Stories by Nancy Gohring

Yahoo sues Facebook over 10 patents

Yahoo is accusing Facebook of copying a range of technologies that the flagging search company invented, in a lawsuit that alleges the social media giant infringes 10 patents.

Carrier IQ Hopes to Allay Users' Privacy Concerns

Carrier IQ executives said they hope that customers are once again recognizing the value of the data that their company's software collects, after some operators disabled the software following a privacy uproar late last year.

Google once considered issuing currency

Google once considered issuing its own currency, to be called Google Bucks, company Chairman Eric Schmidt said on stage in Barcelona at the Mobile World Congress Tuesday.

Google kills more services

Google is continuing to weed out its services and on Friday announced it will shut down Picnik, Google Message Continuity and Needlebase and make changes to some other services.

HTC, Nokia to offer first LTE Windows Phones on AT&T

Microsoft CEO Steve Ballmer made a surprise appearance at AT&T's Developer Summit at the Consumer Electronics Show to say that the operator would be the first to offer LTE Windows Phones, including the HTC Titan II and a phone from Nokia.

HP makes executive changes

After a couple of high-profile departures, Hewlett-Packard on Wednesday announced some executive appointments, including a new CIO.

Motorola to lay off 800 more workers

Motorola Mobility will lay off 800 people, the latest in a string of worker reductions at the handset maker, as it prepares to become part of Google.

Five things you need to know about Android phone security

1. Use a service to secure data. Android's open market and few security features open the door to hackers, leaving critical corporate data at risk. The best security comes from providers like Good Technology, which secures phones using its own network operations center, software on the phones, and a server behind a firewall. Technology like Good's encrypts data as it travels to and from the device, and stored data is also encrypted. IT administrators are not required to open a hole in the corporate firewall.

[]