by sadmin | Oct 20, 2017 | blackberry, cyber security, internet of things, Summit
MINNEAPOLIS, October 19, 2017 (Newswire.com) – Chris Greco, Senior Director Solutions Development at Blackberry, will present “The Intersection of the Connected Worker and the
Internet of Things” on Tuesday, Oct. 24, during Cyber Security Summit 2017 at the Minneapolis Convention Center.
Today, the smartphone is the primary communication and computing device for many consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off-campus mobile workers who are becoming increasingly connected by rich real-time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.
Greco’s session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how best to address them.
Greco is the Senior Director of Solutions Development at BlackBerry Ltd. He has 15 years of industry experience and currently leads the enterprise technical product management team and the enterprise security certifications team at BlackBerry with a focus on enterprise software and mobility. Over the years, Greco has worked with governments on implementing secure software solutions and security certifications and assurances like NIAP, Common Criteria, FedRAMP.
About BlackBerry
BlackBerry® is a leading software and services company dedicated to securing the Enterprise of Things.
BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things (IoT) can thrive. Our software platform, BlackBerry Secure, is a comprehensive mobile-native approach to security that addresses the entire enterprise from end point to end point.
With software and services from BlackBerry, enterprises in a range of industries – from healthcare to financial services — are empowered to:
- Identify and mitigate cybersecurity threats.
- Manage and secure a diverse and growing set of endpoints such as smartphones, tablets, wearables and laptops.
- Protect files and IP by enabling users to securely access, share and collaborate.
- Develop powerful applications, workflows and business processes.
- Unify crisis communications within and between organizations.
BlackBerry holds 80-plus security certifications and is listed in the top position in all six categories of Gartner’s high-security mobility management study. The company is ranked among the top 10 percent of all cybersecurity providers. All G7 governments and 15 of G20 are BlackBerry customers. BlackBerry Unified Endpoint Management (UEM) software is the most widely-deployed among Fortune 500 companies.
Based in Waterloo, Ontario, the company was founded in 1984 and operates in North America, Europe, Asia, Middle East, Latin America and Africa. For more information, visit
www.BlackBerry.com.
Cyber Security Summit 2017
Cyber Security Summit is a public-private collaboration with support from industry, government, and university leaders who gather to discuss security trends and solutions. The 7th Annual Summit will bring together senior executives, risk managers, military representatives, policymakers, lawyers, academics, and technology leaders. Topics, content and speakers are driven by an Advisory Board composed of leaders from diverse critical infrastructure operators and commercial market sectors. Cyber Security Summit 2017 will take place Oct. 23-25 at the Minneapolis Convention Center.
by sadmin | Oct 19, 2017 | cyber security, hack, wifi
NordVPN gives advice on and commentary due to major security protocol hack
NEW YORK, October 18, 2017 (Newswire.com) – The security protocol currently used to protect
the vast majority of Wi-Fi connections has just been broken – meaning that hackers who are within physical range of someone’s home can crack anyone’s Wi-Fi password, spy on their internet activity and intercept any unencrypted data streams.
This is due to a severe flaw in WPA2 protocol, and the proof-of-concept exploit is called KRACK (Key Reinstallation Attacks). It allows hackers to eavesdrop on any
Wi-Fi traffic passing between computers and access points.
The
US-CERT has recently distributed an advisory to about 100 organizations, warning that the discovered weakness can allow an attacker to decrypt network traffic from a WPA2-enabled device and hijack connections. Depending on the network configuration, it is also possible hackers could inject and manipulate data.
The attack works by exploiting a four-way handshake used to establish a key for traffic encryption. During the third step of the process, the supposedly unique key can be resent multiple times. If a hacker can get it resent in a certain way, they can reuse it in a manner that completely undermines the encryption.
“Past experience shows that these types of vulnerabilities don’t get easily fixed,” said Marty Kamden, CMO of
NordVPN. “Home
Wi-Fi users are especially vulnerable, as they do not have enough information how to deal with the threat. ISPs can take years to switch to routers with a safer protocol. That’s another situation where users should take their Internet security into their own hands. Everyone should assume that their network is now vulnerable, and take precautions. Virtual Private Networks – VPNs – remain the strongest defense from these types of vulnerabilities.”
A VPN will add an extra layer of security on the entire device by rerouting one’s online data through a ‘tunnel’ secured with military-grade encryption, ensuring that no third parties can eavesdrop on it. However, a VPN will not help if configured on one’s router. A user’s devices must be connected to VPN from within your network.
“Internet users should also look for firmware patches for their routers. Depending on their configurations, they could be potentially exploited,” added Marty P. Kamden.
For more information about staying safe online, visit
NordVPN.com.
by sadmin | Oct 19, 2017 | Food, Mettler, Toledo, X-ray
Manufacturers of pumped food products can benefit from high detection sensitivity and improved Overall Equipment Effectiveness (OEE) with the X38 x-ray inspection system from
METTLER-TOLEDO Safeline X-ray.
The X38 forms part of METTLER-TOLEDO Safeline X-ray’s cutting-edge Next Generation x-ray inspection technology. The innovative single vertical x-ray beam system for pumped food products boasts a complete new set of software algorithms that have been specially developed for piped food products, including meat and poultry, fruit and vegetables, dairy, baby food, syrups, jams and preserves. It offers optimum detection capabilities, particularly for contaminants such as calcified bone, mineral stone, glass shards and metal filings, while allowing the timely and accurate opening of the reject valve, ensuring precise removal of the contaminated product with minimal product waste. Crucially, the X38 features a uniquely robust, Ingress Protection (IP) 69 rated design that supports and facilitates the rigorous hygiene regimes required by pumped production lines, increasing uptime and optimizing productivity.
Traditionally, pumped production lines have presented a challenge to manufacturers when it comes to cleaning since the machinery is in direct contact with the product. To overcome this, the production machinery must be designed specifically for harsh wash-down environments accompanied by rigorous and regular cleaning schedules to prevent biological, chemical and physical contamination. With this in mind, the X38 has been built according to the principles of the European Hygienic Engineering and Design Group (EHEDG), featuring a number of design enhancements to support even the harshest wash-down procedures. The system’s pneumatic components have been moved to their own sealed enclosure to protect them from water and cleaning chemical ingress.
The X38’s air conditioner has an IP69 rating that makes it capable of withstanding the high-pressure and high-temperature cleaning applications commonly seen on pumped food lines. The X38’s casing also boasts sloping surfaces and curved edges, which allows water to run off quickly and easily, reducing the need to wipe the machine dry after cleaning and eliminating bacteria traps. These design improvements mean that the frequency of downtime for cleaning can be reduced and in addition the X38’s robustness means higher reliability of performance i.e. less downtime. Both of these facts significantly increase overall equipment effectiveness (OEE) and reduce the total cost of ownership (TCO).
The system has a number of design features to simplify maintenance and testing processes for manufacturers to enhance OEE. A unique feature of the X38 system is that it automatically calibrates x-ray settings. Traditionally, to calibrate a pipeline x-ray system, a signal from the detector, whilst no product is in the path of the beam, needs to be detected, which is often challenging as the inspection equipment and pipe can still contain product. To avoid unnecessary downtime by emptying product from the pipe, the X38 x-ray generator and detector simultaneously move away from the pipe manifold (inspection window), calibrate and then move back to the inspection point in less than 20 seconds.
An optional infeed pipe with a test piece insertion port can be supplied, which allows the machine operators to perform regular testing. Additionally, an auto test facility can be added which consists of a test sphere, automatically fed through the x-ray beam while product is moving, thereby checking the sensitivity of detection without interrupting production.
Speaking about the development of the new system, Niall McRory, Global Key Account Manager at METTLER-TOLEDO Safeline X-ray, explained: “Manufacturers are facing growing competition from new companies entering the international market. To protect and grow their bottom line, more and more are looking for ways to reduce operating costs while boosting the productivity of their pumped production lines.”
“X-ray inspection systems that feature a robust, class-leading design can help manufacturers achieve this, ensuring optimum detection sensitivity while streamlining even the harshest cleaning regimes, boosting line efficiency. This helps food manufacturers remain competitive in an increasingly crowded market.”
The X38 x-ray system can be easily integrated into production pipelines with flow rates of up to 14 tonnes per hour, depending on the diameter of the pipe and the application. It is available with 2.5 inch, three inch or four inch diameter pipes as standard, but can be built with other sizes on request to suit customers’ existing pipework.
Enhanced integrated interlocking systems ensure pipes are fully in position before the x-ray generator switches on, guaranteeing operator safety. Advanced connectivity options enable the system to be set-up from a remote location for easy product changeovers, while also allowing the recording and storing of product inspection data.
METTLER-TOLEDO now offers a 5-year generator warranty for all our Next Generation x-ray systems, this ensures the most expensive component of your x-ray system is covered, avoiding any unexpected downtime or additional costs, when purchased with a comprehensive or standard care package.
METTLER-TOLEDO Product Inspection offer ProdX™ 2.0 data management software system which is designed for use on food lines, as well as in pharmaceutical and chemical processing. The data management software package connects product inspection equipment across the entire production line into a single, unified network.
About METTLER-TOLEDO Safeline X-ray
METTLER-TOLEDO Safeline is the world’s leading supplier of metal detection and x-ray inspection solutions for the food and pharmaceutical industries. Together with Garvens Checkweighing, CI-Vision and Pharmacontrol Electronic GmbH (PCE), METTLER-TOLEDO Safeline forms the Product Inspection division of METTLER-TOLEDO.
