Lighting Rural Africa; AI; IoT; Windows 10; App Store Vulnerability

Posted July 28th, 2015 at 3:02 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

A Laptop-Sized Solar Panel Is Lighting Rural Africa

M-Kopa, a Nairobi-based provider of solar-lighting systems, is making affordable solar panels to power homes that have no access to Kenya’s electrical grid. The panel is the size of a laptop, with a battery that generates about 8 watts of energy.

​Hawking, Musk, Wozniak Call for Ban on Offensive AI Weapons

Artificial Intelligence (AI) is slowly crawling into our collective consciousness; and luminaries like Tesla Motor’s Elon Musk, Apple co-founder Steve Wozniak and astrophysicist Steven Hawking are already sounding alarm bells. Hundreds of robotics and AI researchers signed an open letter from the Future Life Institute in which they warned about the inevitability of a global arms race and called for a “ban on offensive autonomous weapons”

IoT Devices Will Triple to Over 38 Billion Units By 2020

New research from Juniper Research expects that there will be up to 38.5 billion Internet of Things (IoT) always-connected devices in 2020. That’s an increase from 13.4 billion in 2015 – or a 285 percent spike. The study also found that the number of connected devices already exceeds that of humans on the planet by at least two times.

Microsoft Downloading Windows 10 to Some PCs Ahead of Launch

Microsoft has begun rolling out Windows 10 on machines that previously received an invite. You’ll know the download has started when a new folder called “$windows.~BT” appears on your PC’s system partition. And if a download wreaks havoc with your system, Microsoft is providing a tool to deal with that here.

Critical Vulnerability in Apple App Store, iTunes Revealed

Vulnerability Lab’s security researcher Benjamin Kunz Mejri this week uncovered a critical flaw in Apple’s App Store and the iTunes invoice system that allows remote hackers hijack a session and inject malicious script codes into the vulnerable modules.

Microsoft Sinks in Antivirus Tests

You might want to reconsider if you’ve been running Microsoft’s antivirus utility on your Windows PC. Germany-based testing lab AV-Test just ranked Windows Defender as the worst performer out of the 22 common anti-malware apps tested. McAfee, Norton and Trend Micro products also underperformed.

China Busts ‘Fake’ Apple Factory That Made 41,000 iPhones

Chinese authorities have shut down a Beijing factory that manufactured about 41,000 counterfeit Apple iPhones. The factory belonged to a company that was set up earlier in the year and had workers repackaging second hand parts billed as new, genuine iPhones. The fake iPhones were worth up to $19 million.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Can Digital Knowledge Be Preserved?

Posted July 24th, 2015 at 3:01 pm (UTC-5)
1 comment

Accessories for an original 128K Macintosh computer, including an operating system disk (top R) and a guided tour on a cassette tape (top L) are displayed at the Vintage Mac Museum in Malden, Massachusetts January 18, 2014. (Reuters)

Accessories for an original 128K Macintosh computer, including an operating system disk (top R) and a guided tour on a cassette tape (top L) are displayed at the Vintage Mac Museum in Malden, Massachusetts, Jan.18, 2014. (Reuters)

Two hundred years into the future, descendants of a humanity struck by an unknown catastrophe scavenge for scraps of knowledge that could hold the key to restoring their ancestors’ lost digital past.

This is the story of Jonesbridge: Echoes of Hinterland – the first in a fictional trilogy that offers a “portrait of a society or a world that had to start with much fewer people and much less knowledge – sort of like picking a chunk of their history,” Author M.E. Parker told TECHtonics.

The cover of Jonestown: Echoes of Hinterland. (M.E. Parker)

The cover of Jonesbridge: Echoes of Hinterland. (Diversion Books)

Survivors find much information to help them burn coal for electricity, for example. But the amount of lost digital knowledge, particularly the more sophisticated or closely-guarded proprietary technology, sets them back to a dark age.

Whatever information they find on crumbling, obsolete hardware or software leftovers is inaccessible or possibly alien to them, making it more of a challenge to reassemble the digital puzzles of the past.

