Microsoft Is Developing Cost-Effective Security for IoT Devices

IoT security researchers at Microsoft Research are focused on the near future when microcontrollers, which are small, low-power computers on a single chip, gain connectivity. Microcontrollers are already installed in billions of gadgets, so their eventual connectivity will explode the number of Internet of Things devices, all of which will require greater security. Microsoft Research’s Project Sopris aims to provide cost-effective security for microcontrollers, which currently don’t have enough compute power to offer security. Continue reading Microsoft Is Developing Cost-Effective Security for IoT Devices

CES to Offer New Take on the Future of Ambient Experiences

For 20 years the quest and definition of Ambient Intelligence (AmI) has been the purview of think tanks and device manufacturers. Defined in the 1990’s by Eli Zelkha and a team at Palo Alto Ventures, the pursuit of pervasive presence for humans and responsive connection with the computed environment has been the goal of multinationals and government entities. Most recently, the concept of creating environments that are responsive to the presence of individuals is making its way into the consumer electronics and personal computing space, which we expect will make a compelling splash next month at CES in Las Vegas. Continue reading CES to Offer New Take on the Future of Ambient Experiences

ETCentric Begins CES Coverage with Advance Sector Reports

ETC@USC’s coverage of CES 2018 (formerly the International Consumer Electronics Show) is underway as ETCentric begins its series of preview stories. Between now and the start of CES on January 9 in Las Vegas, our team will explore emerging trends and technologies with a focus on how these innovations may impact or influence media and entertainment. Even with more than 3,900 companies filling 2.5 million square feet with new products, services and technologies that span every industry, we’ve identified three broad segments that will help us organize our coverage: Input, Throughput and Output. Continue reading ETCentric Begins CES Coverage with Advance Sector Reports

New Technology Is a Clear Focal Point of 2017 LA Auto Show

Cars are still the obvious centerpiece of the LA Auto Show (December 1-10), but, increasingly, the hackers are starting to outnumber the gearheads. At AutoMobility LA, a four-day preview event for industry insiders and press preceding the consumer-focused show, cybersecurity and artificial intelligence were talked about with the same frequency as horsepower and mpg. Show organizers stressed the importance of bringing together “the entire new mobility ecosystem” and showcased a number of startups with vehicle debuts mixed in. Additionally, the event featured the first ever hackathon at an auto show. Continue reading New Technology Is a Clear Focal Point of 2017 LA Auto Show

New Uber CEO Faces the Impact of Undisclosed Data Breach

Uber Technologies acknowledged that one year ago it paid hackers $100,000 to hide a data breach that impacted 47 million accounts. The company fired then-chief security officer Joe Sullivan and deputy Craig Clark for both the breach itself and concealing it. The hackers got the names, emails and phone numbers of millions of riders as well as 600,000 drivers’ license numbers, although apparently Social Security numbers and credit card numbers were not accessed. Uber says it will inform those impacted by the breach in “coming days.” Continue reading New Uber CEO Faces the Impact of Undisclosed Data Breach

Europe to Employ Stricter Protection Rules for Personal Data

Since 1995, European businesses and organizations have operated under data protection rules specific to an era of much less digital data. To update the rules, the European General Data Protection Regulation (GDPR) will launch on May 25, 2018, and numerous GDPR experts are ready to profit off of their offer to help businesses get ready. U.K. information commissioner Elizabeth Denham dubs much of the activity as “scaremongering,” saying that companies that complied with the older rules won’t have to deal with major changes. Continue reading Europe to Employ Stricter Protection Rules for Personal Data

Under Senate Grilling, Equifax Says It Owns Consumer Data

Members of the Senate Commerce Committee interrogated Equifax interim chief executive Paulino do Rego Barros, but not about the widely reported hack that compromised the personal data of more than 145 million U.S. consumers. The committee wanted to know why Equifax was storing the information to begin with, challenging Equifax’s right to profit from such personal information. The highlight of the meetings thus far has been Barros’ assertion that Equifax, not consumers, own the data collected about them and that people cannot remove themselves from the company files. Continue reading Under Senate Grilling, Equifax Says It Owns Consumer Data

Fog Computing Unifies Technologies for Smart Cars, Homes

Fog computing is the latest idea on how to get the most out of new technologies and provide solutions for smart cars, cities and homes. It relies on cloud computing infrastructure, but brings the actual processes closer to earth (hence, fog) by using hardware near the edge of the network. Fog computing brings together many cutting edge technologies including virtualization, blockchain, DevOps, 5G, TSN (time-sensitive networking), distributed computing and IT-OT (operations technology) collaboration. Continue reading Fog Computing Unifies Technologies for Smart Cars, Homes

Facebook, Google and Twitter Execs Testify Before Congress

Facing the Senate Judiciary Committee on Tuesday, Facebook, Google and Twitter executives responded to questions on why they didn’t recognize Russian-linked accounts earlier. In response, the rueful executives said their companies were working on ways to curb the activity of foreign governments, terrorists and criminals and prevent them from exploiting social media. On the other hand, however, those same Silicon Valley companies face a public that is far from united over whether they should curb free speech. Continue reading Facebook, Google and Twitter Execs Testify Before Congress

Cisco, Google Partner to Gain Market Share in Cloud Services

Google and Cisco Systems are partnering to help companies manage software and technology services in their own data centers or an external cloud service. The two tech titans’ collaboration is aimed at breaking through Amazon and Microsoft’s domination of cloud services. With the new deal, Google will have access to Cisco’s corporate clients and Cisco will get a boost in its transition from computing networking equipment to cloud services. Cisco also competes with rivals such as VMware, another Amazon ally. Continue reading Cisco, Google Partner to Gain Market Share in Cloud Services

Amazon to Debut New Delivery Service in 37 Cities Next Month

Amazon is introducing Amazon Key, a service that, via a smart lock and a security camera, allows its couriers to unlock the consumer’s front door and drop a package inside. Similarly, Latch, a startup that makes smart locks, inked a deal this summer with Walmart online shopping site Jet.com to pay for its locks to be installed in 1,000 New York City apartment buildings. Amazon Key, which starts at $250, is a kit that includes an Amazon Cloud Cam (available separately for $120) and a Yale or Kwikset smart door lock. Continue reading Amazon to Debut New Delivery Service in 37 Cities Next Month

ARM Proposes Security Framework Standard for IoT Devices

Consumer confidence in the Internet of Things can be easily rattled by reports of compromised privacy, such as when researchers found that some baby monitors had been turned into surveillance devices. The SoftBank Group-owned U.K. chip manufacturer ARM, however, has introduced a potential solution: a security framework for IoT devices from home appliances and children’s toys to vehicles and streetlights. Up until now, the many IoT manufacturers haven’t agreed on a single security standard, something ARM hopes to remedy. Continue reading ARM Proposes Security Framework Standard for IoT Devices

WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

According to researchers, the WPA2 protocol for Wi-Fi connectivity contains a significant weakness that makes it vulnerable to attackers. A hacker within range of connected devices would reportedly be able to exploit this weakness to hijack passwords, emails and other “encrypted” data, or even place ransomware into a website the user is visiting. The research, which has been ongoing for weeks, reveals that the WPA2 core vulnerability could affect operating systems and devices including Android, Linux, OpenBSD, MediaTek, Linksys, macOS and Windows. Continue reading WPA2 Wi-Fi Flaw Revealed, Android & Linux Most Vulnerable

Clicking Flash Update on the Equifax Site Results in Adware

In the wake of May’s Equifax website breach that reportedly involved personal data of 145.5 million U.S. consumers, the credit reporting service’s site was manipulated again this week. On Wednesday, and again on Thursday, fraudulent Adobe Flash updates appeared that infected computers with adware when clicked. Only three of 65 antivirus providers detected the adware. Security analyst Randy Abrams discovered the issue while investigating false information that had appeared on his credit report. Meanwhile. federal legislators have introduced a new cybersecurity bill to help protect consumers. Continue reading Clicking Flash Update on the Equifax Site Results in Adware

Security Update: 3 Billion Yahoo Accounts Hit in 2013 Attack

Yahoo announced yesterday that all 3 billion of its user accounts were affected by a previously disclosed August 2013 cyberattack, originally reported by the company as affecting 1 billion accounts. Yahoo had earlier reported that a separate 2014 attack affected 500 million accounts. Last year we learned that, “digital thieves made off with names, birth dates, phone numbers and passwords of users that were encrypted with security that was easy to crack,” according to The New York Times. “The intruders also obtained the security questions and backup email addresses used to reset lost passwords.” Continue reading Security Update: 3 Billion Yahoo Accounts Hit in 2013 Attack

Page 1 of 2812345678910...20...»