Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Lenovo To Launch LePad Tablet In June

February 18, 2011 by  
Filed under Around The Net

Comments Off on Lenovo To Launch LePad Tablet In June

In what appears to be the year of the tablet, Chinese PC maker Lenovo announced plans to sell its LePad tablet worldwide in June, but will first launch the device in China at the end of March, a company spokesman said on today.

The LePad, Lenovo’s first tablet computer, was unveiled in January during the Consumer Electronics Show in Las Vegas. The device is built with 10.1-inch screen that runs the Android 2.2 OS on a 1.2GHz Qualcomm Snapdragon processor. (See a video report on LePad’s CES unveiling on YouTube.)

Lenovo said the device would be priced between $399 and $449. But at the time, the company was still unsure whether it would sell the product outside of China.

While Lenovo now plans on selling the tablet overseas, company spokesman Jay Chen couldn’t say which markets will be targeted.  Read More…

80% Of Browsers Found To Be At Risk Of Attack

February 17, 2011 by  
Filed under Internet

Comments Off on 80% Of Browsers Found To Be At Risk Of Attack

About eight out of every ten internet browsers run by consumers are vulnerable to attack by exploits of already-patched bugs, a security expert said today.

The poor state of browser patching stunned Wolfgang Kandek, CTO of security risk and compliance management provider Qualys, which presented data from the company’s free BrowserCheck service Wednesday at the RSA Conference in San Francisco.

“I really thought it would be lower,” said Kandek of the nearly 80% of browsers that lacked one or more patches.

BrowserCheck scans Windows, Mac and Linux machines for vulnerable browsers, as well as up to 18 browser plug-ins, including Adobe’s Flash and Reader, Oracle’s Java and Microsoft’s Silverlight and Windows Media Player.

When browsers and their plug-ins are tabulated together, between 90% and 65% of all consumer systems scanned with BrowserCheck since June 2010 reported at least one out-of-date component, depending on the month. In January 2011, about 80% of the machines were vulnerable.  Read more….

nVidia Goes Quad-Core With Tegra

February 16, 2011 by  
Filed under Computing

Comments Off on nVidia Goes Quad-Core With Tegra

Nvidia finally debuted its first quad-core Tegra processor, codenamed Kal-El, and the new chip will probably lead to much more powerful tablets and high-end smartphones.
 
 Nvidia’s Senior VP Phil Carmak of Mobile Business announced that the new processor will deliver a five-fold graphics performance increase over the current Tegra 2 dual-core. The chip is supposedly capable of driving 2560×1600 displays.  It is thought that the new chip could power much more serious products than current tablets.

“You’ll have full photo editing, video editing, writing of documents, browsing the Web, all sorts of stuff,” Phil Carmak announced. Read more….

Intel’s B3 Sandy Bridge To Ship Today

February 14, 2011 by  
Filed under Computing

Comments Off on Intel’s B3 Sandy Bridge To Ship Today

Intel has stated that they intend to start shipping their B3 stepping 6-Series chipset chips by February 14th (today). If you missed the headlines on this fiasco, I am speaking in reference to Intel’s chipset that is plagued by the now quite famous SATA 3Gbps bug.

Intel is still sticking to its original announcement that it will ship these products by the end of February. The new stepping has several updates including the change of revision ID from 04h to 05h, BIOS update to 1.1.4 and minor metal layer change improving lifetime wear and tear with no changes to functionality or design specifications (the one that fixes SATA 3.0Gbps issue).  Read more…

‘Ransomware’ Malware Threats Increasing

February 13, 2011 by  
Filed under Computing

Comments Off on ‘Ransomware’ Malware Threats Increasing

A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.

“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.

Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.

To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said.   Read More….

Conflicker Worm Still Wreaking Havoc

February 13, 2011 by  
Filed under Computing

Comments Off on Conflicker Worm Still Wreaking Havoc

Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.

Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers.  The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software.  Read more….

Mobile Phone Security Threats On The Rise

February 11, 2011 by  
Filed under Smartphones

Comments Off on Mobile Phone Security Threats On The Rise

Mobile phone security threats rose sharply last year as the growing popularity of Internet-enabled mobile devices like smartphones and tablets provided new opportunities for cybercriminals, security software maker McAfee said.

In its fourth-quarter threat report, released on today, McAfee said the number of pieces of new cellphone malware it found in 2010 rose 46 percent over 2009’s level.

“As more users access the Internet from an ever-expanding pool of devices -computer, tablet, smartphone or Internet TV- web-based threats will continue to grow in size and sophistication,” it said.

McAfee, which is being acquired by Intel for $7.68 billion, said it expected PDF and Flash maker Adobe to remain a favorite of cybercriminals this year, after it surpassed Microsoft  in popularity as a target in 2010.

It attributed the trend to Adobe’s greater popularity in mobile devices and non-Microsoft environments, coupled with the ongoing widespread use of PDF document files to transfer malware.  Read More….

Windows 7 Service Pack 1 Coming February 22nd

February 10, 2011 by  
Filed under Computing

Comments Off on Windows 7 Service Pack 1 Coming February 22nd

According to sources Microsoft will release the first service pack update for Windows 7 on February 22nd. The service pack has reached the RTM stage and sent to OEMs earlier this week.

The service pack is said to be a hefty 1.2GB download will feature all prior updates and fixes and Microsoft stated the update will improve networking, security and mobility.   Read More….

Benefits of Cloud Computing

February 3, 2011 by  
Filed under Internet

Comments Off on Benefits of Cloud Computing

In a nutshell Cloud Computing is the process of having on-demand hosted computing services provided outside your own network environment through a vendor’s Public or Private Data Center. Cloud Computing can be broken into three distinct categories. They are SaaS (Software as a Service), IaaS (Infrastructure as a Service), and PaaS (Platform as a Service).

Even though the concepts of Cloud Computing have been around for years, it still remains in its infancy. However, its adoption rate has been rather explosive lately, due in part to its seamlessness and ease of information integration.Cloud Computing has many benefits for medium and small businesses by way of collaboration and Productivity. For instance users will have the ability to work on the same projects in real-time from any location whether it’s the office, at home or an overseas location, at any time. The office never closes.

Another reason Cloud Computing has become so enticing is businesses can cut expenses on hardware and IT staffing to support the very same services as if they were on-site (Break/Fix issues are resolved by the vendor and the customer is never aware since services are redundant). Security is also enhanced because leading vendors adhere to higher levels of security features that are cost prohibitive to most medium and small businesses. In these days of high profile data breaches added security is must have.

Businesses should also consider their IT teams will not have a steep learning curve adapting to Cloud based services, since most user environment applications are similar in design to those they are accustomed to using today. Another added convenience is that Cloud Computing rids businesses of the old and costly software licensing requirement for every application/user. Cloud Computing allows the business to buy services on a time/usage metric.

If your business is looking to stay agile and save money, Cloud Computing may be the right direction to move.

Microsoft Eyeing More Software For The iPad

February 2, 2011 by  
Filed under Around The Net

Comments Off on Microsoft Eyeing More Software For The iPad

The current rumor on the street is that Microsoft might be looking beyond the recently released OneNote for iPad. Insiders are saying Microsoft is closely monitoring the number of downloads of OneNote for iPad/iPhone/iPod Touch to perhaps gauge the possible interest in adding more productivity software for Apple iOS suite of products. Read More…..

« Previous PageNext Page »