Bipartisan Bill Would Further Regulate Online Content for Kids

Senators Ed Markey (D-Massachusetts) and Richard Blumenthal (D-Connecticut) introduced the Kids Internet Design and Safety (KIDS) Act, which would regulate how companies such as YouTube and TikTok handle what is accessible to children online, including advertising, app design and potentially harmful content. One of the main targets of the new bill are so-called unboxing videos, such as YouTube channel “Ryan’s World,” which can get millions of views. The KIDS Act would not ban the content, but prohibit the platform from recommending it to kids, curbing its distribution. Continue reading Bipartisan Bill Would Further Regulate Online Content for Kids

Intel Issues a Patch to Address Concerns About Chip Security

According to researchers at security firm Positive Technologies, Intel chips that were released during the past five years contain a flaw that may allow hackers to overcome built-in security measures. The flaw is in the Converged Security and Management Engine (CSME), described as a subsystem inside CPUs and chipsets similar to AMD’s Platform Security Processor. Intel has issued a patch, but Positive Technologies said it may not be enough to protect systems containing the flawed products. Intel’s 10th generation processors are reportedly not among those affected. Continue reading Intel Issues a Patch to Address Concerns About Chip Security

Law Could Stoke Battle Between Congress and Silicon Valley

Senate Judiciary Committee chair Lindsey Graham and senator Richard Blumenthal plan to introduce a law that could interfere with Big Tech’s ability to provide end-to-end encryption. The Eliminating Abuse and Rampant Neglect of Interactive Technologies Act of 2019 (EARN IT Act) targets the distribution of child sexual abuse material on platforms such as Facebook and Google, making them liable for state prosecution and civil lawsuits for user-posted content currently protected by Section 230. Continue reading Law Could Stoke Battle Between Congress and Silicon Valley

HPA Tech Retreat: Universal Unveils New Production Workflow

Like any movie franchise installment, Universal Pictures’ “Fast & Furious 8” (also known as “The Fate of the Furious”) relied on footage and data from the sequels that were produced before it. This movie was the proof of concept for Production 3.0, a new platform enabling quick access to assets like 3D VFX models for use in sequels, as well as theme park and AR/VR experiences.“Our production asset archive isn’t organized enough and doesn’t hold all production assets,” said Universal VP of creative technologies Annie Chang, who headed the team that developed it. Continue reading HPA Tech Retreat: Universal Unveils New Production Workflow

HPA Tech Retreat: Evolving Security for Media & Entertainment

An increasing concern over content security was the subject of HBO/WarnerMedia productions and content security head Marc Zorn’s talk on “Why Traditional Information Security Doesn’t Fit in Most of Media & Entertainment.” “Film security was based on physical controls,” he said. “Post production began after photography, and threats were primarily from post onwards.” Once the workflow became digital, he added, threats to digital media looked like IT security, “from an IT security professional’s perspective.” Continue reading HPA Tech Retreat: Evolving Security for Media & Entertainment

HPA Tech Retreat: The DPP’s Report on Next Gen Production

The Digital Production Partnership (DPP) is a London-based media industry business network, with a membership of 400+ companies representing the entire content supply chain. Eighteen months ago, the DPP issued the Production Business Survey report, detailing the operations of 57 production companies vis-à-vis the cloud. What it found was discouraging, so the DPP set its sights on another survey on Next Generation Production. At the HPA Tech Retreat, managing director Mark Harrison presented the findings. Continue reading HPA Tech Retreat: The DPP’s Report on Next Gen Production

Justice Department Charges Huawei with Racketeering, Theft

The Justice Department issued a federal indictment, which was unsealed in the Eastern District of New York, accusing Huawei Technologies and its affiliates of a “pattern of racketeering activity” as well as stealing trade secrets from six U.S. firms. The six firms were not named, but a source identified them as Cisco Systems, CNEX Labs, Fujitsu, Motorola Solutions, Quintel Technology and T-Mobile. Among the reportedly stolen information were source code and manuals for wireless technology. Continue reading Justice Department Charges Huawei with Racketeering, Theft

WhatsApp Chief Pledges to Safeguard Messaging Encryption

WhatsApp head Will Cathcart revealed that the app now has more than two billion active users; numbers were last released two years ago. Cathcart also emphasized that he will continue to defend the messaging app’s encryption, noting that, “for all of human history, people have been able to communicate privately with each other … and we don’t think that should go away in a modern society.” Facebook, which acquired WhatsApp for $21.8 billion, finds encryption a barrier to recuperating its investment. Continue reading WhatsApp Chief Pledges to Safeguard Messaging Encryption

Ransomware Attacks Increase and Demand Bigger Payouts

An increasing number of cities, hospitals and businesses are being attacked by ransomware, by which bad actors shut down the victim’s computer network until a ransom is paid. Up until now, these attacks have been hard to measure since many of those impacted quietly paid the ransom without notifying any authorities. Security firm Emsisoft just reported a 41 percent increase in ransomware attacks between 2018 and 2019, with 205,280 businesses and other groups submitting evidence of such intrusions in 2019. Continue reading Ransomware Attacks Increase and Demand Bigger Payouts

White House Pushes For 5G Standards and U.S. Networks

The Trump administration is working with U.S. tech companies, including AT&T, Dell and Microsoft, to develop common engineering standards for 5G telecom networks that would allow software to run on hardware from any manufacturer. In doing so, the U.S. would be able to advance 5G networks without relying on gear from China’s Huawei. White House economic advisor Larry Kudlow said, “the big picture concept is to have all the U.S. 5G architecture and infrastructure done by American firms, principally,” although it could also include technology from Ericsson and Nokia. Continue reading White House Pushes For 5G Standards and U.S. Networks

Apple Drops iCloud Encryption Plan Based on FBI Concerns

According to six sources, in response to FBI concerns, Apple dropped the plan to allow iPhone users to encrypt backups in its iCloud service. Although this took place two years ago, it is just now being reported. Stress between Apple’s stance on privacy and law enforcement’s push to have access to its phones re-emerged a few weeks ago when a Saudi Air Force officer killed three Americans at Naval Air Station Pensacola. U.S. attorney general William Barr and President Donald Trump urged Apple to unlock the killer’s two iPhones. Continue reading Apple Drops iCloud Encryption Plan Based on FBI Concerns

Google Bypasses Cloud to Offer AI to Enterprise Customers

AI can enable many important tasks from manufacturing to medicine, but only if the applications are speedy and secure. Communication via the cloud adds latency and risks privacy, which is why Google worked on a solution — dubbed Coral — that avoids centralized data centers. Coral product manager Vikram Tank described Coral as a “platform of [Google] hardware and software components … that help you build devices with local AI — providing hardware acceleration for neural networks … right on the edge device.” Continue reading Google Bypasses Cloud to Offer AI to Enterprise Customers

NSA Discovers Windows Vulnerability — and Tells Microsoft

The National Security Agency (NSA) discovered a vulnerability in versions of Windows and, instead of retaining it, reported it to Microsoft, which is now patching the flaw in its handling of certificate and cryptographic messaging functions. The vulnerability could have enabled attackers to use malicious code that would pretend to be legitimate software. Microsoft also warned all current users of Windows 7 Home Basic, Home Premium, Professional or Ultimate to upgrade immediately. Continue reading NSA Discovers Windows Vulnerability — and Tells Microsoft

Terrorist Act Revives Clash Between Government and Apple

In the aftermath of a deadly shooting at a Naval air station in Pensacola, Florida that was later declared an act of terrorism, Attorney General William Barr requested that Apple provide access to the two iPhones used by the killer. He later complained that Apple has thus far provided no “substantive assistance.” The Saudi Arabian assassin, Second Lt. Mohammed Saeed Alshamrani, was training with the U.S. military but had earlier posted anti-American, anti-Israeli and jihadist screeds on social media. Continue reading Terrorist Act Revives Clash Between Government and Apple

Las Vegas Was a Target of Cyberattack While Hosting CES

Early Tuesday morning, just as CES 2020 was getting underway, the team that monitors computers for Las Vegas detected a potential cyberattack as the city’s systems were reportedly compromised. While city officials tweeted about the breach, the information was light on details regarding which operations had been affected or the extent of the attack. The timing was unfortunate, since the annual CES confab is one of the largest events in Las Vegas. Last year, the show attracted more than 175,000 people and 4,400 exhibitors, including a number of Fortune 500 companies. Continue reading Las Vegas Was a Target of Cyberattack While Hosting CES