Skip to main content

Home/ Corliss Tech Review Group/ Contents contributed and discussions participated by Queeniey Corliss

Contents contributed and discussions participated by Queeniey Corliss

1More

Microsoft finally unveils its new browser called Edge - 1 views

started by Queeniey Corliss on 22 May 15 no follow-up yet
  • Queeniey Corliss
     
    At last the long wait is over, Microsoft finally reveals its official name for its new web browser plans last January, dubbed as Microsoft Edge, which is previously code-named Project Spartan.

    Microsoft made the announcement at the annual Build Developer Conference 2015. Edge will replace Internet Explorer as the default browser of Windows 10 PCs, smartphones and tablets. It's not surprising that the nickname "Edge" is based on the new rendering engine that Microsoft is using for its Windows 10 browser which is called EdgeHTML.

    Joe Belfiore, the Corporate Vice President, Operating Systems Group at Microsoft also said that the name was referred to the idea of Microsoft being on the edge of consuming and creating.

    Microsoft Edge is designed to be a lightweight web browser with a layout engine built around web standards that is created for interoperability with the contemporary web.

    The browser's new logo appears to be similar to the Internet Explorer's logo. However, the directions of the swirls have been changed and the color is a bit darker.

    Microsoft Edge consists of unique features such as the ability to annotate on web pages, modern and futuristic design for new tabs which appear to have a flat design concept, jotting down notes or draw on top of web pages for a great way of reading and consuming content, favorites folder built into the browser, thumbnails of frequently visited websites, web applications and further integration with digital assistant Cortana to offer more personalized results and actions.

    Developers will be able to carry their Chrome extensions or Firefox add-ons with just a couple of changes to Microsoft Edge.

    Microsoft Edge also enables users to engage with sites and provide them a chance at starting to write some web code, which they may put into an application through web extensions built into the web browser.

    Stay tuned on The Corliss Tech Review Group blog for more updates.
1More

The Corliss Group Latest Tech Review - Protect Your Assets By Practicing Common-Sense C... - 1 views

started by Queeniey Corliss on 16 Apr 15 no follow-up yet
  • Queeniey Corliss
     
    Let's get the scary stuff out of the way upfront: Cybercrime costs the global economy $575 billion annually, according to reports. The United States takes a $100 billion hit, the largest of any country, according to Politico. A report from former U.S. intelligence officials counted 40 million people whose personal information was stolen within the past year.

    Online theft is huge, and it only seems to be getting worse. Hardly a week goes by without some story about hackers penetrating a computer system somewhere. Corporations, individuals, even White House servers were hacked last week. I sometimes wonder just how difficult it is for a determined bad guy to access grandma's checking account or your neighbor's IRA and grab those assets.

    I am not the only one thinking about this. New York State Department of Financial Services issued a report on cybersecurity in the banking sector, where more than 150 organizations rely on third-party service providers for critical banking functions. The regulators want the banks to tighten security.

    So should you.

    We spend most of our time in financial markets looking at ways to deploy our capital: What assets to buy or sell, how much we should save for retirement, whether we should own more of these stocks and less of those bonds.

    We don't spend so much time thinking about the ways we can lose that money - to fraud and to common theft. We should be more vigilant, especially as we move our lives online, with digital access to our checking and savings accounts, our online portfolios, even our taxes.

    It is impossible to make yourself hack-proof, but you can make yourself less vulnerable.

    It all starts with some common-sense security steps. Three ways you probably can improve your existing practices: Develop better e-mail habits, beef up password security and (as always) remember that your behavior is the root of most of your problems.

    Get your e-mail act together

    Every day, your inbox fills with all manner of junk. Some of it is merely time-wasting nonsense, but let's not forget about the really dangerous stuff: phishing schemes, malicious viruses and malware. It seems the only reprieve we get are those rare occasions when the main servers in Russia - a.k.a. Spambot Central - gets temporarily knocked off-line.

    It's more than a huge productivity killer, it's a financial hazard. That $100 billion a year we mentioned above comes out of everyone's pockets. Even if you have not been hacked, you are paying for it in some way. Banking costs are higher as financial firms spend hundreds of millions of dollars a year on security.

    People have tried a variety of ways to tackle this: Filters, whitelists, e-mail verifiers and trusted ID services; disposable ­ e-mail addresses from sites such as Mailinator; "junk" e-mail addresses from Hotmail, Yahoo or Google. And still the danger keeps coming.

    I have a few tricks I use to keep the really nasty stuff under control, such as:

    ●View e-mail as plain text.

    All of the bad links, embedded viruses and other malware go away when you select "view as plain text." Sure, you lose all of the graphics and links, but you lose the threats as well.

    ●Create a primary e-mail address.

    This is your main address - for colleagues, clients and peers. Never share this e-mail address. Don't subscribe to anything using this address - no Internet mailing lists, no subscriptions, nada. Use this address alone for your finance- and business-related e-mails. Anything unrelated is junk; treat it that way. Block the domains of senders. Mark junk mail as junk.

    ●Use an e-mail forwarder.

    I have been a big fan of Leemail.me. Instead of giving out my e-mail address, I use Leemail to auto-generate an address whenever I want to share my e-mail with an unfamiliar company. It forwards my e-mail from the company to me. When I want to shut that sender off, I flick a button.

    Tracking the companies that share or sell your e-mail address is invaluable. The basic version of Leemail is, astonishingly, free, and the upgrade is only a few bucks a year.

    ●Don't hit "unsubscribe"; get blacklisted instead.

    There are a number of companies that provide e-mail services to third parties, shops such as Constant Contact, Vertical Response and iContact. They are the middlemen between businesses and consumers. And while they claim to be "opt-in only" and not spammers, in truth, they are subject to whatever bad behaviors their clients engage in. They all have become legal quasi-spammers.

    On every e-mail these companies send, there is an unsubscribe button. NEVER CLICK THAT. When you do, you are not unsubscribing. Rather, you are verifying that your e-mail address is legitimate.

    Instead, go to the company Web site and track down the customer service number. Call customer service and insist on having your e-mail or domain "blacklisted." Thats the only way to ensure you will truly be unsubscribed. If the company refuses, file a Federal Trade Commission complaint.

    Password security

    If you were like I was five years ago, you had one simple password that you used for everything - Amazon, Facebook, Wall Street Journal - everywhere. This could've been disastrous. Now all passwords are different. Avoid the common errors, such as using birthdays or your kids' names. Never use sequential numbers. And for goodness sake, don't use "password" as your actual password.

    Put all of your passwords on a document named something other than "My passwords." I find burying passwords somewhere in a spreadsheet to be useful. Print out a copy and place it in your safety deposit box with other important papers.

    Your biggest risk? You.

    I have said all too often that when it comes to investing, people are their own worst enemy. Behavioral problems are rife in security as well. Get into the practice of thinking about security, and soon it becomes second nature.

    The Securities and Exchange Commission has gotten much more serious about personal financial data security. They have informed advisers and brokers that there is a duty to protect client data. When we set up our wealth-management practice, we put into place specific policies and procedures to protect clients:

    ● All sensitive information is sent by secure e-mail using a third party for encryption.

    ● We never e-mail Social Security numbers or account numbers or other private data via regular email.

    ● We went totally paperless. Our file cabinets are empty, everything is cloud based.

    ● Any documents that arrive are shredded, so even our outgoing garbage is secure with nothing usable to a thief.

    Most of this is common sense. However, many people are still vulnerable. With smarts and a bit of awareness, you can make your financial assets much more secure.
1More

The Corliss Group Latest Tech Review - Us Regulator To Impose New Cyber Security Standa... - 1 views

shared by Queeniey Corliss on 14 Apr 15 - No Cached
  •  
    A new report highlighting deficiencies in US banks' oversight of suppliers' cyber security should serve to remind financial services companies in Europe of the due diligence they need to undertake, an expert has said.
1More

The Corliss Group Latest Tech Review: Facebook to launch social network for cyber secur... - 1 views

started by Queeniey Corliss on 16 Feb 15 no follow-up yet
  • Queeniey Corliss
     


    Facebook is launching a social network for cyber security professionals to share information about threats that could lead to cyber attacks, as the US government and companies search for new ways to co-ordinate their defences.

    The world's largest social network is stepping up its work in cyber security by teaming with other technology companies including Yahoo and online scrapbooking site Pinterest. The platform will enable companies to share clues about how hackers are behaving in the hope of preventing security breaches.

    As cyber attacks hit companies from Sony Pictures to health insurer Anthem, the private and public sector are under pressure to work together to understand their adversaries. Hackers join forces and share tips to break into networks but so far, communication about cyber defence has often been haphazard.

    Mark Hammel, Facebook's manager of threat infrastructure, said ThreatExchange had been developed from a system that Facebook was already using internally to make it easier to catalogue threats to the site in real time.

    Facebook's decision to share the tool comes at a time when the company is trying to broaden its appeal beyond social interactions with friends and family and make the product a tool that is useful in the workplace. The company is also trying out a site and app called Facebook at Work, designed to facilitate internal collaboration between colleagues.

    Mr Hammel said Facebook would give the cyber security service away for free, unlike some other threat detection systems.

    "We feel that as our product's footprint has grown, with the number of people using it to communicate, we have the ability to spend more time on broader security issues that affect the internet," he said. He added Facebook was "really well positioned" with its "social sharing model" to direct a threat project such as this.

    He added that Yahoo and Pinterest were good initial partners because they faced similar threats and had sizeable user bases. "Together, we're protecting a pretty sizeable percentage of the internet," he said.

    The ThreatExchange comes after Barack Obama, US president, put information sharing at the heart of his cyber security proposals announced ahead of the State of the Union speech last month. He proposed legislation that would make it easier for companies to share information about cyber threats with the government.

    The US government announced this week that it would be establishing a new agency, modelled on the National Counterterrorism Center with the aim of bringing together information from all arms of government during a cyber incident.

    Mr Obama is expected to flesh out those proposals at a White House summit held at Stanford University on Friday, while appealing to the technology industry to do more to help.

    The financial industry already leads the way in sharing information. The Financial Services Information Sharing and Analysis Center - known as FS-ISAC - joined the Depository Trust and Clearing Corporation, the post-trade services provider, last September to launch the first widespread not-for-profit intelligence service. The project is funded by 12 large companies from sectors including finance, energy and healthcare.

    But many analysts say information sharing is a key challenge for cyber defences. Last year saw a steep acceleration in attacks on businesses. These included the largest ever breach of personal data at a retailer at Home Depot, as well as the attack on Sony Pictures that the FBI has said was orchestrated by North Korea.
1More

Corliss Tech Review Group: ARM smartphone chip boasts 3x computing power - 1 views

started by Queeniey Corliss on 10 Feb 15 no follow-up yet
  • Queeniey Corliss
     
    With the trend today of making every new smartphone thinner than the last one, most would have to make a compromise between aesthetics and productivity. Usually, a nice and thin smartphone means shorter battery life and limited processing capability.

    Fortunately for us, manufacturers are now moving towards extended battery life and excellent processing power even in thin handsets. Case in point: ARM's next generation A72 processors.

    ARM Holdings, a microchip designer based in Britain, has announced a new processor for tablets and smartphones that boasts improved graphics and processing capability. Their new Cortex-A72 chip design and other improvements in related technology came just in time to help the handheld device industry which struggles with cooling demand.

    Corliss Tech Review Group noted that much of the advancement could be credited to big improvements made in manufacturing technology, particularly from the Asian contractors.

    An event in San Francisco was held where ARM announced that the new chips pack thrice as much computing power when compared with those in use today. It is now totally possible for manufacturers to use these new processors from ARM to get superb performance minus the strain in the device's battery. In fact, the company claims that in thin profile designs, the new chip could allow for as much as 75% reduction in power consumption.

    The company's vice president of marketing also mentioned that the device has "more than enough" computing power to support complex processes on tablets and smartphones even without an Internet connection. Most of the smartphone processes today that are data-heavy are usually being handled by remote servers and not the device's processor itself.

    Devices with this new processor technology are expected to be available by early next year. But according to Corliss Tech Review Group, 10 companies, including MediaTek of Taiwan and Rockchip of China, have already licensed ARM's new technology.
1More

Corliss Tech Review Group: Google Glass barely alive - 1 views

started by Queeniey Corliss on 02 Dec 14 no follow-up yet
  • Queeniey Corliss
     
    Two years ago, Google has hyped its Glasses device as the greatest thing since sliced bread -- and for a moment, many of us believed it.

    During its launch, there was much enthusiasm on the part of the consumers and developers but now people seemed to be losing interest. (Whether that's because of the $1,500 price tag or the fact that you can't really find a place to buy it from remains unknown.)

    While it may still sound supercool to geeks, Glass might not even reach the hands of the general public as developers are jumping out of the bandwagon. Some of them have felt the lack of support from Google, especially since an official public launch date is yet to be set. When Glass became available for developers in 2012, 10,000 units were reportedly sold. Then last year, it became available to tech lovers and media people but as of now, there's no news when it would become commercially available.

    "It's not a big enough platform to play on seriously," said the founder of Normative Design Matthew Milan who discontinued their Glass app supposed to target fitness buffs.

    According to Corliss Tech Review Group, out of more than a dozen Glass app developers, 9 have already put their efforts on hold owing to the limitations of the gadget and perceived lack of customers. Meanwhile, 3 of them have instead switched their focus on developing software for businesses.

    "If there was 200 million Google Glasses sold, it would be a different perspective. There's no market at this point," said Tom Frencel, CEO of a game developer firm that held back its efforts to make a Glass game.

    What's more, in the past 6 months, a number of Google employees responsible for the Glass development have reportedly left. Also, the Glass Collective, a funding consortium by Google Ventures has invested in only 3 startups this year and has taken down its website without notice. A spokesperson from Google Ventures said that the reason for the website closure is for entrepreneurs to come to them directly.

    Google insists it's still committed to developing Glass. Chris O'Neill, its head of business ops said, "We are completely energized as ever about the opportunity that wearable and Glass in particular represent. We are as committed as ever to a consumer launch. That is going to take time and we are not going to launch this product until it's absolutely ready."

    The formerly proud "Explorers" who go around the streets touting their Glasses are now getting flak for being "Glassholes". After all, no one really wants such evident threat to privacy hanging around in obvious, or obscure, places. In fact, someone from Google admitted himself that Glass is a perfect example of privacy issues concerning wearable devices.

    Experts from Corliss Tech Review Group have already predicted that it's a tall order for Glass to be a mass-market gadget. It's more likely to go down the road of Segway; a supposedly cool invention that ended up being used only in professional and industrial settings.
1More

The Corliss Group Latest Tech Review: Logitech K480 Keyboard Works with Anything You Own - 1 views

  •  
    It's a truth as universal as it is annoying; if you want all your devices to work with a specific keyboard, well, you'll probably need either one for each, sign on for precisely one device ecosystem, or get used to swiping in words. Travelers in particular are driven insane by this problem, so Logitech decided, quite cleverly, to solve it with the K480. Swiss Army Keyboard There are two problems with modern portable keyboards. The first is, as we noted, device compatibility. Ask anybody who's had to install drivers just to get a basic keyboard to work, the various device ecosystems out there don't play well with each other and seemingly want to drive you insane. Logitech solves this with some clever design. You can switch between three different places to send your words, so that regardless of whether you're all Apple, or a mix of Apple, Chrome, and Windows, you'll be able to use the keyboard and get the point across. Basically, if it uses Bluetooth, you're all set to type. At The Trough The second problem is keeping all your stuff organized; you've got your phone over here, your tablet over there, and your laptop in front of you… and many keyboards want to be docked solely at your tablet. How does Logitech solve this? Simple: It puts a trough at the top of the keyboard that can easily be used to stand up both your tablet and your phone, and to type away at both of them with ease. A Keyboard For The Multitasker Multitasking, or at least sorting through your various tasks properly, can be a profoundly annoying experience, and Logitech deserves credit for looking at how we actually use our gadgets and creating a keyboard that fits in with them. If that's something you need, it starts at just $50.
1More

The Corliss Group Latest Tech Review: Closing the High-Tech Gender Gap - 1 views

started by Queeniey Corliss on 10 Sep 14 no follow-up yet
  • Queeniey Corliss
     


    This year's Lemelson-MIT Prize winner discusses grassroots ways for boosting the number of women in technology and business.

    I have a confession to make: I've been living under a rock.

    I've actually been b usy under here - running a bioengineering lab at MIT, starting companies, teaching, consulting, being a mom. But I've been so focused on keeping all the balls in the air that, until recently, I hadn't noticed that women typically aren't the ones starting technology companies.

    To be fair, I had recognized that:

    * Girls choose engineering less often and drop out of engineering disproportionately (the so-called "leaky pipeline").
    * The percentage of women computer science majors peaked 30 years ago.
    * The higher I climb, the fewer other women there are at the table with me.

    I've also seen progress in gender equity in higher education. I just didn't realize until recently that the technology industry is light years behind.

    In case you've also been under a rock, here are some numbers that I found truly astonishing. Women lead only 3 percent of tech startups, account for only 4 percent of the senior venture partners funding such startups and represent only 5 percent of the founders, advisors and directors at MIT technology spinoffs.

    Are you as shocked as I was? What if I tell you that more than 50 percent of students in some MIT undergraduate science majors are women - and that's been the case for almost 20 years? Where do these talented women go, and what are the implications of that drain?

    If we believe that entrepreneurship is a fundamental engine of progress, that it is a path to getting ideas into the world, then what does it mean for our society if the ideas that germinate in the minds of all those young women rarely turn into companies with products? (By the way, women-led private tech companies have 12 percent higher revenue and 35 percent higher return on investment than those led by men, according to the Kauffman Foundation. This shouldn't have to be true to make us care, but it actually is.)

    The Lemelson-MIT Prize is an award for invention, for making discoveries useful through commercialization, and for inspiring the next generation. As the 2014 recipient, I am truly honored and grateful to the many people who have contributed to our collective track record using miniaturization tools to impact human health.

    Here are three things that made a difference for me:

    Great expectations: My biggest fan and mentor has always been my dad, himself a serial entrepreneur. When I became a professor, he had mixed feelings about me climbing the ivory tower. To encourage me, he asked one simple question: "When will you start your first company?" (As it turned out, I started my first company within five years. Since then, my students and have founded 10 companies between us.)

    Microclimate: Many have noted the chilly climate for women in engineering. I've been extraordinarily lucky. Of my college tribe of girlfriends, four of us are now successful entrepreneurs. My best friend is among that 4 percent of women venture capitalists; in fact, she was named one of Fortune's Most Powerful Women. I'm fortunate to work alongside female founder colleagues, MIT's Technology Licensing Office, and the ever-inspirational Professor Robert Langer. Indeed, my microclimate is actually pretty warm.

    Men who believed in me: Much has been written about visible role models for women. I try to be one, even when it's hard to put myself "out there." Along the same lines, I appreciate having had a working mom who was a trailblazer, having been one of the first women in India to receive an MBA. However, it's worth noting that the people in my life who have seen more for me than I saw for myself, who believed in me and promoted me, were mostly men, including my graduate advisor, my first investor, and my husband. The truth is that changing the face of technology requires the involvement of men who care about it.

    I will donate some of the prize money to the MIT Society of Women Engineers. This organization runs fabulous outreach programs designed to keep young girls interested in the STEM fields (science, technology, engineering and math). I also look forward to supporting a program for women's entrepreneurship in MIT's upcoming Innovation Initiative.

    I hope other institutions will follow suit and such initiatives spread as quickly and far as the ideas set forth in the gender equity report championed by MIT's beloved former president Charles Vest. I encourage you to also do your part: If you believe strongly in a talented woman you know, why not ask her when she will be starting her first company? It could be just the kind of great expectation that makes a real difference.
1More

The Corliss Group Latest Tech Review: GE Device Measures the Calories on Your Plate - 1 views

started by Queeniey Corliss on 15 Jul 14 no follow-up yet
  • Queeniey Corliss
     
    Self-tracking devices like the Fitbit do a fair, if imperfect, job at measuring how much you move and then inferring how many calories you've burned in a day. But they don't measure how many calories you consume. You can enter calorie estimates into an app, but doing so is a tedious and often inaccurate process.

    GE researchers have a prototype device that directly measures the calories in your food. So far it only works on blended foods-the prototype requires a homogenous mixture to get an accurate reading. But they're developing a version of the device that will determine the calories in a plate of food-say, a burrito, some chips, and guacamole-and send the information to your smartphone.

    Matt Webster, the senior scientist in diagnostic imaging and biomedical technologies at GE Research who invented the calorie counter, says eventually the device might be incorporated into a microwave oven or some other kitchen appliance. Heat your food, and at the same time get a readout of the precise calorie count, without measuring out portions and consulting nutritional charts.

    Webster analyzed nutritional data from the U.S. Department of Agriculture-which contains detailed information on thousands of foods-and determined that it's possible to get an accurate calorie estimate using just three pieces of data-fat content, water content, and weight. The calories from all the other constituents of food-such as sugar, fiber, and protein-can be approximated by subtracting the water and fat weight from the total weight.

    In tests using the prototype to measure mixtures of oil, sugar, and water, results were within 5 to 10 percent of the results from standard, destructive means of measuring calorie content, such as the bomb calorimeter that measures food calorie content by burning it.

    The device works by passing low-energy microwaves through a weighed portion of food and measuring how the microwaves are changed by the food-fat and water affect the microwaves in characteristic ways. Getting a reading is easy using existing equipment if the food is liquid or blended. Getting a good reading for a sandwich and chips will require "virtual blending" Webster says. That could be done by developing microwave antennas that form a more uniform distribution of microwaves than the current equipment and using algorithms to get an average, or by progressively scanning the food. In either case, the complete measurement could be taken in a second or two.

    Others are developing devices that are being marketed as being able to count calories. For example, a pair of devices have emerged recently on crowd-funding sites. But those devices are limited to analyzing the surface of most foods (they work by measuring reflected light). This approach might work to recognize a piece of food as an apple, for example, whose caloric content can be looked up in a database. It wouldn't easily work with a burrito, where most of the calories are wrapped up inside.

    "We're looking at waves that pass all the way through the food. So you're getting a complete measurement of the entire food," Webster says.
1More

The Corliss Group Latest Tech Review: UK Businesses Ignoring Consumer Demand for Mobile... - 1 views

  •  
    Mastercard warns: invest or face economic consequences. Many UK businesses are struggling to expand and develop to their full potential due to a lack of proper investment into new technologies such as alternative payment methods, a senior Mastercard executive has told CBR. Marcia Clay, the groups' UK and Ireland head of strategy and commercial development, explained that UK consumers are increasingly calling for innovative technologies such as mobile payments as they look to simplify their everyday lives. "I believe we need to prioritise support for innovative start-ups, businesses in the eCommerce and mobile payments sector for example, which are in a unique position to propel the UK economy forward in 2014 and beyond," she said. Clay detailed how Mastercard is working with London-based Startupbootcamp FinTech, providing the expertise, mentoring and access to a network of industry professionals that most early-stage FinTech start-ups would not be able to access otherwise. Mastercard has found that many small businesses still do not use electronic payments, despite almost 80% of UK businesses having a website or some sort of online presence. A much smaller percentage can currently accept card payments, and the company believes that businesses of all sizes should be encouraged to invest in new technology and services that give consumers more choice. The company also found that UK consumers are using mobile and contactless payment methods and wide-spread adoption is reaching a critical mass; with around 5.7m transactions taking place on UK smartphones every day. This has been spurred on by a major growth in contactless payments, which grew by 383% from 2012 to 2013 across the country a
1More

The Corliss Group Latest Tech Review: Mobile malware and operating system vulnerabilities - 1 views

started by Queeniey Corliss on 06 Jun 14 no follow-up yet
  • Queeniey Corliss
     
    9% of large organisations face security, hacking, phishing scams and internet fraud in mobile devices
    Industry experts to share insights helping businesses defend from cyberattacks during security sessions and workshops at Gulf Information Security Expo & Conference

    Dubai, United Arab Emirates: As the Middle East and Africa region continue to experience a rapid growth in the sales and penetration of smartphones, with a population of more than 525.8 million using mobile devices in 20131, an increasing number of malware attacks also pose a threat to millions of smartphone users. Tackling the importance of mobile security, the second Gulf Information Security Expo & Conference (GISEC) 2014, taking place from 9 to 11 June at Dubai World Trade Centre (DWTC), will discuss ways to secure the mobile environment against evolving threats.
    The unfettered growth in mobility created an alluring opportunity for cybercriminals with 9% of large organisations experienced a security or data breach in smartphones or tablets, according to a 2013 PricewaterhouseCoopers (PwC) survey. The widespread use of mobile devices resulted to various cybercrimes such as hacking, phishing scams and internet fraud. Smartphones are usually attacked through malwares, Trojan horse viruses and malicious software such as Loozon and FinFisher.

    Among the GISEC Conference speakers is Nader Henein, Advance Security Solutions, Advisory Division at Blackberry, who will talk about devising a fit-for-purpose bring-your-own-device (BYOD) security plan that capitalises on the innovation and productivity of a mobile workforce. Also included in his presentation are the introduction of more stringent authentication and access controls for critical business apps and balancing the legal and electronic recovery implications of mobile devices with governance and compliance.

    Heinen will also tackle mobile malware tactics and recent advances in Android malware as well as dissecting the anatomy of a mobile attack. According to Sophos Mobile Security Threat Report 2014, the exponential growth in Android devices and the buoyant and largely unregulated Android app market produced a sharp rise in malware targeting that platform. SophosLabs has seen over 650,000 individual pieces of malware for Android, which has grown quickly in a short period of time due to the increasing use of mobile devices.
    "Security for mobile devices, applications and content is a paramount concern in a mobility management strategy," said Ian Evans, Managing Director and Senior Vice President, AirWatch by VMware EMEA. "Allowing corporate-owned or employee-owned devices to access corporate data requires a strong enterprise security strategy to ensure the deployment is secure and corporate information is protected."

    Brian Lord, Managing Director, PGI Cyber, commented: "PGI (Protection Group International) recognises that the growth of mobile device use is essential for commerce, governments and individuals. They increase efficiency, drive down costs and afford maximum flexibility. As with all information and communication media, they also come with their own security risks. PGI's solutions, whether advisory or technical, all encompass the security risk posed by mobile devices - whether that is an individual device or an integral part of an organisation's infrastructure - and afford protection without detracting from the huge value such devices bring." he added.
    During the two-day conference, leading information security experts headlined by Robert Bigman, former Chief Information Security Officer at the CIA; Mikko Hypponen, Chief Research Officer at F-Secure and Wim Remes, Chairman of the Board of Directors at (ISC)2 will discuss various topics on cyber threats and cybersecurity.

    Bigman's keynote address of Day 1 of the GISEC Conference will shed light on the vulnerability of Heartbleed, especially clear prevention methods the audience can use to protect their internal corporate networks under the theme 'Change the way you connect to the internet'. Hypponen - the man who tracked down the authors of the first PC virus ever recorded - will deliver his keynote address on Day 2 of the GISEC Conference and will discuss critical information security issues to empower one with superior protection. Remes will focus on strategies to map out existing infrastructures to adequately protect them against realistic threats among several others.

    Meanwhile, GISEC will also hold free-to-attend security sessions on vendor-run educational presentations, workshops, demonstrations, informative speeches and case-studies giving I.T. professionals useful insights to help defend their businesses from cyberattacks. Based on the Official CISSP CBK® Review Seminar, (ISC)2 will offer an education programme focusing on two of the most challenging domains of the CISSP CBK: Information Security Governance and Risk Management; and Access Control delivered by an Authorised (ISC)2 Instructor. All attendees will receive CISSP certificate.

    As the region's only large-scale information security platform, GISEC will gather industry, government and thought leaders as well as international and regional cybersecurity experts in various business verticals such as I.T., oil & gas, banking & finance, government, legal, healthcare and telecoms to meet the growing requirements for information security and countermeasures in the region.

    The must-attend event is set to draw 3,000 trade visitors from 51 countries and more than 100 exhibitors from the world's leading information security companies and brands. 91% of last year's attendees were purchasing decision makers from a wide range of industries.

    Among the key sponsors of the exhibition are BT Global as Strategic Sponsor; GBM as Diamond Sponsor; Spire Solutions and Protection Group International as Platinum Sponsors; Access Data, Websense International, Fire Eye and F5 Networks as Gold Sponsors; Research in Motion (Blackberry), CSC Computer Sciences, Guidance Software and Palo Alto Networks as Silver Sponsors. Meanwhile, Palladium is the sponsor for the IT Security Awards.

    Powered by GITEX TECHNOLOGY WEEK, the region's leading Information and Communications Technology (ICT) event, GISEC is strictly a trade-only event and is open to business and trade visitors from within the industry only. GISEC is open 10am-6pm from 9-11 June. Visitor attendance is free of charge. For more information, please visit www.gisec.ae.
1More

The Corliss Group Latest Tech Review: US cyberspying case against Chinese military offi... - 1 views

started by Queeniey Corliss on 05 Jun 14 no follow-up yet
  • Queeniey Corliss
     


    Two weeks after the Obama administration announced a groundbreaking criminal case, accusing five Chinese military officers of hacking into US companies to steal trade secrets, the accused have yet to be placed on Interpol's public listing of international fugitives.

    What's more, there is no evidence that China would entertain a formal US request to extradite them.



    Short of the five men flying to the US for a vacation, for example, there's no practical way they could be arrested outside China without help from foreign governments. It's also unclear whether the charges levied by the US are accepted internationally as crimes. No country so far has publicly expressed support for the groundbreaking charges.

    The Obama administration described the unusual indictment on May 19 as a wake-up call for China to stop stealing US trade secrets. The FBI published "wanted" posters with pictures of all five Chinese military officers. Attorney General Eric Holder said such hacking suspects "will be exposed for their criminal conduct and sought for apprehension and prosecution in an American court of law".

    Now, weeks later, that's looking less likely than ever, illustrating the complex legal and diplomatic issues posed by the indictment. There may be no viable options for Holder to make good on his word.

    "The next step needs to be [we], here in the US, saying this is not just a US-China issue," said Shawn Henry, former cyber director at the FBI and now president of CrowdStrike Services, a security technology company. "This is a China-versus-the-world issue."

    So far, the US does not appear to have the world on its side.

    Neither officials in China nor the US said they would comment on any efforts by American prosecutors to arrest the Chinese military officers. The White House and State Department directed inquiries to the Justice Department, where spokesman Marc Raimondi said: "Our investigation is active, and we are not going to comment on specific actions to locate the individuals charged in the indictment."

    A federal grand jury charged the five Chinese military officials with hacking into five US nuclear and technology companies' computer systems and a major steel workers union's system, conducting economic espionage and stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage.

    The US and China have no extradition treaty. And China's laws preclude extraditing citizens to countries where there's no treaty.

    China has denied the hacking allegations and wants the US to revoke the indictment. A defence ministry spokesman, Geng Yansheng, said last week that the case ran counter to China-US military cooperation and had damaged mutual trust. Citing the suspension of dialogue on computer security, Geng said further responses from China would depend on Washington's attitude and actions.

    "The Chinese are obviously not going to extradite their officials to the US," said John Bellinger, former State Department legal adviser. For this reason, Bellinger said he did not expect the US to make the request. "To ask them to do something that they're obviously going to then deny makes [the US] look ineffectual," he said.

    The US can ask Interpol, the international criminal police organization, to place defendants on its "red notice" list of wanted fugitives, which would alert the 190 member countries if the men were to travel outside of China. But the five officers were not on Interpol's public list as recently as yesterday, although there were 24 other Chinese citizens on that list wanted by the US on charges that included fraud, sexual assault, arson and smuggling.

    Raimondi, the Justice Department spokesman, would not say whether the US had asked Interpol to assign red notices to the men. Interpol does not allow red notices in cases it considers political in nature, but spokeswoman Rachael Billington declined to say whether Interpol considered economic espionage to be political.

    "Whilst we could not comment on a hypothetical situation, requests for red notices are considered on a case by case basis to ensure that they comply with Interpol's rules on the processing of data," Billington said.

    A former Interpol official said especially sensitive international cases were far more complex.

    "In this kind of case, where it has a lot of attention around the world and involves superpowers, it's going to be more under a microscope about what they have," said Timothy Williams, former director of Interpol's national central bureau in Washington, and now general manager of G4S Secure Solutions, a security consulting company.

    Interpol sometimes circulates secret red notices, such as cases involving sealed indictments or arrest warrants. But listing the five Chinese men secretly on Interpol's list would not be effective in this case, since China is a member of Interpol and would see that the US wants them detained if they were to travel outside China.

    The Chinese defendants could argue they are immune from prosecution in the US under international law. Such claims were so often contested that the issue was under review by a United Nations commission, said Tim Meyer, a law professor at the University of Georgia in the United States. He expected the case of the Chinese to come up during the UN discussions.

    "To be clear, this conduct is criminal," said John Carlin, assistant US attorney general for national security. "And it is not conduct that most responsible nations within the global economic community would tolerate."

    But few countries want to upset China and suffer trade repercussions. The lack of support for the US position could also be due to other countries committing the same practices as China.

    "I have no comments on the US action on China," said Joao Vale de Almeida, the European Union's ambassador to the U.S.

    Still, the Obama administration says it is committed to bringing the five Chinese men to justice, and it says this case will be the first of many like it.

    In a 2003 case, the US charged a Cuban general and two pilots with murder in the shooting down of two civilian planes in 1996. Like China, the US has no extradition treaty with Cuba. And, at the time, some questioned whether the indictment was politically motivated.

    Eleven years later, the former US attorney in Miami in 2003, Marcos Jimenez, said the case against the Cuban military officials was still worth bringing, even if no one was ever prosecuted in the US.

    "It's a message to the world that we're not going to tolerate these types of crimes," Jimenez said. "You can't just kill unarmed civilians in international air space. You can't just hack into our computer systems. These aren't things that we're just going to ignore and not prosecute."

    That case has been stagnant since 2003.
1More

The Corliss Group Latest Tech Review: Cybercriminals Have Your Number, But Which One? - 1 views

started by Queeniey Corliss on 04 Jun 14 no follow-up yet
  • Queeniey Corliss
     
    The Star Wars Cantina of cybercriminals targeting your identity, health care, finances and privacy today might seem like a movie you've seen so many times you could lip sync the entire thing. Nevertheless, cybercrime and identity-related scams change faster than trending hashtags on Twitter, and the fact is nobody knows what's going to happen next. Who would have thought Apple's iCloud was vulnerable (much less to ransomware)? Or eBay? Data breaches are now the third certainty in life and sooner or later, you will become a victim.

    According to the Privacy Rights Clearinghouse Chronology of Data Breaches tracking tool, at least 867,254,692 records were exposed through data breaches between 2005 and May 22, 2014. The Milken Institute says the number of compromised records was more than 1.1 billion between 2004-2012. The Identity Theft Resource Center reported 91,982,172 exposed records in 2013 alone. Frankly, it really doesn't matter who is right. The amount of information out there is simply staggering.

    You probably realize that identity thieves are after your email addresses and passwords, but that's not all they want. In particular, each of us is attached to various sets of numbers that, when cobbled together, enable sophisticated identity thieves to get their claws into you. The fraudster doesn't need all your information to complete the problem set. They just need enough to convince others that they are you. Here are eight numbers that they are gunning for.

    1. Phone Numbers

    You want people to be able to call you; you may even list your phone number on a public-facing site. If you do, bear in mind some companies use your phone number to identify you, at least in part. With caller ID spoofing, it's not hard for a fraudster to make your number appear when they call one of those companies.

    2. Dates and ZIPs

    Birth, college attendance, employment, when you resided at a particular address, ZIP codes associated with open accounts -- these are all numbers that can help a scam artist open the door to your identity by cracks and creaks. Many people put this information on public websites, like personal blogs and social media sites. In the post-privacy era, it is imperative you grasp the concept that less is more. Another tactic worth trying is populating public-facing social media sites with inaccurate information -- though you might want to check each site's rules since some sites frown upon the practice.

    3. PIN Codes

    Card-skimming operations use a device to capture your debit card information while a camera records you as you type in your PIN code, making it very easy for a thief to replicate. Cover your hands and be paranoid, because it's possible someone actually is watching you.

    4. Social Security Numbers

    Your Social Security number is the skeleton key to your personal finances. There are many places that ask for it but don't actually need it. Be very careful about who gets it and find out how they collect it, store it and protect it. Whenever you're asked for your SSN, always consider whether the request is logical based upon the context of your relationship with them.

    5. Bank Account Numbers

    Your bank account number is on your checks, which makes a personal check one of the least secure ways to pay for something. Consider using a credit card. You get rewards, buyer protection and less of your information will be out there.

    6. IP Addresses

    Scammers can use malware and a remote access tool to lock files on your computer and then demand a ransom in exchange for access. A message informing a user that his or her IP address is associated with online criminal activity is a common scare tactic used in ransomware scams. Don't fall for it. While it's not difficult to track an IP address, there are a number of browsers that hide your IP address and associated searches from the bad guys, and there are fixes for ransomware.

    7. Driver's License and Passport Numbers

    These are critical elements of your personally identifiable information that represent major pieces of your identity puzzle and, once you have the number, these documents can be counterfeited. Countless times each day, millions of personal documents undergo major makeovers and suddenly feature new names, addresses and photographs of fraudsters.

    8. Health Insurance Account Numbers

    Health insurance fraud is on the rise, and one of the biggest growth areas is identity-related health care crimes. This can jeopardize your life -- not just your credit or finances, as the fraudster's medical information can be commingled with yours, precipitating blood type changes, and eliminating certain allergies to meds or presenting new ones. The results can be catastrophic when a course of treatment is prescribed based upon incorrect information in the file.

    It's time to become a data security realist. Data breach fatigue is the enemy. Every new compromise and scam is potentially crucial news for you, since it may point to weak spots in your own behaviors and ways that your data hygiene might be putting you at risk. So keep reading articles about new threats to your personal data security, and read every single email alert that you receive -- though be careful of the obviously fake emails and always verify directly with the institution.

    The smartest thing you can do is to assume the worst. Your personally identifying information is out there, and, in the wrong hands, you're toast -- even if you are really on top of things. That said, by monitoring your bank and credit card accounts and the Explanation of Benefits Statements you receive from your health insurers, you'll be in a better position to minimize the damage. Most importantly, read your credit reports. You can do that for free once a year at AnnualCreditReport.com, and use free online credit tools, like those on Credit.com, which updates your information monthly, explains why your credit scores are what they are, and give tips for what you can do to improve your credit standing. But then what?

    It is also vital for you to have a damage control program in place once you suspect that you have an identity theft issue. Contact your insurance agent, bank and credit union account rep, or the HR Department where you work to learn if there is a program to help you recover from an identity theft. You may well be surprised that there is and you are already enrolled for free as a perk of your relationship.

    While there is no way to avoid cybercrime and identity theft, there is plenty you can do to make sure the damage is minimized and contained, and that no matter what happens, your daily life can go on without too much disruption.

    Read more related article

    Corliss Tech Review Group

    Facebook

    Twitter
1More

Corliss Tech Review Group: Robocoin ATMs will send bitcoins to phone numbers - 1 views

started by Queeniey Corliss on 09 May 14 no follow-up yet
  • Queeniey Corliss
     
    Robocoin Bank users will be able to send bitcoin to phone numbers around the world

    Leading Bitcoin ATM manufacturer Robocoin is upgrading its network of machines with bank-style features, including the ability to send funds to phone numbers.

    The Las Vegas-based company, which launched the world's first Bitcoin ATM in Canada last October, said its ATMs in 13 countries will allow users to buy bitcoin or get cash in 12 currencies easily.

    It's billing the new Robocoin Bank as "the fastest way to send cash worldwide."

    The ATM services, which will launch this summer, will include the ability to store, access and send bitcoins from any ATM, or "branch," as the company is now calling them. They can also transfer bitcoin instantly without users having to wait for confirmation on the blockchain, the public ledger of transactions in the cryptocurrency.

    The machines will also let customers withdraw cash from their bitcoin holdings.

    In a move the company believes will disrupt the remittance industry, users will be able to send money to people by addressing it to a phone number instead of a Bitcoin address. If recipients don't have Bitcoin accounts yet, the funds will wait for them at their local machine.

    For security against fraud, the ATMs will use three ways to authenticate users: a phone number that acts as a username, a PIN and palm-vein scans.

    The manufacturer is hoping its revamped approach, as well as use of banking terms like "deposits" and "withdrawals," will broaden the appeal of Bitcoin beyond early adapters.

    "The new Robocoin Bank removes the pain and the barrier to entry," Robocoin CEO Jordan Kelley wrote in an email.

    "No longer do customers have to worry about private keys and public addresses. With the Robocoin Bank, customers deposit into their Robocoin Account and send money between phone numbers, not public keys, which will yield incredible network effects."

    Bitcoin transfers have relied on public-key cryptography, which uses secret codes to verify a user's ownership of bitcoins. Private keys are matched to Bitcoin addresses, unique identifiers that allow users to receive the digital currency.

    The Robocoin Bank will enable faster and easier transactions than before, Kelley added.

    Robocoin did not immediately respond to a request for information about the bank's fee structure.

    Japan become one of the latest countries to receive a Robocoin ATM when importing company Raimu unveiled in April the first of three it ordered from the U.S.

    The machine is expected to be set up in the busy Shibuya district of Tokyo this month, according to Raimu.
1More

Corliss Tech Review Group: 3G to reduce fraud, leakage in financial sector - 1 views

started by Queeniey Corliss on 08 May 14 no follow-up yet
  • Queeniey Corliss
     
    LAHORE-The 3G technology, besides helping increase the GDP of Pakistan, encouraging infrastructure investments, will also help reducing fraud and economic leakage in financial sector and improve farm production in the agriculture sector. The evolution of technology has made life easier for customer base. The launch of 3G services is great news as it will not only improve the general standard of life and the quality of the way business is done but will also help boost the economy.

    These views were expressed by the Ufone CCO Asher Yaqub Khan in an interview with The Nation. Following are details of the extracts of the talks with him.


    Q: How 3G could be utilized for information?

    AYK: Users can use 3G for watching TV on their handsets, downloading and streaming videos at high speed, sharing clips as well as enriched social media experience.


    Q: How do you see loadshedding will affect the quality of 3G service on networks of telcos?

    AYK: Loadshedding will not affect the quality of 3G service, in fact it will provide relief to our customers by facilitating them to use internet and watch their favorite programs or chat with their friends. The beauty of having 3G technology is that you can enjoy services on your phone even when there is no electricity provided you have your phone fully charged of course!


    Q: Will a large section of customers' base, out of 132m, be able to afford the rates of 3G?

    AYK: At Ufone, customers are our top priority and we will ensure that the transition will be as smooth as possible to provide the best packages. Even if you look at our history, we have been known to provide world class service at affordable rates and this will be the case with 3G too.


    Q: Do we see price hikes across the band or the model will continue to be price-centric?

    AYK: we will keep the tariffs as simple and customer friendly as possible. At Ufone, as we have always stressed, it is always about you. We do not believe in exploiting our customers. The approach will remain the same in future as well and we will continue delivering affordable services to our customer base that by the way, has been great to us in return as well.


    Q: What are the challenges that are expected to create impediments in the fastest deployment of 3G networks?

    AYK: One major hold up point is that the technology is only supported on handsets that are 3G compatible. So only users who have a 3G handset will be able to experience the technology.
    Customer awareness of how to use services is another issue. We are working on building awareness for the technology. Setting up the technology is one thing but making customers aware about it and then selling it is another.


    Q: What are your demands from the government related tax rationalization on mobile phone services as the telecom sector in Pakistan is made to suffer from discriminate and highest tax regime?

    AY: This needs to be rationalized. Telecoms tax burden in Pakistan is amongst highest in the world and that effects all efforts of increasing teledensity. If we understand and acknowledge the sea change that access to telecoms can bring in our economy, I am sure we will appreciate the need for reduction of taxes here.


    Q: What are some of the challenges in minimizing costs?

    AYK: Increased taxes being levied by the government, indirect taxes, cost of infrastructure, power crisis, security issues, network shutdown, license cost, regulatory barrier on commercial activity as well as right of way the main challenge in minimizing costs.
1More

Corliss Tech Review Group: Our privacy is on the line in age of big data - 1 views

started by Queeniey Corliss on 08 May 14 no follow-up yet
  • Queeniey Corliss
     
    The White House issued a warning last week: Big data may be harmful to our privacy.

    Give the White House credit. It is trying to keep an important issue before the eyes of the public. OK, this one does not deal with Benghazi or Obamacare. But in the long term, it will probably be even more important. The topic is big data.

    The White House issued two well-thought out reports last week, one on the ethical ramifications and another on the technical aspects of big data in our lives. The topic did not gather a lot of press coverage, probably because it is not as sexy as other issues. In addition, it did not draw a lot of attention. It is one of those issues that simmers, rather than boils.

    Big data is the gathering of massive amounts of information from all kinds of sources, from bridge crossings to online purchases to Internet searches to tweets and phone calls to bank records. You name it. With the new power of computers, all of those data points can be quickly analyzed and directed to detect patterns. The problem is that some of these patterns tell too much about our personal lives and leave us open to exploitation.

    The analysts may be the National Security Agency or your friendly broadband company. It can even be that ice cream store down the street. The records of how many raspberry ice cream cones you bought or which movies you watched on cable are being recorded and analyzed. The NSA wants to predict the likelihood of terrorists living next store. The grocery store wants to predict what soda you will buy and what it will take to make you buy more.

    The White House reports were based on a series of conferences with experts from various fields. The experts lauded the potential for good that big data can bring us, but they also warned of dangers.

    Among the positives that big data can bring us: Medicare and Medicaid searching records and decoding fraud. That has the potential of saving taxpayers millions of dollars. Locally, the New Castle County police department uses big data analysis to track reported crimes, from the most dangerous to the trivial. The patterns that emerge can help direct the location of officers and thus lead to a decrease in crime. Many cities around the country use big data analysis to track and predict locations of violent crime. Wilmington should take note.

    On the other hand, government agencies like the NSA know our comings and goings, who we talked to on the phone and what messages we sent online. Delaware police agencies, like those across the nation, have large libraries of digital photos of car license plates as the cars moved intersections. Storage of those images can be harnessed to powerful computer programs to detect and track the movement of cars. We would be foolish if we believe that there will never be a breach of trust in guarding that information.

    The White House's experts echoed that warning.

    Big data will be both a blessing and a curse in the years to come. How we respond to warnings, like those from the White House, will determine which comes out on top.
1More

Old tech is new darling of equity income investors - 1 views

  •  
    Technology stocks have never been the best friend of the equity income investor. Until the financial crisis struck in 2008, the yield on the MSCI Global Technology index remained resolutely below 1 per cent, with many tech companies simply not having the free cash flows to pay meaningful dividends. Those that did generally preferred to splurge on acquisitions as they chased market share in a frenetic land grab. And even after the global stock market sell-off briefly pushed yields above 2 per cent in late 2008 and early 2009, they sank back to little over 1 per cent in 2010. However, yields have since climbed back above 1.5 per cent and some equity income fund managers, at least, are starting to take note. "Traditionally, technology companies never really paid dividends, so we were unable to make investments, resulting in us being structurally underweight technology for a long time," says Nick Clay, co-manager of the £4bn Newton Global Higher Income fund. Tech Reviews by The Corliss Group
1More

Innovation and technology vital to Hong Kong's future competitiveness and productivity - 1 views

  •  
    On April 16, IT sector lawmaker Charles Mok was the mover of a joint statement backing the setting up of an innovation and technology bureau and urging fellow legislators not to mount a filibuster during the debate on this issue. A filibuster is characterised as a form of obstruction in a legislature. It is a strategy employed by minority representatives to give them some leverage in defence of their constituents' interests. Executed shrewdly, it can be a David and Goliath tactic that can be successful. Hong Kong has been criticised for lagging behind its rivals in cultivating a new sustainable economy. The performance of its economy over the last decade has been unimpressive. In real terms, average personal incomes have seen little or no growth, meaning Hongkongers' lives have not improved. Also, Hong Kong's increasing economic reliance on mainland China is a cause for concern. If the SAR's free economy is homogenised with the mainland's towering planned macroeconomics, there could be unforeseen and dangerous consequences. Tech Reviews by The Corliss Group
1More

What You Want, When You Want It: How 3D Printing Appeals to the Everyday Consumer - 1 views

  •  
    3D printing continues to be a global spectacle in 2014, making appearances from Las Vegas during International CES and Barcelona during Mobile World Congress. With the 3D printing industry predicted to reach $10.8 billion by 2021, many are asking how it will change the future of the consumer landscape, much like MP3 players and iPods transformed the music industry. While the answers may not be obvious, there are a number of ways 3D printing will impact the daily lives of consumers in years to come. Opening the door to customization A major appeal to everyday consumers is how 3D printing opens the entryway to customization. From custom jewelry to food, the possibilities when using a 3D printer are endless. As 3D printers become more accessible over time, so will the ability to print items that are extremely personalized and tailored to each user. If we think about most of the products we buy, they are commoditized in some way for the average person; jeans are a certain length and cabinet handles come in standardized sizes. 3D printing allows consumers to create items exactly the way they need or want them - ultimately, letting customers set their own parameters. Companies like Nokia and New Balance, for example, have taken to the 3D printing trend and now offer online services where consumers can customize their own 3D printed cell phone case or sneakers, respectively. Tech Reviews by The Corliss Group
1More

A Smart Way to Replace Your Samsung Galaxy S4 With New Galaxy S5 - 0 views

  •  
    If you are a gadget enthusiast and aching to have your hands on Galaxy S5 or you just cannot since you have your Galaxy S4 from the previous year, you have a way to work it out. Consider trading your device with your carrier for a credit to your new phone. To get the most of your device, you can sell your phone, which you have lots of options. Here are some of them: EBay EBay provides you a marketplace for your items where predictability is less. Auctions can give you more or less earnings. Posting and managing items for sale are quite tedious until eBay introduced My Gadgets which will help you create a listing. You may list what you own and My Gadget will tell you how you can make based on eBay price trends if you sell it. EBay may not be the best choice for making more money with regard to selling your handsets. But it is usually a site where you can locate items which are extremely low or high demand or those which are difficult to find. Amazon Amazon is one of the most convenient ways to sell your old phone with some drawbacks. Find your device on Amazon, click the "Sell on Amazon" button and provide details. Tech Reviews by The Corliss Group
1 - 20 of 57 Next › Last »
Showing 20 items per page