Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Google And Yahoo Get Blocked

May 24, 2016 by  
Filed under Around The Net

Comments Off on Google And Yahoo Get Blocked

The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.

On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.

“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”

The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?

If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.

“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”

The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.

The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.

Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html

Oracle Goes Deeper Into The Cloud

May 13, 2016 by  
Filed under Computing

Comments Off on Oracle Goes Deeper Into The Cloud

Right on the heels of a similar acquisition last week, Oracle has announced it will pay $532 million to buy Opower, a provider of cloud services to the utilities industry.

Once a die-hard cloud holdout, Oracle has been making up for lost time by buying a foothold in specific industries through acquisitions such as this one. Last week’s Textura buy gave it a leg up in engineering and construction.

“It’s a good move on Oracle’s part, and it definitely strengthens Oracle’s cloud story,” said Frank Scavo, president of Computer Economics.

Opower’s big-data platform helps utilities improve customer service, reduce costs and meet regulatory requirements. It currently stores and analyzes more than 600 billion meter readings from 60 million end customers. Opower claims more than 100 global utilities among its clients, including PG&E, Exelon and National Grid.

Opower will continue to operate independently until the transaction closes, which is expected later this year. The union will create the largest provider of mission-critical cloud services to an industry that’s worth $2.3 trillion, Oracle said.

Oracle’s Utilities business delivers applications and cloud services that automate core operational processes and enable compliance for global electric, gas and water utilities.

“Oracle’s industry organizations maintain unique domain knowledge, specialized expertise and focused product investments,” said Rodger Smith, a senior vice president who leads the Utilities global business unit, in a letter to customers and partners. “This model has proven highly successful across several industries, and we look forward to bringing these same benefits to the customers of Opower.”

Source- http://www.thegurureview.net/aroundnet-category/oracle-pushes-deeper-into-cloud-computing-with-another-acquisition.html

Do Carriers Want To Abandon Google?

April 14, 2016 by  
Filed under Consumer Electronics

Comments Off on Do Carriers Want To Abandon Google?

Carrier dissatisfaction with the Android maker Google is growing as more of them look to alternatives to curb what they perceive as the search engine outfit’s inflexibility.

AT&T has publically mentioned it is looking at flogging a smartphone powered by an alternative version of Android. If true, the move is a deliberate slap in the face to Google.

US carriers are a little perturbed about the amount of control has over its products and are looking to rivals such as Cyanogen, which distributes a version of Android that’s only partially controlled by Google.

ZTE had been in discussions to make the device, these people say. But mysteriously its involvement was put in jeopardy when the US government suddenly imposed trade sanctions on the company – of course this is nothing to do with Google.

The big idea is to do something like Amazon and create new flavor of Android based on Google’s source code but controlled entirely by AT&T. It would also give AT&T sole responsibility for maintaining the OS going forward.

It would bugger up Google’s because changes to the Android system might be difficult to incorporate into AT&T’s new version, and some might not make it over at all. However AT&T would be able to integrate phones more deeply into its existing infrastructure and issue updates when it wants.

One likely possibility would be an OS-level integration with AT&T’s DirectTV service which is tricky under Google’s rules. It is not clear if AT&T is serious, or if it is just a move to force Google to pull finger.

Courtesy-Fud

Is Microsoft A Risk?

February 29, 2016 by  
Filed under Security

Comments Off on Is Microsoft A Risk?

Hewlett Packard Enterprise (HPE) has cast a shade on what it believes to be the biggest risks facing enterprises, and included on that list is Microsoft.

We ain’t surprised, but it is quite a shocking and naked fact when you consider it. The naming and resulting shaming happens in the HPE Cyber Risk Report 2016, which HPE said “identifies the top security threats plaguing enterprises”.

Enterprises, it seems, have myriad problems, of which Microsoft is just one.

“In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown,” said Sue Barsamian, senior vice president and general manager for security products at HPE.

“We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organisation to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth.”

Microsoft earned its place in the enterprise nightmare probably because of its ubiquity. Applications, malware and vulnerabilities are a real problem, and it is Windows that provides the platform for this havoc.

“Software vulnerability exploitation continues to be a primary vector for attack, with mobile exploits gaining traction. Similar to 2014, the top 10 vulnerabilities exploited in 2015 were more than one-year-old, with 68 percent being three years old or more,” explained the report.

“In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications.”

It is not all bad news for Redmond, as the Google-operated Android is also put forward as a professional pain in the butt. So is iOS, before Apple users get any ideas.

“Malware has evolved from being simply disruptive to a revenue-generating activity for attackers. While the overall number of newly discovered malware samples declined 3.6 percent year over year, the attack targets shifted notably in line with evolving enterprise trends and focused heavily on monetisation,” added the firm.

“As the number of connected mobile devices expands, malware is diversifying to target the most popular mobile operating platforms. The number of Android threats, malware and potentially unwanted applications have grown to more than 10,000 new threats discovered daily, reaching a total year-over-year increase of 153 percent.

“Apple iOS represented the greatest growth rate with a malware sample increase of more than 230 percent.”

Courtesy-TheInq

Microsoft To Release Advanced Threat Analytics

August 5, 2015 by  
Filed under Computing

Comments Off on Microsoft To Release Advanced Threat Analytics

Microsoft is very close to releasing Advanced Threat Analytics (ATA) the security sure-up that it first announced three months ago.

ATA, or MATA as we called it for our own small amusement, is the result of three months’ real world testing, and the culmination of enough user feedback to inform a final release.

That final release will happen in August, which should give you plenty of time to get your head around it.

Hmmm. Microsoft’s Advanced Threat Analytics seems like a very good idea focused on the enterprise.

— Kevin Jones (@vcsjones) May 4, 2015

Idan Plotnik, who leads the ATA team at Microsoft, explained in an Active Directory Team Blog post that the firm is working towards removing blind spots from security analytics, and that this release should provide a strong and hardy tool for the whacking away of hacking.

“Many security monitoring and management solutions fail to show you the real picture and provide false alarms. We’ve taken a different approach with Microsoft ATA,” he said.

“Our secret sauce is our combination of network Deep Packet Inspection, information about the entities from Active Directory, and analysis of specific events.

“With this unique approach, we give you the ability to detect advanced attacks and stolen credentials, and view all suspicious activities on an easy to consume, simple to explore, social media feed like attack timeline.”

The Microsoft approach is an on-premise device that detects and analyses threats as they happen and on a retrospective basis. Plotnik said that it combines machine learning and knowledge about existing techniques and tactics to proactively protect systems.

“ATA detects many kinds of abnormal user behaviour many of which are strong indicators of attacks. We do this by using behavioural analytics powered by advanced machine learning to uncover questionable activities and abnormal behaviour,” he added.

“This gives the ability for ATA to show you attack indicators like anomalous log-ins, abnormal working hours, password sharing, lateral movement and unknown threats.”

A number of features will be added to the preview release, including performance improvements and the ability to deal with more traffic, before general availability next month.

Source

Text To 911 Has Low Adoption Rate

May 19, 2015 by  
Filed under Around The Net

Comments Off on Text To 911 Has Low Adoption Rate

Only 5% of the nation’s 6,500 emergency dispatch centers are capable of receiving and responding to emergency text-to-911 messages.

That’s not good enough for more than 41,000 signers of a Change.org petition. They want Congress to pass legislation requiring emergency centers to update their systems to accommodate texting.

Text-to-911 would have provided much-needed help for Lisbeth (not her real name), a mother of two who said she was repeatedly battered by her boyfriend in her home over several years. One day three years ago, when he was yelling at her, she tried to call 911 on her cell phone for help, but he broke down the door where she was hiding and demanded to know whom she was calling.

“I was trying to whisper, but he got in and punched me and asked me who I was talking to,” Lisbeth said in an interview. That time, a neighbor overheard the fight and called 911 to bring police to the scene.

“911 works, but I wish it worked with text,” she added. “If they had it back then, it might have made a difference.” Lisbeth later moved into a shelter for abused women in California’s San Fernando Valley and said her life has improved for herself and her children. “Anybody who is going through the same situation as I was should ask for help,” she said.

The Federal Communications Commission last yea rrequired U.S. carriers and makers of some texting apps to provide emergency texting with their services, but the FCC doesn’t regulate the nation’s emergency dispatch centers. Instead, the centers are regulated locally by 3,200 different states, counties and cities, even though many of those jurisdictions receive federal funds for the dispatch centers.

FCC Commissioner Ajit Pai last August expressed concerns that FCC mandates for carriers might give the public a false impression that they can send texts to emergency responders when so few are prepared to receive texts.

Source

Terror Alerts To Be Issued Via Facebook, Twitter

April 10, 2011 by  
Filed under Around The Net

Comments Off on Terror Alerts To Be Issued Via Facebook, Twitter

The U.S. government may start issuing terror alerts via Facebook and Twitter, according to a news service report.

The Associated Press reported Thursday that the U.S. Department of Homeland Security is working to re-design the current color-coded terror alert system. The new system, according to the report, would have only two levels of alerts — elevated and imminent.

Those alerts would be conveyed out to the public in part via social networking sites Facebook and Twitter . The AP article is based on a 19-page draft of the plan that the news service obtained.

“The new terror alerts would also be published online using Facebook and Twitter ‘when appropriate,’” the news agency reported, “but only after federal, state and local government leaders have already been notified.”

The new system is expected to be in place by April 27.

Zeus Kerravala, an analyst at Yankee Group Research, said the fact that the U.S. government is entrusting something as critical as terrorist alerts to Facebook and Twitter shows how important social networking sites have become to people’s lives.

Read more….