Page 3,969«..1020..3,9683,9693,9703,971..3,9803,990..»

Tucson Morning Blend Top 5 Tech Trends you’ll love this year. Heather Rowe 1:27 – KGUN

NEW TECH STUFF TO MAKE OUR LIVES BETTER IN 2020 In the decade now drawing to a close, every part of our lives our personal lives, our businesses and careers became fully digital. And with the 2020s now upon us, were going to see even more massive changes as the tech we use gets further refined and as technology that was dreamed up only recently becomes part of our daily routines! Here are five of the top technologies that IBM says will revolutionize the year and decade ahead:

1. Artificial Intelligence will turbo-charge productivity both personally, and professionally.

While artificial intelligence probably wont take your job, it will change how you work. In the coming decade, expect to see AI making its way into all sorts of workplaces around the world automating routine tasks that will free up your time to concentrate on parts of your job that are more satisfying and meaningful. And there will be lots of new jobs and career possibilities for those who gain the skills to work in technology fields.

2. Blockchain will help to make the food you eat safer than ever.

Food recalls keep consumers constantly on their toes affecting their shopping habits, and calling produce and pantry items into question. But blockchain networks like IBM Food Trust (which is used by a growing number of retailers including Walmart, Albertsons and Carrefour as well as major food suppliers like Dole) are helping to trace foods from the farm to your fork. What is blockchain? Its a digital ledger that means means consumers now have unprecedented insight into exactly where their food has come from and it doesnt stop with food blockchain now tracks global shipments, marriages and more. Right now were able to track food shipments on the blockchain via apps and in the next decade, well see this cutting edge technology become a part of everyday life.

3. Edge Computing will have a big impact on retail, and on the tech you use on your cell phone.

Today's consumer electronics, cars and electric vehicles, and all sorts of other digital devices are equipped with sensors that collectively generate tons of data. Today theres an estimated 15 billion intelligent devices operating on the outer edges of the network, and by 2022, that number is expected to reach 55 billion. In order to make sense of all of the information from these devices, well see massive growth in whats called edge computing: the use of compact, efficient computer servers located at the networks edges/near these smart devices that can process data locally, instead of sending it all back to a data center via the cloud.. The next decade will see a surge in edge computing, aided by the rollout of 5G technology and while consumers wont see edge computing it will transform the way retailers stock the latest goods you buy, and it will affect how cellphone carriers support mobile gaming and augmented reality and more.

4. From cloud computing to the Hybrid Cloud: what you need to know.

You know how when youre getting ready to pack for a big trip, you need to gather stuff from all over the place to make your vacation work? You might have clothes and shoes spread out between multiple closets, your suitcase is in the basement, your passport (which needs to stay super secure) is in a safe. Well, businesses with lots of data are the same way: they might have some info in one type of cloud, some info in another, and more stuff on three servers in two different states. Thats why more and more businesses are turning to hybrid cloud: its a technology infrastructure that makes it easy for companies to quickly access data wherever its stored to make it usable and easy to analyze. For consumers, this means theyre being helped by retailers and companies more quickly all with their data being safer than ever.5. Quantum computing moves from the realm of the theoretical (and from being a sci-fi movie plotline!) into the world of practical experiments and applications.

Its not necessary to be a quantum physicist to grasp the main point of quantum computing: it seeks to solve complex problems that have been considered unsolvable using classical computers alone. IBM is a leader on making quantum technology available to industry, academia and anyone else inspired by quantum computings potential. As the next decade unspools well see quantum computing moving from the lab to the mainstream and it will start to solve problems in chemistry, medicine and more.

Visit link:
Tucson Morning Blend Top 5 Tech Trends you'll love this year. Heather Rowe 1:27 - KGUN

Read More..

Honeywell names Top 11 Innovations of 2019 – wingsmagazine.com

Honeywell published an online post of what it sees to be the Top 11 breakthrough technologies that will shape the future, with a primary emphasis on aviation as well as the manufacturing and processes helping to drive the industry forward. The following Top 11 list was produced by Honeywell, with the company first describing What the innovation is and then Why it will be impactful. Honeywell notes many of these technologies already had a major influence over the past year.

1. Power for air taxisWhat: This was a major year for advancements in Urban Air Mobility (UAM) and soon air taxis will be a future mode of transportation. This means the airspace will be more crowded than ever. A new Compact Fly-By-Wire system, used in traditional aircraft, has been redesigned for air taxis. It is about the size of a paperback book.

Why its innovative: The compact computer system packs the brains of an aircrafts flight controls into one system. Operating as though the autopilot is always on, it brings agility, stability and safety to future electronic virtual takeoffs and landings.

2. Surveillance cameras forsee buyer behaviorWhat: Security cameras, which traditionally monitor for theft, can now be used to help retailers make decisions about product displays, operating hours and staffing.

Why its innovative: Surveillance systems can predict future trends by monitoring buyer behavior and store patterns. This comes in handy for retailers who can analyze that data and influence how shoppers experience stores, ultimately boosting sales.

3. Access to Quantum ComputingWhat: This long-awaited technology goes from theory to impact with a new partnership with Microsofts Azure Quantum that will give organizations around the world access to quantum computing through an open cloud system.

Why its innovative: Quantum computing is a step closer to becoming a more common reality. Businesses and organizations will be able to use it to tackle problems they never would have attempted before.

4. Intelligent hearing protectionWhat: The VeriShield headset and cloud-based technology monitor noise levels that workers are exposed to, providing real-time alerts when noise exceeds safe levels.

Why its innovative: Managers can remotely monitor sounds affecting workers with a smartphone or mobile computer and alert employees to potential issues. The first-of-its-kind headset collects data on noise patterns and gives insights into long-term exposure. That helps companies develop an effective noise conservation program to protect workers hearing.

5. Robotic cargo unloadingWhat: Robots now can unload tractor trailers full of inventory at distribution centers. The Robotic Unloader eliminates the need for people to work inside the heat of a tractor trailer that can be strenuous and unsafe.

Why its innovative: Artificial intelligence gets the job done without an operator. That improves safety, offsets shortages in staffing and minimizes damage to goods.

6. Predictive airplane maintenanceWhat: With Honeywell Forge for Airlines, software combines individual aircraft and overall airline data into one dashboard, airlines can predict aircraft maintenance to fix parts before they break.

Why its innovative: Because its predictive and not just preventative, the technology helps reduce flight delays caused by unexpected repairs. That helps airlines maximize profits, improve efficiency and safety and protect passengers.

7. Real-time data makes work more efficientWhat: Most of todays global workforce do not work at a desk. These deskless workers in airports, hospitals and other industries often rely on clipboard methods to do their jobs. With Honeywell Forge technology, pen and paper methods can be replaced with mobile computers to input data immediately. Software analyzes that data and gives immediate insight.

Why its innovative: Reducing inefficient steps of inputting data from paper save time and money. It also gives visibility to worker productivity and the ability to harness institutional knowledgea key priority as workforces get older.

8. Digital twins get smart about maintenanceWhat: Businesses that depend on equipment can use digital twin technology to mirror physical assets of a company. The digital version can use data from the physical equipment to predict machine availability, inefficient operations and maintenance needs.

Why its innovative: The ability to predict maintenance can optimize efficiency. Now, instead of having to stop operations or shut down for maintenance, plants can protect uptime and save money.

9. Fast communication during emergenciesWhat: Every second counts in a crisis. Traditional emergency communications may include relatively slow paging or color code signaling. Now, staff at hospitals, schools, airports and other high density buildings can use the Command and Control Suite to customize communications between specific teams, based on the severity of the situation.

Why its innovative: The command and control suite provides enhanced facility visualization, enhanced map navigation and broader editing capabilities.

10. Virtual engineering and controlWhat: A new generation of control system technology which is the hardware and software that operate industrial plants no longer relies on sequential project flows. With Experion Process Knowledge System (PKS) Highly Integrated Virtual Environment (HIVE) the virtualization approach unchains controllers and control applications from physical equipment and shifts day-to-day management of servers to a centralized data center. This allows operators to make late changes without their traditionally inherent risks and re-work.

Why its innovative: The technology simplifies control system design, implementation and lifecycle management. That enables plants to execute projects in less time, at lower cost and lower risk, while improving throughput, quality and operational reliability.

11. Machine learning to fight cyberattacksWhat: In an industrial environment, algorithms that detect anomalies immediately identify risks to systems in industrial controls environments.

Why its innovative: Detecting risk adds an additional layer of protection against cyberattacks. The algorithms analyze for risk that can be missed by common cybersecurity threat detectors. That includes threats like polymorphic malware, which changes constantly to avoid detection, and emerging types of threats. It operates on real-time data to immediately identify new and emerging dangers to industrial control systems and the Industrial Internet of Things.

See the original post here:
Honeywell names Top 11 Innovations of 2019 - wingsmagazine.com

Read More..

19 Most In-Demand Tech Jobs in Silicon Valley (and the Companies Hiring) – Dice Insights

Its a New Year, and in Silicon Valley, things are off to a weird start. Last year ended with a handful of unicorn startups either outright imploding (WeWork) or grievously underperforming (Uber), while some tech giants are undergoing a bit of an existential crisis (witness Googles co-founders deciding to step away from active duties). Its definitely not business as usual.

Despite those troubles, tech-industry unemployment remains low, and theres still lots of venture capital for startups that can demonstrate a pathway to a viable product (and perhaps even profitability). The biggest tech firms, meanwhile, are pouring considerable funding into cutting-edge areas such asmachine learning, artificial intelligence (A.I.), quantum computing, andadvanced data science.

With all that in mind, which jobs are currently most in-demand in Silicon Valley and nearby San Francisco? In order to answer that question, we turn to Burning Glass, which collects and analyzes millions of job postings from across the country. Over the past 30 days, Silicon Valley employers have posted the following positions the most:

What can we conclude from this list? Although tech companies are willing to pay top dollar for specialists in A.I. and other fields, they still have (and will likely always have) a pressing need for technologists who make sure that company operations run smoothly, day in and day out. This includes software developers (with a focus on applications), web developers (because websites must keep running, no matter what), and computer systems engineers/architects (because IT infrastructure is always evolving).

Membership has its benefits. Sign up for a free Dice profile, add your resume, discover great career insights and set your tech career in motion. Register now

Analysts and architects crop up on this list at several points, and thats no surprise, either. Companies need architects to build out infrastructure (and wrangle with the data that infrastructure holds); they also need analysts who can glean effective insights from all the collected consumer and business data.

And which companies are actually doing the hiring? Fortunately, we have a breakdown of that, as well:

Apple, Uber, and Salesforce top Burning Glasss list of Silicon Valley job postings over the past 30 days. No surprise there: All three companies are fixtures of the Bay Area, and bothAppleand Salesforce have considerable momentum behind them at the moment. That Uber is hiring is interesting, considering the firmlaid off hundreds of workers last yearbut perhaps its executives have decided on a new strategy that requires a new class of engineers and developers.

Although San Francisco and Silicon Valley offerhigh median salariesto technology workers, theres a substantial catch: the areascost of living is absurdly expensive, and sometimes comes paired with an annoyingly long commute (just ask all those San Francisco residents who must drive down to Mountain View or Cupertino every day). Meanwhile, smaller cities with a lower cost of living aredeveloping robust tech scenes of their own, both in terms of companies and open tech jobs. Silicon Valley looks like its going to continue to offer great opportunities in 2020, but It faces a fierce competition for talent with other cities and regions.

Go here to see the original:
19 Most In-Demand Tech Jobs in Silicon Valley (and the Companies Hiring) - Dice Insights

Read More..

New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware – ZDNet

While obtaining a new piece of tech hardware over the holidays can be exciting, it's not without risks, because in many cases, the default delivery state of the shiny new thing offers very little in the way of cyber security.

That means connecting your new product to the internet straight out of the box without taking security precautions could leave you open to hacking, cyber attacks and malware - all of which could put your data and privacy at risk.

To help users enjoy their new devices safely, the UK's National Cyber Security Centre (NCSC) the cyber arm of the GCHQ intelligence service has detailed five simple steps which can help make devices more secure.

1. Protect it with a strong password

People often believe that cyber criminals need to be expert sleuths to crack people's passwords, but the reality is that people use weak passwords which are easy to guess. It could be that they're using the default password which comes with the new device, or it could be that they're using common or easily guessable weak passwords like '12345' or 'password' for their email, shopping and social media accounts.

That's why the NCSC says that users should change simple or default passwords to a more secure one, so that it's not so easy for cyber criminals to guess. One way the NCSC suggests doing this is by making your password three random words which are memorable to you, but difficult for others to guess.

2. Turn on two-factor authentication (2FA)

A strong password is a good first step to securing a device and the accounts, but it isn't impossible for cyber criminals to use brute force attacks in an attempt to crack passwords, or to use phishing attacks to dupe users into giving up their passwords.

That's why the NCSC recommends using two-factor authentication to ensure that there's another barrier to attackers gaining access to accounts. Because even if attackers know your password, having to authorise the login attempt via a text message or application on your smartphone makes it harder for hackers to hijack the account.

SEE:A winning strategy for cybersecurity(ZDNet special report) |Download the report as a PDF(TechRepublic)

"While you're at it, turn on 2FA for your main email account if you haven't already. That's the centre of your digital life because things like password resets get sent there, so it needs to be better protected than other accounts," saidIan Levy, technical director at the NCSC.

