Archerfish home security camera system does video analysis for you
Posted in: camera, security, Today's ChiliInternet-enabled security cameras are nothing new, but Cernium’s Archerfish system mixes in some smart video-analysis software and Sling-style placeshifting to make monitoring your home from afar a little easier. Up to four cameras can feed 352 x 240 resolution video into the $1000 box, which contains a TI DaVinci chip powerful enough to intelligently analyze the video for people and vehicles, encode it to H.264, and send it to wherever you are, along with text and email alerts if so desired. Of course, it wouldn’t be 2009 if there wasn’t a monthly fee for cloud-based hosting, and Archerfish is no exception — you don’t log in to your own box, you have to shell out $20/mo to access the MyArcherfish dashboard to review your footage. Of course. It’s all on sale soon, including a $1,500 two camera bundle.
[Via Zatz Not Funny!]
Filed under: Misc. Gadgets
Archerfish home security camera system does video analysis for you originally appeared on Engadget on Fri, 13 Feb 2009 06:23:00 EST. Please see our terms for use of feeds.
Read | Permalink | Email this | Comments
Security experts hating on Android browser until patch is released
Posted in: Android, Google, security, Today's ChiliSoftware vulnerabilities are no stranger to modern, highly-connected smartphones and feature phones alike, and fortunately, the big guys have been pretty good about staying on the ball and patching the serious stuff in a reasonable amount of time. The latest problem discovered in the Android browser’s multimedia subsystem really sucks, though — it’s so bad, some security dudes are advising customers to “avoid” using the it altogether until it gets fixed — and the most frustrating part about it is that it actually is fixed in the Android code trunk, it’s just that no one’s bothered to roll out an update to G1 users yet. In the meantime, the dude who discovered the problem is advising users to only visit trusted sites and avoid WiFi, so yeah, just don’t browse or anything, okay?
[Via ReadWriteWeb]
Filed under: Cellphones, Handhelds
Security experts hating on Android browser until patch is released originally appeared on Engadget on Thu, 12 Feb 2009 15:44:00 EST. Please see our terms for use of feeds.
Read | Permalink | Email this | Comments
A new brand of finger vein authentication technology called “mofiria” was developed by Sony for incorporation in electronic devices. Not only is the mofiria capable of being used as a security measure for personal computers, it could also be put into smaller portable devices due to its compact size. Unlike fingerprint authentication, this technology relies on the veins inside the finger to recognize an identity and hence, forgery would take a lot more to accomplish.
The CMOS sensor of the mofiria device captures the scattered light in the finger brought about by near-infrared LED shone on the body part. The light is then formed into an image or a pattern that serves as a person’s recognition. The authentication device doesn’t even require the finger to be placed upon it on a certain position because the captured data (that takes around 0.015 second using a computer and 0.25 second on a mobile device) is automatically corrected. That makes mofiria highly-accurate in its given task. Sony is looking at a 2009 commercialization date for the mofiria finger vein authentication technology.
Sony Security Searches for a Vein
Posted in: security, Today's Chili
Fingerprint and vein scanners in computers are widespread enough that they no longer have to carry an "as seen on Minority Report or Total Recall" tag.
Now Sony has announced it has developed a compact, finger vein authentication technology that it says will be available in laptops and mobile phones later this year.
The authentication technology, puzzlingly named ‘mofiria,’ is expected to have higher accuracy compared to other personal identification techniques, says Sony.
Passwords have been passé for awhile as PC makers have added biometric authentication technologies such as fingerprint scans and palm authentication to PC systems. Sony’s rival Hitachi has had its finger vein authentication products available since last year, while Fujitsu offers a palm scan technology for both computers and general building access systems. That said, most users are probably still entering passwords to unlock their computers, even if biometric scanners are available on their machines. Why? It’s not clear, though it might be that existing technologies are too unreliable, not well-understood by the average user, or perhaps simply too creepy.
The ‘mofiria’ tech from Sony offers quick response and high accuracy and comes in a
compact size for mounting on mobile devices, says the company. It uses a CMOS sensor that diagonally captures
scattered light inside the finger veins making a plane layout
possible. This allows for a small and flexible design to be integrated into mobile devices.
"The vein pattern is extracted from the captured finger vein image and
data from the pattern is compressed into the size of one-tenth to store
in memory," said Sony in a statement.
Sony claims false rejection rate for the technology is less than 0.1 percent and
processing time for identification takes only about 0.015 seconds using a
personal computer CPU and about 0.25 seconds using a mobile phone
CPU.
Sony’s Mofiria biometrics to be trotted out sometime this year
Posted in: security, sony, Today's Chili
Continue reading Sony’s Mofiria biometrics to be trotted out sometime this year
Filed under: Peripherals
Sony’s Mofiria biometrics to be trotted out sometime this year originally appeared on Engadget on Mon, 02 Feb 2009 10:21:00 EST. Please see our terms for use of feeds.
Read | Permalink | Email this | Comments
Security researcher Chris Paget has brought Cory Doctorow’s latest novel to life.
In the book Little Brother, kids use cheap RFID readers to clone San Francisco’s Fastrak cards and then rewrite the details to other users’ cards to cause mayhem and bring down the DHS. In reality, these cards contain RFID (Radio Frequency Identification) chips which can be read from a distance. The purpose is to let drivers cruise through toll-booths without stopping – payment is automatic – but you can be sure that there are plenty of other scanners dotted around the city, tracking your progress as you drive.
Paget wasn’t trying to bring down the government. He was simply making a point. Armed with a homebrew RFID reader kit (cost of parts: $250), he drove downtown and in 20 minutes had grabbed the details of two RFID passports. No Fastrak cards yet, but that doesn’t mean you shouldn’t be wrapping them in tinfoil (we’re actually serious). Paget’s aim is to have these chips removed from personal IDs as, aside from being insecure they are "unsuitable for tagging people". We agree.
Passport RFIDs cloned wholesale by $250 eBay auction spree [The Register]
Little Brother [Craphound]
See Also:
- Mobile RFID Reader Brings Big Brother To Your Pocket
- New York Offers Drivers License with RFID Tag
- Access Denied: RFID Cat-Flap Scans Kitties
Microsoft Surface being used to coordinate Super Bowl security
Posted in: Microsoft, security, Today's ChiliIf you’ve been watching the news this week, you might have caught NFL security VP Milton Ahlerich saying that Raymond James Stadium in Tampa will be “one the safest locations you can possibly be” during the Super Bowl on Sunday, and it looks like Microsoft Surface will be a big reason why: it’s being used to coordinate security forces around the site. It’s seriously slick — maps are integrated with planning and voice communications software so the field commanders can immediately assess incident responses and personnel deployments, with the ability to initiate radio contact directly from the interface. Definitely much cooler than zooming in and out of photos and ordering drinks, we’d say — video after the break.
Continue reading Microsoft Surface being used to coordinate Super Bowl security
Filed under: Misc. Gadgets
Microsoft Surface being used to coordinate Super Bowl security originally appeared on Engadget on Thu, 29 Jan 2009 20:36:00 EST. Please see our terms for use of feeds.
Read | Permalink | Email this | Comments
Major storage vendors agree to disk encryption standards
Posted in: samsung, security, SSD, Today's Chili, ToshibaWe’ve seen quite a few hardware-encrypted disks hit the scene lately, but to be honest, we’ve always thought they were a risky investment, since all the systems were proprietary — we wouldn’t want to store our encryption-worthy data on a disk that can’t be read at all in a few years, after all. That’s happily about to change, though — the Trusted Computing Group has just announced that virtually every drive maker has agreed on a set of 128-bit encryption standards covering SSDs and HDDs. That’s Fujitsu, Hitachi, Seagate, Samsung, Toshiba, Western Digital, IBM, Wave Systems, LSI, and ULink Technology, if you’re keeping score at home (and we know you are). Ideally this means that we’ll see easy cheap disk encryption filter onto mainstream consumer storage, which would basically invalidate all those “I’m stealing this hard drive out of your laptop and using it to log into your Facebook account” crimes of passion we know the kids are into these days. Best part? Fujitsu, Seagate and Hitachi are all already shipping drives that support the TCG standards.
[Via Digg]
Filed under: Storage
Major storage vendors agree to disk encryption standards originally appeared on Engadget on Thu, 29 Jan 2009 07:49:00 EST. Please see our terms for use of feeds.
Read | Permalink | Email this | Comments
New Zealand Man Buys MP3 Player, Gets US Military Files
Posted in: military, MP3 Digital Audio, mp3 player, security, Today's ChiliWhen picking up a piece of electronics from a thrift store, the top concern is generally something along the lines of, “does the thing turn on?” When a New Zealand man visiting a second-hand store in Oklahoma picked up an MP3 player, he got all that and more. The DAP housed 60 military files, including American soldiers’ names, phone numbers, and social security numbers.
Chris Ogle from Whangarei, New Zealand, picked the player up for $18. He discovered the files upon plugging the device into his computer. Along with the soldiers’ personal information, the player also held mission briefings and equipment details.
“The more I look at it, the more I see and the less I think I should be looking,” Ogle told a local New Zealand news station.