Thursday, March 24, 2016

How Software Enabled Volkswagen to Hack Its Cars

Computer hacking has been a problem for as long as computers have been around. No matter how far technology advances, there seems to be a way to penetrate even the most secure programs. Vehicles have come an equally long way, and newer cars rely heavily on computer programs for vehicle diagnostics.

volkswagen

Most people have seen and heard about the incident that shook up the auto industry involving German automaker Volkswagen and how it manipulated computer diagnostics in some of its vehicles. The vehicles were advertised with estimated EPA fuel-efficiency ratings that turned out to be bogus. Consumers who purchased the vehicles were misled, the public was put at risk, and the Environmental Protection Agency was plagued with questions about how easily its emissions testing can be manipulated.


Since OBD is nothing more than a software program that communicates like any other computer, it is vulnerable to outside manipulation. It appears that this what happened when Volkswagen deliberately manipulated the system in its vehicles for the sole purpose of circumventing emissions testing standards. Initially, the recall was said to affect only diesel-based engines, but it was recently expanded to include certain gas-powered models, as well.

What Exactly did Volkswagen Do?

In the case of the Volkswagen emissions hack, programmers accessed the vehicle’s diagnostic computer system and coded it in such a way that the vehicle performed differently under testing conditions. During normal operation, the vehicle’s test mode (known as Dyno Mode) was in an idle state, but when connected to emissions testing software, the vehicle would go into “test mode” and reduce emissions to acceptable levels. In essence, the vehicle’s emission system was hacked so that it knew when it was being tested and was programmed to respond accordingly. However, on the road, the vehicles in question were spewing harmful emissions at a much higher rate.

EPA Response

Volkswagen carried on its emissions hack for years before it was thoroughly investigated by the agency. This is not the first time that Volkswagen has been implicated in manipulating vehicles for the sole purpose of dodging emissions standards, as it was fined more than $100,000 in the 1970s for similar emissions manipulation. When news of the hack broke, the EPA issued a public statement asserting that the automaker used “sophisticated software algorithms” to thwart environmental laws and mislead consumers.

The EPA has a limited budget and would need more resources to expand to include real-world testing. Other government agencies have backed the EPA and stepped in to investigate. The FBI is conducting an ongoing investigations related to Volkswagen.

Meanwhile Volkswagen faces billions of dollars in fines, and possible criminal and civil liability. In addition, it is considering firing or laterally shifting executives. The company issued a nationwide recall affecting hundreds of thousands of vehicles that will cost it billions as it undertakes complex repairs and reinstall emissions software.

Going Forward

On February 2, 2016, Volkswagen submitted a comprehensive recall plan affecting diesel models manufactured from 2009 to 2015, and it vowed to correct the problem. The plan must be reviewed and approved by the EPA before a formal recall is issued. A similar plan was presented and subsequently rejected by California regulators who stated the plan to fix vehicles was “incomplete.” The repair plans have not yet been made public, so it’s unknown if it is as simple as reprogramming the vehicle’s OBD, installing compliant parts, or a combination of the two.

Meanwhile Volkswagen could face billions of dollars in fines, as well as possible criminal and civil liability. In addition, its CEO could resign.

The recall, which will affect nearly 1 million vehicles in the United States alone and 11 million vehicles worldwide, will cost Volkswagen billions as it performs complex repairs and reinstalls emissions software.

The EPA will keep a close eye on all recall repairs going forward, and the situation could put increased scrutiny on all automakers in the future.


Monday, March 21, 2016

NFC Technology: The Good, the Bad, and the Future

Near Field Communication (NFC) has recently experienced a surge in popularity thanks to wireless payment systems and aggressive advertising from smartphone manufacturers. Commercials showcasing NFC’s speed and accessibility show consumers holding their smartphones near NFC terminals to pay for goods and services without ever having to open their wallets.

While NFC technology has been around for just over a decade, its growth was slow initially, particularly in the United States. Since the introduction of the first NFC-enabled smartphone in 2010, the technology has steadily been gaining momentum. Mobile NFC-based payment apps such as Apple Pay, Android Pay, and Samsung Pay have exploded onto the market, and consumers are beginning to come around to the idea of contactless payments.

NFC technology works by encoding information on a special microchip called an NFC tag. The tag stores information that can be transmitted via Bluetooth to other devices equipped with the technology. NFC technology was introduced in 2006, and it has been widely used in Asia and Europe for years. However, it is just beginning to catch on in the US.

Pros – Convenience, Security, and Simplicity

Image courtesy WikiMedia
The convenience of NFC is arguably its biggest draw, and consumers who’ve adopted the technology like the flexibility of paying without ever having to pull out their credit card. For those who have NFC-enabled devices but don’t use them, security is a real concern. Those with reservations about NFC technology may feel that their data is vulnerable to hackers or other outside sources. Smartphone manufacturers such as Apple and Samsung have emphasized that their respective payment systems have a high level of encryption, and even they are unable to see a user’s credit card information. Instead, each user is classified with a unique identifier that is specifically tied to their encrypted data.

In addition to individuals, businesses can benefit greatly from adopting NFC technology. Since mobile wallets are encrypted, retailers with NFC payment terminals can offer their customers a level of security that alternative payment methods cannot. For example, the Apple Pay smartphone application encrypts credit card data and adds an extra layer of security if a user chooses to use fingerprint security. This ensures that only the intended user can use Apple Pay to make payments and comes in handy should the phone ever be lost or stolen. Customers do not have to worry about merchants having their actual credit card number on file, as all of their information remains encrypted in their smartphones.

Cons – Vulnerability of Information, Availability, and Ease of Use


Proponents of NFC technology swear by its safety and insist that using it is the safest way to pay. Unfortunately, criminals are usually one step ahead of technology, and they spend a lot of time figuring out how to steal sensitive data. Card skimming is one of the most widely known ways for criminals to access credit card information just by standing close to the victim. NFC technology makes stealing credit card information even easier than skimming because the NFC signal emitted can be intercepted from several feet away, even with mediocre interception devices.

Image courtesy B Rosen | Flickr
Any NFC-enabled device can be compromised if an NFC reader is nearby. A criminal does not need to be within arm’s reach of a victim to steal his or her credit card information. This is the one of the main reasons why NFC skeptics avoid this technology.

While no payment method is 100% safe and secure from the prying eyes of hackers, NFC is in fact more secure than traditional payments, particularly the old-school magnetic stripe cards that are gradually being replaced with embedded chip cards. America seems to be lagging behind in payment security in comparison with Europe and other countries, but with recent banking security breaches, security is important now more than ever before.

Going Forward – What the Future Holds for NFC Technology

What else is NFC used for other than paying wirelessly at a retailer? In 2011, global payment processor PayPal implemented technology that allows account holders to send money from one NFC-enabled smartphone to another. This is a major way to facilitate peer-to-peer transactions, such as splitting a bill at a restaurant or paying back a personal loan without the hassle of going to the ATM or carrying cash.

In to further simplify things, merchant loyalty cards can be stored in each phone’s mobile wallet. As a result, consumers have fewer cards to keep track of, and they can redeem them for valuable savings. Retailers can gain valuable insight into customers’ buying patterns and increase mobile marketing efforts. Southwest Airlines and Ticketmaster have already implemented NFC-enabled ticketing, which saves time and paper. NFC is exciting technology that has a lot of untapped potential, but it’s still unclear just how long it will take to catch on with the masses.

Thursday, March 17, 2016

Wireless Cities Are Helping People Communicate on the Go


Although it has had a slow start, wireless Internet has since taken over and can be found at a variety of locations, such as hospitals, airports, and even fast food chains. Coffee shops are often filled with customers who pop open their laptops to study or work while enjoying their favorite beverages. Wi-Fi has become so commonplace that so-called wireless cities are slowly forming across the U.S. A wireless city basically has implemented an open wireless network that enables users to access it anywhere within a certain radius. In these cities, there is no need to step into a coffee shop or library since the entire city is essentially one big Wi-Fi hot zone. The wireless networks can even be accessed in outdoor areas like parks and city streets.

Benefits


In the case of Tempe, users pay a fee to access wireless Internet around the city. This serves to bring in much-needed revenue for the city, provide visitors and residents with access, and keep connection speeds at optimal levels. The paid structure avoids the common pitfall of painfully slow Internet connections that often plague free wireless hot spots.

Drawbacks

Having an entire wireless Internet infrastructure is a great thing for residents, businesses, and the cities themselves, but this technology is not without drawbacks. With technology developing at lightning speed and constantly evolving, it can be costly to transition cities to a totally wireless network knowing that the technology is likely to be replaced by something newer and faster in the near future. Smaller municipalities often have to deal with state-imposed restrictions, and it can take years — sometimes decades — for municipal Wi-Fi to come to fruition.

With widespread Wi-Fi access, networks can quickly become congested and cause limited connectivity. If the increased network traffic is more than just temporary, outages will happen more frequently, and cities must then consider upgrading their networks to have adequate bandwidth. Financial consideration must be taken into account when an upgrade is in order. Tourists are attracted to wireless cities, longtime residents consider it a benefit of staying put, and citywide Wi-Fi is a definite draw for those contemplating relocation.

What’s Next?


Cities all over the United States are jumping on the citywide wireless Internet trend, and it can be expected to grow exponentially in the next decade. The city of Boston has an extensive wireless network and provides users with access points in convenient locations. Los Angeles, Oklahoma City and Ocean City, Maryland have all adopted citywide Wi-Fi access, and it has largely been a positive addition. The challenges that plague municipal Wi-Fi may deter more cities from hopping on board and with so many hot spots already available, bringing this technology to a city near your may not be at the top of the priority list.

Monday, March 14, 2016

Encryption Software at the Heart of Apple’s Battle with Government

A San Bernardino couple launched a deadly attack at a government rehabilitation center on December 2, 2015 that resulted in 14 deaths and more than 21 injuries. Aside from the firearms used, the cell phones of the suspects were the subject of intense law enforcement scrutiny. In order to determine a motive, investigators sifted through shipping records; interviewed co-workers, neighbors, and family; and even combed the suspects’ social media posts.

To date, federal investigators have been unable to get their hands on any information contained in the smartphone of suspect Syed Rizwan Farook due to Apple’s refusal to allow access to the server. The FBI issued a warrant for the data contained in Farook’s phone, but received a flat-out refusal from Apple. Apple cites privacy concerns that go beyond individual users and asserts that accessing data cannot be accomplished without potentially compromising the data security of millions of iPhone users.

How Apple Approaches User Privacy

In addition to the built-in encryption software, Apple has gone to great lengths to increase privacy from the user’s end. There is a two-step verification process that requires users to enter their Apple ID credentials for functions like making purchases, making account changes, or setting up a new device. In the event that an iPhone is lost or stolen, a user can access their iCloud account from another device and remotely lock the device to prevent information from being accessed. Remote Wipe allows users to completely erase data from the iPhone should it end up in the wrong hands.

Apple uses what are called tokens to transmit and store encrypted data on its iPhones. Tokens store information on the phone itself and on Apple’s servers, as well as in the cloud (Apple’s proprietary cloud software is called iCloud). The data is subject to high-level encryption that obscures credit cards stored in Apple Pay and passwords stored in Apple’s Keychain and emails, just to name a few.

These privacy features are so secure that Apple asserts that it cannot directly access the information stored on a user’s iPhone. While this eases fears of prying eyes accessing sensitive information, it presents a huge problem when law enforcement has a legitimate need to access phone data during an investigation.

Apple’s Encryption Software

Apple devices have been praised for their high level of security and the encryption in its devices. Although no device is 100% safe from unauthorized data access, Apple has gone to great lengths to protect user information. In fact, Apple’s encryption software is at the heart of the conflict with the FBI.

As details began to emerge about the San Bernardino shooters, officials attempted to access the data in Farook’s iPhone but thanks to encryption software it proved impossible. Apple’s software ensured that the phone’s data would be permanently erased after several unsuccessful password attempts. Once the FBI was made aware of how the data encryption software functions, it was compelled to request the data from Apple directly.

Apple CEO Tim Cook insists that the encryption software is so secure that the company itself cannot even access the information. Cook stated that in order to access data from any user’s phone, the code for the company’s encryption software would have to be completely rewritten. This would not only be a major undertaking for Apple, but it would essentially open the door to every iPhone owner’s personal information.

While this is certainly not the first time that Apple has been ordered by a court to unlock an iPhone, it is one of the first instances since the company rolled out the iOS 8 update in 2014. The update included encryption software that cannot be accessed by a third party or Apple. Previous iOS versions could be accessed in certain circumstances, especially when law enforcement requested the information. The update came on the heels of widely publicized iPhone data leaks – some of which involved celebrity photos – so Apple had a lot at stake and sought to quell criticism of its privacy protection efforts.

Current Issues

Although the company has cooperated with law enforcement in the past, Apple does not make it easy to access information, and each request is reviewed on a case-by-case basis, even if a search warrant is issued. According to the Apple website, “National security-related requests are not considered Device Requests or Account Requests and are reported in a separate category,” which may change the way that Apple handles requests similar to the ones related to the San Bernardino case.

Going forward, it’s uncertain if Apple will find a way to comply with the federal government’s request for information. The FBI is losing patience with Apple and has accused it of sympathizing with terrorists. In 2014, Cook said "[We] have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will."

It appears Apple’s stance has not changed since then. Just last week, Los Angeles Court Magistrate Sheri Pym ordered Apple to allow the federal government access to Farook’s iPhone data. The order asks Apple to supply the federal government with software that would enable it to access data, but so far Apple is holding firm in its stance and has refused.

Thursday, March 10, 2016

How Businesses Can Manage Multiple Social Media Accounts

business
Most business owners maintain their own personal social media accounts and, in some cases, would prefer to keep their business and personal accounts separate. On the surface, it may seem unnecessary to have multiple social media accounts across multiple platforms. However, depending on the type of business , it may make perfect sense. Another popular reason for having multiple social media accounts is when a business owner runs several types of businesses that shouldn’t necessarily share a social media account. For example, you may be a personal trainer who also runs a web design business, and would like to keep these two lines of business separate.

While many companies have a love-hate relationship with social media platforms, few can deny how social media impacts their business. Some business owners steadfastly hold off on adopting any business social media pages, and this could prove to be a big mistake in the long run. Even for a tech-savvy CEO, managing multiple social media accounts can be overwhelming and detrimental to overall productivity. Here we explore some common reasons for having multiple social media pages and helpful tools for managing multiple social media platforms, and how you can make the most of what each one has to offer:

Buffer - Social Media Scheduler

Instead of manually posting information whenever you remember to do so or being unsure of the best time to post something for more visibility, Buffer takes the guesswork out of the process by scheduling social media communications for you. Whether it involves a brick-and-mortar business announcing a last-minute change in business hours or an online store sending out information about a big sales promotion, scheduling content is a strategic way to improve your business while simultaneously freeing up time for yourself.

buffer logo
Buffer takes care of all the behind-the-scenes work of logging in and analyzing target markets with sophisticated analytics that would take an immeasurable amount of time if undertaken by a human. Using Buffer increases productivity that can easily be lost in a sea of updates, posts, and feedback.

Buffer is available for the iPhone and Android, as well as a browser extension for Safari, Opera, Chrome, and Firefox. It’s free to sign up for an Individual Plan, which allows users to manage one account per social media platform (i.e., Facebook, Twitter, etc.). More feature-rich plans begin at $10 per month. The Large Business Plan, which is $250 per month, allows multiple users.

Sprout Social - An Integrated Social Media Inbox

Sprout Social is a powerful tool that helps users to easily comingle their social media channels through an easy-to-use application. All accounts can be viewed in one news feed or separated within the app for a high level of customization. As a result, social media managers or small business owners can avoid having to constantly check various social media platforms and log in and out of each one, thus eliminating the need to search for information across platforms.

sprout social logo
Sprout Social is great because it not only provides users the ability to post and review content, but it can also be used as a way to respond to customer service queries initiated on social media sites. Customers have the opportunity to not only brag about their great experience, but also to post their dissatisfaction on social media sites. Sometimes these complaints go viral, providing potential customers with a negative impression of the company. Statistics show that only 15% of customer complaints are addressed on social media, but companies that are able to address customer concerns stand out. Sprout Social can reduce the likelihood that you will forget your login credentials or accidentally log into the wrong profile - both of which are unnecessary time wasters and could cause costly mistakes.

Hugely successful corporations like the cloud service Dropbox and the health food chain Whole Foods have endorsed Sprout Social as an important part of their social media communication efforts. Sprout Social offers a 14-day free trial, and per-user monthly subscriptions start at $59 per month for the Team Plan, which covers up to three users for $500 per month.

Both Sprout Social and Buffer can be used by business owners themselves, but they are especially helpful for social media managers tasked with keeping it all together. Social media marketing professionals work closely with business owners to determine the best way to draw in more leads, push content, and connect with customers. Social media managers handle the day-to-day social media grunt work, allowing business owners to do what they do best: manage their companies.

Social media platforms such as Facebook, Twitter, and Instagram help business owners to communicate with their clients like never before, and customers increasingly look to a company’s social media accounts to learn more about their products and services. Controlling social content is extremely important for protecting your business, and these management tools can streamline the process.

Tuesday, March 8, 2016

Web Analytics Software Can Save Time and Money

analytics
Web analytics software is designed to gather information about a website’s visitors. Google has its own unique version of web analytics software that uses a complicated algorithm to collect and rank websites. Website analytics involves more than just keywords. It is a sophisticated system that provides data on how a website’s visitor ended up there (typing a web address vs. being redirected from another website), what links the visitor clicked, and at what point they navigated away from the website.

Web analytic software is a valuable tool for ecommerce since it effectively identifies consumer behavior. Merchants can then fine-tune their websites to drive sales, study market trends, and improve the customer experience. While Google Analytics is arguably the most well known and widely used web analytics software, there are other contenders doing great things, as well. While lesser known, the software described here offers powerful web analytics, as well as other benefits:

Varvy.com – Understanding Google’s Search Engine Guidelines

For the inexperienced, it can be difficult to understand the inner workings of Google Analytics and keyword rankings. Varvy.com seeks to make the learning curve less steep with an automated way to analyze any website specific to the established Google guidelines. Varvy.com is free to use, and users can simply enter a web address for detailed information on site maps, compliance with Google’s webmaster tools, the number of links on a website, and a host of other valuable information.

varvy logo
Varvy.com not only allows users to analyze website data. The site seeks to educate users on the ins and outs of web analytics and how they can affect your bottom line. Once a user submits a website to be tested, the individual is provided with a detailed report of what was found, what the data means, and what steps should be taken next.

The website has a variety of articles and blog posts that provide information on common website pitfalls to avoid, tips and tricks, and an explanations of complicated web analytic concepts. In addition to web analytics, Varvy.com provides information on website speed, mobile SEO, WordPress plug-ins, and a host of other useful tools.

Varvy.com is completely free and can be accessed from anywhere, ranging from a desktop computer or laptop to a smartphone or tablet.

Cyfe – One-Stop Shop for Web Analytics

Cyfe developers state that businesses waste up to 80% of their time analyzing website data. Described as an “all-in-one dashboard ,“ Cyfe is filled with features to help users gather and interpret important website data. Cyfe goes further than common social media analysis tools to provide users with a thorough overview of a multitude of online activities using widgets. The widgets within the Cyfe app pull data from various pages all over the web and neatly present them in a sleek interface. Information can then be used to drive sales and target marketing efforts. Cyfe provides a variety of widgets that are commonly used and offers the ability to create customized widgets that aggregate data from company-specific applications and programs.

cyfe logo
The premium version of Cyfe analyzes data and conveniently stores 30 days’ worth, with historical data being archived so that it’s always accessible. The ability to review past data is a wonderful way to guide future decisions and provides a clear picture of past successes and failures. Another great feature is financial integration with widgets for popular sites like PayPal, Freshbooks, and QuickBooks. Cyfe even includes valuable keyword ranking so that users are better able to target the content pushed to their websites. The feature alone is worth the price of a premium Cyfe subscription.

Signing up for Cyfe is free, but upgrading to the premium level is only $19 per month, and a discount is given for annual subscriptions that are paid in full. For this price, users get a great deal of functionality in comparison to similar apps that offer less functionality. Cyfe is available for Android and iOS, and it can be accessed from a desktop computer, as well.

Technology continues to move at a rapid pace, and business owners need up-to-the minute communication now more than ever. Widespread access to the Internet makes competition stiff, and websites that are optimized for this rapidly changing environment will continue to outperform those that are not. It’s simply not necessary to squander countless hours analyzing data on your own when technology can crunch the numbers for you in a fraction of the time.

There is no shortage of web analytics software available, and most cost much more than those described here. These programs provide a great deal of benefits for very little money, proving that it is not always necessary to spend a lot of money for effective web analytics software.

Friday, March 4, 2016

How Secure Is Your Banking and Financial Information?

More and more people are managing their finances via the Internet nowadays because of the ease and convenience it affords. However, there are drawbacks to every technological advance, and in the case of online banking, the threat of experiencing a security breach is real. Large banks like Chase and Citibank, as well as smaller regional banks, have been the subjects of security breaches that have cost them millions of dollars to remedy and have shaken customer confidence.

While the security situation is serious, there are some common-sense precautions, online banking customers can reduce the chances of their financial data being stolen. In addition, banks and other financial institutions are constantly improving online banking technology to improve the security of their customers’ information.

Bank Security

online banking
Bank fraud has always been an issue, even before the Internet Age, but new technology has enabled scam artists to access networks and sensitive information at a higher rate than ever before.

Current technology helps to alert the bank to fraud before major damage is done and often prevents it from happening in the first place. For example, sophisticated telecommunications advances in the last decade have given banks the ability to immediately shut down a compromised debit or credit card. Banks are also becoming more adept at thoroughly investigating potential fraud and resolving disputed transactions quickly.

Online Banking

Most people have heard about Internet-only banks that have no brick-and-mortar locations. These banks market themselves as a great alternative to traditional banks, enticing consumers with generous sign-up offers and low fees. Although most Internet banks are legitimate and provide great service at a low cost, customers should make sure they are dealing with a legitimate bank before trusting them with personal information or money.

Of course, traditional banks have also jumped on the online banking trend and now offer a wide range of services to help customers avoid the need to visit their local branch. One of the most popular online-banking features—the ability to remotely make a deposit—allows customers to deposit a paper check by simply taking a picture of it. Bank customers can also perform transfers online and use services like PopMoney and Chase QuickPay to send money to other people straight from their smartphone.

However, once a customer begins accessing their banking information online, there are some basic yet important steps they should take to safeguard their financial information. First, people should make sure they are accessing their bank’s website over a secure Internet connection, preferably from their home or another closed network. While it may be tempting to access one’s online banking while sitting in the airport or a local coffee shop, this is not the most secure method and theoretically it can expose private information to any seasoned hacker. Also, online banking customers need to check their accounts on a regular basis so that they can quickly spot any fraudulent charges.

Using Your Smartphone or Tablet for Banking

iphone
People should always use caution when accessing their financial information on their smartphone or tablet. While it can be tempting to check one’s account balances while waiting in line at the store, this is a bad idea. Aside from prying eyes that may be able to see passwords and balance information, some fraudsters frequent retail stores for the sole purpose of stealing the information of unsuspecting shoppers.

If online banking customers own a phone that has Near Field Communication (NFC), they should be extra cautious, because this technology is a scammer’s dream. Thieves have figured out a way to access NFC communication on a nearby device, thereby enabling them to steal personal data. If a person uses phone-based payment methods like Apple Pay or Android Pay—both of which store credit card information—nearby scammers can access it. Again, monitoring one’s transactions and even enabling e-receipts and notifications from the card issuer can help customers stay on top of any suspicious card activity.

Online banking technology has indisputably made people’s lives easier. But, while the technology behind this phenomenon continues to evolve, it is wise to stay alert and be diligent about protecting all passwords and private information. Only by protecting their information can people make the most of modern banking technology.