Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Apple Rolls Out A Revamped Store

June 21, 2016 by  
Filed under Consumer Electronics

Comments Off on Apple Rolls Out A Revamped Store

Apple Inc announced a series of long anticipated enhancements to its App Store, but the new features may not ease concerns of developers and analysts who say that the App Store model – and the very idea of the single-purpose app – has seen its best days.

The revamped App Store will let developers advertise their wares in search results and give developers a bigger cut of revenues on subscription apps, while Apple said it has already dramatically sped up its app-approval process.

The goal is to sustain the virtuous cycle at the heart of the hugely lucrative iPhone business. Software developers make apps for the iPhone because its customers are willing to pay, and those customers, in turn, pay a premium for the device because it has the best apps.

The store is now more strategically important than ever for Apple as sales of the iPhone begin to level off and the company looks to software and services to fill the gap. Apple CEO Tim Cook said on a recent conference call that App Store revenues were up 35 percent over last year.

But the store is also a victim of its own success. Eight years after its launch, it is packed with more than 1.9 million apps, according to analytics firm App Annie, making it almost impossible for developers to find an audience – and increasingly difficult for customers to find what they need, as some 14,000 new apps arrive in the store each week.

“The app space has grown out of control,” said Vint Cerf, one of the inventors of the internet and now a vice president at Alphabet Inc’s Google, who was speaking at a San Francisco conference on the future of the web on Wednesday. “We need to move away from having an individual app for every individual thing you want to do.”

Courtesy-http://www.thegurureview.net/mobile-category/apple-rolls-out-a-revamped-app-store.html

iOS Developers Warned About Taking Shortcuts

February 10, 2016 by  
Filed under Computing

Comments Off on iOS Developers Warned About Taking Shortcuts

Slapdash developers have been advised not to use the open source JSPatch method of updating their wares because it is as vulnerable as a soft boiled egg, for various reasons.

It’s FireEye that is giving JSPatch the stink eye and providing the warning that it has rendered over 1,000 applications open to copy and paste theft of photos and other information. And it doesn’t end there.

FireEye’s report said that Remote Hot Patching may sound like a good idea at the time, but it really isn’t. It is so widely used that is has opened up a 1,220-wide iOS application hole in Apple users’ security. A better option, according to the security firm, is to stick with the Apple method, which should provide adequate and timely protection.

“Within the realm of Apple-provided technologies, the way to remediate this situation is to rebuild the application with updated code to fix the bug and submit the newly built app to the App Store for approval,” said FireEye.

“While the review process for updated apps often takes less time than the initial submission review, the process can still be time-consuming and unpredictable, and can cause loss of business if app fixes are not delivered in a timely and controlled manner.

“However, if the original app is embedded with the JSPatch engine, its behaviour can be changed according to the JavaScript code loaded at runtime. This JavaScript file is remotely controlled by the app developer. It is delivered to the app through network communication.”

Let’s not all make this JSPatch’s problem, because presumably it’s developers who are lacking.

FireEye spoke up for the open source security gear while looking down its nose at hackers. “JSPatch is a boon to iOS developers. In the right hands, it can be used to quickly and effectively deploy patches and code updates. But in a non-utopian world like ours, we need to assume that bad actors will leverage this technology for unintended purposes,” the firm said.

“Specifically, if an attacker is able to tamper with the content of a JavaScript file that is eventually loaded by the app, a range of attacks can be successfully performed against an App Store application.

Courteys-TheInq

Apple Removes Data Spying Apps From Store

October 21, 2015 by  
Filed under Consumer Electronics

Comments Off on Apple Removes Data Spying Apps From Store

Apple has removed several apps from its store that it said could pose a security risk by exposing a person’s Web traffic to untrusted sources.

The company recommended deleting the apps but did not name them, which may make it hard for people to know which apps put their data at risk.

The apps in question installed their own digital certificates on a person’s Apple mobile device. It would enable the apps to terminate an encrypted connection between a device and a service and view the traffic, which is a potential security risk.

Most websites and many apps use SSL/TLS (Secure Socket Layer/Transport Security Layer), a protocol that encrypts data traffic exchanged with a user. SSL/TLS is a cornerstone of Web security, ensuring data traffic that is intercepted is unreadable.

