Archive for Security

Don’t Encrypt, Just Repaint

Posted in Paint,Security,Wi-Fi by Chetz on March 31st, 2007

EM-SEC paint blocks WiFi from leaving the roomIt’s the perfect product for people that can’t figure out how to set up their own personal encrypted network. EM-SEC Technologies has the solution to those technically-challenged folk: just paint your home with the EM-SEC Coating System and your wireless network is secure. People inside can still access the network but anyone attempting to access it from outside won’t be able to because of what’s on your walls.

The EM-SEC paint works like this: the paint uses a series of water-based shielding products that restrict the passage of airborne RF signals, thus blocking the transmission of the frequency from your hub or modem. Naturally this kind of technological breakthrough was at first designed to shield government and military centers and protect their sensitive data streams but now private business and non-geek home owners can get in on the …

Apple Releases iTunes 7.1 and QuickTime Fixes

Posted in Apple,iTunes,News,Security,Services by Darrin Olson on March 6th, 2007

Apple releases QuickTime fixes and iTunes updateOn Monday Apple released both an updated version of its iTunes digital music software and updates to the QuickTime media player software to fix eight security flaws.

According to a security alert from Apple, the 7.1.5 version of QuickTime fixes security issues involving how the player handles certain types of “maliciously-crafted” files including QuickTime, MIDI, 3GP, PICT and QTIF. The update also adds some functionality updates with the new version which can be downloaded through the Software Update preferences or from the QuickTime download page.

iTunes 7.1 adds features for improved sorting, full screen Cover Flow and most significantly additional support for the upcoming Apple TV. “Using iTunes 7.1, you can now enjoy your favorite iTunes movies, TV shows, music, and more from the comfort of your living room with Apple TV. iTunes 7.1 also supports a new full screen …

The VB-C300, Canon’s latest eye in the sky

Posted in Canon,Digital Video,Security by Darrin Olson on February 23rd, 2007

VB-C300 PTZ Canon Security CameraIf you’ve ever wanted one of those cool eye-in-the-sky cameras like they have at casinos under the tinted domes in the ceiling, Canon has recently introduced a new professional grade version with some really nice and unexpected features.

This is the VB-C300 Wide-Angle Pan/Tilt/Zoom (PTZ) network camera from Canon that also has some high quality video recording software available to allow you watch and record the video stream across a LAN or the internet. It is optionally powered by the actual LAN cable making installation a lot easier. Simply mount the camera and attach your LAN line and you are powering, controlling and watching video from one connection.

“The addition of the VB-C300 PTZ Camera and introduction of VK-64 / VK-16 Version 1.3 Network Video Recording Software further expands the versatility of Canon’s Network Video Solutions products and provides installers with more options to …

Indestructible Flash Drive – IronDrive

Posted in Flash Memory,Security by Darrin Olson on February 18th, 2007

IronDrive Flash MemoryAny concerns about losing the data on your USB flash drive due to damaging it would be dispelled with this IronDrive from R&D Electronics. The rugged flash memory device has been tested to withstand moisture, vibration, shock testing from all angles, caustic agents, EMI, and even nuclear effects.

The IronDrive comes in different capacities from 32MB to 4GB and can be customized if needed. The device connects via a 12 inch USB 2.0 cable and is able to transfer data to and from Windows XP/POS/CE as well as Linux and VxWorks. It is also rated to operate from -40 C to +85 C. The first concern that came to mind was whether or not the memory would last as long as its enclosure, and the IronDrive has a MTBF (Mean time between failures) of 4.66 million hours and is rated to 5 million write and erase …

Twelve Microsoft Security Patches Tuesday, and More

Posted in Microsoft,News,Security,Windows by Darrin Olson on February 11th, 2007

Microsoft has 12 updates coming TuesdayYou may want to set a side a little time for some updates and rebooting on Tuesday, February 13th. Microsoft has 12 security updates scheduled in their monthly security bulletin communication that list out various Security Bulletins affecting Microsoft software products.

