Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Twitter Tightens Security

December 2, 2013 by  
Filed under Security

Comments Off on Twitter Tightens Security

Twitter Inc said it has put in place a security technology that makes it harder to spy on its users and called on other Internet firms to do the same, as Web providers look to thwart spying by government intelligence agencies.

The online messaging service, which began scrambling communications in 2011 using traditional HTTPS encryption, said on Friday it has added an advanced layer of protection for HTTPS known as “forward secrecy.”

“A year and a half ago, Twitter was first served completely over HTTPS,” the company said in a blog posting. “Since then, it has become clearer and clearer how important that step was to protecting our users’ privacy.”

Twitter’s move is the latest response from U.S. Internet firms following disclosures by former spy agency contractor Edward Snowden about widespread, classified U.S. government surveillance programs.

Facebook Inc, Google Inc, Microsoft Corp and Yahoo Inc have publicly complained that the government does not let them disclose data collection efforts. Some have adopted new privacy technologies to better secure user data.

Forward secrecy prevents attackers from exploiting one potential weakness in HTTPS, which is that large quantities of data can be unscrambled if spies are able to steal a single private “key” that is then used to encrypt all the data, said Dan Kaminsky, a well-known Internet security expert.

The more advanced technique repeatedly creates individual keys as new communications sessions are opened, making it impossible to use a master key to decrypt them, Kaminsky said.

“It is a good thing to do,” he said. “I’m glad this is the direction the industry is taking.”

Source

Intel Buys KNO Software

November 27, 2013 by  
Filed under Computing

Comments Off on Intel Buys KNO Software

Intel has acquired educational software developer Kno to add to its Education division.

Speaking in the company blog, Intel Sales and Marketing Group VP John Galvin explained that in a world where kids are being bombarded by technology, Intel Education has a mission to support the rollout of technology in the classroom.

Galvin said, “The Kno platform provides administrators and teachers with the tools they need to easily assign, manage and monitor their digital learning content and assessments.”

This acquisition brings Intel’s global digital content library to over 225,000 [higher education] and K-12 titles from 74 education publishers. “We’re looking forward to combining our expertise with Kno’s rich content so that together, we can help teachers create classroom environments and personalized learning experiences that lead to student success,” Galvin added.

Intel Education has been working for the past decade with over 10 million teachers that it has assisted to integrate technology with education.

In the UK alone there have been tremendous strides in educational software over the past 30 years, dating back to the government pledge to provide a computer in every school, which led to the creation of the BBC Microcomputer designed specifically for that purpose.

Today, not only is ICT a dedicated lesson in its own right, but it forms one of the key skills that educators are expected to incorporate into all lesson plans, putting it on a par with English and Maths, showing just how far we’ve come from making Venn diagrams with ascii art.

Source

Intel’s Bay Trail M Is On The Way

November 26, 2013 by  
Filed under Computing

Comments Off on Intel’s Bay Trail M Is On The Way

Intel launched its Bay Trail-M ultra low voltage processors for netbooks and mobile devices over the weekend. According to CPU World the new mobile CPUs, branded this time as Celeron and Pentium, can manage twice the CPU performance, and up to three times faster graphics.

They do all that while using the same amount of juice as their “Cedar Trail” predecessors. Most chips have higher clock speeds than N2805, N2810 and N2910 SKUs and come with Burst Performance technology. They can operate at a higher maximum operating temperature which makes them easier to cool. Finally, in addition to 4 N28xx/N29xx Celerons Intel also released Pentium N2920.

Then there are new dual-core Bay Trail-M microprocessors like the Celeron N2806, N2815 and N2820 which can operate at frequencies from 1.6 GHz to 2.13 GHz, when going downhill had the wind is behind them. They also have the maximum burst speed ranging from 2 GHz to 2.39 GHz. The processors come with 1 MB L2 cache, Ivy Bridge graphics clocked at 311 MHz and up to 756 MHz, and support for DDR3L-1066 memory. The N2806 has 4.5 Watt TDP while the N2815 and N2820 have 7.5 Watt TDP. All of the Celeron N28xx processors are priced at $132.

Two new quad-core microprocessors are Celeron N2920 and Pentium N3520. The CPUs have 2 MB L2 cache, and run at 1.86 GHz and 2.17 GHz respectively, with burst frequencies reaching 2 GHz and 2.42 GHz. Both parts integrate Ivy Bridge graphics, that can be clocked as high as 854 MHz. The Celeron can deal with DDR3L-1066 memory, and the Pentium supports 1333 MHz memory data rate. They fit into 7.5 Watt power envelope. The official prices of Celeron N2920 and Pentium N3520 are $132 and $180.

Source

Tizen Announces New Partners

November 25, 2013 by  
Filed under Smartphones

Comments Off on Tizen Announces New Partners

Samsung and Intel announced on Tuesday that the open source Tizen operating system now has 36 partners, including eBay, Trend Micro and Panasonic.

The full list of new partners was announced at the Tizen Developer Summit, and includes a mix of firms from different sectors. Among the 36 backers are eBay, Nokia’s Here mapping service, Konami, McAfee, Panasonic, Sharp and The Weather Channel, giving us some insights as to what software applications are likely to appear on the Linux based operating system.

Trevor Cornwell, founder and CEO of Appbackr, one of Tizen’s newly added partners, said that his firm found the operating system appealing due to its open nature, perhaps hinting that it is more open than Google’s Android mobile operating system.

He said, “The Tizen OS promises to be the most open and comprehensive software platform available for those companies wishing to target the consumers of connected devices.

“The Association’s commitment to support HTML5 applications, combined with their vision that extends beyond the smartphone and tablet ecosystem to a wider array of other connected device segments, makes it attractive to all types of companies. We look forward to collaborating with the Tizen Association to ensure that all stakeholders can contribute to the development of a platform for this growing market opportunity.”

It’s still unclear when Samsung’s first Tizen powered smartphone will make it to market, but online speculation suggests we’ll be seeing the firm’s debut Android challenging smartphone at some point in 2014.

Further speculation suggests that Samsung’s first Tizen phone will be an updated version of the Galaxy S4, possibly to reduce its reliance on Android.

Source

Will nVidia’s Tegra 5 Go LTE?

November 22, 2013 by  
Filed under Computing

Comments Off on Will nVidia’s Tegra 5 Go LTE?

The tradition continues. Our sources are confirming that Nvidia’s Logan SoC, possibly called Tegra 5, doesn’t come with an integrated LTE modem. Just like Apple, Nvidia makes a big fast chip with impressive Kepler based GPU, but it won’t put a an icera LTE solution inside the same chip.

Icera i500 is Tegra 5 compatible and it has AT&T certification. As the launch draws near, it should become compatible with other US and international LTE carriers like Verizon and T-mobile.

This should not be a big issue for Nvidia’s target market, manufacturers will have to choose two chips instead of one, a clear competitive disadvantage compared to future Qualcomm chips with Adreno 400 graphics and updated CPU cores, expected in early 2014.

During Nvidia’s recent conference call, CEO Jen Hsun Huang said devices based on the new Tegra 4i with integrated LTE should be announced in Q1 and ship no later than Q2. Jensen also mentioned that people are going to be “delighted by the OEM that it comes from” which is probably his way of of announcing some big brand design wins, but he also emphasised that the designs will be global rather than US. For US success you need CDMA Jensen said, but as far as we know Verizon is the only company using it.

Since Apple can pull of two chip designs from day one, we can only assume that two chip approach won’t cost much battery life compared to single chip design that has LTE on board (Snapdragon 600 and 800 ed. ). However, Nvidia is likely going to be making bets on its Kepler based GPU, expected to be the fastest graphics core ever integrated in a mobile SoC that will rock tablets and some phones around the world. The fact that Logan is likely to pack very powerful graphics sans on-die LTE makes it a bit more interesting for tablets than phones, which is exactly what we saw with the Tegra 4.

We expect to see Tegra 5 devices announced at CES 2014 so early January and with some luck we might see them shipping very early in 2014.

Source

Did Stuxnet Infect A Russian Nuclear Plant?

November 20, 2013 by  
Filed under Computing

Comments Off on Did Stuxnet Infect A Russian Nuclear Plant?

Kaspersky has claimed that the infamous Stuxnet computer worm “badly infected” the internal network of an unnamed Russian nuclear plant after it caused chaos in Iran’s nuclear facilities.

Speaking at a keynote presentation given at the Canberra Press Club 2013, Kaspersky CEO Eugene Kaspersky said a staffer at the unnamed nuclear plant informed him of the infection.

“[The staffer said] their nuclear plant network which was disconnected from the internet was badly infected by Stuxnet,” Kaspersky said.

“So unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity.”

Stuxnet was discovered to have spread throughout industrial software and equipment in 2010 and is believed to have been created by the United States and Israel to attack Iran’s nuclear facilities. According to Kaspersky’s source, the malware was carried into the Russian nuclear plant and installed on a physically separated “air-gapped” network.

Kaspersky also made a rather outlandish joke during his speech, saying that all data is subject to theft. “All the data is stolen,” Kaspersky said. “At least twice.”

“If the claim of the Russian nuclear plant infection is true, then it’s easy to imagine how this “collateral damage” could have turned into a very serious incident indeed, with obvious diplomatic repercussions,” said security expert Graham Cluley.

“There is no way to independently verify the claim, of course. But it is a fact that Stuxnet managed to infect many computer systems outside of its intended target in Iran,” Cluley added. “Indeed, the very fact that it spread out of control, was what lead to its discovery by security firms.”

Earlier this year, Symantec claimed that the Stuxnet computer worm could date back further than 2010 and was more widespread than originally believed.

Symantec’s report called “The Missing Link” found a build of the Stuxnet attack tool, dubbed Stuxnet 0.5, which it said dated back to 2005 and used different techniques to sabotage industrial facilities.

Source

Can Robots Run On (NH2)2CO?

November 19, 2013 by  
Filed under Around The Net

Comments Off on Can Robots Run On (NH2)2CO?

Scientists have discovered a way to power future robots using an unusual source — urine.

Researchers at the University of the West of England, Bristol and the University of Bristol collaborated to build a system that will enable robots to function without batteries or being plugged into an electrical outlet.

Based on the functioning of the human heart, the system is designed to pump urine into the robot’s “engine room,” converting the waste into electricity and enabling the robot to function completely on its own.

Scientists are hoping the system, which can hold 24.5 ml of urine, could be used to power future generations of robots, or what they’re calling EcoBots.

“In the city environment, they could re-charge using urine from urinals in public lavatories,” said Peter Walters, a researcher with the University of the West of England. “In rural environments, liquid waste effluent could be collected from farms.”

In the past 10 years, researchers have built four generations of EcoBots, each able to use microorganisms to digest the waste material and generate electricity from it, the university said.

Along with using human and animal urine, the robotic system also can create power by using rotten fruit and vegetables, dead flies, waste water and sludge.

Ioannis Ieropoulos, a scientist with the Bristol Robotics Laboratory, explained that the microorganisms work inside microbial fuel cells where they metabolize the organics, converting them into carbon dioxide and electricity.

Like the human heart, the robotic system works by using artificial muscles that compress a soft area in the center of the device, forcing fluid to be expelled through an outlet and delivered to the fuel cells. The artificial muscles then relax and go through the process again for the next cycle.

“The artificial heartbeat is mechanically simpler than a conventional electric motor-driven pump by virtue of the fact that it employs artificial muscle fibers to create the pumping action, rather than an electric motor, which is by comparison a more complex mechanical assembly,” Walter said.

Source

Adobe Data Found Online

November 18, 2013 by  
Filed under Around The Net

Comments Off on Adobe Data Found Online

A computer security firm has discovered data it says belongs to some 152 million Adobe Systems Inc user accounts, suggesting that a breach reported a month ago is much larger than Adobe has so far disclosed and is one of the largest on record.

LastPass, a password security firm, said that it has found email addresses, encrypted passwords and password hints stored in clear text from Adobe user accounts on an underground website frequented by cyber criminals.

Adobe said last week that attackers had stolen data on more than 38 million customer accounts, on top of the theft of information on nearly 3 million accounts that it disclosed nearly a month earlier.

The maker of Photoshop and Acrobat software confirmed that LastPass had found records stolen from its data center, but downplayed the significance of the security firm’s findings.

While the new findings from LastPass indicate that the Adobe breach is far bigger than previously known, company spokeswoman Heather Edell said it was not accurate to say 152 million customer accounts had been compromised because the database attacked was a backup system about to be decommissioned.

She said the records include some 25 million records containing invalid email addresses, 18 million with invalid passwords. She added that “a large percentage” of the accounts were fictitious, having been set up for one-time use so that their creators could get free software or other perks.

She also said that the company is continuing to work with law enforcement and outside investigators to determine the cost and scope of the breach, which resulted in the theft of customer data as well as source code to several software titles.

The company has notified some 38 million active Adobe ID users and is now contacting holders of inactive accounts, she said.

Paul Stephens, director of policy and advocacy for the non-profit Privacy Rights Clearinghouse, said information in an inactive database is often useful to criminals.

He said they might use it to engage in “phishing” scams or attempt to figure out passwords using the hints provided for some of the accounts in the database. In some cases, people whose data was exposed might not be aware of it because they have not accessed the out-of-date accounts, he said.

“Potentially it’s the website you’ve forgotten about that poses the greater risk,” he said. “What if somebody set up an account with Adobe ten years ago and forgot about it and they use the same password there that they use on other sites?”

Source

Google Expands Malware Blocker

November 15, 2013 by  
Filed under Computing

Comments Off on Google Expands Malware Blocker

Google has expanded malware blocking in an early development build of Chrome to sniff out a wider range of threats than the browser already recognizes.

Chrome’s current “Canary” build — the label for very-early versions of the browser, earlier than even Chrome’s Dev channel — will post a warning at the bottom of the window when it detects an attempted download of malicious code.

Features added to the Canary build usually, although not always, eventually make it into the Dev channel — the roughest-edged of the three distributed to users — and from there into the Beta and Stable channels. Google did not spell out a timetable for the expanded malware blocking.

Chrome has included malware blocking for more than two years, since version 12 launched in June 2011, and the functionality was extended in February 2012with Chrome 17.

Chrome is now at version 30.

Canary’s blocking, however, is more aggressive on two fronts: It is more assertive in its alerts and detects more malware forms, including threats that pose as legitimate software and monkey with the browser’s settings.

“Content.exe is malicious, and Chrome has blocked it,” the message in Canary reads. The sole visible option is to click the “Dismiss” button, which makes the warning vanish. The only additional option, and that only after another click, is to “Learn more,” which leads to yet another warning.

In Canary, there is no way for the user to contradict the malware blocking.

That’s different than in the current Stable build of Chrome, which relies on a message that says, “This file is malicious. Are you sure you want to continue?” and gives the user a choice between tossing the downloaded file or saving it anyway.

As it has for some time, Chrome will show such warnings on select file extensions, primarily “.exe,” which in Windows denotes an executable file, and “.msi,” an installation package for Windows applications. Canary’s expansion, said Google, also warns when the user tries to download some less obvious threats, including payloads masquerading as legitimate software — it cited screen savers and video plug-ins in a  blog posting — that hijack browser settings to silently change the home page or insert ads into websites to monetize the malware.

Google’s malware blocking is part of its Safe Browsing API (application programming interface) and service, which Chrome, Apple’s Safari and Mozilla’s Firefox all access to warn customers of potentially dangerous websites before they reach them.

In Chrome’s case, the malware warning stems not only from the Safe Browsing “blacklist” of dodgy websites, but according to NSS Labs, a security software testing company, also from the Content Agnostic Malware Protection (CAMP) technology that Google has baked into its implementation of Safe Browsing.

Source

Raspberry PI Breaks Record

November 13, 2013 by  
Filed under Computing

Comments Off on Raspberry PI Breaks Record

Sinclair ZX80 and runaway success story, the Raspberry Pi might be about to get its own monitor after a Kickstarter campaign to create a low cost 9in screen for it has exceeded its $90,000 goal in a single weekend.

The HDMIPi monitor from startup Raspi.tv presently stands at $100,996 on Kickstarter, an increase of $8,000 in just the last four hours. The concept behind the monitor is to create something small and affordable but with maximum 1920×1080 resolution. Even though the project has had to scale down its ambitions to 1200×800 resolution to fit the business plan, Raspberry Pi fans have flocked to crowdfund the device.

Put in perspective, that’s higher than HD 720p resolution, or as they describe it, “slightly better resolution than the 720p HD footage on BBC iPlayer”.

Monitor cases will be available in a variety of colours, designed by none other than Paul Beech, who designed the original Raspberry Pi logo.

Although primarily designed for the Raspberry Pi, the HDMIPi is a standard HDMI monitor and can be used for other devices – Android sticks, video cameras, games consoles and beyond.

Raspi.tv has pledged to ship orders in February 2014, delays permitting, and is already working on enhancements. It has described touch functionality as something that might become available as a bolt-on at a later date, saying that “enough people have mentioned it that we are sitting up and taking notice”.

As ever with the Raspberry Pi ecosystem, everything is a bit Ryanair, and power supplies, surrounds and so on are not automatically included, though of course, in the true DIY spirit, you can always make your own.

Source

« Previous PageNext Page »