Page 4,465«..1020..4,4644,4654,4664,467..4,4704,480..»

Glitch in Amazon web servers causes problems for popular sites – The Guardian

The case highlights how reliant the internet has become on several players, including Amazon, used by tens of thousands of web services for hosting and backing up data. Photograph: Loic Venance/AFP/Getty Images

Amazons S3 cloud service experienced an outage of several hours on Tuesday that caused problems for many websites and mobile apps that rely on it, including Medium, Business Insider, Slack, Quora and Giphy.

The company said earlier on Tuesday that it was experiencing high error rates on the platform affecting a large part of the east coast of the US. Then on Tuesday afternoon, Amazon posted on its service health dashboard that the issue had been resolved:

As of 1:49 PM PST, we are fully recovered for operations for adding new objects in S3, which was our last operation showing a high error rate. The Amazon S3 service is operating normally.

The Amazon Simple Storage Solution (S3) is used by tens of thousands of web services for hosting and backing up data, including the Guardian, which was heavily affected.

The problem had also affected some internet-connected devices, such as as smartphone-controlled light switches.

The outage even affected a site called is it down right now? which monitors when other sites are down.

The case highlights how reliant the internet has become on several players, including Amazon, Cloudflare and Google who provide the expensive centralized infrastructure on which the web runs.

The so-called cloud is actually made up of thousands and thousands of powerful computer servers, stored by Amazon and others in huge server farms. The companies build and maintain them so so that smaller players dont have to.

Its convenient and flexible (you only pay for the storage they use) for companies who dont have the resources or skills to do it themselves that is, until theres a problem.

See the original post here:
Glitch in Amazon web servers causes problems for popular sites - The Guardian

Read More..

With Confidence In AWS Shaken, Who Could Benefit? – Benzinga

Amazon.com, Inc. (NASDAQ: AMZN) faced a setback Tuesday due to an outage at its cloud computing platform Amazon Web Services, or AWS.

Does this development open a window for competing platforms to pick up market share?

Amazon said its cloud service was hit by a partial failure of a hosting platform. The widespread outage affected a number of Internet services, including Slack, Trello, Splitwise and Medium, and numerous media outlets.

Related Link: Amazon Web Services Is 'Destroying' Its Competition

"We continue to experience high error rates with S3 in US-East-1, which is impacting various AWS services. We are working hard at repairing S3, believe we understand root cause and are working on implementing what we believe will remediate the issue," Amazon said in an update on the outage midday Tuesday.

By late-afternoon Tuesday, the company said its S3 service was operating normally.

AWS, officially launched in 2006, has been a highly profitable business for Amazon, fetching $12.22 billion in revenue and $3.11 billion in operating profit for the company in 2016. So, a far-reaching outage is a concern for the business.

On the day AWS suffered the outage, its uptime the amount of time the service is functioning stood at 99.59 percent, according to Forbes. It's a solid number, although it falls beneath the company's 99.95 percent target.

Tuesday's outage led Forbes contributor Patrick Moorhead to question the faith companies place in public cloud services at the expense of in-house IT.

Public cloud platforms do offer the advantages of agility, a metered business model, robust toolsets, endless innovation and more. Moorhead instead recommends a hybrid IT approach, where some IT services are in-house and some are in the cloud.

Amazon's competitors

Against the backdrop of the AWS outage, Benzinga looked at which other cloud computing platforms stand to benefit now that Amazon's vulnerability stands exposed.

Though Amazon's AWS, with its first entrant advantage, is the leader of the pack, it's not without competition.Microsoft Corporation (NASDAQ: MSFT), Alphabet Inc (NASDAQ: GOOGL) and International Business Machines Corp. (NYSE: IBM) are all breathing down Amazon's neck.

All of these providers offer two layers of cloud: namely, Internet as a service, or Iaas, and Platform as a Service, or Paas. The former allows virtual servers and storage to be set up in someone else's data center, while the latter allows developers to build applications.

Amazon's AWS held a 33.8 percent global market share in cloud computing as of the fourth quarter of 2016, as opposed to a 30.8 percent share for Microsoft, Google and IBM combined, according to ZDNet.

Microsoft had launched a competing product, Azure, by 2010. The company won points on its enterprise know-how and established customer base, and businesses can easily transfer their Windows apps to the Azure cloud, according to Business Insider. Microsoft's Enterprise Agreement with clients translates into discounts on Microsoft software, too, the publication said.

Google's entry into cloud computing started in 2008 with the Google App Engine, whichallowed developers build their apps. Google later added many features and renamed the service as the Google Cloud Platform in 2013. Google's advantage in the arena is the trust developers have with the company due to its allegiance to open-source philosophy.

Other players in the sector include IBM and Oracle Corporation (NYSE: ORCL). IBM promotes hybrid cloud and hasn't found much traction with small- and medium-sized companies.

Oracle has pushed its cloud product largely only to existing customers, according to Business Insider.

Other competitors have simply tried and then given up. Rackspace Hosting, Inc. (NYSE: RAX) sold its Cloud Sites business unit to hosting company Liquid Web last August. A report in the IT publication The Register suggests Cisco Systems, Inc. (NASDAQ: CSCO) will shut down its Cisco Intercloud Services public cloud in 2017.

Amazon may have taken a hit from the outage, but its dominant presence means the hit is unlikely to be crippling. The rivals have a lot of catching up to do to make a dent to Amazon's positioning in the market. That said, the recent outage could reignite corporate discussions concerning hybrid IT environments.

Posted-In: Amazon Amazon Web Services AWS cloud computing GoogleNews Tech Trading Ideas Best of Benzinga

2017 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

The rest is here:
With Confidence In AWS Shaken, Who Could Benefit? - Benzinga

Read More..

Mathematician breaks down how to defend against quantum … – Phys.Org

February 28, 2017 Credit: CC0 Public Domain

The encryption codes that safeguard internet data today won't be secure forever.

Future quantum computers may have the processing power and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers.

The paper clarifies misunderstandings about the complex field of public key cryptography and provides a common basis of understanding for the technical experts who will eventually be tasked with designing new internet security systems for the quantum computing age.

"Designing security systems to protect data involves experts from many different fields who all work with numbers differently," Hamlin said. "You are going to have pure and applied mathematicians, computer programmers and engineers all involved in the process at some point. For it to work in real life, all of these people need to have a common language to communicate so that they can make important decisions about how to safeguard online transactions and personal communications in the future."

Preparing for the future

Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of time faster than silicon-based computers. A hacker armed with a next generation quantum computer could in theory decrypt any internet communication that was sent today, Hamlin said.

In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences today's computer use to operate.

In his paper, Hamlin breaks down how the generalized knapsack code works in terms that computer scientists, engineers and other experts outside the field of pure mathematics can understand. He explains that by disguising data with number strings more complex than the 0s and 1s conventional computers use to operate, the generalized knapsack offers a viable security method for defending against quantum computing hacks.

"The Generalized Knapsack Code expands upon the binary representations today's computers use to operate by using a variety of representations other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including those using basis reduction, one of the decoding methods used to break the original knapsack code."

Hamlin said his hope is that his paper, Number in Mathematical Cryptography, clears up misunderstandings he has run into professionally so that the generalized knapsack code can be developed for future use.

"Quantum computing will change how we handle data and we, as a society, are going to have to make some important decisions about how to prepare for it," Hamlin said. "A code like this can be implemented on conventional hardware and yet it would also be secure from a hacker with a quantum computer. I think it is time for us to consider this code very seriously for adapting commerce and perhaps communication in light of the possibility of quantum computing."

Explore further: Quantum compute thisMathematicians build code to take on toughest of cyber attacks

More information: Nathan Hamlin, Number in Mathematical Cryptography, Open Journal of Discrete Mathematics (2017). DOI: 10.4236/ojdm.2017.71003

Washington State University mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer.

What does the future hold for computing? Experts at the Networked Quantum Information Technologies Hub (NQIT), based at Oxford University, believe our next great technological leap lies in the development of quantum computing.

When future users of quantum computers need to analyze their data or run quantum algorithms, they will often have to send encrypted information to the computer.

Anticipating the advent of the quantum computer, related mathematical methods already provide insight into conventional computer science.

For the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a cinch.

(Tech Xplore)There are conventional computers and then there is another kindquantum computers, different, designed to leverage aspects of quantum physics to solve certain sorts of problems dramatically faster than ...

The encryption codes that safeguard internet data today won't be secure forever.

Pennsylvania's congressional district maps are almost certainly the result of gerrymandering according to an analysis based on a new mathematical theorem on bias in Markov Chains developed by Carnegie Mellon University and ...

A chicken-sized, feathered dinosaur that scuttled around Earth 160 million years ago is helping flesh out the missing link between land-bound animals and flying ones, scientists said Tuesday.

For all the fact-checking and objective reporting produced by major media outlets, voters in the U.S. nonetheless rely heavily on their pre-existing views when deciding if politicians' statements are true or not, according ...

Human activity, whether commercial or social, contains patterns and moments of synchronicity. In recent years, social media like Twitter has provided an unprecedented volume of data on the daily activities of humans all over ...

(Phys.org)Stephen Brusatte, a fellow in Vertebrate Paleontology at the University of Edinburgh in the U.K. has published a Perspective piece in the journal Science outlining the state of current research into the development ...

Adjust slider to filter visible comments by rank

Display comments: newest first

CIA &/or KGB have quantum computers for decades now. Security is a lovely myth, like democracy.

Knapsack code is something I've been meaning to look at for a while now. I'll be giving this open access paper a careful look.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Read the rest here:

Mathematician breaks down how to defend against quantum ... - Phys.Org

Read More..

How to defend against quantum computing attacks – ScienceBlog.com – ScienceBlog.com (blog)

The encryption codes that safeguard internet data today wont be secure forever.

Future quantum computers may have the processing power and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers.

The paper clarifies misunderstandings about the complex field of public key cryptography and provides a common basis of understanding for the technical experts who will eventually be tasked with designing new internet security systems for the quantum computing age.

Designing security systems to protect data involves experts from many different fields who all work with numbers differently, Hamlin said. You are going to have pure and applied mathematicians, computer programmers and engineers all involved in the process at some point. For it to work in real life, all of these people need to have a common language to communicate so that they can make important decisions about how to safeguard online transactions and personal communications in the future.

Preparing for the future

Quantum computers operate on the subatomic level and theoretically provide processing power that is millions, if not billions of time faster than silicon-based computers. A hacker armed with a next generation quantum computer could in theory decrypt any internet communication that was sent today, Hamlin said.

In order to create an online security system better prepared for future demands, Hamlin and retired mathematics professor William Webb created the Generalized Knapsack Code in 2015 by retrofitting a previous version of the code with alternative number representations that go beyond the standard binary and base 10 sequences todays computer use to operate.

In his paper, Hamlin breaks down how the generalized knapsack code works in terms that computer scientists, engineers and other experts outside the field of pure mathematics can understand. He explains that by disguising data with number strings more complex than the 0s and 1s conventional computers use to operate, the generalized knapsack offers a viable security method for defending against quantum computing hacks.

The Generalized Knapsack Code expands upon the binary representations todays computers use to operate by using a variety of representations other than 0s and 1, Hamlin said. This lets it block a greater array of cyberattacks, including those using basis reduction, one of the decoding methods used to break the original knapsack code.

Hamlin said his hope is that his paper, Number in Mathematical Cryptography, clears up misunderstandings he has run into professionally so that the generalized knapsack code can be developed for future use.

Quantum computing will change how we handle data and we, as a society, are going to have to make some important decisions about how to prepare for it, Hamlin said. A code like this can be implemented on conventional hardware and yet it would also be secure from a hacker with a quantum computer. I think it is time for us to consider this code very seriously for adapting commerce and perhaps communication in light of the possibility of quantum computing.

View original post here:

How to defend against quantum computing attacks - ScienceBlog.com - ScienceBlog.com (blog)

Read More..

Researchers Have Directly Tested Two Quantum Computing … – Futurism

In Brief

If you arent already, youre likely soon to find yourselflooking forward to the day when quantum computers will replace regular computers for every day use. The computing power ofquantum computersis immense compared to what regular desktops or laptops can do. The downside is, current quantum computing technology are limited by the bulky frameworks and extreme conditions they require in order to function.

Quantum computers need specialized setups in order to sustain and keep quantum bits the heart of quantum computing working. These qubits are particles in a quantum state of superposition, which allows them to encode and transmit information as 0s and 1s simultaneously. Most computers run on binary bit systems which useeither0s or 1s. Sincequantum computers can use both at the same time, they can process more information faster. That being said,Sustaining the life of qubitsis particularly difficult, but researchers are investigating quantum computing studies are trying to find ways to prolong the life of qubits using various techniques.

Now, for the first time ever, two quantum computers have been pitted against one another. One is a chip developed by IBM and used qubits made from superconducting materials. The other is a chip designed by the University of Maryland thatrelies on electromagnetic fields to trap a quantum material called ytterbium ions, which can be harvested forfor its qubits. Although they used different methods, both chips run algorithms the same way and worked with just five qubits.

Because both were still modest in power, the test couldnt really show which had better qubits. While IBMs quantum computer proved to be faster, it was also less reliable. IBMs qubits also broke down much easier than the University of Marylands. The latter had qubits that were interconnected thanks to the nature of ytterbium which made them capable of sharing information with each other. IBMs, on the other hand, needed a central hub to swap information.

Still, it was a valuable experiment, and definitely a sign of improving quantum computing technology. It also stands tohelp researchers figure out which qubit technology would more efficient and viable for further development. For a long time, the devices were so immature that you couldnt really put two five-qubit gadgets next to each other and perform this kind of comparison, said Simon Benjamin, a University of Oxford physicist who wasnt part of the study. Its a sign that this technology is maturing.

Read the original here:

Researchers Have Directly Tested Two Quantum Computing ... - Futurism

Read More..

What you need to know about ‘Cloudbleed,’ the latest internet security bug – Globalnews.ca

;

It's time to change your passwords one again, thanks to a potentially massive data leak.

Its once again time to change your passwords. A bug found in internet infrastructure company Cloudflares software has been leaking personal data including private chat logs and passwords from hundreds of thousands of websites for months.

Cloudflare, which offers hosting and security services to websites, hosts six million sites, including services like Uber, FitBit, OKCupid and password management program 1Password.

READ MORE: Average cost of data breach in Canada is $6.03M, study finds

According to Google researchers who discovered the bug, now known as Cloudbleed, the vulnerability had been sending chunks of data to users browsers when they visited a webpage hosted by the company. The bug may have been active since September 2016, but researchers say it was definitelyfrom February 13 until it was discovered on February 18.

Of the leaked data, researchers said they found private messages from dating sites, full messages from chat services, online password data, frames from adult video sites and hotel booking details.

READ MORE: Canadian Tire admits 5 days after breach customer info may have been accessed

WATCH ABOVE: One of Canadas largest in-store and online retailers has acknowledged it suffered a security breach forcing it to prevent customers from checking their points and credit card accounts. Sean OShea reports.

While the leak has the potential to be very dangerous for web users, the company said there is no evidence the data was accessed by hackers.

Weve seen absolutely no evidence that this has been exploited, Cloudflare Chief Technology Officer John Graham-Cumming told Reuters. Its very unlikely that someone has got this information.

Researchers said about 120,000 webpages were leaking information every day.Graham-Cumming noted the company has been working with Google to remove any sensitive data that may have been indexed by search engines.

The website doesitusecloudflare.com has already been set up, allowing users to search through services they have signed up for to see if they might be affected.

