Menu

Blog

Archive for the ‘security’ category: Page 126

Feb 24, 2016

CIOs admit they are blind to cyber threats despite security spend

Posted by in categories: encryption, security

Is it time to relook at the CIO role requirements to include some level of CISO/ CSO experience?


Many of the security defences that companies invest in are blind to encrypted traffic and untrustworthy digital certificates, a study reveals.

Read more

Feb 23, 2016

MasterCard to Launch Selfie, Fingerprint ID in U.S. This Summer

Posted by in categories: privacy, security

The biometric security methods for online transactions have been in trials by MasterCard since last July and are being expanded around the world.

MasterCard is planning to launch fingerprint and selfie biometric identification options for customers in the United States and in other parts of the world this summer as it finds that users are comfortable and confident with the technology.

The expansion of the program, which began last July as a trial project to see how consumers would respond to the use of selfies and fingerprints to replace passwords for their online purchases, was announced by the company on Feb. 22 in Amsterdam, where a larger testing project involving some 750 users over six months was also conducted.

Continue reading “MasterCard to Launch Selfie, Fingerprint ID in U.S. This Summer” »

Feb 22, 2016

FlexEnable has created a screen you can wrap around your wrist

Posted by in categories: computing, electronics, materials, security

Sometimes, it seems like the tech world is inexorably bending towards a future full of curved devices. At MWC in Barcelona, we saw yet another prototype display, this time from English firm FlexEnable. Now, this isn’t a working device of any kind — it’s essentially just a screen running a demo — and neither is FlexEnable a consumer electronics company. But the firm says its technology is ready to go, and it’s apparently in talks with unnamed hardware partners who want to make this sort of device a reality. How long until we see fully-fledged wristbands like this on the market? Eighteen months is the optimistic guess from FlexEnable’s Paul Cain.

The prototype uses plastic transistors to achieve its flexibility, creating what the company calls OLCD (organic liquid crystal display) screens. FlexEnable says these can achieve the same resolutions as regular LCD using the same amount of power, but, of course, they have that added flexibility. These transistors can be wrapped around pretty much anything, and also have uses outside of display technology. FlexEnable was also showing off thin flexible fingerprint sensors, suggesting they could be wrapped around a door handle to add security without it being inconvenient to the user.

Continue reading “FlexEnable has created a screen you can wrap around your wrist” »

Feb 22, 2016

Is San Bernardino iPhone Fully Encrypted?

Posted by in categories: encryption, government, hacking, law enforcement, mobile phones, policy, privacy, security

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

iphone-01In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Continue reading “Is San Bernardino iPhone Fully Encrypted?” »

Feb 21, 2016

Asteroid Art Gallery: NASA To Open Art Gallery On The Asteroid Bennu

Posted by in categories: security, space travel

The art gallary of space.


Are you tired looking for a gallery space to exhibit your artwork? Well, now you have a chance to show off your work in an asteroid art gallery, thanks to NASA.

According to CNN, the space agency is inviting people to send their artworks to an asteroid on its new spacecraft: the Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx. The mission, led by the University of Arizona, will also collect a sample of the asteroid Bennu and return it to Earth for study for the first time in history.

Continue reading “Asteroid Art Gallery: NASA To Open Art Gallery On The Asteroid Bennu” »

Feb 21, 2016

China’s newest tech can offer quantum of security

Posted by in categories: cybercrime/malcode, economics, encryption, finance, quantum physics, security

Very concerning news for the US security; we’ll see how the US responds. Remember, our largest hackers in the US is China; so we’ll need to determine what this means as well as how vulnerable we are.

http://www.globaltimes.cn/content/969692.shtml


China’s stock markets have been stabilizing in recent days after the rollercoaster ride at the start of the year. And one bright point has been stocks related to quantum communications, showing renewed investor interest in the new technology, which will play an important role in creating a safety net for the increasingly information technology-savvy economy.

Continue reading “China’s newest tech can offer quantum of security” »

Feb 20, 2016

United Nations CITO: Artificial intelligence will be humanity’s final innovation

Posted by in categories: computing, internet, quantum physics, robotics/AI, security

I hate to break the news to the UN’s CITO — has she ever heard of “Quantum Technology?” After AI flood into the scene; the next innovation that I and others are working on is Quantum Computing which will make AI, Internet, Cyber Security, devices, platforms, medical technology more advance with incredible performance.


The United Nations Chief Information Technology Officer spoke with TechRepublic about the future of cybersecurity, social media, and how to fix the internet and build global technology for social good.

Artificial intelligence, said United Nations chief information technology officer Atefeh Riazi, might be the last innovation humans create.

Read more

Feb 20, 2016

Volvo wants your phone to be the only car key you ever need

Posted by in categories: mobile phones, security, transportation

By next year, Volvo wants to become the first manufacturer to sell cars without keys. Instead of a physical key or even a Bluetooth key fob, Volvo customers will use a “digital key” in a smartphone app to access (and share that access) to their cars.

Drivers will be able to use the app (and a Bluetooth connection) to start their car, open the trunk, mess with the security system, or — like with a key fob — simply have the car unlock as you approach it. But the biggest implications of this change could be for ride-sharing. Customers (and manufacturers) have begun entertaining new ideas about how to use cars to get around without owning them outright, and something like a digital key makes it easier for multiple people to have control over one particular vehicle. That could mean something as simple as just sharing access with your family, but Volvo will also make it work on the cars it provides to Sunfleet, a Swedish car-sharing service.

Read more

Feb 19, 2016

Could hacking your pacemaker and holding it ransom be a 2016 cyber trend?

Posted by in categories: biotech/medical, computing, security

So, we’re now adding possible murder to the charges of hackers?.


The Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of 17,000 U.S. dollars to hackers after two weeks of being shut out of their computer network. We talk to cyber security expert Jay Radcliffe about medical cyber vulnerabilities.

Read more

Feb 19, 2016

Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016

Posted by in categories: privacy, security, transportation

Northrup Grumman’s new Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases being showcase at the WEST 2016 navel conference on February 17.


Northrop Grumman Corporation (NYSE: NOC) has announced that it will be showcasing key naval capabilities at the WEST 2016 navel conference on February 17, 2016. The corporation will unveil its full-spectrum cyber solutions, biometric defense solutions, unmanned aircraft and much more at the event. WEST 2016 is co-sponsored by AFCEA and the US Naval institute in San Diego. Northrop Grumman is a platinum sponsor of the conference, which is themed “how we make the strategy work.”

The defense contractor will be showcasing its sea serving operations and capabilities that will help the US armed forces combat challenges and difficulties more efficiently. It is also expected to display how it integrates cyber-technology into all of its defense segments. The key highlight of its cyber-suite is its Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases.

Continue reading “Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016” »