Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Tech Firms Form OTrP To Support IoT Security

July 29, 2016 by  
Filed under Security

Comments Off on Tech Firms Form OTrP To Support IoT Security

A bunch of tech firms including ARM and Symantec have joined forces to create a security protocol designed to protect Internet of Things (IoT) devices.

The group, which also includes Intercede and Solacia, has created The Open Trust Protocol (OTrP) that is now available for download for prototyping and testing from the IETF website.

The OTrP is designed to bring system-level root trust to devices, using secure architecture and trusted code management, akin to how apps on smartphones and tablets that contain sensitive information are kept separate from the main OS.

This will allow IoT manufacturers to incorporate the technology into devices, ensuring that they are protected without having to give full access to a device OS.

Marc Canel, vice president of security systems at ARM, explained that the OTrP will put security and trust at the core of the IoT.

“In an internet-connected world it is imperative to establish trust between all devices and service providers,” he said.

“Operators need to trust devices their systems interact with and OTrP achieves this in a simple way. It brings e-commerce trust architectures together with a high-level protocol that can be easily integrated with any existing platform.”

Brian Witten, senior director of IoT security at Symantec, echoed this sentiment. “The IoT and smart mobile technologies are moving into a range of diverse applications and it is important to create an open protocol to ease and accelerate adoption of hardware-backed security that is designed to protect onboard encryption keys,” he said.

The next stage is for the OTrP to be further developed by a standards-defining organisation after feedback from the wider technology community, so that it can become a fully interoperable standard suitable for mass adoption.

Courtesy-TheInq

 

Apple Rolls Out A Revamped Store

June 21, 2016 by  
Filed under Consumer Electronics

Comments Off on Apple Rolls Out A Revamped Store

Apple Inc announced a series of long anticipated enhancements to its App Store, but the new features may not ease concerns of developers and analysts who say that the App Store model – and the very idea of the single-purpose app – has seen its best days.

The revamped App Store will let developers advertise their wares in search results and give developers a bigger cut of revenues on subscription apps, while Apple said it has already dramatically sped up its app-approval process.

The goal is to sustain the virtuous cycle at the heart of the hugely lucrative iPhone business. Software developers make apps for the iPhone because its customers are willing to pay, and those customers, in turn, pay a premium for the device because it has the best apps.

The store is now more strategically important than ever for Apple as sales of the iPhone begin to level off and the company looks to software and services to fill the gap. Apple CEO Tim Cook said on a recent conference call that App Store revenues were up 35 percent over last year.

But the store is also a victim of its own success. Eight years after its launch, it is packed with more than 1.9 million apps, according to analytics firm App Annie, making it almost impossible for developers to find an audience – and increasingly difficult for customers to find what they need, as some 14,000 new apps arrive in the store each week.

“The app space has grown out of control,” said Vint Cerf, one of the inventors of the internet and now a vice president at Alphabet Inc’s Google, who was speaking at a San Francisco conference on the future of the web on Wednesday. “We need to move away from having an individual app for every individual thing you want to do.”

Courtesy-http://www.thegurureview.net/mobile-category/apple-rolls-out-a-revamped-app-store.html

Google Upgrades Voice Search

October 8, 2015 by  
Filed under Around The Net

Comments Off on Google Upgrades Voice Search

Google said it has constructed a better neural network that is making its voice search work faster and better in noisy environments.

“We are happy to announce that our new acoustic models are now used for voice searches and commands in the Google app (on Android and iOS), and for dictation on Android devices,” Google’s Speech Team wrote in a recent  blog post . “In addition to requiring much lower computational resources, the new models are more accurate, robust to noise, and faster to respond to voice search queries.”

In 2013, Google brought the same voice recognition tools that had been working in Google Now to Google Search.

Along with being able to find information on the Internet, Google Voice Search also was able to find information for users in their Gmail, Google Calendar and Google+ accounts.

At the 2013 Google I/O developers conference, Amit Singhai, today a senior vice president and Google Fellow, said the future of search is in voice. For Google, he said, future searches will be more like conversations with your computer or device, which also will be able to give you information before you even ask for it.

The company went on to make it clear that it would continue to focus on voice search.

And this week’s announcement backs that up.

Google explained in its blog post that it has updated the neural network it’s using for voice search. A neural network is a computer system based on the way the human brain and nervous system work. It generally uses many processors operating in parallel.

The improved neural network is able to consume the incoming audio in larger chunks than conventional models without performing as many calculations.

“With this, we drastically reduced computations and made the recognizer much faster,” the team wrote. “We also added artificial noise and reverberation to the training data, making the recognizer more robust to ambient noise.”