Unfortunately, its unclear just how many web users may have been affected by the Cloudflare bug. While the company has downplayed the severity of the leaked data and fixed the vulnerability itself, security experts warn there could still be fallout for those who use websites run by Cloudflare.

READ MORE: Ransomware on the rise in Canada How to protect your data

While Cloudflares service was rapidly patched to eliminate this bug, data was leaking constantly before this point for months. Some of this data was cached publicly in search engines such as Google, and is being removed, wrote security expert Ryan Lackey in a blog post.

Other data might exist in other caches and services throughout the Internet, and obviously it is impossible to coordinate deletion across all of these locations. There is always the potential someone malicious discovered this vulnerability independently.

Dating site OKCupid said its initial investigation revealed minimal, if any exposure from the bug. 1Password also said none of its data was found to be at risk.

Lackey and others recommend users change their passwords right away, just in case any leaked data fell into the wrong hands.

Cloudflare is behind many of the largest consumer web services (Uber, Fitbit, OKCupid, ), so rather than trying to identify which services are on Cloudflare, the most cautious is use this as an opportunity to rotate ALL passwords on all of your sites, he said.

Security breaches like this one are a good opportunity to be more proactive about the type of passwords you use. For example, stay away from easy-to-guess passwords like 123456 or password as well as easy to guess identifiers, like your dogs name.

Experts say passwords that include a mix of letters, numbers and symbols are more secure but numbers included in a password should never be something easy to guess based on the user. That means your age, the current year, or your address are not good choices. Similarly, the longer the password the better.

Passwords that use up to 10 uppercase and lowercase letters mixed with numbers are proven to be more secure despite being hard to remember.

READ MORE: How to protect yourself from security breaches on social media sites

One tip is to construct a password from a sentence, mix in a few uppercase letters and a number for example, There is no place like home, would become tiNOplh62.

And remember, try not to use the same password for any two accounts.

If the website or service you are using offers two-stepauthentication, experts agree its in your best interest to turn it on.

Two-factor or two-step authentication requires the user to set up their account so that a text message containing a secondary login code is sent to their phone every time they log in to their account. That means a hacker would have to have both your password and your cellphone in order to get access to your accounts.

With files fromReuters

2017Global News, a division of Corus Entertainment Inc.

Follow this link:

What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca

Read More..

Google cracks longtime pillar of internet security – MarketWatch

A cryptographic technology long central to internet security has been dealt a knockout blow by researchers at Google and a Dutch research institute.

In a paper to be published Thursday, the researchers demonstrate an attack on an algorithm called SHA-1, which has been widely used over the past 20 years to verify the authenticity of digital documents.

SHA-1 has worked behind the scenes to guarantee that the websites people visit are, in fact, are what they claim to be. It is what is known as a hash function--a technique for turning any digital document into a unique 40-digit sequence of letters and numbers. That digital fingerprint serves as a quick way of authenticating digital certificates, passwords, even office documents.

Called a collision attack, the researchers technique is something cryptographers have contemplated since 2005, when researchers in China reported the first significant flaws in SHA-1. Until now, it was only a theoretical attack, said Marc Stevens, a researcher with the Centrum Wiskunde & Informatica in Amsterdam, which collaborated with Alphabet Inc.s Google unit GOOGL, -0.56% on the effort. We actually did it.

An expanded version of this report appears at WSJ.com.

Most popular at WSJ.com:

John McCain makes secret trip to Syria.

How hit team came together to kill Kim Jong Nam.

See the original post:

Google cracks longtime pillar of internet security - MarketWatch

Read More..

Emsisoft Internet Security 2017.2.0.7219 – TechCentral.ie

If youre going to pay for security, its a good idea to pay for a complete package. Previously Emsisoft offered a bundle of its Anti-Malware and Online Armor packages, but has ditched that in favour of this: one integrated suite containing the functionality and protection of both.

It shares the Emsisoft Anti-Malware user interface, and then adds in the core firewall protection from Online Armor. Your money buys you the protection of not just one, but two anti-malware engines (BitDefender alongside Emsisofts own) and offers three layers of protection in the form of a real-time file scanner, zero-day blocker based on suspicious behaviour and a web blocker that prevents you from visiting known unsafe websites.

Emsisoft also comes with an optional PUP module that will alert you whenever potentially unwanted programs like browser toolbars and bundleware try to get on your system.

When it comes to the firewall, while Emsisoft Internet Security includes the same robust engine that powers Online Armor, it utilises a simpler, friendlier UI thats intelligent enough to keep the number of alerts it throws at you to a minimum while keeping you informed as programs attempt to access the internet for the first time after installation.

All of this is wrapped up in a slimline, Windows 10-inspired user interface thats as slick and lightweight as the program itself. Installation is straightforward: enter your license or activate the trial, download the latest updates, choose whether or not to enable PUP protection and then choose your initial scan.

Once set up, click the programs Notification area icon to access the configuration screen. This is split into six sections Overview is self-explanatory, as is Scan, Quarantine (go here to view what files have been blocked and unblock them), Logs and Settings. The Protection tab is the most useful this is where you fine-tune your various protection settings, but for most people these can be left alone.

Delving deep into the program is definitely something for more advanced users, but the fact is that Emsisoft Internet Security will provide protection for any user, whatever their level of technical know-how.

For v2017.2release info (see the changelogfor more):

New: Scanner settings screen which acts as a template for on demand and (new) scheduled scans. Improved: PUP detection in installers. Improved: Program start-up performance. Improved: Integration with Windows Security Center. Improved: Minor improvements related to permissions. Improved: Faster loading of the Behavior Blocker screen. Improved: Minor GUI improvements. Fixed: Issue where missed scheduled scans were not executed.

See the rest here:

Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie

Read More..

Data from internet-connected teddy bears held ransom, security expert says – Fox News

Data from internet-connected smart teddy bears has been leaked and ransomed, exposing childrens voice messages and more than half a million customer accounts, according a security expert.

In a blog post, cybersecurity expert Troy Hunt says that an unnamed source contacted him about a data breach affecting the CloudPets range of stuffed animals. The Bluetooth-connected toys let parents upload and download messages to and from their children via an app.

The CloudPets database had allegedly been left exposed online.

MY FRIEND CAYLA: DOLL BANNED IN GERMANY NOT 'ESPIONAGE DEVICE,' COMPANY SAYS

Someone sent me data from the table holding the user accounts, about 583k records in total, wrote Hunt, in his blog post. There are references to almost 2.2 million voice recordings of parents and their children.

Hunt added that the information was sent to him by someone who travels in data breach trading circles, and said that others had also accessed the information. The CloudPets data was accessed many times by unauthorised parties before being deleted and then on multiple occasions, held for ransom, he wrote.

According to data received by Hunt, the 583,000 records were part of the larger database, which contained more than 820,000 users.

PC MICROPHONES HELPED STEAL HUNDREDS OF GIGABYTES OF DATA FROM UKRAINE FIRMS

Technology news website Motherboard also reports that it was contacted about the breach independently by two security researchers in the last few weeks. With the help of the researchers, Motherboard was able to verify the legitimacy of the breach, it said.

Spiral Toys, the company behind CloudPets, has denied that customers were hacked. In a statement emailed to Fox News.com the Los Angeles-based firm said that it was notified of a potential breach on Feb. 22. "When we were informed of the potential security breach we carried out an internal investigation and immediately invalidated allcurrent customer passwords to ensure that no information could be accessed," it said. "Toour best knowledge, we cannot detect any breach on our message and image data,as all data leaked was password encrypted."

Spiral Toys is also requiring users to choose new increased security passwords. "An email will be sent outinforming customers of the potential compromised login data and will give thema link to create a new password," it said.

BEWARE GOOGLE CHROME SCAM THAT COULD INJECT MALWARE INTO YOUR COMPUTER

The company added that its CloudPet services havebeen running safely since March 2015. "We are taking all steps necessary tocontinue to run safely on our production servers," it said. "We are committed toprotecting our customer information and their privacy in order to ensureagainst any such incidents in the future."

