Name : Lauren
First Name : Driver
Blog URL :
Another SXSWi in Austin, Texas has come and gone and if you’ve ever been, you can likely attest to it being bigger (and crazier!) than ever. We focused our time on sessions that we felt had the most impact and insight into our digital lives – and no surprise, this year, most were focused on mobile – in particular mobile payments, apps and what many are now calling the “virtual wallet.”
Many agreed that consumer interest is growing but some questioned when it would become more mainstream and what security risks consumers should consider. We heard quite a bit about mobile payment apps from retailers that are growing in popularity like the Starbucks payment app but also, Tabbedout, which was very popular during SXSW as it allows users to open, review and pay bar tabs directly from their smartphone. Many people we talked to outside the convention center during our “JAGwalking” sessions even noted they were already using it. Have you tried it before? Would it be something you recommend?
Stacey Higginbotham of GigaOm just wrote about how mobile payment apps are creating the “virtual wallet” in response to news that Google is joining Citigroup and MasterCard to set up a mobile payment system. You can read her full article here - http://gigaom.com/2011/03/28/will-apps-become-the-new-wallet/.
Our digital security expert and blogger, Robert Siciliano, covered the topic last month as well in a blog post on the rise of mobile payments and how smartcard-based SIM cards will be at the core of mobile payment security. Essentially, the SIM card contains a small computer with its own software designed to protect the payment information. You can see Robert’s full article here - http://robertsiciliano.com/blog/2011/03/15/mobile-payment-is-coming/.
NFC, a.k.a. near field communications, is also another way consumers will be able to conduct contactless payments with their smart phones. NFC is a wireless standard for communicating within a few inches. But NFC can be used for things other than mobile payments – it can even be used to unlock your car door with your phone. Pretty neat, huh? Ars Technica also did a thorough write up on the technology last month – it’s definitely worth a look. You can read it here - http://arstechnica.com/gadgets/guides/2011/02/near-field-communications-....
NFC and mobile payments are still being tested in the US but we expect to see major rollouts beginning in 2011. While over 96% of attendees who responded to our survey about mobile payments said they’d be interested in using their cell phones to make payment transactions, it’s clear that there is still a big need for education on what NFC technology is and ultimately the impact it will have on how we use and view our smart phones. Not surprisingly, when asked what “NFC” meant while JAGwalking at SXSW, most attendees answered with “National Football Conference.”
Thoughts or comments? We’d love to hear them! Have you used mobile payment apps? Let us know if so, or if not, what your concerns are to adopting mobile payments on your smartphone.
Missed the discussions at SXSW? Search #virtualwallet or #sxswnfc on Twitter.com to catch related tweets.
And follow @JustAskGemalto on Twitter to learn practical answers for your digital life. Thanks!
SXSW Interactive (SXSWi) official starts today and we are very excited. Not only because of all the great panels and sessions we will be attending (and live-tweeting from) but also because of the fun games and sweepstake giveaways we have planned.
Yesterday we posted about our top 5 “don’t-miss” panels related to your digital life. Today, we want to let you in on the games and surprises we’ve been working on for the past few weeks.
Drum roll, please……
JustAskGemalto’s JAGlibs at SXSW
Who doesn’t love the fun game Madlibs? At SXSW we are hosting our own special version in the JustAskGemalto’s JAGlibs sweepstakes game! Visit JAGlibs.com and create your own JAGlib based off helpful digital security tips from JustAskGemalto. After you create your JAGlib, you’ll be prompted to share it on Twitter. If you share your JAGlib via a public tweet using the hashtag #JAGlibs you will be entered into a giveaway for the new iPad2! JAGlibs.com will feature a new JAGlib quesiton and template each day - so play all five times to increase your chances of winning. Winner will be drawn randomly and notified on Wednesday, March 16. Live attendance at the event is not required to enter or win.
Full details and rules can be found here: http://bit.ly/faluE5.
To play JAGlibs, please visit www.JAGlibs.com.
