Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

BlackBerry’s Secure Goes To iOS

July 1, 2013 by  
Filed under Smartphones

Comments Off on BlackBerry’s Secure Goes To iOS

BlackBerry continues to expand its support for Android and iOS with Secure Work Space, which separates work and personal apps and data, as the device maker tries to hold on to enterprise users by becoming more platform neutral.

Remaining relevant in a world where more than 9 out of 10 smartphones shipped are based on either Google’s Android or Apple’s iOS isn’t easy for BlackBerry. But the company still has fans in enterprise IT departments and hopes to remain an option for users by continuing to embrace the two dominant platforms. The company can already manage devices based on Android and iOS, and support for BlackBerry Messenger is on the way.

BlackBerry announced Secure Work Space in March and has now made good on a promise to ship it before June 30. The software is an add-on to BlackBerry Enterprise Service (BES) 10, and it adds a managed container to protect corporate data and applications running on Android and iOS devices.

Users get integrated email, calendar and contacts, as well as secure browser access to intranets and document editing capabilities. Data is protected both when stored on the device and when transferred to and from enterprise servers, according to BlackBerry.

“The concept is right and very similar to what AT&T offers with Toggle. Creating two different “personas” on mobile devices is becoming a best practice for enterprises. Buying it from BlackBerry is probably most relevant for enterprises that have a major commitment to BlackBerry 10 and BES 10,” said Leif-Olof Wallin, research vice president at Gartner.

On BlackBerry 10 smartphones, BlackBerry has tightly integrated a personal and a work environment with the Balance feature.

BlackBerry is far from the only vendor that has adopted this concept. One competitor is Good Technology, which on Tuesday announced a whole host of new applications compatible with its Dynamics Security Mobility platform, which includes support for both app wrapping and encrypted app containers. The list of newcomers includes Mobility for SAP and remote access app Splashtop.

But for those interested in Secure Work Space, which is based on software from OpenPeak, the BES 10 server software is free to download. Annual client access licenses for Secure Work Space are $99 per year and device. For enterprises that want to get their feet wet, the platform is also available as a 60-day free trial bundle that includes device management for BlackBerry 10, iOS and Android devices, as well as Secure Work Space licenses for 50 users.

Source

Will Icahn Boot Michael Dell?

June 18, 2013 by  
Filed under Computing

Comments Off on Will Icahn Boot Michael Dell?

Carl Icahn reportedly is drawing up a shortlist of potential Dell CEO replacements for Michael Dell should his bid for the company be successful.

Icahn and Southeastern Asset Management have made a bid to rival that of Michael Dell and Silver Lake Partners in the high stakes fight over Dell and its board. Now it is being reported that Icahn has already started drawing up a list of candidates that he and Southeastern Asset Management will propose as replacements for Michael Dell as CEO of Dell.

Icahn has previously warned that should his offer for Dell be accepted by the shareholders he would look to not only oust Michael Dell as CEO but replace the firm’s board of directors. Reuters reports that Icahn is casting his net far and wide, including consideration of former HP CEO and current Oracle co-president Mark Hurd.

According to Reuters’ sources Cisco director Michael Capellas, IBM services head Michael Daniels and Oracle’s Hurd are all in the frame, although none of the individuals would confirm having been approached by Icahn.

Michael Dell’s initial plan to buy back the company he founded has met with strong opposition by existing shareholders, some of whom think they are getting shortchanged. According to Michael Dell, the firm’s reorganisation into an enterprise IT vendor will be easier if the company goes private and doesn’t face investor and market scrutiny.

So far Dell’s board is backing Michael Dell’s and Silver Lake Partners’ buyout offer, suggesting that Icahn’s offer is short of cash. However some of Dell’s investors might like the drastic action that Icahn is promising, along with the fact that his offer allows existing shareholders to maintain a diluted stake in the company.

Should Icahn manage to get his takeover offer accepted by Dell’s shareholders, it will set up a sensational return to the PC industry for Hurd and give Dell renewed momentum to compete with HP.

Source

McAffee See Sure In Spam

June 13, 2013 by  
Filed under Computing

Comments Off on McAffee See Sure In Spam

The first three months of 2013 have seen a surge in spam volume, as well as a growing number of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee.

After remaining relatively stable throughout 2012, spam levels rose during the first quarter of 2013, reaching the highest volume seen in the past two years, McAfee said in a report released Monday.

The amount of spam originating from some countries rose dramatically, McAfee said. Spam from Belarus increased by 540% while spam originating in Kazakhstan grew 150%.

Cutwail, also known as Pushdo, was the most prevalent spam-sending botnet during the first quarter, McAfee said.

The increased Pushdo activity has recently been observed by other security companies as well. Last month, researchers from security firm Damballa found a new variant of the Pushdo malware that’s more resilient to coordinated takedown efforts.

On the malware front, McAfee has also seen a surge in the number of Koobface samples, which reached previously unseen levels during the first quarter of 2013. First discovered in 2008, Koobface is a worm that spreads via social networking sites, especially through Facebook, by hijacking user accounts.

The number of malware samples designed to infect a computer’s master boot record (MBR) also reached a record high during the first three months of 2013, after increasing during the last quarter of 2012 as well, McAfee said.

The MBR is a special section on a hard disk drive that contains information about its partitions and is used during the system startup operation. “Compromising the MBR offers an attacker a wide variety of control, persistence, and deep penetration,” the McAfee researchers said in the report.

The MBR attacks seen during the first quarter involved malware like StealthMBR, also known as Mebroot; Tidserv, also known as Alureon, TDSS and TDL; Cidox and Shamoon, they said.

Source

Apple Raising Prices In Japan

June 10, 2013 by  
Filed under Uncategorized

Comments Off on Apple Raising Prices In Japan

Apple Inc increased prices of iPads and iPods in Japan on Friday, becoming the highest-profile brand to join a growing list of foreign companies asking Japanese consumers to pay more as a weakening yen squeezes profit.

Some U.S. companies have inoculated themselves at least temporarily against the yen’s fall through financial hedging instruments, while others are charging customers more.

The yen has fallen more than 20 percent against the U.S. dollar since mid-November when then-opposition leader Shinzo Abe, who is now prime minister, prescribed a dose of radical monetary easing to reverse years of sliding consumer prices as part of a deflation-fighting policy, dubbed “Abenomics.”

The Bank of Japan, under a new Abe-backed governor, in April promised to inject $1.4 trillion into the economy in less than two years to achieve 2 percent inflation in roughly two years.

Price rises are rare in Japan, which has suffered 15 years of low-grade deflation. A few other foreign brands have also raised prices on products, providing an early sign of inflation for Abe and an indication that these companies feel consumer demand is strong enough to withstand the increases.

Still, price rises would have to spread much more widely, especially to lower-end discretionary goods, to show that Abe’s aggressive policies are helping reinvigorate the economy.

Apple, one of the most visible foreign companies in Japan, raised the price of iPads by up to 13,000 yen ($130) at its local stores. The 64-gigabyte iPad will now cost 69,800 yen, up from 58,800 yen a day ago, an Apple store employee said. The 128-gigabyte model will cost 79,800 yen compared with 66,800 yen.

Apple also upped prices of its iPod music players by as much as 6,000 yen and its iPad Mini by 8,000 yen.

Source

Twitter’s Authentication Has Vulnerabilities

June 6, 2013 by  
Filed under Around The Net

Comments Off on Twitter’s Authentication Has Vulnerabilities

Twitter’s SMS-based, two-factor authentication feature could be abused to lock users who have not enabled it for their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure.

Twitter introduced two-factor authentication last week as an optional security feature in order to make it harder for attackers to hijack users’ accounts even if they manage to steal their usernames and passwords. If enabled, the feature introduces a second authentication factor in the form of secret codes sent via SMS.

