Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Axis Communications Uses APIs and Low-Light Tech to Differentiate

August 5, 2013

One constant in business has been the ecosystem can be more important than the product. As an example, if a person is considering attending a conference, they typically look at the speakers and exhibitors to see if there is a fit before booking their trip. In other cases they will look to see who else is attending before they decide to pull the trigger. Over the last few decades a number of tech companies did their best to attract developers to their platforms to build their ecosystems.

MDM is Just too Small a Market for Apple

July 1, 2013

It is no secret that MDM is a huge market and Apple is in large part responsible for the trend where non-Microsoft and non-Blackberry devices infiltrated the enterprise. Moreover, corporate IT departments have huge budgets so if Apple came out with an MDM solution it could do exceedingly well in the market.

Writing for TMCnet, Joe Rizzo asks why Apple isn't in this market and he makes some good points.

You have to wonder however the predicament Cupertino is in at the moment.

Your iPhone Could Get Hacked Through the Charger

June 4, 2013

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously worry about Apple devices which were not jailbroken. It is now impossible to know which Apple devices have been infected meaning all of them are suspect.

An article on TMCnet by Steve Anderson explains that a group of researchers at the Georgia Institute of Technology discovered the exploit which can be duplicated via a device called a Mactans charger.

Emerging Threats Combats a Million Plus Pieces of New Malware a Week

May 17, 2013

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of algorithms which are written with malicious intent in mind? One company, Emerging Threats thinks they can help with part of the equation… Identification of the sites which are compromised.

I recently met with the company at Interop in Las Vegas to learn about their IP and domain intelligence solutions ETPro Ruleset for IDS/IPS and IQRisk Suite for IDS/IPS, Firewalls, SIEMs and DNS.

How M2M, Telematics & GPS Helped Catch the Boston Bombers

May 3, 2013

The Boston bombers stole a Mercedes Benz equipped with mbrace2 the m2m/telematics system allowing a user or law enforcement to track the vehicle. While typically the system is useful for users who want to remotely unlock or lock their car door, it can also be used for synchronizing PC mapping apps with the car, allowing you to send a location and directions to your car. This is useful for people who don't want to enter an address into the GPS once in the vehicle.

The carjacking victim alerted police to the fact that the car had mbrace2 and at this point law enforcement tracked the car and was able to end the chase shortly thereafter. There is no telling what would have happened if a brand of car without such technology had been stolen.

Read more at Extreme Tech.







NICE Systems at MWC2013

February 28, 2013

At Mobile World Congress 2013 in Barcelona NICE had a very compelling story regarding its multiple product lines which are generally analytics, security, financial and the contact center. In a conversation with Yaniv Zukerman and Eyal Kirshner I learned the company will be focusing more on its multi-channel analytics solutions across its product lines. Moreover, we will see more cloud solutions from them as well - including in the anti-fraud space. This technology will be rolled out across product lines - and used to allow for CFPB compliance.

Scam Users, Accumulate Facebook Likes, Buy a Ferrari

February 18, 2013

Bitdefender Labs recently reported that a site showing kittens and unicorns suggested users download a “business flash” plugin in order to see a video. At this point the plugin takes control of the user’s computer allowing cookie information to be taken and replicated on another computer – effectively locking a user out of their social networking account.



Bitdefender describes the people behind this scheme as crooks which makes this story more interesting as this exploit seems to be designed to “borrow” a user’s identity. If your account isn’t taken over, the extension sits on your computer and can continue to like site after site without your approval.

All Windows Passwords at Risk and What to do about it

December 12, 2012

With the word out that a 25-GPU cluster can crack every standard Windows password in less than 6 hours, it may be time for us to consider this new Securematrix technology from Japan championed by Itara Nishimura of CSE Co., Ltd. His company makes a technology which uses a matrix of changing-numbers, allowing the user to use a known pattern to determine what their password will be for each login.

 

I interviewed him recently as part of a Cloud Expo West 2012 video interview series.

Can a supercomputer hack this sort of password as well?

How Much Freedom Have we Given up Since 9/11?

September 4, 2012

Protecode: Eliminating the Pitfalls of Software Development

August 20, 2012

Software development productivity has evolved tremendously over the decades as the cost of computing has plummeted rapidly while the cost of human capital has accelerated. Of course there are some anomalies in the “human capital” part of the curve as development can now take place in countries like India where wages are lower than say Silicon Valley. Still, when plotted against a dollar per unit of computing power curve which is exponentially decreasing, it continues to be much more expensive to hire programmers than to add processor cores or to increase clock speed.

Case in point, a few decades back when programming an IBM mainframe, it didn’t matter that programmers had to batch their programs using punch cards and wait for the computer’s results because you weren’t going to add more mainframe processing power unless you won corporate Lotto.

Featured Events