Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Samsung’s Eight-core Chip Goes Hacking

August 13, 2013 by  
Filed under Computing

Comments Off on Samsung’s Eight-core Chip Goes Hacking

A Samsung eight-core chip used in some Galaxy S4 mobile devices is now available for hackers to play with on a developer board from South Korea-based Hardkernel.

Hardkernel’s Odroid XU board has incorporated Samsung’s eight-core Exynos 5 Octa 5410 chip, which is based on ARM’s latest processor designs. Samsung recently announced a new eight-core chip, the Exynos 5 Octa 5420, which packs faster graphics and application processing than the 5410. The 5420 has not yet been shipped yet, however.

The Odroid board is priced at $149 through Aug. 31, after which it will be offered for $169. Samsung for many months has said that a board with an eight-core chip would be released, and has shown prototype developer boards at conferences.

Odroid-XU will provide developers an opportunity to write programs tuned for Samsung’s octa-core chip, which has been a source of controversy. Analysts have said the eight-core design is overkill for small devices like smartphones and tablets, which need long battery life.

The eight-core chip design also takes up a lot of space, which prevented Samsung from putting LTE radios inside some Galaxy S4 models. Qualcomm, which hesitantly moved from the dual core to the quad-core design on its Snapdragon chips, on Friday criticized eight-core chips, calling the idea “dumb.”

Despite the criticism, the board will give developers a first true glimpse of, and an opportunity to write and test applications for, ARM’s Big.Little design. The design combines high-power cores for demanding applications with low-power cores for mundane tasks like texting and calling.

Samsung’s iteration of Big.Little in the Exynos 5 Octa 5410 chip combines four processors based on ARM’s latest Cortex-A15 processor design, which incorporates four low-power Cortex-A7 CPUs. The Cortex-A15 is ARM’s latest processor design and succeeds the previous Cortex-A9 core, which was used in popular smartphones like Apple’s iPhone and the Galaxy S3. Samsung said the eight-core chip provides a balance of power and performance, with the high-power cores kicking in only when necessary.

The board has an Imagination Technologies PowerVR SGX544MP3 graphics processor, 2GB of low-power DDR3 DRAM, two USB 3.0 ports and four USB 2.0 ports. Other features include Wi-Fi, Ethernet and optional Bluetooth. Google’s Android 4.2 operating system is preloaded, and support for other Linux distributions like Ubuntu is expected soon. The board has already been benchmarked on Ubuntu 13.04.

Source

Is Twitter Home To Malware?

May 1, 2013 by  
Filed under Around The Net

Comments Off on Is Twitter Home To Malware?

Security outfit Trusteer has recently identified an active configuration of TorRAT targeting Twitter users. The malware launches a Man-in-the-Browser (MitB) attack through the browser of infected PCs, gaining access to the victim’s Twitter account to create malicious tweets.

Dana Tamir, Enterprise Security Director for Trusteer the malware, which has been used as a financial malware to gain access to user credentials and target their financial transactions, now has a new goal: to spread malware using the online social networking service. At this time the attack is targeting the Dutch market. But since Twitter is used by millions of users around the world, this type of attack can be used to target any market and any industry.

The attack is carried out by injecting Javascript code into the victim’s Twitter account page. The malware collects the user’s authentication token, which enables it to make authorized calls to Twitter’s APIs, and then posts new, malicious tweets on behalf of the victim.

Tamir said that the attack is particularly difficult to defend against because it uses a new sophisticated approach to spear-phishing. Twitter users follow accounts that they trust. Because the malware creates malicious tweets and sends them through a compromised account of a trusted person or organization being followed, the tweets seem to be genuine. The fact that the tweets include shortened URLs is not concerning: Twitter limits the number of characters in a message, so followers expect to get interesting news bits in the form of a short text message followed by a shortened URL. However, a shortened URL can be used to disguises the underlying URL address, so that followers have no way of knowing if the link is suspicious.

Source

Skype Confirms Glitch

July 23, 2012 by  
Filed under Around The Net

Comments Off on Skype Confirms Glitch

Skype, a division of Microsoft, confirmed on Monday that a bug in its software has led to instant messages being shared with unintended parties.

The company said it will provide an update to fix the problem in “the next few days.”

According to user reports, the unintended recipients have been connected to just one of the two users who exchanging messages. The problem could have harmful consequences. For example, two co-workers using Skype to exchange IMs (instant messages) could, as a result of the problem, share the message with another contact in one user’s address book — potentially a third co-worker being unfavorably described in their IM exchange.

According to Skype, the problem only arises in “rare circumstances.”

The issue first came to light last week in Skype’s user forums. It seems to stem from the update issued by the voice, video and text messaging service in June.

Source…

Twitter Wants To Email You

May 23, 2012 by  
Filed under Around The Net

Comments Off on Twitter Wants To Email You

Twitter will begin delivering a weekly email digest to highlight for users of the micro-blogging site the tweets they are most likely to be interested in, the company stated on Monday.

The feature marks a departure for a social network that typically emphasizes real-time delivery of information.

How will Twitter determine which tweets a user may want to see? Twitter spokesman Robert Weeks said the digest will feature the tweets that the “people you’re connected to on Twitter are engaging with the most.”

From the email digest, users will be able to see the conversation about a particular tweet, follow shared links and send out their own tweets. The digest will include tweets not just from a user’s own feed but also from the feeds of people he or she follows.

Source…

More Trojan Malware Found On Macs

April 23, 2012 by  
Filed under Computing

Comments Off on More Trojan Malware Found On Macs

Following the outbreak of the Flashback Mac Trojan, security researchers have identified two more cases of Mac OS X malware. The good news is most Mac owners have little reason to worry about them.

Both cases are variants on the same Trojan, called SabPub, Kaspersky Lab Expert Costin Raiu wrote on Securelist.

The first variant is known as Backdoor.OSX.SabPub.a. Like Flashback, this new threat was likely spread through Java exploits on Websites, and allows for remote control of affected systems. It was created roughly one month ago.

Fortunately, this malware isn’t a threat to most users for a few reasons: It may have only been used in targeted attacks, Raiu wrote, with links to malicious Websites sent via e-mail, and the domain used to fetch instructions for infected Macs has since been shut down.

Furthermore, Apple’s security update for Flashback helps render future Java-based attacks harmless. In addition to removing the Flashback malware, the update automatically deactivates the Java browser plug-in and Java Web Start if they remain unused for 35 days. Users must then manually re-enable Java when they encounter applets on a Web page or a Web Start application.

The second SabPub variant is old-school compared to its sibling. Instead of attacking through malicious Websites, it uses infected Microsoft Word documents as vector, distributed by e-mail.

Source…

Xoom Tablets To Get Android 4.0

January 27, 2012 by  
Filed under Uncategorized

Comments Off on Xoom Tablets To Get Android 4.0

Motorola Mobility has confirmed the Android Ice Cream Sandwich upgrade to the Xoom Wi-Fi tablet will arrive over-the-air via Wi-Fi to U.S.-based devices on Wednesday.

In addition to faster browser rendering, the free update lets users type via voice and includes a Data Manager tool for monitoring and controlling network data usage, something seen as especially helpful to reviewers of the Samsung Galaxy Nexus smartphone running Ice Cream Sandwich, also called Android 4.0.

Motorola called it the first tablet of its kind to receive the upgrade to Ice Cream Sandwich, though the update for the Asus Transformer Prime tablet was distributed a week ago, as several bloggers, including Slashgear noticed.

Source…

Citigroup Hackers Pocketed $2.7 million

June 29, 2011 by  
Filed under Around The Net

Comments Off on Citigroup Hackers Pocketed $2.7 million

Citigroup suffered about $2.7 million in losses after cybercriminals uncovered a way to lift credit card numbers from its website and make fraudulent transactions.

