Choking Russia’s Internet; Uber Troubles; IoT; Google Hangouts

Posted December 10th, 2014 at 2:43 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

Russia’s Creeping Descent Into Internet Censorship

A new Russian law could soon prevent foreign Internet companies from reaching the country unless they set up local servers. The move would effectively put these companies at the mercy of the Russian government, which has been gradually expanding censorship.

Obama Becomes First US President to Write Computer Program

While kicking off the annual Computer Science Education Week Tuesday, Barack Obama reportedly became the first U.S. president to write a computer program, albeit a basic one to animate a character from a Disney movie. How much code he actually wrote himself remains in dispute.

Uber’s System for Screening Drivers Draws Scrutiny

Ride-sharing company Uber continues to attract its share of trouble. Authorities in New Delhi banned Uber Monday after an Indian woman alleged that she was raped and beaten by the driver. In Spain, a Madrid judge banned the service, pending further court action. In the U.S., California is suing Uber for misleading customers on driver background checks. And backlash against Uber continues to spread in many parts of the world.

The Sony Mega-Hack: What You Need to Know

Sony Pictures is still reeling from a recent destructive hack attack that crippled its systems and leaked a lot of information online. And the repercussions of the attack just keep coming.

Giving Vulnerabilities Catchy Names Prompts More Patching

Copenhagen-based security researcher Secunia ApS says giving vulnerabilities names like Heartbleed and Shellshock make it easier for computer users to learn about these flaws and ask that vendors release patches to fix them.

Intel Joins ‘Internet of Things’ Movement

Intel is partnering with Accenture, Dell and other firms to build an Internet of Things platform that will provide connectivity to everyday items.

Google Injects Smarts, Stickers Into Hangouts Communication App

The updated Hangouts app, which combines text, video and voice chat, uses natural language processing to detect if someone is looking for another person and then helps them meet.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Firefighting With Technology; Sony, Uber Woes; Linux Malware

Posted December 9th, 2014 at 2:00 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

FBI Official Says ‘No Attribution’ to North Korea in Sony Hack Probe

The U.S. Federal Bureau of Investigation says the FBI has not confirmed suspicions that North Korea is the culprit in the recent Sony Entertainment hack attack that wreaked havoc on the company’s systems.

PlayStation Network Hacked ‘By Lizard Squad’

Sony Entertainment is having a bad year. After a major hack attack that paralyzed its systems and leaked data online, Sony’s PlayStation online store now appears to have been hacked, locking out players for a couple of hours. The perpetrators claiming responsibility call themselves the Lizard Squad.

How Technology Can Stop Massive Fires From Destroying Cities

US firefighters using the latest technologies such as modern flame-retardant curtains, thermal-imaging cameras and drones are able to get a better handle on massive fires that might threaten entire neighborhoods.

Uber Banned From India’s Capital After Alleged Rape

The ride-sharing service Uber got into more hot water after India banned the service from the capital Delhi following allegations that a young woman was assaulted and beaten by an Uber driver on Friday.

Two Stealthy Linux Malware Samples Uncovered

Kaspersky security researchers have found two Linux variants of a previously-discovered Windows malware known as Turla, which used social engineering to target individuals and websites and exploited Adobe reader and Windows zero-day flaws.

Google-Backed Password-Killer Crosses Major Milestone

Google has been working since late last year on a new way for users to access their online email, using a USB key instead of a password. And a new version of FIDO or Fast Identification Online, which is the infrastructure behind the technology, puts the company closer toward eliminating the use of passwords.

Ralph Baer, Inventor of the Gaming Console, Dies at 92

An engineer and defense contractor, Ralph Baer started toying with the idea of playing games on television back in 1966. He later invented the first home video game console – the “Brown Box,” which later became the Magnavox Odyssey.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Your Money or Your Data: Ransomware Is on the Rise

Posted December 5th, 2014 at 2:00 pm (UTC-5)
1 comment

Attackers using ransomware encrypt files on mobile devices or PCs and lock out their users until they comply with a demand to pay ransom. (Ted Benson for VOA)

Attackers using ransomware encrypt files on mobile devices or PCs and lock out their users until they comply with a demand to pay ransom. (Ted Benson for VOA)

“Your money or your data” seems to be the favored mantra these days as cybercriminals look for safer, more effective ways to fool victims into parting with their money.

