Acer Is The Latest Victim Of Computer Hacking
Comments Off on Acer Is The Latest Victim Of Computer Hacking
Taiwanese PC manufacturer Acer is investigating a cyber hacker attack that stole customer data from its Packard Bell division in Europe, the company said.
Acer said the security breach was limited to customers’ names, addresses, phone numbers, emails, and system serial numbers. No credit card data was stolen, it said. Acer provided no other details about the breach, and said the investigation was ongoing.
News of the breach was reported several days ago, after a hacker group called Pakistan Cyber Army claimed to have stolen the personal data of about 40,000 people from an Acer server in Europe. Acer did not comment on the attack at the time.
The Hacker News had published screen shots of the personal data and some of the source code that was stolen in the security breach. It also said that the Pakistan Cyber Army would issue a press release detailing more about their motives. But so far, no new information has surfaced from the hacking group.
Acer Launches Sandy Bridge Notebooks
Acer updated its Timeline notebook series with Intel’s Sandy Bridge family of CPUs. The Timeline X series will come in three sizes, 13.3-inch, 14-inch and 15.6-inch and they are about an inch thick. Furthermore, the notebooks will be equipped with Acer’s PowerSmart Technology that is supposed to provide battery life of up to nine hours on models with integrated graphics and up to eight hours for those models with discrete graphics.
Download Defense Added To Chrome Browser
Comments Off on Download Defense Added To Chrome Browser
Google has updated Chrome to version 12, adding a new feature that warns users when they’ve downloaded files from dangerous Web sites.
New to Chrome 12 is a tool that flags questionable files pulled from the Web. Chrome now shows an alert when users download some file types from sites that are on the Safe Browsing API (application programming interface) blacklist, which Google maintains.
The messages reads: “This file is malicious. Are you sure you want to continue?” If they wish, users can ignore the warning and install the file on their system’s hard drive.
“This warning will be displayed for any download URL that matches the latest list of malicious websites published by the Safe Browsing API,” said Google last April when it debuted the feature in an earlier edition of Chrome.
Safe Browsing already identifies suspicious or unsafe sites, then adds them to a blacklist. Chrome, Mozilla’s Firefox and Apple’s Safari all tap into Safe Browsing to warn users of risky sites before they actually visit them.
AMD’s Bulldozer Will Be Late
AMD has confirmed that their Bulldozer chip-set will be delayed until later in the summer.
The FX Series which is codenamed Zambezi is based on the Bulldozer architecture. Unfortunately, AMD didn’t provide an official date they just said that the FX Series is coming in “late summer”, which means do not expect to the chip until probably late August.
Cell Phones Can Be Dangerous
June 5, 2011 by admin
Filed under Smartphones
Comments Off on Cell Phones Can Be Dangerous
It appears that an Australian brain surgeon has called the latest report in reference to the report on the potential harmful effects of mobile phones as a wake-up call to users and the telecommunications industry.
Dr Teo, said he was “pleased” that at last there came conclusive proof that mobile phones caused brain tumours. He also went on to say that the report should serve as a ”wake up call’ that should alert both the public and the mobile phone industry to the link between mobile use and cancer.”
As you know a report was released by the World Health Organisation’s cancer research wing that said radio frequency electromagnetic fields generated by cell phones are “possibly carcinogenic to humans” and heavy usage could lead to a possible increased risk of glioma, a malignant type of brain cancer.
Microsoft’s IE Latest Flaw: ‘Cookiejacking’
Comments Off on Microsoft’s IE Latest Flaw: ‘Cookiejacking’
A technology security researcher has discovered a flaw in Microsoft Corp’s widely used Internet Explorer browser that he said may allow hackers to steal credentials to access FaceBook, Twitter and other websites.
He coined the technique as ”cookiejacking.”
“Any website. Any cookie. Limit is just your imagination,” said Rosario Valotta, an independent Internet security researcher based in Italy.
Hackers can exploit the flaw to access a data file stored inside the browser known as a “cookie,” which holds the login name and password to a web account, Valotta wrote.
Once a hacker has that cookie, he or she can use it to access the same site, said Valotta, who calls the technique “cookiejacking.”
The vulnerability affects all versions of Internet Explorer, including IE 9, on every version of the Windows operating system.
To take advantage of this flaw, the hacker must first persuade the victim to drag and drop an object across the PC’s screen before the cookie can be hijacked.
That sounds like a difficult task, but Valotta said he was able to do it fairly easily. He built a puzzle that he put up on Facebook in which users are challenged to “undress” a photo of an attractive woman.
“I published this game online on FaceBook and in less than three days, more than 80 cookies were sent to my server,” he said. “And I’ve only got 150 friends.”
Microsoft said there is little risk a hacker could succeed in a real-world cookiejacking scam.
“Given the level of required user interaction, this issue is not one we consider high risk,” said Microsoft spokesman Jerry Bryant.
Apple Admits To Security Issues
Apple has finally acknowledge and has promised an update for Mac OS X that will find and remove the MacDefender fake security software, and warn uninfected users when they download the infectious program.
The announcement — part of a new support document that the company posted late Tuesday — was the company’s first public recognition of the threat posed by what security experts call “scareware” or “rogueware.”
Apple has taken criticism for not publicly responding to the MacDefender threat.
“In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants,” Apple said in the document. “The update will also help protect users by providing an explicit warning if they download this malware.”
Apple also outlined steps that users with infected Macs can take to remove the scareware.
Andrew Storms, director of security operations with nCircle Security, was surprised that Apple said it would embed a malware cleaning tool in Mac OS X.
Google SEARCH Goes SSL
Google is finally taking privacy seriously to a degree by offering its users a secure form of searching while using Google Search. Moving forward users will have the opportunity to enable SSL (Secure Socket Layer) for added security. Be advised, the service will only cover the Google search and clicks made through Google to other non-secured sites will be visible.
Can Intel Tablets Take Business Away From iPads?
Comments Off on Can Intel Tablets Take Business Away From iPads?
Tablets based on Intel’s first dedicated tablet processor may not be a smash hit among consumers like Apple’s iPad, but they could find much better acceptance within enterprises, analysts said this week.
Apple’s iPad is the ‘Golden Child’, but Intel’s Oak Trail processor could bring a fresh crop of tablets that are more closely aligned to security, software and hardware needs of businesses, analysts said. By supporting the Windows 7 OS, Oak Trail tablets will integrate better than the iPad into IT environments relying on Windows.
Tablets with Intel’s 1.5GHz Atom Z670 processor from Fujitsu and Motion Computing went on sale this month and will start shipping in June. Fujitsu is taking orders for the Stylistic Q550 Slate PC tablet, which is priced starting at US$729. Motion Computing is taking orders for the CL900 Tablet PC, which is priced starting at $899. The business tablets come with Microsoft’s Windows 7 OS and include solid-state drive storage. Intel has said 35 devices based on the Oak Trail chip will become available starting in May.
Apple may be spurring consumer tablet innovation, but computing needs are very different in the corporate world, said Stephen Baker, vice president of industry analysis at NPD. Outside the Apple ecosystem, there is a whole world of corporate applications and computing needs driven by Windows, Baker said.
Google Facing DOJ Probe
May 13, 2011 by admin
Filed under Around The Net
Comments Off on Google Facing DOJ Probe
Google is under investigation by the U.S. Department of Justice concerning practices within its advertising program, and has set aside $500 million for a potential resolution fund, the company said in a regulatory filing on Tuesday.
In its quarterly report filed with the U.S. Securities and Exchange Commission, Google said that in May it accrued $500 million for the three-month period ended March 31, 2011 in connection “with a potential resolution of an investigation by the United States Department of Justice into the use of Google advertising by certain advertisers”.
Although it cannot predict the ultimate outcome of the matter, Google said that it believes that it will not have a material adverse effect on its business, consolidated financial position, results of operations, or cash flows.
The company did not explain why the charge had been taken retrospectively on its first quarter earnings. It is also not clear to whom Google would have to make the payment in the event of settlement.
Google declined to comment, stating that it was a legal matter. The company has updated its first-quarter results press release on its web site, to reflect the new charge.