Saturday, January 10, 2015

Hackers Recreate Fingerprints Using Public Photos


finger_print
Fingerprints – Means of Ascertaining Identity 

Fingerprints have been used as a means of ascertaining a person’s identity for quite some time since 1900 and for the past 10 years or so; it has begun to get fairly common in the form of digital fingerprint readers. It first showed up on expensive laptops and external peripherals in enterprise settings and recently on smartphones like the latest iPhones and the Galaxy S5.A recent cyber security convention in Hamburg, the `Chaos Computer Club’ demonstrated on how someone’s fingerprint could be used which was done by analysing photographs.

Fingerprints could be developed from smudges on windows and from other smooth surfaces. Earlier forgers used tapes, scanner or some plastic material and glue in order to build a fingerprint which could fool scanners. A member of Chaos Computer Club, a European hacker association, showed the possibility of reproducing someone’s fingerprint and probe into systems that were protected by biometric fingerprint scanners, by using a photo of the finger.

A snap or a photo of a celebrity waving their hand could be sufficient to implement this task. The member of the CCC managed to get hold of the fingerprint of Germany’s defence minister Ursula von der Leyen from a photo which was taken during a press conference, which if the German government would use biometric access control systems, could be a kind of security breach.

Hacker Create Fingerprint from Public Photos

Jan Starbug Krissler, the hacker, portrayed his findings at Chaos Communication Congress recently. With the photo of von der Leyen’s thumb gained from a press conference, somewhere in October, together with some other photos of her thumb from various angles, he managed to rebuild her thumbprint with the use of commercially available software – VeriFinger.

Thereafter he used the thumbprint to develop a real world dummy by printing it out on a mask and exposed the mask to create a negative of the print on a substrate. He then filled the negative with wood glue in order to create a positive fingerprint. On testing it showed that this technique could trick Apple’s TouchID sensor. According to Chaos Computer Club, it states that this is the first time a fingerprint has been deceived so far and the group leader, Starbug has informed that he was capable of creating a thumbprint of Ursula von der Leyen, the German Minister of Defence, from several of her news photos.

Need for Fingerprint Security Systems

Starbugobtained the print of the fingerprint from the photos on the tracing paper and then copied it to a plastic board. Thereafter he covered it in graphite making a dummy print by coating the plastic in wood glue. In one of the demonstration, the dummy print managed to trick Apple’s TouchID – APPL, Tech30 that controls Apple Pay.

A statement made by the group states that there would be no need to steal objects carrying the fingerprints anymore and after this talk, politicians would probably wear gloves henceforth while talking in public. The Club also states that the presentation needs the validity of fingerprint security systems and it would be difficult to do any useful thing with the German Defence Minister’s fingerprints though one could use the hacking method to intrude into a friend’s iPhone.

Friday, January 9, 2015

ADAM iOS-Connected Asthma Monitor


The Automated Device for Asthma Management 

The wearable Automated Device for Asthma Management or ADAM by Health Care Originals, as shown to AppleInsider at CES can count coughs as well as measure respiration, wheeze and heart rate. To undermine effective symptoms monitoring and medication which would lead to poor health condition, a device has been proposed which could continuously monitor asthma symptoms especially coughing which is the most common symptom in asthma patients.

The identified symptoms can then be stored and retrieved later by the patient or the physician for reference, indicating the level of asthma control. It is a unique iOS connected medical device which is focused in providing the users with a solution in managing their asthma condition.Measuring vital signs together with other biological reading, the ADAM is capable of predicting as well as logging asthma attack and also recommends behaviour changes.

In other words it will be featuring inhaler detection with alerts and alert forwards together with symptom tracking as well as trending treatment plans. It is proposed to be launched during the second quarter this year, though the price has not been disclosed yet. ADAM users could also have the facility of receiving medication reminders and the device has potential of HIPAA compliant data storage.

Focused on Preventing Complication with Asthma

The device has been focused on preventing complications with asthma which could tend to get serious if not detected in time. Timely treatment could save a lot of time and trouble to the victim. The ADAM sensor has been designed with its own iOS connected application and HealthKit support is also on its way for the smart wearable accessory.

The ADAM comprises of a consumer electronic mobile platform that runs a custom application which acquires an audio signal from external user worn microphone which is connected to the device analog to digital converter or a microphone input.

To determine the absence or presence of cough sounds, the signal is processed where symptoms are tallied and raw audio waveforms are recorded, making easy access for later review by a physician. Symptoms detection algorithm depends on standard speech recognition as well as machine learning paradigms, consisting of an audio feature extraction step with a Hidden Markov Model - HMM, based Viterbi decoder which has been trained on a huge database with audio examples on various subject. Performance of recognizer is shown in terms of sensitivity as well as the rate of false alarm determined in a cross validation test.

Personal Asthma Monitoring Device 

Mobile technology has made much progress so much so that the hardware needs of personal asthma monitoring devices have been created in existing consumer electronics platforms. Due to the broad install base together with software development kit –SDK, Apple’s iOS device have been the chosen platform, specifically, the 4G iPod.

The present approach is based on proven technology and method in the field of speech recognition, keyword as well as key audio effect detection, content based audio analysis and machine learning, like the other audio systems for cough monitoring which have been reported in literature.

Here the cough detection algorithm presented, processes the audio date in two ways where in the initial stage, the incoming stream of digital audio samples tend to get rearranged in fixed length frames from which set of audio features are computed and the sequence of feature vectors are then passed to HMM Viterbi decoder.

Thursday, January 8, 2015

The Next Version of USB is the Key to Apple's New MacBook


USB_Port
Apple’s all New MacBook Air for 2015

Apple is on its way in preparing an all-new MacBook Air for 2015 and is working towards a thinner and a totally redesigned MacBook. Reports from 9to5Mac claims, that Apple’s next notebook would be a 12-inch MacBook Air, wherein this new design comes with jettisons standards type, like a full sized USB ports, MegSafe connectors and SD slots in favour of a thinner and lighter body together with a higher resolution display.

Sources who have utilised the internal prototype version of the forthcoming computer, have given details with regards to the machine together with their artist renditions of the latest MacBook Air and a first close look at its first major step in mobile Mac computing from the time the Retina MacBook Pro had been launched in 2012.

The revamped MacBook Air will have a 12 inch screen and will be much narrower than the prevailing 11 inch MacBook Air and the bezels surrounding the MacBook Air screen are shrunk for the display panel and keyboard could take up a larger usable area of the laptop. The keyboard has been changed, placing them together utilising less space with a few key changes like the power button for instance, has been moved to the left upper corner area, towards the left of the escape key.

USB Type-C – Smaller/Faster/Reversible Cable

Besides this, the travel on the trackpad has also been removed keeping in mind to have a slim laptop. Users need to be aware that the new MacBook Air would be coming with only two ports, such as a headphone jack and a single USB Type-C port and it is difficult to imagine a MacBook without a Thunderbolt Connection or MagSafe charger, though the new specification of USB supports driving displays together with device charging.

There are two kinds of technology which Apple needs to take up – USB Type-C and a processor which could run well enough in helping to achieve a thin design without a fan. USB Type-C is the most important with a smaller, faster and reversible cable that will make the device thinner in the future. It could also serve as a power cable and display for devices and would need a single small port for all functions on a laptop.

Thin/Light/Small Laptop

The next thing that Apple would need after the USB-C is the processor and laptop developers are planning to launch laptops with Intel’s latest Broadwell processors though the chip continues to run hot enough with a need of a fan, which a 12-inch MacBook could do without it.

Apple could probably use the Intel Core M processor in order to keep it cool making sure that the battery life is appropriate, which the Company is striving to achieve with MacBook for several years now. This would mean that the MacBook would be comparatively thin, light as well as small though may not be a powerful machine.

The Core M will be capable to power the rumoured high res screen and such screens are standard on most mid-range as well as on some low cost laptop this year, but not a hit. On the contrary, it would be a little machine used for browsing, video watching or other purpose which would involve typing.

Expired Domain Search



DomCop
Expired domain search engine at DomCop enables users to locate domains that are based on Page Rank, Domain Authority, Moz Rank, Trust Flow, Majestic Citation, Similar Web Rank, Alexa Rank, SEMRush Rand together with Social Statistics and Traffic Data.

Data is imported from domain auctions; dropped lists or those which are not deleted and provided with relevant details for these domains. Besides this, page rank is validated ensuring that the domains are not scams.

