SAN FRANCISCO (AP) -- Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the world. ...
Tags: Yahoo, Encrypt, Users'Personal Data
Should newspapers get into the online learning business? Digital strategist Amy Webb floated the prospect at October's Online News Association conference as one of the top 10 tech trends for 2014 for media companies. As massive open ...
The world’s tallest building is getting rebuilt with some of the worlds best lighting. One World Trade Center is currently getting fitted with hundreds of red, white and blue LED modules. Washington Post states that, “The Port ...
Tags: LED Lights, World Trade Center
The latest documents to be leaked via whistleblower Edward Snowden suggest that the US National Security Agency (NSA) and GCHQ have tapped the communications networks of popular internet companies. "Top secret" documents published in the ...
Tags: Computer Products, web security
Cargo theft and cattle rustling are crippling crimes for farmers and ranchers. Theft may take the form of one big grab and run, or it may be the death-of-a-thousand-cuts. A tiny sampling of recent cargo hits from the Associated Press: In ...
Tags: Agriculture, Food
The National Security Agency (NSA) is harvesting data from contact lists of millions of personal email and instant messenger accounts from across the globe, according to documents leaked by whistleblower Edward Snowden. The latest Prism ...
Tags: Computer Products, software
The New York Times website was unavailable to its readers yesterday afternoon in the US, after a cyber attack on the organisation's web host, Melbourne IT. Twitter, which uses Melbourne IT as a domain name registrar, was also affected by ...
Tags: Computer Products, webservice
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT. A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc ...
Tags: Computer Products, IT
The LED lamp, called the Curl, was created by British designer Sebastian Bergne. A circular LED bulb is finished simply with a curl of white plastic, resulting in a minimalist design and original shape. The bulb's temperature can be ...
The well known lighting designer Ingo Maurer brings the phrase Porca Miseria to life with this intimate portrayal of an?Italian curse.?Porca Miseria! or 'Holy Crap', may be exactly what someone would say when dropping their favorite dish ...
Tags: Dishes Light, Lights, Lighting
An audit of US National Security Agency eavesdropping has found that the security agency routinely violates its own privacy rules. According to a leaked, supposedly top secret audit, the NSA violated its on privacy policies 2,776 times in ...
Tags: Computer Products, sfotware
Fugitive document leaker Edward Snowden has formally applied for political asylum in Russia after spending eight days in the transit area of Moscow's Sheremetyevo airport. The Reuters news agency quoted an unnamed Russian immigration ...
Tags: NSA, Edward Snowden, Russia
More secret National Security Agency documents leaked by Edward Snowden to The Guardian suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables. The operation ...
Yahoo has received between 12,000 to 13,000 requests for user data from law enforcement agencies in the U.S. between Dec. 1 and May 31 this year, the company said Monday. The most common of these requests concerned fraud, homicides, ...
Tags: Yahoo, User Data, Law Enforcement Agencies
The National Security Agency is creating new processes aimed at making it harder for systems administrators to misuse privileged access to agency systems, NSA officials told the U.S. House Intelligence Committee Tuesday. NSA director ...
Tags: NSA, 2-Person Rule