Tag Archives: Yuval Ben-Itzhak

How many devices do you have in your home?

It’s probably more than you think. There are the obvious ones such as laptops, tablets and smartphones. But did you think of your smart TV, games console or even your refrigerator? Our homes are very quickly becoming digital environments with dozens of connected devices making up what is known as The Internet of Things.

You may have already heard of devices such as Nest that offer smart solutions to everyday functions like heating your home, but while it may sound futuristic, it is very much part of reality.  As an industry, the Internet of Things was already worth well over $30 billion in 2013 and is set to surpass $70 billion by 2018.

The transition to a digitally connected world has well and truly begun. Whether you track your daily activity using a fitness wearable, have your home alarm system linked to your phone or simply stream movies to your television, that’s all part of living in an increasingly connected world.

In an ideal world, this connectivity would be seamless and integrated. In reality though, each of these connected devices are being developed in isolation across dozens of different verticals. The end result is a fractured market that can make it confusing and difficult for you to keep track of all your devices.

There must be an easier way. A simple product that can help you control your personal Internet of Things without the hassle of managing each one individually.

And that’s the idea behind AVG Zen™. We want to make managing your digital world as simple as possible. We want to avoid the culture of countless notifications, constantly prompting you and pulling you back to manage your devices. The idea behind AVG Zen is to offer peace of mind.

The vision is that someday, AVG Zen will help you track all of the devices on your personal Internet of Things.  Today, AVG Zen is already a powerful tool that can take much of the hassle out of managing your many devices (and those of your family).

Video

Welcome to AVG Zen

As a central dashboard, AVG Zen allows you to monitor and manage the security and performance of your devices by adding them to your AVG Zen network. It’s an incredibly easy and powerful way to ensure that your PCs, Mac and Android devices are locked down and running smoothly.

That’s AVG Zen – and we are working to ensure it will continue to bring peace of mind to  your connected world as that world continues to grow.

 

Are You Too Social For Your Smartphone?

AMSTERDAM and SAN FRANCISCO – November 4, 2014 – Aside from the usual suspects like games and social media, streaming and even pre-installed apps are the most likely to chew your smartphone or tablet battery and storage, according to the latest Android App Performance Report by AVG Technologies N.V. (NYSE: AVG), the online security company™ for 182 million active users.

The Q3 report, based on AVG’s analysis of anonymous data from over one million AVG Android app users, charts the top apps worldwide that affect smartphone and tablet performance in terms of data plan consumption, storage capacity and battery life. With its constant background notification checks, which run even when the app is not open, the social networking app from Facebook emerged as having the biggest impact on your mobile device when it comes to overall performance.

Performance Impact Rank App Name Category Developer
1 Facebook Social Facebook
2 Path Social Path Inc.
3 9GAG – Funny pics and videos Entertainment 9GAG
4 Instagram Social Instagram
5 Spotify Music Music & Audio Spotify Ltd.

 

Social apps were well-represented in the Report with two other social apps, Path and Instagram, making the top five most performance drains. With phone and tablet space at more of a premium than ever, the report also found that real-time news apps featured prominently in the charts. Amongst the list of storage eating apps, the New York Times Breaking News app, which caches the articles accessed through it, was most likely to chew up a device’s storage, ranking higher than Facebook and Spotify. People’s data plans were also likely to be affected by CNN’s Breaking US & World News app and the UK’s Daily Mail app.

“The goal of the Android App Performance Report is to analyze anonymized data to give users the important information they need to make informed choices about what they can do to continue to enjoy their favorite apps while reducing their impact on their device,” said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. “It might not be obvious what Facebook, Instagram, Spotify, 8 Ball Pool and Farm Heroes Saga have in common. But in our tech-centric world, running out of battery or storage space at the moment you need it most is hugely frustrating, and that’s why this degree is insight is vital.”

