By
Rob ScottSeptember 11, 2015
California Governor Jerry Brown has vetoed California Senate Bill 142, proposed legislation that would require drone users to obtain permission to fly their unmanned aerial systems less than 350 feet over private property. “Drone technology certainly raises novel issues that merit careful examination,” wrote Brown. “This bill, however, while well-intentioned, could expose the occasional hobbyist and the FAA-approved commercial user alike to burdensome litigation and new causes of action.” Tech groups opposed the bill and the CEA applauded the Governor’s decision. Continue reading Governor Brown Vetoes Legislation Restricting Use of Drones
By
Rob ScottSeptember 7, 2015
Chip giant Intel recently threw its hat into the quantum computer ring when it announced plans to invest $50 million in Netherlands-based QuTech, an institute launched in 2013 by Delft University of Technology and the Dutch Organization for Applied Research. The investment is part of a planned 10-year collaboration with QuTech. Researchers from leading tech companies such as Google, IBM and Microsoft have been looking to apply quantum physics to computing for a long time. Continue reading Intel Makes a Major Investment in Quantum Computer Research
By
Debra KaufmanAugust 28, 2015
Cybersecurity technology from Los Alamos National Laboratory is now available to banks and other private sector businesses, via the consulting firm Ernst & Young. The New Mexico lab, benefitting from the $1 billion the U.S. spends a year on unclassified cybersecurity research, has developed a great deal of relevant technology, but is not set up to market the results of its own research. Ernst & Young, which consults on cybersecurity, will communicate the lab’s products and add its own expertise. Continue reading New Initiative: U.S. Offers Cybersecurity Tech to Private Sector
By
Rob ScottAugust 27, 2015
As numerous startups introduce drones for recreational and commercial use, and tech giants including Amazon and Google plan delivery projects based on UAVs, concerns have emerged regarding various safety, privacy and security issues. Now policy groups tied to tech firms are working to block new legislation in California that could impact the deployment and use of drones. Senate Bill 142, which passed the California Assembly on Monday, restricts operation of UAVs under 350 feet above properties without permission of the property owners. Continue reading California Legislation Could Have Impact on Drone Deliveries
By
Debra KaufmanAugust 26, 2015
The Third U.S. Circuit Court of Appeals ruled that the Federal Trade Commission can advance its lawsuit against Wyndham Worldwide, which the FTC holds partially culpable for theft of online data three times between 2008 and 2010, for a total of over 619,000 credit- and debit-card numbers. Since Congress has yet to pass sweeping legislation on data security, the FTC has stepped in, so far instigating 50 additional data-security cases based on its mandate to act against unfair and deceptive business practices. Continue reading FTC Has Authority Over Corporate Hacks, says Appeals Court
By
Debra KaufmanAugust 26, 2015
In 2016, Aerosense, jointly owned by Sony and robotics firm ZMP, plans to launch a commercial drone service targeting construction, logistics and agriculture industries. A prototype of an airplane-shaped drone was unveiled this week. The drones, which will be capable of capturing HD images and transmitting them to the cloud, will rely in part on the mobile phone and digital camera technologies developed for Sony’s Xperia smartphones. Analysts believe the unmanned aircraft industry may be worth $82 billion in the U.S. by 2025. Continue reading Sony and ZMP Team Up to Offer Commercial Drone Services
By
Debra KaufmanAugust 25, 2015
When Facebook launched ThreatExchange in February, the idea was to create a platform where companies could share information on potential cyberattacks, malware and other malicious hazards. Now, the Silicon Valley company says that the number of companies on the platform has reached 90, after 23 joined last week when the application process became easier. Facebook, which isn’t alone in offering a platform for centralized cyberthreats, is continuing its work to integrate these other information-sharing platforms. Continue reading Companies Share Cyberthreat Info on New Facebook Platform
By
Rob ScottAugust 25, 2015
A recent Check Point Software survey determined that enterprise network vulnerabilities often result from the ease in which company employees can now connect their mobile devices to insecure wireless networks. The study suggests that the threat level increases with larger organizations. For example, companies that use 2,000 or more devices experience a 50 percent chance that at least six devices have become infected with malware (something to consider since 82 percent of companies now have a BYOD plan in place). Continue reading Mobile Devices Now the Largest Threat to Enterprise Security
By
Rob ScottAugust 18, 2015
Google has unveiled its new Chrome operating system designed for business customers, which includes changes aimed at allowing companies to operate many of their legacy software applications. Dell has announced new Chromebooks and management software designed to work with the new operating system. After years of pushing cloud-based systems for improved security and management, Google has learned that many companies require custom upgrades or rely on virtualized systems to address the multitude of applications that cannot easily move to the cloud. Continue reading Google Launches New Chrome OS for its Business Customers
By
Rob ScottAugust 18, 2015
The Department of Commerce announced that it would renew its contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one year (with options to extend it another three years), delaying its plans to relinquish oversight of one aspect of Internet governance. Commerce has overseen ICANN’s management of the Internet’s domain-name system since 1998. But last year, the Obama administration proposed transferring the oversight to international stakeholders, a plan that has met criticism regarding the potential impact to free expression. Continue reading U.S. Renews Contract with ICANN, Delays Giving Up Oversight
By
Debra KaufmanAugust 17, 2015
Netflix will be the first large company to move its information technology to a public cloud, more specifically, Amazon Web Services, reporting its plans to shutter its last data center by the end of the summer. After a major hardware failure in 2008, Netflix started moving its operations to AWS in 2009, first shifting its jobs page and, later, its video player, iPhone-related technology, discovery and search, and accounts pages. As a streaming competitor with Amazon, however, Netflix runs its own content delivery network. Continue reading Netflix Moves Operations to Cloud, Closes Last Data Center
By
Debra KaufmanAugust 10, 2015
The emergence of Stagefright, a malicious code that targets Android phones, has impacted all mobile companies using the Google operating system. Google has already fixed the problem in its own line of Nexus phones and tablets, and now plans to supply monthly security updates wirelessly. Both Samsung and LG have also announced they will be issuing a monthly security update; other impacted mobile phone manufacturers include Sony, HTC and Android One, all of which have provided or plan to provide Stagefright patches. Continue reading Mobile Companies Face Stagefright, Android Security Issues
By
Debra KaufmanAugust 7, 2015
The Chinese government stated it will place cybersecurity police units at the country’s major Internet companies and websites, to prevent fraud, other illegal activities and the amorphously phrased “spreading of rumors,” reports the state-owned Xinhua News Agency. The Internet in China is monopolized by three major companies: e-commerce site Alibaba, Tencent for gaming and messaging, and search engine Baidu. Neither Facebook nor Google operate in China; LinkedIn, which has agreed to China’s cybersecurity measures, does. Continue reading China Ratchets Up Internet Control with On-Site Cyber Police
By
Debra KaufmanJuly 27, 2015
Apple just came out with a new Apple TV remote with integrated Touch ID, which utilizes fingerprint sensors to authorize and block users. In addition to TV-centric capabilities, the new remote offers the ability to enter a channel without punching in a password and to allow authorized people to make iTunes purchases. What makes this TV remote truly different is its ability to control in-home electronics. Over the years, rumors have been rife that Apple’s end game for Apple TV was as a home automation hub. Continue reading Apple TV Remote Also Offers Features for Home Automation
By
Rob ScottJuly 24, 2015
A privilege-escalation bug was identified in the latest version of Apple’s OS X this week by security researcher Stefan Esser. The vulnerability reportedly provides hackers with root user privileges that make it possible to infect Macs with rootkits and other malware. This type of bug is commonly used to bypass security protections created for applications and operating systems. According to Esser, the vulnerability can be found in OS X Yosemite 10.10.4 and the beta version of 10.10.5, but not in the recent beta version of El Capitan 10.11. Continue reading Security Researcher Reports Privilege-Escalation Bug in OS X