Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

FCC Votes To Tighten Broadband Providers Privacy Rules

April 19, 2016 by  
Filed under Around The Net

Comments Off on FCC Votes To Tighten Broadband Providers Privacy Rules

The U.S. Federal Communications Commission is moving toward major new regulations requiring ISPs to get customer permission before using or sharing their Web-surfing history and other personal information.

The FCC voted 3-2 last week to approve a notice of proposed rule-making, or NPRM, the first step toward passing new regulations, over the objections of the commission’s two Republicans.

The rules, which will now be released for public comment, require ISPs to get opt-in permission from customers if they want to use their personal information for most reasons besides marketing their own products.

Republican Commissioners Ajit Pai and Michael O’Rielly complained that the regulations target Internet service providers but not social networks, video providers and other online services.

“Ironically, selectively burdening ISPs, who are nascent competitors in online advertising, confers a windfall on those who are already winning,” Pai said. “The FCC targets ISPs, and only ISPs, for regulation.”

The proposed rules could prohibit some existing practices, including offering premium services in exchange for targeted advertising, that consumers have already agreed to, O’Rielly added. “The agency knows best and must save consumers from their poor privacy choices,” he said.

But the commission’s three Democrats argued that regulations are important because ISPs have an incredible window into their customers’ lives.

ISPs can collect a “treasure trove” of information about a customer, including location, websites visited, and shopping habits, said Commissioner Mignon Clyburn. “I want the ability to determine when and how my ISP uses my personal information.”

Broadband customers would be able to opt out of data collection for marketing and other communications-related services. For all other purposes, including most sharing of personal data with third parties, broadband providers would be required to get customers’ explicit opt-in permission.

The proposal would also require ISPs to notify customers about data breaches, and to notify those directly affected by a breach within 10 days of its discovery.

Courtesy- http://www.thegurureview.net/aroundnet-category/fcc-votes-to-tighten-broadband-providers-privacy-rules.html

Hospitals Should Brace For Surge In Ransomware Attacks

April 18, 2016 by  
Filed under Security

Comments Off on Hospitals Should Brace For Surge In Ransomware Attacks

U.S. hospitals should brace for a surge in “ransomware” attacks by cyber criminals who take computer networks hostage, then demand payment in return for unlocking them, a non-profit healthcare group warned on Friday.

The Health Information Trust Alliance conducted a study of some 30 mid-sized U.S. hospitals late last year and found that 52 percent of them were infected with malicious software, HITRUST Chief Executive Daniel Nutkis told Reuters.

The most common type of malware was ransomware, Nutkis said, which was present in 35 percent of the hospitals included in the study of network traffic conducted by security software maker Trend Micro Inc.

Ransomware is malicious software that locks up data in computers and leaves messages demanding payment to recover the data. Last month, Hollywood Presbyterian Hospital in Los Angeles paid a ransom of $17,000 to regain access to its systems.

This week, an attack on MedStar Health forced the largest healthcare provider in Washington, D.C., to shut down much of its computer network. The Baltimore Sun reported a ransom of $18,500 was sought. MedStar declined to comment.

HITRUST said it expects such attacks to become more frequent because ransomware has turned into a profitable business for cyber criminals.

The results of the study, which HITRUST has yet to share with the public, demonstrate that hackers have moved away from focusing on stealing patient data, Nutkis said.

“If stuff isn’t working, they move on. If stuff is working, they keep doing it,” said Nutkis. “Organizations that are paying have considered their options, and unfortunately they don’t have a lot of options.”

Extortion has become more popular with cyber criminals because it is seen as a way to generate fast money, said Larry Whiteside, a healthcare expert with cyber security firm Optiv.

Stealing healthcare data is far more labor intensive, requiring attackers to keep their presence in a victim’s network undetected for months as they steal data, then they need to find buyers, he added.

“With ransomware I’m going to get paid immediately,” Whiteside said.

Courtesy- http://www.thegurureview.net/aroundnet-category/hospitals-should-brace-for-surge-in-ransomware-attacks.html

AMD’s Vegas GPU Details Spotted

April 11, 2016 by  
Filed under Computing

Comments Off on AMD’s Vegas GPU Details Spotted

Details of AMD’s Vega GPU were leaked and then taken down from AMD R&D Manager’s LinkedIn profile page over Easter.

Hexus spotted Yu Zheng, an R&D Manager at AMD Shanghai had listed the work on Project Greenland as a work experience highlight on his LinkedIn profile page. Greenland is described as “A leading chip of the first graphics IP v9.0 generation, it has full capacity of 4096 shader processor along with whole new SOC v15 architecture.”

The Graphics IP v9.0 designation is thought to signify a Vega GPU in the making. Zheng mentions this is an SOC, but then Hawaii and Fiji chips were described the same. Fiji is part of the graphics IP v8.0 family, as will be Polaris.

Vega following after Polaris, and designated as a ‘HMB2′ GPU by AMD, it looks like Vega based graphics cards will be the successors to the HBM equipped Fiji range such as the Radeon Fury and Nano. Fiju can manage 4096 stream processors,  but with an upgrade to HBM2, 14nm process and other optimisation it is estimated that a Greenland/Vega GPU based graphics cards will offer 20 to 30 per cent better performance.

So with Greenland/Vega sporting HBM2 memory Hexus thinks that Polaris packing graphics cards will therefore feature GDDR5/X memory.

Courtesy-Fud

Is The Smartwatch Boom Really A Bust?

April 7, 2016 by  
Filed under Around The Net

Comments Off on Is The Smartwatch Boom Really A Bust?

The bottom is dropping out of the smart watch industry as VC’s start to realise that the Apple dream is not making many people much dosh.

This week smartwatch maker Pebble CEO Eric Migicovsky blamed VCs for not giving him all the money he needs and laid off a quarter of its workforce.

Only a few years ago, Pebble was the darling of the crowdfunding crowd, having raised over $30 million on Kickstarter. This was when Apple was rumoured to be making one and the Tame Apple Press was claiming they were going to be the next big thing,

When Migicovsky confirmed the layoffs. He implied that VCs are now less keen on funding the dream.

Now Apple, which was said to be the market leader of smartwatches, has dropped the price of the Apple Watch by $50. It is probably not going to upgrade the next one with any serious bells and whistles. It looks like the only people who bought one were Apple’s hard core of fanboys who buy everything that Jobs’ Mob makes regardless of whether they need it.

The IDC sees wearable devices reaching 110 million by the end of 2016 which should be 38.2 percent growth. But it seems that this is not enough.

Fitbit was initially championed as an industry leader but this year saw its stock has been battered in 2016. It appears that Smartwatches haven’t set the market alight. Pebble’s rivals are Apple, Samsung, Motorola, LG and others. It also does not have any other businesses to fall back on.

Courtesy-Fud

Windows 10 Passes 20% User Share Mark

April 6, 2016 by  
Filed under Computing

Comments Off on Windows 10 Passes 20% User Share Mark

For the first time since its debut, Windows 10 accounted for more than one-fifth of the visits to sites tracked by the Digital Analytics Program (DAP), which mines traffic to more than 4,000 websites on over 400 different domains maintained by U.S. government agencies, such as the Internal Revenue Service and the National Weather Service.

The bulk of the visits to DAP websites originate in the U.S.

So far Windows 10 has recorded 20.2% of visits in March by Windows PCs, smartphones and tablets. That was a one-percentage point increase from February and more than two percentage points above January’s.

Although Microsoft irregularly trumpets the number of devices running Windows 10 — the last time was nearly three months ago — data from DAP and metrics vendors like Net Applications and StatCounter are the only publicly available sources for monitoring Windows 10 adoption.

But these external measurements are rough at best.

A case in point: Because overall traffic to DAP websites plummets on weekends — total visits by Windows devices on Saturday and Sunday are typically less than half that of a weekday — Windows 10 may be unrepresented, as more Windows PCs used during the work week are business machines, which predominantly run the corporate standard, Windows 7.

Microsoft has just over four months left to boost Windows 10 adoption by pushing the free upgrade to eligible Windows 7 and 8.1 devices. That deal is set to expire July 29, on the one-year anniversary of Windows 10′s launch.

