Apple has unveiled its long-awaited Apple Watch, which the company says will begin shipping in nine countries on April 24.
The price of the watch will run from $349 to as much as $10,000 for a high-end version that's built with 18-karat gold alloys. A new Apple Watch App Store will provide software that runs on the devices, which have a promised average battery life of 18 hours.
Despite the so-called "smartwatch" sector still being nascent, many analysts expect to see Apple sell a relatively large number of the new devices. "There's not a single killer app. It's a collection of experiences to create a device that I think people will buy," Patrick Moorhead, president of Moor Insights & Strategy, tells The Wall Street Journal.
But some outstanding questions center on whether the wearable devices will keep users' data safe and secure, especially when people begin using their Apple Watch to make payments.
Here are eight security-related issues highlighted by information security experts:
1. Shakedown Imminent
Both for GPS and wireless connectivity - including downloading watch apps - Apple says the Apple Watch must be paired with an iPhone, and in particular, an iPhone 5 or newer, running at least iOS 8.2, which was released March 9. Pairing the Apple Watch with an iPhone also allows users to make payments with the watch via Apple Pay - so far, this feature is only available in the United States - or display a Passbook boarding pass.
Apple says the Apple Watch will pair with an iPhone via Wi-Fi - 802.11b/g - as well as Bluetooth 4.0.
Of course, it's only a matter of time before enterprising researchers begin testing whether they can intercept - sniff - or spoof the wireless communications that flow between an Apple Watch and the iPhone to which it's been paired. "Given the fact that it is a high-profile device - which will have wide adoption - you can bet security researchers and hackers alike will be poking and prodding the watch to find new vulnerabilities as well as take advantage of existing attack vectors, leveraging weaknesses in both Wi-Fi and Bluetooth," says Ken Westin, senior security analyst for IT security vendor Tripwire.
2. Sniffing, Skimming, Apps
Indeed, there are known vulnerabilities associated with both Wi-Fi and Bluetooth, and related flaws could be found either in Apple's related implementations, or via the third-party apps that are designed to run on, or work with, Apple Watch.
But for now, of course, it's not clear whether Apple Watch might be susceptible to related attacks. "As to how vulnerable the design is, that will remain a mystery until the device is released and the full community of researchers has had a chance to review and sniff the traffic between the Apple devices as well as review the software development kits for the new device," says Philip Lieberman, president of identity management software vendor Lieberman Software.
3. Location Tracking
Many manufacturers of wearable devices have so far failed to secure the data they collect, which leaves users open to having their data get intercepted. Alternately, individual devices might be "fingerprinted" based on the way they use Bluetooth or Wi-Fi.
"As the device is utilizing both, it will also be interesting to see how that data can be used to track individuals in physical spaces, as this has both security and privacy implications - not just from a malicious attackers perspective, but also overzealous marketing," Tripwire's Westin says. "The fact the Apple Watch also integrates third-party apps could also increase security and privacy concerns."
4. Wireless Security Warnings
In general, security experts recommend disabling all wireless networking technologies when in untrusted environments. "I, for one, always have Wi-Fi and Bluetooth disabled on my phone when I travel outside my premises, both for battery life and security," says Brett Fernicola, CISO of data security software vendor Stealthbits Technologies. But because such networking is required to support many Apple Watch features, users would have a disincentive to disable it.
5. Fraudster Watch
Could Apple Watch be worn by fraudsters? Apple says that after removing the watch, every time a user puts it on again, they must enter a code to unlock the payment functionality.
But some recent fraud reports have centered on thieves loading stolen card data into Apple Pay on iPhones, and then making purchases. According to mobile payments and e-commerce strategy and advisory firm DROP Labs, up to 6 percent of all Apple Pay transactions have been fraudulent, compared with an average of less than 1 percent for U.S. credit card transactions.
Still, many fraud experts say the problem isn't linked to hardware-level security problems, but, rather, poor back-end authentication practices by banks, which are failing to adequately verify cards when they get loaded onto an iPhone, in advance of Apple Pay purchases.
Gartner analyst Avivah Litan doesn't expect Apple Watch, which can be used to make touchless payments when paired with an iPhone that uses Apple Pay, to alter that fraud situation. "I don't think we will see any unique fraud issues with Apple Watch and Apple Pay, vs. iPhones and Apple Pay," she tells Information Security Media Group. "It's the same issues, I think, although the fraud-related information sent by an iWatch - vs. that sent by an iPhone - to an issuing bank may be less granular or rich." Such information helps banks apply context-aware security to better identify and reject transactions - or Apple Pay accounts - that appear to be fraudulent.
6. Bank Buy-In
What's not yet clear, however, is whether banks can resolve Apple Pay-related challenges to their liking. If not, Apple users may find fewer merchants and banks accepting Apple Pay. "Some banks have had a very negative reaction to Apple Pay fraud, and in the words of one banker, believe 'Apple has thrown them under the bus' and should take more responsibility for fraudulent enrollments, since they are all done through Apple accounts," Litan says.
So fraud experts are waiting to see if the Apple Pay ecosystem might suffer a backlash from banks, potentially leading to an overhaul of how such systems work. For example, Litan says, a mobile payment provider - such as Apple - might assume responsibility for all transactions, including related fraud. "Either that, or the banks need to change the registration process on the mobile phones so that they totally own it and don't split customer ownership with the mobile payment provider." With either change, however, users would arguably benefit from a reduced risk of fraud.
7. Contactless Payment Upsides
Using Apple Pay via an iPhone or Apple Watch requires "contactless" - using near-field communications - POS terminals. They're now widespread in Europe, but still being rolled out across the United States, driven, in part, by the October 2015 liability shift, in which any merchant or issuer that doesn't support EMV takes responsibility for all fraudulent transactions. As those terminals arrive, they could also drive a reduction in payment-card fraud rates, financial services experts say, thanks in part to its use of tokenization, which substitutes a unique code in place of an actual card number or related data.
"These terminals will not only accept these new chip cards but will also include NFC, which means that they will already be programmed to accept Apple Pay," says David Pollino, senior vice president and enterprise fraud prevention officer for Bank of the West. In addition, they will be using "an already established, new security system," which will give banks more techniques for identifying and blocking fraud, regardless of whether those payments are made using an Apple Watch, iPhone or payment card.
8. Rogue NFC Terminals
Despite such security upsides, once an Apple Pay device, including Apple Watch, is unlocked, an attacker could potentially use it to make fraudulent purchases, warns Dave Jevans, co-founder of the Anti-Phishing Working Group and chief technology officer of mobile security firm Marble Security. "It's a dangerous recipe, especially when you think that many retail stores have emitters fraudulently scanning credit cards," he says. "They could run NFC terminals to slurp unauthorized payments."
As of 2014, supplier web channels controlled 60% of the total online market, according to new PhoCusWright data. Online travel agencies on the other hand are pulling business away from traditional offline channels at a faster rate compared to supplier websites and apps. Optimism over Europe's recovery experienced in the first half of 2014 proved short-lived, as the French economy continued its slowdown into 2015 and Greece's fiscal woes continued to weigh heavily on Euro Zone stability.
How many marketers can pin down the impact of social media using hard numbers?
The following infographic, based largely on results from the Demand Gen Report 2013 B2B Content Preferences Survey and 2012 B2B Buyer Survey shows data to help answer that very important question.
Promoting content over social networks is now a vital part of getting a message in front of potential buyers, establishing thought leadership and making the most of content investments. That means understanding which social media channels are most appropriate for different campaigns, and it definitely means understanding how to optimize different types of content for your social campaigns.
Everyday Social Media numbers are growing, and here are 45 facts in an infographic by Digital Insights.
A few of the statistics:
40% of marketers use Google+, 70% desire to learn more and 67% plan to increase Google+ activities 42% update their profile information regularly on LinkedIn Every second 8000 users like some or other photo on Instagram 80% of total Pinterest’s pins are re-pins 4.2 billion people use mobile device to access social media sites
Via Lauren Moss
je vous invite à essayer ces trois alternatives à Woorank pour analyser le seo de votre blogue (Voici 3 outils très pratiques pour vérifier l'état du référencement de votre site | @scoopit via @arobasenet
Lorsqu’on regarde la dernière infographie de LinkedIn, on apprend que 93% des marketeurs B2B utilisent le marketing de contenu et que 58% de ces professionnels projettent d’augmenter leur budget pour ce poste au cours de l’année prochaine.
We’re pretty keen on optimal timing for social media here at Buffer, and I figured it was high time I collected all the information we have about online communication into one place. I’ve collected research and stats on Twitter, Facebook, email and blogging to help you find the best time to communicate with others in each format.
The tricky thing I’ve come across is that since the Web is still so new, a lot of the research available to us is conflicting. We really need more time and more studies to get definitive answers about what works best, and the fact that our audience members are constantly changing their own activity patterns makes it even harder to work out for sure. Looking at the latest social media stats seems to only confirm that.
So my suggestion would be to use this guide as just that--a guide to help you work out what to test for in your own audience, so that you can see what actually works best in your specific case....
Amazon has expanded its Steam-competing digital downloads play by launching digital games and digital software stores for PC and Mac software on its U.K. site -- something the ecommerce giant already offered on Amazon.com.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.