Google Settles with Italy, Agrees to Privacy Checks

Google’s latest agreement with a European privacy regulator includes spot checks at its U.S. headquarters to monitor how the Internet giant is complying with an order to improve its privacy policy, add new opt-outs for targeted advertising, and disclose how long it keeps users’ data. The Italian data-privacy authority outlined a process for Google to comply with the country’s privacy laws and an order imposed on the company in July.

FCC's Net Neutrality Language Called Vague

As the U.S. Federal Communications Commission prepares to vote on new rules for high-speed Internet service, one aspect of the rules is drawing criticism from both opponents and proponents of tighter regulation. The FCC, which is set to vote to regulate Internet service providers more like traditional telephone companies, has introduced a so-called "general conduct" provision in the latest version of the rules that aim to ensure net neutrality, the principle that all web traffic should be treated equally.

Judge Dismisses Suit Against Google Over Android Apps

Google Inc. won dismissal of claims it abused its market power by forcing hand-held device makers that use its Android operating system to also provide the search engine company’s applications. Google was accused in a consumer lawsuit of requiring manufacturers make its search engine the default option on Android-powered devices and forcing handset makers such as Samsung Electronics Co. to offer less popular Android applications in order to pre-load, for free, favorites such as YouTube.

Homeland Security Tells Lenovo Users to Remove Program

The U.S. government advised Lenovo Group Ltd customers to remove a "Superfish," a program pre-installed on some Lenovo laptops, saying it makes users vulnerable to cyberattacks. The Department of Homeland Security said in an alert that the program makes users vulnerable to a type of cyberattack known as SSL spoofing, in which remote attackers can read encrypted web traffic, redirect traffic from official websites to spoofs, and perform other attacks.

Russia Launches Android Monopoly Probe of Google

Russia's competition watchdog said it had opened a case against Google Inc. over alleged violation of anti-monopoly law, following a complaint from Russia's biggest search site Yandex NV over Google's mobile platform. Yandex said it had asked the watchdog to investigate whether Google was abusing the dominance of its Android smartphone operating system, restricting competing apps.

Malware Tricks Android Users That Phone is Off

Security vendor AVG has spotted a malicious program that fakes the sequence a user sees when they shut off their Android phone, giving it freedom to move around on the device and steal data. When someone presses the power button on a device, a fake dialog box is shown. The malware then mimics the shutdown animation and appears to be off, AVG’s mobile malware research team said in a blog post.

Software Links North Korea to Sony Attack, NSA Chief Says

The U.S. National Security Agency (NSA) identified North Korea as the source of the recent cyberattack on Sony Pictures Entertainment after analyzing the software used in the intrusion, NSA Director Admiral Michael Rogers said. Speaking to a Canadian security conference, Rogers explained that the discovery was part of the agency's efforts to develop software to counter cyberattacks.

Hackers Still Lurking on State Department Computers

Three months after the State Department confirmed hackers breached its unclassified email system, the government still hasn’t been able to evict them from the department’s network, according to three people familiar with the investigation. Each time investigators find a hacker tool and block it, these people said, the intruders tweak it slightly to attempt to sneak past defenses.

Lenovo-Installed Software Made PCs Vulnerable, Report Says

China's Lenovo Group Ltd, the world's largest PC maker, had pre-installed a virus-like software on laptops that makes the devices more vulnerable to hacking, cybersecurity experts said. Users reported as early as last June that a program called Superfish pre-installed by Lenovo on consumer laptops was 'adware', or software that automatically displays adverts.

Jury Says Samsung Infringed Bluetooth Patent

Gordon Bremer didn't invent Bluetooth 2.0. In fact, as he admitted on the stand in an East Texas federal court, he hadn't even read the specification for it until 2007 -- three years after it was on the market. Despite that, Bremer may be getting paid a hefty royalty by Samsung, after a jury ruled that the Korean electronics company infringed Bremer's patents

Russian Pleads Not Guilty to U.S. Data Breach

A Russian accused of helping mastermind the largest international data breach ever prosecuted in the United States pleaded not guilty, following his extradition from the Netherlands, the U.S. Department of Justice said. Vladimir Drinkman, 34, was accused of conspiring with at least four other men to install "sniffers" to comb through computer networks of financial companies, payment processors and retailers around the world, and then to store and eventually sell data they collected.

Arab Hackers Reportedly Penetrate Israeli Sites

Israel may be known as a technology and cyber security powerhouse, but a sophisticated Arab-led hacking campaign has been relatively successful in penetrating several important Israeli sites and possibly extracting data from them. The campaign, dubbed operation Arid Viper, has been gleaning high-level information from Israelis by using phishing emails disguised with pornographic movies, according to a report by security software firm Trend Micro.

NSA Hides Spy Software in Hard Drives, Lab Says

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives. That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.