Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Windows 10 Passes 20% User Share Mark

April 6, 2016 by  
Filed under Computing

Comments Off on Windows 10 Passes 20% User Share Mark

For the first time since its debut, Windows 10 accounted for more than one-fifth of the visits to sites tracked by the Digital Analytics Program (DAP), which mines traffic to more than 4,000 websites on over 400 different domains maintained by U.S. government agencies, such as the Internal Revenue Service and the National Weather Service.

The bulk of the visits to DAP websites originate in the U.S.

So far Windows 10 has recorded 20.2% of visits in March by Windows PCs, smartphones and tablets. That was a one-percentage point increase from February and more than two percentage points above January’s.

Although Microsoft irregularly trumpets the number of devices running Windows 10 — the last time was nearly three months ago — data from DAP and metrics vendors like Net Applications and StatCounter are the only publicly available sources for monitoring Windows 10 adoption.

But these external measurements are rough at best.

A case in point: Because overall traffic to DAP websites plummets on weekends — total visits by Windows devices on Saturday and Sunday are typically less than half that of a weekday — Windows 10 may be unrepresented, as more Windows PCs used during the work week are business machines, which predominantly run the corporate standard, Windows 7.

Microsoft has just over four months left to boost Windows 10 adoption by pushing the free upgrade to eligible Windows 7 and 8.1 devices. That deal is set to expire July 29, on the one-year anniversary of Windows 10′s launch.

Windows 10 adoption growth has slowed each month this year. At the pace of past three months, Windows 10 should account for approximately 26% of DAP’s traffic by the end of July. (Other data sources have repeatedly portrayed global adoption of Windows 10 at lower rates than in the U.S.)

Will that match whatever goal Microsoft set when it decided to give away upgrades? Microsoft’s not saying, and even if it did, there would be no way to verify any claim.

Source- http://www.thegurureview.net/computing-category/windows-10-passes-20-user-share-mark.htm

Symantec Has Some Flaws With SEP

April 1, 2016 by  
Filed under Computing

Comments Off on Symantec Has Some Flaws With SEP

Symantec has warned of three serious vulnerabilities in its Endpoint Protection (SEP) software, and is advising users to update their systems.

The bugs affect all builds of the 12.1 version of the SEP software, with the first two flaws allowing authorised but low privilege users of the software to gain elevated and administrative access to the management console, which can be accessed either locally or through a web-based portal.

The third bug is in the sysplant driver and enables users to bypass the SEP’s security controls and run malware and other malicious code on a targeted client machines.

“Exploitation attempts of this type generally use known methods of trust exploitation requiring enticing a currently authenticated user to access a malicious link or open a malicious document in a context such as a website or in an email,” said the security firm.

There have been no recorded exploits of the flaws, so it would appear that Symantec has squashed the bugs before they became a real-world problem for its customers.

The first two bugs were discovered by security researcher Anatoly Katyushin from rival firm Kaspersky Labs, which is a little embarrassing. Discovery of the third bug was credited to the enSilo Research Team.

Symantec advises SEP users to update their software to the 12.1 RU6 MP4 version. It also recommends that users should take precautions and restrict remote access to the management console in order to prevent hackers from attacking client systems through the web portal.

While hackers can direct sophisticated malware at even the most robustly secured systems, exploiting flaws in software offers an easier route into machines and networks, providing hackers get in before the bugs are discovered and patched.

Recent examples can be seen with the discovery of iOS malware which threatens iPhones through an Apple DRM flaw, and an error on Code.org’s website which saw the emails of its volunteers exposed.

Courtesy-TheInq

Intel Processors Will Support Vulcan API

March 31, 2016 by  
Filed under Computing

Comments Off on Intel Processors Will Support Vulcan API

Intel is releasing graphics drivers that support the Vulkan 1.0 API for chips running Windows 7, 8 and 10 PCs.

According to Intel the drivers provide beta support for the Vulkan 1.0 API for 6th Generation Intel Core and related processors.

