Public Intelligence releases Android threat warning from Homeland Security and the FBI

There’s a report out there today appearing with the public dissemination of nearly-secret information site Public Intelligence that has the USA-centered Homeland Security organization and FBI showing Android as a threat for Malware nationwide. This report shows that because Android 2.3 Gingerbread it still a widespread operating system, Google’s own mobile system is a threat […]

Piper security system is a sleek way to monitor your home

Home security systems aren’t exactly known for being sexy. However, the Piper is aiming to change all that. Developed by Ottawa-based BlackSumac, the Piper strives to give home security and automation a new look while offering up a robust feature set. And the startup is hoping to use crowdsourcing platform, Indiegogo, to bring it all […]

Google tightens Android app rules for device interference and in-game purchases

Google Play Store at Google IO 2013

Google occasionally updates its Play Store rules to weed out inconsistent or shady behavior in Android apps, and we’re witnessing one of its larger clean-ups today. The company’s new guidelines more explicitly ban device interference: titles in the Play Store can’t modify settings or other apps without permission, and they can’t install bookmarks or icons that pitch a third-party service. Google is also adamant that any in-game purchases of virtual goods must go through its billing system. As usual, new apps have to follow these guidelines right away, while developers with existing apps have a 30-day grace period to make any changes. The policies won’t necessarily stop rogue code from sneaking into the Play Store, but Google can at least say that it gave fair warning.

Filed under: , , , ,

Comments

Via: The Next Web

Source: Google Play Support

Moto X Skip dongle hands-on with Moto Maker custom phone

The Moto X is only showing up in AT&T stores today, but since we got our order in early through our Moto Maker walkthrough last week, we’ve had an early opportunity to try out the new Skip security dongle system. Effectively a wearable NFC tag, the Skip clips to your jacket, jeans, or purse, and […]

Unlocking Moto X with the Motorola Skip (hands-on video)

Unlocking Moto X with the Motorola Skip handson video

Motorola’s new Skip NFC smartphone key is quite possibly the simplest gadget we’ve covered at Engadget. But simple as it may be, Skip is a time saver for Moto X users. The tiny device, comprised of an NFC tag, a small piece of fabric and a pair of magnets for securing to an article of clothing, such as a pants pocket or shirt sleeve, ships for free with all Moto Maker orders, and is available as a $20 add-on if you’ve purchased your Moto X directly from a carrier. It’s also bundled with three NFC-enabled stickers that you can affix to your car, a piece of furniture or a personal accessory, like a purse or wallet.

Setting up Skip takes only a few seconds. Assuming you have NFC enabled, tap the Moto X to the Skip or one of the bundled Skip Dots, and a configuration screen will pop up prompting you to pair your device with the tag. You’ll enter your password to complete the process, then any time you need to unlock your phone in the future, all you need to do is tap the two together. Skip might not be the best fit if you keep confidential corporate data on your handset, but assuming your password serves mostly to keep prying eyes away from personal email or text messages, it should do the trick. Catch Skip in action in our hands-on video after the break.%Gallery-slideshow73405%

Filed under: , ,

Comments

Report: NSA used taxpayer dollars to cover PRISM compliance costs for tech companies

Report NSA used taxpayer dollars to cover PRISM compliance costs for tech companies

The mounting national debt? Yeah, you’re probably better off just ignoring why exactly it’s mounting. The Guardian is continuing the blow the lid off of the whole NSA / PRISM saga, today revealing new documents that detail how the NSA paid out “millions” of dollars to cover PRISM compliance costs for a multitude of monolithic tech outfits. As the story goes, the National Security Agency (hence, tax dollars from American taxpayers) coughed up millions “to cover the costs of major internet companies involved in the PRISM surveillance program after a court ruled that some of the agency’s activities were unconstitutional.” The likes of Yahoo, Google, Microsoft and Facebook are expressly named, and while Google is still angling for permission to reveal more about its side of the story, other firms have conflicting tales.

For whatever it’s worth, a Yahoo spokesperson seemed a-okay with the whole ordeal, casually noting that this type of behavior is perfectly legal: “Federal law requires the US government to reimburse providers for costs incurred to respond to compulsory legal process imposed by the government. We have requested reimbursement consistent with this law.” Meanwhile, Facebook stated that it had “never received any compensation in connection with responding to a government data request.” Microsoft, as you might imagine, declined to comment, though we heard that Steve Ballmer could be seen in the distance throwing up a peace sign. At any rate, it’s fairly safe to assume that your worst nightmares are indeed a reality, and you may have a far more enjoyable weekend if you just accept the fact that The Man knows everything. Better, right?

Filed under: ,

Comments

Source: The Guardian

Circle Gives You Distributed Control Of Your Family’s Internet So You Can Be Human To Each Other

cf86ab3d98fbf6632f26de1e1285d568_large

Let’s not kid ourselves: We don’t control the Internet, the Internet controls us. Any notions to the contrary are foolish at best, but a new Kickstarter project called Circle wants to help families fight back against the Internet’s omnipresence with hardware and software that allows individual control of devices connected to a local network.

Circle isn’t a router, like the Skydog, which was created by the Xerox PARC company PowerCloud Systems and is based on a similar concept. Instead, it’s a network device that can communicate with your router, and with all of your connected devices, offering up a filter between your existing gear and the unfiltered Internet, allowing you to set limitations for kids’ devices based on age, time, ad content and more. You can receive notifications about different types of Internet activity to your own device, too, and get reports about both “negative” and “positive” browsing, Circle claims.

In other words, Circle makes you the NSA PRISM program for your own household, but with a little bit of China’s Great Firewall thrown in the mix. You can schedule timed access to different categories of site, so that Facebook or YouTube time doesn’t get crazy, cut off access temporarily via Pause mode, turn off access once it’s time for bed, and even block ads entirely on devices that your kids use. All of this is managed via an app for iPhone.

Circle says their solution is better because it doesn’t require setting up user profiles or installing nanny software on every individual device, and because it works with your existing router, you don’t need to get an expensive replacement or change any network settings.

The team behind Circle includes Tiebing Zhang, a former network security engineer for the Department of Defense, and Honeywell Wi-Fi control systems engineer, as well as Jelani Memory, an entrepreneur with experience in design, sports, business development and much more besides. Circle definitely manages to look the part, thanks possibly to founder and Product Designer Sean Kelly, but whether it can back up those good looks with performance remains to be seen.

Circle is $150 to pre-order via Kickstarter pledge, with an anticipated delivery date of August, 2014. Nice to see a hardware startup give itself a reasonable amount of time to deliver. The startup is also looking for roughly $250,000 in total funds to make the project work, which will take the working prototype that currently exists and make it production-ready.

CoreOS looks to fork Google’s Chrome OS to help tame the web

CoreOS looks to grab piece of the Linux server market

Luckily, most of us don’t have to think about the tangled infrastructure that keeps the internet ticking along. But, as profiled by Wired, that’s the obsession of the crew at CoreOS, who are building an operating system it ambitiously hopes will help make the web tidier and more nimble. It’s underpinned by Chrome OS, which the team aims to fork so that it can run every web service imaginable. That’d give smaller players in the web server game access to modular web infrastructure tech, like that used by Google on desktops and laptops with ChromeOS. It would also keep servers up-to-date automatically without the need to install brand new versions of an operating system — a peril-fraught hassle administrators often postpone as long as possible. If successful, the project could result in better server security, quicker response to evolving web technologies and less downtime. CoreOS is still early in its development, but the group has already sold another of its open source projects to cloud player Rackspace, and counts Linux kernal specialist Greg Kroah-Hartman among its collaborators. For more, check Wired’s in-depth take on it at the source.

[Image credit: Wired]

Filed under: ,

Comments

Source: Wired

Google Exploring Location-Dependent Security Settings For Smartphone Unlock

unlockpattern

Google has a patent application published today (via Engadget) that would make the standard system of unlocking a device much more intelligent, using a smartphone’s built-in sensor to change your security settings on a sliding basis depending on where the phone finds itself. This would allow a user to make it easier to unlock a phone while in the comfort of their own home, while making it more difficult when the device is in a public place.

The invention is clearly designed to make it harder for a stranger or unwanted intruder to access your phone and its data when it may be easily lifted from your pocket or bag while in transit or at a public location like a cafe. In the end it’s a convenience feature, more than a security one, since the most secure option would be to use the most intrusion-resistant method of screen locking available at all times. But making things easier to access at home makes a lot of sense, in terms of decreasing friction and potential displeasure with the general user experience.

The patent as described also contains a provision that would allow for a third authentication method to be set for a second so-called “familiar area.” This would allow for a number of different possibilities, like setting different levels of security for home, work and the rest of the world, for instance. It’s a handy and noteworthy wrinkle in the patent app, since it could also make it possible to essentially set up a specific security profile required in professions where on-site security of data and mobile devices is paramount.

There are a lot of ways this could potentially be useful, in fact, and it’s one of those context-based features that Google seems to be focusing on with Google Now and recent updates to apps like Keep. In the future, you have a different phone depending on where you go, and that’s something most of the tech giants seem to be working on.

Google applies for location-based security patent, locks down your phone on the go

Google applies for locationbased security patent, toughens up your smartphone while outdoors

Google’s knack with location services helps us to get around, but hopefully, that same tech will serve to keep our devices safe in the future. Mountain View has applied to patent a system that modifies your smartphone’s security depending on where you are. If you’re at home or work, for instance, then swipe-to-unlock will suffice, but if you venture into the unknown, then your handset will demand you enter a code or, you know, offer up a DNA sample. The only issue that we can find, of course, is that you’d better hope that the person who lives above or below you in the apartment block doesn’t have their eyes on your Nexus.

Filed under: , , ,

Comments

Source: USPTO