Facebook Builds App for Private Sharing with Close Friends

Micro-sharing just got easier for Facebook users. Instead of using complicated privacy controls, Facebook is working on an app codenamed “Moments” that will let Facebook users choose which sets of friends can see their content. The app focuses on audience rather than content, so each group of “co-workers,” “family,” and “high school pals” will have their own tile in the grid design. Facebook may auto populate the groups in the new app based on users’ Facebook activity. Continue reading Facebook Builds App for Private Sharing with Close Friends

Recent Home Depot Hack Prompts Retailers to Upgrade Security

Home Depot has confirmed that hackers have breached its store payments system and may have stolen up to 60 million credit card numbers. The breach could affect customers who paid with a credit or debit card at any of the 2,157 stores in the U.S. and Canada between April and September. This latest hacking incident has led retailers to speed up the installation of chip-reading credit card terminals at their stores. Credit card companies are also adding security to their cards. Continue reading Recent Home Depot Hack Prompts Retailers to Upgrade Security

Apple to Add Security Alerts Following Celebrity Photo Leaks

Apple CEO Tim Cook confirmed that the hackers responsible for recently leaking nude photos of celebrities were able to break into the celebrities’ iCloud accounts. The company plans to add additional security alerts to help prevent future security breaches. In the next two weeks, Apple users will start receiving notifications when someone tries to change an account password, restore iCloud data to a new device, or when a new device logs onto the account for the first time. Continue reading Apple to Add Security Alerts Following Celebrity Photo Leaks

China Creates Own OS to Kick Dependence on U.S. Systems

China could have its own operating system in place by October to take on imported systems currently offered by tech giants such as Microsoft, Google and Apple. Initial reports suggest the system would first appear on desktop computers and then later expand to smartphones and other mobile devices. According to Ni Guangnan, who heads a development alliance created in March, the domestically built software could replace desktop operating systems within 1-2 years and mobile systems within 3-5 years. Continue reading China Creates Own OS to Kick Dependence on U.S. Systems

New California Law to Require ‘Kill Switch’ on Smartphones

Starting in July of next year, all smartphones sold in California must have a “kill switch,” a software feature that allows smartphone owners to disable a phone after it has been stolen. The “kill switch” will make it more difficult for thieves to resell stolen phones because the phone can only be reactivated with the owner’s correct password. Smartphone manufacturers will be required to ship these phones with the anti-theft technology activated as part of the default settings. Continue reading New California Law to Require ‘Kill Switch’ on Smartphones

Transparency for the Web: XRay Tracks Use of Personal Data

In a step toward protecting the personal data of online users, researchers at Columbia University have created new software called XRay that can observe and predict how tech companies are using the personal data that they collect. The software is based on research related to Google’s Gmail ads, Amazon recommendations, and YouTube recommendations. XRay, which will help privacy-concerned watchdogs track how personal data is used, is still in development. Continue reading Transparency for the Web: XRay Tracks Use of Personal Data

Twitter Effectively Combats Spam with New BotMaker System

Twitter unveiled its new BotMaker system this week, designed to address its growing spam problem. The machine learning models and other techniques traditionally used to classify messages as spam do not always work with the real-time nature of Twitter, so the company developed BotMaker, which scans messages as part of bulk data analyses. According to Twitter, the system has resulted in a 40 percent reduction in spam since it was rolled out and now handles billions of events each day. Continue reading Twitter Effectively Combats Spam with New BotMaker System

Google Planning to Offer Accounts to a Younger Demographic

In what could potentially become a controversial move, Google has plans to offer accounts to children under the age of 13 for the first time. Google services such as Gmail and YouTube do not currently offer accounts to kids (although kids can log on anonymously or pose as adults). Now Google is planning a new approach that encourages parents to open accounts for their children, and in the process control how they use Google services and the information that is collected about their kids. Continue reading Google Planning to Offer Accounts to a Younger Demographic

Encrypted Communication Tools Seeking Mainstream Users

Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users

Best Buy Plans to Offer Smart Home Hub via New Peq Service

According to videos recently posted to YouTube, Best Buy will offer a smart home hub through a $9.99-per-month service called Peq, which is provided by the newly launched SmartHome Ventures. Ted Schremp, CEO of SmartHome Ventures, suggests that Peq makes setting up and operating home automation and security very simple. Best Buy will become the fourth major retailer to join the home automation space following Lowe’s Iris, Staples Connect and Home Depot’s deal with Wink-Quirky. Continue reading Best Buy Plans to Offer Smart Home Hub via New Peq Service

NSA Funds Development of All-In-One Programming Language

The National Security Agency is funding a project at Carnegie Mellon University to develop the world’s first “polyglot” programming language that combines CSS, JavaScript, PHP, HTML5, and more. Wyvern, the new language, intends to make Web programming easier. Files will be more organized, making it easier for Web developers to secure their websites, which seems to be the NSA’s primary goal. Wyvern is an open source project still in development. Continue reading NSA Funds Development of All-In-One Programming Language

Tech Giants Tighten Security on Emails with Encryption Option

Last week, Yahoo joined Google and Microsoft in the effort to bring more privacy to users of their popular email services. The 110 million unique Yahoo email users will have the option to turn on an encrypted messaging feature. The feature relies on PGP encryption, which stores each user’s encryption key on their personal laptops and devices. Google also announced that encrypted websites will fare better in their search results due to a new feature in its ranking algorithm. Continue reading Tech Giants Tighten Security on Emails with Encryption Option

Russian Criminals Obtain Passwords and More in Massive Hack

Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack

FAA Regulations Needed as Aerial Drones Grow in Popularity?

As the price of small drones decreases, the popularity of these tiny unmanned aircraft increases for aerial wedding photographers and gadget enthusiasts alike. In New York City in particular, the proliferation of these devices has state officials and law enforcement officers worried. There is no required training for the amateur pilots operating these drones. In terms of regulations, the Federal Aviation Agency currently permits drones to be flown under 400 feet. Continue reading FAA Regulations Needed as Aerial Drones Grow in Popularity?

Black Hat: Smartphones Next Target of Cybersecurity Threats

At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats