Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog
author_image

Jordan Robertson

Jordan is a technology writer with Bloomberg News. He previously worked at The Associated Press.

Facebook wants young children to use its service. Will they be a jackpot - or a data dud?

Photograph by Martin Barraud

Facebook wants young children to use its service. Will they be a jackpot - or a data dud?

Facebook’s Push for Child Users a Data Jackpot? Not So Fast

Now that Facebook is exploring ways to allow children under 13 to officially use its service, the company faces two critical questions if it moves ahead with any plans. The first one is the most delicate: How does Facebook plan...

Read more »

Projected Internet traffic growth through 2016

Source: Cisco VNI Global Forecast, 2011-2016

Projected Internet traffic growth through 2016

Cisco Web-Traffic Forecast Points to Slowing Growth

Good data on Internet traffic is hard to come by. Service providers such as AT&T and Verizon guard their information, and third parties have limited visibility. That’s what makes the annual traffic forecasts by Cisco Systems Inc., the world’s biggest...

Read more »

Of the top 25 area codes where text-message spam originates from in the U.S., 15 are in California, Florida and New York.

Photograph by Michael Caronna/Corbis

Of the top 25 area codes where text-message spam originates from in the U.S., 15 are in California, Florida and New York.

Do You Live Near a Text-Message Spammer? Check Your Area Code

If you live in the 347, 201 or 510 area codes, or basically anywhere along the eastern edge of Florida, there’s a good chance you live near a mobile-phone spammer or a business that enables one. According to new research...

Read more »

The Methodist Hospital in 2010 in Indianapolis, Indiana. The state has one of the most technologically sophisticated exchanges in the country.

Photograph by Joey Foley/Getty Images

The Methodist Hospital in 2010 in Indianapolis, Indiana. The state has one of the most technologically sophisticated exchanges in the country.

How to Build a Mountain of Patient Data: Don’t Ask for Permission

Indiana isn’t usually considered a hub of technological innovation. However, about 2,000 miles from Silicon Valley, it has solved a problem that has flummoxed even high-tech states like California. Indiana has built one of the most advanced “health information exchanges,”...

Read more »

Symantec says the largest attack on Mac computers didn't net the criminals anything in the end.

Photograph by George Frey/Bloomberg News

Symantec says the largest attack on Mac computers didn't net the criminals anything in the end.

Biggest Attack on Apple Computers Didn’t Pay Off, Symantec Says

Symbolically, last month’s news of a hacking attack on more than 600,000 Mac computers sent a loud message: Apple products are now vulnerable to the same kind of mass infections that Microsoft Windows computers are. Financially, however, it was the...

Read more »

Omar Khan, a former executive at Samsung Mobile and Citigroup, was hired to help lead NQ Mobile’s international expansion.

Photograph by Bloomberg

Omar Khan, a former executive at Samsung Mobile and Citigroup, was hired to help lead NQ Mobile’s international expansion.

Will China Connection Help or Hurt NQ Mobile’s Security Pitch in U.S.?

NQ Mobile, China’s biggest mobile-phone security company, wants to expand in the U.S. But its success will hinge on a delicate question: Will American businesses and consumers be comfortable using security software designed in one of the world’s hacking hot...

Read more »

Security researchers have discovered new malware targeting Android devices that doesn’t take the usual route of embedding itself in an app.

Photograph by Chris Ratcliffe/Bloomberg

Security researchers have discovered new malware targeting Android devices that doesn’t take the usual route of embedding itself in an app.

Hacking Android Devices: It’s Not Just Apps You Need to Worry About

It’s not just malicious apps you need to be wary of infecting your smartphone. Now, navigating to poisoned websites are a threat, too. Security researchers have discovered a new malware targeting Android devices that doesn’t take the usual route of...

Read more »

Hackers' favorite security hole last year was a Windows vulnerability from four years ago, according to Symantec.

Photograph by Michael Blann

Hackers' favorite security hole last year was a Windows vulnerability from four years ago, according to Symantec.

Hackers’ Favorite Target Last Year Was a Blast From the Past

If you need more proof that users are a weak link in computer security, look no further than today’s report from Symantec, which showed that hackers’ favorite target in 2011 was a security hole fixed about four years ago. The...

Read more »

India has overtaken the U.S. as the top offender for sending junk e-mail, according to a report by Sophos.

Photograph by Getty Images

India has overtaken the U.S. as the top offender for sending junk e-mail, according to a report by Sophos.

India Claims Spamming Crown

The sleaziest thing about spam isn’t just that people are bombarded with crass penis-enlargement ads and identity-theft scams. Even more unseemly is that many of us are spammers, and don’t know it. Spammers typically steal our computing resources by renting...

Read more »

Bug-brokers are willing to pay potentially hundreds of thousands of dollars for the most destructive software flaws.

Photograph by Pete Oxford/Minden Pictures

Bug-brokers are willing to pay potentially hundreds of thousands of dollars for the most destructive software flaws.

Where Did the Bugs Go? Check the Gray Market, HP Report Says

On its face, it seems like a good sign in the battle against hackers: The number of known software vulnerabilities fell by nearly 1,700 last year. Not so. A new report from Hewlett-Packard said the drop — to 6,843 last...

Read more »