Citi acknowledged the breach earlier this month, saying hackers had gained accessed to more than 360,000 Citi credit card accounts of U.S. customers. The hackers didn’t breach Citi’s main credit card processing system, but were reportedly able to obtain the numbers, along with the customers’ names and contact information, by logging into the Citi Account Online website and guessing account numbers.

Until now, it wasn’t revealed if any fraud had occurred as a result of the theft. But Citi confirmed Friday that there were losses of $2.7 million from about 3,400 accounts.

The bank has said its customers will not be liable for the fraudalent transactions and losses as a result of them.

Read More….

Nokia Expects Windows Phone Before EOY

June 3, 2011 by  
Filed under Smartphones

Comments Off on Nokia Expects Windows Phone Before EOY

Nokia has “increased confidence” that the first of its smartphone devices to run on the Windows Phone platform will ship by the fourth quarter, the company said on Tuesday.

Nokia’s CEO Stephen Elop is putting his full weight behind getting a Windows Phone-based product out for the important end-of-year holiday shopping season, in order to help turn around the company’s smartphone fortunes. The company’s teams are aligned around that goal, he said in a statement.

The company won’t reveal ship dates until closer to when the first phones arrive, but the pressure is on to deliver the devices this year, Elop said when the company announced its first quarter results.

Nokia will have several more opportunities to divulge more information shortly. On June 21, Elop will give a presentation at the Connection 2011 Conference, which is organized in conjunction with CommunicAsia 2011 in Singapore. He will give an update on the company’s partnership with Microsoft, and set the stage for a number of product and service launches, according to the program.

Read More…

Microsoft To Discontinue Vista SP1 Support By July

May 18, 2011 by  
Filed under Computing

Comments Off on Microsoft To Discontinue Vista SP1 Support By July

Microsoft reminded users on Monday that it intends to stop supporting Windows Vista Service Pack 1 on July 12.

“From that date onward, Microsoft will no longer provide support or free security updates for Windows Vista Service Pack 1 (SP1),” the company stated in a blog entry on its TechNet website.

The company recommended users upgrade to Vista Service Pack 2 or Windows 7 to receive continued support and patches. Vista SP2 also includes operating system updates such as a new version of Windows Search, and drivers to support new hardware.

Users can install Vista SP2 using Windows Update, or by manually downloading the 32-bit edition or 64-bit edition of the service pack.

Users must have Windows Vista SP1 installed prior to applying SP2. Further instructions on installing SP2 are available on Microsoft’s website.

Read More……

Apple Outs Patch For Tracking Issue

May 6, 2011 by  
Filed under Around The Net

Comments Off on Apple Outs Patch For Tracking Issue

As Apple promised last week in several discussions regarding its location tracking issues, iOS 4.3.3 addresses three bugs related to the database of location information on iOS devices. Firstly, it reduces the amount of the cached location information to a week’s worth, rather than relying on a size limit, as it previously did.

Secondly, it no longer backs up the cache to your Mac or PC via iTunes upon syncing, so the information isn’t available to anyone with access to your computer. And finally, the cache is now deleted from the device when Location Services are disabled in iOS’s Settings app.

Apple has also announced plans to encrypt the location information on iOS devices itself in the next major update to the operating system, which presumably means it will be incoporated into iOS 5.

The iOS 4.3.3 update applies to the iPhone 4, iPhone 3GS, iPad, iPad 2, third-generation iPod touch, and the fourth-generation iPod touch. Exceptions to this fix though, are the iPhone 3G and the second-generation iPod touch, both of which were supported by the original release of iOS 4 when the location database is believed to have been created but have since been dropped from compatibility. Also missing in action is the CDMA iPhone 4, although some reports have suggested that it didn’t log data in the same way as the GSM model.

Read More…

« Previous PageNext Page »