Jun 30

Best Defense is Equal to Attack

Speaking of BYOD, the best defense is attack, namely, making strategies in advance to achieve your desired results and to avoid potential risks.

BYOD (Bring Your Own Device) has stirred all walks of business processes. Some companies are fully enjoying the convenience brought by BYOD, yet some companies shy away from them. On the bright side, BYOD can potentially help companies save operating costs, help employees maintain a happy mood and improve office efficiency. But on the other hand, BYOD may also bring a series of problems and pitfalls in the various aspects of security, compatibility and so on. But through some planning and education, most of these problems and pitfalls can be avoided. We can have a look at the troubles brought by BYOD and corresponding resolutions to these problems.

Data leakage: Companies sensitive data leakage is always one of most concerned problems for companies. Employees bringing their own devices to company makes enterprise more worried. Employees may lose their smart phone or tablet; for these devices can easily be eyeing by thief. When the devices containing companies’ sensitive data get lost, the data may fall into wrong hands. One way to avoid this situation is to use file password protection program to lock sensitive data with password, and the other way is to use a remote deletion policy, namely when the employee’s mobile device is stolen, company can remotely delete the sensitive data on the remote device.

Password Leak: just like we usually carry several keys, employees’ mobile devices will store various passwords that are used to log in company’s network and applications. These passwords may exist in mobile applications, or may also be stored directly in the mobile device’s memory. Enterprises must establish a strategy to ensure that companies’ passwords won’t be stored in cache or any application in mobile device. An alternative strategy is that if employees want to save the password on the mobile device business (even login information), they need to use information/password saving application to properly encrypt them.

Productivity decline: When employees start BYOD, they will spend a lot of time on social network, chatting with friends or do other things unrelated to work. How to solve this problem? Since many devices are connected to operator’s mobile communication network, in which case the employees feel that their equipment is not bound by corporate policy. In order to avoid this situation, you should require employees’ mobile devices switch into WiFi network provided by the enterprise when entering company. 

Insufficient bandwidth: Many companies have been concerned about this problem. Most companies believe that the enterprise network bandwidth demands will be dropped after the use of BYOD, which is a big mistake. One of the advantages of BYOD is that employees also can use the mobile operator’s network networking to work when going out, but when they returned to the office, they are likely to connect desktop and their mobile devices to the corporate network, thereby increasing the burden on the enterprise network access bandwidth. Therefore, companies need to ensure that their network access bandwidth has sufficient load-bearing capacity.

Device Management: Many companies are asking how to manage a large number of mobile devices. Because of the many types of equipment, as well as different operators, companies is difficult to centrally manage all mobile devices. But what companies can do is to establish a set of network access control mechanism (NAC), and to control these devices via MAC address for each mobile device.

Over Autonomy: Once a company implemented a BYOD strategy, which’s equivalent to tell employees and users that businesses gives them a very high autonomy. Of course, this autonomy is likely to be abused by employees or network users. Therefore, even if the enterprises implement BYOD, they should let employees know that it doesn’t mean that they can use their own equipment in any activity. If necessary, you can also require employees to sign BYOD agreement confirming that they understand their mobile devices use behaviors in the enterprise are limited.

Dec 17

Dangers in Mobile Information Age

The development of the Internet and information technology makes people step into the information age, but with the change of the information processing terminal, people also enter the mobile information era. In this mobile era, people can use their mobile information devices to connect the network anytime and anywhere, beginning their informationalized living, office and entertainment. It’s sure that the mobile situation will continue for a long period of time, because it fit people’s hope of free.

But it is this portable mobile device that brings about information and data security issues to people. How to deal with mobile device security issues has become one of most concerned things of individuals, companies and even countries. Also due to the diversity of mobile devices and information technology, the protection solutions must keep up with them, namely is able to adapt to various possible environment and safety requirements.

Mobile Device Management (hereinafter referred to as MDM), namely management of smart phones, tablet PCs and other mobile network client. Now, MDM is an indispensable measure for enterprises, because the mobile network clients are similar to traditional computer, poor management is likely to cause a bad impact on operating safety.

Smart phones and tablet computers are developed from the PDA (Personal Digital Assistant, Pocket PC), their history is not long. They can be used as a mobile network clients, the earliest portable microcomputer appeared in the late 1990s.

Mobile + Portable= Increasing chance of stolen

Owing to the small size and portability, the stolen risk of microcomputer is significantly higher than desktop computer. Most desktop computers are larger in the volume and fixed on positions in the office, they are seldom stolen if you close the door. But because of the small size of laptops and smart phones, the stolen difficulty is sharply decreased.

Many researches show that mobile phone is now more important than our wallets for people. The reason why phones are becoming so important is that in addition to its intrinsic value, the important data stored in the phone, such as scheduling, address book, and so such private information are important.

Business people tend to store data involving many business secrets in office tablet PCs and smart phones, especially in the email. E-mail specific contents are different based on each company ‘s information infrastructure, which may include unimportant chat, and may also include customer information, corporate plans, and even the contract documents. Email possibly contains passwords of common office applications.

The most frightening thing is data. Important data may be lost due to security vulnerabilities in equipment: hackers can gain access to the device, and access the data in the device. Another way is through the phishing application. As long as you download some phishing applications, they will be able to access to the data stored in your device. Apparently, users who download these applications are insufficient of vigilance. As long as the application is free, users are willing to download; they are seldom concerned about the possibility that the data in their own equipment may therefore be compromised.

The traditional Trojan viruses can also spread on a mobile platform. Even though Apple, Google, Microsoft and other companies have considered this problem in the design of operating procedures and ensure that the factory equipment is not toxic, but it’s impossible that the program has no flaws.

As the security issues come with the development of mobile technology and IT are more and more, in order to decrease the loss caused by mobile device stolen we’d better password protect the data stored in it. If the threatening objects aim at the value of data, you can use encryption solution to protect the data.

People look for freedom, while the yearning for freedom also affects their attitudes of handling things. In the face of security issues in the information age, individuals, companies and countries need encryption technology to protect files and lock portable storage devices.

Oct 09

The Ban on Samsung Smartphone Import Is in Effect

According to the news, the U.S. Trade Representative’s office (USTR) said on Thursday that the ban on importing Samsung smartphones proposed by U.S. International Trade Commission (hereinafter referred to as “ITC”) will come into effect.

The earlier report said that owing to the absence of a veto by the United States President Barack Obama, the ban on imports of Samsung smartphones ruled by ITC is already in force.

However, the ITC’s ruling has to be handed over to U.S. President Barack Obama for considering, Obama has 60 days to give the final result of this ruling. If Obama does not veto the ITC ruling, the ruling will come into effect. Several media reports said, now 60 days time has passed, and Obama did not veto the decision.

ITC’s decision does not clearly indicate which devices of Samsung infringe, but has been determined that, Galaxy S 4G, Fascinate and Galaxy Tab these old models are infringing.

In sharp contrast, Apple has had a similar experience, but the result was the opposite. In June this year, ITC has ruled that some old products of Apple has infringed the patent of data transferring of Samsung’s products and ban the import or sale of AT & T version of the iPhone 4, iPhone 3GS, iPad (3G version) and iPad2 (3G version). But in August this year, the Obama government has rejected ITC’s ruling.

Nowadays, innovations in the field of IT usually rely on many small improvements involving numerous technologies, which means the patent is not always clear precisely. The open secret is that everyone infringes others’ patents in some way.

The battles of patent between companies are continuing, the fights of copyright are also continuous. If you operate a business and your company specializes in selling created videos or documents to customers, most companies tend to store the videos or documents into a USB and sell this USB to customers, but what can you do to protect your copyright from being breached by others? Here, I recommend you to use USB encryption solution to ensure the contents in your USBs will not be copied or transmitted by unauthorized users. You can use USB copy protection program to password protect the USB and configure access permissions to specific groups or individuals to allow them to access the contents in it and prevent other unauthorized access at the same time. Complete protection is the indispensable measure to ensure the security of companies’ wealth and inventions.

Aug 12

Google are Developing New Security Authentication Products

According to foreign media reports, the world’s largest search engine Google ( microblogging ) is currently developing a new security authentication technology, the use of the technology may be able to make use of jewelry and other users Jewelry login account, instead of entering tedious password.

 

Google’s announcement about this experiment was appeared in a scholarly articles published in January. The goal of this development is to produce a small “USB key”, the user can use this key to entered all verified information into the computer. In addition, Google also mentioned that the embedded smart chip ring will be expectedly produced.

 

Last month, in RSA security conference hold in San Francisco, an engineer of Google who specializes in charge of security, Mayank Upadhyay, has a public speech for this technology. He said that the use of personal hardware to password login accounts can prevent from re-use or being copied. He also said that the people are familiar with this technology. “Everyone is very familiar with the ATM, why not use the computer in the same way?”

 

Upadhyay said that Google is developing a small USB key, when the key is inserted into the computer, the user can be authenticated through the network. The key is also built non-contact chip, which can be used on a mobile device.

 

Secret security token like that Google is developing does not contain a static password that can be replicated. Each encryption keys and devices are matched with each other; built-in data will never be transmitted to the outside world. When the key is connected, the key will make the right answer to the question the web site set up to ensure that the same information will not land again.

 

After the meeting, Upadhyay said that Google will also produce a ring which can replace cryptographic token, but he did not disclose the details of their work. “Some people may feel uncomfortable on the USB cryptographic token.”

 

From the development of Google, the personal security has become one of heated topic nowadays, for the science and technology have rapidly advanced, personal data and information are equal to fortune for all of us and the tricks of data theft have been more and more excellent. For people who are accustomed to storing personal data or information in PC or USB, the data security is the most important thing that will annoy them. I recommend Folder locker or USB locker to keep the data in the PC or USB more secure.

Jun 04

Top Hot Ultra-book

In this rapidly developing mobile electronic age, who can firmly grasp hot point, break the convention, who can get caught the attention of consumers? Over most of the year, the direction of development will continue to be variability and touch function. This can already be seen in the last year, capacitive multi-touch screen from the original tablet PCs and smart phones, steps into the ultra book. A number of products have realized the 2-in -1 of tablet computer and ultra book through morphological changes.

Touch-screen laptop should make many changes in products form and design because of the change in interaction, so we see a lot of ultra-book which is able to flip, rotate, slide and even be detachable. The designer emphasizes on how to solve the convenience and safety of touch-screen interaction, which is not be considered before.

Now, I will introduce some types of hot ultra book as below.

LenovoYoga13-IFI

Lenovo Yoga13-IFI (daylight orange)

Operating system

Windows 8

Motherboard chipset

Intel QS77

CPU model

Intel Core i5 3317U

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

13.3 inches

Screen Resolution

1600×900

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.0 mega pixel camera

Wireless network card

802.11b/g/n wireless protocol

Bluetooth

Support, Bluetooth 4.0 module

Notebook Weight

1540g

Case Description

Sunlight Orange

 

Asus: TAICHI 21

Asus TAICHI 21

Deformation

Dual

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 5 megapixel camera

Data interface

2 × USB3.0

Battery Type

Polymer battery, 3500 mA

Notebook Weight

1250g

Shell material

Magnesium alloy

Case Description

Silver

Acer:S7

Acer S7-191-53334G12ass

CPU model

Intel Core i5 3337U

CPU frequency

1.8GHz

The Process

22nm

Memory Capacity

4GB

Hard drive capacity

128GB

Screen Size

11 inches

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Screen description

Capacitive multi-touch

Graphics chip

Intel GMA HD 4000

Webcam

Integrated camera

Data interface

2 × USB3.0

Reader

Multi-in-1 card reader

Keyboard Description

Backlit keyboard

Battery Type

4 polymer battery, 4680 mA

Notebook Weight

1248g

Samsung : 700T

Samsung XE700T1C-A01

Operating system

Windows 8 (64bit)

CPU family

Intel Core i5 3-generation family (Ivy Bridge)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Supreme Turbo

2600MHz

Bus Specifications

DMI 5 GT / s

Memory Capacity

4GB

Memory Type

DDR3

Hard drive capacity

64GB

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Data interface

1 × USB3.0

Video Interface

Mini HDMI

Keyboard Description

Keyboard Dock

Shell material

Composite materials

Case Description

Black

Toshiba : U920t-T06B

Toshiba U920T

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

8GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Screen Resolution

1366×768

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

USB2.0 + USB3.0

Video Interface

HDMI

Notebook Weight

1520g

 Lenovo :ThinkPad S230U

Lenovo ThinkPad S230u Twist (33473QC)

Operating system

Windows 8 Professional edition 64bit (64 of professional edition)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

24GB +500 GB

Hard to describe

Hybrid hard drives (SSD +7200 rpm HDD)

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen Resolution

1366×768

Screen description

Capacitive multi-touch, support for five-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Data interface

2 × USB3.0

Video Interface

Mini HDMI, Mini DisplayPort

Notebook Weight

1580g

Sony : Duo 11

Sony D11217CCB (Metallic Grey)

Operating system

Simplified Chinese version of Windows 8

CPU model

Intel Core i3 3217U

CPU frequency

1.8GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

HDMI

Notebook Weight

1305g

Thickness

17.85mm

Shell material

Magnesium alloy

Dell : XPS 12

Dell XPS 12 (XPS12D-1508)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen description

Capacitive multi-touch

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.3 megapixel camera

Audio System

Built-in audio chip

Speaker

Built-in speaker

Microphone

Built-in microphone

Wireless network card

Intel 6235 AGN

Bluetooth

Support, Bluetooth 3.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

Mini DisplayPort

Audio Interface

Headphone / microphone combo interface

Other interfaces

RJ45 (network interface), power connector

Pointing device

Glass touchpad

Keyboard Description

Anti-leakage keyboard, backlit keyboard, full-size keyboard

Notebook Weight

1520g

Length

317mm

Width

215mm

Thickness

15-20mm

Shell material

Magnesium alloy

Case Description

Gray

 

As the rapid development of computer, we have to recognize that computer has become one important part of man’s life. We use it for work, entertainment, and living, we may take it as transfer media, storage devices, etc., and meanwhile, we should pay more attention to our information security in computer. You’d better lock files/folders to prevent someone else will access and view your sensitive and confidential data and information without your permission. 

Mar 07

Microsoft: who is peeping on users’ privacy in e-mails?

According to the report of some international media, that “Scroogled” campaign, which is advocated by Microsoft has moved on from sniping at Google Shopping to charge Gmail with invading its users’ privacy for it peeps e-mail for keywords that can be used for advertising purpose. It is said that Microsoft is planning to cease this campaign, but Microsoft said to Businessinsider that they will proceed on this campaign as long as Google peeps on users’ privacy.

Data protection and privacy security has long been a focused topic for people all around the world, if you think you lock file and folder on your computer with data security program is enough to safeguard your personal information, you are totally wrong. Files and documents in computer may have some of your information, however, how about the online world? People send and receive e-mails on the Internet from time to time, and they shop online and pay bills online too. Therefore these activities pose yourself to the danger and threat which may result in data leakage of your privacy and other information.

When Microsoft found that Google scan users’ Gmail and send them targeted advertise, they encourage users to abandon their Gmail accounts and take up accounts in Outlook.com which belongs to Microsoft in the first round of Scroogled campaign.  And then in the second Scroogled campaign which is advocated in the November of 2012, Microsoft built Scroogled.com and criticized Google adwords.

Privacy protection contains many contents such as USB copy protection and many other aspects, and people care about these topics very much. It is said that Microsoft will end their activity which aims at Google by changing the way used. They will give up using advertise to impact, while about the new measures and policies which they still keep in secret. But one thing can be sure is that no matter what measure Microsoft take to object Google, there is too soon to declare the end of it.

Actually, Microsoft also scans users’ emails in their Outlook mail service, but they said that they doing this just for the sake of preventing the invasion of spam and malware. It is hard to tell who people should believe and blame about the two giants. People need to pay attention for their privacy and protect personal information, or one day they may fall into endless trouble.

 

Feb 27

Google Project Glass and Advertisement Industry

Recently Google displayed some of the unreleased features and functionalities of Google Glass, which is of course excites technology enthusiasts and Glassholes all around the world. As long as the concept of Google glass was put into the market, there are thousands of guesses and predictions about this product. Things in the technology world keep changing from time to time, the popularity of smart phones, tablets and also people’s choice for the mobile devices. When Google announced that they are absorbed in testing to find a way that a piece of jewelry may replace the role of password, so that people password protect folders now may find a new way out to ensure data security in the future.

When it comes to the relationship between Google glass and the advertisement field, although Google have made sure that they will nor add any advertisement on this smart glass, the advertisers still hope to gain some development for the industry with this new technology product which may changing the models of traditional advertisement.

Google released the video to the pre-order of Google glass at the price of $1,500. Only a limited set of developers and pundits have been able to try them out up to this point.  You can imagine that one day you are on the street and when you feel hungry, you can search for the nearby restaurant instantly with your glass and then pick out the one where your friend was happen to dining there. While texting to your friend you are able to search for the discount you may get in the restaurant. What a perfect scene which may only appear in the fiction movie, now with Google glass this may be not too far away.  

In fact the future for advertising on Google glass is promising and full of possibilities. Having an unexpected meal with your friend has been realized by Facebook which offers some function may reach the same function in this kind. Some personalized ads may find their way to take off if they cooperate with Google glass. With the help of this glass people may live a life which may only exist in the game world or fiction movie, though this technology is only in the beginning steps, people are confident about the realization of it.

Before the year 1992, people are hard to imagine the possibility of putting ads on the website, but now it is universal and everywhere. Data are stored ad transferred via USB drive and computer, more and more people lock pen drive to protect their information, and all of them are remote guesses in the old days and now are realities.

Google hasn’t told customers when the complete product will come into the market and the exact price. This pioneering production is definitely a key to the door of new technology and people may enjoy the miracles it brings in the near future.

Feb 22

Identity Fraud Poses a Growing Threat to People’s Work and Private Life

According to a recent report that people in US are experiencing a continuous rising number of identity fraud in the last three years, which indicates that about 5 percent adults in America are affected by identity fraud. Comparing to the figure in the last three years, researchers find that in 2012 the number of identity fraud has risen by about 0.9 percent and stays at the highest level.

People in the modern society are suffering from all kinds of dangers that may result in the leakage of their personal information and important data as the related crime on both the Internet and the real world is rampant. From digital data protection on portable USB drive disks to data security issue for real paper documents, people lock USB disks and keep their files in safe place, however, the effect is barely satisfactory.

When it comes to the losses of identity Fraud, the victims are not the one who suffered the most, and it was proved that the bank, businesses and merchants absorbed a considerable amount of identity fraud. When criminals get people’s identity information they may apply for new account of credit cards, which harm the identity owner’s credit record and cause loss for financial institution as well.

Data breach from any area is an annoying enough matter for anyone. Let’s just take data breach from computer for example, people may store some highly confidential files or pictures on the computer, and when they are flown into the wrong hand the consequence would be terrible. A very possible source of identity theft is from Social Security members, which is a vital factor for opening a new account.  

Financial damages come from identity fraud are obvious in the sector of aging system when financial organizations exchange details of deposits and other cash transfer made by enterprises and individuals.

Data protection is becoming more and more important as increasing number of data leakage and data breach cases walk out on the show, therefore, folder encryption on computer or copy protect USB with valuable files which are rather important. Once your identity details for into the wrong hand you may become the target of criminals. For social service institutions it is very necessary to build more security information management system to protect citizens’ identity information and prevent identity theft from happening. For individual people, when they need to pose their information on the Internet they need to think twice and be cautious.

Feb 19

Network Vulnerability: Thousands of Devices is Faced with Danger of Hacker Attack

Routers are one of the most widely used devices for people with the need of sharing their network and gain more convenience in using the network. Nowadays, routers and other network devices are the roots of attacks from hackers and other cyber criminals because of their adoption of Plug and play technology. As the occurrence of hacker attack and illegal use of the network people now value their privacy and folder encryption than they ever had.

According to a recent report from international media that network security software company Rapid7 is going to release a white paper which contains the content that most of the network technologies used in the market now leave networks vulnerable and then result in hacker attacks on thousands of personal computers, printers and storage devices in normal network environment. These attacks usually cause serious consequence for people’s private life and working staff. Comparing to USB security issues which are easy to control attacks from network devices are random and unpredictable so network vulnerabilities need more attention.

Computer routers and other network devices is the root for exposing users’ equipments to the danger of attacks from hackers and cyber criminals owing to the using of Universal Plug and Play, UPnP technology which enables the network to recognize and communicate external equipments faster, which save the time for network debugging greatly.

In this white paper, Rapid7 pointed out that their researchers have figured out 3 independent vulnerabilities from UPnP technology standard and these vulnerabilities result in 40 million to 50 million devices which include some well known brands such as Belkin, D-Link and Linksys etc. all around the world are vulnerable to attack.

If you want to make sure your sensitive files and folders in your computer or a USB drive disk free from the annoy of being breached or copied without any permission you can use a special data protection or USB copy protection software to safeguard your confidential information. But how about data protection threats result from vulnerabilities in network devices? According to the study of Rapid7, hackers may take advantages of the existing security vulnerability and get your highly classified documents, steal password, gain the total control of your PC or obtain remote control of the web cameras, printers and security systems.

Rapid7 recommended that if a company or consumer suspects his or her devices are at the danger of vicious attack then close the UPnP function in time and Rapid has released a tool on their web to help their customer to scan for potential security vulnerabilities in their routers and related devices and products.