It’s called ransomware. And it is on the rise, according to security experts interviewed by TECHtonics.

In some scenarios, victims are locked out of their cellphone or computer files. A message warns them that they need to pay ransom before their files are unlocked.

“It’s easier to kind of kidnap and hold hostage files than a person,” said Kevin Haley, Director of Product Management for Symantec Security Response. “You’re a lot less likely to be caught. You’ve got a lot better way to pay the ransom, a lot safer way and you don’t have to get somebody to stuff bills into a suitcase and throw it off a bridge or … leave it in a locker. So it’s got a lot of appeal to the bad guys.”

Part of the appeal is the prevalence of important data online. Australia-based cybersecurity expert Troy Hunt said as more important data become available online, there are “more and more attack vectors for online criminals to take advantage of.”

That happens in cases where people or even IT departments who have not implemented backup procedures correctly are reluctant to report the attack, said Kaspersky Lab’s Argentina-based security researcher Santiago Pontiroli. “So … some people [decide] to pay the cybercriminals.”

According to Pontiroli, ransomware attacks spiked in 2013 as cybercriminals adopted Bitcoin and other types of electronic payments to cover their tracks as they carry out criminal extortion.

Cryptocurrencies allow “a high degree of anonymity,” said Hunt, which “makes it easier for cybercriminals to receive money without compromising their identity.”

And they have perfected their payoff methods, said Haley.

“That was always the hang-up before,” he explained. “They could get on your machine and they could encrypt your files, but they didn’t have a good way for you to pay the ransom. So that’s changed and so we’re seeing this explosion.”

What hasn’t changed is that ransomware is ultimately a type of malicious software. “They usually disguise it as a Trojan,” said Pontiroli. “And when it gets to your system, it encrypts everything.”

So when some Apple iOS users got locked out of their files earlier this year in a ransomware attack, victims who had no sensitive data to worry about simply reset their phones or formatted their computer hard drives.

In that instance, Haley said attackers used the FindMyiPhone app to put up a screen on the device, saying they had encrypted it.

“They had simply phished the Apple ID and password from users and then used the Apple FindMyiPhone app to put a pin number on and then pop up the little message,” he said.

Not all ransomware attacks use this method. Others exploit websites with poor security practices to plant their malware, waiting to prey on visitors.

“First they have to find a website that they can break into to plant the malware,” said Haley. “And then they wait for people to visit and then try to make them vulnerable, try to exploit then when they get there.”

Together, website insecurity and unpatched vulnerabilities on users’ PCs, are an open invitation for trouble.

“In other words,” says Haley, “you just visit the site and only by visiting the site, the bad guys are able to load or download malware onto your computer. And that is taking advantage of a vulnerability that you haven’t patched on your computer.”

Haley says attack patterns are varied and random, sometimes using spam, email attachments or by offering links to trick individuals into installing malware. With corporations, he said attackers often look for ways to break in, either using spam or specific knowledge about their target.

Also, cybercriminals often resort to manipulation and social engineering to target victims, as with Koler, an Android ransomware that targets pornography sites. Koler flashes a message and images from police to tell victims that they did something illegal that will be reported to authorities unless they pay a certain amount of money.

“They try to scare you in order for you to pay quickly,” said Pontiroli. “And because … it’s kind of shameful, not many people report it.”

He says cybercriminals know that people respond if they scare them or offer them good deals or even prey on the kindness of those willing to lend a hand to a stranger in need.

Companies like Sony Pictures, which is struggling to recover from a recent attack, frequently are successfully attacked because of shortcomings within their organizations, says Hunt. He said there are a lot of things that should happen before an attacker is successful.

“If they have been infected by malware inside their internal organization, the question I’ll be asking is, ‘What was their position on things like anti-virus?’” he said. “Did they have a good process there? Did they have good processes in terms of checking their inbound email for phishing attacks or malicious attachments?”

Some companies have paid hefty sums of money for ransom. In 2007, Nokia paid ransomers millions of euros to stop the distribution of a stolen encryption key only to lose track of the money and the criminals.The case remains open today.

Hunt said victims who pay the ransom might get their kidnapped data back, but nothing is for certain.

“There is absolutely no guarantee that you will get anything back,” says Haley. “In some cases, you do because the ransomers want to have a good reputation so that other people will pay them as well. And in others, they just don’t care. They’re just ripping you off. And in fact in some cases, you may pay the ransom and they’ll try to extort even more money from you.”

