Professional Services Gain Momentum in Data Protection Software Market

Professional Services Gain Momentum in Data Protection Software Market

While Dependency of Organizations Shifts towards In-house Cybersecurity Professionals A major overhaul of data security led by stringent regulatory mandates has caused a meteoric rise in the adoption of data protection tools. Every enterprise dealing with consumer data has to abide by data security laws
Being relevant, leading and remaining differentiated in the era of AI

Being relevant, leading and remaining differentiated in the era of AI

In the previous post "Yes, AI could be smart enough to take your job," I mentioned that AI would affect the way you make a living. It is different from the “industrial revolution” or the “dot-com era” as: AI aims to replace us, not simply make a specific
waterloo-1

Batteryless smart devices closer to reality

Researchers at the University of Waterloo have taken a huge step towards making smart devices that do not use batteries or require charging.

These battery-free objects, which feature an IP address for internet connectivity, are known as Internet of Things (IoT) devices. If an IoT device can operate without a battery it lowers maintenance costs and allows the device to be placed in areas that are off the grid.

Many of these IoT devices have sensors in them to detect their environment, from a room’s ambient temperature and light levels to sound and motion, but one of the biggest challenges is making these devices sustainable and battery-free.

Professor Omid Abari, Postdoctoral Fellow Ju Wang and Professor Srinivasan Keshav from Waterloo’s Cheriton School of Computer Science have found a way to hack radio frequency identification (RFID) tags, the ubiquitous squiggly ribbons of metal with a tiny chip found in various objects, and give the devices the ability to sense the environment.

Postdoctoral fellow Ju Wang (centre) and Professor Omid Abari demonstrate the wireless keypad clicker they invented by hacking RFID sensors with tiny push-button switches.

“It’s really easy to do,” said Wang. “First, you remove the plastic cover from the RFID tag, then cut out a small section of the tag’s antenna with scissors, then attach a sensor across the cut bits of the antenna to complete the circuit.”

In their stock form, RFID tags provide only identification and location. It’s the hack the research team has done — cutting the tag’s antenna and placing a sensing device across it — that gives the tag the ability to sense its environment.

To give a tag eyes, the researchers hacked an RFID tag with a phototransistor, a tiny sensor that responds to different levels of light.

By exposing the phototransistor to light, it changed the characteristics of the RFID’s antenna, which in turn caused a change in the signal going to the reader. They then developed an algorithm on the reader side that monitors change in the tag’s signal, which is how it senses light levels.

Among the simplest of hacks is adding a switch to an RFID tag so it can act as a keypad that responds to touch.

“We see this as a good example of a complete software-hardware system for IoT devices,” Abari said. “We hacked simple hardware — we cut RFID tags and placed a sensor on them. Then we designed new algorithms and combined the software and hardware to enable new applications and capabilities.

“Our main contribution is showing how simple it is to hack an RFID tag to create an IoT device. It’s so easy a novice could do it.”

The research paper by Wang, Abari and Keshav titled, Challenge: RFID Hacking for Fun and Profit-ACM MobiCom, appeared in the Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, October 29–November 2, 2018, New Delhi, India, 461– 70.

Source: UWaterloo News

CloudBuzz

The latest in curated technology related news from around the globe.

CloudBuzz material is source credited with ​attribution.

Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare ...
Adopting An Industry-Wide Red Line Movement

Adopting An Industry-Wide Red Line Movement

Red Line Movement Recently, I’ve been calling for an industry-wide adoption of the red line philosophy to help with the ...
Infosec thought leaders

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it ...
Global Public Cloud Spending To Double By 2020

Global Public Cloud Spending To Double By 2020

The Cloud and Endpoint Modeling The worldwide migration of IT resources to the public cloud continues, at a head-spinning pace ...
5 Recommendations for Effective Governance, Risk and Compliance Management

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues ...

"Top 100 Brand Influencer, Cloud”
-ONALYTICA

"Best Cloud Computing Blog"
-SYSADMIN MAGAZINE

"Top 10 Sites For Cloud Computing"
-DIGITALISTMAG SAP

"Top 10 Cloud Computing Blogs”
-MARKETING ENVY

"Top 25 Must Read Cloud Blogs"
-CLOUDENDURE