ramanan50

Posts Tagged ‘Gadgets’

Your Eye Saves Passwords Myris Scan

In Gadgets, internet on January 21, 2014 at 11:43

I find it difficult to remember passwords for websites.

Even a simple password I forget.

Eye Scan

Screenshot by Michelle Starr/CNET Australia)

The pass words my son , son-in-law make me swoon, so complicated.

So I save them in a folder.

Simple, you would think.

I create folders in such a fashion with such exotic names I find it difficult to locate them fast.

For people like me, A Gadget is on the way.

Myris Scanner would do it for me.

Story:

There are a number of password vaults on the market that aim to keep your passwords secure, locked behind one single master password that can let you into all your accounts and profiles. While this is a good way to keep your information safe, you could, potentially, still be caught out by a keylogger.

 

But what if your accounts could only be unlocked by using a physical part of your body? The iris of your eye is unique to you, and it’s by scanning your eye that the company EyeLock aims to keep your passwords secure. Its mouse-sized device, Myris, can perform a quick eye-scan to verify your identity before letting you in.

Connecting to your computer via USB, it scans your eye at a rate of 20 frames per second, looking at over 240 points on the iris to generate a 2048-bit signature unique to each user. To get into your accounts, which are linked via an application, you need to physically scan your eye — photos and videos will not work. And, although there’s a chance you can get a false match, it’s very slim — just one in 2.25 trillion. According to EyeLock, only DNA is more accurate.

This means that you could set highly complicated passwords for your internet banking, VPNs, email, shopping websites and social networks and not have to worry about remembering them.

“Usernames and passwords will soon be a thing of the past, and EyeLock’s introduction of Myris brings us one step closer,” said EyeLock chief marketing officer Anthony Antolino. “People are required to remember dozens of passwords in an effort to secure their data, while organisations and individuals are in a constant struggle to keep their digital, social and financial transactions safe from compromise, breach and theft. Until service providers take the step to eliminate usernames and passwords, Myris enables users to set passwords as complex as they’d like and forget them once linked to the device.”

Myris will be made available globally later this year, although a definite release date and pricing are yet to be announced.

Enhanced by Zemanta

TV Collects Your Personal Data

In Gadgets on November 21, 2013 at 13:20

One is used to websites tracking your History.

Then came the Mobiles.

There have been various regulations in force , on paper.

I have posted quite a few Posts on how to protect one’s personal Data.

Now the Spying enters your Home too.

There have been reports of LG TVs collecting personal data and forwarding to the Company.AP and Huffington Post report.

Smart TV

Smart TVs Collect personal Data

SEOUL, South Korea (AP)LG Electronics Inc. said it is investigating a claim that some of its smart TVs send information on home viewing habits back to the company without consent.

The investigation comes after a British blogger, using network traffic analysis software, detailed how his LG smart TV logged the channels he was watching even after an information collection feature was disabled.

The blog said the TV also collected the names of files saved in an external USB hard drive plugged into the TV as well as the TV’s unique identification information.

The information also appeared to be sent to LG unencrypted.

The world’s second-largest TV maker said Thursday that customer privacy is its top priority and takes the issue very seriously.

An ad platform in LG smart TVs called LG Smart AD lets advertisers reach target audiences by utilizing device information, regional information and demographic details such as age and gender, LG says on its website.

However it was not immediately clear which features in LG’s smart TVs were triggering the data monitoring.”

..

Bell‘s privacy policy has been updated to indicate that it plans to start tracking customers and collect data on web and mobile usage, TV watching and phone calling habits.

Bell will start collecting customer data on Nov. 16, which it says will be used for improving network performance, creating marketing reports and selling targeted ads on mobile devices.

Websites visited, search terms used, TV shows watched, calling patterns and mobile usage will be collected and collated with what products and services customers pay for, where they live, their gender and age range.

Bell says the data it collects will not be linked with a customer’s identity. While customers can opt out of having their data used for personalized advertising and marketing reports, it appears they will be tracked regardless.

Bell did not immediately respond to an interview request.

