STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION

Size: px
Start display at page:

Download "STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION"

Transcription

1 STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION Maryam Mehrnezhad Ehsan Toreini Siamak F. Shahandashti Feng Hao Newcastle University, UK At EuroUSEC, July 2016

2 JavaScript-based attack on mobile devices using Motion and Orientation sensors

3 Research Challenge: Low Sampling rate Android Native app: 200 Hz Firefox: up to 50 Hz Chrome: up to 60 Hz ios: Native app: 100 Hz Safari: 20 Hz

4 Implementation Data from mobile users User independent Platform-free: Android/iOS JavaScript, html5, Node.js, Mongodb ANN Sensitive Information Phone-call timing Physical Activities Touch actions PINs

5 Entire PIN on 3rd attempt: 99.48%

6 Impact on industry and academia W3C The standard is being revised W3C Technical/advisory meeting Browsers Acknowledged by Chrome, Firefox, Safari, Opera Patched in Firefox v46 and Apple ios 9.3 Current Solution: Limiting/ Disabling, user permission Security vs usability A project between NCL culture lab and Security group and UCL Strong support from world leading researchers and Google, Qualcomm and W3C

7 WHY DOES THIS VULNERABILITY EXIST? Unmanaged sensors sensing is unmanaged on existing smartphone platforms in-app access to unmanaged sensors is now spreading to in-browser access Different terminology Unknown sensors users are less familiar with the relatively newer (and less advertised) sensors such as motion and orientation User study: to rate the level of their familiarity with each sensor.

8 List of mobile sensors From: iphone 6, Nexus 6S, Android Developers, W3C, Extra sensors (Common sensing hardware) Sensors: WiFi, Bluetooth, NFC Touch Screen, TouchID, Fingerprint, Camera, Microphone, GPS Ambient Pressure, Barometer, Ambient Humidity, Ambient Temperature, Ambient Light, Device Temperature Accelerometer, Gyroscope, Gravity, Magnetic field, Motion, Rotation, Orientation, Proximity Hall Sensor, Sensor Hub

9 Participants 30 participants, 13 male and 17 female Recruited through social and vocational networks 18 to 59 years old, median: 31 Except one, no computer security bg Multiple degree programs and levels, and the remaining participants worked in a different range of fields Owning a wide range of mobile devices, from 0 to 11 years, average: 6 University office, 10 Amazon voucher

10

11

12 Findings Generally surprised and impressed with the variety Newer sensors tend to be less known Generally not familiar with ambient sensors Low-level hardware sensors (acc, gyr) less known in comparison with high-level (motion, ori) High-level sensors are named after their functionalities Software features are more advertised by the mobile vendors

13 Risk Perception of Mobile Sensors Perceived risk level for their PINs being discovered by each sensor Finding one s PIN is a clear and intuitive security risk Putting the perceived risk levels in context with respect to the actual risk levels for a number of sensors Scenario Game app having access to all sensors Opening your banking app Entering your PIN Description of sensors Basic functionalities Further questions

14

15

16 Touch Screen Users are generally concerned However, still about half of our participants were either moderately concerned, a little concerned, or not concerned at all Some comments: Why any of these sensors should be dangerous on an app while I have officially installed it from a legal place such as Google Play? As long as the app with these sensors is in the background, I have no concern at all More general risk model in relation to mobile devices is affecting the users perception

17 Communicational sensors WiFi, Bluetooth, and NFC Users are generally concerned Comment: I am not concerned with physical [motion, orientation, accelerometer, etc.]/ environmental [light, pressure, etc.] sensors, but network ones. Hackers might be able to transfer my information and PIN Fair concern in regard to each sensor capability on the PIN discovery

18 Identity-related sensors Camera, microphone, fingerprint/ TouchID, and GPS Users are generally concerned GPS, fingerprint/touchid can not cause the disclosure of PINs After sensor description, still concerned Camera and Microphone Participant s concern due to other reasons (saying out loud, glasses reflection) Low actual risk Another general risk model

19 Environmental Sensors Ambient sensors (humidity, light, pressure, and temperature) Generally low and stays low after description Were concerned about these sensors simply because they did not know them [now that I know these sensors,] I am quite certain that movement/environmental sensors would not affect the security of personal id/passwords etc. Ambient light and PIN discovery, low actual risk

20 Movement Sensors Orientation, rotation, and motion Know them, but not concerned Accelerometer and gyroscope The risk perception is even lower Comments: In my everyday life, I don t even think about these sensors and their security. There is nothing on the news about their risk High actual risk

21 General knowledge versus risk perception The more the users know about these sensors, the more concern they express Spearman s rank-order correlation measure, r = 0.61, high confidence Not knowing sensors -> no customer demand -> no security design by mobile vendors Not as OS resources

22 Suggested Solutions Academic approach restricting the sensor to one app, reducing the sampling rate, temporal pause of the sensor on sensitive entries such as keyboard, rearranging keyboard for password entrance, asking for explicit permission from the user, ranking apps based on their similarities to malware, and obfuscating anomalies in sensor data Industrial Native app: no consideration JsavaScript No event fires when the page is not visible or is backgrounded Fire events only on the top-level browsing context or same-origin nested iframes Limit the frequency of events (60 Hz)

23 Conclusion and Discussion Sensors on mobile devices are booming Their security is not managed Current solutions are not usable enough Users are not generally concerned or even familiar with sensors Designing a practical solution is not straightforward Having control on granting access before running a website during working with it full control on reviewing, updating and deleting these data, if stored by the website or shared with a third party afterwards a smart notification feature on the browser

24 THANKS Q&A

This is a repository copy of TouchSignatures : Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript.

This is a repository copy of TouchSignatures : Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. This is a repository copy of TouchSignatures : Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/117981/

More information

Fusing Sensors into Mobile Operating Systems & Innovative Use Cases

Fusing Sensors into Mobile Operating Systems & Innovative Use Cases Fusing Sensors into Mobile Operating Systems & Innovative Use Cases May 23, 2012 Tristan Joo (tristanjoo@wca.org) Board Director & Co-Chair of Mobile SIG Wireless Communications Alliance, Independent Executive

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

SE 3S03 - Tutorial 1. Zahra Ali. Week of Feb 1, 2016

SE 3S03 - Tutorial 1. Zahra Ali. Week of Feb 1, 2016 SE 3S03 - Tutorial 1 Department of Computer Science McMaster University naqvis7@mcmaster.ca Week of Feb 1, 2016 testing vs Software Devices and s Devices and s App Device Outline testing vs Software Devices

More information

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home! Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research

More information

System requirements. Display requirements. PDF reader requirements. Fingerprint Login/Touch Authentication requirements

System requirements. Display requirements. PDF reader requirements. Fingerprint Login/Touch Authentication requirements System requirements The computer you use must meet the following minimum requirements: PC or Mac with at least a 1-GHz processor and 1 GB of RAM. Available browser updates applied for improved security

More information

Online and Mobile Banking Requirements Guide

Online and Mobile Banking Requirements Guide Online and Mobile Banking Requirements Guide Introduction This document explains the hardware and software requirements for Valley First Credit Union s Online and Mobile Banking Experience. Members are

More information

Mobile Computing Meets Research Data

Mobile Computing Meets Research Data Mobile Computing Meets Research Data Engineer Bainomugisha Pilot Research Data Center Workshop Mombasa/Kenya Software Languages Lab. Department of Computer Science Vrije Universiteit Brussel, Belgium Department

More information

Tablet - is the generic term for a mobile computer with touchscreen display that is operated with fingers or stylus pen instead of a mouse and

Tablet - is the generic term for a mobile computer with touchscreen display that is operated with fingers or stylus pen instead of a mouse and Mobile Computing What is this? Tablet - is the generic term for a mobile computer with touchscreen display that is operated with fingers or stylus pen instead of a mouse and keyboard. Walmart defines a

More information

ANDROID TABLETS & SMARTPHONES. JB Burke Your OLLI Android Facilitator/Teacher/Moderator/etc (Cell)

ANDROID TABLETS & SMARTPHONES. JB Burke Your OLLI Android Facilitator/Teacher/Moderator/etc (Cell) ANDROID TABLETS & SMARTPHONES JB Burke Your OLLI Android Facilitator/Teacher/Moderator/etc. JB2001@Q.com 928-925-9354 (Cell) Components of an Android device Adding a microsd card Not available on all devices

More information

Private Browsing: an Inquiry on Usability and Privacy Protection

Private Browsing: an Inquiry on Usability and Privacy Protection Private Browsing: an Inquiry on Usability and Privacy Protection Xianyi Gao*, Yulong Yang*, Huiqing Fu*, Janne Lindqvist*, Yang Wang+ *Rutgers University +Syracuse University Published in WPES 2014 What

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Should the users be informed? Differences in risk perception between Android and iphone users

Should the users be informed? Differences in risk perception between Android and iphone users Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security

More information

Privacy, Law, and Smartphones

Privacy, Law, and Smartphones CyLab Privacy, Law, and Smartphones Engineering & Public Policy acy & Secur ity Priv e l :// C DU HT TP ratory bo La Oct. 29, 2015 CyLab U sab Rebecca Balebako U P S.C S.C M U.E 1 Agenda Quiz Reading discussion

More information

The State of the Trust Gap in 2015

The State of the Trust Gap in 2015 The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years

More information

Head-to-head: Which will win for your business?

Head-to-head: Which will win for your business? Head-to-head: Which will win for your business? When it comes to mobile operating systems (OS), chances are you re already pretty familiar with the big two Apple and Android. There s probably a device

More information

Mobile and Ubiquitous Computing: Mobile Sensing

Mobile and Ubiquitous Computing: Mobile Sensing Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,

More information

KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE

KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE A tablet computer, or simply tablet, is a complete mobile computer, larger than a mobile phone or personal digital assistant,

More information

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

The new maximum security smartphone No Camera - No GPS - No Recorder

The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is

More information

BETTER TOGETHER. Internet + TV from Elevate Fiber. TV User Guide

BETTER TOGETHER. Internet + TV from Elevate Fiber. TV User Guide BETTER TOGETHER Internet + TV from Elevate Fiber. TV User Guide Stream your favorite shows and movies with Elevate s new high-def TV. Elevate TV is a full-featured digital television service delivered

More information

LIBRARY MEMBER USER GUIDE

LIBRARY MEMBER USER GUIDE LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account...2 Part 2) How to checkout a magazine issue...4 Part 3) How to download Zinio Reader 4...10 a) For your PC...10 b) For your

More information

Preface...3 Acknowledgments...4. Contents...5. List of Figures...17

Preface...3 Acknowledgments...4. Contents...5. List of Figures...17 Contents - 5 Contents Preface...3 Acknowledgments...4 Contents...5 List of Figures...17 Introduction...23 History of Delphi...24 Delphi for mobile platforms...27 About this book...27 About the author...29

More information

february 2013 part 1 of 3

february 2013 part 1 of 3 february 2013 part 1 of 3 contents hardware 3 software 10 hardware Microsoft Surface Pro Tablet Initial Reviews Mixed http://bit.ly/129hdn4 http://bit.ly/129hsrr http://nyti.ms/129hv6z -Laptop/Tablet Hybrid

More information

Event Password: NationalCenter2017 DON T FORGET STEP 2 ON THE NEXT PAGE!

Event Password: NationalCenter2017 DON T FORGET STEP 2 ON THE NEXT PAGE! Hi, We ve built a mobile app for 2017 Parents as Teachers International Conference! It has all the important information you ll need for the event, and features to enhance your event experience. Step 1:

More information

Mobile Devices and Smartphones

Mobile Devices and Smartphones Mobile Devices and Smartphones Smartphone Modern smartphones can do almost as much as a desktop PC could. They are extremely mobile and convenient. With a proper service provider they can access the internet

More information

How to use Video Conferencing & Desktop Sharing on Magnet Voice

How to use Video Conferencing & Desktop Sharing on Magnet Voice How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps WebSphere Puts Business In Motion Put People In Motion With Mobile Apps Use Mobile Apps To Create New Revenue Opportunities A clothing store increases sales through personalized offers Customers can scan

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Live Guide Co-browsing

Live Guide Co-browsing TECHNICAL PAPER Live Guide Co-browsing Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over

More information

NORTON WI-FI RISK REPORT: U.S. Results

NORTON WI-FI RISK REPORT: U.S. Results NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers

More information

Privacy-ABC Technologies on Mobile Phones

Privacy-ABC Technologies on Mobile Phones Privacy-ABC Technologies on Mobile Phones Dr. Gert Læssøe Mikkelsen, Alexandra Institute A/S ABC4Trust Summit Event Brussels, January 20, 2015 A research project funded by the European Commission s 7th

More information

Digital Marketing, Privacy, and New Technologies. Jules Polonetsky, CEO Future of Privacy Forum

Digital Marketing, Privacy, and New Technologies. Jules Polonetsky, CEO Future of Privacy Forum Digital Marketing, Privacy, and New Technologies Jules Polonetsky, CEO Future of Privacy Forum 9.26.17 Future of Privacy Forum The Members 140+ Companies 25+ Leading Academics 10+ Advocates The Mission

More information

How To Install Flash Firefox Android Tablet Os On Hp

How To Install Flash Firefox Android Tablet Os On Hp How To Install Flash Firefox Android Tablet Os On Hp Adobe may have cut support for Flash in Android Jelly Bean and beyond, but it's not don't officially support Flash, it's really easy to add Flash support

More information

PNC.com, Weather.com & SouthWest.com. Usability Analysis. Tyler A. Steinke May 8, 2014 IMS 413

PNC.com, Weather.com & SouthWest.com. Usability Analysis. Tyler A. Steinke May 8, 2014 IMS 413 PNC.com, Weather.com & SouthWest.com Usability Analysis Tyler A. Steinke May 8, 2014 IMS 413 2 P a g e S t e i n k e Table of Contents Introduction 3 Executive Summary 3 Methodology 4 Results 4 Recommendations

More information

User Help

User Help ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...

More information

Android - open source mobile platform

Android - open source mobile platform Android - open source mobile platform Alexander Schreiber http://www.thangorodrim.de/ Chemnitzer Linux-Tage 2009 Alexander Schreiber Android - open source mobile

More information

CNT-IP-2 Web Enabled Serial Controller

CNT-IP-2 Web Enabled Serial Controller CNT-IP-2 Web Enabled Controller Quick Start Guide Order toll-free in the U.S. 800-959-6439 For technical support, call 714-641-6607 Hall Research, 1163 Warner Ave. Tustin, CA 92780 www.hallresearch.com

More information

Duo Security Enrollment Guide

Duo Security Enrollment Guide Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,

More information

SMARTWATCH User Manual

SMARTWATCH User Manual SMARTWATCH User Manual Please refer to this manual before using your LOGIC LIFE 30 SmartWatch. ENGLISH Pages OVERVIEW 3 CHARGING 4 USABILITY 5 PAIRING 6-7 FUNCTIONS 8-12 TECHNICAL SPECIFICATIONS 13 2 1.

More information

Getting Started for Moderators Quick Reference Guide

Getting Started for Moderators Quick Reference Guide Practice before leading your first session. Become familiar with the session content. Open web pages, applications needed for application sharing and screen captures before session begins. Load multimedia

More information

Duo Security Enrollment Guide

Duo Security Enrollment Guide Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,

More information

ORGANIZING MOBILE WEB

ORGANIZING MOBILE WEB ORGANIZING MOBILE WEB EXPERIENCES @lukew EXTENSION LEARN LUKE WROBLEWSKI 1 378K iphones sold per day 562K ios devices 371K Babies born per day 1M Android devices activated per day 200K Nokia smartphones

More information

Android OS. Operating System based on Linux [ ] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus]

Android OS. Operating System based on Linux [ ] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus] 1 Android OS Operating System based on Linux [24-02-16] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus] 1 https://www.androidpit.com/android-marshmallow-update-overview-for-smartphones-and-tablets 2 https://blog.idrsolutions.com/2014/12/android-apps-ide-for-java-coder-programmers/

More information

TELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual. WiFi ARVIG arvig.net/wifitv. Delivered by Arvig

TELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual. WiFi ARVIG arvig.net/wifitv. Delivered by Arvig TELEVISION WiFi Plans WiFi Delivered by Arvig Interactive Guide and DVR (Digital Video Recorder) Manual 888.99.ARVIG arvig.net/wifitv TABLE OF CONTENTS Getting Started My Arvig Registration...1 Supported

More information

Secure Authentication for Internet environment using Biometric and One-Time Password

Secure Authentication for Internet environment using Biometric and One-Time Password UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time