3. Always accept automatic updates

Smartphones, tablets, computers and Internet of Things devices all now regularly receive updates from manufacturers but users will regularly put off applying either because they see installing the updates as a waste of time or don't understand why devices need to be updated.

However, updates are often issued after security vulnerabilities arise as means of closing loopholes which can otherwise be exploited by hackers. Many of the most high-profile malware campaigns and cyber attacks of recent years have spread so easily because they're taking advantage of known vulnerabilities which users haven't applied the patches to fix.

Because of this, the NCSC recommends that users should configure all their smart devices to install automatic updates and to install updates for phones, tablets and computers as soon as they get the option.

4. If you don't want it anymore, perform a factory reset

Sometimes people decide that a gadget isn't for them, or they decide that they want to trade it in for a newer model. If this is the case, the NCSC suggests that users should perform a factory reset of the device. By returning the device to its original settings like this, users will wipe all of their personal data from it, meaning that that information can't be potentially exploited by whoever uses it next.

5. Here's what to do if something goes wrong

If the worst happens and users think an outsider has control of a device inside their home, the NCSC recommends users perform a factory reset. Meanwhile, if users become aware of an incident reported in the news and think their product is affected, they should visit the manufacturer website for advice.

There's also the option of visiting the Information Commissioner's Office (ICO) website, or the website of the NCSC.

The five tips are simple, but they can do a long way to protecting users against the vast majority of cyber attacks.

"Enjoy your new devices and the cool things they can do. Don't be afraid of new technology and the internet. With some basic prevention, you'll be as safe as houses," Levy said.

READ MORE ON CYBER SECURITY

See the original post here:
New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware - ZDNet

Read More..

Internet of Things security firm Armis in talks to be acquired -media – Nasdaq

JERUSALEM, Jan 6 (Reuters) - Cybersecurity firm Armis, which specializes in protection for the Internet of Things (IoT), is in talks to be bought by a U.S. tech firm for around $1 billion, Israeli financial media outlets reported on Monday.

The Calcalist financial news website said that Armis was in advanced negotiations with an unnamed potential buyer to be acquired at a valuation of $800 million to $1.2 billion.

Officials at Armis could not be reached for immediate comment.

The company says its enterprise security platform protects IoT devices -- like medical infusion pumps or those used in production lines at car manufacturers -- from attacks by identifying suspicious or malicious devices and quarantining them.

In April, Armis said it raised $65 million in Series C funding, bringing the companys total funding to $112 million. The round was led by Sequoia Capital.

(Reporting by Ari Rabinovitch Editing by Tova Cohen)

((ari.rabinovitch@thomsonreuters.com; +972-2-632-2202; Reuters Messaging: ari.rabinovitch@thomsonreuters.com@reuters.net))

The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.

Continue reading here:
Internet of Things security firm Armis in talks to be acquired -media - Nasdaq

Read More..

BlackBerry Collaborating with Amazon Web Services to Demonstrate Safe, Secure, and Intelligent Connected Vehicle Software Platform for In-Vehicle…

LAS VEGAS, Jan. 6, 2020 /PRNewswire/ --BlackBerry Limited(NYSE: BB; TSX: BB) today announced it has teamed up with Amazon Web Services, Inc. (AWS) to demonstrate a connected vehicle software platform for in-vehicle applications that combines the safety and security of BlackBerry's QNX real-time operating system with AWS' Internet of Things (IoT) Services in the cloud and in the car. The platform enables automotive manufacturers to securely access data from vehicle sensors, and create software applications and machine-learning models for connected, electric, and autonomous vehicles.

With the AWS-powered BlackBerry platform, automotive OEMs can expedite their vision of continuously and quickly bringing innovative connected vehicle services to market, ranging from cockpit personalization, vehicle acoustic conditioning, vehicle health monitoring, and advanced driver assistance systems (ADAS) features.Car companies can also leverage this platform for their new software-centric electric car and autonomous platforms, enabling essential functions such as continuous EV battery life monitoring and prediction, and managing vehicle sub-systems to holistically control warranty costs, providing important security updates and seamless updates of vehicle software features to delight their customers, and drive monetization of vehicle data while exercising control over data access.

