Posts Tagged ‘ security ’

Hacking by sound not that simple

Aug 17th, 2015 | By

A recent story from Reuters kicked up a bit of a stir by claiming that hackers could use sound to steal data from a computer or network. While the story was true it turns out that it isn’t the whole story and is less of a problem than the report inferred, according to cybersecurity expert Jack Wolosewicz. Here’s the interview.

 

 



Secure collaboration is a quiet trend at #52DAC

Jun 9th, 2015 | By

By Lou Covey
Editorial Director

While outsourcing software and design development is a common practice, the idea of putting your company’s crown jewels into the cloud for a freelancer to monkey with tends to drive sales of anti-emetics. Can you safely allow virtual strangers to access your server, or should you just suck it up and overwork your employees?

That has been a continuous conundrum of the Electronic Design Automation Industry (EDA) and its customers in the embedded software and semiconductor industries. Larger companies, like Synopsys and Intel either use internal security paradigms in the collaborative tools or work with …



Data breach fatigue and NIH fuel ineffective cyber security

Mar 19th, 2015 | By

This is another part of our ongoing series on outsourcing services, again focusing on security  Large companies rely on the work of outsourcing providers for developing security solutions and containing breaches.

By Lou CoveyNew Tech Press

News reports about data breaches are almost a daily occurrence. Companies spend millions on identity protection services for affected customers while the same type of breaches continue with no end in sight. The sheer volume of data stolen is astronomical begging the question, why isn’t anything being done?

“There is no financial reason for companies and governments to do anything about the …



Solving the weakness of password protection

Jan 7th, 2015 | By

This is part one of a a two-part interview with Jack Wolosewicz, CTO of Eurocal Group and founder of Certus, a security technology firm.  We talk about the inherent weakness of passwords in relation to the growing use of streaming video.



Sponsored by Blaylock EngineeringEuroCal GroupMeBox Media and Busivid.



Coin Guard: Home security for the tech impaired

Oct 13th, 2014 | By

Home security gadgets are all the rage, fueled in no small part by Dropcam and their competitors.  But video surveillance and smart locks have issues of data storage and hack-ability to deal with that scares most non-techie types.  Pilot Labs, a small OEM wireless product manufacturing company in San Diego, decided to leap into the fray with a product that brings wireless security to the masses who have a hard time figuring out fax machines.

Coin Guard, currently awaiting funding through Kickstarter before it becomes widely available, hopefully in time for Christmas, Is a disk about two inches across that …