Source-http://www.thegurureview.net/aroundnet-category/google-upgrades-voice-search.html

FCC Commits To 600 Mhz Wireless Spectrum Auction

September 21, 2015 by  
Filed under Uncategorized

Comments Off on FCC Commits To 600 Mhz Wireless Spectrum Auction

LAS VEGAS — Federal Communications Commission Chairman Tom Wheeler has committed to a March 29 start date for an unprecedented auction of 600Mhz wireless spectrum currently under the control of the nation’s broadcasters.

The auction has already been delayed two years, but Wheeler was adamant it will move ahead on a timeline that allows input from broadcasters as well as from wireless providers that would be potential spectrum buyers.

The broadcast spectrum in the 600Mhz band offers the potential to wireless carriers to send data, including video and other multimedia at much faster speeds and with lower latency. Latency refers to the speed required to generate a response to a wireless signal.

“I’m supremely confident [the auction] starts March 29,” he said in keynote comments at CTIA Super Mobility Week 2015 here. Explaining the delays, he said the planned auction is like a “Swiss watch with so many moving parts.”

The FCC plans to issue a new public notice in October that will give further details on the planned schedule. Wheeler said that around Thanksgiving, broadcasters will be able to indicate whether they want to participate in offering up the spectrum they use today.

Once the FCC establishes pricing, the broadcasters can decide whether to move forward or withdraw from the process if the prices don’t meet their needs, Wheeler said. In January, wireless providers — including newcomers, possibly — will be prompted to express interest in joining the auction to buy spectrum.

Wheeler contended that the 600MHz spectrum auction shows the FCC is moving to free up spectrum that the cellular industry says it urgently needs.

Source-http://www.thegurureview.net/mobile-category/fcc-commits-to-600-mhz-wireless-spectrum-auction-in-march.html

Drones To Have Intel Inside

September 10, 2015 by  
Filed under Computing

Comments Off on Drones To Have Intel Inside

Intel is taking its competitive game up a notch by investing in its own drones.

Intel has written a check for more than US$60 million to Yuneec International, a Chinese aviation company and drone maker.

This is not the first time that the Chipmaker has invested in drones. It has written smaller amounts for the drone makers Airware and PrecisionHawk. The Yuneec deal is its largest investment in a drone company yet.

Apparently Intel thinks that drones are potential computing platforms for its processors.

Intel CEO Brian Krzanich said he believed in a smart and connected world. And one of the best ways to bring that smart and connected world to everyone and everywhere has been drones.

Amazon and Google are developing drones as they seek new ways to deliver items to consumers, Intel just wants to make sure that its chips are delivering the payload. There is no indication that it is building a secret airforce which it will use to take down competition – that would be silly.

Yuneec makes a range of drones built for aerial photography and imaging. Its technology also powers manned electric aircraft.

Source-http://www.thegurureview.net/computing-category/drones-to-have-intel-inside.html

Should Encryption Be The Norm?

December 1, 2014 by  
Filed under Computing

Comments Off on Should Encryption Be The Norm?

Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.

The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.

It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.

“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”

The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.

The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.

However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.

These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.

Source

SalesForce Goes Hacking

November 7, 2013 by  
Filed under Computing

Comments Off on SalesForce Goes Hacking

Salesforce.com really wants to attract lots of developers to its Dreamforce conference next month in San Francisco. As in, really.

Last Friday, the cloud software vendor announced a “hackathon” would be held at the conference, with US$1 million going to the developer or team who creates the top prize-winning mobile application with Salesforce.com technology.

“It’s not going to be easy — $1 million is going to bring out the best of the best,” Salesforce.com said in Friday’s announcement. “So don’t wait until Dreamforce! You’re going to want to get started now. With Force.com, Heroku, ExactTarget Fuel, Mobile Services and more — you’ve got a killer array of platform technology to use.”

Salesforce.com will also be providing some “pretty amazing new technology” for use at the show, the announcement adds.

In order to participate, developers have to either register for a full conference pass or a special $99 hacker pass.

The hackathon reflects Salesforce.com’s long courtship of developers to its development technologies, its AppExchange marketplace and recent efforts to build out more tooling for mobile application development.

Developers taking part in the hackathon will have plenty of competition, with some 20,000 programmers expected to attend Dreamforce overall. A “Hack Central” area will be open around the clock, supporting coders who want to work until the wee hours on their application.

In order to qualify, an application can’t have been previously released. The entries will be judged on four criteria counting 25 percent each: innovation, business value, user experience and use of Salesforce.com’s platform.

The second-place finisher will receive $50,000, with $25,000 going to the third-place winner. Fourth and fifth place will get $10,000 and $5,000, respectively.

Some 120,000 people are expected to register for Dreamforce this year. While some of that total will be watching online rather than in person, Dreamforce is now operating at a scale rivaling Oracle’s OpenWorld event, which happened last month.

Source

Inventor Predicts Future Of 3D

October 1, 2013 by  
Filed under Around The Net

Comments Off on Inventor Predicts Future Of 3D

Pablos Holman predicts that in the not too distant future our diets will be tailored to our metabolisms, adding a few bits of broccoli, a smattering of beets and some meat — all extruded from a 3D printer in an appetizing form to please our palates.

Holman is a futurist and inventor at the Intellectual Ventures Laboratory in Bellevue, Wash., where he and others work on futuristic projects like printable food. He was not alone in speaking on the topic at the Inside 3D Printing Conference last week.

Avi Reichentall, CEO of 3D Systems, one of the largest consumer printer companies, has already been able to configure his machines to create a variety of sugary goods, including cakes and candy. The sweets were on display with ornate designs.

Reichentall said consumers can expect his company to build a machine that will take a place next to the coffee maker on a kitchen counter, but instead of a caffeine shot, it will offer a sugar rush.

“We are working on a chocolate printer. I want a chocolate printer in my kitchen. I want it to be as cool as a Keurig coffee maker,” Reichentall said. “We now have 3D printed sugar. We’re going to bring to pastry chefs and confectionaries and bakers a whole range of new sugar printing capabilities.

“This is coming to a marketplace near you very soon,” he said.

While Reichentall focuses on desserts, Holman is busy with main courses, creating machines that can take freeze-dried food and hydrate it as it is being extruded through nozzles to create an eye-pleasing meal.

Source

Is The Tesla Hackable?

September 9, 2013 by  
Filed under Security

Comments Off on Is The Tesla Hackable?

It’s the curse of the connected car once it’s linked to the Internet, it’s, well, on the Internet. In the case of the Tesla Model S, this means that mischievous hackers could, in theory, control some functions of the vehicle and even snoop without the owner’s knowledge.

Tesla offers Android and iPhone apps for Model S owners, which can be used to check the vehicle’s battery, track its location and status, and tweak several other settings, like climate control and the sunroof. It can also be used to unlock the doors on the Model S.

Dell senior engineer George Reese says the REST API used by Tesla to provide access for Android and iPhone apps has several fairly serious security flaws, which could offer a way in for unscrupulous hackers.

According to an article written by Reese for O’Reilly, Tesla appears to have broken from accepted best practice when designing the API for the Model S.

“It’s flawed in a way that makes no sense. Tesla ignored most conventions around API authentication and wrote their own. As much as I talk about the downsides to OAuth (a standard for authenticating consumers of REST APIs–Twitter uses it), this scenario is one that screams for its use,” he wrote.

However, Reese notes, this is merely a potential attack vector, not one that could be immediately exploited. That said, a compromised website particularly one designed to provide “value-added services” via the API to Tesla drivers could prove highly damaging.

“I can … honk their horns, flash their lights, and open and close the sunroof. While none of this is catastrophic, it can certainly be surprising and distracting while someone is driving,” Reese wrote.

Automotive hacking has been posited by experts for some time, and several presentations at this year’s Defcon detailed fairly comprehensive methods of compromising some models.

Source

Is Apple Doomed?

August 22, 2013 by  
Filed under Consumer Electronics

Comments Off on Is Apple Doomed?

The necromancy department of Apple has been summoning the spirit of Steve Jobs in the hope of turning around its current dismal growth figures. For a while now, even amongst Apple fanboys, there has been a belief that Jobs’ Mob has gone done the tubes since Jobs croaked.

It is a myth of course, Jobs’ specialty was not innovation but to market a working ideas as if it were his own. But either way Apple is attempting to try and convince everyone that the new iPhone was personally designed by its former CEO. Even after being dead for a while now, and having no impact over the disasters the company has since suffered, Jobs apparently was on board for the iPhone 5S.

According to Apple’s government liaison Michael Foulkes, Jobs oversaw the design of two models of iPhone to go on sale after his death. We suspect that it will take full resurrection before anyone takes this particular spin seriously. If Jobs could really see into the future and predict where his toys would be three years after he died, we would have thought he would have also seen that was a stupid idea not to accept conventional medical treatment for his cancer until it was too late.

Source

Next Page »