Opera Goes VPN
Opera Software has announced a crop of additional functionality for its desktop edition which graduates today to become Opera 32.
The Norwegian browser firm has a relatively small but very loyal market share of 1.27 percent. It has benefited in recent years from increased compatibility owing to a change to the open source Chromium base, making it the biggest Chromium browser apart from Chrome itself.
Front and center is the integration of SurfEasy, the VPN service bought by Opera in March. Customers can now run completely anonymous browsing sessions from within Opera 32.
Other browsers offer ‘anonymous browsing’, but this does not protect your browsing of robot sex doll sites from your ISP or your search engine. With a VPN you can be sure that whatever you get up to is secret.
Opera product manager Zhenis Beisekov said in the Opera Blog: “Your security online has always been our highest concern. We want to move it another step forward, because we believe that privacy online is a universal right.”
Other new features include the addition of password syncing between browsers, which joins the existing shared tabs, bookmarks and data.
Bookmarks get a new tree-view designed to make it easier to find stuff in your bookmarks, and maybe give them the tidy up they’ve needed all these years.
Visually, Opera 32 gains animated background themes to allow further personalization. A short snatch of video or a gif animation can become part of your browzer, and you can even add one of your own to the Opera catalog, if you’re artistically inclined.
Opera recently announced a major update to its Mini browser for smaller devices, which offers a data compression option that maintains the integrity of the page content for the first time, making it ideal for roaming and low bandwidth areas.
Source-http://www.thegurureview.net/computing-category/opera-browser-introduces-vpn-for-everyone.html
Are Investors Losing Patience With Apple?
September 24, 2015 by admin
Filed under Around The Net
Comments Off on Are Investors Losing Patience With Apple?
Investors fear that Apple has run out of ideas after it released a version of Microsoft’s surface pro and an iPhone, which was the same as last year’s.
Apple’s Tim Cook might have thought yesterday, as he walked away from the cheering crowds of Apple employees and rabid New York Times writers, that he had won the day.
However, Apple shares fell 1.9 percent as shareholders realised that there were no transformative products that could jumpstart the company’s sales ahead of the crucial holiday season.
Apple shares usually drop an average of 0.4 percent on the day of iPhone announcements because the hype never matches the reality but this is a much bigger fall.
The big iPad received a raspberry because it was too big and similar to Microsoft’s Surface tablet and the new iPhones were too similar to those released a year ago. The Apple Surface Pro even came with a stylus, which is something that Apple fanboys mocked for years. In fact the only innovative thing about it was that it required recharging every ten hours making it the chocolate teapot of pencils.
All they had which was new was the 3D Touch which is a “so what?” technology which no one really needed or cares about. It was certainly not worth upgrading to get.
Jobs’ Mob has clearly given up on any pretence of “thinking different” and short of ideas has copied itself and others.
We expected the Apple TV announcement to be hugely disappointing. Apple has mostly dialled back its ambitions this year as it plans a bigger telly service announcement next year. But you would think that after all these years not upgrading the Apple TV, Jobs Mob could have come up with some more interesting hardware.
What we got were demonstrations showed tricks to make viewing easier voice control which can rewind a video for 15 seconds and turn on subtitles, when a viewer asks something like “What did she say?”
Oddly Cook said that Apple had worked really hard, and really long on that project. The new set-top box will include an app store and let developers create new software for Apple TV, including video games.
Again nothing that you can’t get elsewhere and probably a lot cheaper. We expect the Tame Apple Press will go into damage control limitation exercise and try to convince the world that everything is brilliant. Watch the comments below for statements from “Apple investors” claiming that their shares have gone up and that there was tons in yesterday’s rally to get excited about.
Source-http://www.thegurureview.net/computing-category/are-investors-losing-patience-with-apples-inventiveness.html
Hackers Accessed 10M Records At Excellus
September 23, 2015 by admin
Filed under Around The Net
Comments Off on Hackers Accessed 10M Records At Excellus
Hackers have penetrated the IT systems of U.S. health insurer Excellus BlueCross BlueShield and gained access to personal, financial and medical information of more than 10 million people, the company has disclosed.
The initial attack occurred in December 2013, but the company did not learn about it until Aug. 5. Since then it has been working with the FBI and cybersecurity firm Mandiant to investigate the breach.
The hackers may have had access to customer records which include names, addresses, telephone numbers, dates of birth, Social Security numbers, member identification numbers, financial accounts and medical claims information.
Records may contain all or just some of that information, depending on the customer’s relationship with the company. The breach doesn’t affect just Excellus members, but also members of other Blue Cross Blue Shield plans who sought medical treatment in the upstate New York area serviced by the company.
The information was encrypted, but the attackers gained administrative privileges to the IT systems, allowing them to potentially access it, the company said on a website that was set up to provide information about the incident.
No evidence has been found yet that the data was copied or misused by the attackers.
Excellus will send breach notification letters via mail to all affected persons throughout the month and is offering free credit monitoring and identity protection services for two years through a partner.
The company will not contact affected individuals via email or telephone, so any emails or phone calls claiming to be from the company in regard to this attack should be ignored as they are probably scams.
The incident comes after three other Blue Cross Blue Shield health insurers — Anthem, Premera and CareFirst — announced large data breaches this year as a result of cyberattacks.
Excellus said that it doesn’t have sufficient information about the Anthem, Premera and CareFirst investigations in order to comment about possible connections between those attacks and the one against its own systems.
Source-http://www.thegurureview.net/aroundnet-category/hackers-accessed-10m-records-at-excellus.html
FCC Commits To 600 Mhz Wireless Spectrum Auction
September 21, 2015 by admin
Filed under Uncategorized
Comments Off on FCC Commits To 600 Mhz Wireless Spectrum Auction
LAS VEGAS — Federal Communications Commission Chairman Tom Wheeler has committed to a March 29 start date for an unprecedented auction of 600Mhz wireless spectrum currently under the control of the nation’s broadcasters.
The auction has already been delayed two years, but Wheeler was adamant it will move ahead on a timeline that allows input from broadcasters as well as from wireless providers that would be potential spectrum buyers.
The broadcast spectrum in the 600Mhz band offers the potential to wireless carriers to send data, including video and other multimedia at much faster speeds and with lower latency. Latency refers to the speed required to generate a response to a wireless signal.
“I’m supremely confident [the auction] starts March 29,” he said in keynote comments at CTIA Super Mobility Week 2015 here. Explaining the delays, he said the planned auction is like a “Swiss watch with so many moving parts.”
The FCC plans to issue a new public notice in October that will give further details on the planned schedule. Wheeler said that around Thanksgiving, broadcasters will be able to indicate whether they want to participate in offering up the spectrum they use today.
Once the FCC establishes pricing, the broadcasters can decide whether to move forward or withdraw from the process if the prices don’t meet their needs, Wheeler said. In January, wireless providers — including newcomers, possibly — will be prompted to express interest in joining the auction to buy spectrum.
Wheeler contended that the 600MHz spectrum auction shows the FCC is moving to free up spectrum that the cellular industry says it urgently needs.
Source-http://www.thegurureview.net/mobile-category/fcc-commits-to-600-mhz-wireless-spectrum-auction-in-march.html
Enterprise Needs Driving Cloud Sales Boom
Comments Off on Enterprise Needs Driving Cloud Sales Boom
The cloud continues to gain major ground, driven by enterprise storage needs.
Sales are way up for little-known manufacturers that sell directly to big cloud companies like Google and Facebook, while the market for traditional external storage systems is shrinking, according to research company IDC.
Internet giants and service providers typically don’t use specialized storage platforms in their sprawling data centers. Instead, they buy vast amounts of capacity in the form of generic hardware that’s controlled by software. As users flock to cloud-based services, that’s a growing business.
Revenue for original design manufacturers that sell directly to hyperscale data-center operators grew by 25.8 percent to more than US$1 billion in the second quarter, according to the latest global IDC report on enterprise storage systems. Overall industry revenue rose just 2.1 percent from last year’s second quarter, reaching $8.8 billion.
These so-called ODMs are low-profile vendors, many of them based in Taiwan, that do a lot of their business manufacturing hardware that’s sold under better known brand names. Examples include Quanta Computer and Wistron.
General enterprises aren’t buying many systems from these vendors, but the trends at work in hyperscale deployments are growing across the industry. Increasingly, the platform of choice for storage is a standard x86 server dedicated to storing data, according to IDC analyst Eric Sheppard. Sales of server-based storage rose 10 percent in the quarter to reach $2.1 billion.
Traditional external systems like SANs (storage area networks) are still the biggest part of the enterprise storage business, logging $5.7 billion in revenue for the quarter. But sales in this segment were down 3.9 percent.
Overall demand for storage capacity continued to grow strongly, with 37 percent more capacity shipped in the quarter compared with a year earlier.
Source-http://www.thegurureview.net/aroundnet-category/enterprise-storage-needs-driving-cloud-sales-boom.html
Is Acer Open To A Takeover?
Acer Inc founder Stan Shih said he would welcome a takeover of the struggling Taiwanese computer manufacturer after a drastic decline in its stock price, while warning any potential buyer would have to pay a heavy amount.
“Welcome,” Shih told reporters in response to a question about whether Acer would be open to a takeover. He added however that any buyer would get an “empty shell” and would pay dearly.
“U.S. and European management teams usually are concerned about money, their CEOs only work for money. But Taiwanese are more concerned about a sense of mission and emotional factors,” he said.
His remarks were first reported by Taiwanese media on Thursday and were confirmed by a company spokesman.
Acer has reported steep on-year sales falls in recent months, including a 33 percent drop in July.
It suffered a T$2.89 billion ($90 million) loss in the first six months of 2015, versus a slight profit in the same period last year. It booked losses for all of 2011, 2012 and 2013 amid cratering PC sales.
Its stock price has fallen by nearly half since early April.
Source-http://www.thegurureview.net/aroundnet-category/acer-warms-to-takeover-possibility.html
Apple TV Service Delayed Again
August 26, 2015 by admin
Filed under Consumer Electronics
Comments Off on Apple TV Service Delayed Again
Apple Inc will push back rolling out its live TV service to at least next year, Bloomberg reported, citing people familiar with the iPhone maker’s plans.
The company had planned to introduce the service, which is delivered over the Internet, this year.
Discussions with broadcasters such as CBS Corp and Twenty-First Century Fox Inc to license programming are progressing slowly, and lack of content has led Apple to scrap plans to announce the service at a Sept. 9 event, Bloomberg said.
Apple also lacked the computer network capacity to ensure a good viewing experience, Bloomberg said.
The company still plans to introduce a more powerful version of its Apple TV set-top box at the event, which will be held in San Francisco.
Apple was aiming to price the new service at about $30 to $40 a month, media reports have said.
Dropbox Beefs Up Security
August 25, 2015 by admin
Filed under Around The Net
Comments Off on Dropbox Beefs Up Security
Two-factor authentication is widely regarded as a best practice for security in the online world, but Dropbox has announced a new feature that’s designed to make it even more secure.
Whereas two-step verification most commonly involves the user’s phone for the second authentication method, Dropbox’s new U2F support adds a new means of authenticating the user via Universal 2nd Factor (U2F) security keys instead.
What that means is that users can now use a USB key as an additional means to prove who they are.
“This is a very good advancement and adds extra security over mobile notifications for two-factor authentication,” said Rich Mogull, Securosis CEO.
“Basically, you can’t trick a user into typing in credentials,” Mogull explained. “The attacker has to compromise the exact machine the user is on.”
For most users, phone-based, two-factor authentication is “totally fine,” he said. “But this is a better option in high-security environments and is a good example of where the FIDO standard is headed.”
Security keys provide stronger defense against credential-theft attacks like phishing, Dropbox said.
“Even if you’re using two-step verification with your phone, some sophisticated attackers can still use fake Dropbox websites to lure you into entering your password and verification code,” the company explained in a blog post. “They can then use this information to access your account.”
Security keys, on the other hand, use cryptographic communication and will only work when the user is signing in to the legitimate Dropbox website.
Dropbox users who want to use the new feature will need a security key that follows the FIDO Alliance’s Universal 2nd Factor (U2F) standard. That U2F key can then be set up with the user’s Dropbox account along with any other U2F-enabled services, such as Google.
Has The iPhone Peaked in The U.S.?
August 21, 2015 by admin
Filed under Smartphones
Comments Off on Has The iPhone Peaked in The U.S.?
Apple’s vice like grip in the US smartphone market is falling off as sales of the overpriced gadgets slump.
Research outfit Kantar Worldpanel ComTech said the 2.3 per cent drop in US sales had been covered by rises in China, Japan and Australia.
But the fact that Apple’s home ground is the US and that it has become increasingly dependent on its iPhone, this statistic does not bode well, particularly as the company depends on continual growth to maintain its share price the whole lot is starting become unstuck.
For the second quarter of 2015, iPhone sales grew by 2.1 percent from the same quarter last year across Europe’s five biggest markets, namely the UK, Germany, France, Italy and Spain. Growth was strongest in the UK at 5.5 percent and weakest in Italy at only 0.1 percent. Beyond Europe, iPhone sales surged by 9.1 per cent in Australia, 7.3 percent in China and 2.7 percent in Japan.
It is worthwhile pointing that the European growth outside the UK, Australia and China is more indicative of a flat market rather than actual growth.
A possible reason for the fall in the US is better competition from Android where Apple’s Android rivals provided a tougher fight.
Carolina Milanesi, chief of research at Kantar Worldpanel ComTech, said in a press release. “In the U.S., as we forecasted last month, Android’s growth continued in the quarter ending June 30, with both Samsung and LG increasing their share sequentially. Forty-three percent of all Android buyers mentioned a ‘good deal on the price of the phone’ as the main purchase driver for their new device.”
“Android in the U.S. is undergoing its strongest consolidation yet, with Samsung and LG now accounting for 78 percent of all Android sales,” Milanesi added. “LG is the real success story of the quarter. Not only did it double its share of the US smartphone market once again, but it was also able, for the first time, to acquire more first-time smartphone buyers than Samsung.”
Screen size was the main driver for Android buyers across Europe, according to Dominic Sunnebo, business unit director at Kantar. Samsung and LG both sell big-screen “phablet” phones. Samsung’s Galaxy Note 4 sports a 5.7-inch screen, while LG’s G4 packs in a 5.5-inch screen.
Though the iPhone 6 Plus also uses a 5.5-inch display, iOS buyers are driven by a wider range of factors, Sunnebo said, including “phone reliability and durability, as well as the quality of the materials.”
Of course if you are member of Tame Apple Press you will forget to report the news and say the opposite and claim that the iPhone’s wonderful sales are a problem.
Malware Turns Computers Into Cellular Antenna
Comments Off on Malware Turns Computers Into Cellular Antenna
A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.
While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.
Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.
“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.
The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.
The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.
The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.