McAfee’s Biometric Software Coming Soon
Comments Off on McAfee’s Biometric Software Coming Soon
A McAfee security product that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.
“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.
Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.
An average user has about 18 passwords and biometric authentication will make PCs easier to use, Skaugen said.
Biometric authentication isn’t new. It’s being used in Apple Pay, where fingerprint authentication helps authorize credit card payments through the iPhone or iPad. Intel has been working on multiple forms of biometric authentication through fingerprint, gesture, face and voice recognition.
McAfee is owned by Intel, and the chip maker is building smartphone, tablet and PC technology that takes advantage of the security software. Intel has also worked on biometric technology for wearable devices like SMS Audio’s BioSport In-Ear Headphones, which can measure a person’s heart rate.
Intel also wants to make PCs and tablets easier to use through wireless charging, display, docking and data transfers. Such capabilities would eliminate the need to carry power brick and cables for displays and data transfers. Such capabilities will start appearing in laptops next year with sixth-generation Core chips code-named Skylake, which will be released in the second half.
Symantec Uncovers Advanced Spying Malware
Comments Off on Symantec Uncovers Advanced Spying Malware
An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.
Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.
The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”
Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.
Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”
Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.
Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.
Silk Road 2.0 Shutdown
U.S. governmnent authorities said they have shut down the successor website to Silk Road, an underground online drug marketplace, and charged its alleged operator with conspiracy to commit drug trafficking, computer hacking, money laundering and other crimes.
Blake Benthall, 26, was arrested last Wednesday in San Francisco and was expected to make an initial court appearance in federal court there later on Thursday.
The charges against Benthall carry a maximum sentence of life in prison.
A lawyer for Benthall could not immediately be identified.
Silk Road 2.0 was launched late last year, weeks after authorities had shuttered the original Silk Road website in October and arrested its alleged owner, Ross Ulbricht, who went by the online alias, Dread Pirate Roberts.
“Let’s be clear – this Silk Road, in whatever form, is the road to prison,” Manhattan U.S. Attorney Preet Bharara, whose office is prosecuting both cases, said in a statement.
Benthall, known as “Defcon” online, became the operator of Silk Road 2.0 in December, one month after an unnamed co-conspirator launched the site, according to prosecutors.
Silk Road 2.0 provided an online bazaar where users across the world could buy and sell drugs, computer hacking tools and other illicit items, using the digital currency Bitcoin as payment, authorities said.
As of September, the site was generating at least $8 million a month in sales, they said.
The government’s investigation included an undercover agent who was able to infiltrate the administrative staff of the website and interact directly with Benthall, prosecutors said.
Ulbricht, 30, has pleaded not guilty and is scheduled for trial in New York in January.
Intel Opens Up Core M
Intel has extended its Core M range of fanless mobile chips by adding four models to the three initial Core M processors launched at the IFA trade show in September.
Like those first fanless models, Intel’s new Core M processors are dual-core chips that support Hyperthreading in up to four threads and have thermal design power (TDP) ratings of 4.5W.
They’re faster than the initial Core M chips, with base clock speeds ranging from 800MHz to 1.2GHz and Turbo Boost speeds from 2GHz to 2.9GHz.
The firm’s initial Core M chips were also rated at 4.5W TDP but topped out at 1.1GHz and 2.6GHz under Turbo Boost.
These additional fanless mobile chips are configurable by system designers, in that OEMs can scale the chip speeds and power consumption up or down depending on the purpose and configuration of the device.
A compact tablet or notebook can conserve power by limiting processor speed, while a larger device can offer higher speed at the cost of higher power draw and heat.
Thus, these new Core M chips can be configured from 600MHz base clock speed and 3.5W TDP to 1.4GHz base clock speed and 6W TDP in the fastest model.
Intel has also boosted the integrated graphics processors in these latest Core M chips, offering GPU base clock speeds ranging from 300MHz to 900MHz, whereas the initial models supported 100MHz to 850MHz.