Want to see funny #JAGlibs that others have created? Search #JAGlibs on Twitter to discover funny answers and create your own.
JustAskGemalto’s #DigitalID Sweepstakes & Giveaway
The #DigitalID sweepstakes giveaway turns you into the teacher. We want you to share with us something you’ve learned, seen or heard related to digital security from SXSWi. Share a public tweet on Twitter using the hashtag #DigitalID and on Wednesday, March 16, we will randomly choose a winner from those who shared their digital security smarts! Live attendance at the event is not required to enter or win.
Full details and rules can be found here: http://bit.ly/gpqceP
Want to see what people are saying? Search #DigitalID on Twitter and join the conversation!
JustAskGemalto’s QR Daily Poll Sweepstakes & Giveaway
We want to hear and learn from you on topics related to digital security and our digital lives. During SXSWi, you can answer a SurveyMonkey poll question each day to be entered into daily random drawings for $100 Visa gift cards. Participants will need to 1) find JustAskGemalto branded coasters and other marketing materials with a designated QR code (specific matrix barcode) that will be placed in downtown Austin establishments and online 2) scan the QR code using a dedicated QR barcode reader and camera phone 3) answer the daily one question poll, pursuant to the on-screen instructions, including your Twitter handle so we can notify you if you won. If a participant does not have a Twitter account, they may submit their email address in the optional field, but an email address is not necessary to enter. Twitter handle and email address will be used only to identify and notify the daily winners. Live attendance at the event is not required to enter or win.
Full details and rules can be found here: http://bit.ly/ewBh1X
Please note all sweepstakes run between March 11-15, 2011 during SXSW Interactive Conference.
Visit the following channels starting today for details on promotions and giveaways during SXSWi. Happy playing and find us at the conference!
Hi everyone! We are so excited to be attending the upcoming 2011 SXSW Interactive Conference in Austin, Texas.
Mobile payments and e-wallets, NFC and RFID, online authentication and privacy are just a few of the topics of discussion we are looking forward to hearing about this weekend as SXSWi kicks-off. And with so many experts under one roof, it’s hard to choose which panels to attend. We’ve listed below a few of the sessions we think are going to be “don’t-miss” discussions at SXSWi for anyone interested in learning about their digital life.
We’ll be attending each of these (and several more) – so if you can’t attend or just want to join the conversation online, we will be using the hashtag, #digitalID, to share insights, tips and news from the conference. Follow @JustAskGemalto on Twitter and join in on the fun!
The Future of Digital Wallets
Participants: Christina Nguyen White
Friday, March 11 – 3:30-4:30 p.m.
Hilton, Salon J
Overview: The growing hole in your back jeans pocket is getting a bit too personal. No need to swipe anymore. Just scan. When can we get rid of our wallets without losing the cash? We know mobile is here. Now learn how far we can take it. Digital wallets are within very close reach. With RFIDs, QR codes, and Big-Brother-like tracking, the technology is already in place. Checkout with your phone. Instantly grab coupons when you checkout. Scan your digital ticket at Friday’s ballgame. Digitally split the bill with your friends. The possibilities that we’ve always wished for are now within reach. Get a glimpse into how retailers are edging towards digital, understand the impact of how this will change the way we buy, and ultimately, as designers, understand how this will change the way we interact with our mobile phones.
How to Raise a Digital Native
Participant: John Bracken
Saturday, March 12 – 5:00-6:00 p.m.
Austin Convention Center, Room 8A
Overview: The Internet and mobile phones have created a new realm of possibilities, and distractions, for parents. Dads, and other non-birthing child care providers, face new challenges in negotiating the digital age. The panel will build on the lessons and tales emerging from NuevoDads, a private listserv of 50-60 techie fathers, and a few mothers. The panel will: - create a safe space for peers to discuss a multitude of parenting issues - create a network for both parenting and non-parenting needs - explore the changes from the past, when being a dad was a fan isolated task.
Panel: Authentication Fails = ID Thieves Succeed. What's Next?
Participant: Alex Davis
Sunday, March 13 – 12:30 – 1:30 p.m.
Hilton, Salon C
Overview: How does a retailer, bank or any business know they’re interacting with you & not an imposter? Consumers need thoughtful, scalable & user-friendly authentication solutions to stop ID theft & protect reputations & assets. We’ll discuss ID theft & authentication, lessons learned addressing these problems, & how technology + new approaches are paving the way forward. ID fraud & authentication are discussed together because the challenges they create, when one fails & the other succeeds, are endless. ID theft is caused by a failure of authentication & is a concern for ANY industry that handles valuable assets – like money, credit cards, SSN, health records, or World of Warcraft characters. ID theft is commonly talked about & feared, but not always understood. We’ll discuss what it means & how it’s executed. We’ll also share ID theft examples, from mundane to insane & prove that the systems that allow this to happen are clearly broken. When it comes to authentication, a thief can convince someone that they are you, but a thief cannot convince you that he is you – the heart of why consumer participation & strong authentication are so important. When consumers are allowed to participate in transactions, identity theft stops. Architects, engineers & companies have approached authentication in a variety of ways. We’ll go through technical examples & lessons learned from these schemes & show that challenges still exist. We’ll then discuss current innovations & the path forward.
Your Data in the Cloud: Privacy, Ownership, Convenience
Participant: Daniel Putterman
Monday, March 14 – 11:00 – 12:00 p.m.
Austin Convention Center, Ballroom B
Overview: There’s no topic with more buzz around it than the “cloud.” However, for all the aspects of our social and commercial lives we entrust to the cloud, at the same time we surrender our data, and increasingly our memories and finances, to others. Who controls that data, who protects it and who ensures our privacy? There are however possibilities for creating one’s own cloud, and retaining a measure control over off-site data and services, both software and hardware based. We’ll explore a number of solutions to the notion of a personal cloud, and the trade-offs inherent in that choice.
What's In Your Virtual Wallet?
Participant: Laura Chambers, Steve Yankovich
Tuesday, March 15 – 11:00 – 12:00 p.m.
Radisson, Town Lake Ballroom
Overview: At SXSW Interactive 2011, Rob Veres, general manager of RedLaser and senior director of Mobile, eBay Inc., and Laura Chambers, senior director of PayPal Mobile, are poised to speak on the topic of mobile commerce and virtual wallets. As one of the driving forces behind eBay's and PayPal’s mobile initiatives, Rob and Laura sit at a unique vantage point regarding the evolution of mobile. How can brands, entrepreneurs and developers make money from mobile commerce? Specifically, how will mobile devices evolve to become the “virtual wallets” of the future? In grappling with these questions, eBay and PayPal have led the way in mobile shopping and payments. Not surprisingly, the company’s mobile sales and transactions have grown dramatically. In 2010, eBay's mobile sales more than double to nearly $2 billion from $600 million in 2009. PayPal's mobile transactions grew from $25 million in 2008 to $141 million in 2009. eBay and PayPal have also led the way in creating innovative mobile commerce apps. The companies have incorporated technologies like augmented reality to virtually try on sunglasses and "bump" so that two iPhones can seamlessly transfer money. To date, eBay's and PayPal's mobile apps have been downloaded more than 36 million times worldwide. eBay and PayPal have also encouraged third-party developer innovation through its RedLaser and PayPal X platforms.
There are even more details to come on promotions and games we will be hosting at the event so stay tuned!
For more details on SXSW, please visit: www.sxsw.comRead more
In this day and age we have threaded our needs and the online technology into a virtual symbiosis. Our daily information is constantly streamed between our smart phones, notebooks and online services.
We are actively pursuing an entanglement with the digital world and many personal boundaries are extended into an unknown territory. As we boldly progress in this pioneering era, in which our privacy is diluted into our personal needs, it is helpful to preserve a digital security checklist – a guide to an intelligent exposure of our thoughts and actions that we cordially share among ourselves.
It can have simple points such as creating strong passwords for personal online accounts, locking our personal devices, utilizing free protective antivirus tools, installing of GPS software or even free software such as LogMeIn, which allows remote access to any personal device. Also, our password must be different for different sites, especially if we using personal emails as our accounts. For example, if our Amazon and Paypal account share the same email account, do not use the same password.
And for those of us who use social media in our daily lives, we extend a part of ourselves to unprotected territory. The question changes from “why should we use social media” to “how to use social media the right way for you.” In this case, it is important to understand the privacy rules of the desired online services, such as Facebook, Twitter or even a simple user-generated news links.
The digital security list of 2011 may expand the traditional guidelines to cover new technologies as well. Our information continues to ascend into the digital dimension, while we unconsciously embrace its metamorphoses. Google Documents or Amazon Kindle serve as perfect examples of a new transmission of our information into a new storage form called “cloud computing”.
This new form of technology allows us to store our information outside traditional local resources, into an online service. It decentralizes our access points into a variety of devices. In the case of Kindle, we may read our purchased books directly from our tablets, smart phones, dedicated Kindle devices, netbooks etc. The digital security list should include tips on how to safely utilize these access points.
If the information is important, please consider having off-cloud storage as well. Also, certain interfaces may be forbidden, such as shared computers or certain smart phones.
As our digital security lists amplifies with new points every day, we must still remember the basics:
• Create strong personal passwords
• Use locked devices
• Remote access software
• Close social media services after each use on shared computers
• Make sure you are educated in the privacy rules and settings of your various networks
• Use more than one email address
• Do not share accounts among services AND do not share passwords among accounts
• Use antivirus software
• Review online services before each use and always be cautious when sharing personal information online
We are thankful to the advances of the technology in the last decade and hopeful that it will continue to carry the momentum in the next decade as well.Read more
We are very excited to announce JustAskGemalto is hosting this week’s Travelers Night In (#TNI) chat on Twitter with ZipSetGo.com!
In case you aren’t familiar, #TNI is a weekly chat amongst people on Twitter who live and breathe travel. You can chat with travel experts and addicts alike and learn about the latest ideas in the travel world. Each week #TNI tackles a different theme and hosts tweet a new question every 10 minutes! #TNI is a great place to get information, news and have some fun every Thursday afternoon! This week, we will be discussing 2011 travel predictions.
So, how can you participate? Simply load your Twitter page (or your Tweetdeck, Hootsuite, Twtvite, etc) and search for “#TNI.” #TNI hosts tweet out one question every 10 minutes for the 90 minutes of the event. Participants respond with answers, questions, tips, etc. Each tweet should include "#TNI", so it's easy for followers to track. Not on Twitter? Don’t fret because you can still "listen" in by using Tweetgrid (or Twitter's built-in search functions) to follow the conversation, but you won't be able to contribute to the discussion. Maybe this is a good time for you to join Twitter? It's easy (and free) to get an account. If you don't have a Twitter account, you can't bring your tips and experiences to the party!
Each week, #TNI creates a custom Tweetgrid for the week’s chat – you can find this week’s grid here: http://bit.ly/dKuCLN.
More event details are below – we hope you can join in on the fun and discussion in this week’s #TNI!
What: Travelers' Night In (#TNI) – 2011 Travel Predictions
When: Every Thursday from 3:30 – 5:00 PM ET (or whenever the conversation stops!)
Where: On Twitter! Follow the hash tag #TNI
Who: @GoApril @ZipSetAndrea @GoSaraBeth @ZipSetRachel @ZipSetGo, @justaskgemalto, fellow world travelers, and of course, YOU!
More details on #TNI and ZipSetGo, please visit: http://www.zipsetgo.com/travelers-night-eventsRead more
Traditionally, winter holidays are like no other holidays for kids and parents alike. School is in recess, holiday presents are only a few days away and most of the free time is spent with the family, in a warm, pleasant home. However, in this day and age, staying inside the house is just a relative term. With internet available to most families on winter holidays, children enjoy advantages that surpass reading a book or just watching a TV show.
