Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Twitter To Track Mobile Users

December 11, 2014 by  
Filed under Around The Net

Comments Off on Twitter To Track Mobile Users

Twitter Inc has plans to start tracking what third-party apps are installed on users’ mobile devices so the social media company can deliver more tailored content, including ads, the company has revealed.

The feature, called “app graph,” will allow the company to see what other applications users may have installed on phones or other devices.

“To help build a more personal Twitter experience for you, we are collecting and occasionally updating the list of apps installed on your mobile device so we can deliver tailored content that you might be interested in,” the company said on its site.

The posting also included instructions on how to turn the feature off. Twitter is not collecting data from within the applications, the posting noted.

Twitter, whose main service allows users to broadcast 140-character messages, has been searching for ways to re-invigorate user engagement and drive growth. As part of that effort, the company is considering creating additional mobile applications beyond its core messaging service.

Source

Symantec Uncovers Advanced Spying Malware

December 5, 2014 by  
Filed under Computing

Comments Off on Symantec Uncovers Advanced Spying Malware

An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.

The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.

Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.

The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”

Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.

Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.

Source

Office 365 Goes Video Streaming

December 3, 2014 by  
Filed under Around The Net

Comments Off on Office 365 Goes Video Streaming

Microsoft unveiled Office 365 Video, a YouTube-like streaming service where enterprises and large organizations can post in-house video content for communication and training.

“Office 365 Video provides organizations with a secure, company-wide destination for posting, sharing and discovering video content,” said Mark Kashman, a senior product manager with the Office 365 team, in a blog posting.

Kashman touted Video as a tool for internal communications, citing the examples of new-employee orientation, management messaging and worker training. Employees will also be able to contribute to a “Community” section, though most companies will probably frown on cat antic clips.

The service rolls out over the next few days to companies that have registered for Office 365′s First Release early distribution program, then through early 2015 to others.

Video will be available only to subscribers of Office 365′s plans for enterprises — E1 through E4 — and universities (A2 through A4). It will not be offered to consumer subscribers or firms with small business-oriented plans like Business Essentials, Business and Business Premium.

Kashman also said Office 365 plans for government agencies will get Video at some point, but he did not proffer a timeline.

The other requirement is SharePoint Online, an off-premises component of the enterprise and academic plans, but missing from the increasingly popular Office 365 ProPlus, the rent-not-buy plan used by organizations that have decided to retain their back-end services, like SharePoint and Exchange, on premises.

Although Office 365 Video has elements of consumer streaming services like Google’s YouTube, it’s strictly an in-house affair: It will be available only to employees, and then only those whom IT administrators have assigned access rights.

Source

Should Encryption Be The Norm?

December 1, 2014 by  
Filed under Computing

Comments Off on Should Encryption Be The Norm?

Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.

The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.

It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.

“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”

The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.

The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.

However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.

These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.

Source

New Malware Targeting Apple Devices

November 19, 2014 by  
Filed under Computing

Comments Off on New Malware Targeting Apple Devices

Palo Alto Networks Inc  has uncovered a new group of malware that can infect Apple Inc’s  desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.

The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.

Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.

The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.

It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.

But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.

Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.

Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.

Source

Adobe Eases Privacy Concerns

November 14, 2014 by  
Filed under Around The Net

Comments Off on Adobe Eases Privacy Concerns

Tests on the latest version of Adobe System’s e-reader software reveals the company is now collecting less data following a privacy-related row last month, according to the Electronic Frontier Foundation.

Digital Editions version 4.0.1 appears to only collect data on e-books that have DRM (Digital Rights Management), wrote Cooper Quintin, a staff technologist with the EFF. DRM places restrictions on how content can be used with the intent of thwarting piracy.

Adobe was criticized in early October after it was discovered Digital Editions collected metadata about e-books on a device, even if the e-books did not have DRM. Those logs were also sent to Adobe in plain text.

Since that data was not encrypted, critics including the EFF contended it posed major privacy risks for users. For example, plain text content could be intercepted by an interloper from a user who is on the same public Wi-Fi network.

Adobe said on Oct. 23 it fixed the issues in 4.0.1, saying it would not collect data on e-books without DRM and encrypt data that is transmitted back to the company.

Quintin wrote the EFF’s latest test showed the “only time we saw data going back to an Adobe server was when an e-book with DRM was opened for the first time. This data is most likely being sent back for DRM verification purposes, and it is being sent over HTTPS.”

If an e-book has DRM, Adobe may record how long a person reads it or the percentage of the content that is read, which is used for “metered” pricing models.

Other technical metrics are also collected, such as the IP address of the device downloading a book, a unique ID assigned to the specific applications being used at the time and a unique ID for the device, according to Adobe.

Source

What Will Facebook Do With WhatsApp?

October 21, 2014 by  
Filed under Around The Net

Comments Off on What Will Facebook Do With WhatsApp?

Facebook, which closed its acquisition of mobile messaging service WhatsApp earlier this week, has said that it has no near-term plan to make money from it.

Chief Executive Mark Zuckerberg, who is visiting India to participate in an event to boost Internet usage, refused to say much more, but it does indicate that the company has not worked out a cunning plan yet.

Facebook’s final WhatsApp acquisition price tag has risen an additional $3 billion to roughly $22 billion because of the increased value of Facebook’s stock in recent months. This means that Zuckerberg is under pressure to make a bob or two from the deal.

WhatsApp works across different types of phones, across borders, and without advertising. The app only charges a 99 cent annual subscription fee, which is waived for the first year.

Source

Will Facebook Enter The Healthcare Arena?

October 16, 2014 by  
Filed under Around The Net

Comments Off on Will Facebook Enter The Healthcare Arena?

Facebook Inc already can tell who your friends are and the what types of things grabs your attention. Soon, it could also know the state of your health.

On the heels of fellow Silicon Valley technology companies Apple Inc and Google Inc, Facebook is plotting its first steps into the fertile field of healthcare, said three people familiar with the matter. The people requested anonymity as the plans are still in development.

The company is exploring creating online “support communities” that would connect Facebook users suffering from various ailments. A small team is also considering new “preventative care” applications that would help people improve their lifestyles.

In recent months, the sources said, the social networking giant has been holding meetings with medical industry experts and entrepreneurs, and is setting up a research and development unit to test new health apps. Facebook is still in the idea-gathering stage, the people said.

Healthcare has historically been an area of interest for Facebook, but it has taken a backseat to more pressing products.

Recently, Facebook executives have come to realize that healthcare might work as a tool to increase engagement with the site.

One catalyst: the unexpected success of Facebook’s “organ-donor status initiative,” introduced in 2012. The day that Facebook altered profile pages to allow members to specify their organ donor-status, 13,054 people registered to be organ donors online in the United States, a 21 fold increase over the daily average of 616 registrations, according to a June 2013 study published in the American Journal of Transplantation.

Separately, Facebook product teams noticed that people with chronic ailments such as diabetes would search the social networking site for advice, said one former Facebook insider. In addition, the proliferation of patient networks such as PatientsLikeMe demonstrate that people are increasingly comfortable sharing symptoms and treatment experiences online.

Chief executive Mark Zuckerberg may step up his personal involvement in health. Zuckerberg and his wife Priscilla Chan, a pediatric resident at University of California San Francisco, recently donated $5 million to the Ravenswood Health Center in East Palo Alto.

Any advertising built around the health initiatives would not be as targeted as it could be on television or other media. Pharmaceutical companies, for instance, are prohibited from using Facebook to promote the sale of prescription drugs, in part because of concerns surrounding disclosures.

Source

Will Verizon Throttle Users?

October 15, 2014 by  
Filed under Smartphones

Comments Off on Will Verizon Throttle Users?

Verizon Wireless backed away from a widely criticized plan to slow down the connections of heavy data users with unlimited LTE plans.

The carrier had announced in July it would extend a practice it calls network optimization to unlimited LTE subscribers starting in October. Network optimization targets the top 5 percent of data users on the network when a cell site is under the heaviest demand, and slows down those users’ network performance. Verizon had already applied the practice to the top users of its 3G network.

“We’ve greatly valued the ongoing dialogue over the past several months concerning network optimization and we’ve decided not to move forward with the planned implementation of network optimization for 4G LTE customers on unlimited plans,” the carrier said in a statement on Wednesday. “Exceptional network service will always be our priority and we remain committed to working closely with industry stakeholders to manage broadband issues so that American consumers get the world-class mobile service they expect and value.”

U.S. Federal Communications Commission Chairman Tom Wheeler attacked the plan in a letter to Verizon, suggesting it was a ploy to get customers to switch from their unlimited plans to ones with a cap on monthly data usage. Verizon no longer sells new unlimited plans but allows subscribers with those plans to keep them.

“I know of no past Commission statement that would treat as ‘reasonable network management’ a decision to slow traffic to a user who has paid, after all, for ‘unlimited’ service,” Wheeler wrote in the late July letter to Verizon Wireless President and CEO Dan Mead.

Digital rights group Public Knowledge also attacked so-called data throttling, as well as practices by AT&T, Sprint and T-Mobile USA.

The showdown demonstrated the tension over increasing demand for mobile data, which carriers say puts a strain on their networks. Among other things, that demand has led operators to seek ever more spectrum and apply network management techniques they say are necessary to keep serving all subscribers well. Though LTE makes much more efficient use of the airwaves than 3G does, LTE networks are serving a rapidly growing number of subscribers.

Source

Mobile Carriers Dash To Enter FCC Auction

October 14, 2014 by  
Filed under Uncategorized

Comments Off on Mobile Carriers Dash To Enter FCC Auction

Three of the four largest U.S. mobile operators and satellite provider Dish Network Corp plan to bid in the Federal Communications Commission’s November auction of airwaves, according to initial applications released on Wednesday.

As expected, the largest U.S. wireless carrier Verizon Communications Inc, No. 2 AT&T Inc, No. 4 T-Mobile US Inc and Dish appeared to be the largest companies to indicate an interest in bidding in the upcoming auction of frequencies known as AWS-3.

Applications from Northstar Wireless LLC and SNR Wireless LicenseCo LLC reported they had entered bidding agreements with Dish, which had indirect ownership interest in both companies.

Northstar’s disclosures showed direct and indirect ownership interest by Alaska Native corporation Doyon Ltd and indirect ownership interest by financial firm Catalyst Investors. Asset manager BlackRock Inc had membership shares in SNR, according to the documents.

T-Mobile and AT&T did not appear to plan joint bids with other companies, and T-Mobile’s Kathleen Ham, vice president of federal regulatory affairs, said the carrier had no such agreements with any company.

A Verizon spokesman did not respond to inquiries about potential joint bidding and Dish representatives declined comment beyond confirming the submission of its application, citing FCC’s anti-collusion rules.

A total of 80 entities submitted initial applications. Interested parties, which may or may not actually bid for wireless licenses in the auction, included smaller U.S. companies such as Bluegrass Wireless LLC, Guam-based wireless company Docomo Pacific Inc and individual spectrum investors.

Scheduled to begin on Nov. 13, the auction is expected to raise at least $10 billion and will include airwaves previously occupied by multiple federal users, including the Department of Homeland Security.

Dish applied to bid in the auction as American AWS-3 Wireless I LLC and disclosed joint bidding arrangements with SNR and Northstar, which in turn had to disclose ownership and other information.

SNR listed former FCC Wireless Bureau Chief John Muleta, now CEO of consulting firm Atelum LLC, as a contact. Muleta, reached late on Wednesday, declined comment, citing FCC’s restrictions.

Northstar’s disclosures listed Allen Todd, assistant secretary at Doyon, a Fairbanks-based Alaska Native Regional Corporation with numerous affiliates in various fields including oil and gas land drilling. Todd could not be reached for comment on Wednesday.

SNR’s and Northstar’s, as well as AT&T’s, initial application appeared to be incomplete, which can be caused by small bureaucratic omissions. Of the 80 applications, 47 were deemed incomplete and have to be properly finished by Oct. 15 to allow the companies to participate.

All initial applications have to put down an upfront payment by Oct. 15 to confirm participation.

Source

« Previous PageNext Page »