INSTA-LEADS: Our Full-Service B2B Marketing Program Delivers Sales-Ready Leads Click to Learn More!
Welcome Guest | Sign In
ECommerceTimes.com
FCC Comes Through on Net Neutrality
February 27, 2015
The FCC has adopted new open Internet rules by a 3-2 vote along party lines. The rules, which affect both wired and wireless access, prohibit broadband providers from unreasonably interfering with efforts of consumers and edge providers to reach each other. The Internet is "simply too important to be left without rules and without a referee on the field," said FCC Chairman Tom Wheeler.
Government Spies Came Up Dry, Says Gemalto
February 26, 2015
SIM card maker Gemalto, whose networks reportedly were breached by hackers from the United States National Security Agency and the UK's GCHQ, on Wednesday said the spies got nothing. The hackers stole cryptokeys for millions of SIM cards, according to The Intercept, which cited documents released by NSA whistle-blower Edward Snowden. Gemalto denied any SIM cryptokeys had been stolen.
Court Sticks It to Apple in $533M Patent Case
February 25, 2015
Apple must pay patent licensing firm Smartflash US$532.9 million for infringing three patents. U.S. District Judge Rodney Gilstrap, who presided over the case in Tyler, Texas, ordered Apple to pay the penalty after a federal jury in Texas found that the company's iTunes software infringed on the patent holder. That jury took eight hours to decide Apple willfully used Smartflash's patents without consent.
Net Neutrality: All Over but the Shouting?
February 25, 2015
After well over a year of bitter, often highly partisan debates, and despite dissension within its ranks and opposition from industry groups, the United States Federal Communications Commission is expected on Thursday to vote in favor of rules enforcing Net neutrality. The commission wants to regulate ISPs like common carriers under Title II of the Communications Act of 1934.
Yahoo CISO, NSA Chief Slug It Out Over Security Backdoors
February 25, 2015
Yahoo CISO Alex Stamos on Monday confronted NSA Director Adm. Mike Rogers over the United States government's plan to require built-in backdoors in hardware and software made by American companies. The exchange took place at the New America Foundation's cybersecurity conference. Building backdoors into cryptography is "like drilling a hole in the windshield," Stamos said.
Open Source vs. Proprietary Firms on the IoT Battleground
February 25, 2015
A battle is brewing over control of the Internet of Things marketplace. Consumers see only convenience and extensions to their always-on mobile devices. Product makers see a pathway to streaming data that can be monetized from buyers' connections. Will history repeat itself, as open source begins to take on the current, yet unsustainable, walled-garden core of the IoT?
FTC, Private Sector Lock Horns Over Consumer Data Protection
February 25, 2015
The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the FTC to continue penalizing commercial firms for failure to protect consumer data from hackers. That decision has been challenged, and in early March the FTC and its opponent will square off in court.
Google Puts Blogger Porn Under Wraps
February 25, 2015
Google will place a privacy curtain around sexually explicit images and video on its Blogger platform if users fail to remove the content of their own volition by March 23. The measure falls short of outright censoring the content or terminating users. However, it does restrict access to the owner or admins of the blog and the people with whom the owner has shared it.
Citizenfour's Oscar Highlights National Divide Over Snowden
February 24, 2015
Citizenfour, a film documenting interviews director Laura Poitras conducted with whistle-blower Edward Snowden, won the Oscar for best documentary Sunday. The talks took place as Snowden blew the lid off the United States National Security Agency's surveillance activities. The award highlights the divisions in the U.S. over Snowden's actions and the question of national security.
Government Spies Steal SIM Card Cryptokeys
February 23, 2015
The United States' National Security Agency and British spy agency GCHQ have hacked into the internal computer network of Gemalto, the world's largest maker of SIM cards, and stolen the cards' encryption keys, according to information in files leaked by whistle-blower Edward Snowden. Gemalto makes about 2 billion SIM cards a year, and sells them to 450 major wireless network carriers worldwide.
AT&T Puts a Price on Privacy
February 23, 2015
Users who want to sign on to GigaPower by AT&T, the carrier's 1-gigabit-per-second Internet service that just become available in Kansas City, Missouri, have an interesting choice. They can pay $70 with the understanding that their online movements will be tracked for commercial purposes -- or they can pay an additional $29 a month to avoid the monitoring.
Google Rails Against Proposal to Give Feds Remote Hacking Authority
February 20, 2015
Google is fighting a proposed amendment to Rule 41 of the U.S. Criminal Code that might allow authorities to hack into computers abroad. The amendment seeks to empower a magistrate in a district where activities related to a crime may have occurred to issue a warrant for remote search of computers, as well as seizure or copying of their files, under certain circumstances.