Paying the ransom is not an option, said Pontiroli, because it means that you have to “trust the word of someone that is holding your files ransom.”

It also keeps the extortion business going.

Haley predicts that ransomware attacks will continue as long as there are people who are fooled, scared or cajoled into paying ransom.

“This is a scheme that is working well for cybercriminals,” added Pontiroli. “You learn about ransomware when you are a victim of it.”

Prevention is the best cure, he advised, both in terms of having the necessary security measures and the knowledge that this type of threat exists.

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Wiping Out Sony; Girl Scouts; GTA 5; Best Android Apps

Posted December 4th, 2014 at 2:00 pm (UTC-5)
Leave a comment

The Princess Trap

A New-York based software engineer, whose four-year-old daughter is already going for cultural gender cliches and predesignated social roles, writes about the uphill battle he and others face getting kids – especially girls – interested in science.

Inside the “Wiper” Malware That Brought Sony Pictures to its Knees

The malware used to attack Sony Pictures’ systems, which effectively wiped out data and crippled the studio, uses Microsoft Windows file sharing features and files named for Windows components to spread, control computer functions, and wreak havoc on the systems it infects.

Selling Girl Scout Cookies Online Can Have a Dark Side

After decades of selling their cookies the traditional way, The Girl Scouts are going online. But the decision has raised concerns that girls as young as 13 could end up as targets for cyberbullying and online predators.

Kmart Australia Halts Sales of Grand Theft Auto 5

This is the second Australian chain to stop selling Take-Two’s Grand Theft Auto 5, following an online petition of more than 40,000 signatures that condemned the game’s depiction of violence against sex workers. Take-Two CEO Strauss Zelnick expressed disappointment for the decision, saying the critically-acclaimed game is played by tens of millions of people around the world.

Lawyers Say Apple Deleted Rivals’ Songs From Users’ iPods

Lawyers representing consumers in a class-action antitrust lawsuit against Apple told jurors Wednesday that the tech giant deleted music users had downloaded on their iPods from rival services between 2007-2009 without telling them and prevented them from restoring it.

How High-Tech, Temporary Tattoos Want to Hack Your Skin

If technology has its way, temporary tattoos will never be the same again. The Center for Wearable Sensors at the University of California San Diego has been experimenting with temporary tattoos equipped with sensors to leach data out of the wearer’s body and transmit its findings using WI-Fi or Bluetooth.

The 12 Best Android Apps of 2014

Google’s Android operating system had a busy year in 2014, between new toys and related updates and an impressive array of mobile apps.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

PC Power Fights Ebola; IoT; Google’s Santa Tracker

Posted December 3rd, 2014 at 2:00 pm (UTC-5)
Leave a comment

Tech Sightings today:

IBM Helps You Donate Computer Power to Fight Ebola

In a new twist on ways to fight the Ebola virus, IBM and scientists at Scripps Research Institute in southern California have come up with a way to enable users to donate processing time on their PCs and various digital devices to researchers.

Harvard: IoT Is Third Big Technology ‘Wave’ In the Last 50 Years

Michael Porter, an economist at the Harvard Business School and James Heppelmann, president and CEO of PTC, argue that the Internet of Things (IoT) may be the most significant event since the arrival of the Internet because of its potential to usher a new era of prosperity.

Sony Pictures Struggles to Recover Eight Days After Cyber Attack

Sony is still trying to restore its systems eight days after suffering a crippling cyberattack with a data-wiping virus. Employees were given new computers as investigators search for clues that might reveal the attackers’ identities.

Cybersecurity Threats 2015: More Espionage, More Apple Malware

Leading security experts expect hackers to flourish in 2015 and increasingly go after Apple devices. They also project that the cyber espionage scene will expand to include new comers from developing countries anticipating high economic growth.

Bluetooth Update Aims to Shield Your Smartphone from Prying Beacons

An upcoming Bluetooth update will improve connectivity, give users more privacy controls, and make it much more difficult for snoopers to get covert access to a user’s mobile device.

Twitter Announces Sweeping Update to Reporting, Blocking Tools

New tweaks announced Tuesday enhance Twitter’s blocking and reporting mechanisms for handling Internet trolls.The update, which is still a limited release, lets users report abusive behavior via Twitter’s mobile app.

