The Upload: Your tech news briefing for Thursday, February 12

Governments tighten grip on net ... Facebook supersizes open networking switch ... Apple gets bonded labor out of supply chain ... and more

Restrictive governments getting better at censoring the Internet

Authoritarian government are censoring the Internet more aggressively and using more sophisticated technology, according to the annual World Press Freedom Index being released Thursday by Reporters Without Borders. China is judged "a pioneer" in the field, after blocking access to all Google services during the last year and stamping out domestic coverage of protests in Hong Kong and the 25th anniversary of the Tiananmen Square Massacre. Iran is also high on the list, as it works on a national intranet that will keep citizens off the global Internet.

Facebook supersizes its open networking switch

Facebook is open-sourcing more technology that it has developed for its own data centers: this time with a 16-port "Wedge" switch design, the basis of a new modular platform that can link racks of servers. Facebook hopes the work it is putting into open networking hardware will help to create a broad ecosystem of suppliers and developers, similar to what's grown up around Linux.

Apple shaking indentured servitude out of its supply chain

There's progress on Apple CEO Tim Cook's commitment that the expensive electronics his company sells don't come at the cost of exploiting those who make them. The company's latest report on labor practices says that it has ended a system that put contract workers in debt to recruiters before they even began their jobs. Apple is forcing its suppliers to repay any workers who were charged recruitment fees; last year US$4 million was reimbursed to over 4,500 people.

Critical vulnerability put Windows systems at risk

Microsoft has finally put out a fix for a problem it learned of more than a year ago: a fundamental design flaw in the feature that organizations use to centrally manage Windows systems, applications, and user settings -- one that put computers at risk of full compromise. The flaw remained undiscovered for at least a decade and to fix it, Microsoft had to re-engineer core components of the operating system and add several new features. The extent of the repair also means that no patch will be made available for the millions of businesses still running Windows Server 2003, which is due to reach the end of extended support in July.

Intel Core M processors may help thin out Windows tablets

New Intel chips based on its Skylake design are set to arrive this year, and should allow for thinner Windows tablets that may stack up better against Apple's latest iPad Air. The new Core M chips are due in the second half of the year and will also extend battery life in tablets, hybrids and laptop PCs, Intel CEO Brian Krzanich said at the Goldman Sachs Technology and Internet conference Tuesday. We may find out more about Core M at Taipei's Computex in June.

Senators eye privacy, security laws for Internet of Things

At a Senate hearing on Wednesday, several Democrats said they are exploring legislation that would enforce privacy and security standards for connected devices. Sen. Edward Markey of Massachusetts plans to introduce a bill that will focus on security standards and the data collected by connected automobiles. It would mandate that collected data be encrypted, and that drivers could opt out of data collection without disabling navigation. It would also require that the car manufacturer or a security vendor be able to detect and respond to hacking attempts in real time, among other requirements.

Microsoft picks up Sunrise calendaring app

Microsoft is buying Sunrise, a company that makes a calendaring app for iOS and Android mobile devices, the corporate VP for Outlook and Office 365 said in a blog post Wednesday. Rajesh Jha said the app will remain on the market and free after the acquisition, and will continue to support a range of third-party apps and calendar services.

Free 'search engine on steroids' tracks criminals online

A powerful data-mining and search tool developed with U.S. military funding is being used by investigators to reveal the links in online criminal networks. The Wall Street Journal reveals how Memex is being used to identify and locate sex traffickers.

Watch now

PC World puts the Dell Venue 8 7000 through its paces and finds a solid Android tablet.

One last thing

Wired decided to look at vaccination rates at the day-care centers used by Silicon Valley's elite tech workers; what they found may surprise you.

Join the CSO newsletter!

Error: Please check your email address.

Tags AppleReporters Without BordersMicrosoftNetworkingsecuritysoftwareintelinternetFacebook

More about AppleBordersComputexDellFacebookFreedomGoldmanGoogleIntelLinuxMicrosoftSunriseTechnologyWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts