White House Creates Cybersecurity Agency to Combat Threats

The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats

President Obama Calls for New Improvements to Cybersecurity

President Barack Obama proposed a series of new regulations that intend to help protect the country from cyberattacks. In the wake of a series of significant hacks last year, Obama is asking Congress to increase prosecution and toughen the penalties of people committing cybercrimes. He also wants companies to be able to share their information about hacks. In other news, President Obama wants to increase broadband competition by ending the laws in 19 states that limit municipal broadband. Continue reading President Obama Calls for New Improvements to Cybersecurity

Why Analysts Are Concerned About the JP Morgan Data Breach

In an era of system hacks becoming more common, JP Morgan is the latest to report a massive breach of customer information. While the company believed a few weeks ago that only one million accounts were affected, it now reports that 76 million households and 8 million small businesses were part of the data breach. While recent breaches have largely involved retailers, some analysts are more concerned about the JP Morgan case, especially since banks tend to have more sensitive data about their customers. Continue reading Why Analysts Are Concerned About the JP Morgan Data Breach

Apple’s Open Letter Explains Privacy Tips, Security Methods

Following the iCloud security breach involving controversial celebrity photos, Apple is trying to regain consumer trust by encouraging users to utilize their new and pre-existing security features. The company revealed how it encrypts messages and offered tips for protecting user data in a newly-launched website. In the open letter, Apple CEO Tim Cook takes a swing at Google for monetizing users’ private data and reassures Apple users that their data is safe from the government. Continue reading Apple’s Open Letter Explains Privacy Tips, Security Methods

Apple Introduces iOS 8 with a Focus on Privacy and Sharing

With the release of Apple’s iOS 8, the company is introducing some significant privacy and sharing upgrades. Following the recent hack of celebrity photographs from iCloud accounts, Apple launched a campaign explaining the ways in which it handles personal data. CEO Tim Cook released a statement indicating that he wants Apple to be transparent about these issues. In iOS 8, the company released a feature called Continuity, enhanced user privacy, and family sharing. Continue reading Apple Introduces iOS 8 with a Focus on Privacy and Sharing

Russian Criminals Obtain Passwords and More in Massive Hack

Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack

Black Hat: Smartphones Next Target of Cybersecurity Threats

At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats

California Senate Passes Amended Smartphone Kill-Switch Bill

Weeks after the California Senate voted down legislation that would require anti-theft tech in all new smartphones, it has now passed a revised version of the bill after Apple and Microsoft withdrew their opposition. While the legislation is applauded by law enforcement groups, it is still opposed by some wireless carriers, and could face an uphill battle in the state Assembly. If passed, kill-switch technology would be required for phones sold in California that are manufactured after July 1, 2015. Continue reading California Senate Passes Amended Smartphone Kill-Switch Bill

Cybersecurity Focus Shifts From Blocking to Spotting Threats

Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches.  Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats

New Software Lets Chat Apps Connect Phones Without Internet

The recently released FireChat mobile app stands out from competitors as the only messaging app that can be used without cell phone reception. FireChat makes use of Apple’s multipeer connectivity introduced in iOS 7, which enables phones to connect with each other directly via Bluetooth or Wi-Fi. FireChat users within 100 feet of one another can exchange messages without sending data through a cellular provider. A future of similar apps not reliant upon the Internet could open new possibilities and address privacy concerns. Continue reading New Software Lets Chat Apps Connect Phones Without Internet

Apple Acquires Burstly to Provide Support for App Developers

Burstly and TestFlight provide support for developers and the App Store ecosystem in the form of beta testing services, app monetization, and analytics. TestFlight began as a technical hack that included over-the-air updates for enterprise apps. In 2011, the two companies merged to become Burstly, which Apple has now acquired. Development support is a much needed component of Apple’s system. Apple App Store customers spent more than $10 billion in 2013, with 3 billion app downloads in December alone. Continue reading Apple Acquires Burstly to Provide Support for App Developers

Samsung Gear 2 Smartwatches Switch from Android to Tizen

Samsung recently announced it will make two follow-up smartwatches to the Galaxy Gear. The new Gear 2 and Gear 2 Neo will be available just five months after the release of their predecessor. While most of the key specs are similar to the first Gear, the new models will have a 1.0GHz dual-core SoC of unspecified make, in contrast to the 800MHz single-core chip in the first Gear. The new battery will last twice as long, and most importantly, the next-gen smartwatches will run on Tizen rather than Android. Continue reading Samsung Gear 2 Smartwatches Switch from Android to Tizen

Google’s Chromecast SDK Headed for International Markets

Google is planning to bring Chromecast to international markets and make casting available on multiple devices with thousands of apps. The popular device’s SDK, which is still being finalized, will be opened up to help make apps compatible with the $35 dongle, and Google is partnering with several companies to bring its functionality to a number of other devices. Hundreds of developers have already signed up to add Chromecast capabilities to their apps. Continue reading Google’s Chromecast SDK Headed for International Markets

Verizon: Big Corporations Still Moving to the Public Cloud

Verizon recently released a study that found that NSA surveillance concerns have not decreased the adoption of public cloud services by large corporations. Companies have been increasing their amount of data stored in the cloud. Public clouds remain attractive as they allow companies to decrease or increase the scale of resources, and to share the cost of ownership among users. But some big companies are looking to vendors outside the U.S. to avoid the NSA. Continue reading Verizon: Big Corporations Still Moving to the Public Cloud

15 Percent of American Adults Not Using the Internet or Email

A new report from the Pew Internet & American Life Project, based on interviews conducted by Princeton Survey Research Associates, indicates that 15 percent of American adults ages 18 and older say they are not using the Internet or email. Survey participants cite issues related to relevance, problems with ease-of-use, security, expense and availability as primary reasons. Additionally, another 9 percent of U.S. adults note that they use the Internet, but not while they are at home. Continue reading 15 Percent of American Adults Not Using the Internet or Email