New California Law to Require ‘Kill Switch’ on Smartphones

Starting in July of next year, all smartphones sold in California must have a “kill switch,” a software feature that allows smartphone owners to disable a phone after it has been stolen. The “kill switch” will make it more difficult for thieves to resell stolen phones because the phone can only be reactivated with the owner’s correct password. Smartphone manufacturers will be required to ship these phones with the anti-theft technology activated as part of the default settings. Continue reading New California Law to Require ‘Kill Switch’ on Smartphones

Transparency for the Web: XRay Tracks Use of Personal Data

In a step toward protecting the personal data of online users, researchers at Columbia University have created new software called XRay that can observe and predict how tech companies are using the personal data that they collect. The software is based on research related to Google’s Gmail ads, Amazon recommendations, and YouTube recommendations. XRay, which will help privacy-concerned watchdogs track how personal data is used, is still in development. Continue reading Transparency for the Web: XRay Tracks Use of Personal Data

Twitter Effectively Combats Spam with New BotMaker System

Twitter unveiled its new BotMaker system this week, designed to address its growing spam problem. The machine learning models and other techniques traditionally used to classify messages as spam do not always work with the real-time nature of Twitter, so the company developed BotMaker, which scans messages as part of bulk data analyses. According to Twitter, the system has resulted in a 40 percent reduction in spam since it was rolled out and now handles billions of events each day. Continue reading Twitter Effectively Combats Spam with New BotMaker System

Google Planning to Offer Accounts to a Younger Demographic

In what could potentially become a controversial move, Google has plans to offer accounts to children under the age of 13 for the first time. Google services such as Gmail and YouTube do not currently offer accounts to kids (although kids can log on anonymously or pose as adults). Now Google is planning a new approach that encourages parents to open accounts for their children, and in the process control how they use Google services and the information that is collected about their kids. Continue reading Google Planning to Offer Accounts to a Younger Demographic

Encrypted Communication Tools Seeking Mainstream Users

Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users

Best Buy Plans to Offer Smart Home Hub via New Peq Service

According to videos recently posted to YouTube, Best Buy will offer a smart home hub through a $9.99-per-month service called Peq, which is provided by the newly launched SmartHome Ventures. Ted Schremp, CEO of SmartHome Ventures, suggests that Peq makes setting up and operating home automation and security very simple. Best Buy will become the fourth major retailer to join the home automation space following Lowe’s Iris, Staples Connect and Home Depot’s deal with Wink-Quirky. Continue reading Best Buy Plans to Offer Smart Home Hub via New Peq Service

NSA Funds Development of All-In-One Programming Language

The National Security Agency is funding a project at Carnegie Mellon University to develop the world’s first “polyglot” programming language that combines CSS, JavaScript, PHP, HTML5, and more. Wyvern, the new language, intends to make Web programming easier. Files will be more organized, making it easier for Web developers to secure their websites, which seems to be the NSA’s primary goal. Wyvern is an open source project still in development. Continue reading NSA Funds Development of All-In-One Programming Language

Tech Giants Tighten Security on Emails with Encryption Option

Last week, Yahoo joined Google and Microsoft in the effort to bring more privacy to users of their popular email services. The 110 million unique Yahoo email users will have the option to turn on an encrypted messaging feature. The feature relies on PGP encryption, which stores each user’s encryption key on their personal laptops and devices. Google also announced that encrypted websites will fare better in their search results due to a new feature in its ranking algorithm. Continue reading Tech Giants Tighten Security on Emails with Encryption Option

Russian Criminals Obtain Passwords and More in Massive Hack

Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack

FAA Regulations Needed as Aerial Drones Grow in Popularity?

As the price of small drones decreases, the popularity of these tiny unmanned aircraft increases for aerial wedding photographers and gadget enthusiasts alike. In New York City in particular, the proliferation of these devices has state officials and law enforcement officers worried. There is no required training for the amateur pilots operating these drones. In terms of regulations, the Federal Aviation Agency currently permits drones to be flown under 400 feet. Continue reading FAA Regulations Needed as Aerial Drones Grow in Popularity?

Black Hat: Smartphones Next Target of Cybersecurity Threats

At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats

Bleep: BitTorrent Develops Secure Calling and Messaging App

San Francisco’s BitTorrent is leveraging its expertise in online file sharing tech to develop Bleep, an encrypted snoop-proof chat app. None of the texts or calls are stored, and only the two computers are involved in the communication. While the NSA could potentially monitor the interactions, the job becomes much more difficult with the new app. Not only does Bleep encrypt its traffic and encourage users to keep their identities secret, but it also uses no central server. Continue reading Bleep: BitTorrent Develops Secure Calling and Messaging App

CockroachDB Cloud-Based Software Makes Websites Resilient

A team of open source developers, including several former Google engineers, is working on software that will allow companies to ensure that their cloud computing systems will run even if a server or data center goes down. The software known as CockroachDB is based on Google’s Spanner system, which uses thousands of servers to run its online empire. CockroachDB will similarly replicate information across data centers, so online operations will not suffer from outages. Continue reading CockroachDB Cloud-Based Software Makes Websites Resilient

Apple and IBM Tackle Mobile Enterprise with Exclusive Venture

Apple and IBM announced a joint venture that the tech giants have been working on for several months. The exclusive partnership will focus on mobile and data analysis tech in the corporate world by developing more than 100 business software programs intended for use on iPhones and iPads. Applications will be tailored for banking, healthcare, insurance, retail, telecommunications and transportation. Apple CEO Tim Cook described the venture as “a landmark partnership.” Continue reading Apple and IBM Tackle Mobile Enterprise with Exclusive Venture

Netflix Releases its Security Monkey as an Open-Source Tool

Netflix recently open-sourced one of its management tools designed to work with machines through Amazon’s cloud. Security Monkey is the latest open-source tool in a line of software known as the “Simian Army,” that was developed to help run Netflix’s massive online service. For companies using Amazon’s cloud computing services, Security Monkey can monitor configuration changes across several Amazon accounts and ensure that those changes avoid common security problems. Continue reading Netflix Releases its Security Monkey as an Open-Source Tool