The Industry Built Upon Analyzing, Selling Your Location Data

Location data has become big business. According to recent research from The New York Times, at least 75 companies receive reams of precise, anonymous location data from apps with enabled location services. Some of these companies state they track up to 200 million mobile devices, to collect such data, which they sell, use or analyze for customers such as advertisers, retail companies and financial outlets including hedge funds. The location-targeted advertising industry is valued at $21 billion this year. Continue reading The Industry Built Upon Analyzing, Selling Your Location Data

Australian Law Will Allow Agencies to Circumvent Encryption

In the United States, Congress has resisted calls by the FBI and Department of Justice that would require tech companies to create a “back door” to allow them to bypass devices’ encryption. But other U.S. allies are moving forward on just such legislation, with Australia about to adopt a tough encryption law permitting intelligence agencies these powers. The country believes that its agencies need the power to circumvent encryption to protect it from terrorist attacks during the holiday season, often a high-threat period. Continue reading Australian Law Will Allow Agencies to Circumvent Encryption

PwC Research Reveals Media Execs’ Reluctance to Adopt AI

Media companies continue to adopt a variety of digital technologies, but have proven to be more reluctant than other industry sectors to embrace artificial intelligence. That’s the finding of PwC, which surveyed 1,000 U.S. executives for its “2019 AI Predictions” report. Covering many industry sectors, the research revealed that 20 percent of these companies plan to deploy AI next year. But media companies are still in the very early stages of enabling AI, and only a few with an AI business case. Continue reading PwC Research Reveals Media Execs’ Reluctance to Adopt AI

Federal Government Takes Additional Steps to Block Huawei

The U.S. government is reportedly pushing for foreign allies to stop using hardware from China-based Huawei Technologies Co. According to people familiar with the initiative, the government is aiming to convince wireless and Internet service providers to avoid telecom equipment that comes from Huawei in an effort to increase security. Washington officials are particularly concerned about countries that host military bases. The U.S. and Australia already have bans in place to curb the risk of cyberattacks. Huawei is the world’s largest telecommunications provider. Continue reading Federal Government Takes Additional Steps to Block Huawei

A Debate Over Most Effective Strategy to Fight Cyberattacks

Cyberattacks could potentially disrupt U.S. infrastructure, from the electric grid to the financial system. In July, the Department of Homeland Security reported that Russian hackers gained access to the control rooms of electric utilities. Now, analysts and policymakers are debating the best way to protect our critical infrastructure. While many believe that federal and state government regulation, funding and oversight are necessary, others argue this tack may actually cause harm and we should consider alternative approaches. Continue reading A Debate Over Most Effective Strategy to Fight Cyberattacks

U.S. Does Not Sign France’s Cyberspace Security Agreement

At the UNESCO Internet Governance Forum, French president Emmanuel Macron issued an initiative to set international Internet procedures for cybersecurity, including revealing tech vulnerabilities. Fifty nations, 90 nonprofits and universities and 130 private corporations and groups have endorsed the “Paris Call for Trust and Security in Cyberspace” — but not the United States. U.S. companies Google, Facebook, IBM, and HP signed on to the agreement, which outlines nine goals but doesn’t bind signatories legally to comply. Continue reading U.S. Does Not Sign France’s Cyberspace Security Agreement

Oregon Senator Proposes a Consumer Data Protection Bill

Oregon Democratic Senator Ron Wyden drafted a data privacy bill akin to the recent General Data Protection Regulation (GDPR) legislation in Europe. Dubbed the Consumer Data Protection Act, Wyden’s bill would give users more control over selling and sharing their data, and would give the Federal Trade Commission authority to set privacy and security standards and fine those companies that do not protect consumer data. One provision is a “Do Not Track” feature that would allow people to opt out of being tracked. Continue reading Oregon Senator Proposes a Consumer Data Protection Bill

Apple’s Tim Cook Asks Bloomberg to Retract China Spy Story

Apple chief executive Tim Cook is the latest and most prominent executive to call on Bloomberg to retract the claim that its technology supply-chain had been corrupted by Chinese surveillance microchips. According to two Bloomberg reports this month, Chinese spies infiltrated the technology supply chain with a surveillance microchip installed by Silicon Valley-based server company Supermicro. Those tiny chips ended up in the data center hardware of as many as 30 companies, including Amazon and Apple, added the report. Continue reading Apple’s Tim Cook Asks Bloomberg to Retract China Spy Story

