Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Tablets Likely to Transmit Sensitive Data

March 15, 2011 by  
Filed under Around The Net

Comments Off on Tablets Likely to Transmit Sensitive Data

Forty-eight percent of U.S. tablet device owners have used them to transmit all kinds of sensitive data, according to a survey released recently by Harris Interactive and FuzeBox.

Considering the explosive increase in tablet computer adoption, this is not entirely shocking news, but it should give pause to business owners and IT professionals. Sometimes without the explicit blessing of the company, employees are increasingly using tablets to answer work email and conduct day-to-day business. Read More…

Google Employees May Get Xoom Tablets

March 4, 2011 by  
Filed under Around The Net

Comments Off on Google Employees May Get Xoom Tablets

Google employees may be getting new tablets, Motorola’s CEO said earlier in the week.

Speaking at a Morgan Stanley conference, Motorola CEO Sanjay Jha said it’s clear that his company’s focus on enterprise is paying off in that it is having conversations with companies wishing to buy tens of thousands of tablets. Motorola last week began offering its Xoom tablet, the first to run the Honeycomb version of Android, which was developed specifically for tablet devices.

When asked why those enterprises are choosing to go with an Android tablet rather than Apple’s iPad, Jha joked: “One of them is Google so I think I understand why that is.” Google may be more inclined to buy tablets running its own Android software rather than a device from competitor Apple. Read More…

YouTube Explodes

February 28, 2011 by  
Filed under Around The Net

Comments Off on YouTube Explodes

According to a study of over 16,000 mobile YouTube users conducted by Google, 75% of respondents said that mobile is their primary way of accessing YouTube. At first glance, that figure may come as no surprise – after all, how shocking is at that a survey of mobile users finds that they watch a lot of YouTube Mobile? However, it’s actually a rather telling number.

For some of us, watching YouTube on a mobile device is an additional way to watch video, not the primary way. But for a large majority of mobile video users, it’s completely the opposite.

The survey found that 70% of the respondents reported visiting YouTube Mobile at least once per day and, while there, 58% spent more than 20 minutes per visit. 38% even when as far as to report that they feel like YouTube Mobile is replacing their desktop video usage entirely.

As noted by the Google Mobile Ads blog post reporting this data, these figures aren’t really a surprise. It referenced a recent Nielsen survey that found that YouTube Mobile is the number one mobile video viewing site in the U.S., with more than 7.1 million uniques.

Of course, Google is revealing this news to pique the interests of mobile advertisers – the post mentions that advertisers can now buy a “daily roadblock” which allows them to own all available ad impressions for 24 hours. Those ads would run on the Search, Browse and Home pages of the mobile website.  Read More……

‘Ransomware’ Malware Threats Increasing

February 13, 2011 by  
Filed under Computing

Comments Off on ‘Ransomware’ Malware Threats Increasing

A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.

“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.

Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.

To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said.   Read More….

Microsoft Eyeing More Software For The iPad

February 2, 2011 by  
Filed under Around The Net

Comments Off on Microsoft Eyeing More Software For The iPad

The current rumor on the street is that Microsoft might be looking beyond the recently released OneNote for iPad. Insiders are saying Microsoft is closely monitoring the number of downloads of OneNote for iPad/iPhone/iPod Touch to perhaps gauge the possible interest in adding more productivity software for Apple iOS suite of products. Read More…..

« Previous Page