News Archive 
SSKA Industry News
Wednesday, 19 December 2007
LawFuel.com: Hario Tandiwidjojo, 28, pleaded guilty to federal charges stemming from his hacking into business kiosks at hotels and stealing credit card information. He pleaded guilty to one count of unauthorized access to a protected computer to conduct fraud. In a plea agreement filed in United States District Court, Tandiwidjojo admitted that he hacked into approximately 60 computers inside business kiosks operated by Showcase Business Centers Inc. Tandiwidjojo bypassed four password checks that Showcase Business Centers had in place on their computers, using passwords he obtained while employed by a company that serviced the business kiosks.
 
Read more
Posted by: AT 12:17 pm   |  Permalink   |  
Tuesday, 04 December 2007
The Denver Post: Travelers looking for the fast lane at Denver International Airport can start at the Hyatt Regency Tech Center. The Denver Tech Center hotel has installed a kiosk from Clear, a New York-based company that provides an airport-security fast-pass program. Customers pay an annual $99 fee to Clear to go through a special security lane at 11 airports nationwide. The concierge-type service lane is expected to be in operation at DIA in January and promises to help Clear members get through a special security line faster than a basic security line.
 
Read more
Posted by: AT 12:54 pm   |  Permalink   |  
Wednesday, 21 November 2007
KATU-TV (Portland, Ore.): Kiosks are meant to speed up the check-in process at the airport, but security experts say they could be open doors for terrorists to hide their identities on U.S. jets.
 
Read more
Posted by: AT 11:23 am   |  Permalink   |  
Monday, 05 November 2007
Daytona (Fla.) Business-Journal: Drivers soon may be able to pay for gas with a simple fingerprint scan. Ten Shell stations in Chicago are testing biometric systems that let consumers scan their fingertips on a payment device. The systems are directly linked to customers' checking or credit-card accounts.
 
Read more
Posted by: AT 12:00 pm   |  Permalink   |  
Monday, 29 October 2007
Security Document World: Norway has rolled out 21 biometric kiosks as part of its biometric ePassport and visa pilot scheme. The kiosks, which have been developed by Motorola in conjunction with the Norwegian Ministry of Foreign Affairs and the National Police Computing and Material Service, capture a 2D facial image, fingerprints (10 fingers for visas and two for passports) and the signature of passport and visa applicants. Motorola says the country is one of the first to use a single kiosk to capture three biometrics for passports and visas.
 
Read more
Posted by: AT 10:10 am   |  Permalink   |  
Tuesday, 02 October 2007
CNNMoney.com: GE Homeland Protection Inc. has announced it has begun a development program designed to create an automated air passenger identification system potentially more effective and less costly than the manual processes employed at today's airport screening lanes. The aviation identity kiosk development program seeks to supplement advances in passenger screening already attained by GE Security's Checkpoint of the Future initiative, bringing an advanced technology solution to the head of the security lane where passengers' government-issued ID photos are currently compared by security officials with faces and the names on boarding passes.
 
Read more
Posted by: AT 11:04 am   |  Permalink   |  
Wednesday, 22 August 2007
AMSTELVEEN, Netherlands · ICTS International, a provider of advanced security services, has announced its wholly owned subsidiary MITAM-Advanced Specialized Technological Systems LTD has entered into a joint agreement with GE Homeland Protection Inc. for the development and commercialization of the next generation of aviation ID security kiosks.

The ID kiosk will address security and passenger convenience needs. The product's innovation is in its security sensors and the method of those sensors' fusion, as well as the passenger interface.
The joint venture obtained funding for development through the Binational Industrial Research and Development Foundation. The kiosks will use ICTS' security technology and GE's security screening and detection technology. 
 
The main features of the ID Kiosk are expected to include:
  • Integration of data and operations into a complete system and new concept of operations
  • Quick processing of standard and non-standard travel documents
  • Document forgery detection
  • Integration of state-of-the-art explosive trace sampling and detection
  • Quadruple resonance shoe explosives detector capability
  • Robust passenger identification based on image analysis
Posted by: AT 09:43 pm   |  Permalink   |  
Monday, 13 August 2007
Information Week: TJX will be glad when this year is over. The $17 billion-a-year parent company of T.J. Maxx, Marshall's and several other discount retail chains has spent the past eight months dealing with the largest breach of customer data in U.S. history. Few details of the TJX debacle have been made public by the company or investigators, but it appears poorly secured in-store kiosks are at least partly to blame for acting as gateways to the company's IT systems.
 
Read more
Posted by: AT 10:19 pm   |  Permalink   |  
Monday, 13 August 2007
SANTA CLARA, Calif. · McAfee Inc. announced that McAfee VirusScan Enterprise 8.5i now supports the Windows XP Embedded operating system. By expanding their protection to Windows XPE, companies can manage security on point-of-sale terminals, including airline kiosks and ATMs, using McAfee's ePolicy Orchestrator security-management software.
 
"Many of our larger customers, including financial institutions, major retail and airlines, have requested support for this platform," said Rees Johnson, vice president of product management for McAfee. "A more secure retail location enables easier and safer connectivity with customers. McAfee VirusScan Enterprise protects these retail sites from viruses, malware and theft of customer information."
 
As more companies with remote kiosks, point-of-sale terminals and ATMs move away from proprietary operating platforms to the Windows XPE platform, their exposure to the threats that affect the Windows platform increase.
Posted by: AT 10:16 pm   |  Permalink   |  
Wednesday, 11 July 2007
InterGovWorld.com: Terrorism, escalating crime and illegal immigration have pushed the British government closer to dropping a tight electronic curtain over its borders. At London's Heathrow Airport, passengers are using the miSense program · a program that comprises a check-in kiosk and a biometric electronic-immigration system named miSenseplus. The kiosk uses biometric data to verify passengers from check-in through boarding. The kiosk scans the code on the first page of a passport as well as the passenger's fingerprint.
 
Read more
Posted by: AT 05:55 pm   |  Permalink   |  
Tuesday, 10 July 2007
MEBANE, N.C. - ArcaTech Systems has opened new customer-support facilities in Northern Ireland and Russia. The new operations are expected to support growth in those markets.
 
The Russian office is located in Moscow and the Northern Ireland facility is located in County Fermanagh between Belfast and Dublin. Both facilities provide local support services, parts warehousing and repair facilities. ArcaTech's products include cash dispensers and recyclers, check scanners, encrypting PIN pads and other components for transaction-automation systems.
 
The expansion of ArcaTech's operations builds on a successful first-half of 2007 for the company's U.S. operations.
Posted by: AT 06:05 pm   |  Permalink   |  
Monday, 11 June 2007
Palm Beach (Fla.) Post: Mailing kiosks in TSA security checkpoint lanes allow passengers to mail banned items such as pocket knives, lighters and perfumes to their destination or home, rather than throw these items away or turn them over to TSA officials.
 
Read more
Posted by: AT 03:29 pm   |  Permalink   |  
Wednesday, 30 May 2007
COLORADO SPRINGS, Colo. · The U.S. Patent and Trademark Office has granted a patent for The Self-Service Shredder, built and marketed by RealTime Shredding Inc.
 
The patent, granted for the "public access information destruction system performing pay-per-use shredding," was issued to the product's inventor, JRP Enterprises LLC. JRP's principal, Johnny R. Podrovitz, serves as vice president of business services for RealTime Shredding, which owns exclusive rights to build, distribute and market The Self-Service Shredder.
 
The Self-Service Shredder incorporates a 2.5-horsepower motor, LCD display and uses standard electrical power. Payment mechanisms allow acceptance of cash and/or access codes. Anti-jam software prevents and reverses jamming. Embedded software allows users with wireless connectivity to monitor use, obtain reports and change functions.
 
The Self-Service Shredder cross-cut shreds paper, cardboard, credit cards, paper clips, staples as well as CDs, DVDs and floppy disks. The industrial-strength shredder can shred up to 200 sheets of paper a minute.
Posted by: AT 12:51 pm   |  Permalink   |  
Wednesday, 02 May 2007
COPENHAGEN, Denmark · Triton, an ATM manufacturer with more than 158,000 installations, announced today that they have selected Sagem Denmark as their future provider of OEM Triple Des PIN pads for their ATMs.
 
As the deadline for complete PCI Triple Des compliance draws near, the need for Triple Des technology development has become increasingly obvious. Making the shift to Sagem Denmarks' reliable and secure PIN pads allows us to stay focused on our core products says Triton President Brian Kett.
 
"We are pleased to be partnering with Sagem," Kett said. "We choose Sagem for their technical expertise and because they have a great reputation for producing a quality product at a great price."

