How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?
catamount 21 weeks ago
Microsoft apparently went through the hotmail account of the blogger who posted leaked Windows code to find the source of the leak. Can they just do this? Is it legal for them to just go through and read peoples' emails whenever they have what they think is a good reason to do so?
Topic: SecurityAnswer this Question
Ask a question
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.
University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.
Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs.
Many former employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed.
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.
The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.
A senior U.S. senator is asking airlines about their data privacy practices, saying he's concerned about what information the companies are collecting and sharing with third parties.
GuardiCore developing "honeypot" approach to detecting and blocking stealthy attacks.
You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices.