consumers are now more aware of the importance of maintaining personal security and privacy from corporations, governments and other powerful nsiders.
a fake Occupy Central app that spread phishing malware in Hong kong poked a few more holes in the perceived security of ios closed system.
and also runs the risk of losing ground to more open competitors early on. Even worse, a company that starts out open
says that these companies are the vanguard of a larger host of companies that will remake finance. here are equity fundraising
there risk and a multiple that lenders make based on the risks they take, whereas advisory services or transaction services are taking a percentage on the service they provide
It cannot be removed without the security key, and if unauthorized removal occurs the system will said lertheadquarters,
so theye at risk of churning out. Twitter is facing this problem already. Eventually, Instagram might need to help people unfollow accounts they never Like
increase energy security and improve the competitiveness of U k. businesses. The scheme, which came into force in July 2014,
and pave the way for increased business profitability, competitiveness and security, while mitigating organizational energy waste.
taking into consideration that the U s. wastes an approximate $2. 8 billion in PC energy every year, the U k. may need to take a more effective approach to energy security.
Combined with large-scale security incidents like Heartbleed, web users are asked often to quickly change their account passwords to protect themselves against further attacks.
While the automated password changing technology is a huge leap in terms of efficiency and security protections for today web users,
and when it comes to choosing security over easiness, web users have shown consistently they prefer the latter.
and vetted/reviewed for potential security concerns. The Blackphone device and startup business is an attempt to consumerize the hard problem of security
and privacy within a familiar-looking Android##wrapper and by bolting on multiple third party services to put##secure alternatives for essentials such as##cloud storage within easy reach (as well as bundling up the cost of their initial subscription in with the phone).
However it s also##a trade-off given that running third party software introduces more security risks.
Callas previously told Techcrunch the store could##include##different security review tiers for apps as a way for users to navigate the risks of running third party content.
We re going to put a security and privacy seal of approval on them. But we also want to be able to have people go download their favorite game.##
and collaboration##tools to##large corporations today announced a new program called Box Trust that brings 19 new partners to its platform to provide its customer base with additional security options.
and other large companies that are in-market providers of enterprise-scale security tooling for larger companies.
Box therefore must ensure##that it has a host of security-focused firms on its platform
so that any company that has a large number of denizens to its name can rock security in the manner of their own choosing.
#We re building a security model with a thriving ecosystem of partners to provide all new tools and services that secure content in the enterprise.#
A relatively new protocol proposed to the Internet Engineering Task force (IETF), Opflex was designed to offer a highly scalable architecture that works across a broad range of hardware devices to enable multivendor innovation.
Some networking vendors initially viewed the rising tide of open-source projects as a threat. But the open-source networking movements
operational elements such as installation, security and reliability may not be developed fully. These are major issues for people who manage enterprise networks.
They need assurances that their organizationsnetworks will be safe and reliable when using products based on an open-source platform,
and the fact that it now on by default means that the risk associated with stealing a modern ios device is even greater.
meaning a thief weighs reward vs. risk, including factors like how difficult it is to recoup an investment on something theye taken.
and Las vegas. There a new vanguard creating the future of the U s. manufacturing economy. Companies like Makerbot, Techshop and Kickstarter are playing a large part in fixing the breakdown between historical industrialized employment and manufacturing models,
When Google and Twitter receive legal threats from countries to censor controversial content or have their services shut down locally,
(or airport security) get inside. It also comes with an easy-to-access laptop compartment so you can pull out your computer right before the security line.
Gil and his four cofounders Tomi Pierucci Alejo Verlini Brian Chen and Martin Diz are in Y Combinator current batch of companies
#Scientists Make Energy-Generating Keyboard That Knows Who#s Typing On it Passwords continue to be a glaring weakness in digital security.
So what about tightening the security screw further by applying a continuous biometric such as a keyboard that knows who typing on it in real-time
such as greater security due to its ine of sightrequirements (no snooping on a network from outside a building
and valued at over $2 billion produces security entertainment and enterprise products too. It already has strong links to Xiaomi
and a funding round for wearables startup Misfit but with the Kingsoft deal Xiaomi may well be laying the ground for a dedicated games service security features and other mobile services for its customers.
Recent security breaches and other events have prompted a number of apps to emerge that promise encrypted communications between mobile phones.
and formerly ran Twitter security team. he idea is to scramble the information so well that it not worth pursuing.