Google Santa Tracker Site Now Live

You’d better watch out! Christmas is just four weeks away. But Google’s Santa Tracker website is already in action so that visitors can track Santa’s sleigh as it travels the world on  December 24.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Hacking Sony; Stephen Hawking; Browser Wars

Posted December 2nd, 2014 at 2:34 pm (UTC-5)
Leave a comment

Today in Tech Sightings:

How Intel Helped Stephen Hawking Communicate With the World

Celebrated astrophysicist Stephen Hawking, Director of Research at the Center for Theoretical Cosmology in Cambridge, suffers from a degenerative motor neuron disease that has made it impossible for him to communicate with the world without the aid of technology. Now, Intel has announced a new system that will considerably enhance Hawking’s ability to run a computer.

Did North Korea Hack Sony Over Kim Film?

A group calling itself the Guardians of Peace has hacked into Sony Pictures. The attack, which is being blamed on North Korea, has crippled the company’s systems and leaked several movies scheduled for release on DVD online. The Federal Bureau of Investigation (FBI) found that some of the software used in the attack was compiled in Korean. Sony is now investigating possible links to North Korea.

FBI Warns of ‘Destructive’ Malware in Wake of Sony Attack

The FBI has also issued a warning to businesses following the cyberattack on Sony Pictures without mentioning how many companies have been affected by similar destructive attacks. The report did provide technical details and advice on how to counter the malware.

Vietnam Detains Blogger for ‘Bad Content’ Posts

Police in Vietnam detained sixty-five-year-old blogger, Hong Le Tho, and searched his home for posting comments critical of the country’s communist government in what appears to be the latest crackdown on dissent.

Once Celebrated in Russia, Programmer Pavel Durov Chooses Exile

Russian entrepreneur Pavel Durov, known for his widely-popular social network, VKontakte, fled  Russia once the Kremlin tightened Internet controls and started asking for data on Ukrainian protest leaders. He now moves from country to country.

Internet Explorer Continues to Grow, but Chrome is Gaining Fast at Firefox Expense

According to Net Applications’ latest stats, Internet Explorer now controls 58.94% of the global browser market, while Google Chrome has a 21.25% piece of the pie. At the same time, Firefox continues to lose market share and now holds a 13.26% slice of the market.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Have You Been Harassed Online?

Posted December 2nd, 2014 at 12:00 pm (UTC-5)
Leave a comment

There are a lot of behaviors from the real world that we wish weren’t be duplicated in the digital world. But unfortunately harassment, especially for many women, is a reality in both worlds.

Given recent, ugly episodes of online harassment, TECHtonics will feature a three-part series on the subject in coming weeks.

If you have suffered from online harassment and abuse, please tell us your story. We will include it in the series.

Please send a Direct Message to @aidaakl if you are interested. You have to follow (and be followed) for the DM to go through.

Thank you.

 

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

GM Foods Still Controversial After All These Years

Posted November 28th, 2014 at 11:00 am (UTC-5)
15 comments

An agriculturist prepares to plant "Golden Rice" seedlings, grown from genetically-modified rice grains, at the International Rice Research Institute in Los Banos, south of Manila in the Philippines, Aug. 14, 2013. (Reuters)

An agriculturist prepares to plant “Golden Rice” seedlings, grown from genetically-modified rice grains, at the International Rice Research Institute in Los Banos, south of Manila in the Philippines, Aug. 14, 2013. (Reuters)

Proponents and critics of genetic modification (GM) have been arguing over the potential impact of genetically modified organisms (GMO) on health and the environment for more than a decade now.

Genetic engineering can manipulate the DNA of crops to switch off existing traits or add new ones in ways that were not possible before.

Proponents argue that genetic engineering has been at work long enough without reports of health or environmental risks. They say the process undergoes rigorous testing and is more precise and more sustainable.

Opponents say the biotech industry’s safety tests are self-motivated and lack oversight. They argue that in addition to concerns over long-term health issues, the environmental impact of GM farming is already evident.

TECHtonics reached out to two experts from each side of the debate to get a glimpse of where some of these issues stand today.

C.S. Prakash, Professor of Plant Molecular Genetics at Tuskegee University

The argument that genetically modified crops release escaped genes into the environment or that they cause allergies are concerns that are, in his view, “orchestrated and made up,” says Prakash.

He says pollination and cross-pollination is always going on and has not prevented people from growing food crops for thousands of years and maintaining the purity of crop varieties.

