27. May 2011 18:48
Google demonstrated its mobile payment solution for Android – Google Wallet, at press conference in New York yesterday. Using near-field communications to make contactless payments, the system has been tested, and will release “soon” in the U.S. – previous reports claimed September.
The Google Wallet service will launch for Sprint’s Nexus S 4G customers, and will support Citi MasterCard and Google Prepaid Card transactions at MasterCard PayPass outlets. More support across devices, operators, retailers, and payment solutions is being devised and negotiated, however, an inbuilt NFC chip is required – available on only a few phones so far.
With the G... [More]
26. May 2011 18:04
From e-mail to cellular communications, from secure Web access to digital cash, cryptography is an essential part of today's information systems. Cryptography helps provide accountability, fairness, accuracy, and confidentiality. It can prevent fraud in electronic commerce and assure the validity of financial transactions. It can prove your identity or protect your anonymity. It can keep vandals from altering your Web page and prevent industrial competitors from reading your confidential documents. And in the future, as commerce and communications continue to move to computer networks, cryptography will become more and more vital.
But the cryptography now on the market doesn'... [More]
26. May 2011 17:57
WordPress has discontinued support for Internet Explorer 6 in its latest update. The company has explained that it has had to use increasingly complex code trickery to make the Dashboard work in IE6, and has finally decided that enough is enough.
Logging into your Dashboard using IE6 will still be possible, but it will look pretty broken. Furthermore, a red alert box will provide you with a link to upgrade. Other outdated browser will result in an orange alert to let you know you need to upgrade, and will provide links for you to do so. There will also be a link to Browse Happy, a website which lists all the latest versions of each of the five main browsers.
Two months ago, Micros... [More]
24. May 2011 20:00
Encryption, when properly deployed and managed, can enable enterprises to safely cloud-enable applications and control sensitive corporate or personal information in the cloud. A good solution that provides robust separation of duties helps minimize the possibility of a breach. Data can be encrypted in a few different ways in private clouds and Infrastructure as a Service systems. Cloud computing is a priority for enterprises seeking greater agility, operational efficiency and overall cost reduction, but security concerns continue to inhibit its use. Half of all companies not adopting cloud computing cite security as the reason, according to a Forrester Research October 2010 study, ... [More]
24. May 2011 19:59
Biometric systems, what are they?
Systems of access control can be divided into three groups according to what a person has to present to the system for identification:
that what he/she knows;
that what he/she possesses;
that what is a part of his/her body.
Systems of the first group use ciphers of some kind (for example, PIN codes or cryptographic sequences) that have to be entered manually.
The second group systems use ciphers that are presented with the help of electronic media (magnetic strip cards, touch memory keys, token devices, proximity cards, etc.).
The third group, biometric systems, is principally different in that they examine the person's identity itself: t... [More]
24. May 2011 19:54
TEL AVIV, Israel, March 25, 2010 – Computer hackers are getting smarter, which not only puts our national security at risk, but also compromises our personal and financial information. Now, a new invention is promising to beat today's hackers – and hackers of the future – using existing fiber optic and computer technology.
Transmitting binary lock-and-key information in the form of light pulses, Dr. Jacob Scheuer of Tel Aviv University's School of Electrical Engineering said his device ensures that a shared key code can be unlocked by the sender and receiver – and absolutely nobody else.
He will present his new findings to peers at this year's laser... [More]
23. May 2011 18:25
After taking nearly three years to deliver Firefox 4, Mozilla has beta-released Firefox 5 just two months after. The first beta in Mozilla’s new rapid release development cycle, Firefox 5 beta does not feature as many interface and framework changes that Firefox 4 had over Firefox 3.
Trying to stay up-to-date and ahead of the curve, the new strategy will enable Mozilla to deliver frequent stable updates, and bring new features to users faster, like Google does with Chrome. Changes in Firefox 5 beta include:
Added support for CSS animations
Added support for switching Firefox development channels
The Do-Not-Track header preference has been moved to increase discoverabili... [More]
23. May 2011 15:45
Iomega has announced their new Personal Cloud technology, a technology that will use your Iomega NAS (Network Attached Storage) device to backup, protect, and give others access to your files and information on a personal cloud.
This is a web-based architecture and will allow for consumers and business professionals to connect and exchange their Iomega NAS with all of the data on it to other individuals or other devices through the Internet. Iomega ensures that this data on your personal cloud can only be manipulated by you or whomever else you give access to. There is no subscription fee associated with this technology (including access by others onto your cloud and the protection f... [More]
19. May 2011 15:14
Folks over at Ulm University in Germany have determined that all Android phones running any version below Android 2.3.4 Gingerbread are vulnerable to attacks over unencrypted Wi-Fi networks. And since only the Nexus S, and a few other devices have that update onboard, that pretty much means the entire Android user base (99.7%) is at risk.
The German researchers published their findings in a paper entitled "Catching AuthTokens in the Wild: The Insecurity of Google's ClientLogin Protocol." Vulnerability is specific to unencrypted Wi-Fi hot spots, where the team demonstrated an attack that gained access to all items of contacts, calendar events, and private pictures, including those c... [More]
17. May 2011 12:58
Intel (INTC.O) is anticipated to win EU approval next week for its $7.68 billion purchase of security expert McAfee Inc (MFE.N) after offering more dispensations to ease competition concerns, two sources with direct knowledge of the subject said on Thursday.
World No. 1 chipmaker Intel had already protected permission from the U.S. Federal Trade Commission on December 21 to acquire McAfee, the world’s No. 2 security software maker.
Sources mentioned that in recent days Intel had projected more remedies to the European Commission in addition to others presented on January 6 after protest by McAfee’s competitors. “The Commission’s clearance is likely next ... [More]