Smartphones Merging with Cars Creating Connected Vehicles

Many cars made today are embedded with new technologies, which are leading to partnerships between auto manufacturers and wireless companies. These agreements are resulting in vehicles with always-on, fast wireless connectivity, providing the groundwork for new services, such as smartphones integrating with cars, and perhaps car-to-car communication. But with new forms of connectivity come new distractions and potential dangers. Continue reading Smartphones Merging with Cars Creating Connected Vehicles

Government Defends NSA Program that Collects Phone Data

According to a secret document obtained by The Washington Post, the National Security Agency and the FBI are accessing the central servers of nine U.S. Internet companies through a program code-named PRISM. The agencies are reportedly tracking chats, images, emails, documents and connection logs that assist analysts in identifying foreign threats. The federal government defends the program, while some civil liberties proponents are skeptical. Continue reading Government Defends NSA Program that Collects Phone Data

AT&T Launches Digital Life Home Security and Monitoring

AT&T announced that it has launched its Digital Life home security and monitoring service in 15 U.S. cities with plans to expand to 50 locations this year. Built on the telecom’s 2010 acquisition of Xamboo, it will compete with security offerings by companies like ADT and various startups building devices for the connected home. Digital Life will provide visual access via Web-connected cameras and sensors hooked up to a broadband connection. Continue reading AT&T Launches Digital Life Home Security and Monitoring

Google Joins FIDO Alliance: Hopes to Replace Passwords

Google has joined a consortium of technology companies that plans to make online accounts more secure. The FIDO Alliance, which was founded in part by Lenovo and PayPal, launched a set of technology standards earlier in the year that could reduce reliance on passwords. The group hopes hardware can have more of a role in authenticating users, and has been working on different ideas such as security chips and voice recognition. Continue reading Google Joins FIDO Alliance: Hopes to Replace Passwords

AP Twitter Account Hacked: Underlines Need for Security

The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security

CISPA: House of Representatives Passes Controversial Bill

In a 288 to 127 vote, the U.S. House of Representatives has passed the Cyber Intelligence Sharing and Protect Act (CISPA), which encourages businesses to share cyberthreat information with the government. Privacy advocates have been fighting passage of the act, concerned that it allows agencies to conduct warrantless searches of data collected from e-mail and Internet providers. The bill overrides current privacy and wiretap laws. Continue reading CISPA: House of Representatives Passes Controversial Bill

Search Engine Exposes Vulnerability of Connected Devices

Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices

Google Creates Manager for Permanently Inactive Accounts

With Internet users posting an increasing amount of information online, the question has arisen regarding what happens to that data once an individual passes on. Google may now have an answer with its new Inactive Account Manager. With this technology, users of any Google service can set a time to delete their “digital life” or send selected elements to a person of their choosing, after the account or accounts become permanently inactive. Continue reading Google Creates Manager for Permanently Inactive Accounts

U.S. Financial Institutions Become Targets of Cyberattacks

American Express confirmed that its website had come under attack last week. The assault, which took the site offline for two hours, marks the latest in a string of powerful digital attacks on American financial institutions that began this past September. JPMorgan Chase and others experienced a similar attack this month. The assaults collectively resulted in the loss of millions of dollars. Continue reading U.S. Financial Institutions Become Targets of Cyberattacks

Ethical Hacking: Going Undercover to Train Employees

Businesses have been training their employees to be more aware of potential cyberattacks. However, here’s the twist: the employees don’t always know they are being trained. So-called “ethical hackers” have been hired to lure employees with different tactics such as fake emails promising work bonuses and pictures of adorable cats with links or software that teaches workers how to avoid online dangers. Continue reading Ethical Hacking: Going Undercover to Train Employees

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Coalition of 38 States Draws Up Security Steps for Google

After a two-year investigation into whether or not Google’s Street View violates privacy protections, law enforcement officials have again told the company it is time to shape up. Google acknowledged breaches this week and said no longer will there be a scenario in which a midlevel engineer launches a program to secretly gather data from possibly millions of unencrypted global Wi-Fi networks, unbeknownst to his bosses. Continue reading Coalition of 38 States Draws Up Security Steps for Google

Obama Seeks Corporate Support for Cybersecurity Initiative

President Obama met with a group of 13 corporate executives at the White House on Wednesday to discuss growing cybersecurity concerns and to enlist support for his proposed legislation to combat the threat of computer warfare and corporate espionage. Among the chief execs were Rex W. Tillerson of Exxon Mobil, Randall L. Stephenson of AT&T, Brian T. Moynihan of Bank of America and Jamie Dimon of JPMorgan Chase. Continue reading Obama Seeks Corporate Support for Cybersecurity Initiative

China Hacking Hollywood Computers, Say Security Experts

Some cybersecurity experts say that Chinese hackers have invaded Hollywood’s computers, much like they did to the systems of Facebook, Apple, The New York Times and many others. The root of the problem, according to The Hollywood Reporter, is China’s contempt for intellectual property. In a country where most video and software is pirated, the culture of copying runs deep. Continue reading China Hacking Hollywood Computers, Say Security Experts

Danny Hillis Asks: What Happens if the Internet Goes Down?

At TED 2013 last week, Danny Hillis, an early Internet user who registered the third domain name ever (Think.com), spoke on the vulnerability of the expanding Internet. While standing on stage for his talk, he held up a one-inch-thick notebook, which listed every person — including name, address and phone number — who had an Internet address in 1982. By his estimates, that book would be 25 miles tall in today’s world. Continue reading Danny Hillis Asks: What Happens if the Internet Goes Down?