Windows 10 adoption growth has slowed each month this year. At the pace of past three months, Windows 10 should account for approximately 26% of DAP’s traffic by the end of July. (Other data sources have repeatedly portrayed global adoption of Windows 10 at lower rates than in the U.S.)

Will that match whatever goal Microsoft set when it decided to give away upgrades? Microsoft’s not saying, and even if it did, there would be no way to verify any claim.

Source- http://www.thegurureview.net/computing-category/windows-10-passes-20-user-share-mark.htm

Is Apple Trying To Rain On Intel’s Parade?

April 5, 2016 by  
Filed under Computing

Comments Off on Is Apple Trying To Rain On Intel’s Parade?

Intel’s cunning plans for computers that will recognize human emotion using its RealSense 3D camera, have been killed off in the short term by Apple.

RealSense is a mix of infrared, laser and optical cameras to measure depth and track motion. It can be used on a drone that can navigate its own way through a city block, but it is also good at detecting changes in facial expressions, and Intel wanted to give RealSense the ability to read human emotions by combining it with an emotion recognition technology developed by Emotient.

Plugging in Emotient allowed RealSense to detect whether people are happy or sad by analyzing movement in their lips, eyes and cheeks. Intel said that it could detect “anger, contempt, disgust, fear,” and other sentiments.

A few months ago the fruity cargo cult Apple acquired Emotient. Intel has removed the Emotient plug-in from the latest version of the RealSense software development kit.

It is not clear at this point if Apple told Intel that it invented the plug in and so it had to sling its hook, or if Intel did not want Jobs’ Mob anywhere near its technology.

The RealSense SDK has features that allow it to recognize some facial expressions, but it’s unclear if they’ll be as effective as the Emotient technology.

Courtesy-Fud

Symantec Has Some Flaws With SEP

April 1, 2016 by  
Filed under Computing

Comments Off on Symantec Has Some Flaws With SEP

Symantec has warned of three serious vulnerabilities in its Endpoint Protection (SEP) software, and is advising users to update their systems.

The bugs affect all builds of the 12.1 version of the SEP software, with the first two flaws allowing authorised but low privilege users of the software to gain elevated and administrative access to the management console, which can be accessed either locally or through a web-based portal.

The third bug is in the sysplant driver and enables users to bypass the SEP’s security controls and run malware and other malicious code on a targeted client machines.

“Exploitation attempts of this type generally use known methods of trust exploitation requiring enticing a currently authenticated user to access a malicious link or open a malicious document in a context such as a website or in an email,” said the security firm.

There have been no recorded exploits of the flaws, so it would appear that Symantec has squashed the bugs before they became a real-world problem for its customers.

The first two bugs were discovered by security researcher Anatoly Katyushin from rival firm Kaspersky Labs, which is a little embarrassing. Discovery of the third bug was credited to the enSilo Research Team.

Symantec advises SEP users to update their software to the 12.1 RU6 MP4 version. It also recommends that users should take precautions and restrict remote access to the management console in order to prevent hackers from attacking client systems through the web portal.

While hackers can direct sophisticated malware at even the most robustly secured systems, exploiting flaws in software offers an easier route into machines and networks, providing hackers get in before the bugs are discovered and patched.

Recent examples can be seen with the discovery of iOS malware which threatens iPhones through an Apple DRM flaw, and an error on Code.org’s website which saw the emails of its volunteers exposed.

Courtesy-TheInq

Is nVidia Going Linux

March 29, 2016 by  
Filed under Computing

Comments Off on Is nVidia Going Linux

The dark satanic rumor mill has manufactured a hell on earth yarn claiming that Nvidia is working on its own Linux OS for gamers.

A slide has tipped up showing a screen capture of an installer screen for this operating system supposedly going by the “NLINUX” codename at NVIDIA.

Not much to go on, but it does appear that Nvidia is looking at creating a distribution for gamers similar to that operated by Valve.

It is hard to see what Nvidia would get out of it. Nvidia also has its SHIELD TV that’s powered by Tegra hardware and offers a variety of games over their cloud/streaming “GeForce NOW” service.

So why would Nvidia need a full-blown Linux distribution? The only place it could use one is on the desktop, but that would just mean bringing another Linux distribution into a crowded market with little return for its efforts.

Nvidia already has control of the Linux gaming systems and its cards do better on Linux than AMDs so an “optimized” Linux OS is not going to sell them more graphics cards for Linux gamers. It would have to add something which is better than Steam, or Ubuntu and what could that be?

Courtesy-Fud

Qualcomm Jumps Into VR

March 24, 2016 by  
Filed under Computing

Comments Off on Qualcomm Jumps Into VR

Qualcomm has thrown its hat into the virtual reality (VR) ring with the launch of the Snapdragon VR SDK for Snapdragon-based smartphones and VR headsets.

The SDK gives developers access to advanced VR features, according to Qualcomm, allowing them to simplify development and attain improved performance and power efficiency with Qualcomm’s Snapdragon 820 processor, found in Android smartphones such as the Galaxy S7 and tipped to feature in upcoming VR headsets.

In terms of features, the development kit offers tools such as digital signal processing (DSP) sensor fusion, which allows devs to use the “full breadth” of technologies built into the Snapdragon 820 chip to create more responsive and immersive experiences.

It will help developers combine high-frequency inertial data from gyroscopes and accelerometers, and there’s what the company calls “predictive head position processing” based on its Hexagon DSP, while Qualcomm’s Symphony System Manager makes easier access to power and performance management for more stable frame rates in VR applications running on less-powerful devices.

Fast motion to photon will offer single buffer rendering to reduce latency by up to 50 percent, while stereoscopic rendering with lens correction offers support for 3D binocular vision with color correction and barrel distortion for improved visual quality of graphics and video, enhancing the overall VR experience.

Stereoscopic rendering with lens correction supports 3D binocular vision with color correction and barrel distortion for improved visual quality of graphics and video, enhancing the overall VR experience.

Rounding off the features is VR layering, which improves overlays in a virtual world to reduce distortion.

David Durnil, senior director of engineering at Qualcomm, said: “We’re providing advanced tools and technologies to help developers significantly improve the virtual reality experience for applications like games, 360 degree VR videos and a variety of interactive education and entertainment applications.

“VR represents a new paradigm for how we interact with the world, and we’re excited to help mobile VR developers more efficiently deliver compelling and high-quality experiences on upcoming Snapdragon 820 VR-capable Android smartphones and headsets.”

The Snapdragon VR SDK will be available to developers in the second quarter through the Qualcomm Developer Network.

The launch of Qualcomm’s VR SDK comes just moments after AMD also entered the VR arena with the launch of the Sulon Q, a VR-ready wearable Windows 10 PC.

Courtesy-TheInq

 

Cisco Fixes Major Flaw

March 23, 2016 by  
Filed under Computing

Comments Off on Cisco Fixes Major Flaw

Cisco has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices which are popular among those distributed by ISPs to their customers.

The embedded Web server in the Cisco Cable Modem with Digital Voice models DPC2203 and EPC2203 contains a buffer overflow vulnerability that can be exploited remotely without authentication.  Apparently all you need to do is send a crafted HTTP requests to the Web server and you could see some arbitrary code execution.

Cisco said that its customers should contact their service providers to ensure that the software version installed on their devices includes the patch for this issue.

The Web-based administration interfaces of the Cisco DPC3941 Wireless Residential Gateway with Digital Voice and Cisco DPC3939B Wireless Residential Voice Gateway are affected by a vulnerability that could lead to information disclosure. An unauthenticated, remote attacker could exploit the flaw by sending a specially crafted HTTP request to an affected device in order to obtain sensitive information from it.

The Cisco Model DPQ3925 8×4 DOCSIS 3.0 Wireless Residential Gateway with EDVA is affected by a separate vulnerability, also triggered by malicious HTTP requests, that could lead to a denial-of-service attack.

Hackers have been hitting modems, routers and other gateway devices, hard lately – especially those distributed by ISPs to their customers. By compromising such devices, attackers can snoop on, hijack or disrupt network traffic or can attack other devices inside local networks.

Courtesy-Fud

« Previous PageNext Page »