The AWS-powered BlackBerry platform combines the two companies' edge and cloud technologies into a comprehensive edge-to-cloud offering for the global automotive industry. QNX software allows automotive OEMs to develop and run a common software platform across in-vehicle systems such as gateways, TCUs, engine controllers, digital cockpits and emerging domain controllers, while AWS capabilities enable automotive software developers to securely and easily access data from vehicle sensors, build software applications and machine learning (ML) models using vehicle data, and deploy them inside the vehicle to enable in-vehicle inference and actions. The platform will integrate the BlackBerry QNX operating system and over-the-air software update services, with AWS IoT cloud services for secure connectivity and telematics, Amazon SageMaker for developing ML models, and AWS IoT edge services for in-vehicle ML inference.

"By working with AWS, we can provide OEMs with a unique foundational software platform that will allow them to build the next generation connected and autonomous cars of the future," said John Wall, Senior Vice President and Co-Head of BlackBerry Technology Solutions. "By combining our technologies and strengths into one dedicated cloud-based offering, we can ensure automakers have the tools they need to deliver the driving experience consumers want, without sacrificing on the security and reliability they need."

"Our automotive customers are developing exciting new products and services that rely on the power of the cloud, IoT, and AI/ML. We are thrilled to be working with BlackBerry QNX to provide secure connectivity and advanced edge computing capabilities for the next generation of electric and autonomous vehicles," said Bill Vass, Vice President, Technology, Amazon Web Services, Inc.

"Combining the safety and security of QNX with AWS cloud and edge intelligence has the potential to speed the development of Karma's connected car ecosystem," said Lewis Liu, Karma Automotive Vice President, Business Development and Strategy. "It shows how Karma's vehicle platform is being used by technologists as a test-bed to prove new innovation, speed product development and ultimately to provide owners with leading cyber-security resources and predictive maintenance information via the latest artificial intelligence applications. The result is enhanced VVIP treatment for our discerning luxury-customer base, and cutting-edge technology that can lead to new business opportunities for Karma beyond pure automotive retail sales."

BlackBerry's full suite of automotive offerings will be demonstrated at the Consumer Electronics Show (CES) in Las Vegas from January 7-10, 2020, at the Las Vegas Convention Center.Visit BlackBerry at Booth #7515 in the North Hall.

About BlackBerry

BlackBerry (NYSE: BB; TSX: BB) is a trusted security software and services company that provides enterprises and governments with the technology they need to secure the Internet of Things. Based in Waterloo, Ontario, the company is unwavering in its commitment to safety, cybersecurity and data privacy, and leads in key areas such as artificial intelligence, endpoint security and management, encryption and embedded systems. For more information, visit BlackBerry.com and follow @BlackBerry.

BlackBerry and related trademarks, names and logos are the property of BlackBerry Limited and are registered and/or used in the U.S. and countries around the world. All other marks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.

Media Contacts:BlackBerry (519) 597-7273mediarelations@BlackBerry.com

SOURCE BlackBerry Limited

http://www.blackberry.com

Read more here:
BlackBerry Collaborating with Amazon Web Services to Demonstrate Safe, Secure, and Intelligent Connected Vehicle Software Platform for In-Vehicle...

Read More..

The Internet of Things: how safe are your smart devices? – Spectator.co.uk

After years of marketing hype, it seems the much-heralded Internet of Things (or IoT to those in the know) has finally arrived. From washing machines and heating systems that can be controlled from your smartphone, to doorbells that learn to recognise regular visitors and broadcast suspicious activity, more and more of us are upgrading our homes with internet-enabled devices. But have we stopped to think about the cybersecurity of this new technology?

One expert isnt convinced weve thought it through. Mikko Hypponen is chief research officer for the Finnish digital security company F-Secure. Having observed the rise in IoT devices, hes coined a new maxim to alert consumers to their potential dangers: if its smart, he says, its also vulnerable. Its a pessimistic rule, he tells me during a stopover in London ahead of an industry speaking gig but its a true one too: the more connectivity we add to our homes, the more vulnerability we create.

The big risks for IoT devices fall into two broad categories, he explains both of which are already being exploited by cyber-criminals. The first and more obvious vulnerability is that smart devices might serve as a backdoor into our home networks, allowing hackers easier access to our laptops and smartphones and all the valuable information (from passwords to credit cards) that entails. In cybersecurity circles, the examples are already becoming legendary: like the Las Vegas casino that reportedly had its high-rollers database stolen by hackers who entered the network via a smart fist-tank.

Smart devices like fridges and doorbell cameras are typically the weakest link in your home network, Hypponen says. Its a problem compounded by the fact that buyers are rarely encouraged to take even the most basic of safety precautions such as changing the devices password from its default setting. Along with other new technologies (in particular cryptocurrencies like Bitcoin that allow for untraceable payments) its led to a spike in ransomware attacks, where hackers render computers useless until the user sends them a large sum of money. One of the most famous ransomware viruses was the Wannacry malware, which infected NHS computers in 2017 apparently at the instruction of North Korea.

