Intel’s Security Exec Jumps Ship
Michael Fey has left Intel Security Group to become chief operating officer at Blue Coat. Blue Coat is apparently not the traditional garb of a British Holiday Camp entertainer, but apparently a privately owned network security company.
Fey was one of the few top McAfee managers to stay with the company after it was bought by Intel in 2011. McAfee is now part of Intel Security Group, where Fey had been chief technology officer. Fey said that his role at Blue Coat would be “very similar” to his old job but he was allowed to focus on the cloud and the advanced threats space more.
“Blue Coat had tremendous growth behind the scenes and now I get to focus on taking that growth and trying to get it to the billion-dollar revenue mark,” he told Reuters.
Since the $7.7 billion acquisition by Intel, McAfee has lost senior managers and key talent in technology development, research and sales. At Blue Coat, Fey will replace David Murphy, who will stay on as a strategic adviser to the board.
Twitter To Track Mobile Users
December 11, 2014 by admin
Filed under Around The Net
Comments Off on Twitter To Track Mobile Users
Twitter Inc has plans to start tracking what third-party apps are installed on users’ mobile devices so the social media company can deliver more tailored content, including ads, the company has revealed.
The feature, called “app graph,” will allow the company to see what other applications users may have installed on phones or other devices.
“To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in,” the company said on its site.
The posting also included instructions on how to turn the feature off. Twitter is not collecting data from within the applications, the posting noted.
Twitter, whose main service allows users to broadcast 140-character messages, has been searching for ways to re-invigorate user engagement and drive growth. As part of that effort, the company is considering creating additional mobile applications beyond its core messaging service.
McAfee’s Biometric Software Coming Soon
Comments Off on McAfee’s Biometric Software Coming Soon
A McAfee security product that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.
“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.
Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.
An average user has about 18 passwords and biometric authentication will make PCs easier to use, Skaugen said.
Biometric authentication isn’t new. It’s being used in Apple Pay, where fingerprint authentication helps authorize credit card payments through the iPhone or iPad. Intel has been working on multiple forms of biometric authentication through fingerprint, gesture, face and voice recognition.
McAfee is owned by Intel, and the chip maker is building smartphone, tablet and PC technology that takes advantage of the security software. Intel has also worked on biometric technology for wearable devices like SMS Audio’s BioSport In-Ear Headphones, which can measure a person’s heart rate.
Intel also wants to make PCs and tablets easier to use through wireless charging, display, docking and data transfers. Such capabilities would eliminate the need to carry power brick and cables for displays and data transfers. Such capabilities will start appearing in laptops next year with sixth-generation Core chips code-named Skylake, which will be released in the second half.
Office 365 Goes Video Streaming
December 3, 2014 by admin
Filed under Around The Net
Comments Off on Office 365 Goes Video Streaming
Microsoft unveiled Office 365 Video, a YouTube-like streaming service where enterprises and large organizations can post in-house video content for communication and training.
“Office 365 Video provides organizations with a secure, company-wide destination for posting, sharing and discovering video content,” said Mark Kashman, a senior product manager with the Office 365 team, in a blog posting.
Kashman touted Video as a tool for internal communications, citing the examples of new-employee orientation, management messaging and worker training. Employees will also be able to contribute to a “Community” section, though most companies will probably frown on cat antic clips.
The service rolls out over the next few days to companies that have registered for Office 365′s First Release early distribution program, then through early 2015 to others.
Video will be available only to subscribers of Office 365′s plans for enterprises — E1 through E4 — and universities (A2 through A4). It will not be offered to consumer subscribers or firms with small business-oriented plans like Business Essentials, Business and Business Premium.
Kashman also said Office 365 plans for government agencies will get Video at some point, but he did not proffer a timeline.
The other requirement is SharePoint Online, an off-premises component of the enterprise and academic plans, but missing from the increasingly popular Office 365 ProPlus, the rent-not-buy plan used by organizations that have decided to retain their back-end services, like SharePoint and Exchange, on premises.
Although Office 365 Video has elements of consumer streaming services like Google’s YouTube, it’s strictly an in-house affair: It will be available only to employees, and then only those whom IT administrators have assigned access rights.
Can Qualcomm Comptete With Intel?
Qualcomm has confirmed that it will branch out from offering its Snapdragon mobile chips and will soon launch a line of server processors.
The firm’s CEO, Steve Mollenkopf, has remained tight lipped about the plans so far but, according to The Wall Street Journal, said during a meeting with financial analysts in New York on Wednesday that the company is working on chips for the data centre.
There’s no timing yet, either, although Mollenkopf said that his firm is currently “engaged with customers”.
Qualcomm is already the world leader in ARM chips for smartphones, and we assume that the company will develop server chips based on ARM’s 64-bit ARMv8-A architecture as rivals such as AMD have done.
The move will place Qualcomm in competition with chip giant Intel, which is currently one of the biggest server chip makers.
Qualcomm announced last month that it had acquired Cambridge-based chipmaker CSR for a hefty $2.5bn (£1.6bn), as the company looks to push further into the Internet of Things (IoT).
The buyout, which comes two months after CSR rejected a takeover bid from Microchip Technology, will see Qualcomm using the British company to push further into the IoT, automotive and mobile communications markets.
CSR rejected an initial bid from Microchip, but reports claim that the firm has until 5pm UK time today to make a better offer.
However, CSR’s board of directors has unanimously accepted Qualcomm’s offer of 900p a share. The closing price at the time of the offer was 660p.
Should Encryption Be The Norm?
Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.
The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.
It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.
“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”
The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.
The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.
However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.
These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.
New Malware Targeting Apple Devices
Comments Off on New Malware Targeting Apple Devices
Palo Alto Networks Inc has uncovered a new group of malware that can infect Apple Inc’s desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.
The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.
Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.
The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.
It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.
But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.
Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.
Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.
Adobe Eases Privacy Concerns
November 14, 2014 by admin
Filed under Around The Net
Comments Off on Adobe Eases Privacy Concerns
Tests on the latest version of Adobe System’s e-reader software reveals the company is now collecting less data following a privacy-related row last month, according to the Electronic Frontier Foundation.
Digital Editions version 4.0.1 appears to only collect data on e-books that have DRM (Digital Rights Management), wrote Cooper Quintin, a staff technologist with the EFF. DRM places restrictions on how content can be used with the intent of thwarting piracy.
Adobe was criticized in early October after it was discovered Digital Editions collected metadata about e-books on a device, even if the e-books did not have DRM. Those logs were also sent to Adobe in plain text.
Since that data was not encrypted, critics including the EFF contended it posed major privacy risks for users. For example, plain text content could be intercepted by an interloper from a user who is on the same public Wi-Fi network.
Adobe said on Oct. 23 it fixed the issues in 4.0.1, saying it would not collect data on e-books without DRM and encrypt data that is transmitted back to the company.
Quintin wrote the EFF’s latest test showed the “only time we saw data going back to an Adobe server was when an e-book with DRM was opened for the first time. This data is most likely being sent back for DRM verification purposes, and it is being sent over HTTPS.”
If an e-book has DRM, Adobe may record how long a person reads it or the percentage of the content that is read, which is used for “metered” pricing models.
Other technical metrics are also collected, such as the IP address of the device downloading a book, a unique ID assigned to the specific applications being used at the time and a unique ID for the device, according to Adobe.
MDM Coming To Office 365
November 10, 2014 by admin
Filed under Smartphones
Comments Off on MDM Coming To Office 365
Microsoft will rollout mobile device management (MDM) capabilities to Office 365 in 2015, making it easier for firms to manage corporate data across a range of mobile devices, including those running iOS and Android as well as Windows.
Microsoft unveiled the updates coming to its Office 365 cloud-delivered productivity suite in 2015 at its TechEd Europe conference.
These will enable customers to apply security policies against devices that connect to Office 365 to ensure that email and documents can be accessed only by approved devices, plus the ability to remotely wipe Office 365 data if necessary.
Julia White, Microsoft general manager for Office 365, said that the updates will enable customers to offer “conditional access” to Office documents and email, such as ensuring that any device used by employees has not been jailbroken or rooted, which could potentially pose a security risk.
Administrators will be able to set policies directly from the Office 365 administration portal, and enforce the use of a Pin to secure access to the device. Any wipe of Office 365 content will not affect the user’s personal data, White added.
These MDM features coming to Office 365 are actually powered by Microsoft’s Intune cloud-based management service and are a subset of Intune’s capabilities, the firm disclosed.
Intune itself is also getting some upgrades that will enable customers to benefit from additional security features if they also subscribe to Intune.
These will include data leak prevention measures that enable policies to be applied against managed applications, preventing users from copying and pasting data from an Office 365 app to another, for example, or copying files from Office 365 to elsewhere on the device.
While these capabilities are built in to Office 365, Microsoft will also enable this to be extended to other applications using Intune app wrapper functionality, White said.
White also confirmed that Microsoft is working on an Android version of the Office for iPad suite of mobile productivity tools that the firm announced for Apple’s tablet platform earlier this year.
Microsoft’s Office announcement comes amid speculation that the firm will release Office for Android next month.
Qualcomm’s Snapdragon Goes WiGi
he WiGig standard has been around since 2009, but we haven’t really seen it hitting that many retail devices. Back at IDF 2014, Intel demonstrated WiGig 802.11ad video, peripherals, 4K video transfer and it promised that Skylake based laptops will come out of the box with the technology.
WiGig will let you transfer up to 7Gbpps of audio, video or data via 2.4, 5 or 6GHz bands and is as fast as eight-antenna 802.11ac and nearly 50 times faster than highest 802.11n rate. It is backward compatible with WiFi standards, but due to its high frequency it is limited to short distances, usually up to 10 meters, cannot really penetrate walls but it can propagate by reflecting off of walls, ceilings or objects using beam forming.
Now Qualcomm showcased this technology for the first time and promised it inside Snapdragon 810 based devices. Qualcomm demonstrated peer-to-peer connection and transfer of 4K video between two 20nm Snapdragon 810 based tablets. One of the tablets was the sync side and it was connected directly to a 4K TV and it was clear that you could play a content from one tablet and sync it to the second one.
WiGig’s 7Gbps translates to 875MB per second in the best case scenario. The Qualcomm demo shows a Plutonium MSM8994 based tablet hitting up to 187MB a second (1.5 Gbit per second) available for data transfer, with 4K multi-device streaming on the side. WiGig can possibly get to external storage, enabling faster NAS systems, future peripherals such as keyboard and mouse and on a longer run it can completely eliminate the necessity for docking stations. It will take some time but this is the grand idea.
It remains to be seen when we will be able to buy first Snapdragon 810 device with 802.11ad WiGig abilities. Qualcomm mentioned 2015 a number of times, but there’s nothing more specific than that. A potential problem for this standard might be the speed of flash storage that is used in tablets and phones today. According to Androbench, the HTC One M8 can sequentially read 92.29 MB/s, sequentially write only 17 MB/s, while Nvidia’s Shield tablet can sequentially read 67.75 MB/s, and write only 14.09 MB/s.
The performance gets even less impressive with smaller files, but with numbers we are getting from latest 2014 devices, the flash has to increase speed up to 10 times in order to be ready to write files at 150MB. For theoretical maximum of ridiculously fast 875 MB/s we need about 50 times faster memory that the 14-17MB/s write speed available in the current generation of high end mobile devices.