Vulkan 1.0 was introduced last month by industry consortium Khronos Group and is supposed to replace the OpenGL, which was first introduced in 1991 by Silicon Graphics. Vulkan is supposed to exploit powerful GPUs and multicore CPUs, but it is still a long way behind Direct X 12 – at least in its beta condition.

With Intel’s drivers developers will be able to exploit features on Intel GPUs, like the Iris Pro, that are integrated in chips alongside CPUs. Intel’s rival AMD has already released Vulkan drivers for Radeon graphics processors.

Vulkan 1.0 APIs will also work with Linux-based PCs like Steam Machines. Intel has made available open-source Vulkan drivers for Linux PCs running on chips code-named Broadwell and Skylake.

Courtesy-Fud

Is nVidia Going Linux

March 29, 2016 by  
Filed under Computing

Comments Off on Is nVidia Going Linux

The dark satanic rumor mill has manufactured a hell on earth yarn claiming that Nvidia is working on its own Linux OS for gamers.

A slide has tipped up showing a screen capture of an installer screen for this operating system supposedly going by the “NLINUX” codename at NVIDIA.

Not much to go on, but it does appear that Nvidia is looking at creating a distribution for gamers similar to that operated by Valve.

It is hard to see what Nvidia would get out of it. Nvidia also has its SHIELD TV that’s powered by Tegra hardware and offers a variety of games over their cloud/streaming “GeForce NOW” service.

So why would Nvidia need a full-blown Linux distribution? The only place it could use one is on the desktop, but that would just mean bringing another Linux distribution into a crowded market with little return for its efforts.

Nvidia already has control of the Linux gaming systems and its cards do better on Linux than AMDs so an “optimized” Linux OS is not going to sell them more graphics cards for Linux gamers. It would have to add something which is better than Steam, or Ubuntu and what could that be?

Courtesy-Fud

Cisco Fixes Major Flaw

March 23, 2016 by  
Filed under Computing

Comments Off on Cisco Fixes Major Flaw

Cisco has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices which are popular among those distributed by ISPs to their customers.

The embedded Web server in the Cisco Cable Modem with Digital Voice models DPC2203 and EPC2203 contains a buffer overflow vulnerability that can be exploited remotely without authentication.  Apparently all you need to do is send a crafted HTTP requests to the Web server and you could see some arbitrary code execution.

Cisco said that its customers should contact their service providers to ensure that the software version installed on their devices includes the patch for this issue.

The Web-based administration interfaces of the Cisco DPC3941 Wireless Residential Gateway with Digital Voice and Cisco DPC3939B Wireless Residential Voice Gateway are affected by a vulnerability that could lead to information disclosure. An unauthenticated, remote attacker could exploit the flaw by sending a specially crafted HTTP request to an affected device in order to obtain sensitive information from it.

The Cisco Model DPQ3925 8×4 DOCSIS 3.0 Wireless Residential Gateway with EDVA is affected by a separate vulnerability, also triggered by malicious HTTP requests, that could lead to a denial-of-service attack.

Hackers have been hitting modems, routers and other gateway devices, hard lately – especially those distributed by ISPs to their customers. By compromising such devices, attackers can snoop on, hijack or disrupt network traffic or can attack other devices inside local networks.

Courtesy-Fud

GM Buys Cruise Automation

March 21, 2016 by  
Filed under Around The Net

Comments Off on GM Buys Cruise Automation

General Motors the acquisition Cruise Automation for Cruise’s deep software talent and rapid development capability — a move designed to further accelerate GM’s development of autonomous vehicle technology.

Over the past two months, GM has entered into a $500 million alliance with ride-sharing company Lyft; formed Maven — its personal mobility brand for car-sharing fleets in many U.S. cities — and established a separate unit for autonomous vehicle development.

“This acquisition announcement clearly shows that GM is serious about developing the technology and controlling its own path to self-driving and driverless vehicles,” said Egil Juliussen, research director for IHS Automotive.

While GM did not disclose the financial details of the Cruise acquisition, reports estimated the purchase to be in the $1 billion range.

Founded in 2013, Cruise sells an aftermarket product that is positioned as a highway autopilot, according to IHS Automotive.

Vehicles using Cruise’s software cannot automatically changes lanes, but the technology does work at low speed and highway speed, meaning it’s classified between Level 2 and Level 3 in the National Highway Traffic Safety Administration’s levels of autonomous driving.

The NHTSA’s Level 3 includes limited self-driving automation and allows a driver to cede full control of all safety-critical functions under certain traffic or environmental conditions; Level 4 indicates a fully autonomous vehicle.

Cruise’s software was initially offered by Audi in its A4 and S4 vehicles as a $10,000 option that required installation work by Cruise. The product consisted of a sensor unit on top of the car and a computer in the trunk.

GM’s purchase of Cruise is likely to spur other carmakers “to react and determine what their strategy should be,” Juliussen said.

Other carmakers are likely to seek to become partners with Google and license Google’s self-driving and driverless software technology. Multiple manufacturers are likely to opt for a Google partnership, IHS said.

Source- http://www.thegurureview.net/aroundnet-category/gm-announces-acquisition-of-cruise-automation.html

IBM Goes After Groupon

March 14, 2016 by  
Filed under Around The Net

Comments Off on IBM Goes After Groupon

IBM has filed suit against online deals marketplace Groupon for infringing four of its patents, including two that emerged from Prodigy, the online service launched by IBM and partners ahead of the World Wide Web.

Groupon has built its business model on the use of IBM’s patents, according to the complaint filed Wednesday in the federal court for the District of Delaware. “Despite IBM’s repeated attempts to negotiate, Groupon refuses to take a license, but continues to use IBM’s property,” according to the computing giant, which is asking the court to order Groupon to halt further infringement and pay damages.

IBM alleges that websites under Groupon’s control and its mobile applications use the technology claimed by the patents-in-suit for online local commerce marketplaces to connect merchants to consumers by offering goods and services at a discount.

About a year ago, IBM filed a similar lawsuit around the same patents against online travel company Priceline and three subsidiaries.

To develop the Prodigy online service that IBM launched with partners in the 1980s, the inventors of U.S. patents 5,796,967 and 7,072,849 developed new methods for presenting applications and advertisements in an interactive service that would take advantage of the computing power of each user’s PC and reduce demand on host servers, such as those used by Prodigy, IBM said in its complaint against Groupon.

“The inventors recognized that if applications were structured to be comprised of ‘objects’ of data and program code capable of being processed by a user’s PC, the Prodigy system would be more efficient than conventional systems,” it added.

Groupon is also accused of infringing U.S. Patent No.5,961,601, which was developed to find a better way of preserving state information in Internet communications, such as between an online merchant and a customer, according to IBM. Online merchants can use the state information to keep track of a client’s product and service selections while the client is shopping and then use that information when the client decides to make a purchase, something that stateless Internet communications protocols like HTTP cannot offer, it added.

Source- http://www.thegurureview.net/aroundnet-category/ibm-files-patent-infringement-lawsuit-against-groupon.html 

Will Intel Release It’s 10nm Processors By 2017?

March 2, 2016 by  
Filed under Computing

Comments Off on Will Intel Release It’s 10nm Processors By 2017?

Intel has said that a job advert which implied that it would not be using the 10nm process for two years was inaccurate and confirmed that it is on track for a 2017 release.

The advert, which was spotted by the Motley Fool has since been taken down, said the company’s 10-nanometer chip manufacturing technology would begin mass production “approximately two years” from the posting date.

Intel has said that the advert was wrong and confirmed that its “first 10-nanometer product is planned for the second half of 2017.”

It is not expected that Intel will roll out server chips in 2017. At the moment the plan appears to be introducing its second-generation 14-nanometer server chip family in early to mid-2017. But instead Intel will be trying to get its process ramped at high yields experimenting on the PC market so that 10-nanometer server processors will be ready for the first half of 2018.

This follows Intel’s traditional pattern of a having a few parts released as it experiments with the new tech. This is what happened in the first year of Intel’s 14-nanometer availability.

Courtesy-Fud

Is Microsoft A Risk?

February 29, 2016 by  
Filed under Security

Comments Off on Is Microsoft A Risk?

Hewlett Packard Enterprise (HPE) has cast a shade on what it believes to be the biggest risks facing enterprises, and included on that list is Microsoft.

We ain’t surprised, but it is quite a shocking and naked fact when you consider it. The naming and resulting shaming happens in the HPE Cyber Risk Report 2016, which HPE said “identifies the top security threats plaguing enterprises”.

Enterprises, it seems, have myriad problems, of which Microsoft is just one.

“In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown,” said Sue Barsamian, senior vice president and general manager for security products at HPE.

“We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organisation to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth.”

Microsoft earned its place in the enterprise nightmare probably because of its ubiquity. Applications, malware and vulnerabilities are a real problem, and it is Windows that provides the platform for this havoc.

“Software vulnerability exploitation continues to be a primary vector for attack, with mobile exploits gaining traction. Similar to 2014, the top 10 vulnerabilities exploited in 2015 were more than one-year-old, with 68 percent being three years old or more,” explained the report.

“In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications.”

It is not all bad news for Redmond, as the Google-operated Android is also put forward as a professional pain in the butt. So is iOS, before Apple users get any ideas.

“Malware has evolved from being simply disruptive to a revenue-generating activity for attackers. While the overall number of newly discovered malware samples declined 3.6 percent year over year, the attack targets shifted notably in line with evolving enterprise trends and focused heavily on monetisation,” added the firm.

“As the number of connected mobile devices expands, malware is diversifying to target the most popular mobile operating platforms. The number of Android threats, malware and potentially unwanted applications have grown to more than 10,000 new threats discovered daily, reaching a total year-over-year increase of 153 percent.

“Apple iOS represented the greatest growth rate with a malware sample increase of more than 230 percent.”

Courtesy-TheInq

iOS Developers Warned About Taking Shortcuts

February 10, 2016 by  
Filed under Computing

Comments Off on iOS Developers Warned About Taking Shortcuts

Slapdash developers have been advised not to use the open source JSPatch method of updating their wares because it is as vulnerable as a soft boiled egg, for various reasons.

It’s FireEye that is giving JSPatch the stink eye and providing the warning that it has rendered over 1,000 applications open to copy and paste theft of photos and other information. And it doesn’t end there.

FireEye’s report said that Remote Hot Patching may sound like a good idea at the time, but it really isn’t. It is so widely used that is has opened up a 1,220-wide iOS application hole in Apple users’ security. A better option, according to the security firm, is to stick with the Apple method, which should provide adequate and timely protection.

“Within the realm of Apple-provided technologies, the way to remediate this situation is to rebuild the application with updated code to fix the bug and submit the newly built app to the App Store for approval,” said FireEye.

“While the review process for updated apps often takes less time than the initial submission review, the process can still be time-consuming and unpredictable, and can cause loss of business if app fixes are not delivered in a timely and controlled manner.

“However, if the original app is embedded with the JSPatch engine, its behaviour can be changed according to the JavaScript code loaded at runtime. This JavaScript file is remotely controlled by the app developer. It is delivered to the app through network communication.”

Let’s not all make this JSPatch’s problem, because presumably it’s developers who are lacking.

FireEye spoke up for the open source security gear while looking down its nose at hackers. “JSPatch is a boon to iOS developers. In the right hands, it can be used to quickly and effectively deploy patches and code updates. But in a non-utopian world like ours, we need to assume that bad actors will leverage this technology for unintended purposes,” the firm said.

“Specifically, if an attacker is able to tamper with the content of a JavaScript file that is eventually loaded by the app, a range of attacks can be successfully performed against an App Store application.

Courteys-TheInq

« Previous PageNext Page »