According to Sean Sullivan, a security advisor at F-Secure, attackers could actually abuse this feature in order to prolong their unauthorized access to those accounts that don’t have two-factor authentication enabled. The researcher first described the issue Friday in a blog post.

An attacker who steals someone’s log-in credentials, via phishing or some other method, could associate a prepaid phone number with that person’s account and then turn on two-factor authentication, Sullivan said Monday. If that happens, the real owner won’t be able to recover the account by simply performing a password reset, and will have to contact Twitter support, he said.

This is possible because Twitter doesn’t use any additional method to verify that whoever has access to an account via Twitter’s website is also authorized to enable two-factor authentication.

When the two-factor authentication option called “Account Security” is first enabled on the account settings page, the site asks users if they successfully received a test message sent to their phone. Users can simply click “yes,” even if they didn’t receive the message, Sullivan said.

Instead, Twitter should send a confirmation link to the email address associated with the account for the account owner to click in order to confirm that two-factor authentication should be enabled, Sullivan said.

As it is, the researcher is concerned that this feature could be abused by determined attackers like the Syrian Electronic Army, a hacker group that recently hijacked the Twitter accounts of several news organizations, in order to prolong their unauthorized access to compromised accounts.

Some security researchers already expressed their belief that Twitter’s two-factor authentication feature in its current implementation is impractical for news organizations and companies with geographically dispersed social media teams, where different employees have access to the same Twitter account and cannot share a single phone number for authentication.

Twitter did not immediately respond to a request for comment regarding the issue described by Sullivan.

Source

Is This A Mobile First World?

June 3, 2013 by  
Filed under Smartphones

Comments Off on Is This A Mobile First World?

Judging from the number of people engrossed in activities with their smartphones on the sidewalk, in their cars and in public places, mobile seems to have stolen our attention away from the wired Internet and traditional TV.

However, there is a ways to go before mobile platforms become the primary place where consumers turn for entertainment and getting things done, players at  CTIA Wireless trade show said.

Nokia Siemens Networks announced new capabilities in its network software to make video streams run more smoothly over mobile networks. Among other things, the enhancements can reduce video stalling by 90 percent, according to the company. But even Sandro Tavares, head of marketing for NSN’s Mobile Core business, sees “mobile-first” viewing habits as part of the future.

“Now that the networks are providing a better capacity, a better experience with mobile broadband, mobile-first will come,” Tavares said. “Because the experiences they have with the devices are so good, these devices … start to be their preferred screen, their first screen.

“This is a trend, and this is something that will not change,” Tavares said. But he thinks it’s too early to build networks assuming consumers will turn to tablets and phones as their primary sources of entertainment. “Do you have to be prepared for mobile-first now? Probably not. You have to be able to keep the pace.”

For AT&T, mobile-first is a top priority for its own internal apps, ensuring employees can do their jobs wherever they are, said Kris Rinne, the carrier’s senior vice president of network technologies. But to make it possible over the network, a range of new technologies and relationships may have to come together, she said.

For example, giving the best possible performance for streaming video and other uses of mobile may require steering traffic to the right network if both cellular and Wi-Fi are available. AT&T is developing an “intelligent network selection” capability to do this, Rinne said. When AT&T starts to deliver voice over LTE, it will stay on the cellular network — at least in the early days — because the carrier has more control over quality of service on that system, she said.

Other issues raised by mobile-first include security of packets going over the air and rights for content that subscribers are consuming primarily on mobile devices instead of through TV and other traditional channels, Rinne said.

Source

Lenovo Soars

May 31, 2013 by  
Filed under Computing

Comments Off on Lenovo Soars

PC sales in China and high growth in smartphones sales helped boost Lenovo’s net profit for its fiscal fourth quarter by 90% year-over-year.

For the quarter ended March 31, Lenovo’s net profit was $127 million, the company said on Thursday. Revenue shattered records and was at $7.8 billion, growing 4% from the same period last year.

In Lenovo’s home market of China, the company had an operating margin of 4.9%, an increase of 8% year-over-year. The company also saw continued profitability in its mobile devices business, which makes up 9% of its overall sales. At the end of the quarter, Lenovo’s smartphone shipments were up 206% year-over-year.

Globally, PC shipments were down 13.9% year-over-year in the quarter, the market’s steepest decline since research firm IDC began tracking the market in 1994. Lenovo itself posted flat year-over-year PC shipment growth in the period.

Smartphone and tablet popularity have hurt PC sales, according to analysts. Computers running Microsoft’s Windows 8 have also failed to drum up consumer interest in the previous two quarters.

Source

Lenovo, however, has managed to weather the slowdown by taking advantage of the Chinese PC market, where it has an over 30% market share. Close to half of the company’s revenue comes from the country, now the world’s largest PC market.

The company is now close to surpassing leading PC vendor HP for the top spot. The company had a 15.3% share of the market in this year’s first quarter, while HP had a 15.7% share.

But the Chinese PC maker also plans to focus more of its investment on tablets, smartphones and enterprise hardware, the company’s CEO Yang Yuanqing said in a statement. Earlier this year, Lenovo also reorganized its operations to sharpen the company’s branding and compete better in high-end products.

For the current fiscal year, Lenovo aims to ship 50 million smartphones, up from 30 million last year, Yang said Thursday in an earnings call. It aims to ship 10 million tablets, a five-fold increase from the previous fiscal year.

Most of Lenovo’s smartphone sales come from China, but the company has also begun selling handsets in the emerging markets of Russia, India, Indonesia, the Philippines and Vietnam. In addition, Lenovo is preparing to bring its smartphones to the U.S. and European markets, Yang said, without saying when.

Is Yahoo Really Back?

May 28, 2013 by  
Filed under Computing

Comments Off on Is Yahoo Really Back?

Yahoo has once again made the list as one of the world’s 100 most valuable brands.

The Internet company nabbed the 92nd spot in the annual list of global companies from multiple industries including technology, retail and service, released Tuesday by BrandZ, a brand equity database. The ranking gave Yahoo a “brand value” of US$9.83 billion, which is based on the opinions of current and potential users as well as actual financial data.

Apple occupied the number-one position on the list, with a brand value of $185 billion. Google was number two, with a value of roughly $114 billion.

The BrandZ ranking, commissioned by the advertising and marketing services group WPP, incorporates interviews with more than 2 million consumers globally about thousands of brands along with financial performance analysis to compile the list. Yahoo last appeared on the list in 2009 at number 81.

Yahoo’s inclusion on the 2013 list comes as the Internet company works to reinvent itself and win back users. Previously a formidable player in Silicon Valley, the company has struggled in recent years to compete against the likes of Google, Facebook and Twitter.

Improving its product offerings on mobile has been a focus. New mobile apps for email and weather have been unveiled, along with a new version of the main Yahoo app, featuring news summaries generated with technology the company acquired when it bought Summly.

Most notably, Monday the company announced it is acquiring the blogging site Tumblr for $1.1 billion in cash. Big changes to its Flickr photo sharing service were also announced.

Yahoo’s rebuilding efforts have picked up steam only during the last several months, but the 2013 BrandZ study was completed by March 1.

However, last July’s appointment of Marissa Mayer as CEO likely played a significant role in the company’s inclusion in the ranking, said Altimeter analyst Charlene Li. “Consumer perception has gone up since then,” she said.

“Yahoo’s leadership has a strong sense of what they want to do with the brand,” she added.

Yahoo’s 2012 total revenue was flat at $4.99 billion. However, after subtracting advertising fees and commissions paid to partners, net revenue was up 2 percent year-on-year.

Source

Will SoftBank Raise The Stakes?

May 16, 2013 by  
Filed under Smartphones

Comments Off on Will SoftBank Raise The Stakes?

SoftBank Corp President Masayoshi Son may get a less than enthusiastic reception when he comes to the United States this week to meet Sprint Nextel Corp’s major shareholders, as he tries to drum up support for the Japanese company’s proposed takeover of the No. 3 U.S. wireless service provider.

SoftBank’s billionaire founder, who proposed a $20 billion deal for a 70 percent stake in the U.S. wireless carrier, said on Tuesday that he would discuss the deal with shareholders in a bid to fight off rival Dish Network, a U.S. satellite TV provider, which offered Sprint a $25.5 billion bid.

The executive for the Japanese mobile operator may have a tough time selling the deal, as several shareholders have told Reuters that SoftBank would need to raise its bid in order to win their vote at Sprint’s June 12 shareholder meeting.

Two big Sprint shareholders, Paulson & Co and Omega Advisors, have publicly said the Dish offer looks better than SoftBank’s. Other shareholders said on Tuesday that they would go to meet Son during his trip but they were skeptical about his arguments against Dish.

While Dish’s offer would provide more cash upfront to shareholders, Son has argued that Dish would not be good for the company as it would require Sprint to take on a heavy debt load. He also promises a July 1 close for the deal and warned that Dish regulatory approval may not come until 2014.

Robert Lynch, the director of research for Westchester Capital Management, which owned over 14 million shares in Sprint at the end of December, said that the prospect of a quicker deal close would not be enough to win over his company’s vote.

“We think right now that Dish has a better offer on the table. We think SoftBank’s going to have to improve their offer,” Lynch said, noting that SoftBank’s comments about the prospective debt leverage from a Dish deal were overdone.

“We think the leverage is manageable. We think there are synergies here. While raising the leverage is something we looked at we think its not as big of a obstacle as SoftBank is saying,” Lynch said.

A big Sprint investor who asked not to be named said they were happy to meet with Son while he is in the United States but that they were hoping to convince him to raise his bid.

“If Mr. Son wants to own Sprint he will have to raise his bid,” said the person from a top 25 Sprint shareholder who did not want to be quoted by name ahead of the meeting.

Source

Adobe Reader Security Issue Found

May 8, 2013 by  
Filed under Security

Comments Off on Adobe Reader Security Issue Found

McAfee has discovered a vulnerability in Adobe’s Reader program that allows people to track the usage of a PDF file.

“Recently, we detected some unusual PDF samples,” McAfee’s Haifei Li said in a blog post. “After some investigation, we successfully identified that the samples are exploiting an unpatched security issue in every version of Adobe Reader.”

The affected versions of Adobe Reader also include the latest “sandboxed” Reader XI (11.0.2).

McAfee said that the issue is not a “serious problem” because it doesn’t enable code execution, however it does permit the sender to see when and where a PDF file has been opened.

This vulnerability could only be dangerous if hackers exploited it to collect sensitive information such as IP address, internet service provider (ISP), or even the victim’s computing routine to eventually launch an advanced persistent threat (APT).

McAfee said that it is unsure who is exploiting this issue or why, but have found the PDFs to be delivered by an “email tracking service” provider.

The vulnerability works when a specific PDF JavaScript API is called with the first parameter having a UNC-located resource.

“Adobe Reader will access that UNC resource. However, this action is normally blocked and creates a warning dialog,” Li said. “The danger is that if the second parameter is provided with a special value, it changes the API’s behavior. In this situation, if the UNC resource exists, we see the warning dialog.

“However, if the UNC resource does not exist, the warning dialog will not appear even though the TCP traffic has already gone.”

McAfee said that it has reported the issue to Adobe and is waiting for their confirmation and a future patch. Adobe wasn’t immediately available for comment at the time of writing.

“In addition, our analysis suggests that more information could be collected by calling various PDF Javascript APIs. For example, the document’s location on the system could be obtained by calling the Javascript “this.path” value,” Li added.

Source

« Previous PageNext Page »