For more information on the X-series x-ray inspection systems or any aspect of x-ray inspection procedures and technology, call Daniela Verhaeg, Marketing Manager SBU X-ray Inspection of METTLER-TOLEDO Safeline X-ray on +44 (0)1763 25 7900 or email daniela.verhaeg(at)mt.com.
by sadmin | Oct 17, 2017 | Android, appaik, arcade, chichir, download, game, mobile
Chichir is a simple but interesting and challenging arcade game, save your ball from obstacles and run through another ball to score.
No doubt this is very amazing game to play and its really hard to beat others.
How to play:
You need to save your ball from the obstacles from path of the ball by tapping on left side or right side of screen, which will rotate the obstacles in circular path accordingly.
To earn points, you need to go through the other ball in the circle with the ball in motion.
The more you score, more obstacles you will find.
Initially this game is offered in android version only and requires android 2.3 and above.
Download the app here: DOWNLOAD Chichir
Offered By
Appaik
by sadmin | Oct 17, 2017 | China, coin, currency, stock
The banning of initial coin offerings by China has been one of the biggest developments in cryptocurrency this year, throwing a spanner in the works for many. Start-ups who had intended to
raise money through the online scheme have had re-thinks, and other investor u-turns have been mooted.
China has begun a crackdown on the raising of funds through what are termed as digital currencies which are ‘token based’. ICOs in particular have been targeted, as a market which has mushroomed in 2017 – making several digital entrepreneurs very rich – now has the potential to see its growth stunted.
So is the cryptocurrency boom essentially a bubble which is about to burst? Only time will tell, but the threat to the market from China seems to come from the Chinese government’s perception that cryptocurrencies pose a destabilising risk to the economy and the country’s social order as a whole.
The significance of the Chinese policy to ban ICOs – which are the routes with which funds are raised for cryptocurrency ventures (at present entirely unregulated) – cannot be underestimated. China sits at the top of the tree as the biggest cryptocurrency market anywhere in the world. Studies (
https://www.coindesk.com/estimating-data-china-real-bitcoin-trading-volumes/) suggest that no less than 80 percent of transactions for Bitcoin are made in China’s native currency; yuan.
A statement of intent
Could there be an underlying strategic motive for China’s move to ban ICOs? Commentators have suggested that the ban represents a play by China to be seen as the prominent rule maker for cryptocurrency, underlining its status as an influencer and power broker. They have picked up on the growing feeling that cryptocurrencies and the blockchain – which is where transactions that take place in digital currencies are recorded – are going to be central to finance in years to come.
Intervention at this stage suggests that the government in China has fully appreciated the size of investment activity, and plans to curtail the risk of investor losses due to the speculative nature of the investments. In this respect, they are obviously wary of the bubble bursting.
A gateway to the global market?
So why have China and cryptocurrency been such a good match thus far? A large factor could be the tight controls on money both entering and exiting the strictly governed nation. Investors in China have seen this as a way around the constraints which are imposed upon them in yuan, but a knock-on effect could be that the value of the currency has dipped. There is also the opportunity to operate outside the controls of foreign exchange, and transfer funds offshore if needs be.
With this consideration, comes the suggestion that initial coin offerings and cryptocurrencies could be used as a mask for fraudulent activity, which any properly run government would look to crack down on – with money laundering a particular worry.
A political angle?
Look deeper into the political landscape in China, and the looming 19th Party Congress looks to be another factor which the authorities have had their eye on with the ICO ban. Social unrest should be avoided at all costs, and even more pertinently, the 2015 collapse of the stock market cannot be repeated.
Trent Challis, spokesman for a private investment group based in Hong Kong, confirmed his support for the theory that the development is the result of investors wishing to circumnavigate government controls. He said: “My feeling is that China’s attempt to stunt ICOs and crypto all comes down to timing. Until they can legislate it, they are keen to impose whatever restrictions they can. Legislating a digital currency will, in itself, be an immense task.
“Since news of the ban broke, I have personally seen the move of many ICOs to Switzerland and other neutral countries. There is no doubt that cryptocurrency has provided a legitimate ‘back door’ of sorts for big-time investors, some of them multi-millionaires, to transport money out of China, without being subject to capital controls which can significantly disrupt their ability to achieve their objectives.
“So, it looks like China has put the brakes on now to buy themselves time to make up plans to legislate it, if that is at all possible. Our own calculations show that capital to the tune of $395 million USD has been taken out of our investment group, due to the refund of Chinese ICOs. There is no doubt that the Chinese market sat at the top table for ICOs and cryptocurrencies, and by many experts’ reckoning, was the biggest market anywhere around the globe.”
While financial experts such as Mr Challis are still putting the pieces together, China’s precise position on cryptocurrencies remains far from clear. Many regulators in other countries see ICOs as securities, which are therefore subject to being regulated. But with China, the guessing game as to the government’s next move continues.