Passenger Drone Tests Begin This Year; Apps Put Wildlife at Risk

Posted June 8th, 2016 at 1:08 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

The EHang 184 autonomous aerial vehicle is unveiled at the EHang booth at CES International, Wednesday, Jan. 6, 2016, in Las Vegas, Nevada. (AP)

The EHang 184 autonomous aerial vehicle is unveiled at the EHang booth at CES International, Jan. 6, 2016, in Las Vegas, Nevada. (AP)

China’s Ehang Will Test World’s First Passenger Drone This Year

Ehang – the Chinese company that unveiled an electric passenger drone in January – now has clearance to begin testing it in Nevada sometime this year. The permissions were secured through a partnership with the Nevada Institute for Autonomous Systems and the Governor’s Office of Economic Development. Ehang said its autonomous drone can take off vertically and carry a passenger for 23 minutes at 63 miles per hour.

Mobile Apps Put South Africa’s Wildlife at Risk

Tourists using mobile apps to locate big game in South Africa’s national parks are running over animals as they speed to the prized attractions. A statement from South Africa’s National Parks’ managing executive for tourism development and marketing  blamed mobile apps for an “increased rate of lawlessness in the parks including speeding, congestion at sightings as well as road kills caused by guests rushing to, and congregating around, these sightings.”

Singapore to Block Internet Access on Government Computers

Citing security reasons, the government of Singapore will remove Internet access from as many as 100,000 government work stations within a year. Singapore is one of the world’s most wired countries, but the Infocomm Development Authority said the move will not affect government operations.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

India Tops World Smartphone Growth; The Most Hackable Nations

Posted June 7th, 2016 at 10:52 am (UTC-5)
2 comments

Today’s Tech Sightings:

Laborers speak on mobile phones opposite in a market area in Kolkata, India, March 9, 2016.

Laborers speak on mobile phones opposite in a market area in Kolkata, India, March 9, 2016.

Ericsson: India Will Have 810 Million Smartphone Users by 2021

India already has the world’s fastest-growing smartphone market, and that’s likely to continue. According to the latest Ericsson Mobility Report, India’s mobile subscriptions will grow to 1.37 billion by 2021. In the first quarter of 2016, India added 21 million new mobile subscribers, compared to five million in Indonesia and three million in the US.

The Internet’s Most Hackable Countries

Researchers from security firm Rapid7 have come up with a list of countries most at risk of hacks and cyberattacks. Topping the list are some of the world’s wealthiest and most developed nations. The research, which ranked Belgium as the most vulnerable, said many of these countries are putting business ahead of security. Australia and China ranked fourth and fifth respectively. The U.S. landed in 14th place.

Survey: US Millennials Still Consume News – on Their Phones

A national survey led by the  University of Missouri ‘s Reynolds Journalism Institute found that 75 percent of U.S. adults 18-44 years of age frequently use their smartphones to access news. More than 60 percent of adults under 45 years of age typically read news while browsing social media services, and millennials are twice as likely as older smartphone users to receive news from friends.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Cash-for-Grades App Pays Students to Learn, but Should It?

Posted June 2nd, 2016 at 2:05 pm (UTC-5)
1 comment

FILE - A teacher helps first grade students during a computer lesson in school in Tallinn, Estonia. (Reuters)

FILE – A teacher helps first grade students during a computer lesson in school in Tallinn, Estonia. (Reuters)

A new app currently in development aims to motivate children to study and excel. But some critics say the controversial cash-for-grades model is ineffective.

Launching first in the U.S. in December, the cash-for-grades e-learning app Incentify is based on the premise that children will be willing to study or do homework chores they don’t want to do in return for cash or other rewards.

A screenshot from the Incentify cash-for-grades e-learning app, courtesy Incentify's Patrick Leddy.

A screenshot from the Incentify cash-for-grades e-learning app, courtesy Incentify’s Patrick Leddy.

“All of our technology is based on Harvard University studies, which have determined … whether kids responded to incentives and did better in school or not,” said Incentify’s CEO and founder Patrick Leddy. “And sure enough, conclusively, they do respond better to incentives.”

Leddy argues that before engaging with teachers and educational content at school, children need to be motivated to study instead of day dreaming or playing games.

