By
Meghan CoyleFebruary 12, 2015
The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats
By
Meghan CoyleJanuary 15, 2015
President Barack Obama proposed a series of new regulations that intend to help protect the country from cyberattacks. In the wake of a series of significant hacks last year, Obama is asking Congress to increase prosecution and toughen the penalties of people committing cybercrimes. He also wants companies to be able to share their information about hacks. In other news, President Obama wants to increase broadband competition by ending the laws in 19 states that limit municipal broadband. Continue reading President Obama Calls for New Improvements to Cybersecurity
By
Rob ScottOctober 6, 2014
In an era of system hacks becoming more common, JP Morgan is the latest to report a massive breach of customer information. While the company believed a few weeks ago that only one million accounts were affected, it now reports that 76 million households and 8 million small businesses were part of the data breach. While recent breaches have largely involved retailers, some analysts are more concerned about the JP Morgan case, especially since banks tend to have more sensitive data about their customers. Continue reading Why Analysts Are Concerned About the JP Morgan Data Breach
By
Meghan CoyleSeptember 22, 2014
Following the iCloud security breach involving controversial celebrity photos, Apple is trying to regain consumer trust by encouraging users to utilize their new and pre-existing security features. The company revealed how it encrypts messages and offered tips for protecting user data in a newly-launched website. In the open letter, Apple CEO Tim Cook takes a swing at Google for monetizing users’ private data and reassures Apple users that their data is safe from the government. Continue reading Apple’s Open Letter Explains Privacy Tips, Security Methods
By
Marlena HallerSeptember 19, 2014
With the release of Apple’s iOS 8, the company is introducing some significant privacy and sharing upgrades. Following the recent hack of celebrity photographs from iCloud accounts, Apple launched a campaign explaining the ways in which it handles personal data. CEO Tim Cook released a statement indicating that he wants Apple to be transparent about these issues. In iOS 8, the company released a feature called Continuity, enhanced user privacy, and family sharing. Continue reading Apple Introduces iOS 8 with a Focus on Privacy and Sharing
By
Meghan CoyleAugust 7, 2014
Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack
By
Marlena HallerAugust 5, 2014
At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats
Weeks after the California Senate voted down legislation that would require anti-theft tech in all new smartphones, it has now passed a revised version of the bill after Apple and Microsoft withdrew their opposition. While the legislation is applauded by law enforcement groups, it is still opposed by some wireless carriers, and could face an uphill battle in the state Assembly. If passed, kill-switch technology would be required for phones sold in California that are manufactured after July 1, 2015. Continue reading California Senate Passes Amended Smartphone Kill-Switch Bill
By
Meghan CoyleMay 7, 2014
Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches. Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats
By
Rob ScottApril 8, 2014
The recently released FireChat mobile app stands out from competitors as the only messaging app that can be used without cell phone reception. FireChat makes use of Apple’s multipeer connectivity introduced in iOS 7, which enables phones to connect with each other directly via Bluetooth or Wi-Fi. FireChat users within 100 feet of one another can exchange messages without sending data through a cellular provider. A future of similar apps not reliant upon the Internet could open new possibilities and address privacy concerns. Continue reading New Software Lets Chat Apps Connect Phones Without Internet
By
Lisette LeonardMarch 3, 2014
Burstly and TestFlight provide support for developers and the App Store ecosystem in the form of beta testing services, app monetization, and analytics. TestFlight began as a technical hack that included over-the-air updates for enterprise apps. In 2011, the two companies merged to become Burstly, which Apple has now acquired. Development support is a much needed component of Apple’s system. Apple App Store customers spent more than $10 billion in 2013, with 3 billion app downloads in December alone. Continue reading Apple Acquires Burstly to Provide Support for App Developers
By
Lisette LeonardFebruary 25, 2014
Samsung recently announced it will make two follow-up smartwatches to the Galaxy Gear. The new Gear 2 and Gear 2 Neo will be available just five months after the release of their predecessor. While most of the key specs are similar to the first Gear, the new models will have a 1.0GHz dual-core SoC of unspecified make, in contrast to the 800MHz single-core chip in the first Gear. The new battery will last twice as long, and most importantly, the next-gen smartwatches will run on Tizen rather than Android. Continue reading Samsung Gear 2 Smartwatches Switch from Android to Tizen
By
Cassie PatonDecember 18, 2013
Google is planning to bring Chromecast to international markets and make casting available on multiple devices with thousands of apps. The popular device’s SDK, which is still being finalized, will be opened up to help make apps compatible with the $35 dongle, and Google is partnering with several companies to bring its functionality to a number of other devices. Hundreds of developers have already signed up to add Chromecast capabilities to their apps. Continue reading Google’s Chromecast SDK Headed for International Markets
By
Chris CastanedaOctober 4, 2013
Verizon recently released a study that found that NSA surveillance concerns have not decreased the adoption of public cloud services by large corporations. Companies have been increasing their amount of data stored in the cloud. Public clouds remain attractive as they allow companies to decrease or increase the scale of resources, and to share the cost of ownership among users. But some big companies are looking to vendors outside the U.S. to avoid the NSA. Continue reading Verizon: Big Corporations Still Moving to the Public Cloud
By
Rob ScottOctober 3, 2013
A new report from the Pew Internet & American Life Project, based on interviews conducted by Princeton Survey Research Associates, indicates that 15 percent of American adults ages 18 and older say they are not using the Internet or email. Survey participants cite issues related to relevance, problems with ease-of-use, security, expense and availability as primary reasons. Additionally, another 9 percent of U.S. adults note that they use the Internet, but not while they are at home. Continue reading 15 Percent of American Adults Not Using the Internet or Email