Spiral Toys said that once customers' needs have been addressed and it has documented the incident, itwill file the cyber-crimereport with the State Attorney General in California.

Other internet-connected toys have also been grabbing headlines. The My Friend Cayla doll, for example, was recently banned by The Federal Network Agency in Germany amid hacking fears, although the dolls German distributor insists it is safe to use. Hello Barbie has also been in the security spotlight in recent years, while electronic toy maker Vtech has been targeted by hackers.

HOW AI AND TECH COULD STRENGTHEN AMERICA'S BORDER WALL

Steven Malone, director of security productmanagement at security companyMimecast told Fox News that users need to think carefully about the security implications of the Internet of Things, where a wide range of devices are connected to the web. "Just because you can connect a device to the Internet, it doesnt mean you should!" he wrote.

Follow James Rogers on Twitter @jamesjrogers

See original here:

Data from internet-connected teddy bears held ransom, security expert says - Fox News

Read More..

Encryption patent that roiled Newegg is dead on appeal | Ars Technica – Ars Technica

Enlarge / A figure from the patent that has been asserted against Intel, Google, and hundreds of other companies providing SSL and TLS on their websites.

Patent-holding company TQP Developmentmade millions claiming that itowned a breakthrough in Web encryption, even though most encryption experts had never heard of the companyuntil itstarted a massive campaign of lawsuits.Yesterday, thecompany's litigation campaign was brought to an end when a panel of appeals judges refused (PDF) togive TQP a second chance tocollect on a jury verdict against Newegg.

The TQPpatentwas invented by Michael Jones, whose company Telequip briefly sold a kind of encrypted modem. The companysold about 30 models before the modem business went bust. Famed patentenforcer Erich Spangenbergbought the TQP patent in 2008 and beganfiling lawsuits, saying that the Jones patent actually entitled him to royalties on a basic form of SSL Internet encryption. Spangenberg and Jonesultimately made more than $45 million from the patent.

TQP appealedits case, and oral arguments were heard at the US Court of Appeals for the Federal Circuit on February 8. Yesterday, thethree-judge panel found in Newegg's favor, issuing a short two-pageorder that did not explain its reasoning. While TQP could theoretically still appeal to the full Federal Circuit or to the Supreme Court, it's far from clear there's anylegal issue in the case that would compel either of those bodies to take the case.

Newegg and its former chief legal officer, Lee Cheng, have long taken an uncompromising view on the necessity offighting what they term "patent trolls" in court. The TQP Development trial, in which Cheng faced off against Spangenberg, may end up being Newegg's last high-profile patent trial. In October, Cheng left Newegg for Nashville-based guitar maker Gibson Brands.

The Newegg win did not invalidate theTQP patent, which expired in 2012. Nonew cases have been filed since2014.

After the trial against Newegg, the TQP patent was sold, according to former owner Spangenberg. The new entity's ownership is unclear, but it is still represented by the same lawyers from Los Angeles-based Russ, August and Kabat. TQP lead attorney Marc Fenster didn't respond to a request for comment on the appeals court ruling.

"Neweggs e-commerce encryption systems never infringed TQPs patent, which is directed to outdated modem technology from the 1980s," Newegg lawyer Dan Brean told Ars via e-mail. "The differences are clear and fundamental in terms of how and when data is encrypted and transmitted. That is why Judge Gilstrap entered judgment in Neweggs favor despite the jurys verdict, and the Federal Circuit has now affirmed that judgment."

"Im glad that this is finally over," added Newegg lawyer Kent Baldauf. "We have lived with this a long time as it was filed in 2011. This patent troll case was particularly troubling as it not only involved an antiquated technology that has never been used by modern Internet retailers such as Newegg, but it was also asserted to cover the foundational developments of luminaries in the field of encryption such as Ron Rivest and Whit Diffie.We are thankful that Newegg once again stood up to a patent troll and refused to settle based upon a patent that it did not infringe."

Continued here:

Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica

Read More..