ComputerWorld

ComputerWorldIndependent

‘Hey Siri, buy $100 Bitcoin for the burglar guy’

Credit to Author: Jonny Evans| Date: Tue, 14 Nov 2017 06:08:00 -0800

Apple will apparently bring FaceID to its long-awaited HomePod smart speaker systems next year, but voice assistant tech may be a weak link in domestic and enterprise security, fresh research claims.

The imitation game

Researchers at the University of Eastern Finland claim that voice impersonators can fool smart speaker systems into thinking they are an authorized user of those systems.

It’s known that you can undermine voice authorization systems using speech synthesis, voice conversion or even dubbing recordings of a target voice.

To read this article in full, please click here

Read More

(Insider Story)

Read More
ComputerWorldIndependent

Mingis on Tech: The iPhone X – best phone for business, or best phone ever?

Credit to Author: Ken Mingis| Date: Thu, 09 Nov 2017 14:15:00 -0800

When it comes to mobile devices, companies tend to like three things: solid security, ease-of-management and low cost.

With Apple’s iPhone X, it looks like you can check off two of those three items. The phone’s cutting-edge Face ID authentication system really does work. iOS 11 is easy to manage and inherently secure. But that last one – price – is a big one. The iPhone X  starts at $999 for the 64GB model and goes to $1,149 for the 256GB version.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Android security audit: An 11-step checklist

Credit to Author: JR Raphael| Date: Thu, 09 Nov 2017 09:36:00 -0800

Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason.

As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly sensationalized accounts tied to theoretical threats with practically zero chance of actually affecting you in the real world. If you look closely, in fact, you’ll start to notice that the vast majority of those stories stem from companies that — gasp! — make their money selling malware protection programs for Android phones. (Pure coincidence, right?)

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest – Deal Alert

Credit to Author: DealPost Team| Date: Wed, 08 Nov 2017 05:35:00 -0800

Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,800 people on Amazon (read reviews), where its typical list price of $34.25 is discounted 15% to $28.99. See this deal on Amazon.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What is blockchain? The most disruptive tech in decades

Credit to Author: Lucas Mearian| Date: Tue, 07 Nov 2017 17:06:00 -0800

Blockchain is poised to change IT in much the same way open-source software did a quarter of a century ago. And in the same way that Linux took more than a decade to become a cornerstone in modern application development, Blockchain will take years to become a lower cost, more efficient way to share information between open and private networks.

But the hype around this seemingly new, secure electronic ledger is real. In essence, blockchain represents a new paradigm for the way information is shared and tech vendors and companies are rushing to figure out how they can use the distributed ledger technology to save time and admin costs. Numerous companies this year have been rolling out pilot programs and real-world projects across a variety of industries – everything from financial services to healthcare to mobile payments.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

When Google Play Protect fails

Credit to Author: JR Raphael| Date: Tue, 07 Nov 2017 08:34:00 -0800

I’ve written a lot about Android security over the years — and more often than not, it’s the same ol’ story time and time again:

A company that sells mobile security software finds some theoretical threat — something that (a) hasn’t affected any actual users in the real world and (b) couldn’t affect any actual users in the real world, outside of a highly improbable scenario in which all native security measures are disabled and the user goes out of his way to download a questionable-looking app from some shady porn forum.

To read this article in full or to leave a comment, please click here

Read More