Haiku Review: CMS ABS-Secure Encrypted Backup Solution (160GB)

ABS-Secure_backup_160GB-275.jpg

Chloe O’Brian
couldn’t hack into this drive&#8212
not to save the world.

Tony Hoffman

For the full-length, free-verse ABS-Secure Encrypted Backup Solution (160GB)
review check out PCMag.com.

Archerfish home security camera system does video analysis for you

Internet-enabled security cameras are nothing new, but Cernium’s Archerfish system mixes in some smart video-analysis software and Sling-style placeshifting to make monitoring your home from afar a little easier. Up to four cameras can feed 352 x 240 resolution video into the $1000 box, which contains a TI DaVinci chip powerful enough to intelligently analyze the video for people and vehicles, encode it to H.264, and send it to wherever you are, along with text and email alerts if so desired. Of course, it wouldn’t be 2009 if there wasn’t a monthly fee for cloud-based hosting, and Archerfish is no exception — you don’t log in to your own box, you have to shell out $20/mo to access the MyArcherfish dashboard to review your footage. Of course. It’s all on sale soon, including a $1,500 two camera bundle.

[Via Zatz Not Funny!]

Filed under:

Archerfish home security camera system does video analysis for you originally appeared on Engadget on Fri, 13 Feb 2009 06:23:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Security experts hating on Android browser until patch is released

Software vulnerabilities are no stranger to modern, highly-connected smartphones and feature phones alike, and fortunately, the big guys have been pretty good about staying on the ball and patching the serious stuff in a reasonable amount of time. The latest problem discovered in the Android browser’s multimedia subsystem really sucks, though — it’s so bad, some security dudes are advising customers to “avoid” using the it altogether until it gets fixed — and the most frustrating part about it is that it actually is fixed in the Android code trunk, it’s just that no one’s bothered to roll out an update to G1 users yet. In the meantime, the dude who discovered the problem is advising users to only visit trusted sites and avoid WiFi, so yeah, just don’t browse or anything, okay?

[Via ReadWriteWeb]

Filed under: ,

Security experts hating on Android browser until patch is released originally appeared on Engadget on Thu, 12 Feb 2009 15:44:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Sony Develops Finger Vein Authentication Technology

mofiria.jpgA new brand of finger vein authentication technology called “mofiria” was developed by Sony for incorporation in electronic devices. Not only is the mofiria capable of being used as a security measure for personal computers, it could also be put into smaller portable devices due to its compact size. Unlike fingerprint authentication, this technology relies on the veins inside the finger to recognize an identity and hence, forgery would take a lot more to accomplish.

The CMOS sensor of the mofiria device captures the scattered light in the finger brought about by near-infrared LED shone on the body part. The light is then formed into an image or a pattern that serves as a person’s recognition. The authentication device doesn’t even require the finger to be placed upon it on a certain position because the captured data (that takes around 0.015 second using a computer and 0.25 second on a mobile device) is automatically corrected. That makes mofiria highly-accurate in its given task. Sony is looking at a 2009 commercialization date for the mofiria finger vein authentication technology.

Sony Security Searches for a Vein

Sony_mofiria
Fingerprint and vein scanners in computers are widespread enough that they no longer have to carry an "as seen on Minority Report or Total Recall" tag.

Now Sony has announced it has developed a compact, finger vein authentication technology that it says will be available in laptops and mobile phones later this year.

The authentication technology, puzzlingly named ‘mofiria,’ is expected to have higher accuracy compared to other personal identification techniques, says Sony.

Passwords have been passé for awhile as PC makers have added biometric authentication technologies such as fingerprint scans and palm authentication to PC systems. Sony’s rival Hitachi has had its finger vein authentication products available since last year, while Fujitsu offers a palm scan technology for both computers and general building access systems. That said, most users are probably still entering passwords to unlock their computers, even if biometric scanners are available on their machines. Why? It’s not clear, though it might be that existing technologies are too unreliable, not well-understood by the average user, or perhaps simply too creepy.

The ‘mofiria’ tech from Sony offers quick response and high accuracy and comes in a
compact size for mounting on mobile devices, says the company. It uses a CMOS sensor that diagonally captures
scattered light inside the finger veins making a plane layout
possible. This allows for a small and flexible design to be integrated into mobile devices.

"The vein pattern is extracted from the captured finger vein image  and
data from the pattern is compressed into the size of one-tenth to store
in memory," said Sony in a statement.

Sony claims false rejection rate for the technology is less than 0.1 percent and
processing time for identification takes only about 0.015 seconds using a
personal computer CPU and about 0.25 seconds using a mobile phone
CPU.

