Posts Tagged ‘Security’
Kia : Rondo LX 2008 LX V-6 2nd Owner. Great shape! Make Offer to firstname.lastname@example.org
End Date: Monday Dec-9-2013 7:49:22 PST
Buy It Now for only: $6,975.00
Buy It Now | Add to watch list
Articles on Gmail, Including: Gmailfs, History of Gmail, Gmail Interface, Gma...
End Date: Wednesday Dec-11-2013 3:46:07 PST
Buy It Now for only: $18.20
Buy It Now | Add to watch list
Articles on Internet Properties Established in 2004, Including: Orkut, Gmail...
End Date: Wednesday Dec-11-2013 3:56:42 PST
Buy It Now for only: $29.40
Buy It Now | Add to watch list
Judging by the millions of YouTube views since it launched just last week, there’s quite a bit of interest in Coin. The Bluetooth-enabled swipeable lets you add in identifying info from up to eight individual credit, debit, membership, loyalty and gift cards, and comes along with companion Android and iOS apps that boost functionality. While the applications enable you to save detailed card info for online purchases, push additional payment methods to Coin and access the Bluetooth-powered leash that will send an alert if you walk away without your card, the device works independently as well.
The company is announcing some additional security features today that should serve to ease at least some fraud concerns. Coin will include an “alarm” that tracks the number of times the card is swiped and sends an app alert if it suspects unauthorized use. It can also be locked to just one card before you hand it over at a store or restaurant, so a clerk can’t accidentally (or deliberately) swap cards before swiping. Reps also responded to 50 questions on a new Q&A page, addressing additional security-related and function queries, including ATM compatibility (yes, it will work), photo ID storage (uh, no) and chip and pin support (not yet, but it’s in the works). The firm is also releasing additional cards for pre-order, so if you want to get in before the price jumps to $ 100, there’s still time to hand over 50 bucks (plus $ 5 shipping) at the source link below.
The BlackBerry of today could’ve been a Chinese-controlled company — if the Canadian government hadn’t put its foot down, that is. A report in The Globe and Mail, citing inside sources, claims the government feared a Lenovo takeover would compromise national security given how connected …
Quantum cryptography is secure against intruders, since you can’t intercept data in mid-flight without ruining it. The technology won’t always stop leaks, however, which is why the University of Cambridge has developed a new protocol that keeps participants honest. The method combines the theories …
It sounds like the seeds of a end-of-days sci-fi hit, but DARPA knows what it’s doing, right? It’s establishing the first-ever tournament for automated network defenses, in which systems would compete against each other to test vulnerabilities, make security patches, and generally wage digital war …
LAUSD iPad Program Could Be Delayed After Security Concerns, Growing …
Deasy has asked the school board to consider the revised timeline during a special meeting it has scheduled for Oct. 29 to address growing concerns about the iPad rollout. Among the issues expected to be discussed during that session are a security …
Read more on Huffington Post
Apple: iPhone, iPad Profit Prospects Improving, Say Canaccord, Deutsche
With our expectations for a full redesign for iPad 5 and increased near-term iPad 5 versus iPad Mini supplier build rates, we believe December quarter iPad sales mix will shift toward the iPad 5 versus iPad Mini. The iPhone and iPad mix shifts should …
Read more on Barron’s (blog)
What Apple's iPad 5 Needs To Remain The Best Selling 9.7-Inch Tablet
We're just a week away from when Apple is likely to hold their annual iPad event. At that time, we'll most likely see a completely redesigned iPad 5, and an iPad mini 2 with some necessary improvements. This week, we're offering our thoughts on what …
Read more on AppAdvice
Samsung chose to name part of its enterprise smartphone security suite after an Army post, but LG’s going for something entirely more generic: Gate. The company’s solution appears to work much like JK Shin and Co.’s, safeguarding both private and business data as they coexist on a phone, allowing outfits to use a BYOD (Bring Your Own Device) setup. By wielding Gate, users can encrypt their hardware’s data, use a VPN and make the lives of IT departments easier thanks to mobile device management features. It’s not clear the software will be offered gratis, but it sounds like it’ll be available just in time for the G2′s trip stateside.
Source: LG Korea Social (translated)
Today, BitTorrent announced it’s building a private instant messaging client for our post-PRISM world. The firm told CNET that BitTorrent Chat should function like the company’s other peer-to-peer services, using a form of torrenting’s decentralized technology-approach that’s been adapted for real-time communications. And while compatibility with other IM protocols is expected in the future, for now it’s exclusive to BitTorrent account holders. You can even apply for an invite into the pre-alpha at the BitTorrent Labs site — if you’re so inclined, that is.
Filed under: Internet
Source: BitTorrent Blog
The New York Police Department is a big fan of iOS 7. According to several reports on Twitter, the department has officers out on the street distributing fliers encouraging iPhone owners to update to iOS 7, which has new security features that might just cut down on theft. Earlier this year, New York’s attorney general called on Apple and other smartphone manufacturers to step up the tools they provide to prevent theft and facilitate device recovery. With Apple’s latest update, it’s made seemingly large steps in doing that.
The NSA can easily bypass many commonly used forms of encryption. This is terrible news for the people who sell it.
National Security Agency (NSA) headquarters building in Fort Meade, Maryland.
Handout . / Reuters
The latest National Security Agency scoop, published jointly by The Guardian, The New York Times, and ProPublica yesterday, paints an astonishingly dismal picture of the current online security industry. The primary revelation — that your encrypted data may be unsafe from the hands of the NSA — could have the potential to erode the precious framework of trust at the center of the security and encryption industries.
The documents, provided by Edward Snowden, allege that the NSA has spearheaded a $ 250 million-a-year campaign to target and crack much of the encryption infrastructure that protects sensitive information on the web, such as emails, banking systems, and web searches. At first glance, the revelations appear to destroy the very premise of secure encryption — a notion that stands to cripple not only security companies, but also any hardware and software company with ties to the internet.
The Guardian / Via theguardian.com
“Of course this changes the perception of the security industry and fundamental use of many products you thought might have been completely secure, like VPN,” Harvey Boulter, founder of Seecrypt, a popular encrypted voice and texting app, said of the newest NSA revelations.
According to Chester Wisniewski, a senior security advisor at Sophos Canada, the greatest risk posed by the Snowden news is an economic one. “Our entire global economy relies on transactions being safe and secure,” he told BuzzFeed.
“The whole idea of my mom buying me a present on Amazon is founded on the idea of a safe browser padlock,” Wisniewski said. “Knowing that can be compromised affects everything from governments and banking all the way down to my mother. This could have an impact on American software, internet, and hardware companies. Foreign corporations and governments simply won’t want to do business with the U.S. anymore if they know there's a quick back door, and that's when things go off the rails.”
“It is guaranteed that this is hurting the internet industry,” Boulter agrees. “Just here in the Middle East, we've come across many corporations that are moving away from Gmail because they no longer believe it to be trustworthy. We're seeing a shift away from trusting these applications coming from U.S. and U.K. providers as no one quite knows who to trust.”
But for all the uncertainty, those BuzzFeed spoke with don't see the security industry as beyond saving. “Encryption versus surveillance is a cat-and-mouse game,” Boulter said. “There's never a status quo. You do something, and they invent a way to get into your systems.”
For those deeply invested in the security game, yesterday's scoops only confirmed a common belief. “As somebody involved in cryptography for a long time, there weren't all that many revelations here,” Wisniewski said. A lot of it sounded to me to be weaknesses in our systems that we knew about but decided to ignore and proceed anyway.”
For Wisniewski, the Snowden documents provide a silver lining: Given the NSA's budget and scale, many encryption systems have stood up to the test. “These reports show that it's not trivial for the NSA to break these encryption systems. It takes billions of dollars to put a dent in them. If you're targeted by the NSA because you're a foreign government or a terrorist, then nothing will be unbreakable. But if you're just trying to send secure emails across your company, there's less reason to worry. To target costs hundreds of millions of dollars, and this isn't something you can do in your garage with a stack of PS3s.” (Ed note: PlayStation 3 consoles are sometimes clustered together for large-scale computing tasks, providing cheap alternatives to traditional supercomputers.)
However damaging the revelations are to public perception, there's reason to believe that these newest revelations could wipe away the false notions of security many still have when it comes to online security. “In all, I think there's a chance this could be a positive awakening,” Boulter said. In other words, no one with a product to sell can say, definitively, that your data is safe.