-
People who use Gmail and other free email systems have no reasonable expectation of privacy, according to court papers filed by lawyers for Google. The filing was made in June, when Google moved to dismiss a case accusing it of breaking laws by scanning users' emails to target them with ads.
-
The Renew company has been asked to cease tracking the cellphones of pedestrians who pass its recycling bins, which also double as kiosks showing video advertisements. The bins logged data about any Wi-Fi-enabled device that passed within range.
-
The owner of the encrypted email service posted a cryptic message, saying he was barred from divulging specifics.
-
According to The New York Times, the National Security Agency is watching emails and other text communications that go in and out of the country. It's looking for key words. The agency says it only gathers information it is authorized to collect.
-
A special committee that includes two members of the Lacks family will review scientists' applications for access to the genetic sequence of cells derived from a tumor that killed Henrietta Lacks. The cells are among the most widely used in research.
-
Each summer, thousands of security researchers, hacktivists, black hats, white hats and feds descend on Las Vegas for Black Hat and Def Con. A look at the stories and trends we're keeping an eye on.
-
Sources tell CNET °µºÚ±¬ÁÏ that government investigators have asked for such data. Whether any company has turned the information over isn't clear. The report is the latest in a string of stories in recent weeks about steps the National Security Agency and FBI are reportedly taking.
-
Whether it's facial recognition or snapping photos with a wink of an eye, hackers are proving it's possible to re-engineer Google Glass in a number of creative ways.
-
A group of good guy hackers showed us how they can listen in on phone conversations and read text messages of Verizon customers simply by using inexpensive store bought technology.
-
More than half of health-related websites checked by a health policy researcher used trackers that could provide data about visitors to third parties. Some also shared search terms that could be linked to a visitor.