“A language, for example, like the Rosetta Stone – we were able to kind of piece together you know, Greek, Egyptian and in-between, based on the Rosetta Stone and some of the linguistic abilities that we had,” said Parker, “But without the software and technology aspect of it, we wouldn’t be able to do that with technology.”

But he acknowledged that it is unlikely that humanity might one day come to face such an event.

“The incredible amount of redundancy that we do have in our online infrastructure currently makes it unlikely that there would be a civilization-altering loss of data, unless … of course for a catastrophic, you know – nuclear war, solar event even that kills a large part of the population with it,” he said. So in that case, it’s sort of a perfect storm.”

It is a speculative scenario. But in the “unlikely” event that a global catastrophe disrupts humanity’s ability to produce and maintain technology and technological infrastructure for more than 150 years, “much or most information that is now available only in digital form will likely be lost,” said Micah Altman, Director of Research and Head/Scientist, Program on Information Science for the MIT Libraries, at the Massachusetts Institute of Technology.

There are several reasons that would account for this loss. One of them is the life span of digital storage media.

“Most media used for digital storage [such as hard drives, solid state devices] are intended for storage for approximately a five-year period,” he said in an email interview. “The information on this media would be unrecoverable after 100 years, even in ideal conditions.”

While some specialized archival digital media are theoretically designed for 100-year storage under controlled conditions, he said “150 years exceeds the expected lifetime of most of these archival digital materials; and the storage conditions induced by a catastrophe would induce rapid degradation.”

Ironically, some analog information might survive. That could include “books and journals printed on acid-free paper, information preserved on “Rosetta disks” – [nickel disks designed for 10000-year storage] – as long as the storage conditions were conducive.”

A computer disk with family tree information lies among rubble on May 26, 2011, in Joplin, Mo., after a tornado tore through much of the city. (AP)

A computer disk with family tree information lies among rubble on May 26, 2011, in Joplin, Mo., after a tornado tore through much of the city. (AP)

Even if some of the recovered archives are intact, hardware availability – or lack of – would present another challenge. So a surviving optical disk, even if intact, would require”specialized hardware” to read it.

An ordinary DVD, for example, requires lasers, VLSI or Very Large Scale Integration – the process of creating an integrated circuit by combining thousands of transistors into a single chip – and “precisely engineered motors” – a “sophisticated technology that generally requires considerable supporting infrastructure to manufacture,” Altman explained.

Then there is the issue of digital obsolescence. Digital information formats, said Altman, are “complex, not human-readable or self-documenting.”

“Without documentation of the formats, software to implement them, and computers to execute the software, the bits retrieved … would be uninterpretable,” he explained.

So if humanity’s technology infrastructure disappears for a 100 years, he said “a whole lot of scientific knowledge, culture, and historical/government record disappears.”

But digital information is easy to replicate, he noted, meaning that a country that escapes the catastrophe and “manages to maintain technical manufacturing infrastructure at [a] small scale” can potentially save “much of the publicly available information.”

The iced-over door to Vault 2 of the Svalbard Global Seed Vault, dubbed as Noah's Seed Ark and a Doomsday Vault. The vauls was dug into a mountainside in Norway's arctic Svalbard islands. It will hold 4.5 million different agricultural seed samples from around the world. (AP)

The iced-over door to Vault 2 of the Svalbard Global Seed Vault, dubbed as Noah’s Seed Ark and a Doomsday Vault. The vault was dug into a mountainside in Norway’s arctic Svalbard islands. It will hold 4.5 million different agricultural seed samples from around the world. (AP)

The iced-over door to Vault 2 of the Svalbard Global Seed Vault, dubbed as Noah’s Seed Ark and a Doomsday Vault. Dug into a mountainside in Norway’s arctic Svalbard islands, the vault will hold 4.5 million agricultural seed samples from around the world. (AP)

The recovery of lost digital knowledge would depend on who survives, what they know,  where they are, and on the scale of the catastrophe. But Jonesbridge is “more a story of humanity … understanding that it … has a capacity to overcome more than it has a capacity to avoid calamity,” said Parker.

He suggested that there might be a way to create a repository to protect accumulated digital knowledge similar to an underground seed vault in Norway that houses millions of species of seeds for crops, trees and plants.

“It would be possible to create some sort of [a] technology vault … that could maintain at least a road map of how to retrieve information from certain basic systems,” he said. “The problem that we face is that the encryption and decryption technology and compression technology are in many cases proprietary to whoever makes it, and they’re protective of it.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Three-D Printing; App Fraud; Asia Eyes US Gaming Market

Posted July 23rd, 2015 at 3:00 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

India Needs China’s 3-D Printing Construction Technology Now

Building a house in India takes about six months, on average. But recently, a Chinese company put together a 3-D-printed house in a matter of three hours. Writer Abhimanyu Ghoshal argues that India could use this technology to pare down the time it needs to build homes, cut back on noise and pollution, reduce reliance on migrant labor from rural areas, and address wage disparities.

Technology Can Make a Better World, If We Want It to

Writing in the New York Times, Melinda Gates, co-chair of the Bill & Melinda Gates Foundation, said the power of technology can be transformative, depending on how people decide to use it to affect their world and benefit others.

Netmarble Takes Stake in SGN, Extending Asia’s Reach Into US Mobile Games

Video games are very big and very lucrative in Asia; and Asian game makers are increasingly reaching into the U.S. market. The latest move in this trend was a $130 million investment in SGN (Social Gaming Network), one of the United States’ largest mobile game studios, from South Korean mobile game publisher, Netmarble. Industry observers say Asian game developers see this trend as an opportunity to port their content to the West.

Thousands of Apps Secretly Run Ads That Users Can’t See

A new report from Forensiq, a company that tracks fraud in online advertising, found as many as 5,000 Apple and Android apps secretly run advertisements without the knowledge of smartphone users – a practice that defrauds marketers and slows down mobile devices. The study found at least one app practiced this type of fraud on one percent of devices examined in the United States, while in Europe and Asia, 2-3 percent of the devices had fake ads.

Google Patches 43 Critical Security Flaws in Chrome

Up to 43 security problems in Google’s Chrome browser, many of them critical, have been fixed as part of the Chrome 44 update for Windows, Mac and Linux. Many of the bugs were submitted by external security researchers. Google has a bug bounty program that grants researchers financial rewards based on the severity of the issues they uncover.

Line Launches Lightweight Version of Its Messaging App for Android

Messaging service Line now has an Android version with the same features as the mainstream app, but without audio and video support. The Android app also drops the Timeline feature, but lets users save on storage space and data.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Bionic Eyes; Schooling Vietnam; Android Malware; Google Maps

Posted July 22nd, 2015 at 3:04 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

World First Bionic Eye Gives Hope to Millions

A British pensioner suffering from macular degeneration has become the world’s first person to be fitted with a bionic eye.  The ground-breaking operation gave Ray Flynn, an electronic implant that works with a camera attached to his glasses to send video feeds to healthy cells in his retina.

Schooling Vietnam: How Tech Companies Are Training the Next Wave of Workers

Vietnam strives to become a leading technology manufacturer. The challenge is to provide students with the training they need after graduation to equip them with skills other than those for assembling devices. Even when that happens, years of supervision are required. Now, a host of global tech companies have launched their own training programs to educate Vietnam’s work force, in part attracted by the country’s stability, its cheap labor market and its readiness to give tax breaks to foreign firms.

Researcher Unveils New Privilege Vulnerability in Apple’s Mac OS X

German researcher Stefan Esser from the security audit company SektionEins found a privilege escalation vulnerability that affects Mac OS X 10.10 and new features in the newest iterations of the operating system. The flaw makes features based on the dynamic linker dyld and environment variable DYLD_PRINT_TO_FILE exploitable and allows hackers to create or open arbitrary files in the system.

Bug Opens OpenSSH Servers to Brute-Force Password Attacks

A security researcher known online by the alias Kingcope has discovered a UNIX bug that affects secure remote access software OpenSSH. The bug could let hackers bypass authentication restrictions and try to figure out the passwords.

Hacking Team’s RCS Android: The Most Sophisticated Android Malware Ever Exposed

Trend Micro researchers who recently uncovered that the hacked Italian firm Hacking team delivered Android spyware using Google Play apps, have now analyzed the code of that actual malware. Known as RCS Android or Remote Control System Android, the malware is capable of doing so many things and spying on so many levels that researchers consider it the most sophisticated Android malware ever exposed.

New Google Maps Feature Shows You Everywhere You’ve Been

If you had doubts about the extent of data Google has on you, here’s something else to consider: a new Google Maps feature called “Your Timeline”, which allows you to visualize everywhere you’ve been on a given day or over a month or a year.

Forever 21′s ‘Thread Screen’ Displays Instagram Pics Using Fabric

It’s called a “Thread Screen.” The gigantic display at hardware maker Breakfast New York is a screen made up 6,400 mechanical spools of multicolored threaded fabric. Each spool has 5.5 feet of fabric. The whole thing is divided into 36 colors and moves like a conveyer belt that stops at hues corresponding to the displayed photos. The Instagram project allows users to control the display until July 28 by posting a picture on Instagram using #F21ThreadScreen as a hashtag.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Asia Mobile Growth; Toshiba Crisis; Twitter, Digital Attack Map

Posted July 21st, 2015 at 3:50 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

APAC to Reach Two Billion Unique Smartphone Users by 2019

A new Forrester report said the Asia-Pacific region will have two billion unique smartphone users by 2019, accounting for 83 percent of the total unique mobile subscriber base. The number of smartphones in the region passed one billion last year.

Toshiba CEO Quits Over Accounting Scandal

Toshiba Corp’s CEO Hisao Tanaka and other senior executives stepped down for their roles in Japan’s biggest accounting scandal in years. Chairman Masashi Muromachi will replace Tanaka for the time being. An independent probe found that Tanaka was aware his company had inflated profits by $1.2 billion over several years.

Social Robots Could Be Coming to a Home Near You

Social robots are designed for the home as personal companions and typically cost around $1,000. And while they might not live up to expectations, the Japanese have been seriously experimenting with social robots, employing them in hotels and shopping malls and are now looking to use them in other locations.

Europe to Decide If Uber Is a Tech or Taxi Company

Uber seems to get in trouble wherever it goes. Now, a Spanish judge has asked the European Court of Justice to decide if the company is a transport service or a digital service. If deemed a mere transport company, Uber could face stricter licensing, insurance and safety rules, among other headaches.

Watch Digital Attacks Live on This Map

Are cyber attacks on the rise? Google, in partnership with network security and management company Arbor Networks, put together a fascinating digital attack map that shows the number of Distributed Denial of Service (DDoS) attacks that happen at any given time.

Twitter Kills Background Images

If you thought your Twitter settings were somehow messed up, you thought wrong. Twitter on Monday began removing background images and wallpaper from users’ timelines, which is why your pages are now bright, vanilla white.

Why a CEO Worth $840 Million Lives in a Trailer Park With His Pet Alpaca

Tony Hsieh, CEO of Zappos.com is worth $840 million. But he chooses to live in a 18.5 – square meter trailer in Las Vegas with his pet alpaca. Hsieh, the son of Taiwanese immigrants, rents about 30 trailers in the park to visiting coders. Oh, and the community is called “Llamappolis.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Biometrics Have Promise, But Raise Privacy, Security Questions

Posted July 17th, 2015 at 4:02 pm (UTC-5)
1 comment

More companies are slowly adopting biometrics, a technology sometimes seen as “the” answer to a crumbling cybersecurity regime that has fallen prey to hackers. But the collection of biometric data is raising all kinds of questions about privacy and security.

MasterCard, the latest firm to dip its toes into the waters of biometrics, is developing a pilot for a face recognition identification system. While still scant on details, the company said in an email that it “wants consumers to have a safe and simple payment authentication experience with biometric technology.”

We are giving consumers a choice to authorize the transaction with who they are [face or fingerprint], not with what they may or may not remember. Paying with MasterCard Identity Check will reduce online fraud.

When you log in to your mobile device, you snap a photo of your face. The image of your face is then converted to a value of 1s and 0s based on face measurements. The image is then destroyed. The value is stored but protected [hashed and encrypted], and cannot be used to recreate your image. The new value can be compared to the enrollment value for matching.

A British Passport Office volunteer has his face scanned for a biometrics enrollment card in London, April 26, 2004. (Reuters)

A British Passport Office volunteer has his face scanned for a biometrics enrollment card in London, April 26, 2004. (Reuters)

“Biometrics are … a series of numbers of ones and zeros that represent different measurements on your face and different ways that your face might look,” said Jennifer Lynch, a senior staff attorney with the non-profit civil liberties group, Electronic Frontier Foundation.

Theoretically, a person who accesses that data can then steal the biometric information and find a way to reconstitute the faces behind it.

Reconstituting a hacked biometric “depends on the algorithm and the type of biological attributes used,” said Symantec’s principal threat researcher Candid Wueest. He said most algorithms “only save and compare a reduced subset of features that are generated by a one-way function, making it extremely difficult to generate the original face, even if you know the algorithm.”

A man has his fingerprint scanned at a Taipei household registration office in Taiwan, June 17, 2005. (Reuters)

A man has his fingerprint scanned at a Taipei household registration office in Taiwan, June 17, 2005. (Reuters)

Many biometric systems use a fingerprint, for example, to unlock a service key. That key typically corresponds to an application. Once that fingerprint becomes publicly available, “the whole system needs to be exchanged,” he said.

Vendors are making it more difficult for hackers to fool the sensors with a printed photo or a fake finger. But Wueest said it is still possible to trick them.

“Last year, for example, we saw someone successfully reconstruct a fingerprint from a high- definition photo and use it to unlock a system,” he recalled.

There also have been attacks where photos of faces were constantly modified and rechecked against the target.

“This may generate a picture that passes the test and resembles the original,” he said. “The principal is the same as a classical brute force attack against password hash functions.”

“We will be seeing more of that in the future,” predicted Lynch, although that depends on the biometric system a vendor is using.

She said some systems are “not sophisticated enough to recognize or to distinguish a face from the photograph of a face. And so you could hack into a system with a photograph of somebody else’s face.”

Some vendors might use high-level encryption to make hacking into their system more difficult. But Lynch warned that if a single company creates a proprietary biometric algorithm for multiple clients, then hacking the source could compromise a host of databases and enable a recreation of the biometric data.

“Unfortunately,” added Wueest, “weaker implementations can allow attackers to bypass the entire process — similar to weak password authentication processes. For example, some smartphone sensors allow applications to record the original image of the fingerprint before it is processed by the algorithm, permitting re-authentication in the future.”

However, he pointed out that with biometric systems, attackers often need physical access. “This limits  the scalability of an attack,” he said. “If biometrics are used to unlock an application key, then this key can be attacked just like any password, The huge advantage is that the key will be long and complex and cannot be found in a dictionary.”

Iridian Technologies Lina Page has the iris of her eye reflected in a eye scanner that allows for physical access as she demonstrates her companies technology at Comdex 2001 in Las Vegas November 14, 2001. (Reuters)

Iridian Technologies Lina Page has the iris of her eye reflected in a eye scanner that allows for physical access as she demonstrates her companies technology at Comdex 2001 in Las Vegas November 14, 2001. (Reuters)

Nevertheless, Lynch is concerned about the mass collection of biometric data, given the “massive databases of biometrics” collected in recent years by law enforcement agencies and government entities in the United States and other countries.

She said whenever that happens, “the biggest concern is how are those biometrics being stored and what protections are in place to prevent them from being stolen or from the systems being hacked?”

One of the key differences between password systems and biometrics is that identifiers like faces and fingerprints cannot be changed.

“With a credit card number or a social security number or a driver’s license number, that number can be changed,” said Lynch.“… But with a biometric, you cannot change your fingerprint. You can’t change your face. So if that data is stolen, then society is at a much greater risk for identity theft.”

TECHtonics asked MasterCard that question. In response, the company said it “has a longstanding commitment to building privacy and data protection” into everything it does.

In delivering a safe and convenient way to pay, we design and develop our products and services with respect for privacy. To us, data isn’t just bits and bytes, it’s personal.

When processing transactions, we only collect the card number, the merchant name and location, the date and the amount of the transaction. Except for select opt-in programs, we do not receive the cardholder’s name or other contact information.

Using biometrics to authenticate online payment transactions is consumer choice and an additional layer of security.

Despite the limitations of biometrics systems, Carnegie Mellon University’s Lorrie Faith Cranor, Director of CyLab Usable Privacy and Security Laboratory, believes the technology has a lot of promise, albeit with a tinge of skepticism.

“It is not clear to me that it will ‘solve’ the cybersecurity problem,” she said. “But it will be an increasingly useful tool.”

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Nokia Silent in Salo; Social Media News; Cybersecurity; iOS Scam

Posted July 16th, 2015 at 4:01 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Microsoft Shuts Down Nokia Phone Unit in Finnish Town of Salo

Salo, a town of 54,000 in southern Finland that hosted one of Nokia’s first factories in the 1970s, has been hit hard by the decline of the country’s electronics industry. Now, Microsoft’s decision to shut down Nokia’s former product development unit in the town will put 1,100 jobs at risk.

Social Media News Consumption Is Growing

A new report from the Pew Research Center and the Knight Foundation finds that Facebook and Twitter news consumption has ticked up significantly in the past two years. The report showed that up to 63 percent of Twitter and Facebook members got their news from social media, an 11 percent increase over last year.

OPM Breach Exposed More Than a Million Fingerprints

The recent hacking of the U.S. federal government’s Office of Personnel Management (OPM) has compromised millions of social security numbers, security clearances and critical personal information. But more importantly, it also exposed more than 1 million fingerprints – identifiers that, unlike a license or ID number, cannot be replaced.

Authorities Shutter Darkode, a Marketplace for Stolen Personal Data

And if you are wondering where your personal information goes once it is hacked, one of its destinations is Darkode, a hacking forum recently raided by U.S. authorities. The forum was a marketplace for stolen data, and a training and launching pad for more cyber attacks. Authorities who dismantled the site searched, arrested or charged at least 70 members of the password-protected forum.

Reddit’s New CEO Poised to Limit Free Speech

Reddit’s months-long upheaval, which led to the ouster of its former CEO Ellen Pao, is coming to a close with the appointment of new CEO Steve Huffman. The new chief is holding an online town meeting to reconnect with users unhappy with the way the popular community website is managed. But a recent post from Hoffman, in which he said that Reddit was never intended to be a “bastion of free speech,” could complicate reconciliation.

Three Dangers Society Faces From 3D Printing

Three D printing has a lot of promise, particularly for medical applications and developing economies. But writer Brian Krassenstein lists three concerns that could sound the alarm on some 3-D printing applications.

How to Get Rid of ‘iOS Crash Warnings’ Scam Popups

If you found yourself looking at a popup on your iPhone or iPad screen claiming that the operating system has crashed and that you should call help – don’t. It’s a scam. Writer Adrian Kingsley-Hughes has a few tips to help you address the issue.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Poverty & the Internet; Adobe Flash; Hacking Team Domino Effect

Posted July 15th, 2015 at 3:10 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Poverty, More Than Geography, Determines Who Gets Online in America

A new map of the digital divide in the United States, released by the White House Council of Economic Advisers, reveals that 80 percent to 90 percent of households in the most affluent sectors are connected to the Internet, while the percentage drops to about 50 percent in areas with the lowest median income.

Researchers Create Quad-Core Computer Using Four Rat Brains

Scientists at Duke University are looking at ways to connect the brains of animals together. To do that, they connected rat brains to one another via microwire arrays to create what researchers call a ‘Brainet.’ In their most recent experiment, scientists stimulated the rats’ brains using temperature and barometric pressure data on precipitation. The rats were able to correctly forecast the weather in 41 percent of the cases.

Flash. Must. Die.

The voices are getting louder, calling for an end to Adobe’s Flash Player – a resource whose numerous vulnerabilities have extended many an invitation to hackers over the past few years. Now, writer Brian Barrett has some tips to help users ditch Flash altogether.

Hacking Team Stealthy Spyware Gets Entrenched Through Hard Disk Removal

A 400GB cache that recently was dumped on the Web after Italian firm Hacking Team was breached is shedding more light on the company that sells surveillance tools and claims to be “the good guys.” Researchers at Trend Micro revealed that in addition to developing exploits and vulnerabilities, the Hacking Team used a BIOS toolkit that keeps their Remote Control System on their targets’ computers. The dump also revealed a new vulnerability in Microsoft’s Internet Explorer browser.

Epic Games Forums Hacked, User Data Stolen

In an email to forum members, Epic Games said a hacker had compromised its gaming communications and stolen data, including usernames, emails and passwords. The company has taken the forums offline while it determines how the hacker breached the system.

Seagull Steals Tourist’s GoPro, Captures Amazing Spanish Coast Footage

Yes, a seagull did, in fact, steal a tourist’s GoPro camera. And on the bright side, it took some serious footage of the Cies Islands in Spanish Galicia.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Mozilla Blocks Flash; Nadella’s Microsoft; Google’s Photo Mishaps

Posted July 14th, 2015 at 3:09 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Mozilla Blocks Flash Player on Firefox

Mozilla has blocked all versions of Adobe Flash Player in its Firefox browser due to its vulnerability to attack. Last week’s breach of the Italian company Hacking Team was made possible by a Flash Player bug that hackers exploited. While Adobe issued a patch, there appear to be more issues with that product.

Facebook: Adobe’s Flash Plug-In Is a Security Risk No Longer Worth Taking

Facebook’s security chief Alex Stamos is calling Adobe to kill its Flash plug-in. His death-to-Flash verdict came in a tweet a week after the Hacking Team attack.

Microsoft’s Nadella Talks Mobile Ambitions, Windows 10 Strategy, HoloLens, More

Microsoft CEO Satya Nadella talked about his plans in the mobile phone market and expectations for Microsoft and its augmented-reality product, HoloLens, among other issues in an exclusive interview with ZDNet’s Mary Jo Foley.

New Wi-Fi Technology Will Make Phones ‘Aware’ of Surroundings

An emerging generation of Wi-Fi-enabled devices will allow mobile phones to communicate with nearby Wi-Fi devices and take advantage of new proximity services, such as putting two gamers in the same area in touch to set up a match.

Google Photos Might Upload Your Pics Without Your Permission

Google’s Photos.app is on a roll, first tagging a couple of Africans as “Gorillas,” for which Google has apologized. Now, it appears Photos.app backs up photos to the cloud even when it is disabled or uninstalled. Neowin reported that customers found out when they began to see their photos appearing online on Google+ and among various search results.

Chinese Trojan Spies on Your Texts, Emails

Security researchers have uncovered a new threat to mobile messaging on smartphones. According to security firm Malwarebytes, a new Trojan for Android smartphones – SmsSpy – is typically found in third-party Chinese markets. Once installed on a phone, it snoops around text messages, emails and contact lists then emails them elsewhere. It also automatically emails new targets.

Nintendo Fans Flood Internet With Tributes to Late President

Gamers who grew up with Nintendo’s Super Mario Brothers and Pokemon took to social media to mourn the company’s late President Satoru Iwata, who lost a fight to cancer Saturday.

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Tech Devices Displace Memory, Boost Digital Amnesia

Posted July 10th, 2015 at 3:35 pm (UTC-5)
Leave a comment

US soldiers use their smartphones to take pictures of US President Barack Obama after he delivered a speech at the US military base Yongsan Garrison in Seoul, South Korea, April 26, 2014. (Reuters)

US soldiers use their smartphones to take pictures of US President Barack Obama after he delivered a speech at the US military base Yongsan Garrison in Seoul, South Korea, April 26, 2014. (Reuters)

Digital devices have become where we keep many of the vital pieces of our lives – snapshots once relegated to photo albums, contact information that used to be committed to memory or recorded in address books, even sensitive records kept in filing cabinets. All it takes is one careless moment for all those digitally-stored ‘memories’ to be lost forever.

