The group of experts said that forcing the shutdown of internet access can "never be justified" under international human rights laws.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
Did anyone wonder why the feds aren't screaming blind fury from the rooftops?
The Freedom Act is seen by many as the last chance to get a bill through Congress reining in the NSA's vast dragnet. But some privacy groups say the effort doesn't go far enough.
The former NSA official turned whistleblower said, among other things, a greater threat exists to Americans' privacy than the controversial Patriot Act.
A collection of notable security news items for the week ending May 1, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
One of the agency's first whistleblowers says the NSA is taking in too much data for it to handle, which can have disastrous -- if not deadly -- consequences.
Traffic hit upwards of 334Gbps, which accounts for tens of thousands of connections.
The new bill lands with just over a month before the Patriot Act sunsets. Privacy advocates say the bill does not go far enough to protect Americans' privacy.
The emailing service confirmed it anticipates many more users could be affected than first thought after an employee account was accessed.
WordPress issued a security update shortly after the news broke over the weekend.
When you don't differentiate between good and bad hackers, you have a problem.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
OS X may have a better security reputation than Windows, but it's far from perfect.
A collection of notable security news items for the week ending April 24, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
OPINION: In his RSA 2015 keynote on national cybersecurity threats, Homeland Security head Jeh Johnson told an audience of cybsersecurity experts something so wildly impossible, it almost went unnoticed.
The best of ZDNet, delivered
- 1 The NSA may not be listening to your private phone calls, but it has been watching your private parts
- 2 Registry hack enables continued updates for Windows XP
- 3 The top ten most common database security vulnerabilities
- 4 Symantec releases simplified Norton Security line
- 5 Mobile app permissions: Who does it right?