A draft resolution calling for the break-up should be finalized early next week, with a vote potentially on Thursday, according to a report from The Financial Times. While the European Parliament has no formal power to break up the company, a vote to split Google could put pressure on the European Commission, the EU’s executive body.
The motion is backed by several German politicians and by the Parliament’s two largest political blocs, the European People’s Party and the Socialists, according to the newspaper. The Reuters news agency also reported on the plan.
A Google spokeswoman didn’t immediately respond to a request for comments about the proposed break-up motion.
Google currently faces a long-running antitrust investigation in the EU. Google and the EU’s previous antitrust commissioner, Joaquín Almunia, agreed to a set of terms back in February, but after complaints from online publishers and other groups, the commission demanded more concessions from Google.
Consumer Watchdog, a consumer rights group and long-time Google critic, applauded the move. “This is exactly what needs to happen,” John Simpson, Consumer Watchdog’s Privacy Project director, said by email. “Search should be separated from Google’s other businesses. We called for this back in 2010 and the need to do this has become even clearer as Google’s power has increased.”
In 2010, the group called on the U.S. Department of Justice to split Google’s search service from other lines of business.
One of the better-known sites, Insecam, appeared to have gone offline after the warnings, but at least one site that publishes similar content was still available.
The websites show footage from security cameras used by businesses and in people’s homes, including CCTV networks that secure buildings and even cameras built into baby monitors.
Last week the U.K.’s data protection watchdog warned of a website based in Russia that accesses thousands of webcams using their default logins and passwords, which it said can be easily found online.
The U.S. Federal Trade Commission also weighed in, warning users to ensure video feeds are encrypted and that wireless routers are protected by passwords.
“Once you’ve bought your IP camera, check its security settings and keep its software up-to-date,” wrote Nicole Vincent Fleming, a consumer education specialist with the FTC in a blog post.
Security experts have long warned that not changing the default credentials on such devices can allow them to be accessed by hackers.
The domain name Insecam.cc was registered through GoDaddy earlier this month, though whoever registered it chose to keep their registration details private in the “whois” domain directory.
The U.K. information commissioner has reportedly urged the Russian authorities to take down the site.
EBay Inc is making over its local delivery program and extending more logistics options to smaller merchants that make up the bulk of the e-commerce giant’s sprawling base of marketplace sellers, according to one of its executives.
More of eBay’s smaller sellers, including some with annual sales under $100,000, will allow shoppers to buy items online that can be picked up in stores, an option now used by big companies such as Best Buy Co Inc and Toys ‘R’ Us.
EBay also plans to dismantle its standalone mobile app for its $5 same-day delivery service “eBay Now” as soon as this week. The service will instead be folded into eBay’s mobile app and website.
“The big play in the U.S. has been around buy online, pick-up in store,” Tom Allason, head of eBay Local, said Wednesday.
The shift reflects how eBay and other technology companies, including Amazon.com Inc and Google Inc, still struggle with the high cost of same-day delivery. Only a fraction of a small retailer’s sales come from customers who also opt for same-day delivery, making it difficult to make a profit.
“That’s a part of why delivery is only one piece of the equation,” Allason said in an interview.
Earlier, the e-commerce giant intensified efforts to court retailers as it prepares to split its marketplaces division next year from PayPal, the payments unit that has been the fastest-growing part of its business.
EBay had planned to expand same-day delivery to 25 markets by the end of 2014, but it is only available in New York, San Francisco, the broader Bay Area, Dallas and Chicago.
EBay is exploring other delivery options for the United States, Germany and other markets, including the “click-and-collect” model used by Shutl in the United Kingdom, in which shoppers pick up certain eBay purchases from British retailer Argos.
The inclusion of the paid-for Beats service in an iOS software update, which would instantly make it available on millions of iPhones and iPads, could happen as early as March, the daily reported, citing people familiar with the situation.
The move will mark the company’s first big push into subscription music, at a time when downloads from its iTunes are in decline, the paper said.
The service, which is likely to be rebranded under the iTunes label, will compete with music streaming services like Spotify, Pandora, and Soundcloud.
Google Inc said last week that YouTube is rolling out a long-awaited paid monthly music subscription service called YouTube Music Key.
Apple, which bought music streaming and audio equipment company Beats in May for $3 billion, could not immediately be reached for comment.
Finland’s Nokia unveiled a new brand-licensed tablet computer which is designed to rival Apple’s iPad Mini, just six months after the company sold its underperforming phones and devices business to Microsoft for over $7 billion.
