Amazon Goes Droning
August 5, 2016 by admin
Filed under Around The Net
Comments Off on Amazon Goes Droning
Amazon.com Inc announced that it has entered into a partnership with the British government to hasten the process for allowing small drones to makes deliveries.
The world’s biggest online retailer, which has laid out plans to start using drones for deliveries by 2017, said a cross-government team supported by the UK Civil Aviation Authority had provided it with the permissions necessary to explore the process.
Amazon unveiled a video last year showcasing how an unmanned drone could deliver packages, narrated by former Top Gear TV host Jeremy Clarkson.
The U.S. Federal Aviation Administration said last month the use of drones for deliveries will require separate regulation from their general use.
Wal-Mart Stores Inc said last month it was six to nine months from beginning to use drones to check warehouse inventories in the United States.
Source-http://www.thegurureview.net/aroundnet-category/u-k-regulators-give-amazon-permission-to-explore-drone-deliveries.html
Facebook Goes End To End
Facebook Inc announced that it began testing end-to-end encryption on its popular Messenger application to prevent snooping on digital conversations.
The limited testing on Messenger, which has more than 900 million users, comes three months after Facebook rolled out end-to-end encryption to its more popular WhatsApp, a messaging application with over 1 billion users that it acquired in October 2014.
The move comes amid widespread global debate over the extent to which technology companies should help law enforcement snoop on digital communications.
End-to-end encryption is also offered on Apple Inc’s iMessage platform as well as apps including LINE, Signal, Viber, Telegram and Wickr.
Facebook Messenger uses the same encryption technology as WhatsApp, which uses a protocol known as Signal that was developed by privately held Open Whisper Systems.
“It seems well designed,” said Matthew Green, a Johns Hopkins University cryptologist who helped review an early version of the protocol for Facebook.
While WhatsApp messages are encrypted by default, Facebook Messenger users must turn on the feature to get the extra additional security protection, which scrambles communications so they can only be read on devices at either end of a conversation.
Facebook said that it was requiring users to opt in to encryption because the extra security is not compatible with some widely used Messenger features.
“Many people want Messenger to work when you switch between devices, such as a tablet, desktop computer or phone,” the company said in an announcement on its website. “Secret conversations can only be read on one device and we recognize that experience may not be right for everyone.”
Facebook also said that Messenger users cannot send videos or make payments in encrypted conversations.
Courtesy-http://www.thegurureview.net/aroundnet-category/end-to-end-encryption-comes-to-facebook-messenger.html
Has The Smartphone Bubble Busted?
June 22, 2016 by admin
Filed under Smartphones
Comments Off on Has The Smartphone Bubble Busted?
After sliding its slide-rules, flicking its abacus, and counting its toes, the bean counters at Gartner have decided that the smartphone business bubble has burst splattering in the face of those who depend on it.
Big G says the market will shrink from 14.4 per cent growth in 2015 to just 7 per cent in 2016 — with only 1.5 billion smartphone units being shipped globally this year. Compair this with 2010, when Gartner notes the market grew 73 per cent.
However the signs have been obvious for about a year. Mature Western markets saturated, China’s growth engine slowing as demand has topped out and other markets unable to afford the higher margin gear. The smartphone has come to the end of its ability to provide new technology too with companies only able to offer incremental upgrades. Carriers are moving away from subsidizing upgrades which means that them wasting their own profits to prop up the likes of Apple are over.
In emerging markets it says the average lifetime of premium phone is between 2.2 and 2.5 years, while basic mobiles have an average lifetime of three years and up.
Gartner sees the biggest remaining opportunity for smartphone growth in India, noting that sales of feature phones — aka dumbphones — accounted for a majority (61 per cent) of total mobile device sales last year, leaving plenty of scope for upgrades as smartphones continue to become more affordable.
It is estimating 139 million smartphones will be sold in India this year, growing 29.5 per cent year-over-year. It notes the average selling price of mobiles in the country remains below $70, and it expects smartphones priced under $120 to continue to contribute around half of overall smartphones sales there this year. Apple’s hope that it can save its flailing business numbers by selling into India show the complete lack of understanding of how that market is working. It is tending to favor small local smartphone makers like Intex.
China is going to offer Apple no help either Gartner is expecting “little growth” in the region in the next five years. IT says it is “saturated yet highly competitive” market. Smartphones represented 95 per cent of total mobile phones sales last year.
Gartner analyst Annette Zimmerman said that “non-traditional” vendors in China could do well and thinks that by 2018 at least one such phone maker will be among the top five smartphone brands in the country.
“Chinese internet companies are increasingly investing in mobile device hardware development, platforms and distribution as they aim to grow their user bases and increase user loyalty and engagement,” she said.
The Sub-Saharan African region is also couched as an attractive region for smartphone vendors, with smartphone sales only overtaking mobile phones sales there for the first time last year. Nokia brand licensee and newly formed smartphone OEM HMD will want to take note, given it has paid for the right to build feature phones (and smartphones) bearing the previously iconic Nokia brand name.
Courtesy-Fud
Google And Yahoo Get Blocked
May 24, 2016 by admin
Filed under Around The Net
Comments Off on Google And Yahoo Get Blocked
The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.
On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.
“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”
The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?
If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.
“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”
The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.
The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.
Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html
Twitter Blocks Intelligence Agencies
May 17, 2016 by admin
Filed under Around The Net
Comments Off on Twitter Blocks Intelligence Agencies
Twitter has prohibited a data-mining firm from providing analytics of real-time tweets to U.S. intelligence agencies, according to a Wall Street Journal report, quoting a person familiar with the matter.
Twitter, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.
Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies.
Twitter’s move appears to be in line with its policy on the use of its tweet data by external companies.
“Dataminr uses public Tweets to sell breaking news alerts to companies such as Wall Street Journal parent Dow Jones and government agencies such as the World Health Organization, for non-surveillance purposes,” Twitter said in a statement Sunday. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes.”
U.S. intelligence agencies gained access to Dataminr’s service after In-Q-Tel, aventure capital organization backed by U.S. intelligence agencies, put money in the firm, the WSJ said, quoting a person familiar with the matter. Twitter is said to have conveyed to Dataminr that it didn’t want to continue the relationship with intelligence agencies at the end of a pilot by the data analysis firm arranged by In-Q-Tel. Dataminr does not figure in the list of In-Q-Tel portfolio companies on its website.
Source-http://www.thegurureview.net/uncategorized/twitter-blocks-intelligence-agencies-access-to-tweet-analytics.html
Oracle Goes Deeper Into The Cloud
Right on the heels of a similar acquisition last week, Oracle has announced it will pay $532 million to buy Opower, a provider of cloud services to the utilities industry.
Once a die-hard cloud holdout, Oracle has been making up for lost time by buying a foothold in specific industries through acquisitions such as this one. Last week’s Textura buy gave it a leg up in engineering and construction.
“It’s a good move on Oracle’s part, and it definitely strengthens Oracle’s cloud story,” said Frank Scavo, president of Computer Economics.
Opower’s big-data platform helps utilities improve customer service, reduce costs and meet regulatory requirements. It currently stores and analyzes more than 600 billion meter readings from 60 million end customers. Opower claims more than 100 global utilities among its clients, including PG&E, Exelon and National Grid.
Opower will continue to operate independently until the transaction closes, which is expected later this year. The union will create the largest provider of mission-critical cloud services to an industry that’s worth $2.3 trillion, Oracle said.
Oracle’s Utilities business delivers applications and cloud services that automate core operational processes and enable compliance for global electric, gas and water utilities.
“Oracle’s industry organizations maintain unique domain knowledge, specialized expertise and focused product investments,” said Rodger Smith, a senior vice president who leads the Utilities global business unit, in a letter to customers and partners. “This model has proven highly successful across several industries, and we look forward to bringing these same benefits to the customers of Opower.”
Source- http://www.thegurureview.net/aroundnet-category/oracle-pushes-deeper-into-cloud-computing-with-another-acquisition.html
Symantec Has Some Flaws With SEP
Symantec has warned of three serious vulnerabilities in its Endpoint Protection (SEP) software, and is advising users to update their systems.
The bugs affect all builds of the 12.1 version of the SEP software, with the first two flaws allowing authorised but low privilege users of the software to gain elevated and administrative access to the management console, which can be accessed either locally or through a web-based portal.
