16.9 C
Thursday, September 21, 2017
Home Tags Norwegian

Tag: Norwegian

Changing temps may have impacted the ability to farm, leading to new economic strategies.
Companies team to build autonomous, zero-emission container "feeder ship."
For gaming, the iPhone sparked a gold rush and burst of creativity still felt today.
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world.
In these attacks, data is encrypted with the extension “.WCRYrdquo; added to the filenames. Our analysis indicates the attack, dubbed “WannaCryrdquo;, is initiated through an SMBv2 remote code execution in Microsoft Windows.
Opera Reborn gets new design, VPN, and ad-blocking (except for Google's ads).
Fredrikstad - 9th February 2017. norxe, the Norwegian manufacturer of DLP projectors, will be exhibiting at ISE 2017.This exciting new startup will demonstrate two P1 projectors on a Partner booth in Hall 12, stand N-44.In addition, the company is delighted to announce the appointment of Iain Ambler as Head of Business Development for the UK.
Iain will be attending ISE along with the rest of the norxe team.
Iain‘s appointment is the latest in what... Source: RealWire
Specifically, Overlord is about fighting supernatural Nazi monsters in World War II.
Won't someone think of the children, literally? The Electronic Privacy Information Center (EPIC) and the European Consumer Organization (BEUC) are calling for US and EU data protection authorities to take action against insecure networked toys. Declaring that "My Friend Cayla," a Bluetooth-enabled doll released in 2014, and "i-Que," a connected robot released last year, "fail miserably when it comes to safeguarding basic consumer rights, security, and privacy," the BEUC on Tuesday presented findings about the device's shortcomings, based on an investigation by the Norwegian Consumer Council, a BEUC member. The BEUC argues that the toys violate the EU Unfair Contract Terms Directive and the EU Data Protection Directive. EPIC, also on Tuesday, filed a complaint with the Federal Trade Commission alleging that the toys violate US privacy law. The toys, manufactured by Genesis Toys and supported by speech recognition software from Nuance Communications, are designed to talk to children and to capture their speech, in conjunction with Android or iOS mobile apps. EPIC and BEUC contend the companies use collected data for purposes beyond interaction, specifically hidden marketing.

The BEUC says that the toys spout pre-programmed phrases that endorse commercial products. "For example, Cayla will happily talk about how much she loves different Disney movies, meanwhile, the app-provider also has a commercial relationship with Disney," the BEUC said. The BEUC also objects to the transference of speech data from EU-based children to Nuance, a US-based company. Moreover, it asserts the terms of service presented to customers are illegal because customers must agree that the terms can be changed without notice, that personal data can be used for advertising, and that information may be shared with undisclosed third parties. Finally, BEUC says the toys lack adequate security measures because, without much effort, they can be hijacked using a mobile phone. The EPIC complaint echoes those concerns: "The failure to employ basic security measures to protect children’s private conversations from covert eavesdropping by unauthorized parties and strangers creates a substantial risk of harm because children may be subject to predatory stalking or physical danger." Pen Test Partners, a UK-based security research group, came to the same conclusion last year when it published details about several security problems affecting "My Friend Cayla" and hacked the doll to make it swear. Genesis Toys, incorporated in Hong Kong and based in Los Angeles, was not immediately reachable for comment. A spokesperson for Nuance, in response to a query from The Register, pointed to a post by Richard Mack, VP of corporate marketing. "Nuance takes data privacy seriously," Mack said, omitting the "very" present in variants of the phrase offered by Facebook and Google in the past. Mack says Nuance has not received in inquiry from the FTC or other privacy authority. He stresses that the company's policy is that it doesn't use or sell voice data for marketing purposes and that it doesn't share voice data collected from one customer with another. "Upon learning of the consumer advocacy groups' concerns through media, we validated that we have adhered to our policy with respect to the voice data collected through the toys referred to in the complaint," he said. ® Sponsored: Want to know more about PAM? Visit The Register's hub
Musk's lot better get on this A smartphone app flaw has left Tesla vehicles vulnerable to being tracked, located, unlocked, and stolen. Security experts at Norwegian app security firm Promon were able to take full control of a Tesla vehicle, including finding where the car is parked, opening the door and enabling its keyless driving functionality.

A lack of security in the Tesla smartphone app opened the door to all manner of exploits, as explained in a blog post here.

