Android

Security and The Internet of Things: An RSA Roadmap

The RSA Security Conference starts next week in San Francisco: the central event of a week-long orgy of IT security wheeling and dealing in the Bay Area. Though its roots are as a small and clubby gathering of cryptographers, RSA long ago stopped being that, and started resembling a kind of speed dating event for technology and IT security firms. Sure – there are plenty of interesting talks at RSA, but the important work takes place in private suites of adjoining hotels and chance encounters in the halls of the Moscone. If there’s a big IT security deal in the offing – like IBM’s $1 billion acquisition of Trusteer, or FireEye’s purchase of the firm Mandiant – chances are good that the conversation started at RSA. Long and short: RSA is a snapshot of the security industry at a particular place and time. As such, it tends to be a […]

Can Google Hold Back Facial Recognition For Glass?

The New Yorker blog has an interesting, short piece by Betsy Morais on the challenges posed by facial recognition and wearable technology that’s worth reading. The post, “Through a Face Scanner, Darkly” picks up on recent reports about a proliferation of facial recognition applications for the Google Glass platform, addressing the ethical implications of the intersection of wearable technology with powerful sensors and analytics capabilities, including facial recognition. Specifically, Morais zeros in on an app called NameTag that adds a face scanner to the Glass. “Snap a photo of a passerby, then wait a minute as the image is sent up to the company’s database and a match is hunted down. The results load in front of your left eye, a selection of personal details that might include someone’s name, occupation, Facebook and/or Twitter profile, and, conveniently, whether there’s a corresponding entry in the national sex-offender registry,” Morais writes. NameTag’s focus […]

Podcast: Security Challenges Ahead For Blackberry

With another busy week behind us in the security world, we sat down with Zach Lanier, a senior security researcher for mobile authentication specialist Duo Security. Zach is a recognized authority on the security of mobile devices, and was able to talk about some ongoing research he’s doing on Blackberry’s BB10 operating system. Zach told us that Blackberry 10, the latest version of Blackberry’s mobile operating system, is a big improvement over previous versions, including the TabletOS that Blackberry (formerly Research in Motion) used for its PlayBook – the company’s first foray into the tablet space.  But Lanier and fixed many of the information leaks that he and others found in TabletOS and reported to the company. “But there are still lots of questions we’re looking to answer,” Lanier said.   Among other things, Lanier is examining whether Blackberry 10’s support for so many different runtimes might pose security problems for […]

Are Wearables The Future Of Authentication?

CIO Magazine has an interesting round-up piece that looks at the enterprise impact of wearable technology, which you can read here.   Much of this is what you’d expect: FitBit, Google Glass and the (coming) tsunami of smart watches that will soon wash over us. The Cliff’s Notes version is that adoption of wearables will be rapid in verticals that are positioned to leverage the technology early on – such as healthcare and retail. But the piece argues that enterprises risk ‘missing’ the wearable wave in the same way that they ‘missed’ (or at least didn’t plan for) the mobile computing revolution. What might planning entail? Pilots, apparently – maybe of Google Glass or a competing technology. [Read more Security Ledger coverage of wearable technology. ] An interesting side note concerns a possible enterprise ‘killer app’ for wearables; authentication. The article quotes Forrester Analyst J.P. Gownders saying that wearable technology, with integrated biometric […]

Cisco Survey: 100% of Fortune 500 Hosting Malware?

If you’re working in IT at a Fortune 500 firm, Cisco Systems has some unwelcome news: you have a malware problem. According to the 2013 Annual Security Report from the networking giant, 100 percent of 30 Fortune 500 firms it surveyed sent traffic to Web sites that host malware. Ninety-six percent of those networks communicated with hijacked servers operated by cyber criminals or other malicious actors and 92 percent transmitted traffic to Web pages without content, which typically host malicious activity. “It was surprising that it was 100 percent, but we know that it’s not if you’re going to be compromised, but when,” said Levi Gundert, a technical lead in Cisco’s Threat Research, Analysis and Communications (TRAC) group in an interview with The Security Ledger. Among the high points (or low points) in Cisco’s Report: Cisco observed the highest number of vulnerabilities and threats on its Intellishield alert service in the 13 years […]