Tag Archives: Innovation

Is the blockchain the next big thing in banking?

Late last year, it emerged  that that two major Dutch banks ABN Amro and ING were running trials of blockchain technology on their trading desks.  The move follows reports that international banking group Santander was testing the viability of moving their international payments infrastructure to the blockchain.

The move to the blockchain, which Santander estimated could save banks as much as $20 billion a year in infrastructural costs, would be a landmark endorsement of the technology behind cryptocurrencies such as Bitcoin.

While it seems that the move may now not go ahead, it is still a significant step for financial institutions that have gone largely unchanged in decades.  What we are witnessing is the first large scale reaction from a bank in the face of new technology that threatens their industry, Bitcoin has revealed how outdated the existing financial infrastructure is, and banks realize this.

What is the blockchain?

Many people confuse blockchain with Bitcoin. While Bitcoin is a cryptocurrency, blockchain is the ledger system that tracks and manages every transaction made. The blockchain is mostly known for being the ledger system used by Bitcoin.

The blockchain is essentially a record of all Bitcoin transactions in history. They are recorded live and stored chronologically in “blocks” so that if you followed the chain through to the end, it would return to the first ever Bitcoin transaction.

You can see the blockchain in action here, with a live scrolling list of all transactions made in Bitcoin shown in real time.

https://blockchain.info/new-transactions

 

Why move to the blockchain?

What’s interesting about the blockchain is that it is entirely transparent. The sender and recipient of every transaction is known. But the blockchain also grants pseudo anonymity, while the details of the transactions are shown, there is no way to trace the identity of the account holders.

As well as improved privacy, the blockchain allows end users to save money on international financial transactions, move money around instantly and securely.

Security is another important benefit of the blockchain. While a traditional bank has a small number of servers processing transactions, when using the blockchain, the legwork is split between thousands of computers around the world.

Naturally, having such a large bank of computers do the processing makes the blockchain incredibly secure. With each computer managing only a tiny fraction of the transactions, in order to successfully hack the ledger, hundreds, if not thousands, of computers would need to be successfully breached. On top of this, it means that banks no longer need to foot the bill for server maintenance and security.

 

What does this mean for Bitcoin?

With blockchain technology on the brink of mainstream adoption, where does that leave Bitcoin? Unfortunately for fans of the cryptocurrency, the traded volumes are still too small to really support its case as a viable alternative to traditional currency.

However, volumes are growing slowly over time and while early adopters such as Silkroad have brought negative press associations, they are also paving a way for legitimate business use – a proof of concept.

While we may have to wait some time to see either blockchain or Bitcoin adopted by mainstream industry and finance, the news that major corporations are investigating the applications of blockchain technology is a very positive sign.

I believe that in a few years’ time, blockchain will be the de-facto method for ledgering transactions and that businesses and banks will no longer ‘own’ how their clients move money but instead battle to be the platform of choice for blockchain transactions.

 

 

 

Introducing Crumble – Surf Without Surveillance

We are happy to announce Crumble, a brand new Chrome extension designed by our colleagues from the Innovation Labs. The extension, currently in beta, will prevent companies from tracking you on the Internet via cookies, without breaking the websites you visit.

You can install the extension for free from here: Crumble Chrome extension.

Crumble

While this is not the first solution of its kind, we do think that our implementation makes Crumble the best solution against online cookie tracking.  Here’s why:

  • Stops online tracking companies from creating your profile via cookies based on your online browsing
  • It’s always up to date because it does not rely on a predefined list of online trackers.
  • By design does not offer preferential treatment to selected ad networks (unlike some other extensions)
  • Does not break the user experience on websites you visit
  • Does not hide any content on the websites you visit
  • Shows instantly who is tracking you on websites you visit

Download Crumble

How does it work?

Crumble intercepts 3rd party cookies and controls what information is sent back to the web tracking companies.  This way we can prevent trackers from following and profiling you based on the sites you visit.

Because, we manage rather than block 3rd party cookies, this means you will always get the full website experience; no broken plugins, no missing content, no weird behavior.

But wait! There’s more! Unlike other extensions that promise you a similar thing, we are doing all this by identifying the type of the cookie and not by keeping a blacklist of trackers. This allows us to block any new tracker as soon as it appears. No waiting time, no updating any list. Instant action.

This also means that we do not offer preferential treatment to trackers (aka whitelist them) unlike some other extensions.

Visible results

 

Get in touch

This is Beta release from Innovation Labs by AVG. For more info you can find FAQ section of our website.

We would also love to hear your feedback at support.innovation [@] avg.com or tweet us @avginnovation.

 

Can These Glasses Protect Your Identity?

What are invisibility glasses?

Developed by AVG Innovation Labs, the glasses help protect your visual identity in the digital age.

Through a mixture of technology and specialist materials, privacy wearables such as invisibility glasses can make it difficult for cameras or other facial recognition technologies to get a clear view of your identity.

For more information on AVG’s Invisibility Glasses check out this blog post.

The future of smart glasses still looks bright

At the 2015 Consumer Electronics Show earlier in January, wearable digital technology was the darling of the show.

While most of the buzz was around smart watches, Google Glass remained a status symbol worn by some geeks attending the show.  The yet-young “smart glasses” scene even boasted new entrants by major players like Sony and Epson.

So, it was surprising to some, when Google announced last week that as of Monday January 19th 2015, it was halting sales of its glasses and going back to the drawing board. Perhaps not so surprising to anyone outside the bubble of CES.

The consumer product media had ridiculed the glasses and its adopters for everything from how the device looks, to potential privacy infringements.

Google announced that Tony Fadell, the father of the iPod while at Apple and the CEO of smart-home device maker Nest Labs, which Google acquired last year, would undertake the Glass re-boot.

Tony Faddell

Image courtesy of mojandroid

 

Under Fadell’s expert hand, the product’s redesign should help Google Glass, though concerns about the smart glasses concept remain. I recently wrote about wearable devices and adoption, and privacy issues, particularly in the workplace. The focus of that piece was a potential ban on smart glasses and what companies need to do to prepare for the Wear Your Own Device (WYOD) trend. For now, it looks like the negatives outweighed the benefits, on the consumer side at least.

However, I believe that the smart glasses concept has great potential in other areas – one of which, is healthcare.  Boston’s Beth Israel Deaconess Medical Center is a prime example of how smart glasses can assist medical staff. It has developed a system that allows an ER doctor to look up information on patients by using Google Glass to scan a Quick response (QR) code on the wall of each room. It’s a great project and you can read a doctor’s blog about it here.

More recently, smart glasses for healthcare applications got another boost in the form of Augmedix, a startup with the aim of providing medical professionals with a Glass-powered records management solution.

Augmedix

Image courtesy of Augmedix

 

Enabled by Google Glass, Augmedix expedites the time physicians spend daily entering or retrieving data from electronic health records, allowing them to focus on patient care. According to the company, first launched in 2012, the service has a nationwide patient acceptance rating of more than 99 percent. The company’s CEO reports to Forbes that the Glass reboot is not cause for concern, as Google will continue to supply Glass to enterprise customers.

According to Forbes, Augmedix was one of ten companies Google lists as certified Glass at Work partners, focused on Glass-based enterprise services. More than half of them list healthcare as a major focus.

Of course, privacy issues will be consummately important for smart glasses in healthcare scenarios – as patient privacy is rigorously protected by the Health Insurance Portability and Accountability Act (HIPAA) and vigilance is of critical importance to all of us.

It’s not just about healthcare though, I think the smart glasses category has a lot to offer many fields that need quick and hands-free information, including things like rescue operations and engineering on a drilling platform.

So, where are digital glasses going? Suffice it to say, for now, it looks like away from the consumer market and into business ones.

Image courtesy of knowyourmobile

Addressing A New Generation of Mobile Threats Through Innovation

What inspires our innovation most is our customers – and finding solutions to better protect them, their personal data and their devices. In order to do this, we are constantly tracking new security threats in today’s ever-changing digital world.