Parents and educators agree that smart and safe Internet browsing practices are more important than ever. These practices may include the usage of appropriate internet applications that control unapproved browsing, URL shortcuts on the computer desktop , filters that prevent advertisement and restrict key words URL websites on the browser itself and of course, visual monitoring. Another method is to include kids-safe search engines. Most search engines auto-fill the search bar with popular searches that might not be suitable for children. A kid-safe search engine will restrict the resulted links to more age appropriate content as well.
With the introduction of new online video streaming services such as Netflix or Hulu, kids have an alternative medium to watch their favorite cartoons and TV shows. Kids may chose when and where to enjoy their cherished episodes, while skipping the commercial breaks. And with devices such as tablets, Apple TV, gaming consoles and even smart phones, now their shows are not restricted to a controlled computer environment. Parents must show care in the instant video queue and even re-organize a “kids safe” profile. Thankfully, Netflix allows the creation of more than one profile on the same account.
Video games are also a favorite past time during a cold winter holiday. Whether it’s the new Wii console or the new XBOX 360 Kinect, children will try and play as many games as they can. Most of the newest games allow internet multi-player games, which can expose children to online strangers. One of the safest things to do in this case is to either unplug the console from the internet or verify the online friends that are participating in the game.
In families with children of different ages, siblings share their electronic devices with each other. Most teenagers are involved in live-interaction activities such as Facebook, Skype, Instant Messaging, and video conferencing, therefore parents must educate their older children to help create a safe environment for their younger siblings as well. Logging out of their computer would prevent anyone without a password to access the applications still running on the background.
This past October for National Cyber Security Awareness Month, JustAskGemalto.com spoke with several digital parenting experts on how they keep their kids safe online. You can find video and expert testimonials from Sue Scheff (PURE), Mary K. Hoal (YourSphere.com), Cammie Moise (Cyber Safe Family), Fran Melmed (context communication), Jason Falls (Social Media Explorer), Aaron Strout (Powered), C.C. Chapman (Digital Dads), Brad Powell (DadLabs), Craig Heimbuch and Jeff Pugh (Man of the House), on our Facebook page and YouTube channel. As always, we’d like to hear from you on what you do or what you think parents can do this holiday season (and ongoing) to keep their kids safe online. Please share your thoughts in the comments section below.
Visit us on Facebook at facebook.com/justaskgemalto
Visit us on YouTube at youtube.com/justaskgemalto
We wish you and your family a very happy holiday and a wonderful new year. Cheers!Read more
Thanksgiving dinner is one of those treasured moments, chased through air, road and rail that celebrate being together with friends and family.
The anticipation of our arrival is fueled by the delayed flight, the bumpy road or the uncomfortable bus ride. Thankfully, we have our phones, tablets, laptops and netbooks that take our minds away from the strangers sitting next to us, and let us keep in touch with our friends.
It is easy to forget that in these close environments, besides our space, we also share our wireless signal with our neighbors. In a shared network, our net activity leaves a trace behind us. That is why it is important to be virtually conscious of what information we share over the air, whether at the airport terminal, the airplane WI-FI, or even the hotspot on the bus.
Our personal electronic devices are our favorite communication medium. We write, we talk, we send pictures and videos through them. Thanksgiving will bring more news and surprises that we feel we must share immediately through Facebook, Twitter and Instant Messaging. However it might not be the right idea to write your travel plans on a public Web space. In a time when people still leave the houselights on when they travel, a message such as “spending Thanksgiving with my whole family at my grandparents” might not be a good idea, and might attract burglars to your house.
But social media is part of our young generation’s existence. Sometimes it is more effective to write a message on your Facebook wall that dinner is ready in hopes for a “like” vote. However, we should remember that we are with friends and family that might use the same devices that we are using. So while we watch our favorite YouTube video, our favorite TV show on Hulu and the new foreign movie on Netflix, we should remember to log out and close the applications after each use. In a special gathering such as Thanksgiving, with different generations coming together to celebrate, it might not be wise to read that article labeled “NSFW” (not suitable for work) right before grandpa reads his news.
And if we are the hosts, who have worked tirelessly to create a comfortable stay and fulfilling meal for our loved ones, we may want to discuss our concerns with our guests, especially if our laptops or desktops are shared over the holidays. The instant messaging, video conferencing or Facebook accounts should not be available for use to younger children. And it is easy to forget to log out of the Gmail account, or the PayPal account or even the eBay account. These easy steps will prevent any uncomfortable and embarrassing moments afterwards.
As we travel towards the Thanksgiving dinner, we are thankful to be with our loved ones, and looking forward enjoying a delicious meal with our friends and family.Read more
Did you know that October is National Cyber Security Awareness Month?
To help spread the word about NCSAM, we have asked industry experts to share their knowledge with us on how to keep kids safe online. Our first interview comes from Sue Scheff, the founder of Parents' Universal Resources Experts, Inc. (P.U.R.E.), a child and parenting advocacy organization. Thanks Sue for participating!
Q: What are some of the biggest issues you have as a parent in keeping your kids safe online?
A: One of the major issues I believe for parents is taking the time to learn about online safety and then teaching it to our children. We need to lead by example and not only talk about the dangers that lurk online, but also show them examples of how young kids are being lured virtually through chatrooms, social networking, etc. It doesn't take a long time to find a story of some young girl or boy that was harmed or killed because they became a target for a predator. The Kristin Helms story is a perfect example that bad things can happen to good people. Our children need to know and understand the dangers of mingling with the "unknown".
Q: How do you manage your children’s online safety?
A: Many parents will start by keeping the computer in an open room that is always visible. That is a great idea, but in reality computers, cellphones, Blackberry's, iPhones etc are located throughout schools, libraries, Internet Cafes and even your own neighbors. Education is key to staying safe. Parents need to continually speak with their kids about safety online. This is not just a one time discussion - it is constant. The Internet is changing constantly and the discussion should always be on the table. Stressing privacy issues is a priority. Teaching your kids never to give out their address, phone number and other personal identifications is critical. With children, it is also showing them why it is so important. Giving them examples of consequences that can happen when strangers have your private information. You won't have to look far to find stories of everyday people that have lost so much by "trusting" a virtual person. A great reminder to them is that what goes online, stays online. What you post today, can haunt you tomorrow.
Q: What online resources do you use to learn about and prevent identity theft and cyber threats?
A: There are many resources to use, and most are very good. My personal favorite is Reputation Defender/MyPrivacy. Since 2006 they have been one of the leaders in protecting not only a person's online image, but have expanded into privacy more than most. I believe their privacy services are priceless - the reports you received are detailed and the graphs can help you see where your child's name is going. It gives you the heads-up talk to your child about it and also helps prevent content from escalating out of control. The sooner you realize what the Internet is saying about or your family, the quicker you can address and hopefully put a stop to it.
About Sue Scheff:
Sue Scheff is the founder of Parents' Universal Resources Experts, Inc. (P.U.R.E.), a child and parenting advocacy organization, is a noted expert on Internet Defamation by countless mediums after winning $11.3M in a 2006 lawsuit against a woman who posted viral defamatory statements about Scheff and P.U.R.E. Sue Scheff's first book "Wit's End! Advice and Resources for Saving Your Out of Control Teen " published by Health Communications (HCI), Inc. has helped many families with at risk teens. Her next book, which she co-authored with Internet Attorney, John Dozier Jr., Google Bomb! The Untold Story of the $11.3M Verdict That Changed the Way We Use the Internet, also published by HCI, offers insight to how she won the landmark case for Internet Defamation and Invasion of Privacy, and offers you tips to keep your virtual image safe. She has appeared on The Rachel Ray Show, ABC News, 20/20, CNN Headline News, Fox News,CBS Nightly News, CBC News: Sunday Morning, Forbes, Washington Post, Wall Street Journal, Huffington Post, Sun-Sentinel and NPR, to name a few. Visit the author at www.suescheff.com.