Connect with us

Technology

New Datalogic Memor 1 Introduced to the Market

Published

on

Datalogic Memor 1

Datalogic Group launched a new tech product. Datalogic Group is known as a global leader in the automatic data capture and process automation markets. This new device aims to make consumers’ lives easier is called Datalogic Memor 1 and here’s what this product is all about.

This new device may be small, but as the what the saying goes, small but terrible! Datalogic Memor 1 is very convenient in so many ways that it will even lessen the workload of employees significantly. It specifically has the function of manufacturing shop floor, scanning items for more a easy receiving and delivering of goods and other kinds of logistic stuff.

Datalogic Memor 1 has a wide range of applications. One of its high tech functionality is having a high-density 1D and 2D barcodes that allows users to use mobile applications smoothly. It is a full touch device and has a scanning application of advanced 2D technology. It also possesses Datalogic which is perfect to utilize “Green Spot” for a much easier indicator and great visual feedback.

Aside from those amazing specifications mentioned, Memor 1 is also equipped with a powerful Qualcomm Snapdragon CPU and has a feature of Android 8.1 (Oreo) and a Google Mobile Services (GMS). Datalogic Memor 1 can be purchased in 2 types of components, a hand-held model that has a similarity with a scraggy smartphone, and a pistol-grip version with a great and handy trigger for the user’s convenient scanning all day every day.

Aside from all of the functions mentioned earlier, Memor 1 can also be used as an on-premise wireless phone or the popular PTT device by using the VoIP or Voice over Internet Protocol method. Memor 1 has a lot of features to offer which includes the application of high density of 1D and 2D barcodes. How cool is that! A 2 in 1 device that is very useful and beneficial to employees who will be using it on their day to day job! This fantastic device will genuinely enjoy and be helpful to people mainly who are working in warehouses, store managers, sales assistants and more.

By introducing their newly invented device, Datalogic Company has been widely known for their unique and outstanding products made. They are the first manufacturer who presented to the market world the feature of Datalogic Wireless Charging System for mobile computers. This modernized device enables users to avoid using batteries and pins that usually gets broken, dent, and dirty. Datalogic Wireless Charging System also minimizes the time in terms of charging. It gets fully loaded in a short period, unlike any similar regular device.

I've been contributing news since 2010, both online and print. Aside from Z6Mag, I manage independent news blogs that provide awareness on a diverse list of topics to every reader.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Another China-Based Server Discovered Open Containing 1TB Of Personal Data

The data appears to come from more than 100 loan-related apps and exposing a handful of sensitive data that researchers think caused by the problematic security of Chinese Fintech industry.

Published

on

Nearly one terabyte of data has been left open by a China-based server for everyone to see that includes sensitive information of people, including their SMS and call logs.

The unprotected database was discovered by Safety Detectives’ research team led by Anurag Sen, which contained at least 889 gigabytes of data and was growing every day until it was closed. The researchers were not able to determine who owns the database, but they were able to confirm that it originated from China.

According to the researchers, the information contained in the exposed database came from more than 100 different loan-related applications. They also said that the database they discovered was a “treasure trove of data” and has contained sensitive information of millions of Chinese citizens.

The most crucial pieces of information that made the researchers conclude that the database includes data from loan-related applications is the discovery of several credit evaluation reports, which contain loan records and details, risk management data, and real ID numbers, as well as, personal information like name, phone number, and address.

In 4.6 million unique entries, the researchers were able to find other data like:

  • GPS location
  • A detailed list of contacts
  • SMS logs
  • IMSI numbers
  • IMEI numbers
  • Device model/version
  • Stored app data
  • Memory data
  • Operator reports
  • Transaction details
  • Mobile billing invoices
  • Full names
  • Phone numbers
  • Bill amount per month
  • Call log
  • Credit and debit card details
  • Concentrated list of apps on each mobile device
  • Detailed tracking of app behavior
  • Device information
  • Device location
  • Launch & exit times
  • Duration on the content, etc.
  • Passwords with MD5 encryption, which can be decoded

Furthermore, the amount and type of data discovered by the team inside the previously exposed database led them to conclude that citizens are being tracked in detail.

“Things including a user’s IP address and duration of a given activity, call logs, SMS exchanges (including content of the SMS), and the various apps installed on the devices are all within the scope of data made available by this leak,” reads the report of Safety Detectives penned by Jim Wilson.

The researchers raised many concerns regarding the database they have uncovered. According to them, the database could be used by marketers to “hyper-target” their customers and “fine-tune” their messages to them. Worse, the data could also be used by threat actors to carry out fraud, and “it could also be easily used in either ‘friendly’ government spying or not-so-friendly espionage.”

