Sony To Acquire Toshiba’s Sensor Business
November 4, 2015 by admin
Filed under Consumer Electronics
Comments Off on Sony To Acquire Toshiba’s Sensor Business
Toshiba Corp is offload its image sensor business to Sony Corp for around 20 billion yen ($164.68 million) as part of a restructuring plan laid out earlier this year, sources with knowledge of the deal said on Saturday.
Toshiba, whose businesses range from laptops to nuclear power, is undergoing a restructuring after revelations this year that it overstated earnings by $1.3 billion going back to fiscal 2008/09.
Image sensors, which are used in digital cameras and smartphones, are part of Toshiba’s system LSI semiconductor business. Toshiba plans to sell its image sensor manufacturing plant in Oita, southern Japan, and pull out of the sensor business altogether, said the sources, who declined to be identified.
The sale is likely to be finalized soon, the sources said.
Toshiba is considering several options for its system LSI semiconductor business and its discrete semiconductor business and that debate is ongoing, a Toshiba official said when contacted.
An official from Sony declined to comment.
Masashi Muromachi, who became Toshiba’s CEO following the accounting scandal, has promised to restructure lower-margin businesses.
The deal for the image sensor business would be the beginning of the restructuring, Nikkei reported earlier on Saturday.
Sony is already a dominant player in the image sensor market, with its products used in phones made by China’s Xiaomi and India’s Micromax Informatix Ltd.
Courtesy-http://www.thegurureview.net/consumer-category/sony-to-acquire-toshibas-sensor-business.html
Steve Ballmer Believes In Twitter
Ex Microsoft Corp Chief Executive Steve Ballmer has purchased a 4 percent stake in Twitter Inc, according to his spokesman, making him the third-biggest individual shareholder in the social media company.
Ballmer’s stake is worth more than $800 million based on Twitter’s $21 billion market value. Only co-founder Evan Williams and Saudi billionaire Prince Alwaleed bin Talal have greater stakes among individual investors.
Friday Ballmer tweeted from a non-verified account that he built up his stake over the past several months.
His tweet lauded Twitter’s new ‘Moments’ feature, which curates the best tweets of the day, and Dorsey’s appointment as permanent CEO last week.
“Good job @twitter, @twittermoments innovation, @jack Ceo, leaner, more focused,” the tweet said. “Glad I bought 4% past few months.”
Twitter declined to comment. Ballmer himself did not return requests for comment.
Ballmer, who bought the Los Angeles Clippers basketball team after retiring as Microsoft CEO in February 2014, has a personal fortune of about $21.5 billion, making him the 35th richest person in the world, according to Forbes magazine.
Ballmer now owns more of Twitter than co-founder and CEO Dorsey, who has a 3.2 percent stake, according to Thomson Reuters data. Williams is the largest individual shareholder with about 7.5 percent, followed by Alwaleed with about 5.2 percent.
Like @alwaleedbinT move too,” Ballmer’s tweet said. Alwaleed and his investment firm, Kingdom Holding Co 4280.SE, said earlier this month they had raised their stake in Twitter to more than 5 percent.
Ballmer’s investment is a sign that Twitter’s efforts to revive growth under Dorsey is being appreciated, Monness, Crespi, Hardt, & Co Inc analyst James Cakmak said.
“I think it’s just another point of evidence that the step that they are taking to redirect the business toward growth is resonating,” Cakmak said.
Twitter has made several new announcements since Dorsey, who also served as CEO in 2008, returned on a permanent basis last week. On Tuesday, Twitter said it will lay off about 8 percent of its workforce and on Wednesday, it hired Google Inc executive Omid Kordestani as executive chairman.
FBN Securities analyst Shebly Seyrafi said Ballmer’s stake could be indicative of widespread confidence in Dorsey and his strategy.
Source-http://www.thegurureview.net/aroundnet-category/steve-ballmer-believes-in-twitter.html
Is Canon Betting Its Future On IoT?
Canon has announced that it is joining the raft of technology companies attempting to take on the Internet of Things (IoT) through what it is calling the ‘Imaging of Things’.
Speaking at the firm’s EXPO 2015 event in Paris on Tuesday, Canon CEO Fujio Mitarai talked up the firm’s global vision for the future as the IoT becomes more pervasive.
“Canon is showing how the world of imaging is expanding rapidly in the age of the IoT,” said Mitarai.
“In the future nearly everything will be connected through smart devices. These rely on built-in cameras or sensors and the data they generate. As a result, Canon predicts that the IoT will largely depend on the ‘Imaging of Things’.”
To take on this future, Mitarai plans to overhaul Canon’s business structure to build a network of smaller Canon companies and thus create an “ecosystem of innovation”.
The CEO said that these companies have been designed to “harness innovation and creative talents from across the regions”, and will include more investment in what Canon does but on a more local level in different regions across the world, as opposed to all of the innovation being created in Tokyo, as it is at the moment.
This will allow “regional independence and international collaboration [to be] put into practice”, Mitarai said.
In this new “network of companies”, Mitarai explained that each regional headquarters will manage local R&D and manufacturing, as well as service and support customised to its market.
In Europe, the smaller Canon companies will focus on printing and network video surveillance, and the firm has already brought in specialists in these business areas such as Océ, Axis and Milestone Systems.
Mitarai said that, along with its global reputation for cameras, this will make Canon the largest printing and network video surveillance company in the world.
On a B2B level, the move is also about helping other firms build new competitive advantages and improve services for their own customers.
“We are changing our own operation model and go to market structure to build more expertise in these areas and connect with our customers,” said Jeppe Frandsen, head of the Production Printing Group at Canon Europe.
“Our customers are changing so we are now looking at a way customers are changing to what their customers want – new ways to do business together.”
Canon’s EXPO 2015 event was also an opportunity for the company to show off many of the latest projects from its R&D centre in Tokyo for the first time in Europe.
These tie in with the firm’s new focus as it launches smaller companies in more regional areas, and include a range of innovative practices such as responding to society’s monitoring needs, 3D printing as part of a partnership with 3D Systems in Europe, and graphic arts via investment in digital print technologies.
Source-http://www.thegurureview.net/technology-2/is-canon-betting-its-future-on-iot.html
Apple Removes Data Spying Apps From Store
October 21, 2015 by admin
Filed under Consumer Electronics
Comments Off on Apple Removes Data Spying Apps From Store
Apple has removed several apps from its store that it said could pose a security risk by exposing a person’s Web traffic to untrusted sources.
The company recommended deleting the apps but did not name them, which may make it hard for people to know which apps put their data at risk.
The apps in question installed their own digital certificates on a person’s Apple mobile device. It would enable the apps to terminate an encrypted connection between a device and a service and view the traffic, which is a potential security risk.
Most websites and many apps use SSL/TLS (Secure Socket Layer/Transport Security Layer), a protocol that encrypts data traffic exchanged with a user. SSL/TLS is a cornerstone of Web security, ensuring data traffic that is intercepted is unreadable.
It is possible in some cases to interfere with an encrypted connection. Many enterprises that want to analyze encrypted traffic for security reasons will use SSL proxies to terminate a session at the edge of their network and initiate a new one with their own digital certificate, allowing them to inspect traffic for malicious behavior.
In that scenario, employees would likely be more aware or expect that kind of monitoring. But people downloading something from the App Store probably would have no idea of the access granted to their sensitive data traffic.
Apple checks applications to ensure that malicious ones are not offered in its store. Those checks are in large part the reason why Apple has had fewer problems with malicious mobile applications in its store.
Installing digital certificates isn’t itself a malicious action per se, but Apple may be concerned that users are not fully aware of the consequences of allowing an app to do so.
