Security Products – Apparel – Dresses

Virgin Trains had legitimate interest in publishing Corbyn images, rules ICO

data protection Virgin Trains did not breach data protection laws by publishing CCTV images of Jeremy Corbyn as he searched the company s train carriages in search of a seat, the Information Commissioner s Office has ruled. Such an action would ordinarily be in breach of the law, said the ICO, but Virgin had a legitimate interest in releasing the footage to rebut news reports that the Labour leader had been unable to find a seat. Richard Branson, founder of the rail operator, had tweeted out the footage, which was captured on one of his trains on 11 August 2016, to prove that spare seats were in fact available, contradicting the Labour leader s assertion that the train was ram-packed .

Photo: Virgin Trains under CC3.0 licence Corbyn was sat on the floor of the train when he made the comment, which were captured by a filmmaker accompanying him during his campaign to retain the Labour leadership. Countering Branson s tweet, Corbyn he had been unable to sit with his wife, and that he was only able to sit later because train staff had upgraded another family to first class. Virgin Trains did not entirely escape censure. The ICO found that the rail operator did breach the data protection rights several passengers whose faces it had failed to pixellate. Misleading In a statement, ICO head of enforcement Steve Eckersley said: In this case, the ICO s view was that Virgin had a legitimate interest, namely correcting what it deemed to be misleading news reports that were potentially damaging to its reputation and commercial interests. It would not have been possible to achieve Virgin s legitimate interests without publishing Mr Corbyn s image. Virgin could only show that there were empty seats on Mr Corbyn s journey if they showed Mr Corbyn on that journey. The Labour leader s celebrity was also a relevant factor, said Eckersley, as he would have different expectations than other passengers as to his privacy. This was especially the case given the video of the trip he himself had published and that he should reasonably expect Virgin to respond in kind .

By contrast, however, the other passengers whose faces were not pixellated were simply minding their own business and Virgin Trains had infringed on their privacy . Nevertheless, the ICO is taking no action against the company as only three people in the footage were recognisable, none of whom had contacted the ICO to complain. Shortly after the incident, Chris Brogan of B&G Associates wrote on IFSEC Global: The sixth condition of schedule 2 of the Data Protection Act addresses the use of personal data for the legitimate interests of the data controller as long as it does not prejudice the rights and freedoms or legitimate interests of the data subject. Virgin have a legitimate interest in protecting its brand . Jeremy made the issue public and Virgin has defended its rights. This is a balancing act and I suggest that the information tribunal/court would find in favour of Virgin. I cannot see under the circumstances how Jeremy would win the argument that the publication of his images by Virgin prejudiced his rights. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Businesses have been hacked whether they realise it or not, expert warns

There are two types of businesses those who know they ve been hacked and those who don t know they ve hacked a leading security expert has said. Stuart Rawling, director of business development at Pelco Schneider Electric, made the stark warning at the event s opening panel Current trends and future of the industry . Rawling said businesses must have a solid security plan in place which brings together both human and cyber elements.

There is a risk of getting an antivirus solution and hoping that will solve everything, said Rawling. An antivirus won t help you against a zero-day attack by its very definition it s unknown. The theme that rapidly-advancing security technology cannot be expected to tackle threats without a human element and robust planning was a key element of the session. Professor Martin Gill, perpetuity research & director at industry awards the OSPAs, warned that leaving it to technology and it hoping it will all be ok is a dangerous path for the industry. We should be holding on to the human element. I speak to a lot of offenders, and one said to me recently technology doesn t jump off a wall and arrest you . I just interviewed 12 heads of retail and 12 loss prevention directors. And when asked what their best security system is they all agree: their staff. Rawling agreed, saying he doesn t see a day coming soon where a physical security guard is not deployed.

Ultimately there still needs to be a human decision made on what to do, he said. A response plan still requires a human response. What do you do when something happens? That s where security fails most often the operating procedure, not the technology. Fellow panellist Tony Weeks, head of technical services at NSI, said that technology cannot be implemented without human expertise. No matter how advanced the technology, you will still need people to configure and look after the systems, he said. The most important consideration is an outstanding security policy which addresses all aspects, the panel agreed. When I speak to offenders about why they chose their target the answer is always the same because it was easy, said Gill. That hasn t changed over 30 years.

Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Aurora debuts long range facial recognition sensor at IFSEC 2017

IFSEC 2017 launch Facial recognition technology developer Aurora has unveiled at IFSEC 2017 a long range sensor that extends near infrared capabilities to a wider range of distances, making it suitable for more applications. Queue management, surveillance and VIP identification are possible applications with the technological advance. Aurora s specialist biometric imaging and illumination technology is designed to work with the latest versions of the company s deep learning-based facial recognition engines.

With its near IR -based facial recognition, Aurora has logged millions of successful events in applications, including time and attendance, airport passenger management and access control. Now, the company s core technology, FaceSentinel LR, uses high speed global shutter technology and a high brightness near-IR ceramic flash to deliver HDR still frames to Aurora s facial recognition engine. Aurora s head of sales and marketing Gary James says FaceSentinel LR addresses issues common in the operation of facial recognition with visible light CCTV images. This can hinder accuracy in situations where the subject s face is not directly looking at the camera. James says: The sensor is highly compact, with very low power consumption, despite its powerful output and processing ability. This extends the operational range of our IR face recognition capability fivefold, opening up many new applications such as queue monitoring and covert identification. At IFSEC Aurora is also showcasing its FaceSentinel sensor integrated with the Fastlane Glassgate 300 turnstile, operating in both token-free Identification mode that allows registered users access simply by looking at the sensor and Verification mode, which adds a biometric layer to the functionality of any access control system. FaceSentinel uses artificial and infrared light to achieve unparalleled facial recognition speed, accuracy and reliability. Aurora s facial recognition technology is used throughout Heathrow Airport for boarding pass verification as well as within British Airways domestic self-boarding gates.

Integrated Design Limited (IDL) is the designer and manufacturer of Fastlane Turnstiles and Door Detective anti-tailgating products, and has over 30 years of experience and a worldwide on and installation network. At IFSEC International 2017, FaceSentinel and FaceSentinel LR are running on Integrated Design Limited s stand E1550. The company makes turnstiles and door tailgating detection products.

IFSEC International runs between 20-22 June 2017 at London ExCeL. Get your free badge now. Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out

Kitemark standard would be a progressive step towards strengthening IoT security

Symantec internet Security threat Report The recent Internet Security Threats Report from Symantec highlights that last year cyber attackers have been fishing for gold in all areas and frequently finding success, as seen by the sheer regularity of breach reports in 2016. While malicious emails and ransomware continued to wreak havoc on businesses and consumers alike, the study again highlighted new threats coming into the spotlight thanks to the increase in usage of connected devices. In an era where data is becoming the new currency, all personal and professional data needs to be properly protected especially with GDPR regulations fast approaching.

As more businesses take advantage of the benefits the internet of things (IoT) can bring to their business, they also need to utilise technologies available to them such as machine learning to help analyse and help detect and improve weaknesses in a network and spot abnormal activity when it occurs. We can expect various forms of attacks to continue to increase. There is no excuse not to be prepared. As we continue to see the exponential growth of connected devices, we will continue to see security issues that we hadn t even considered before, such as the Mirai botnet of 2016. Lessons will clearly be learned such as avoiding hard coding IP addresses, use of default password, while many of the protocols designed for smart connected devices will have their own potential flaws and vulnerabilities which organisations will have to tackle. Online Trust Alliance (OTA) To help make securing internet-connected devices easier for businesses, the Online Trust Alliance (OTA) has produced a framework in IoT security, offering guidance on how to secure embedded devices. This introduction of a kitemark standard for IoT devices is a progressive step towards ensuring safe practice is followed and that security of such devices against these types of hacks is stopped at source. In short, we can expect various forms of attacks to continue to increase. With this knowledge there is no excuse not to be prepared.

Cybercriminals are entrepreneurial, well-sourced and motivated and Symantec s report once again demonstrates that the threat of attack is a growing problem. Organisations and consumers need to be wary of attacks, as the damage could be far greater than just financial and reputational. Organisations must now realise that they can no longer afford for cybersecurity not to be their number one priority. Ensure a solid security strategy at Borders & Infrastructure Expo Join other high-end security professionals at the launch of Borders & Infrastructure Expo, in conjunction with Europe s most renowned security event, IFSEC International, addressing your critical needs for large-scale security projects. By attending, you ll access leading security providers showcasing the latest advancements in both physical and cyber solutions.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

One in five UK firms hacked in 2016

Cybersecurity Large firms are most at risk from cybercrime, with British businesses lacking even the most basic security measures to keep confidential information secure, finds a survey by the British Chambers of Commerce (BCC). According to the survey of more than 1,200 businesses, one in five British businesses were hacked last year and only a quarter of businesses said they had security in place to guard against hacking. The findings from the survey have also discovered that it is larger companies, with at least 100 staff, that are more susceptible to cyber attacks.

Around 42% of large businesses reported cyber attacks, compared with 18% of small companies. High-profile attacks on company databases, have hit companies, including Yahoo and telecoms firm TalkTalk. Hackers into Yahoo s database had accessed a wealth of personal data, including email addresses, dates of birth and passwords and even encrypted or unencrypted security questions and answers from more than a billion user accounts in August 2013. In a Guardian article, Adam Marshall, BCC director-general, said: Cyber-attacks risk companies finances, confidence and reputation, with victims reporting not only monetary losses, but costs from disruption to their business and productivity. While firms of all sizes, from major corporations to one-man operations, fall prey to attacks, our evidence shows that large companies are more likely to experience them. Most businesses surveyed are reliant on IT providers to resolve issues after an attack, while banks and financial institutions as well as police and law enforcement agencies tend to have in-house expertise. The extension to data protection regulation coming into force in 2017 means firms will need to increase their responsibilities and requirements to protect personal data, or prepare to face penalties for not complying. TalkTalk had to pay a 400,000 fine in 2016 for security failings that led to it being hacked in 2015. The Information Commissioner s Office, which levied the fine, said the attack could have been prevented if TalkTalk had taken basic steps to protect customers information .

Marshall added: More guidance from government and police about where and how to report attacks would provide businesses with a clear path to follow in the event of a cybersecurity breach and increase clarity around the response options available to victims, which would help minimise the occurrence of cybercrime. Ensure a solid security strategy at Borders & Infrastructure Expo Join other high-end security professionals at the launch of Borders & Infrastructure Expo, in conjunction with Europe s most renowned security event, IFSEC International, addressing your critical needs for large-scale security projects. By attending, you ll access leading security providers showcasing the latest advancements in both physical and cyber solutions.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Why did it take Yahoo nearly four years to discover the biggest hack in history?

Why Did It Take Yahoo Nearly Four Years To Discover The Biggest Hack In History?

Yahoo s reputation has plumbed new depths after it admitted on Wednesday it had fallen victim to the biggest hack in history. It s the second damaging revelation in a few months, with the company revealing in September that it had suffered an attack not only huge in scale 500,000 accounts were compromised but that it had taken two years to even realise it. Users scrambling to change passwords therefore did so knowing that criminals had already had since 2014 to exploit their data.

That incident has now been surpassed on two counts, with the other hack affecting a staggering one billion accounts and this time occurring not just two but three years ago in 2013. Users are being urged to change passwords and security questions, but once again the words horse , stable , door and bolted seem pertinent. Some experts have advised users to go further still and close their accounts. Yahoo, which has for years been losing email market share to Gmail and Hotmail, can expect to see that trend accelerate. The company, whose shares tumbled 6% following the revelations and whose $4.8bn sale to Verizon is now in doubt, has been ticked off by Germany s cyber security authority for failing to adopt modern encryption techniques to protect users personal data. Below several cyber security experts share their verdicts on the latest hack and their punches are very much non-pulled. Any breach that involves personally identifiable (PII) information like names, addresses, and user credentials can haunt its victims for months or years J Paul Haynes, CEO, eSentire Any breach that involves personally identifiable (PII) information like names, addresses, and user credentials can haunt its victims for months or years. This information usually ends up on the dark web, where it s cycled through buyers who can use that information to commit various forms of fraud. Hackers can also use PII to access other systems, particularly if the victim used similar username and password combinations for other accounts.

The frequency of large-scale hacks may be contributing to security fatigue leaving people feeling helpless in the face of multiple incidents Joe Siegrist, CEO, LastPass The frequency of the large-scale hacks we re hearing about may be contributing to security fatigue leaving people feeling helpless in the face of multiple incidents. Take back control of personal security by not using and reusing weak passwords across your accounts. Creating unique, long, complex passwords with a password management tool is a simple way to do this. It s also advisable to do this instead of storing passwords in browsers as this could make them vulnerable to malware attacks. M&A and IPO activities are on the rise, so there is a good chance we will see breaches or hacks uncovered as companies carry out due diligence before deals are finalised Andersen Cheng, CEO, Post-Quantum The latest Yahoo breach is catastrophic in numbers easily the biggest data breach we have seen to date. Even more worrying is why this took so long to be disclosed, with the incident taking place nearly four years ago. It looks like these kinds of deals between companies will disclose even more of these historical incidents as we move forward. M&A and IPO activities are on the rise, and they will continue to gather pace in 2017, such is the sheer volume of, and demand to invest in, the next tech unicorn . With this uptick in activity, there is a good chance that we will see data issues such as breaches or hacks uncovered as companies carry out their due diligence before deals are finalised.

I expect there will be a few more unpleasant surprises uncovered next year. Such disclosure, taking into consideration the unclear and even suspicious disclosure timeline just before the buyout may provide a valid reason for Yahoo s shareholders to sue Yahoo s top management if the deal fails or brings less money than expected Ilia Kolochenko, CEO, High-Tech Bridge Announcing such a massive breach three years after it has occurred, is a very serious, and hopefully well-thought out step taken by Yahoo. As we don t have any clear technical details around what has actually happened, it s difficult to make any conclusions on who or what was at the origins of the breach. However, I am pretty sure that this news has the potential to negatively impact the deal with Verizon. Such disclosure, taking into consideration the unclear and even suspicious disclosure timeline just before the buyout may provide a valid reason for Yahoo s shareholders to sue Yahoo s top management if the deal fails or brings less money than expected. I don t think the breach will impact Yahoo s customers in any new manner now, unless someone makes the breached database public and enables the re-use of passwords and secret questions/answers. The attackers who breached Yahoo, must have already leveraged the compromised data for their own purposes. If they haven t done so already after September s disclosure, all Yahoo customers should consider changing their passwords, including accounts on all other services on which they registered using their Yahoo email. Migration to a more reliable email provider, such as Gmail, also makes sense.

The magnitude of this breach drives home how critical two factor-authentication is when it comes to account security Eldon Sprickerhoff, founder and chief security strategist, eSentire T he magnitude of this breach doesn t just impact Yahoo account holders, it extends to anyone using web mail services and drives home how critical two factor-authentication is when it comes to account security. We all have a role to play in the security of our own data. The same fate could be a reality for anyone not using two-factor authentication to secure their accounts. In Yahoo s case, account passwords were hacked. Think of it as a one-way encryption that can t be decrypted. But, if you take every possible alphanumeric and punctuation combination, mix it with every possible seed, and feed it through the hash function, you end up with all possible hashed passwords. You can then do a reverse lookup and find the actual password. What this means, is that with standard password technology in place (like the kind used by Yahoo), hackers can easily identify user passwords. Two-factor authentication takes security one step further, eliminating the need for hashes, and the risks associated with hashes.

It s a feature that s enabled by adding another form of identity verification to the account sign-in process, like a phone number. It s a simple step that provides significantly more protection to account holders. The greater risk with this particular breach is the countless other email accounts that could be impacted. Many Internet Service Providers (ISPs), like Rogers in Canada or Sky UK in the UK, use white-label Yahoo mail for their account holders. So, if you have a Rogers or Sky UK web mail account, you actually have a Yahoo email account. Regardless, the safest route for all users is to update all passwords and ensure two-factor authentication is enabled, immediately. Whether an external actor broke in, or the breach was through a trusted third party, once the attacker has gained a foothold they effectively become an insider , able to traverse and access systems with impunity Jamie Graves, CEO, ZoneFox We ve known for a few months now that Yahoo has suffered a big breach back in 2013, but what wasn t clear was the sheer scale of the information taken. These latest figures are seismic. While this hack is getting a lot of attention given the detrimental impact it is likely to have on Yahoo s purchase by Verizon, it is vital that businesses everywhere take note and learn a lesson from what could be the biggest cyber-security breach in history.

Whether the breach occurred due to an external actor breaking in, or through a trusted third party, once the attacker has gained a foothold they effectively become an insider , able to traverse and access systems with impunity. As with any insider or trusted partner, if proper monitoring is not put in place, then security incidents like the one that happened over the weekend can occur quickly and without warning. In order to identify and remedy the situation as fast as possible, businesses no matter how large or small, must ensure they have some form of behavioural monitoring solution in place at all times, to identify and combat any breaches and suspicious activity from staff and partners alike immediately.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

2016 has been a boom year for state snooping laws here s how to fight back

2016 Has Been A Boom Year For State Snooping Laws   Here  S How To Fight Back

In 2016 internet privacy has experienced a string of shocks and abuses around the world starting with the Polish law that loosened spying restrictions for police and ending the year with the UK s controversial Investigatory Powers Bill, Rule 41 in the US and the TOR network s blocking in Belarus. Restricting internet privacy and interfering with people s lives by mass surveillance techniques brings fear to the society and dramatically increases the likelihood of criminal activity by giving new easy tools to access people s data not only to governments, but to whoever is able to hack, intercept or otherwise manipulate the new surveillance systems. Below is our review of the year in online privacy, and some suggestions about how people can protect themselves online.

In Germany , the new data retention act requires public telecommunication and internet providers to retain various call detail records (CDRs). These include phone numbers, the date and time of phone calls and texts, the content of text messages, and for mobile calls the locations of call participants. In addition, Internet providers are required to store user metadata such as IP addresses, port numbers, and the date and time of Internet access. Poland s law expands government access to digital data and loosens restrictions on police spying. Collected metadata will be kept for up to twoyears. One doesn t have to be an official suspect to be placed under surveillance for up to 18 months. In addition, the person being monitored will not be informed about it, compromising the protection of journalists sources and deterring potential whistleblowers. On 7 July, Russian president Vladimir Putin signed into Russian law several bills designed to help the government take measures against dissent online and demand unprecedented levels of data retention from the country s telecom companies. For instance, the legislation warrants tougher sentencing for online commentary deemed as an incitement to hatred or a violation of human dignity.

Such convictions now carry a minimum prison sentence of two years. The law requires service providers to monitor and store all calls, texts, chats and web browsing activity. The retained data can be accessed by several government agencies without a warrant. The UK s Investigatory Powers Act received the royal assent on 29 November, opening up the gate for a disturbingly intrusive surveillance system. Among other things, the so-called Snoopers Charter gives the state the ability to indiscriminately hack, intercept, record, and monitor the communications and Internet use of all of the UK population. The entire browsing history of every resident of the UK will be stored for one year. Almost 50 police forces and government departments, ranging from the Metropolitan Police Service and GCHQ to the Food Standards Agency are authorized to access the data In the US , a new amendment to the Rule 41 of the US Federal Rules of Criminal Procedure quietly went into effect on 1 December. It allows the FBI to secretly use malware to hack into thousands of computers with one warrant. There is no need to identify specific computers to be searched.

That means FBI can hack into as many computers as they wish, whether their owners are suspected of some criminal activity or not. New surveillance laws have also been passed and/or enacted in Belarus, China, Turkey, Ethiopia and elsewhere this year. For detailed information, visit our extensive coverage on those laws in our recent ‘2016 Privacy Review blog post. Dangers of surveillance states Citizen control and surveillance, especially suspicionless surveillance, whether physical or digital, has not proved to be an effective way to control criminal activity history tells us it has always turned out to be counter-productive, endangering lives and causing fear and insecurity. For example, when the government opens a backdoor to citizen s data, it means that this backdoor could potentially be used by anyone else, and can fall into the hands of hackers. Once the information is in the wrong hands, it can be used to steal people s identities and rob them of their bank accounts, for example. Data can also get misplaced, systems can crash and everyone can get endangered. Solution There are solutions to bypass some of these restrictive laws, the most reliable being a VPN service . A VPN sends your data through a securely encrypted tunnel before accessing the Internet this protects any sensitive information about your location by hiding your IP address.

Connecting through a VPN tunnel hides your online activity from your Internet service provider (ISP). The only information visible to the ISP is that you are connected to a VPN server, while all other information is encrypted by the VPN s protocol. This prevents ISPs from collecting potentially sensitive data and passing it onto any third parties. It s also important to use a VPN service that does not store activity records to ensure your data is not logged and forwarded to any agencies. NordVPN has a strict no-log policy and could not supply any information on your online activities even if requested. Besides VPNs, it s also crucial to use anti-spyware software, to make sure to use a Firewall, not to install unapproved programs on the computer that might contain bugs, and to be generally vigilant about the kind of information one shares and opens online. Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Master Locksmiths Association: 2012 in review, 2013 ahead

Master Locksmiths Association: 2012 in review, 2013 ahead Dr Steffan George, development director for the Master Locksmiths Association (MLA), looks back on 2012 and ahead to what’s in store during 2013.

2012 was an eventful year for all of us within the security industry, with the crowds at the Olympic Games and changes in legislation surrounding squatting being just a couple of the high profile issues that drew attention to the ongoing importance of effective security. At the Master Locksmiths Association (MLA), we have been incredibly busy ourselves. Work towards launching a nationally recognised qualification and apprenticeship scheme has been ongoing, and we have had major input into the content of the qualification, with Skills for Security and the MLA s chosen awarding body HABC due to officially launch both the apprenticeship and qualification this year.

Furthermore, we have significantly invested in our website to create a more user friendly platform and enable customers to find a reputable locksmith in their local area. In addition to providing a more customer-focused front end, our new site provides simple yet effective advice on domestic and commercial security, in turn making it a one-stop shop for security advice. Reports of scam operators Sadly, we are still hearing reports of scam operators who are positioning themselves as MLA members or using the names and addresses of genuine local firms despite not being in the area in which they claim to be.

Our new website, PR and marketing activity as well as work with third parties such as Trading Standards aims to combat this trend and prevent the general public from being taken in by rogue traders.

2012 also saw us continue a sustained PR campaign promoting the importance of security and the benefits of MLA members to both consumer and business audiences commissioned articles ranged from those in the health press (Caring Times, Learning Disability Practice) to property (GSPC, Property Investor Today, Landlord Zone) to consumer press (J Life, Your Home, Real Home, The Sunday Mirror) and the trade (Public Sector Build Journal, Building Engineer, The Jeweller, Retail Digital). Furthermore, our regular security column was highly successful in press all over the country and regularly featured in publications including The Yorkshire Post, The Wells Journal, The Derby Telegraph, The Coventry Telegraph, The Newcastle Journal, The Nottingham Evening Post and The Lincolnshire Echo to name but a few.

2012 also saw the successful launch of a new membership category for practicing locksmiths which has seen great take-up by those who meet the criteria. We also enjoyed record retention rates: evidentially, the significant benefits of being an MLA member are proving their worth.

In 2012 we have seen more regional training and member events than ever before, allowing members to gain first hand advice and build up relationships – and even working partnerships – with fellow locksmiths who have a shared interest. What’s going to happen in 2013?

2013 is shaping up to be another busy year for all at the MLA, with further work on Search Engine Optimisation for the website and even more information and articles offering security advice on a wide range of issues to consumers. In addition, we’re developing an e-newsletter campaign which we aim to launch in 2013 to offer members, partners, customers and the media alike regular updates on security matters, MLA news and topical industry updates.

We will also be working on developing yet more members benefits to ensure we provide maximum value. The 17th incarnation of the MLA Expo is shaping up to be one of the biggest locksmith exhibitions yet, with 20% of stand space sold just 24 hours after launch. The 2013 event will see not only great deals for those looking to purchase locksmith-related products, but also the usual highly-acclaimed Expo training and a fantastic prize draw for visitors the top prize being a trip to Las Vegas!

Also, back by popular demand for the 2013 event we will have various evening social events to enable locksmiths, suppliers and trainers to get to know each other and network in an informal and relaxed atmosphere.

We hope to see those of you in the trade at the International Centre in Telford on 13-15 September 2013.

In the meantime, may we wish you all a happy, prosperous and secure 2013.

Indian Government Wiretapping and started BlackBerry interception …

According to a report, All major Indian telecom companies, including Bharti Airtel, Vodafone India and Tata Tele services, have agreed to share real-time interception of BlackBerry calls and data services on their networks with Security agencies to meet the December 31 deadline fixed by the Indian government . Research In Motion (RIM), the manufacturer of BlackBerry, has been directed to provide the resolution and web-browsing needs of the BlackBerry Internet Services. This is to be done in discussion with concerned service providers and law interception organisations.

Earlier in 2011, the government set the deadline for RIM to come up with facilities for interception, or face closure of their operations in India. The security agencies in the country have been trying to get the company to install local servers so they could access and monitor the stream of messages going back and forth to implement better security in the country. The Ministry for Home Affairs ordered interception of about 10,000 phones and 1300 email ids, during October to December 2012.

According to an Indian news paper report1, About 500 new e-mail addresses of individuals were also added to the existing 800 e-mail IDs already under surveillance. Most requests for surveillance came from the Intelligence Bureau, followed by the Narcotics Control Bureau, Directorate of Revenue Intelligence, Army’s Signals Intelligence Directorate, State Intelligence units followed by Police Departments of Andhra Pradesh and Maharashtra. Wire tapping to detect tax evasion by Income Tax authorities is however not allowed. According to the Section 5(2) of the Indian Telegraph Act of 1885, the government is authorized to intercept or detain messages, if satisfied that it is necessary to do so in the interests of the sovereignty, integrity, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence.

Read More News on – The Hacker News..

About Author:

photo of Mohit Kumar

aka ‘Unix Root‘ is Founder and Editor-in-chief of ‘The Hacker News‘.

He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks.

His all efforts are to make internet more Secure.

Follow him @ Twitter | LinkedIn | | Email | Facebook Profile234567


  1. ^ report (articles.economictimes.indiatimes.com)
  2. ^ (thehackernews.com)
  3. ^ Twitter (twitter.com)
  4. ^ LinkedIn (in.linkedin.com)
  5. ^ (plus.google.com)
  6. ^ Email (thehackernews.com)
  7. ^ Facebook Profile (www.facebook.com)

More Bargain Basement Bundles

NFC in BlackBerry Isn't Only for Mobile Payments – N4BB

Research In Motion has been one of the biggest pushers for Near Field Communications (NFC) in the mobile space.

Select BlackBerry 7 devices already have NFC capabilities.

BlackBerry 10 devices are also planned to have NFC.

NFC will open the doorway to much easier mobile payments for quickly passing through the check out line at stores.

However, NFC is not limited to only mobile payments.

That s the misconception as RIM points out1, NFC can have far more functionality.

Here s what else NFC can allow you to do:

1. Replace access badges with BlackBerry smartphones2

BlackBerry partner HID Global offers Secure Identity Services 3, a comprehensive suite of web-based tools for managing physical access credentials (here s the HID press release4 with more info).

In case you didn t know, Secure Identity Services is the first all-in-one web-based solution for enterprise credential provisioning and management.

The HID platform provides businesses with the tools to create, use, and manage identities for traditional badges on plastic cards, for tokens, and for digital credentials on NFC-enabled BlackBerry smartphones.

2. Share information with BlackBerry NFC capable devices using BlackBerry Tag5

Earlier this year, RIM announced BlackBerry Tag6, which allows customers to exchange information with a simple tap between any two NFC-enabled BlackBerry smartphones.

This technology makes sharing information a lot faster and much more personal.

Here are just a few examples of what you can share with a single tap using BlackBerry Tag:

  • Invite your friend to BlackBerry Messenger (BBM )
  • Share contact information
  • Share content from the media applications
  • Share voice notes
  • Share documents from within Documents To Go
  • Share a URL from the browser
  • Create Bluetooth pairing with ease
  • Transfer files

3. Smart Tags Work Like Magic 7

Smart tags can contain a range of information, including web addresses, telephone numbers, email addresses, coupons, graphics, media files, event details, and more.

When you tap the smart tag reader on the back of your BlackBerry smartphone against a smart tag, your smartphone views the smart tag and presents you with the options to view or delete the smart tag.

Smart tags can also help automate common tasks that you perform on a regular basis.

According to Annu, Senior Product Manager for BlackBerry 7, NFC technology on BlackBerry smartphones works like magic .

Some smart tag ideas from Inside BlackBerry For Business Blog readers include launching the BlackBerry Travel app when tapping the NFC tag on their suitcase, tapping an NFC tag beside their bed to set their alarm, and so much more.

If you are interested in taking advantage of this unique technology, check out this blog post: Automate Common Tasks in Your Life Using NFC Tags and Your BlackBerry8910


  1. ^ RIM points out (bizblog.blackberry.com)
  2. ^ Replace access badges with BlackBerry smartphones (bizblog.blackberry.com)
  3. ^ Secure Identity Services (www.hidglobal.com)
  4. ^ press release (www.hidglobal.com)
  5. ^ Share information with BlackBerry NFC capable devices using BlackBerry Tag (blogs.blackberry.com)
  6. ^ RIM announced BlackBerry Tag (blogs.blackberry.com)
  7. ^ Smart Tags Work Like Magic (docs.blackberry.com)
  8. ^ Annu (blogs.blackberry.com)
  9. ^ BlackBerry Travel (www.blackberry.com)
  10. ^ Automate Common Tasks in Your Life Using NFC Tags and Your BlackBerry (blogs.blackberry.com)

More Offers