It is possible in some cases to interfere with an encrypted connection. Many enterprises that want to analyze encrypted traffic for security reasons will use SSL proxies to terminate a session at the edge of their network and initiate a new one with their own digital certificate, allowing them to inspect traffic for malicious behavior.

In that scenario, employees would likely be more aware or expect that kind of monitoring. But people downloading something from the App Store probably would have no idea of the access granted to their sensitive data traffic.

Apple checks applications to ensure that malicious ones are not offered in its store. Those checks are in large part the reason why Apple has had fewer problems with malicious mobile applications in its store.

Installing digital certificates isn’t itself a malicious action per se, but Apple may be concerned that users are not fully aware of the consequences of allowing an app to do so.

Source-http://www.thegurureview.net/aroundnet-category/apple-removes-data-spying-apps-from-store.html

Are Investors Losing Patience With Apple?

September 24, 2015 by  
Filed under Around The Net

Comments Off on Are Investors Losing Patience With Apple?

Investors fear that Apple has run out of ideas after it released a version of Microsoft’s surface pro and an iPhone, which was the same as last year’s.

Apple’s Tim Cook might have thought yesterday, as he walked away from the cheering crowds of Apple employees and rabid New York Times writers, that he had won the day.

However, Apple shares fell 1.9 percent as shareholders realised that there were no transformative products that could jumpstart the company’s sales ahead of the crucial holiday season.

Apple shares usually drop an average of 0.4 percent on the day of iPhone announcements because the hype never matches the reality but this is a much bigger fall.

The big iPad received a raspberry because it was too big and similar to Microsoft’s Surface tablet and the new iPhones were too similar to those released a year ago. The Apple Surface Pro even came with a stylus, which is something that Apple fanboys mocked for years. In fact the only innovative thing about it was that it required recharging every ten hours making it the chocolate teapot of pencils.

All they had which was new was the 3D Touch which is a “so what?” technology which no one really needed or cares about. It was certainly not worth upgrading to get.

Jobs’ Mob has clearly given up on any pretence of “thinking different” and short of ideas has copied itself and others.

We expected the Apple TV announcement to be hugely disappointing. Apple has mostly dialled back its ambitions this year as it plans a bigger telly service announcement next year. But you would think that after all these years not upgrading the Apple TV, Jobs Mob could have come up with some more interesting hardware.

What we got were demonstrations showed tricks to make viewing easier voice control which can rewind a video for 15 seconds and turn on subtitles, when a viewer asks something like “What did she say?”

Oddly Cook said that Apple had worked really hard, and really long on that project. The new set-top box will include an app store and let developers create new software for Apple TV, including video games.

Again nothing that you can’t get elsewhere and probably a lot cheaper.  We expect the Tame Apple Press will go into damage control limitation exercise and try to convince the world that everything is brilliant.  Watch the comments below for statements from “Apple investors” claiming that their shares have gone up and that there was tons in yesterday’s rally to get excited about.

Source-http://www.thegurureview.net/computing-category/are-investors-losing-patience-with-apples-inventiveness.html

Can OSX Make Macs Vulnerable To Rootkits?

August 7, 2015 by  
Filed under Computing

Comments Off on Can OSX Make Macs Vulnerable To Rootkits?

The software genii at Apple have redesigned their OSX software to allow malware makers to make designer micro-software that can infect Macs with rootkits.

Obviously the feature is one that Apple software experts designed specifically for malware writers, perhaps seeing them as an untapped market.

The bug in the latest version of Apple’s OS X allows attackers root user privileges with a micro code which could be packed into a message.

Security researcher Stefan Esser said that this was the security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.

The OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Plainly the software genii did not believe that standard safeguards involving additions to the OS X dynamic linker dyld applied to them because they were protected from harm by Steve Job’s ghost.

This means that attackers to open or create files with root privileges that can reside anywhere in the OS X file system.

“This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem. And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege-escalation,” Esser said.

The vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability.

An Apple spokesman said that engineers are aware of Esser’s post of course they did not say they would do anything about it. They will have to go through the extensional crisis involved in realising that their product was not secure or perfect. Then the security team will have to issue orders, signed in triplicate, sent in, sent back, queried, lost, found, subjected to an internal inquiry, lost again, and finally bury it in soft peat for three months and recycled as firelighters.

Source

New Malware Targeting Apple Devices

November 19, 2014 by  
Filed under Computing

Comments Off on New Malware Targeting Apple Devices

Palo Alto Networks Inc  has uncovered a new group of malware that can infect Apple Inc’s  desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.

The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.

Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.

The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.

It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.

But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.

Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.

Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.

Source

BlackBerry And Amazon Team Up

June 30, 2014 by  
Filed under Smartphones

Comments Off on BlackBerry And Amazon Team Up

BlackBerry Ltd has agreed to a licensing deal with Amazon.com Inc that will let the Canadian smartphone maker offer some 240,000 Android applications from Amazon’s app store on its lineup of BlackBerry 10 devices this fall.

The move allows the Waterloo, Ontario-based company to add a vast array of consumer-focused apps to its devices, while at the same time directing its own efforts toward developing enterprise and productivity applications.

Customers who own smartphones powered by its BlackBerry 10 operating system will now be able to access popular Android apps such as Groupon, Netflix, Pinterest, Minecraft and Candy Crush Saga on their BlackBerry devices this fall. Google Inc makes Android, the mobile operating system used in more than a billion phones and tablets.

The apps will become available after the Canadian smartphone maker rolls out the upgraded BlackBerry 10.3 operating system, the company said.

The move is the latest by the smartphone pioneer to streamline its focus as it attempts to reinvent itself under new Chief Executive Officer John Chen as BlackBerry phones have lost ground to Apple Inc’s iPhone and Samsung Electronics Co Ltd’s Galaxy devices.

Analysts saw the move as a step in the right direction, but are not sure whether it will help turn the tide for BlackBerry.

“While this will widen the BB10 app ecosystem, the consumer

smartphone environment still remains challenging,” Wells Fargo analyst Maynard Um said in a note to clients.

Um views the announcement as a positive for BlackBerry, but said “whether it stems consumer churn remains to be seen.”

Chen wants to remain a competitor in the smartphone segment, but is focused on making BlackBerry a dominant force in machine-to-machine communications. The company’s QNX software already is a mainstay in the automotive industry, powering electronic and other systems in a wide range of cars.

BlackBerry already works with hundreds of large enterprise clients, including corporations and government agencies, to manage and secure mobile devices on their internal networks.

Chen intends to build on those ties and BlackBerry’s security credentials to let these enterprise clients build and customize in-house corporate and productivity applications for their employees.

Source

Is China Mobile Good For Apple?

January 29, 2014 by  
Filed under Smartphones

Comments Off on Is China Mobile Good For Apple?

The tame Apple Press has enthusiastically been running storied about how well Apple is doing in China. Reuters for example has been saying that the one million pre-orders that Jobs’ Mob has just collected is a triumph for Tim Cook’s negotiating ability. Getting a deal out of China Mobile was something the sainted Steve Jobs could not manage.

However saner heads are urging caution, While it is true that launching its iPhone on China Mobile vast network on Friday, opening the door to the world’s largest carrier’s 763 million subscribers and giving its China sales a short-term jolt, it is not likely to last. For a start the deal could start a war which China Mobile would not want. Some analysts predicting a costly subsidy war as rival carriers compete to lure customers. If China Mobile does not make its targets on sales for these phones, they are going to increase the subsidies.

China Mobile’s iPhone sales are expected to reach 12 million in its 2014 fiscal year, but its subsidies will leap 57 percent to $7 billion. In addition, the prices are still really high for the Chinese market. For the basic 16GB iPhone 5S, with no subscriber contract, China Mobile is charging $870.

China Unicom and China Telecom slashed their iPhone prices by as much as $210 following the announcement that a deal had been struck between Apple and China Mobile. The pair have also offered a range of cut-price deals on contracts. But there are also some problems with the pre-orders. Reuters checks showed that there were multiple registrations using fake ID numbers which means that people are buying up hoping to make a swift buck on resales.

