If HR 2267 is signed into law, sites will have to apply for federal licensing. There's no language about a cap on the licenses, but in a regulated environment, safeguards against such things as identity theft, compulsive gambling behavior and underag
For years, Internet advocates have warned of the doomsday scenario that will play out on Monday: Google and Verizon will announce a deal that the New York Times reports "could allow Verizon to speed some online content to Internet users more quickly
According to anti-trafficking advocates, some of the women featured on the site are underage and are being forced into prostitution against their will. When confronted Craigslist founder Craig Newmark with these accusations the Internet magnate said
“Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip...
Lovers still see a face-to-face encounter as the ideal way to break up their relationship in the complicated age of Facebook and cell phones, according to a researcher's interviews with college students and middle-age adults.
To understand what the web has done for free speech, it’s necessary to think about how Natalya Gorbanevskaya and her fellow dissidents produced 65 issues of the samizdat publication Chronicle Of Current Events in the Soviet Union between 1968 and 198
Following the release of 92,000 war log files, Liz Cheney is calling for WikiLeaks to be shut down and says that the founder has "blood on his hands."
Paul Ceglia, who claims in a lawsuit that he owns 84 percent of Facebook Inc., said his case wouldn’t have been possible if state troopers hadn’t come to his house in October to arrest him for fraud.
A mystery file with the name "Insurance" has been posted to the web page where earlier this week some 77,000 secret documents about the Afghan war were leaked. The 1.4GB file is ten times larger than all the other files on Wikileaks' Afghan War Diary
Under the authoritarian rule of the control-oriented HIVE philosophy -- where man is no better, nor different, than bees in a honeycomb -- we have been reduced to be workers at the service of the queen.
Facebook Inc. will probably put off its initial public offering until 2012, giving Chief Executive Officer Mark Zuckerberg more time to gain users and boost sales, three people familiar with the matter said.
Attribution is one of the biggest problems on the internet when it comes to cyberwarfare. How do you hold a nation responsible for malicious attacks if you can’t determine whether the activity was state-sponsored?
The personal details of 100 million Facebook users have been collected and published online in a downloadable file, meaning they will now be unable to make their publicly available information private.
On Thursday, Google Incorporated posted a notice claiming that its search engine had been blocked on mainland China. (this is one of Googles largest and key markets Google China) While Google thought China may had blocked their service with some t
The ECP Act currently states that companies are required to provide basic subscriber data to the FBI, but lists only the four kinds of information that might be found on phone bills -- customer's name, address, length of service, and toll billing...
Recorded Future strips from web pages the people, places and activities they mention. The company examines when and where these events happened (“spatial and temporal analysis”) and the tone of the document (“sentiment analysis”).
All forum owners and websites need to know this information so spread the word. In case the source url comes up 'banned' due to hotlinking, just copy & paste the article url into your browser. http://www.godlikeproductions.com/forum1/message11468
The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.
You may have heard the rumor that swirled briefly last month about an Internet “kill switch” that could power down the Web in the case of a critical cyber attack. Those rumors turned out to be largely overblown, but it turns out there are now seven i
The administration wants to add just four words -- "electronic communication transactional records" -- to a list of items that the law says the FBI may demand without a judge's approval.
UK businessman Paul Kane has been selected to form part of an elite “chain of trust” charged with rebooting the web in the event of a catastrophe that sees it having to be shut down, according to Metro.
A malicious site can find out what social-networking groups you belong to--and then figure out your identity.
Steve Gibson has a plan to save the media world’s financial crisis — and it’s not the iPad.
“There are so many great things that the internet does and has to offer, but at the same time, Kyra, as you know, there is this dark side,” Roberts said. “Imagine what would have happened if we hadn’t taken a look at what happened with Shirley Sherro
Computers in Iran have been hardest hit by a dangerous computer worm that tries to steal information from industrial control systems. 60% of all systems infected by the worm are located in Iran. Indonesia and India have also been hard-hit by the mali
Voice chat with zFone for VOIP communication with encryption. Zfone is open source code software which means no back doors. Together you will have unbeatable military grade encryption. This is the best secure encrypted communications method out there
The movie trailer for Middle Men starring Luck Wilson.
Everyone is trying to figure out how to make a buck off of the Internet, which is a good thing. This struck me as a good way to get people to watch your ads. Kind of a trivial pursuit on the web. Got the crop circle people up in arms too.
Recently, a forum I am personally a part of, "God Like Productions" has been under attack by a company named "Attributer corporation" on behalf of "Reuters." It looks like this company has been scanning websites (aggressively) to see if ther
The White House recently released a draft of a troubling plan titled "National Strategy for Trusted Identities in Cyberspace" (NSTIC). In previous iterations, the project was known as the "National Strategy for Secure Online Transactions" and emphasi