The cyber-attack unearthed by Promon provides additional functionality to that exposed by Keen Security Labs in a different hack in late September. Tom Lysemose Hansen, founder and CTO at Promon, said: "Keen Security Labs' recent research exploited flaws in the CAN bus systems of Tesla vehicles, enabling them to take control of a limited number of functions of the car. Our test is the first one to use the Tesla app as an entry point, and goes a step further by showing that a compromised app can lead directly to the theft of a car." One way for the hack to work is for cybercriminals to set up a Wi-Fi hotspot, likely close to a public Tesla charging point. When Tesla users log in and visit a page, an advert targeting car owners appears, offering an incentive such as a free meal or coffee. When clicking this link and downloading the accompanying app, hackers can gain access to the user's mobile device, allowing them to attack the Tesla app and obtain usernames and passwords. Youtube Video In an update, Promon outlines the many and varied security shortcomings of Tesla's app. This attack is not Tesla specific, and can in generalised form be used against any app. However, the Tesla app did not offer any kind of resistance which would require time-consuming effort to exploit. One thing that stood out was that the OAuth token is stored in plain text – absolutely no attempts have been made to encrypt it, or otherwise protect it.

Getting access to this one piece of data alone will get you the location of the car, ability to track the car and being able to unlock the car. Driving off with the car requires the username and password in addition, which was very easy to do since the application did not detect that it had been modified to add malware-like behaviour that would send the credentials out of the app to a server. "If Tesla had followed best practice in security (e.g. as recommended by the Open Web Application Security Project), including applying self-protecting capabilities inside the app, it would have required much higher technical skills – and much more effort – to perform such an attack," according to Promon.

The Norwegian app security firm said that it was in "close dialogue with Tesla" in order to address these app security issues. A Tesla spokesperson said "Tesla has never received a report of any car being stolen through a compromised app" and offered the statement below. The report and video do not demonstrate any Tesla-specific vulnerabilities.

This demonstration shows what most people intuitively know – if a phone is hacked, the applications on that phone may no longer be secure.

The researchers showed that known social engineering techniques could be employed to trick people into installing malware on their Android devices, compromising their entire phone and all apps, which also includes their Tesla app.

Tesla recommends users run the latest version of their mobile operating system. John Smith, principal solutions architect at app security firm Veracode, commented: "With Tesla just recently remediating a vulnerability which allowed the car to be exploited remotely, this new security flaw leaves the car vulnerable to theft and highlights the plethora of challenges that car manufacturers now face as they introduce internet-connected services into the car.
Vulnerable software is one of the most significant challenges faced by the automotive industry, with findings from a recent IDC report indicating that there could be a lag of up to three years before car security systems are protected from hackers. "There are over 200 million lines of code in today's connected car, not to mention smartphone apps linked to the car.
So it is essential that car manufacturers put security at the heart of the development strategy, rather than as an afterthought." ® Sponsored: Customer Identity and Access Management
Magnus Carlsen is worried Russia will steal his chess data and hand it to his opponent. The name Magnus Carlsen may not mean anything to you, unless of course you're a chess fan.

The 25-year-old Norwegian is the reigning World Chess Champion, achieve...
London —November 3, 2016 — RiskIQ, the leader in External Threat Management, today announced that it is working with Evry as a key reseller in the Nordic region.EVRY is a leading Norwegian IT company serving the Nordic region and beyond.

They combine in-depth industry knowledge and technological expertise with a local delivery model and international strength. RiskIQ logo Evry’s comprehensive security portfolio covers identity management, data, network and client security services as well as services for Security Operations Centres. RiskIQ’s solution offerings complement this portfolio, allowing Evry’s clients to extend their security program outside the firewall. Consistently ranking top of the European Commission’s Digital Economy and Society Index (DESI)[1], Nordic countries are leading the way in their use of digital platforms.

Companies are responding.

According to recent research by Accenture[2], 56% of large Nordic businesses now have a digital strategy in place, compared with 48% in 2015.

As a result, Nordic organisations are constantly growing their digital footprint; be it on the web, through the development of mobile applications or through social media.

This has significantly increased their digital attack surface and therefore their exposure to cyber threats.
In addition to defending their own digital assets, they also have to deal with the growing problem of cyber impersonation, whether it be domain infringement, web and mobile phishing or executive and brand impersonation on social media. RiskIQ Digital Footprint and External Threats solutions help organisations tackle both problems. "Cyber Security is a board level conversation today in many Nordic organisations as digital channels overtake traditional channels in all aspects of customer engagement,” said Trevor Crompton, RiskIQ’s EMEA Channel Director. “Bringing visibility and management to the digital assets that make up these channels is core to RiskIQ's solution and we are delighted to be partnering with Evry to extend this capability to organisations across the Nordic region." About RiskIQRiskIQ is a cybersecurity company that helps organizations discover and protect their external facing known, unknown and 3rd party web, mobile and social digital assets.

