Category Archives: Technology

Silicon valley & technology news. Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way. The word technology can also mean the products resulting from such efforts, including both tangible tools such as utensils or machines, and intangible ones such as software. Technology plays a critical role in science, engineering, and everyday life

Robotic Farm Promises Cheap Local Produce

The U.S. farm-to-table trend is definitely one of the latest. Americans are hungry for fresh, organic produce in their homes, and in many cases they are willing to pay more for it. But in an urban setting, residents don’t have a farm next door. The company Iron Ox is looking to change that, with the help of robust robotics. VOA’s Kevin Enochs has the story.

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Plans to Rewrite Rules that Impede Self-driving Cars

The Trump administration is moving ahead with plans to revise safety rules that bar fully self-driving cars from the roads without equipment such as steering wheels, pedals and mirrors, according to a document made public on Thursday.

The National Highway Traffic Safety Administration (NHTSA) “intends to reconsider the necessity and appropriateness of its current safety standards” as applied to automated vehicles, the U.S. Department of Transportation said in an 80-page update of its principles dubbed “Automated Vehicles 3.0.”

The department, as reported by Reuters earlier on Thursday, disclosed that the NHTSA wants comment “on proposed changes to particular safety standards to accommodate automated vehicle technologies and the possibility of setting exceptions to certain standards that are relevant only when human drivers are present.”

U.S. Transportation Secretary Elaine Chao released the document at a department event. In the report, Chao said that self-driving cars have the potential to dramatically reduce traffic crashes and road deaths. But she added the “public has legitimate concerns about the safety, security, and privacy of automated technology.”

Automakers must currently meet nearly 75 auto safety standards, many of which were written with the assumption that a licensed driver will be in control of the vehicle.

General Motors Co in January filed a petition seeking an exemption for the current rules to use vehicles without steering wheels and other human controls as part of a ride-sharing fleet it plans to deploy in 2019.

NHTSA has not declared the GM petition complete, a step necessary before it can rule on the merits. NHTSA said it plans to propose modernizing procedures to follow when reviewing exemption petitions.

Alphabet Inc’s Waymo unit plans to launch an autonomous ride-hailing service for the general public with no human driver behind the steering wheel in Arizona later this year. But unlike GM, Waymo’s vehicles will have human controls for the time being.

In March, a self-driving Uber Technologies Inc vehicle struck and killed a pedestrian, while the backup safety driver was watching a video, police said. Uber suspended testing in the aftermath and some safety advocates said the crash showed the system was not safe enough to be tested on public roads.

NHTSA has stepped up its self-driving car focus as legislation in Congress on self-driving cars, which passed the U.S. House of Representatives in 2017, has stalled. It has only a slender chance of being approved in 2018, congressional aides said.

The report said “NHTSA’s current statutory authority to establish motor vehicle safety standards is sufficiently flexible to accommodate the design and performance of different” automated vehicles.

The Center for Auto Safety said NHTSA should require companies to “submit evidence” that their self-driving technology is safe “before involuntarily involving human beings in their testing.”

GM said in a statement on Thursday that “legislation is still urgently needed” to allow “the full deployment of self-driving vehicles.”

Automakers have warned it could take too long for NHTSA to rewrite the rules to allow for the widespread of adoption of self-driving cars without human controls.

The department also said it “no longer recognizes the designations of ten automated vehicle proving grounds” announced in January 2017.

The sites, including a Michigan center that U.S. President Donald Trump visited last year, were named by Congress to be eligible for $60 million in grants “to fund demonstration projects that test the feasibility and safety” of self-driving vehicles.

The Transportation Department also announced it will start studying the workforce impacts of automated vehicles with the Labor, Commerce, and the Health and Human Services departments. 

The report also said the Trump administration will not support calls to end human driving. The department “embraces the freedom of the open road, which includes the freedom for Americans to drive their own vehicles.”

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.

US Warns of New Hacking From China-Linked Group

The U.S. government warned Wednesday that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

The Department of Homeland issued a technical alert for cloudhopper, which it said was engaged in cyber espionage and theft of intellectual property, after experts with two prominent U.S. cybersecurity companies warned earlier this week that Chinese hacking activity has surged amid the escalating trade war between Washington and Beijing.

Chinese authorities have repeatedly denied claims by Western cybersecurity firms that it supports hacking.

Homeland Security

Homeland Security released the information to support U.S. companies in responding to attacks by the group, which is targeting information technology, energy, health care, communications and manufacturing firms.

“These cyber threat actors are still active and we strongly encourage our partners in government and industry to work together to defend against this threat,” DHS official Christopher Krebs said in a statement.

The reported increase in Chinese hacking follows what cybersecurity firms have described as a lull in such attacks prompted by a 2015 agreement between Chinese President Xi Jinping and former U.S. President Barrack Obama to curb cyber-enabled economic theft.

“I can tell you now unfortunately the Chinese are back,” Dmitri Alperovitch, chief technology officer of U.S. cybersecurity firm CrowdStrike, said Tuesday at a security conference in Washington.

“We’ve seen a huge pickup in activity over the past year and a half. Nowadays they are the most predominant threat actors we see threatening institutions all over this country and Western Europe,” he said.

Analysts with FireEye, another U.S. cybersecurity firm, said that some of the Chinese hacking groups it tracks have become more active in recent months.

Advice to US firms

Wednesday’s alert provided advice on how U.S. firms can prevent, identify and remediate attacks by cloudhopper, which is also known as Red Leaves and APT10.

The hacking group has largely targeted firms known as managed service providers, which supply telecommunications, technology and other services to business around the globe.

Managed service providers, or MSPs, are attractive targets because their networks provide routes for hackers to access sensitive systems of their many clients, said Ben Read, a senior intelligence manager with FireEye.

“We’ve seen this group route malware through an MSP network to other targets,” Read said.

North Korea Said to Have Stolen a Fortune in Online Bank Heists

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam.

U.S. security firm FireEye raised the alarm Wednesday over a North Korean group that it says has stolen hundreds of millions of dollars by infiltrating the computer systems of banks around the world since 2014 through highly sophisticated and destructive attacks that have spanned at least 11 countries. It says the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyber activity that has led the Trump administration to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the United States. Last month, the Justice Department charged a North Korean hacker said to have conspired in devastating cyberattacks, including an $81 million heist of Bangladesh’s central bank and the WannaCry virus that crippled parts of Britain’s National Health Service.

DHS offers warning

On Tuesday, the U.S. Department of Homeland Security warned of the use of malware by Hidden Cobra, the U.S. government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa. It said that Hidden Cobra was behind the theft of tens of millions of dollars from teller machines in the past two years. In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea, which prohibits access to the world wide web for virtually all of its people, has previously denied involvement in cyberattacks, and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as the Internet Protocol, or IP, addresses that identify computers and characteristics of the coding used in malware, which is the software a hacker may use to damage or disable computers.

But other cybersecurity experts tell The Associated Press that they also see continued signs that North Korea’s authoritarian government, which has a long track record of criminality to raise cash, is conducting malign activity online. That activity includes targeting of financial institutions and crypto-currency-related organizations, as well as spying on its adversaries, despite the easing of tensions between Pyongyang and Washington.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” said Adam Meyers, vice president of intelligence at CrowdStrike. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

North Korea attacks continue

CrowdStrike says it has detected continuing North Korean cyber intrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea, and a new variant of malware against users of mobile devices that use a Linux-based operating system.

This activity has been taking place against the backdrop of a dramatic diplomatic shift as Kim Jong Un has opened up to the world. He has held summits with South Korean President Moon Jae-in and with President Donald Trump, who hopes to persuade Kim to relinquish the nuclear weapons that pose a potential threat to the U.S. homeland. Tensions on the divided Korean Peninsula have dropped and fears of war with the U.S. have ebbed. Trump this weekend will dispatch his top diplomat, Mike Pompeo, to Pyongyang for the fourth time this year to make progress on denuclearization.

But North Korea has yet to take concrete steps to give up its nuclear arsenal, so there’s been no let-up in sanctions that have been imposed to deprive it of fuel and revenue for its weapons programs, and to block it from bulk cash transfers and accessing to the international banking system.

FireEye says APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014 as the economic vise on North Korea has tightened in response to its nuclear and missile tests. Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye says APT38 has attempted to steal $1.1 billion, and based on the data it can confirm, has gotten away with hundreds of millions in dollars. It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication or SWIFT system that is used to transfer money between banks. Its biggest heist to date was $81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn they were suspected to have been laundered in casinos.

Cyber attacks an alternative 

The Foundation for Defense of Democracies, a Washington think tank, said in a report Wednesday that North Korea’s cyber capabilities provide an alternative means for challenging its adversaries. While Kim’s hereditary regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it says.

Sandra Joyce, FireEye’s head of global intelligence, said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds. On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything. And when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.

“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the U.S. government to provide more specific threat information to financial institutions about APT38’s modus operandi. APT stands for Advanced Persistent Threat.

Large Chile bank hacked

The Silicon Valley-based company says it is aware of continuing, suspected APT38 operations against other banks. The most recent attack it is publicly attributing to APT38 was against of Chile’s biggest commercial banks, Banco de Chile, in May this year. The bank has said a hacking operation robbed it of $10 million.

FireEye, which is staffed with a roster of former military and law-enforcement cyberexperts, conducted malware analysis for a criminal indictment by the Justice Department last month against Park Jin Hyok, the first time a hacker said to be from North Korea has faced U.S. criminal charges. He’s accused of conspiring in a number of devastating cyberattacks: the Bangladesh heist and other attempts to steal more than $1 billion from financial institutions around the world; the 2014 breach of Sony Pictures Entertainment; and the WannaCry ransomware virus that in 2017 infected computers in 150 countries. 

North Korea Said to Have Stolen a Fortune in Online Bank Heists

North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam.

U.S. security firm FireEye raised the alarm Wednesday over a North Korean group that it says has stolen hundreds of millions of dollars by infiltrating the computer systems of banks around the world since 2014 through highly sophisticated and destructive attacks that have spanned at least 11 countries. It says the group is still operating and poses “an active global threat.”

It is part of a wider pattern of malicious state-backed cyber activity that has led the Trump administration to identify North Korea — along with Russia, Iran and China — as one of the main online threats facing the United States. Last month, the Justice Department charged a North Korean hacker said to have conspired in devastating cyberattacks, including an $81 million heist of Bangladesh’s central bank and the WannaCry virus that crippled parts of Britain’s National Health Service.

DHS offers warning

On Tuesday, the U.S. Department of Homeland Security warned of the use of malware by Hidden Cobra, the U.S. government’s byword for North Korea hackers, in fraudulent ATM cash withdrawals from banks in Asia and Africa. It said that Hidden Cobra was behind the theft of tens of millions of dollars from teller machines in the past two years. In one incident this year, cash had been simultaneously withdrawn from ATMs in 23 different countries, it said.

North Korea, which prohibits access to the world wide web for virtually all of its people, has previously denied involvement in cyberattacks, and attribution for such attacks is rarely made with absolute certainty. It is typically based on technical indicators such as the Internet Protocol, or IP, addresses that identify computers and characteristics of the coding used in malware, which is the software a hacker may use to damage or disable computers.

But other cybersecurity experts tell The Associated Press that they also see continued signs that North Korea’s authoritarian government, which has a long track record of criminality to raise cash, is conducting malign activity online. That activity includes targeting of financial institutions and crypto-currency-related organizations, as well as spying on its adversaries, despite the easing of tensions between Pyongyang and Washington.

“The reality is they are starved for cash and are continuing to try and generate revenue, at least until sanctions are diminished,” said Adam Meyers, vice president of intelligence at CrowdStrike. “At the same time, they won’t abate in intelligence collection operations, as they continue to negotiate and test the international community’s resolve and test what the boundaries are.”

North Korea attacks continue

CrowdStrike says it has detected continuing North Korean cyber intrusions in the past two months, including the use of a known malware against a potentially broad set of targets in South Korea, and a new variant of malware against users of mobile devices that use a Linux-based operating system.

This activity has been taking place against the backdrop of a dramatic diplomatic shift as Kim Jong Un has opened up to the world. He has held summits with South Korean President Moon Jae-in and with President Donald Trump, who hopes to persuade Kim to relinquish the nuclear weapons that pose a potential threat to the U.S. homeland. Tensions on the divided Korean Peninsula have dropped and fears of war with the U.S. have ebbed. Trump this weekend will dispatch his top diplomat, Mike Pompeo, to Pyongyang for the fourth time this year to make progress on denuclearization.

But North Korea has yet to take concrete steps to give up its nuclear arsenal, so there’s been no let-up in sanctions that have been imposed to deprive it of fuel and revenue for its weapons programs, and to block it from bulk cash transfers and accessing to the international banking system.

FireEye says APT38, the name it gives to the hacking group dedicated to bank theft, has emerged and stepped up its operations since February 2014 as the economic vise on North Korea has tightened in response to its nuclear and missile tests. Initial operations targeted financial institutions in Southeast Asia, where North Korea had experience in money laundering, but then expanded into other regions such as Latin America and Africa, and then extended to Europe and North America.

In all, FireEye says APT38 has attempted to steal $1.1 billion, and based on the data it can confirm, has gotten away with hundreds of millions in dollars. It has used malware to insert fraudulent transactions in the Society for Worldwide Interbank Financial Telecommunication or SWIFT system that is used to transfer money between banks. Its biggest heist to date was $81 million stolen from the central bank of Bangladesh in February 2016. The funds were wired to bank accounts established with fake identities in the Philippines. After the funds were withdrawn they were suspected to have been laundered in casinos.

Cyber attacks an alternative 

The Foundation for Defense of Democracies, a Washington think tank, said in a report Wednesday that North Korea’s cyber capabilities provide an alternative means for challenging its adversaries. While Kim’s hereditary regime appears to prioritize currency generation, attacks using the SWIFT system raise concerns that North Korean hackers “may become more proficient at manipulating the data and systems that undergird the global financial system,” it says.

Sandra Joyce, FireEye’s head of global intelligence, said that while APT38 is a criminal operation, it leverages the skills and technology of a state-backed espionage campaign, allowing it to infiltrate multiple banks at once and figure how to extract funds. On average, it dwells in a bank’s computer network for 155 days to learn about its systems before it tries to steal anything. And when it finally pounces, it uses aggressive malware to wreak havoc and cover its tracks.

“We see this as a consistent effort, before, during and after any diplomatic efforts by the United States and the international community,” said Joyce, describing North Korea as being “undeterred” and urging the U.S. government to provide more specific threat information to financial institutions about APT38’s modus operandi. APT stands for Advanced Persistent Threat.

Large Chile bank hacked

The Silicon Valley-based company says it is aware of continuing, suspected APT38 operations against other banks. The most recent attack it is publicly attributing to APT38 was against of Chile’s biggest commercial banks, Banco de Chile, in May this year. The bank has said a hacking operation robbed it of $10 million.

FireEye, which is staffed with a roster of former military and law-enforcement cyberexperts, conducted malware analysis for a criminal indictment by the Justice Department last month against Park Jin Hyok, the first time a hacker said to be from North Korea has faced U.S. criminal charges. He’s accused of conspiring in a number of devastating cyberattacks: the Bangladesh heist and other attempts to steal more than $1 billion from financial institutions around the world; the 2014 breach of Sony Pictures Entertainment; and the WannaCry ransomware virus that in 2017 infected computers in 150 countries. 

Meet Farmers of  Future: Robot

Brandon Alexander would like to introduce you to Angus, the farmer of the future. He’s heavyset, weighing in at nearly 1,000 pounds, not to mention a bit slow. But he’s strong enough to hoist 800-pound pallets of maturing vegetables and can move them from place to place on his own.

Sure, Angus is a robot. But don’t hold that against him, even if he looks more like a large tanning bed than C-3PO.

To Alexander, Angus and other robots are key to a new wave of local agriculture that aims to raise lettuce, basil and other produce in metropolitan areas while conserving water and sidestepping the high costs of human labor. It’s a big challenge, and some earlier efforts have flopped. Even Google’s “moonshot” laboratory, known as X, couldn’t figure out how to make the economics work.

After raising $6 million and tinkering with autonomous robots for two years, Alexander’s startup Iron Ox says it’s ready to start delivering crops of its robotically grown vegetables to people’s salad bowls. “And they are going to be the best salads you ever tasted,” says the 33-year-old Alexander, a one-time Oklahoma farmboy turned Google engineer turned startup CEO.

Iron Ox planted its first robot farm in an 8,000-square-foot warehouse in San Carlos, California, a suburb located 25 miles south of San Francisco. Although no deals have been struck yet, Alexander says Iron Ox has been talking to San Francisco Bay area restaurants interested in buying its leafy vegetables and expects to begin selling to supermarkets next year.

The San Carlos warehouse is only a proving ground for Iron Ox’s long-term goals. It plans to set up robot farms in greenhouses that will rely mostly on natural sunlight instead of high-powered indoor lighting that sucks up expensive electricity. Initially, though, the company will sell its produce at a loss in order to remain competitive.

During the next few years, Iron Ox wants to open robot farms near metropolitan areas across the U.S. to serve up fresher produce to restaurants and supermarkets. Most of the vegetables and fruit consumed in the U.S. is grown in California, Arizona, Mexico and other nations. That means many people in U.S. cities are eating lettuce that’s nearly a week old by the time it’s delivered.

There are bigger stakes as well. The world’s population is expected to swell to 10 billion by 2050 from about 7.5 billion now, making it important to find ways to feed more people without further environmental impact, according to a report from the World Resources Institute.

Iron Ox, Alexander reasons, can be part of the solution if its system can make the leap from its small, laboratory-like setting to much larger greenhouses.

The startup relies on a hydroponic system that conserves water and automation in place of humans who seem increasingly less interested in U.S. farming jobs that pay an average of $13.32 per hour, according to the U.S. Department of Agriculture. Nearly half of U.S. farmworkers planting and picking crops aren’t in the U.S. legally, based on a survey by the U.S. Department of Labor.

The heavy lifting on Iron Ox’s indoor farm is done by Angus, which rolls about the indoor farm on omnidirectional wheels. Its main job is to shuttle maturing produce to another, as-yet unnamed robot, which transfers plants from smaller growing pods to larger ones, using a mechanical arm whose joints are lubricated with “food-safe” grease.

It’s a tedious process to gently pick up each of the roughly 250 plants on each pallet and transfer them to their bigger pods, but the robot doesn’t seem to mind the work. Iron Ox still relies on people to clip its vegetables when they are ready for harvest, but Alexander says it is working on another robot that will eventually handle that job too.

Alexander formerly worked on robotics at Google X, but worked on drones, not indoor farms. While there, he met Jon Binney, Iron Ox’s co-founder and chief technology offer. The two men became friends and began to brainstorm about ways they might be able to use their engineering skills for the greater good.

“If we can feed people using robots, what could be more impactful than that?” Alexander says.

 

                 

Meet Farmers of  Future: Robot

Brandon Alexander would like to introduce you to Angus, the farmer of the future. He’s heavyset, weighing in at nearly 1,000 pounds, not to mention a bit slow. But he’s strong enough to hoist 800-pound pallets of maturing vegetables and can move them from place to place on his own.

Sure, Angus is a robot. But don’t hold that against him, even if he looks more like a large tanning bed than C-3PO.

To Alexander, Angus and other robots are key to a new wave of local agriculture that aims to raise lettuce, basil and other produce in metropolitan areas while conserving water and sidestepping the high costs of human labor. It’s a big challenge, and some earlier efforts have flopped. Even Google’s “moonshot” laboratory, known as X, couldn’t figure out how to make the economics work.

After raising $6 million and tinkering with autonomous robots for two years, Alexander’s startup Iron Ox says it’s ready to start delivering crops of its robotically grown vegetables to people’s salad bowls. “And they are going to be the best salads you ever tasted,” says the 33-year-old Alexander, a one-time Oklahoma farmboy turned Google engineer turned startup CEO.

Iron Ox planted its first robot farm in an 8,000-square-foot warehouse in San Carlos, California, a suburb located 25 miles south of San Francisco. Although no deals have been struck yet, Alexander says Iron Ox has been talking to San Francisco Bay area restaurants interested in buying its leafy vegetables and expects to begin selling to supermarkets next year.

The San Carlos warehouse is only a proving ground for Iron Ox’s long-term goals. It plans to set up robot farms in greenhouses that will rely mostly on natural sunlight instead of high-powered indoor lighting that sucks up expensive electricity. Initially, though, the company will sell its produce at a loss in order to remain competitive.

During the next few years, Iron Ox wants to open robot farms near metropolitan areas across the U.S. to serve up fresher produce to restaurants and supermarkets. Most of the vegetables and fruit consumed in the U.S. is grown in California, Arizona, Mexico and other nations. That means many people in U.S. cities are eating lettuce that’s nearly a week old by the time it’s delivered.

There are bigger stakes as well. The world’s population is expected to swell to 10 billion by 2050 from about 7.5 billion now, making it important to find ways to feed more people without further environmental impact, according to a report from the World Resources Institute.

Iron Ox, Alexander reasons, can be part of the solution if its system can make the leap from its small, laboratory-like setting to much larger greenhouses.

The startup relies on a hydroponic system that conserves water and automation in place of humans who seem increasingly less interested in U.S. farming jobs that pay an average of $13.32 per hour, according to the U.S. Department of Agriculture. Nearly half of U.S. farmworkers planting and picking crops aren’t in the U.S. legally, based on a survey by the U.S. Department of Labor.

The heavy lifting on Iron Ox’s indoor farm is done by Angus, which rolls about the indoor farm on omnidirectional wheels. Its main job is to shuttle maturing produce to another, as-yet unnamed robot, which transfers plants from smaller growing pods to larger ones, using a mechanical arm whose joints are lubricated with “food-safe” grease.

It’s a tedious process to gently pick up each of the roughly 250 plants on each pallet and transfer them to their bigger pods, but the robot doesn’t seem to mind the work. Iron Ox still relies on people to clip its vegetables when they are ready for harvest, but Alexander says it is working on another robot that will eventually handle that job too.

Alexander formerly worked on robotics at Google X, but worked on drones, not indoor farms. While there, he met Jon Binney, Iron Ox’s co-founder and chief technology offer. The two men became friends and began to brainstorm about ways they might be able to use their engineering skills for the greater good.

“If we can feed people using robots, what could be more impactful than that?” Alexander says.

 

                 

Irish Regulator Opens Facebook Data Breach Investigation

Ireland’s data regulator has launched an investigation of Facebook over a recent data breach that allowed hackers access 50 million accounts which could potentially cost Facebook more than $1.6 billion in fines.

The Irish Data Protection Commission said Wednesday that it will look into whether the U.S. social media company complied with European regulations that went into effect earlier this year covering data protection.

It’s the latest headache for Facebook in Europe, where authorities are turning up the heat on dominant tech firms over data protection. Last month, European Union consumer protection chief Vera Jourova said that she was growing impatient with Facebook for being too slow in clarifying the fine print in its terms of service covering what happens to user data and warned that the company could face sanctions.

The commission said in a statement that it would examine whether Facebook put in place “appropriate technical and organizational measures to ensure the security and safeguarding of the personal data it processes.”

The commission said earlier this week the number of EU accounts potentially affected numbered less than 5 million.

Ireland, which is Facebook’s lead privacy regulator for Europe, is moving swiftly to investigate the U.S. tech company since the breach became public on Friday.

Facebook said Friday attackers gained the ability to “seize control” of user accounts by stealing digital keys the company uses to keep users logged in. They could do so by exploiting three distinct bugs in Facebook’s code.

The company said it has fixed the bugs and logged out the 50 million breached users — plus another 40 million who were vulnerable to the attack — in order to reset those digital keys. Facebook said it doesn’t know who was behind the attacks or where they’re based. Neither passwords nor credit card data was stolen. At the time, the company said it alerted the FBI and regulators in the U.S. and Europe.

Facebook on Wednesday didn’t immediately return a request for comment.

Facebook has faced a tumultuous year of security problems and privacy issues . News broke early this year that a data analytics firm once employed by the Trump campaign, Cambridge Analytica, had improperly gained access to personal data from millions of user profiles. Then a congressional investigation found that agents from Russia and other countries have been posting fake political ads since at least 2016. In April, Zuckerberg appeared at a congressional hearing focused on Facebook’s privacy practices.

The European Union implemented stronger data and privacy rules, known as General Data Protection Regulation, in May.

The case could prove to be the first major test of GDPR. Under the new rules, companies could be hit with fines equal to 4 percent of annual global turnover for the most serious violations. In Facebook’s case, that could amount to more than $1.6 billion based on its 2017 revenues.

The new rules also require companies to disclose any breaches within 72 hours. The commission said Facebook informed it that its internal investigation is continuing and that it is taking actions to “mitigate the potential risk to users.”

Irish Regulator Opens Facebook Data Breach Investigation

Ireland’s data regulator has launched an investigation of Facebook over a recent data breach that allowed hackers access 50 million accounts which could potentially cost Facebook more than $1.6 billion in fines.

The Irish Data Protection Commission said Wednesday that it will look into whether the U.S. social media company complied with European regulations that went into effect earlier this year covering data protection.

It’s the latest headache for Facebook in Europe, where authorities are turning up the heat on dominant tech firms over data protection. Last month, European Union consumer protection chief Vera Jourova said that she was growing impatient with Facebook for being too slow in clarifying the fine print in its terms of service covering what happens to user data and warned that the company could face sanctions.

The commission said in a statement that it would examine whether Facebook put in place “appropriate technical and organizational measures to ensure the security and safeguarding of the personal data it processes.”

The commission said earlier this week the number of EU accounts potentially affected numbered less than 5 million.

Ireland, which is Facebook’s lead privacy regulator for Europe, is moving swiftly to investigate the U.S. tech company since the breach became public on Friday.

Facebook said Friday attackers gained the ability to “seize control” of user accounts by stealing digital keys the company uses to keep users logged in. They could do so by exploiting three distinct bugs in Facebook’s code.

The company said it has fixed the bugs and logged out the 50 million breached users — plus another 40 million who were vulnerable to the attack — in order to reset those digital keys. Facebook said it doesn’t know who was behind the attacks or where they’re based. Neither passwords nor credit card data was stolen. At the time, the company said it alerted the FBI and regulators in the U.S. and Europe.

Facebook on Wednesday didn’t immediately return a request for comment.

Facebook has faced a tumultuous year of security problems and privacy issues . News broke early this year that a data analytics firm once employed by the Trump campaign, Cambridge Analytica, had improperly gained access to personal data from millions of user profiles. Then a congressional investigation found that agents from Russia and other countries have been posting fake political ads since at least 2016. In April, Zuckerberg appeared at a congressional hearing focused on Facebook’s privacy practices.

The European Union implemented stronger data and privacy rules, known as General Data Protection Regulation, in May.

The case could prove to be the first major test of GDPR. Under the new rules, companies could be hit with fines equal to 4 percent of annual global turnover for the most serious violations. In Facebook’s case, that could amount to more than $1.6 billion based on its 2017 revenues.

The new rules also require companies to disclose any breaches within 72 hours. The commission said Facebook informed it that its internal investigation is continuing and that it is taking actions to “mitigate the potential risk to users.”

Trump to Meet With Google CEO, Other Tech Heads in October

U.S. President Donald Trump plans to meet with Google CEO Sundar Pichai and other tech executives this month at a social media summit.

White House economic adviser Larry Kudlow said Tuesday that the administration hoped Facebook and Twitter would send representatives to the meeting. Kudlow added the event would most likely happen in mid-October, though no date has been set.

Prominent conservatives, including the president, have accused Facebook, Google and Twitter of silencing right-leaning voices on their platforms, a suspected practice called “shadow banning.”

Kudlow had a meeting with Pichai last Friday, which he described as “great.”

Pichai drew flack from senators last month after failing to send an executive to a hearing, and he has agreed appear at another.

3D Map of Singapore Helps City Planner Prepare for Future

Imagine seeing an incredibly detailed map of your home city in three dimensions, with every citizen carrying a cell phone showing up as a dot on that map. Well, you can’t because there are security issues galore when it comes to tracking people online. But you should know it’s possible, at least in Singapore, where city planners are considering how the technology may help improve life. VOA’s Kevin Enochs reports.

Instagram Names Adam Mosseri as New CEO

Adam Mosseri, a veteran 10-year Facebook executive, will become the new head of Instagram, outgoing co-founders Kevin Systrom and Mike Krieger announced Monday.

“We are thrilled to hand over the reins to a product leader with a strong design background and a focus on craft and simplicity,” Systrom and Krieger said in a press release.The pair announced their resignation last week without giving a clear explanation.

Mosseri, 35, has been Instagram’s head of product since May. He began as a designer at Facebook in 2008, and recently ran its News Feed. His appointment comes among fears that with the departure of Instagram’s independent-minded founders, the app will become more like Facebook: Cluttered with features, and invasive of user’s personal data.

Instagram was founded in 2010 and bought by Facebook two years later for $1 billion. While Facebook has struggled to hold onto younger users, Instagram remains popular with teens. It has also remained scandal-free, while Facebook has taken heat for numerous scandals including the spread of fake news, alleged exploitation of user data with third parties, electoral interference, and its use as a platform for radical leaders to spread propaganda in developing countries.

Instagram Names Adam Mosseri as New CEO

Adam Mosseri, a veteran 10-year Facebook executive, will become the new head of Instagram, outgoing co-founders Kevin Systrom and Mike Krieger announced Monday.

“We are thrilled to hand over the reins to a product leader with a strong design background and a focus on craft and simplicity,” Systrom and Krieger said in a press release.The pair announced their resignation last week without giving a clear explanation.

Mosseri, 35, has been Instagram’s head of product since May. He began as a designer at Facebook in 2008, and recently ran its News Feed. His appointment comes among fears that with the departure of Instagram’s independent-minded founders, the app will become more like Facebook: Cluttered with features, and invasive of user’s personal data.

Instagram was founded in 2010 and bought by Facebook two years later for $1 billion. While Facebook has struggled to hold onto younger users, Instagram remains popular with teens. It has also remained scandal-free, while Facebook has taken heat for numerous scandals including the spread of fake news, alleged exploitation of user data with third parties, electoral interference, and its use as a platform for radical leaders to spread propaganda in developing countries.

Can Wireless Challenge Cable for Home Internet Service?

Cellular companies such as Verizon are looking to challenge traditional cable companies with residential internet service that promises to be ultra-fast, affordable and wireless.

Using an emerging wireless technology known as 5G, Verizon’s 5G Home service provides an alternative to cable for connecting laptops, phones, TVs and other devices over Wi-Fi. It launches in four U.S. cities on Monday.

Verizon won’t be matching cable companies on packages that also come with TV channels and home phone service. But fewer people have been subscribing to such bundles anyway, as they embrace streaming services such as Netflix for video and cellphone services instead of landline.

“That’s the trend that cable has been having problems with for several years, and a trend that phone companies can take advantage of,” Gartner analyst Bill Menzes said.

That’s if the wireless companies can offer a service that proves affordable and effective.

T-Mobile and Sprint are also planning a residential 5G service as part of their merger proposal, though few details are known.

Verizon’s broadband-only service will cost $70 a month, with a $20 discount for Verizon cellular customers. According to Leichtman Research Group, the average price for broadband internet is about $60, meaning only some customers will be saving money.

Even so, Verizon can try to win over some customers with promises of reliability.

Verizon says its service will be much faster than cable. That means downloading a two-hour movie in high definition in two minutes rather than 21. The service promises to let families play data-intensive games and watch video on multiple devices at once, with little or no lag.

“The things that really matter to a customer are how fast it is and how reliable it is,” longtime telecom analyst Dave Burstein said. In tests of Verizon’s 5G so far, he said, “reliability is proving out quite nicely.”

Verizon could also capitalize on many people’s frustration with their cable companies. Consumer Reports magazine says customers have long been unhappy with perceived weak customer service, high prices and hidden fees.

The residential 5G service is part of a broader upgrade in wireless technology.

Verizon has spent billions of dollars for rights to previously unused radio waves at the high end of the frequency spectrum. It’s a short-range signal, ideal for city blocks and apartment buildings, but less so for sprawling suburbs or rural communities. That’s why Verizon is pushing residential service first, while AT&T is building a more traditional cellular network for people on the go, using radio waves at the lower end.

AT&T is aiming to launch its 5G mobile network this year in 12 cities, including Atlanta and Charlotte, North Carolina. Dish also has plans for a 5G network, but it’s focused on connecting the so-called “Internet of Things,” everything from laundry machines to parking meters, rather than cellphones or residential broadband.

Sprint tried to introduce residential wireless service before, using a technology called WiMax, but it failed to gain many subscribers as LTE trumped WiMax as the dominant cellular technology. This time, Verizon is using the same 5G technology that will eventually make its way into 5G cellular networks.

The Verizon service will start in parts of Houston, Indianapolis, Los Angeles, and Sacramento, California.

“These are small areas but significant,” said Ronan Dunne, president of Verizon Wireless. “Tens of thousands of homes, not hundreds of thousands of homes.” Eventually, Verizon projects 30 million homes in the U.S. will be eligible, though there’s no timeline.

For now, Verizon isn’t planning to hit markets where it already has its cable-like Fios service. Verizon stopped expanding Fios around 2010, in part because it was expensive to dig up streets and lay fiber-optic lines. Verizon can build 5G more cheaply because it can use the same towers available for cellular service.

That said, Verizon might not recoup its costs if it ends up drawing only customers who stand to save money over cable, said John Horrigan, a broadband expert at the Technology Policy Institute.

And while Verizon says the new network will be able to handle lots of devices at once, anyone who’s tried to use a phone during concerts and conferences will know that the airwaves can get congested quickly.

What Verizon’s service won’t do is extend high-speed internet access to rural America, where many households can’t get broadband at all, let alone competition. Cable and other companies haven’t found it profitable to extend wires to remote parts of the country. But Verizon will face the same problem, given that its short-range signal will require several wireless towers closer together. That’s feasible only in densely populated areas.

That’s not good enough, said Harold Feld, senior vice president of the advocacy group Public Knowledge. He said internet service at reasonable prices is “fundamental” for all Americans — not just those who live in populated areas.

T-Mobile and Sprint want to jointly create a 5G network that would also offer residential wireless broadband, but not for a few years. In seeking regulatory approval, the companies say 20 percent to 25 percent of subscribers will be in rural areas that have limited access to broadband. But the companies offered no details on how they would do so. T-Mobile and Sprint declined to comment.

 

Can Wireless Challenge Cable for Home Internet Service?

Cellular companies such as Verizon are looking to challenge traditional cable companies with residential internet service that promises to be ultra-fast, affordable and wireless.

Using an emerging wireless technology known as 5G, Verizon’s 5G Home service provides an alternative to cable for connecting laptops, phones, TVs and other devices over Wi-Fi. It launches in four U.S. cities on Monday.

Verizon won’t be matching cable companies on packages that also come with TV channels and home phone service. But fewer people have been subscribing to such bundles anyway, as they embrace streaming services such as Netflix for video and cellphone services instead of landline.

“That’s the trend that cable has been having problems with for several years, and a trend that phone companies can take advantage of,” Gartner analyst Bill Menzes said.

That’s if the wireless companies can offer a service that proves affordable and effective.

T-Mobile and Sprint are also planning a residential 5G service as part of their merger proposal, though few details are known.

Verizon’s broadband-only service will cost $70 a month, with a $20 discount for Verizon cellular customers. According to Leichtman Research Group, the average price for broadband internet is about $60, meaning only some customers will be saving money.

Even so, Verizon can try to win over some customers with promises of reliability.

Verizon says its service will be much faster than cable. That means downloading a two-hour movie in high definition in two minutes rather than 21. The service promises to let families play data-intensive games and watch video on multiple devices at once, with little or no lag.

“The things that really matter to a customer are how fast it is and how reliable it is,” longtime telecom analyst Dave Burstein said. In tests of Verizon’s 5G so far, he said, “reliability is proving out quite nicely.”

Verizon could also capitalize on many people’s frustration with their cable companies. Consumer Reports magazine says customers have long been unhappy with perceived weak customer service, high prices and hidden fees.

The residential 5G service is part of a broader upgrade in wireless technology.

Verizon has spent billions of dollars for rights to previously unused radio waves at the high end of the frequency spectrum. It’s a short-range signal, ideal for city blocks and apartment buildings, but less so for sprawling suburbs or rural communities. That’s why Verizon is pushing residential service first, while AT&T is building a more traditional cellular network for people on the go, using radio waves at the lower end.

AT&T is aiming to launch its 5G mobile network this year in 12 cities, including Atlanta and Charlotte, North Carolina. Dish also has plans for a 5G network, but it’s focused on connecting the so-called “Internet of Things,” everything from laundry machines to parking meters, rather than cellphones or residential broadband.

Sprint tried to introduce residential wireless service before, using a technology called WiMax, but it failed to gain many subscribers as LTE trumped WiMax as the dominant cellular technology. This time, Verizon is using the same 5G technology that will eventually make its way into 5G cellular networks.

