By
Meghan CoyleAugust 7, 2014
Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack
By
Meghan CoyleAugust 6, 2014
As the price of small drones decreases, the popularity of these tiny unmanned aircraft increases for aerial wedding photographers and gadget enthusiasts alike. In New York City in particular, the proliferation of these devices has state officials and law enforcement officers worried. There is no required training for the amateur pilots operating these drones. In terms of regulations, the Federal Aviation Agency currently permits drones to be flown under 400 feet. Continue reading FAA Regulations Needed as Aerial Drones Grow in Popularity?
By
Marlena HallerAugust 5, 2014
At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats
By
Marlena HallerAugust 4, 2014
San Francisco’s BitTorrent is leveraging its expertise in online file sharing tech to develop Bleep, an encrypted snoop-proof chat app. None of the texts or calls are stored, and only the two computers are involved in the communication. While the NSA could potentially monitor the interactions, the job becomes much more difficult with the new app. Not only does Bleep encrypt its traffic and encourage users to keep their identities secret, but it also uses no central server. Continue reading Bleep: BitTorrent Develops Secure Calling and Messaging App
By
Meghan CoyleJuly 25, 2014
A team of open source developers, including several former Google engineers, is working on software that will allow companies to ensure that their cloud computing systems will run even if a server or data center goes down. The software known as CockroachDB is based on Google’s Spanner system, which uses thousands of servers to run its online empire. CockroachDB will similarly replicate information across data centers, so online operations will not suffer from outages. Continue reading CockroachDB Cloud-Based Software Makes Websites Resilient
By
Rob ScottJuly 17, 2014
Apple and IBM announced a joint venture that the tech giants have been working on for several months. The exclusive partnership will focus on mobile and data analysis tech in the corporate world by developing more than 100 business software programs intended for use on iPhones and iPads. Applications will be tailored for banking, healthcare, insurance, retail, telecommunications and transportation. Apple CEO Tim Cook described the venture as “a landmark partnership.” Continue reading Apple and IBM Tackle Mobile Enterprise with Exclusive Venture
By
Meghan CoyleJuly 7, 2014
Netflix recently open-sourced one of its management tools designed to work with machines through Amazon’s cloud. Security Monkey is the latest open-source tool in a line of software known as the “Simian Army,” that was developed to help run Netflix’s massive online service. For companies using Amazon’s cloud computing services, Security Monkey can monitor configuration changes across several Amazon accounts and ensure that those changes avoid common security problems. Continue reading Netflix Releases its Security Monkey as an Open-Source Tool
According to a four-month investigation by The Washington Post, ordinary Internet users significantly outnumber the legally targeted foreigners in electronic communications intercepted by the NSA. Based on the collection of intercepted conversations from U.S. digital networks that Edward Snowden provided, 90 percent of account holders were not the intended surveillance targets. And nearly half of the files included names, email addresses or other details belonging to U.S. citizens. Continue reading Report: NSA Keeps Information Not Targeted in Surveillance
Analyst firm Berg Insights forecasts that the number of smart homes in the U.S. and Europe will reach 36 million by 2017, with sales of $9.4 billion per year. The second edition “Smart Homes and Home Automation” report indicates the U.S. had 3.5 million smart homes at the end of 2012. Berg defines smart homes as those with connected products that work in conjunction with apps or a Web portal. However, most of today’s smart homes simply include products such as a Nest thermostat. Continue reading 36 Million Smart Homes Coming to U.S. and Europe by 2017
By
Marlena HallerJune 24, 2014
As part of its push to become the dominant OS for connected devices in and around the home, Google’s Nest Labs will purchase Dropcam for $555 million. Dropcam’s Web-connected video-monitoring service streams live to mobile apps and sends alerts based on activity in the home. Google acquired Nest, founded by Apple designers Matt Rogers and Tony Fadell, earlier this year for $3.2 billion. The acquisition of Dropcam is expected to generate privacy concerns. Continue reading Connected Home: Google’s Nest Agrees to Acquire Dropcam
By
Meghan CoyleJune 19, 2014
NASA uses a super-fast shadow network, known as the Energy Science Network (ESnet for short), to connect researchers working on big data projects, such as the Large Hadron Collider or the Human Genome Project. ESnet uses fiber optic lines to reach transfer speeds of 91 gigabits per second, the fastest ever reported for end-to-end data transfer conducted under real world conditions. NASA does not plan on making ESnet available to consumers, but the tech may someday be picked up by Internet service providers. Continue reading NASA’s Shadow Internet: 100 Times Faster Than Google Fiber
By
Marlena HallerMay 29, 2014
In a survey of 259 marketing and business development execs in finance, retail and consumer products, Forrester Research found that one-third of the respondents were confused about big data, and only 9 percent plan to implement related technologies in the next year. Forrester also found in a parallel survey that 452 technology execs at the same companies claimed they were more familiar with big data. Despite the confusion, the report encourages companies to take advantage of data supplied by Internet users and connected devices.
Continue reading Forrester Sees Growth in Use of Big Data Despite Confusion
By
Meghan CoyleMay 29, 2014
The Federal Trade Commission released a report urging Congress to require data brokers to be more transparent. Data brokers collect information on nearly all U.S consumers, typically without their knowledge, and create profiles based on online purchases, public records, and online tracking cookies. The FTC recommends creating one Internet site where each company explains their purpose and method of data collection and gives consumers a chance to opt out. Continue reading FTC Report Exposes Depth of Data Broker Info on Consumers
Late last week the House overwhelmingly passed legislation that is intended to bring an end to the National Security Agency’s bulk phone records program. The USA Freedom Act is designed to restrict the federal government’s ability to collect records about citizens in bulk, a program that had sparked debate regarding privacy and civil liberties. The House voted 303-to-121 in support of the USA Freedom Act, which could signal a change in how both political parties view the power of the NSA. Continue reading House Passes USA Freedom Act to Curb NSA Surveillance
By
Meghan CoyleMay 26, 2014
The Worldwide Web Consortium and the Digital Advertising Alliance have been working on separate efforts to draft rules that would allow Internet users to browse without being tracked by online marketing companies. However, the proposals from both groups will still allow Google or Facebook to track consumers on their own sites or properties such as Gmail or any site with a Facebook “Like” button. Small ad networks say the new proposals will undercut their business. Continue reading Small Ad Networks May Suffer from “Do Not Track” Proposals