Africa To Lead Global Bandwidth Demand
Comments Off on Africa To Lead Global Bandwidth Demand
Africa’s demand for Internet access to the rest of the world will grow by an average of 51 percent every year until 2019, ahead of all other regions, according to a forecast by research company Telegeography.
Rapid economic growth and wider Internet use will drive the increase in demand, which will be met mostly by turning on unused capacity in existing cables, according to Telegeography analyst Erik Kreifeldt. Terrestrial links are in demand partly because much of Africa still relies on satellite, which is far more expensive per bit than wired broadband, he said.
Most Internet bandwidth between continents is provided by undersea cables built and financed by groups of service providers. From Africa, most of those links go to Europe. Other carriers pay to tap into those cables and link their customers to the Internet. In some parts of Africa, running cables from coastal areas to the interior is a challenge so satellite remains the major Internet source, Kreifeldt said.
The capacity of international cables landing on African shores is just a fraction of the bandwidth available between Europe, the U.S. and Asia. After seven years of the growth that Telegeography forecasts, from 2012 through 2019, Africa will have 17.2Tbps (bits per second) of links to the outside world. That’s up from just 957Gbps in 2012 but will still be only about one-quarter of the international capacity of Latin America and less than that of Canada, according to Telegeography.
The hunger for the Internet varies among African countries. Through 2019, bandwidth demand is expected to grow fastest in Angola, at 71 percent per year; Tanzania, at 68 percent; and Gabon, at 67 percent.
Many new cables have been built to Africa and around the continent in the past several years, giving service providers excess fiber capacity that can be turned on when needed, Kreifeldt said. As that fiber gets lit up and supply rises, prices should fall for enterprises and other users in African countries, he said. However, due to relative scarcity, a given amount of bandwidth between Africa and Europe costs about 10 times as much as the same size connection between Europe and North America, he said. Africa’s bandwidth gains aren’t expected to shrink that gap.
ATM Malware Found In Mexico
A malicious software program identified in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
Two versions of the malware, called Ploutus, have been discovered, both of which are engineered to empty a certain type of ATM, which Symantec has not identified.
In contrast to most malware, Ploutus is installed the old-fashioned way — by inserting a CD boot disk into the innards of an ATM machine running Microsoft Windows. The installation method suggests that cybercriminals are targeting standalone ATMs where access is easier.
The first version of Ploutus displays a graphical user interface after the thief enters a numerical sequence on an ATM’s keypad, although the malware can be controlled by a keyboard, wrote Daniel Regalado, a Symantec malware analyst, on Oct. 11.
Ploutus is programmed for a specific ATM model since it assumes there is a maximum of four cassettes per dispenser in the ATM. It then calculates the amount of money that should be dispensed based on the number of bills. If any of the cassettes have less than the maximum number of 40 bills, it releases whatever is left, repeating that process until the ATM is empty.
Kevin Haley, director of Symantec Security Response, said in an interview earlier this month that the attackers have deep knowledge of the software and hardware of the particular ATM model.
“They clearly know how this machine worked,” he said.
The source code of Ploutus “contains Spanish function names and poor English grammar that suggests the malware may have been coded by Spanish-speaking developers,” Regalado wrote.
In a new blog post, Regalado wrote that the attackers made Ploutus more robust and translated it into English, indicating the same ATM software can be exploited in countries other than Mexico.
The “B” variant of Ploutus has some differences. It only accepts commands through the keypad but will display a window showing the money available in the machine along with a transaction log as it dispenses cash. An attacker cannot enter a specific number of bills, so Ploutus withdraws money from the cassette with the most available bills, Regalado wrote.
Symantec advised those with ATMs to change the BIOS boot order to only boot from the hard disk and not CDs, DVDs or USB sticks. The BIOS should also be password protected so the boot options can’t be changed, Regalado wrote.
LG Goes Self-Healing
November 6, 2013 by admin
Filed under Smartphones
Comments Off on LG Goes Self-Healing
LG is upping the ante in smartphone technology with a new handset that has a curved touchscreen, along with a special “self healing” technology that the company claims can prevent scratches on the phone’s casing.
The South Korean electronics vendor unveiled the new phone on Monday, calling it the LG G Flex. Digital renderings of the handset were leaked earlier this month. But in its Monday announcement the company offered further details on the phone, showing that it contains a few new technologies, along with its curved display.
The G Flex is the second phone to feature a curved display, the first coming from Samsung Electronics with its Galaxy Round handset. The top and bottom of the G Flex’s 6-inch screen are curved towards the user, while on the Samsung phone it is the sides that are curved towards the viewer.
This makes LG’s handset closer to the curve of a traditional fixed-line phone handset, a design choice LG said is optimized for the contours of a face. Users can more comfortably hold the phone to their mouth and ear, improving its voice and sound quality, according to LG.
The company also touted the design by stating that the phone offers an easier grip, and holds better in a person’s back pocket. In addition, LG said the curved screen gives an “IMAX-like” experience when viewing videos, allowing for a greater field of view.
Will Twitter IPO Shares Reach $20?
November 5, 2013 by admin
Filed under Around The Net
Comments Off on Will Twitter IPO Shares Reach $20?
Twitter has decided to price its IPO shares between $17 and $20 when it lists on the New York Stock Exchange, the company said in its filing.
Based on an assumed initial public offering price of $18.50 — the midpoint of the range — Twitter estimates the net proceeds from the sale of shares of common stock will be roughly $1.25 billion, the company said in documentsfiled with the U.S. Securities and Exchange Commission.
Some 80.5 million shares of common stock will be registered, according to the filing.
Releasing its IPO price range positions Twitter to begin its “road show,” seeking to raise funds from investors across the country. In documents filed last week, the company said it would list its shares under the ticker symbol TWTR on the New York Stock Exchange, representing a big win for the market over rival Nasdaq.
Twitter has yet to determine a date for the listing, though one report suggested Nov. 15 could be the day.
Twitter’s IPO is likely to be one of the hottest of the year and the most prominent in social media since Facebook went public last year. Twitter’s share price range will be markedly lower than Facebook’s, which priced its IPO at $38 per share.
Twitter filed for its highly anticipated public offering earlier last month.
Stanford Develops Carbon Nanotubes
Researchers at Stanford University have demonstrated the first functional computer constructed using only carbon nanotube transistors.
Scientists have been experimenting with transistors based on carbon nanotubes, or CNTs, as substitutes for silicon transistors, which may soon hit their physical limits.
The rudimentary CNT computer is said to run a simple operating system capable of multitasking, according to a synopsis of an article published in the journal Nature.
Made of 178 transistors, each containing between 10 and 200 carbon nanotubes, the computer can do four tasks summarized as instruction fetch, data fetch, arithmetic operation and write-back, and run two different programs concurrently.
The research team was led by Stanford professors Subhasish Mitra and H.S. Philip Wong.
“People have been talking about a new era of carbon nanotube electronics moving beyond silicon,” Mitra said in a statement. “But there have been few demonstrations of complete digital systems using [the] technology. Here is the proof.”
IBM last October said its scientists had placed more than 10,000 transistors made of nano-size tubes of carbon on a single chip. Previous efforts had yielded chips with just a few hundred carbon nanotubes.
Banks Join Instant Chat
October 16, 2013 by admin
Filed under Around The Net
Comments Off on Banks Join Instant Chat
Goldman Sachs Group Inc, JPMorgan Chase & Co and six other financial institutions have agreed to join a new instant messaging network from Markit and Thomson Reuters Corp to connect disparate messaging systems.
The network, called Markit Collaboration Services, launched on Monday and allows members to chat with one another regardless of the proprietary messaging technology that each firm uses.
This open platform differs Bloomberg LP’s messaging system, which is a closed network only for users of Bloomberg terminals.
Bloomberg messaging is the most popular form of chat on Wall Street, and often cited as one of the reasons banks are willing to pay around $20,000 a year for a subscription to a Bloomberg terminal.
