Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Can Intel Go Wireless?

July 17, 2014 by  
Filed under Uncategorized

Comments Off on Can Intel Go Wireless?

Intel wants to lead the drive into a less wired world by pushing standards, drive down the cost, and make these technologies ubiquitous.

At Computex, Intel demonstrated WiGig wireless docking and simultaneous wireless charging of a laptop, smartphone, headset and tablet with a pad placed under a tabletop. The company said that it would deliver reference designs for systems that use the technology in 2016 as part of a future Core processor family known as Skylake.

WiGig trades range for speed and operates in the 60GHz spectrum, compared with 2.4- and 5.0GHz for WiFi. It can transfer data at speeds of up to 7Gbps, compared to a maximum speed of a little more than 1Gbps for 802.11ac.

WiGig can be used to stream video from a mobile device to a TV or monitor, replacing HDMI and DisplayPort cables, but is being seen as a way of carrying out networking and wireless docking. It means that you can put your laptop on your desk and it automatically connects with your monitor, keyboard and mouse, printer and other peripherals without cables.

Intel plans to make its own WiGig chips. The outfit said it will have silicon for both transmitters and receivers in production by the end of this year, and available in products in the first half of 2015. Intel also wants to push Rezence for wireless charging.

Chipzilla has added that it will contribute some of its own IP to expand the standard to support wireless charging of laptops (which requires at least 20 watts) and that Rezence will be part of a Skylake reference design by 2016. This means that the world could be wirelessly networked soon after that.

Source

Is Malware Wreaking Havoc On XP?

July 14, 2014 by  
Filed under Computing

Comments Off on Is Malware Wreaking Havoc On XP?

One of the top three malware programs affecting businesses in the second quarter is a worm that takes advantage of the large number of companies still using Windows XP, Trend Micro has warned.

The worm, dubbed DOWNAD, also known as Conficker, can infect an entire network via a malicious URL, spam email, or removable drive. Windows XP is particularly susceptible to this threat because it is known to exploit the MS08-067 Server service vulnerability in order to execute arbitrary code.

DOWNAD also has its own domain generation algorithm (DGA) that allows it to create randomly-generated URLs. It then connects to these created URLs to download files to the system. Trend Micro said that around 175 IP addresses are found to be related to the DOWNAD worm and that these IP addresses use various ports and are randomly generated via the DGA capability of DOWNAD.

“During our monitoring of the spam landscape, we observed that in Q2, more than 40 percent of malware related spam mails are delivered by machines infected by DOWNAD worm,” said Trend Micro anti-spam research engineer Maria Manly in a blog post.

“A number of machines are still infected by this threat and leveraged to send the spammed messages to further increase the number of infected systems. And with Microsoft ending the support for Windows XP this year, we can expect that systems with this OS can be infected by threats like DOWNAD.”

The security company warned that spam campaigns delivering FAREIT, MYTOB, and LOVGATE payloads in email attachments are attributed to DOWNAD infected machines. FAREIT is a malware family of information stealers that download variants of the Zeus Trojan, while MYTOB is an old family of worms known for sending a copy of itself in spam attachments.

The other top sources of spam with malware are the CUTWAIL botnet, together with Gameover ZeuS (GoZ). Manly said CUTWAIL was actually previously used to download GoZ malware but now a malware called UPATRE employs GoZ malware or variants of ZBOT which have peer-to-peer functionality.

“In the last few weeks we have reported various spam runs that abused Dropbox links to host malware like UPATRE,” Manly said. “We also spotted a spammed message in the guise of voice mail that contains a Cryptolocker variant. The latest we have seen is a spam campaign with links that leveraged CUBBY, a file storage service, this time carrying a banking malware detected as TSPY_BANKER.WSTA.”

According to Manly, cybercriminals and threat actors are probably abusing file storage platforms to mask their malicious activities and go undetected in the system and network.

“As spam with malware attachment continues to proliferate, so is spam with links carrying malicious files. The continuous abuse of file hosting services to spread malware appears to have become a favoured infection vector of cyber criminals most likely because this makes it more effective given that the URLs are legitimate thereby increasing the chance of bypassing anti-spam filters,” she added.

Source

Oracle Takes A Fall

July 7, 2014 by  
Filed under Computing

Comments Off on Oracle Takes A Fall

Oracle posted fiscal fourth-quarter results that were just horrible for investors looking for more progress in web-based services, sending its shares lower.

The company had been expected to report a pickup in its software business and progress in cloud computing, shares of Oracle had gained 10 percent over the past three months. However yesterday it was clear that Oracle is getting a kicking from the competition like Salesforce.com and Workday which have been offering competitive software and Internet-based products at prices that often undercut Oracle.

Tech spending is likely to fall as more companies move to the cloud. Oracle has been rolling out its own cloud-based products but they remain under five percent of its overall revenue. For the fiscal first quarter, Oracle expects software and cloud revenue to grow between 6 percent and 8 percent. That forecast includes expectations for software- and platform-related cloud services to grow between 25 percent and 35 percent.

Oracle said it expects its hardware system revenue to be in a range of down 1 percent to up 3 percent.

For its latest fourth quarter, Oracle said overall revenue rose 3 percent to $11.3 billion. That was less than the $11.48 billion analysts had expected on average. Net income fell 4 percent to $3.6 billion.

Revenue from Oracle’s hardware systems products grew 2 percent to $870 million.

Source

Verizon Wants Dish’s Spectrum

July 3, 2014 by  
Filed under Around The Net

Comments Off on Verizon Wants Dish’s Spectrum

Verizon Communications Inc unit Verizon Wireless is in hot pursuit of satellite-TV operator Dish Network Corp’s spectrum to improve wireless internet speeds, the New York Post reported, citing sources familiar with the matter.

The two companies have held informal, early talks about the spectrum, the report said.

In May, Verizon Communications Chief Executive Lowell McAdam shot down rumors that the company was in potential merger talks with Dish.

Federal Communications Commission Chairman Tom Wheeler has proposed restrictions on how much the biggest wireless carriers can bid for in a major auction of TV spectrum scheduled for mid-2015.

A possible merger between Sprint Corp and T-Mobile US Inc could prompt U.S. regulators to rewrite rules they are now considering for the auction.

Source

Microsoft’s Killswitch Incoming

July 1, 2014 by  
Filed under Smartphones

Comments Off on Microsoft’s Killswitch Incoming

Responding to mounting  pressure, Google and Microsoft will follow Apple in adding an anti-theft “kill switch” to their smartphone operating systems.

The commitment comes at a time when new data shows a dramatic drop in theft of Apple iPhones and iPads after the September 2013 introduction of iOS 7, which included a kill-switch function that allows stolen devices to be remotely locked and deleted so they become useless.

In New York, iPhone theft was down 19 percent in the first five months of this year, which is almost double the 10 percent drop in overall robberies seen in the city. Over the same period, thefts of Samsung devices — which did not include a kill switch until one was introduced on Verizon-only models in April — rose by over 40 percent.

In San Francisco, robberies of iPhones were 38 percent lower in the six months after the iOS 7 introduction versus the six months before, while in London thefts over the same period were down by 24 percent. In both cities, robberies of Samsung devices increased.

“These statistics validate what we always knew to be true, that a technological solution has the potential to end the victimization of wireless consumers everywhere,” San Francisco District Attorney George Gascon told IDG News Service.

Gascon and New York State Attorney General Eric Schneiderman have been leading a push to get smartphone vendors and telecom carriers to include kill switches in their products as a way to curb phone theft.

The joint work had early success with Apple but other carriers and phone makers dragged their feet. However, resistance to the idea appears to be dropping as several bills that mandate kill switches make their way through state legislatures and the U.S. Congress.

The bills demand a function that would enable a phone owner to remotely delete and disable a phone if stolen. The function could be disabled by consumers before a theft takes place if desired, but crucially new handsets would be supplied with it switched on by default.

Source

BlackBerry And Amazon Team Up

June 30, 2014 by  
Filed under Smartphones

Comments Off on BlackBerry And Amazon Team Up

BlackBerry Ltd has agreed to a licensing deal with Amazon.com Inc that will let the Canadian smartphone maker offer some 240,000 Android applications from Amazon’s app store on its lineup of BlackBerry 10 devices this fall.

The move allows the Waterloo, Ontario-based company to add a vast array of consumer-focused apps to its devices, while at the same time directing its own efforts toward developing enterprise and productivity applications.

Customers who own smartphones powered by its BlackBerry 10 operating system will now be able to access popular Android apps such as Groupon, Netflix, Pinterest, Minecraft and Candy Crush Saga on their BlackBerry devices this fall. Google Inc makes Android, the mobile operating system used in more than a billion phones and tablets.

The apps will become available after the Canadian smartphone maker rolls out the upgraded BlackBerry 10.3 operating system, the company said.

The move is the latest by the smartphone pioneer to streamline its focus as it attempts to reinvent itself under new Chief Executive Officer John Chen as BlackBerry phones have lost ground to Apple Inc’s iPhone and Samsung Electronics Co Ltd’s Galaxy devices.

Analysts saw the move as a step in the right direction, but are not sure whether it will help turn the tide for BlackBerry.

“While this will widen the BB10 app ecosystem, the consumer

smartphone environment still remains challenging,” Wells Fargo analyst Maynard Um said in a note to clients.

Um views the announcement as a positive for BlackBerry, but said “whether it stems consumer churn remains to be seen.”

Chen wants to remain a competitor in the smartphone segment, but is focused on making BlackBerry a dominant force in machine-to-machine communications. The company’s QNX software already is a mainstay in the automotive industry, powering electronic and other systems in a wide range of cars.

BlackBerry already works with hundreds of large enterprise clients, including corporations and government agencies, to manage and secure mobile devices on their internal networks.

Chen intends to build on those ties and BlackBerry’s security credentials to let these enterprise clients build and customize in-house corporate and productivity applications for their employees.

Source

Can Malwarebytes Protect XP?

June 26, 2014 by  
Filed under Security

Comments Off on Can Malwarebytes Protect XP?

Malwarebytes has launched anti-exploit services to protect Windows users from hacking attacks on vulnerabilities in popular targets including Microsoft Office, Adobe software products and Java, a service which even offers protection for Windows XP users.

Consumer, Premium and Corporate versions of the service are available, and are designed to pre-emptively stop hackers from infecting Windows machines with malware.

“An exploit will typically first corrupt the memory of an application process, take control, then execute code,” said Malwarebytes director of special projects Pedro Bustamante.

“From the shell code it executes a payload that tells the exploit what to do and that in turn usually downloads malware from the internet and executes it. The final stage is usually where antivirus kicks in, when it’s being downloaded from the internet, and starts doing things like behavioural analysis to see if it’s malicious.

“We don’t care about that, what we do comes before then. We just look for exploit-like behaviour and block anything that looks like it at the shellcode or payload stages. We come into play before the malware even appears on the scene.”

The Consumer version of the anti-exploit service is free and offers basic browser and Java protection.

The Premium version costs $37.00  per user and adds Office and Adobe protection services as well as the ability to add custom shields to other internet-facing applications, like Messenger or Netflix.

The Corporate version costs$40.00 person user and offers complete anti-exploit protection and comes with Malwarebytes’ Anti-malware service and a toolkit for IT managers.

Bustamante explained that the technology is designed to help businesses and general web users defend against the new wave of exploit-based cyber attacks.

“Traditional security can’t deal with exploits. Every day we see people getting infected, even if they have the latest up-to-date antivirus readers, because of exploits,” he said. “This is why we care about the applications you run – Firefox, Chrome, Internet Explorer, Java, Acrobat [and Microsoft] Word, Excel [and] Powerpoint.”

Bustamante added that the service is doubly important for Windows XP users since Microsoft officially ceased support for the OS in April.

“We’re still seeing over 25 percent of our users running XP. For them this product is even more important,” he said.

“We see new zero-days if not every week, every month, and for XP users who are not getting any more patches from Microsoft this product will be essential.

“Every month Microsoft will be releasing security patches for newer versions of Windows. Every time Microsoft does this it’ll be a treasure map for hackers to find exploits on Windows XP.

“It’ll show them exactly where the vulnerabilities are, so every month will see an influx of new exploits targeting Windows XP.”

Source

Is Apple Now Copying Google

June 25, 2014 by  
Filed under Computing

Comments Off on Is Apple Now Copying Google

PC Advisor has been going through Apple’s latest iOS 8 operating system and is finding features which appear to be a direct lift from Google. Of course it has to say that Apple is being brilliant and original about stealing the ideas. After it points out that Apple did not invent the music player but it did steal it better than anyone else.

The top 5 iOS 8 features Apple stole from Android include:

Typing suggestions: Start typing and suggested words will appear letter by letter. Hit the correct word and you save the time it would have taken to type the while word and it is a pretty intelligent selection process.

Okay Google: Hotword detection is also the basis of the Google Now Launcher that shipped with the Nexus 5. As long as your phone is awake, saying ‘Okay Google’ wakes up the voice assistant. In iOS 8 Apple has added something similar in the guise of ‘Hey Siri’, the ability to immediately engage Siri simply via a voice command.

Third-party keyboards: Google has long given Android users the opportunity to explore the world outside its own platform. Apple is allowing the same thing on its system now.

Widgets: Widgets have always been part of Android and Apple finally is letting it happen. Of course Apple is not entirely prepared to let you have full control of your device’s desktop. iOS 8 widgets are small app extensions that take up a spot in the Notification Center. Not as good as Android but better than a poke in the eye with a short stick.

Useful notifications: Android has long allowed developers to add up to two action buttons to a notification. So when the message pops up telling you that you have a message you can reply right from the notification, the relevant app opening as required. Now Apple can do that.

While it is accepted that ideas are copied, at least until one of the sides turns into a Patent Troll, what is strange about Apple is that it markets itself as the innovation hub that others follow. It appears that if this was ever true it is not the case now.

Source

Will MasterCard Sell Big Data?

June 23, 2014 by  
Filed under Around The Net

Comments Off on Will MasterCard Sell Big Data?

MasterCard Inc, the world’s second-largest credit card association, sees business booming from selling data to retailers, banks and governments on spending patterns found in the payments it processes, a top executive told Reuters.

MasterCard, which handles payments for 2 billion cardholders and tens of millions of merchants, uses that information to generate real-time data on consumer trends, available more quickly that regular government statistics.

“It is an incredibly fast growing area for us,” Ann Cairns, who heads MasterCard’s business outside North America, said in an interview, stressing that the company respects cardholder privacy, using anonymous data rather than personal information.

MasterCard does not give figures for its information services products but “other revenues”, which include the sale of data, grew 22 percent in the first quarter of 2014 to $341 million, outpacing the growth of total revenue dominated by payments processing, which rose 14 percent to $2.177 billion.

Cairns said clients for the data include retailers, banks and governments, with MasterCard tailoring it to their needs.

“Retailers are fantastic at using the data they have available about how people shop in their store, how their inventory turns over, but what they don’t know is what happens outside their store,” she said. “The data we’ve got is ubiquitous across the whole market. We can help retailers see what they need to do to capture more sales.”

Cairns, 57, a statistician by training who joined MasterCard in 2011 after helping manage the disposal of Lehman Brothers assets in Europe, revels in the insights real-time card data can provide, such as London’s popularity as the world’s top travel destination and a rise in spending on experiences such as eating out or going on holiday rather than shopping in stores.

MasterCard has recorded a spike in spending in Brazil on groceries and a drop in spending on luxury goods as the price of food has risen ahead of the World Cup, she said, the kind of insight valued by companies such as Nike and Adidas that are hoping to sell $300 soccer boots during the competition.

While MasterCard expands in “big data”, Cairns sees no slowdown in its traditional business of processing payments, with plenty of potential for growth as 85 percent of consumer transactions are still made by cash or check.

“Moving money and doing it safely and securely is so deeply cared about by so many people around the world that it will be a business that has fantastic value now and for years to come,” said Cairns, who previously worked at Citigroup and ABN Amro.

Source

Hackers Going After Traffic Signs

June 20, 2014 by  
Filed under Security

Comments Off on Hackers Going After Traffic Signs

After hackers played several high-profile pranks with traffic signs, including warning San Francisco drivers of a Godzilla attack, the U.S. government advised operators of electronic highway signs to take “defensive measures” to better secure their property.

Last month, signs on San Francisco’s Van Ness Ave were photographed flashing “Godzilla Attack! Turn Back” and highway signs across North Carolina were tampered with last week to read “Hack by Sun Hacker.”

The Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, this week advised cities, highway operators and other customers of digital-sign maker Daktronics Inc to take “defensive measures” to minimize the possibility of similar attacks.

It said that information had been posted on the Internet advising hackers how to access those systems using default passwords coded into the company’s software. “ICS-CERT recommends entities review sign messaging, update access credentials and harden communication paths to the signs,” the agency said in an alert posted on Thursday.

Jody Huntimer, a representative for Daktronics, declined to say if the recent attacks involved the bug reported by ICS-CERT.

“We are working with the ICS-CERT team to clarify the current alert and will release a statement once we have assessed the situation and developed customer recommendations,” Huntimer said via email.

Krebs on Security, a widely read security blog, posted a confidential report from the Center for Internet Strategy, or CIS, which was sent to state security officials. It warned that the pranks created a public safety risk because drivers often slow or stop to view the signs and take pictures.

CIS also predicated that amateur hackers might attempt to hack into other systems in the coming weeks following the May 27 release of “Watch Dogs,” a video game from Ubisoft focused on hacking critical infrastructure.

Source

« Previous PageNext Page »