Wysips Connect will make your phone a solar cell that can receive data transmitted through light waves

Remember that 90% transparent solar-cell that stumbled into our CES trailer last year? It’s back, and it’s got some new tricks. Wysips Connect is making its official debut on the show floor this year, and while the transparent panel can still generate electricity through sun exposure, it’s now equipped with LiFi – a visible light spectrum communication technique capable of transmitting data at broadband speeds. If LiFi becomes common in smartphones, shopping malls, airports or hospitals could use the technology to push local map data to a user’s phone, or help them find a product’s location in an oversized supermarket.

Read more.

Android Banking Trojan Svpeng Goes Phishing

Kaspersky Lab researchers say the Android banking Trojann Svpeng now has phishing capabilities and may be testing the waters to infect devices outside of Russia.

via https://threatpost.com/android-banking-trojan-svpeng-goes-phishing/102822

Singapore on alert for cyber attacks after websites hacked

Singapore’s government has been put on heightened alert for cyber attacks after people claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action.

via https://www.topix.net/tech/computer-security/2013/11/singapore-on-alert-for-cyber-attacks-after-websites-hacked?fromrss=1

Free guide: 5 Best practices for BYOD

Trend Micro Incorporated has issued a free how-to guide that covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.

 

iPhones, iPads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These devices offer greater flexibility and adaptability — whether it’s for business or private use. But these devices also put proprietary company information at risk. Ideally, consumer devices can extend and supplement desktop and laptop machines, allowing employees to remain connected to the organization without being chained to a physical office. Incorporating consumer technology into a corporate IT system requires planning, policy, protection, and control.

 

You can request your copy at https://net-security.tradepub.com/free/w_aaaa2710/?p=w_aaaa2710

Security firm releases tool to audit SAP’s HANA

A new tool from security vendor Onapsis aims to secure SAP’s in-memory database HANA, the German company’s fastest-growing data processing product.

 

Onapsis, a Boston-based company that specializes in SAP security, will incorporate the tool into its X1 suite, which scans for vulnerabilities and configuration problems in SAP deployments.

 

HANA is a cornerstone of SAP’s strategy to compete with Oracle and IBM. Available as a cloud service and an appliance, it’s designed to process analytical and transaction workloads much faster for SAP’s ERP, CRM, supply chain and business intelligence applications.

 

Read More at Network World