Posts

Smart High-Tech Solutions for Aging in Place

Image
The call came in less than an hour before the 8 a.m. shift was scheduled to start: A family emergency meant the regular caregiver for an elderly Dana Point, California, client couldn't make her shift that day, so a replacement caregiver was needed ASAP. Homewatch CareGivers of San Juan Capistrano  (Calif.) had to quickly find and send a substitute from its pool of licensed, trained and security-bonded caregivers. Once confirmed to cover the shift, the substitute caregiver tapped into the Homewatch CareGivers "Care+" mobile system to access the client's medical information, such as client care plan and schedules for meals, medications, blood pressure monitoring, doctor visits and more. In the mobile app, the caregiver was able to check in for the shift, confirm timesheet details, and obtain driving directions to the client's home. At the end of the eight-hour workday, the caregiver used the mobile app to capture end-of-shift notes and formally check out ...

Free Cloud Storage Service

Image
As the never-ending stream of  data  accumulates on our devices, cloud storage solutions are in high demand. The most generous storage packages come at a price, of course, but there are free ones available to catch the overspill, with many established services offering free starter packages with a set storage allowance.  Here's our selection of the best options available. Read next:  Beat Gmail Alternatives 1. Dropbox © Dropbox The free  Dropbox Basic  account comes with up to 2GB of storage space. You can top this limit up by referring family and friends to Dropbox, completing your user profile or following the company on Twitter. Any changes made to files are backed up for 30 days. Users can also upload their photos to  Dropbox  automatically after they're taken.  For £6.58 per month you can  buy  a Dropbox Plus subscription that boosts the storage space to 1TB.  Dropbox Professional adds ac...

Check If Your Facebook Account is Among The Hacked Account

Image
Late last month Facebook announced its  worst-ever security breach  that allowed an unknown group of hackers to steal secret access tokens for millions of accounts by taking advantage of a flaw in the 'View As' feature. At the time of the initial disclosure, Facebook estimated that the number of users affected by the breach could have been around 50 million, though a new update published today by the social media giant downgraded this number to 30 million. Out of those 30 million accounts, hackers successfully accessed personal information from 29 million Facebook users, though the company assured that the miscreants apparently didn’t manage to access any  third-party app data . Facebook vice president of product management Guy Rosen published a new  blog post  Friday morning to share further details on the massive security breach, informing that the hackers stole data from those affected accounts, as follows: For about 15 million Facebook ...

Cyber Threat Intelligence

Democratizing Threat Intelligence With Our New Handbook by Chris Pace Just as with any book, during the process of writing “ The Threat Intelligence Handbook ,” we had to make a decision about who it was going to be for. In thinking about the kind of people who could gain the most from a book introducing  threat intelligence , we came to understand that it really was for anyone working in security. This idea that threat intelligence doesn’t need to be the preserve of specialized analysts and dedicated teams is one that we’ve been hearing from our customers for some time. But there is a quite distinct difference between the analysis and production of threat intelligence and its application for better security. That’s why we want to democratize the use of threat intelligence. A healthy democracy requires the universal participation of well-educated and passionate citizens; in the same way, security teams of all stripes not only will benefit from, but have something to contr...

MasterCard launches Credit Card with Built-In Fingerprint Scanner

Image
MasterCard has  unveiled  its brand new payment card that has a built-in biometric fingerprint scanner, allowing customers to authorize payments with their fingerprint, without requiring a PIN code or a signature. The company is already testing the new biometric payment cards, combined with the on-board chips, in South Africa and says it hopes to roll out the new cards to the rest of the world by the end of 2017. Don't Worry, It Still Supports PIN-based Transactions as Fallback Wait — If you think that this feature would not allow you to share your card with your child and spouse, don’t worry — Mastercard has a solution for this issue as well. The company has confirmed that even if the card is configured to expect the fingerprint for authenticating a purchase, but it does still have a PIN as a fallback, in case, for some reason EMV readers fail to read fingerprint or you have yourself handed it to your child for shopping. Stores & Retailers Don't Need New Har...

Beware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws

Image
Bad news for consumers with Linksys routers: Cybersecurity researchers have disclosed the existence of nearly a dozen of unpatched security flaws in Linksys routers, affecting 25 different Linksys Smart Wi-Fi Routers models widely used today. IOActive's senior security consultant Tao Sauvage and independent security researcher Antide Petit published a   blog post   on Wednesday, revealing that they discovered 10 bugs late last year in 25 different Linksys router models. Out of 10 security issues (ranging from moderate to critical), six can be exploited remotely by unauthenticated attackers. According to the researchers, when exploited, the flaws could allow an attacker to overload the router, force a reboot by creating DoS conditions, deny legitimate user access, leak sensitive data, change restricted settings and even plant backdoors. Many of the active   Linksys devices   exposed on the internet scanned by Shodan were using default credentials, ma...

Partner Spotlight: Get a Complete Threat View With Cisco Umbrella Investigate

Image
Editor’s Note This is part of a series of blog posts on useful “all-source analysis” research and collaborative approaches using Recorded Future and our OMNI Intelligence Partners. Summary Cisco Umbrella Investigate’s  threat intelligence  on domains, IPs, ASNs, and file hashes can be accessed via an extension built into Recorded Future Intel Cards. Starting with a single piece of data, incident responders can query and find associated domains, IPs, ASNs, and file hashes, drill down on specific behavior indicators, and pivot directly into the Investigate console for additional research. In a single correlated source, Investigate’s threat intelligence enables security teams to uncover threats and tighten the gap between threat detection and remediation. Challenge Many security products provide visibility into what’s happening on your own network. But what about the rest of the internet? What about everything going on beyond your perimeter? News flash — that’s whe...