So what can owners do to protect their own devices and their wider home networks against attack? One obvious step, according to F-Secure, is to ensure your WiFi network is as secure as possible. That means changing its name (thus making it difficult for hackers to identify its make and model and, from there, its security flaws), using WPA2 encryption, and ensuring you use a secure password. As for IoT devices themselves, owners should be sure to change the default password and also look at disabling certain features like Universal Plug and Play which make it easier for hackers to exploit their vulnerabilities.

While ransomware attacks are on the rise, Hypponen is also interested in a newer form of cyber-crime which targets the next wave of smaller IoT devices like toasters and hairdryers which connect directly to the internet using 5G. Hang on a minute, I ask. Who needs an internet-enabled toaster? Well, no-one, admits Hypponen. Yet he simultaneously predicts that, as internet-connectivity becomes cheaper and cheaper, it will soon be impossible to buy toasters that dont connect to the internet.

How so? The reason is that toasters arent going online to provide new functionalities to the customer: instead theyll be providing manufacturers with real-time data on exactly how the device is being used. This kind of mass data is extremely valuable to manufacturers, allowing them to continuously improve their products, but it also makes devices vulnerable to cyber attack particularly given many use only the most basic encryption and dont always allow users to change their settings. In the past year, Hyponnen says, hes seen more cyber attacks on IoT devices than Windows computers.

Given these devices arent usually connected to your home network (they access the internet directly through tiny 5G chips), the aim isnt to get hold of your personal data. Hackers want to recruit your devices into their botnets vast swarms of captive IT addresses that can be used to attack internet servers by sending an overwhelming flood of nonsensical data. In 2016, millions of such devices across the world were harvested in the Mirai botnet, which managed to take down websites from Twitter to the BBC, and Spotify to FoxNews. It remains one of the largest cyber-attacks of recent history.

So whats the solution? Hypponen says that industry has been slow to act partly because consumers dont suffer directly if their devices are targeted. During the Mirai attack, I called one office because we could see that a heat pump in their network was part of the botnet, he says. I asked them do you own this particular model of pump? Well are you aware its being used to help take down half of the internet right now?. He says that the company was fascinated to hear about the botnet, but werent particularly motivated to spend their own money to secure their devices. Of course many more wont even know the breach has taken place: a study by the Dutch digital security firm Gemalto found that less than half of businesses were able to identify when an IoT device had been hacked.

Hypponen contrasts the approach taken by both government and industry to cybersecurity with the more established approach to consumer safety. If you buy a washing machine, you can be certain its not going to catch fire or give you an electric shock as we certify those things, he says. But theres no regulation at all on whether the machine might end up revealing your WiFi password to hackers. Though that might be changing: the UK government has begun consulting with experts and industry on how to develop appropriate safeguards, while Finland has just become the first country to introduce a government-backed quality stamp for those products which meet basic cybersecurity standards.

With around a quarter of British homes already using smart devices and another 40 per cent saying they would consider buying one in the next five years its an issue which wont be going away any time soon. Something to keep in mind when youre eyeing up your new toaster.

More:
The Internet of Things: how safe are your smart devices? - Spectator.co.uk

Read More..

Beset by lawsuits over poor security protections, Ring rolls out ‘privacy dashboard’ for its creepy surveillance cams, immediately takes heat – The…

CES With criticism mounting, Amazon's Ring revealed a web dashboard of privacy controls it hopes will slash the number of horror stories coming from customers.

On Monday, in time for this year's CES in Las Vegas, the home surveillance camera and internet-connected doorbell specialist made a point of unveiling an account control panel it hopes will allow users to better manage the access settings on their devices and keep hackers and other intruders out. The new controls will be available across all products.

"This latest feature will make it easy to view and control privacy and security settings from one dashboard," Ring said of the new feature.

"The Control Center will initially let you see and manage your connected mobile, desktop, and tablet devices, as well as third-party services; it will also enable you to opt out of receiving video requests in areas where local police have joined the Neighbors app."

This comes after Ring found itself under fire on a number of fronts for its privacy policies and security protections. In particular, the close relationship Ring struck with America's plod has worried civil rights groups who believe that the cameras provide officers with excessive levels of surveillance power. In short, Ring encourages folks to share their web-connected cam footage with neighbors and the police, opening up a whole can of worms regarding privacy and consent.

