Amazon Web Services: Outage During Bid for CIA Contract

Amazon’s Web Services went down on Sunday due to a technical issue at a North Virginia data center. The outage was caused by a problem with a single networking device, and reveals that many companies do not distribute their Web services in different locations for service redundancy. This comes as Amazon is bidding on a CIA contract to manage their data services, and competitors are critical of whether Amazon can manage the demands of government data. Continue reading Amazon Web Services: Outage During Bid for CIA Contract

New FTC Chair Warns Companies About Consumer Data Privacy

The new chair of the U.S. Federal Trade Commission, Edith Ramirez, says that the agency will pursue a more active role in policing companies that gather large amounts of data, and that the FTC will not hesitate to sue for privacy and security violations. Ramirez wants more transparency from companies that collect consumer data, as well as to keep this data anonymous. Ramirez did not provide specifics regarding how the FTC will enforce data protection guidelines. Continue reading New FTC Chair Warns Companies About Consumer Data Privacy

Microsoft Releases Operating System For Home Automation

Microsoft researchers have recently released software that will make home automation easier. The company’s Lab of Things will serve as a platform for researchers and developers. Researchers will have a base to study home automation technology, and developers will have an operating system for apps that will control and monitor this technology. Some believe that the Lab of Things may be a starting project for larger and more complex buildings. Continue reading Microsoft Releases Operating System For Home Automation

Smartphones Merging with Cars Creating Connected Vehicles

Many cars made today are embedded with new technologies, which are leading to partnerships between auto manufacturers and wireless companies. These agreements are resulting in vehicles with always-on, fast wireless connectivity, providing the groundwork for new services, such as smartphones integrating with cars, and perhaps car-to-car communication. But with new forms of connectivity come new distractions and potential dangers. Continue reading Smartphones Merging with Cars Creating Connected Vehicles

Government Defends NSA Program that Collects Phone Data

According to a secret document obtained by The Washington Post, the National Security Agency and the FBI are accessing the central servers of nine U.S. Internet companies through a program code-named PRISM. The agencies are reportedly tracking chats, images, emails, documents and connection logs that assist analysts in identifying foreign threats. The federal government defends the program, while some civil liberties proponents are skeptical. Continue reading Government Defends NSA Program that Collects Phone Data

AT&T Launches Digital Life Home Security and Monitoring

AT&T announced that it has launched its Digital Life home security and monitoring service in 15 U.S. cities with plans to expand to 50 locations this year. Built on the telecom’s 2010 acquisition of Xamboo, it will compete with security offerings by companies like ADT and various startups building devices for the connected home. Digital Life will provide visual access via Web-connected cameras and sensors hooked up to a broadband connection. Continue reading AT&T Launches Digital Life Home Security and Monitoring

Google Joins FIDO Alliance: Hopes to Replace Passwords

Google has joined a consortium of technology companies that plans to make online accounts more secure. The FIDO Alliance, which was founded in part by Lenovo and PayPal, launched a set of technology standards earlier in the year that could reduce reliance on passwords. The group hopes hardware can have more of a role in authenticating users, and has been working on different ideas such as security chips and voice recognition. Continue reading Google Joins FIDO Alliance: Hopes to Replace Passwords

AP Twitter Account Hacked: Underlines Need for Security

The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security

CISPA: House of Representatives Passes Controversial Bill

In a 288 to 127 vote, the U.S. House of Representatives has passed the Cyber Intelligence Sharing and Protect Act (CISPA), which encourages businesses to share cyberthreat information with the government. Privacy advocates have been fighting passage of the act, concerned that it allows agencies to conduct warrantless searches of data collected from e-mail and Internet providers. The bill overrides current privacy and wiretap laws. Continue reading CISPA: House of Representatives Passes Controversial Bill

Search Engine Exposes Vulnerability of Connected Devices

Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices

Google Creates Manager for Permanently Inactive Accounts

With Internet users posting an increasing amount of information online, the question has arisen regarding what happens to that data once an individual passes on. Google may now have an answer with its new Inactive Account Manager. With this technology, users of any Google service can set a time to delete their “digital life” or send selected elements to a person of their choosing, after the account or accounts become permanently inactive. Continue reading Google Creates Manager for Permanently Inactive Accounts

U.S. Financial Institutions Become Targets of Cyberattacks

American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks

Ethical Hacking: Going Undercover to Train Employees

Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Coalition of 38 States Draws Up Security Steps for Google

After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google