Hackers threaten phone in your pocket, experts warn

securityanal

The boom in smartphones among often careless users has made happy hunting for hackers, whose virus attacks and hijacking of unprotected mobiles are multiplying, experts warn.

Security analysts and companies at this week’s Mobile World Congress, a top wireless telecom fair in Barcelona, Spain, said phone makers and users must be on guard to stop hackers getting into your pocket.

“With smartphones we are going through what we went through 15 years ago with personal computers,” said Tanguy de Coatpont, head of the French branch of international anti-virus firm Kaspersky Lab.

“There are more and more security problems because with their processing power they are really like little computers, permanently connected.”
Kaspersky’s most recent study showed that 28 percent of users were ignorant of the risks of cyberattack on their smartphones.

Just over a quarter of users in that study said they knew of the risk but were not worried about it.
Analysts said that attitude had fuelled attacks on smartphones by hackers over the past two years.

“We are seeing an increase in volume (of attacks) of sometimes more than 400 percent quarter on quarter,” said David Grout, southern Europe director of Intel Security, a global software protection firm.

visitorstest

That is small compared to the scale of attacks on personal computer operating systems such as Windows, but “it is a bigger and bigger risk,” he said.
“Hackers have to hand lots of personal information contained in a smartphone, particularly financial details.”

Innovation, not security

James Lyne, global head of security research at anti-virus firm Sophos, said phone makers must do more to warn customers of the risks of attack on their unencrypted phones.

Most consumer smartphones are not designed primarily with security in mind, with the exception of certain specialised models.
Launching its new flagship smartphone Galaxy S6 smartphone in Barcelona, South Korean giant Samsung vaunted its sleek design, wide-angle camera and wireless charger, but said little about anti-virus protection.

“The mobile market is driven by innovation and focused on adding marketable features rather than security and privacy concerns,” Lyne told a gathering at the congress.
Other lower-profile products stress security, however, such as the Blackphone, whose second-generation model was unveiled in Barcelona.
Selling for more than $600 (543 euros), the Blackphone 2 by US company Silent Circle promises encrypted calls with protection against cyberattacks and spying by intelligence agencies.

It is competing with phone maker Blackberry for business clients, hoping to lure companies who fear their employees’ unsecured phones are a security risk.
Tech security experts say smartphone users should install antivirus programmes on their phones.

French company CS Communication et Systemes presented at the Barcelona congress a protection device in the form of a miniature card that is inserted into the handset.

techsecurity

Ransomware attacking phones

Most cyberattacks nowadays target Android, the widespread smartphone operating system developed by US Internet giant Google, said de Coatpont.
“It is a very open platform that has 80 percent of the market.”

Apple’s iOS system, used on iPhones, is generally considered more secure but is not immune from attack either.

Sean Sullivan, a researcher at anti-virus and online security firm F-Secure, said hackers successfully attacked a gay dating iPhone application in Britain.
The hackers hoped that users would be reluctant to report the attack since the attack obtained sensitive information about their sexuality, Sullivan said.
He added that the smartphone world may need a wake-up call to boost security—something comparable to Cryptolocker, Russian “ransomware” that struck in 2013.
Ransomware, which seizes control of computers and demands money to unblock users’ data, is now targeting smartphones too, Sullivan said.

References:http://phys.org/

New conductive ink for electronic apparel

2-newconductiv

University of Tokyo researchers have developed a new ink that can be printed on textiles in a single step to form highly conductive and stretchable connections. This new functional ink will enable electronic apparel such as sportswear and underwear incorporating sensing devices for measuring a range of biological indicators such as heart rate and muscle contraction.

Current printed electronics, such as transistors, light emitted diodes and solar panels, can be printed on plastic or paper substrates, but these substrates tend to be rigid or hard. The use of soft, stretchable material would enable a new generation of wearable devices that fit themselves to the human body. However, it has proved difficult to make an ink that is both highly conductive and elastic without a complicated multi-step printing process.

