Some buyers of e-books will begin to receive payments Tuesday as part of a settlement in a price-fixing case against Apple.
It's the issue that won't die: A Senate committee has voted to weaken the Federal Communications Commission's net neutrality rules.
The FBI has been slow to assess the privacy risks and hasn't adequately tested the accuracy of a huge facial recognition database used by several law enforcement agencies, a government auditor said.
An appeals court has upheld the U.S. Federal Communications Commission's controversial net neutrality rules, passed in 2015.
A bill to give email and other documents stored in the cloud new protections from government searches may be dead in the U.S. Senate over a proposed amendment to expand the FBI's surveillance powers.
A U.S. agency has lined up broad support for its plan to end the government's oversight of the Internet's domain name system, despite opposition from some Republicans in Congress.
Qlik, a vendor of data visualization tools, has agreed to be acquired by private equity investment firm Thoma Bravo for US$3 billion.
The U.S. Federal Reserve, the nation's central bank, detected more than 50 cybersecurity breaches between 2011 and 2015, including a handful attributed to espionage.
Hewlett-Packard Enterprise is asking a jury to award the company US$3billion from Oracle after the database giant stopped supporting HPE's Itanium-based servers, even though it allegedly signed a contract to do so.
A proposal in the U.S. Senate to require smartphone OS developers and other tech vendors to break their own encryption at the request of law enforcement may be dead on arrival.
A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country's residents when they are stored overseas.
Some U.S. government agencies are using IT systems running Windows 3.1, the decades-old COBOL and Fortran programming languages, or computers from the 1970s.
Many U.S. states aren't confident in their ability to respond to cyberattacks on physical infrastructure such as water and electric systems, some emergency response officials said.
A secret FBI hacking tool, used to compromise the Tor anonymous browser in one investigation, is facing challenges from criminal defendants, perhaps putting its future in doubt.
Many cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, who launder money, and who provide escrow services, according to a new white paper.