An investigation into the use of a personal email system for official communications by Hillary Clinton, while she was U.S. secretary of state, has been closed with no charges filed, U.S. Attorney General Loretta E. Lynch said Wednesday.The move comes after FBI Director James Comey on Tuesday said he did not recommend bringing charges against her although he described as “extremely careless” the use by her and her aides of unsecured email networks for distribution of very sensitive, highly classified information.To read this article in full or to leave a comment, please click here
An investigation into the use of a personal email system for official communications by Hillary Clinton, while she was U.S. secretary of state, has been closed with no charges filed, U.S. Attorney General Loretta E. Lynch said Wednesday.The move comes after FBI Director James Comey on Tuesday said he did not recommend bringing charges against her although he described as “extremely careless” the use by her and her aides of unsecured email networks for distribution of very sensitive, highly classified information.To read this article in full or to leave a comment, please click here
An appeals court has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act, when he and other former employees used the login credentials of a current employee to gain access to data on the employer’s computers.The opinion of the court is likely to be controversial as it is expected to have implications on commonplace sharing of passwords by husbands, co-workers and friends even for innocuous purposes.One of the three judges, Stephen Reinhardt, for example, dissented from the majority opinion, stating that “people frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it.”To read this article in full or to leave a comment, please click here
An appeals court has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act, when he and other former employees used the login credentials of a current employee to gain access to data on the employer’s computers.The opinion of the court is likely to be controversial as it is expected to have implications on commonplace sharing of passwords by husbands, co-workers and friends even for innocuous purposes.One of the three judges, Stephen Reinhardt, for example, dissented from the majority opinion, stating that “people frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it.”To read this article in full or to leave a comment, please click here
A second man has pleaded guilty to using a phishing scheme to get access to private and sensitive videos and photographs of people in the entertainment industry in Los Angeles.Edward Majerczyk, 28, a resident of Chicago and Orland Park, Illinois, has admitted in a plea agreement entered in the U.S. District Court for the Central District of California that between Nov. 23, 2013 through August 2014, he had engaged in a phishing scheme to obtain usernames and passwords from his victims, according to the U.S. Attorney’s Office for the Central District of California.Majerczyk gained access to the victims’ usernames and passwords after he sent them emails that appeared to be from security accounts of internet service providers. These mails directed the victims to a website that would collect their usernames and passwords. After illegally accessing the email accounts, he obtained personal information including sensitive and private photographs and videos, according to his plea agreement.To read this article in full or to leave a comment, please click here
A second man has pleaded guilty to using a phishing scheme to get access to private and sensitive videos and photographs of people in the entertainment industry in Los Angeles.Edward Majerczyk, 28, a resident of Chicago and Orland Park, Illinois, has admitted in a plea agreement entered in the U.S. District Court for the Central District of California that between Nov. 23, 2013 through August 2014, he had engaged in a phishing scheme to obtain usernames and passwords from his victims, according to the U.S. Attorney’s Office for the Central District of California.Majerczyk gained access to the victims’ usernames and passwords after he sent them emails that appeared to be from security accounts of internet service providers. These mails directed the victims to a website that would collect their usernames and passwords. After illegally accessing the email accounts, he obtained personal information including sensitive and private photographs and videos, according to his plea agreement.To read this article in full or to leave a comment, please click here
A move in the Senate to provide enhanced surveillance powers to the FBI through the use of National Security Letters met a hurdle Monday after Senator Ron Wyden placed a hold on the 2017 Intelligence Authorization bill over the controversial provisions.Wyden’s hold is a a measure by which a senator or group of senators can prevent a motion from reaching a vote.Tech companies and industry and civil rights groups are opposed to what is seen as a wider push by the Senate to increase the scope of the NSLs, which would allow the government to collect Internet records such as browsing history, email metadata, and location information through administrative orders and without court approval.To read this article in full or to leave a comment, please click here
A move in the Senate to provide enhanced surveillance powers to the FBI through the use of National Security Letters met a hurdle Monday after Senator Ron Wyden placed a hold on the 2017 Intelligence Authorization bill over the controversial provisions.Wyden’s hold is a a measure by which a senator or group of senators can prevent a motion from reaching a vote.Tech companies and industry and civil rights groups are opposed to what is seen as a wider push by the Senate to increase the scope of the NSLs, which would allow the government to collect Internet records such as browsing history, email metadata, and location information through administrative orders and without court approval.To read this article in full or to leave a comment, please click here
Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here
Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here
Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here
Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here
Google Fiber is acquiring Internet service provider Webpass to be able to increase its urban coverage quickly and offer customers a combination of fiber and wireless delivery of high-speed Internet.
For Google Fiber, which has typically worked with cities in planning and building a fiber network from scratch, the acquisition will give the Alphabet business a headstart in many markets, particularly in dense urban areas.
The financial terms of the acquisition were not disclosed. Google did not immediately comment on the acquisition.
