Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

SPEECHPRO's Multifactor Biometric Engine Doubles Reliability

September 12, 2013



Now that Apple has decided to jump into the biometrics space with Touch ID, we can expect the idea of finger, face and speech recognition to gain more traction. When it comes to biometrics there are different approaches which companies can take to ensure only specific people have access to computers and information. In Apple’s case the company is looking to make it easier to keep your phone secure. The single finger touch is all that is required to get into many of secrets located on your phone.



The challenge is as I blogged yesterday – a sleeping person can inadvertently divulge all their secrets to other people without realizing it.





AVG Helps Manage Facebook Privacy

September 12, 2013

Whoops: There is an iPhone 5s Fingerprint Hack

September 12, 2013

Biometric technology is amazing because when it is working perfectly it really is one of the best ways to ensure an individual's identity is verified. I can't guess your fingerprint for example. Sure, I can try to mimic it like you have seen in the movies but generally this isn't very practical.

An easier way to hack your fingerprint however is shown below - Redditor iZeeHunter posted the image Wednesday, along with the caption: "The new iPhone 5S provides unmatched security with its new Fingerprint lock, which makes your personal data even harder to reach!"



Whether this photo hurts Apple or not remains to be seen but a way around such a "hack" is to use multifactor authentication such as finger and voice or finger and password. Of course this would add increased levels of complexity - something Apple tried to reduce in the first place.





Axis Communications Uses APIs and Low-Light Tech to Differentiate

August 5, 2013

One constant in business has been the ecosystem can be more important than the product. As an example, if a person is considering attending a conference, they typically look at the speakers and exhibitors to see if there is a fit before booking their trip. In other cases they will look to see who else is attending before they decide to pull the trigger. Over the last few decades a number of tech companies did their best to attract developers to their platforms to build their ecosystems.

MDM is Just too Small a Market for Apple

July 1, 2013

It is no secret that MDM is a huge market and Apple is in large part responsible for the trend where non-Microsoft and non-Blackberry devices infiltrated the enterprise. Moreover, corporate IT departments have huge budgets so if Apple came out with an MDM solution it could do exceedingly well in the market.

Writing for TMCnet, Joe Rizzo asks why Apple isn't in this market and he makes some good points.

You have to wonder however the predicament Cupertino is in at the moment.

Your iPhone Could Get Hacked Through the Charger

June 4, 2013

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously worry about Apple devices which were not jailbroken. It is now impossible to know which Apple devices have been infected meaning all of them are suspect.

An article on TMCnet by Steve Anderson explains that a group of researchers at the Georgia Institute of Technology discovered the exploit which can be duplicated via a device called a Mactans charger.

Emerging Threats Combats a Million Plus Pieces of New Malware a Week

May 17, 2013

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of algorithms which are written with malicious intent in mind? One company, Emerging Threats thinks they can help with part of the equation… Identification of the sites which are compromised.

I recently met with the company at Interop in Las Vegas to learn about their IP and domain intelligence solutions ETPro Ruleset for IDS/IPS and IQRisk Suite for IDS/IPS, Firewalls, SIEMs and DNS.

How M2M, Telematics & GPS Helped Catch the Boston Bombers

May 3, 2013

The Boston bombers stole a Mercedes Benz equipped with mbrace2 the m2m/telematics system allowing a user or law enforcement to track the vehicle. While typically the system is useful for users who want to remotely unlock or lock their car door, it can also be used for synchronizing PC mapping apps with the car, allowing you to send a location and directions to your car. This is useful for people who don't want to enter an address into the GPS once in the vehicle.

The carjacking victim alerted police to the fact that the car had mbrace2 and at this point law enforcement tracked the car and was able to end the chase shortly thereafter. There is no telling what would have happened if a brand of car without such technology had been stolen.

Read more at Extreme Tech.







NICE Systems at MWC2013

February 28, 2013

At Mobile World Congress 2013 in Barcelona NICE had a very compelling story regarding its multiple product lines which are generally analytics, security, financial and the contact center. In a conversation with Yaniv Zukerman and Eyal Kirshner I learned the company will be focusing more on its multi-channel analytics solutions across its product lines. Moreover, we will see more cloud solutions from them as well - including in the anti-fraud space. This technology will be rolled out across product lines - and used to allow for CFPB compliance.

Scam Users, Accumulate Facebook Likes, Buy a Ferrari

February 18, 2013

Bitdefender Labs recently reported that a site showing kittens and unicorns suggested users download a “business flash” plugin in order to see a video. At this point the plugin takes control of the user’s computer allowing cookie information to be taken and replicated on another computer – effectively locking a user out of their social networking account.



Bitdefender describes the people behind this scheme as crooks which makes this story more interesting as this exploit seems to be designed to “borrow” a user’s identity. If your account isn’t taken over, the extension sits on your computer and can continue to like site after site without your approval.

Featured Events