Mobile Payments Overview

Instead of paying with cash (notes and coins), the client may use a bank check, or use his credit card. In these two cases, the bank vouches for the authenticity of the transaction, performs accounting [...]

The use of electronic Identity Card is progressing in Asia

In Cambodia, the electronic identity card helps 60,000 monks to participate in the voting process organized in the Kingdom. In 2013, new national identity cards equipped with electronic and biometric technology have been commissioned. Despite [...]

Online fraud with EMV card

The Irish company Global Risk Technologies warns Internet sales companies to the risks of invoicing when associated with EMV payment card. Indeed, the online payment by EMV card returns the responsibility for payment on the [...]

DDoS attacks, definition and protections

The online Small Business activity is attracting the attention of hackers who see them as easy targets. Among the most frequent attacks, we must mention the DDoS attack (Distributed Denial of Service).” The DDoS causes [...]

Analysis of the six billion security attacks observed in 2014

Under the title “Global Threat Intelligence Report 2015″ NTT Com Security France reveals the results of the global study on the networks security. This study focuses on the evolution of threats observed in 2014 and [...]

Orange sets up a network for the Internet of Things

Orange will invest 600 million euros by 2018 in a Low Power Wide Area Network (LPWA), a low data rate technology that ensures low power consumption connectivity and low cost. Network operator in the machine-to-machine [...]

French Handball Team is using Wearable RFID Sensors

The Chambéry Savoie Handball team uses a UWB RTLS solution provided by the company BeSpoon to monitor metabolic status of each player, and the speed with which he runs, jumps and how high and how [...]

Lobary at Smart Contactless World 2015

Smart Contactless World 2015, the international event dedicated to local services for connected consumers, is opening its doors in the “Palais du Pharo” in Marseille from 15 to 17 September, 2015. Chairman of the Conference [...]

Internet of Things Security

Security is essential to any implementation of network software. Recently, security flaws have been revealed by the press and the major data breaches have become nightmares for public relations of the concerned entreprises. Security must [...]

A Dedicated M2M Service in UK

EE, the British mobile network operator has opened a new service for the company designed specifically for M2M communications on 2, 3 and 4G mobile networks . This service is called “EE Connect”, and offers [...]

Nigeria delays national eID deadline

Nigeria’s National Identity Management Commission (NIMC) has moved a deadline for compulsory use of the National Identification Number (NIN) forward from September 1, 2015 to January 9, 2016, saying it needs to work on harmonising [...]

The dynamism of Gemalto

Gemalto, the digital security expert Company, is present simultaneously in several areas. First, Gemalto sells one of the first LTE wireless Class 1 modules. Specifically designed for M2M (Machine-to-Machine) and industrial applications in the Internet [...]

Birth of the Industrial Consortium for IoT

The Industrial Internet Consortium, a global organization created 18 months ago to accelerate the industrial implementation of the Internet of Things, now gathers 200 members. This organization was founded by AT & T, Cisco, General [...]

We should strongly support the IC global industry!

The global semiconductor industry has taken a dangerous inflationary road, some say it looks like a system of Ponzi. You know the financial package system which is to reward customer investments by the funds provided [...]

‘Connected Life’ and ‘Digital Transformation’: beyond the buzzwords

‘Connected’ citizen / consumer / business … may sound as buzzwords coined by marketing teams of tech providers a few years ago. If  the promises of the connected life and business digital transformation are yet [...]

Hacking the US administration

Hackers broke into the services of the OMP (Office of Personnel Management), a government agency in charge of human resources officials. The first attack had affected four million civil servants, and a second has involved [...]

Is the electronic IDentity Card needed for Homeland Security ?

Opinions differ between Cameroon and the United Kingdom on the need to use the e-ID Card to ensure security in the country. On the one hand, Cameroon wants to ensure that in the fight against [...]

Google launches OnHub IoT router

Internet giant Google has teamed up with TP-Link to launch a new router that claims to simplify domestic Wi-Fi and is the first device to use Google’s Brillo and Weave IoT software protocols. The key [...]

DNA selects Gemalto to guide EMV deployment strategy for U.S. debit card issuers

Gemalto, expert in digital security, has been selected by the Debit Network Alliance (DNA), a consortium of leading U.S. debit network providers, to deliver EMV consulting services. Gemalto’s EMV Allynis Consulting Services are designed to [...]

India launches “e-KYC” Secure Mobile Authentication Services

The Indian authorities are reminding their efforts made in the field of new technologies and in the implementation of a number of projects, such as “make in India”, “India skill”, “Digital India” recently launched to [...]

Visa Announces mVISA Payment Service in India

Visa Inc. today announced the opening of a new technology development center in Bangalore, India. This center is part of Visa’s global strategy to change its worldwide processing network into an open commerce platform. In [...]

Securing Wi-Fi networks

Various solutions have been proposed to ensure the security of Wi-Fi networks. The latest ones are obviously the most resilient to attacks. Three classes of protections have been developed. The first, WEP (Wired Equivalent Privacy), [...]

In the pursuit of becoming smart

Businesses around the world are seeking the direction for the future, trying to find the right solution to boost up their efficiency and productivity. These businesses will use the power of connected devices managed by [...]

Hacking the Wi-Fi IoT

The devices involved in the Internet of Things (IoT) often use to communicate a wireless protocol called “ZigBee”. When wishing to connect these devices, they send over the wireless network connection authorization applications to their [...]

NXP and HID Global partners increase the security and flexibility of the e-ID / Smartcard

HID Global, expert in secure identity solutions, has released a polycarbonate (PC) designed for ultra-thin insert overlay on electronic identity card (e-ID) to be 30% thinner. This new offering will use direct link to the [...]

Cars without driver and the cooperative driving

Car without driver projects, called “autonomous cars” become clearer. We already know the cars that have a driver assistance and help for example the driver to respect a preset speed. In the 2018-2020 horizon, new [...]

Australia will close one of its 2G networks

One of the three Australian Mobile Phone Operators, Optus, intends to close its 2G network to free up frequencies for mobile broadband services. The company said its 2G services will cease on 1 April 2017. [...]

The essential SIM card is moving again

The removable SIM Card in our smartphones will not be eternal. We had the large SIM Card and at the insistence of innovative industrials, the Global Special Mobile Association (GSMA) has accepted the dual format [...]

Gemalto offers highly reliable encryption capabilities

Gemalto, expert in digital security, announces the availability of its SafeNet Luna SA 6 new solution, a hardware security module (HSM) specifically designed for service providers to provide a cryptographic processing on demand, with key [...]

Gemalto uses the Architecture defined by the GSMA for Connected Objects

According to a recent study published by E & Y, more than 7 billion devices will be connected by 2020, with smartphones, computers and tablets. This growth of the park connected objects concerned officials of [...]

Articles précédents

© 2015 Strategies Telecoms & Multimedia | Contact |  -