The Verizon service will start in parts of Houston, Indianapolis, Los Angeles, and Sacramento, California.

“These are small areas but significant,” said Ronan Dunne, president of Verizon Wireless. “Tens of thousands of homes, not hundreds of thousands of homes.” Eventually, Verizon projects 30 million homes in the U.S. will be eligible, though there’s no timeline.

For now, Verizon isn’t planning to hit markets where it already has its cable-like Fios service. Verizon stopped expanding Fios around 2010, in part because it was expensive to dig up streets and lay fiber-optic lines. Verizon can build 5G more cheaply because it can use the same towers available for cellular service.

That said, Verizon might not recoup its costs if it ends up drawing only customers who stand to save money over cable, said John Horrigan, a broadband expert at the Technology Policy Institute.

And while Verizon says the new network will be able to handle lots of devices at once, anyone who’s tried to use a phone during concerts and conferences will know that the airwaves can get congested quickly.

What Verizon’s service won’t do is extend high-speed internet access to rural America, where many households can’t get broadband at all, let alone competition. Cable and other companies haven’t found it profitable to extend wires to remote parts of the country. But Verizon will face the same problem, given that its short-range signal will require several wireless towers closer together. That’s feasible only in densely populated areas.

That’s not good enough, said Harold Feld, senior vice president of the advocacy group Public Knowledge. He said internet service at reasonable prices is “fundamental” for all Americans — not just those who live in populated areas.

T-Mobile and Sprint want to jointly create a 5G network that would also offer residential wireless broadband, but not for a few years. In seeking regulatory approval, the companies say 20 percent to 25 percent of subscribers will be in rural areas that have limited access to broadband. But the companies offered no details on how they would do so. T-Mobile and Sprint declined to comment.

 

A Pakistani American Startup Fighting Media Censorship

According to the latest report by the Committee to Protect Journalists in Pakistan, fatal violence against journalists has declined, but fear and self-censorship have grown. In this era, five Pakistani American students at Harvard University have created a startup that challenges censorship using the latest block-chain technology. Their mission is “making journalism truly free.” Saqib Ul Islam visited Harvard’s innovation lab to bring us the story of a new company called “Inkrypt.”

Google CEO to Testify Before US House on Bias Accusations

Google Chief Executive Sundar Pichai has agreed to testify before the U.S. House Judiciary Committee later this year over Republican concerns that the company is biased against conservatives, a senior Republican said Friday.

Republicans want to question Google, the search engine of Alphabet Inc, about whether its search algorithms are influenced by human bias. They also want to probe it on issues such as privacy, classification of news and opinion, and dealing with countries with human rights violations.

Pichai met with senior Republicans on Friday to discuss their concerns, House Majority Leader Kevin McCarthy said.

McCarthy told reporters after the meeting that it was “very productive” and “frank.”

“I think we’ve really shown that there is bias, which is human nature, but you have to have transparency and fairness,” McCarthy said. “As big tech’s business grows, we have not had enough transparency and that has led to an erosion of trust and, perhaps worse, harm to consumers.”

Alphabet Inc’s Google unit has repeatedly denied accusations of bias against conservatives. Pichai left the meeting without comment.

Pichai wrote in an internal email last week that suggestions that Google would interfere in search results for political reasons were “absolutely false. We do not bias our products to favor any political agenda.”

The CEO had been scheduled to be in Asia this week but canceled the trip to be in Washington.

The hearing will take place after the midterm congressional elections in November, McCarthy said.

Google came under fire from members of both parties earlier this month for refusing to send a top executive to a Senate Intelligence Committee hearing that included Facebook Inc and Twitter Inc executives.

Republicans have also raised concerns about Google’s dominance. Earlier this week, the Justice Department met with state attorneys general to focus on the need to protect consumer privacy when big technology companies amass vast troves of data, but came to no immediate conclusions.

Asked if Republicans will push to break up Google, McCarthy said: “I don’t see that.” He said the hearing will look at privacy, bias issues, China and other matters.

Pichai is also meeting with Democratic lawmakers and is due to meet with White House economic adviser Larry Kudlow on Friday, a White House official said Thursday.

Google CEO to Testify Before US House on Bias Accusations

Google Chief Executive Sundar Pichai has agreed to testify before the U.S. House Judiciary Committee later this year over Republican concerns that the company is biased against conservatives, a senior Republican said Friday.

Republicans want to question Google, the search engine of Alphabet Inc, about whether its search algorithms are influenced by human bias. They also want to probe it on issues such as privacy, classification of news and opinion, and dealing with countries with human rights violations.

Pichai met with senior Republicans on Friday to discuss their concerns, House Majority Leader Kevin McCarthy said.

McCarthy told reporters after the meeting that it was “very productive” and “frank.”

“I think we’ve really shown that there is bias, which is human nature, but you have to have transparency and fairness,” McCarthy said. “As big tech’s business grows, we have not had enough transparency and that has led to an erosion of trust and, perhaps worse, harm to consumers.”

Alphabet Inc’s Google unit has repeatedly denied accusations of bias against conservatives. Pichai left the meeting without comment.

Pichai wrote in an internal email last week that suggestions that Google would interfere in search results for political reasons were “absolutely false. We do not bias our products to favor any political agenda.”

The CEO had been scheduled to be in Asia this week but canceled the trip to be in Washington.

The hearing will take place after the midterm congressional elections in November, McCarthy said.

Google came under fire from members of both parties earlier this month for refusing to send a top executive to a Senate Intelligence Committee hearing that included Facebook Inc and Twitter Inc executives.

Republicans have also raised concerns about Google’s dominance. Earlier this week, the Justice Department met with state attorneys general to focus on the need to protect consumer privacy when big technology companies amass vast troves of data, but came to no immediate conclusions.

Asked if Republicans will push to break up Google, McCarthy said: “I don’t see that.” He said the hearing will look at privacy, bias issues, China and other matters.

Pichai is also meeting with Democratic lawmakers and is due to meet with White House economic adviser Larry Kudlow on Friday, a White House official said Thursday.

Facebook Tightens Security After Announcing Breach

The security breach Facebook announced Friday that affected 50 million users was a setback for the social media giant, which has been working for months to regain customers’ trust over how it handles their data.

