Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Intel’s Security Exec Jumps Ship

December 18, 2014 by  
Filed under Computing

Comments Off on Intel’s Security Exec Jumps Ship

Michael Fey has left Intel Security Group to become chief operating officer at Blue Coat. Blue Coat is apparently not the traditional garb of a British Holiday Camp entertainer, but apparently a privately owned network security company.

Fey was one of the few top McAfee managers to stay with the company after it was bought by Intel in 2011. McAfee is now part of Intel Security Group, where Fey had been chief technology officer. Fey said that his role at Blue Coat would be “very similar” to his old job but he was allowed to focus on the cloud and the advanced threats space more.

“Blue Coat had tremendous growth behind the scenes and now I get to focus on taking that growth and trying to get it to the billion-dollar revenue mark,” he told Reuters.

Since the $7.7 billion acquisition by Intel, McAfee has lost senior managers and key talent in technology development, research and sales. At Blue Coat, Fey will replace David Murphy, who will stay on as a strategic adviser to the board.

Source

Twitter To Track Mobile Users

December 11, 2014 by  
Filed under Around The Net

Comments Off on Twitter To Track Mobile Users

Twitter Inc has plans to start tracking what third-party apps are installed on users’ mobile devices so the social media company can deliver more tailored content, including ads, the company has revealed.

The feature, called “app graph,” will allow the company to see what other applications users may have installed on phones or other devices.

“To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in,” the company said on its site.

The posting also included instructions on how to turn the feature off. Twitter is not collecting data from within the applications, the posting noted.

Twitter, whose main service allows users to broadcast 140-character messages, has been searching for ways to re-invigorate user engagement and drive growth. As part of that effort, the company is considering creating additional mobile applications beyond its core messaging service.

Source

Samsung Moves To Block nVidia

December 10, 2014 by  
Filed under Computing

Comments Off on Samsung Moves To Block nVidia

Samsung has moved to try and block the sales of Nvidia chips in the US.

Samsung has filed a complaint with the U.S. International Trade Commission as part of patent war which appears to have broken out between the two chipmakers. Samsung claims Nvidia infringed several of its chip-related patents and for making false claims about its products. This is effectively counter-suing after Nvidia filed a suit against the company in September making more or less the same charges.

Nvidia accused Samsung and rival Qualcomm of infringing patents on its graphics-processing unit (GPU). Samsung, which had filed the lawsuit in a US federal court on November 4, is seeking damages for deliberate infringement of several technical patents, including a few that govern the way semiconductors buffer and use data.

The ITC complaint also named computer-parts manufacturers Biostar Microtech and Elitegroup. These things run and run and usually wind up with a settlement where both sides agree to keep the details quiet. The ITC is often used as leverage in such cases because it deals with things a little quicker and a product embargo to the US can be seriously damage a company’s wealth.

Source

McAfee’s Biometric Software Coming Soon

December 9, 2014 by  
Filed under Computing

Comments Off on McAfee’s Biometric Software Coming Soon

A McAfee security product that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.

“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.

Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.

An average user has about 18 passwords and biometric authentication will make PCs easier to use, Skaugen said.

Biometric authentication isn’t new. It’s being used in Apple Pay, where fingerprint authentication helps authorize credit card payments through the iPhone or iPad. Intel has been working on multiple forms of biometric authentication through fingerprint, gesture, face and voice recognition.

McAfee is owned by Intel, and the chip maker is building smartphone, tablet and PC technology that takes advantage of the security software. Intel has also worked on biometric technology for wearable devices like SMS Audio’s BioSport In-Ear Headphones, which can measure a person’s heart rate.

Intel also wants to make PCs and tablets easier to use through wireless charging, display, docking and data transfers. Such capabilities would eliminate the need to carry power brick and cables for displays and data transfers. Such capabilities will start appearing in laptops next year with sixth-generation Core chips code-named Skylake, which will be released in the second half.

Source

Intel’s Cherry Trail Coming In 2015

December 8, 2014 by  
Filed under Computing

Comments Off on Intel’s Cherry Trail Coming In 2015

Bay Trail was quite a big deal when it started shipping in late 2013.

It was a tablet chip that enabled great design wins such as the affordable Asus T100TA and even in late 2014 Asus used the platform to create the EeeBook X205, a $199 netbook.

Both of these designs are based on Intel’s Bay-Trail M processor, a year old 22nm quad-core processor based on the Silvermont design. Some machines that are coming with LTE, both netbooks and tablets and there will be new chip coming in 2015. It is called LTE Advanced XMM7360 chip and supports LTE Cat 10,3 CA up to 450 Mbits download and upload.

Intel will also offer Morrefield quad cores for machines with lower TDP ratings, especially tablets, and at some point in 2015 it will introduce its 14nm Airmont core based Cherry Trail processor. Cherry Trail based on 14nm Airmont core was originally expected in late 2014, but it got pushed towards middle of 2015.

Intel is clearly encountering more obstacles moving from the 22nm to the 14nm manufacturing process, but considering that most ARM competitors still have to start commercially shipping its 20nm SoCs in significant volumes, Intel still has a manufacturing node advantage. If only Intel had as many design wins to go along with its cutting edge fabs, as the company has been struggling to ship 40milion tablets in 2014, as promised.

Braxton will replace Cherry Trail in 2016. Braxton is a tock architecture, another 14nm design based on the quad-core Goldmont core. When it comes to the Performance Media Internet Device (MID) market Intel has another chip planned in 2016. It calls it SoFIA MID and the chip comes in intels 14nm manufacturing process.

Value and Entry markets for Media Internet Device (MID) and phones includes four new SoFIA parts, but with all these new and exciting chips Intel has to compete against some advanced chips coming on line in 2015, including the Qualcomm Snapdragon 810 20nm, Nvidia Erista and more affordable Mediatek solutions such as the MT6795 A53-based octa-core and its successor.

Source

Symantec Uncovers Advanced Spying Malware

December 5, 2014 by  
Filed under Computing

Comments Off on Symantec Uncovers Advanced Spying Malware

An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.

The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.

Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.

The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”

Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.

Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.

Source

Can Qualcomm Comptete With Intel?

December 2, 2014 by  
Filed under Computing

Comments Off on Can Qualcomm Comptete With Intel?

Qualcomm has confirmed that it will branch out from offering its Snapdragon mobile chips and will soon launch a line of server processors.

The firm’s CEO, Steve Mollenkopf, has remained tight lipped about the plans so far but, according to The Wall Street Journal, said during a meeting with financial analysts in New York on Wednesday that the company is working on chips for the data centre.

There’s no timing yet, either, although Mollenkopf said that his firm is currently “engaged with customers”.

Qualcomm is already the world leader in ARM chips for smartphones, and we assume that the company will develop server chips based on ARM’s 64-bit ARMv8-A architecture as rivals such as AMD have done.

The move will place Qualcomm in competition with chip giant Intel, which is currently one of the biggest server chip makers.

Qualcomm announced last month that it had acquired Cambridge-based chipmaker CSR for a hefty $2.5bn (£1.6bn), as the company looks to push further into the Internet of Things (IoT).

The buyout, which comes two months after CSR rejected a takeover bid from Microchip Technology, will see Qualcomm using the British company to push further into the IoT, automotive and mobile communications markets.

CSR rejected an initial bid from Microchip, but reports claim that the firm has until 5pm UK time today to make a better offer.

However, CSR’s board of directors has unanimously accepted Qualcomm’s offer of 900p a share. The closing price at the time of the offer was 660p.

Source

Oracle And SAP Settle Piracy Dispute

November 24, 2014 by  
Filed under Computing

Comments Off on Oracle And SAP Settle Piracy Dispute

Oracle has won a limited victory in its long-running lawsuit with rival SAP.

The action was taken in reference to events dating back to 2007, which saw employees of SAP’s TomorrowNow unit accused of illegally downloading Oracle software.

German company TomorrowNow was bought by SAP as a means to undercut Oracle’s internal tech support rates, with the ambition of getting customers to migrate to SAP solutions, reports Reuters.

In 2006, TomorrowNow started the process of undermining its parent’s position, offering cut-price support to users of the Siebel database and CRM.

Oracle was originally awarded $1.3bn back in 2010, but this was adjusted downwards on multiple appeals.

SAP acknowledged that its employees had been in the wrong, but disputed the damages awarded. SAP offered a $306m payment in 2012, but did so more in hope than expectation given its admissions.

Earlier in the year, a federal judge gave Oracle the option to settle for $356.7m or force a retrial, and the company has now decided on the former with a further $2.5m in interest.

“We are thrilled about this landmark recovery and extremely gratified that our efforts to protect innovation and our shareholders’ interests are duly rewarded,” said Oracle’s general counsel Dorian Daley.

“This sends a strong message to those who would prefer to cheat than compete fairly and legally.”

SAP agreed: “We are also pleased that, overall, the courts hearing this case ultimately accepted SAP’s arguments to limit Oracle’s excessive damages claims and that Oracle has finally chosen to end this matter.”

SAP announced a partnership with IBM last month to bring its HANA service to enterprise cloud users.

Source

Silk Road 2.0 Shutdown

November 20, 2014 by  
Filed under Computing

Comments Off on Silk Road 2.0 Shutdown

U.S. governmnent authorities said they have shut down the successor website to Silk Road, an underground online drug marketplace, and charged its alleged operator with conspiracy to commit drug trafficking, computer hacking, money laundering and other crimes.

Blake Benthall, 26, was arrested last Wednesday in San Francisco and was expected to make an initial court appearance in federal court there later on Thursday.

The charges against Benthall carry a maximum sentence of life in prison.

A lawyer for Benthall could not immediately be identified.

Silk Road 2.0 was launched late last year, weeks after authorities had shuttered the original Silk Road website in October and arrested its alleged owner, Ross Ulbricht, who went by the online alias, Dread Pirate Roberts.

“Let’s be clear – this Silk Road, in whatever form, is the road to prison,” Manhattan U.S. Attorney Preet Bharara, whose office is prosecuting both cases, said in a statement.

Benthall, known as “Defcon” online, became the operator of Silk Road 2.0 in December, one month after an unnamed co-conspirator launched the site, according to prosecutors.

Silk Road 2.0 provided an online bazaar where users across the world could buy and sell drugs, computer hacking tools and other illicit items, using the digital currency Bitcoin as payment, authorities said.

As of September, the site was generating at least $8 million a month in sales, they said.

The government’s investigation included an undercover agent who was able to infiltrate the administrative staff of the website and interact directly with Benthall, prosecutors said.

Ulbricht, 30, has pleaded not guilty and is scheduled for trial in New York in January.

Source

New Malware Targeting Apple Devices

November 19, 2014 by  
Filed under Computing

Comments Off on New Malware Targeting Apple Devices

Palo Alto Networks Inc  has uncovered a new group of malware that can infect Apple Inc’s  desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.

The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.

Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.

The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.

It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.

But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.

Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.

Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.

Source

« Previous PageNext Page »