As a starting point for the day, we showed a Live Global Threat Map. This dynamic map provides a snapshot of virus/malware activity we are tracking real-time on PCs and mobile devices all around the world. On our map, you can zoom in and actually see the number of infections in each country over a period of time. With 188 million active users, 90 million of which are mobile, we have a pretty good pulse on the threats around the world.

Most of our demos for the day were focused on the new generation of attacks uniquely focused on mobile functionality. While the first generation of mobile attacks were primarily using vectors and methods used in the PC world, now we are starting to see the second generation mobile attacks.

These new attacks include the use of voice, social engineering, rough access points and exploitation of various vulnerabilities in apps.

Here are a few of the mobile threats we demoed:

Voice Activation

Voice activated software is a standard feature on smartphones and is also appearing in smart TVs and other Internet-connected devices. It also, unfortunately, can be used maliciously. Did you know some applications can respond to voice, even when a phone is locked? We demonstrated how the mobile operating system will respond to a synthetic voice and allow a malicious app to bypass the limitations of a locked device or permissions, allowing it to call a phone number, send mail and other malicious actions. The flaw is very simple and it impacts a broad range of products utilizing voice activation technologies; they simply do not authenticate the source of the voice.

App Vulnerabilities

In the PC world, software can be distributed and installed on the PC from any source. As a result we are seeing many malicious programs impacting this platform. The mobile world has learned this lesson and is centralizing app distribution via app stores. This approach improves control and scan the apps for malicious intent. However, the fact that an app is not malicious doesn’t mean it isn’t vulnerable. We showed an app available on an app store that was downloaded over 5 million times, but is vulnerable. Our demo showed how easy it would be to exploit the vulnerability and take over the mobile device from a remote – allowing streaming video and voice from the device to the hacker.

iOS Threats

All mobile platforms share security issues and we at AVG always keep an eye on emerging threats in all mobile platforms. For example, we demoed the recent Apple iOS “Masque Attack” technique. This technique allows an attacker to substitute malware for a legitimate iOS application under a limited set of circumstances. It works by luring users to install an application from a source other than the iOS app store or their organization’s provisioning system, such as delivered through a phishing link.  This technique takes advantage of a security weakness that allows an untrusted application with the same “bundle identifier” as that of a legitimate application to replace the legitimate application on an affected device, while keeping all of the user’s data. This vulnerability exists because iOS does not enforce matching certificates for applications with the same bundle identifier.  Apple’s own iOS platform apps, such as Mobile Safari, are not vulnerable. In our demo we created a malicious iOS application named ‘FakeBook’ that steals all the user’s data that the legitimate Facebook application have access to.

Visual ID Hijacks

Malicious apps that assume visual identification of a “real” well-known brand (think about banking and social media applications) can replace a legitimate app and wreak havoc. Take Droidphish, a new attack vector we discovered, for example. If a hacker registers with a specific URL, when a link within the real app or even on a web page is clicked, the malicious app can assume the identity of the legitimate application. In our demo, the attacker gains complete control over your device, your email and data, even to the point of taking a photo of you using the device.

Texting Hijinks

We’ve all been warned to beware of URLs sent via a text (SMS) message. When clicked, they can redirect you to a malicious website. In our demo we showed media that a malicious app can even read and reply to incoming text messages without any visual appearance and without the owner of the device being aware that something is going on!

Cross-Platform Infection

Another demo scenario involved an app that creates a malicious PDF that is later automatically synced—via a cloud-based, file sharing service like DropBox – between a PC and mobile device, infecting the other device without even knowing. Imagine if the PDF had an “interesting” name that may trick the user into opening it.

Wi-Fi Hacks

We are constantly warned that public open Wi-Fi is unsafe, but there are millions of public Wi-Fi hot spots open and that means a lot of security risks ahead. Here are three scenarios we demonstrated on public Wi-Fi:

  • Sniffing – Via free Wi-Fi, anyone sitting next to you in a coffee shop could be looking at the traffic you are sending if your data is unencrypted, including your chats, messages, emails etc.
  • Spoofing – You connect to a malicious hotspot thinking it is legitimate- i.e. it could be named for a well-known coffee shop. (A colleague in Amsterdam ran an experiment and 60 people connected to his network in less than an hour!)
  • Tracking- Walk into a retail store and SSID info allows tracking of your location. In some cases, a trusted retailer may be seeking to personalize your experience when you walk into a department. But in other cases, the tracking could be for nefarious purposes.

For these very scenarios, our Innovations Labs team created AVG Wi-Fi Assistant to smartly turn your Wi-Fi on/off along with a secure Virtual Private Network (VPN) service – so that no one can track you through Wi-Fi, or look at your data being transmitted. Additionally, AVG Wi-Fi Assistant also offers substantial battery life improvements.

Finally, we also demoed some current innovative mobile security products that help people protect themselves: AVG Zen and new apps from Location Labs, a new AVG company.

This was our first Experiential Lab day and we look forward to hosting many more in the future!

Protect your mobile against tracking and hacking

AVG is proud to announce a great step forward in its Wi-Fi security offerings. Today we are introducing the brand new version of AVG Wi-Fi Assistant, an Android app that protects you from Wi-Fi tracking and Wi-Fi hacking.

The app, from the AVG Innovation team in Amsterdam, is currently in BETA, and we’d love your feedback. Get AVG Wi-Fi Assistant for FREE today from the Google Play store (some features require in-app purchasing).

Fueled by news of NSA leaks, security flaws like Heartbleed and browser extensions that make it simple to hack someone on public Wi-Fi, security and tracking are becoming key concerns for smartphone users worldwide.

Read on to learn more about Wi-Fi threats and how the new AVG Wi-Fi Assistant can help protect you.

 

Wi-Fi Security Threats

Wi-Fi hacking is the most common threat when it comes to public Wi-Fi. When you connect to an public Wi-Fi network (i.e. coffee shop, airport, or hotel), others maybe able to intercept your Internet traffic, collecting your passwords, private photos, emails, browser cookies and a lot more personal info. CNN has a hands-on example of this.  AVG Wi-Fi Assistant encrypts your communications to conceal them from hackers.

Wi-Fi tracking is the second big issue.  Currently specialized software solutions allow virtually anybody to use your phone’s Wi-Fi signal, to track your location and in some instances identify you. MIT Technology Review took a look at this Wi-Fi tracking technology and the inherent threats in this article . Wi-Fi tracking is even more worrying as most smartphone users have their Wi-Fi on all the time. This is increasingly an issue as retailers can use your Wi-Fi signal to track how you move around stores or around the city and even identify who you are. And that’s not all, if you keep your Wi-Fi open all the time hackers can trick your phone to connect to a fake Wi-Fi hotspot, and then snoop in at your private information.

AVG Wi-Fi Assistant can prevent tracking by turning off your Wi-Fi connection when you are not connected to a hotspot that you trust and automatically turns it back on when approaching the trusted hotspot again.

 

Wi-Fi Security Solutions

AVG Wi-Fi Assistant protects you against Wi-Fi Tracking and Wi-Fi Hacking by combining smart Wi-Fi Automation with VPN encryption in one simple to use app, for free. Here’s how it works:

Wi-Fi Security

Turn on VPN (Virtual Private Network) when you connect to a Wi-Fi Hotspot to conceal your data from unfriendly eyes. VPN secures your Internet connection and encrypts all the data you’re sending and receiving. This allows you to  use mobile data with lesser risk of your data or passwords being stolen.

Every month you get 500Mb of free VPN encryption; if you need more, you can upgrade to our premium VPN plan. We think this is a must have feature for online banking, emailing, or logging into your social networking accounts.

Wi-Fi Automation

AVG Wi-Fi Assistant runs in the background and learns the locations of Wi-Fi hotspots you connect to – without using GPS. It then uses your location to automatically turn your phone’s Wi-Fi adaptor on and off, exactly when you need it, hiding you from trackers. As a bonus, turning the Wi-Fi connection on and off can even extend your battery life.

Just to recap here are the Key Benefits of AVG Wi-Fi Assistant

  • Prevent password hacking
  • Prevent Wi-Fi tracking
  • Save battery power

Download the AVG Wi-Fi Assistant today and do let us know what you think.