All this is the least of Apple’s Chinese worries. The outfit has fallen out of favour with consumers who are increasingly opting for domestic products. Those who want an iPhone do not need to pay excessively to get one through China mobile either. In China, you can buy handsets typically smuggled from Hong Kong and then sign up for a China Mobile contract. This is a swings and roundabouts for Apple. If people buy from China Mobile, they will not buy from Hong Kong so it will lose sales there. If they don’t then the China Mobile contract is rubbish.

Source

Hackers Dupe Apple

August 28, 2013 by  
Filed under Uncategorized

Comments Off on Hackers Dupe Apple

Apple’s security was once again made a laughing stock as a team of researchers demonstrated how it is possible to sneak apps past Apple’s test regime. A group of researchers presenting at Usenix were able to spreading malicious chunks of code through an apparently-innocuous app for activation later.

According to their paper the Georgia Tech team wanted to create code that could be rearranged after it had passed AppStore’s tests. The code would look innocuous running in the test environment, be approved and signed, and would later be turned into a malicious app.

They created an app that operated as a Georgia Tech “news” feed but had malicious code was distributed throughout the app as “code gadgets” that were idle until the app received the instruction to rearrange them. After the app passes the App Review and lands on the end user device, the attacker can remotely exploit the planted vulnerabilities and assemble the malicious logic at runtime by chaining the code gadgets together.

The instructions for reassembly of the app arrive through a phone-home after the app is installed.

The app will run inside the iOS sandbox, but can successfully perform many malicious tasks, such as stealthily posting tweets, taking photos, stealing device identity information, sending email and SMS, attacking other apps, and even exploiting kernel vulnerabilities.

Source

MS Office Demand Fizzles

July 19, 2013 by  
Filed under Computing

Comments Off on MS Office Demand Fizzles

After a promising start, downloads of Microsoft’s free Office for the iPhone quickly nosedived, as the latest data from a mobile app analytics company showed.

But at least 200,000 copies of the small suite — iPhone versions of Word, Excel and PowerPoint — were downloaded in the first six days.

Distimo, a Dutch firm that tracks app store market data for several platforms, including Apple’s iOS, Google’s Android, and Microsoft’s Windows 8 and Windows Phone, said Office Mobile for the iPhone debuted in the No. 10 spot on June 15, the day after Microsoft launched the free app.

That was Office Mobile’s peak: On June 16, Office Mobile slipped to the No. 19 position among all free iPhone apps, then continued to slide throughout the week of June 17-23, starting that seven-day stretch at No. 36, falling to No. 86 by Friday, June 21, and ending at No. 299 on June 23.

From June 24 to July 6, Office Mobile was not on Distimo’s leaderboard, which lists only the top 400 downloaded apps.

The number of downloads of Office Mobile for iPhone is unknown — Distimo requires a paid account to show developers the estimated downloads of their apps and those of competitors, and did not reply to questions Sunday — but the tally was probably significant.

According to Distimo,  to place in the App Store’s No. 10 spot, an app must average 72,000 downloads daily. Office Mobile was ranked No. 10 on June 15. Apps ranked at No. 50 averaged 23,000 downloads daily: Office Mobile held position at No. 50 or lower for five consecutive days.

Those numbers implied that at least 200,000 copies of Office Mobile were downloaded in the six days between June 15 and June 20.

Likewise, the sharp decline of Office Mobile’s position in the App Store’s free list after just a week hints at a pent-up demand that was quickly satisfied.

Although rumors of Office on iOS had circulated since the iPad’s 2010 introduction, they heated up last November when reports claimed Microsoft would launch a mobile version of the suite this year and tie the software to Office 365. At the time, most analysts agreed that Office 365 was the smart move because it could boost interest in the subscription concept Microsoft has bet will result in more, and more regular, revenue from its Office cash cow.

Linking Office on iOS to Office 365 would also let Microsoft avoid the Apple “tax,” the 30% cut that Apple takes from all App Store sales.

Only Office 365 subscribers can use Office Mobile. Subscriptions range from the consumer-grade Office 365 Home Premium, which costs $100 annually, to several business plans that start at $150 per user per year and climb to $264 per user per year.

Source

Next Page »