Google followed through on promises to combine Android Pay and Google Wallet by releasing Google Pay in the Google Play store yesterday. Peer-to-peer payments are not available on this platform yet, but the company expects to offer this feature in the next few months.
AT&T has selected portions of Atlanta, Dallas and Waco, Texas, as its first locations to roll out 5G service in the US. Nine more cities will be named in months to come, and the first AT&T devices to tap the technology have not been announced.
IBM has announced added upgrades to its Spectrum Storage line, including a software-defined network attached storage, data compression software and added security for VMware virtual machines. Chief Marketing Officer Eric Herzog said the company wants to add more partners to expand to even more features.
Members of the global social network Mom.life have been awarding advice-sharing mothers with "Blooms," and now Mom.life is giving substance to those rewards in the form of cryptocurrency. Mom.life has more than 1 million users worldwide.
Reports indicate the upcoming P version of the Android operating system will include a feature that bars idling background apps from accessing the phone's camera. The safeguard should reduce the possibility of embarrassing photos for the purpose of blackmail, writes Kyle Wiggers.
Cleveland State University and Case Western Reserve University have partnered on the Internet of Things Collaborative to develop and test IoT projects and technology to make the region smarter. A $1.75 million Cleveland Foundation grant is helping to fund the initiative, which focuses on health care, manufacturing, energy and other areas.
A North Korean hacking group known as Reaper has been spying on multinational corporations, according to a FireEye report. While the affected organizations weren't named, FireEye's John Hultquist says that Fortune 500 companies are being targeted and predicts that the hackers will become more aggressive.
An unsecured open-source Kubernetes cloud platform used by Tesla exposed credentials for the company's Amazon Web Services resources. Mining scripts used for cryptojacking were discovered, and sensitive data was exposed, researchers found.
Organizations are moving toward a compliance-first strategy, and while compliance is important, it should be a subset of the security strategy, writes Jim Kennedy. "Instead of firewalls, network protocols and IoT gateways, organizations should consider data assets and applications; and then determine which user roles require access to those assets," he writes.
Attorney General Jeff Sessions announced the creation of a task force that would focus on global cyberthreats to election systems and critical infrastructure. Representatives from the Department of Justice will be part of the task force and will report their findings in June.
- Page 1