But Signal hits all seven of the Electronic Frontier Foundation criteria for security on its Secure Messaging Scorecard.
see the risk and the interest rates, and make the loans they want to on an a la carte basis,
and you want attractive risk-adjusted returns. The economy may have recovered, but the 2008 meltdown is still taking a toll on the lending market.
Drones are seen no longer just as a tool of the military or a toy that people use to fly around.
or when a life guard can get to a person on time. The average human takes 90 seconds to reach
and radiological threats before someone actually gets to the fire. Police have been buying up drones for years now,
Whatever you think about the surveillance state, drones will continue to be used by law enforcement and security forces.
Transportation The idea of a drone taking you to work is still a Jetsons kind of idea,
Apple has been making a lot of use of the Touch ID feature as a security authentication layer on its phone for things like unlocking the device authenticating app payments and so on
Venmo launched Touch ID security authentication in November last year. Back when Apple first unveiled Touch ID in 2013 Dorsey was positive on the technology noting that it would generally help with storing sensitive information on the device
#Push For Greater State Surveillance Powers Could Have Chilling Effect On U k. Tech Sector The U k. government is lining up a new piece of legislation to expand the state digital data capture powers.
and Facebook to give U k. intelligence agencies access to the encrypted conversations of suspected terrorists and criminals.
While that is certainly true for some digital services with a sloppy attitude to security (or with business models that rely on data mining their users), others,
such as Apple, claim they intentionally do not hold encryption keys which presumably sets up a legal clash with security-and privacy-conscious tech companies and the U k. government.
tells Techcrunch he has concerns about the surveillance powers that the government will be pushing for. el have to see how much theyl try
those are huge threats to the UK technology sectors. And is definitely not the right way to proceed. eyond the overreach
and if you believe that the problem the intelligence services face at the moment is a shortage of data then it would address the problem.
If you look at the killing of U k. soldier Lee Rigby for example the problem isn that they have no idea.
I think the word we used was isleadinge also notes that the Joint Committee report on the draft Communications Data bill was hugely critical about the lack of data ministers were able to provide to support assertions that expanding data capture powers for counter-terrorism purposes would save lives.
and does shroud its arguments in claims of national security secrecy. Saying, in essence, e need more data but we can tell you whyand where the U k. Parliament Intelligence and security committee should be playing a robust role in holding the government to account in such a sensitive area,
The intelligence services play an incredibly important role and we want them to be able to do their jobs in a clear and accountable way.
which regulates the powers public bodies have to carry out surveillance and communications interception. Briefing notes for the Investigatory Powers Bill state it will aim to odernise our law in these areas
and ensure it is fit for purposeripa has been criticized for years for eroding press freedoms and sanctioning disproportionate surveillance by, for instance, enabling police and local councils to spy on journalists.
While Sir Tim Berners-Lee, inventor of the world wide web, called for checks and balances on government surveillance.
where when the security services take the ability to look at private data, they do it in a way where it goes through a court,
and when people do have snooped their data on it only used in a very serious process of tracking down organised crime and terrorism?
so shoring up and expanding state surveillance and data capture powers is evidently front of mind and a clear priority for the new U k. government.
At the last count there were estimated to be between 4 million and 5. 9 million of these surveillance cameras in the U k
This month the U k. surveillance camera commissioner warned that budget cuts are forcing councils to switch off CCTV cameras.
But the idea that state surveillance capabilities will diminish because of shrinking government resources seems fantastical.
Rather the role of providing state surveillance apparatus continues to be outsourced to private operators.
So U k. police and intelligence agencies obtain whatever CCTV footage theye after from the private operator funding a camera in their shop or carpark or driveway or, hey, even that in-home Dropcam or the lens on that life-logging wearable
Imagine the power of state surveillance tapping into an expansive Internet of things infrastructure that ceaselessly gathers real-time data on every point of human intersection public
and rivatewhen it comes to surveillance of digital comms data, this same outsourcing modus operandi used with CCTV is being applied by governments to Internet companies with the U k. government now preparing to push one of the most hawkish data retention agendas in the Western world,
How hugely powerful commercial digital platforms respond to being coopted as the coal face of state surveillance,
#The Senate Advances NSA Surveillance Reform Legislation As Deadline Approaches The Senate voted 77-to-17 to take up the USA Freedom Act,
a bill already passed in the House that would reform National security agency (NSA), in a rare Sunday session.
