Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Zeus Attached To Cancer Email Scam

March 28, 2014 by  
Filed under Around The Net

Comments Off on Zeus Attached To Cancer Email Scam

Thousands of email users have been hit by a sick cancer email hoax that aims to infect the recipients’ computers with Zeus malware.

The email has already hit thousands of inboxes across the UK, and looks like it was sent by the National Institute for Health and Care Excellence (NICE). It features the subject line “Important blood analysis result”.

However, NICE has warned that it did not send the malicious emails, and is urging users not to open them.

NICE chief executive Sir Andrew Dillon said, “A spam email purporting to come from NICE is being sent to members of the public regarding cancer test results.

“This email is likely to cause distress to recipients since it advises that ‘test results’ indicate they may have cancer. This malicious email is not from NICE and we are currently investigating its origin. We take this matter very seriously and have reported it to the police.”

The hoax message requests that users download an attachment that purportedly contains the results of the faux blood analysis.

Security analysis firm Appriver has since claimed that the scam email is carrying Zeus malware that if installed will attempt to steal users’ credentials and take over their PCs.

Appriver senior security specialist Fred Touchette warned, “If the attachment is unzipped and executed the user may see a quick error window pop up and then disappear on their screen.

“What they won’t see is the downloader then taking control of their PC. It immediately begins checking to see if it is being analysed, by making long sleep calls, and checking to see if it is running virtually or in a debugger.

“Next it begins to steal browser cookies and MS Outlook passwords from the system registry. The malware in turn posts this data to a server at 69.76.179.74 with the command /ppp/ta.php, and punches a hole in the firewall to listen for further commands on UDP ports 7263 and 4400.”

Source

Google Buys A.I. Firm

February 7, 2014 by  
Filed under Computing

Comments Off on Google Buys A.I. Firm

Google has purchased DeepMind Technologies, an artificial intelligence company in London, reportedly for $400 million.

A Google representative confirmed the via email, but said the company’s isn’t providing any additional information at this time.

News website Re/code said in a report this past Sunday that Google was paying $400 million for the company, founded by games prodigy and neuroscientist Demis Hassabis, Shane Legg and Mustafa Suleyman.

The company claims on its website that it combines “the best techniques from machine learning and systems neuroscience to build powerful general-purpose learning algorithms.” It said its first commercial applications are in simulations, e-commerce and games.

Google announced this month it was paying $3.2 billion in cash to acquire Nest, a maker of smart smoke alarms and thermostats, in what is seen as a bid to expand into the connected home market. It also acquired in January a security firm called Impermium, to boost its expertise in countering spam and abuse.

The Internet giant said on a research site that much of its work on language, speech, translation, and visual processing relies on machine learning and artificial intelligence. “In all of those tasks and many others, we gather large volumes of direct or indirect evidence of relationships of interest, and we apply learning algorithms to generalize from that evidence to new cases of interest,” it said.

In May, Google launched a Quantum Artificial Intelligence Lab, hosted by NASA’s Ames Research Center. The Universities Space Research Association was to invite researchers around the world to share time on the quantum computer from D-Wave Systems, to study how quantum computing can advance machine learning.

Source

Qualcomm Acquires Patents From HP

February 3, 2014 by  
Filed under Computing

Comments Off on Qualcomm Acquires Patents From HP

Chip making giant Qualcomm Inc has purchased a patent portfolio from Hewlett-Packard Co, including those of Palm Inc and its iPaq smartphone, in a move that will bulk up HP’s offerings to handset makers and other licensees.

The portfolio comprises about 1,400 granted patents and pending patent applications from the United States and about 1,000 granted patents and pending patent applications from other countries, including China, England, Germany, Japan and South Korea.

The San Diego-based chipmaker did not say how much it paid for the patents.

The majority of Qualcomm’s profits come from licensing patents for its ubiquitous CDMA cellphone technology and other technology related to mobile devices. Instead of licensing patents individually, handset vendors, carriers and other licensees pay royalties to Qualcomm in return for access to a broad portfolio of intellectual property.

The patents bought from HP, announced in a release on Thursday, cover technologies that include fundamental mobile operating system techniques.

They include those that HP acquired when it bought Palm Inc, an early player in mobile devices, in 2010 and Bitfone in 2006. HP tablets made using Palm’s webOS operating system failed to catch on.

“There’s nothing left at Palm that HP could get any use out of so it’s better to sell the patents, which are always valuable to Qualcomm,” said Ed Snyder, an analyst with Charter Equity Research. “They have to keep that bucket full.”

The new patents will not lead to increased royalty rates for existing Qualcomm licensees, a Qualcomm spokeswoman said.

Last year, HP sold webOS, which it received as part of the $1.2 billion Palm acquisition, to South Korea’s LG Electronics Inc.

Source

Can Robots Run On (NH2)2CO?

November 19, 2013 by  
Filed under Around The Net

Comments Off on Can Robots Run On (NH2)2CO?

Scientists have discovered a way to power future robots using an unusual source — urine.

Researchers at the University of the West of England, Bristol and the University of Bristol collaborated to build a system that will enable robots to function without batteries or being plugged into an electrical outlet.

Based on the functioning of the human heart, the system is designed to pump urine into the robot’s “engine room,” converting the waste into electricity and enabling the robot to function completely on its own.

Scientists are hoping the system, which can hold 24.5 ml of urine, could be used to power future generations of robots, or what they’re calling EcoBots.

“In the city environment, they could re-charge using urine from urinals in public lavatories,” said Peter Walters, a researcher with the University of the West of England. “In rural environments, liquid waste effluent could be collected from farms.”

In the past 10 years, researchers have built four generations of EcoBots, each able to use microorganisms to digest the waste material and generate electricity from it, the university said.

Along with using human and animal urine, the robotic system also can create power by using rotten fruit and vegetables, dead flies, waste water and sludge.

Ioannis Ieropoulos, a scientist with the Bristol Robotics Laboratory, explained that the microorganisms work inside microbial fuel cells where they metabolize the organics, converting them into carbon dioxide and electricity.

Like the human heart, the robotic system works by using artificial muscles that compress a soft area in the center of the device, forcing fluid to be expelled through an outlet and delivered to the fuel cells. The artificial muscles then relax and go through the process again for the next cycle.

“The artificial heartbeat is mechanically simpler than a conventional electric motor-driven pump by virtue of the fact that it employs artificial muscle fibers to create the pumping action, rather than an electric motor, which is by comparison a more complex mechanical assembly,” Walter said.

Source

Africa To Lead Global Bandwidth Demand

November 11, 2013 by  
Filed under Internet

Comments Off on Africa To Lead Global Bandwidth Demand

Africa’s demand for Internet access to the rest of the world will grow by an average of 51 percent every year until 2019, ahead of all other regions, according to a forecast by research company Telegeography.

Rapid economic growth and wider Internet use will drive the increase in demand, which will be met mostly by turning on unused capacity in existing cables, according to Telegeography analyst Erik Kreifeldt. Terrestrial links are in demand partly because much of Africa still relies on satellite, which is far more expensive per bit than wired broadband, he said.

Most Internet bandwidth between continents is provided by undersea cables built and financed by groups of service providers. From Africa, most of those links go to Europe. Other carriers pay to tap into those cables and link their customers to the Internet. In some parts of Africa, running cables from coastal areas to the interior is a challenge so satellite remains the major Internet source, Kreifeldt said.

The capacity of international cables landing on African shores is just a fraction of the bandwidth available between Europe, the U.S. and Asia. After seven years of the growth that Telegeography forecasts, from 2012 through 2019, Africa will have 17.2Tbps (bits per second) of links to the outside world. That’s up from just 957Gbps in 2012 but will still be only about one-quarter of the international capacity of Latin America and less than that of Canada, according to Telegeography.