“The classrooms are not at the speed of the children,” he told Techtonics. “The children are the Google generation. So how is it that we expect the kids to run at light speed outside of the school, but when they get in the school, they’ve got to slow down to horse and buggy?”

The Google generation – young people with “instant gratification” at their fingertips – can benefit more from e-learning than a traditional classroom, said Leddy. “We know for a fact that e-learning all by itself teaches a kid faster than teacher, pencil, paper and book.”

Dangling “a carrot” in front of kids to entice them to study is a model Leddy intends to take to other parts of the world to empower girls, in particular, who often are married off at an early age.

Whatever the reason for early marriages, Leddy argued children who earn money while learning are unlikely to be sold off for a dowry.

“Once they’re educated, now they could be productive members of society,” he said. “They could be hired or they could start a company … or they could leave because now they have skills to go elsewhere.”

And if the girls get married off anyway, the cash transfers stop.

“We can verify the education,” he said. “That’s the whole key of how our app works. We track all of the kids’ learning performance and metrics. And then we reward them based upon their learning.”

The kids must achieve first. “Nothing transacts until the student has first learned,” he said. “Then the money transacts.”

To do this, Incentify has lined up 72 corporate partners and non-profit groups to reach out to these students and offer them rewards and micro-scholarships through the app.

A screenshot taken with permission from the Intensifyed website shows progress studens have made while using the app to study in return for rewards and incentives.

A screenshot taken with permission from Incentifyed.com website shows progress students have made while using the app to study in return for rewards and incentives.

But Leddy conceded the approach is controversial, with 15-20 percent of people saying kids shouldn’t be paid to perform at school and should do it on their own.

“And you may want to force your child to do that,” he said. “Meanwhile, all of these other kids over here are excelling because they are getting incentivized.”

“This is not the way to solve world poverty,” said Samuel Abrams of Columbia University’s Teachers College, who takes issue with the entire cash-for-grades concept. “You have such huge income disparity in these countries and generations of corruption and abuse. I mean you have a caste system in a lot of these countries.”

Apps can do a lot of things, he said, but he cautioned that there is no “nice, clean silver bullet” to tackle poverty, social justice and the like.

He said the approach is naive and reflects a privileged critique of “poor cultural norms” – bad work habits among low-income communities.

“I don’t buy that at all,” he said in an interview. “I think there are certainly some aspects of underperformance that derive from bad work habits, but that’s probably, most likely the product of horrible discrimination and underprivilege and deprivation.”

Citing the same Harvard study, Abrams said the cash-for-grades model might work in the short-term to get homework done, but in the long-run, passion can only develop through a personal connection between the student, the teacher and the subject matter.

“It comes down to … whether or not it is psychologically good to motivate the kid with cash or gift incentives,” countered Leddy. “Well … they are learning how the world works. They’re performing something for money. …. The bottom line is it works. And it’s proven that it works.”

Leddy hopes Incentify will generate a domino effect on a global scale as children and sponsors who download the app are encouraged to give back a portion of their earnings to help other kids.

“The value of what we’re doing is going to impact generations to come,” he said. “So that’s why we believe it is of the utmost importance getting our technology out there into the world and then letting the kids benefit from it.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Musk: We’re Probably Living in a Video Game; the Future With AI

Posted June 2nd, 2016 at 12:09 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

A video game enthusiast experiences the VR virtual reality headset with a skydiving game during the Computex Taipei exhibition at the world trade center in Taipei, Taiwan, May 31, 2016. (AP)

A video game enthusiast experiences a VR virtual reality headset with a skydiving game in Taipei, Taiwan, May 31, 2016. (AP)

Elon Musk: We’re Probably Living in a Video Game

Speaking at California’s Code Conference, the founder of Tesla and SpaceX Elon Musk warned that the lines between the real world and increasingly-sophisticated simulated environments could become so blurred that it will be hard to distinguish reality from simulation. The scenario is not as far-fetched as it seems, given rapid advances in virtual and augmented reality technologies. Also, Musk, Amazon CEO Jeff Bezos and former Microsoft CEO Bill Gates all had something to say about artificial intelligence (AI) and its implications for the future.

Writer Brian Fung takes on some of the commonly circulated artificial intelligence doom-and-gloom scenarios and attempts to address a few of them. He also acknowledges that the technology raises some unsettling questions, particularly in rapidly-progressing fields that will invariably shape the future.

All About Your ‘Fullz’ and How Hackers Turn Your Personal Data Into Dollars

If your personal information was hacked along with nearly 165 million records compromised in 338 security breaches that the Identity Theft Resource Center recorded in 2015, then you have more reason to worry than you know. According to writer Robert Lemos, criminals are focused on piecing together scraps of stolen personal data into a full profile or ‘fullz’ of the victim that will make identity theft that much easier.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Android’s Location Data Jackpot; Google Search Adds Privacy Controls

Posted June 1st, 2016 at 11:20 am (UTC-5)
Leave a comment

Today’s Tech Sightings:

A 3-D printed Android logo is seen in front of a displayed cyber code in this illustration taken March 22, 2016. (Reuters)

A 3-D-printed Android logo is seen in front of a displayed cyber code in this illustration taken March 22, 2016. (Reuters)

Police Filing Warrants for Android’s Vast Store of Location Data

If you use Google Maps on your Android device, you should know the software has a feature that builds a comprehensive history of the places you visit. Google’s Location History system collects the information, which is then used in Maps. The resulting user profile is supposedly private, but Google can still use it for targeted ads, and police can access it once they have probable cause to search and get a warrant.

Digital Assistants Will Drive Voice-based Computing Into New Age

A new generation of digital assistants and bots powered by artificial intelligence and deep learning are taking voice-based computing to the next level. Writer Bob O’Donnell argues the way we think about technology and interact with it will change as people become accustomed to speaking to their devices. He predicts the results will be revolutionary.

Googling Yourself Now Leads to Personal Privacy Controls

Starting Wednesday, a shortcut to personal account information will appear at the top of Google’s search results when logged-in users run a search to see how much of their personal data made it online. The new feature is intended to make it easier for users to manage their privacy and security.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Stolen Tumblr Data Up for Sale; US, Vietnam World’s Biggest Spammers

Posted May 31st, 2016 at 12:00 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - The Tumblr logo is displayed at Nasdaq, in New York. (AP)

FILE – The Tumblr logo is displayed at Nasdaq, in New York. (AP)

65 Million Tumblr Account Records Up for sale on Underground Market

A few week after Tumblr notified users it suffered a data breach, 65 million records showed up for sale on the dark web. The information is on offer on a dark market site called TheRealDeal, owned by the same person who sold 167 million records stolen from Linkedin, as well as data stolen from MySpace and Fling.com. Tumblr said the attack occurred on May 12.

Kaspersky: Vietnam World’s Second Biggest Source of Spam

Kaspersky Lab’s Spam and Phishing Report has placed Vietnam as the world’s second-largest source of spam for the first quarter of 2016, thereby replacing Russia. The United States remained in the top position.

Report: One in Five Smartphone Users Block Ads 

A new report from PageFair found that one in five global smartphone – about 419 million people – use ad blockers on their devices. According to the report, most users with browsers that block ads are in China – up to 159 million people, followed by India with 122 million ad blockers. The prevalence of ad blockers is costing online publishers a lot of money in ad revenues. The newspaper industry is fighting back.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Selfies for Security? Just Don’t Blink on Facebook

Posted May 27th, 2016 at 10:30 am (UTC-5)
Leave a comment

(VOA/Mark Sandeen)

Selfies – those digital expressions of self-infatuation and keepers of memories – are slowly emerging as a potential replacement for passwords. But cybersecurity experts caution that they can only be an effective deterrent as part of a multi-layered security defense.

Some companies are already experimenting with selfies to authenticate credit card users for financial transactions, log-ins, and other online access. But these are not your average selfies.

“There are some smarts in this brilliant technology” to verify the legitimacy of the pictures, said cybersecurity expert Scott Schober, CEO of Berkley Varitronics Systems and author of Hacked Again.

“They ask you to blink, or ask you to maybe smile or to do something else to make it a live image,” he said. “And they do have some depth as well from the actual picture so they could differentiate it’s not a flat photo.”

Both Schober and Kaspersky Lab’s principal security researcher, Kurt Baumgartner, are impressed by the technology.

Baumgartner welcomes the use of biometrics, facial recognition and image-based data points to replace often-violated passwords, but cautioned in an email that companies using biometric schemes should ensure that their systems are properly implemented, configured, and maintained.

There are also other challenges that need to be factored in, said Schober, such as quality degradation when a selfie is taken at night or in adverse weather conditions, for example.

A man takes a selfie with a snowman during a snow storm in Times Square in the Manhattan borough of New York, Jan. 23, 2016. (Reuters)

Hopefully, this is not the kind of selfie that will be used for security authentication. A man takes a selfie with a snowman during a snow storm in Times Square in the Manhattan borough of New York, Jan. 23, 2016. (Reuters)

When a picture is taken, companies using the technology transmit the selfie data from the user’s device and save the digital file on their network. That means the selfie “could be replicated or possibly used by a bad guy,” said Schober.

“It’s your selfie,” he said. “They’re keeping it in digital format, broken down on their servers, on their network. I would be concerned. I wouldn’t put my information out there using a selfie myself.”

Keeping track of dozens of complicated passwords can be a real pain. But a stolen password can be changed. A stolen selfie or biometric data in general cannot be altered.

If your facial recognition or selfie – if that’s compromised, if your fingerprint is compromised, you can’t really change it. It’s stolen forever.

Protect Yourself

  • Protect accounts with multi-factor authentication: a text message to a smartphone or a swipe of a finger in addition to a password
  • Don’t have multi-factor authentication? Change, improve passwords
  • Update all software and apps. Clean and keep all devices clean
  • Monitor activity on financial and credit cards accounts. Implement a fraud alert if need be
  • Watch out for fake emails. Delete suspicious emails or posts
Michael Kaiser, Executive Director, the National Cyber Security Alliance

“The implications are a lot worse than using a traditional password, be it long and strong of course,” said Schober. “… Security is often achieved when you have layers of security. And having biometrics as an added layer I think is very valuable. But to replace the password, the jury is still out, in my opinion.”

Not easy to fake a selfie

So how do you fool a selfie? Schober decided to take the scenario to the extreme.

“Could somebody … make a Hollywood mask that looks exactly the same as a person with the ability to make the eyes blink?” he asked. “Sure they could – or make a smile or … one picture beforehand and then another picture of the eyes blinking and somehow manipulate it. Could they? Yeah, probably.”

Hackers are lazy, said Schober, and typically prefer the path of least resistance to avoid being caught. Hacking a selfie backed up by additional layers of security means they have to work a lot harder to get the information they’re after.

“It’s going to take somebody a number of hours to create a true image that would be able to fool something like that with the software and the algorithms because they’re pretty advanced,” said Schober. “So you’d need to look very carefully at somebody’s selfie if you could get a picture of them … then you can probably replicate it quickly.”

Stronger authentication methods, such as adding a second step – a text message or a swipe of the finger in conjunction with a password – make it harder for bad guys to gain access to online accounts, said Michael Kaiser, Executive Director of the National Cyber Security Alliance, in an email.

“Multi-factor authentication can provide an additional layer of protection and make it significantly harder for email, financial services, and social networks accounts to be accessed by others,” he said.

“Two-factor authentication is very, very effective,” added Schober. “This would be a great a second step. Maybe it’s your actual password, maybe it’s your biometric fingerprint, maybe it’s your iris. … Combinations of things work really well. And we’d still have a level of convenience.”

“Just don’t upload ‘blink’ selfies to Facebook from now on,” added Baumgartner.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Floppy Disks Control US Nukes; Microsoft Retracts Malware-like Ploys

Posted May 26th, 2016 at 12:15 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - An obsolete 8 and 1-half inch floppy disc is held in London, England. (AP)

FILE – A man looks through a now nearly-obsolete 8 and 1-half inch floppy disc is held in London, England. (AP)

Floppy Disks Control US Nukes and Missiles?

An IBM Series/1 computer introduced in 1976 controls some of the United States’ ballistic missiles and nuclear bombers, according to a new report from the U.S. Government Accountability Office (GAO). The 40-year-old machine, which sends and receives emergency action alerts, still stores data on nearly-obsolete floppy disks. However, an upgrade is underway and will be completed in 2017, according to the Pentagon.

