Deal Of The Day: 45% Off On Foscam Wireless Security Camera

Foscam Wireless Security Camera

 

You can’t be home 24/7 to check on your baby or elderly folks, but you can check in with them remotely if you’ve got the Foscam Wireless Security Camera installed at home. It’s compact, it’s versatile, and it lets you access the video feed via an app whenever you feel the need to check on your loved ones.

The camera is equipped with a 1-megapixel sensor that records 1280 × 720p video resolution. It features two-way audio, IR lights for night vision, and is compatible with most mobile devices and PCs. It’s currently on sale for $86.99.

[ Get the Foscam Wireless Security Camera ]

The post Deal Of The Day: 45% Off On Foscam Wireless Security Camera appeared first on OhGizmo!.

Top Security Risks Surrounding The Cloud

cloud risks 1

If you’ve been following business technology over the last couple of years it’s hard to avoid the buzz around ‘cloud services’ and how they’re becoming mainstream in the corporate sector. A majority of businesses have applied the term to everything and anything imaginable within and outside their companies. Yes. The cloud is now mainstream.

Most cloud adopters, however, have one major concern: exactly how safe is the platform? Although most reputable service providers have top-notch security measures, experts say the cloud can’t be completely safe from data leaks.

Why is the cloud closely associated with data leaks? Fundamentally, cloud integration takes some control away from the IT department and gives it to a third-party provider. When the network is not owned by the company, it’s more open to outside entities.

Netspoke founder and CEO Sanjay Beri said the companies can expect their probability of being a victim of a data breach to triple simply because of their increased use of the cloud. That’s what IT departments are coming to grips with, and they’re starting to recognize the need to align their security practices to mitigate and prevent these threats.

While the security of cloud providers is better than practices of the average company, breaches will happen and responding to incidents will require security best practices when the response includes a service provider’s infrastructure. Additionally, companies need to know the contractual obligations because there is usually a murky line between the customer’s responsibilities and cloud provider’s responsibilities.

Other risks of cloud adoption include:

Malicious insiders: these insiders could be a business partner, a former employee, or a service contractor gaining access to corporate data for malicious purposes. The risk is even more when service providers keep the encryption keys to themselves; this means the customer is solely depending on the provider for securing the network. Cloudtweak advises cloud adopters to endeavor to know insiders and vulnerabilities beforehand.

Stolen passwords: Cloud adoption could also demystify assumptions about password security. A single compromise could make the entire database available to adversaries; making cloud breach attempts an affordable option to hackers rather than working to hack a single system for customer data. The recent iCloud password hack allowed hackers to breach multiple accounts after gaining access to user passwords.

Being proactive against the risks
When it comes to securing the cloud, the importance of control over your critical infrastructure can’t be overstated. Here are a few security risks to prevent and mitigate the risk surrounding cloud computing:

Collective intelligence: proper cloud security requires collective intelligence for maximum protection and minimum impact on your systems. Collective intelligence technology can instantly share malware-based information, improving protection across all connected systems. Also, a company offering such technology can provide real-time protection and put an end to adversary activities when it matters the most.

Encrypt your data: encryption is one of the best ways to protect the data. It requires you to move to the file to the cloud and password-protect that file so that no one can access the file without knowing the password. Also check with the cloud provider to see if the data is encrypted automatically.

Backup data: one of the easiest ways to take control of your data is to make sure you have a secure backup of all data. This is more about securing your intellectual property. Check for external backup options with the cloud provider.

 

Dell’s Future Mood Sensing Computers Resemble ‘Her’

Dell Mood Sensing Computers

The movie ‘Her’ doesn’t seem to be very far fetched, at least from Dell’s viewpoint. The company’s new research lab works on technologies that might change the way we interact with computers.

Besides mood sensing computers, Dell’s new R&D labs also work on a new type of cloud security based on homomorphic encryption. The company’s goal is to turn these technologies into viable products as quickly as possible. Dell isn’t the only one working on these, as Microsoft is also looking into gesture control and mood sensing computers, while IBM manifested an interest in that type of encryption.

Jai Menon, the head of the new R&D unit, explained in an interview with Business Insider that “Thought-controlled input is a project we started 6 months ago. The notion here is that through some sort of device that you put on, by measuring alpha [brain] waves and so forth, you can actually be able to tell your mood for example: whether your happy or sad. That can then drive the device to, for instance, play music. If you’re sad, it can choose music to cheer you up, for example.”

He also went on to exemplify how the homomorphic encryption would work: “Think about cloud security. What if you want some service done on the cloud, but you don’t want the service to provider to see your data. For instance, a tax computing service. Can they compute your tax without seeing your salary? Well, no. You can encrypt it as you send it on the wire [over the Internet], but the tax provider must see your salary. What if I could encrypt the data in a way they don’t get to see your salary but all of their tax computations still work? I send them encrypted [salary numbers] and they do the addition and send back to you, and you decrypt, only you can. And magically you see [the tax number that you owe.]”

Menon pointed out that Dell’s labs are planning to turn both of these technologies into tangible things that we can all use. Given how quickly they progress, it shouldn’t take long till we’ll have access to thought controlled computers, just like the one Joaquin Phoenix’s character fell in love with in the movie ‘Her’. As far as the new encryption is concerned, adding a new layer of security to our cloud data is always a welcome thing.

If you liked this post, please check the GER mood sweater that provides a visual interpretation of your feelings and this ambient sound lamp.

You Don’t Need Magic, Just CloudMagic: Find Stuff in Multiple Cloud Services in a Snap

CloudMagic

A lot of people resisted the cloud when it first came to be. However, you’re probably already using cloud a lot these days, from your email storage and notes apps to file storage and archiving. Eventually, there will come a time where you’ll forget where you stored a certain file or which email inbox a certain message was sent to. You could search all of your apps and accounts manually–which is task that’s infinitely harder when you’re working from your mobile–or you could just fire up CloudMagic.

CloudMagic lets you search for whatever it is you’re looking through all of your cloud-hosted data. Some features include: multiple accounts searching, singular view of all data, rich previews and actions, partial word search, search multiple devices, and search result filters.

CloudMagic1

The app is compatible with Gmail, Dropbox, Drive, Hotmail, Exchange, SkyDrive, Yahoo! Mail, Box, Outlook.com, Evernote, Office 365, Windows Live, and more, so it’s highly likely that you can use CloudMagic with your existing accounts. It’s pretty easy to get on your Android device: just head to the Google Play store, search for “CloudMagic,” and tap the app to install.

If you’re still on the fence about the cloud, don’t be. For one, the prices being charged by providers don’t cost a premium anymore. Developers and service providers are also more conscientious about virtual security and getting it right, so there’s little to worry about on that end as well. A lot of major companies have already adopted and moved to the cloud, so that should appease your doubts as well.

There are two versions of CloudMagic that are available. The first one is the free version, which will give you up to 50 free previews every month. If you don’t foresee yourself using it a lot, then you’ll be fine with this version. However, if you need more than the 50-limit preview, then there’s CloudMagic Pro which gives you unlimited previews for $4.99 a month.

VIA [ Tech Republic ]

Microsoft buys PhoneFactor, adds smartphone authentication to its cloud services

Microsoft buys PhoneFactor, adds smartphone authentication to its cloud services

With a hand-in-glove relationship with the world of business, it's key that Microsoft ensures it can keep companies data safe. That's what prompted Steve Ballmer to whip out his checkbook to snap up PhoneFactor, a multi-factor authentication company that uses smartphones instead of code-generating security tokens. With its new toy, Redmond plans to integrate the feature into its services like SharePoint, Azure and Office 365, letting users sign on with their own device as a key element of the signing in process.

Filed under: , ,

Microsoft buys PhoneFactor, adds smartphone authentication to its cloud services originally appeared on Engadget on Fri, 05 Oct 2012 06:28:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMicrosoft  | Email this | Comments