By
Meghan CoyleMay 13, 2014
The Federal Trade Commission recently charged Snapchat of deceiving users about the privacy of their personal data and their image and video messages. Under the terms of a new settlement with the FTC, Snapchat will be required to implement a privacy program that will be independently monitored for the next 20 years. If Snapchat violates the agreement, the company may be subject to fines. Snapchat has reportedly resolved most of the privacy issues over the past year. Continue reading Snapchat Agrees to Settle with FTC Over Deceptive Marketing
LG announced that its new family friendly, all-in-one computer powered by Chrome OS will be available for $350. The “simple, fast and secure” Chromebase will take on the iMac-dominated all-in-one space when it begins shipping this month. Chromebase combines cloud computing, access to “tens of thousands of apps” via the Chrome Web Store, a widescreen 21.5-inch 1080p display, an Intel Celeron 2955U Haswell processor, 2GB of RAM and 16GB of storage. Continue reading LG All-In-One Chromebase Computer to Hit Shelves This Month
By
Meghan CoyleMay 8, 2014
More than twenty tech companies and civil liberties groups have started a coalition to fight the National Security Agency’s mass Internet surveillance programs. On June 5, these groups will participate in a “Reset the Net” day of action by posting the campaign’s splash screen on websites and mobile apps. The coalition is distributing free privacy protection software tools to users and calling on developers to add NSA resistant features to sites and apps. Continue reading Reset the Net: Campaign Opposes Mass Internet Surveillance
By
Meghan CoyleMay 7, 2014
Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches. Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats
As the next step in the ongoing privacy debate sparked by the actions of Edward Snowden, the White House has released a report that recommends the government create limits on how companies make use of the information they gather online from customers. The report’s chief author is John Podesta, a senior White House adviser. Private companies fear a government initiative that could regulate how they profit from data gathered through mobile communication and Internet surfing habits. Continue reading Government Considers Limits on Customer Data Collection
By
Meghan CoyleApril 30, 2014
The U.S. government has had little success in passing bills to establish security standards and facilitate data sharing between the private and public sectors, but the Senate Intelligence Committee is currently drafting a new bill that would serve that purpose. Senator Dianne Feinstein and Senator Saxby Chambliss co-authored a bill which states that a company cannot be sued for sharing threat data to any entity or the federal government to prevent or investigate a cyberattack. Continue reading Senate Intelligence Committee Drafts Cyber Threat Legislation
By
Meghan CoyleApril 28, 2014
More than a dozen companies have joined the Core Infrastructure Initiative to provide funding to open source projects, starting with OpenSSL. The Linux Foundation, Amazon, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, Qualcomm, and VMWare have each pledged $100,000 over the next three years to pay for full-time developers, security audits, computing and testing infrastructure, and more to help financially strapped open source projects. Continue reading New Initiative Gets Companies to Fund Open Source Projects
By
Rob ScottApril 11, 2014
Popular websites have been scrambling to update software and Internet users have been encouraged to change their passwords following the news of an encryption flaw known as the Heartbleed bug, which is already being categorized as one of the biggest security threats the Internet has ever experienced. The bug has affected a number of websites and services (although the extent is not clear), and may have exposed account info including passwords and credit card numbers going back two years. UPDATE: Cisco and Juniper said yesterday that some of their networking products contain the bug, which means sensitive info may have been obtained while moving across corporate networks, home networks and the Internet. Continue reading Bug Causes Scramble to Update Software and Change Passwords
By
Tim MillerApril 9, 2014
Day one of Media Management in the Cloud, a two-day conference co-produced by NAB and the ETC, opened Tuesday morning to a standing-room only crowd in the Convention Center’s South Hall. After a brief welcome by ETC CEO Ken Williams, ETC’s Erik Weaver began the day’s events, noting that almost everything happening at NAB this year seems to have some connection to the cloud. Day one presentations and panels focused on key areas related to cloud services, such as cost, scalability, security, production and storage. Continue reading NAB Cloud Conference Opens to a Packed House in Las Vegas
By
Phil LelyveldApril 8, 2014
Ken Williams, executive director and CEO of ETC@USC, moderated a Disney/ABC Television Group panel at NAB called “Creating the Watch ABC Product.” From the SPROCKIT stage Monday in Las Vegas, the panel included Albert Cheng and Skarpi Hedinsson of the Disney/ABC Television Group, Ralf Jacob of upLynk and Doug Knopper of FreeWheel. The discussion focused on content creation, advertising, distribution workflow, technology integration and vendor relationships. Continue reading From the NAB SPROCKIT Stage: Creating Watch ABC Product
By
Rob ScottApril 8, 2014
The recently released FireChat mobile app stands out from competitors as the only messaging app that can be used without cell phone reception. FireChat makes use of Apple’s multipeer connectivity introduced in iOS 7, which enables phones to connect with each other directly via Bluetooth or Wi-Fi. FireChat users within 100 feet of one another can exchange messages without sending data through a cellular provider. A future of similar apps not reliant upon the Internet could open new possibilities and address privacy concerns. Continue reading New Software Lets Chat Apps Connect Phones Without Internet
By
Phil LelyveldApril 7, 2014
“Computers are like a bicycle for our minds,” Steve Jobs once said. “If that’s the case, then the cloud is a jetliner,” said Josh Rizzo, VP technology for Hula Post Production and moderator of SMPTE’s “Distributive Creativity” panel at NAB on the use of the cloud by the entertainment industry. Rizzo started off by making two overarching points: First, the entertainment industry is moving from expression to experience. Second, anything that can be built can be hacked, but the cloud is more secure than many options. Continue reading SMPTE Tech Summit at NAB: Distributive Creativity in the Cloud
By
Rob ScottApril 4, 2014
According to a new survey from Harris Interactive, a significant number of consumers are being more careful with online activities in the year since Edward Snowden revealed information about NSA phone and Internet surveillance. Among the poll’s findings, Harris learned that 33 percent of those 18 to 34 said they were doing less online shopping, 29 percent of people in the same age group said they had reduced online banking activity, and 24 percent of overall respondents explained they were “less inclined to use email.”
Continue reading Poll Suggests Consumers More Cautious Online Post Snowden
By
Rob ScottApril 3, 2014
The Industrial Internet Consortium — which includes AT&T, Cisco, General Electric, IBM and Intel — said last week that it plans to develop engineering standards for the connection of objects, sensors and computing systems in large industrial assets, such as oil refineries, factories and harbors. The consortium aims to establish standards for how machines will share information and move data. The group also plans to publish case studies, conduct forums and cooperate on security practices. Continue reading Consortium Seeks Engineering Standards for Internet of Things
By
Rob ScottMarch 17, 2014
Apple’s Touch ID fingerprint reader, released with the iPhone 5s, includes a sensor the thickness of a human hair, a sapphire crystal button, capacitive tech and complex data analysis. Alabama-based startup IDair believes it can replicate the quality of the Touch ID with a simpler approach that uses existing smartphone cameras to capture images of users’ fingers. IDair’s tech uses an algorithm the company has patented to convert the image into a means of identification. Continue reading Startup Develops Secure Method to Access Data on Your Phone