Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Google Shuts Down Short-Lived Hands Free Mobile Payment App

    By
    eWEEK Staff
    -
    February 7, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Today’s topics include Google’s decision to shut down its Hands Free mobile payment application, Microsoft’s addition of Evernote and other add-ins to its Outlook application, the new Tenant Restrictions feature in Microsoft Azure that helps tighten access controls and a SecureWorks’ analysis that found that the majority of cyber-attacks involving phishing and network scams.

      Like it has with several other technologies and services in recent months, Google is pulling the plug on its Hands Free mobile payment application. In a brief announcement this week, the company said it would shut down the service Feb 8.

      After that date, Hands Free will no longer work in the small number of San Francisco Bay Area retail stores that have accepted Hands Free payments on a trial basis since Google announced the service last March.

      Google’s statement offered no reason for the company’s decision to terminate Hands Free and merely noted the company had learned quite a bit from the pilot program.

      Microsoft released its mobile Outlook client for iOS and Android two years ago this week, based on the software giant’s late-2014 acquisition of the popular email app, Acompli.

      To celebrate, the company announced add-in support for the iOS version of the app. The first batch includes Evernote, GIPHY, Nimble, Smartsheet, Trello and Microsoft’s own Dynamics 365 and Translator.

      In addition to serving as the cloud-based version of the software giant’s user identity management platform, Azure AD also can be used to provide single sign-on and access services for a variety of third-party software-as-a-service apps and Microsoft’s own Office 365 business software suite. Add-in functionality is being rolled out first to Office 365 customers, followed by Outlook.com users.

      The Tenant Restrictions feature in Azure Active Directory is now generally available, allowing organizations to exert more control over their users’ interactions with software-as-a-service applications to prevent leaks of sensitive information.

      Azure AD also can be used to provide single sign-on and access services for a variety of third-party apps and Microsoft’s own Office 365 business software suite. Essentially, the feature can be used to help businesses ensure that their users are only permitted to log into their cloud application subscriptions.

      “For example, you can use Tenant Restrictions to allow access to your organization’s Office 365 applications, while preventing access to other organizations’ instances of these same applications,” continued Simons.

      The vast majority of successful attacks on companies are conducted by cyber-criminals using phishing, network scans for exploitable systems and strategic web site compromises, security-services firm SecureWorks found in an analysis of six months of incident-response engagements.

      The analysis of 163 incidents found that 82 percent could be attributed to cyber-criminals, 11 percent to insiders and 7 percent to nation-state adversaries.

      The company attributed attacks to financially-motivated cyber-criminals if they included theft of funds, the copying of financial information or personal data, the use of computing power, or ransom of data.

      While advanced attacks and zero-day vulnerabilities garner a lot of attention, phishing, exploitation of known vulnerabilities and using websites to launch attacks were the most common methods of compromise. The vast majority—88 percent—of attacks were opportunistic and not targeted, the report stated.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×