Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘FCC’
Most Recent
Read More
July 19, 2015

T-Mobile Fined $17.5 Million for 911/EMS Outage

Every hour nearly 30,000 calls are placed to emergency medical services (EMS) in the United States, according to USA Today. These calls are of a protected nature and can be made even using a mobile device that is otherwise out of service.

However, last August, many of T-Mobile’s customers were unable to reach 911, the American standard EMS number, for two periods spanning a few hours each. A glitch in T-Mobile’s infrastructure caused this problem, which the FCC considers to be an oversight on T-Mobile’s part, as proper safeguards are available for the 911 system. Worse yet, T-Mobile decided not to notify the 911 call centers affected by the outage, a crucial [...]

Read More
April 12, 2015

AT&T Gets a $25,000,000 Fine after Contractor Data Theft

The Federal Communications Commission has brought AT&T to a $25,000,000 settlement over its mismanagement of customer data between the end of 2013 and the end of 2014. Rather than face litigation, AT&T has agreed to the FCC’s largest-ever settlement in relation to data and privacy loss or theft. (Another fairly large settlement happened less than a year ago, regarding Sprint’s violation of the Do-Not-Call Implementation Act of 2003, which cost them $7,500,000.)

Read More
January 6, 2015

FCC Net Neutrality Vote Scheduled for February 2015

The United States Federal Communications Commission (FCC) announced on Friday that they plan to vote on so-called “net neutrality” legislation in February. It is still unclear whether the FCC plans to pursue Title II regulation, which would subject Internet providers to the same rules as telephone companies.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University