Economy | ANALYSIS
Households to take hit from tax hike
by Tomoko Otake
The consumption tax increase will hit every household in Japan hard, with many people’s financial future hanging on whether their wages rise enough to offset the hike's impact.
27
P/SUNNY
The fingerprint-based security system used to unlock Apple’s latest iPhone can be bypassed using a household printer and some wood glue, a German hacking group has claimed. A spokesman for the Chaos Computer Club said the group managed to fool the biometric sensor in ...
One of the highlights of the iPhone 5S, the fingerprint scanner, is facing two concerns that may take a little shine off Apple’s cool new feature. Privacy advocates have raised concerns over how Apple plans to handle this highly sensitive data. And many consumers ...
Britain’s intelligence services were behind a cyberattack on state-owned Belgian telecom giant Belgacom, a German newsweekly reported Friday. Der Spiegel magazine said documents it had seen from fugitive U.S. leaker Edward Snowden’s “archive” indicated that the goal of the project, code-named Operation Socialist, was ...
Google is racing to encrypt the torrents of information that flow among its data centers around the world in a bid to thwart snooping by the U.S. National Security Agency and the intelligence agencies of foreign governments, company officials said Friday. The move is ...
China has been seen as the aggressor in cyberattacks, but many worry its own defenses are woeful.
It is perhaps a little hard to remember now, but in 2010, there seemed to be a new global superpower. A superpower that acted in unorthodox ways, which was unaccountable and yet of the people, and that was above all nameless, faceless and, as ...
Microsoft on Friday said that a battle to shed light on secret U.S. government requests for Internet user data will play out in court after failed peace talks. Microsoft and Google filed suits in federal court in June, arguing they have a right to ...
The Obama administration's cyber operations sometimes involve what one leaked budget document calls "field operations" abroad, commonly with the help of CIA operatives or clandestine military forces, "to physically place hardware implants or software modifications."
Twitter and The New York Times are hit with cyberattacks, with credit quickly claimed by a group backing embattled Syrian strongman Bashar Assad.
China has been hit by the “largest ever” attack on its Internet infrastructure, crashing the country’s .cn servers, according to a government-linked agency. The national domain name resolution service came under a distributed denial of service (DDoS) attack for around two hours early on ...
An unemployed Palestinian developer named Khalil Shreateh tried several times to report a bug to Facebook’s security team. When no one got back to him, he took the (dubiously) logical next step: exploited the bug to leave a public comment on Facebook CEO Mark ...
Computer geeks already knew it was possible to hack into a car’s computerized systems and potentially alter some electronic control functions. But new research to be presented this week shows the vulnerabilities are greater and the potential for mischief worse than believed, in a ...