In addition to the 50 million users whose log-on information could have been accessed by hackers, the company required as a precaution another 40 million to log on to be able to get on their accounts. Facebook said it reported the breach of the company’s code, which the firm said it fixed, to law enforcement.

The social media company was not sure Friday whether any personal information had been gathered or misused, but it scrambled to address the issue, which was discovered earlier in the week. Facebook users may find they have to relink their Facebook accounts to their Instagram accounts, and possibly to third-party apps, which users often log on to with their Facebook accounts.

In a call Friday with reporters, Guy Rosen, Facebook vice president of product management, said that the breach appeared to be very broad with no specific country targeted. “We’ll update with what we learn,” he said. 

Focus on elections

The breach came just weeks before the U.S. midterm elections, something the company has been keenly focused on.

More than 300 Facebook workers are scouring the platform, looking for false news, fake accounts and disinformation campaigns by foreign state-sponsored operatives that may be trying to sway voters. Facebook executives have said that they did not do enough to address these issues in the run-up to other elections such as the 2016 U.S. presidential race and that they are working to fix them.

In addition, Facebook’s relationship with its 2 billion users took a hit last spring when it was disclosed that an outside researcher who was given access to Facebook data used the information for political campaigns. As a result, the company contacted users whose information might have been seen or used by the outside firm Cambridge Analytica.

“We have a responsibility to protect your data, and if we can’t, then we don’t deserve to serve you,” Facebook CEO Mark Zuckerberg said in a statement posted to his Facebook page in March.

‘View As’ tool

The company said hackers exploited the privacy feature known as “View As,” which lets users see how their own profiles would look to other people. Facebook said hackers were then able to use the security flaw to steal log-in keys, called access tokens, that could allow them to access people’s accounts.

“We’re a big fan of ‘View As’ here at EFF,” said Gennie Gebhart, associate director of research at the Electronic Frontier Foundation, the digital civil liberties group. “It’s one good way to make sure that your privacy settings are the way you want them to be. I can see what my friends see or friends of friends see.”

But by checking what a friend can see, the “View As” tool actually made one’s friend vulnerable to this hack.

A relatively new feature that allowed users to upload “Happy Birthday” videos was part of a combination of three bugs that contributed to the vulnerability, the social media firm said.

“It’s one of those weird things that daisy-chained together,” Gebhart added.

Facebook said it was shutting down “View As” until further notice.

The hackers “used the access tokens to query data, but there are no public reports of abusing the access to post updates to timelines or spread disinformation,” said Travis Smith, principal security researcher at Tripwire, a security firm. “This could be because they were only after data or it could be that their attack was cut off midstream by Facebook before they could reach their ultimate goal.”

Security advice

Affected Facebook users should take some additional steps, said Gary Davis, the chief consumer security evangelist at security firm McAfee, who wrote about the Facebook hack in a blog post.

Among them, users should change their log-in information. “Since this flaw logged users out, it’s vital you change up your log-in information,” he wrote. 

He also stressed users should update their Facebook apps as soon as possible.

“Facebook has already issued a fix to this vulnerability, so make sure you update immediately,” he wrote.

Facebook Tightens Security After Announcing Breach

The security breach Facebook announced Friday that affected 50 million users was a setback for the social media giant, which has been working for months to regain customers’ trust over how it handles their data.

In addition to the 50 million users whose log-on information could have been accessed by hackers, the company required as a precaution another 40 million to log on to be able to get on their accounts. Facebook said it reported the breach of the company’s code, which the firm said it fixed, to law enforcement.

The social media company was not sure Friday whether any personal information had been gathered or misused, but it scrambled to address the issue, which was discovered earlier in the week. Facebook users may find they have to relink their Facebook accounts to their Instagram accounts, and possibly to third-party apps, which users often log on to with their Facebook accounts.

In a call Friday with reporters, Guy Rosen, Facebook vice president of product management, said that the breach appeared to be very broad with no specific country targeted. “We’ll update with what we learn,” he said. 

Focus on elections

The breach came just weeks before the U.S. midterm elections, something the company has been keenly focused on.

More than 300 Facebook workers are scouring the platform, looking for false news, fake accounts and disinformation campaigns by foreign state-sponsored operatives that may be trying to sway voters. Facebook executives have said that they did not do enough to address these issues in the run-up to other elections such as the 2016 U.S. presidential race and that they are working to fix them.

In addition, Facebook’s relationship with its 2 billion users took a hit last spring when it was disclosed that an outside researcher who was given access to Facebook data used the information for political campaigns. As a result, the company contacted users whose information might have been seen or used by the outside firm Cambridge Analytica.

“We have a responsibility to protect your data, and if we can’t, then we don’t deserve to serve you,” Facebook CEO Mark Zuckerberg said in a statement posted to his Facebook page in March.

‘View As’ tool

The company said hackers exploited the privacy feature known as “View As,” which lets users see how their own profiles would look to other people. Facebook said hackers were then able to use the security flaw to steal log-in keys, called access tokens, that could allow them to access people’s accounts.

“We’re a big fan of ‘View As’ here at EFF,” said Gennie Gebhart, associate director of research at the Electronic Frontier Foundation, the digital civil liberties group. “It’s one good way to make sure that your privacy settings are the way you want them to be. I can see what my friends see or friends of friends see.”

But by checking what a friend can see, the “View As” tool actually made one’s friend vulnerable to this hack.

A relatively new feature that allowed users to upload “Happy Birthday” videos was part of a combination of three bugs that contributed to the vulnerability, the social media firm said.

“It’s one of those weird things that daisy-chained together,” Gebhart added.

Facebook said it was shutting down “View As” until further notice.

The hackers “used the access tokens to query data, but there are no public reports of abusing the access to post updates to timelines or spread disinformation,” said Travis Smith, principal security researcher at Tripwire, a security firm. “This could be because they were only after data or it could be that their attack was cut off midstream by Facebook before they could reach their ultimate goal.”

Security advice

Affected Facebook users should take some additional steps, said Gary Davis, the chief consumer security evangelist at security firm McAfee, who wrote about the Facebook hack in a blog post.

Among them, users should change their log-in information. “Since this flaw logged users out, it’s vital you change up your log-in information,” he wrote. 

He also stressed users should update their Facebook apps as soon as possible.

“Facebook has already issued a fix to this vulnerability, so make sure you update immediately,” he wrote.