Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Web.com Latest Hacking Victim

September 1, 2015 by  
Filed under Computing

Comments Off on Web.com Latest Hacking Victim

Hackers gain unauthorized access to the computers of Internet services provider Web.com Group and stole credit card information of 93,000 customers.

According to a website set up by the company to share information about the incident, Web.com discovered the security breach on Aug. 13 as part of its ongoing security monitoring.

Attackers compromised credit card information for around 93,000 accounts, as well as the names and addresses associated with them. No other customer information like social security numbers was affected, the company said.

According to the company, the verification codes for the exposed credit cards were not leaked. However, there are websites on the Internet that don’t require such codes for purchases.

Web.com has notified affected customers via email and will also follow up with letters sent through the U.S. Postal Service. Those users can sign up for a one-year free credit monitoring service.

The company did not specify how the intruders gained access to its systems, but has hired a “nationally recognized” IT security firm to conduct an investigation.

Web.com provides a variety of online services, including website and Facebook page design, e-commerce and marketing solutions, domain registration and Web hosting. The company claims to have over 3.3 million customers and owns two other well known Web services companies: Register.com and Network Solutions.

Register.com and Network Solutions customers were not impacted by this breach unless they also purchased services directly from Web.com.

Source-http://www.thegurureview.net/aroundnet-category/web-com-latest-victim-of-credit-card-hacking.html

Apple TV Service Delayed Again

August 26, 2015 by  
Filed under Consumer Electronics

Comments Off on Apple TV Service Delayed Again

Apple Inc will push back rolling out its live TV service to at least next year, Bloomberg reported, citing people familiar with the iPhone maker’s plans.

The company had planned to introduce the service, which is delivered over the Internet, this year.

Discussions with broadcasters such as CBS Corp and Twenty-First Century Fox Inc to license programming are progressing slowly, and lack of content has led Apple to scrap plans to announce the service at a Sept. 9 event, Bloomberg said.

Apple also lacked the computer network capacity to ensure a good viewing experience, Bloomberg said.

The company still plans to introduce a more powerful version of its Apple TV set-top box at the event, which will be held in San Francisco.

Apple was aiming to price the new service at about $30 to $40 a month, media reports have said.

Source

Dropbox Beefs Up Security

August 25, 2015 by  
Filed under Around The Net

Comments Off on Dropbox Beefs Up Security

Two-factor authentication is widely regarded as a best practice for security in the online world, but Dropbox has announced a new feature that’s designed to make it even more secure.

Whereas two-step verification most commonly involves the user’s phone for the second authentication method, Dropbox’s new U2F support adds a new means of authenticating the user via Universal 2nd Factor (U2F) security keys instead.

What that means is that users can now use a USB key as an additional means to prove who they are.

“This is a very good advancement and adds extra security over mobile notifications for two-factor authentication,” said Rich Mogull, Securosis CEO.

“Basically, you can’t trick a user into typing in credentials,” Mogull explained. “The attacker has to compromise the exact machine the user is on.”

For most users, phone-based, two-factor authentication is “totally fine,” he said. “But this is a better option in high-security environments and is a good example of where the FIDO standard is headed.”

Security keys provide stronger defense against credential-theft attacks like phishing, Dropbox said.

“Even if you’re using two-step verification with your phone, some sophisticated attackers can still use fake Dropbox websites to lure you into entering your password and verification code,” the company explained in a blog post. “They can then use this information to access your account.”

Security keys, on the other hand, use cryptographic communication and will only work when the user is signing in to the legitimate Dropbox website.

Dropbox users who want to use the new feature will need a security key that follows the FIDO Alliance’s Universal 2nd Factor (U2F) standard. That U2F key can then be set up with the user’s Dropbox account along with any other U2F-enabled services, such as Google.

Source

Malware Turns Computers Into Cellular Antenna

August 19, 2015 by  
Filed under Security

Comments Off on Malware Turns Computers Into Cellular Antenna

A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.

While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.

Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.

“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.

The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.