Nokia, a name which was once synonymous with mobile phones until first Apple and then Samsung Electronics eclipsed the Finnish company with the advent of smart phones, said the manufacturing, distribution and sales of the new N1 tablet, will be handled under license by Taiwan’s Foxconn.
The aluminum-cased N1, which runs on Google’s Android Lollipop operating software but features Nokia’s new Z Launcher intelligent home screen interface, is due to be in stores in China in the first quarter of next year for an estimated price of $249 before taxes, with sales to other markets to follow.
Sebastian Nystrom, the head of products at Nokia’s Technologies unit, said the company was looking to follow up with more devices and will also look into eventually returning to the smartphones business by brand-licensing.
“With the agreement with Microsoft, as is customary, we have this transition and we can’t do smartphones … We have a time limit. In 2016 we can again enter that business,” Nystrom told Reuters.
“It would be crazy not to look at that opportunity. Of course we will look at it.”
Microsoft last week dropped the Nokia name on its latest Lumia 535 smartphone, which runs on its Windows Phone 8 operating system, but still uses the brand for more basic phones.
After the Microsoft sale Nokia was left with its core network equipment and services business plus its smaller HERE mapping and navigation unit and Nokia Technologies, which manages the licensing of its portfolio of patents and develops new products such as the N1 and the Z Launcher.
The end-to-end encryption comes thanks to a collaboration between WhatsApp and Open Whisper Systems, an open-source development company focused on secure communications.
Facebook-owned WhatsApp has more than 600 million users who log in monthly, making Open Whisper’s encryption deployment the largest ever in the area of end-to-end encrypted communication, Open Whisper said.
The encryption is on by default. It’s only available for Android right now, though the companies are working to roll out support for other platforms.
End-to-end encryption has gained attention following the disclosures about government surveillance last year by former NSA contractor Edward Snowden. Meanwhile, the flood of cyber attacks targeting retailers and Internet companies alike have highlighted the need for better data security.
Edward Snowden himself has called end-to-end encryption the best possible form of encryption, because it keeps people’s data encrypted even while it’s on company servers. The data, in theory, can only be decrypted on people’s personal devices. That means outside groups must target individuals’ machines if they want to access the data.
Some other mainstream services like Google have released products to facilitate end-to-end encryption. And along with Apple, Google’s also working to make encryption the default on smartphones.
But end-to-end encryption still is primarily offered by lesser known companies that don’t rely on people’s data for advertising.
WhatsApp’s end-to-end encryption uses Whisper’s TextSecure protocol, which encrypts text messages over the air and on people’s phones.
WhatsApp declined to comment further on the encryption deployment.
Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.
The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.
It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.
“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”
The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.
The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.
However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.
These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.
The world’s No.1 Internet social network with 1.35 billion monthly users has been quietly testing a version of its website aimed at workplace collaboration. The service, dubbed Facebook at Work, allows users to exchange messages and share documents using Facebook’s scrolling news feed and other familiar features from the consumer version of Facebook.
The professional version of Facebook, which could compete with services such as LinkedIn Corp, as well as Salesforce.com Inc and Microsoft Corp, would allow users to maintain special profiles that are distinct from their existing Facebook profiles, the person said. Work activities would not be shared on a user’s personal profile, and the baby photos, videos and general banter popular in the consumer version of Facebook would not encroach into the professional version.
A Facebook team in London is leading the effort and a small number of companies are currently running a pilot version of the service, the person said.
It is still unclear how Facebook plans to make money from the professional service. Facebook is not currently charging a subscription fee for the version being tested, according to a report in the Financial Times, which first reported news of the service. Facebook currently generates the bulk of its revenue from ads that appear on its existing service.
Soon to be released bracelets with technology from Intel Corp and design cues from fashion brand Opening Ceremony will connect the wearer with Facebook, Google and Yelp via an AT&Tdata plan,no smartphone necessary.
Called My Intelligent Communication Accessory, or MICA, the snakeskin bracelets are aimed at fashion-conscious women and are an attempt by the two companies to stand out in a growing field of often-clunky smartwatches and fitness brands that have yet to catch on widely with consumers.
“We really approached this first and foremost about why would a woman want to wear this everyday, and how can it be incorporated into her wardrobe,” Humberto Leon, creative director at Opening Ceremony, said in a phone interview last week.
As well as lapis stones, obsidian and an 18k gold coating, the devices include a sapphire curved screen on the inside of the wrist that displays text messages, calendar items and events from Google and Facebook, and recommendations of nearby restaurants and stores from Yelp.
After Intel was late to smartphones and tablets in recent years, Chief Executive Brian Krzanich has been determined to make sure the top chipmaker is at the forefront of future trends in mobile computing.
