Malware Turns Computers Into Cellular Antenna
Comments Off on Malware Turns Computers Into Cellular Antenna
A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.
While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.
Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.
“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.
The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.
The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.
The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.
Did Microsoft Intentionally Delay The Surface Pro 4?
Comments Off on Did Microsoft Intentionally Delay The Surface Pro 4?
The latest rumors suggest that Microsoft was waiting to jack the latest Intel Skylake processor under its bonnet.
Redmond seemingly wants the new Surface Pro to be state of the art and be a tablet which is useful. Skylake will give it better battery life and performance with current industry standards like Bluetooth 4.1, Cat6 LTE, WiDi 6.0, and A4WP wireless charging weaved into it.
Intel will support the tablets through compatibility with 3D cameras and audio processing software plus better stylus interaction.
There is no sign of confirmation of the rumors. Microsoft has been quiet so far about the Surface Pro 4. We had been expecting it to highlight some of the better features of Windows 10.
However if the rumors are true it will be a hell of a lot better than the MacBook Air 2015 because it will feature innovation, rather than just being thin.
Latest news about its release date suggests a 2016 launch.
Yahoo Acquires Polyvore
August 12, 2015 by admin
Filed under Around The Net
Comments Off on Yahoo Acquires Polyvore
Yahoo Inc announced on Friday that it has agreed to acquire fashion start-up Polyvore to help drive traffic and strengthen its mobile and social offerings.
Yahoo, which did not disclose terms of the deal, said Polyvore will accelerate its ‘Mavens’ growth strategy.
The company has been focusing on four areas — mobile, video, native advertising and social — which it calls Mavens, to drive user engagement and ad sales as it battles intense competition from Google Inc and Facebook Inc .
Revenue from Mavens made up about one-third of the company’s total revenue in the quarter ended June 30.
The Mavens portfolio includes BrightRoll, mobile app network Flurry, mobile ad buying platform Yahoo Gemini and blogging site Tumblr.
Polyvore, the brainchild of 3 ex-Yahoo engineers, was started in 2007.
The Mountain View, California-based company allows users to mix-and-match articles of clothing and accessories and customize them into “sets”.
Polyvore’s co-founder and CEO Jess Lee was earlier part of Google Inc’s associate manager program, which Marissa Mayer headed before joining Yahoo as CEO.
Yahoo Unveils Livetext Mobile Messaging App
August 11, 2015 by admin
Filed under Around The Net
Comments Off on Yahoo Unveils Livetext Mobile Messaging App
Yahoo unveiled a mobile messaging app that combines texting with live one-on-one video.
The app, named Livetext, is video calling with a twist: there’s no audio. To communicate, users type texts and emojis that are overlaid onto the screen during the call.
The app’s format might sound restricting, but Yahoo says Livetext will help users to communicate more freely. The lack of audio, the company says, removes inhibitions that people might feel when they otherwise receive video calls in public.
“We wanted to bridge the gap between the simplicity and ease of texting, with the live feeling of calling,” said Adam Cahan, senior vice president of video, design and emerging products at Yahoo, during the app’s unveiling at an event in New York on Wednesday that was webcast.
Livetext was developed from scratch at Yahoo. Its development was aided by Yahoo’s acquisition last year of mobile messaging app MessageMe, the company said Wednesday. It’s yet another messaging app in a sea of competitors like Snapchat, WhatsApp and Facebook Messenger.
Still, Livetext is the latest attempt by Yahoo to provide a messaging app that resonates with users. It became available to download for free on Thursday for iOS and Android, in the U.S., U.K, Canada, Ireland, Germany, France, Hong Kong and Taiwan. Users will be able to text in English, French, German and Chinese using the app.
The app streams video only when two people are connected through the app at the same time. Users can search for friends in the app through their Livetext user name, or through the contacts list on their phone.
There is no time limit on calls placed through the app, and no way to save or archive the sessions. The video quality will depend on the strength of the data connection, although connections at 3G and above should suffice, Yahoo said.
It’s available on Android and the desktop, but not on iOS.
Is Wafer Output Headed Down?
United Microelectronics (UMC) expects to post an up to 5 per cent decrease in wafer shipments for the third quarter of 2015.
The outfit’s capacity rate will fall below 90 per cent for the first time after being flat out for ages.
UMC CEO Po-Wen Yen said the third quarter, would suffer from the inventory correction problems that were first noticed in the first quarter.
Current weakness in overall demand, partly due to the uncertainties in economic outlook, will prolong the inventory adjustment through the second half of 2015,” he said.
UMC used 94 per cent of its overall capacity in the second quarter of 2015, when the company shipped a record 1.54 million 8-inch equivalent wafers.
Shipments during the quarter were driven mainly by 28nm products, the foundry noted.
UMC reported consolidated revenues of $1.23 billion for the second quarter, down 6 per cent on last year. Gross margin came to 22.9 per cent compared with 24.3 per cent in the first quarter and 22.9 per cent in second.
UMC created net profits of $1.45 billion in the second quarter of 2015 – the highest level in nine quarters.
Looking into the third quarter, UMC expects to use 87-89 per cent of its overall capacity in the third quarter. Wafer shipments and ASPs will fall up to 5 per cent and about 3 per cent, respectively, on quarter.
Can OSX Make Macs Vulnerable To Rootkits?
Comments Off on Can OSX Make Macs Vulnerable To Rootkits?
The software genii at Apple have redesigned their OSX software to allow malware makers to make designer micro-software that can infect Macs with rootkits.
Obviously the feature is one that Apple software experts designed specifically for malware writers, perhaps seeing them as an untapped market.
The bug in the latest version of Apple’s OS X allows attackers root user privileges with a micro code which could be packed into a message.
Security researcher Stefan Esser said that this was the security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.
The OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Plainly the software genii did not believe that standard safeguards involving additions to the OS X dynamic linker dyld applied to them because they were protected from harm by Steve Job’s ghost.
This means that attackers to open or create files with root privileges that can reside anywhere in the OS X file system.
“This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem. And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege-escalation,” Esser said.
The vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability.
An Apple spokesman said that engineers are aware of Esser’s post of course they did not say they would do anything about it. They will have to go through the extensional crisis involved in realising that their product was not secure or perfect. Then the security team will have to issue orders, signed in triplicate, sent in, sent back, queried, lost, found, subjected to an internal inquiry, lost again, and finally bury it in soft peat for three months and recycled as firelighters.
Can Oracle Make Money Off Android?
Database outfit Oracle’s moves to try and copyright APIs appear to be part of an attempt for Oracle to make money on Android.
Oracle has asked a U.S. judge for permission to update its copyright lawsuit against Google to include the Android which it claims contains its Java APIs.
Oracle sued Google five years ago and is seeking roughly $1 billion in copyright claims if it manages to convince a court that its APIs are in Android it could up the damages by several billions.
Oracle wrote in a letter to Judge William Alsup on Wednesday that the record of the first trial does not reflect any of these developments in the market, including Google’s dramatically enhanced market position in search engine advertising and the overall financial results from its continuing and expanded infringement.
Last month, the US Supreme Court upheld an appeals court’s ruling that allows Oracle to seek licensing fees for the use of some of the Java language. Google had said it should use Java APIs without paying a fee.
Microsoft To Release Advanced Threat Analytics
Comments Off on Microsoft To Release Advanced Threat Analytics
Microsoft is very close to releasing Advanced Threat Analytics (ATA) the security sure-up that it first announced three months ago.
ATA, or MATA as we called it for our own small amusement, is the result of three months’ real world testing, and the culmination of enough user feedback to inform a final release.
That final release will happen in August, which should give you plenty of time to get your head around it.
Hmmm. Microsoft’s Advanced Threat Analytics seems like a very good idea focused on the enterprise.
