Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Amazon Debuts Cloud-based Transcoding Service

October 28, 2013 by  
Filed under Computing

Comments Off on Amazon Debuts Cloud-based Transcoding Service

Amazon Web Services has rolled out the option to use its Elastic Transcoder for audio-only conversions.

Amazon Elastic Transcoder was developed to offer an easy and low-cost way to convert media files from their source format into versions that will play on devices like smartphones, tablets and PCs.

The new feature lets anyone use Amazon Elastic Transcoder to convert audio-only content like music or podcasts from one format to another. Users can also strip out the audio tracks from video files and create audio-only streams. An option that, for example, can be used to create podcasts from video originals that are compatible with iOS applications that require an audio-only HTTP Live Streaming (HLS) file set, Amazon said.

The output from Elastic Transcoder is two-channel AAC, MP3 or Vorbis. Metadata like track name, artist, genre and album art is included in the output file and users can also specify replacement or additional album art.

Users of the service pay for the length of their converted content. For audio-only transcoding, prices start at $0.0045 per minute. That compares to the video version, which costs from $0.015 per minute for standard definition content and $0.03 per minute for high-definition clips, according to Amazon’s website.

For users who want to try out the service, the AWS Free Tier offers up to 20 minutes of free audio output per month. The service was announced for video in January and is still tagged as a beta.

Source

Is Skype Involved In Spying?

October 21, 2013 by  
Filed under Internet

Comments Off on Is Skype Involved In Spying?

Luxembourg’s data protection authority is investigating Microsoft-owned Skype for its alleged cooperation with the U.S. NSA’s Prism spying program, according to the agency.

Luxembourg’s data protection authority, CNPD, is investigating Skype’s links to NSA spying programs after receiving several complaints, said Tom Kayser, a spokesman for the authority. “I can’t really talk about the details of the investigation because it is still ongoing,” he said.

Skype, which has its European headquarters in Luxembourg, allegedly cooperates with the NSA through a program exploring the legal and technical issues involved in making customer calls available to intelligence and law enforcement agencies. The Guardian newspaper first reported the investigation.

The CNPD has powers to ensure that multinational companies based in Luxembourg respect national law, and often receives complaints from the data protection authorities of other European Union member states.

Privacy campaign group Europe-v-Facebook filed one of the complaints in June. That filing was part of a barrage of complaints filed in various countries against European subsidiaries of tech companies that are allegedly involved in the NSA’s spying program, including Facebook, Apple, Microsoft and Yahoo.

Under Luxembourg data protection law service providers and operators are required to ensure the confidentiality of communications and related traffic data.

“No person other than the user concerned may listen to, tap or store communications or the traffic data relating thereto, or engage in any other kinds of interception or surveillance thereof, without the consent of the user concerned,” reads the law’s unofficial English translation.

Violators can face up to a year in prison and/or a fine up to a!125,000 ($170,000). The court dealing with the matter can also order companies like Skype to stop any processing that conflicts with the law on pain of a periodic monetary penalty determined by the court.

“We regularly engage in a dialogue with data protection authorities around the world and are always happy to answer their questions,” a Microsoft spokeswoman said in an email. “It has been previously widely reported that the Luxembourg DPA was one of the DPA’s that received complaints from the ‘Europe v Facebook’ group so we’re happy to answer any questions they may have.”

Source

Does Intel Need Help?

October 7, 2013 by  
Filed under Computing

Comments Off on Does Intel Need Help?

As time runs out for Intel to bring its Internet-based TV service by the end of the year, the outfit has approached Samsung and Amazon to ask them to lend a hand. Intel has asked about providing funding and distribution for the service. It looks like the set-top box project could be scrapped if a strategic partner isn’t found soon.

OnCue was supposed to allow users to watch live TV, on demand, and other offerings. Intel said it would provide the hardware and services directly to consumers and that the box would come with a camera that can detect who is in front of the TV. More than 300 engineers are working on the project under Erik Huggers, the head of Intel Media. A version of the service running on Intel hardware is testing with 3,000 Intel employees. Goodness knows what content they are running. Intel is having difficulty getting content deals.

