Tag: The Doors
By using proprietary mobile apps, it is possible to get some useful features, but if a car thief were to gain access to the mobile device that belongs to a victim that has the app installed, then would car theft not become a mere trifle?
The focus on digital is set to remain the key trend in the IT industry for the next 12 months
London, UK – 29 November 2016 - Dimension Data, the global ICT solutions and services provider, today published its top IT predictions for 2017, and the focus on digital is set to remain the key trend in the industry for the next 12 months.
Dimension Data’s Chief Technology Officer, Ettienne Reinecke says digital is about building truly customer-centric business models on IT including the network, data centre, applications, and other infrastructure - which may be on-premise, or cloud-based. “Today, there’s no such thing as a digital strategy – just strategy in a digital world.
And while the digital age is creating a degree of uncertainty for some organisations, it’s also opening the doors to exciting possibilities and ushering in an era of infinite potential.”
Reinecke cites ownership and access to data – and metadata – as a key theme. “In the year ahead, control and ownership of data and metadata will emerge as a point of discussion - and indeed contention.
That’s because data and metadata are the ‘gold dust’ that allow organisations to glean rich insights about customer behaviour.
In addition, metadata allows organisations to identify specific behavioural patterns, derive business intelligence, and make informed business decisions,” Reinecke explains.
As a result, organisations are becoming increasingly protective of their metadata, and wary of who has access to it. “Organisations don’t just want ownership and control of their data for compliance reasons: they want it to perform analytics. We expect that this will trigger some interesting discussions between businesses and their cloud providers.
For example, where are the boundaries with respect to ownership, especially around metadata. We foresee this issue resulting in a bit of ‘push and pull’ among the various parties.”
Other IT trends that Dimension Data predicts will make their mark in 2017 include:
Intelligence is driving the predictive cybersecurity posture
Cybercrime is big business. Over the last few years, cybercriminals have been re-investing much of the ill-gotten gains into developing more sophisticated capabilities, using more advanced technologies.
Despite ongoing innovation in the cybersecurity industry, much of the effort remains reactive.
Cybersecurity will become more predictive, rather than proactive.
Machines are being embedded in the workspace for tomorrow
A new generation is starting to show up at work, and they’re not millennials, or even Gen Z: they’re machines.
And it won’t be much longer before holographics, augmented reality, and virtual reality begin to move from B2C into B2B.
Also, over the next two to three years these technologies will drive a fundamental transformation of the workspace.
The Internet of Things is delivering on the promise of big data
IoT will deliver on the promise of big data.
Increasingly, big data projects are going through multiple updates in a single year – and the Internet of Things (IoT) is largely the reason.
That’s because IoT makes it possible to examine specific patterns that deliver specific business outcomes, and this has to increasingly be done in realtime.
This will drive a healthier investment, and faster return in big data projects.
Container technology is the new disruptor in the data centre and a key enabler for hybrid IT
In 2017 we’ll see more widespread adoption of containers, but the transition to a fully containerised world will take few more years.
In addition, we’ll see increasing adoption of network function virtualisation (NFV) when cloud-enabling existing networks, and for new networks to be architected with hybrid cloud in mind.
Visit dimensiondata.com to read more about Dimension Data’s 2017 IT predictions.
About Dimension Data
Dimension Data uses the power of technology to help organisations achieve great things in the digital era.
As a member of the NTT Group, we accelerate our clients’ ambitions through digital infrastructure, hybrid cloud, workspaces for tomorrow, and cybersecurity. With a turnover of USD 7.5 billion, offices in 58 countries, and 31,000 employees, we deliver wherever our clients are, at every stage of their technology journey. We’re proud to be the Official Technology Partner of Amaury Sport Organisation, which owns the Tour de France, and the title partner of the cycling team, Team Dimension Data for Qhubeka.
Visit us at http://www.dimensiondata.com/
Charlotte Martin/Matthew Watkins
tel +44 (0) 203 217 7060
By reaching a deal now, Uber avoids a trial, scheduled for March, that could have been incredibly damaging to its image. Uber declined to comment on the case, and the lawyer representing the anonymous plaintiffs didn't respond to a request for comment. The lawsuit (PDF) was originally filed in October of last year, with both plaintiffs listed as Jane Does.
The complaint described two assaults.
In the first, "Doe 1" said she was assaulted by her driver, Abderrahim Dakiri, after her two other friends were dropped off. "When the vehicle was stopped at a red light, Dakiri began groping Ms.
Doe 1 in the crotch, upper thigh, and top of her pants," the complaint stated.
She later escaped the car and ran to a friend's house.
A passerby called 911 and the driver was arrested and charged. Jane Doe 2 hired an Uber in South Carolina, and says her driver Patrick Aiello instead took her to a parking lot, locked the doors and "proceeded to viciously rape her." Aiello was arrested and charged. Uber argued it shouldn't be responsible for crimes committed by its drivers, but in a hearing earlier this year, Judge Ilston was unconvinced.
As precedent, the judge cited a 1956 case where the Pullman Company was found to have some responsibility for a passenger who was raped by a railway porter. The original lawsuit claimed that Uber's background checks were insufficient and that changes "must be implemented without delay." Since the settlement is confidential, it isn't clear what changes, if any, were instituted as a result of the litigation. The settlement papers were filed on Thursday and reported earlier by The Recorder.
Researchers from Tencent's Keen Security Labs totally hack the Tesla S over Wi-Fi. reader comments 13 Share this story Security researchers at the Chinese Internet company Tencent's Keen Security Lab privately revealed a security bug in Tesla Model S cars that allowed an attacker to achieve remote access to a vehicle's Controller Area Network (CAN) and take over functions of the vehicle while parked or moving.
The Keen researchers were able to remotely open the doors and trunk of an unmodified Model S, and they were also able to take control of its display. Perhaps most notably, the researchers remotely activated the brakes of a moving Model S wirelessly once the car had been breached by an attack on the car's built-in Web browser. Tesla has already issued an over-the-air firmware patch to fix the situation. Previous hacks of Tesla vehicles have required physical access to the car.
The Keen attack exploited a bug in Tesla's Web browser, which required the vehicle to be connected to a malicious Wi-Fi hotspot.
This allowed the attackers to stage a "man-in-the-middle" attack, according to researchers.
In a statement on the vulnerability, a Tesla spokesman said, "our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly." After Keen brought the vulnerability to Bugcrowd, the company managing Tesla's bug bounty program, it took just 10 days for Tesla to generate a fix. Full details of the attack were not revealed.
But in a video demonstrating the attack (shown above), researchers exploited the in-car browser of an unmodified vehicle by intercepting a search for the nearest charging station.
The exploit then allowed the researchers to gain remote control over Wi-Fi to door locks, seat adjustments, signals, and other controls including the vehicle's displays. While moving, the researchers were also able to demonstrate remote control of the vehicle's rear hatch and the brakes, bringing the car to a very sudden stop from a computer 12 miles away. Listing image by El monty
To get its message out, GTP has worked with journalists at Re/Code and The Intercept, which have run stories about Google's many visits to the White House, the prevalence of ex-Googlers in the US Digital Service, and other links.What wasn't known, until today, is who was paying the bills for research by the "nonprofit watchdog" group. "The folks running the Google Transparency Project won’t say who is paying for it, which is odd for a group devoted to transparency," noted Fortune's Jeff John Roberts, one of many journalists who the group reached out to in April. Today, Roberts has published a followup, confirming that based on a tip, he found at least one funder—Oracle.
That's the same company that lost a major copyright trial to Google and continues to spar with the search giant in court. “Oracle is absolutely a contributor (one of many) to the Transparency Project.
This is important information for the public to know.
It is 100 percent public records and accurate,” Oracle Senior VP Ken Glueck told Roberts. Other funders remain unknown. One big suspect, however, can be ruled out. Microsoft, whose lobbyists and lawyers have clashed with Google on many occasions, told Roberts that it is not part of the group. Is it a big deal? We're better off with the information being out there. Like Roberts, I agree that "throwing light on lobbying conducted by Google (or any other big company) is a good thing." However, it also seems like the source of the information should be made clear, especially for a group that's so focused on investigations against a particular company.
GTP's research has led to a lot of news stories—many of them around the time of this year's Oracle v.
Google trial—none of which reported that the Oracle is paying, at least in part, for the Google investigations. The Google Transparency Project is part of a larger organization called the Campaign for Accountability, an organization that says its goal is to use "research, litigation, and aggressive communications to expose how decisions made behind the doors of corporate boardrooms and government offices impact Americans' lives." It also works on issues like anti-LGBT discrimination and environmental protection.
But the researchers also devised a way to do that, assembling a piece of radio hardware costing around $40. The radio device eavesdrops on the signal sent from the key fob to the car. Once the signals are decrypted, the researchers were able to make copies of the key fob and open the car door. They tested their method against the VW Jetta, Golf, and Passat, as well as the Audi A1, which is also made by Volkswagen. “Our findings affect millions of vehicles worldwide and could explain unsolved insurance cases of theft from allegedly locked vehicles,” the researchers wrote. The researchers, from the University of Birmingham in England and from the German engineering firm Kasper & Oswald, are presenting their paper at the USENIX Security Symposium this week in Austin, Texas. The researchers notified Volkswagen of their findings last November, and the parties have been having a “constructive exchange,” Volkswagen said.
They agreed that the researchers would publish their findings but with no specifics about how they extracted the master keys from the vehicles. Volkswagen didn't confirm which models were affected but said it would continue to work on its security. However, the researchers say the vulnerability might not be easy to fix; a costly firmware update would be needed, and that could take time. It's unknown if criminals have been using the method to break into cars, they noted. To eavesdrop on the remote control key's radio signal, a bad actor would need to be within 100 meters, which doesn't sound like a big obstacle to overcome.