Source-http://www.thegurureview.net/aroundnet-category/apple-removes-data-spying-apps-from-store.html
Stagefright 2.0 Exploits Android Vulnerabilities
Comments Off on Stagefright 2.0 Exploits Android Vulnerabilities
Newly found vulnerabilities in the way Android handles media files can allow attackers to compromise devices by tricking users into visiting maliciously crafted Web pages.
The vulnerabilities can lead to remote code execution on almost all devices that run Android, starting with version 1.0 of the OS released in 2008 to the latest 5.1.1, researchers from mobile security firm Zimperium said in a report published Thursday.
The flaws are in the way Android processes the metadata of MP3 audio files and MP4 video files, and they can be exploited when the Android system or another app that relies on Android’s media libraries previews such files.
The Zimperium researchers found similar multimedia processing flaws earlier this year in an Android library called Stagefright that could have been exploited by simply sending Android devices a maliciously crafted MMS message.
Those flaws triggered a coordinated patching effort from device manufacturers that Android’s lead security engineer, Adrian Ludwig, called the “single largest unified software update in the world.” It also contributed to Google, Samsung and LG committing to monthly security updates going forward.
One of the flaws newly discovered by Zimperium is located in a core Android library called libutils and affects almost all devices running Android versions older than 5.0 (Lollipop). The vulnerability can also be exploited in Android Lollipop (5.0 – 5.1.1) by combining it with another bug found in the Stagefright library.
The Zimperium researchers refer to the new attack as Stagefright 2.0 and believe that it affects more than 1 billion devices.
Since the previous attack vector of MMS was closed in newer versions of Google Hangouts and other messaging apps after the previous Stagefright flaws were found, the most straight-forward exploitation method for the latest vulnerabilities is through Web browsers, the Zimperium researchers said.
Zimperium reported the flaws to Google on Aug. 15 and plans to release proof-of-concept exploit code once a fix is released.
That fix will come on Oct. 5 as part of the new scheduled monthly Android security update, a Google representative said.
Source-http://www.thegurureview.net/mobile-category/stagefright-2-0-exploits-android-vulnerabilities.html
Was The Hilton Hotel Chain Hacked In April?
Comments Off on Was The Hilton Hotel Chain Hacked In April?
The Hilton organization is reportedly trying to work out whether it has been hacked and, if so, what it should do about it.
We say reportedly as we have not been able to contact Hilton ourselves and can rely only on reports. They are pretty solid reports, however, and they concern a problem at the company that happened between 21 April and 27 July.
Brian Krebs, of KrebsOnSecurity, started this off with a report about a payment card breach. Krebs said that he had heard about the breach from various sources, and that Visa – the card provider – has mailed potentially affected parties with a warning, and the news that it is the fault of a bricks and mortar company.
Visa did not name the company, but affected parties, or banks to be more precise, have uttered it to Krebs. Its name is Hilton.
“Sources at five different banks say they have now determined that the common point-of-purchase for cards included in that alert had only one commonality: they were all were used at Hilton properties, including the company’s flagship Hilton locations as well as Embassy Suites, Doubletree, Hampton Inn and Suites, and the upscale Waldorf Astoria Hotels & Resorts,” he wrote.
“It remains unclear how many Hilton properties may be affected by this apparent breach. Several sources in the financial industry told KrebsOnSecurity that the incident may date back to November 2014, and may still be ongoing.”
Krebs has a statement from the Hilton organisation in which the firm defended its security practices, and revealed that it is aware of the potential problem and is looking into it. This is a common theme among the breached, and should soon become part of mission statements.
“Hilton Worldwide is strongly committed to protecting our customers’ credit card information,” said the company in the statement to Krebs.
“We have many systems in place and work with some of the top experts in the field to address data security. Unfortunately the possibility of fraudulent credit card activity is all too common for every company in today’s marketplace. We take any potential issue very seriously, and we are looking into this matter.”
We have asked Visa and Hilton for their comments.
Source-http://www.thegurureview.net/computing-category/was-the-hilton-hotel-chain-hacked-in-april.html
Google Upgrades Voice Search
October 8, 2015 by admin
Filed under Around The Net
Comments Off on Google Upgrades Voice Search
Google said it has constructed a better neural network that is making its voice search work faster and better in noisy environments.
“We are happy to announce that our new acoustic models are now used for voice searches and commands in the Google app (on Android and iOS), and for dictation on Android devices,” Google’s Speech Team wrote in a recent blog post . “In addition to requiring much lower computational resources, the new models are more accurate, robust to noise, and faster to respond to voice search queries.”
In 2013, Google brought the same voice recognition tools that had been working in Google Now to Google Search.
Along with being able to find information on the Internet, Google Voice Search also was able to find information for users in their Gmail, Google Calendar and Google+ accounts.
At the 2013 Google I/O developers conference, Amit Singhai, today a senior vice president and Google Fellow, said the future of search is in voice. For Google, he said, future searches will be more like conversations with your computer or device, which also will be able to give you information before you even ask for it.
The company went on to make it clear that it would continue to focus on voice search.
And this week’s announcement backs that up.
Google explained in its blog post that it has updated the neural network it’s using for voice search. A neural network is a computer system based on the way the human brain and nervous system work. It generally uses many processors operating in parallel.
The improved neural network is able to consume the incoming audio in larger chunks than conventional models without performing as many calculations.
“With this, we drastically reduced computations and made the recognizer much faster,” the team wrote. “We also added artificial noise and reverberation to the training data, making the recognizer more robust to ambient noise.”
Source-http://www.thegurureview.net/aroundnet-category/google-upgrades-voice-search.html
U.S. LTE Speeds Drop
October 5, 2015 by admin
Filed under Around The Net
Comments Off on U.S. LTE Speeds Drop
The U.S. has dropped to No. 55 in LTE performance as speeds rise rapidly in countries that have lept ahead some early adopters of the popular cellular system.
The average download speed on U.S. 4G networks inched up to 10Mbps (bits per second) in the June-August quarter, according to research company OpenSignal. That was an improvement from 9Mbps in the previous quarter, but the country’s global ranking fell from 43rd as users in other countries made much larger gains.
The U.S. was one of the first countries with commercial LTE service when Verizon Wireless launched its network in late 2010. But other countries that adopted the system later started with better technology, and some have secured more frequencies or rolled out enhancements that U.S. carriers haven’t embraced as much, OpenSignal said.
New Zealand scored the highest average speed in the quarter with 36Mbps, coming up from nowhere in the rankings. But perennial standouts like South Korea and Singapore kept getting faster, too. The average LTE speed in Korea is now 29Mbps (up by 4Mbps), and in Singapore it’s 33Mbps, up by 5Mbps.
OpenSignal collects data on cellular performance through a free app that mobile subscribers can use to measure the speed they’re getting and find faster networks. The results announced Wednesday are based on readings from more than 300,000 users worldwide, the company said.
Countries like Hungary, the Dominican Republic and Morocco beat the U.S. in average LTE speed, but they aren’t necessarily smartphone paradises. Mobile users in America can use LTE more of the time, for example, because their carrier’s networks are built out. Subscribers in the U.S. are on LTE 78 percent of the time, on average, making the country No. 10 for what OpenSignal calls “time coverage.” Moroccan LTE may be fast, but 49 percent of the time, users there don’t get it, for example.
Source-http://www.thegurureview.net/mobile-category/u-s-falls-to-55th-place-worldwide-for-lte-speeds.html
Apple Finally Drops iCloud Storage Plan Prices
Comments Off on Apple Finally Drops iCloud Storage Plan Prices
For the second time in as many years, Apple dropped prices for its expanded iCloud storage plans, putting costs in line with rivals like Google, Microsoft and Dropbox.
