Related topics: hackers

Instant facial recognition a two-edged sword

By the time Joe Rosenkrantz took his seat in his company's conference room, a video camera had already handled the introductions. An image of Rosenkrantz, taken as he walked toward his chair, instantly popped up on a nearby ...

App firm say it may be source of Apple breach

A digital publisher said Monday it was likely the source of a data breach which resulted in the leak of personal data from as many as 12 million Apple iPhone and iPad users.

Hackers claim 12 million Apple IDs from FBI (Update 2)

A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking, but the FBI said it never had the data.

Toronto study shows mobile spyware's long shadow

(Phys.org)—Spyware sold legally can infect BlackBerrys, iPhones, and other mobile devices, according to a study from two security researchers at the University of Toronto Munk School of Global Affairs' Citizen Lab. Morgan ...

India can monitor BlackBerry without codes: report

India has found a way to monitor BlackBerry corporate emails without asking developer Research in Motion (RIM) to hand over encryption codes a report said Wednesday, which could help end a standoff with the Canadian company.

'Predictive policing' takes byte out of crime

Crime fighters have long used brains and brawn, but now a new kind of technology known as "predictive policing" promises to make them more efficient.

Censoring social media fans flames of social unrest

Is social media censorship a means to quell a modern uprising? Some politicians and law enforcers during the political turbulence of 2011 thought so but recent research suggests that uncensored citizens experience less violence ...

page 12 from 40