Eight of the security bulletins scheduled to be released Tuesday affect Microsoft Windows or Microsoft Office with seven of them having severity rating of ‘Critical’ with the rest rated as ‘Important’. The remaining four bulletins range from ‘Important’ to ‘Critical’ and will affect Windows with Visual Studio, Step-by-Step Interactive Training, Microsoft Data Access Components (MDAC) and multiple security applications that run on Windows including OneCare, Antigen, and Wiindows Defender among others.

Along with these high-security updates, Microsoft will be releasing another update to the Malicious Software Removal Tool and 10 additional non-security related high-priority updates.

These security updates from Microsoft are a common …

Locking iPod Case

Posted in Accessories,iPod,Security by Darrin Olson on February 11th, 2007

iPod Locking CaseIn keeping up with the regular installments of iPod accessories, we ran across this locking iPod case from Elecom via Akihibara News.

We’ve seen some strange iPod accessories in the past months, including the iDisguise and a bullet proof case which both have different angles on protecting the player.

This iPod accessory appears to be a combination lock with a wire cable which can lock the audio player to another object to prevent it from being stolen. Simply remove the top, slide the iPod into the case and replace the top while securing the cable to a stationary object.

I’m struggling coming up with a reasonable situation where something like this would be necessary, but I’m starting to think that necessity is not the mother of iPod accessory inventions. You could probably lock the device to something at home to keep your little brother from …

BiodeLogon Facial Recognition Authentication

Posted in News,Security by Darrin Olson on February 5th, 2007

BiodeLogon Facial Recognition software for Windows Login authenticationNecSoft, a Japanese software company, has released some new authentication software that uses facial recognition as a different type of biometric security in order to gain access to a Windows PC.

In order to authenticate, a web cam views the face in front of it and matches it to an existing photo tied to the user account. The system also has a network management component in the works to allow a network administration of the facial recognition authentication for individual client PC’s.

As an added security feature, all of the images taken when trying to authenticate with the web cam are saved by the system. This, unlike trying multiple passwords, identifies the individual attempting to gain access to the system through the BiodeLogon facial recognition application.

We had reported last October about a Japanese mobile phone from NTT DoCoMo that also utilized …

iCache Replaces Your Credit Cards, Adds Security

Posted in Security,Services by Chetz on January 18th, 2007

iCache Replaces All Your Credit CardsiCache is a new gadget on the market trying to gain some adoption with the intention of consolidating your credit card data and adding a little security as well.

The iCache device is able to house the data from all your credit cards, debit cards and basically anything with a magnetic stripe. Once the information is saved it’s secured by a biometric fingerprint scanner on the front. Whenever a credit card is needed for a purchase, users can select the appropriate card from the menu on the iCache gadget and the magnetic stripe on the iCache credit card will be temporarily encoded with the appropriate swipe data. The iCache device can also display bar codes and communicate information with Contactless terminals.

This all seems pretty slick, especially for those with a number of credit cards. If you lose this device the bar code …

PayPal Security Key Protects Phishing Attacks

Posted in Paypal,Security by Paul Patterson on January 15th, 2007

PayPal Security Key Protects Phishing AttacksPayPal is strengthening its defenses with the aid of a new Security Key. The PayPal Security Key is a small, portable password-generating key fob that was developed in conjunction with VeriSign to help protect your PayPal and eBay accounts against phishing attacks.

The device works by assigning a unique six-digit security code each time you log in to your account. You will continue to use your regular user name and password to authenticate, but you also enter the security code that the device displays. The code is synchronized with a server at the time of authentication to verify that the code is the same. Once you are finished, the code expires.

The device will give PayPal an additional and much-needed layer of protection. While not foolproof, it should help thwart phishing scams which have been a serious problem for PayPal customers.

The …

Paypal Increases Security With Key Fob

Posted in News,Paypal,Security by Darrin Olson on January 12th, 2007

Paypal increases security with key fob password codes.Ebay and Paypal are gearing up to offer customers an increased security measure when logging into their Paypal account to further avoid data theft from phishing scams.

In the near future, password generating gadget can be used in conjunction with existing login credentials when signing into a Paypal account. The key fob generates a new 6-digit password about every 30 seconds. This password is synchronized with a server that verifies that the every-changing code is the same at the time of authentication. Verisign currently offers the same type of two-factor authentication security to customers through their Unified Authentication Token product.

Phishing scams involve a would-be thief making a site that appears exactly like a legitimate site such as Paypal, and then sending out spam emails drawing people to the fake look-a-like site, and asking consumers to “verify” their login …

email

Gmail Vulnerability May Still Exist

Posted in email,Gmail,Google,Security by Chris Weber on January 2nd, 2007

gmail mass email deletionThis is a follow up to the previous post on the Gmail Contacts Exploit.

It appears the the problem has been partially fixed by Google. A blog on zdnet is claiming that the issue is partially fixed. They are reporting that the issue may still exist on some Google domains. Another blogger is stating that the vulnerability still exists. SlipperyBrick is researching the issue and will keep our readers informed of any developments in the case.

Update: The author has posted to the Google Group handling Gmail issues to get a response from Google. The author of this post uses Gmail as his primary email client.

email

Gmail Hacked

Posted in email,Gmail,Google,News,Security by Chris Weber on January 1st, 2007

gmail mass email deletionThe problems continue for Gmail users. A vulnerability was found in the Gmail web based email application that allowed anyone to see a Gmail user’s contacts. The vulnerability came from the fact that apparently Gmail stores the users contacts in a JavaScript file. Any clever web hacker could steal this information as long as the user was logged into their Gmail account and visited a malicious site.

Gmail has had problems in the past with this sort of issue. Jeremiah Grossman discovered the issued and reported it to Google.

Both issues revolve around using JavaScript, the scripting language used in web pages, to make requests for data. If the request is made from the HTML within a Gmail message then the cookies used to authenticate a user to Gmail may be used to get information …

DataMore V2 Partly Secure Hard Drive

Posted in Hard Drives,Security by Chetz on December 16th, 2006

DataMore V2 Secure Data Storage From SavitMicroSavitMicro has a new secure hard drive called the DataMore V2 available for consumers in Korea, although according to Akihabara News you can special order it in the US at GeekStuff4U.com.

The drive is intended to allow you to store your own data securely in a portable, external hard drive. When you first get the drive you can format it and define how much of the drive is “public” and how much of it is “secure”. When connectto a PC via USB, it will show the public portion of the drive that is unsecured at make that available. The secure portion will not be available until you scan your fingerprint on the outside of the drive case, then the secure partition will be available.

When setting up the drive, you can give on or all of your fingerprints to be set …

smartSTICK BioMetric Secure USB Drive

Posted in Flash Memory,Security by Chetz on December 6th, 2006

smartSTIK Biometric USB DrivebioMETRX has a few products that are secured through a finger activated technology that only allows the owner to access the data it contains. The smartSTICK is one of these devices which happens to be portable USB drive.

It holds data and works like any other thumb drive, but in this case your thumb can actually be used to give you access to the drive. By simply sliding your finger over the sensor you can set and gain access to the drive contents.

The drive can save up to 10 users and comes in storage capacities as much as 1GB. It also comes with a number of software applications to aid in storage, including storing medical records, school work, personal PC settings, email addresses, IM buddy lists and other productivity applications.

Product Page [bioMETRX]

Lexar Safe PSD S1100 For Enterprise Security

Posted in Flash Memory,Security by Darrin Olson on December 6th, 2006

Lexar Safe PSDLexar has released an advanced security USB drive for use in enterprise organizations to enhance the level of data security when using thumb drives to transfer data.

The Lexar Safe PSD S1100 uses a multi-layer security platform to allow users to safely store and transfer secure data and lessen the risk of loss or theft. The USB memory device has something called PSD-Lock that provides device-access control technology to keep those out that do not have the right password.

It also has some “off-line” defenses to protect the theft of data from the device itself. It uses an internal 256-bit EAS encryption algorithm, and has a housing designed in such a way that makes it very evident if it has been tampered with. This keeps someone from removing or replacing the contents without it being visibly obvious.

Moving data to and from the Safe …