The Upload: Your tech news briefing for Wednesday, June 17

Baseball gets a hacking scandal... Airbus plans Internet satellites... European court holds site liable for comments

A C-17 Globemaster III flies over Busch Stadium in St. Louis before the Cardinals-Giants baseball game July 7, 2007. The flyover was part of Air Force Week St Louis.

A C-17 Globemaster III flies over Busch Stadium in St. Louis before the Cardinals-Giants baseball game July 7, 2007. The flyover was part of Air Force Week St Louis.

Say it ain't so: FBI probes alleged Cardinals-Astros hack

Even America's pastime isn't safe from cybercrime: the FBI is investigating allegations that the St. Louis Cardinals hacked into computer systems belonging to rival baseball team the Houston Astros. The investigation centers on the baseball operations database, which is said to contain statistics, video and other vital information about players.

Airbus joins the Internet satellite crowd

Count European consortium Airbus in on the business of delivering Internet service via satellites, the Verge reports. It's going to design and build 900 orbiters for Richard Branson's OneWeb, which aims to provide LTE, 3G, and Wi-Fi to rural communities.

European court holds news site liable for user comments

No, it's not a death knell for free speech in Europe, but the European Court of Human Rights nonetheless rattled some teacups when news broke Tuesday that it had ruled against an Estonian news site, holding it liable for hate-filled user comments. The ruling doesn't have immediate legal significance beyond the narrow confines of the case at hand, according to experts consulted by Ars Technica UK: it simply confirmed that Estonia's laws are not incompatible with the European Union's.

Buggy open-source components make many apps insecure by design

The unbridled use of open-source components by both commercial and in-house business software developers could be leading to a proliferation of apps that are vulnerable to malware, says a company that manages one of the largest public repositories of Java components. And poor inventory practices mean that when there's a known flaw in a given component, developers won't be able to tell which of their apps use it, according to Sonatype. About 7.5 percent of components downloaded last year had known vulnerabilities.

U.S. pols fear big government breaches put national security at risk

Two recently disclosed data breaches at the U.S. Office of Personnel Management could endanger national security and the lives of federal workers in intelligence or other sensitive jobs, according to some lawmakers. OPM officials said they are still investigating the breach of the security clearance database and declined to estimate how many people are affected or whether another government was responsible; they also declined to talk in a public hearing about whether intelligence or military workers were affected by the breach.

SAP steps up its IoT push

SAP has rolled out new features in its Hana platform to help customers connect with IoT at enterprise scale and manage big data more effectively. One new feature enables organizations to synchronize data between the enterprise and remote locations at the edge of the network. Expanded data-integration capabilities in Hana will support the latest Hadoop distributions from Cloudera and Hortonworks.

Time Warner hit with first net neutrality complaint

Now that net neutrality rules are in effect in the U.S., one company is wasting no time seeking to ensure that cable giant Time Warner starts playing by the rules, the Washington Post reports. Commercial Network Services says it will file a complaint with the Federal Communications Commission accusing the cable company of charging unreasonable rates to deliver its streaming videos to Time Warner's customers.

Amazon goes to Congress to ask for fewer drone rules

Amazon on Wednesday will call on the U.S. Congress to embrace automated drone flights and come up with a set of simple, nationwide regulations that will allow its proposed Prime Air service to get off the ground. The rules proposed recently by the Federal Aviation Administration won't allow Prime Air to fly, so the head of its public policy team is heading over to testify before the U.S. House Committee on Oversight and Government Reform.

Watch now

Take three minutes and catch up with the E3 gaming expo happening in Los Angeles this week.

One last thing

Is the so-called sharing economy ruining our cities? Housing experts debate whether AirBNB is causing rising rents in San Francisco and New York.

Join the CSO newsletter!

Error: Please check your email address.

Tags amazon.comU.S. Office of Personnel Managementtime warnerAirbnbSonatypeU.S. Federal Aviation AdministrationinternetEuropean Court of Human RightsHortonWorksairbussecurityCommercial Network ServicesSAPU.S. Federal Communications CommissionsoftwareOneWebcloudera

More about ClouderaCountFBIFederal Aviation AdministrationFederal Communications CommissionTime Warner

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place