"Due to Tritons strong presence in the marketplace we feel that Triton is uniquely positioned to support our further expansion and strategy in to the ATM market for Triple Des PIN pads", said Lars Clausen, vice president of Sagem Denmark. "We are partnering with Triton for this reason, and we are excited about this new relationship."
Posted by: AT 02:19 pm   |  Permalink   |  
Tuesday, 01 May 2007
Computerworld.com: Organizations that use RFID devices should systematically evaluate potential security and privacy risks posed by the technology, U.S. government officials say in a new report detailing best practices for retailers, manufacturers, hospitals and federal agencies.
 
Read more
Posted by: AT 02:25 pm   |  Permalink   |  
Tuesday, 24 April 2007
COLORADO SPRINGS, Colo. · First State Bank and Trust, based in Bayport, Minn., has acquired four self-service shredding kiosks for customer and public use.
 
First State Bank and Trust has installed The Self-Service Shredder in Bayport, Oak Park Heights, and Stillwater.
 
The kiosks, developed by RealTime Shredding Inc., shred paper, cardboard, credit cards, paper clips, staples, CDs, DVDs and floppy disks using a cross-cut method. The shredder can shred up to 200 sheets of paper a minute.
 
"Being attentive to individuals' and business' financial security is our job. The kiosks offer a practical tool in that regard," said Ryan Benson, vice president of retail banking for First State.
Posted by: AT 05:31 pm   |  Permalink   |  
Friday, 20 April 2007
CUMBERLAND, Va. · Visitors to Cumberland County Public Schools will soon be greeted by a school-safety device called LobbyGuard. In an effort to strengthen campus security, the LobbyGuard visitor-management kiosk can instantly check all visitors against national and state sex-offender registries, as well as other criminal databases, and notify appropriate school and district personnel via text-message alerts if a match is made.
 
LobbyGuard operates in hundreds of public and private schools, university campuses, government buildings and corporate facilities across the United States. After a visitor signs in, LobbyGuard runs a background check and prints a photo ID badge with a self-expiring barcode. The photo ID badge lets faculty and staff know the visitor has followed the proper sign-in procedures.
 
"Parents trust us with their children daily, and we feel it is our responsibility to make every effort to create a safe learning environment," said division superintendent Dr. James Thornton. "LobbyGuard will provide a consistent system to track visitors and volunteers while keeping away people who present a danger to our students and staff members."

Posted by: AT 05:44 pm   |  Permalink   |  
Monday, 16 April 2007
DALLAS · AXCESS International Inc., a provider of dual-active RFID and real-time location systems solutions, announced that three civilian U.S. government agencies are installing its patented ActiveTag wireless RFID system for locating, tracking and protecting laptop computer assets and critical documents. AXCESS' RFID solution is designed to prevent such thefts by working automatically to identify, locate and track assets as they move around a facility.
 
AXCESS' ActiveTag system provides a solution to agencies reportedly losing personally identifiable information that works in concert with standard security alarm equipment, to identify authorized personnel and provide instant message alerts when unauthorized individuals attempt to remove tagged laptops or other assets.
 
The technology, which manages assets with no manual human involvement, can identify a laptop by using a small battery-powered property tag attached to the computer, often with an optional anti-tamper circuit that serves as a fail safe measure.
 
U.S. Congress is considering five bills that require safeguards and prompt notification of potential victims of identity theft.
   
AXCESS' ActiveTag RFID/RTLS and sensing systems use small, re-usable battery-powered tags that when automatically activated, transmit a wireless message typically 30 to 100 feet to hidden palm-size receivers. The receivers are connected via standard network simultaneously to the enterprise system software, the existing security alarm equipment, and stand-alone middleware and enduser software provided by AXCESS under the Online Supervisor label. Tags last five years or longer.
Posted by: AT 06:16 pm   |  Permalink   |  
Monday, 09 April 2007
Theregister.co.uk: A group of Dutch researchers at Vrije Universiteit in Amsterdam is building RFID Guardian, a personal RFID firewall to allow individuals to monitor and control access to RFID tags. RFID Guardian is intended to be a portable, battery-operated device that will tell users when new RFID tags appear, when they're being read, and who owns them.
 
Read more
Posted by: AT 06:51 pm   |  Permalink   |  
Tuesday, 20 March 2007
Prepaid-press.com: The contactless card tag consists of a semiconductor chip or set of chips and an antenna that relays radio frequency signals into and out of the chip at the point of the transaction. This passive RFID technology creates a fear factor for most people who don't understand how it works. In some cases, however, this fear is reasonable.
 
Read more
Posted by: AT 02:21 pm   |  Permalink   |  
Monday, 12 March 2007
CALGARY, Canada · Calgary Health Region's 24,000 employees will have greater access to personal human resources information via new IBM self-service kiosks installed in hospitals, clinics and offices.

IBM worked closely with the Calgary Health Region to design a kiosk that met its needs. IBM migrated the Region's applications to the new hardware and monitors, and manages and provides help-desk-support services for 100 kiosks the Region is deploying.
 
The IBM Anyplace Kiosk has an LCD-touchscreen display, keyboard and trackball, a built-in printer and a telephone preset to automatically dial help-desk support when the handset is lifted.

Using the kiosks, employees can access their human resources application, e-mail, company intranet and other related Web sites to submit health benefits claims, confirm or make changes to benefits coverage, or print out pay advice.

"We wanted to provide our employees with easy access to their human resources information, regardless of whether they work at a desk with a PC or not," said Margaret Munsch, a senior vice president at Calgary Health Region. "By providing self-service kiosks, our regional clinical and corporate employees, including clinical staff, porters, housekeeping and other support staff can quickly access their personal information anytime, regardless of which of our sites they may be working at on a given day."

Users identify themselves by logging onto the kiosk with a secure, personal ID.
Posted by: AT 04:04 pm   |  Permalink   |  
Friday, 02 March 2007
Mercury News: One month after fast-pass security kiosks opened at San Jose's airport, only about one-third of the Bay Area travelers who have applied to join the program have been cleared to speed through checkpoints. Although the kiosks are averaging about 20 to 25 users a day at Mineta San Jose International, some fliers who applied for the cards when enrollment kiosks opened in October still haven't received them.
 
Read more
Posted by: AT 04:34 pm   |  Permalink   |  
Friday, 16 February 2007
COLORADO SPRINGS, Colo. — RealTime Shredding Inc., developer of self-service shredding kiosks, has added its first dealer, Tallahassee, Fla.-based Identity Theft Solutions Corp.
 
According to a news release, Identity Theft Solutions will market RealTime's Self-Service Shredder as an integral part of its fraud protection and resolution services and products.
 
"The Self-Service Shredder fills a need for small and mid-sized businesses and organizations, for which neither home shredders nor mobile shredding are appropriate," said Keith Carr, Identity Theft Solutions' president.
 
Home shredders, "can be laborious, time-intensive and unsafe" for business use, he said. 
Posted by: AT 12:29 pm   |  Permalink   |  
Wednesday, 14 February 2007
The Calgary Sun: With an eye to speeding up travel between Canada and the United States, iris-recognition technology will soon take off at Calgary International Airport. The technology will allow travelers to bypass long waits in customs inspection lines by using automated self-serve kiosks that scan their eyes for security clearance.
 
Read more
Posted by: AT 12:40 pm   |  Permalink   |  
Tuesday, 06 February 2007
CYPRESS, Calif. · The new SMARTPIN from ID TECH is designed to be built into self-service kiosks, ATMs, vending machines, gasoline pumps and similar applications.
 
"As the manufacturer of the SecurePIN hand-held PIN entry products, the next logical step was the development of this robust panel-mounted PIN-pad product," said Terry Conant, ID TECH's executive vice president and chief technology officer.
 
The PIN pad is being released with options for a back-lit LCD and plastic or metal keys. The companion products will include a selection of Payment Card Industry-certified hybrid card readers for chip and PIN operations. The keys have both audio and tactile feedback. Additional features include selectable language options and a choice of USB-CDC or RS232 communication interface.
 
SmartPIN also is designed for outdoor and unattended applications.
  
For new installations or upgrading existing equipment, SmartPIN has the features and operations to support secure PIN-entry applications. It also provides DES and Triple DES encryption algorithms and DUKPT for key management.
Posted by: AT 01:16 pm   |  Permalink   |  
Tuesday, 19 December 2006
COLORADO SPRINGS, Colo. · Businesses and residents along Colorado's Front Range can now quickly, conveniently and inexpensively shred documents and other materials at UPS Stores.
 
The Self-Service Shredder, developed by Colorado Springs-based RealTime Shredding Inc., cross-cuts paper, cardboard, credit cards, paper clips, staples, CDs, DVDs and floppy disks. The industrial-strength shredder, featuring multiple control points for maximum safety, can shred up to 200 sheets of paper a minute. Individuals can bring in any material they want to shred and do so for $1 per 2-minute session.
 
The service is a natural extension of the document services, packing, shipping, and mailbox and postal services UPS Stores already offer, said Mike Fye, owner of The UPS Store in Monument.
 
Whether it's someone who is ready to clean out the basement and destroy 15 years of old phone bills, or a business that needs to shred old documents, "it's easy, inexpensive, and makes good sense,"� Fye said.
 
At the same time, the Self-Service Shredder helps local businesses and individuals prevent identity theft, said Amanda Verrie, president of RealTime Shredding. Identity theft is now the fastest-growing crime in the United States, according to the National Crime Prevention Council. More than 9.3 million Americans were the victims of identity theft last year, resulting in losses of $52.6 billion to individuals, businesses and government.
 
Businesses, Verrie said, appreciate the ease of the Self-Service Shredder to help them comply with HIPAA and FACTA document-destruction requirements. The ability to see the material shredded eliminates worries about personal information being lost or stolen.
Posted by: AT 08:47 am   |  Permalink   |  
Thursday, 14 December 2006
SourceNews.com: The U.S. government approved new technology that will automatically scan shoes and boots for bombs, and promises that travelers will soon be spared the trouble of scurrying through security in their socks. The devices will be available to passengers enrolled in the Registered Traveler program, which uses biometric ID kiosks to speed airport security checks.
 
Read more
Posted by: AT 08:00 am   |  Permalink   |  
Tuesday, 28 November 2006
Business Travel Executive: British Airways plans to launch the Clear Registered Traveler program at Terminal 7 of John F. Kennedy International Airport this fall and market the program to its North American customers. By entering the Registered Traveler program, participants submit to a series of background checks and use security kiosks to bypass the ordinary queues for security checks.
 
The BA deployment makes it the first airline to market the program. JFK is the first airport in the New York area to have the security pass program. Clear will use mobile kiosks to enroll British Airways corporate clients who travel overseas regularly from JFK's Terminal 7.
 
Read more
Posted by: AT 09:26 am   |  Permalink   |  
Monday, 13 November 2006
Wheeling News-Register: A staff editorial in the Wheeling News-Register sharply criticizes new background checking kiosks at a high school in St. Albans, W. Va., saying the machines provide little, if any, security.
 
Read more
Posted by: AT 09:50 am   |  Permalink   |  
Wednesday, 11 October 2006
JENKS, Okla. - Visitors to Jenks High School will soon be greeted by a new school-safety tool called LobbyGuard. LobbyGuard's visitor-management kiosk can instantly check all campus visitors against national and state sex-offender registries and other criminal databases, and notify appropriate school and district personnel if a match is made.
 
"One of the most challenging areas for most of the nation's schools is the monitoring of who is coming into our children's buildings," said Roger Wright, executive administrator of School Safety and Emergency Preparedness for the Jenks district.
 
LobbyGuard operates in hundreds of public and private schools and administrative facilities across the United States. The demand for visitor background checks came from school systems themselves, even before states started passing the Jessica Lunsford Act, which requires schools to screen campus visitors against criminal databases.
 
LobbyGuard requires a driver's license to sign in, runs an instant background check on the visitor, and matches the visitor to any student he or she is allowed to pick up.
Posted by: AT 10:57 am   |  Permalink   |  
Wednesday, 11 October 2006
The Oregonian: A robbery Oct. 10 at a Northeast Portland ATM couldn't have gone better for the victim.
 
He was across the street from a Multnomah County Sheriff's Office, and deputies were just rolling in to start the night shift when the crime occurred. The victim had just withdrawn $100 from a U.S. Bank when two men showed him a butcher knife and demanded the money.
 
Read more
Posted by: AT 10:56 am   |  Permalink   |  
Monday, 25 September 2006
SNPX.com: Breaking into an ATM might not involve ramming it with a forklift after all. A security researcher has discovered it can be done using something much less violent — a Google search. According to a report on eWeek, respected security researcher Dave Goldsmith, founder of Matasano Security and formerly of @Stake, used Google to find master passwords for a popular U.S. ATM brand, the Tranax Mini-Bank 1500 series, in only 15 minutes.
 
Read more
Posted by: AT 11:37 am   |  Permalink   |  
Monday, 25 September 2006
SNPX.com: A new report by Forrester Research entitled "Anyone Who Says RFID Is ‘Completely Secure' Is Selling Something,"� describes the main areas of vulnerability within an RFID deployment and provides recommendations in the form of steps companies should take to protect data. The same types of attacks to which any type of database is vulnerable could be levied against RFID middleware, it warns.
 
Read more
Posted by: AT 11:37 am   |  Permalink   |  
Wednesday, 16 August 2006

SAN FERNANDO, Calif. · Heineken USA and Precision Dynamics Corporation, provider of automatic wristband identification, are joining to ensure that all attendees are 21 or older Aug. 19 at Heineken's AmsterJam music festival in New York City.

PDC developed the AgeBand system, which utilizes software developed by Intelli-Check in cooperation with the American Association of Motor Vehicle Administrators, to ensure all attendees are of legal drinking age. The AgeBand system scans and verifies IDs and instantly prints a wristband with pertinent patron information, including the date and time of check along with the number 21, to indicate age-verified. The system provides defensible action against underage drinking, reduces instances of human errors when checking IDs, and provides non-transferable positive-age verification, access control and security.

Supporting the AgeBand system is Intelli-Check's PDA-like device, ID-Check Mobile, which also scans and verifies a patron's identification and age, offering additional mobility and flexibility to the overall age verification system.

At last year's AmsterJam, which sold out with more than 30,000 concert goers, more than 1,000 people were turned away using the AgeBand and Intelli-Check age verification systems. This year, 20 AgeBand systems and four ID-Check Mobile systems will be onsite to efficiently check attendees.

"Heineken has a long-standing commitment to prevent underage drinking," said Dan Tearno, vice president of corporate relations for Heineken USA. "Our great partnership with PDC enables the use of accurate, state-of-the-art technology that quickly and efficiently verifies that all attendees at AmsterJam are of legal drinking age, while minimizing any inconvenience and maximizing the experience of concert goers."

Since July 2005, Heineken USA has used the PDC AgeBand Wristband System at a series of company-sponsored concert events, making it the first alcohol beverage company to use AgeBand technology in this manner. Heineken USA used AgeBand to restrict underage access at its first AmsterJam concert in 2005, which boasted more than 30,000 attendees, and to restrict underage consumption at special events of all sizes across the country.

Posted by: AT 10:31 am   |  Permalink   |  
Thursday, 03 August 2006
Jacksonville.com: Leaders of major companies like Microsoft, Cisco Systems Inc., and underground researchers sit in a tight closed room to learn how to attack a secured popular Cisco Systems Inc. router that sends telephone calls over the Internet during the Black Hat conference in Las Vegas, Tuesday, Aug. 1, 2006. About 6,000 people will attend the Black Hat and Defcon conference, which runs Wednesday through Sunday.
 
The middle-aged G-men who wear crisp suits and consort with teenage hackers sporting purple hair can make the two conferences that will converge in Las Vegas this week look like a scene from a science-fiction movie.
 
Read more.
Posted by: AT 11:10 am   |  Permalink   |  
Wednesday, 02 August 2006
iAfrica: Absa on Tuesday raised concerns over the increase in incidents in which explosives are used to blow open ATMs.
 
"We take this matter very seriously as it is not only damage to property, but also a danger to our customers," said general manager of self service Prazesh Mahadeo.
 
Read more.
Posted by: AT 11:12 am   |  Permalink   |  
Friday, 21 July 2006
Amarillo, Texas - Visitors and residents in Amarillo, Texas, now are preventing identity theft quickly, conveniently and inexpensively with the nation's first self-service shredding kiosk.
 
RealTime Shredding, developer of the first self-service kiosk to help consumers and businesses fight identity theft, has installed kiosks at a school district and an RV park in Amarillo. These installations represent the first RealTime Shredding kiosks in use at any U.S. educational institution or RV park, says Amanda Verrie, RealTime Shredding president.
 
At Cal Farley's Boys Ranch Independent School District, administrators are using the kiosk to increase staff productivity and insure compliance with state, federal and internal document destruction regulations. The organization already has reduced the time spent on shredding by at least 75 percent, and anticipates savings in staff cost of $10,000 or more on an annual basis. In addition, the district no longer needs to purchase multiple smaller shredders throughout the year that frequently jam and break, and no longer needs to hire part-time help to keep up with shredding requirements. Business access codes and accompanying reports track and document use by department.
 
At Fort Amarillo RV Park, Owner Bobby Prescott is offering the RealTime Shredding kiosk as an additional convenience for park visitors. Guests can bring in any material they would like to shred and do so at a cost of $1 per two-minute session. With RealTime Shredding's industrial-quality shredder, that equates to up to four pounds, or about 400 sheets of paper. "Long-term guests, as well as those here for shorter stays, find it very handy," says Prescott. He also is using the self-service shredder to destroy sensitive business documents and other materials.
 
RealTime Shredding use at RV parks and educational institutions "makes great sense in terms of helping prevent identity theft and achieving these organizations' goals," says Amanda Verrie, RealTime Shredding president. With President Bush's recent executive order creating the nation's first-ever Identity Theft Task Force, Americans' consciousness about protecting their good names is on the rise, she says, and shredding continues to grow in importance. Identity theft is now the fastest-growing crime in the United States, according to the National Crime Prevention Council. More than 9.3 million Americans were the victims of identity theft in 2005, resulting in losses to individuals, businesses, and government of $52.6 billion.
 
Both Boys Ranch Independent School District and Fort Amarillo RV Park are appreciating the simplicity, safety, and convenience of the shredding kiosk, adds Verrie. Since it cross-cut destroys cardboard, credit cards, paper clips, staples, CDs, DVDs, and floppy disks -— in addition to paper -— users can shred quickly and efficiently. Ability to see the material shredded in real time eliminates worries about personal information being lost or stolen.
 
RealTime Shredding, Inc. (www.realtimeshredding.com) develops and markets the first self-service shredding kiosk designed specifically for consumers and businesses. RealTime Shredding kiosks provide a fast, convenient, inexpensive way to shred documents and other materials that must be destroyed. Based in Colorado Springs, the woman-owned and-operated company offers multiple kiosk models and options, with purchase, revenue-sharing, and lease plans available.
Posted by: AT 11:36 am   |  Permalink   |  
Wednesday, 12 July 2006
July 12, 2006 -- The Swedish Reitan Servicehandel, which is part of the Reitan Group has opted to install Wincor Nixdorf's cash management solution iCASH at six of its 7-Eleven stores in order to automate in-store cash processes. System rollout will begin in autumn 2006. After several pilot installations, this contract represents Wincor Nixdorf's first order in the retail cash management area.
 
Since April, the Reitan Group has been using two of its 7-Eleven stores in Stockholm to test how modern automation technology can be used to optimize cash processes.
 
Wincor Nixdorf provided its iCASH solution for the pilot project. The delivery comprises the coin module iCASH/15, the banknote module iCASH/50 and the iCASH software. The project's objective is to use this cash management solution to automate cash handling processes, reduce inventory discrepancies and increase in-store security.
 
In adopting this solution, the Reitan Group is following the recommendations of the Swedish National Board of Occupational Safety, which has called for increased security in stores situated in hazardous locations and those offering extended hours of business. The board had demanded that cash be dealt with in closed cycles with notices posted to the effect that employees were not able to access any cash. These recommendations were made as a response to Sweden's increasing number of robberies.
 
The coin module iCASH/15 and the banknote module iCASH/50 are integrated into the staff side of the counter and are both operated by the POS personnel. Both modules are recycling units, which means that cash previously paid in can subsequently be used to give change. This makes it possible to optimize the intervals at which the cash on hand needs to be replenished or picked up. POS personnel no longer need to handle any cash except when conducting an actual sale: banknotes are stored in a safe that can be opened only by CiT operatives.
 
The modules are controlled by the specially-developed iCASH software, with an interface provided to integrate the cash management systems into the POS software.
 
The closed and automated cash cycle excludes the possibility of employees making careless mistakes, for instance when giving change, and makes deliberate pilfering equally impossible. But the system's primary benefit is the reduction in costs due to process automation — not only for those processes exclusive to POS stations but also for POS handovers and the final cash audit.
 
As Lothar Wolf, Marketing Manager of the Retail Cash Management Division says, "Cash processes, from the POS station through the cash office right down to the CiT operatives' pick-up and replenishment operations, offer considerable potential for increasing productivity. Our products, which range from process consulting to outsourcing companies' entire cash handling activities, enable us to offer retail enterprises a modular solution portfolio for the entire process chain — from the POS to the bank."
Posted by: AT 11:58 am   |  Permalink   |  
Tuesday, 11 July 2006

July 10, 2006-- Hand Held Products, Inc., the worldwide leader in verification solutions, today announced the immediate availability of the Quick Check 890 verification system for validating the readability and standards compliance of printed linear bar codes.

The Quick Check 890 verifier system consists of the QC890 input device and Quick Check ImageData software, providing an out of the box verification solution ideal for retail, warehouse and distribution, and healthcare - as well as other industries where bar code quality is critical to operations.

The only verifier powered by Adaptus Imaging Technology 5.0, the Quick Check 890 verification system enables companies to easily meet ISO/IEC test parameters for bar code symbol conformance.

Key features and functionality include:

  • Hands-free operation for increased test repeatability
  • Support for multiple languages
  • Easy-to-use menu-based user interface
  • Flexible connectivity - RS232 & USB or Bluetooth wireless
  • Simple set-up and operation - compatible with Microsoft Windows and Windows Mobile 2003, as well as the Mac OS.

"Bar code quality is critical to productivity and efficiency. Whether you're a manufacturer, distributor or retailer - bar codes that are damaged, incorrect or of poor quality can lead to data errors - negatively impacting operations," said Chuck Biss, VP of verification products, Hand Held Products. "We've designed the Quick Check 890 verification system to be a simple out-of-the-box solution - users get everything they to need to deploy an effective verification program in one convenient hardware and software bundle."

The Quick Check 890 verification system is available by calling Hand Held Products at 1-800-582-4263 or by visiting www.handheld.com.


About Hand Held Products

With headquarters in Central New York, Hand Held Products is a worldwide leading manufacturer of image based data collection systems for mobile, wireless, and transaction processing solutions. Through its proprietary Adaptus(TM) Imaging Technology platform, Hand Held Products is dedicated to delivering innovative imaging solutions, reliability and durability to its customers and partners through more than 30 sales offices and hundreds of resellers. Hand Held Products is a privately held company and is represented in every major market and geographic region of the world. To find out how Hand Held Products can help you at the point-of-sale, on the sales floor, in the warehouse or on the delivery truck, call us at 1-800-582-4263. Or visit us at handheld.com.

This material contains forward-looking statements, which involve risks and uncertainties that may cause actual results to differ materially from those projected in this publication. While Hand Held Products believes its statements to be reliable, all information/projections/statements/opinions expressed herein are based on information available as of the date of publication and are subject to change without notice.

Posted by: AT 12:01 pm   |  Permalink   |  
Friday, 30 June 2006
News.com.au: Banks are offering a $50,000 reward for information leading to the arrest and conviction of bandits who rob automatic teller machines (ATMs) in NSW.

An increasing number of ATM robberies has led the Australian Bankers' Association (ABA) to extend their reward scheme to cover ATM robberies and ram raids.
 
Read more.
Posted by: AT 12:19 pm   |  Permalink   |  
Monday, 26 June 2006
Bizjournals.com: Global Resources Inc., which advertised business opportunities for public-access Internet machines at "lucrative locations" has been ordered to pay $2.2 million, including restitution to 96 people who the state says were defrauded out of their investments.
 
In the lawsuit filed by the Florida Agriculture and Consumer Services Commission, a Pinellas County circuit court judge ordered Global Resources, and its former owner Stewart Pope, to pay $960,000 in civil fines and more than a million dollars in restitution.
 
Read more.
Posted by: AT 12:31 pm   |  Permalink   |  
Wednesday, 21 June 2006
USA Today: Visa USA has confirmed that an ATM security breakdown has exposed more consumers to potential mischief.
 
The story is the latest in a string of lapses that have illuminated the often flimsy controls over the personal information entrusted to businesses, schools and government agencies.
 
The Visa breach dates back to February when Visa began notifying banks of a security problem affecting a U.S.-based contractor that processed automated teller machine transactions.
 
Read more. 
Posted by: AT 12:44 pm   |  Permalink   |  
Wednesday, 14 June 2006
businesswire.com: Visa USA announced an agreement with Verified Identity Pass, Inc. (Verified ID) to offer discounted memberships for Clear, Verified ID's registered traveler program, to select Visa Signature and Visa Traditional Rewards cardholders.
 
Clear members receive fast access through security checkpoints by verifying their biometric information in specially-designed Clear lines, enabling time-pressed travelers to quickly move through long lines and experience a more hassle-free travel experience.
 
Read more.
Posted by: AT 01:03 pm   |  Permalink   |  
Tuesday, 30 May 2006
Posen, Ill. - Corporate Safe Specialists, one of the largest suppliers of retail safes and cash handling systems, and Brink's, Inc. have collaborated to bring retail customers one of the most advanced safe and cash control systems ever devised. The new Brink's Compusafe 3000 Series safe will give customers new ways to cut losses, improve customer service, and increase business efficiency.
 
Brink's proven hardware is now coupled with CSS's Advanced Cash Control System, the most dynamic cash management software in the industry. The combination of CSS's ACCS and the Brink's Compusafe 3000 Series results in an easy-to-use and robust system for managing information and reducing loss.
 
Color touchscreen images prompt customers every step of the way and the easy-to-use software puts customers at ease instantly. The system also features an open architecture that allows for integration at the point-of-sale (POS), with back office solutions and other in-store management devices such as cell phones and PDA's. The ACCS verifies what is in the safe and securely delivers that data when and where it is needed. The six language translation of the device makes this a true global cash management solution. The ACCS software results in an "information safe." The most advanced auditing tools are included to bring labor savings to any store by reducing reconciliation time at shift close. The advanced software provides event monitoring, end-of-day reports, and video monitoring.
 
"The teams from both companies have succeeded in improving a proven cash management tool by coupling it with the most advanced software, ready to meet the challenges of today and tomorrow's retail cash management needs," said Ed McGunn, president and one of the founders of CSS. "The real beneficiaries of this collaboration are the customers and helping our customers has always been our number one goal."
 
"The safe has always been an integral part of our Compusafe Service, adding to the convenience, simplicity, and security that makes Brink's CompuSafe the most trusted name in the industry," says Glenn Mason, vice president of Compusafe Service, Brink's. "With its advanced technology and superior performance, the Brink's Compusafe 3000 makes cash processing fast and easy so managers spend less time managing their cash and more time managing their stores - and that's efficiency that goes straight to the bottom line."
 
About Corporate Safe Specialists:
 
Corporate Safe Specialists (CSS) founded in 1988 by three respected safe industry veterans is one of the largest suppliers of safes to the retail and restaurant communities, including a high percentage of Fortune Five Hundred Companies. Since its inception, the company's main goal has been to protect the interests and profits of their clients. To accomplish this they have continually enhanced and grown their product line and services. In addition to their full line of fireproof, burglar-proof and electronic safes, the company is a pioneer in kiosks designed for specialty retailers along with other loss prevention products. For more information go to www.corporatesafe.com
Posted by: AT 08:35 am   |  Permalink   |  
Friday, 28 April 2006

RealTime Shredding, developer of the first self-service shredding kiosk to help fight identity theft, has added business access codes to the kiosk's functions.
 
The new feature makes it easier than ever for retailers and corporations to incorporate the shredding kiosk into their standard operations and comply with HIPAA, FACTA, and Sarbanes-Oxley regulations, says Amanda Verrie, RealTime Shredding president. Companies and other organizations can assign and control up to 253 codes. By assigning codes to individual departments, divisions, offices, or other units, businesses can track usage or implement an internal chargeback system. Retailers, such as business and copy centers, can assign codes to individual business or consumer customers, making to routine shredding more convenient.
 
Additional features of the business access code function include:

  • LED display indicating time used for each user;
  • Ability to program shredding sessions of designated maximum length;
  • Customizable usage reports citing date, user, location time of day, time used, and amount collected (for retail models). 

RealTime Shredding's kiosk gives users the ability to shred documents and other material they want to destroy quickly, simply, and securely. The company's industrial-quality Level 3 cross-cut shredder can destroy up to four pounds, or about 400 sheets of paper, in just two minutes, and also can shred cardboard, credit cards, paper clips, staples, CDs, DVDs, and floppy disks.
 
Business access codes spell good news for corporations and retailers alike, says Verrie, with the introduction of the codes and corresponding management reports setting "a new standard in shredding." Users can see their material being shredded in real time, create an audit trail, and produce management reports. "These qualities are critical to help businesses comply with HIPAA, FACTA, and Sarbanes-Oxley," she explains.
 
In addition, because the receptacle for the shredded material is located behind a locked window, users can see the material being shredded, but cannot dispose of it themselves. This feature, says Verrie, eliminates some of the problems that have arisen in recent corporate finance scandals. "It's no longer enough just to shred," she says. "Companies must take responsibility for ensuring the proper handling of the shredded material, and the RealTime Shredding kiosk can go a long way toward facilitating that level of responsibility." 

RealTime Shredding, Inc. (www.realtimeshredding.com), develops and markets the first self-service shredding kiosk designed specifically for consumers and businesses. RealTime Shredding kiosks provide a fast, convenient, inexpensive way to shred documents and other materials that must be destroyed. Based in Colorado Springs, the woman-owned and -operated company offers multiple kiosk models and options, with purchase, revenue-sharing, and lease plans available.
 
Contact: Amanda Verrie
RealTime Shredding, Inc.
719-488-3655

Posted by: AT 09:00 am   |  Permalink   |  
Monday, 17 April 2006
ENGLEWOOD, Colo. - (BUSINESS WIRE) - Arrow Enterprise Computing Solutions, a business division of Arrow Electronics, Inc. (NYSE: ARW), today announced it will partner with McAfee, Inc. (NYSE: MFE) to deliver two new McAfee(R) Foundstone(R) courses to enhance system engineers' Vulnerability Management capabilities and to offer general enterprise security product training. Both sessions will be held at the Courtyard Marriot in Herndon, Virginia, April 18 through April 20.
 
In an effort to enhance security trainings and course offerings to system engineers, Arrow recognized the growing risks to enterprises as the number of new vulnerabilities and the speed and sophistication of attacks seeking to exploit those vulnerabilities increase significantly every year. Free to McAfee SecurityAlliance(TM) solution providers, the courses created by Arrow provide attendees with informative insight surrounding vulnerability issues.
 
Both courses offer a combined lecture and lab environment to teach systems engineers how to proactively manage network vulnerabilities and security threats using McAfee's prioritized approach to vulnerability management, how these new appliances help benefit each organization and how to gain maximum value from Foundstone Enterprise solutions. Foundstone Enterprise is a priority-based, enterprise-class security solution that automates, simplifies and integrates existing vulnerability management processes. Foundstone protects the critical network infrastructure with a consistent, measurement-based approach that incorporates asset discovery, inventory, and prioritization; threat intelligence and correlation; regulatory compliance measurement; remediation tracking and reporting.
 
"These courses were designed to help our partners become better educated on today's ever evolving security solutions such as McAfee Foundstone Vulnerability Management and overall product solutions," said Rich Severa, president, MOCA Group. "With these new courses, we are strengthening our partners' knowledge base to better support and supply their customers with the latest technologies available in the security marketplace."
 
The McAfee Foundstone Vulnerability product training courses will instruct system engineers to:
  •    Install, configure and efficiently utilize all of the features
       of McAfee Foundstone Enterprise.
  •    Navigate through the McAfee Foundstone product feature set and learn how to effectively deploy the technology.
  •    Learn vulnerability management best practices, which enable
       more efficient remediation and risk reduction.
  •    Learn to create, modify, enhance, and schedule scan
       configurations that adhere to specified criteria.
In the product training courses, attendees will learn how to:
  •     Proactively manage vulnerabilities, threats, and assets.
  •     Ensure ways to maximize potential from McAfee Foundstone
            Enterprise.
    About Arrow ECS
Arrow ECS is the global business group of Arrow Electronics, Inc. (NYSE: ARW) that provides enterprise and midrange computing products, services and solutions to value-added resellers, system integrators, and independent software vendors (ISVs). Based in Englewood, Colo., Arrow ECS connects its customers to an exclusive network of the world's foremost technology suppliers, including HP, IBM, Sun Microsystems, EMC, NetApp, Hitachi Data Systems, and other leading storage networking, software, and security suppliers. Arrow Electronics reported $2.7 billion in worldwide computer products sales in 2005. Visit us at www.arrowecs.com.
Posted by: AT 10:48 am   |  Permalink   |  
Wednesday, 29 March 2006
Detroit, MI -- GARTNER Wireless & Mobile Summit - Symbol Technologies, Inc. (NYSE:SBL), The Enterprise Mobility Companyâ„¢, today announced new wireless network infrastructure features for increased coverage, enhanced security and mobility - including Layer 3 roaming, mesh networking and wireless security with location-based services. These new features enable enterprises to operate more efficiently with increased security, and expand their wireless coverage area. Symbol also announced the MC9090 family of premium rugged mobile computers for demanding environments.
 
"Businesses with a growing number of mobile users continually need to address challenges in wireless coverage, network security and user mobility. Addressing these challenges requires the enterprise to implement mobility as a complete system — end-to-end," said Anthony Bartolo, vice president and general manager of Symbol's Wireless Infrastructure and RFID Divisions. "This means taking into account the users, devices, applications, network infrastructure and management. With this approach, customers should utilize their wireless infrastructure to optimize their mobile applications."
 
Expanded Coverage, Security and User Mobility for "Business-Critical Wireless"
Symbol's new wireless features are designed to optimize mobile applications in the enterprise — including solutions to extend wireless networks to previously cost-prohibitive or physically-challenged locations; provide persistent mobility; secure the wireless network, and add location-based services throughout the enterprise.
 