A123 Lawsuit Asserts Apple in Cahoots With Its Ex-Engineer
February 20, 2015
Electric-car battery maker A123 Systems earlier this week filed a lawsuit against Apple in a Massachusetts Superior Court in Middlesex County. A123 also sought a temporary restraining order and preliminary injunction to stop its former employee, Mujeeb Ijaz, from violating his non-disclosure and non-compete agreement. Ijaz had moved to Apple to apply his skills as an auto-battery engineer.
Yandex Asks Russian Authorities to Drop the Hammer on Google
February 18, 2015
Yandex has asked Russia's antitrust authorities to look into whether Google is breaking the country's laws by not allowing preinstallation of third-party services on Android devices. Three smartphone vendors told Yandex last year that they couldn't install its search engine as the default, the company claimed. Yandex is seeking to have the Android OS unbundled from Google Search.
Are Call Centers Ready for the Internet of Things?
February 17, 2015
The IoT represents a wealth of untapped riches -- and there's no shortage of data highlighting the potential this technology has for the economy. The demand is there, as is the supply. However, there's one piece that may or may not be missing, depending on whom you ask: the back end capacity to handle the information these devices will generate.
It's Time to Investigate Cyber Insurance
February 17, 2015
Almost every day there are reports of cyberintrusions, attacks and related security breaches. If your company does not have the right insurance, it could be even more of a disaster. What company can afford not to have insurance for a potential cyberdisaster? Let's look at some protective measures that can be taken to safeguard your business.
How Eroding Trust Hurts Companies
February 12, 2015
I love all the innovation and trends in the wireless, telecom, television, Internet and tech space. However there is also a big warning light flashing ahead that no one is paying attention to...trust is eroding. Trust is a delicate thing and is being ignored. Innovation is great, but if we don't protect the privacy and personal information of users, they will lose trust and that will bite us in the end.
Obama's Cyberthreat Intel Aggregator Plan Divides Security Experts
February 12, 2015
The Obama Administration on Tuesday announced plans to set up a national Cyber Threat Intelligence Integration Center to integrate all data from government agencies and the private sector, and disseminate it appropriately. The intelligence integration center will initially have a staff of 50 and a budget of US$35 million. Reactions from cybersecurity experts were mixed.
Samsung Smart TV Owners Fume Over Sneaky Pop-Up Ads
February 11, 2015
Samsung Smart TV owners, already shaken by news earlier this week that their TVs can transmit voice commands and other private data to third parties, have been hit by another revelation -- that the devices sneak ads into movies they're watching, without the owner's knowledge or consent. A user on the Plex forum complained that a Pepsi ad popped up every 10 to 15 minutes while he was watching his Samsung TV.
Bug Bounties Entice Researchers to Don White Hats
February 10, 2015
Bug bounty programs are used by individual software makers to improve the quality of their products, but they can have incidental benefits for all software makers, too. One of those is to encourage bug hunters to wear a white hat instead of a black one. When you make it easy for hackers to do the right thing, the majority will," noted Alex Rice, CTO of HackerOne.
Report: Connected Vehicles Vulnerable to Hack Attacks
February 09, 2015
Motorists in the United States are increasingly at risk of cyberattacks and violations of privacy, as more and more technology is added to their cars. A report released on Sunday by the office of Sen. Ed Markey (D-Mass.) listed a number of key findings that are based on responses from 16 auto makers to a letter sent to them by Markey's office.
Concerns Emerge About Samsung Smart TVs 'Bugging' Owners
February 09, 2015
The feature in question may transmit some voice commands, along with information about the device, to a third-party service that converts speech to text, Samsung's global privacy policy warns. If voice recognition is going to be on all the time, "that seems like really poor design, and certainly represents a privacy risk," said Justin Brookman, director of the consumer privacy project at the Center for Democracy & Technology.
3D-Printed 'Urban Concept' Car Assembled by Singapore Students
February 06, 2015
Students at Singapore's Nanyang Technological University have built the island republic's first 3D-printed concept car. The NTU Venture 8 (NV8) is built on a carbon fiber single-shell chassis. Its 150 3D parts were made out of lightweight plastic that were created on printers at the university, 3D printer manufacturer Stratasys, and the Singapore-MIT Alliance for Research and Technology.
FCC Chair Submits New Approach for Net Neutrality
February 06, 2015
Some proposed rules that the Federal Communication Commission maintains will prevent content discrimination on the Internet drew fire on Thursday from two policy interest groups. A four-page "fact sheet" on the rules was released Wednesday by FCC Chairman Tom Wheeler. In it, the chairman outlined what he's proposing to the full commission, which is expected to vote on the rules February 26.

See More Articles in Hot Topics Section >>
Facebook Twitter LinkedIn Google+ RSS