By
Rob ScottAugust 20, 2014
In what could potentially become a controversial move, Google has plans to offer accounts to children under the age of 13 for the first time. Google services such as Gmail and YouTube do not currently offer accounts to kids (although kids can log on anonymously or pose as adults). Now Google is planning a new approach that encourages parents to open accounts for their children, and in the process control how they use Google services and the information that is collected about their kids. Continue reading Google Planning to Offer Accounts to a Younger Demographic
By
Meghan CoyleAugust 18, 2014
Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users
By
Rob ScottAugust 18, 2014
According to videos recently posted to YouTube, Best Buy will offer a smart home hub through a $9.99-per-month service called Peq, which is provided by the newly launched SmartHome Ventures. Ted Schremp, CEO of SmartHome Ventures, suggests that Peq makes setting up and operating home automation and security very simple. Best Buy will become the fourth major retailer to join the home automation space following Lowe’s Iris, Staples Connect and Home Depot’s deal with Wink-Quirky. Continue reading Best Buy Plans to Offer Smart Home Hub via New Peq Service
By
Meghan CoyleAugust 13, 2014
The National Security Agency is funding a project at Carnegie Mellon University to develop the world’s first “polyglot” programming language that combines CSS, JavaScript, PHP, HTML5, and more. Wyvern, the new language, intends to make Web programming easier. Files will be more organized, making it easier for Web developers to secure their websites, which seems to be the NSA’s primary goal. Wyvern is an open source project still in development. Continue reading NSA Funds Development of All-In-One Programming Language
By
Meghan CoyleAugust 11, 2014
Last week, Yahoo joined Google and Microsoft in the effort to bring more privacy to users of their popular email services. The 110 million unique Yahoo email users will have the option to turn on an encrypted messaging feature. The feature relies on PGP encryption, which stores each user’s encryption key on their personal laptops and devices. Google also announced that encrypted websites will fare better in their search results due to a new feature in its ranking algorithm. Continue reading Tech Giants Tighten Security on Emails with Encryption Option
By
Meghan CoyleAugust 7, 2014
Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack
By
Meghan CoyleAugust 6, 2014
As the price of small drones decreases, the popularity of these tiny unmanned aircraft increases for aerial wedding photographers and gadget enthusiasts alike. In New York City in particular, the proliferation of these devices has state officials and law enforcement officers worried. There is no required training for the amateur pilots operating these drones. In terms of regulations, the Federal Aviation Agency currently permits drones to be flown under 400 feet. Continue reading FAA Regulations Needed as Aerial Drones Grow in Popularity?
By
Marlena HallerAugust 5, 2014
At this week’s Black Hat security conference, researchers plan to unveil different techniques for easily taking over a smartphone without alerting the user or phone company. Security consultant Mathew Solnik will outline the ways in which he can use the Internet to hack anyone’s phone from 30 feet away. Georgia Institute of Technology students will present the ways in which they can take over the latest iPhone. And a researcher from Bluebox will show how Android apps can steal user data. Continue reading Black Hat: Smartphones Next Target of Cybersecurity Threats
By
Marlena HallerAugust 4, 2014
San Francisco’s BitTorrent is leveraging its expertise in online file sharing tech to develop Bleep, an encrypted snoop-proof chat app. None of the texts or calls are stored, and only the two computers are involved in the communication. While the NSA could potentially monitor the interactions, the job becomes much more difficult with the new app. Not only does Bleep encrypt its traffic and encourage users to keep their identities secret, but it also uses no central server. Continue reading Bleep: BitTorrent Develops Secure Calling and Messaging App
By
Meghan CoyleJuly 25, 2014
A team of open source developers, including several former Google engineers, is working on software that will allow companies to ensure that their cloud computing systems will run even if a server or data center goes down. The software known as CockroachDB is based on Google’s Spanner system, which uses thousands of servers to run its online empire. CockroachDB will similarly replicate information across data centers, so online operations will not suffer from outages. Continue reading CockroachDB Cloud-Based Software Makes Websites Resilient
By
Rob ScottJuly 17, 2014
Apple and IBM announced a joint venture that the tech giants have been working on for several months. The exclusive partnership will focus on mobile and data analysis tech in the corporate world by developing more than 100 business software programs intended for use on iPhones and iPads. Applications will be tailored for banking, healthcare, insurance, retail, telecommunications and transportation. Apple CEO Tim Cook described the venture as “a landmark partnership.” Continue reading Apple and IBM Tackle Mobile Enterprise with Exclusive Venture
By
Meghan CoyleJuly 7, 2014
Netflix recently open-sourced one of its management tools designed to work with machines through Amazon’s cloud. Security Monkey is the latest open-source tool in a line of software known as the “Simian Army,” that was developed to help run Netflix’s massive online service. For companies using Amazon’s cloud computing services, Security Monkey can monitor configuration changes across several Amazon accounts and ensure that those changes avoid common security problems. Continue reading Netflix Releases its Security Monkey as an Open-Source Tool
According to a four-month investigation by The Washington Post, ordinary Internet users significantly outnumber the legally targeted foreigners in electronic communications intercepted by the NSA. Based on the collection of intercepted conversations from U.S. digital networks that Edward Snowden provided, 90 percent of account holders were not the intended surveillance targets. And nearly half of the files included names, email addresses or other details belonging to U.S. citizens. Continue reading Report: NSA Keeps Information Not Targeted in Surveillance
Analyst firm Berg Insights forecasts that the number of smart homes in the U.S. and Europe will reach 36 million by 2017, with sales of $9.4 billion per year. The second edition “Smart Homes and Home Automation” report indicates the U.S. had 3.5 million smart homes at the end of 2012. Berg defines smart homes as those with connected products that work in conjunction with apps or a Web portal. However, most of today’s smart homes simply include products such as a Nest thermostat. Continue reading 36 Million Smart Homes Coming to U.S. and Europe by 2017
By
Marlena HallerJune 24, 2014
As part of its push to become the dominant OS for connected devices in and around the home, Google’s Nest Labs will purchase Dropcam for $555 million. Dropcam’s Web-connected video-monitoring service streams live to mobile apps and sends alerts based on activity in the home. Google acquired Nest, founded by Apple designers Matt Rogers and Tony Fadell, earlier this year for $3.2 billion. The acquisition of Dropcam is expected to generate privacy concerns. Continue reading Connected Home: Google’s Nest Agrees to Acquire Dropcam