Krzanich gave the green light for the chipmaker to develop the bracelet with Opening Ceremony after his wife wore a prototype for several days and liked it, he recently said.
Incoming alerts discreetly vibrate the bracelet instead of making a noise. Its $495 price tag includes a two-year data plan with AT&T, which means it does not rely on a smartphone for connectivity, as do most smartwatches, the companies said in a press release.
As well as working with Opening Ceremony, Intel in March bought fitness bracelet maker Basis Science and it has teamed up with watch retailer Fossil Group to develop other wearable computing devices.
The social network has launched Privacy Basics, a page set up to offer users advice and how-to tips to make sure they have the level of privacy they want for their Facebook profiles.
Facebook also is giving users an early look at changes the company plans on making to its terms of service, data policy and cookies policy. Users have a week to make comments or suggestions about what’s coming.
“Over the past year, we’ve introduced new features and controls to help you get more out of Facebook, and listened to people who have asked us to better explain how we get and use information,” wrote Erin Egan, Facebook’s chief privacy officer. “Protecting people’s information and providing meaningful privacy controls are at the core of everything we do, and we believe today’s announcement is an important step.”
Facebook has had its share of privacy controversies. It has repeatedly been criticized for its privacy policies and even for the difficulty in using privacy controls.
“This may showcase that Facebook is finally beginning to understand perceptions are important,” said Rob Enderle, an analyst with the Enderle Group. “This really isn’t a change in policy but a change in how they communicate what they are doing. This kind of thing can improve trust and, if they keep it up, it should improve customer retention and satisfaction.”
Facebook, he added, may be losing some of the “arrogance” it had previously shown users.
Zeus Kerravala, an analyst with ZK Research, said Facebook’s move could encourage a lot of users to increase the privacy around their posts and photos.
The new Privacy Basics page offers interactive guides to what Facebook says are the most commonly asked questions about how users can control their information.
After two years of showing up at high-profile events wearing Google Glass, the gadget that transforms eyeglasses into spy-movie worthy technology, Google co-founder Sergey Brin arrived recently to a Silicon Valley event noticeably bare-faced. He’d left his pair in the car, Brin told a reporter. The Googler, who heads up the top-secret lab which developed Glass, has hardly given up on the product — he recently wore his pair to the beach.
But Brin’s timing is not propitious, coming as many developers and early Glass users are losing interest in the much-hyped, $1,500 test version of the product: a camera, processor and stamp-sized computer screen mounted to the edge of eyeglass frames. Google Inc itself has pushed back the Glass roll out to the mass market.
While Glass may find some specialized, even lucrative, uses in the workplace, its prospects of becoming a consumer hit in the near future are slim, many developers say.
Of 16 Glass app makers contacted by Reuters, nine said that they had stopped work on their projects or abandoned them, mostly because of the lack of customers or limitations of the device. Three more have switched to developing for business, leaving behind consumer projects.
Plenty of larger developers remain with Glass. The nearly 100 apps on the official web site include Facebook and OpenTable, although one major player recently defected: Twitter.
“If there was 200 million Google Glasses sold, it would be a different perspective. There’s no market at this point,” said Tom Frencel, the Chief Executive of Little Guy Games, which put development of a Glass game on hold this year and is looking at other platforms, including the Facebook Inc-owned virtual-reality goggles Oculus Rift.
Several key Google employees instrumental to developing Glass have left the company in the last six months, including lead developer Babak Parviz, electrical engineering chief Adrian Wong, and Ossama Alami, director of developer relations.
Researchers at the University of Utah have developed self-healing software that detects, expunges and protects against malware in virtual machines.
Called Advanced Adaptive Applications (A3), the software suite was created in collaboration with US defence contractor Raytheon BBN over a period of four years.
It was funded by DARPA through its Clean-Slate Design of Resilient, Adaptive, Secure Hosts programme, and was completed in September, Science Daily reported on Thursday.
A3 features “stackable debuggers”, a number of debugging applications that cooperate to monitor virtual machines for indications of unusual behaviour.
Instead of checking computer object code against a catalogue of known viruses and other malware, the A3 software suite can detect the operation of malicious code heuristically, based on the types of function it attempts.
Once the A3 software detects malicious code, it can apparently suspend the offending process or thread – stopping it in its tracks – repair the damage and remove it from the virtual machine environment, and learn to recognise that piece of malware to prevent it entering the system again.
The self-healing software was developed for military applications to support cyber security for mission-critical systems, but it could also be useful in commercial web hosting and cloud computing operations.
If malware gets into such systems, A3 software could detect and repair the attack within minutes.
