regulation - News, Features, and Slideshows
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.
By Jeremy Kirk | 21 May, 2015 15:25
The European Parliament wants to apply strict disclosure requirements on companies whose products contain so-called conflict materials, often used in laptops, tablets and smartphones and other consumer electronics.
By Loek Essers | 21 May, 2015 02:38
There are no plans to require back doors in communications encryption in Europe, according to European Commission Vice President Andrus Ansip. Proposals for mandatory encryption workarounds for mobile devices in the U.S. are the subject of a heated debate.
By Loek Essers | 20 May, 2015 21:18
The US financial consumer protection watchdog has ordered PayPal to cough up US$25 million in fines for deceptive practices around the company's credit service, which included signing up customers for the service without their consent.
By Zach Miners | 20 May, 2015 05:30
Alibaba Group has been hit with a lawsuit from luxury brands that alleges that the Chinese e-commerce giant has been deliberately promoting the sale of counterfeit products.
By Michael Kan | 18 May, 2015 14:07
A flurry of activity will follow the plan from U.S. Federal Communications Commission Chairman Tom Wheeler to reclassify broadband as a regulated public utility as the foundation for new net neutrality rules.
By Grant Gross | 06 February, 2015 06:47
In the debate over net neutrality, AT&T and Cisco are warning that fiber optic cable rollouts could be delayed -- and revenues lost -- if President Obama's recently proposed rules move ahead.
By Matt Hamblen | 14 November, 2014 23:15
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
The U.S. Federal Communications Commission and its allies have several options, with most of them difficult, after a U.S. appeals court struck down most of the agency's 2010 net neutrality rules.
By Grant Gross | 14 January, 2014 20:48
Whitepapers about regulation
With the number of new and emerging security products being denoted by analysts as the “silver bullet” solution, it is critical to recognize that there are many authentication choices available on the market. In this whitepaper, we look at what organisations must consider before making a final selection, specially their user authentication needs, the threats targeting their business, their business objectives and the regulatory guidelines that impact their industry.
Axon wanted to win more business by reaching out to CIOs and key technology decision makers with more flexible, affordable and easy-to-manage disaster recovery solutions.
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- Microsoft offers Windows 10 carrot, threatens with stick
- US Senate leader pushes to extend NSA phone dragnet
- IBM defends use of temp visa workers
- Marines test augmented reality battlefield
- Pebble Time smartwatch to begin shipping on May 27
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
- Secom security drone follows, photographs intruders
- Alibaba's UC Browser found leaking users' data
- Freelance hacking site vows to clean up dodgy listings