Tuesday, January 21, 2014

Free apps for messaging

Viber


Viber combines the best of rival services such as Skype and WhatsApp. It's free, and allows you to send messages and make calls for free to other Viber users.

Aber requires your phone number and an activation code to get started, then scans your contacts list to see if any of your friends are using the service. You can then send messages to individuals or groups, and make calls (although there's a charge for ringing non-Viber users from the app). The call function, plus a cleaner experience, puts Viber ahead of WhatsAppr but its worth keeping track of storage and data consumption - voice messages, calls and conversation threads can quickly gobble up your space and allowance.

WhatsApp

WhatsApp is the Android and iOS answer to BlackBerry Messenger, allowing you to send notes to friends or groups of friends at no (or little) cost. The app is free to use for a year, then requires a small annual subscription. It's hugely popular, so ifs likely a good chunk of your contact list will already have WhatsApp, making it a cheaper way to send video, picture and intern.ational messages than SMS.

GroupMe

GroupMe offers similar goup messaging features to WhatsApp - but it offers one advantage, despite its smaller userbase. The service is owned by Skype, which means its Windows Phone app is updated at the same pace as the i05 and Android versions. It lacks some of their features, but GroupMe may be a good option for Windows Phone users waiting patiently for other apps to update.

Monday, January 20, 2014

Adidas miCoach - free app

The wide-ranging miCoach from adidas is one of the few quality iOS and Android fitness apps to make it onto Windows Phone. Its genius lies in its range: you can use it as a GPS tracker like any other mobile fitness app, but the optional accessories - from a heart -rate monitor to the X_Cell motion tracker - turn miCoach into a tracker for pretty much any sport or activity. Its aimed more at the serious athlete than the sporadic jogger, but ifs free if you want to try it.

Sunday, January 19, 2014

Free iOS app: ingogo

Focusing on Sydney and Melbourne - for now - ingogo is one of the most convenient ways to book an.d track a taxi. The real draw of the app is that it's something that works at the driver end, so you can track their approach and even communicate directly with them in case of any delays. It's very handy!

Saturday, January 18, 2014

HOW THE FUTURE OF SECURITY COULD BE YOU

FORGET ABOUT PINS AND PASSWORDS — THE HUMAN BODY COULD PROVIDE THE ANSWERS TO ALL OUR SECURITY QUESTIONS. DAVEY WINDER INVESTIGATES

Apple has reignited the biometric-security debate by including a fingerprint scanner on the iPhone Ss. However, the possibilities for authenticating our devices using our bodies goes much further than our fingers.

Forget fingerprints; passwords are passé: what about smartphones that measure he hands 'shake" when clicking icons; keyboards that analyse the speed and style of your typing: and wearable computers that track the way you walk and the pattern of your heartbeat?

All of the above are being researched and developed right now - which isn't as surprising as it may seem. The top-end smartphones in our pockets are already highly sophisticated sensor clusters containing accelerometers, gyroscopes, compasses, thermometers, GPS units and biometric readers.

In this feature, we reveal how these 'measurement of me" authentication systems work, when we're likely to be able to use them and whether they really do offer greater security than your existing password.



UNIQUE HUMAN BEHAVIOURS
Think biometrics, and chances are you'll picture fingerprints. If you're more imaginative - or up on your security reading - you may also think of facial or iris recognition. However, biometrics has moved on from these relatively simplistic measures of an individual, and can therefore be used as a method of authentication within the security sphere.

There are many unique human behaviours that can be monitored and together build up a biosignature that's impossible to forge - think in terms of your gait as you walk, the pressure you exert when you tap or swipe a touchscreen, or even the routines you follow in a typical day. While such authentication alternatives sound advanced, they must prove their mettle against the oft-abused but ubiquitous password to ever become widely used.

To start, let's consider SitentSense! an authentication framework being developed by researchers at the Illinois Institute of Technology, which uses data mined from "touch behaviour", including user biometrics and micro-movements of a device as its used. Researchers gathered data in the background using the sensors already integated in a srnartphone and; with their own software, were able to monitor and measure operating dynamics, such as touch, that are unique to the user.

In their research paper, authors Cheng Bo, Lan Zhang and Xiang-Yang Li explain how the three principal gestures of tapping (such as clicking icons), scrolling (reading Prnails,browsing or tweeting) and flinging (turning pages in an ebouk reader) are used to identify an individual. The features analysed inctude the co-ordinates where the screen was touched, the pressure exerted and the duration of the contact, all of which can be extracted from Android's application programming interface (API).

Since people touch their smartphones differently depending on the app they're using, both touch and "reaction" are measured. To measure the "reaction", the researchers looked at the position of the device and the different amplitudes of vibration caused by each touch. These pattern can be readily observed by accessing the accelerometer and gyroscope built in to a smartphone.

The researchers also had to consider the context in which a. phone is being used: if the user is walking on a train or in a car, for example. They countered this problem by combining movement-based biometrics - which can identify your speed by the changes in movement of your device ¬with historical, touch-based biometrics to provide art authentication template that proved to be more than 99% accurate during trials on Android-based FITC Eva 30 and Samsung Galaxy 5 III devices.

The end result is a method of verifying whether the current user is the authorised owner of the device based upon historical behavioural biometrics - the 'Yneasurement of me", in other words. All this is done in the background, continuously monitoring user behaviour in order to maintain the verification of identity whenever the phone is being held. If the machine-learning algorithms determine that a pattern is no longer a match, the handset can lock that user out. The software will switch on automatically during the use of sensitive apps. such as Email or SMSZ for eicample) to ensure protection, and switch off during extended gameplay to save power.

The accuracy of such methods is impressive, with a result of 99% achieved in testing after a maximum of ten scr?en taps. However, while this figure may sound sufficientr would you be happy if the one phone call out of a hundred you were locked out of was an important one? The accuracy figure isn't good enough, which is why any successful behavioural monitoring solution will haw to combine methodologies.

CREATURES OF HABIT

Markus jakobsson of mobile malware firm FatSkunk suggests in a co-authored papa' entitled "Implidt Authentication through Lea.ming User Behavice that implicit authentication ¬using cur daily routines, what we do and whore we go - as additional data for such schemes is one soludon.

Smartphones make collecting such data easy, thanks to GP and mapping. Also, as jakobsson says, we're mostly creatures of habit: we tend to follow the same route to work every day, stopping at the same coffee shop; once we're in the officer westay in one broadly defined area until lunchtime, and so on.

Collecting data on such patterns provides a model of a uses behaviour, but it also raises questions of privacy, However, jakobsson and his colleagues had ethics in mind, so all phone numbers, SSIDs and URLs collected in the trials were obfuscated using a keyed hash. The key was randomly generated during the software-installation process, and stored - and al] hashing performed - only on the device to which it pertained.

Using this data the system tots up scores based on whether a user is conforming to their standard behaviour versus acting out of the norm. The technique computes art authentication score based on recently observed behaviours and the identification of "good" events, such as calling the same person or buying coffee at the same shop.Conversely, the authentication score is lowered by a negative event such as calling an unicriown number cr visiting a new location., Even time itself is seen as a negative event, with scores degrading as time passes. When the score falls below a certain threshold, the user has to input a passcode to continue or else they're locked out successfully authenticating with the correct passcode is seen as a positive and boosts the score again. Its an interesting approach, andiakobsson says it was robust enough in testing to prevent 95% of attackers from being successful.

BIOMETRICS AREN'T DEAD
Not all of the "measuring me" security research is centered on behavioural patterns, however - biometrics is far from dead. Indeed, one huge advantage of biometric technology is that its available either now or very soon.

A good example of the Latter is llionyro's Nymi (www.bionym.  cam/tech?), Smart wristbands that monitor your pulse and send that data to a srnartphone app are becoming commonplace among techie types for whom "fitness training" isn't a dirty phrase, and Bionyrn is hoping the Nymi password bracelet will become equally popular. Unlike other wearable authentication concepts, the Nymi doesn't act as a secure-code generator of one-time codes, but rather features an embedded electrocardiogram (ECG) sensor that monitors the heartbeat of the wearer.

Use of the heartbeat as a security metric is inherently more secure than a fingerprint the company says. Indeed,within days of the iPhone Ss going on sale, one German hacking group had revealed a method of lifting and cloning a fingerprint that would fool the Touch ID sensor. Although such fingerprint theft represents a very small risk to most people, the opportunity to steal somethinglilae your heartbeat pattern is smaller, given that it can't be left lying around and is protected inside your body.

Clasping the Nymi around your wrist turns it on, and touching the sensor on the top completes an electrical circuit, since your wrist is in contact with the bottom sensor that lets it monitor your heartbeat. The wristband will vibrate and the onboard LEDs light up to indicate that the monitoring and authentication process is complete. The Nymi knows you're wearing it, as will any connected devices and applications. The device itself also incorporates a built-in accelerometer and gyroscope; this combination means that it will support gesture-based unlocking.

Its. an interesting development, not least since Toronto-based Bionym is already taking pre-orders at $1679 per unit for delivery in the first quarter of 2014, but also since it provides three-factor security: authentication requires possession of the Nyrni, possession of your heartbeat and possession of an authorised authentication device, such as a phone registered with the Nyrni app.

But does it actually work? we haven't seen the Nymi in action, but one obvious question jumps out: will variations to your heartbeat - depending on stress, exercise, medication or illness - not affect the system? Bionym says that the device isn't looking at your heart rate, but rather the shape of your ECG wave_ Signal-processing and machine-learning algorithms are employed to find unique features within the wave that are static over time: these are converted into a biometric template for the user.

What's more the Nymi actually takes only one reading when you put it on - it doesn't continuously monitor your heartbeat, and this reading authenticates the user as Icing as they continue to wear the device. Once the Nymi is authenticated. the user can exercise as much as they like and it won't make any difference.

Anyone who has been unfortunate enough to require an ECG in hospital will know that performing an accurate one involves the attachment of numerous electrodes to the chest, arms and legs. Bionym insists, since this isn't a medical diagnostic reading, a]1 that's required to take an authentication reading is the ability to monitor the electrical signal in the wrists and hands via completion of a circuit that "crosses the heart" This is why the design of the Nymi requires the user to touch the bracelet with the opposite hand when ifs being activated.

That said Bionym admits that ifs still testing how people with a mechanical heart valve or those suffering from heart disease,. for .a.x.a.mple, will affect Nymi's accuracy. While this testing is ongoing, the company will offer a full refund to anyone enaountering problems. Privacy-wise, the ECG data captured by the Nymi is stored cryptographically within the hardware itself, and applications require user permission to access this digitally signed data.

THE END OF PASSWORDS?
Such projects are intriguing, but are they necessary? Most people are happy using single-factor authentication (see Identifying authentication, right), but reliance upon passwords alone can't continue if we iArant our data to be safeguarded in an environment that's increasingly under the criminal microscope.

For now, two-factor authentication seems a good balance of security, distribution cost and ease of use, but it still has weaknesses. Ease of use has always been the primary driver for Ms and passwords, since security measures are useless if nobody employs them because they're too difficult or time-consuming. The problem is that the number of services we use and the complexity of passwords required to secure them has increased to the point of insanity. Password managers help, but they're only a sticking plaster. This is why the real solution may come in the shape of a third factor: who you are.

Sunday, March 10, 2013

Apple Blasted for "Genius" Ads

Not so Genius Apple's panned ads featured a Genius who helped a Mac owner on a plane make an anniversary film for his wife after forgetting the occasion, helped an expectant father make cards to send to the family while his wife was in labour, and advised a man who bought a PC that's "basically" a Mac.

Apple has removed a series of new Mac ads after they were deemed 'embarrassing', 'cringe-inducing', and `dreadful' by publications and Apple experts.

The three new adverts were broadcast in the US during the opening ceremony of the London 2012 Olympics, and featured an Apple Genius helping various Mac owners in unlikely situations. But, unlike many of Apple's previous ad campaigns such as the Think Different campaign and the Get a Mac series, the new ads were widely criticised. Even former Apple executive Jean-Louis Gass& tweeted: "Ouch! Cringe-inducing new Apple 'Genius' ads for Mac. Put those back in the bottle."

The Mac maker has since pulled the ads from its YouTube channel and the Apple.com website. In what may be a coincidence, Scott Trattner, one of the team behind the ads,
has quit. He was an executive creative director at TBWA/Media Arts Lab, but is moving on to a post at agency 72andSunny.

While Trattner's latest ad campaign hasn't been well received, he had more success with previous Apple promotions, including the I'm a Mac campaign He had worked on commissions for Apple since 2004.

Geofencing Alerts Come to Find My Friends


Soon you won't have to ask your friends: "Are you there yet?" Your iPhone will be able Apple's a to tell 6 overhaul, ! you on their rthebehalf. As part of Apple’s IOS 6 overhaul, the company’s Find My Friends app (free, bit.ly/p4kYb8) is set to add a new geofencing notification system. This will allow you to set up an alert for any of your Find My Friends contacts — when they leave or arrive at a given location, you'll receive an alert.
The app is, however, one part creepy, two parts useful. On the one hand, it's nice to offer people a way to check up on your journeys. For example, when I lived in California, I'd make the drive from San Francisco to Los Angeles to visit my folks. Once Find My Friends came out, I made my mother use the app rather than call me every few hours to check on my progress up or down the coast; with geofencing, she automatically received an alert when I finally reached my apartment. (And it's a lot easier to remember than sending a "Home safely" text message at two in the morning after you've been driving for six hours.)

However, like all location-aware services, this only works if your contacts are people you trust. Once you allow a friend to add you, they have access to your location and geofence alerts unless you remove them; given that, you may not want to allow everyone in your contacts list to follow you on Find My Friends.
Adding a geofence alert may also wear down both your device's battery and your friend's. Sure, it's nice to know when your friend arrives at the pub, but they may prefer sending you a text message to having their phone battery drained.
Potential uses and politics aside, these alerts are in the same vein as iOS 6's call-rejection features: they're yet another way for us to automate messages rather than feel the obligation to text Or Call. — SERENITY CALDWELL

Thursday, March 7, 2013

Four Easy-to-Miss iOS 6 Improvements

    Not every new iOS feature gets its fair share of time in the spotlight. We may be focusing on Siri and Maps when it comes to Apple's next mobile operating system, but the update promises a number of smaller changes that are each impressive in their own way. Here are some iOS enhancements that you might have overlooked during Apple's iOS sneak peek at WWDC back in June.

New Share Screen In iOS 5, when you tap to share a photo, you get a long list of sharing actions to choose from — posting to Twitter, sending an email or iMessage, and other options. iOS 6 adds Facebook sharing as an option — part of the systemwide Facebook integration planned for this update, along with sharing to various Chinese social networks. (That's a nod to how important the Chinese market has become to Apple.) But the company has decided against cramming more buttons into that panel. Instead, iOS 6 will present you with a new icon-based sharing screen. It uses these icons to represent the apps and services with which you can share your content.

Spotlight Tweak If you have lots of apps, sometimes it's hard to figure out precisely which home screen they're located on. In iOS 6, Spotlight makes that a smidgen easier by listing the name of the folder in which a particular app is nestled when it appears in the search results.

Reminders Improvements Apple introduced the Reminders app in iOS 5, and it gets some helpful new options in iOS 6. Apple says you can now set location-based reminders from the iPad. Even better, you can manually enter.

Time to Share iOS 6's sharing screen offers an icon-based view — not unlike the iPhone's home screen — in contrast with the list-based approach of iOS 5. addresses where you want reminders, a feature currently missing from Reminders; at present, you can only set reminders for locations linked to addresses in your existing contacts.

Also new in Reminders is the ability to reorder your tasks as desired. And Apple told developers that iOS 6 includes a new Reminders API, which should make it possible for
third-party apps to integrate with the Reminders database. That means you can use Siri to set reminders, which will in turn appear in your third-party task-management app of choice.

Siri and Twitter We mentioned this in Sit-i's New Tricks (see page 23) but it bears repeating: if you link your friends' Twitter usernames to their Contacts entries, Siri automatically translates their real names into their Twitter handles as you dictate.

So if I say, "Tweet 'Excellent dinner last night with Jason Snell, Dan Moren, and Serenity Caldwell," Siri automatically composes a tweet like "Excellent dinner last night with @jsnell, @dmoren, and @settern."
- LEX FRIEDMAN