But wait, there's more: A US spying Q&A

Wait, there's more? Yes, this was the week that America's intelligence secrets spilled out: Classified court orders. Top secret Power Point slides. Something called PRISM. It's pretty important stuff, once you've made sense ...

US judge orders Google to turn over data to FBI

A U.S. judge has ruled that Google Inc. must comply with the FBI's warrantless demands for customer data, rejecting the company's argument that the government's practice of issuing such requests to telecommunication companies, ...

Tech push transforms TV viewing experience

For decades we've been watching TV. Now a new generation of televisions is beginning to watch us. Technological advances are giving the old clunky "boob tube" an IQ injection. Some of the new breed of smart TVs comes equipped ...

Microfluidic devices move from application to fundamental science

(Phys.org) —Just a few drops of liquid or a bit more is run past specialized sensors in microfluidic devices to detect chemicals of concern to doctors and security personnel. However, these devices are now being reinvented ...

Better than X-rays: A more powerful terahertz imaging system

(Phys.org) —Low-energy terahertz radiation could potentially enable doctors to see deep into tissues without the damaging effects of X-rays, or allow security guards to identify chemicals in a package without opening it. ...

Google to Congress: Time to change email laws

Google Inc. is calling on the U.S. Congress to update laws related to email and other forms of electronic communications, calling the current rules outdated and inconsistent.

FBI snooping tactic ruled unconstitutional (Update)

A US judge has ordered the FBI to stop its "pervasive" use of National Security letters to snoop on phone and email records, ruling Friday that the widespread tactic was unconstitutional.

Report: VA sent data over unsecured networks

A government watchdog says the Veterans Affairs Department has been sending sensitive data—including electronic health records—over unencrypted networks, making them vulnerable to theft or misuse.

page 8 from 13