The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.

The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.

Source

Will Qualcomm Unveil The Snapdragon 820 SoC

August 17, 2015 by  
Filed under Computing

Comments Off on Will Qualcomm Unveil The Snapdragon 820 SoC

Qualcomm is set to unveil its new Snapdragon 820 SoC on August 11 in LA and more details are being leaked than you would see at a Welsh leak recipe contest.

It appears that the new Snapdragon 820 will have the catchy title MSM8996 and it promises some significant performance improvements in key areas. We already know that it will not be catching fire, but it also has a 40 per cent GPU performance increase with its A530 GPU.

The device is also claimed to have a 30 per cent power improvement with 64b of shared virtual memory with the CPU.

Another big area of improvement is the Hydra CPU, which claims a 35 percent improvement compared to the Snapdragon 810.

The Snapdragon 820 will support 4k60 entertainment and high-speed data connectivity.

There are rumours that there will be a QFE3100 Envelope Tracking system this will not speed up mail in the criminally slow Italian Post Office, but should create a lower power and a thermal footprint. A dedicated low power sensor is integrated for always on use.

Another major upgrade compared to the older SoC is a switch from 20nm to 14nm FinFET manufacturing process. We are still expecting the Xiaomi Mi5 to be the first one to use it.

Source

Is Wafer Output Headed Down?

August 10, 2015 by  
Filed under Computing

Comments Off on Is Wafer Output Headed Down?

United Microelectronics (UMC) expects to post an up to 5 per cent decrease in wafer shipments for the third quarter of 2015.

The outfit’s capacity rate will fall below 90 per cent for the first time after being flat out for ages.

UMC CEO Po-Wen Yen said the third quarter, would suffer from the inventory correction problems that were first noticed in the first quarter.

Current weakness in overall demand, partly due to the uncertainties in economic outlook, will prolong the inventory adjustment through the second half of 2015,” he said.

UMC used 94 per cent of its overall capacity in the second quarter of 2015, when the company shipped a record 1.54 million 8-inch equivalent wafers.

Shipments during the quarter were driven mainly by 28nm products, the foundry noted.

UMC reported consolidated revenues of $1.23 billion for the second quarter, down 6 per cent on last year. Gross margin came to 22.9 per cent compared with 24.3 per cent in the first quarter and 22.9 per cent in second.

UMC created net profits of $1.45 billion in the second quarter of 2015 – the highest level in nine quarters.

Looking into the third quarter, UMC expects to use 87-89 per cent of its overall capacity in the third quarter. Wafer shipments and ASPs will fall up to 5 per cent and about 3 per cent, respectively, on quarter.

Source

Microsoft To Open Source Radio Code

August 3, 2015 by  
Filed under Computing

Comments Off on Microsoft To Open Source Radio Code

Microsoft has begun to open source some more of its code, this time for the Microsoft Research Software Radio (Sora).

“We believe that a fully open source Sora will better support the research community for more scientific innovation,” said Kun Tan, a senior researcher on the Sora project team.

Sora was created to combat the problem of creating software radio that could keep up with the hardware developments going on around it.

The idea behind it is to run the radio off software on a multi-core PC running a basic operating system. In the example, it uses Windows. But then it would.

A PCIe radio control board is added to the machine with signals processed by the software for transmission and reception, while the RF front-end, with its own memory, interfaces with other devices.

The architecture also supports parallel processing by distributing processing pipelines to multiple cores exclusively for real-time SDR tasks.

Sora has already won a number of awards, and the Sora SDK and API were released in 2011 for academic users. More than 50 institutions now use it for research or courses.

As such, and in line with the groovy open Microsoft ethos, the software has now been completely open sourced, with customizable RF front-ends, customizable RCB with timing control and synchronization, processing accelerators and support for new communication models such as duplex radios.

The Sora source code is now up on GitHub. Use cases already in place include TV whitespace, large scale MIMO and distributed MIMO systems.

Microsoft has made a number of moves towards open sourcing itself over the past year. Most notably, The .NET Framework at the heart of most Windows programs was offered up to the newly created .NET Foundation.

It was announced yesterday that Google is releasing its Kubernetes code to the Linux Foundation to set up a standardized format for containerization.

Source

Xerox To Revamp Healthcare IT Business

July 31, 2015 by  
Filed under Computing

Comments Off on Xerox To Revamp Healthcare IT Business

Xerox Corp said it would overhaul its healthcare IT business and record a related impairment charge of about $145 million in the second quarter.

The company said it would end sales of its integrated eligibility system, a software system which can support operations in call centers and document imaging.

The healthcare business provides administrative and care management solutions to state Medicaid programs and government healthcare programs.

“Going forward, Xerox will focus on managing and completing the current Health Enterprise implementations, and will be highly selective in responding to new Medicaid Management Information System opportunities,” the company said on Friday.

The healthcare business contributes “$2 billion plus” to total revenue, a company spokeswoman said. The company reported total revenue of $19.54 billion for 2014.

“Basically, they are focusing their government healthcare business away from less profitable initiatives that they were pursuing. I see it as a positive,” Cross Research analyst Shannon Cross said.

“From a long-term stand point, it (Medicaid) is a profitable business,” Cross said.

Xerox, which has been shifting its focus to IT services from making printers and copiers, adjusted its earnings estimate for the quarter ended June to reflect the charge.

The company said it now expects earnings from continuing operations of 9-11 cents per share, below its prior guidance of 17-19 cents per share.

Shares of Xerox, which is expected to report second-quarter results on July 24, were up 1.6 percent at $10.79 in afternoon trading.

Source

Darkode Hacking Forum Shut Down

July 29, 2015 by  
Filed under Computing

Comments Off on Darkode Hacking Forum Shut Down

Law enforcement agencies from 20 countries collaborated to cripple a major computer hacking forum, and U.S. officials filed criminal charges against a dozen people associated with the website, the U.S. Department of Justice announced.

Darkode.com on is displaying a message saying the site and domain had been seized by the FBI and other law enforcement agencies.

Darkode, a password-protected online forum for criminal hackers, represented one of the gravest threats to the integrity of data on computers across the world, according to David Hickton, U.S. attorney for the Western District of Pennsylvania. “Through this operation, we have dismantled a cyber hornets’ nest of criminal hackers which was believed by many, including the hackers themselves, to be impenetrable.”

Five of the defendants face charges in Hickton’s district.

Darkode allowed hackers and other cybercriminals to sell, trade and share information and tools related to illegal computer hacking, the law enforcement agencies alleged.

Before becoming a member of Darkode, prospective participants were allegedly vetted through a process that included an invitation by a member, the DOJ said in a press release. The prospective member then pitched the skill or products he or she could bring to the forum.

Darkode members allegedly used each other’s skills and products to infect computers and electronic devices of victims around the world with malware, the DOJ said.

The takedown of the forum and the charges announced Wednesday came after the FBI’s infiltration of Darkode’s membership.

Source

Oculus Buys Pepple

July 27, 2015 by  
Filed under Around The Net

Comments Off on Oculus Buys Pepple

Facebook’s Oculus unit announcd that it has agreed to acquire Israeli gesture recognition technology developer Pebbles Interfaces for an undisclosed amount.

The announcement was made in a blog posted by Oculus.

Israel’s Calcalist financial news website said the deal was worth tens of millions of dollars.

While other companies pioneering the virtual reality field focus on full-body movement, Pebbles’ technology detects and tracks hand movement. It is aimed primarily at gamers but also has applications for TV, computers, or smartphone operation while driving.

Recently Pebbles integrated its technology with Oculus glasses, which translate finger gestures into virtual movement through a camera mounted on the glass frame, Calcalist said.

Investors in Pebbles include Chinese mobile phone maker Xiaomi, Israeli venture capital fund Giza and U.S. storage firm SanDisk, Calcalist said.

Source

« Previous PageNext Page »