Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is Google Going After Facebook?

December 12, 2016 by  
Filed under Around The Net

Comments Off on Is Google Going After Facebook?

The word on the information street is that Google wants to buy Facebook. It is entirely speculative, but could have legs.

Information leaked suggests that talks are well advanced between the two companies.

Anecdotal evidence from many Facebook users suggests that talks are well advanced and the companies are already sharing experimental data, between themselves, of user data. Other sources suggest that Microsoft (Vole) is also interested in Facebook and, conversely, that Facebook is interested in buying Microsoft.

None of the companies cared enough to comment to Fudzilla at press time.

Courtesy-Fud

Tech Firms Form OTrP To Support IoT Security

July 29, 2016 by  
Filed under Security

Comments Off on Tech Firms Form OTrP To Support IoT Security

A bunch of tech firms including ARM and Symantec have joined forces to create a security protocol designed to protect Internet of Things (IoT) devices.

The group, which also includes Intercede and Solacia, has created The Open Trust Protocol (OTrP) that is now available for download for prototyping and testing from the IETF website.

The OTrP is designed to bring system-level root trust to devices, using secure architecture and trusted code management, akin to how apps on smartphones and tablets that contain sensitive information are kept separate from the main OS.

This will allow IoT manufacturers to incorporate the technology into devices, ensuring that they are protected without having to give full access to a device OS.

Marc Canel, vice president of security systems at ARM, explained that the OTrP will put security and trust at the core of the IoT.

“In an internet-connected world it is imperative to establish trust between all devices and service providers,” he said.

“Operators need to trust devices their systems interact with and OTrP achieves this in a simple way. It brings e-commerce trust architectures together with a high-level protocol that can be easily integrated with any existing platform.”

Brian Witten, senior director of IoT security at Symantec, echoed this sentiment. “The IoT and smart mobile technologies are moving into a range of diverse applications and it is important to create an open protocol to ease and accelerate adoption of hardware-backed security that is designed to protect onboard encryption keys,” he said.

The next stage is for the OTrP to be further developed by a standards-defining organisation after feedback from the wider technology community, so that it can become a fully interoperable standard suitable for mass adoption.

Courtesy-TheInq

 

Is Twitter Home To Malware?

May 1, 2013 by  
Filed under Around The Net

Comments Off on Is Twitter Home To Malware?

Security outfit Trusteer has recently identified an active configuration of TorRAT targeting Twitter users. The malware launches a Man-in-the-Browser (MitB) attack through the browser of infected PCs, gaining access to the victim’s Twitter account to create malicious tweets.

Dana Tamir, Enterprise Security Director for Trusteer the malware, which has been used as a financial malware to gain access to user credentials and target their financial transactions, now has a new goal: to spread malware using the online social networking service. At this time the attack is targeting the Dutch market. But since Twitter is used by millions of users around the world, this type of attack can be used to target any market and any industry.

The attack is carried out by injecting Javascript code into the victim’s Twitter account page. The malware collects the user’s authentication token, which enables it to make authorized calls to Twitter’s APIs, and then posts new, malicious tweets on behalf of the victim.

Tamir said that the attack is particularly difficult to defend against because it uses a new sophisticated approach to spear-phishing. Twitter users follow accounts that they trust. Because the malware creates malicious tweets and sends them through a compromised account of a trusted person or organization being followed, the tweets seem to be genuine. The fact that the tweets include shortened URLs is not concerning: Twitter limits the number of characters in a message, so followers expect to get interesting news bits in the form of a short text message followed by a shortened URL. However, a shortened URL can be used to disguises the underlying URL address, so that followers have no way of knowing if the link is suspicious.

Source

IBM Beefs Up

September 21, 2012 by  
Filed under Computing

Comments Off on IBM Beefs Up

IBM is unveiling a new version of its Connections enterprise social networking (ESN) software, which businesses use to give their employees social media capabilities adapted for workplace collaboration, such as employee profiles and blogging.

Enhancements in IBM Connections 4.0 include a more interactive activity stream, broader support for mobile devices, more granular usage analytics and integration with email and calendar systems, according to Heidi Ambler, director of product management for IBM Social Software. It is available immediately.

“This new release helps customers grasp the power of social analytics, gives them anytime-anywhere access to the software and provides cutting-edge capabilities,” she said.

Instead of a list-like news feed, the new software has an activity stream in employee profiles that users can filter for relevance, as well as act on the notifications right from the Connections interface.

For example, users can trigger pop-up boxes from the activity stream notifications and see the latest comments made about a file, see who posted the latest version of it and add tags to it.

An integration with IBM’s own Lotus Notes-Domino and with Microsoft’s Outlook-Exchange email and calendar systems lets users manage email messages through Connections.

Source…

Twitter Wants To Email You

May 23, 2012 by  
Filed under Around The Net

Comments Off on Twitter Wants To Email You

Twitter will begin delivering a weekly email digest to highlight for users of the micro-blogging site the tweets they are most likely to be interested in, the company stated on Monday.

The feature marks a departure for a social network that typically emphasizes real-time delivery of information.

How will Twitter determine which tweets a user may want to see? Twitter spokesman Robert Weeks said the digest will feature the tweets that the “people you’re connected to on Twitter are engaging with the most.”

From the email digest, users will be able to see the conversation about a particular tweet, follow shared links and send out their own tweets. The digest will include tweets not just from a user’s own feed but also from the feeds of people he or she follows.

Source…

Social Networks Go Verified Accounts

February 23, 2012 by  
Filed under Around The Net

Comments Off on Social Networks Go Verified Accounts

Celebrities and other public figures will soon have the ability to verify their accounts and display a preferred “alternative name,” TechCrunch reports.

In an effort to stop impostors, Facebook will reportedly soon allow celebrities and other public figures to verify their accounts in much the same way that Twitter does.

The social network will begin notifying public figures with many subscribers that they can verify their accounts by submitting an image of a government-issued ID, allowing them to display a preferred pseudonym instead of their birth name, according to a TechCrunch report. Facebook will then manually approve the “alternative names” to confirm they are the real stage names or pen names.

Facebook users must be chosen to participate in the program; there is no way to volunteer for verification. However, unlike Twitter, verified accounts will not receive a special badge indicating verified status.

Verification will allow celebrities to be more readily accessible to fans when using their stage names instead of what is officially listed on their birth certificates. The program will also gain more prominent placement in the “People To Subscribe To” section.

Source…

Goo.gl Link Spreading Malware via Twitter

February 21, 2011 by  
Filed under Around The Net

Comments Off on Goo.gl Link Spreading Malware via Twitter

As if we don’t have enough to worry about when it comes to potential attacks of all kinds. First there were reports about the social media site Facebook and its highly infected news feeds now there appears to be yet another mischief seeking internet fiend sending out infected Goo.gl links via Twitter. Users are being warned not to click these suspicious links as they might direct you to malicious sites.

Read More….