Google Brings Customized Feed to Its Search Landing Page

Google is introducing a new look for its search product that will appear just beneath its search box. The user will find a feed of news, entertainment and other content customized to her searches, video views and other personal information, including her location, email and digital calendars. Available first for the desktop, the new Google search page will eventually be available for mobile web browsers as well. Since Google launched in 1998, it has kept its landing page simple, only tweaking it in minor ways. Continue reading Google Brings Customized Feed to Its Search Landing Page

Samsung Wants Bixby Assistant to Control Multiple Devices

Samsung’s digital voice assistant Bixby just arrived on millions of the company’s Galaxy S8 phones. According to Samsung head of mobile software R&D Injong Rhee, the inspiration for Bixby was super-hero Tony Stark (“Iron Man”), who only needs to voice orders to activate all kinds of systems. Similar to Stark, Samsung wants to use Bixby to activate all kinds of devices, from dishwashers to TVs. While Bixby cannot control all apps yet and, like other digital assistants has some limitations, early reviews suggest it excels at function-based commands. Continue reading Samsung Wants Bixby Assistant to Control Multiple Devices

Meta AR Headset May Help Reimagine the Traditional Office

San Francisco-based startup Meta makes augmented reality headsets that its founder/chief executive Meron Gribetz wants to use to remake the traditional office. With his headset, the user can use a virtual floating screen to control 3D models, browse web pages, write code and send emails. Gribetz — who studied neuroscience and computer science at Columbia University — is now using his own employees to test the headset and its software to figure out how to improve it, an experiment described in a Bloomberg News “Decrypted” podcast. Continue reading Meta AR Headset May Help Reimagine the Traditional Office

Google Creates a Unified Corporate, Consumer Gmail Policy

Google has just standardized its Gmail policy, saying it will no longer scan the user emails of its free consumer service in order to serve targeted ads. The company adopted this policy with its G Suite corporate customers’ emails, and now adds its consumer service to avoid confusion and create a single policy. Google says the new policy, which will impact 1.2 billion consumers, will become active later this year. The company will continue to serve ads, but will draw data from YouTube or search rather than emails. Continue reading Google Creates a Unified Corporate, Consumer Gmail Policy

Google Docs Users Targeted in Widespread Phishing Attack

A major phishing attack mimicking cloud-based Google Docs software spread across news organizations and other companies yesterday. Gmail users have been reporting massive numbers of fraudulent emails that masquerade as a message from Google Docs. The emails appear as an invitation to join a Google Doc and often claim to be sent by an individual in the user’s address book. However, clicking on the embedded link directs recipients to grant access to a Google Docs app that is actually a program that sends spam to addresses in the recipient’s email. Continue reading Google Docs Users Targeted in Widespread Phishing Attack

NAB 2017: FCC Chair Ajit Pai Vows to Trim Dated Regulations

In his first appearance at NAB, FCC chair Ajit Pai got a warm welcome from broadcasters who liked what they heard. Pai promised to promote ATSC 3.0, also known as “next gen TV,” prune out regulations that are out-of-date or present obstacles to broadcasters, and tweak others. “Inertia is a powerful force in government,” declared Pai, who said he was “fundamentally optimistic” about broadcasting’s future. “There are close to 1,000 pages of broadcast rules, many of them decades old, and I’m trying to change that.” Continue reading NAB 2017: FCC Chair Ajit Pai Vows to Trim Dated Regulations

Third-Party Sellers on Amazon Become Latest Hacking Target

Hackers are reportedly targeting third-party sellers on Amazon by using stolen email and password credentials (available for purchase from previous hacks via the “Dark Web”) in a scam to post fake product deals online and pocket cash. Thieves have changed the bank info of active sellers on Amazon to steal amounts up to tens of thousands from each and have hacked less active sellers to post merchandise that does not exist, offering products at steep discounts. While PayPal and eBay have been targeted by hackers in the past, cybersecurity experts indicate that Amazon is becoming a new target. Continue reading Third-Party Sellers on Amazon Become Latest Hacking Target

Workplace: Facebook Tests Free Version of Slack Competitor

Facebook’s Workplace is a social networking tool designed for the enterprise, enabling an efficient chat and collaboration platform for employees. It is similar to the Facebook used by friends and family members, but instead is meant to foster interaction between co-workers. Now, Facebook is introducing a free version intended for smaller businesses that are not as interested in the administrative and analytical features offered to subscribers. (It is still being tested, so the release is limited.) The new version will be named “Workplace Standard,” and the paid version will go by “Workplace Premium.” Continue reading Workplace: Facebook Tests Free Version of Slack Competitor

