protection

Source: http://gizmodo.com/5943788/developers-suspect-the-new-kindle-fires-will-be-hack+resistant

Developers Suspect the New Kindle Fires Will Be Hack-ResistantIf you were banking on hacking a new Kindle Fire to take advantage of cheap hardware without Amazon’s modded Android OS, you perhaps better think again. Developers over at XDA are speculating that they expect the new range of Fires to be too sophisticated to hack.

In particular, a forum post provides evidence which suggests that the new devices will come with more sophisticated protection, including locked bootloaders and “high security” features offered by Texas Instrument processors.

Of course, with Amazon really pushing its device-as-service concept hard, the news likely won’t ruffle the majority of Fire-user feathers. But for those who were cheekily hoping to grab a Fire HD and mod it from the off, there may well be something to grumble about. [XDA via Engadget]

Tags: , , , , , , , , , , , , , , , , , , ,

Monday, September 17th, 2012 Uncategorized No Comments

Google responds)

Source: http://www.engadget.com/2012/02/20/microsoft-finds-google-bypassed-internet-explorers-privacy-sett/

There was quite a stir sparked last week when it was revealed that Google was exploiting a loophole in a Apple’s Safari browser to track users through web ads, and that has now prompted a response from Microsoft’s Internet Explorer team, who unsurprisingly turned their attention to their own browser. In an official blog post today, they revealed that Google is indeed bypassing privacy settings in IE as well, although that’s only part of the story (more on that later). As Microsoft explains at some length, Google took advantage of what it describes as a “nuance” in the P3P specification, which effectively allowed it to bypass a user’s privacy settings and track them using cookies — a different method than that used in the case of Safari, but one that ultimately has the same goal. Microsoft says it’s contacted Google about the matter, but it’s offering a solution of its own in the meantime. It’ll require you to first upgrade to Internet Explorer 9 if you haven’t already, then install a Tracking Protection List that will completely block any such attempts by Google — details on it can be found at the source link below.

As ZDNet’s Mary Jo Foley notes, however, Google isn’t the only company that was discovered to be taking advantage of the P3P loophole. Researchers from Carnegie Mellon University’s CyLab say they alerted Microsoft to the vulnerability in 2010, and just two days ago the director of the lab, Lorrie Faith Cranor, wrote about about the issue again on the TAP blog (sponsored by Microsoft, incidentally), detailing how Facebook and others also sk! irt IE’s ability to block cookies. Indeed, Facebook readily admits on its site that it does not have a P3P policy, explaining that the standard is “out of date and does not reflect technologies that are currently in use on the web,” and that “most websites” also don’t currently have P3P policies. On that matter, Microsoft said in a statement to Foley that the “IE team is looking into the reports about Facebook,” but that it has “no additional information to share at this time.”

Update: Google’s Senior Vice President of Communications and Policy, Rachel Whetstone has now issued a statement in response to Microsoft’s blog post. It can be found in full after the break.

Continue reading Microsoft finds Google bypassed Internet Explorer’s privacy settings too, but it’s not alone (update: Google responds)

Microsoft finds Google bypassed Internet Explorer’s privacy settings too, but it’s not alone (update: Google responds) originally appeared on Engadget on Mon, 20 Feb 2012 16:59:00 EDT. Please see our terms for use of feeds.

Permalink ZDNet  |  sourceIE Blog  | Email this | Comments

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Tuesday, February 21st, 2012 news No Comments

Source: http://gizmodo.com/5882888/new-man-in-the-browser-attack-bypasses-banks-two+factor-authentication-systems

New "Man in the Browser" Attack Bypasses Banks' Two-Factor Authentication SystemsThe banking industry often employs two-step security measures—similar to Google Authenticator—as an added layer of protection against password theft and fraud. Unfortunately, those systems have just been rendered moot by a highly-advanced hack.

The attack, know as the Man in the Browser method, works like this. Malicious code is first introduced onto the victim’s computer where it resides in the web browser. It will lay dormant until the victim visits a specific website—in this case, his bank’s secure website. Once the user attempts to log in, the malware activates and runs between the victim and the actual website. Often the malware will request that the victim enter his password or other security pass into an unauthorized field, in order to “train a new security system.” Once that happens, the attacker has full access to the account.