It was one of the first programs reported by The Guardian after former government contractor Edward Snowden leaked secret documents about American surveillance processes.
the surveillance reform bill did receive the support of many tech companies. President Barack Obama has committed also to signing the bill into law.
Passage of the bill would mark the first time lawmakers have reined in the surveillance powers of the intelligence community in the two years since Snowden first revealed the controversial intelligence gathering programs.
so that the surveillance programs would not expire. Mcconnell also attempted to temporarily extend two lesser known Patriot act provisions expiring tomorrow that involve roving wiretaps and tracking one wolfterrorist suspects.
The Freedom Act does not go far enough in curtailing American surveillance practices. It only addresses the bulk collection of American phone records
The bill does not address the surveillance of non-Americans or the communications of U s. citizens with people outside the country under FISA Section 702 or Executive Order 12333.
But today vote remains a victory for the advocates that have been fighting for two years to limit the scope of the NSA surveillance.
The system was developed by AT&T in the late 1960s to centralize access to public safety services such as fire, police,
which can greatly increase the risk of misunderstanding police instructions. Finally, the company also has a product for emergency call centers called Next Generation 911,
This clarification she says significantly reduces the risks of these opportunities for medical technology companies.
Risk analysis is key and careful system design will ensure that safety critical functions are implemented appropriately.
Next is designing the high-level system architecture to minimize patient risk and ensure that it is usable.
##As an example of how to manage the risks of including apps in connected systems Tighe cites the Verihaler which Sagentia has developed to monitor patient adherence to treatment for asthma or chronic obstructive pulmonary disease (COPD.
Examples include pay-peruse analytics risk-sharing reimbursement and patient self-payment. She recommends defining the MMA s targeted value proposition and business model up front.#
This clarification she says significantly reduces the risks of these opportunities for medical technology companies.
Risk analysis is key and careful system design will ensure that safety critical functions are implemented appropriately.
Next is designing the high-level system architecture to minimize patient risk and ensure that it is usable.
##As an example of how to manage the risks of including apps in connected systems Tighe cites the Verihaler which Sagentia has developed to monitor patient adherence to treatment for asthma or chronic obstructive pulmonary disease (COPD.
Examples include pay-peruse analytics risk-sharing reimbursement and patient self-payment. She recommends defining the MMA s targeted value proposition and business model up front.#
The day after the Super bowl we had reports to Godaddy Intuit the NFL by 8 A m. Analytics can also help protect advertisers from fraud risks without forcing them to build their own investigative efforts.
In theory the algorithms should be able to allocate budget to advertising networks that police their inventory to avoid phony ads.
#Police in California and Texas Test Networked Guns When a police officer draws a firearm he
or she often doesn have an opportunity to radio for backup. Yardarm, a California-based company, is building technology that will automatically alert headquarters in such situations.
The data can be fed to a police dispatch system or viewed on a smartphone. Founded in 2013
Technology that tracks officersaction is slowly gaining acceptance as police chiefs and officers realize that the data can help clear them of wrongdoing
also sells head-worn cameras to help police and security workers document events in the field. ash-cams really set precedent,
Schaff says. hen it comes down to it, monitoring technology helps more than it hurts. Yardarm is holding tests to hone the tracking accuracy with police departments in Santa cruz
California, and Carrollton, Texas. The technology has been tested at firing ranges, but not during active police duty. t is going so well we don even know it there,
says Santa cruz sheriff Phil Wowak. he product brings so much data that wee going to have to figure out how to respond to every element.
and aims to staunch the kinds of security breaches that have occurred at major retailers like Target Neiman Marcus
As science links these variants to disease risk, the idea has been that genotypes could predict your chance of getting cancer or heart disease
But predicting risk is tricky. Most genes don say anything decisive about you. And if they do,
when you find out. don believe that this kind of risk assessment is mature enough to be a consumer product yet,
or lower, their risk for drug reactions, common diseases, or personality traits such as a lack of empathy.
Promethease makes little effort to combine the genetic risks for any one disease into a single comprehensible number.
He says 23andme stepped on shaky scientific ground by trying to merge risks into one neat score. veryone wants to sell a simple answer:
ere is your risk. But we don know how these things interact, he says. At the same time, he believes the uncertain value of DNA information is not a reason to keep it away from lay people. t not reasonable to think there some specific dateay 18,
For now, consumers have to fend for themselves in a thicket of scientific informationnd make their own decisions about risks.