More information

Iphone Usb Tethering Windows 7 No Internet. Access >>>CLICK HERE<<<

Iphone Usb Tethering Windows 7 No Internet. Access >>>CLICK HERE<<< Iphone Usb Tethering Windows 7 No Internet Access If you're unable to get your iphone or ipad online because there's no Wi-Fi signal On a Windows PC, you can use the Internet Connection Sharing feature

More information

ViewersLogic - Installation guide

ViewersLogic - Installation guide ViewersLogic - Installation guide General Thank you for joining the ViewersLogic (VL) media panel. Before you install the app, please make sure you meet the following requirements: 1) Have a Home Wi-Fi

More information

EMBEDDED SYSTEMS AND MOBILE SYSTEMS

EMBEDDED SYSTEMS AND MOBILE SYSTEMS EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery

More information

Copyright

Copyright Copyright NataliaS@portnov.com 1 EMULATORS vs Real Devices USER EXPERIENCE AND USABILITY User Interactions Real occurring events Overall performance Consistency in results SPECTRUM OF DEVICE CONFIGURATIONS

More information

VerseOne Introductions

VerseOne Introductions VerseOne Introductions Andrew Neilson Digital Strategy & Information Architect Michele Gaudelli Sales and Marketing Director John Sexton Web Developer & Usability Expert Penny Everett Web Accessibility

More information

Copyright

Copyright Copyright NataliaS@portnov.com 1 Overview: Mobile APPS Categories Types Distribution/Installation/Logs Mobile Test Industry Standards Remote Device Access (RDA) Emulators Simulators Troubleshooting Guide

More information

TELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual for the Amazon Fire TV Stick. WiFi ARVIG arvig.

TELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual for the Amazon Fire TV Stick. WiFi ARVIG arvig. TELEVISION WiFi Plans WiFi Delivered by Arvig Interactive Guide and DVR (Digital Video Recorder) Manual for the Amazon Fire TV Stick 888.99.ARVIG arvig.net/wifitv TABLE OF CONTENTS Getting Started My

More information

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall, Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms

More information

MIGRATING FROM WINDOWS XP

MIGRATING FROM WINDOWS XP MIGRATING FROM WINDOWS XP WHAT S THE PROBLEM WITH XP? Microsoft is no longer providing security updates for XP after April 8, 2014 After this date, Microsoft Security Essentials (MSE) for XP will no longer

More information

BUYING PERSONAL COMPUTERS AND SMART DEVICES SOUTHEAST COASTAL GEORGIA COMPUTER CLUB - CHARLES MURPHY

BUYING PERSONAL COMPUTERS AND SMART DEVICES SOUTHEAST COASTAL GEORGIA COMPUTER CLUB - CHARLES MURPHY BUYING PERSONAL COMPUTERS AND SMART DEVICES SOUTHEAST COASTAL GEORGIA COMPUTER CLUB - CHARLES MURPHY Getting Started Types Features Brands Shopping Tips Consider Tech Support Overview Explosion of personal

More information

Pivot Full Manual. The All-in-One Smart Hub Solution

Pivot Full Manual. The All-in-One Smart Hub Solution Pivot Full Manual The All-in-One Smart Hub Solution Table of Contents Getting Started...3 Overview... 3 What s in the box... 3 Pivot... 3 Door & Window Sensors... 6 Zmodo App... 6 Zmodo Web App... 6 Setup...7

More information

Remotely accessing GPH ICT systems

Remotely accessing GPH ICT systems Remotely accessing GPH ICT systems Version: 1.7 CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device... 4

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

The Google Maps app for iphone and ipad makes navigating your world faster and easier. Voice-guided GPS navigation for driving, biking, and walking

The Google Maps app for iphone and ipad makes navigating your world faster and easier. Voice-guided GPS navigation for driving, biking, and walking Google Maps Earth App For Iphone 4 Voice Navigation Try these quick fixes to improve voice-guided navigation in the Google Maps app. Can't hear voice navigation? Here are a couple tips if you're using

More information

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS SESSION ID: MBS-W04 THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS Nadir Izrael CTO & Co-Founder Armis, Inc. Ben Seri Head of Research Armis, Inc. Placeholder Slide: Image of spread of infection Placeholder

More information

Copyright 2017, Zighra Inc.

Copyright 2017, Zighra Inc. Zighra core AI based Adaptive Authentication Engine Patent (US Patent# - 9619852) 1. What does this cover? Zighra s patent answers the security question who is the real user behind a transaction or device?

More information

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico 1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

SMARTWATCH User Manual

SMARTWATCH User Manual SMARTWATCH User Manual Please refer to this manual before using your LOGIC LIFE 20 SmartWatch. ENGLISH Pages OVERVIEW 3 CHARGING 4 USABILITY 5 PAIRING 6-7 FUNCTIONS 8-12 TECHNICAL SPECIFICATIONS 13 2 1.

More information

Use of ISP1507-AL Evaluation Boards

Use of ISP1507-AL Evaluation Boards Use of ISP1507-AL Evaluation Boards Application Note AN181103 Introduction Scope This document gives details on hardware and software for using and testing Insight SiP Bluetooth Low Energy module ISP1507-AL,

More information

Introduction to Android Tablets and Smartphones

Introduction to Android Tablets and Smartphones The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,

More information

Mastering Mobile Web with 8 Key Rules. Mastering Mobile Web with 8 Key Rules

Mastering Mobile Web with 8 Key Rules. Mastering Mobile Web with 8 Key Rules Mastering Mobile Web with 8 Key Rules 1 Introduction When it comes to mobile web design and testing, mobility plays by a far different set of rules than the desktops of years past. Today we are challenged

More information

Security and privacy in the smartphone ecosystem: Final progress report

Security and privacy in the smartphone ecosystem: Final progress report Security and privacy in the smartphone ecosystem: Final progress report Alexios Mylonas Athens University of Economics & Business Overview 2 Research Motivation Related work Objective Approach Methodology

More information

Opening Smart T.V to third-party apps, user perspectives Himanandini Mohanty Faculty sponsor: Fadi Mohsen, University of Michigan-Flint

Opening Smart T.V to third-party apps, user perspectives Himanandini Mohanty Faculty sponsor: Fadi Mohsen, University of Michigan-Flint Opening Smart T.V to third-party apps, user perspectives Himanandini Mohanty Faculty sponsor: Fadi Mohsen, University of Michigan-Flint ABSTRACT A third-party app is any app that is developed by a party

More information

Remotely accessing GPH ICT systems

Remotely accessing GPH ICT systems Remotely accessing GPH ICT systems Version: 1.6 FINAL CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device...

More information

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many

More information

Farm Sprayer GPS Pro & Pro Software. Operation Manual

Farm Sprayer GPS Pro & Pro Software. Operation Manual Farm Sprayer GPS Pro & Pro Software Operation Manual 1 Table of Contents INSTALLATION OF PRO SOFTWARE 3 UPDATING SOFTWARE 4 SETTING UP THE GPS CABLES & CONNECTORS 5 CONNECTING TO WIFI TO SAVE MAPS 6 OPERATING

More information

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University Bark: Default-Off Networking and Access Control for the IoT James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University The IoT is everywhere So are the attacks... 1. Devices easily compromised

More information

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

MEMS & Sensors for wearable electronics. Jérémie Bouchaud Director and Senior Principal Analyst IHS Technology

MEMS & Sensors for wearable electronics. Jérémie Bouchaud Director and Senior Principal Analyst IHS Technology MEMS & Sensors for wearable electronics Jérémie Bouchaud Director and Senior Principal Analyst IHS Technology Outline Wearable electronics market overview MEMS & Sensors in wearable Motion sensors MEMS

More information

U.S. Mobile Benchmark Report

U.S. Mobile Benchmark Report U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral

More information

Evidence.com February 2017 Release Notes

Evidence.com February 2017 Release Notes Evidence.com February 2017 Document Revision: B Evidence.com Version 2017.2 Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries. Firefox is a trademark of The

More information

Mint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group

Mint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group Mint Getting Started Guide for Financial Institutions Financial Institution Support OFX Connectivity Group Table of Contents MINT GETTING STARTED GUIDE... 3 ABOUT THIS GUIDE... 3 ABOUT MINT... 4 WHAT IS