The third bug is in the sysplant driver and enables users to bypass the SEP’s security controls and run malware and other malicious code on a targeted client machines.
“Exploitation attempts of this type generally use known methods of trust exploitation requiring enticing a currently authenticated user to access a malicious link or open a malicious document in a context such as a website or in an email,” said the security firm.
There have been no recorded exploits of the flaws, so it would appear that Symantec has squashed the bugs before they became a real-world problem for its customers.
The first two bugs were discovered by security researcher Anatoly Katyushin from rival firm Kaspersky Labs, which is a little embarrassing. Discovery of the third bug was credited to the enSilo Research Team.
Symantec advises SEP users to update their software to the 12.1 RU6 MP4 version. It also recommends that users should take precautions and restrict remote access to the management console in order to prevent hackers from attacking client systems through the web portal.
While hackers can direct sophisticated malware at even the most robustly secured systems, exploiting flaws in software offers an easier route into machines and networks, providing hackers get in before the bugs are discovered and patched.
Recent examples can be seen with the discovery of iOS malware which threatens iPhones through an Apple DRM flaw, and an error on Code.org’s website which saw the emails of its volunteers exposed.
Courtesy-TheInq
Darkode Hacking Forum Shut Down
Law enforcement agencies from 20 countries collaborated to cripple a major computer hacking forum, and U.S. officials filed criminal charges against a dozen people associated with the website, the U.S. Department of Justice announced.
Darkode.com on is displaying a message saying the site and domain had been seized by the FBI and other law enforcement agencies.
Darkode, a password-protected online forum for criminal hackers, represented one of the gravest threats to the integrity of data on computers across the world, according to David Hickton, U.S. attorney for the Western District of Pennsylvania. “Through this operation, we have dismantled a cyber hornets’ nest of criminal hackers which was believed by many, including the hackers themselves, to be impenetrable.”
Five of the defendants face charges in Hickton’s district.
Darkode allowed hackers and other cybercriminals to sell, trade and share information and tools related to illegal computer hacking, the law enforcement agencies alleged.
Before becoming a member of Darkode, prospective participants were allegedly vetted through a process that included an invitation by a member, the DOJ said in a press release. The prospective member then pitched the skill or products he or she could bring to the forum.
Darkode members allegedly used each other’s skills and products to infect computers and electronic devices of victims around the world with malware, the DOJ said.
The takedown of the forum and the charges announced Wednesday came after the FBI’s infiltration of Darkode’s membership.
Text To 911 Has Low Adoption Rate
May 19, 2015 by admin
Filed under Around The Net
Comments Off on Text To 911 Has Low Adoption Rate
Only 5% of the nation’s 6,500 emergency dispatch centers are capable of receiving and responding to emergency text-to-911 messages.
That’s not good enough for more than 41,000 signers of a Change.org petition. They want Congress to pass legislation requiring emergency centers to update their systems to accommodate texting.
Text-to-911 would have provided much-needed help for Lisbeth (not her real name), a mother of two who said she was repeatedly battered by her boyfriend in her home over several years. One day three years ago, when he was yelling at her, she tried to call 911 on her cell phone for help, but he broke down the door where she was hiding and demanded to know whom she was calling.
“I was trying to whisper, but he got in and punched me and asked me who I was talking to,” Lisbeth said in an interview. That time, a neighbor overheard the fight and called 911 to bring police to the scene.
“911 works, but I wish it worked with text,” she added. “If they had it back then, it might have made a difference.” Lisbeth later moved into a shelter for abused women in California’s San Fernando Valley and said her life has improved for herself and her children. “Anybody who is going through the same situation as I was should ask for help,” she said.
The Federal Communications Commission last yea rrequired U.S. carriers and makers of some texting apps to provide emergency texting with their services, but the FCC doesn’t regulate the nation’s emergency dispatch centers. Instead, the centers are regulated locally by 3,200 different states, counties and cities, even though many of those jurisdictions receive federal funds for the dispatch centers.
FCC Commissioner Ajit Pai last August expressed concerns that FCC mandates for carriers might give the public a false impression that they can send texts to emergency responders when so few are prepared to receive texts.
Symantec Uncovers Advanced Spying Malware
Comments Off on Symantec Uncovers Advanced Spying Malware
An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.
Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.
The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”
Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.
Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”
Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.
Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.