The view from the top of IT with TechWorld Editor Rohan Pearce
The state attorney general for New York has sent the five largest U.S. cellphone carriers each a letter asking why they all oppose the installation of a "kill-switch" device in their handsets as a deterrent against smartphone theft.
By Martyn Williams | 11 December, 2013 20:44
An Arizona lawmaker is eyeing an unusual way of reigning in the National Security Agency, which has been under fire for questionable surveillance practices: Block it from operating in her state.
By Jaikumar Vijayan | 11 December, 2013 20:06
Negotiators on a secret trade treaty, which includes controversial intellectual property proposals, could not meet their year-end deadline for an agreement this week at Singapore.
By John Ribeiro | 11 December, 2013 05:34
The U.S. Federal Communications Commission should limit the amount of spectrum that giant mobile carriers AT&T and Verizon Communications are able to buy in an auction scheduled for mid-2015, some U.S. senators said Tuesday.
By Grant Gross | 10 December, 2013 22:17
Chinese vendors that previously accepted bitcoins stopped doing so just days after China moved to ban banks from trading in the virtual currency.
By Michael Kan | 09 December, 2013 12:23
Amazon's nascent plan to use unmanned drones to deliver packages to customers has already raised strong privacy concerns that could ultimately nip it in the bud.
By Jaikumar Vijayan | 06 December, 2013 11:42
Technology users -- retailers, in particular -- are being snared in patent infringement lawsuits, prompting Congress to eye reforms that could change how lawsuits are filed and who pays if they're frivolous.
By Patrick Thibodeau | 02 December, 2013 11:28
Anyone who dreads hearing one end of a loud phone call all the way from Anchorage to Miami, take heart: The plan to allow cellphones on planes could fail in more ways than an overbooked flight at a snowbound airport on Christmas Eve.
By Stephen Lawson | 23 November, 2013 01:12
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
By Jaikumar Vijayan | 19 November, 2013 17:51
With the number of new and emerging security products being denoted by analysts as the “silver bullet” solution, it is critical to recognize that there are many authentication choices available on the market. In this whitepaper, we look at what organisations must consider before making a final selection, specially their user authentication needs, the threats targeting their business, their business objectives and the regulatory guidelines that impact their industry.