Luckily, the method is only a single-shot attack. That is, the attacker is only able to infiltrate the site once with the user-supplied pass code. But, once in, the attacker can hide records of money transfers, spoof balances and change payment details. “The man in the browser attack is a very focused, very specific, advanced threat, specifically focused against banking,” Daniel Brett, of malware testing lab S21sec, told the BBC.

Since this attack has shown that the two-factor system is no longer a viable defense, the banking industry may have to adopt more advanced fraud-detection methods similar to what secure credit cards. When compared to having your account silently drained, standing in line for the teller suddenly doesn’t seem like that much of a hassle. [BBC News via Technology Review]

Image: jamdesign / Shutterstock

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Tuesday, February 7th, 2012 news No Comments

Here’s A Sneak Peek At Netflix’s First Big Bet On Original Programming (NFLX)

Source: http://www.businessinsider.com/netflix-original-series-lilyhammer-2012-1


Netflix has been talking up their new original programming quite a bit, and now they’ve actually released some footage.

“Lilyhammer” tells the story of an East Coast mobster, played by “The Sopranos” actor Steven Van Zandt, who’s relocated to a small town in Norway as part of the witness protection program.

Unlike most TV shows, you’ll be able to see all eight episodes of “Lilyhammer” at once — Netflix is putting the whole series online February 6.

This seems to be a risky strategy: shows often build buzz over the course of the season, especially with a new series, and if “Lilyhammer” doesn’t catch on immediately it could have a hard time building viewership.

Netflix might be counting on a viral audience, with subscribers passing it between each other and telling their friends they need to see it. If that’s the case, it better be good.

Please follow SAI: Media on Twitter and Facebook.

Join the conversation about this story »

See Also:




drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Tuesday, January 3rd, 2012 news No Comments

Vapor4 May Be the First Bumper Worthy of the iPhone 4

The ecosystem for the iPhone4 has begun in earnest.

Source: http://gizmodo.com/5576923/vapor4-may-be-the-first-bumper-worthy-of-the-iphone-4

Vapor4 May Be the First Bumper Worthy of the iPhone 4The iPhone 4 shatters easily, and its tiny plastic bezel offers no protection. On top of that, touching its metal rim causes interferences. The Vapor4 bumper—made of aluminum—may solve most of these design problems. And it looks great:

Of course, nothing looks as cool as the iPhone 4 on its own, but if you want to avoid the antenna problems and the shattering, you are going to need one of these. They are made of aluminum, and they have an interior liner that separates the metal from the antenna, insulating it. The manufacturer—the same who makes the beautiful Joule iPad stand—told me that their tests showed no interference whatsoever across all models of iPhone:

We basically wrapped it in an inch thick of anodized aluminum all around with our special secret liner inside, nothing impacted the reception.

We will have to test this, but it definitely is the first bumper that actually looks cool. Especially the way you put it together, with those hex screws.

Vapor4 May Be the First Bumper Worthy of the iPhone 4

The Vapor4 is not cheap, although not as expensive as the beautiful exotic wood back replacement: The Vapor4 is $80. For $100 you also get the V4Carbon, a carbon fiber back plate that will further protect the iPhone 4 fragile glass back. [Elementcase]

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Thursday, July 1st, 2010 news No Comments

Cybercrooks Target Social Networks

Source: http://feeds.marketingcharts.com/~r/marketingcharts/~3/16mASWhC9kU/

Cybercriminals are turning their attention to users of social networks such as Facebook and Twitter, according to a new report [pdf] from IT security and data protection firm Sophos.

Spam, Malware Attacks on the Rise Sophos’ Security Threat Report: 2010 indicates criminals have increasingly focused attacks on social networking users in the past 12 months, with a […]<img src="http://feeds.feedburner.com/~r/marketingcharts/~4/16mASWhC9kU" height="1" width="1"/>

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Friday, February 5th, 2010 digital No Comments

Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.

Augustine Fou portrait
http://twitter.com/acfou
Send Tips: tips@go-digital.net
Digital Strategy Consulting
Dr. Augustine Fou LinkedIn Bio
Digital Marketing Slideshares
The Grand Unified Theory of Marketing