And it doesn't alert owners to multiple logins from across the country or world a tell-tale sign of an account compromise nor limit the rate at which miscreants can attempt to guess account passwords. It does not direct people to use multi-factor authentication, nor does it require strong passwords, and nor does it reject username-password combinations known to be stolen from other websites. It basically fails to prevent netizens from falling foul of brute-force attacks and credential stuffing, and subsequent security device hijackings, by miscreants on the other side of the internet.

Don't expect the dashboard rollout to solve any of these worries. Digital-rights group Fight for the Future was quick to dismiss the CES announcement as "a total joke." The dashboard "amounts to little more than a cosmetic redesign," the campaigners added, and no new protections have been added, we're told.

"Amazon is still putting the responsibility on users to protect these devices, knowing full well that they wont," thundered Fight for the Future deputy director Evan Greer.

"You cant sell a car without seat belts or airbags and then say the driver should have installed them when they get in a crash. Amazon is selling cheap, insecure, internet-connected surveillance cameras and convincing people to put them inside their homes, knowing that they put those people in danger."

And then there's the matter of the lawsuits. In December, a class-action case emerged in the US over a spate of hacks of in-home Ring surveillance cameras. And in California on Friday, a second suit [PDF] was filed complete with harrowing details of what lawyers for the plaintiffs call a "living nightmare" enabled by shoddy Ring security.

Named Plaintiffs Ashley LeMay and Dylan Blakeley recounted a time when a hacker broke into the couple's Ring security camera over the internet, and began playing music over the gizmo to lure their 8-year-old daughter into a bedroom where the miscreant could speak to the child.

"Intrigued by the music, the Blakeleys eight-year-old daughter, A., went to the room she shares with two of her younger sisters to investigate. But the room was empty. As A. wandered the room, looking for the source of the music, the song abruptly stopped, and a mans voice rang out: 'Hello there'," the filing recounts.

"It was a stranger an unknown hacker, who had taken over the Blakeleys account and had the ability to see, hear, and speak to A. inside her own room. In a chilling exchange captured on the devices video recording, the hacker began shouting racial slurs at A. and encouraging her to misbehave."

The lawsuit states that there are a number of glaring flaws in Ring's security, such as allowing multiple logins from different IP addresses, not insisting on two-factor authentication and, even then, only using text messages for multi-factor login codes, leaving people open to SIM-jacking attacks.

It might take a bit more than a dashboard to fix this.

Read the original:
Beset by lawsuits over poor security protections, Ring rolls out 'privacy dashboard' for its creepy surveillance cams, immediately takes heat - The...

Read More..

Start the new year, and new decade, by making your slice of the internet more secure – Times Colonist

TORONTO In a year that saw companies such as TransUnion, Facebook and Desjardins urge their Canadian users to change their passwords and monitor their financial accounts due to data breaches, it's never been more important to safeguard your personal information.

The crucial part, however, is to actually take steps to make your personal data less vulnerable to cybercriminals.

"That's really what cyber hygiene is all about," said Adrian White, director of the financial crimes division at the Canadian Bankers Association.

"You want to make sure you minimize the risks by doing things on a regular basis that keep you safe from these kinds of threats in the criminal space."

The start of a new year, and (by most accounts) the start of a fresh new decade, presents an excellent nudge to review digital passwords and take other steps to protect yourself and your finances online.

Taking action is increasingly important amid a rising number of major data breaches, leaving more sensitive data vulnerable to criminals who find devious new ways to put it all to use.

"As we move into 2020, people have less and less control over the security and privacy of their personal information," said Claudiu Popa, cybersecurity expert and CEO of Informatica Corp.

With so much out of your hands, it's important to keep control of the key points of entry for your personal online accounts.

First and foremost is updating your passwords, those jumbles of characters that you've been haphazardly managing since you went online. It's time to create a system that will carry you through the next decade with greater safety and peace of mind.

One of the best ways to create a secure password is to think of a phrase, and then use the first letter of each word with some numbers and symbols mixed in as the password. The full phrase can also be used if it is easier to remember, with some added random bits to add security.

"I've stopped calling them passwords, I call them passphrases," said Popa.

"Because the emphasis is on the most important attribute of passwords, which is length. The longer they are, the more useful they are."

Better yet, use a password manager, which can create complex passwords and them remembers them so you don't have to. There are a wide variety out there, including some quite functional free versions from providers like LastPass, KeePass, and Dashlane.

"The sooner you get comfortable with a password database the better," said Popa.

