Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Does M$ Have A Strategy For Windows?

July 27, 2016 by  
Filed under Computing

Comments Off on Does M$ Have A Strategy For Windows?

As we reported earlier today, Microsoft CEO Satya Nadella proclaimed the virtues of its cloud computing platform.

But he didn’t say very much about Windows at all.

And, according to Seeking Alpha financial analyst Mark Hibben in a note to his clients, it’s almost as if Nadella has given up the ghost on the now long in the tooth operating system.

He didn’t say much about smartphones either but admitted that Windows 10 won’t hit the one billion user mark.

But there are another billion and a bit people out there who are using previous versions of Windows and Hibben thinks that that’s Microsoft should really take advantage of that opportunity.

Hibben thinks that while Nadella is practically creaming himself about the cloud the same sort of urges don’t seem to apply to Windows.

Windows phone revenues have fallen 71 percent compared to the same period last year and Microsoft seems to lack a strategy for smartphones in the future.

So has Microsoft given up on Windows? That, surely, can’t be the case.

Courtesy-Fud

Google And Yahoo Get Blocked

May 24, 2016 by  
Filed under Around The Net

Comments Off on Google And Yahoo Get Blocked

The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.

On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.

“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”

The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?

If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.

“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”

The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.

The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.

Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html

Twitter Blocks Intelligence Agencies

May 17, 2016 by  
Filed under Around The Net

Comments Off on Twitter Blocks Intelligence Agencies

Twitter has prohibited a data-mining firm from providing analytics of real-time tweets to U.S. intelligence agencies, according to a Wall Street Journal report, quoting a person familiar with the matter.

Twitter, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.

Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies.

Twitter’s move appears to be in line with its policy on the use of its tweet data by external companies.

“Dataminr uses public Tweets to sell breaking news alerts to companies such as Wall Street Journal parent Dow Jones and government agencies such as the World Health Organization, for non-surveillance purposes,” Twitter said in a statement Sunday. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes.”

U.S. intelligence agencies gained access to Dataminr’s service after In-Q-Tel, aventure capital organization backed by U.S. intelligence agencies, put money in the firm, the WSJ said, quoting a person familiar with the matter. Twitter is said to have conveyed to Dataminr that it didn’t want to continue the relationship with intelligence agencies at the end of a pilot by the data analysis firm arranged by In-Q-Tel. Dataminr does not figure in the list of In-Q-Tel portfolio companies on its website.

Source-http://www.thegurureview.net/uncategorized/twitter-blocks-intelligence-agencies-access-to-tweet-analytics.html

Will Google Stop Using Java?

April 22, 2016 by  
Filed under Computing

Comments Off on Will Google Stop Using Java?

Google is so hacked off with Oracle’s java antics it is seriously considering taking it out of Android and replacing it with Apple’s open sauce Swift software.

While we would have thought that there would be little choice between Oracle and Apple as evil software outfits, the fact that Apple uncharacteristically made Swift open source might make life a bit brighter for Google. At the moment Oracle is suing Google for silly money for its Java use in Android.

Swift was created as a replacement for Objective C, and is pretty easy-to-write. It was introduced at WWDC 2014, and has major support from IBM as well as a variety of major apps like Lyft, Pixelmator and Vimeo that have all rebuilt iOS apps with Swift.

But since Apple open sourced Swift, Google, Facebook and Uber have al said that they are interested in it. Taking Java out of Android is a big job. Google would also have to make its entire standard library Swift-ready, and support the language in APIs and SDKs. Some low-level Android APIs are C++, which Swift cannot bridge to. Higher level Java APIs would also have to be re-written.

Of course if it did all this, Apple might realize that its biggest rival was using its own software to club it to death. It might not be be so nice about allowing Swift out to play and eventually Google have to fork Swift and dump the Apple version. This would probably result in an anst-ridden moan album about how life is so unfair which makes a fortune while scoring passive agressive revenge on the dumpee.

Courtesy-Fud

Windows 10 Passes 20% User Share Mark

April 6, 2016 by  
Filed under Computing

Comments Off on Windows 10 Passes 20% User Share Mark

For the first time since its debut, Windows 10 accounted for more than one-fifth of the visits to sites tracked by the Digital Analytics Program (DAP), which mines traffic to more than 4,000 websites on over 400 different domains maintained by U.S. government agencies, such as the Internal Revenue Service and the National Weather Service.

The bulk of the visits to DAP websites originate in the U.S.

So far Windows 10 has recorded 20.2% of visits in March by Windows PCs, smartphones and tablets. That was a one-percentage point increase from February and more than two percentage points above January’s.

Although Microsoft irregularly trumpets the number of devices running Windows 10 — the last time was nearly three months ago — data from DAP and metrics vendors like Net Applications and StatCounter are the only publicly available sources for monitoring Windows 10 adoption.

But these external measurements are rough at best.

A case in point: Because overall traffic to DAP websites plummets on weekends — total visits by Windows devices on Saturday and Sunday are typically less than half that of a weekday — Windows 10 may be unrepresented, as more Windows PCs used during the work week are business machines, which predominantly run the corporate standard, Windows 7.

Microsoft has just over four months left to boost Windows 10 adoption by pushing the free upgrade to eligible Windows 7 and 8.1 devices. That deal is set to expire July 29, on the one-year anniversary of Windows 10′s launch.

Windows 10 adoption growth has slowed each month this year. At the pace of past three months, Windows 10 should account for approximately 26% of DAP’s traffic by the end of July. (Other data sources have repeatedly portrayed global adoption of Windows 10 at lower rates than in the U.S.)

Will that match whatever goal Microsoft set when it decided to give away upgrades? Microsoft’s not saying, and even if it did, there would be no way to verify any claim.

Source- http://www.thegurureview.net/computing-category/windows-10-passes-20-user-share-mark.htm

GM Buys Cruise Automation

March 21, 2016 by  
Filed under Around The Net

Comments Off on GM Buys Cruise Automation

General Motors the acquisition Cruise Automation for Cruise’s deep software talent and rapid development capability — a move designed to further accelerate GM’s development of autonomous vehicle technology.

Over the past two months, GM has entered into a $500 million alliance with ride-sharing company Lyft; formed Maven — its personal mobility brand for car-sharing fleets in many U.S. cities — and established a separate unit for autonomous vehicle development.

“This acquisition announcement clearly shows that GM is serious about developing the technology and controlling its own path to self-driving and driverless vehicles,” said Egil Juliussen, research director for IHS Automotive.

While GM did not disclose the financial details of the Cruise acquisition, reports estimated the purchase to be in the $1 billion range.

Founded in 2013, Cruise sells an aftermarket product that is positioned as a highway autopilot, according to IHS Automotive.

Vehicles using Cruise’s software cannot automatically changes lanes, but the technology does work at low speed and highway speed, meaning it’s classified between Level 2 and Level 3 in the National Highway Traffic Safety Administration’s levels of autonomous driving.

The NHTSA’s Level 3 includes limited self-driving automation and allows a driver to cede full control of all safety-critical functions under certain traffic or environmental conditions; Level 4 indicates a fully autonomous vehicle.

Cruise’s software was initially offered by Audi in its A4 and S4 vehicles as a $10,000 option that required installation work by Cruise. The product consisted of a sensor unit on top of the car and a computer in the trunk.

GM’s purchase of Cruise is likely to spur other carmakers “to react and determine what their strategy should be,” Juliussen said.

Other carmakers are likely to seek to become partners with Google and license Google’s self-driving and driverless software technology. Multiple manufacturers are likely to opt for a Google partnership, IHS said.

Source- http://www.thegurureview.net/aroundnet-category/gm-announces-acquisition-of-cruise-automation.html

U.S. Wants To Help Supercomputer Makers

March 1, 2016 by  
Filed under Computing

Comments Off on U.S. Wants To Help Supercomputer Makers

Five of the top 12 high performance computing systems in the world are owned by U.S. national labs. But they are beyond reach, financially and technically, for many within the computing industry, even larger ones.

That’s according to U.S. Department of Energy (DOE) officials, who run the national labs. A new program aims to connect manufacturers with supercomputers and the expertise to use them.

This program provides $3 million, initially, for 10 industry projects, the DOE has announced. Whether the program extends into future fiscal years may well depend on Congress.

The projects are all designed to improve efficiency, product development and energy use.

For instance, Procter & Gamble will get help to reduce the paper pulp in products by 20%, “which could result in significant cost and energy savings” in this energy- intensive industry, according to the project description.

Another firm, ZoomEssence, which produces “powder ingredients that capture all the key sensory components of a liquid,” will work to optimize the design of a new drying method using HPC simulations, according to the award description.

Some other projects in the initial implementation of what is being called HPC4Mfg (HPC for Manufacturing) includes an effort to help Global Foundriesoptimize transistor design.

In another, the Ohio Supercomputer Center and the Edison Welding Institute will develop a welding simulation tool.

The national labs not only have the hardware; “more importantly the labs have deep expertise in using HPC to help solve complex problems,” said Donna Crawford, the associate director of computation at Lawrence Livermore National Laboratory, in a conference call. They have the applications as well, she said.

HPC can be used to design and prototype products virtually that otherwise might require physical prototypes. These systems can run simulations and visualizations to discover, for instance, new energy-efficient manufacturing methods.

Source-http://www.thegurureview.net/computing-category/u-s-wants-to-help-supercomputer-makers.html

Is Microsoft A Risk?

February 29, 2016 by  
Filed under Security

Comments Off on Is Microsoft A Risk?

Hewlett Packard Enterprise (HPE) has cast a shade on what it believes to be the biggest risks facing enterprises, and included on that list is Microsoft.

We ain’t surprised, but it is quite a shocking and naked fact when you consider it. The naming and resulting shaming happens in the HPE Cyber Risk Report 2016, which HPE said “identifies the top security threats plaguing enterprises”.

Enterprises, it seems, have myriad problems, of which Microsoft is just one.

“In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown,” said Sue Barsamian, senior vice president and general manager for security products at HPE.

“We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organisation to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth.”

Microsoft earned its place in the enterprise nightmare probably because of its ubiquity. Applications, malware and vulnerabilities are a real problem, and it is Windows that provides the platform for this havoc.

“Software vulnerability exploitation continues to be a primary vector for attack, with mobile exploits gaining traction. Similar to 2014, the top 10 vulnerabilities exploited in 2015 were more than one-year-old, with 68 percent being three years old or more,” explained the report.

“In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications.”

It is not all bad news for Redmond, as the Google-operated Android is also put forward as a professional pain in the butt. So is iOS, before Apple users get any ideas.

“Malware has evolved from being simply disruptive to a revenue-generating activity for attackers. While the overall number of newly discovered malware samples declined 3.6 percent year over year, the attack targets shifted notably in line with evolving enterprise trends and focused heavily on monetisation,” added the firm.

“As the number of connected mobile devices expands, malware is diversifying to target the most popular mobile operating platforms. The number of Android threats, malware and potentially unwanted applications have grown to more than 10,000 new threats discovered daily, reaching a total year-over-year increase of 153 percent.

“Apple iOS represented the greatest growth rate with a malware sample increase of more than 230 percent.”

Courtesy-TheInq

Twitter To Revive Tweets

January 11, 2016 by  
Filed under Around The Net

Comments Off on Twitter To Revive Tweets

Right on the heels of the first U.S. presidential primaries and caucuses, a popular archive of sometimes-misguided or embarrassing tweets that have been deleted by politicians and their staff has been resurrected by Twitter.

Politwoops had been a popular social media destination for political junkies and others looking to unearth social media gaffes by politicians.

But in a move widely lambasted by open-government advocates, Twitter effectively shuttered Politwoops last summer when it revoked access to its interface by the government accountability watchdog, the Sunlight Foundation, that had developed the tool and had been publishing the tweets.

On Thursday, Twitter said it had reached a deal with Sunlight and another organization, the Open State Foundation, to restore the tool.

“Politwoops is an important tool for holding our public officials, including candidates and elected or appointed public officials, accountable for the statements they make, and we’re glad that we’ve been able to reach an agreement with Twitter to bring it back online both in the U.S. and internationally,” said Jenn Topper, communications director for The Sunlight Foundation.

While the announcement was a victory for government-transparency advocates, it could prove to be a setback for politicians hoping to avoid the social media rumpus that can accompany an ill-timed tweet or misconstrued online musing.

The deal comes as the clock ticks closer to the first vote casting in the 2016 U.S. presidential campaign. The Iowa caucuses will take place on Feb. 1, followed by the first primary in New Hampshire on Feb. 9.

Source-http://www.thegurureview.net/aroundnet-category/twitter-to-revived-archived-deleted-tweets-of-politicians.html

Pawn Storm Hacking Develops New Tools For Cyberespionage

December 17, 2015 by  
Filed under Security

Comments Off on Pawn Storm Hacking Develops New Tools For Cyberespionage

A Russian cyberespionage group known as Pawn Storm has made use of new tools in an ongoing attack campaign against defense contractors with the goal of defeating network isolation policies.

Pawn Storm, also known as Sofacy, after its primary malware tool, has been active since at least 2007 and has targeted governmental, security and military organizations from NATO member countries, as well as media organizations, Ukrainian political activists and Kremlin critics.

Since August, the group has been engaged in an attack campaign focused on defense contractors, according to security researchers from Kaspersky Lab.

During this operation, the group has used a new version of a backdoor program called AZZY and a new set of data-stealing modules. One of those modules monitors for USB storage devices plugged into the computer and steals files from them based on rules defined by the attackers.

The Kaspersky Lab researchers believe that this module’s goal is to defeat so-called network air gaps, network segments where sensitive data is stored and which are not connected to the Internet to limit their risk of compromise.

However, it’s fairly common for employees in organizations that use such network isolation policies to move data from air-gapped computers to their workstations using USB thumb drives.

Pawn Storm joins other sophisticated cyberespionage groups, like Equation and Flame, that are known to have used malware designed to defeat network air gaps.

“Over the last year, the Sofacy group has increased its activity almost tenfold when compared to previous years, becoming one of the most prolific, agile and dynamic threat actors in the arena,” the Kaspersky researchers said in a blog post. “This activity spiked in July 2015, when the group dropped two completely new exploits, an Office and Java zero-day.”

Source- http://www.thegurureview.net/aroundnet-category/pawn-storm-hacking-group-develops-new-tools-for-cyberespionage.html

Next Page »