The enterprise edge is evolving from traditional wired workstations to wirelessly connected devices. Networks are expanding within and outside "the four walls," requiring a wireless infrastructure designed for new and challenging environments. Symbol's mesh networking solution provides the functionality to securely extend the perimeter of wireless coverage to locations previously too expensive or physically impossible to wire. The Symbol mesh architecture provides a resilient system that is intuitive to deploy, "self-healing" and capable of supporting high-bandwidth voice, video and data applications on standards-based wireless devices. With a Symbol wireless mesh network, businesses can now deploy an expansive wireless network beyond the main campus to support business-critical applications at the point of activity, avoiding the expensive requirement of installing traditional Ethernet cabling.
 
Symbol's award-winning WS5100 wireless switch will soon feature Layer 3 roaming capabilities to enable true enterprise mobility. Layer 3 roaming allows mobile users to maintain connectivity as they roam throughout the enterprise and help ensure applications such as voice and video are available and connected as they move. This feature further enhances Symbol's predictive roaming technology already found on its family of mobile computing devices to enable high-bandwidth, connection-sensitive applications.
Symbol's Wireless Intrusion Protection System (IPS) delivers 24-by-7 protection against unauthorized access and malicious attacks on a wireless network. The upcoming release of Wireless IPS will provide network managers with the ability to visualize and monitor the RF domain and wireless network capacity, and ultimately, identify the source and location of a rogue attack. With Symbol Wireless IPS, businesses can extend location-based services throughout the enterprise, and quickly locate devices in the wireless space and disarm potential threats. This feature helps to ensure maximum up-time and peak performance of the wireless network and mobile computers.
 
New "Connected" Flagship Rugged Mobile Computer
The MC9090 family of mobile computers builds on Symbol's market-leading MC9000 series of rugged handheld mobile computers . Symbol MC9090 mobile computers support current and next-generation business-critical applications that help maximize the efficiency and productivity of mobile workers inside and outside "the four walls" of the most demanding environments such as manufacturing and warehouse floors, field sales and delivery. The MC9090 series of mobile computers combines the latest in mobile operating systems and processing power with advanced data capture options and integrated multi-mode wireless connectivity including wide area network (WAN), 802.11a/b/g wireless LAN (WLAN) and Bluetooth-enabled wireless personal area network (WPAN) — for anytime, anywhere voice, video and data connectivity.
 
"Extreme ruggedness, multi-mode wireless WAN/LAN/PAN, and three distinct form factors based on a common high-performance platform has made the original MC9000 mobile computer the best-selling rugged mobile computer in the industry," said Brian Viscount, vice president of product marketing for Symbol's Mobile Computing Division. "To date, Symbol's MC9090 mobile computer maintains its best-in-class, best-selling rugged mobile computer status, and provides our customers with key refinements in areas such as voice and data convergence for increased productivity and true competitive advantage."
 
In manufacturing environments, the MC9090 mobile computer can be used to instantly track parts, inventory and shipments, as well as arrange for just-in-time delivery by connecting with suppliers worldwide. The MC9090 mobile computer can also help improve and accelerate assembly line and plant operations, and notify staff when inventories are running low before it is too late. Select MC9090 mobile computer models support reading of direct part markings (DPM) used in the manufacture of metal parts in industries such as automotive and aerospace, as well as Push-to-Talk walkie-talkie capability and integrated GPS (Global Positioning System) support built into the recently announced MC9097 mobile computer — the industry's first iDEN rugged mobile computer.
 
The MC9090 family of mobile computers is available with Symbol's "Service from the Start" comprehensive coverage, a three-year service agreement that includes a three-day turn-around for products sent to Symbol repair centers.
 
About Symbol Technologies
Symbol Technologies, Inc., The Enterprise Mobility Company, is a recognized worldwide leader in enterprise mobility, delivering products and solutions that capture, move and manage information in real time to and from the point of business activity. Symbol enterprise mobility solutions integrate advanced data capture products, radio frequency identification technology, mobile computing platforms, wireless infrastructure, mobility software and world-class services programs under the Symbol Enterprise Mobility Services brand. Symbol enterprise mobility products and solutions are proven to increase workforce productivity, reduce operating costs, drive operational efficiencies and realize competitive advantages for the world's leading companies.  www.symbol.com.
 
About the Gartner Wireless & Mobile Summit
Gartner Wireless & Mobile Summit 2006 offers new concepts and best practices to increase ROI on wireless investment, insights on the future of wireless, and unbiased perspectives on devices, systems, integration and the latest trends. The summit provides the critical information necessary to make the best choices to reduce costs, while maximizing current and new mobile initiatives. Additional information is available at www.gartner.com/us/wireless
Posted by: AT 12:07 pm   |  Permalink   |  
Wednesday, 29 March 2006
ST. PAUL, Minn.--(BUSINESS WIRE) -- 3M today announced its newest, high-security anti-counterfeiting label will be introduced on March 30 at the Authentication Connections Forum in Tampa, Fla. This new security solution, the 3M Confirm authentication label with floating image technology, incorporates a unique eye-visible security feature that provides powerful product authentication and can be verified easily with or without the use of a tool.

The label's floating image has an optically variable device (OVD) - a unique, overt security feature. The OVD image appears to "float" above or "sink" below the surface of the label and then disappear as the viewing angle changes. Dramatic movement of the image is easy to detect and recognize using only the human eye, enabling quick and easy authentication that proves the label and product are genuine. The label also incorporates a very secure and time-tested covert security feature inherent to Confirm security material.

"Electronics, pharmaceuticals, automotive parts, apparel, and cosmetics - the list of items that are counterfeited is endless," said Bill Markovitz, marketing development manager, 3M Security Systems. "The new Confirm security label will allow manufacturers and distributors to certify their products as authentic and then let wholesalers, retailers and end-consumers rapidly identify fakes. 3M currently sells a similar security product to governments for passports and driver's license programs. That same high level of security now will be available for commercial applications."
 
These labels build on 3M's proven retroreflective security technology - 3M Confirm security labels - which have been very well-accepted in the security marketplace for more than 25 years. The new floating image security feature enhances the inherent security of Confirm authentication labels and is based on proprietary technology. Verification is easier than ever and can be accomplished by a diverse population.
 
For more than 30 years, 3M has provided premier security solutions and services that identify, authenticate, secure and track materials and information by combining security and productivity. Drawing on its broad technology base and expertise, 3M creates solutions for a wide array of security needs. Examples include issuance and authentication of travel documents and personal identification cards, brand and asset protection solutions to fight counterfeiting and tampering, file tracking solutions, and library security and workflow management solutions.
 
About 3M -- A Global, Diversified Technology Company
Every day, 3M people find new ways to make amazing things happen. Wherever they are, whatever they do, the company's customers know they can rely on 3M to help make their lives better. 3M's brands include Scotch, Post-it, Scotchgard, Thinsulate, Scotch-Brite, Filtrete, Command and Vikuiti. Serving customers in more than 200 countries around the world, the company's 69,000 people use their expertise, technologies and global strength to lead in major markets including consumer and office; display and graphics; electronics and telecommunications; safety, security and protection services; health care; industrial and transportation. For more information, including the latest product and technology news, visit www.3M.com.
 
3M, Confirm, Scotch, Post-it, Scotchgard, Thinsulate, Scotch-Brite, Filtrete, Command and Vikuiti are trademarks of 3M
Posted by: AT 12:03 pm   |  Permalink   |  
Tuesday, 28 March 2006
YORKTOWN HEIGHTS, NY, and ZURICH, SWITZERLAND -  IBM today announced new intrusion detection capabilities to help clients detect, prevent and analyze hacker attacks.
IBM researchers have designed a novel intrusion detection tool, code named "Billy Goat," that not only provides early detection of worm attacks but also greatly reduces the false alarm rate. The tool masquerades as a collection of servers on the network. Actual servers do not communicate with Billy Goat, but criminals who randomly attack servers are likely to stumble over it. As soon as Billy Goat gets attacked it quickly identifies the attacking systems and fences them off -- effectively isolating worms and viruses before they can propagate much further.
 
"Integrity of financial transactions, confidentiality within a virtual enterprise, privacy of customer data and availability of critical infrastructure all depend on strong security mechanisms," said Peggy Kennelly, vice president of IBM's On Demand Innovation Services. "IBM Research and Business Consulting Services work together to offer world-class solutions to everyday security threats that make sense for your business, whether you have 100 employees or 100,000."
 
Due to the strain on systems administrators during attacks, the most important property of any intrusion detection system is that it is free from the high rate of false alarms produced by many other sensors. The Billy Goat system minimizes false alarms through the use of a novel architecture that combines an extensive view of the network, spoofed service interaction with potential attackers, and a clear focus on detecting automated attacks.
 