— Kevin Jones (@vcsjones) May 4, 2015
Idan Plotnik, who leads the ATA team at Microsoft, explained in an Active Directory Team Blog post that the firm is working towards removing blind spots from security analytics, and that this release should provide a strong and hardy tool for the whacking away of hacking.
“Many security monitoring and management solutions fail to show you the real picture and provide false alarms. We’ve taken a different approach with Microsoft ATA,” he said.
“Our secret sauce is our combination of network Deep Packet Inspection, information about the entities from Active Directory, and analysis of specific events.
“With this unique approach, we give you the ability to detect advanced attacks and stolen credentials, and view all suspicious activities on an easy to consume, simple to explore, social media feed like attack timeline.”
The Microsoft approach is an on-premise device that detects and analyses threats as they happen and on a retrospective basis. Plotnik said that it combines machine learning and knowledge about existing techniques and tactics to proactively protect systems.
“ATA detects many kinds of abnormal user behaviour many of which are strong indicators of attacks. We do this by using behavioural analytics powered by advanced machine learning to uncover questionable activities and abnormal behaviour,” he added.
“This gives the ability for ATA to show you attack indicators like anomalous log-ins, abnormal working hours, password sharing, lateral movement and unknown threats.”
A number of features will be added to the preview release, including performance improvements and the ability to deal with more traffic, before general availability next month.
Microsoft To Open Source Radio Code
Microsoft has begun to open source some more of its code, this time for the Microsoft Research Software Radio (Sora).
“We believe that a fully open source Sora will better support the research community for more scientific innovation,” said Kun Tan, a senior researcher on the Sora project team.
Sora was created to combat the problem of creating software radio that could keep up with the hardware developments going on around it.
The idea behind it is to run the radio off software on a multi-core PC running a basic operating system. In the example, it uses Windows. But then it would.
A PCIe radio control board is added to the machine with signals processed by the software for transmission and reception, while the RF front-end, with its own memory, interfaces with other devices.
The architecture also supports parallel processing by distributing processing pipelines to multiple cores exclusively for real-time SDR tasks.
Sora has already won a number of awards, and the Sora SDK and API were released in 2011 for academic users. More than 50 institutions now use it for research or courses.
As such, and in line with the groovy open Microsoft ethos, the software has now been completely open sourced, with customizable RF front-ends, customizable RCB with timing control and synchronization, processing accelerators and support for new communication models such as duplex radios.
The Sora source code is now up on GitHub. Use cases already in place include TV whitespace, large scale MIMO and distributed MIMO systems.
Microsoft has made a number of moves towards open sourcing itself over the past year. Most notably, The .NET Framework at the heart of most Windows programs was offered up to the newly created .NET Foundation.
It was announced yesterday that Google is releasing its Kubernetes code to the Linux Foundation to set up a standardized format for containerization.
Xerox To Revamp Healthcare IT Business
Xerox Corp said it would overhaul its healthcare IT business and record a related impairment charge of about $145 million in the second quarter.
The company said it would end sales of its integrated eligibility system, a software system which can support operations in call centers and document imaging.
The healthcare business provides administrative and care management solutions to state Medicaid programs and government healthcare programs.
“Going forward, Xerox will focus on managing and completing the current Health Enterprise implementations, and will be highly selective in responding to new Medicaid Management Information System opportunities,” the company said on Friday.
The healthcare business contributes “$2 billion plus” to total revenue, a company spokeswoman said. The company reported total revenue of $19.54 billion for 2014.
“Basically, they are focusing their government healthcare business away from less profitable initiatives that they were pursuing. I see it as a positive,” Cross Research analyst Shannon Cross said.
“From a long-term stand point, it (Medicaid) is a profitable business,” Cross said.
Xerox, which has been shifting its focus to IT services from making printers and copiers, adjusted its earnings estimate for the quarter ended June to reflect the charge.
The company said it now expects earnings from continuing operations of 9-11 cents per share, below its prior guidance of 17-19 cents per share.
Shares of Xerox, which is expected to report second-quarter results on July 24, were up 1.6 percent at $10.79 in afternoon trading.