Markit and Thomson Reuters said they hoped their open messaging network will attract banks that want to chat with their clients or other financial institutions but cannot currently do so because they are on different messaging systems.
The other banks that have joined the new network are Deutsche Bank, Bank of America Merrill Lynch, Barclays, Citigroup, Credit Suisse and Morgan Stanley, according to a statement from Markit.
The banks collectively employ more than 1 million people worldwide, though it was not immediately clear how many individuals will use the new Markit service.
David Craig, president of Thomson Reuters’ Financial & Risk division, said one of the challenges facing banks is that their messaging systems do not always talk to one another. “That creates costs and complexity,” he said.
Markit and Thomson Reuters said the messages on the new network are encrypted, and the system does not store them.
Representatives from Bank of America, Deutsche Bank, Goldman Sachs and Morgan Stanley were not immediately available to comment on the new messaging system. Representatives from Barclays, Citi, Credit Suisse and JPMorgan also declined to comment.
Does Intel Need Help?
As time runs out for Intel to bring its Internet-based TV service by the end of the year, the outfit has approached Samsung and Amazon to ask them to lend a hand. Intel has asked about providing funding and distribution for the service. It looks like the set-top box project could be scrapped if a strategic partner isn’t found soon.
OnCue was supposed to allow users to watch live TV, on demand, and other offerings. Intel said it would provide the hardware and services directly to consumers and that the box would come with a camera that can detect who is in front of the TV. More than 300 engineers are working on the project under Erik Huggers, the head of Intel Media. A version of the service running on Intel hardware is testing with 3,000 Intel employees. Goodness knows what content they are running. Intel is having difficulty getting content deals.
Intel has yet to announce any TV programming partners, and Time Warner Cable and other cable TV providers have been pressuring channel owners to shun pacts with Intel and other Internet-based TV providers. Samsung, which ships millions of smart TVs, could distribute the service as a bundle, while Amazon could provide access to its growing library of movies and TV shows.
Apple Hacked
October 2, 2013 by admin
Filed under Smartphones
Comments Off on Apple Hacked
A group of German hackers claimed to have successfully breached the iPhone fingerprint scanner on Sunday, just two days after Apple Inc debuted the technology that it promises will better protect devices from criminals and snoopers seeking access.
If the claim is verified, it will be embarrassing for Apple which is betting on the scanner to set its smartphone apart from new models of Samsung Electronics Co Ltd and others running the Android operating system of Google Inc.
Two prominent iPhone security experts told Reuters that they believed the German group, known as the Chaos Computing Club, or CCC, had succeeded in defeating Apple’s Touch ID, though they had not personally replicated the work.
One of them, Charlie Miller, co-author of the iOS Hacker’s Handbook, described the work as “a complete break” of Touch ID security. “It certainly opens up a new possibility for attackers.”
Apple representatives did not respond to requests for comment.
CCC, one the world’s largest and most respected hacking groups, posted a video on its website that appeared to show somebody accessing an iPhone 5S with a fabricated print. The site described how members of its biometrics team had cracked the new fingerprint reader, one of the few major high-tech features added to the latest version of the iPhone.
The group said they targeted Touch ID to knock down reports about its “marvels,” which suggested it would be difficult to crack.
“Fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints,” a hacker named Starbug was quoted as saying on the CCC’s site.
The group said it defeated Touch ID by photographing the fingerprint of an iPhone’s user, then printing it on to a transparent sheet, which it used to create a mold for a “fake finger.”
CCC said similar processes have been used to crack “the vast majority” of fingerprint sensors on the market.
“I think it’s legit,” said Dino Dai Zovi,” another co-author of the iOS Hacker’s Handbook. “The CCC doesn’t fool around or over-hype, especially when they are trying to make a political point.”
Touch ID, which was only introduced on the top-of-the-line iPhone 5S, lets users unlock their devices or make purchases on iTunes by simply pressing their finger on the home button. It uses a sapphire crystal sensor embedded in the button.
