The Upload: Your tech news briefing for Wednesday, February 11

Kill switches lower smartphone thefts ... Anthem hit for failure to communicate ... IBM's Watson is learning Japanese ... and more tech news

Smartphone in danger.

Smartphone in danger.

Smartphone thefts fall after kill switches come in

Law enforcement officials who pushed hard for vendors to make smartphones a less attractive target for theft by adding "kill switch" features are pleased to know the tactic is working. Statistics to be released Wednesday show smartphone thefts, particularly for iPhones, trending down significantly in New York, London and San Francisco.

Anthem hit for failure to communicate

Inadequate security practices let hackers steal personal information on about 80 million customers of Anthem, and now inadequate follow-up with those victims by the health insurer has attorneys general in ten U.S. states demanding immediate action. Anthem said last week it would offer free credit monitoring and identity theft protection to victims, but since then, the AGs say, it has provided few additional details and no information about how individuals can sign up. They're demanding that the insurer commit to reimbursing consumers for hack-related losses incurred between the breach and whenever victims get access to credit and identity theft safeguards.

Why a giant multinational is trying crowdfunding

Sony isn't joining the film students and musicians on Indiegogo because it needs to find $50,000. Rather, it's put its MESH project on the crowdfunding site as a way to get early adopters to give it feedback on an innovative new project before it goes to market. Now if only Google had thought of that with Glass!

IBM's Watson is learning Japanese

IBM has struck a deal with SoftBank Telecom to bring its Watson cognitive computing technology to Japan, a move that will add the Japanese language to the system's repertoire and expand its use across new frontiers. Besides hosting and reselling Watson tech, Softbank is aiming to get independent developers to build new capabilities for the platform, the New York Times reports.

New U.S. Cyber Threat center is all about the information

The U.S. is setting up the new Cyber Threat Intelligence Integration Center in an effort to improve communication among network defenders, government agencies and law enforcement, says a senior Obama administration official. The CTIIC won't take over the cybersecurity responsibilities of other agencies but will be modeled after the National Counterterrorism Center, established after Sept. 11, 2001, to coordinate information about terrorist threats.

Apple breaks a new stock market record: $711 billion at the close

Apple stock has traded at levels that valued the company above $700 billion before, but Tuesday marked the first day that its stock closed (at $122.02) at a level that crossed the benchmark -- and then some -- to $711 billion. The Wall Street Journal says that's a first for a U.S. company. Number two Exxon Mobil has a market cap of about $385 billion while the closest tech competitor is number four Microsoft at $349 billion.

Chinese hackers targeted banks and military via ad on

Security researchers say that a Chinese hacking group infiltrated the site in November and used it to launch targeted attacks against site visitors from U.S. banking and defense companies. The attack took advantage of unpatched vulnerabilities in Adobe Flash and Microsoft Internet Explorer 9 and was launched from the "Thought of the day" Flash widget that appears when people first visit the financial magazine's site, said Invincea.

Watch now

Boston Dynamics is showing off its latest robots -- including an electricity-powered "dog" with sensors sophisticated enough to allow it to stay upright when kicked.

One last thing

Intel made waves at CES with a pledge to spend $300 million increasing diversity in its ranks. Here's what that promise really means.

Join the CSO newsletter!

Error: Please check your email address.

Tags AppleBoston DynamicsIBMsecurityhardware systemssonyintelinternetAnthem

More about AppleGoogleIntelMicrosoftSoftbankSonyThoughtThreat IntelligenceWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place