By
Chris CastanedaAugust 30, 2013
Amazon’s Web Services went down on Sunday due to a technical issue at a North Virginia data center. The outage was caused by a problem with a single networking device, and reveals that many companies do not distribute their Web services in different locations for service redundancy. This comes as Amazon is bidding on a CIA contract to manage their data services, and competitors are critical of whether Amazon can manage the demands of government data. Continue reading Amazon Web Services: Outage During Bid for CIA Contract
By
Chris CastanedaAugust 21, 2013
The new chair of the U.S. Federal Trade Commission, Edith Ramirez, says that the agency will pursue a more active role in policing companies that gather large amounts of data, and that the FTC will not hesitate to sue for privacy and security violations. Ramirez wants more transparency from companies that collect consumer data, as well as to keep this data anonymous. Ramirez did not provide specifics regarding how the FTC will enforce data protection guidelines. Continue reading New FTC Chair Warns Companies About Consumer Data Privacy
By
Chris CastanedaJuly 22, 2013
Microsoft researchers have recently released software that will make home automation easier. The company’s Lab of Things will serve as a platform for researchers and developers. Researchers will have a base to study home automation technology, and developers will have an operating system for apps that will control and monitor this technology. Some believe that the Lab of Things may be a starting project for larger and more complex buildings. Continue reading Microsoft Releases Operating System For Home Automation
By
Chris CastanedaJuly 12, 2013
Many cars made today are embedded with new technologies, which are leading to partnerships between auto manufacturers and wireless companies. These agreements are resulting in vehicles with always-on, fast wireless connectivity, providing the groundwork for new services, such as smartphones integrating with cars, and perhaps car-to-car communication. But with new forms of connectivity come new distractions and potential dangers. Continue reading Smartphones Merging with Cars Creating Connected Vehicles
According to a secret document obtained by The Washington Post, the National Security Agency and the FBI are accessing the central servers of nine U.S. Internet companies through a program code-named PRISM. The agencies are reportedly tracking chats, images, emails, documents and connection logs that assist analysts in identifying foreign threats. The federal government defends the program, while some civil liberties proponents are skeptical. Continue reading Government Defends NSA Program that Collects Phone Data
By
Rob ScottApril 30, 2013
AT&T announced that it has launched its Digital Life home security and monitoring service in 15 U.S. cities with plans to expand to 50 locations this year. Built on the telecom’s 2010 acquisition of Xamboo, it will compete with security offerings by companies like ADT and various startups building devices for the connected home. Digital Life will provide visual access via Web-connected cameras and sensors hooked up to a broadband connection. Continue reading AT&T Launches Digital Life Home Security and Monitoring
By
Rob ScottApril 25, 2013
Google has joined a consortium of technology companies that plans to make online accounts more secure. The FIDO Alliance, which was founded in part by Lenovo and PayPal, launched a set of technology standards earlier in the year that could reduce reliance on passwords. The group hopes hardware can have more of a role in authenticating users, and has been working on different ideas such as security chips and voice recognition. Continue reading Google Joins FIDO Alliance: Hopes to Replace Passwords
By
Rob ScottApril 24, 2013
The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security
By
Rob ScottApril 19, 2013
In a 288 to 127 vote, the U.S. House of Representatives has passed the Cyber Intelligence Sharing and Protect Act (CISPA), which encourages businesses to share cyberthreat information with the government. Privacy advocates have been fighting passage of the act, concerned that it allows agencies to conduct warrantless searches of data collected from e-mail and Internet providers. The bill overrides current privacy and wiretap laws. Continue reading CISPA: House of Representatives Passes Controversial Bill
By
Rob ScottApril 19, 2013
Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices
By
emeadowsApril 15, 2013
With Internet users posting an increasing amount of information online, the question has arisen regarding what happens to that data once an individual passes on. Google may now have an answer with its new Inactive Account Manager. With this technology, users of any Google service can set a time to delete their “digital life” or send selected elements to a person of their choosing, after the account or accounts become permanently inactive. Continue reading Google Creates Manager for Permanently Inactive Accounts
American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks
By
emeadowsMarch 28, 2013
Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees
By
emeadowsMarch 25, 2013
During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data
By
Rob ScottMarch 15, 2013
After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google