The detailed specifications of all of Intel’s Core M mobile processors are available on the firm’s website.
Intel said that these new fanless Core M processors will start hitting the market early next year.
Adobe Eases Privacy Concerns
November 14, 2014 by admin
Filed under Around The Net
Comments Off on Adobe Eases Privacy Concerns
Tests on the latest version of Adobe System’s e-reader software reveals the company is now collecting less data following a privacy-related row last month, according to the Electronic Frontier Foundation.
Digital Editions version 4.0.1 appears to only collect data on e-books that have DRM (Digital Rights Management), wrote Cooper Quintin, a staff technologist with the EFF. DRM places restrictions on how content can be used with the intent of thwarting piracy.
Adobe was criticized in early October after it was discovered Digital Editions collected metadata about e-books on a device, even if the e-books did not have DRM. Those logs were also sent to Adobe in plain text.
Since that data was not encrypted, critics including the EFF contended it posed major privacy risks for users. For example, plain text content could be intercepted by an interloper from a user who is on the same public Wi-Fi network.
Adobe said on Oct. 23 it fixed the issues in 4.0.1, saying it would not collect data on e-books without DRM and encrypt data that is transmitted back to the company.
Quintin wrote the EFF’s latest test showed the “only time we saw data going back to an Adobe server was when an e-book with DRM was opened for the first time. This data is most likely being sent back for DRM verification purposes, and it is being sent over HTTPS.”
If an e-book has DRM, Adobe may record how long a person reads it or the percentage of the content that is read, which is used for “metered” pricing models.
Other technical metrics are also collected, such as the IP address of the device downloading a book, a unique ID assigned to the specific applications being used at the time and a unique ID for the device, according to Adobe.
MDM Coming To Office 365
November 10, 2014 by admin
Filed under Smartphones
Comments Off on MDM Coming To Office 365
Microsoft will rollout mobile device management (MDM) capabilities to Office 365 in 2015, making it easier for firms to manage corporate data across a range of mobile devices, including those running iOS and Android as well as Windows.
Microsoft unveiled the updates coming to its Office 365 cloud-delivered productivity suite in 2015 at its TechEd Europe conference.
These will enable customers to apply security policies against devices that connect to Office 365 to ensure that email and documents can be accessed only by approved devices, plus the ability to remotely wipe Office 365 data if necessary.
Julia White, Microsoft general manager for Office 365, said that the updates will enable customers to offer “conditional access” to Office documents and email, such as ensuring that any device used by employees has not been jailbroken or rooted, which could potentially pose a security risk.
Administrators will be able to set policies directly from the Office 365 administration portal, and enforce the use of a Pin to secure access to the device. Any wipe of Office 365 content will not affect the user’s personal data, White added.
These MDM features coming to Office 365 are actually powered by Microsoft’s Intune cloud-based management service and are a subset of Intune’s capabilities, the firm disclosed.
Intune itself is also getting some upgrades that will enable customers to benefit from additional security features if they also subscribe to Intune.
These will include data leak prevention measures that enable policies to be applied against managed applications, preventing users from copying and pasting data from an Office 365 app to another, for example, or copying files from Office 365 to elsewhere on the device.
While these capabilities are built in to Office 365, Microsoft will also enable this to be extended to other applications using Intune app wrapper functionality, White said.
White also confirmed that Microsoft is working on an Android version of the Office for iPad suite of mobile productivity tools that the firm announced for Apple’s tablet platform earlier this year.
Microsoft’s Office announcement comes amid speculation that the firm will release Office for Android next month.
TSMC’s FinFet Coming In 2015?
TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late Q2 or early Q3.
For consumers, this means products based on TSMC 16nm FinFET silicon should appear in late 2015 and early 2016. The first TSMC 16nm FinFET product was announced a few weeks ago.
