Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

6 of 10 Companies Approve BYOD

April 18, 2013 by  
Filed under Around The Net

Comments Off on 6 of 10 Companies Approve BYOD

More than six out of 10 companies allow or mandate the use of employee-owned mobile devices for work in order to increase productivity, according to a survey published on Tuesday.

While the BYOD (bring your own device) push has been at the forefront of press coverage, the majority of companies still provide at least a subset of devices to employees. One third of companies strictly mandate which devices can be used for work purposes and don’t allow any type of device provided by the employee, according to the survey conducted by the Computing Technology Industry Association (CompTIA), a nonprofit trade group.

The online survey of 502 U.S. IT and business executives was conducted in February. It also found that the most popular option, at 58%, was to have a mix of corporate-owned and employee-owned devices.

For 53% of those surveyed, the top reason for allowing employees to use or select their own devices was to increase productivity while employees are away from the office. Another reason was that employees like to use familiar devices.

Twelve percent of the respondents stated it was simply too difficult to stop employees from using their own devices.

CompTIA’s report said that companies looking to maximize the benefits of a mobile device-enabled workforce must “look beyond simply which devices are used and re-examine business processes and workforce needs.”

Companies should assess the specific needs of workers, rather than just deploying one device over another on a corporate-wide basis, said Seth Robinson, director, technology analysis, at CompTIA.

Source

Google Fights NSL Over Data Privacy

April 16, 2013 by  
Filed under Around The Net

Comments Off on Google Fights NSL Over Data Privacy

Google is fighting a National Security Letter (NSL) issued by the US government, with the Electronic Frontier Foundation (EFF) acknowledging it is one of the first firms to do so.

Google took the unusual step last month of revealing, albeit in vague terms, the number of NSLs it received from the US government. At the time the company said it was working with the authorities to improve transparency around the subject, but according to court filings it is also fighting against handing over users’ data.

In March, Google filed a petition to set aside a legal process. Kevan Fornasero, a lawyer for Google said in the filing that petitions “filed under Section 3511 of Title 18 to set aside legal process issued under Section 2709 of Title 18 must be filed under seal because Section 2709 prohibits disclosure of the legal process”.

Fornasero’s reference to Section 2709 refers to the ability of the FBI to issue NSLs and force the handover of user data. According to the EFF, Google is one of the first communications companies to fight an NSL, but because Section 2709 doesn’t allow firms to disclose the legal process, few people can be certain that others haven’t tried to stand up to the US government.

Matt Zimmerman, a lawyer for the EFF said, “The people who are in the best position to challenge the practice are people like Google. So far no one has really stood up for their users’ among large Internet service providers.”

Google has tried in recent years to provide users with some information on how it deals with government agencies’ requests for user data. If the firm can succeed in its fight against NSLs then it could open the floodgates for others to stand up against a law that some see to be nothing more than a snooper’s charter.

Source

Is Ubuntu Linux Spyware?

April 4, 2013 by  
Filed under Computing

Comments Off on Is Ubuntu Linux Spyware?

Richard Stallman has asked a South American free software association not to promote Ubuntu Linux at its events because it “spies on its users” by collecting its users’ desktop search activity and selling the data to Amazon.

Canonical released Ubuntu 12.10 last October with Amazon search integrated into its Dash desktop search function.

Although Ubuntu users can opt out and Canonical claims it anonymises users’ search information before sending it to Amazon, the change resulted in Ubuntu users being shown Amazon ads in response to desktop search queries.

The ‘feature’ has attracted a lot of criticism and might have led some users to defect to other Linux distributions.

When Stallman’s request was denied by the FLISOL event organiser with the excuse that it would limit user freedom of choice, Stallman fired off a response to the organisation’s entire mailing list on Sunday. Parts of his email are quoted below, as translated by Groklaw.

“The issue I raise is about what should happen at FLISOL events. Give away copies of Ubuntu or not? Promote Ubuntu or no? I asked the organisers of the event that they, as a policy, not distribute or promote Ubuntu.

“Freedom of users is something else, and there isn’t a conflict between a user’s freedom and my request. If someone decides to install Ubuntu, I would consider it a mistake, but it’s his own choice to do it. What I ask is that you don’t participate, help or suggest that he do it. I didn’t request that you block him from doing so.

“As a matter of principle, I don’t believe anyone has a right, morally, to distribute proprietary software, that is, software that deprives the users of freedom. When the user controls his own software, he can install what he wants and no one can stop him. But today’s issue isn’t about him, what he does, but rather what you do with him.”

As Stallman sent his email only yesterday, it’s not yet known whether FLISOL has reconsidered promoting Ubuntu at its free software events.