Data used for verification is encrypted and stored in a secure enclave of the phone’s A7 processor chip.
Two security experts who sponsored an impromptu competition offering cash and other prizes to the first hackers who cracked the iPhone said they had reviewed the information posted on the CCC website, but wanted more documentation.
“We are simply awaiting a full video documentation and walk through of the process that they have claimed,” said mobile security researcher Nick DePetrillo, who started the contest with another security expert, Robert Graham. “When they deliver that video we will review it.”
The two of them each put up $100 toward a prize for the contest winner, then set up a website inviting others to contribute. While the booty now includes more than $13,000 in cash, it was not clear that the CCC would receive the full payout, even if DePetrillo and Graham declared them winners.
Dell Bets On Windows 8
Demand for Windows 8 may be still somewhat lukewarm, but Dell is maintaining its stance that it is the best operating system for business tablets and plans to roll out more Windows 8-based products later this year, according to a senior executive at the computer maker.
“Our Windows tablets are more secure and easier to manage than Android-based products and iOS-based products [because Windows is] on our tablets,” said Jeff Clarke, vice chairman and president of global operations at Dell. “And we are not going to change that.”
Windows-based devices accounted for just 4.5% of tablet sales in this year’s second quarter, according to research firm IDC. In comparison, Android-based devices had 62.6% of the tablet market and Apple’s iPad had 32.5%.
The slow adoption of Windows 8 tablets is partly due to their high prices, and to the operating system’s lack of mobile apps, analysts say. Windows 8 has also received mixed reviews, with some people citing its lack of a Start button in the desktop mode as a major problem.
But Dell expects demand for Windows 8 devices to pick up with the availability of Windows 8.1, which Microsoft will release in October.
Cyber Attacks Increasing In Middle East
Comments Off on Cyber Attacks Increasing In Middle East
Syria’s civil war and political strife in Egypt have given birth to new battlegrounds on the Web and driven a surge in cyber attacks in the Middle East, according to a leading Internet security company.
More than half of incidents in the Gulf this year were so-called “hacktivist” attacks – which account for only a quarter of cybercrime globally – as politically motivated programmers sabotaged opposing groups or institutions, executives from Intel Corp’s software security division McAfee said on Tuesday.
“It’s mostly bringing down websites and defacing them with political messages – there has been a huge increase in cyber attacks in the Middle East,” Christiaan Beek, McAfee director for incident response forensics in Europe, Middle East and Africa (EMEA), told Reuters.
He attributed the attacks to the conflict in Syria, political turmoil in Egypt and the activities of hacking collective Anonymous.
“It’s difficult for people to protest in the street in the Middle East and so defacing websites and denial of service (DOS) attacks are a way to protest instead,” said Beek.
DOS attacks flood an organization’s website causing it to crash, but usually do little lasting damage.
The Syrian Electronic Army (SEA), a hacking group loyal to the government of President Bashar al-Assad, defaced an Internet recruiting site for the U.S. Marine Corps on Monday and recently targeted the New York Times website and Twitter, as well other websites within the Middle East.
Beek described SEA as similar to Anonymous.
“There’s a group leading operations, with a support group of other people that can help,” said Beek.
McAfee opened a centre in Dubai on Monday to deal with the rising threat of Internet sabotage in the region, the most serious of which are attacks to extract proprietary information from companies or governments or those that cause lasting damage to critical infrastructure.
Cyber attacks are mostly focused on Saudi Arabia, the world’s largest oil exporter, Qatar, the top liquefied natural gas supplier, and Dubai, which is the region’s financial, commercial and aviation hub, said Gert-Jan Schenk, McAfee president for EMEA.
“It’s where the wealth and critical infrastructure is concentrated,” he said.
The “Shamoon” virus last year targeted Saudi Aramco, the world’s largest oil company, damaging about 30,000 computers in what may have been the most destructive attack against the private sector.
“Ten years ago, it was all about trying to infect as many people as possible,” added Schenk. “Today we see more and more attacks being focused on very small groups of people. Sometimes malware is developed for a specific department in a specific company.”