Can Intel Go Wireless?
July 17, 2014 by admin
Filed under Uncategorized
Comments Off on Can Intel Go Wireless?
Intel wants to lead the drive into a less wired world by pushing standards, drive down the cost, and make these technologies ubiquitous.
At Computex, Intel demonstrated WiGig wireless docking and simultaneous wireless charging of a laptop, smartphone, headset and tablet with a pad placed under a tabletop. The company said that it would deliver reference designs for systems that use the technology in 2016 as part of a future Core processor family known as Skylake.
WiGig trades range for speed and operates in the 60GHz spectrum, compared with 2.4- and 5.0GHz for WiFi. It can transfer data at speeds of up to 7Gbps, compared to a maximum speed of a little more than 1Gbps for 802.11ac.
WiGig can be used to stream video from a mobile device to a TV or monitor, replacing HDMI and DisplayPort cables, but is being seen as a way of carrying out networking and wireless docking. It means that you can put your laptop on your desk and it automatically connects with your monitor, keyboard and mouse, printer and other peripherals without cables.
Intel plans to make its own WiGig chips. The outfit said it will have silicon for both transmitters and receivers in production by the end of this year, and available in products in the first half of 2015. Intel also wants to push Rezence for wireless charging.
Chipzilla has added that it will contribute some of its own IP to expand the standard to support wireless charging of laptops (which requires at least 20 watts) and that Rezence will be part of a Skylake reference design by 2016. This means that the world could be wirelessly networked soon after that.
Brits Investigate Facebook
July 15, 2014 by admin
Filed under Around The Net
Comments Off on Brits Investigate Facebook
The British data watchdog is looking into whether Facebook Inc violated data-protection laws when it gave permission to researchers to conduct a psychological experiment on its users.
A Facebook spokesman acknowledged that the experiment on nearly 700,000 unwitting users in 2012 had upset users and said the company would change the way it handled research in future.
The study, to find if Facebook could alter the emotional state of users and prompt them to post either more positive or negative content, has caused a furor on social media, including Facebook itself.
“We’re aware of this issue and will be speaking to Facebook, as well as liaising with the Irish data protection authority, to learn more about the circumstances,” the Information Commissioner’s Office (ICO) spokesman Greg Jones said in an email.
Jones said it was too early to tell exactly what part of the law Facebook may have infringed. The company’s European headquarters is in Ireland.
The Commissioner’s Office monitors how personal data is used and has the power to force organizations to change their policies and can levy fines of up to 500,000 pounds ($839,500).
Facebook said it would work with regulators and was changing the way it handled such cases.
“It’s clear that people were upset by this study and we take responsibility for it,” Facebook spokesman Matt Steinfeld said in an email.
“The study was done with appropriate protections for people’s information and we are happy to answer any questions regulators may have.”
Is Malware Wreaking Havoc On XP?
One of the top three malware programs affecting businesses in the second quarter is a worm that takes advantage of the large number of companies still using Windows XP, Trend Micro has warned.
The worm, dubbed DOWNAD, also known as Conficker, can infect an entire network via a malicious URL, spam email, or removable drive. Windows XP is particularly susceptible to this threat because it is known to exploit the MS08-067 Server service vulnerability in order to execute arbitrary code.
DOWNAD also has its own domain generation algorithm (DGA) that allows it to create randomly-generated URLs. It then connects to these created URLs to download files to the system. Trend Micro said that around 175 IP addresses are found to be related to the DOWNAD worm and that these IP addresses use various ports and are randomly generated via the DGA capability of DOWNAD.
“During our monitoring of the spam landscape, we observed that in Q2, more than 40 percent of malware related spam mails are delivered by machines infected by DOWNAD worm,” said Trend Micro anti-spam research engineer Maria Manly in a blog post.
“A number of machines are still infected by this threat and leveraged to send the spammed messages to further increase the number of infected systems. And with Microsoft ending the support for Windows XP this year, we can expect that systems with this OS can be infected by threats like DOWNAD.”
The security company warned that spam campaigns delivering FAREIT, MYTOB, and LOVGATE payloads in email attachments are attributed to DOWNAD infected machines. FAREIT is a malware family of information stealers that download variants of the Zeus Trojan, while MYTOB is an old family of worms known for sending a copy of itself in spam attachments.
The other top sources of spam with malware are the CUTWAIL botnet, together with Gameover ZeuS (GoZ). Manly said CUTWAIL was actually previously used to download GoZ malware but now a malware called UPATRE employs GoZ malware or variants of ZBOT which have peer-to-peer functionality.
“In the last few weeks we have reported various spam runs that abused Dropbox links to host malware like UPATRE,” Manly said. “We also spotted a spammed message in the guise of voice mail that contains a Cryptolocker variant. The latest we have seen is a spam campaign with links that leveraged CUBBY, a file storage service, this time carrying a banking malware detected as TSPY_BANKER.WSTA.”
According to Manly, cybercriminals and threat actors are probably abusing file storage platforms to mask their malicious activities and go undetected in the system and network.
“As spam with malware attachment continues to proliferate, so is spam with links carrying malicious files. The continuous abuse of file hosting services to spread malware appears to have become a favoured infection vector of cyber criminals most likely because this makes it more effective given that the URLs are legitimate thereby increasing the chance of bypassing anti-spam filters,” she added.
Salesforce Goes Healthcare
Salesforce Inc, one of the first cloud-computing companies, is turning its focus towards healthcare with new software and services aimed at the largest hospitals.
Salesforce has announced a strategic alliance with Amsterdam-based medical technology company Philips, which it envisions as the first of many partnerships. These companies will announce two new medical applications later in the summer, called Philips eCareCoordinator and Philips eCare Companion.
The software is designed to improve health and cut costs. The apps are intended to be used by physicians to monitor chronically ill patients between doctor visits.
Salesforce said the goal is to make it easier for hospitals to collect and analyze data from medical devices, which patients with chronic conditions often use at home.
“In the United States, care providers are facing increasing demands and decreasing reimbursement,” said Michael Peachey, a senior director of solutions and product marketing at Salesforce.
“We want to improve efficiency for physicians by transmitting patient data in real time.”
Peachey said the Salesforce software meets security and privacy rules under the Health Insurance Portability and Accountability Act, known as HIPAA.
In the short term, Peachey said Salesforce intends to develop additional apps with other partners to help doctors and nurses monitor patients from the comfort of their homes.
“It’s an open platform,” he said.
NSA Software Reengineered
Hackers have found a way to reverse engineer the technology of the United States National Security Agency (NSA) spy gadgets.
Thanks to documents leaked by fugitive former NSA contractor and whistleblower Edward Snowden, the group has built a copycat device able to gather private data from computer systems.
The Advanced Network Technology catalogue, leaked by Snowden, is the Argos book of the NSA showing a range of toys available to agents. One such device known has a “retro reflector” had eluded identification, beyond that it acted as a bug, keylogger and screengrabber.
Michael Ossman and his team from Great Scott Gadgets, a Colorado based hacking group, decided that the best defence against such devices was to create their own to understand what makes them tick.
It transpired that the key technology being used is called software defined radio (SDR), an approach that uses software to generate radio transmissions through signal processing, doing away with a lot of hardware circuitry.
“SDR lets you engineer a radio system of any type you like really quickly so you can research wireless security in any radio format,” Ossmann told New Scientist.
The technique can be used for almost any type of radio signal and therefore the devices are capable of tracking anything, from what you’re listening to through a Bluetooth headset to the binary signals of your internet traffic.
The group, which will demonstrate its work at the Defon hacking conference in Las Vegas, runs a website at NSAplayset.org that is a repository for all of the information it gathered.
Oracle Takes A Fall
Oracle posted fiscal fourth-quarter results that were just horrible for investors looking for more progress in web-based services, sending its shares lower.
The company had been expected to report a pickup in its software business and progress in cloud computing, shares of Oracle had gained 10 percent over the past three months. However yesterday it was clear that Oracle is getting a kicking from the competition like Salesforce.com and Workday which have been offering competitive software and Internet-based products at prices that often undercut Oracle.
Tech spending is likely to fall as more companies move to the cloud. Oracle has been rolling out its own cloud-based products but they remain under five percent of its overall revenue. For the fiscal first quarter, Oracle expects software and cloud revenue to grow between 6 percent and 8 percent. That forecast includes expectations for software- and platform-related cloud services to grow between 25 percent and 35 percent.
Oracle said it expects its hardware system revenue to be in a range of down 1 percent to up 3 percent.
For its latest fourth quarter, Oracle said overall revenue rose 3 percent to $11.3 billion. That was less than the $11.48 billion analysts had expected on average. Net income fell 4 percent to $3.6 billion.
Revenue from Oracle’s hardware systems products grew 2 percent to $870 million.
Verizon Wants Dish’s Spectrum
July 3, 2014 by admin
Filed under Around The Net
Comments Off on Verizon Wants Dish’s Spectrum
Verizon Communications Inc unit Verizon Wireless is in hot pursuit of satellite-TV operator Dish Network Corp’s spectrum to improve wireless internet speeds, the New York Post reported, citing sources familiar with the matter.
The two companies have held informal, early talks about the spectrum, the report said.
In May, Verizon Communications Chief Executive Lowell McAdam shot down rumors that the company was in potential merger talks with Dish.
Federal Communications Commission Chairman Tom Wheeler has proposed restrictions on how much the biggest wireless carriers can bid for in a major auction of TV spectrum scheduled for mid-2015.
A possible merger between Sprint Corp and T-Mobile US Inc could prompt U.S. regulators to rewrite rules they are now considering for the auction.
BlackBerry And Amazon Team Up
June 30, 2014 by admin
Filed under Smartphones
Comments Off on BlackBerry And Amazon Team Up
BlackBerry Ltd has agreed to a licensing deal with Amazon.com Inc that will let the Canadian smartphone maker offer some 240,000 Android applications from Amazon’s app store on its lineup of BlackBerry 10 devices this fall.
The move allows the Waterloo, Ontario-based company to add a vast array of consumer-focused apps to its devices, while at the same time directing its own efforts toward developing enterprise and productivity applications.
Customers who own smartphones powered by its BlackBerry 10 operating system will now be able to access popular Android apps such as Groupon, Netflix, Pinterest, Minecraft and Candy Crush Saga on their BlackBerry devices this fall. Google Inc makes Android, the mobile operating system used in more than a billion phones and tablets.
The apps will become available after the Canadian smartphone maker rolls out the upgraded BlackBerry 10.3 operating system, the company said.
The move is the latest by the smartphone pioneer to streamline its focus as it attempts to reinvent itself under new Chief Executive Officer John Chen as BlackBerry phones have lost ground to Apple Inc’s iPhone and Samsung Electronics Co Ltd’s Galaxy devices.
Analysts saw the move as a step in the right direction, but are not sure whether it will help turn the tide for BlackBerry.
“While this will widen the BB10 app ecosystem, the consumer
smartphone environment still remains challenging,” Wells Fargo analyst Maynard Um said in a note to clients.
Um views the announcement as a positive for BlackBerry, but said “whether it stems consumer churn remains to be seen.”
Chen wants to remain a competitor in the smartphone segment, but is focused on making BlackBerry a dominant force in machine-to-machine communications. The company’s QNX software already is a mainstay in the automotive industry, powering electronic and other systems in a wide range of cars.
BlackBerry already works with hundreds of large enterprise clients, including corporations and government agencies, to manage and secure mobile devices on their internal networks.
Chen intends to build on those ties and BlackBerry’s security credentials to let these enterprise clients build and customize in-house corporate and productivity applications for their employees.
