Consumer spending on technology forecast to reach $1.69 trillion in 2019

Consumer spending on technology is forecast to reach $1.69 trillion in 2019, an increase of 5.3% over 2018. Traditional technologies still dominate According to the latest Worldwide Semiannual Connected Consumer Spending Guide from International Data C… Continue reading Consumer spending on technology forecast to reach $1.69 trillion in 2019

Seven key digital disruptions CIOs may not seeing coming

Gartner revealed seven digital disruptions that organizations may not be prepared for. These include several categories of disruption, each of which represents a significant potential for new disruptive companies and business models to emerge. “The sin… Continue reading Seven key digital disruptions CIOs may not seeing coming

Fitness app Polar Flow reveals home addresses of soldiers, spies

Polar Flow can reveal sensitive information about the lives of users, including intelligence agents, embassy workers, military men and women, workers at nuclear weapons storage sites, and so on. What is Polar Flow? Polar Flow is an app and web service … Continue reading Fitness app Polar Flow reveals home addresses of soldiers, spies

Security, privacy issues we need to solve before non-medical implants become pervasive

The cybernetic revolution is happening, and it’s imperative that civil liberties and privacy issues are addressed by system designers, innovators, regulators, and legislators, says James Scott, a Senior Fellow at cybersecurity think tank ICIT (Institute for Critical Infrastructure Technology). With a recently released paper on the topic of implantable devices, he provided a comprehensive overview of the current situation regarding the use of medical and non-medical implants, and the security and privacy issues that already … More Continue reading Security, privacy issues we need to solve before non-medical implants become pervasive

Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks

A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a good alternative to passwords and biometrics-based 2FA options. About Pixie “Pixie authentication is based on what the user has (the trinket) and what the user knows (the particular trinket among all the other objects that the user readily has access to, angle and viewpoint used to register the trinket),” the … More Continue reading Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks

Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without them being aware of it, but most have no trouble with law enforcement agents, first responders, or field services workers using wearable cameras to capture evidence or to protect their own safety. Wearable cameras in … More Continue reading Privacy, security concerns grow for wearables

Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University of the Negev (BGU) and Tel Aviv University (TAU) researchers. While most online signature verification technologies rely on dedicated digital devices – such as tablets or smart pens – to capture, analyze and verify signatures, this new method utilizes motion sensors found in readily available hand-worn devices. Recent market … More Continue reading Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

Unlocking Windows 10 PCs with smartphones, wearables, smart cards

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the password-free authentication feature that comes with the OS, works by recognizing the users’ face, iris, or fingerprint, but could initially be used only by those that had a supported infrared-illuminated camera (for face and iris recognition), a supported fingerprint reader, or companion devices such as Microsoft Band and … More Continue reading Unlocking Windows 10 PCs with smartphones, wearables, smart cards