Tag Archive for: EDGE

Billions of Android owners urged to turn on three hidden safety locks – you’re living on the edge without them


THESE three quick tricks will keep upgrade your phone’s security.

You might be tempted to download a security subscription service to keep your Android safe from hackers or thieves.

There are three life-saving tips that will padlock your phone shutCredit: GETTY

But there are free, ready-to-go safety tricks hidden on your phone — you simply need to know where to look.

Here are three life-saving tips that will padlock your phone shut, according to Computer World.

1. Safe Browsing

Chrome‘s Safe Browsing mode is enabled by default, but there is a newer and more effective version.

It’s called “Enhanced Safe Browsing” and will operate “in the background to provide faster, proactive protection against dangerous websites, downloads, and extensions,” according to Google’s website.

Here’s how you access it:

  • Open Chrome on your Android.
  • Select the three-dot menu icon in the app’s upper-right corner.
  • Select Settings > Privacy and Security > Safe Browsing. Tap the dot next to “Enhanced protection.”

An extra helpful tip: Return to Chrome’s Settings menu and select “Safety check.”

This will open a useful one-tap tool for scanning browser settings and saved passwords, and will let you know of any possible breaches or weak spots in your security.

Most read in Phones & Gadgets

2. Smart Lock

Android’s Smart Lock feature is designed to make security simpler, by pausing the extra protections when it’s in your hands.

It will automatically allow you to keep your phone unlocked whenever you’re in a trusted place like your home or office, or when you’re connected to a commonly-used Bluetooth device, like your earbuds.

Here’s how depending on your device type:

  • For Android 12 and later, Android settings > Security > Advanced Settings.
  • For earlier Android versions, open Android settings > Security > Screen Lock.
  • For Samsung devices, Settings > Lock Screen.

3. Lockdown Mode

No, not that kind of lockdown.

The handy Android setting called “Lockdown Mode” provides you with an easy way to temporarily lockdown your phone.

In this mode, only a pattern, PIN, or password can get a person past your lock screen and into your device.

It temporarily shuts down your phone from all biometric and Smart Lock…

Source…

CLOUDASTRUCTURE ANNOUNCES EDGE CAMERA SOLUTION “CVR on Cam”


MIAMI, Oct. 28, 2022 /PRNewswire/ — Today, Cloudastructure announced a new edge surveillance solution, CVR on Cam. The offering enables customers to opt for proprietary surveillance cameras that can encrypt and transfer their surveillance data to the cloud, directly from the camera. 

Cloudastructure’s CVR on Cam, combined with Cloudastructure’s end-to-end security platform enables customers to capture, analyze, and promptly respond to any threat on their premises, all without interfering with mission critical operations.

The CVR on Cam encrypts and transfers all surveillance data to Cloudastructure’s cloud-based platform, where AI and Machine Learning algorithms go to work: reviewing and indexing all the video. When a customer receives an alert from the platform, they can log in via their computer or mobile, review the footage forensically and the AI/ML analytics to confirm whether there is a threat, and in the event there is, switch to live view of the location and seamlessly “Voice Down” any perpetrator.

The CVR on Cam solution is ideal for companies that want cloud surveillance but have only a few cameras at some locations. These lower density deployments make it difficult to justify an NVR or CVR to support only a few cameras. With the CVR on Cam, no NVR or CVR is needed 

Cloudastructure CEO Rick Bentley commented, “The Security Industry Association [SIA] recently predicted that by 2026, more than 50% of companies will move their surveillance to the edge or to the cloud. Hardware should never be a barrier to that goal. With the CVR on Cam, we enable more companies that desperately need end-to-end cloud-based surveillance to have it.”

About Cloudastructure:
Headquartered in Miami, Florida, with R&D in Silicon Valley, California, Cloudastructure’s 21st century award-winning security platform utilizes a scalable cloud-based architecture that features cloud video surveillance with proprietary, state-of-the-art AI/ML analytics, a seamless remote guarding solution, IoT cybersecurity, and smart parking. The combination enables enterprise businesses to achieve proactive, end-to-end security, and pairs that platform with an attractive value proposition that eschews proprietary…

Source…

Hack puts Latin American security agencies on edge


MEXICO CITY — A massive trove of emails from Mexico’s Defense Department is among electronic communications taken by a group of hackers from military and police agencies across several Latin American countries, Mexico’s president confirmed Friday.

The acknowledgement by President Andrés Manuel López Obrador comes after Chile’s government said last week that emails had been taken from its Joint Chiefs of Staff.

The Mexican president spoke at his daily news conference following a local media report that the hack revealed previously unknown details about a health scare he had in January.

López Obrador downplayed the hack, saying that “there’s nothing that isn’t known.” He said the intrusion apparently occurred during a change of Defense Department systems.

But Chile was so concerned by the breach to its own systems that it called its defense minister back from the United States last week where she was attending the United Nations General Assembly with President Gabriel Boric.

The 10 terabytes of data taken by the group also include emails from the militaries in El Salvador, Peru and Colombia, as well as El Salvador’s National Police. The Mexico portion of the data appeared to be the largest.

A group of anonymous, self-described social justice warriors who call themselves Guacamaya say they use hacking to expose injustice and corruption in defense of Indigenous peoples. Hackers using the same name previously hacked and released the emails of a mining company long accused of human rights and environmental abuses in Guatemala.

In a statement accompanying the most recent action, the group complained of the plundering of Latin America, which it refers to as Abya Yala, by colonizers and the continuing extractivist goals of the “Global North.”

The group issued a 1,400-word comunique saying that the militaries and police of Latin American countries, often with extensive training by the United States, are used by governments “to keep their inhabitants prisoner.”

“The police minimize the risk that the people exercise their honorable right to protest, to destroy the system that oppresses them,” the group wrote.

The group said it would make the documents available to…

Source…

New research collaboration leverages edge computing to meet defence and security challenges


Professor David Lie (ECE) is collaborating with researchers from across Canada to develop edge computing solutions to address defence and security challenges.

The project — A Platform for Secure and Dependable Hierarchical Edge Processing on 5G — has received $1.5 million in funding over three years from Canada’s Department of National Defence (DND).

Edge computing refers to the processing of data near its originating source, not in distant servers. The project proposes a hierarchy of data centres that provides computation and storage at the peripheries, shifting from a country level all the way down to a neighbourhood level. The strategy aims to mitigate the high latency of cloud-based applications caused by limited internet bandwidth.

“Imagine you’re trying to run an intelligent transportation system, where vehicles are sending and receiving large amounts of data to the cloud in real time,” says Lie. “Today, the cloud’s architecture means there’s some distance between the servers and the vehicles. Even at the speed of an electron, there are processing delays, and that makes a difference when you’re dealing with a moving vehicle. Edge computing can reduce those delays.”

As part of its Innovation for Defence Excellence and Security (IDEaS) Program, DND is supporting the creation of ‘micro-nets’ — self-organized multidisciplinary teams of at least three eligible organizations/institutions who carry out interdisciplinary research on aspects of a science and technology challenge of common interest.

In addition to Lie, the team includes Professor Eyal de Lara, Chair of U of T’s Department of Computer Science, as well as Professor Oana Balmau of the School of Computer Science at McGill University, Professor Julien Gascon-Samson of the Software and IT Engineering Department at ÉTS Montréal / University of Québec, and Professor Aastha Mehta of the Department of Computer Science at the University of British Columbia.

Together, they will design a new platform based on localized data centres situated near the field of use. The idea is that these centres would better deliver reliable, predictable and secure performance for future high-performance…

Source…