Moreover, they are also checked if they have been banned by Google and metrics are also used from other source such as Moz, Majestic SEO, and SEMRush etc. in validating the domains. Page Rank relates to the value that has been given to a page or domain which portrays its significance to Google and is obtained from incoming links to the domain or page from others across the internet and high page ranks provide more page rank to the domain.

Here the value of the page rank is based on the Google toolbar where most of the users are not aware that the page rank used by Google is not what is shown in the toolbar. At times it could be easy in presenting a fake page rank by directing a domain to a high page rank domain, temporarily and since the same is only updated once after some month, it could not be a reliable source of domain value.

Common Search/Simple Search/Advanced Search 

The domains here are not sold but lists of those available are displayed for purchase either through auction or could be registered through a domain registrar.Most of the domains listed at the site come from several sources such as NameJet, DynaDot, GoDaddy, and SnapNames as well as from different drop lists all over the world.

Viewers could navigate through the search in three ways such as a Common Search which is a pre-built search in locating expired domains that could be very useful for a first timer. The second is a Simple Search which is an easy search for users having few needed parameters and the last is Advanced Search which is for those who would prefer to have the option to search on each single metric

Expiring/Expired/Archived Domains

Scam Domains are several domains which are on auction as well as expired which portray fake page ranks which could be redirected to some high page rank domain. On checking on these, it indicates a fake page rank and buyers ultimately end up buying them. Banned Domains are those which have been banned by Google and can be checked on how many back links it may have.

 The site could also be check on Google – info: website.comand those domains which have been banned can be filtered. Users could buy expired domains that come with great metrics which are listed in three different categories namely: Expiring Domains wherein the domains which are likely to be expiring within 10 days are displayed.

Expired Domains are those domains already expired in the last 10 days and Archived Domains are those that are presently available and have expired for over 10 days back.

Wednesday, January 7, 2015

The First Great Apple Watch Accessory


Bandstand
Several companies are gearing up to get on the Apple Watch bandwagon and the dock called by Standzout as `first great Apple Watch accessory will be capable of charging the Apple Watch with induction charging plate which will hold the timepiece. Standzout will be introducing a versatile dock together with inductive charging as well as pivoting stand for its upcoming Apple Watch and its Bandstand Apple Watch Dock would be on display at the Consumer Electronics Show in 2015.

It gets its power from a wire in the dock’s base which is inclusive of two USB ports for recharging other devices like iPad or iPhone. Moreover, the platform also pivots so that one can tilt the Apple Watch if desired to do so.

The Apple Watch would be on the wrist most of the time and one is not likely to dock it for view information when the same information is available on other iOS devices and with a battery already installed in the Apple Watch, it would not take more than an hour or so to recharge the timepiece. Standzout will be showing the Apple Watch dock which would rely on an induction charging plate in order to power the device as it holds the timepiece in place.

Pair of USB Ports/Pivot Stand

Besides this, there will also be a pair of USB ports which would help the user in making use of the dock in order to charge up other devices where an Apple user undoubtedly would be in possession of an iPhone or iPad as well. It has been rumoured that Apple is planning to launch this new entry on Valentine’s Day and it is presumed that the Bandstand Watch Dock would not be the last but probably, one of the first of several other accessories which would be released over a period of time.

It is just a matter of time and we need to wait and watch before the launch comes through for the latest entry and the Bandstand is just what one is looking forward to, a stand for the Apple Watch for charging as well as two other USB devices like the iPad or iPhone wherein the stand pivots the watch to enable its use while being charged at the same time. Users are anxiously awaiting the arrival of this new launch.

Launch at – CES 2015

On launching the `first great Apple Watch accessory’ at CES 2015, the company is planning to sell dock that is equipped with a wireless charging technology with extra USB ports also for charging additional devices together with a pivoting stand enabling adjustment as per the requirement of the user. According to the developer, it has been designed from the ground up making the experience of charging and using Apple Watch, a much better one.

Moreover, the inductive charge which is built in the stand makes it easy and simple for charging as well as taking off the watch and drop it on the stand. It is provided with an LED light to enable the user to locate it in the dark where the brightness can be adjusted. The bandstand which works off on an induction charging plate, seems to be an appropriate choice for a charging platform though to get to know it better it would be essential to field test it with the real thing.