News

apple store luxury retail
controlling privacy

ransomware

Consultant urges never pay ransomware demands

When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.

p1200661

FedEx offering $5 and all you have to do is, gulp, reinstall or reactivate Flash

Testing the limits of what a customer might do for gettiing $5 off.

p1200591

Apple: Macs and iPhones are safe from newly revealed CIA exploits

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.

windows phone cortana

Microsoft delays tools for third-party Cortana integrations

Microsoft has delayed the release of its tools for connecting other services to the Cortana virtual assistant, a decision that could cause it to lose ground in a crowded industry.

Google Play

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.

Digital Key encryption

To punish Symantec, Google may distrust a third of the web's SSL certificates

Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and to force the company to replace all of its customers' certificates.

H-1B visa Statue of Liberty America

H-1B lottery’s game of chance is legal, judge rules

A lawsuit that challenged the fairness and legality of the H-1B lottery system, calling it a "never ending game of chance," has been thrown out in federal court.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

DHL augmented reality

Augmented reality gets a second life in manufacturing

Although augmented reality may not have gotten very far in the consumer market, the technology is getting a second look in the manufacturing sector.

bitcoins

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.

esmond kane

Blockchain can help secure medical devices, improve patient privacy

If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.

Uber headquarters office San Francisco

Uber finally agrees to reveal diversity data

Uber Technologies has agreed to provide next month its diversity data, which it had earlier declined to make public.

FBI

FBI director floats international framework on access to encrypted data

The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

20170104 ces microsoft autonomous car

Microsoft expands connected car push with patent licensing

Microsoft’s push into the connected car market continued Wednesday when it unveiled a new patent licensing program aimed at crafting deals for carmakers and other companies.

161214 apple newyork

Leaked iCloud credentials obtained from third parties, Apple says

The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services.

free tech software storage

18 free cloud storage options

A review of 18 companies that offer free cloud storage

zerow

Google's Android Things OS won't work on new Raspberry Pi board

The new Raspberry Pi Zero W was designed to be a board to make internet of things devices, but a key OS from Google won't work on the hardware.

21394517746 9a77570fae o

Newly leaked documents show low-level CIA Mac and iPhone hacks

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

Load More