Last month's <a href="http://www.computerworld.com/s/article/9135591/Hacker_break_in_of_Twitter_e_mail_yields_secret_docs?">breach of a hosted Google Apps implementation</a> used by Twitter Inc. has heightened fears in some quarters that cloud computing could pose significant security and privacy risks to users.
Stories by Jaikumar Vijayan
In another big victory for the Recording Industry Association of America (RIAA) a federal jury has fined Boston University student Joel Tenenbaum US$675,000 for illegally downloading and distributing 30 copyrighted songs.
Two recent court decisions -- one in New York and the other in Wisconsin -- highlight the continuing struggles that courts around the country are having over law enforcement's use of GPS devices to track an individual's movements.
The IT staff at the U.S. House of Representatives is taking emergency steps in an effort to handle a fourfold increase in the amount of e-mail that has come in via the House's web site since Sunday, when the text of the proposed Wall Street bailout bill was posted online.
Companies that are globalising their operations or outsourcing work to offshore locations shouldn't overlook behavioural and cultural differences when developing their security risk-management plans, according to a survey of IT managers and end users in 10 countries that was released by Cisco Systems.
A federal judge in Minnesota Wednesday ordered a new trial in a copyright infringement case involving a woman who last fall was told by a jury to <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9041018">pay US$222,000</a> to various record companies for illegally copying and distributing 24 songs.
A federal judge in Boston Thursday refused to lift a temporary <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9112159&intsrc=news_list">restraining order</a> preventing three <a href="http://www.computerworld.com/action/inform.do?command=search&searchTerms=Massachusetts+Institute+of+Technology">MIT</a> students from publicly discussing details of several security vulnerabilities that they found in the electronic ticketing system used by the city's mass transit authority.
In the US, privacy and civil rights advocates are expressing their dismay over a pair of decisions made by a California District Court judge last week to shut down Wikileaks.org, a controversial Web site that allows whistleblowers to anonymously post corporate and government documents online.
How bad was 2007 for breaches, vulnerabilities and similar mayhem? On the bright side, it was better than 2008 is forecast to be. With more of every sort of meltdown predicted -- more criminalization of the hacker community, more Web-application attacks, more phishing, more spamming, more zero-day attacks and more virtualization-related threats -- we're happy to tell you that you are likely to look back on 2007 as the peaceful old days.
Facebook's Beacon ad service may, ironically, be the best thing that's happened to the online privacy movement in a while.
Banks in the UK could end up spending upwards of US$500 million to deal with the aftermath from the recent loss of computer disks containing bank account and other personal data belonging to about 25 million people, according to analyst firm Gartner.
After months of speculation about how exactly the intrusion at TJX Companies. happened, officials now know how the theft was committed.
A former network engineer and technical services manager at the Council of Community Health Clinics (CCC) in San Diego could spend 10 years in prison after a federal jury convicted him last week of hacking into his former employer's computers and sabotaging patient data.
Though it might not seem that way, the top 10 most vulnerable software vendors -- and, yes, that includes Microsoft Corp. -- are contributing a smaller percentage of all vulnerability disclosures per year compared to five years ago.
A faulty antivirus update from McAfee Inc. that mistakenly identified hundreds of programs as a Windows virus has resulted in some companies accidentally deleting significant amounts of data from affected computers.
Nominations close on August 3
WEDNESDAY, JULY 29 | How partners can help their customers make the most of Cloud as the future of work takes hold
EDGE 2020 Goes Virtual