38 Charged in Phishing Scams- May 20, 2008 Thirty-eight people were charged yesterday with stealing names, Social Security numbers, credit card data and other personal information from Internet users as part of a global crime ring.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/295178134... Ex-PurchasePro Chief Found Guilty of Fraud, Obstruction- May 16, 2008 Dot-com highflier Charles E. Johnson Jr. was convicted yesterday of stock fraud and obstruction of justice after a federal court found that he misled investors by inflating revenue at his Las Vegas software firm.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/295178136... NBC's Numbers Geek Makes His Mark- May 12, 2008 NEW YORK--In a borrowed office at 30 Rock, Chuck Todd is on his cellphone, telling a Barack Obama strategist that his boss will probably fall just short of winning Indiana that night.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/288691676... FBI Backs Off From Secret Order for Data After Lawsuit- May 8, 2008 The FBI has withdrawn a secret administrative order seeking the name, address and online activity of a patron of the Internet Archive after the San Francisco-based digital library filed suit to block the action.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/288691677... FCC to Test Transition to Digital TV in N.C.- May 8, 2008 The switch to digital broadcasting, the biggest change for the television industry since color TV, will get a trial run in September in Wilmington, N.C.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/288691679... The Ultimate Little Black Book- May 5, 2008 Once upon a time, there was one telephone company. Routing phone calls was pretty straightforward.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/288691680... White House Plans Proactive Cyber-Security Role for Spy Agencies- May 2, 2008 America's spy agencies for the first time would be tasked with gathering intelligence on threats to the nation's computer networks under a policy that could be detailed by the White House as early as next week, a senior administration official said Wednesday.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/282192668... Security of F-35 Jet Secrets Questioned- May 2, 2008 The technology going into the U.S. military's newest fighter plane may have been compromised by unauthorized access to facilities and computers that belong to BAE Systems, one the aircraft's builders, according to a report from the Pentagon's inspector general made public yesterday.http://feeds.washingtonpost.com/~r/wp-dyn/rss/technology/techpolicy/index_xml/~3/282192669... |