It told her that her versions of 11 genes carried some increased risk of breast cancer
if I had a high risk or genetic predisposition toward heart disease, diabetes, or Alzheimer. I don,
#Sharing Flood Mitigation Strategies with At-Risk Countries After a 1953 North sea storm surge killed nearly 2000 people in The netherlands the country s government built massive new protective seawalls along the coast.
Initially it will offer technologies for assessing an area s vulnerability over time. The land area of The netherlands includes a vast river delta formed by the Rhine and two other rivers.
The DELTAS project initially aims to deliver tools for assessing vulnerability over time for people in the Ganges-Brahmaputra-Meghna delta
along with a onetime security code for that particular transaction, and approves the salell in less than 10 seconds.
starting with its influential army of iphone users. obile payment is finally hitting that pivotal moment
Apple focus on security is timely, too. In recent months, card data breaches At home Depot, Target,
& Research cited security concerns as a key reason theye holding back on mobile payments. Although credit cards are used in Apple Pay
Improved security is even more important to banks and retailers than it is to consumers, who have limited liability for fraudulent charges on stolen cards.
Better security seems to have made up for any reservations that banks may have about Apple role as a powerful new middleman on transactions
In July DARPA gave out $40 million in awards to try to develop brain implants that would help brain-injured soldiers recover lost memories
#Motorized Pants to Help Soldiers and Stroke Victims A soft exoskeleton being developed by researchers at Harvard could let soldiers carry heavy backpacks over long distances or help stroke victims walk more steadily.
and security with biometric data says Mark Thomas the executive director of Vaxtrac a nonprofit that worked with the Benin trials.
Intellectual property privacy security##those are some of the friction points in terms of growth. For existing business models the immediate challenges include preparing for the new workforce and identifying exactly
says Eran Tromer, a computer security expert at Tel aviv University. The remarkable result is described in this paper due to be presented at a conference in South korea next month,
Tromer says his research team has used all those methods to extract encryption keys based on widely used, high-security standards, 096-bit RSA keys and 3, 072-bit Elgamal keys.
and others, says Radu Sion, a computer security expert at Stony Brook University. Tromer says he doesn know of anybody performing a ground-potential attack to steal real data
and fitness tracking, helping to monitor the condition of soldiers and firefighters and changing the way we play video games. oul see games where your emotional state changes the character youe playing,
The company also recently began working on a project funded by the U s. military to make batteries for sensors that would monitor the health status of soldiers.
as well as James Collins, an expert in genetic engineering at Arizona State university, ene drives present environmental and security challenges.
the scientists who authored the editorial say society needs to develop ntegrated risk managementincluding genetic antidotes that could reverse the effect,
This lead time enables public discussion of environmental and security concerns, research into areas of uncertainty,
It allows adaptation of regulations and conventions in light of emerging information on benefits, risks,
and has favored features by IT managers such as encrypted connections and fine-grained access controls. No doubt the folks at Dropbox took notice;
whose police forces are overextended already fighting eal-worldcrimes and who lack the resources and expertise to investigate online activity.
What are the biggest threats? Bitcoins Bitcoins only have value when the transactions are confirmed by at least six members of the peer-to-peer network.
Cyber-spies Companies and governments spend money on espionage. Cyber-spies use rojansand ack doorsto access data on their targetscomputer networks,
Government surveillance The two most important inventions of our time, the Internet and the mobile phone, changed the world
but they also have turned out to be perfect tools for the surveillance state. And in a surveillance state
everybody is assumed guilty. PRISM, one of the governmental surveillance programs unveiled by Edward Snowden, monitors people known to be innocent and builds dossiers on everyone based on their Internet activity.
Because the U s. is home to the most ubiquitous Internet services, search engines, webmail sites, browsers,
However, the same advancements in computing power and data storage that have made wholesale surveillance possible have made also leaking possible.
where she directs the Cylab Usable Privacy and Security Laboratory. Facebook ran an experiment on 689,003 users to see
and that a statement of the procedures includes a escription of any reasonably foreseeable risks or discomforts to the subject.