The university and Raytheon demonstrated the A3 software suite to DARPA in September by testing it against the notorious Shellshock exploit known as the Bash Bug.
A3 detected and repaired the Shellshock attack on a web server within four minutes. The project team also tested A3 successfully on another six examples of malware.
Eric Eide, the research associate professor of computer science who led the A3 project team along with computer science associate professor John Regehr, said: “It’s pretty cool when you can pick the Bug of the Week and it works.”
The A3 self-healing software suite is open source, so it’s free for anyone to use, and the university researchers would like to extend its applicability to cloud computing environments and, perhaps eventually, end-user computing.
Professor Eide said: “A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven’t tried those experiments yet.”
“We’ve made Skype available on computers, mobile phones, TVs and even games consoles,” wrote Jonathan Watson, Skype product marketing manager for Microsoft, in a blog post. “Expanding to different platforms has helped us grow to over 2 billion daily minutes (that’s over 33 million hours) of voice and video calls…. Now, not only can Skype be used on just about any screen you lay your hands on, but you can also enjoy Skype on a browser.”
Skype for Web, which is expected to roll out in the coming weeks, will be available via Internet Explorer, Chrome on Windows, Firefox or Safari.
“If you already use Skype, go to Skype.com and sign in to see all your contacts and latest conversation history,” wrote Watson. “We’re making Skype for Web available to small number of existing and new users to begin with, and gradually rolling out worldwide in the coming months — look out for an invite when you sign in to your Skype account on Skype.com.”
Zeus Kerravala, an analyst with ZK Research, said this is a good move for Microsoft because it opens Skype up to more users in more places.
“The requirement to have a client means one might not always be able to use Skype,” he said. “For example, if I’m on a shared computer, say in an airport, I can’t use Skype…. Maybe I can’t get on the airport Wi-Fi, but there’s a public Internet terminal or I might want to use a friend’s computer. But with Skype Web, now I can. So now Skype can be pervasive across all devices, not just ones that I happen to own.”
Emergency responders will be able to better locate callers who dial 911 on their cellphones from indoors as the U.S. wireless industry improves caller-location for the majority of such calls in the next few years.
Historically, satellite and other technologies have helped emergency responders find people who called from outdoors, while landlines commonly automatically provided dispatchers with an address. Cellphone calls from indoors, however, have been tougher to locate because walls weaken signals.
Verizon Communications Inc, AT&T Inc, Sprint Corp and T-Mobile US have reached a deal with public-safety groups to get specific location data to 911 dispatchers for 40 percent of wireless 911 calls within two years and 80 percent within six years.
The wireless association CTIA announced the agreement with the Association of Public-Safety Communications Officials and the National Emergency Number Association on Friday.
The deal marks a milestone in the long-running effort to help first-responders get to emergencies quickly as people increasingly rely on cellphones for 911 calls and to improve their ability to locate emergencies in places such as schools, shopping malls and hotels.
The Federal Communications Commission has long required data from wireless 911 calls to include location information based on outdoor technologies. But technology has been insufficient to direct responders to specific floors, rooms or particular areas of a building.
The FCC earlier this year challenged the wireless industry to help responders locate emergencies indoors, within 50 meters horizontally and 3 meters vertically, estimating it could save more than 10,000 lives every year.
The “heightened location accuracy,” available to supporting networks and handsets, will find callers through nearby devices connected to Wi-Fi or Bluetooth that will be logged with a specific location in a special emergency-services database.
Over time, the wireless carriers plan to ensure each handset can turn on Bluetooth or Wi-Fi connectivity in emergency-call instances, if it is disabled.
The FCC had proposed the rollout timeframe of two years for 67 percent of cellphone calls and five years for 80 percent, though the companies and public safety groups reached a slightly different consensus.
Sophos is betting that understaffed IT departments will want to use the cloud to deal with cyber attacks. Kris Hagerman, CEO of the computer security company, said SMBs often have small IT departments and may have no one dedicated to full-time security.
Sophos thinks the answer will be a cloud-based management console to work across its entire security portfolio, Hagerman said. The company’s UTM firewall product handles email security, endpoint and network protection, wireless, web filtering and web server defence.
The company has linked its UTM system to its endpoint protection product so the two can share data, which results in better overall security and easier management, Hagerman said. The system has been given the thumbs up from analyst outfit Gartner which said that its “ease of use consistently rates high. The interface contains general guidance on what each feature does, which is useful for SMB operators, who are not all security experts.”
Hagerman said Sophos’ end user and network businesses—it’s two main lines—are growing twice the rate of the market. There isn’t a magic formula to that growth, he said.