Next is your email, which is the way you access all those accounts where you've forgotten your password because you don't have a system or password manager in place.

You should keep your primary email linked to online banking and other important accounts secure by only giving it out when necessary. Have a second email for less important accounts that don't store personal data, and consider using disposable accounts when possible, said Popa.

"A lot of people just constantly give out their real, their almost permanent, their long-term personal email address because they don't know how to get a disposable one."

There are plenty of online services that let you set up a quick email address to satisfy those sites that demand an address when you don't feel you need to give one.

And while you're considering whether an email is needed, expand that assessment to any other information asked of you, whether it be a request for your email address at the big box store or a social insurance number when applying for a credit card.

The less information you give out, whether to companies or to the general public on social media, the lower the chances it will fall into the wrong hands.

Other important steps to staying secure, like keeping programs updated, checking in on your online financial accounts, being wary of what you're connecting your devices to (especially public wifi), and to generally keep a skeptical eye on everything online.

With these two main areas more secure you can venture out a little more confidently in the new year.

This report by The Canadian Press was first published January 2, 2020.

Visit link:
Start the new year, and new decade, by making your slice of the internet more secure - Times Colonist

Read More..

Russia Takes a Big Step Toward Internet Isolation – WIRED

Over the holidays, the Russian government said it had completed a multi-day test of a national, internal internet known as RuNet, a bid to show that the country's online infrastructure could survive even if disconnected from the rest of the world. Though Russia claims the initiative relates to cybersecurity, researchers and human rights advocates inside Russia and around the world argue that the test underscores Russia's broader campaign to control and censor access to digital information within its borders.

Whether the Kremlin intends to fully cut Russia off from the global internet remains an open question. But through its support of purpose-built Russian services and its tech sector more generally, Russia has indisputably made significant steps toward going it alone. In early December, President Vladimir Putin signed a law that will take effect this summer requiring all computers, smartphones, and smart TVs sold in Russia to come pre-loaded with apps from Russian developers. The government is also investing 2 billion rublesabout $32 millionin a Russian Wikipedia alternative.

Those initiatives, together with increasingly isolationist infrastructure, points to a desire for markedly increased control. But analysts say that last week's test may actually reflect a gradual approach rather than a rush to separate.

"There is not that much data available, but presenting the drills that happened in late December as a real-world exercise about disconnecting Russia from the global internet is probably exaggeration. There were no user reports confirming that," says Leonid Evdokimov, a Russian security researcher at Censored Planet who formerly worked for the Tor Project and the Russian web services giant Yandex. "But the internet censorship and overall situation in Russia clearly has a chilling effect. So it seems there is no urgent need for the government to make an isolated internet right now. The current partial censorship and set of laws produce enough of a noticeable effect."

The fear is that at some point the government will trade incremental infringement for radical repression.

Over the last decade, the Russian government has worked steadily to build out legal and infrastructure-level internet controls, establishing content filters and block lists and introducing oversight mechanisms within private telecoms. In October 2018, the Russian government cut mobile data service in the Ingushetia region during political proteststhe first such internet outage in the country. Last August, the government initiated another internet blackout, this time during protests in Moscow. And in November, a new "sovereign internet" law also took effect, legalizing more radical isolation, including last week's test.

Technical challenges have slowed Russia's efforts, though. In the case of China, whose so-called Great Firewall gives the government near-absolute control over the internet, censorship and blocking infrastructure was built in from the start. In a country like Russia, where the internet grew mostly unchecked for decades, it's tougher to retrofit mechanisms for control. Take Russia's efforts in 2018 to ban the encrypted messaging app Telegram, which largely failed as Telegram and its users deployed anti-censorship techniques. Similarly, Russia's efforts to crack down on VPNs have been very problematic, but still not comprehensive.

"I dont think were going to see a large-scale shutdown in Russia or a large-scale block of big digital platforms. It isnt strategically viable," says Allie Funk, a research analyst at the pro-democracy group Freedom House, who works on an annual Freedom on the Net global assessment. "Russian users as a whole are extremely politically active and the government doesn't really want to deter foreign tech companies. So it seems like what they're trying to do is create an environment in which international or foreign platforms are more willing to comply with Russian laws."

That isn't to say the government couldn't eventually develop comprehensive control, but it hasn't yet demonstrated anything close to a full connectivity blackout or internet separation. In contrast, the Iranian government caused a total country-wide blackout in November that lasted multiple days. Iran is a much smaller and more geographically contained country than Russia, though.

Read the rest here:
Russia Takes a Big Step Toward Internet Isolation - WIRED

Read More..