The FBI is stepping up its effort to get broader authority to put “wiretaps” on the Internet to catch criminals and terrorists. But the move is drawing fire from civil liberties groups, technology firms and others who claim the effort could be counterproductive, by harming online security and imposing hefty costs on makers of hardware and software.
With a project called Portable Native Client now making its way into Chrome and potentially onto the Web itself, Google is violating its own principles for its Blink browser engine, a Mozilla programmer said Friday. Portable Native Client, or PNaCl, is a Google technology to let Web apps run specially created software at nearly the speed of the native apps that run on operating systems like Windows or iOS.
A Web site malicious code injection, which uses the kind of exploit Google is hoping to encourage companies to patch faster when discovered. (Credit: AlienVault) Google has undertaken what some might call a Sisyphean effort: to get technology companies to patch publicly unknown security vulnerabilities, referred to as “zero day” exploits, more quickly. In a blog post published Wednesday, two Google security engineers advised their counterparts at other companies to respond to actively exploited zero days within seven days