The Upload: Your tech news briefing for Thursday, March 12

New flagship phones on the way from LG, Huawei... Apple struggles with 11-hour cloud outage... Impatience grows over EC's Google probe

Richard Yu, Chief Executive Officer of the Consumer Business Group at Huawei Technologies, at the launch of the Ascend P7

Richard Yu, Chief Executive Officer of the Consumer Business Group at Huawei Technologies, at the launch of the Ascend P7

High-end phones on the way with LG, Huawei next in line

If you were disappointed with the shortage of new flagship smartphones at Mobile World Congress last week, just hang on until next month. LG Electronics is expected to announce the highly anticipated successor to its good-looking G3 -- the G4? -- that may sport a 1620 x 2880 pixel display. Huawei has started to post teasers for an event on April 8 for its P8, likely to offer a screen that's a bit larger than the Ascend P7's 5 inches, better battery life and an improved camera. Even Sony, which badly needs a big hit, may jump in the fray, with the Xperia Z4.

Apple loses iTunes, iCloud for hours

Apple struggled mightily to fix an outage that affected key e-commerce and productivity services for hours on Wednesday, including iTunes, iCloud and the App Store.

The problems began at around 5 a.m. in the eastern U.S. and weren't fully resolved until 11 hours later. Apple blamed the outage on an internal DNS error. Also affected: the iBooks Store. ZDnet estimated that Apple lost around US$2.2 million per hour in revenue during the outage.

Members of European Parliament want progress on the Google anti-trust probe

European legislators want the European Commission to accelerate the pace of its investigation into possible anti-trust violations by Google. A large majority in Parliament endorsed a scathing study penned by one of its members that says the Commission risks losing its cred on digital issues if the four-year probe keeps dragging on. The investigation, the report says, "has achieved no demonstrable results" in its attempt to determine whether Google gives its own services preferential treatment in search results.

Facebook faces class action for unauthorized purchases by kids

A judge has ruled that Facebook has to face a class-action suit from parents demanding refunds for unauthorized purchases by kids on its site. The plaintiffs argue that its policies don't do enough to protect minors (or really, the parents whose payment cards said minors might get their hands on). California law says contracts can be voided if they involve personal property the child does not own. The certified class includes potentially millions of Facebook users who were minors between 2008 and 2015.

Google backup service targets enterprises

Google has unveiled a new backup storage service that gives companies a cheaper way to store and archive data in volume. Cloud Storage Nearline is meant as an alternative to running in-house storage systems and also targets startups like mobile apps companies that need a way to store user data. The costs is just one cent per GB per month, and Google promises that the data can be retrieved within about three seconds.

Is a Lyft or Uber driver a contractor or employee?

Much of the entrepreneurial allure of the "sharing economy" is that companies can take a cut of fees paid to individual service providers without incurring the troublesome overhead of actually employing them -- but a case in California court questioning whether drivers for Lyft and Uber are contractors or employees may threaten that business model. On Wednesday, judges in two separate cases refused to dismiss suits brought by the drivers and referred them for jury trial. If the companies have to treat their drivers as employees, they will incur higher costs, and have to let them keep customers' tips.

Twitter latest to ban stolen nude photos and revenge porn

Twitter has banned the posting of stolen nude photos and revenge porn on its site, meeting growing demands from users that it place some checks on such content. The social media site has now threatened to lock the accounts of those who post the prohibited material until they remove it.

Privacy advocates push for more protection for data stored in the cloud

A coalition including tech companies and digital rights advocates on Wednesday renewed their call for Congress to change a 29-year-old U.S. electronic privacy law called the Electronic Communications Privacy Act [ECPA]. They want all email and documents stored in the cloud to have the same privacy protections from police searches as newer files or paper records stored in a file cabinet. Right now, warrants aren't needed to go after digital files stored with a third party for more than 180 days.

Code name found in Equation group malware suggests link to NSA

Security researchers analyzing malware used by a sophisticated espionage group are finding more clues that point to the U.S. National Security Agency being behind it. Kaspersky Lab released an extensive report in February that detailed the attack techniques and malware tools used by the group, which it calls Equation, but stopped short of linking it to U.S. intelligence. But now, Kaspersky is publishing findings that include what look like NSA fingerprints.

Watch now

How does the new, ultra-thin and light Apple MacBook handle? PC World takes it for a spin.

One last thing

MySpace stopped being a relevant social network years ago, but there are lessons to be learned in its failure. The Guardian sat in on a talk by a former executive on what went wrong.

Join the CSO newsletter!

Error: Please check your email address.

Tags Huawei TechnologiesLG Electronicssecurityeuropean commissionlegaltwitterinternetUber TechnologiesFacebookAppleGoogle

More about AppleAscendEuropean CommissionEuropean ParliamentFacebookGoogleHuaweiKasperskyLGNational Security AgencyNSASonyUber

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts