Tag Archives: operating system

Made in IBM Labs: Two-Factor Security for Mobile Transactions

ZURICH – 18 Oct 2013: IBM scientists have developed a new mobile authentication security technology based on the radio standard known as near-field communication (NFC). The technology provides an extra layer of security when using an NFC-enabled device and a contactless smartcard to conduct mobile transactions, including online banking and digital signatures when accessing a corporate Intranet or private cloud.

According to a recent report by ABI Research, the number of NFC devices in use will exceed 500 million in 2014. This statistic and the fact that 1 billion mobile phone users will use their devices for banking purposes by 2017* make for an increasingly opportune target for hackers. (more…)

Read More

IBM Helps Organizations Address Growing Mobile Computing Opportunity

New software and services enable businesses to create and enhance mobile strategies

ARMONK, N.Y. – 09 Nov 2012: IBM today unveiled a suite of new software and services that enables global organizations to build a comprehensive mobile computing strategy – from securing and managing devices, to creating mobile applications and analyzing data. These new offerings are part of a move by IBM to capitalize on the growing market opportunity for mobile that is expected to drive $130B in revenue for the IT industry by 2015, according to a recent study.[i]

As organizations increasingly view mobile computing as the next platform to conduct business, the market is evolving beyond just the device. Business leaders including the chief information officers (CIOs) and increasingly chief marketing officers (CMOs) of global organizations such as airlines, retailers, governments and healthcare providers are among the businesses turning to IBM to ensure mobile services and solutions are readily available to constituents and in full compliance with IT strategies. They need solutions that can be applied across any mobile environment and device — whether a laptop, smartphone or tablet — and can provide an underlying IT infrastructure that is always available, secure, effectively manages data, and integrates both front and back-end systems. (more…)

Read More

IBM X-Force 2012 Mid-Year Trend and Risk Report: Rising Attacks Focus on Browsers and Social Media Networks

New global security operations center in Wroclaw, Poland helps clients stay ahead of threats

ARMONK, N.Y. – 20 Sep 2012: IBM today released the results of its X-Force 2012 Mid-Year Trend and Risk Report, which shows a sharp increase in browser-related exploits, renewed concerns around social media password security, and continued challenges in mobile devices and corporate “bring your own device” (BYOD) programs.

To further protect its clients from emerging threats like those reported in the IBM X-Force Mid-Year Trend and Risk Report, IBM is today announcing the opening of a security operations center in Wroclaw, Poland. This newest IBM Security Operations Center is the 10th worldwide facility to help clients proactively manage these threats, including real-time analysis and early warning notification of security events. Data for the bi-annual X-Force report comes from IBM’s security operations centers which monitor more than 15 billion security events a day on behalf of approximately 4,000 clients in more than 130 countries. (more…)

Read More

Nokia Unveils Its First Windows Phone 8 Devices

Nokia introduces the Lumia 820 and Lumia 920, phones designed to take full advantage of the Windows Phone 8 operating system coming this fall.

NEW YORK CITY – Sept. 5, 2012 – Nokia revealed two new Windows Phone 8 Lumias at a press event in New York City this morning.

From the circuit board on up, the new phones – the Nokia Lumia 820 and the Nokia Lumia 920 — were designed to take full advantage of Windows Phone 8, Microsoft’s forthcoming phone operating system, says Terry Myerson, corporate vice president of Microsoft’s Windows Phone Division. At the press event, Nokia showed off the two next-generation Lumias, available in a number of colors, as well as some accessories, including a wireless chargers and speakers.

“These are exciting times around Windows Phone,” Myerson says in a blog post. “In June we showed the first glimpses of Windows Phone 8, our most innovative release ever, and one we can’t wait to get in the hands of people around the world later this year.” (more…)

Read More

AARP and Microsoft Release New Study on How Online Communication Connects Generations

*The report reveals social technologies are helping families connect and enhance intergenerational relationships.*

WASHINGTON, D.C. — Feb. 7, 2012 — AARP and Microsoft Corp. today released “Connecting Generations,” a new research report that examines how people of all ages are using online communication and social networking to enhance their family relationships. The report reveals three key pieces of evidence showing that online communication is bridging the generation gap: (more…)

Read More

University Academic Lifts Lid on Iphone Tracking

A University of Exeter researcher has revealed how he discovered Apple iPhones and iPads are tracking every movement of their owners and storing it in a file on the device.

Dr Alasdair Allan, a Senior Research Fellow in the Astrophysics department, came across the find while looking at programmes on the iPhone with security expert, Pete Warden. (more…)

Read More

Hardware, Software Advances Help Protect Operating Systems From Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer – or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked.

At issue are security attacks in which an outside party successfully compromises one computer application (such as a Web browser) and then uses that application to gain access to the OS. For example, the compromised application could submit a “system call” to the OS, effectively asking the OS to perform a specific function. However, instead of a routine function, the attacker would use the system call to attempt to gain control of the OS. (more…)

Read More