Intel has yet to announce any TV programming partners, and Time Warner Cable and other cable TV providers have been pressuring channel owners to shun pacts with Intel and other Internet-based TV providers. Samsung, which ships millions of smart TVs, could distribute the service as a bundle, while Amazon could provide access to its growing library of movies and TV shows.

Source

Apple Hacked

October 2, 2013 by  
Filed under Smartphones

Comments Off on Apple Hacked

A group of German hackers claimed to have successfully breached the iPhone fingerprint scanner on Sunday, just two days after Apple Inc debuted the technology that it promises will better protect devices from criminals and snoopers seeking access.

If the claim is verified, it will be embarrassing for Apple which is betting on the scanner to set its smartphone apart from new models of Samsung Electronics Co Ltd and others running the Android operating system of Google Inc.

Two prominent iPhone security experts told Reuters that they believed the German group, known as the Chaos Computing Club, or CCC, had succeeded in defeating Apple’s Touch ID, though they had not personally replicated the work.

One of them, Charlie Miller, co-author of the iOS Hacker’s Handbook, described the work as “a complete break” of Touch ID security. “It certainly opens up a new possibility for attackers.”

Apple representatives did not respond to requests for comment.

CCC, one the world’s largest and most respected hacking groups, posted a video on its website that appeared to show somebody accessing an iPhone 5S with a fabricated print. The site described how members of its biometrics team had cracked the new fingerprint reader, one of the few major high-tech features added to the latest version of the iPhone.

The group said they targeted Touch ID to knock down reports about its “marvels,” which suggested it would be difficult to crack.

“Fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints,” a hacker named Starbug was quoted as saying on the CCC’s site.

The group said it defeated Touch ID by photographing the fingerprint of an iPhone’s user, then printing it on to a transparent sheet, which it used to create a mold for a “fake finger.”

CCC said similar processes have been used to crack “the vast majority” of fingerprint sensors on the market.

“I think it’s legit,” said Dino Dai Zovi,” another co-author of the iOS Hacker’s Handbook. “The CCC doesn’t fool around or over-hype, especially when they are trying to make a political point.”

Touch ID, which was only introduced on the top-of-the-line iPhone 5S, lets users unlock their devices or make purchases on iTunes by simply pressing their finger on the home button. It uses a sapphire crystal sensor embedded in the button.

Data used for verification is encrypted and stored in a secure enclave of the phone’s A7 processor chip.

Two security experts who sponsored an impromptu competition offering cash and other prizes to the first hackers who cracked the iPhone said they had reviewed the information posted on the CCC website, but wanted more documentation.

“We are simply awaiting a full video documentation and walk through of the process that they have claimed,” said mobile security researcher Nick DePetrillo, who started the contest with another security expert, Robert Graham. “When they deliver that video we will review it.”

The two of them each put up $100 toward a prize for the contest winner, then set up a website inviting others to contribute. While the booty now includes more than $13,000 in cash, it was not clear that the CCC would receive the full payout, even if DePetrillo and Graham declared them winners.

Source

HP To Support The iPad

September 30, 2013 by  
Filed under Consumer Electronics

Comments Off on HP To Support The iPad

Is your iPad out of warranty? Hewlett-Packard to the rescue.

HP updated its SmartFriend support service and will now troubleshoot problems with Windows, Android, Chrome OS, OS X and iOS products, according to a fact sheet describing the service.

“HP is expanding its HP SmartFriend service to provide 1:1 expert support for any brand of PC or tablet,” the company said. The plan previously supported PCs from HP and other vendors, as well as Macs.

Users can avail of the service to address general hardware, software and malware issues. HP says its agents can “remove viruses, improve PC performance, solve software errors, and connect devices to a wireless network with enhanced security.” The support is provided by phone or over the Internet, so don’t expect a technician to trot in and fix your iPad in person. But HP notes it can save you from driving to a store.

Unlike Best Buy’s Geek Squad service, HP’s service does not include hardware repairs. It can be tricky to change the battery or storage in tablets, so for iPads, the Genius Bars at Apple Stores may still be the best option for some repairs.

HP didn’t immediately comment on exactly what support it will provide for the iPad. HP printers offer wireless printing from iPads and iPhones. HP sells primarily Windows PCs and Android tablets, though on last Thursday it announced the Pavilion 14 laptop with Google’s Chrome OS.

While SmartFriend includes support for iOS devices, the service seems focused mainly on Windows products. Its technicians include “Microsoft Application Trainers, Microsoft Product Specialists, A+/MCP/MCSE Certified Professionals, Network Administrators and HTML Developers,” according to the fact sheet.

The service starts at US$9.99 per month and users can sign up for a pre-paid, monthly or yearly support plan. A “Complete Plan” supports two devices, while a “Family Plan” supports up to four devices.

Source

HTC Cutting US Jobs

September 25, 2013 by  
Filed under Around The Net

Comments Off on HTC Cutting US Jobs

In another sign of trouble at HTC, the Taiwan-based mobile device maker began downsizing its U.S. operations on Friday, eliminating an undisclosed number of staff.

The move is meant to “streamline and optimize” the company’s U.S. organization “after several years of aggressive growth,” HTC said in a Monday email. A company spokeswoman declined to specify how many employees would be affected.

“However, to achieve our long-term goals as a business and return maximum value to our shareholders, this is a necessary step to drive ongoing innovation,” the company said.

HTC has been facing a difficult year on weak earnings that have sent its stock price tumbling. In the second quarter, its net profit plummeted 83 percent year-over-year, despite strong reviews for its flagship smartphone, the HTC One.

The weak financials are major change from only a couple years ago when HTC was riding high selling Android smartphones in the U.S. But starting in late 2011, the company’s net profit has sagged on increased competition from Samsung and Apple.

To recover, HTC has focused on building up its “One” smartphone brand. In addition, the company has expanded its China presence, and in August launched a new marketing campaign that’s enlisted Hollywood actor Robert Downey Jr.

While the company has largely focused selling high-end handsets, in July HTC said it was planning on selling more mid-tier and entry level phones to regain market share. The new phones will launch at end of the third quarter or early fourth quarter.

But the company’s troubles go beyond issues with smartphone sales and marketing. In September, Taiwanese authorities arrested three HTC employees for allegedly stealing company secrets. One of the employees arrested was Thomas Chien, HTC’s vice president of product design.

HTC has declined to offer further details on the case.

Source

Dell Bets On Windows 8

September 16, 2013 by  
Filed under Computing

Comments Off on Dell Bets On Windows 8

Demand for Windows 8 may be still somewhat lukewarm, but Dell is maintaining its stance that it is the best operating system for business tablets and plans to roll out more Windows 8-based products later this year, according to a senior executive at the computer maker.

“Our Windows tablets are more secure and easier to manage than Android-based products and iOS-based products [because Windows is] on our tablets,” said Jeff Clarke, vice chairman and president of global operations at Dell. “And we are not going to change that.”

Windows-based devices accounted for just 4.5% of tablet sales in this year’s second quarter, according to research firm IDC. In comparison, Android-based devices had 62.6% of the tablet market and Apple’s iPad had 32.5%.

The slow adoption of Windows 8 tablets is partly due to their high prices, and to the operating system’s lack of mobile apps, analysts say. Windows 8 has also received mixed reviews, with some people citing its lack of a Start button in the desktop mode as a major problem.

But Dell expects demand for Windows 8 devices to pick up with the availability of Windows 8.1, which Microsoft will release in October.

Source

Is The Tesla Hackable?

September 9, 2013 by  
Filed under Security

Comments Off on Is The Tesla Hackable?

It’s the curse of the connected car once it’s linked to the Internet, it’s, well, on the Internet. In the case of the Tesla Model S, this means that mischievous hackers could, in theory, control some functions of the vehicle and even snoop without the owner’s knowledge.

Tesla offers Android and iPhone apps for Model S owners, which can be used to check the vehicle’s battery, track its location and status, and tweak several other settings, like climate control and the sunroof. It can also be used to unlock the doors on the Model S.

Dell senior engineer George Reese says the REST API used by Tesla to provide access for Android and iPhone apps has several fairly serious security flaws, which could offer a way in for unscrupulous hackers.

According to an article written by Reese for O’Reilly, Tesla appears to have broken from accepted best practice when designing the API for the Model S.

“It’s flawed in a way that makes no sense. Tesla ignored most conventions around API authentication and wrote their own. As much as I talk about the downsides to OAuth (a standard for authenticating consumers of REST APIs–Twitter uses it), this scenario is one that screams for its use,” he wrote.

However, Reese notes, this is merely a potential attack vector, not one that could be immediately exploited. That said, a compromised website particularly one designed to provide “value-added services” via the API to Tesla drivers could prove highly damaging.

“I can … honk their horns, flash their lights, and open and close the sunroof. While none of this is catastrophic, it can certainly be surprising and distracting while someone is driving,” Reese wrote.

Automotive hacking has been posited by experts for some time, and several presentations at this year’s Defcon detailed fairly comprehensive methods of compromising some models.

Source

Java 6 Security Hole Found

September 6, 2013 by  
Filed under Security

Comments Off on Java 6 Security Hole Found

Security firms are urging users of Oracle’s Java 6 software to upgrade to Java 7 as soon as possible to avoid becoming the victims of active cyber attacks.

F-secure senior analyst Timo Hirvonen warned about the exploit this weekend over Twitter, advising that he had found an exploit in the wild actively targeting an unpatched vulnerability in Java 6, named CVE-2013-2463.

PoC for CVE-2013-2463 was released last week, now it’s exploited in the wild. No patch for JRE6… Uninstall or upgrade to JRE7 update 25.

— Timo Hirvonen (@TimoHirvonen) August 26, 2013

CVE-2013-2463 was addressed by Oracle in the June 2013 Critical Patch Update for Java 7. Java 6 has the same vulnerability, as Oracle acknowledged in the update, but since Java 6 became unsupported in April 2013, there is no patch for the Java 6 vulnerability.

Cloud security provider Qualys described the bug as an “implicit zero-day vulnerability”. The firm’s CTO Wolfgang Kandek said he had seen it included in the spreading Neutrino exploit kit threat, which “guarantees that it will find widespread adoption”.

“We know about its existence, but do not have a patch at hand,” Kandek said in a blog post. “This happens each time a software package loses support and we track these instances in Qualysguard with our ‘EOL/Obsolete’ detections, in this case.

“In addition, we still see very high rates of Java 6 installed, a bit over 50 percent, which means many organisations are vulnerable.”

Like F-secure, Kandek recommended that any users with Java 6 upgrade to Java 7 as soon as they can.

“Without doubt, organisations should update to Java 7 where possible, meaning that IT administrators need to verify with their vendors if an upgrade path exists,” he added.

Source

Apple To Acquire Embark

September 3, 2013 by  
Filed under Consumer Electronics

Comments Off on Apple To Acquire Embark

Apple is reportedly purchasing mapping app developer Embark, in a move that could lend more real-time navigation features for public transit to Apple’s own Maps app.

The acquisition, which was first reported by tech journalist Jessica Lessin, follows other recent mapping purchases for Apple: HopStop, another maker of apps for public transit directions; and Locationary, which provides data about local businesses; and WifiSLAM, an indoor location and mapping company.

Apple did not directly confirm its acquisition of Embark, but in an emailed statement said, “Apple buys smaller technology companies from time to time, and we generally do not discuss our purpose or plans.”

Apple declined to comment further on the deal.

Apple has faced some serious challenges over the past year in providing a consistently solid mapping product with its Maps app. Last September Apple CEO Tim Cook was forced to publicly apologize for a series of issues plaguing the company’s Maps app in Apple’s iOS 6 operating system.

Embark is a company based in the San Francisco Bay Area that makes a mobile mapping app designed to help people navigate mass transit systems. The company’s app provides “tailored trips” specific to the user’s region, along with notifications for late-running trains and other advisories and closures.

Embark’s technology, if it does find its way into a future Apple product, could enhance Apple’s mapping products and make the company a stronger competitor to rivals like Google. Google’s Maps app already offers real-time public transit navigation features, as do some smaller players like iTransitBuddy.

Embark’s app is available for free on the iPhone for 10 transit systems including Boston’s MBTA, Chicago’s L, the New York City Subway and San Francisco’s Bart and Caltrain systems, with more on the way, according to Embark’s website.

It is not clear whether Embark’s app will be shut down as part of the acquisition. The app was still available in Apple’s App Store at the time of this article’s posting.

Embark’s team could not be immediately reached to comment on the deal.

Source

« Previous PageNext Page »