Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Satellite Phone Encryption Cracked

February 11, 2012 by  
Filed under Smartphones

Comments Off on Satellite Phone Encryption Cracked

German researchers claim to have cracked the algorithm that secures satellite phone transmissions.

Benedikt Driessen and Ralf Hund from Ruhr University have reverse engineered the GMR-1 and GMR-2 voice ciphers used in a lot of satellite systems. These are used by, among others, government agencies and the military.

Bjoern Rupp, CEO at GSMK Cryptophone said, “This breakthrough has major implications for the military, civilians engaged on overseas operations, or indeed anyone using satellite phones to make sensitive calls in turbulent areas.”

Their report is titled “Don’t Trust Satellite Phones” and shows how someone with a “suitably programmed computer” and software radio capable of receiving satellite frequencies can hack calls. These include ones made by disaster relief agencies and the military.

Source…

Can Hackers Attack A Trains Network?

January 7, 2012 by  
Filed under Around The Net

Comments Off on Can Hackers Attack A Trains Network?

Security expert Professor Stefan Katzenbeisser of Technische Universität Darmstadt told a security conference in Berlin that the GSM-R which is being installed in train networks makes them vulnerable to hackers.

Katzenbeisser said that the new system was vulnerable to “Denial of Service” attacks and, while trains could not crash, service could be disrupted for quite some time. Speaking to the Chaos Communication Congress he said that Network Rail is currently installing GSM-R across the British railway network.

It uses the similar technical standards to 2G mobile networks and is due to replace older signalling technology in southern England next year, and throughout the whole country in 2014. But train switching systems, which enable trains to be guided from one track to another at a railway junction, have historically been separate from the online world. If they were connected to the internet as they are in GSM-R they could be hit by Denial of Service attacks.

Source…

Is Qualcomm A Threat To Intel?

December 29, 2011 by  
Filed under Computing

Comments Off on Is Qualcomm A Threat To Intel?

Intel tried to do gaming graphics cards and it failed, but when it comes to CPUs for desktop and notebooks, it is currently dominating the market. Even the graphics used in Intel’s latest integrated CPUs these days are quite decent for multimedia and even some basic gaming.

Still, Intel is now shifting its focus and it sees Qualcomm as its main competitor in years to come. We heard this from high ranked sources from within Intel who believe that Qualcomm is the only ARM company that has it all, and Intel wants to take it on.

Intel is carefully watching Nvidia and Texas Instruments, again two strong ARM players, but it still thinks Qualcomm has better time to market, more customers and a much stronger portfolio.

Intel should start shipping Medfield just in time for Windows 8, and in case you’ve missed it, Medfield is a SoC (System on Chip) platform that should find its place to a few tablets and probably even some phones next year. Since Intel is trying to speed development up and put as much pressure on ARM players as possible, its next generation SoC will also come before the end of 2012, and it will use the advanced 22nm process, something we won’t see in ARM chips next year.

.

Source…

China Denies Hack Attack

November 2, 2011 by  
Filed under Security

Comments Off on China Denies Hack Attack

China has denied involvement in hacking US environment monitoring satellites.

Last week the US-China Economic and Security Review Commission released a draft report about several incidents where US satellites were interfered with in 2007 and 2008.

The Commission did not say that the attacks were traced back to China, but it did cite China’s military as a prime suspect, due to the similarity of the techniques used with “authoritative Chinese military writings” on disabling satellite control.

The hackers gained access to the satellites on at least four occasions through a ground station in Norway. The unauthorised access lasted for between two and 12 minutes. While the attacks did no real damage, they did demonstrate that it is possible to hijack satellites, which is a worrying realisation when military satellites are taken into consideration.

China has a bad reputation throughout the world for alleged cyber attacks, often being the first to blame when a major attack has been discovered. The US has not been the only target either, with alleged attacks against Canada and France having been reported earlier this year.

“[The US] has always been viewing China with colored lenses. This report is untrue and has ulterior motives. It’s not worth a comment,” said Hong Lei, a spokesperson for the Chinese Foreign Ministry, according to Reuters.

Source….

Intel, Samsung Behind New Phone OS

October 3, 2011 by  
Filed under Smartphones

Comments Off on Intel, Samsung Behind New Phone OS

Two Linux software groups have decided to collaborate, they said on Wednesday, to develop a new operating system for cellphones and other devices in partnerships with Intel and Samsung Electronics.

However, analysts said the new Tizen platform is likely to struggle to attract wider developer and manufacturer support to compete with the dozen or so other mobile operating systems in a market dominated by Apple and Google’s Linux-based Android.

Even industry majors Nokia and Hewlett-Packard have canceled their mobile platforms this year.

“The best hope for them is that big operators get worried by Android’s increasing smartphone dominance and decide to consciously switch their allegiances to rival platforms to restrict Google’s huge influence over the mobile market,” said analyst Neil Mawston from Strategy Analytics.

LiMo Foundation and the Linux Foundation said the new Tizen platform is an open-source, standards-based software platform that supports multiple devices including smartphones, tablets, smart TVs, netbooks and in-vehicle ‘infotainment’ systems.

The initial release is planned for the first quarter of 2012, enabling the first devices using Tizen to come to market in mid-2012, the two groups said.

Read More….

The First PC Had a Birthday

August 20, 2011 by  
Filed under Computing

Comments Off on The First PC Had a Birthday

The year was 1981 and IBM introduced its IBM PC model 5150 on August 12th, 30 years ago today.

The first IBM PC wasn’t much by today’s standards. It had an Intel 8088 processor that ran at the blazing speed of 4.77MHz. The base memory configuration was all of 16kB expandable all the way up to 256kB, and it had two 5-1/4in, 160kB capacity floppy disk drives but no hard drive.

A keyboard and 12in monochrome monitor were included, with a colour monitor optional. The 5150 ran IBM BASIC in ROM and came with a PC-DOS boot diskette put out by a previously unknown startup software company based out of Seattle named Microsoft.

IBM priced its initial IBM PC at a whopping $1,565, and that was a relatively steep price in those days, worth about $5,000 today, give or take a few hundred dollars. In the US in 1981 that was about the cost of a decent used car.

Because the IBM PC was meant to be sold to the general public but IBM didn’t have any retail stores, the company sold it through US catalogue retailer Sears & Roebuck stores.

Subsequently IBM released follow-on models through 1986 including the PC/XT, the first with an internal hard drive; the PC/AT with an 80286 chip running at 6MHz then 8MHz; the 6MHz XT/286 with zero wait-state memory that was actually faster than the 8MHz PC/AT and (not very) Portable and Convertible models; as well as the ill-fated XT/370, AT/370, 3270 PC and 3270/AT mainframe terminal emulators, plus the unsuccessful PC Jr.

Read More….

EMC’s Data Breach Cost $66 Million

August 5, 2011 by  
Filed under Internet

Comments Off on EMC’s Data Breach Cost $66 Million

Between April and June 2011, EMC spent $66 million handling the fallout from a March cyber attack against its systems, which resulted in the compromise of information relating to the SecurID two-factor authentication sold by EMC’s security division, RSA.

That clean-up figure was disclosed last week during an EMC earnings call, by David Goulden, the company’s chief financial officer. It doesn’t include post-breach expenses from the first quarter, when EMC began investigating the attack, hardening its systems, and working with customers to prevent their being exploited as a result of the attacks.

In spite of the breach, EMC reported strong second-quarter financial results, earning consolidated revenue of $4.85 billion, which is an increase of 20% compared with the same period one year ago. Meanwhile, second-quarter GAAP net income increased by 28% from the same period last year, to reach $546 million. The company saw large growth in its information infrastructure and virtual infrastructure products and services, including quarterly revenue increases of 19% for its information storage group.

Those results led executives to increase their financial outlook for 2011 and predict consolidated revenue in excess of $19.8 billion, which would be a 16% increase from EMC’s 2010 revenues of $17 billion.

Read More….

IBM Debuts Fast Storage System

July 30, 2011 by  
Filed under Computing

Comments Off on IBM Debuts Fast Storage System

IBM

With an eye toward helping tomorrow’s data intensive organizations, IBM researchers have developed a super-fast storage system capable of scanning in 10 billion files in 43 minutes.

This system easily bested their previous system, demonstrated at Supercomputing 2007, which scanned 1 billion files in three hours.

Key to the increased performance was the use of speedy flash memory to store the metadata that the storage system uses to locate requested information. Traditionally, metadata repositories reside on disk, access to which slows operations.

“If we have that data on very fast storage, then we can do those operations much more quickly,” said Bruce Hillsberg, director of storage systems at IBM Research Almaden, where the cluster was built. “Being able to use solid-state storage for metadata operations really allows us to do some of these management tasks more quickly than we could ever do if it was all on disk.”

IBM foresees that its customers will be grappling with a lot more information in the years to come.

“As customers have to store and process large amounts of data for large periods of time, they will need efficient ways of managing that data,” Hillsberg said.

For the new demonstration, IBM built a cluster of 10 eight-core servers equipped with a total of 6.8 terabytes of solid-state memory. IBM used four 3205 solid-state Storage Systems from Violin Memory. The resulting system was able to read files at a rate of almost 5 GB/s (gigabytes per second).

Read More….

Defense Dept. IT Is ‘Stone Age’

July 26, 2011 by  
Filed under Computing

Comments Off on Defense Dept. IT Is ‘Stone Age’

U.S. Marine Corps Gen. James “Hoss” Cartwright, vice chairman of the Joint Chiefs of Staff, issued a stinging critique of the Defense Department’s IT systems and said he sees much room for improvement.

Cartwright, who was speaking at the FOSE information technology conference in Washington,DC, said the DOD is sending increasing amounts of data, such as video, to soldiers on the battlefield, and it’s beginning to build an architecture “that starts to take us where we need to be.” But Cartwright quickly tempered that.

“Quite frankly, my feeling is — at least being a never-satisfied person — the department is pretty much in the Stone Age as far as IT is concerned,” Cartwright said.

Cartwright cited problems with proprietary systems that aren’t connected to anything else and are unable to quickly adapt to changing needs. “We have huge numbers of data links that move data between proprietary platforms — one point to another point,” he said.

The most striking example of an IT failure came during the second Gulf War, where the Marines and the Army were dispatched in southern Iraq.

Read More…..

Japan Takes 1st Place On Supercomputer List

June 22, 2011 by  
Filed under Computing

Comments Off on Japan Takes 1st Place On Supercomputer List

A Japanese computer has earned the number one spot on the Top 500 supercomputer list, ending China’s short reign of just six months. At 8.16 petaflops (quadrillion floating-point calculations per second), the K computer is more powerful than the next five systems combined.

The K computer’s performance was measured using 68,544 SPARC64 VIIIfx CPUs each with eight cores, for a total of 548,352 cores, almost twice as many as any other system on the Top500 list. The computer is still being put together, and when it enters service in November 2012 will have more than 80,000 SPARC64 VIIIfx CPUs according to its manufacturer, Fujitsu.

Japan’s ascension to the top means that the Chinese Tianhe-1A supercomputer, which took the number 1 position in November last year, is now in second spot with its 2.57 petaflops. But China continues to grow the number of systems it has on the list, up from 42 to 62 systems. The change at the top also means that Jaguar, built for the U.S. Department of Energy (DOE), is bumped down to third place.

Read More….

« Previous PageNext Page »