These points might seem like splitting hairs, but apparently Richard Stallman – the author of the GNU General Public Licence (GPL), as well as the founder and president of the Free Software Foundation – is serious about them.

Source

Is Apple Really Security Conscious?

March 27, 2013 by  
Filed under Security

Comments Off on Is Apple Really Security Conscious?

Is Apple proving how clueless it is about security by backing a method of replacing passwords with fingerprint readers?

Just days after a scandal where a South American hospital was staffed by phantom doctors who used silicon fingers of their colleagues to convince administrators’ finger print readers that they were working, Apple has decided that they are the perfect form of security.

Word on the street is that Apple is said to be planning to introduce an iPhone that can be unlocked by the owner’s fingerprint. Speculation about Apple’s plans for fingerprint recognition began last summer when the iPhone maker bought bio-metric security firm AuthenTec for $335 million.

It is believed that the iPhone 5S will have a fingerprint chip under the Home button, to “improve security and usability.” Meanwhile in an engineering journal, two Google security experts outlined plans for an ID ring or smartphone chip that could replace online passwords, which is a lot sexier than fingerprint scanning.

Source

AMD’s Richland Coming In June

March 26, 2013 by  
Filed under Computing

Comments Off on AMD’s Richland Coming In June

Richland is set to replace AMD’s Virgo platform, powered by Trinity processors, and this change will happen in June 2013, most likely coinciding with Computex 2013.

AMD has just launched the first batch of Richland mobile APUs and we still have to see some notebook designs hitting the market. We wrote about mobile Richland APUs.

As of late last year Desktop Richland was always set to launch in June 2013 and the fastest of them is the A10 6800K, clocked at 4.1GHz and 4.4 with Turbo. It also features Radeon HD 8670D graphics that run at 844 MHz. This is the fastest Richland part and it comes unlocked, ready to replace the current AMD A10 5800K. In Europe, the A10 5800K currently sells for 112, while in US the same CPU sells for $129.00 (boxed).

The alpha dog A10 6800K is followed by A10 6700, A8 6600K (Unlocked) and A8 6500. AMD has a mix of 100W and 65W quad-core Richland desktop SKUs. There will be a single A6 6400K (Unlocked) SKU and the A4 6300, both dual-cores with 65W TDP.

Production ready samples were churned out in late January, while volume production is scheduled for late March 2013. The announcement was always scheduled for June 2013 and Richland last through most of 2013, until Kaveri with 28nm Steamroller comes on line.

Source

3G And 4G Modems Pose Security Threats

March 25, 2013 by  
Filed under Security

Comments Off on 3G And 4G Modems Pose Security Threats

Researchers Nikita Tarakanov and Oleg Kupreev analyzed the security of 3G/4G USB modems obtained from Russian operators for the past several months. Their findings were presented Thursday at the Black Hat Europe 2013 security conference in Amsterdam.

Most 3G/4G modems used in Russia, Europe, and probably elsewhere in the world, are made by Chinese hardware manufacturers Huawei and ZTE, and are branded with the mobile operators’ logos and trademarks, Tarakanov said. Because of this, even if the research was done primarily on Huawei modems from Russian operators, the results should be relevant in other parts of the world as well, he said.

Tarakanov said that they weren’t able to test baseband attacks against the Qualcomm chips found inside the modems because it’s illegal in Russia to operate your own GSM base station if you’re not an intelligence agency or a telecom operator. “We’ll probably have to move to another country for a few months to do it,” he said.

There’s still a lot to investigate in terms of the hardware’s security. For example, the SoC (system on a chip) used in many modems has Bluetooth capability that is disabled from the firmware, but it might be possible to enable it, the researcher said.

For now, the researchers tested the software preloaded on the modems and found multiple ways to attack it or to use it in attacks.

For one, it’s easy to make an image of the USB modem’s file system, modify it and write it on the modem again. There’s a tool available from Huawei to do modem backup and restore, but there are also free tools that support modems from other manufacturers, Tarakanov said.

Malware running on the computer could detect the model and version of the active 3G modem and could write an image with malicious customizations to it using such tools. That modem would then compromise any computer it’s used on.

The researchers also found a possible mass attack vector. Once installed on a computer, the modem application — at least the one from Huawei — checks periodically for updates from a single server, Tarakanov said. Software branded for a specific operator searchers for updates in a server directory specific to that operator.

An attacker who manages to compromise this update server, can launch mass attacks against users from many operators, Tarakanov said. Huawei 3G modems from several different Russian operators used the same server, but there might be other update servers for other countries, he said.

Research in this area is just at the beginning and there’s more to investigate, Tarakanov said. Someone has to do it because many new laptops come with 3G/4G modems directly built in and people should know if they’re a security threat.

Source

Is Android Safer Than iOS?

March 21, 2013 by  
Filed under Computing

Comments Off on Is Android Safer Than iOS?

The general consensus is that iOS apps tend to be somewhat safer than their Android counterparts. Apple goes to great lengths to have apps vetted and as a result far fewer iOS apps end up with malware or security issues.

However, a new report fresh out of Appthority claims iOS apps have their fair share of issues and in some respects then can pose an even greater security risk than Android apps. The report covered the top 50 apps from the Apple App Store and Google Play and found that iOS apps exhibited riskier behaviour.

“The majority of iOS apps track for location (60%), share data with advertising or analytics networks (60%) and have access to the user’s contact list (54%). A small percentage of iOS apps also had access to the user’s calendar (14%),” the report found.

However, Android fans shouldn’t be too happy since their platform is not far behind. Half of them share data with ad networks or analytics companies, while 42 percent tracked location. Slightly better, but nothing to be proud about.
One of the most worrying findings is that both Android and iOS apps don’t do much to prevent personal data from leaking from our devices. Not a single iOS app analyzed in the study used encryption to send and receive data, and neither did 92 percent of Android apps.

So while it might seem that Android is a somewhat better platform for users with privacy concerns, both Google and Apple are pants at that sort of thing.

Source

AMD Goes Richland

March 18, 2013 by  
Filed under Computing

Comments Off on AMD Goes Richland

There have been more than enough leaks dealing with Richland, AMD’s successor to the Trinity powered Virgo platform, and we even had a chance to see some leaks regarding its successor, codenamed Kaveri. As you may already know, Richland is planned to last through 2013 and it is clear that this is very important chip for AMD.

Based on the Piledriver architecture and built using 32nm technology, Richland will feature an integrated GPU that will be upgraded to Radeon HD 8000 series, a generation ahead of Trinity. As you know, there has been a lot of leaks regarding the Richland parts and the quad-core A10-6800K with Radeon HD 8670D graphics is expected to pack quite a punch. Best of all, Richland will still use the same FM2 socket.

According to our sources, the NDA will be lifted on 12th of March, 8am EST, and we are sure that we will see at least a couple of reviews as well as some additional info regarding the price and the availability date.

Source

AMD Debuts R5000

March 7, 2013 by  
Filed under Computing

Comments Off on AMD Debuts R5000

AMD has released its Firepro R5000 graphics card that has video over IP capabilities.

AMD typically promotes its workstation class Firepro cards using CAD/CAM software, however this time the company is relying on remote viewing as the big selling point for its latest workstation graphics card. AMD’s Firepro R5000 has a GPU that uses its Graphics Core Next (GCN) architecture and Teradici PC video over IP technology to send graphics output over the network.

AMD used its Pitcarin GPU coupled to 2GB of GDDR5 memory in the Firepro R5000. However it isn’t AMD’s GPU that is the big selling point of the Firepro R5000 but rather Teradici’s Tera2240 chip that encrypts display output before sending it out on the network, while supporting up to 60fps (frames per second).

AMD’s Firepro R5000 is intended to be used in render farms, with each final image being sent over an IP network to the end host, and the firm claims that the technology can be used in education, financial and media environments.

The Firepro R5000 is a single slot graphics card that has two mini Displayport outputs that can drive two 2500×1600 displays, however it can also drive a further four remote displays at 1920×1200 resolution by sending data over its RJ45 Ethernet port.

Both AMD and Teradici talked up the low configuration overheads of the Firepro R5000.

Source…

AT&T Gets GM

March 5, 2013 by  
Filed under Around The Net

Comments Off on AT&T Gets GM

AT&T Monday said it will provide LTE wireless services to most General Motors automobiles starting in 2014 in the U.S. and Canada.

A multi-year agreement between AT&T and GM subsidiary OnStar calls for vehicles to continue getting OnStar’s safety and security services while adding information and entertainment services for backseat drivers, AT&T said.

Millions of vehicles will be affected, as AT&T rolls out LTE to reach 300 million people in the U.S. by the end of 2014.

The AT&T-GM announcement is part of an explosion in the number of devices connected to the Internet, many of them wirelessly, in what some have termed the “Internet of Things.”

“The is a big announcement for connected devices,” Glenn Lurie, president of emerging enterprises and partnerships at AT&T, said in an interview at Mobile World Congress here.

Source…

« Previous PageNext Page »