Apple has added two medical wearables specialists to its team, reigniting speculation that the upcoming "iWatch" could track health issues as well as provide a wrist-worn window to your iPhone. Former medical device specialists from Vital Connect and Sano Intelligence each quietly joined Apple in December, 9 to 5 Mac spotted, bringing expertise in biosensors, minimally-invasive blood monitoring, and more.
A new examination of the seemingly bottomless well of Snowden documents describes an internal NSA catalog of dead ringers for consumer hardware that the NSA can deploy on unsuspecting targets' systems. For example, when a target orders a new hard drive, router, monitor cable, or USB plug online, the NSA can intercept the order and send a bugged clone, which the target would then install by his own volition. The catalog includes hardware by Seagate, Samsung, Cisco, Huawei, Dell and many others.
The first grumblings of a new game from Killer Instinct studio started to make the rounds a few weeks back when concept art for a new game leaked. That concept art was created by James Paick, the guy who did the artwork for the game The Last of Us. After that art leaked no details of the game were offered by the artist or the game studio, Double Helix.
Since the first demonstration of the plausible future abilities of Google Glass, instant facial recognition has been one of the most exciting ideas in the pipeline. According the the development group Facial Network, the time for real-time facial recognition through Google Glass is coming a lot sooner than we originally expected. This isn't an app developed by Google, it's a 3rd party developer group - they've gone and done it first!
Google, Apple, Microsoft, Facebook, and other big names in tech have joined forces to protest government surveillance worldwide, calling for "Global Government Surveillance Reform" to better balance keeping citizens safe while also preserving their privacy. The group, which also includes AOL, LinkedIn, Twitter, and Yahoo, sets out five principles for transparency, oversight, accountability, and respect, penning a collective letter to President Obama and the US Congress in which they allege the balance of power has tipped too far away from the people and too much toward the state.
When it comes to privacy, there are many people who worry that the government is spying on their online habits. In some cases, government spying might even be true. A growing number of major technology companies are joining in a coalition called the Reform Government Surveillance group.
The FBI has been using malware as a means to hunt down certain suspects, as exemplified in the case of a man who has been making bomb threats since June 2012, reports the Washington Post. Some of the malware was a surveillance program planted onto the suspect's computer when he signed into his Yahoo account, but the malware didn't work. The suspect, Mohammed Arian Far -- "Mo" for short -- has not yet been apprehended, though the FBI continues its high-tech search tactics of Mo and others.
The credentials for two million compromised accounts for social media sites and other websites have been posted online. They include credentials for Facebook, Yahoo, Google, Twitter, LinkedIn, a payroll service, and many others. The security breaches are believed to have been made possible through malware installed on user computers, not weaknesses in the websites themselves.
The Internet grows in leaps and bounds, something various statistics have shown in a variety of ways. Percentages are one way to show this, as very large numbers can be hard to digest, but something being called an "Internet Minute" has provided an interesting perspective on the growth, comparing numbers taken from a single minute last year from six big Internet companies with numbers taken from the same companies this year.