BYOD: “Bring Your Own Disaster?” Why the corporate dream come true could turn into your worst nightmare

Bring Your Own Device is the alternative IT strategy that allows authorised users to employ personally selected and purchased devices to access corporate applications. A simple concept – but the devil is in the details. [...]

MasterCard shows its innovations in virtual payments

MasterCard has recently opened a technology center in New York that hosts teams of the electronic portfolio of digital activation system and accelerator Path Start program technologies. The center was set up to share innovations [...]

Intellectual debate in the United States on the interest of the electronic identity card

Many people in the United States raise the point on the important technological and legal advances in several European countries due to the widespread adoption of electronic ID cards. An electronic identity card (e-ID) provides [...]

Hacking the Internet of Things

In a recent study, HP discussed the security issues related to the Internet of Things and HP gives advices on the collection of these data, their encryption and storage. The HP study focused on Internet [...]

The Internet of Medical Sensors

In the framework of biometric sensor development, Silicon Labs is presenting several kits for detecting the environment. The SLSTK3201A model streamlines the process of product development related to IoT designed to detect the relative humidity [...]

The functions of the ID card

In some countries, the question arises whether it is possible to extend the role of the ID card to other functions, like passport, credit card and health card. In other countries, the problem is to [...]

Fighting the Epidemics with Mobile Phones

In developing countries, new communication technologies are mobilized to fight against infectious diseases. The war against the virus stimulates researchers and various proposals have been formulated in order to win the battle. First, the enemy [...]

National ID cards

The trend continues around the world: national identity card must serve its owner! In Wisconsin, it is still a legal issue to be resolved before the Courts states about the validity of the Act passed [...]

E-Wallet with a single programmable card

Plastc, a company specialized in payment card technology offers a digital wallet capable of replacing all credit, debit, access and gift cards with a single card. The company thus provides an optimized solution for wireless [...]

JP Morgan hacked!

The first American bank, JP Morgan, admitted having suffered a cyber-attack last summer that affected 83 million accounts. Cyber-attacks are one of the fears of large web companies. International groups have very large data bases. [...]

Postal workers help to find stolen bikes

Bpost, also known as the Belgian Post Group, delivers mail throughout Belgium. In recent years, the company has expanded the role of its agents by giving them the responsibilities of services that help communities. Postmen [...]

Internet of Things for a Fully Adaptive Automotive Lighting

A perfect illumination is a major safety factor in road traffic. An R&D project in Germany aims at developing a fully adaptive lighting system for road vehicles. The consortium involved covers the entire value chain [...]

Very robust MEM Tags for traceability

The Australian company Bluechiip and STMicroelectronics announced the mass production of traceability labels jointly developed. Based on the technology of micro-electromechanical systems MEMS from ST, these products will be able to respond to a commercial [...]

Identity Theft in Health Computer Systems

Chinese hackers have invested virus in the computer system health of the American group Community Health Systems, which operates 206 hospitals in 29 states. This intrusion would have allowed the pirates to copy medical and [...]

Electronic passports and international security

An intelligent system of electronic passports is expected to fight against terrorism and international crime by making it more difficult to counterfeit travel documents. But the implementation of such a strategy is opposed to the [...]

The lack of vigilance in mobility facilitates fraud

The lack of security of Wi-Fi hotspots and lack of awareness of the users facilitate fraud. According to a British investigation performed by the Cyber Security Research Institute (CSRI) in London in conjunction with F-Secure [...]

Partnership between China Mobile Selects Gemalto for public transport applications

Gemalto, an expert in digital security, has been selected by China Mobile to offer UpTeq NFC solution for users of SIM cards. The goal is to protect the credentials in mobile contactless applications consumers. This [...]

Security flaws in the Health Identification System

The United States Department of Health and Human Services (HHS) has not properly developed its program of employee identification and access card, which has led to reveal a number of security vulnerabilities. The program is [...]

Are we already in 2025?

Are we already in 2025? Jean-Dominique Seval affirms this with conviction in a book oriented for the general public, and published by Edition Multimedia (*). We know the principle of futuristic imaginative and passionate visions [...]

Citizen voting and sexuality

Who would have thought that the binary system and the advent of the digital society would have created so much discussion about the voting electronic card? On the occasion of the election campaign in India, [...]

In 2024, the handheld terminal will control everything!

When you prepare to leave your home, you should check that you have on you your keys, your wallet and your mobile phone. In 2024, this checklist will be reduced to a single element: your [...]

Ineffectiveness of mobile phones to reduce appetite

The American magazine “American Journal of Preventive Medicine” relates the ineffectiveness of smartphone applications to help people to lose weight. According to the author of the article, these applications do not lead to changes in [...]

In Nigeria, the ID card will improve security

Nigeria is to launched the pilot phase of the national identity card (13 million cards are planned). Proposed with the help of MasterCard, the electronic identity card will be identifying Nigerian citizens, just like it [...]

My mobile phone, close to my heart

The French industrial Runware has designed a medical accessory for the iPhone. This smart accessory is associated with the strap heart rate Runalyzer Blue to measure and improve the sport with Bluetooth Smart technology embedded [...]

Economic Assumptions about the Launch of the iPhone 6

The spectacular commercial launch of the iPhone 6 is accompanied by a wave of many assumptions about the evolution of the ICT market. Indeed, the Apple most likely choice is based on deep technical reasons [...]

Identification Growing Market

According to a commercial analysis published by ReportsnReports.com Institute, the global market for facial recognition is to triple between 2013 and 2018 to about $6.50 billion. Public and government services are probably the major clients [...]

ITU Workshop on ICT Security Standardization Challenges for Developing Countries

From 15 to 16 September 2014, a Workshop was held in Geneva on the topic of ICT security on the Internet. The objective of this symposium, organized by the Telecom International Union, was to present [...]

iPhone 6 Paves the Road to Connected Commerce on NFC

Just as iPhone 3 revolutionized the use of the Internet on mobile, iPhone 6 could very well change the way we purchase and pay using NFC technology. Over the past ten years, Apple has been [...]

Making ‘Least Privilege’ Cool

  by Tom Patterson, CSC Cybersecurity Consulting General Manager Somehow, as executives got promoted, CEOs got hired and board members got selected, they all got confused. So confused that their security world is turned upside down, [...]

Computer Networks Protection

To check the server security in a corporate network, it is recommended to scan ports computer systems (port scanning) in order to verify if they are wisely left open or not. Hackers also conduct “port [...]

Articles précédents

© 2014 Strategies Telecoms & Multimedia |  -