#Aereo Ruling Means Uncertainty for Cloud Streaming Services In the U s. Supreme court smackdown of Internet TV upstart Aereo today, some legal watchers see a threat to other cloud storage and content-streaming models,
or provide a means of access control, he said. Given the boom in fitness monitors and other wearable gadgets tethered wirelessly to smartphones,
Besides, Solar City may need to take the risk of investing in a large new manufacturing plant in New york. Existing subsidies that have helped the company grow quickly in recent years may soon disappear.
#A Simple Plan to Impede the NSA Is Taking hold A year after revelations first emerged from former National security agency contractor Edward Snowden about mass Internet surveillance,
Stephen Farrell, a computer scientist at Trinity college in Dublin and a member of the Internet Engineering Task force, the group of engineers who maintain
which is why the military is turning to neurological devices, says Justin Sanchez, manager of the DARPA program, known as Subnets,
But Delgado, also funded by the military, left the U s. after Congressional hearings in which he was accused of developing otalitarianmind-control devices.
The trucks were fitted with technology developed by a startup called Peloton Tech (elotonis The french word for platoon.
He adds that the technology could even allow competing companies to platoon together to get these savings.
A European project, called SARTRE (Safe Road trains for the Environment), has been exploring ways for vehicles to travel in platoons since 2009.
has been testing platoons made of three semi-automated or fully automated trucks since 2007. A U s. project, called PATH (Partners for Advanced Transportation technology
But it would also introduce new risks. Once trains of trucks get too long, it much harder for drivers of other cars to change lanes. would not advocate running very long sequences of these trucks close together,
which risks disrupting another gene, potentially causing cells to turn cancerous. Second, some diseases, such as Huntington
because the risk of death from infectious disease is extremely likely). Children with this genetic condition have been treated with the additive gene therapy method in the past,
which means they are at high risk for stroke heart failure and kidney failure he says. Implanted electrical devices that control bodily functions have been used for many years.
Where his predecessor Steve Ballmer clutched the fading Windows operating system like a frayed security blankethe ios version of Office appeared four years after the iphone debutadella has acknowledged the company need to move on,
Three of the five patients involved in the U s. Department of defense-funded study were injured during military service;
Wong-Foy, a senior research engineer at SRI, has built an army of magnetically steered workers to test the idea that icrorobotscould be a better way to assemble electronics components,
Apps built to exploit such device-to-device schemes can offer security and privacy benefits over those that rely on the Internet.
Recent revelations about large-scale surveillance of online services and the constant litany of data breaches make this a good time for apps that don t rely on central servers he says.
As users become more mindful of the security and privacy implications of technologies they rely on moving in the direction of local ad hoc networking makes a lot of sense.
However peer-to-peer and mesh networking apps also come with their own risks since an eavesdropper could gain access to local traffic just by using a device within range.
director of product strategy and infotainment for GM vehicles. hey go through rigorous safety and security standards,
Documents leaked last June by former U s. intelligence contractor Edward Snowden revealed a global surveillance operation coördinated by the U s. National security agency and its counterpart in Britain
There is a risk that the Internet could fracture into smaller national networks, protected by security barriers.
In this view, Brazil new cable is akin to China Great Firewall (that country system for censoring Web results
So pervasive and successful has digital espionage become that in 2012, Keith Alexander, the Army general in charge of the NSA, described it as he greatest transfer of wealth in history.
He estimated that U s. companies lose $250 billion a year to intellectual-property theft. This is hastening the trend to secure networks
Security experts have been warning for some time that computer networks are not secure from intruders. But in 2013
A half dozen boutique R&d houses, like Italy Hacking Team, develop computer vulnerabilities and openly market them to government attackers.
and analysis for antivirus company Kaspersky Lab, says he logs on to his computer assuming he is not alone. operate under the principle that my computer is owned by at least three governments,
That is a threat mainstream technology companies are grappling with. The U s. government circumvented Google security measures and secretly collected customer data.
British spies scooped up millions of webcam images from Yahoo. In December, on Microsoft official blog, the company top lawyer, Brad Smith, said he had reason to view surreptitious overnment snoopingas no different from criminal malware.
a former Israeli intelligence officer now working in IT SECURITY for the Bank hapoalim Group, in Tel aviv. In this new context, nobody can say where the responsibilities of a company may end
because the U s. government has claimed long that Huawei gear is a Trojan horse for China intelligence services.
Thanks to its privacy laws and discreet culture, the country is emerging as a hub for advanced security technology.
chief research officer of the Finnish security company F-Secure. efore, the idea was that the Web had no borders, no countries.
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011