From the 60 million cars on the road running BlackBerry software, to the 80+ security certifications we have earned, to the 20,000+ enterprises that rely on our software, BlackBerry secures, connects, and mobilizes businesses all around the world today. Watch this video to learn more.
As the need for more advanced safety and security software rises in the automotive sector, BlackBerry QNX has officially launched QNX Hypervisor 2.0, BlackBerry’s most advanced and secure 64-bit embedded operating system which allows developers to partition and isolate safety-critical environments from non-safety critical environments. …
There is no safety without security, said John Wall, senior vice president and head of BlackBerry QNX. If hackers can access a car through a non-critical ECU system, they can tamper or take over safety-critical areas, such as the steering system, brakes or engine. BlackBerry’s QNX Hypervisor 2.0 safeguards against these types of attacks and is a key component of our multi-level approach to securing connected and autonomous vehicles.
In addition to the launch of QNX Hypervisor 2.0, BlackBerry also announced Qualcomm Technologies has adopted QNX Hypervisor 2.0 as part of certain digital cockpit solutions. Support for QNX Hypervisor 2.0 on the Snapdragon 820Am automotive platform is available today.
The QNX Hypervisor 2.0 will assist automakers in taking greater advantage of the power of our Snapdragon automotive platform,” said Nakul Duggal, vice president, product management, automotive, Qualcomm Technologies, Inc. The ability to run concurrent operating systems on top of the QNX Hypervisor on the Snapdragon 820Am automotive platform will help automakers to reduce hardware complexity and cost in their vehicles, while still delivering the responsive and rich user experiences that consumers demand today.
Download the QNX Hypervisor Product Brief for more information.
BlackBerry will join the 20th annual Milken Institute Global Conference, which takes place from April 30th till May 3rd, 2017. The conference will be hosted in the Los Angeles Beverly Hilton Hotel, and in the Valet Area BlackBerry will be demoing a BlackBerry software powered Jaguar XJ.
First debuted at this year’s Consumer Electronics Show, the Jaguar XJ is the next stage in the software-defined car. Powered by BlackBerry software, the Jaguar’s digital cockpit features a consolidated Electronic Control Unit (ECU), which combines the infotainment system and digital instrument cluster onto a single System-on-a-Chip (SoC) – all while using BlackBerry’s hypervisor software to isolate and keep each system crash-proof and safe. The Jaguar also uses our Acoustics Management Platform to enhance communication between driver and passengers and reduce engine sound.
Leading global experts, including five BlackBerry executives, will come together to tackle the economic, technological, and business challenges related to this year’s topic of “Building Meaningful Lives.”
On Tuesday, May 2nd from 8 AM PT, Executive Chairman and CEO John Chen will offer his insights on public policy on the panel, “U.S. Overview: Will the Economic Tailwind continue?”
The following day at 11:15 AM PT, BlackBerry Chief Evangelist Mark Wilson will share his expert thoughts on cybersecurity in healthcare on the panel “Hacks on Healthcare: How to Make a Vulnerable Industry Cyber-Secure“.
BlackBerry’s Chief Operating Officer Marty Beard will be participating in a private dinner panel on the topic, “Will Technology Outpace Human Intelligence?” BlackBerry President, Global Sales Carl Wiese and Senior Director of Business Operations, Neelam Sandhu will also be in attendance.
… Deep learning (DL) is a technology that is as revolutionary as the Internet and mobile computing that came before it. One author found it so revolutionary that he described it as “The Last Invention of Man” [KHAT] – strong words indeed!
Currently, the revival of interest in all things “Artificial Intelligence” (AI) is primarily due to the spectacular results achieved with deep learning research. I must however emphasize that this revival is not due to other classical AI technologies like expert systems, semantic knowledge bases, logic programming or Bayesian systems. Most of classical AI has not changed much, if any, in the last 5 years. The recent quantum leap has solely been driven by deep learning successes. …
Deep learning is a disruptive technology like the Internet and mobile computing that came before. Open source software has been the dominant platform that has enabled these technologies.
AMD combines these powerful principles with its open source ROCm initiative. On its own, this definitely has the potential of accelerating deep learning development. ROCm provides a comprehensive set of components that address the high performance computing needs, such as providing tools that are closer to the metal. These include hand-tuned libraries and support for assembly language tooling.
Future deep learning software will demand even greater optimizations that span many kinds of computing cores. In my view, AMD’s strategic vision of investing heavily in heterogeneous system architectures gives their platform a distinct edge.
AMD’s open source strategy is uniquely positioned to disrupt and take the lead in future deep learning developments.
A security researcher has found 40 unknown zero-day vulnerabilities in Tizen, the operating system that runs on millions of Samsung products.
Last month, the CIA got a lot of attention when WikiLeaks published internal documents purporting to show how the spy agency can monitor people through their Samsung smart TVs. There was a caveat to the hack, however—the hijack involved older models of Samsung TVs and required the CIA have physical access to a TV to install the malware via a USB stick.
But the window to this sort of hijacking is far wider than originally thought because a researcher in Israel has uncovered 40 unknown vulnerabilities, or zero-days, that would allow someone to remotely hack millions of newer Samsung smart TVs, smart watches, and mobile phones already on the market, as well as ones slated for future release, without needing physical access to them. The security holes are in an open-source operating system called Tizen that Samsung has been rolling out in its devices over the last few years. …
At the end of the day, you’re always seeking better, more efficient ways to get work done. Productivity is every bit as important as security. BlackBerry understands this – it’s why our entire solutions portfolio is architected for ease of use, and why we offer the best Personal Information Management (PIM) solution on the market. It’s also why we’ve equipped our Android devices with powerful tools like the Hub and theProductivity Tab.
Those tools just got even better.
Today, we’re proud to announce a major update for all BlackBerry Android devices, including PRIV, DTEK50 and DTEK60 (and coming devices). Available very soon through the Google Play Store, this update completely overhauls the Productivity Tab’s interface, making it both cleaner and more user-friendly. It also adds new Quick Triage functionality (such as Reply All and Delete) for items in the Hub and new Quick Actions for entries in Contacts (such as Phone, Text, Email).
Users on a BlackBerry-branded Android phone should receive a notification when the updates are available in Google Play, at which point they will download automatically over Wi-Fi.
If you need to manually update:
- Connect to a Wi-Fi network, then open the Google Play Store.
- Tap the icon on the left side of the bar, then select “My apps & games” from the menu that pops up.
- Either tap “Update All” or select which apps to update on an individual basis.
- Tap “Download,” and the update will begin even if you don’t see a progress bar or another indicator.
For users on other Android devices, stay tuned – we’ll let you know when the updates (and the Productivity Tab) are available to you!
Earlier this month Google published it’s Android Security 2016 Year In Review. The 71 page report covers various aspects of Android security. From OS security, to information about the ecosystem as well as speaking about various vulnerabilities over the last year. It is a very interesting read, and if you have some time, I’d suggest you give it a good read. You can read the entire report here. …
“Several manufacturers, including Samsung, LG, BlackBerry, and OnePlus, regularly deliver security updates to flagship devices on the same day as Google’s updates to Nexus and Pixel devices, thereby providing their customers
with the most up-to-date security available.”
The next mention of BlackBerry is when speaking of Zero Days. This gets interesting.
“The combination of regular monthly security updates and fast responses by Android device manufacturers significantly mitigated the impact of zero day vulnerabilities against the Android platform. For example, CVE-2016-5195 (also known as Dirty Cow) was publicly disclosed on October 19, 2016. As the Android Security 2016 Year in Review / Android Platform Security 29 patch was available from upstream Linux, some device manufacturers, such
as BlackBerry, deployed a fix in time for the November 2016 security update. We created a special patch string (November 06, 2016) for devices to indicate the vulnerability had been fixed. A fix was required for the December 01, 2016 security patch level.”
Dirty Cow allowed attackers to escalate to root privileges through a race condition bug and gain write-access to read-only memory. The vulnerability had been present for nearly a decade in the android kernel and Linux. The kernel and Linux vulnerabilities were patched in October of 2016, and publicly disclosed October 19th. BlackBerry utilized this fix to push the patch to it’s android version in the November update. Google pushed the update within it’s December security update, following BlackBerry by a month. …
There are few workplace phrases that incite groans as much as, “Let’s have a meeting on that.” But sometimes the most efficient way to get work done is to get a group of people in a room and hash it out. Other times meetings are legally required – like boards of directors or stockholders’ meetings.We can’t entirely avoid meetings, but we can use technology to make setting them up, sending and reviewing materials, and attending them as painless as possible. Virtual meetings allow us to meet right from our smartphones anywhere we can find a wireless connection. Digital and cloud platforms let us share meeting materials electronically, saving time and natural resources with fewer pages printed and shipped out to people. …
iBabs, a BlackBerry Dynamics partner, containerizes your critical enterprise data with full end-to-end encryption backed by two-factor authentication and stored an ISO 27.001 certified cloud environment. Our secure infrastructure encrypts data in motion between the app container and behind-the-firewall resources so that, even if a device is compromised, corporate data remains protected.
iBabs also makes it easy for meeting organizers to share documents, agendas, and other materials, plus capture notes and assign tasks, within the app. The user-friendly interface enables meeting participants to access all past and future meeting materials, notes, annotations, and other documentation right in the app, without having to rifle through a chaotic mess of papers and folios. …
Want to know more about how your company will benefit from secure, paperless meetings? Take a look at our infographic, ”Paperless meetings in 6 easy steps”, and visit the BlackBerry Marketplace for Enterprise to request a free iBabs trial. …
Bug relies on telnet protocol used by hardware on internal networks.
Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix.
Cisco researchers said they discovered the vulnerability as they analyzed a cache of documents that are believed to have been stolen from the CIA and published by WikiLeaks two weeks ago. The flaw, found in at least 318 switches, allows remote attackers to execute code that runs with elevated privileges, Cisco warned in anadvisory published Friday. …
Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.
The malicious code became publicly available in late September. Since then, it’s been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October. …