Bloomberg

News Opinion Markets Personal Finance Tech Politics Sustainability TV Video Radio

Tech Blog
author_image

Jordan Robertson

Jordan is a technology writer with Bloomberg News. He previously worked at The Associated Press.

Google cited patent disputes as key to its agreement to buy Motorola Mobility and its thousands of patents.

Photograph by Tim Boyle/Bloomberg

Google cited patent disputes as key to its agreement to buy Motorola Mobility and its thousands of patents.

At U.S. Patent Office, Mobile Makes Up Nearly Quarter of Those Granted

Want to know how much technical brainpower went into making that smart phone in your pocket? By one estimate, nearly a quarter of all patents being granted by the U.S. Patent and Trademark Office are now going to mobile technologies,...

Read more »

Some security experts have questioned whether Apple reacted quickly enough to protect its users from a known security hole in Java.

Photograph by Gustoimages/Photo Researchers

Some security experts have questioned whether Apple reacted quickly enough to protect its users from a known security hole in Java.

Are You Among 600,000 Whose Mac Was Hacked? Law Isn’t on Your Side

Earlier this month, Apple closed a serious security hole. It was too late. More than 600,000 Mac computers were infected with malicious software that hijacked Google results, replacing them with spam links. This was no run-of-the-mill hacking attack: The target...

Read more »

A trio of gray wolves howl in unison. Smartphones may soon sound like this.

Photograph by Jim and Jamie Dutcher/National Geographic Society

A trio of gray wolves howl in unison. Smartphones may soon sound like this.

Hate Your Co-Worker’s Ringtone? Plug Your Ears for ‘Scream Tones’

A trio of gray wolves howl in unison. Smartphones may soon sound like this. Obnoxious ring tones can annoy co-workers and anyone else in your vicinity. But when it comes to auditory aggravation, one company has an even grander idea:...

Read more »

In a paradoxical way, fixing a well-known software bug can expose users to worse attacks.

Photograph by George Frey/Bloomberg

In a paradoxical way, fixing a well-known software bug can expose users to worse attacks.

A Mystery As Massive Apple Attack Levels Off at 600,000 Macs

A strange thing happened earlier this week when Apple closed a security hole that allowed more than half a million Mac computers to get infected. The infections, by and large, stopped spreading, according to Doctor Web, the Russian maker of...

Read more »


Advertisers are poised to plunge deeper into face-based marketing, which raises a host of security and privacy issues, the FTC said.

Photographer: Ozgur Donmaz

Advertisers are poised to plunge deeper into face-based marketing, which raises a host of security and privacy issues, the FTC said.

Don’t Show Your Face: FTC Warns of Advertisers’ Use of Recognition Tech

The eyes may be the window to the soul, but the whole face could be a path to your pocketbook, if advertisers have their way. The Federal Trade Commission said on Monday that advertisers are using facial recognition technology to...

Read more »


Lookout examined geographic data for some 9 million smartphones it helped locate last year.

Photographer: Matt Cardy/Getty Images

Lookout examined geographic data for some 9 million smartphones it helped locate last year.

Lose Your Smartphone? Check McDonald’s. Or the Dojo.

Where you lose your smartphone, it turns out, says a lot about where you live. If you lose a phone in San Francisco, you were probably at a coffee shop. Misplace it in London? Try the pub. In Brussels, call...

Read more »


The Bushehr nuclear power plant in 2010. A  computer worm is believed to have damaged Iran's centrifuges that year. Critics say new code could facilitate similar attacks.

Photography: Ebrahim Norouzi, IIPA/AP Photo

The Bushehr nuclear power plant in 2010. A computer worm is believed to have damaged Iran's centrifuges that year. Critics say new code could facilitate similar attacks.

Hacker Group Unveils Critical Attacks, Accused of Drawing a ‘Road Map for the Bad Guys’

For the past few months, a team of computer hackers has engaged in an aggressive form of cyber subversion. Its work has enraged critics and led to accusations that it is endangering people’s lives. It’s not Anonymous. The group causing...

Read more »