Adobe Gives Up On Windows XP
Adobe said today that the current CS6 version of Photoshop will be the last one to support the operating system.
Adobe Product Manager Tom Hogarty said in a blog post that the Photoshop team would like to provide advanced notice that Photoshop CS6 (13.0) will be the last major version of Photoshop to support Windows XP. He said that modern performance-sensitive software requires modern hardware graphics interfaces that Windows XP lacks, in particular a way to tap into the power of GPUs. By only working on newer operating systems and hardware Adobe can bring in significantly better performance.
Photoshop CS6 already demonstrates that relying on a modern operating system, graphics cards/GPUs and graphics drivers can lead to substantial improvements in 3D, Blur Gallery and Lighting Effect features not available to Windows XP customers, he said.
Adobe hopes that by providing this information early it will help you understand our current decisions around operating system support and where we we’re headed with future releases of Photoshop. It is hard to see how any serious user of Adobe products could be using an XP machine anyway. The move away from XP started with CS 5 which only ran on Vista.
Kaspersky Finds New Malware
Kaspersky Lab has discovered three Flame spyware related malware threats that it said use “sophisticated encryption methods”.
Kaspersky claims that it uncovered the three new hostile programs while analysing a number of Command and Control (C&C) servers used by Flame’s creators.
“Sophisticated encryption methods were utilised so that no one, but the attackers, could obtain the data uploaded from infected machines,” the firm’s statement read.
“The analysis of the scripts used to handle data transmissions to the victims revealed four communication protocols, and only one of them was compatible with Flame.
“It means that at least three other types of malware used these Command and Control servers. There is enough evidence to prove that at least one Flame-related malware is operating in the wild.”
The discovery of the three programs indicates that Flame’s Command and Control platform was being developed in 2006, four years earlier than first thought.
Flame was originally uncovered in May targeting Iranian computer systems. The malware drew widespread concerns within the security industry regarding its advanced espionage capabilities.
The full scale of Flame and its overarching implications remain unknown, despite the ongoing joint research campaign being mounted by Kaspersky, IMPACT, CERT-Bund/BSI and Symantec.
“It was problematic for us to estimate the amount of data stolen by Flame, even after the analysis of its Command and Control servers,” said Kaspersky’s chief security expert, Alexander Gostev.
Following the discovery of the three new related programs, Kaspersky’s chief malware expert Vitaly Kamluk told The INQUIRER that Flame is not the only one in this big family.
“There are others and they aren’t just other known malwares such as Stuxnet, Gauss or Duqu,” he said. “They stay in the shadows and no one has published anything about them yet. Others were probably used for different campaigns.”
Kamluk added that it is “very possible” there are more than the three listed in Kaspersky’s report.
“They started building RedProtocol, yet another ‘language’ for unknown malware. No known client types are using that one, which means that there is even more malware out there,” he added.
AMD Details Vishera
AMD will launch three eight-core processors led by the AMD FX 8350 but it also plans to launch two six-core processors for people who like to spend a bit less.
The AMD FX6350 is a 125W six-core with a 3.9GHz base clock and 4.2 maximum turbo core clock. It comes with 14MB of cache, supports DDR 3 1866 and comes in AM3+. Naturally this is a 32nm SOI product just as its predecessor as AMD is not ready for 22nm fun yet.
The runner up is a 3.5GHz clocked six core that turbos to 4.1GHz, all that while staying in 95W TDP envelope. The name is FX 6300 and these two boys should launch together. The rest of the specification is the same as with faster brother. These two processors will replace the Zambezi based FX 6120 and FX 6100. These parts as well as FX 6200 that is also a part of Zambezi legacy are all selling between $190 and $250 which is definitely not a lot of money for quite powerful processors.
Does 4G Pose A Security Threat?
Could 4G Networks give way for more high-risk mobile security implications; Symantec is warning of such a wave of threats.
“We could see a move to the sort of threats that we already see on the wireless and fixed connected network,” John said. “Malware that you usually have on fixed networks, like botnets.
“There aren’t many botnets on mobile devices because the bandwidth’s not there to support it, once you go on to 4G [hackers] could start infecting systems.”
To ensure that enterprises avoid these these security threats, John advised that businesses need to be on their toes more than ever, look closely at everything that’s coming into the network, and not trust anything.
“Companies need to make sure that where traditionally it’s been a firewall with a perimeter with everything in a timeline environment,” John said. “What they need to look at is ‘what are my employees doing’, ‘what information is being shared’ and ‘how do we ensure our information is being protected no matter where it may be’, whether its mobile device, across networks or sitting in a cloud service.”
“This is a change we are going through, but 4G is going to push the need for that change even more so,” she added.
According to John, 4G will also be detrimental to businesses in the way it will add a greater burden for them to ensure that cloud services and mobility – what she calls “two of the biggest security challenges for enterprises and their employees” – are up to scratch.
AMD Cuts Radeon Prices
After the recent price cut back in July, that included a $50 price cut for HD 7970, HD 7950 and HD 7870 graphics cards, AMD has apparently decided to cut some of these prices even further taking the HD 7950 3GB graphics card down to $320, or just in line with Nvidia’s recently release GTX 660 Ti graphics card.
AMD has already dropped the HD 7970 from $479 to $429, HD 7950 from $399 to US $349 and the HD 7870 down from $349 to $299. The new price cut skips the HD 7970 graphics card but includes the HD 7950, HD 7870 as well as the 1 and 2GB versions of the HD 7850.
The most important is probably the price cut for the 3GB HD 7950 which battles it out with Nvidia’s recently released GTX 660 Ti. The HD 7950 3GB is, according to the report, will receive a $30 price cut placing it at $320. The HD 7870 2GB graphics card got another $50 price cut pushing it down to $250 which probably makes it one of the most interesting mid-range graphics cards on the market.
AMD also decided to drop price on 1 and 2GB version of the HD 7850 graphics card taking them down by $40 to $190 and $210, respectively.
Windows 8 ‘Grace Period’ Ends
Microsoft has halted the 30-day grace period, a trademark of Windows 7, in the retail copies of Windows 8, requiring that users provide a product key during setup.
The change runs counter to previous practice by the Redmond, Wash. developer. With Windows 7, for example, users could run the OS for 30 days before activating the copy by providing a legitimate key.
That “grace period” was used by some to evaluate the software prior to purchasing, to save up to $100 by using an “upgrade” license to install the OS on a newly-formatted hard drive, and to create physical partitions or virtual machines for quick testing purposes.
Because Windows 8 handles activation differently, the grace period has been eliminated.
As several blogs have noted, customers must enter a unique product key — a 25-character alpha-numeric string — to proceed during Windows 8 setup. Failure to do so stops the process in its tracks. The Consumer Preview and Release Preview used this technique too, although Microsoft provided users a generic key for those sneak peeks.
Once Windows 8 is installed — assuming the machine is connected to the Internet — it automatically seeks out a Microsoft server to verify that the key is valid and then activates the OS. “If the licensed computer is connected to the Internet, the software will automatically connect to Microsoft for activation,” states the end-user licensing agreement, or EULA, for Windows 8 Pro.
Chase Building 1/2 Billion Dollar Data Center
August 24, 2012 by admin
Filed under Around The Net
Comments Off on Chase Building 1/2 Billion Dollar Data Center
The enthusiastic backer of Enron and serial over charger of mortgage payers, JPMorgan Chase has just splashed out on a new $500 million data center.
CEO Jamie Dimon announced the move which practically everyone in the IT industry finds a bit strange. While Chase is the US’s largest bank, the new facilities are a little big by anyone’s standard. It is about the same about of money that Google and Microsoft in their largest data centres for their cloud networks.
Dimon cited the figure as one of the advantages of being a big size. It can afford to invest cash in this way. Size lets Chase build a $500 million data centre that speeds up transactions and invest billions of dollars in products like ATMs and apps that allow your iPhone to deposit cheques, he enthused.
JPMorgan Chase operates two large data centres in Delaware and a 400,000 square foot facility. It also acquired data centres in its deals for distressed rivals Bear Stearns and Washington Mutual in the early days of the 2008 financial crisis. So why it needs a huge new one is anyone’s guess.
Huawei Investigating Security Flaws
August 14, 2012 by admin
Filed under Network Services
Comments Off on Huawei Investigating Security Flaws
Huawei Technologies said on Thursday it was investigating claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last.
“We are aware of the media reports on security vulnerabilities in some small Huawei routers and are verifying these claims,” Huawei said in an email. The company added it uses “rigorous security strategies and policies” to protect the networks of its customers, while following industry standards and best practices concerning security.
“Huawei has established a robust response system to address product security gaps and vulnerabilities,” the company said. The company is also calling on industry to promptly report all product security risks so that the problems can be addressed and fixed, it said in its email.
The alleged security vulnerabilities were disclosed at the Defcon hackers conference this past Sunday by two security researchers. The vulnerabilities were found in the firmware of Huawei AR18 and AR29 series routers, which once exploited through the flaws, could be taken over via the Internet.
One of the researchers, Felix Lindner the head of security firm Recurity Labs, described the security of the Huawei devices he analyzed as “the worst ever”, and said there were bound to be more security flaws with the products.
Microsoft Gives Money To Hackers
Microsoft has given out more than $250,000 in prize money to Black Hat hackers who found ways to protect its software. Redmond’s first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and explosions of shimmering confetti.
The top prize of $200,000 went to doctoral student Vasilis Pappas. Pappas came up with a method to countering “the most popular attack technique” that Redmond is seeing at the moment. This is called Return-Oriented Programming which is a hacker technique that is often used to disable or circumvent a program’s computer security controls. Pappas came up with something called kBouncer which blocks anything that looks like an ROP attack from running.
Microsoft security response center senior director Mike Reavey said that Redmond posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks.
Windows Malware Hides In iOS App
Windows malware slipped past Apple’s eye and has been found tucked into software available on the company’s iOS App Store.
Although the malware, labeled a worm by Microsoft and tagged as “Win32/VB.CB” by the company, is harmless against Apple’s iOS and OS X operating systems, it may pose a threat to iTunes customers who download iPhone and iPad apps to their Windows PCs before syncing to their mobile devices.
A user reported Win32/VB.CB to Apple’s support forum around 10:30 a.m. ET Tuesday. The user, identified only as ”deesto,” said that his or her OS X antivirus warned that “Instaquotes-Quotes Cards for Instagram” was infected.