A new branch from the state-owned China Construction Bank is making a plunge into the world of cutting-edge technology. VR World is taking a look at what’s in play to see how this technology may one day spread to banks closer to home. First and foremost is the face-and-voice recognition. At the entrance to the bank, customers interact with a greeting robot that can speak back using voice recognition. Using their ID or facial recognition, clients can then enter the bank and start using the machines inside to do their bidding. Some functions, like buying gold, exchanging currency or withdrawing money are all done on
General Motors announced their driverless car for the next year
General Motors will no longer need an engineer in the front seat who was managing the robot that controlled its self-driving Chevrolet Bolt. There will be no more steering wheel and also, the pedals will be gone. This announcement came last week and it is more than obvious that this auto-giant got the confidence from it’s engineers. The car will be the fourth generation of its driverless, all-electric Chevy Bolts, which are currently being tested on public roads in San Francisco and Phoenix. And when they roll off the assembly line of GM’s manufacturing plant in Orion, Michigan, they’ll be deployed as ride-hailing vehicles in a
Intel’s Greatest Mistake: Meltdown, Spectre and Why Your CPU Is In Danger
To start the New Year, two major new hardware exploits have been publicized. And people are going nuts. Since the news of these exploits has come out, AMD stock has skyrocketed while Intel’s has dipped significantly. PC hardware enthusiasts everywhere are running around screaming, and if you aren’t hyper-tuned into the world of hardware you may not understand why. Let us break it down for you. What’s happening? Two new hardware-based exploits have been publicized: Meltdown and Spectre. While both issues can be mitigated, it may be impossible to fix them outright without fundamental changes in hardware architecture from manufacturers. What is Meltdown? Meltdown is an attack
Google Announces Improved Gmail Security Warnings
The security of personal information & data is all the hype lately. This was a highly debated subject after the Apple iPhone access requested by the FBI following a recent terrorist attack that was declined by the company completely. Now, Google announced improved Gmail security warnings. One of the most prominent issues is the warning that is issued to accounts when is believed they’ve been targeted by state-sponsored attackers. This comes as a controversial measure. One, that we’re sure will raise a lot of attention in the world of security and data theft. It will also prove crucial to see how will Google react to potential data access to those
Bill Gates sides with FBI on Apple encryption fight?
The situation concerning the backdoor access to the Apple iPhone 5C used by the San Bernardino shooter Syed Ryzwan Farook – is heating up. Even Bill Gates weighed in on the subject, revealing to Financial Times that he would allow FBI one-time access to the attacker’s mobile phone. He stated that all tech companies (including Apple) should comply with government requests for assistance pertaining to investigations regarding terrorist activity. In more areas than one, some agree with Gates. This would be a one time-only access. It would allow the FBI to further investigate this case, revealing more info about an attack that shocked the United
Windows 10 Privacy Concerns Addressed By Microsoft’s Terry Myerson
After Windows 10 was released late last month, the praises for the new operating system came flowing. It showed remarkable stability, built-in new features and overall it projected an increase in performance, plus, it returned the start menu as well. After the initial few weeks of work, some concerns for the new operating system’s privacy & security features have risen. There were several possible sources of concern for users; from the machine ID, key logging to other problematic situations, for example, covertly downloading a multi-gigabyte ISO of Windows 10 to Windows machines without user permission. In a nutshell it was kinda messy and Microsoft had
Paranoids, Meet Your New Phone: Silent Circle’s Blackphone 2
Whether you are a paranoid being or simply want added privacy and/or security, this is the phone for you it seems. The second generation of Silent Circle’s Blackphone 2 brings privacy and security front and center. It does this by offering full device encryption, thanks to Silent OS – an interesting version of Android intended for enterprise customers, putting an emphasis on secure and worry-free daily routines. If you thought the Blackphone 2 is another one of those ultra secure, but slow and outdated phones, think again. Powered by a Qualcomm Snapdragon 615 octa-core processor clocked at 1.7GHz, 3GB of LPDDR3 RAM, it has a
Qihoo 360 Caught Cheating in Antivirus Testing
Bluebox Labs: Xiaomi Phones a Major Security Risk
Xiaomi devices ship with a number of security flaws due to the use of a forked version of Android.
IT: It’s the Place to be for Job Hunting
Japan Estimates Further Growth of its Security Market
IDC Japan announces its latest market analysis, which estimates the potential growth of Japan’s local security business sector through the years 2015 to 2018.
Intel Acquires PasswordBox
Walkman A event, Cloud Direct, 6-Second Camera: The Headlines in Tokyo for Nov. 27
Here is the daily roundup from Japanese consumer tech and tech business websites for November 27, 2014.
One Fifth of Japanese Have Lost a Smartphone, According to Survey
A small sample research done by Lookout Inc. Japan reveals that at least one out of five people in Japan have experienced losing their smartphones.
Synology releases DiskStation Manager 5.1
Google Discovers Vulnerability in SSL 3.0
Google’s security researchers have discovered a new bug within SSL, this time in SSL 3.0 that exploits the fallback to SSL 3.0 and its inherently insecurity
Yahoo Hacked via Shellshock Vulnerability
The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.
No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers
There’s a very good chance that today’s Wired piece about Kevin Mitnick’s newest venture has a lot to do with the discovery of the Bash Bug within various Linux and Unix operating systems. This is a bug that could be considered a Zero Day exploit because of the fact that it is a security vulnerability within an application that is possible to exploit due to the fact that the software vendor has no knowledge of it yet or it has not been patched yet. Either way, it is a vulnerability that someone can take advantage of. Now, Wired ran a piece about Kevin Mitnick and his
5 million Gmail Passwords Leaked, Google Says Don’t Panic
5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts. The leaked Gmail accounts were first published on a Bitcoin forum, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification.
Don't Panic: 5 Million Gmail Passwords Leaked
5 million Gmail usernames and passwords were recently leaked through several Russian cybercrime web forums earlier this week. Google had already confirmed the issue yesterday, though it claims that no compromisation of its data systems was done that led to leakage of these user accounts. The leaked Gmail accounts were first published on a Bitcoin forum, and were submitted in the form of a standard listed text. The forum user who posted the account credentials claims that most of the data in the text are still usable. However, the administrators of the forum have already deleted the passwords, and only left the usernames for verification.