ThingWorx, the ‘platform as a service’ (PaaS) vendor, has made empowering the Internet of Things (or Internet of Everything) its rallying cry. Now the company says it is the first to market with an IoT “marketplace” that it claims will speed development of smart, connected products. The company announced ThingWorx Marketplace at Salesforce.com’s “Dreamforce” event in San Francisco on Monday. The new platform will allow ThingWorx and third party firms to offer “components and services” that are needed to build full-featured IoT applications. Those may be things like new kinds of sensors, widgets, device connectors, protocol adapters, hooks into device clouds or integrations with enterprise management platforms, according to a ThingWorx statement. The platform will be accessible by ThingWorx partners, independent hardware and software vendors, and third party developers, the company said. Enterprises will be able to deploy private instances of the Marketplace to host internally developed applications, application templates, analytics, […]
Tag: Android
Hack Uses Phone’s Camera and Mic To Best Anti-Keylogger
Smart phones these days are bristling with sensors. Forget about the camera and microphone – there are accelerometers, Global Positioning System components, not to mention Bluetooth and NFC transmitters. All those remote sensors enable all kinds of cool features – from finding the nearest Starbucks to mobile payments. But they also pose a risk to the privacy of the phone’s owner – as malicious actors (and the occasional national government) look for ways to turn cameras and other sensors into powerful, cheap and convenient spying tools. Now researchers at The University of Cambridge have demonstrated one possible, new attack type: harnessing the built-in video camera and microphone on Android devices to spy on an owner’s movements and guess his or her password. The technique could be a way for cyber criminals to defeat anti-keylogging technology like secure “soft” keyboards used to enter banking PINs and other sensitive information. The work […]
Google: Android Infections Are Literally One-In-A-Million
The emergence of malicious software for Google’s Android operating system has been one of the biggest security stories of the last two years. But Google is arguing that much of that reporting is hype, saying its own data shows hardly any evidence of infections of mobile devices running Android. Speaking at the recent Virus Bulletin Conference in Berlin, Google mobile researcher Adrian Ludwig presented data that suggests the number of true infections from malicious software are vanishingly small – even in the unregulated independent Android marketplaces. But mobile security experts wonder if Google’s data isn’t burying legitimate security concerns about its mobile operating system. The explosion of Android malware has been so well documented as to become almost a truism in the security world. McAfee in August reported a 35 percent growth in Android malware that included “SMS-stealing banking malware, fraudulent dating and entertainment apps, weaponized legitimate apps and malicious […]
iPhone’s Touch ID Gives A Big Boost To Biometrics
Apple Corp. introduced the latest versions of its iPhone mobile phone yesterday to great fanfare, though the fever pitch that was common during the reign of Steve Jobs was noticeably absent. There were a flurry of articles and opinion pieces like this one, wondering whether Apple had lost its mojo, were common. And it goes without saying that if the headline is wondering whether you’ve lost your mojo, then you most certainly have. Still, Apple didn’t disappoint with its iPhone and iOS updates, particularly in the security arena. Indeed, the long-rumored addition of a finger print reader may have been the most prominent new feature in an update where the most prominent changes (a faster, 64-bit processor, higher resolution camera, etc. ) were transparent to the user. So what do you need to know about the new iPhone and its biometric authentication feature? And how will the new iPhone 5S […]
Report: Cell Phone Data, Blackberry Mail Swept Up In NSA’s Net
Sensitive data from every major brand of cell phone can be captured and analyzed by the U.S. National Security Agency, (NSA) according to a report in the German magazine Der Spiegel on Saturday. Citing “top-secret, internal NSA documents viewed by SPIEGEL reporters, the magazine said that NSA security researchers have developed tools to sap contact lists, SMS traffic, notes and location information from popular devices such as Apple’s iPhone, Google’s Android and Blackberry phones, including Blackberry e-mail, a supposedly secure system that is one of the phone’s most trumpeted features. The documents describe a large-scale and well-organized program within the NSA to obtain data from mobile devices, with discrete teams of security analysts working on a specific platform, developing malware that infiltrates the computers the phones “synch” with, and then loads scripts onto the phones that provide access to a range of other features. See Also: Secure e-mail firms […]