Some other key findings:

  • Some handset makers are draining their own devices. For example, AVG identified three pre-installed Samsung apps (AllShare Cast Dongle, ChatON, WatchON) in the top 10 list of battery draining apps, excluding games. The Samsung WatchON for video also topped the list for auto-starting battery eating apps due to the visual content the app delivers.
  • Three of the most resource-hungry day-to-day tool apps came from Google, with Google Now/Search, Google Text-to-Speech and Google Translate ranking within the top five. The Chrome Browser for mobile also made the list of top 10 storage eaters.
  • Games significantly reduce battery life. Four of the top 10 battery-chewing games came from game producer King, the company behind the ‘Saga’ series.

 

###

 

About AVG Technologies (NYSE: AVG)

AVG is the online security company providing leading software and services to secure devices, data and people.  AVG has over 182 million active users, as of June 30, 2014, using AVG’s products and services including Internet security, performance optimization, and personal privacy and identity protection. By choosing AVG’s products, users become part of a trusted global community that engages directly with AVG to provide feedback and offer mutual support to other customers.

All trademarks are the property of their respective owners.

www.avg.com

 

 

Yuval Ben-Itzhak, CTO, AVG Technologies

 

Contacts:

US

Katie Han

Waggener Edstrom for AVG

[email protected]

+ 1 (212) 551 4807

UK

Samantha Woodman

Waggener Edstrom for AVG

[email protected]

+ 44 (0)20 7632 3840

 

Keep in touch with AVG

What if smart devices could be hacked with just a voice?

Smartphones and wearable devices have introduced a brave new world in the way that humans and computers interact. While on the PC we used the keyboard and mouse, touch-based devices and wearables have removed the need for peripherals and we can now interact with them using nothing more than our hands or even our voices.

This has prompted the arrival of the voice activated “personal assistant”. Activated by nothing more than our voices, these promise to help us with some basic tasks in a hands-free way. Both Apple and Google added voice recognition technologies to their smart devices. Siri and Google Now are indeed personal assistants for our modern life.

Both Siri and Google Now can record our voice, translate it into text and execute commands on our device – from calling to texting to sending emails and many more.

However, these voice recognition technologies – that are so necessary on smart devices – are perhaps not as secure as we give them credit for. After all, they are not configured to our individual voices. Anyone can ask your Google Now to make a call or send a text message and it will dutifully oblige – even if it’s not your voice asking.

What if your device is vulnerable to voice commands from someone else? What if it could call a premium number, send a text message abroad, or write an email from your account without your knowledge. Over–the-air-attacks on voice recognition technologies are real, and they are not limited just to smartphones. Voice activation technologies are also coming to smart connected devices at home, like your smart TV.

As I demonstrate in this short video, the smart devices in my home do respond to my voice, however they also respond to ANY voice command, even one synthesized by another device in my home.

 

 

The convenience of being able to control the temperature of your home, unlock the front door and make purchases online all via voice command is an exciting and very real prospect. However, we need to make progress with the authentication of the voice source. For example, will children be able to access inappropriate content if devices can’t tell if it is a child speaking or a parent?

Being able to issue commands to my television might not be the most dangerous thing in the world but new smart devices, connected to the Internet of Things are being introduced every day. It may not be an issue to change the station on my television, but being able to issue commands to connected home security systems, smart home assistance, vehicles and connected work spaces is not far away.

Utilizing voice activation technology in the Internet of Things without authenticating the source of the voice is like leaving your computer without a password – everyone can use it and send commands.

 

 

There is no question that voice activation technology is exciting, but it also needs to be secure. That means, making sure that the commands are provided from a trusted source. Otherwise, even playing a voice from a speaker or an outside source can lead to unauthorized actions by a device that is simply designed to help.

 

An Emerging Threat

While we haven’t discovered any samples of malware taking advantage of this exploit in the wild yet, it is certainly an area for concern that device manufacturers and operating system developers should take into account when building for the future. As is so often the case with technology, convenience can come at a risk to privacy or security and it seems that voice activation is no different.