Can Malwarebytes Protect XP?
Malwarebytes has launched anti-exploit services to protect Windows users from hacking attacks on vulnerabilities in popular targets including Microsoft Office, Adobe software products and Java, a service which even offers protection for Windows XP users.
Consumer, Premium and Corporate versions of the service are available, and are designed to pre-emptively stop hackers from infecting Windows machines with malware.
“An exploit will typically first corrupt the memory of an application process, take control, then execute code,” said Malwarebytes director of special projects Pedro Bustamante.
“From the shell code it executes a payload that tells the exploit what to do and that in turn usually downloads malware from the internet and executes it. The final stage is usually where antivirus kicks in, when it’s being downloaded from the internet, and starts doing things like behavioural analysis to see if it’s malicious.
“We don’t care about that, what we do comes before then. We just look for exploit-like behaviour and block anything that looks like it at the shellcode or payload stages. We come into play before the malware even appears on the scene.”
The Consumer version of the anti-exploit service is free and offers basic browser and Java protection.
The Premium version costs $37.00 per user and adds Office and Adobe protection services as well as the ability to add custom shields to other internet-facing applications, like Messenger or Netflix.
The Corporate version costs$40.00 person user and offers complete anti-exploit protection and comes with Malwarebytes’ Anti-malware service and a toolkit for IT managers.
Bustamante explained that the technology is designed to help businesses and general web users defend against the new wave of exploit-based cyber attacks.
“Traditional security can’t deal with exploits. Every day we see people getting infected, even if they have the latest up-to-date antivirus readers, because of exploits,” he said. “This is why we care about the applications you run – Firefox, Chrome, Internet Explorer, Java, Acrobat [and Microsoft] Word, Excel [and] Powerpoint.”
Bustamante added that the service is doubly important for Windows XP users since Microsoft officially ceased support for the OS in April.
“We’re still seeing over 25 percent of our users running XP. For them this product is even more important,” he said.
“We see new zero-days if not every week, every month, and for XP users who are not getting any more patches from Microsoft this product will be essential.
“Every month Microsoft will be releasing security patches for newer versions of Windows. Every time Microsoft does this it’ll be a treasure map for hackers to find exploits on Windows XP.
“It’ll show them exactly where the vulnerabilities are, so every month will see an influx of new exploits targeting Windows XP.”
Is Apple Now Copying Google
PC Advisor has been going through Apple’s latest iOS 8 operating system and is finding features which appear to be a direct lift from Google. Of course it has to say that Apple is being brilliant and original about stealing the ideas. After it points out that Apple did not invent the music player but it did steal it better than anyone else.
The top 5 iOS 8 features Apple stole from Android include:
Typing suggestions: Start typing and suggested words will appear letter by letter. Hit the correct word and you save the time it would have taken to type the while word and it is a pretty intelligent selection process.
Okay Google: Hotword detection is also the basis of the Google Now Launcher that shipped with the Nexus 5. As long as your phone is awake, saying ‘Okay Google’ wakes up the voice assistant. In iOS 8 Apple has added something similar in the guise of ‘Hey Siri’, the ability to immediately engage Siri simply via a voice command.
Third-party keyboards: Google has long given Android users the opportunity to explore the world outside its own platform. Apple is allowing the same thing on its system now.
Widgets: Widgets have always been part of Android and Apple finally is letting it happen. Of course Apple is not entirely prepared to let you have full control of your device’s desktop. iOS 8 widgets are small app extensions that take up a spot in the Notification Center. Not as good as Android but better than a poke in the eye with a short stick.
Useful notifications: Android has long allowed developers to add up to two action buttons to a notification. So when the message pops up telling you that you have a message you can reply right from the notification, the relevant app opening as required. Now Apple can do that.
While it is accepted that ideas are copied, at least until one of the sides turns into a Patent Troll, what is strange about Apple is that it markets itself as the innovation hub that others follow. It appears that if this was ever true it is not the case now.