By
Debra KaufmanApril 6, 2021
As data moves to the cloud, security has become increasingly important. Fully homomorphic encryption (FHE) has been developed in labs and is nearly ready to emerge to enable artificial intelligence and machine learning use cases for that data. Microsoft and Intel have been proponents of homomorphic encryption, which follows the data across systems. In December, IBM released its first FHE services, which include educational materials, prototyping environments for companies that want to experiment and support. Continue reading IBM Debuts Advanced Encryption Service After Years of R&D
By
Debra KaufmanSeptember 4, 2018
A behind-the-scenes deal between Google and Mastercard was just revealed, whereby Google paid “millions of dollars” for “a stockpile of Mastercard transactions” that most of the credit card company’s two billion users were unaware of. Over the past year, Google provided select advertisers with the ability to track whether online ads led to sales at physical stores in the U.S. While the deal could give Google leverage over rivals such as Amazon, it could also raise privacy concerns regarding how customer data is used and shared. Google says no personal data was shared about users. Continue reading Mastercard Deal Provides Valuable Info for Google Advertisers
By
Debra KaufmanDecember 22, 2015
Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation
New language in China’s recently enacted national security law is generating major concern across the global technology industry. The rules call for a “national security review” of networking, tech products and services, and foreign investment. In addition, the rules call for crucial tech sectors to be made “secure and controllable,” which industry groups fear may suggest that back doors for allowing third-party access to systems would be necessary, perhaps even leading to the sharing of encryption keys or source code. Continue reading New Chinese Security Law Raises Concerns by Tech Industry
By
Meghan CoyleFebruary 13, 2015
Samsung updated its privacy policy to explain that the company would not be eavesdropping on viewers when they use the voice controls on their Samsung smart TVs. The previous version of the policy suggested that recorded audio could be transmitted to a third party through the television’s voice recognition software. Samsung clarified that only words spoken into the remote would be recorded and sent to the outside company. Users can also opt to turn off the voice recognition feature. Continue reading Samsung Clarifies its Policy Regarding TV Voice Recognition