There are “no side effects to genetically modified crops,” says Prakash, and no increase in allergens because of GM crops.

“It’s the other way round,” he added. “We have a technology where in the future, we can [grow] allergen-free plants, allergen-free food, or we have the technology where we can come up with sensors to identify food contamination and food poisoning and allergy. And so I don’t think there is any scientific basis for either of these.”

He says the biotech industry does “rigorous testing” for food safety and environmental impact and will “make sure that any crop, commodity that is introduced into the market goes through substantial testing and that there is not going to be any known side-effects in terms of its nutritional quality being compromised or any new undesirable traits being introduced into our food. We clearly don’t want that.”

“The risk of any product – food product, or any product – is inherent in the product and not in the process in which it was developed,” he said. “And so, many scientific bodies and organizations that have looked at biotechnology have said that … inherently, there is nothing dangerous about it.”

Biotech, argues Prakash, has “far more answers and far more ways to answer about the consequences of food developed from GM technology compared to conventional.”

With conventional breeding, he says “we absolutely had no idea what we were doing and what were the consequences of that. And yet we went ahead.”

Nevertheless, going conventional or GM is a matter of preference – and precision, says Prakash.

“If you want something that is much more knowledge-based and science-based, and something that is more direct and straightforward, then you go for genetic modification,” he said. “But it also brings in a lot more expense, a lot of regulation, and of course, in some countries right now, GM crops are not allowed.”

Labels on bags of snack foods indicate they are non-GMO products, Los Angeles, California,  Oct. 19, 2012.   (AFP)

Labels on bags of snack foods indicate they are non-GMO products, Los Angeles, California, Oct. 19, 2012. (AFP)

What about the nutrition label?

The biotech industry, according to Prakash, is not opposed to voluntary labeling of GMOs. But he argues that food is not typically labeled based on how it was grown, but rather on its nutritional content.

He also suggests that labeling might antagonize consumers or give the impression that there is something dangerous about the product. He argues that labeling leaves consumers without a choice and puts “hurdles in the development of the technology for absolutely no reason.”

Ricardo Salvador, Director of the Union of Concerned Scientists

Do you act with precaution and do studies first? Or do you use the new technology until there is reason to suspect that there is some unexpected consequence?

At the heart of these questions is what Salvador calls the philosophical difference that comes into play when evaluating the safety of biotech.

He says it is natural to ask questions about the consequences of a technology that is still novel in that the “recombination of genes by introducing foreign genes intentionally into agricultural organisms is not something that we’ve done in this way before.”

He says a little more than a decade and a half of this type of research, biotech now has a track record.

“And the … issue that concerns us the most is the environmental impact that results from the fact that this is a technology that enables and accelerates intensive agriculture, and particularly the kind of agriculture that generates a lot of environmental damage,” he said.

With GM farming, Salvador says more acres can be planted in a shorter period of time. The high cost of the seed motivates farmers to apply as much nitrogen fertilizer as possible to promote productivity and make rapid passes over the field with machinery, thereby baring the soil because weeds have been controlled chemically.

What follows, says Salvador, is water pollution due to the over-application of fertilizers, soil erosion, sedimentation of public waterways, and high cost to the public. That puts GM technology “in the midst of catastrophic failure” for not delivering on its promise to give “greener, cleaner, more sustainable agriculture,” said Salvador.

Current applications making crops herbicide-resistant and insecticide-resistant or producing their own insecticide have resulted in a “rapid adaptation of both weeds and insects,” he said.

“Now the technology is ineffective,” he continued. “Farmers don’t really know another way by now to control weeds. And in fact the resistant weeds are very difficult to control with almost any alternative method.”

While agriculture might have faced similar issues before 1994, when genetic modification took off, Salvador argues that they were not “expressed to the degree that we now face, nor did these issues develop as quickly as they now have developed with this technology.”

While he argues that molecular biology should be pursued to enhance human knowledge, he is concerned about “turning science into technology and then the business models that are utilized to put this technology into the agricultural system.”

The costs – the feed, the fertilizer, the machinery, the fuel cost, the environmental costs, come down to what he describes as the “health epidemic that results from the fact that your producing too much of the wrong stuff – corn, soy – these are ingredients for the junk food diet which is making wealthy societies sick.”

Salvador argues that the GM business model of selling farmers something each year makes them “dependent upon a technology, upon an input,” which is “antithetical to the sustainability and the self-determination of farmers.”

