In a potential blow to government surveillance efforts, a federal judge today ruled that the NSA's practice of collecting phone metadata records on millions of Americans may be unconstitutional.
Stories by Jaikumar Vijayan
The browser cookies that online companies use to track Internet customers for targeted advertising are also used by the National Security Agency to track surveillance targets and break into their systems.
The maker of a popular flashlight app for Android phones has agreed to settle charges brought by the Federal Trade Commission that it left consumers in the dark about its data-sharing practices.
The U.S. National Security Agency is collecting location data daily from tens of millions of cellphones around the world, the Washington Post reported Wednesday.
Many of the LinkedIn emails alerts instructing users on how to reset passwords accessed by hackers were dumped into spam boxes, according to email security vendor Cloudmark.
Professional social networking service LinkedIn today said it is looking into reports that hackers have broken into its systems and accessed the usernames and hashed passwords of the social network's 6.5 million members.
About two years ago, CareFirst BlueCross BlueShield implemented a self-service business intelligence platform to aggregate and analyze vast amounts of data from multiple repositories scattered throughout the company.
Virtualization software vendor VMware today downplayed the seriousness of a source code leak involving the company's ESX hypervisor technology.
Efforts are intensifying to retrieve data belonging to potentially millions of users of Megaupload's online storage service following the company's <a href="http://www.computerworld.com/s/article/9223557/Feds_charge_7_in_massive_case_against_Megaupload_online_piracy_ring">dramatic shuttering</a> by U.S. law enforcement authorities earlier this month.
Intel subsidiary McAfee has agreed to buy database security vendor Sentrigo for an undisclosed sum.
A broad spectrum of IT people, including those close to <a href="http://www.computerworld.com/s/topic/17/Security">security</a> functions, appear to have little awareness of key security issues impacting their organizations, a new survey shows.
Analysts have muted expectations for the parallel data warehouse (PDW) edition of <a href="http://www.computerworld.com/s/article/9140355/Microsoft_preps_SQL_Server_for_battle_in_two_enterprise_arenas">SQL Server 2008 R2</a> that <a href="http://www.computerworld.com/s/article/9137060/Microsoft_Update_Latest_news_features_reviews_opinions_and_more">Microsoft</a> is scheduled to ship next month.
After three years in development, Oracle Corp.'s much-anticipated Oracle Business Intelligence Enterprise Edition 11g (OBIEE) suite will be formally released at an event in London on Wednesday.
The use of virtualization by cloud service providers to host virtual machines belonging to multiple customers on a shared physical infrastructure is opening up fresh data leak risks, a research report warns.
Last month's <a href="http://www.computerworld.com/s/article/9135591/Hacker_break_in_of_Twitter_e_mail_yields_secret_docs?">breach of a hosted Google Apps implementation</a> used by Twitter Inc. has heightened fears in some quarters that cloud computing could pose significant security and privacy risks to users.