TSMC executive CC Wei said sales of 16nm FinFET products should account for 7-9% of the foundry’s total revenue in Q4 2015. The company already has more than 60 clients lined up for the new process and it expects 16nm FinFET to be its fastest growing process ever.
Although TSMC is not talking about the actual clients, we already know the roster looks like the who’s who of tech, with Qualcomm, AMD, Nvidia and Apple on board.
This also means the 20nm node will have a limited shelf life. The first 20nm products are rolling out as we speak, but the transition is slow and if TSMC sticks to its schedule, 20nm will be its top node for roughly a year, giving it much less time on top than earlier 28nm and 40nm nodes.
The road to 10nm
TSMC’s 16nm FinFET, or 16FinFET, is just part of the story. The company hopes to tape out the first 10nm products in 2015, but there is no clear timeframe yet.
Volume production of 10nm products is slated for 2016, most likely late 2016. As transitions speed up, TSMC capex will go up. The company expects to invest more than $10bn in 2015, up from $9.6bn this year.
TSMC expects global smartphone shipments to reach 1.5bn units next year, up 19 percent year-on-year. Needless to say, TSMC silicon will power the majority of them.
Intel Shows Wireless
Intel demoed its “no wires future” of wireless gigabit docking at its Intel Developer Forum (IDF) in California.
Intel wireless gigabit docking is a fully cable-free experience that includes wireless docking, wireless display and wireless charging. Intel demonstrated a reference design based on a next generation 14nm Intel processor on stage during its opening keynote on Tuesday.
Intel hopes to implement this technology by the end of 2015.
“Not only your wireless display, but storage, keyboard and mouse – all the other peripherals you have that have been weighing down our backpacks or strewn across our desk, we’re eliminating with one technology, and that’s wireless gigabit,” said an Intel expert on stage.
“It’s not only a secure and also localised connection – so you can use it in high dense areas such as in an office – but also extremely fast performing at over three times the performance of today’s WiFi.
“But while that’s cool we still have one more cord in our bag and let’s get rid of it: ditch that brick. That last thing that’s weighing us down is [resolved by] wireless power; the ease of use and installation it has is really going to be an advantage using the wireless resonance technology.”
The technology works over a simple receiver that goes into client devices, along with a resonance board that acts as a dock, which creates its own wireless hotspot.
Intel demonstrated how the standard will work using a laptop that automatically powered up and charged as soon as it reached the surface of the table due to the magnetic charging field built into the desk surface.
Intel said that this technology could also charge wireless Bluetooth earpieces, wearable devices, tablets and notebooks. However, it doesn’t have to be built into devices to work, as Intel said it can also be retrofitted into the cases of the devices we are carrying around.
Intel’s wireless gigabit technology is another push towards the firm’s vision of a cable-free future, meaning there’ll be no annoying wires or leads connecting computers to monitors, laptops to plug sockets or tablets to projectors.
The semiconductor giant first announced this view in August, saying that it’s looking to change the enterprise IT market with a strategy that will offer “three major experiences” in the office, that is, wireless display connectivity, wireless docking and wireless charging.
Intel Debuts A Slew Of Core M Chips
Comments Off on Intel Debuts A Slew Of Core M Chips
Intel’s new Core M chips — which bring PC-like performance to slim design tablets — will initially be in many Windows 8.1 tablets, but no Android devices are yet on the radar.
The chips will be in five to seven detachable tablets and hybrids by year end, and the number of devices could balloon to 20 next year, said Andy Cummins, mobile platform marketing manager at Intel.
Core M chips, announced at the IFA trade show in Berlin on Friday, are the first based on the new Broadwell architecture. The processors will pave the way for a new class of thin, large-screen tablets with long battery life, and also crank up performance to run full PC applications, Intel executives said in interviews.
“It’s about getting PC-type performance in this small design,” Cummins said. “[Core M] is much more optimized for thin, fanless systems.”