Webpass in San Francisco owns and operates its Ethernet network, thus removing its dependence on phone and cable companies. It has operations in San Francisco, Oakland, Emeryville, Berkeley, San Diego, Miami, Miami Beach, Coral Gables, Chicago and Boston. The company offers business connections from 10 to 1,000 Mbps and to residential customers service from 100 Mbps to 1Gbps.To read this article in full or to leave a comment, please click here
Google Fiber is acquiring Internet service provider Webpass to be able to increase its urban coverage quickly and offer customers a combination of fiber and wireless delivery of high-speed Internet.
For Google Fiber, which has typically worked with cities in planning and building a fiber network from scratch, the acquisition will give the Alphabet business a headstart in many markets, particularly in dense urban areas.
The financial terms of the acquisition were not disclosed. Google did not immediately comment on the acquisition.
Webpass in San Francisco owns and operates its Ethernet network, thus removing its dependence on phone and cable companies. It has operations in San Francisco, Oakland, Emeryville, Berkeley, San Diego, Miami, Miami Beach, Coral Gables, Chicago and Boston. The company offers business connections from 10 to 1,000 Mbps and to residential customers service from 100 Mbps to 1Gbps.To read this article in full or to leave a comment, please click here
Intel, SAP, Lyft, Spotify and VMware are among over 30 Silicon Valley companies that on Wednesday signed a pledge that they would take action to make their technology workforce "fully representative of the American people, as soon as possible."The absence of diversity in the tech industry in Silicon Valley was highlighted about two years ago by civil rights leader Rev. Jesse Jackson, who pressed some companies to release data on their employment of Blacks, Hispanics and women. Many tech companies like Google and Intel released data but it was found that their workforce was predominantly male and white.Under pressure from Jackson to set specific goals, some companies announced their plans for promoting inclusion. Intel, for example, made a pledge to invest US$300 million on diversity and inclusion and announced a goal to reach full representation of women and underrepresented minorities in its U.S. workforce by 2020. Google also announced a $150 million expenditure to get more women and other minorities into the tech industry.To read this article in full or to leave a comment, please click here
Microsoft believes its refusal to turn over email held in Ireland to the U.S. government got a boost from an opinion of the Supreme Court on Monday, which upheld that U.S. laws cannot apply extraterritorially unless Congress has explicitly provided for it.In a decision Monday in a separate case on the extraterritorial application of a provision of the Racketeer Influenced and Corrupt Organizations Act (RICO), the Supreme Court set out the ground rules for its analysis, pointing out that “absent clearly expressed congressional intent to the contrary, federal laws will be construed to have only domestic application.” The court was applying a canon of statutory construction known as the presumption against extraterritoriality.To read this article in full or to leave a comment, please click here
Microsoft believes its refusal to turn over email held in Ireland to the U.S. government got a boost from an opinion of the Supreme Court on Monday, which upheld that U.S. laws cannot apply extraterritorially unless Congress has explicitly provided for it.In a decision Monday in a separate case on the extraterritorial application of a provision of the Racketeer Influenced and Corrupt Organizations Act (RICO), the Supreme Court set out the ground rules for its analysis, pointing out that “absent clearly expressed congressional intent to the contrary, federal laws will be construed to have only domestic application.” The court was applying a canon of statutory construction known as the presumption against extraterritoriality.To read this article in full or to leave a comment, please click here
U.S. warnings and public scrutiny of hacks by groups believed to be China-based may have led to an overall decrease in intrusions by these groups against targets in the U.S. and 25 other countries, a security firm said.From mid-2014, after the U.S. Government took punitive measures against China, including indicting members of the Chinese People’s Liberation Army for computer hacking, economic espionage and other charges, and raised the possibility of sanctions, FireEye has seen a notable decline in successful network compromises by China-based groups in these countries.To read this article in full or to leave a comment, please click here
U.S. warnings and public scrutiny of hacks by groups believed to be China-based may have led to an overall decrease in intrusions by these groups against targets in the U.S. and 25 other countries, a security firm said.From mid-2014, after the U.S. Government took punitive measures against China, including indicting members of the Chinese People’s Liberation Army for computer hacking, economic espionage and other charges, and raised the possibility of sanctions, FireEye has seen a notable decline in successful network compromises by China-based groups in these countries.To read this article in full or to leave a comment, please click here
Apple may finally get clearance to set up its stores in India, following the Indian government’s decision Monday to liberalize rules requiring local sourcing of some products sold in foreign-owned, single-brand stores.The iPhone maker operates in the country through third-party owned, exclusive stores run by partners like Imagine, in addition to selling through retail chains and online e-commerce websites. But Apple considers the design and layout of its own stores a key element of its branding and retail experience.The Indian government, in a statement Monday, said the local sourcing requirements, which had been a hurdle for Apple to get clearance for its own branded stores, have been relaxed for up to three years. The new rules include a relaxed “sourcing regime” for an additional five years introduced for “entities undertaking single-brand retail trading of products having ‘state-of-art’ and ‘cutting edge’ technology."To read this article in full or to leave a comment, please click here