Unboxing – The Resmed S+ The world’s first non-contact sleep sensor #Resmed #Sleep

This is just a quick unboxing of the Resmed S+ sleep monitoring device, The take a tour of the unit before we set it up and test it out and see if this works..This is actaully the worlds first non contact sleep sensor so you do need to wear anything or have any attachment on your bed so it just sits beside your bed on your locker paired to your smartphone…

 

 

Features

  • Measures your breathing and body movements throughout the night
  • Analyzes light, noise and temperature levels in your bedroom
  • Creates daily sleep scores and charts to help you understand your sleep pattern
  • Delivers personalized feedback based on your sleep pattern, bedroom environment and daily habits
  • Syncs seamlessly with your smartphone or tablet

See more here 

Stuck for what to get your tech-enthusiast dad for #FathersDay ? #iStorage has some ideas. #tech

Ultra-secure iStorage diskAshur is the latest gadget to have: Super speed USB 3.1, PIN authenticated, hardware encrypted portable data storage drives with unique EDGE technology.

With Father’s Day just around the corner, are you stuck for ideas on what to get for your ultimate gadget and ‘tech loving’ dad? With a dad who always wants the latest device and with ‘state of the art’ James Bond type features, look no further than iStorage and their new diskAshur range of colourful hard drives and solid state drives – perfect for storing family and work documents without the fear of the data getting lost or stolen!

iStorage, the award winning and trusted global leader of PIN authenticated, hardware encrypted portable data storage devices, launches their new range of USB 3.1 the diskAshur hard drive and diskAshur solid state drives all of which are designed, developed and assembled in the UK.

Featuring Enhanced Dual Generating Encryption (EDGE) technology making them THE most secure data storage drives available on the market – super spy like!

EDGE™ Security Features:
One of the unique and underlying security features of the GDPR compliant diskAshur² hard drive and diskAshur² SSD is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass laser attacks and fault injections. Essentially the drives feature technology that encrypts both the data and the encryption key, giving you confidence that private information is secure and protected.

So in short, without the PIN, there’s no way in! and you can’t get more ‘James Bond-esque’ than this!

Ideal for users looking for an easy to use secure solution for storing all their data, elegantly designed and available in 4 striking colours (Phantom Black, Ocean Blue, Fiery Red and Racing Green) meaning there’s plenty of technological features to get to grips with. In capacity options from 128GB to 2TB, there will be space for all the family.

 

 

The science bit:
With software free set up and operation, the diskAshur HDD and diskAshur² SSD is platform/device independent meaning it works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems.
In fact, the drives will work on any device with a USB port!

Additionally, with an ultra smooth fascia that doubles up as shock-absorbers, the drives being water and dust resistant (IP 56 certified) and supplied with a stylish and sturdy travel case, the iconic contemporary design also features an integrated cable which can be conveniently stored away when not in use.

In addition to EDGE technology, the following common features are included:

*   Brute Force Hack Defence Mechanism – Intelligently programmed to protect against all forms of Brute Force Attacks. Upon the 15th consecutive incorrect PIN entry, the diskAshur drive assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.

*   Self Destruct Feature: Users can pre-program the diskAshur drives with a unique Self Destruct PIN which, once entered, instantly deletes the encryption key rendering all data previously stored on the drive as lost forever.

*   Unattended Auto-Lock Feature: Set the drive to automatically lock after a pre-determined amount of time where the drive has not been used.

*   Wear Resistant Epoxy Coated Keypad: Designed with protection in mind, the diskAshur range offer a wear resistant epoxy coated keypad which hides key usage to avoid tipping off a potential hacker to commonly used keys.

For more information on iStorage or to find out how the iStorage EDGE range of diskAshur HDD and, diskAshur SSD can help protect your family’s confidential data, visit www.istorage-uk.com or contact +44 (0) 20 8991 6260.

#BlackDuck Center for Open Source Research & Innovation releases 2017 Open Source 360 Degree Survey

 The world’s appetite for open source software is voracious.

Organisations Increase Reliance on Open Source and Acknowledge Risks, But Efforts to Secure and Manage It Effectively are Lagging

In the last year, businesses around the globe significantly increased their use of open source and although they readily acknowledge growing concerns about open source-related security and operational risks, the effective management of open source is not keeping pace with the increase in use.

Those are among the key takeaways from the 2017 Open Source 360 Degree Survey results released today by Black Duck’s Center for Open Source Research and Innovation (COSRI). The COSRI survey comprised 819 respondents primarily from the U.S. and EMEA, 74% of whom were software developers, IT operations/professionals, systems architects, development managers, and security professionals.

Nearly 60% of respondents said their organisations’ use of open source increased in the last year citing: cost savings, easy access, and no vendor lock-in (84%); ability to customise code and fix defects directly (67%); better features and technical capabilities (55%); and the rate of open source evolution and innovation (55%).

Additionally, in terms of open source’s positive impact on business, survey respondents highlighted accelerated innovation (55%) and quality improvement (44%).

 

 

 

Even as their organisations are embracing open source to accelerate application development and increase development agility, respondents expressed concern about license risk/loss of intellectual property (66%); exposure to internal applications to exploitation from open source vulnerabilities (64%); exposure of external applications to exploitation because of open source vulnerabilities (71%); unknown quality of components (74%); and failure of development teams to adhere to internal policies (61%).

Despite those high levels of concern, nearly half of survey respondents indicated their organisations have no formal policies for selecting and approving open source.  And just 15% indicated they have automated processes in place to manage their open source use.

Respondents gave their organisations decidedly middling marks in areas of managing and securing their open source, with slightly more than half reporting: being in compliance with associated licenses (54%); being aware of known security vulnerabilities (55%); knowing where and which open source versions are currently integrated and deployed (54%); and conforming to internal policies (44%).

“The 2017 Open Source 360 Degree survey responses correspond closely with our experience as we engage with businesses of all sizes in all industries around the world. Companies are using a tremendous amount of open source for sound economic and productivity reasons, but today most companies are not effective in securing and managing it,” said Black Duck CEO Lou Shipley. “This is surprising for a number of reasons. Today open source comprises 80% to 90% of the code in a modern application and the application layer is a primary target for hackers. This means that exploitation from known open source vulnerabilities represents the most significant application security risk most organisations face,” Shipley said.

 

The Open Source 360 Degree survey results show that open source vulnerability tracking and remediation remain primarily manual processes carried out by internal resources (53%). Only 27% of respondents reported automatic identification and remediation tracking of known open source vulnerabilities.

Shipley noted that the survey responses are “also very much in line with results in the open source audits we conduct for our customers.”

Black Duck’s On-Demand business unit conducts hundreds of open source code audits annually, primarily related to merger and acquisition transactions. The recently published Open Source Security and Risk Analysis (OSSRA) report on 1,071 applications audited during 2016 found both high levels of open source usage – 96% of the applications contained open source – and significant risk to open source security vulnerabilities – more than 60% of the applications contained open source security vulnerabilities.

Notably, in that Open Source Security and Risk Analysis (OSSRA) report, audited applications from the financial industry contained 52 open source vulnerabilities per application, and 60% of the applications contained high-risk vulnerabilities. The retail and e-commerce industry had the highest proportion of applications with high-risk open source vulnerabilities, with 83% of audited applications containing high-risk vulnerabilities.

This year’s Open Source 360 Degree Survey conducted by Black Duck’s COSRI is the successor to the former Future of Open Source Survey, co-presented for many years by Black Duck and North Bridge.

A detailed presentation of the complete Open Source 360 Degree Survey results will be available on the Black Duck Website on June 22 following a COSRI webinar discussion of the survey findings.

 

 

 

 

Other notable findings from the 2017 Open Source 360 Degree survey include:

Methods for tracking use of open source: Information provided by developers 54%; Manual design/code reviews 36%; Scans to inventory open source in use 33%

Methods for reviewing code for open source use: Don’t review code for open source (38%); internal tools to scan for open source 27%; third-party tools to scan for open source 28%

Most important elements to a successful open source policy: A structured process for review and approval of open source use requests 42%; A whitelist/blacklist of approved open source components, specific to use cases 39%; A whitelist/blacklist of approved open source licenses, specific to use cases 39%

Prevalent areas for open source usage: Build applications used within our organisation 77%; Build applications used by our customers 69%; Build and run our IT operations infrastructure 69%

Prevalent technology areas for open source use: Development Tools/Software Development Lifecycle 57%; Containers/DevOps/Virtualisation/Cloud Computing 53%; Systems Management/Operating Systems 52%;

Open Source Contribution: 66% of companies surveyed contribute to open source projects.

 

Open Source 360 Degree 2017 collaborators included the following (platinum collaborators are in bold): Appnovation, Bareos GmbH & Co. KG, Black Duck Software, Capital One, Couchbase, Credativ, EnterpriseDB, Grid Protection Alliance, InfoSys, Open Hub, Open Invention Network (OIN), Open-Xchange, Opmantek, (Open Source Academy of Arts, Science and Technology) of Pakistan, Pentaho, Red Hat, Rift-io, Rocket.Chat, Symphony Foundation, univention, WIPRO, WP Engine

SecureAuth Launches Advanced Security for Office 365. #SecureAuth #Office365

Superior identity security with multi-factor authentication and adaptive access control protects most widely used cloud service from increasing attacks

 

SecureAuth Corp., the leader in adaptive access control, today unveiled enhanced protection for Microsoft’s Office 365, the world’s most widely used enterprise cloud service. By providing adaptive authentication for all Office 365 mail clients – including Microsoft Outlook and third-party applications, such as Apple Mail, SecureAuth is protecting one of the world’s most popular SaaS applications from increasing cyber attacks.

 

SecureAuth’s enhanced security for Office 365 provides identity protection and detection using the industry’s most advanced adaptive authentication and risk analysis capabilities, and features SecureAuth’s portfolio of multi-factor authentication methods. This multi-layered security approach combines techniques such as geographic location analysis, device recognition, IP address based threat services, and phone fraud prevention – to name a few.

With 85 million users working on a combination of desktop and laptop computers, mobile devices, and web applications, Office 365 is the world’s most popular cloud service. But wide use of Office 365 also makes it a primary target for cyber attacks especially during complex tasks like Office 365 GCC High and SharePoint Data Migration etc. Breaches tied to phishing e-mail scams and lack of strong identity security are accelerating. Organizations using Office 365 have been forced to rely on traditional and inadequate username-password authentication to try to protect themselves from sophisticated attackers.

 

 

Current versions of Office 365 mail clients support basic two-factor authentication while older Microsoft clients and third-party email applications do not. Enhanced identity security from SecureAuth, adaptive authentication, is the most secure approach for access from any client app that connects to Office 365, including older versions of Outlook and third-party email clients.

 

“Office 365 adoption is second-to-none, which is great for convenience and productivity, but unfortunately makes businesses more vulnerable to attack,” said SecureAuth Chief Technology Officer Keith Graham. “Attackers know that Office 365 is ripe to be exploited, and we see organizations under daily attack. With credentials, preventing the misuse of stolen credentials while maintaining ease of use for end users is paramount. That’s why SecureAuth’s new enhanced protection and detection capabilities for Office 365 offers the highest level of identity security – not only for newer mail clients, but also for older versions which remain widely deployed.”

As with all of SecureAuth’s security solutions, the enhanced Office 365 protection offers a frictionless user experience. The system triggers multi-factor authentication only when it determines a logon to be a potential risk. If there is no risk present, multi-factor authentication is not required, ensuring that access remains easy, convenient, and secure.

With the solution deployed across all devices and both old and new mail clients, organizations are protected no matter how their users access Office 365.

This enhancement comes as SecureAuth continues to expand its portfolio of adaptive access control, multi-factor authentication, and single sign-on products, adding Identity-as-a-Service product Cloud Accesspasswordless capabilities, and detection-orientated abilities to its award-winning adaptive authentication suite.

 

For more information on SecureAuth’s enhanced Office 365 protection, visit www.secureauth.com/office365

Traditional Media in a Digital Age by @globalwebindex #Media #ROI #Digital

The way that we produce, distribute and consume media is changing. Indeed, it has already changed a great deal over the last few years. Digital technology has turned the world of traditional media (press, television, and radio) on its head. Whether it survives this transformative period, and in what form, depends on the ability of businesses to adapt to technological developments and changing consumer habits.

One of the biggest changes emerging is the sheer volume of media being consumed digitally. A recent trends report looking at the rise of digital media found that internet users now spend approximately 6 ½ hours online every day. What’s more, the way that way that these individuals access the internet is changing fast. The share of internet time captured by smartphones has risen from 23% to 39% since 2012, with PCs and laptops experiencing a slight decline over the same period. Online users, therefore, represent a huge audience that traditional media outlets cannot afford to ignore.

 

 

Social media, too, has been a game changer. Social networks now represent 32 per cent of online media time and this figure only looks set to grow. Increasingly, individuals are accessing news via social networks, alongside entertainment, consuming content based on what their friends are sharing online. Social media is very much the opinion-maker of modern times, particularly amongst the younger generation, in much the same way that newspapers and radio broadcasts could once claim to be.

However, commentators should not be too hasty when signalling the death of traditional media. Consumers are still spending more than twice as long watching broadcast television when compared to online TV and traditional media still holds a greater sway with rural populations and older individuals. Similarly, broadcast radio and the print press retain a sizeable portion of the market even in the digital age. Evidently, if traditional media outlets are to survive, it is more about evolution than revolution – adapting to new developments without completely abandoning their current methods.

It is also worth noting that some things will remain the same even as many others change and as our reliance on digital media increases, some aspects of the traditional media landscape will continue to be valued highly. Although the digital age has pushed some media outlets toward clickbait headlines and lightweight listicles, there remains room for quality journalism. Not only are audiences showing that they have an appetite for long-form articles, marketers are discovering that it can be a more effective way of monetising their content. As the world of media changes, therefore, content creators must be careful that they do not lose sight of long-established media values.
The change that we are experiencing now is also merely the tip of the iceberg. Media outlets cannot afford to rest on their laurels by assuming that as long as they have a good website and an effective social media strategy they are all set. The industry remains in a constant state of flux and it is difficult to predict future developments that are surely on their way.

 

New devices are being created, or are already with us, that threaten further disruption. Internet connected devices like the Amazon Echo provide another opportunity for individuals to consume media, but also a new challenge to the existing distribution network. With bold predictions being made regarding the Internet of Things, who’s to say that consumers won’t be accessing their media on their smartwatch, internet-enabled glasses, or their home appliances in the not-too-distant future?

The digital age does not represent a clean break from the traditional media distribution and consumption methods of the past. The transition could very well be a messy one as decades-old institutions struggle to adapt to changing technology and consumer behaviour. However, if businesses listen to their audience and remember that there will always be a place for quality content, then they have reason to look towards the future with hope rather than fear.
If you want to learn more about the changes occurring in the world of media, visit GlobalWebIndex for more data and analysis.

 

Fake Nokia 3310 Dual Sim goes on sale in Click.ie €99.99 #Nokia #Nokia3310 #Ireland 

Update. 15/6/17, These are fake copy models and you should avoid at all costs and people have unintentionally bought them in anticipation.  They’ve also been taken down from site after I spoke to them on the phone. There is lots of fakes going around so be careful. If in doubt get in touch with us.
What to watch out for.

The packaging. It’s not a couple of the phones pictured and plain back. Real one hash splash artwork colour with one phone seen above.

Speaker on inside cover should be rectangular not square.

Orange/Yellow colour around the lens, it should be inside to be real.

Motherboard (Green in colour) is visible, not covered.

Back lit keys are white not blue.

Some housing variants are different pay attention to the keys and front fascia on top and finally the USB port placement.. It’s on the top, not the bottom.

 

 

Just a quick note if you are waiting on the all new Nokia 3310. It’s now available in the dual sim format costing €99.99 but I would be careful. It would be expected to be a bit more expensive considered its dual Sim but for this price I feel many will hold off until retailers stock it or wait for Argos to get stock in which is due the 20th June as they told us recently for €69.99 and also Dual Sim

The real Nokia 3310

 

Dual sim European version, The new Nokia 3310 takes the iconic silhouette of the original and reimagines it for 2017. The custom designed user interface brings a fresh look to a classic, whilst the 2.4” polarized and curved screen window makes for better readability in sunlight

Final reminder to find Ireland’s ‘Science Hero’ #GIhero 

Business membership organisation,Guaranteed Irish is issuing the final call for individuals and businesses to nominate their‘Science Hero’ as part of the Guaranteed Irish ‘Hero’ Awards, which recognise the work of people who have been ambassadors for Ireland both at home and abroad. 

 

Members of the public are invited to nominate their science hero by using #GIhero on Twitter or emailinginfo@guaranteedirish.ie before the deadline, this Friday, 9th June 2017. Artist, Maser and Captain of Irish Women’s Rugby team, Niamh Briggs were the first awardees for the contributions to art and sport, respectively.


 

Announcing the call for the Guaranteed Irish Science Hero, Brid O’Connell said:


 “Ireland is ranked tenth globally for our scientific research quality. Here at Guaranteed Irish we believe it is time to champion Irish contributions to science – and what better way to do that than to nominate a Guaranteed Irish Science Hero?


 


“Following April’s March for Science, where thousands of scientists and science supporters took to the streets in over 600 cities across the world, this award is a terrific way to commend someone who you consider to be Ireland’s Science Hero.” continued Brid O’Connell. 


 


“We want all businesses and individuals to get involved and put forward names of anyone who has demonstrated a real commitment to creating a better Ireland with science through: jobs, community and provenance. If you know someone who fits that bill, then we want to hear from you.” concluded Brid O’Connell.  


 

The remaining Guaranteed Irish Heroes for: music, technology and food will be awarded throughout 2017, following the public nominations process. An outside panel of experts in each field review a shortlist and decide the Guaranteed Irish Hero for that category.

 

To get involved and to nominate your Guaranteed Irish Hero, simply emailinfo@guaranteedirish.ie  with your nomination or you can nominate and follow the campaign across social media with the dedicated hashtag: #GIhero.

FTSE 30 Companies Risk Violating Key #GDPR Principle, According to New #RiskIQ Research

With one year remaining until the commencement of EU General Data Protection Regulation (GDPR), new research by RiskIQ reveals that more than one-third of all public web pages of FTSE 30 companies capturing personally identifiable information (PII) are in danger of violating the regulation by doing so insecurely.

 

When assessing the public websites of FTSE 30 organisations, RiskIQ found that more controls on external facing web assets, known as an organisation’s digital footprint, are needed in order to support requirements ahead of the fast-approaching GDPR deadline. Most data capture forms found on websites fall within the scope of GDPR as they collect personal data. The regulation emphasises that provisions should be in place to ensure that PII is securely captured and processed. In the UK, the Information Commissioner has provided guidance that, in the case of data loss where encryption software has not been used to protect the data, regulatory action may be pursued. 1

 

RiskIQ research on the public facing websites of FTSE 30 organisations reveals:

  • 99,467 live websites in total, an average of 3,315 websites per organisation
  • 13,194 pages on those sites that collect PII; an average of 440 pages per organisation
  • 34% of pages that collect PII are doing so insecurely
  • 29% are not using encryption
  • 3.5% are using very old, vulnerable encryption algorithms
  • 1.5% have expired certificates

 

Insecure collection of PII is not just a GDPR compliance violation. The loss of personal data, profit, and reputation resulting from the use of insecure forms is a legitimate concern for consumers, as well as shareholders. In addition to personal claim liability, Article 83 provides guidance on fines for GDPR faults, which start at the greater of €10m or 2% of global annual turnover for the preceding financial year– or even double depending on the infraction. This applies to all companies actively engaging with European citizens, regardless of whether they have a physical presence in Europe.

 

GDPR hygiene extends beyond secure collection. As part of the regulation’s fairness and transparency guidelines, organisations must clearly state at the point of capture how they’ll be using an individual’s data. Permission to use their data must be explicit and demonstrated through an action such as ticking a box, a significant departure from the ‘opt out’ process most organisations have in place today.

 

Bob Tarzey, analyst and director, Quocirca Ltd., said

“While this RiskIQ research is focused on large UK companies, the findings will be representative of all organisations. Many will already have the data security basics in place to comply with the regulations that precede GDPR. However, GDPR has many additional requirements, especially around the way data is captured and processed. These include obtaining explicit opt-in from data subjects. Before an organisation can address GDPR, it needs to fully understand the extent of its online data gathering activities. With enforcement of GDPR less than a year away, the time to act is now.”

 

The challenge for large, global organizations is the sheer volume and complexity of websites and web applications that need to be accounted for, not only for security purposes but also for regulatory compliance such as GDPR. RiskIQ’s Digital Footprint helps organizations address this challenge by discovering and monitoring an organisation’s public facing digital footprint, including websites and associated pages and forms. It highlights both security and policy violation exposures in that footprint to enable security and GRC teams to reduce their attack surface and maintain compliance.

 

To find out more about the risks of using insecure forms, read their recent blog post.  To learn more about the risks of old encryption algorithms, read this blog post.

Switching to SIM only deals could save Brits a total of £3.4 billion per year. #Mobile #Plans

The research carried out by specialist mobile comparison platform HandsetExpert.com found British mobile users are more likely to be better off by switching to SIM only tariffs 88% of the time.

 

Contract Conundrums – HandsetExpert.com Reveals Raw Deals for UK Mobile Users

 

  • British mobile users are more likely to be better off by switching to SIM only tariffs 88% of the time

 

  • Switching to SIM only deals could save Brits a total of £3.4 billion per year

  • The average Brit spends £92.06 p.a. more than they need to on their phone contract

  • There are more than 1.8 million potential phone contracts available for UK customers

 

Almost every other week there is a story in the news about confusing utilities pricing, but while we all know how hard it can be to find the best gas and electricity deals, have you ever considered the confounding array of mobile phone contracts available? With more than 1,898,380 potential contracts compared through specialist mobile comparison platform HandsetExpert.com alone, it’s little wonder that recent research by the platform has revealed that British mobile users are more likely to be better off by switching to SIM only tariffs 88% of the time.

Of the 51.3 million adults in the UK, 73% are contracted smartphone users. When you drill that down to the 23.1 million 18-44 year olds in the country, that figure goes up to 91%. It turns out that on average in the UK, buying a contract with a smartphone is £92.06 more expensive than buying them separately, which means that British adults could be wasting a whopping £3.4 billion.

Why do we overspend so much on our phone contracts? The answer is twofold: firstly, there are an inordinate number of contracts to choose from – HandsetExpert.com compares and provides recommendations based on more than 1.8 million of them. Secondly, most shoppers want the easy option. Buying a handset outright and signing up for a SIM only deal is usually the much cheaper choice, but it takes a little more effort and more money upfront than buying a bundle, which can cost as much as an additional £400 over a 24-month contract.

The perceived saved effort of bundle deals is just that: perceived. In reality, there are so many contracts available for each phone that once you’ve decided on your make and model you still have a plethora of offers to wade through.

Take the Samsung Galaxy S8 – within one week of its release there were over 7,000 different deals available on the market. If that’s the result of a single week you can imagine the boggling number of offers based around the country’s most popular phones.

  • The contracts currently available for the Apple iPhone 7 reflect its popularity: it leads the way with a staggering 142,652 different contract variations available in the UK

  • Apple also take the second, third and fourth spots on the contract charts with the iPhone SE generating 121,535, the iPhone 7 Plus generating 85,461 contracts and the iPhone 6 providing the base for 83,865 bundle deals

  • In fifth place is the Samsung Galaxy S7, with 71,214 contracts available

  • Even the less popular phone models are available with a bewildering number of contract deals; the HTC Desire 626 has 17,220 potential offers available and the Huawei P9 has 12,756 – both more than enough for the casual shopper to get lost in when searching for a new deal.

 

Dr Shahrum Gilani, who founded HandsetExpert.com, comments:

‘Most of us think that we’re savvy shoppers, but with so many different deals available it’s almost impossible to find the best mobile contract for your needs.

‘It’s so easy to be lured into making an unnecessarily expensive purchase. A relatively small difference in the contract price per month can really add up across a 24-month contract, especially when you consider that most of us use more data when we are connected to Wi-Fi than we do on 3G or 4G.

‘With HandsetExpert.com our aim is to gather as much information together as possible so our users can find the very best deals without spending hours shopping around.’