Government Backs Apple and Amazon Denials of Spy Chips

As we reported last week, Bloomberg published a story claiming that China had secretly installed microchips on motherboards built by Supermicro that were used in data center servers of companies such as Apple and Amazon. In the first official response from the U.S. government, Homeland Security issued a statement indicating that it has “no reason to doubt” the denials issued by Apple, Amazon and Supermicro in the wake of the report. The Homeland Security statement is similar to comments released by the U.K.’s National Cyber Security Centre. Continue reading Government Backs Apple and Amazon Denials of Spy Chips

Justice Department Accuses Russian Spies of Cyberattacks

The Justice Department’s National Security Division claims that seven hackers suspected of working with Russia’s GRU military intelligence unit were part of a conspiracy to hack multiple organizations including the World Anti-Doping Agency, the Democratic National Committee, a nuclear energy company and several media outlets. The Fancy Bear cyber espionage group, also known as Sofacy or APT28, is accused of launching a disinformation campaign leading up to the 2016 U.S. presidential election, and “hacking to obtain non-public, health information about athletes and others in the files of anti-doping agencies in multiple countries.” Continue reading Justice Department Accuses Russian Spies of Cyberattacks

China Reportedly Used Tiny Chips to Hack U.S. Companies

According to a Bloomberg Businessweek cover story today, Chinese spies infiltrated nearly 30 U.S. companies including Amazon and Apple by embedding tiny chips into servers in the technology supply chain. In 2015, malicious microchips were reportedly embedded in servers bound for U.S. companies, which resulted in compromised software used in numerous hardware devices. While the report cites former government officials and “senior insiders” at Apple, both Amazon and Apple — as well as motherboard manufacturer Supermicro and China’s Ministry of Foreign Affairs — have firmly disputed the findings. Continue reading China Reportedly Used Tiny Chips to Hack U.S. Companies

Facebook Reveals Another Attack on its Computer Network

In its third security breach reported since June, Facebook announced on Friday that hackers had leveraged a security vulnerability in order to attack its computer network and access the personal accounts of about 50 million of its social platform users. In the two other breaches, hackers unblocked individuals that had been previously blocked by Facebook users, and users’ share settings were manipulated without permission. As a result of this latest breach, “the attackers could use the account as if they are the account holder,” according to Guy Rosen, VP product management for Facebook. Continue reading Facebook Reveals Another Attack on its Computer Network

California Passes Security Bill to Regulate Connected Devices

The California State Legislature recently passed a bill called “Information Privacy: Connected Devices” that creates regulations for IoT devices sold in the United States. SB-327, which applies to all devices that connect to the Internet and include an Internet Protocol or Bluetooth address, would require that security audits be conducted on components purchased overseas. The bill is the first of its kind in the U.S. and has been forwarded to Governor Jerry Brown for his signature. While some have criticized the bill for not being specific or thorough enough, it could place pressure on manufacturers to offer better device-level protection against cyberattacks. Continue reading California Passes Security Bill to Regulate Connected Devices

Inside The New Yorker Profile on Facebook’s Mark Zuckerberg

The New Yorker posted a profile of Facebook founder/chief executive Mark Zuckerberg on its website, a week ahead of its September 17 print publication. The article, by New Yorker staff writer Evan Osnos asks if Facebook will “break democracy.” The profile describes Zuckerberg as someone who makes a distinction between feeling an emotion and acting on it through his business. He also states his opposition to government regulations, stressing that breaking Facebook into smaller companies would be a huge mistake. Continue reading Inside The New Yorker Profile on Facebook’s Mark Zuckerberg

New Research Underlines the Ongoing Strength of P2P Piracy

Anti-piracy company Irdeto has revealed that P2P piracy is booming and still more popular than streaming in several countries. P2P traffic — mostly of the BitTorrent variety — continues to be a significant source of content for streaming portals hosting pirated content. Irdeto’s report comes at a time when Hollywood has focused its attention on streaming sites and services that distribute pirated content. Irdeto’s research examines web traffic to 962 piracy sites in 19 countries where P2P was the “dominant piracy tool.” Continue reading New Research Underlines the Ongoing Strength of P2P Piracy

Page 6 of 13«...234567891011...»