There is enough amount of data for anyone to completely take over someone’s identity without any considerable effort. “If this data were to be sold on the Dark Web, it could easily be packaged into a ‘deal’ where an individual’s financial, medical, and personal life are up for grabs,” the researchers warn.

This is not the first time that a database originating from China was discovered to include sensitive personal and financial information of Chinese citizens. Earlier this year, Victor Gevers, a security researcher from GDI.Foundation, found a similar database that contains sensitive information of Chinese citizens that appeared to be coming from servers of the popular payment platform, Alipay.

The database includes transaction details of Alipay users, and Gevers claimed that it is being sold to third parties for a price.

Alipay denied the accusation and offered an alternative explanation on the data that was discovered. They said that they are not selling transaction details of their users. Instead, the transaction details could have been willingly uploaded by users through a loan app.

According to the investigation conducted by the company, some Alipay customers submitted their Alipay account names and passwords to a particular online lending platform. Such information was obtained by crawler companies that work with these online lending companies and was then stolen by hackers.

Back in March, Gevers said that the continuous discovery of databases, like what he discovered earlier this year and the one discovered by Safety Detectives recently, highlights the massive problem with China’s fintech industry.

He noted that most financial data leaks happen because sources trust third parties with their data. Most of the time in Fintech, experts see third parties doing machine learning and analytics to generate insight. “Knowing what the Chinese people are spending their money on based on one of the biggest financial institutions has a very high market value in and outside China,” he said.

Continue Reading

Technology

24 Million Images Used For Facial Recognition Were Secretly Scraped All Over The Internet

They were taken from people’s social media accounts, websites, social media, photo sharing, and online dating platforms, and also taken by digital cameras in public places, as well as, unencrypted communications.

Published

on

Photo: MegaPixels.cc

If ever you’re wondering where do facial recognition systems compare your photos with, know that it is probably compared to your picture that was secretly gathered by governments and tech companies to develop the facial recognition AI.

A database of millions of images secretly extracted by the US and Europe from people’s social media accounts, websites, social media, photo sharing, and online dating platforms and also taken by digital cameras in public places, as well as unencrypted communications, exists and is now being used facial recognition systems around the world. These systems are ubiquitously by police and state intelligence agencies without you knowing that they have a copy of your face on their system.

In research published by Megapixels.cc, a cybersecurity research firm focused on facial recognition, 24 million non-cooperative, non-consensual photos in 30 publicly available face recognition and face analysis datasets.

Out of these 24 million images, 15 million face images are from Internet search engines, over 5.8 million from Flickr.com, over 2.5 million from the Internet Movie Database (IMDb.com), and nearly 500,000 from CCTV footage.

“All 24 million images were collected without any explicit consent, a type of face image that researchers call “in the wild.” Every image contains at least one face, and many photos contain multiple faces,” reads the study.

The researchers approximated that out of all the millions of images they have found in the said datasets; there are one (1) million people who owned those photos. Furthermore, the researchers found out that the majority of the images originated from the USA and China.

Embassy photo found in the dataset. Photo: MegaPixels.cc

However, they claimed that with all the research papers they have analyzed, only 25% of the datasets originated from the USA, and most of the images are taken from Chinese IP addresses. They also highlighted that limitations in their study only allowed them to evaluate research papers written in English and the big implication for this is that there is a possibility that foreign use could be bigger than the actual number they have found out.

The images in the datasets are not only those that can be found from online databases and social media platforms. A considerable number of photos in the analyzed dataset were taken from government databases.

Related: Celebrity Photos, Composite Sketches, And Other Things The Police Feed The Facial Recognition System To Find A Match

For example, out of the 24 million images they have analyzed, at least 8,428 embassy images from at least 42 countries (with most originating from China and US embassies, as earlier mentioned) were found in face recognition and facial analysis datasets. Over 6,000 of the images were from US, British, Italian, and French embassies (mostly US embassies).

“These images were found by cross-referencing Flickr IDs and URLs between datasets to locate 5,667 images in the MegaFace dataset, 389 images in the IBM Diversity in Faces datasets, and 2,372 images in the Who Goes There dataset,” they added.

As part of their findings, the researchers said that these images were used for commercial research by Google (US), Microsoft (US), SenseTime (China), Tencent (China), Mitsubishi (Japan), ExpertSystems (Italy), Siren Solution (Ireland), and Paradigma Digital (Spain); and military research by National University of Defense Technology (China).

The facial recognition phenomenon

Facial recognition technology has been the center of public conversation as well as legislative and regulatory dialogue in the past few years. The focus of the conversation points to how law enforcement agencies, government offices, as well as a private business, use an unregulated technology.

Law enforcement has been very defensive with their use of facial technology in their operations. They argue that technology helps them keep the security of citizens against unlawful elements.

Relevant: Ethical Regulation Of ‘Facial Recognition’ Is A Shared Responsibility

However, the opposite side of the pole asserts that facial recognition technology violates people’s privacy. Human rights and privacy advocates believe that the premise behind facial recognition systems is problematic in itself and law enforcement, big brother governments, and even businesses who have access to the technology can easily track people’s movements against their consent.

They raise their fears that facial recognition may grow to be a social enemy instead of a friend as regulations governing its use is not enough to protect people’s security and privacy.

“Unless we really rein in this technology, there’s a risk that what we enjoy every day — the ability to walk around anonymous, without fearing that you’re being tracked and identified — could be a thing of the past,” said Neema Singh Guliani, the American Civil Liberties Union’s senior legislative counsel.

Continue Reading

Technology

Sprint Resets Account Passwords Of Users After Data Breach

Hackers used the Samsung website to gain access to Sprint’s accounts.

Published

on

Photo: Sprint Website

Sprint, an American mobile telecom provider, has proactively reset their customers’ account PIN following a data breach that has affected an “unknown” number of accounts.

In a letter sent by Sprint to its customers, Sprint said that the data breach could have affected any account, so they are resetting everyone’s PIN as part of a safety mechanism to mitigate the effects of the data breach.

“Your account PIN may have been compromised, so we reset your PIN just in case in order to protect your account,” reads the notification letter sent by the telecom provider to its users.

According to the company, their team was informed, on June 22nd, of a data breach that allowed a threat actor to gain unauthorized access to their user’s accounts by exploiting an unpatched vulnerability in Samsung’s website “add a line” feature. The “add a line” feature in Samsung.com allows Samsung users to connect their mobile line (including that availed from Sprint) to their Samsung devices.

Sprint, a Kansas-based telecom network founded in 1899 in Abilene, Kansas, claims that they have a total of 54.5 million as of March this year. According to the letter sent by the company to its users, it is still unclear how many of the millions of their users are affected by the breach.

The leak, as stipulated by their notification to customers, includes users’ personal information such as phone number, device type, device ID, monthly recurring charges, subscriber ID, account number, account creation date, upgrade eligibility, first and last name, billing address, and add-on services. Nonetheless, Sprint clarified that no sensitive information that could cause serious identity theft, and fraud was accessed by the hacker/s.

“We take this matter, and all matters involving Sprint customer’s privacy, very seriously,” assures the company to its users.

As of June 25th, the company has said to have “re-secured” their users account and they have taken appropriate measures to protect their users from any untoward fraud and malicious attacks against their identities.

“Sprint has taken appropriate action to secure your account from unauthorized access and has not identified any fraudulent activity associated with your account at this time. Sprint re-secured your account on June 25, 2019, with the following notification to your Sprint phone device: Your account PIN may have been compromised, so we reset your PIN just in case in order to protect your account,” they wrote in the letter.

Furthermore, the same letter includes different mitigation procedures that users can do in order to protect themselves from malicious attacks. The company also urges its users to follow the protocols set by the Federal Trade Commission to help secure their identities.

“As a precautionary measure, we recommend that you take the preventative measures that are recommended by the Federal Trade Commission (FTC) to help protect you from fraud and identity theft. These preventative measures are included at the end of this letter. You may review this information on the FTC’s website at www.ftc.gov/idtheft and www.IdentityTheft.gov or contact the FTC directly by phone at 1-877-438-4338 or by mail at 600 Pennsylvania Avenue, NW, Washington, DC 20580,” they added.

What to do to protect yourself after the data breach?

Place a fraud alert on your credit reports, and review your credit reports.

As part of Sprint’s effort to help their customers protect themselves, they are encouraging their users to contact at least one of the three toll-free fraud alert company below. A user only needs to contact one company as whoever they chose to contact is legally required to submit the fraud alert report to the other two.

TransUnion:
1-800-680-7289
TransUnion Fraud Victim Assistance P.O. Box 2000 Chester, PA 19016
www.transunion.com

Equifax:
1-800-465-7166 Equifax Information Services LLC P.O. Box 105069 Atlanta, GA 30348-5069
www.equifax.com

Experian:
1-888-EXPERIAN (397-3742)
Experian PO Box 9701, Allen, TX 75013
www.experian.com

“Once you place the fraud alert in your file, you’re entitled to order one free copy of your credit report from each of the three consumer reporting companies. If you find fraudulent or inaccurate information, get it removed,” the company advised.

Other steps to protect yourself include:

  • Close the accounts that you believe have been tampered with or opened fraudulently.
  • File a report with your local police or the police in the community where the identity theft took place.
  • Visit the Federal Trade Commission’s Identity Theft website, IdentityTheft.gov, or for more information on reporting and recovering from identity theft.
  • Contact your state’s Attorney General or Consumer Protection Agency for more information on reporting and recovering from identity theft.

Continue Reading

Trending