The current system, which is supported by direct public investment “would get greater returns on its investment if it had a less damaging system to … ecology, as well as to health,” he said.

He urges policymakers to review resource allocation and to “make sure that the public gets the highest return.”

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

Twitter, Uber Mobile Snooping; EU vs. Google

Posted November 27th, 2014 at 2:25 pm (UTC-5)
Leave a comment

Today’s Tech Sightings:

European Parliament Calls On Commission to Consider Breaking Up Google

In a non-binding resolution, European Union legislators urged antitrust regulators to consider separating search engines from other commercial products to boost search market competition. The move is widely seen as targeting Google, which controls about 90 percent of Europe’s search engine market.

In 2014, Internet Added an Entire United States to Its User Base

The United Nations’ International Telecommunication Union’s latest report says the number of  new Internet users in 2013 was equivalent to the population of the United States, most of whom are relatively well-off, educated young people. The report expects the Internet will have added 3 billion users for 2014.

Twitter to Track List of Apps Installed on Your Mobile Device

In making the announcement, Twitter said it will only track installed mobile apps to help improve personal experience and customized content. But the company claims no data will be gathered within applications.

How To Opt Out of Twitter’s New Mobile App Tracker

If you don’t want Twitter looking into your mobile phone to check your installed apps, here are a few steps you can take to keep yourself out of the spying loop.

Uber Under Fire for Android Permissions

Phoenix-based security researcher Joe Giron says Uber’s Android app requests all kind of permissions from users looking to hail a cab from the ride sharing company, including permission to access contacts, cameras, Wi-Fi and a host of information that Google requires from developers working with its Android operating system.

Syrian Electronic Army Hacks Global Websites

Numerous companies and organizations have been targeted, according to the Syrian Electronic Army, including Dell, Microsoft, Ferrari, CNBC, Forbes, UNICEF and others. Security experts say the attack was not malicious, but redirected visitors to a Syrian Electronic Army website.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.

EU Wants Google to ‘Forget’ US Citizens; Regin; 3-D Printing

Posted November 26th, 2014 at 2:24 pm (UTC-5)
Leave a comment

Tech Sightings today:

Google Pushed to Extend ‘Forgotten’ Requests to US

After two days of meetings, EU data protection chiefs drafted rules that now require Google to extend the right to be forgotten beyond Europe to the United States to allow U.S. residents to submit privacy requests to Google if they are unhappy with their digital trail.

Top Male Engineers at Google Make Nearly 20% More Than Female Peers

It is no secret that the tech industry suffers from a significant shortage of women and minority professionals and leaders. But now, a survey by Glassdoor, a jobs and careers website, suggests that many of Silicon Valley’s male professionals earn thousands of dollars more than their female counterparts – up to 19 percent more in some cases.

FTC: Sony Lied About How Innovative PS Vita Is

The U.S. Federal Trade Commission (FTC) says Sony promised “game-changing” features in its  PS Vita gaming console that didn’t live up to the hype. The FTC also filed a complaint against Sony’s advertising agency for asking employees to use their personal Twitter accounts to promote the console without disclosing their connection to the advertisers.

‘Elegant’ Regin Malware Linked to Brits, NSA

Regin, a backdoor type of spyware in use in a number of countries since 2008, is being compared to the infamous Stuxnet, which hit Iran’s nuclear networks, in its sophistication and elegance. Cybersecurity firm Symantec, which uncovered the malware, says producing Regin requires massive resources only governments can provide. And some reports suggest the spyware has been used by British Intelligence and the U.S. National Security Agency (NSA.)

Microsoft to Pay China $140 million for ‘Tax Evasion’

While reporting the news, China’s official news agency, Xinhua, said one of the world’s largest 500 companies, which was established in Beijing in 1995 and whose name starts with an “M,” has to pay Beijing up to $137 million in back taxes and interest, not to mention millions more in additional annual taxes in the future.

ISS 3-D Printer Creates First Object in Space

It may not be the most exciting creation, but the International Space Station’s first 3-D-printed object – a faceplate of the printer extruder casing – is the first step toward creating replacement parts in space.

Aida Akl
Aida Akl is a journalist working on VOA's English Webdesk. She has written on a wide range of topics, although her more recent contributions have focused on technology. She has covered both domestic and international events since the mid-1980s as a VOA reporter and international broadcaster.