Apple announced changes to iCloud extra storage pricing earlier this month at the event where it unveiled new iPhones, the larger iPad Pro and a revamped Apple TV.
Although the Cupertino, Calif., company did not boost the amount of free storage space — as Computerworld speculated it might — and instead continued to provide just 5GB of iCloud space gratis, it bumped up the $0.99 per month plan from 20GB to 50GB, lowered the price of the 200GB plan by 25% to $2.99 monthly, and halved the 1TB plan’s price to $9.99.
Apple also ditched last year’s 500GB plan, which had cost $9.99 monthly.
The new prices are in line with the competition; in one case, Apple’s was lower.
Google, for example, hands out 15GB of cloud-based Google Drive storage for free — triple Apple’s allowance — and charges $1.99 monthly for 100GB and $9.99 each month for 1TB. The smaller-sized plan is 33% more per gigabyte than Apple’s 200GB deal, and Google’s 1TB plan is priced the same as Apple’s.
Microsoft also gives away 15GB. Additional storage costs $1.99 monthly for 100GB — the same price as Google Drive — while 200GB runs $3.99 per month, 33% higher than Apple’s same-sized plan.
Microsoft does not sell a separate 1TB OneDrive plan but instead directs customers to Office 365 Personal, the one-user subscription to the Office application suite. As part of the subscription, customers are given 1TB of OneDrive space. Office 365 Personal costs $6.99 monthly or $69.99 annually.
Source-http://www.thegurureview.net/aroundnet-category/apple-drops-icloud-storage-plan-prices.html
Is Russia Behind Recent US Malware Attacks?
Comments Off on Is Russia Behind Recent US Malware Attacks?
It would appear that while the US has been blaming China for all its cyber break-ins it appears to be ignoring Tsar Putin’s elite hacking team for the last seven years.
For the past seven years, a cyberespionage group operating out of Russia on the orders of Tsar Putin have been conducting a series of malware campaigns targeting governments, political think tanks and other organizations.
Researchers at F-Secure have been looking into the antics of an outfit called “the Dukes” which has been active since at least 2008. The group has evolved into a methodical developer of “zero-day” attacks, pulling together their own research with the published work of other security firms to provide a more detailed picture of the people behind a long-running family of malware.
The Dukes specialize in “smash and grab” attacks on networks, but have also used subtle, long-term intrusions that harvested massive amounts of data from their targets.
The group’s targets do include criminal organisations operating in the Russian Federation, which suggest there is some form of policing element to it. But they are mostly interested in Western governments and related organisations, such as government ministries and agencies, political think tanks and governmental subcontractors.
F-Secure team wrote. “Their targets have also included the governments of members of the Commonwealth of Independent States; Asian, African, and Middle Eastern governments; organisations associated with Chechen terrorism; and Russian speakers engaged in the illicit trade of controlled substances and drugs.”
The group was named after its earliest-detected malware, known as PinchDuke. Its targets were associated with the Chechen separatist movement. Later that year they were going after Western governments and organisations in search of information about the diplomatic activities of the United States and the NATO.
Most of the attacks used spear phishing emails as the means of injecting malware onto targeted systems, one of their attacks have spread malware through a malicious Tor exit node in Russia, targeting users of the anonymising network with malware injections into their downloads.
The targets have always followed Russian government interests. There are a number of Russian-language artifacts in some of the malware, including an error message in PinchDuke. GeminiDuke also used timestamps that were adjusted to match Moscow Standard time.
Before the beginning of the Ukraine crisis, the group began using a number of decoy documents in spear phishing attacks that were related to Ukraine. They included a letter undersigned by the First Deputy Minister for Foreign Affairs of Ukraine.
However, after the crisis happened the attacks dropped off suggesting that it was an intelligence gathering operation. It is also a big operation, which, if operating in Russia would most likely require state acknowledgement, if not outright support.
Source-http://www.thegurureview.net/computing-category/is-russia-behind-us-malware-attacks.html