Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

RIM Heads To The Cloud

August 31, 2011 by  
Filed under Smartphones

Canada’s Research In Motion (RIM) will take the wraps off of a new cloud-based social music sharing service called BBM Music, as companies begin to bet on entertainment delivered over the Internet that incorporates social networking features.

Research in Motion, the maker of BlackBerry phones, said select music from Universal Music Group, Sony Music Entertainment, Warner Music and EMI would be available for the users.

A closed beta trial of the BBM Music service is starting on today in Canada, the United States and the UK, the company stated.

The music service is expected to be commercially available to customers later this year for a monthly subscription of $4.99 in a number of countries, it said.

Read more…

August 30, 2011 by  
Filed under Around The Net

Ohio State University researchers armed with sewing machines and computers have designed a way to weave radio antennas into clothing in an effort to give wearers more flexible and reliable communications capabilities.

Utilizing plastic film and metallic thread, the researchers are attempting to outfit American soldiers with better and less intrusive wireless technology, though they say the hands-free design could be applicable to others, including police, firefighters and the elderly.

The researchers outline their antenna design in the journal IEEE Antennas and Wireless Propagation Letters. They acknowledge the concept of wearable antennas isn’t new (combine what they’re doing and some of the invisibility cloak designs that would be woven into clothing and you’d really have something!).

But the OSU researchers claim their design is an improvement over past efforts in that it boosts antenna range fourfold by utilizing a computer controller that fits on a belt and works with multiple antennas that can send and receive signals in all directions. Network coding that coordinates communications among antennas also plays a key role.

Read More….

August 29, 2011 by  
Filed under Computing

Lenovo’s business-oriented tablet, the ThinkPad Tablet, is now available for purchase and should start shipping within a week. The 10-inch Android device, which Lenovo officially announced a little more than a month ago, boasts an impressive mix of consumer and business-friendly features that might please both the user and their IT department.

Like other Android 3.1 Honeycomb tablets on the market, the ThinkPad Tablet has a 1280 x 800 multitouch display, 1GB of memory, front- and rear-facing cameras and a NVIDIA Tegra 2 dual core processor. It comes in a 16GB model for $499, a 32GB version for $569 and a 64GB option for $669. Basic specs and price-wise, the ThinkPad Tablet is on par with the competition.

What sets the ThinkPad apart, however, are the enterprise-oriented tools like remote administration in case the tablet gets lost or stolen, support for Cisco VPN, and full device encryption. Free apps included like Documents to Go, PrinterShare, and Computrace underscore the tablets professional target audience.

Read More….

August 28, 2011 by  
Filed under Consumer Electronics

With technophiles still scrambling to get their hands on the remaining Hewlett-Packard’s $99 TouchPads, a $49 deal just seems too good to be true.

And, as the thousand or so people who tried to buy cheap TouchPads on an HP look-alike website Tuesday learned, one should think twice about seemingly unbelievable deals.

The prank site — registered Tuesday as Hewlett-packard.org.uk — looks legitimate. In fact, many of the links on the site go to real HP addresses.

But anyone who tries to purchase the $49 TouchPad gets Rickrolled. It’s a popular type of Internet prank where the victim clicks on a seemingly irresistible link — a $49 TouchPad, or a sneak copy of a Kim Kardashian wedding video — and ends up instead sitting through a YouTube clip of schmaltzy soul singer Rick Astley singing his 1987 hit, “Never Gonna Give You Up.”

Read More….

August 27, 2011 by  
Filed under Smartphones

Satellite TV provider Dish Network is aiming to build a 4G cellular network, if the U.S. Federal Communications Commission grants its permission, according to a filing the satellite provider made on Monday.

Dish, which earlier this year completed an acquisition of bankrupt satellite mobile operator TerreStar, asked the FCC to transfer TerreStar’s frequency licenses to a Dish subsidiary and to allow Dish to use the spectrum to build a broadband wireless network that it could then use to offer standalone cellular services.

Combined with spectrum Dish acquired in a separate deal to buy DBSD North America, the satellite provider wants to build a network using LTE, the technology of choice for most of the nationwide mobile phone operators, it wrote.

But it needs special permission from the FCC to offer standalone cellular service–as opposed to a service that is integrated with satellite service–and says it is crucial that it be allowed to do so.

“The requirement to make every device dual-mode severely limits a provider’s ability to enter into arrangements with multiple device and equipment manufacturers, thereby limiting consumer choice and severely impairing the business case economics,” Dish wrote.

The company also argued that customers want the choice of a smaller, lighter device with long battery life. Adding satellite capabilities to devices makes them heavier and reduces battery life. “Today, a mobile voice and data provider’s ability to attract customers depends in large measure on its ability to provide its customers with the types of devices that best suit their needs,” it wrote.

Read More….

August 26, 2011 by  
Filed under Smartphones

BlackBerry maker Research In Motion is making plans to roll out its own music streaming service that will work across its mobile devices, according to people familiar with the plans.

The new service is likely part of an attempt by RIM to improve its BlackBerry Messenger service as it competes with the mobile media platform strengths of rival Apple Inc and Google Inc’s Android.

RIM is in late-stage negotiations with major labels, including Vivendi SA’s Universal Music Group, Sony Corp’s Sony Music, Warner Music Group and EMI Group. The new service is expected to be announced by Labor Day in the United States, September 5.

RIM has been enhancing its BlackBerry Messenger offering, popularly known as BBM, since announcing its “social platform” at last September’s DevCon event where it unveiled the PlayBook tablet computer.

A RIM spokeswoman declined comment on the report but said BBM is one of the largest mobile social networks in the world.

RIM’s BlackBerry smartphones have been hit by a sharply declining market share in the United States, even as the company has expanded sales in other parts of the world, partly because of BBM’s popularity.

Analyst Matthew Thornton at Avian Securities said he doubted the music service would attract new users but might help the company keep its existing BlackBerry customers interested.

“I just don’t think trying to replicate Apple is really going to change their situation near term,” he said.

“For RIM it’s going to be the new OS 7 product first and foremost … and then it’s about QNX and making that transition.”

RIM has just launched an updated operating system on three new touchscreen devices intended to catch up with the technical specifications of Android and other rivals. The company plans to launch the first BlackBerrys using the QNX software, used on its PlayBook tablet, early next year.

Read More….

August 25, 2011 by  
Filed under Internet

Spam – particularly the kind with malicious attachments – is enjoying a growth spurt, reaching a two-year high overall, which includes the spike last fall just before the SpamIt operation folded its doors, a security firm says.

In fact spam traffic is about double what it was then, according to M86 Security Labs, which analyzes spam levels across selected domains.

“After multiple recent botnet takedowns, cybercriminal groups remain resilient clearly looking to build their botnets and distribute more fake AV in the process,” the company says in its blog. “It seems spammers have returned from a holiday break and are enthusiastically back to work.”

This report coincides with a report yesterday from Internet security company Commtouch, which says a spike in email-attached malware has just ended, but that further waves are expected.

M86 says in its blog that most of the spam is generated by the Cutwail botnet, and malicious spam accounted for 13% of the mix over the past week, which is unusually high, but even that spiked to 24% yesterday.

Read More…

August 24, 2011 by  
Filed under Computing

CRYPTOGRAPHY RESEARCHERS have identified a weakness in the Advanced Encryption Standard (AES) security algorithm that can crack secret keys faster than before.

The crack is the work of a trio of researchers at universities and Microsoft, and involved a lot of cryptanalysis – which is somewhat reassuring – and still does not present much of a real security threat.

Andrey Bogdanov, from K.U.Leuven (Katholieke Universiteit Leuven), Dmitry Khovratovich, who is full time at Microsoft Research, and Christian Rechberger at ENS Paris were the researchers.

Although there have been other attacks on the key based AES security system none have really come close, according to the researchers. But this new attack does and can be used against all versions of AES.

This is not to say that anyone is in immediate danger and, according to Bogdanov, although it is four times easier to carry out it is still something of an involved procedure.

Recovering a key is no five minute job and despite being four times easier than other methods the number of steps required to crack AES-128 is an 8 followed by 37 zeroes.

“To put this into perspective: on a trillion machines, that each could test a billion keys per second, it would take more than two billion years to recover an AES-128 key,” the Leuven University researcher added. “Because of these huge complexities, the attack has no practical implications on the security of user data.” Andrey Bogdanov told The INQUIRER that a “practical” AES crack is still far off but added that the work uncovered more about the standard than was known before.

“Indeed, we are even not close to a practical break of AES at the moment. However, our results do shed some light into the internal structure of AES and indicate where some limits of the AES design are,” he said.

He added that the advance is still significant, and is a notable progression over other work in the area.

“The result is the first theoretical break of the Advanced Encryption Standard – the de facto worldwide encryption standard,” he explained. “Cryptologists have been working hard on this challenge but with only limited progress so far: 7 out of 10 for AES-128 as well as 8 out of 12 for AES-192 and 8 out of 14 rounds for AES-256 were previously attacked. So our attack is the first result on the full AES algorithm.”

Read More…

August 23, 2011 by  
Filed under Consumer Electronics

Beetel Teletech, part of India’s Bharti Enterprises that controls top mobile carrier Bharti Airtel (BRTI.NS), unveiled a tablet computer priced at 9,999 rupees ($220) on Wednesday.

The 7-inch tablet, branded Beetel Magiq, uses Google’s (GOOG.O) Android operating system and supports both 3G and Wi-Fi networks, Beetel said in a statement.

Beetel is one of the largest makers of fixed-line phones in India. A company spokesman said China’s Huawei HWT.UL was their manufacturing partner for the tablet.

India is the world’s second-biggest and the fastest-growing market for mobile phones, although computer penetration is still low.

Apple Inc (AAPL.O) began iPad sales in India in January this year, while Samsung Electronics (005930.KS) launched its Galaxy Tab in India in November last year.

Read More…

August 22, 2011 by  
Filed under Internet

A sizeable uptick in malicious email attachments is just subsiding, but if history is any indicator,several smaller spikes are about to follow that use even more deceptive tactics than their predecessors.

The recent surge, fueled in large part by a flood of fake messages from UPS, is similar to one observed at the end of March in that the messages urge recipients to open an attachment that releases the malware on victims’ machines, according to Internet security firm Commtouch.

The earlier wave used a wide range of package-delivery services as senders, including FedEx and DHL, but the latest outbreak employs a wider variety of messages such as, “Dear client, recipient’s address is wrong”, “Dear User, Delivery Confirmation: FAILED”, and “Dear Client, We are not able to delivery [sic] the postal package”, according to the Commtouch blog.

All the messages then instruct the recipient to open the attachment that contains the malware, claiming it is an invoice or a form that needs to be filled out. “This time we see differences in the style of the emails – there is far more variation in the automatically-generated subjects, body and attachment names. Last time all the attachments were “UPS.exe” – this time there are many variations,” says Avi Turiel, director of product marketing at Commtouch in an email.

The attackers will evaluate the success of the attack by finding out how many recipients activated the malware, “Based on the infections vs. malware sent out they will probably try and figure out what they could improve in the next attack,” he says.

Read More…

Comments