Tablets with Core M could be priced as low as US$699, but the initial batch of detachable tablets introduced at IFA are priced much higher. Lenovo’s 11.6-inch ThinkPad Helix 2 starts at $999, Dell’s 13.3-inch Latitude 13 7000 starts at $1,199, and Hewlett-Packard’s 13.3-inch Envy X2 starts at $1,049.99. The products are expected to ship in September or October.
Core M was also shown in paper-thin prototype tablets running Windows and Android at the Computex trade show in June. PC makers have not expressed interest in building Android tablets with Core M, but the OS can be adapted for the chips, Cummins said.
The dual-core chips draw as little as 4.5 watts, making it the lowest-power Core processor ever made by Intel. The clock speeds start at 800MHz when running in tablet mode, and scales up to 2.6GHz when running PC applications.
The power and performance characteristics make Core M relevant primarily for tablets. The chips are not designed for use in full-fledged PCs, Cummins said.
“If you are interested in the highest-performing parts, Core M probably isn’t the exact right choice. But if you are interested in that mix of tablet form factor, detachable/superthin form factor, this is where the Core M comes into play,” Cummins said.
For full-fledged laptops, users could opt for the upcoming fifth-generation Core processor, also based on Broadwell, Cummins said. Those chips are faster and will draw 15 watts of power or more, and be in laptops and desktops early next year.
New features in Core M curbed power consumption, and Intel is claiming performance gains compared to chips based on the older Haswell architecture. Tablets could offer around two more hours of battery life with Core M.
Is Windows ‘Threshold’ Enroute?
Microsoft will unveil a preview of “Threshold,” the current code name for Windows 8′s successor, as soon as next month, according to an online report on Monday.
ZDNet’s Mary Jo Foley, citing unnamed sources, said that Microsoft will deliver a “technical preview” of Threshold late in September or early in October. Previously, Foley had reported that Microsoft would offer a preview of some kind this fall.
Threshold may be officially named “Windows 9″ by Microsoft — the company has said nothing about either the code name or labeled the next iteration of its desktop and tablet OS — although there are arguments for dumping a numerical title because of the possible association with Windows 8, which has widely been pegged as a failure.
“Technical Preview” is a moniker that Microsoft has used in the past for its Office suite. For both Office 2013 and Office 2010, Microsoft used the term to describe an invitation-only sneak peek. Both application suites were later released as public betas prior to their official launch.
Windows, however, has used a different nomenclature. For 2012′s Windows 8, Microsoft called the early looks ”Developer Preview,””Consumer Preview” and “Release Preview,” all open to everyone. The first was analogous to an alpha, the second to a beta, and the third to a done-but-not-approved release candidate.
Windows 7, however, had used the more traditional “Beta” to describe the first public preview in early 2009. The previous fall, when Microsoft unveiled Windows 7, the firm had seeded an invite-only “pre-alpha” version, also dubbed a Developer Preview, of the OS to programmers and some influential bloggers.
Within hours, the Windows 7 Developer Preview leaked to file-sharing websites. Microsoft may have changed its practices for Windows 8, letting anyone download the first preview, because of the inevitably of leaks.
In an update to her blog of earlier today, Foley added that the “Technical Preview” nameplate notwithstanding, Microsoft would allow anyone to download Threshold/Windows 9 when it becomes available in the next few weeks.
If Microsoft does ship a preview soon and sets its sights on a second-quarter 2015 final release, it will have significantly accelerated the tempo from past practice. With Windows 7 and Windows 8, Microsoft offered its first previews 12 and 13 months, respectively, and the public beta 8 or 9 months, before launching the operating system.
Eight or nine months from September would be May or June 2015; that, however, assumes that the Technical Preview is of beta quality. The name itself hints at something less.
Microsoft appears eager to put Windows 8 behind it. It has stopped beating the drum about the OS and recently announced that it would not issue any additional major updates. Instead, the firm said last week, it will include improvements or new features in small packets using the same Windows Update mechanism that regularly serves security patches.