March 12, 2014 |
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to The Intercept , which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far, the report said.
May 24, 2012 |
Could Apple's mobile assistant, Siri, be making the jump to the company's line of Mac computers? It could happen, reports suggested. Nine to 5 Mac reported signs indicating that while Siri might not join Apple's Macs soon its related feature, Dictation, might. Dictation, which debuted with this year's line of iPads, appears in apps that use a keyboard and enables users to speak rather than type to create text. Programming code inside the latest version of Safari on Apple's upcoming operating system, Mountain Lion, show evidence that Dictation could be added to Mac computers, 9 to 5 Mac reported.
April 17, 2013 |
If you've received an email about the Boston bombings, do not click on the link. A spam-monitoring lab at the University of Alabama at Birmingham says a new malware campaign targeting Windows computers is sending out an "unprecedented" amount of spam emails. If users open the email and click on the link inside, the malware will infect their computers. “The volumes are just astronomical,” said Gary Warner , a cyber researcher with UAB's Computer Research Forensics Lab. PHOTOS: The top smartphones of 2013 The lab looks for spam that can result in users' computers becoming infected, Warner said.
August 3, 2012 |
The Pentagon's Missile Defense Agency has told employees to stop using work computers to peruse pornograpy and visit porn sites -- just the latest example of public employees behaving badly. Bloomberg News service obtained a memo that agency Executive Director John James Jr. wrote on July 27 revealing that government employees and contractors had been detected in recent months "engaging in inappropriate use of the MDA network," including "accessing websites, or transmitting messages, containing pornographic or sexually explicit images.
April 28, 1985 |
Suburban high schools in Arlington County, Va., are using computers to record and try to remedy the problem of truancy. Unexplained absences are recorded in the machine, and each night the computer telephones the student's home and, using a human voice, demands a written excuse for the absence.
CALIFORNIA | LOCAL
August 16, 1997
Re "Unless Teachers Get Involved, Wiring Schools Just Enriches Computer Makers," Opinion, Aug. 10: Larry Cuban is correct that "anyone justifying the purchase and use of computers on grounds that all students will learn more, better and faster is lying." Computers are being used by corporations to influence school bureaucrats to spend on technology that is touted as having the answer to teaching kids. Through experience in the public school classroom, I know that computers are not the answer to literacy.
October 9, 2012 |
If someone on Skype asks you "lol is this your new profile pic?" don't click the link. A type of malware known as Dorkbot is going around the video-calling service tricking people into being scammed by asking that question, in both English and German. Once users click on it, they are redirected to download a file from hotfile.com that holds the malware. The worm was discovered by Trend Micro, a security firm that wrote about the malware Monday. Trend Micro says that once infected, computers become part of a botnet, or a network of computers controlled by hackers to execute denial of service attacks, in which attackers try to jam a website by getting large numbers of computers to contact it at the same time.
CALIFORNIA | LOCAL
June 7, 2013 |
Since the Los Angeles Times posted a searchable database of Department of Water and Power employees' pay online late Tuesday night, visitors from the department's computer network have spent approximately 1,300 hours on the site. That's the equivalent of seven-and-a-half months of eight-hour work days. The database page is the first to allow the public -- and apparently DWP workers -- to search individual employees' base pay, overtime and other earnings at the city-owned utility.