Encrypted Communication Tools Seeking Mainstream Users

Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users

Best Buy Plans to Offer Smart Home Hub via New Peq Service

According to videos recently posted to YouTube, Best Buy will offer a smart home hub through a $9.99-per-month service called Peq, which is provided by the newly launched SmartHome Ventures. Ted Schremp, CEO of SmartHome Ventures, suggests that Peq makes setting up and operating home automation and security very simple. Best Buy will become the fourth major retailer to join the home automation space following Lowe’s Iris, Staples Connect and Home Depot’s deal with Wink-Quirky. Continue reading Best Buy Plans to Offer Smart Home Hub via New Peq Service

NSA Funds Development of All-In-One Programming Language

The National Security Agency is funding a project at Carnegie Mellon University to develop the world’s first “polyglot” programming language that combines CSS, JavaScript, PHP, HTML5, and more. Wyvern, the new language, intends to make Web programming easier. Files will be more organized, making it easier for Web developers to secure their websites, which seems to be the NSA’s primary goal. Wyvern is an open source project still in development. Continue reading NSA Funds Development of All-In-One Programming Language

Tech Giants Tighten Security on Emails with Encryption Option

Last week, Yahoo joined Google and Microsoft in the effort to bring more privacy to users of their popular email services. The 110 million unique Yahoo email users will have the option to turn on an encrypted messaging feature. The feature relies on PGP encryption, which stores each user’s encryption key on their personal laptops and devices. Google also announced that encrypted websites will fare better in their search results due to a new feature in its ranking algorithm. Continue reading Tech Giants Tighten Security on Emails with Encryption Option

Russian Criminals Obtain Passwords and More in Massive Hack

Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack

FAA Regulations Needed as Aerial Drones Grow in Popularity?

As the price of small drones decreases, the popularity of these tiny unmanned aircraft increases for aerial wedding photographers and gadget enthusiasts alike. In New York City in particular, the proliferation of these devices has state officials and law enforcement officers worried. There is no required training for the amateur pilots operating these drones. In terms of regulations, the Federal Aviation Agency currently permits drones to be flown under 400 feet. Continue reading FAA Regulations Needed as Aerial Drones Grow in Popularity?

Black Hat: Smartphones Next Target of Cybersecurity Threats

At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats

Bleep: BitTorrent Develops Secure Calling and Messaging App

San Francisco’s BitTorrent is leveraging its expertise in online file sharing tech to develop Bleep, an encrypted snoop-proof chat app. None of the texts or calls are stored, and only the two computers are involved in the communication. While the NSA could potentially monitor the interactions, the job becomes much more difficult with the new app. Not only does Bleep encrypt its traffic and encourage users to keep their identities secret, but it also uses no central server. Continue reading Bleep: BitTorrent Develops Secure Calling and Messaging App

CockroachDB Cloud-Based Software Makes Websites Resilient

A team of open source developers, including several former Google engineers, is working on software that will allow companies to ensure that their cloud computing systems will run even if a server or data center goes down. The software known as CockroachDB is based on Google’s Spanner system, which uses thousands of servers to run its online empire. CockroachDB will similarly replicate information across data centers, so online operations will not suffer from outages. Continue reading CockroachDB Cloud-Based Software Makes Websites Resilient

Apple and IBM Tackle Mobile Enterprise with Exclusive Venture

Apple and IBM announced a joint venture that the tech giants have been working on for several months. The exclusive partnership will focus on mobile and data analysis tech in the corporate world by developing more than 100 business software programs intended for use on iPhones and iPads. Applications will be tailored for banking, healthcare, insurance, retail, telecommunications and transportation. Apple CEO Tim Cook described the venture as “a landmark partnership.” Continue reading Apple and IBM Tackle Mobile Enterprise with Exclusive Venture

Netflix Releases its Security Monkey as an Open-Source Tool

Netflix recently open-sourced one of its management tools designed to work with machines through Amazon’s cloud. Security Monkey is the latest open-source tool in a line of software known as the “Simian Army,” that was developed to help run Netflix’s massive online service. For companies using Amazon’s cloud computing services, Security Monkey can monitor configuration changes across several Amazon accounts and ensure that those changes avoid common security problems. Continue reading Netflix Releases its Security Monkey as an Open-Source Tool

Report: NSA Keeps Information Not Targeted in Surveillance

According to a four-month investigation by The Washington Post, ordinary Internet users significantly outnumber the legally targeted foreigners in electronic communications intercepted by the NSA. Based on the collection of intercepted conversations from U.S. digital networks that Edward Snowden provided, 90 percent of account holders were not the intended surveillance targets. And nearly half of the files included names, email addresses or other details belonging to U.S. citizens. Continue reading Report: NSA Keeps Information Not Targeted in Surveillance

36 Million Smart Homes Coming to U.S. and Europe by 2017

Analyst firm Berg Insights forecasts that the number of smart homes in the U.S. and Europe will reach 36 million by 2017, with sales of $9.4 billion per year. The second edition “Smart Homes and Home Automation” report indicates the U.S. had 3.5 million smart homes at the end of 2012. Berg defines smart homes as those with connected products that work in conjunction with apps or a Web portal. However, most of today’s smart homes simply include products such as a Nest thermostat. Continue reading 36 Million Smart Homes Coming to U.S. and Europe by 2017

Connected Home: Google’s Nest Agrees to Acquire Dropcam

As part of its push to become the dominant OS for connected devices in and around the home, Google’s Nest Labs will purchase Dropcam for $555 million. Dropcam’s Web-connected video-monitoring service streams live to mobile apps and sends alerts based on activity in the home. Google acquired Nest, founded by Apple designers Matt Rogers and Tony Fadell, earlier this year for $3.2 billion. The acquisition of Dropcam is expected to generate privacy concerns. Continue reading Connected Home: Google’s Nest Agrees to Acquire Dropcam

NASA’s Shadow Internet: 100 Times Faster Than Google Fiber

NASA uses a super-fast shadow network, known as the Energy Science Network (ESnet for short), to connect researchers working on big data projects, such as the Large Hadron Collider or the Human Genome Project. ESnet uses fiber optic lines to reach transfer speeds of 91 gigabits per second, the fastest ever reported for end-to-end data transfer conducted under real world conditions. NASA does not plan on making ESnet available to consumers, but the tech may someday be picked up by Internet service providers. Continue reading NASA’s Shadow Internet: 100 Times Faster Than Google Fiber

Page 30 of 37«...1020...26272829303132333435...»