More Posts

Photo
Steve Jobs shown in 2005 introducing the iTunes music service in Tokyo.Credit Shizuo Kambayashi/Associated Press

Apple iPod Lawsuit Down to One Plaintiff

In an odd legal turn, the lawyers suing Apple could not prove that one of their clients purchased an iPod during the time frame in which Apple is accused of blocking music from competitors.Read more…

Photo
Apple’s iPod Nano. Apple is accused of using a copyright management system in its music software to block other stores.Credit Robert Galbraith/Reuters

Apple iPod Suit May Lack One Thing: A Plaintiff

The company’s lawyers claim that the iPods owned by two people represented in the lawsuit were purchased after the period during which Apple is accused of behaving in an anticompetitive manner.Read more…

Photo
Isabelle Falque-Pierrotin said that as long as a European resident had requested that online links be removed, then any search engine must comply with that decision across the globe.Credit Stephane de Sakutin/Agence France-Presse — Getty Images

French Official Campaigns to Make ‘Right to be Forgotten’ Global

Isabelle Falque-Pierrotin, who heads the French data protection authority and heads a European body composed of the region’s 28 national privacy regulators, said Google must do more than remove links from its European domains.Read more…

Photo
An Amazon fulfillment center in Phoenix. Prominent sites like Amazon offer secure URLs. Look for a green padlock symbol and the letters https (rather than http) in the URL bar.Credit David Paul Morris/Bloomberg, via Getty Images

Smart Steps at the Online Checkout

Security breaches can happen when you shop online, so here are tips to ensure privacy.Read more…

Photo
Shoppers at a Macy’s in New York City. As breaches in the last year have shown, debit or credit card transactions in stores are as susceptible to hacking as online transactions.Credit Justin Lane/European Pressphoto Agency

Minimizing In-Store Shopping Dangers

Cash is the most secure form of payment, but there are also other alternatives to magnetic-stripe credit and debit cards.Read more…

Photo
Shoppers at Covent Garden in London who pay with plastic get extra fraud protection because of a chip in all credit and debit cards in Europe.Credit Andrew Testa for The New York Times

Preparing for Chip-and-PIN Cards in the United States

Americans retailers and banks are preparing for the wide release of a security technology in which a chip embedded into credit and debit cards can substantially reduce many forms of fraud.Read more…

Photo
The Amazon Web Services data center in the United States East Region. In 2009, a password-stealing collection of malevolent software was found inside A.W.S., among the world’s largest cloud-computing systems.Credit Amazon Web Services

Computing Goes to the Cloud. So Does Crime.

While public clouds, by their nature, provide opportunities for malicious hackers, the sophistication of the systems and their management allow for new ways to defend against attacks.Read more…