Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Could Better use of Technology have Stopped the Malaysia Airlines Flight 370 Tragedy?

March 8, 2014

Last night, many of us went to sleep with the knowledge that Malaysia Airlines Flight 370 was missing and this morning the news broke that the plane hasn't been found. Considering it is virtually impossible to steal a Boeing 777, the options at this point aren't looking good. My sincerest sympathies go out to the poor families of those onboard.

SOTI Aims to Make Android More Enterprise Ready

February 25, 2014

Customers deploying mobility solutions have a major challenge in deploying secure solutions to their clients in a BYOD environment. Enterprise Mobility Management is a growing space and at MWC 2014 I had a chance to meet with Carl Rodrigues, President & CEO of Soti and Roula Vrsic, VP of Marketing to learn about how their company helps enterprises maximize their workflow productivity.

Vrsic said enterprises are looking to maximize the number of applications they roll out on mobile. She mentioned how healtchare is going mobile but we may not have envisioned this trend some years ago.

Compass EOS and The Optical Approach to Core Routing

September 25, 2013

As core routers have to handle ever-faster data rates the high-speed connections suffer from a variety of problems as a result of challeenges which have to be overcome in inter-chip communications. Signal integrity becomes a problem over copper lines connecting ASICs as circut AC characteristics begin to dominate the impedance, inductance and conductance of the line and in-turn distort the signal. One way to mitigate these challenges is to utilize decision feedback equalization which consumes large amounts of power. Moreover, crosstalk has to be dealt with as electrical circuit speeds have reached the limits where traditional technology can overcome these effects.

SPEECHPRO's Multifactor Biometric Engine Doubles Reliability

September 12, 2013



Now that Apple has decided to jump into the biometrics space with Touch ID, we can expect the idea of finger, face and speech recognition to gain more traction. When it comes to biometrics there are different approaches which companies can take to ensure only specific people have access to computers and information. In Apple’s case the company is looking to make it easier to keep your phone secure. The single finger touch is all that is required to get into many of secrets located on your phone.



The challenge is as I blogged yesterday – a sleeping person can inadvertently divulge all their secrets to other people without realizing it.





AVG Helps Manage Facebook Privacy

September 12, 2013

Whoops: There is an iPhone 5s Fingerprint Hack

September 12, 2013

Biometric technology is amazing because when it is working perfectly it really is one of the best ways to ensure an individual's identity is verified. I can't guess your fingerprint for example. Sure, I can try to mimic it like you have seen in the movies but generally this isn't very practical.

An easier way to hack your fingerprint however is shown below - Redditor iZeeHunter posted the image Wednesday, along with the caption: "The new iPhone 5S provides unmatched security with its new Fingerprint lock, which makes your personal data even harder to reach!"



Whether this photo hurts Apple or not remains to be seen but a way around such a "hack" is to use multifactor authentication such as finger and voice or finger and password. Of course this would add increased levels of complexity - something Apple tried to reduce in the first place.





Axis Communications Uses APIs and Low-Light Tech to Differentiate

August 5, 2013

One constant in business has been the ecosystem can be more important than the product. As an example, if a person is considering attending a conference, they typically look at the speakers and exhibitors to see if there is a fit before booking their trip. In other cases they will look to see who else is attending before they decide to pull the trigger. Over the last few decades a number of tech companies did their best to attract developers to their platforms to build their ecosystems.

MDM is Just too Small a Market for Apple

July 1, 2013

It is no secret that MDM is a huge market and Apple is in large part responsible for the trend where non-Microsoft and non-Blackberry devices infiltrated the enterprise. Moreover, corporate IT departments have huge budgets so if Apple came out with an MDM solution it could do exceedingly well in the market.

Writing for TMCnet, Joe Rizzo asks why Apple isn't in this market and he makes some good points.

You have to wonder however the predicament Cupertino is in at the moment.

Your iPhone Could Get Hacked Through the Charger

June 4, 2013

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously worry about Apple devices which were not jailbroken. It is now impossible to know which Apple devices have been infected meaning all of them are suspect.

An article on TMCnet by Steve Anderson explains that a group of researchers at the Georgia Institute of Technology discovered the exploit which can be duplicated via a device called a Mactans charger.

Emerging Threats Combats a Million Plus Pieces of New Malware a Week

May 17, 2013

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of algorithms which are written with malicious intent in mind? One company, Emerging Threats thinks they can help with part of the equation… Identification of the sites which are compromised.

I recently met with the company at Interop in Las Vegas to learn about their IP and domain intelligence solutions ETPro Ruleset for IDS/IPS and IQRisk Suite for IDS/IPS, Firewalls, SIEMs and DNS.

Featured Events