August 18, 2010 |
India's BlackBerry users breathed a sigh of relief Tuesday as word spread that their beloved smart-phone devices would keep beeping after Aug. 31, the deadline New Delhi had set for the company to either open up its technology or shut down its service. BlackBerry's Canadian parent company reportedly agreed to copy Indian security agencies on client e-mails and short messages, local news reports said Tuesday, citing government sources. The agencies initially must make a specific request but after November reportedly will receive automatic data feeds.
July 12, 2008 |
A former Hewlett-Packard Co. vice president who once worked for IBM Corp. pleaded guilty in U.S. District Court in San Jose to trade- secret theft. Atul Malhotra received e-mails marked "IBM confidential" when he was a director of sales at that company. He sent the contents of the e-mails to two senior vice presidents at Hewlett-Packard two to three months after he was hired in 2006 at the Palo Alto-based company. Malhotra, of Santa Barbara, faces 10 years in prison and a fine of as much as $250,000.
January 31, 2010 |
Sometimes, in his off hours, Yie Eun-woong does a bit of investigative work. He uses the Internet and other means to track personal data and home addresses of foreign English teachers across South Korea. Then he follows them, often for weeks at a time, staking out their apartments, taking notes on their contacts and habits. He wants to know whether they're doing drugs or molesting children. Yie, a slender 40-year-old who owns a temporary employment agency, says he is only attempting to weed out troublemakers who have no business teaching students in South Korea, or anywhere else.
June 3, 2010
AT&T is dropping its $30-a-month unlimited data plan as of Monday and replacing it with a two-tier pricing system for new customers. Current AT&T customers with unlimited data plans can stick with them. Here are AT&T's estimates for how much a user will get out of the data allotments in the new plans. The amount can vary greatly, however. For example, one e-mail with five high-resolution photo attachments could use up 5% of the monthly allotment on the DataPlus plan.
April 27, 2010 |
The case of Thomas A. Drake, a former National Security Agency official indicted last week on charges of providing classified information to a Baltimore Sun reporter, is painfully familiar. In 2002, I became the target of a leak investigation stemming from America's first post- 9/11 terrorism prosecution. As a Justice Department ethics attorney, I had inadvertently learned of a court order for all copies of Justice's internal correspondence about the interrogation of the so-called American Taliban, John Walker Lindh.
July 4, 2010
Cellphones are getting smarter, but that also means they're more vulnerable to hacks and attacks. Here are some tips to protect yourself. -- Familiarize yourself with your phone's security controls. These are often listed on the phone's options or settings page. In general it's recommended that you choose the most restrictive settings. -- Read other users' reviews and ratings of apps and buy only those you think you can trust. -- Be suspicious if an app asks for access to data that doesn't seem appropriate for its function.
March 14, 2011
A hacker organization on Monday released e-mails in which a former Bank of America Corp. employee asserts the company is hiding foreclosure information from regulators. The posting by a member of a group known as Anonymous includes e-mails in which an employee of Balboa Insurance Group in Irvine raises questions about removing from the record documents that were sent out in error. The e-mails don't indicate the loans have foreclosure issues. A Bank of America spokesman said the former Balboa employee stole documents from the company.
CALIFORNIA | LOCAL
August 12, 2000
Re "Who Needs Big Brother When There's 'Carnivore'?" Commentary, July 27: Carnivore is the computer system the FBI occasionally uses in conjunction with Internet service providers' own technical experts to ensure compliance with court orders when a criminal's e-mails are intercepted pursuant to those orders. We have shown Carnivore to over 30 reporters and dozens of people on Capitol Hill and now are offering up the system for independent expert analysis so the public can be further assured that it only does what it is supposed to, i.e., intercepts the specific e-mails or other computer traffic going to or from specific individuals to the exclusion of all other computer communications.
January 18, 2004
If Alyx Sachs of Net Global Marketing actually believes that people will filter through their voluminous e-mail lists to open her company's e-mail solicitations, she is exhibiting the ultimate in wishful thinking ("Lost in the Cyber-Kudzu," by Matthew Heller, Dec. 21). I only open one of possibly 2,000 e-mails just to laugh at the outlandish "offers" that some have the audacity to send. Other than that, my e-mail list stays in cyberspace, like so much unused flotsam garbage. Niki Good Newport Beach
October 5, 2003
The letter in Sunday Calendar on Sept. 21 in which Thomas Bliss comments on the article "Be Persistent, Not Pushy" added his adjective "proudly" to the comment I made about not returning phone calls from people whom I didn't know is completely inaccurate. Of course I don't and won't return calls and e-mails from people I don't know. I get literally 75 unsolicited calls and e-mails a day from unknown folks. Without a reference point or filter my entire day would be consumed with phone and e-mail tag. I have a large organization and others do the filtering.