The Upload: Your tech news briefing for Monday, July 20

Samsung rolls out thin, light Galaxy Tab S2... drones do good, evil... hacked data from site for cheaters splashed online

The Samsung Galaxy Tab S2 black version.

The Samsung Galaxy Tab S2 black version.

Samsung's Galaxy Tab S2 is thinnest and lightest yet

Samsung said Monday that its new Android tablets go on sale next month and the lighter, trimmed down products will offer consumers an alternative to Apple's iPad Air 2. There are 9.7-inch and 8-inch models with a 2048 by 1536 pixel Super AMOLED screen; both come with a fingerprint scanner, along with Samsung's eight-core chip, which has two quad-core processors, one running at 1.9GHz, the other at 1.3 GHz.

Some drones deliver medicine, others interfere with firefighters

Drones played to the "you either love them or hate them" audience in the last few days, doing both good and evil (the latter thanks to thoughtless gadget fanatics, not the brainless devices). On the plus side, a delivery drone from Australian startup Flirtey transported 24 medical packages to patients in remote Wise County, Virginia. But more problematic was how operators of recreational drones seeking to get a good look at a wildfire in California forced the grounding of firefighting aircraft, likely allowing the burn to jump a highway and do more damage.

Site that invites users to "have an affair" is hacked

Cheaters who used the site AshleyMadison.com to have a little extramarital adventure are at risk of exposure thanks to hackers who compromised the company's user databases and posted lots of the data online, reports KrebsOnSecurity. Site operator Avid Life Media confirmed the hack to Krebs and told him that the company was "working diligently and feverishly" to take down information posted by the hacker or hackers going by the name Impact Team.

Buzz around loss-making shopping site reminds some of the last dotcom days

Jet.com opens for business on Tuesday, and the online marketplace that likely has years of losses ahead is hoping to establish a valuation of $3 billion, the Wall Street Journal reports. But behind the scenes, the company still lacks the infrastructure to compete with Amazon.com even as it offers customers lower prices, and eager investors seeking to pile on the cash seem to want to party like it's 1999.

As Apple Watch buzz dies down, some key apps are still missing

Why isn't there a Facebook app for Apple Watch? The social network site still hasn't figured out how to make a good experience for the device, compared to what it can offer via smartphone, an executive tells the New York Times. Snapchat and Google are also still on the sidelines, and the newspaper reports that only five of the 20 most popular free iPhone apps in the U.S. have versions for the Apple Watch.

Mass AG probes how Uber and Lyft cater to the disabled

The first official investigation into whether ride-hailing apps Uber and Lyft comply with laws mandating appropriate services to disabled passengers has been launched by the Massachusetts attorney general. The probe will look at the companies' apps as well as their vehicles, including whether they provide cars that are wheelchair accessible.

Homejoy shuts down amid worker classification debate

Homejoy, the at-home cleaning service that's one of a new breed of startups serving as a broker of on-demand services, is shutting down, as companies in that category face legal challenges aimed at forcing them to classify freelancers as employees. Google is reportedly hiring some of Homejoy's engineering and product development staff to help it develop a new home services booking feature.

Watch now

Catch up on the top IT stories from last week: in the World Tech Update Wrap, Intel is breaking Moore's Law, NASA's probe arrives at Pluto and Qualcomm is in trouble with the European Commission.

One last thing

The Washington Post explores how the rise of the Islamic State and its expert use of online tools is leaving tech companies torn between free speech and security.

Join the CSO newsletter!

Error: Please check your email address.

Tags securityAshleyMadison.comSamsung ElectronicsHomejoyLyftmobileJet.comUber TechnologiesAppleconsumer electronicsGoogle

More about Amazon.comAppleAvidEuropean CommissionFacebookGalaxyGoogleIntelNASAQualcommSamsungUberWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by IDG News Service staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place