“We use our devices … to remember things like where did we park our car in the parking lot or what’s the password for that account?” said Chris Doggett, Managing Director of Kaspersky Lab North America in an interview. “We take pictures with them and use them really to store all sorts of information that we frankly don’t want to try to remember because it’s tough to remember. And it works really well for that.”

It is virtually impossible to remember every little detail; and a recent Kaspersky Lab study found that people increasingly entrust personal information to their mobile devices.

The study, The Rise and Impact of Digital Amnesia, found that up to 53 percent of Europeans surveyed could not remember their children’s telephone number. About 51 percent had to look up the office number, and a third couldn’t remember their partners’ numbers.

In the U.S., 90 percent of those polled said they use their mobile devices and the Internet as an online extension of their brain. About half of those – around 44 percent – said they use their digital device as short-term memory.

At times, people don’t even bother to remember things they assume they can find online. According to the survey, up to 36 percent of Europeans polled were more likely to search the Internet than try to remember the information they need.

Howard Eichenbaum, Director of Boston University’s Center for Memory & Brain told TECHtonics he is concerned that people might “not build a body of knowledge composed by integrating new facts into an organization of knowledge or ‘schema.’”

“The Web has such an amazing body of facts and knowledge at our fingertips,” he said. “It is amazingly useful and extends us in ways few of us could imagine doing without them. On the other hand … I worry that the poverty of ‘knowledge’ personally gained by having to work through memories to incorporate them into knowledge compromises our mental agility in solving new problems.”

He recalled that, growing up, he had to work though routes on a paper map, for example, as part of building in his head an overall layout of the city where he lived. But today, with apps like Google Maps, which give directions to every turn a driver needs to take, Eichenbaum worries “that kids never work with, build, or add to a map and so do not build ‘knowledge’ of their city.”

The information smartphones hold might be sufficient while the batteries last. The “downside to depending on these devices,” said Eichenbaum, “is that they do get lost, broken, or run out of juice more often than we should risk.”

Loss of information in those cases is due to “an extreme fault of the users,” he said, because “everyone should know to back up valuable information.”

On average, Doggett said people assume their information will always be available on their device, just as in their brain. But when the device is lost or the information is compromised, panic ensues.

“All of a sudden we lose what we’re relying on, which is …. its being readily accessible and its being private to us,” said Doggett.

The lost data might include passwords for dozens of accounts that a lot of people too commonly save to their devices so that they are readily available – a bad idea, said Doggett, given that less than one-in-three people surveyed – about 30 percent – added extra security features to their digital devices.

About 28 percent don’t even bother to add any security protection, which means that they will lose all their precious memories should their smartphone get lost, damaged or worse, stolen.

If the information is backed up on a home computer or on a cloud service or somewhere else – then some of it can be restored. Ideally, it should be backed up in multiple locations.

“A lot of the media out there is not going to last that long,” cautioned Doggett. “And cloud services may be reliable or may not be, depending on which ones you use and whether it is a free account today and you have to pay for it tomorrow. … If they don’t take some simple steps to ensure that it is available, it may not be available to them tomorrow.”

There is no denying the convenience of mobile devices. But Doggett said people tend to trust in technology a little too much.

“We are assuming security that doesn’t exist. … That’s the bad news,” he said. “The good news is that there are plenty of tools out there to address that problem; and a lot of them are free.”

Technology allows people to offload low-value information and use their brains for other tasks. “That’s technology helping us,” said Doggett. “We just need to do it in a way that’s safe” to avoid having its power turned against us.

He said digital amnesia by itself is not a bad thing as long as the devices are accessible and reliable. But they are only reliable if people “wake up” and take a few basic steps to protect their treasure trove of memories.

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.