The hunger for the Internet varies among African countries. Through 2019, bandwidth demand is expected to grow fastest in Angola, at 71 percent per year; Tanzania, at 68 percent; and Gabon, at 67 percent.

Many new cables have been built to Africa and around the continent in the past several years, giving service providers excess fiber capacity that can be turned on when needed, Kreifeldt said. As that fiber gets lit up and supply rises, prices should fall for enterprises and other users in African countries, he said. However, due to relative scarcity, a given amount of bandwidth between Africa and Europe costs about 10 times as much as the same size connection between Europe and North America, he said. Africa’s bandwidth gains aren’t expected to shrink that gap.

Source

Is Lenovo Eyeing Blackberry?

October 29, 2013 by  
Filed under Smartphones

Comments Off on Is Lenovo Eyeing Blackberry?

Lenovo reportedly has joined the list of possible Blackberry buyers, with the firm reportedly having approached the struggling Canadian phone maker.

The Wall Street Journal reported that Lenovo, despite previously denying that it was mulling a Blackberry buy (paywalled), has been given the thumbs up to cast an eye over the Canadian company’s books before making it a possible offer.

If reports are to be believed, Lenovo has joined a list of possible buyers that includes Intel, Cisco, SAP, Google, Samsung and LG.

Specific details of Lenovo’s possible acquisition are yet to be revealed, but as a newcomer to the smartphone market Lenovo recently admitted that it is selling more smartphones than tablets and PCs in China, despite being one of the only PC makers to continue showing sales growth.

However, Lenovo’s smartphone portfolio is yet to appear the UK, and the firm hasn’t seen much success outside China. However, picking up Blackberry could help Lenovo enter the global smartphone market, and the firm could be looking to take over from Blackberry as a phone maker focused on business professionals.

Lenovo might have a hard time closing a buyout deal for Blackberry, though. Rumours about a takeover have already led to speculation that such a buyout would struggle to get approval from the US and Canada, due to the company’s Chinese ownership and the fact that Blackberry does business with sensitive parts of both governments.

Blackberry didn’t comment on a possible Lenovo buyout, but instead put out its usual vague statement. A company spokesperson said, “The special committee, with the assistance of Blackberry’s independent financial and legal advisors, is conducting a robust and thorough review of strategic alternatives.”

Lenovo declined to comment on the report.

Source

King.com Has IPO In The Works

October 8, 2013 by  
Filed under Around The Net

Comments Off on King.com Has IPO In The Works

King.com Ltd, the British mobile gaming firm best known for its popular puzzle game ‘Candy Crush Saga’, has filed confidentially for an initial public offering (IPO) in the United States, a person familiar with the matter said on Sunday.

Online technology companies are rushing to the stock market on the backs of Twitter Inc’s announcement earlier this month that it plans to go public in the most eagerly anticipated IPO since last year’s flotation ofFacebook Inc.

Emerging growth companies such as King can use a secretive IPO registration process in the U.S. thanks to the Jumpstart Our BusinessStartups (JOBS) Act, which loosened a number of federal securities regulations in hopes of boosting capital raising and thereby increasing job growth.

King has hired Bank of America Merrill Lynch Corp, Credit Suisse Group AG and JPMorgan Chase & Co to lead the offering, said the person, confirming an earlier report by the Daily Telegraph and asking not to be identified because the information is confidential.

Representatives for King and the banks either declined to comment or did not respond to requests for comment.

King offers 150 games in 14 languages through mobile phones, Facebook and its website. It boasts more than 1 billion gameplays per day from its users.

The company’s games appeal to a growing trend for players to play puzzles with their friends in short bursts, especially as games are increasingly played on the move on phones or tablets to kill spare minutes.

Rival Zynga Inc went public two years ago in a high-profile IPO that raised $1 billion. Since then, Zynga has suffered from sagging morale during several quarters of worsening performance and repeated waves of layoffs.

Founded in 2003, King has been profitable since 2005 and has not had a funding round since September of that year, when it raised 34 million euros ($46.04 million) from investment firms Apax Partners and Index Ventures.

Source

Apple Hacked

October 2, 2013 by  
Filed under Smartphones

Comments Off on Apple Hacked

A group of German hackers claimed to have successfully breached the iPhone fingerprint scanner on Sunday, just two days after Apple Inc debuted the technology that it promises will better protect devices from criminals and snoopers seeking access.

If the claim is verified, it will be embarrassing for Apple which is betting on the scanner to set its smartphone apart from new models of Samsung Electronics Co Ltd and others running the Android operating system of Google Inc.

Two prominent iPhone security experts told Reuters that they believed the German group, known as the Chaos Computing Club, or CCC, had succeeded in defeating Apple’s Touch ID, though they had not personally replicated the work.

One of them, Charlie Miller, co-author of the iOS Hacker’s Handbook, described the work as “a complete break” of Touch ID security. “It certainly opens up a new possibility for attackers.”

Apple representatives did not respond to requests for comment.

CCC, one the world’s largest and most respected hacking groups, posted a video on its website that appeared to show somebody accessing an iPhone 5S with a fabricated print. The site described how members of its biometrics team had cracked the new fingerprint reader, one of the few major high-tech features added to the latest version of the iPhone.

The group said they targeted Touch ID to knock down reports about its “marvels,” which suggested it would be difficult to crack.

“Fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints,” a hacker named Starbug was quoted as saying on the CCC’s site.

The group said it defeated Touch ID by photographing the fingerprint of an iPhone’s user, then printing it on to a transparent sheet, which it used to create a mold for a “fake finger.”

CCC said similar processes have been used to crack “the vast majority” of fingerprint sensors on the market.

“I think it’s legit,” said Dino Dai Zovi,” another co-author of the iOS Hacker’s Handbook. “The CCC doesn’t fool around or over-hype, especially when they are trying to make a political point.”

Touch ID, which was only introduced on the top-of-the-line iPhone 5S, lets users unlock their devices or make purchases on iTunes by simply pressing their finger on the home button. It uses a sapphire crystal sensor embedded in the button.

Data used for verification is encrypted and stored in a secure enclave of the phone’s A7 processor chip.

Two security experts who sponsored an impromptu competition offering cash and other prizes to the first hackers who cracked the iPhone said they had reviewed the information posted on the CCC website, but wanted more documentation.

“We are simply awaiting a full video documentation and walk through of the process that they have claimed,” said mobile security researcher Nick DePetrillo, who started the contest with another security expert, Robert Graham. “When they deliver that video we will review it.”

The two of them each put up $100 toward a prize for the contest winner, then set up a website inviting others to contribute. While the booty now includes more than $13,000 in cash, it was not clear that the CCC would receive the full payout, even if DePetrillo and Graham declared them winners.

Source

Cyber Attacks Increasing In Middle East

September 13, 2013 by  
Filed under Security

Comments Off on Cyber Attacks Increasing In Middle East

Syria’s civil war and political strife in Egypt have given birth to new battlegrounds on the Web and driven a surge in cyber attacks in the Middle East, according to a leading Internet security company.

More than half of incidents in the Gulf this year were so-called “hacktivist” attacks – which account for only a quarter of cybercrime globally – as politically motivated programmers sabotaged opposing groups or institutions, executives from Intel Corp’s software security division McAfee said on Tuesday.

“It’s mostly bringing down websites and defacing them with political messages – there has been a huge increase in cyber attacks in the Middle East,” Christiaan Beek, McAfee director for incident response forensics in Europe, Middle East and Africa (EMEA), told Reuters.

He attributed the attacks to the conflict in Syria, political turmoil in Egypt and the activities of hacking collective Anonymous.

“It’s difficult for people to protest in the street in the Middle East and so defacing websites and denial of service (DOS) attacks are a way to protest instead,” said Beek.

DOS attacks flood an organization’s website causing it to crash, but usually do little lasting damage.

The Syrian Electronic Army (SEA), a hacking group loyal to the government of President Bashar al-Assad, defaced an Internet recruiting site for the U.S. Marine Corps on Monday and recently targeted the New York Times website and Twitter, as well other websites within the Middle East.

Beek described SEA as similar to Anonymous.

“There’s a group leading operations, with a support group of other people that can help,” said Beek.

McAfee opened a centre in Dubai on Monday to deal with the rising threat of Internet sabotage in the region, the most serious of which are attacks to extract proprietary information from companies or governments or those that cause lasting damage to critical infrastructure.

Cyber attacks are mostly focused on Saudi Arabia, the world’s largest oil exporter, Qatar, the top liquefied natural gas supplier, and Dubai, which is the region’s financial, commercial and aviation hub, said Gert-Jan Schenk, McAfee president for EMEA.

“It’s where the wealth and critical infrastructure is concentrated,” he said.

The “Shamoon” virus last year targeted Saudi Aramco, the world’s largest oil company, damaging about 30,000 computers in what may have been the most destructive attack against the private sector.

“Ten years ago, it was all about trying to infect as many people as possible,” added Schenk. “Today we see more and more attacks being focused on very small groups of people. Sometimes malware is developed for a specific department in a specific company.”

Source

U.S. Cloud Vendors Hurt By NSA

September 4, 2013 by  
Filed under Computing

Comments Off on U.S. Cloud Vendors Hurt By NSA

Edward Snowden’s public unveiling of the National Security Agency’s Prism surveillance program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market — a slice of business valued at up to $35 billion.

A new report from the Information Technology & Innovation Foundation (ITIF) concludes that European cloud computing companies, in particular, might successfully exploit users’ fears about the secret data collection program to challenge U.S. leadership in the hosted services business.

Daniel Castro, author of the report, acknowledges that the conclusions are based, so far, on thin data, but nonetheless argues that the risks to U.S. cloud vendors are real.

Indeed, a month prior, the Cloud Security Alliance reported that in a survey of 207 officials of non-U.S. companies, 10% of the respondents said that they had canceled contracts with U.S. service providers after Snowden’s leak of NSA Prism documents earlier this year.

“If U.S. companies lose market share in the short term, it will have long-term implications on their competitive advantage in this new industry,” said Castro in the ITIF report. “Rival countries have noted this opportunity and will try to exploit it.”

To counter such efforts, the U.S. must challenge overstated claims about the program by foreign companies and governments, said Jason Weinstein, a partner in the Washington office of law firm Steptoe & Johnson and a former federal prosecutor and deputy assistant attorney general specializing in computer crime.

“There are a lot of reasons to be concerned about just how significant those consequences will be,” Weinstein said. “The effort by European governments and European cloud providers to cloud the truth about data protection in the U.S. was going on well before anyone knew who Edward Snowden was. It just picked up new momentum once the Prism disclosures came out.”

Weinstein contends that European countries have fewer data protection rules than the U.S.

For example, he said that in the U.K. and France, a wiretap to get content can be issued by a government official without court authority, but that can’t happen in the U.S.

“U.S. providers have done nothing other than comply with their legal obligations,” he said. But because of Snowden’s leaks, “they are facing potentially significant economic consequences.”

Gartner analyst Ed Anderson said his firm has yet to see any revenue impact on cloud providers since the Prism disclosures, but added, “I don’t think Prism does U.S. providers any favors, that’s for sure.”

Nonetheless, Anderson added, “I think the reality is [the controversy] is likely to die down over time, and we expect adoption to probably continue on the path that it has been on.”

One reason why U.S. providers may not suffer is because “the alternatives aren’t great if you are a European company looking for a cloud service,” he said.

Source

« Previous PageNext Page »