"Billy Goat uses a unique approach to detect malicious software by responding to requests sent to unused IP addresses, presenting what from a worm's-eye view looks like a network full of machines and services," says Dr. James Riordan, the lead designer of the system at IBM's Zurich Research Lab. "In other words, Billy Goat creates a virtual environment for the worms. Such virtualization, by providing feigned services as well as recording connection attempts, helps Billy Goat trick worms into revealing their identity. This method allows the system to reliably and quickly identify worm-infected machines in a network."
 
One of the greatest threats to security has come from automatic, self-propagating attacks such as viruses and worms. These attacks scan networked servers at random until they are able to place a harmful program on a server using a maliciously crafted request. The program uses the now-infected server as a base from which to attack other servers. The direct result is rapid exponential growth in the number of attacks leading to load-induced network failure.
 
While the presence of these attacks is by no means new, the damage that they are able to inflict and the speed with which they are able to propagate have grown. Effective implementation of intrusion detection systems and techniques, such as Billy Goat, allows security problems to be identified before major damage occurs.
 
The technology is being made available through IBM's On Demand Innovation Services (ODIS), the partnership between IBM Research and Business Consulting Services (BCS), to help clients tap into the deep technical expertise of IBM Research along with the business insight of IBM's consultants. The ODIS team offers security and privacy services related to biometrics, digital rights management, identity management, intrusion prevention, privacy protection and secure systems.
 
About IBM
IBM is the world's largest information technology company, with 80 years of leadership in helping businesses innovate. Drawing on resources from across IBM and key Business Partners, IBM offers a wide range of services, solutions and technologies that enable customers, large and small, to take full advantage of the new era of e-business. For more information about IBM, visit www.ibm.com
Posted by: AT 12:12 pm   |  Permalink   |  
Wednesday, 15 March 2006
ARMONK, NY - 14 Mar 2006: Nearly 60 percent of U.S. businesses believe that cybercrime is more costly to them than physical crime, reports a recent IBM survey of companies in the healthcare, financial, retail and manufacturing industries. The costs resulting from cybercrime, these businesses report, are primarily from lost revenue, loss of current and prospective customers and loss of employee productivity.

Surveying 600 CIOs or other individuals qualified to answer questions about their company's IT practices, the IBM survey reveals that 84 percent of IT executives of U.S. businesses believe that organized criminal groups possessing technical sophistication are replacing lone hackers in the world of cybercrime. The threat from unprotected systems in developing countries is a growing challenge, according to almost three-quarters of respondents. And, alarmingly, almost three-quarters (74%) perceive that threats to corporate security are now coming from inside the organization.
 
These views come as a majority of respondents (61%) believe it is the joint responsibility of both the Federal and local law enforcement agencies to help combat organized cybercrime. These responses by businesses are in stark contrast to consumer beliefs. A recent IBM survey of consumers showed that 53 percent of Americans hold themselves most responsible for protecting themselves from cybercrime, while 11 percent felt it was the job of federal law enforcement agencies, and only four percent hold local law enforcement agencies responsible.
 
"U.S. IT executives are making it very clear how seriously they take cybercrime threat, both from internal and external sources," said Stuart McIrvine, director of IBM's security strategy. "Paralleling their growing awareness of the impact of cybercrime on their business is the view that this is not a battle they can fight wholly on their own. The nature of crime is changing, and businesses, technology providers and law enforcement must work together to ensure the right safeguards are being put in place to securely operate in today's environment."
 
Taking Action
In light of the growing threat of cybercrime, many companies have increased their security measures to guard against cybercrime. According to the IBM survey, 83 percent of U.S. organizations believe they have safeguarded themselves against organized cybercrime, and they are responding to the increased/changing threat of cybercrime in a number of ways:
 
  • Upgrading virus software (73%);
  • Upgrading their firewall (69%);
  • Implementing intrusion detection/prevention technologies (66%); and
  • Implementing vulnerability/patch management system on network (53%)

When asked which two initiatives were the most important to undertake over the course of the next year, IT business executives in the U.S. indicated upgrading their virus software (39%) and upgrading their firewall (32%) were of highest priority.
 
How the Industries Differ
IT executives in the Finance industry tend to be more concerned than their counterparts in other industries about the threat of cybercrime versus physical crime (50% cite it as a bigger threat versus 38% of the total surveyed). Respondents in Finance also perceive a greater cost impact from cybercrime than IT executives in other industries (71% versus 57%). The Healthcare and Manufacturing industries also find cybercrime to be more costly to their organization than physical crime, while the Retail industry still sees physical crime as having the greatest cost impact.
 
Retail respondents cite loss of revenue as having the greatest cost impact associated with cybercrime. Healthcare and Finance executives believe loss of prospective customers has a greater impact than do their counterparts in Retail and Manufacturing. Manufacturing respondents view damage to brand/reputation as far more of a concern (52%) than in the Healthcare (40%), Financial (35%), and Retail (32%) segments.
 
Global Comparison
IBM conducted the same survey in 16 additional countries to better gauge the attitudes regarding cybercrimes and their impact on international businesses. Both cybercrime and physical crime are viewed as considerable threats to U.S. and international organizations. And, when it comes to cost impact, both groups agree that cybercrime (57% of U.S. and 58% of international businesses) is more costly to their organizations than physical crime (43% and 42%, respectively).
 
However, while 83 percent of U.S. businesses boast that they have adequate safeguards in place to combat organized cybercrime, their international counterparts are not so confident, with just over half (53%) indicating they are prepared.
 
In combating cybercrime, there are some slight differences between U.S. and international IT business executives regarding their priority initiatives. The top two initiatives for U.S. businesses are upgrading their virus software (39% versus 24% of international businesses) and upgrading their firewall (32%). For international businesses, implementing intrusion detection/prevention technologies (33% versus 20% of U.S. businesses) and upgrading their firewall (27%) were the highest priorities. Just seven percent of U.S. businesses thought increasing the encryption of their files was a high priority while almost one-fifth (18%) of the international community thought this to be a higher priority.
 
The U.S. and international business community share the same concerns when it comes to the key costs associated with cybercrime. Both groups indicated that loss of revenue (63% U.S. versus 74% international) and loss of current customers (56% U.S. versus 70% international) would have the highest cost impact should their organization fall victim to a cybercrime. Damage to their brand/reputation is of much higher concern to international businesses than those in the U.S. Over two-thirds (69%) of international businesses cited this to be a key cost associated with cyber-crime, compared to only 40 percent of U.S. businesses. Conversely, legal fees are considered to be a key cost in the U.S. (33%) while of less concern internationally (19%). U.S. businesses are equally concerned about the loss of their current and prospective customers (56% for each) compared to the international community which is more concerned with losing current customers (70%) and less concerned about losing prospective customers (33%).
 
Methodology: Braun Research, Inc. conducted the survey on behalf of IBM. A total of 601 telephone interviews were conducted with U.S. businesses in the healthcare, financial, retail and manufacturing industry sectors during the period of December 2005 to January 2006, and 2,401 international businesses in sixteen countries (China, UK, India, Russia, Poland, Czech Republic, Germany, Spain, Italy, France, Argentina, Brazil, Australia, Mexico, Japan, and Canada) during January 2006. Eligible respondents were at the CIO level, a VP or higher reporting directly into a CIO, or other individuals who were well-versed and qualified to answer questions about their company's IT practices. The survey was fielded at the 95 percent confidence level with a margin of error of +/-2 percent for the global results and +/-8% for the U.S. results.
 
About IBM
IBM is the world's largest information technology company, with 80 years of leadership in helping businesses innovate. Drawing on resources from across IBM and key IBM Business Partners, IBM offers a wide range of services, solutions and technologies that enable customers, large and small, to take full advantage of the new era of on demand business. For more information about IBM, visit http://www.ibm.com.
 
Contact information
Adam Emery
IBM Media Relations
(914) 766-4696

Posted by: AT 01:12 pm   |  Permalink   |  
Thursday, 09 March 2006
At CeBIT, Wincor Nixdorf shows how ATM transactions can be additionally secured with the integration of biometric identification procedures.
 
Wincor Nixdorf has been involved with the practical application of biometric procedures for more than ten years now, and has carried out numerous pilot projects with customers internationally. At CeBIT, the company is presenting one of many possible applications. In the process on display, the tried-and-tested PIN is not replaced by biometric procedures; instead, it is made even more secure with the addition of fingerprint matching.
 
After inserting the card and entering a PIN, the customer is requested to place his/her finger on the sensor. The fingerprint is then scanned and compared to a template installed in the database. This so-called "one-to-one" comparison enables a highly secure authentication of each bank customer.
 
With the implementation of this technology, fraudulent reading of card data and tapping of PINs is rendered useless, since only the person whose fingerprint matches the biometric data stored in the database is allowed to complete the transaction.
 
