Greg Nojeim - News, Features, and Slideshows
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
U.S. President Barack Obama failed to address the National Security Agency's reported efforts to weaken encryption standards and circumvent online encryption technologies in a speech Friday about surveillance reform.
By Grant Gross | 17 January, 2014 20:47
U.S. President Barack Obama's proposed changes to the National Security Agency's surveillance programs don't go far enough, some technology and digital rights groups said, while others hailed it as a good first step.
By Grant Gross | 17 January, 2014 20:00
The U.S. Department of Justice defended the National Security Agency's massive phone records collection program after a U.S. District Court judge ruled Monday that the program is likely to violate the U.S. Constitution.
By Grant Gross | 16 December, 2013 22:03
A U.S. Senate committee has voted to approve a bill that would leave in place the U.S. National Security Agency's bulk telephone-records collection program, with some limits.
By Grant Gross | 31 October, 2013 23:52
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- Marriott CIO: FCC message on WiFi blocking loud and clear
- Microsoft to business: Don't worry about Windows 10, consumers will test it
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
- Verizon to allow opt-out from mobile 'supercookies'
- Brief: Tesla boosts 0-60 acceleration with over-the-air software upgrade
- AT&T will pay $18.2B as top bidder in mobile spectrum auction
- BMW cars found vulnerable in Connected Drive hack
- Twitter's Vine Kids app is not just for kids
- Apple puts the big hurt on Samsung
- Google Glass holds promise but requires a 'reset'
- Microsoft updates cloud-based SQL Server to simplify management