The top U.S. military officer says it will take two years of study and billions of dollars to overcome the loss of security to military operations and tactics revealed by Edward Snowden.
CIOs from companies in all walks of business are using the Target breach as a rallying point to...
State and federal politicians are pushing for a kill switch that would allow users to disable...
New cutting-edge technology could help you reclaim the security of your smartphone. Chip Reid reports on the Blackphone, which runs on a customized operating system that is entirely encrypted.
The sensor brings convenience for entering passcodes and could encourage more people to lock their phones. But fingerprint security isn't foolproof. Here's what to know as you consider whether to place your trust in it.
U.S. retailers are using mobile-based technology to track shoppers' movements at some malls and stores. The companies collecting the information say it's anonymous, can't be traced to a specific person and no one should worry about invasion of privacy.
A coalition of the leading U.S. technology firms is urging changes in the government's spying programs.
Although social engineering often ultimately leads to a cyber attacks, it may not start out that way. It may start with someone pretending to be a customer or the CEO’s friend, telephoning your company and tricking someone to give out information they should not be divulging.
Google is offering new and "far-reaching" concessions to the European Union's antitrust watchdog that are likely to be enough to settle allegations it is abusing its dominant position in Internet searches, the EU said Wednesday.
One of the six men from China charged with conspiring to steal patented seed corn from two of the nation's leading seed developers has appeared in federal court in Des Moines and was ordered held in custody while he awaits trial.
An 83-year-old Catholic nun convicted in a protest and break-in at the primary U.S. storehouse for bomb-grade uranium will find out Tuesday whether she spends what could be the rest of her life in prison.
Former NSA contractor Edward Snowden claimed in a new interview that the U.S. agency is involved in industrial espionage.
Coca-Cola said Friday that laptop computers stolen from its Atlanta headquarters held the personal information of up to 74,000 people.
It should come as no surprise that intellectual property owners concerned that their valuable 3D printing product designs will be copied and traded on the internet need to focus on the available legal tools to protect product designs — most notably copyright, design patents and laws protecting trade dress in product configurations.
Friedberg, an Internet intelligence pioneer who describes himself as "extremely pro-law enforcement," is among a growing number of former national security and law enforcement officials who are questioning the current scope of the National Security Agency's data-gathering programs.
Chinese police seized almost 60,000 suspects involved in intellectual property infringement cases with a total estimated value of 173 billion yuan ($28 billion) in 2013, state media reported Tuesday.
The Organization for the Prohibition of Chemical Weapons says 14 private sector companies have submitted bids to destroy chemicals removed from Syria as part of international efforts to dismantle Damascus' poison gas and nerve agent program.
President Barack Obama on Friday will call for ending the government's control of phone data from millions of Americans, but will not offer a plan for where the information should be held, a senior administration official said.
The National Security Agency has implanted software in nearly 100,000 computers around the world — but not in the United States — that allows the U.S. to conduct surveillance on those machines, The New York Times reported.
Chief financial officer Cathy Meng rejected as "groundless" reports that Huawei equipment might be more vulnerable to security threats than telecoms infrastructure made by other companies.
Defense contractor Honeywell International Inc. said Sunday it is cooperating with a Department of Justice probe into the overseas production of equipment it provided for a U.S. fighter jet.
It is easy to look at Shodan as the problem — it provides easy access to the devices connected to the Internet. In reality, however, Shodan simply highlights the security vulnerabilities of many of the devices that comprise the Internet of Things (IoT). The real problem is not that Shodan finds insecure devices, but that so many devices lack real security.
Next-generation manufacturers are particularly vulnerable when supplying other manufacturers who purchase their goods. If the buyer has the right to inspect the seller’s manufacturing technologies or otherwise has access to the seller’s manufacturing processes, innovative technologies and proprietary advancements, the rights to protect such intellectual assets may be compromised.
A secretive U.S. spy court has ruled again that the National Security Agency can keep collecting every American's telephone records every day, in the midst of dueling decisions in two other federal courts about whether the surveillance program is constitutional.
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.
Two California officials have announced plans to introduce legislation requiring smartphones to have a "kill switch" that would render stolen or lost devices inoperable.
Silent Circle, the global encrypted communications firm revolutionizing mobile device privacy and security for organizations and individuals alike, has announced the availability of its Silent Contacts app for Android via Google Play.
Even as Silicon Valley speaks out against the U.S. government's surveillance methods, technology companies are turning a handsome profit by mining personal data and peering into people's online habits.
- Page 1