More information

Sage ERP Accpac Version 6.1. Coming Q4 2011

Sage ERP Accpac Version 6.1. Coming Q4 2011 Sage ERP Accpac Version 6.1 Coming Q4 2011 Sage ERP Accpac 6.1 What s New Improved usability of data entry screens Sage ERP Accpac 6.1 Virtualization Web Deployment Technology Mobile Access Sage ERP Accpac

More information

Mobile development initiation

Mobile development initiation Mobile development initiation Outline Mobile development: o Why? o How? o New issues Android ios 2 Mobile growth ¼ Internet access Sales of smartphones and tablets increase o + 70% tab Community 3 Why

More information

Machine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data

Machine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data Machine Learning for the Quantified Self Lecture 2 Basic of Sensory Data Dataset (1) During the course we will use a running example provided by CrowdSignals.io People share their mobile sensors data (smart

More information

A MODEL FOR COMPARATIVE ANALYSIS OF THE SIMILARITY BETWEEN ANDROID AND IOS OPERATING SYSTEMS

A MODEL FOR COMPARATIVE ANALYSIS OF THE SIMILARITY BETWEEN ANDROID AND IOS OPERATING SYSTEMS Bulletin of the Transilvania University of Braşov Series V: Economic Sciences Vol. 7 (56) No. 2-2014 A MODEL FOR COMPARATIVE ANALYSIS OF THE SIMILARITY BETWEEN ANDROID AND IOS OPERATING SYSTEMS R. LIXĂNDROIU

More information

Blackboard Collaborate Ultra

Blackboard Collaborate Ultra Blackboard Collaborate Ultra Table of Contents Blackboard Collaborate Ultra Overview... 3 Bb Collaborate Terms and Technical Requirements... 3 Technical Suggestions... 3 Mobile devices... 4 What s New

More information

Indoor navigation using smartphones. Chris Hide IESSG, University of Nottingham, UK

Indoor navigation using smartphones. Chris Hide IESSG, University of Nottingham, UK Indoor navigation using smartphones Chris Hide IESSG, University of Nottingham, UK Overview Smartphones Available sensors Current positioning methods Positioning research at IESSG 1. Wi-Fi fingerprinting

More information

Cambridge Nationals R001. Revision help (LO1)

Cambridge Nationals R001. Revision help (LO1) Cambridge Nationals R001 Revision help (LO1) Portable devices These are electronic devices that can be carried easily. Examples include: Laptops Netbooks Mobile phones Tablets (Ipad, Android Tablet) handheld

More information

IP Cam EdiLife Quick Installation Guide

IP Cam EdiLife Quick Installation Guide IP Cam EdiLife Quick Installation Guide 08-2018 / v1.0 CONTENTS l. Product Information... 3 I-1 System Requirements... 3 II Camera Setup... 4 II-1 Hardware Setup... 4 II-2 EdiLife App... 6 II-2-1 Android

More information

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture

More information

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device

More information

Android Samsung Galaxy S6 Edge

Android Samsung Galaxy S6 Edge Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,

More information

MicroBot Push User Guide

MicroBot Push User Guide MicroBot Push User Guide Troubleshooting 24 My Microbot App does not detect my MicroBot Push 24 MicroBot Push keeps disconnecting 25 MicroBot Push is not updating 25 Getting Started 2 Meet MicroBot Push

More information

An Empirical Analysis of Energy Consumption of Cross-platform Frameworks for Mobile Development

An Empirical Analysis of Energy Consumption of Cross-platform Frameworks for Mobile Development An Empirical Analysis of Energy Consumption of Cross-platform Frameworks for Mobile Development Matteo Ciman 1, Ombretta Gaggi a a Department of Mathematics, University of Padua, Padua, Italy Abstract

More information

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware EMBEDDED SYSTEMS PROGRAMMING 2016-17 Accessing Hardware HARDWARE LIST Accelerometer Vector magnetometer (compass) Gyroscope GPS and/or other location facilities (Front/rear) camera Microphone Speaker Battery

More information

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction

More information

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based

More information

Apple ios Enterprise Mobility Management (cloud based)

Apple ios Enterprise Mobility Management (cloud based) Apple ios Enterprise Mobility Management (cloud based) Codeproof ios EMM offers the following enterprise mobility management and BYOD security features. App Restrictions Block the camera, Safari, App Store,

More information