A collection of news and information related to Computer Crime published by this site and its partners.
Displaying items 1-12 of 1029 » View ktuu.com items only1 2 3 4 5 6 7 8 9 10 11-86 Next >
Sensitive financial and healthcare information is stored on Web browsers, making it easily accessible to hackers, a new analysis has found. Web browsers – Chrome, Firefox, Safari and Internet Explorer – often save images and other content on...
Under growing pressure over recently disclosed surveillance programs, the head of the National Security Agency told lawmakers Tuesday that gathering telephone data and monitoring Internet use has helped to disrupt more than 50 "potential terrorist events"...
More than a decade ago, I ordered a book from a publisher specializing in technical books. I then received notice that my credit card information, along with hundreds of others, had been compromised by an Internet hacker who had penetrated the publisher's...
In late February, a thief or thieves cracked into Evernote's digital vault filled with log-ins, passwords and email addresses belonging to 50 million users. It was a shocking cyber attack considering the Redwood City, Calif., company offers online lockers...
BEIJING — With Edward Snowden in Hong Kong dribbling out morsels on U.S. cyber surveillance activities to the press, Chinese authorities have several choices for dealing with him. Their options include offering asylum to the former U.S....
BEIJING -- Edward Snowden told Hong Kong media that the United States is involved in extensive hacking operations directed against China and Hong Kong. In an interview with the South China Morning Post published on the newspaper’s website early...
Patrons of several local theaters may be at risk for credit card fraud or identity theft after a box office service based in California was hacked. Touchstone Theatre in Bethlehem, the drama department at Cedar Crest College in Allentown and the Lehigh...
The Hartford CourantDan Esty, the state's energy commissioner, sat across a conference table from Art House, Connecticut's head utility regulator, in the bunker of the State Armory in Hartford last July for a drill that simulated a statewide response to a major hurricane....
WASHINGTON (AP) — The Obama administration considered whether to charge a government contractor with leaking classified surveillance secrets while it defended the broad U.S. spy program that it says keeps America safe from terrorists. Facing a...
RANCHO MIRAGE, Calif. — President Obama and his Chinese counterpart, Xi Jinping, wrapped up a summit at this sweltering California desert resort Saturday after nearly eight hours of talks over two days and a candle-lit dinner aimed at shaping what...
WASHINGTON — President Obama has ordered his national security team to draw up a secret target list for possible cyber-attacks, a major expansion of U.S. planning for disabling and hacking into foreign computer networks, according to a copy of the...
Watchdog with Paul MuschickPeople occasionally ask me what I know about companies that offer identity theft protection services and whether they are worth the cost. I haven't explored that issue, but the Consumer Federation of America has, and it issued an update this......
Jun 19, 2013 |Story| Los Angeles Times
Jun 18, 2013 |Story| Baltimore Sun
Jun 17, 2013 |Story| Baltimore Sun
Jun 17, 2013 |Story| Los Angeles Times
Jun 14, 2013 |Story| Los Angeles Times
Jun 12, 2013 |Story| Los Angeles Times
Jun 12, 2013 |Column| Allentown Morning Call
Jun 12, 2013 |Story| Hartford Courant
Jun 11, 2013 |Story| AP Broadcast
Jun 8, 2013 |Story| Los Angeles Times
Jun 7, 2013 |Story| Los Angeles Times
Jun 7, 2013 | Allentown Morning Call
Original site for Computer Crime topic gallery.