Sony’s Mofiria biometrics to be trotted out sometime this year

We don’t know anybody who seriously relies on biometrics — except, of course, those of you who rushed out late last year to pick up your very own BioMirage Coffer — but if this is your bag, take note: Sony has just announced Mofiria, their new high speed, compact biometric solution for mobile devices. Similar to Fujitsu’s PalmSecure, the technology uses near infrared LEDs and a CMOS sensor to capture a snapshot of your veins. Apparently, vein patterns vary from person to person and from finger to finger, and don’t change throughout a person’s life — making them perfect for use in authentication. Of course, passwords should also vary from person to person, and computer to computer, but Sony won’t ever be able to charge extra for a secure password. And that’s really what all this is about, isn’t it? No word on a price yet, but this bad boy should roll out sometime in 2009. PR after the break.

Continue reading Sony’s Mofiria biometrics to be trotted out sometime this year

Filed under:

Sony’s Mofiria biometrics to be trotted out sometime this year originally appeared on Engadget on Mon, 02 Feb 2009 10:21:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

War Driver Cruises San Francisco Scanning, Collecting Passports

Security researcher Chris Paget has brought Cory Doctorow’s latest novel to life.

In the book Little Brother, kids use cheap RFID readers to clone San Francisco’s Fastrak cards and then rewrite the details to other users’ cards to cause mayhem and bring down the DHS. In reality, these cards contain RFID (Radio Frequency Identification) chips which can be read from a distance. The purpose is to let drivers cruise through toll-booths without stopping – payment is automatic – but you can be sure that there are plenty of other scanners dotted around the city, tracking your progress as you drive.

Paget wasn’t trying to bring down the government. He was simply making a point. Armed with a homebrew RFID reader kit (cost of parts: $250), he drove downtown and in 20 minutes had grabbed the details of two RFID passports. No Fastrak cards yet, but that doesn’t mean you shouldn’t be wrapping them in tinfoil (we’re actually serious). Paget’s aim is to have these chips removed from personal IDs as, aside from being insecure they are "unsuitable for tagging people". We agree.

Passport RFIDs cloned wholesale by $250 eBay auction spree [The Register]

Little Brother [Craphound]

See Also:

Microsoft Surface being used to coordinate Super Bowl security

If you’ve been watching the news this week, you might have caught NFL security VP Milton Ahlerich saying that Raymond James Stadium in Tampa will be “one the safest locations you can possibly be” during the Super Bowl on Sunday, and it looks like Microsoft Surface will be a big reason why: it’s being used to coordinate security forces around the site. It’s seriously slick — maps are integrated with planning and voice communications software so the field commanders can immediately assess incident responses and personnel deployments, with the ability to initiate radio contact directly from the interface. Definitely much cooler than zooming in and out of photos and ordering drinks, we’d say — video after the break.

Continue reading Microsoft Surface being used to coordinate Super Bowl security

Filed under:

Microsoft Surface being used to coordinate Super Bowl security originally appeared on Engadget on Thu, 29 Jan 2009 20:36:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Major storage vendors agree to disk encryption standards

We’ve seen quite a few hardware-encrypted disks hit the scene lately, but to be honest, we’ve always thought they were a risky investment, since all the systems were proprietary — we wouldn’t want to store our encryption-worthy data on a disk that can’t be read at all in a few years, after all. That’s happily about to change, though — the Trusted Computing Group has just announced that virtually every drive maker has agreed on a set of 128-bit encryption standards covering SSDs and HDDs. That’s Fujitsu, Hitachi, Seagate, Samsung, Toshiba, Western Digital, IBM, Wave Systems, LSI, and ULink Technology, if you’re keeping score at home (and we know you are). Ideally this means that we’ll see easy cheap disk encryption filter onto mainstream consumer storage, which would basically invalidate all those “I’m stealing this hard drive out of your laptop and using it to log into your Facebook account” crimes of passion we know the kids are into these days. Best part? Fujitsu, Seagate and Hitachi are all already shipping drives that support the TCG standards.

[Via Digg]

Filed under:

Major storage vendors agree to disk encryption standards originally appeared on Engadget on Thu, 29 Jan 2009 07:49:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

New Zealand Man Buys MP3 Player, Gets US Military Files

When picking up a piece of electronics from a thrift store, the top concern is generally something along the lines of, “does the thing turn on?” When a New Zealand man visiting a second-hand store in Oklahoma picked up an MP3 player, he got all that and more. The DAP housed 60 military files, including American soldiers’ names, phone numbers, and social security numbers.

Chris Ogle from Whangarei, New Zealand, picked the player up for $18. He discovered the files upon plugging the device into his computer. Along with the soldiers’ personal information, the player also held mission briefings and equipment details.

“The more I look at it, the more I see and the less I think I should be looking,” Ogle told a local New Zealand news station.