For securing teller station workplaces or PC networks, Wincor Nixdorf already offers a biometric authorization solution using fingerprint technology. Audit-proof tracking of attempts to misuse the system is possible with the implementation of ProTectWork/Enterprise, since logging on under another user name is no longer possible. ProTectWork/Enterprise is server-based and can be used internationally
Posted by: AT 01:42 pm   |  Permalink   |  
Monday, 30 January 2006
Shredding kiosk helps consumers fight identity theft safely, conveniently, inexpensively
 
Jan. 30, 2006 — Individuals and small businesses looking to guard against identity theft now can do so easily, conveniently, and inexpe nsively with the first self-service shredding kiosk designed specifically for consumers and small businesses.
 
With the latest installation at Foothills Mall in Fort Collins, Colo., RealTime Shredding has six kiosks in operation. Users can bring in any material they would like to shred and do so at a cost of $1 per two-minute session. With RealTime Shredding's industrial-quality shredder, that equates to up to four pounds, or about 400 sheets of paper, says Amanda Verrie, the company's president.
 
The RealTime Shredding system cross-cut shreds more than just paper, according to Verrie.  It will shred cardboard, credit cards, paper clips, staples, and even CDs, DVDs, and floppy disks. Security Level 3 cross-cut shredding provides the highest level of security available outside of classified/government use. To assure safety, material enters the system several inches above the cutting blades, and then passes through two control points.
 
Identity theft is now the fastest-growing crime in Colorado and in the United States, according to the National Crime Prevention Council. More than 9.3 million Americans were the victims of identity theft in 2005, resulting in an annual cost to the individuals, businesses, and government of $52.6 billion. A study by the Better Business Bureau and Javelin Research indicates that nearly 88 percent of known-cause identity theft incidents occur "offline" — not via the Internet.
 
RealTime Shredding provides a simple, effective tool to provide consumers with the peace of mind that comes with knowing that documents they no longer need are being completely destroyed, says Verrie. Ability to see the material shredded in real time eliminates worries about personal information being lost or stolen.
 
Previously, explains Verrie, this type of powerful shredding was available only to large corporate users. With the critical need for tools to combat identity theft, RealTime Shredding offers an answer. Now, "for less than the price of a cup of coffee, a true identity theft tool is available."
 
RealTime Shredding kiosks are in operation in Colorado Springs (Chapel Hills Mall), Monument (The UPS Store), and Littleton (Southwest Plaza Mall), as well as at Cal Farley's Boys Ranch in Amarillo, Tex.  RealTime Shredding plans future expansion throughout the state and nation over the next year.  The company has received inquiries and interest from businesses in nearly a dozen states, says Verrie.
 
RealTime Shredding, Inc., develops, manufactures, and markets systems to help prevent identity theft. The RealTime Shredding self-service kiosk provides a fast, convenient, inexpensive way for consumers and small businesses to shred documents and other materials that must be destroyed. The woman-owned and operated company is based in Colorado Springs.
 
 
Contacts: Amanda Verrie
RealTime Shredding, Inc.
720-530-3444

 
Aimee Bennett, APR
Fagan Business Communications
303-843-9840/cell: 303-638-0233
,
Posted by: AT 09:42 am   |  Permalink   |  
Tuesday, 17 January 2006
PALO ALTO, Calif., and TOKYO, Japan, Jan. 17, 2006 - HP and Hitachi, Ltd. today announced that researchers from HP Labs Bristol, UK., and Princeton, N.J., and the Hitachi Systems Development Laboratory will conduct joint work on key security and privacy issues.

The HP and Hitachi research collaboration will focus on two primary themes: authenticating users and devices to improve security inside networks and the use of digital signatures to guarantee the authenticity of document content.

The first theme, network security and authentication, has been stimulated by the constant threat to IT infrastructures from, among many others, impersonation, computer viruses and worms. To combat these threats, HP and Hitachi researchers are investigating how to ensure that computers used to access corporate networks remotely - from home or from a hotel room, for instance - are appropriately authorized. The researchers are interested in developing technologies for a secure infrastructure that manages communications based on the authentication of the integrity of both the PC and the user.

This approach will take advantage of authentication technologies such as Hitachi's Certificate Validation Server (CVS) and the HP ProtectTools Embedded Security PC solution. The researchers will investigate innovative yet highly practical ways to deploy "trusted computing" technology in corporate settings. The goal of this project is to significantly improve important aspects of IT infrastructure security by providing a high-grade, lower-cost technology foundation for enforceable security policy and strengthened identity across a range of devices.

The focus of the second theme, content security research, is to address the problem of how to guarantee the integrity of documents and data by using digital signatures while allowing changes to be made to them.

For example, it may be necessary to delete sensitive data such as names and company secrets from a document for reasons of privacy or confidentiality, yet show that the visible portion of the document is authentic. This process is regularly applied to documents affected by the U.S. Freedom of Information Act and similar laws in other countries. This type of technology also would help ensure the authenticity and integrity of audit trails, an important issue for companies complying with legislation such as Sarbanes-Oxley.

Content security also could be used to demonstrate the integrity of audit trails, for example to third-party auditors, while still retaining confidentiality and privacy of the data contained within.

"This collaboration highlights HP Labs and Hitachi Labs' common interest in security research and our aim to bring about secure systems and infrastructure technologies for modern enterprise needs," said Dick Lampman, senior vice president of research, HP, and director, HP Labs. "HP and Hitachi have had technology alliances that have spanned 16 years, and this is an extension of our partnership to further leverage our research and development."

Dr. Akira Maeda, general manager of Systems Development Laboratory, Hitachi, added: "Hitachi and HP both recognize the increasing importance of security. This collaboration is expected to contribute to a dramatic increase in customer satisfaction by delivering entirely new security backbones."

About Hitachi, Ltd.

Hitachi, Ltd., (NYSE: HIT/ TSE: 6501), headquartered in Tokyo, Japan, is a leading global electronics company with approximately 347,000 employees worldwide. Fiscal 2004 (ended March 31, 2005) consolidated sales totaled 9,027.0 billion yen ($84.4 billion). The company offers a wide range of systems, products and services in market sectors including information systems, electronic devices, power and industrial systems, consumer products, materials and financial services. For more information on Hitachi, please visit the company's website at http://www.hitachi.com.

About HP

HP is a technology solutions provider to consumers, businesses and institutions globally. The company's offerings span IT infrastructure, global services, business and home computing, and imaging and printing. For the four fiscal quarters ended Oct. 31, 2005, HP revenue totaled $86.7 billion. More information about HP (NYSE, Nasdaq: HPQ) is available at http://www.hp.com.

Certain statements found in this document may constitute "forward-looking statements" as defined in the U.S. Private Securities Litigation Reform Act of 1995. Such "forward-looking statements" reflect management's current views with respect to certain future events and financial performance and include any statement that does not directly relate to any historical or current fact. Words such as "anticipate," "believe," "expect," "estimate," "forecast," "intend," "plan," "project" and similar expressions which indicate future events and trends may identify "forward-looking statements." Such statements are based on currently available information and are subject to various risks and uncertainties that could cause actual results to differ materially from those projected or implied in the "forward-looking statements" and from historical trends. Certain "forward-looking statements" are based upon current assumptions of future events which may not prove to be accurate. Undue reliance should not be placed on "forward-looking statements," as such statements speak only as of the date of this document.

This news release contains forward-looking statements that involve risks and uncertainties, as well as assumptions that, if they ever materialize or prove incorrect, could cause the results of HP and its consolidated subsidiaries to differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including the expected development, performance or rankings of products or services; statements of expectation or belief; and any statement of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the development, performance and market acceptance of products and services and other risks that are described from time to time in HP's Securities and Exchange Commission reports, including but not limited to HP's Annual Report on Form 10-K for the fiscal year ended Oct. 31, 2005 and other reports filed after such report. HP assumes no obligation and does not intend to update these forward-looking statements.

Posted by: AT 09:00 am   |  Permalink   |  
Tweet
Twitter
LinkedIn
Facebook
Digg
Delicious
StumbleUpon
Reddit
Add to favorites
PROJECT HELP 

Our members are among the most prominent and respected suppliers of digital signage, kiosk, self-service and mobile technology solutions.

Request project help from DSA members

 Blog: SSKA Industry News 
Latest Posts

Testimonials 
Alex Richardson, Selling Machine Partners
"The Digital Screenmedia Association is home to the best minds in the industry. I encourage you to join other industry leaders in this rapidly growing marketplace."

Alex Richardson
Cross Channel Innovation Mgr.
Polo Ralph Lauren

Twitter 
Tweets by @iDigScreenmedia

Digital Screenmedia Association | 13100 Eastpoint Park Blvd. Louisville, KY 40223 | Phone: 502-489-3915 | Fax: 502-241-2795

ASSOCIATION SPONSORS

     

Website managed by Networld Media Group