Michael Geist, a law professor at the University of Ottawa and the Canada Research Chair in Internet and e-commerce law, said he’s shocked by the extent of the “data grab” that Bell is preparing to undertake.

“What Bell is able to aggregate, being as large as it is, is far more than any individual Internet company, even a company as large as Google,” Geist said.

http://www.huffingtonpost.com/huff-wires/20131121/as–skorea-smart-tvs-privacy/?utm_hp_ref=homepage&ir=homepage

http://montreal.ctvnews.ca/bell-to-start-tracking-customers-web-history-tv-viewing-unless-they-opt-out-1.1508083#ixzz2lGQQkyPL

Data Stealing Technology Gadgets

In technology on September 27, 2013 at 09:24

Recently I posted how the Indian Embassy in Washington DC was bugged by the NSA to steal Data from the Computer.

Here are the technologies/Gadgets behind Data Stealing Technologies from Computers.

Story:

Stingray

Stingray that steals from Hard disk.
Click to Enlarge.

“Stingray”.

The Stingray has become the most widely known and contentious spy tool used by government agencies to track mobile phones, in part due to an Arizona court case that called the legality of its use into question. It’s a box-shaped portable device, sometimes described as an “IMSI catcher,” that gathers information from phones by sending out a signal that tricks them into connecting to it…

Stingray can also be used with software called “FishHawk,” (PDF) ..

Cost: $68,479 for the original Stingray; $134,952 for Stingray II

“Gossamer”

Data Stealing Technology

Gossamer steals Computer Data.Data Stealing Technology.

The Gossamer is a small portable device that can be used to secretly gather data on mobile phones operating in a target area. It sends out a covert signal that tricks phones into handing over their unique codes—such as the IMSI and TMSI—which can be used to identify users and home in on specific devices of interest. What makes it different from the Stingray? Not only is the Gossamer much smaller, but it can also be used to perform a denial-of-service attack on phone users, blocking targeted people from making or receiving calls, according tomarketing materials (PDF) published by a Brazilian reseller of the Harris equipment. The Gossamer has the appearance of a clunky-looking handheld transceiver. One photograph filed with the US Patent and Trademark Office shows it displaying an option for “mobile interrogation” on its small LCD screen, which sits above a telephone-style keypad.

First used: Trademark records show that a registration for the Gossamer was first filed in October 2001.

Cost: $19,696.

Source:

http://ramanan50.wordpress.com/?p=27123&preview=true

 

Smartphone Pictures Security Risk Verified True Video

In consumer forum, Gadgets on August 19, 2013 at 20:27

There is a Video that one takes with a Smartphone poses a security risk as it reveals your location details and other data.

The YouTube video has gone viral and there are reports that this news item is a Hoax.

I checked and found that this is not a hoax.

The information seems to be authentic,

As I am a non technical person, I advise caution.

Story:

Original Story:

Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!

This is truly alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!

PLEASE PASS THIS INFO TO ANYONE YOU KNOW WHO TAKES PICTURES WITH THEIR CELL OR SMART PHONE AND POSTS THEM ONLINE.

I want everyone of you to watch this and then be sure to share with all your family and friends.

It’s REALLY important info, about what your posting things on your cell phones can do TO YOU!!!

Too much technology out there these days so beware………..

PLEASE TAKE THE TIME TO WATCH THIS VIDEO, AND TAKE THE RECOMMENDED PRECAUTIONS.

If you have children or grandchildren you NEED to watch this. I had no idea this could happen from taking pictures on the blackberry or cell phone. It’s scary.

http://kyeos.wordpress.com/2013/05/10/warning-if-you-take-photos-with-your-cell-phone/

Verification article. at http://www.snopes.com/crime/warnings/smartphonepix.asp

Find Original Phone Fake Mobile/Cell

In Gadgets on August 2, 2013 at 20:40

There are fake mobile phones flooding the market.

Follow instructions to find if your Mobile Phone is original.

 

 

Follow

Get every new post delivered to your Inbox.

Join 2,986 other followers

%d bloggers like this: