Monday, March 30, 2015
Tuesday, March 24, 2015
From: Abraham Kurian <email@example.com>
Date: Mon, Mar 23, 2015 at 6:58 PM
Subject: Looking for a grad student programmer in XCODE or other iOS app language
To: Benjamin Watson <firstname.lastname@example.org>
via Mobiles @ NCSU http://ift.tt/1DVa2IP
Monday, March 23, 2015
We have a new and limited opportunity for extra credit. We are evaluating a new experimental platform that will help us measure mobile use in everyday life.
Any of you that have Android devices may email Qian Liu and/or Nischal Shrestha to enroll (email@example.com, firstname.lastname@example.org). We will install our experimental app on your phone; it will ask you questions periodically in a fashion similar to our diary study assignment.
You will receive 1% extra credit.
We can accept roughly ten participants.
Wednesday, March 18, 2015
Fwd: FW: Geriatric Caregiver Solutions "Hackathon" April 11&12 at Quintiles by NCHICA and Northwest AHEC
From: Tom Miller <email@example.com>
Date: Wed, Mar 18, 2015 at 11:19 AM
Subject: Fwd: FW: Geriatric Caregiver Solutions "Hackathon" April 11&12 at Quintiles by NCHICA and Northwest AHEC
To: Andrew DiMeo, Sr. <firstname.lastname@example.org>, Christian Holljes <email@example.com>, Benjamin Watson <firstname.lastname@example.org>
From: Billy Willis <email@example.com>
Date: Wed, Mar 18, 2015 at 9:30 AM
Subject: FW: Geriatric Caregiver Solutions "Hackathon" April 11&12 at Quintiles by NCHICA and Northwest AHEC
To: Tom Miller <firstname.lastname@example.org>, John Board <email@example.com>
Date: Monday, March 9, 2015 at 5:24 PM
To: Billy Willis
Subject: Geriatric Caregiver Solutions "Hackathon" April 11&12 at Quintiles by NCHICA and Northwest AHEC
I wanted to extend an invitation to you to join Northwest AHEC, NCHICA and Quintiles for a healthcare Hackathon! We will be teaming up and designing tech solutions aimed at helping caregivers of elderly with dementia in their home. We are inviting students and professionals with expertise in healthcare technology and caregiving to team up and problem solve using six future methods of coordination. The winning team will walk away with $3,000.
Please send this invitation to all students, hackers, caregivers and health technology specialists. We’re looking to fill the room with problem solvers from all angles to promote the best solutions! It will be a great weekend with food trucks, photo booths, interviews and fun. Please register below and plan to join us if you can!
Trouble viewing this email? Open with your browser
Christopher Jones, MHA
Assistant Director – Informatics and Quality
Northwest Area Health Education Center
Medical Center Boulevard, Winston-Salem, NC 27157-1021
via Mobiles @ NCSU http://ift.tt/1Lvd8Y6
Tuesday, March 17, 2015
// Ars Technica
While almost all the attention paid to the HTTPS-crippling FREAK vulnerability has focused on browsers, consider this: thousands of Android and iOS apps, many with finance, shopping, and medical uses, are also vulnerable to the same exploit that decrypts passwords, credit card details, and other sensitive data sent between handsets and Internet servers.
Security researchers from FireEye recently examined the most popular apps on Google Play and the Apple App Store and found 1,999 titles that left users wide open to the encryption downgrade attack. Specifically, 1,228 Android apps with one million or more downloads were vulnerable, while 771 out of the top 14,079 iOS apps were susceptible. Vulnerable apps were those that used—or in the case of iOS, could use—an affected crypto library and connected to servers that offered weak, 512-bit encryption keys. The number of vulnerable apps would no doubt mushroom when analyzing slightly less popular titles.
"As an example, an attacker can use a FREAK attack against a popular shopping app to steal a user's login credentials and credit card information," FireEye researchers Yulong Zhang, Zhaofeng Chen, Hui Xue, and Tao Wei wrote in a blog post published Tuesday afternoon. "Other sensitive apps include medical apps, productivity apps and finance apps." The researchers provided the screenshots above and below, which reveal the plaintext data extracted from one of the vulnerable apps after it connected to its paired server.
via Mobiles @ NCSU http://ift.tt/1GU7Puy
// Ars Technica
Google announced today that it is officially switching to a human-driven app review process for the Google Play store, a move intended to "better protect the community" and "improve the app catalog." Google's "team of experts" will be checking apps and updates submitted to Google Play for violations of Google's developer policies and giving developers specific feedback on what they need to fix before their apps will be listed.
Google says it began this review process "several months ago" and that "there has been no noticeable change for developers during the rollout." Today's post simply serves as an official announcement of the new policy. An improved review status page will give developers "more insight into why apps were rejected or suspended" and will allow them to "easily fix and resubmit their apps for minor policy violations."
Apple has had a team of real humans evaluating third-party app submissions since the dawn of the App Store, but the Android Market (now Google Play) was more permissive—aside from some automated malware scanning, Google didn't do much to make sure apps worked like they were supposed to and did what they said they did. The Google Play store had apps that did more things, but the quality and security of those apps could be all over the place. Google's app review process will ostensibly fix that problem.
via Mobiles @ NCSU http://ift.tt/1Cr0uDU