FBI Refuses to Release Tor Exploit Details, Evidence Thrown Out

A U.S. court has thrown out evidence against a Tor user after the Federal Bureau of Investigation (FBI) refused to divulge full details of its exploit to hack into the Tor anonymity network. FBI investigators last year rerouted traffic from a pornography website on the dark web to its own servers in pursuit of child pornography suspects. Visitors used the Tor network to remain anonymous. Now, the Tor Project is beefing up encryption to avoid similar situations in the future.

Microsoft Will Adjust Malware-like Tactics for Windows 10 Following Outcry

In case you didn’t know, Microsoft has in recent months adopted some malware-like tactics to trick users of older versions of its Windows operating system into switching to Windows 10. The outcry that followed has been finally heard loud and clear in Redmond, the company’s Washington state headquarters. Microsoft said it will now modify its policies so that customers have an opportunity to reschedule or cancel the upgrade.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Microsoft’s Mobile Dreams Unravel; Foxconn Robots Replace Humans

Posted May 25th, 2016 at 12:05 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FILE - A man is silhouetted against a video screen poses with a Nokia Lumia 820 smartphone in this photo illustration taken in Zenica, Bosnia.

FILE – A man is silhouetted against a video screen poses with a Nokia Lumia 820 smartphone in this photo illustration taken in Zenica, Bosnia. Microsoft recently sold its Nokia acquisition to iPhone manufacturer, Foxconn.

Microsoft Retreats in Smartphone Battle, 1,850 Jobs Could Go

Microsoft’s foray into the mobile smartphone market appears to be at an end. The tech giant’s smartphone business has been in its death throes in recent months. And now, Microsoft just announced it will cut about 1,850 jobs, mostly in Finland, and write down $950 million from the business. The move would put an end to the development of new phones.

iPhone Manufacturer Foxconn Replaces Over Half of Workers in One Factory With Robots

Up to 60,000 Foxconn factory workers have been replaced by robots, according to the South China Morning Post. Quoting a government official, the newspaper said Foxconn’s Kunshan factory reduced its human workforce from 110,000 to 50,000 to cut costs. A related survey of 100 manufacturers revealed that up to 600 major industrial companies in China’s Jiangsu province will replace human labor with robots in the next five years.

Dear Mr. Zuckerberg: Thanks for ‘Free Basics’ in Africa, But We’re Not Totally Convinced

Facebook CEO Mark Zuckerberg’s ‘Free Basics program, which just launched in Nigeria, is still facing challenges. The service, part of Zuckerberg’s Internet.org initiative, is devised to provide internet access to billions of people in developing countries. But it has been criticized for providing a limited version of the Internet, highly controlled by Facebook.

More:

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Twitter Eases 140-Character Limit; Google Toys With Killing Passwords

Posted May 24th, 2016 at 11:49 am (UTC-5)
Leave a comment

Today’s Tech Sightings:

A man reads tweets on his phone in front of a displayed Twitter logo in Bordeaux, southwestern France, March 10, 2016. (Reuters)

A man reads tweets on his phone in front of a displayed Twitter logo in Bordeaux, southwestern France, March 10, 2016. (Reuters)

Twitter Makes Important Changes to Its 140-character Limit, Ditching ‘@mention’

Twitter is moving forward with changes to its 140-character limit that take links and @replies out of the word count. Pictures and other attachments will no longer count toward the 140-character count. A retweet button will also be added to personal tweets. VOA has more here.

Google Wants to Kill Off Passwords for Logging Into Android Smartphones

Google is launching a new experiment, also known as Project Abacus, to work out a better system for Android users to log onto their smartphones without a password. The trial, which will begin in partnership with banks, will replace passwords and PINS that unlock smartphones with biometric data.

Ransomware Hackers Get Their Money, Then Ask for More

Surprise! Once hackers who lock down a system receive ransom, they sometimes come back for more money. In the most recent incident, ransomware hackers who targeted Wichita’s Kansas Heart Hospital demanded more money after receiving payment instead of decrypting the hospital’s computer files. The hospital broke off negotiations and put a backup plan in place instead. Sounds like that should have been the original plan.

More:

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.