U.S. Claims That Russian Hackers Were Behind Yahoo Attack

The Department of Justice officially charged four people yesterday in connection with Yahoo’s 2014 data breach that reportedly resulted in the theft of data from 500 million Yahoo accounts. According to the indictment, the Russian government used the data obtained by two intelligence officers (Dmitry Dokuchaev, Igor Sushchin) and two hackers (Alexsey Belan, Karim Baratov) to spy on White House and military officials, bank executives, cloud computing companies, a senior level airline official, a Nevada gaming regulator, as well as Russian journalists, business execs and government officials. Continue reading U.S. Claims That Russian Hackers Were Behind Yahoo Attack

Facebook Rolls Out Menus to Simplify Use of Messenger Bots

Facebook is updating its Messenger platform to make it easier for users to interact with bots. The interface now has a nested menu that categorizes all of the bot’s capabilities. Facebook also created a new option to allow developers to hide the chatting screen so that customers don’t even have to conduct conversations with bots anymore. This update seems to limit the capabilities of bots and future voice-computing software. It arrives as one launch partner of the bot platform is returning to email rather than using Messenger for customer notifications. Continue reading Facebook Rolls Out Menus to Simplify Use of Messenger Bots

Google Offers Up its Global Cloud-Based Database Technology

Google’s Spanner, developed a decade ago, created a way to store information across millions of machines in a multitude of data centers around the world. Despite its global reach, Spanner behaves as if it operates in a single location, meaning it can reliably replicate and change data without contradicting actions taken at a different location, and retrieve copies if one of the centers goes down. Since its creation, Spanner has become the foundation for 2,000 Google services including Gmail and AdWords. Now, Google plans to unveil Spanner to everyone as a cloud computing service. Continue reading Google Offers Up its Global Cloud-Based Database Technology

Yahoo Warns Users: Hackers Forged Cookies to Access Data

Yahoo has issued another warning that users’ personal data may have been compromised. In addition to the malicious activity reported in December that involved more than 1 billion user accounts in 2013-2014, following the September report regarding a separate theft of 500 million records, the Internet company is now notifying users that additional accounts were compromised between 2015 and 2016. “The stolen data included email addresses, birth dates and answers to security questions,” reports CNBC. The hacks involved “the use of ‘forged cookies’ — strings of data which are used across the Web and can sometimes allow people to access online accounts without re-entering their passwords.” Continue reading Yahoo Warns Users: Hackers Forged Cookies to Access Data

Court Rules Microsoft Email Surveillance Lawsuit Can Proceed

In April, Microsoft sued the federal government for intercepting its customers’ emails and preventing Microsoft from alerting them. Now, U.S. District Judge James Robart has ruled that Microsoft made a viable argument, but rejects its contention that the government interception is an unlawful search and seizure of property. At the time, federal courts issued Microsoft about 2,600 so-called secrecy orders, and the tech company could not inform its customers, even when the search was over. Continue reading Court Rules Microsoft Email Surveillance Lawsuit Can Proceed

Cybersecurity and How to Build Speed Bumps Against Hackers

At a CES CyberSecurity Forum, journalist/author Wayne Rash led a discussion on the various ways that companies are failing to protect their intellectual property and remain vulnerable to malicious code and ransomware. According to Yubico chief executive Stina Ehrensvard, 70 percent of hacks are related to passwords. “The password is the weak link,” agrees Authentic8 chief executive Scott Petry. “Reusing passwords is a problem. If you use your Yahoo password for other sites, you’re in trouble.” Continue reading Cybersecurity and How to Build Speed Bumps Against Hackers

Yahoo: Second Data Breach Involves 1 Billion User Accounts

In September, Yahoo revealed a 2014 security breach that involved 500,000 of its users’ accounts. Now the company has announced an even larger data breach from 2013 involving more than one billion accounts, including those of more than 150,000 government and military employees. “The two attacks are the largest known security breaches of one company’s computer network,” reports The New York Times. “The newly disclosed 2013 attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions that could be used to reset a password.” Continue reading Yahoo: Second Data Breach Involves 1 Billion User Accounts