Your Personal Safety. There’s An App For That

161546.jpg

Flare and was developed by a group of four students at the  Norwegian University of Science and Technology (NTNU)

You are walking home after a night out on a dark autumn evening. Suddenly, you get the feeling that someone is following you. You look over your shoulder, and see a shadow between the trees in the park. You quicken your steps. When you glance behind you again, you see the shadow disappear in between two houses. 

This is when you could press the “help” button on the app that you have downloaded. It sends a message to everyone in the area who also has the app, with information about your phone number and where you are. This way they are able to call you, alert emergency services, or get to your location if need be.

This important app is called Flare and was developed by a group of four students at the  Norwegian University of Science and Technology (NTNU). “We want to start a network of users who can help each other, and by doing so, help make the world a little safer,” says Svein Grimholt, the brain behind this app.

Grimholt got the idea during the UKA student festival held in Trondheim two years ago. Every year tens of thousands of young people come together during festivals to go to concerts and other large events. In one such event, which Grimholt attended, there was a rape case, and an attempted rape, he explains, which got him thinking that there must be a way to let people around you know that you’re in need of help.

“There are apps that resemble ours, but ours is unique in that it is crowd sourced. This means that you reach out to other users that are nearby, so help can potentially arrive much quicker. The average response time for the police is between 15 and 23 minutes, meaning that the damage may already have been done by the time they get there,” Grimholt explains.
There are some problems arising from the use of this app, however. First, there is the danger of people taking the law into their own hands instead of waiting for law enforcement services, but according to the developers, the app is meant to complement them, not replace them. There is also the possibility of people sending out prank calls and calling out for help needlessly, as often happens in emergency call centers today. 

The young entrepreneurs have already had this matter taken care of and explained that the app requires verification with the caller’s phone number, so the user is connected to their identity. The information about both the person who sends out an alarm call and everyone who receives it is stored for a certain period of time, so it is possible to retrieve the info if there is a problem.
i-hls: http://http://bit.ly/1KAf8aY

« New Software To Identify ISIS Recruiters
Jobs Are Disappearing to the Digital Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

HumanFirewall

HumanFirewall

Your secuirty is dorectly proportional to the awareness of your employees. Use Phishing simulation across your organization to train & profile user behavior.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

National Cybersecurity Competence Centre (NC3)

National Cybersecurity Competence Centre (NC3)

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.