Skip to content

Computers


Is Your Gmail Safe From the G-Men?

Does the Fourth Amendment’s requirement that the government obtain a warrant to search one’s effects based on probable cause apply to e-mail communications? It all depends on where those e-mails are...

Federal Judge Rules Against Copyright Trolls

The Electronic Frontier Foundation (EFF) has asked an Illinois judge to quash subpoenas issued in a "reverse class action" lawsuit accusing thousands of people of illegally downloading pornography, and urged the...

Feds Plotted Invasion of Social Media

The federal government wanted to hire a “security” contractor to create software that would allow legions of fake profiles on social-networking services to spy, promote propaganda, and smear enemies of the...

Apple’s Refreshed MacBooks Pro

Apple announced the release of a new line of refreshed, enhanced MacBook Pro laptops last week. The new MacBook Pros represent a boon for the Apple company, which is currently soaring...

Apple Produces New iPad

With Valentine’s Day just around and corner, finding that right gift that says “I love you” is not always so easy. For those looking to break with the traditional flowers and...

Hackers Shut Down Egyptian Regime’s Websites

A loosely affiliated network of hackers around the world known as “Anonymous” took credit for shutting down the Egyptian regime’s websites in support of anti-government protestors. The group is also targeting...

Internet IDs Are On the Way

Under the guise of security, the Obama administration is creating an Internet ID for all Americans. The program for the National Strategy for Trusted Identities in Cyberspace was announced last week...

Privacy Laws at Risk for Internet Users

Telecommunications and Internet companies are increasingly finding themselves in uncomfortable positions, caught between privacy laws that protect their consumers and law enforcement efforts that necessitate privacy invasion. As Internet and telecommunications...