Now, Professor Takao Someya’s research group at the University of Tokyo’s Graduate School of Engineering has developed an elastic conducting ink that is easily printed on textiles and patterned in a single printing step. This ink is comprised of silver flakes, organic solvent, fluorine rubber and fluorine surfactant. The ink exhibited high conductivity even when it was stretched to more than three times its original length, which marks the highest value reported for stretchable conductors that can be extended to more than two and a half times their original length.

Using this new ink, the group created a wrist-band muscle activity sensor by printing an elastic conductor on a sportswear material and combining it with an organic transistor amplifier circuit. This sensor can measure muscle activity by detecting muscle electrical potentials over an area of 4×4 square centimeters with nine electrodes placed 2 centimeters apart in a 3×3 grid.

1-newconductiv

 

“Our team aims to develop comfortable werable devices .This ink was developed as part of this endeavor,” says Someya. “The biggest challenge was obtaining high conductivity and stretchability with a simple one-step printing process. We were able to achieve this by use of a surfactant that allowed the silver flakes to self-assemble at the surface of the printed pattern, ensuring high conductivity.”

References:http://phys.org/

NIST revises key computer security publication on random number generation

nistrevisesk

In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other types of electronic data. The action implements changes to the methods that were proposed by NIST last year in a draft document issued for public comment.

The updated document, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, describes algorithms that can be used to reliably generate random numbers, a key step in data encryption.

One of the most significant changes to the document is the removal of the Dual_EC_DRBG algorithm, often referred to conversationally as the “Dual Elliptic Curve random number generator.” This algorithm has spawned controversy because of concerns that it might contain a weakness that attackers could exploit to predict the outcome of random number generation. NIST continues to recommend the other three algorithms that were included in the previous version of the Recommendation document, which was released in early 2012.

The revised version also contains several other notable changes. One concerns the CTR_DRBG—one of the three remaining random number algorithms—and allows additional options for its use. Another change recommends reintroducing randomness into deterministic algorithms as often as it is practical, because refreshing them provides additional protection against attack. The document also includes a link to examples that can help developers to implement the SP 800-90A random number generators correctly.

The revised publication reflects public comments received on a draft version, released late last year.

References:http://phys.org/

Throwable tactical camera gets commercial release

throwabletac

Unseen areas are troublesome for police and first responders: Rooms can harbor dangerous gunmen, while collapsed buildings can conceal survivors. Now Bounce Imaging, founded by an MIT alumnus, is giving officers and rescuers a safe glimpse into the unknown.

In July, the Boston-based startup will release its first line of tactical spheres, equipped with cameras and sensors, that can be tossed into potentially hazardous areas to instantly transmit panoramic images of those areas back to a smartphone.
“It basically gives a quick assessment of a dangerous situation,” says Bounce Imaging CEO Francisco Aguilar MBA ’12, who invented the device, called the Explorer.

Launched in 2012 with help from the MIT Venture Mentoring Service (VMS), Bounce Imaging will deploy 100 Explorers to police departments nationwide, with aims of branching out to first responders and other clients in the near future.

The softball-sized Explorer is covered in a thick rubber shell. Inside is a camera with six lenses, peeking out at different indented spots around the circumference, and LED lights. When activated, the camera snaps photos from all lenses, a few times every second. Software uploads these disparate images to a mobile device and stitches them together rapidly into full panoramic images. There are plans to add sensors for radiation, temperature, and carbon monoxide in future models.

For this first manufacturing run, the startup aims to gather feedback from police, who operate in what Aguilar calls a “reputation-heavy market.” “You want to make sure you deliver well for your first customer, so they recommend you to others,” he says.

Steered right through VMS

Over the years, media coverage has praised the Explorer, including in Wired, the BBC, NBC, Popular Science, and Time—which named the device one of the best inventions of 2012. Bounce Imaging also earned top prizes at the 2012 MassChallenge Competition and the 2013 MIT IDEAS Global Challenge.

Instrumental in Bounce Imaging’s early development, however, was the VMS, which Aguilar turned to shortly after forming Bounce Imaging at the MIT Sloan School of Management. Classmate and U.S. Army veteran David Young MBA ’12 joined the project early to provide a perspective of an end-user.

“The VMS steered us right in many ways,” Aguilar says. “When you don’t know what you’re doing, it’s good to have other people who are guiding you and counseling you.”

1-throwabletac

 

Leading Bounce Imaging’s advisory team was Jeffrey Bernstein SM ’84, a computer scientist who had co-founded a few tech startups—including PictureTel, directly out of graduate school, with the late MIT professor David Staelin—before coming to VMS as a mentor in 2007.

Among other things, Bernstein says the VMS mentors helped Bounce Imaging navigate, for roughly two years, in funding and partnering strategies, recruiting a core team of engineers and establishing its first market—instead of focusing on technical challenges. “The particulars of the technology are usually not the primary areas of focus in VMS,” Bernstein says. “You need to understand the market, and you need good people.”

In that way, Bernstein adds, Bounce Imaging already had a leg up. “Unlike many ventures I’ve seen, the Bounce Imaging team came in with a very clear idea of what need they were addressing and why this was important for real people,” he says.

Bounce Imaging still reaches out to its VMS mentors for advice. Another “powerful resource for alumni companies,” Aguilar says, was a VMS list of previously mentored startups. Over the years, Aguilar has pinged that list for a range of advice, including on manufacturing and funding issues. “It’s such a powerful list, because MIT alumni companies are amazingly generous to each other,” Aguilar says.

The right first market

From a mentor’s perspective, Bernstein sees Bounce Imaging’s current commercial success as a result of “finding that right first market,” which helped it overcome early technical challenges. “They got a lot of really good customer feedback really early and formed a real understanding of the market, allowing them to develop a product without a lot of uncertainty,” he says.

Aguilar conceived of the Explorer after the 2010 Haiti earthquake, as a student at both MIT Sloan and the Kennedy School of Government at Harvard University. International search-and-rescue teams, he learned, could not easily find survivors trapped in the rubble, as they were using cumbersome fiber-optic cameras, which were difficult to maneuver and too expensive for wide use. “I started looking into low-cost, very simple technologies to pair with your smartphone, so you wouldn’t need special training or equipment to look into these dangerous areas,” Aguilar says.

The Explorer was initially developed for first responders. But after being swept up in a flurry of national and international attention from winning the $50,000 grand prize at the 2012 MassChallenge, Bounce Imaging started fielding numerous requests from police departments—which became its target market.
Months of rigorous testing with departments across New England led Bounce Imaging from a clunky prototype of the Explorer—”a Medusa of cables and wires in a 3D-printed shell that was nowhere near throwable,” Aguilar says—through about 20 further iterations.

But they also learned key lessons about what police needed. Among the most important lessons, Aguilar says, is that police are under so much pressure in potentially dangerous situations that they need something very easy to use. “We had loaded the system up with all sorts of options and buttons and nifty things—but really, they just wanted a picture,” Aguilar says.

Neat tricks

Today’s Explorer is designed with a few “neat tricks,” Aguilar says. First is a custom, six-lensed camera that pulls raw images from its lenses simultaneously into one processor. This reduces complexity and reduces the price tag of using six separate cameras.

The ball also serves as its own wireless hotspot, through Bounce Imaging’s network, that a mobile device uses to quickly grab those images—”because a burning building probably isn’t going to have Wi-Fi, but we still want … to work with a first responder’s existing smartphone,” Aguilar says.

But the key innovation, Aguilar says, is the image-stitching software, developed by engineers at the Costa Rican Institute of Technology. The software’s algorithms, Aguilar says, vastly reduce computational load and work around noise and other image-quality problems. Because of this, it can stitch multiple images in a fraction of a second, compared with about one minute through other methods.

In fact, after the Explorer’s release, Aguilar says Bounce Imaging may option its image-stitching technology for drones, video games, movies, or smartphone technologies. “Our main focus is making sure the [Explorer] works well in the market,” Aguilar says. “And then we’re trying to see what exciting things we can do with the imaging processing, which could vastly reduce computational requirements for a range of industries developing around immersive video.”

References:http://phys.org/