The company’s External Threat Management platform combines a worldwide proxy network with synthetic clients that emulate users to monitor, detect and take down malicious and copycat apps, drive by malware and malvertisements. RiskIQ is being used by leading financial institutions and other companies to protect their web assets and users from external security threats and fraud.
It is headquartered in San Francisco and backed by growth equity firms Summit Partners and Battery Ventures. To learn more about RiskIQ, visit www.riskiq.com. About EvryEVRY is one of the leading IT companies in the Nordic countries, with a strong local and regional presence in 50 Nordic towns and cities.

Through its knowledge, solutions and technology, EVRY contributes to the development of the information society of the future, and so creates value for the benefit of its customers and for society as a whole.

EVRY combines in-depth industry knowledge and technological expertise with a local delivery model and international strength. EVRY has some 10,000 employees and reports annual turnover approaching NOK 13 billion.

The company is listed on the Oslo Stock Exchange and operates from headquarters outside of Oslo. To learn more about Evry, visit www.evry.com. [1] https://ec.europa.eu/digital-single-market/en/desi[2] https://www.accenture.com/no-en/insight-high-performance-business-forum-research
Enlarge / Kim Phuc is the girl pictured in an iconic picture—censored by Facebook—that was taken by photographer Nick Ut during a napalm strike in the Vietnam war.Eric Lalmand/AFP/Getty Images reader comments 92 Share this story Update, 8.43pm GMT: Facebook has reinstated posts containing the photograph of Kim Phuc—the naked girl captured in the iconic "napalm girl" photograph. The free content ad network issued a lengthy statement to justify its volte-face, after it had earlier removed the Norwegian PM's post from her Facebook account.

Erna Solberg had posted the image as the row against Facebook's censorship escalated. Facebook said late on Friday that it "looked again" at how its rules had been applied to the image by photographer Nick Ut. "An image of a naked child would normally be presumed to violate our Community Standards, and in some countries might even qualify as child pornography," it said. "In this case, we recognise the history and global importance of this image in documenting a particular moment in time.

Because of its status as an iconic image of historical importance, the value of permitting sharing outweighs the value of protecting the community by removal, so we have decided to reinstate the image on Facebook where we are aware it has been removed." It's worth parsing the final bit of that sentence: "we are aware" is Facebook trying its best, once again, to avoid any suggestion that it is directly editing the content. The company, continuing with its hands-off theme, added: We will also adjust our review mechanisms to permit sharing of the image going forward.
It will take some time to adjust these systems but the photo should be available for sharing in the coming days. We are always looking to improve our policies to make sure they both promote free expression and keep our community safe, and we will be engaging with publishers and other members of our global community on these important questions going forward. Original Story Facebook has been accused of censorship by Norway's prime minister, Erna Solberg, in a growing spat about the free content ad network's removal of a post featuring the Pulitzer Prize-winning historic Vietnam War image of "napalm girl." The social media network deleted a post made by the Norwegian newspaper Aftenposten based on the fact that the image contained child nudity. On Friday morning, the editor-in-chief of the paper published an open letter to Mark Zuckerberg, in which he described the Facebook chief as "the world's most powerful editor"—a sticky note increasingly being slapped on the multibillionaire's back, even as he continues to refuse to accept any such tag. Just last week, Zuckerberg wryly said at a Facebook event in Germany: "we're a tech company, we're not a media company." Nick Ut's harrowing image of a naked child fleeing from a napalm explosion, however, has bluntly been deemed inappropriate by Facebook because it displays nudity.

The row first began some weeks ago, when Norwegian author Tom Egeland posted the picture on Facebook, only to have it removed for violating the firm's rules. Facebook told Ars: While we recognise that this photo is iconic, it’s difficult to create a distinction between allowing a photograph of a nude child in one instance and not others. We try to find the right balance between enabling people to express themselves while maintaining a safe and respectful experience for our global community. Our solutions won’t always be perfect, but we will continue to try to improve our policies and the ways in which we apply them. In other words, Facebook doesn't want to be seen as a publisher editing content on its ad-stuffed service because it would then be exposed to strict libel laws.
Instead, it claims to rely on a global community of users to report content that violates its stringent rules.

The company has repeatedly come under fire for removing posts featuring nude images, such as pictures of breast-feeding mums. Norwegian PM Solberg reportedly posted Ut's photo on her Facebook account on Thursday when she accused Zuckerberg's company of censorship. Her "napalm girl" post has since disappeared. This post originated on Ars Technica UK