Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

1 In 5 U.S. PCs Have No Antivirus Protection

June 8, 2012 by  
Filed under Computing

Comments Off on 1 In 5 U.S. PCs Have No Antivirus Protection

Nearly a fifth of Windows PCs in the U.S. lack any active security protection, an antivirus vendor stated on Wednesday, citing numbers from a year-long project.

“The scale of this is unprecedented,” argued Gary Davis, the director of global consumer product marketing for McAfee, talking about the scope of his company’s sampling of PC security.

McAfee took measurements from scans of more than 280 million PCs over the last 12 months, and found that 19.3% of all U.S. Windows computers browsed the Web sans security software. Owners of those systems downloaded and used McAfee’s free Security Scan Plus, a tool that checks for antivirus programs and enabled firewalls.

Globally, the average rate was 17%, putting the U.S. in the top 5 most-unprotected countries of the 24 represented in the scans.

Of the unprotected PCs in the U.S., 63% had no security software at all, while the remaining 37% had an AV program that was no longer active. The latter were likely trial versions of commercial antivirus software that had expired.

Antivirus trials are a fact of life in the Windows world. Most new machines come with security software that runs for a limited time. Some new Dell PCs, for example, come with a 30-day trial of McAfee’s Security Center program.

Source…

Adata Outs 40MB/s UHS microSD Card

June 7, 2012 by  
Filed under Computing

Comments Off on Adata Outs 40MB/s UHS microSD Card

Adata has launched a 32GB UHS-1 microSD card offering 40MB/s write bandwidth.

Adata, which recently has been making a big push in the solid-state disk (SSD) drive market, has announced its first microSD cards that support the UHS-1 specification. The firm’s Premier Pro cards come in 8GB, 16GB and 32GB capacities with the firm citing read bandwidth of 45MB/s and all important write bandwidth of 40MB/s.

The SD Card Association defined the UHS-I specification as part of its SD Version 3.01 standard, and while Adata’s new cards boast impressive speeds there is a lot of headroom left, with UHS-1 supporting bandwidths up to 104MB/s. Adata’s cards, roughly translated to the ‘X’ speed rating used on a number of memory cards, come out at 266X.

Ray Chu, product manager at Adata said, “These cards have the best read and write performance among all comparable products offered by the industry’s key players. When that is combined with the aggressive pricing options in store for this line, the result is going to be a bonanza for our customers worldwide.”

Source…

Powerful “Flame” Virus Found In Iran

June 4, 2012 by  
Filed under Computing

Comments Off on Powerful “Flame” Virus Found In Iran

Security experts have uncovered a highly sophisticated computer virus in Iran and other Middle Eastern states that they believe was deployed at least five years ago to engage in state-sponsored cyber espionage.

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that claimed responsibility for discovering the virus.

Kaspersky researchers said on Monday they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Iran has accused the United States and Israel of deploying Stuxnet.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

A cyber security agency in Iran said on its English website that Flame bore a “close relation” to Stuxnet, the notorious computer worm that attacked that country’s nuclear program in 2010 and is the first publicly known example of a cyber weapon.

Iran’s National Computer Emergency Response Team also said Flame might be linked to recent cyber attacks that officials in Tehran have said were responsible for massive data losses on some Iranian computer systems.

Source…

SecureID CRACKED?

May 31, 2012 by  
Filed under Around The Net

Comments Off on SecureID CRACKED?

An analyst has come up with a technique that clones the secret software token that RSA’s SecurID uses to generate one-time passwords.

Sensepost senior security analyst Behrang Fouladi said that the discovery has important implications for the safekeeping of the tokens. Fouladi demonstrated another way determined attackers could circumvent protections built into SecurID. By reverse engineering software used to manage the cryptographic software tokens on computers running Windows, he found that the secret “seed” was easy for people with control over the machines to locate and copy. He provided step-by-step instructions for others to follow in order to demonstrate how easy it is to create clones that mimic verbatim the output of a targeted SecurID token.

Source…

Seagate Gobbles Up Lacie

May 30, 2012 by  
Filed under Computing

Comments Off on Seagate Gobbles Up Lacie

Seagate has signed a deal to buy consumer storage vendor Lacie that values the firm at $186m.

Seagate, which recently completed the acquisition of Samsung’s hard disk unit and swiftly cut warranties on most of its drives to just one year, has now announced that it will buy hard drive packager Lacie. Seagate has signed an agreement with Philippe Spruch, Lacie’s chairman and CEO, to purchase his 63.5 percent stake in the company at $7.05 per share in cash, which values the firm at $186m.

According to Seagate the purchase should help the firm grow in Europe and Japan. The firm also announced that Spruch will be employed by Seagate and run its consumer products division.

Steve Luczo, Seagate chairman, CEO and president said, “Lacie has built an exceptional consumer brand by delivering exciting and innovative high end products for many years. This transaction would bring a highly complementary set of capabilities to Seagate, significantly expand our consumer product offerings, add a premium branded direct attached storage line, strengthen our network-attached storage business line and enhance our capabilities in software development.”

Lacie’s fancy portable hard drives are popular among those who like fancy cases wrapped around bog-standard consumer hard disks. Seagate’s purchase of Lacie should see the firm not only become the sole supplier of hard drives in Lacie products but make a renewed push in the consumer portable hard drive market following last year’s floods in Thailand that affected the three big hard drive manufacturers.

Seagate said the deal should be completed by the third quarter of 2012 pending regulatory approval in the US, France and Germany.

.

Source…

Is B.Y.O.D Proving To Be A Headache?

May 29, 2012 by  
Filed under Around The Net

Comments Off on Is B.Y.O.D Proving To Be A Headache?

IT managers trying to cope with the growing bring-your-own-device (BYOD) trend can expect to see an explosion in the number of smartphones and tablets used by employees in the next few years.

As a result, IT shops won’t be able to provide the security necessary to protect company data, says Gartner analyst Ken Dulaney.

“The number of devices coming in the next few years will outstrip IT’s ability to keep the enterprise secure,” he said, adding that IT workers are “going crazy” and “get into fights” over whether users should have upgrades.

To help IT cope, software vendors should create what Dulaney called “beneficial viruses” that could be embedded in corporate data carried on mobile devices. These software tools would require users to have licenses in order to access files, just as digital rights management technology does with music and video files.

Beneficial viruses would also “be smart enough” to delete the sensitive data if a device is lost or stolen, or if data winds up on an unauthorized device, Dulaney said, adding, “It’s time for the SAPs and Oracles to begin thinking about doing that, and it’s a lot harder than we think.”

Today, IT shops use mobile device management software to monitor which mobile users are authorized to access applications and whether they can access the data outside the corporate cloud.

Source…

Google Tweaks It’s Search Engine

May 24, 2012 by  
Filed under Around The Net

Comments Off on Google Tweaks It’s Search Engine

Google is changing the way it handles searches in the United States to give users quick access to answers without leaving the page, the company said.

The new search process is based on what Google calls the “knowledge graph” — meaning that it tries to pinpoint faster the context surrounding its users’ keyword searches.

“Over the years, as search has improved, people expect more,” said Amit Singhal, vice president of engineering at Google and the head of search, in an interview. “We see this as the next big improvement in search relevance.”

The redesign, which for now affects only U.S.-based English language users, is gradually being rolled starting Wednesday on desktop, mobile and tablet platforms. Google plans to eventually expand the new search features outside the U.S., Singhal said, without specifying when.

Many of the results will carry more graphical elements, compared to standard lists of search results, such as maps and pictures of related results, often in separate pop-ups. The idea is to let users easily discover what related material interests them and click through to it, Singhal said.

Source…

Twitter Wants To Email You

May 23, 2012 by  
Filed under Around The Net

Comments Off on Twitter Wants To Email You

Twitter will begin delivering a weekly email digest to highlight for users of the micro-blogging site the tweets they are most likely to be interested in, the company stated on Monday.

The feature marks a departure for a social network that typically emphasizes real-time delivery of information.

How will Twitter determine which tweets a user may want to see? Twitter spokesman Robert Weeks said the digest will feature the tweets that the “people you’re connected to on Twitter are engaging with the most.”

From the email digest, users will be able to see the conversation about a particular tweet, follow shared links and send out their own tweets. The digest will include tweets not just from a user’s own feed but also from the feeds of people he or she follows.

Source…

AMD Officially Launches Trinity Mobile

May 22, 2012 by  
Filed under Computing

Comments Off on AMD Officially Launches Trinity Mobile

AMD has finally and officially lifted an NDA veil off its mobile Trinity A-series APU lineup based on the 2nd-gen Bulldozer CPU core, aka Piledriver, and VLIW4 Northern Islands GPU squeezed together on a 32nm SOI die.

Architecture-wise, AMD’s Trinity combines two to four Piledriver x86 cores combined with up to 384 VLIW4 Radeon cores on a 32nm die which ends up as a 246mm2 chip with 1.303B transistors, slightly more than Llano’s 228mm2/1.178B. Since it is made in the same 32nm manufacturing process as Llano, the greatest win for Trinity are actual CPU and GPU performance improvements as well as impressive power consumption improvements when compared to Llano APUs.

Same as the FX-series desktop parts based on the Bulldozer architecture, AMD’s Trinity CPU part has a 2+1 integer/floating point design where you get two integer cores that share a single floating point scheduler. Although it appears to the OS as two cores, each Piledriver module actually has less resources than traditional core design. But with Piledriver, those Bulldozer kinks got ironed out as much as possible, improving IPC (instruction per cycle), reducing leakage, reducing CAC and giving it a slight frequency uplift.

As far as the GPU is concerned, we are looking at quite familiar Northern Islands VLIW4 part, a same one that was behind Cayman Radeon HD 6970 graphics card. Of course, the GPU has been cut down to up to 384 stream processors (organized in 6 SIMDs) with 24 texture units and 8 ROPs. The clocks have also gone down to 497MHz base clock that can “turbo” up to 686MHz.

Source…

Will Window 8 Tablets Launch In November?

May 21, 2012 by  
Filed under Computing

Comments Off on Will Window 8 Tablets Launch In November?

The first Windows 8 tablets should hit retail sometime in November and we could see a bunch of devices in different form factors.

According to CNET’s Brooke Crothers, the first wave of Windows tablets will include more than a dozen devices, but more than half of them will be hybrid designs. So, it seems Microsoft and vendors are betting on traditional keyboards to set Windows tablets apart from the competition.

The new tablets will be based on Intel’s dual-core Clover Trail Atoms, but bear in mind that Microsoft will also release Windows for ARM chips and AMD could also enter the fray with some low-voltage APUs.

Source…

« Previous PageNext Page »