In light of the circumstances, numerous states have enacted “cyberstalking” or “cyberharassment” laws or currently possess laws that specifically include electronic forms of communication within more traditional stalking or harassment laws. In addition, many states have enacted “cyberbullying” laws in reaction to issues related to protecting minors from online bullying…
Articles Posted in Technology
Samsung Enters Into a Legal Battle with Apple Over iPhone 3G Patents
Samsung Electronics, the second largest maker of mobile phones, claims that Apple Inc. has infringed upon its patents since entering the mobile-phone market with the iPhone 3G, a lawyer for Samsung told a Dutch court as the Korean company seeks a ban on some Apple products in the Netherlands. “Apple…
Politically-motivated hackers release sensitive information
In the recent years, politically-motivated hackers have made sensitive information available to bloggers and mainstream media at unprecedented rates. For example, Wikileaks released leaked Afghan war logs and government diplomatic cables. Anonymous individual hacked and released emails from the computer security firm HBGary. A college student gained access to and…
Facebook Seeks More Acquisitions and Looks to Compete with Twitter and Google
Facebook Inc., which is currently considered the world’s largest social network, plans more acquisitions so to improve its site design, keep services more reliable and advance its mobile features to compete with Twitter and Google which are active in the same arenas. Facebook’s director of corporate development, Vaughan Smith stated…
Is Email Hacking a Crime?
In April 2010, David Kernell faced trial for “hacking” into then-Alaskan Governor Sarah Palin’s personal email account. In November 12, 2010, David Kernell was indicted (i.e., a grand jury believed there was sufficient evidence to place him on trial on federal charges). Thereafter, a jury convicted him of two charges.…
New-Age Hackers Force Symantec and McAfee to Scramble for Better Solutions
A rise in attacks by hackers in 2011 is showing limits of an older generation of security software from Symantec Corp. (www.symantec.com) and McAfee Inc. (www.mcafee.com) and is placing pressure on these high-tech companies to upgrade products. These and similar companies are seeking to keep up with cloud computing and…
President Obama to Hold Twitter Town Hall
The White House will host a Twitter town hall with President Barack Obama on July 6. The president will answer questions submitted via Twitter, which limits messages to 140 characters. The town hall will focus on jobs and the economy, and a video feed of Obama’s answers will be streamed…
Google Temporarily Disables Realtime Search
Google, Inc. has temporarily shut down a search engine feature that allows users to find real-time updates from Twitter, Facebook, FriendFeed and other social networking sites. See more on www.twitter.com/salaratrizadeh.
Hacking on Fox News Twitter reports Obama’s death
Hackers broke into Fox’s political Twitter account early Monday, posting updates saying President Barack Obama had been assassinated. A series of six tweets coming from the FoxNewsPolitics account reported that Obama had been shot to death in Iowa and the shooter was unknown. See more on www.twitter.com/salaratrizadeh
Internet Miners Permit Major Increase in Domain Names
Internet miners voted Monday to allow virtually unlimited new domain names based on themes as varied as company brands, entertainment and political causes, in the system’s biggest shake-up since it started 26 years ago. Groups able to pay the $185,000 application can petition next year for new updates to “.com”…