Fujitsu’s secure USB tech keeps your data from wandering off (or just plain deletes it)

With corporate espionage on the rise, you just cannot be too careful, right? We’ve all heard the horror stories: Someone takes a spreadsheet home to do a little number crunching on his personal PC and, next thing you know, some ne’er-do-wells in Tehran have the specs for the President’s personal helicopter. Well, the brain trust at Fujitsu Labs has put its collective heads together and come up with a pair of new technologies aimed at preventing sensitive information from getting into the wrong hands. First, the “secure USB memory device” is a thumb drive containing a processor and a battery. Data security policies can be set to delete data after a specific period of time or if the drive is accessed by an unauthorized computer — handy if the thing gets lost or misplaced. Second, the company’s “file redirect technology” restricts the data to the USB memory device itself, or to a specified server. The company is currently conducting internal trials of the technology, but we’ll let you know as soon as we see one of these bad boys in the wild.

[Via Akihabara News]

Filed under:

Fujitsu’s secure USB tech keeps your data from wandering off (or just plain deletes it) originally appeared on Engadget on Fri, 17 Apr 2009 13:03:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Fujitsu’s PalmSecure takes high-speed, contact free biometric readings

This next item should be music to the ears of security professionals, fans of biometric devices, and germophobes alike. Fujitsu has just announced a new palm vein authentication device — one that’s being touted as the world’s fastest, and the first that works without the user actually touching the device. Unlike past implementations of this technology, which moved at a comparative snail’s pace, PalmSecure works in as little as one millisecond. We can think of a number of places where this sort of thing could be particularly useful, from top secret lairs housing doomsday devices to anyplace where people might not be washing their hands as often as they should be (we really hate that). Despite its speed, Fujitsu insists that this bad boy performs with the same level of accuracy as its slow moving brethren. More pics after the break.

[Via Akihabara News]

Continue reading Fujitsu’s PalmSecure takes high-speed, contact free biometric readings

Filed under:

Fujitsu’s PalmSecure takes high-speed, contact free biometric readings originally appeared on Engadget on Fri, 17 Apr 2009 12:23:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Samsung comes clean with self-encrypting SSDs

It seems that Dell jumped the gun a wee bit by shedding some light on Samsung’s forthcoming self-encrypting SSDs, but now Sammy is providing us with all the missing details… er, most of them, anyway. In conjunction with Wave Systems, Samsung is launching what it calls an industry first with its new line of solid state drives. Said devices are able to automatically encrypt information as it’s saved to the drive, and they each come bundled with Wave’s EMBASSY management software. At least initially, these super secure SSDs will ship in 64GB, 128GB and 256GB flavors, and while we’re told that the whole lot is available now “through at least one major OEM,” there’s no specific mention of price. Shocker, we know. The full release is after the break.

Continue reading Samsung comes clean with self-encrypting SSDs

Filed under:

Samsung comes clean with self-encrypting SSDs originally appeared on Engadget on Thu, 16 Apr 2009 12:00:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Proposed bill would create National Cybersecurity Advisor

It hasn’t gotten a lot of traction yet, but Senators Jay Rockefeller and Olympia Snowe have jointly introduced a bill that would create an Office of the National Cybersecurity Advisor, a new White House position designed to beef up the nation’s information security policies. The new office goes hand-in-hand with the Cybersecurity Act of 2009, another proposed bill that would create an entire panel of security experts brought in from the government, private sector, and universities. All together, the two pieces of legislation would require that government networks and software meet a set of security standards and vulnerability tests — and, more controversially, that private networks deemed “critical infrastructure” by the President meet these standards as well. What’s more, El Presidente can order the disconnection of those networks during a “cybersecurity emergency” or national security emergency if needed, and security professionals will need to be licensed by the government to work on them. Yeah, it’s a long way from BlackBerrys loaded with presidential campaign information being sold at yard sales, but we’d bet some of these ideas get tamer as the bill moves through the process — we’ll see how it goes.

Filed under:

Proposed bill would create National Cybersecurity Advisor originally appeared on Engadget on Mon, 06 Apr 2009 13:43:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

How the Conficker Problem Just Got Much Worse

On the surface, April 1 came and went without a peep from the dreaded Conficker megaworm. But security experts see a frightening reality, one where Conficker is now more powerful and more dangerous than ever.

In the first minute of April 1, Conficker did exactly what everyone knew it was going to do: It successfully phoned home for an update. And while it was fun to imagine what nasty payload that update may have included (it was fun, wasn’t it?), the result was not outwardly catastrophic; rather than a blueprint for world domination, the update contained instructions on how to dig in even deeper.

“The worm did exactly what everyone thought it was going to do, which is update itself,” security expert Dan Kaminsky, who helped develop a widely-used Conficker scanner in the days leading up to April 1, told us. “The world wants there to be fireworks, or some Ebola-class, computers-exploding-all-over-the-world event or God knows what, but the reality is…the Conficker developers have cemented their ability to push updates through any fences the good guys have managed to build in February and March.”

And here’s why that is deeply, deeply scary. As we explained, Conficker has built a zombie botnet infrastructure by registering hundreds of spam DNS names (askcw.com.ru, and the like), which it then links up and uses as nodes for infected machines to contact for instructions. In its earlier forms, Conficker attempted to register 250 such DNS names per day. But with the third version of the software, the Conficker.c variant which has been floating around for the last month or so, the number of spam DNS takeovers was boosted to 50,000 per day—a number security pros can no longer keep up with.

What the April 1 update did was simple: It provided instructions for linking up with the thousands, perhaps tens of thousands of new nodes registered by Conficker.c over the last few weeks, effectively growing the size of the p2p botnet to a point where it can not be stopped.

“It’s not about ownage, it’s about continued ownage,” says Kaminsky, citing a favorite quotation of one of his hacker buddies. “It’s not about how you get into the network, it’s about, ‘How do you be [there] a year from now?'” And the answer is: “You do a lot of the things the Conficker developers are doing.”

“This is not something where the guys wrote it, it’s out, then they’re going to go out and play Nintendo. They’re frankly trying to build something that is a sustainable network for months or years to come,” Kaminsky says.

Kevin Haley, director of Symantec Security Response, raises another good point: “The first [of April] would have been a pretty bad day to choose [to do something with Conficker], because everyone was watching to see what was going to happen. Whoever’s behind this is as lot more patient than we are.”

As far as what comes next? More waiting. Good methods now exist for detecting and cleansing Conficker from infected machines on a network (and, let’s not forget, a months-old security patch from Microsoft is all you need to protect yourself), but by now the size of Conficker’s infected army of nodes spread around the world is big enough to function with devastating consequences even if most PCs are secure.

So we’ll just have to keep waiting to see what this thing does.

Recent Apple patent filing speaks of stealth biometric security on iPhone, other insane insanity

Recent patent fillings by Apple that AppleInsider has dug up point to the company adding several new methods of insuring the security of its devices for users. The new filings cite biometric authentication methods that would excite Ethan Hunt — including installation of a hidden sensor behind the screen that would recognize the user’s fingerprint when touched, and / or a front-facing camera for retinal recognition. The filing also suggests further possibilities, such as the device being capable of recognizing the user’s voice, or collecting DNA samples for recognition via genetic code. We’ve heard plenty of semi-speculative tech tales in the past, so we always take this stuff with a grain of salt, but Apple seems to be moving forward at least into the research phase of such endeavors. To the future we go! There’s one more fantastic scribble after the break, hit the read link for more details.

Continue reading Recent Apple patent filing speaks of stealth biometric security on iPhone, other insane insanity

Filed under:

Recent Apple patent filing speaks of stealth biometric security on iPhone, other insane insanity originally appeared on Engadget on Fri, 27 Mar 2009 22:09:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Simple keystroke sniffing schemes work where keyloggers won’t

Ah, the wonders of CanSecWest. The famed security conference has delivered yet again in 2009, this time bringing to light two simple sniffing schemes that could be used to decipher typed text when keyloggers are just too noticeable. Gurus from Inverse Path were on hand to explain the approaches, one of which involved around $80 of off-the-shelf gear. In short, curious individuals could point a laser on the reflective surface of a laptop between 50 feet and 100 feet away, and then by using a “handmade laser microphone device and a photo diode to measure the vibrations, software for analyzing the spectrograms of frequencies from different keystrokes, as well as technology to apply the data to a dictionary,” words could be pretty easily guessed. The second method taps into power grid signals passed along from PS/2 keyboard outputs, and by using a digital oscilloscope and an analog-digital converter, those in the know can pick out tweets from afar. Check the read link for more, and make sure you close those blinds and pick up a USB keyboard, pronto.

[Via Slashdot]

Filed under: ,

Simple keystroke sniffing schemes work where keyloggers won’t originally appeared on Engadget on Fri, 27 Mar 2009 09:01:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Video: GE bringing 3D HD baggage screening to airports

Certain airports have already taken the whole “walk through the metal detector” thing to the next level, but things are about to get stepped up once more thanks to TSA certification on a new product from GE Security. The CTX 9800 DSi, which happily sits in the company’s explosives detection systems (EDS) line, is now free to waltz into airports in order to “protect travelers with advanced high-definition 3D imaging baggage screening technology.” We’re talking 360 degree, finely-detailed views of baggage contents, which will undoubtedly cause immense embarrassment when a given TSA agent sees your prime selection of underwear, nose hair trimmer and pink nail polish. Here’s hoping this won’t slow security lines down even further, and if you’re interested in seeing what all this thing can do, just mash play on the video above.

Filed under:

Video: GE bringing 3D HD baggage screening to airports originally appeared on Engadget on Fri, 27 Mar 2009 00:19:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

nio Bluetooth security tag keeps tabs on your belongings

It’s okay to be honest with yourself — if you’ve been struggling to keep your personal goods on your person, and hiring a personal bodyguard is simply out of the question, you might need nio. What’s nio, you ask? Why, it’s a Bluetooth security tag that links up your mobile phone and practically anything else you’d like: a briefcase, a set of keys, a pack of Doritos, etc. Essentially, it gives you the ability to be buzzed if your tracked belongings hover too far out of range with your cellie, though the inability to remotely taser the thief is a definite shortcoming. Seems that you’ll have to be real serious about this to even inquire about a price, but a totally explanatory video is waiting just past the break.

[Via Gadling]

Continue reading nio Bluetooth security tag keeps tabs on your belongings

Filed under: ,

nio Bluetooth security tag keeps tabs on your belongings originally appeared on Engadget on Thu, 26 Mar 2009 10:23:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Fraunhofer’s new security device turns your window into a motion detector

The brain geniuses at Fraunhofer are back on the scene with a security device that takes the window alarm to the next level. The Vigilant window sees the ol’ glass panel coated with a nanoparticle material which converts light into fluorescent radiation. When the system is switched on, a UV lamp is aimed at the window, which is outfitted with sensors along its edges. As long as the lamp is unobstructed, everything is goldie. However, if a cat burglar should come by in his trademark all-black out fit and obstruct the beam, the alarm is activated — sending your elite security team into action. If you don’t have an elite security team, perhaps you can send your T-34 to snare him in its net. Either way, it’s clear they messed with the wrong folks this time. A prototype already exists, no word yet on when this will become available.

[Via Oh Gizmo!]

Filed under:

Fraunhofer’s new security device turns your window into a motion detector originally appeared on Engadget on Wed, 11 Mar 2009 09:18:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments