Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

‘Stegano’ Malvertising Exposes Millions To Hacking

December 13, 2016 by  
Filed under Around The Net

Comments Off on ‘Stegano’ Malvertising Exposes Millions To Hacking

Since October, millions of internet users have been exposed to malicious code embedded in the pixels from tainted banner ads designed to install Trojans and spyware, according to security firm ESET.

The attack campaign, called Stegano, has been spreading from malicious ads in a “number of reputable news websites,” ESET said in a Tuesday blog post. It’s been preying on Internet Explorer users by scanning for vulnerabilities in Adobe Flash and then exploiting them.

The attack is designed to infect victims with malware that can steal email password credentials through its keylogging and screenshot grabbing features, among others.

The attack is also hard to detect. To infect their victims, the hackers were essentially poisoning the pixels used in the tainted banner ads, ESET said in a separate post.

The hackers concealed their malicious coding in the parameters controlling the pixels’ transparency on the banner ad. This allowed their attack to go unnoticed by the legitimate advertising networks.

Victims will typically see a banner ad for a product called “Browser Defense” or “Broxu.” But in reality, the ad is also designed to run Javascript that will secretly open a new browser window to a malicious website designed to exploit vulnerabilities in Flash that will help carry out the rest of the attack.

Hackers have used similar so-called malvertising tactics to secretly serve malicious coding over legitimate online advertising networks. It’s an attack method that has proven to be a successful at quickly spreading malware to potentially millions.

The makers behind the Stegano attack were also careful to create safeguards to prevent detection, ESET said. For instance, the banner ads will alternate between serving a malicious version or a clean version, depending on the settings run on the victim’s computer. It will also check for any security products or virtualization software on the machine before proceeding with the attack.

ESET declined to name the news websites that were found unknowingly displaying the malicious ads, but cautioned that the attack was widespread, and could have been hosted through other popular sites as well.

Source-http://www.thegurureview.net/aroundnet-category/stegano-malvertising-ads-expose-millions-of-online-users-to-hacking.html

Will The TeraHertz Band Increase Wi-Fi Speeds?

December 9, 2016 by  
Filed under Around The Net

Comments Off on Will The TeraHertz Band Increase Wi-Fi Speeds?

Researchers have worked out a way to push Wi-Fi speeds to 34 Gbps using the TeraHertz band.

While greater bandwidth in the 300GHz and above band has been known for a while it is pointless because the range makes it a chocolate teapot.

Some researchers have managed to hit 100 Gbps but when it only works for a few centimeters it is not commercially viable.

Now boffins at the Tokyo Institute of Technology have got the technology to provide a great 34 Gbps speed with a decent range.

Naoto Oshimo, one of the scientists behind this latest test, said that “device performance is almost sufficient for short-distance wireless communication such as KIOSK downloads, which might be its first application”. By that they mean that they have managed 10 metres, almost OK for home use.

Oshimo believes that this technology will scale hugely in terms of the speed as well, and we could eventually be looking at topping the 1Tbps mark.

Courtesy-Fud

Can iOS Activation Lock Be Bypassed?

December 7, 2016 by  
Filed under Around The Net

Comments Off on Can iOS Activation Lock Be Bypassed?

Two researchers report that they have discovered a way to bypass the activation lock feature in iOS that’s supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner.

The first report came Sunday from an Indian security researcher named Hemanth Joseph, who started investigating possible bypasses after being confronted with a locked iPad he acquired from eBay.

The activation lock gets enabled automatically when users turn on the Find My iPhone feature via iCloud. It links the device to their Apple IDs and prevents anyone else from accessing the device without entering the associated password.

One of the few things allowed from the activation lock screen is connecting the device to a Wi-Fi network, including manually configuring one. Hemanth had the idea of trying to crash the service that enforces the lock screen by entering very long strings of characters in the WPA2-Enterprise username and password fields.

The researcher claims that, after awhile, the screen froze, and he used the iPad smart cover sold by Apple to put the tablet to sleep and then reopen it. This is supposed to restore the state of the tablet from where it was left off, in this case, loading the WPA2 screen again with the long strings of characters filled in.

“After 20-25 seconds the Add Wifi Connection screen crashed to the iPad home screen, thereby bypassing the so-called Find My iPhone Activation Lock,” he said in a blog post.

Hemanth said he reported the issue to Apple on Nov. 4, and the company is investigating it. He tested the bypass on iOS 10.1, which was released on Oct. 24.

Last week, a researcher named Benjamin Kunz Mejri, from German outfit Vulnerability Lab, posted a video showing the same bypass, but on the newer iOS 10.1.1 version.

Kunz Mejri’s method is similar and also involves overflowing the Add Wi-Fi form fields with long strings of characters but also requires rotating the tablet’s screen in order to trigger the crash after the smart cover trick.

Apple has not yet confirmed that issue and did not immediately respond to a request for comment.

Source- http://www.thegurureview.net/mobile-category/researcher-prove-ios-activation-lock-can-be-bypassed.html

Is Facebook Moving Into A.I.?

December 6, 2016 by  
Filed under Around The Net

Comments Off on Is Facebook Moving Into A.I.?

Facebook Inc is developing a way to automatically flag offensive material in live video streams, building on a growing effort to use artificial intelligence to monitor content, said Joaquin Candela, the company’s director of applied machine learning.

The social media company has been embroiled in a number of content moderation controversies this year, from facing international outcry after removing an iconic Vietnam War photo due to nudity, to allowing the spread of fake news on its site.

Facebook has historically relied mostly on users to report offensive posts, which are then checked by Facebook employees against company “community standards.” Decisions on especially thorny content issues that might require policy changes are made by top executives at the company.

Candela told reporters that Facebook increasingly was using artificial intelligence to find offensive material. It is “an algorithm that detects nudity, violence, or any of the things that are not according to our policies,” he said.

The company already had been working on using automation to flag extremist video content, as Reuters reported in June.

Now the automated system also is being tested on Facebook Live, the streaming video service for users to broadcast live video.

Using artificial intelligence to flag live video is still at the research stage, and has two challenges, Candela said. “One, your computer vision algorithm has to be fast, and I think we can push there, and the other one is you need to prioritize things in the right way so that a human looks at it, an expert who understands our policies, and takes it down.”

Facebook said it also uses automation to process the tens of millions of reports it gets each week, to recognize duplicate reports and route the flagged content to reviewers with the appropriate subject matter expertise.

Chief Executive Officer Mark Zuckerberg in November said Facebook would turn to automation as part of a plan to identify fake news. Ahead of the Nov. 8 U.S. election, Facebook users saw fake news reports erroneously alleging that Pope Francis endorsed Donald Trump and that a federal agent who had been investigating Democratic candidate Hillary Clinton was found dead.

However, determining whether a particular comment is hateful or bullying, for example, requires context, the company said.

Source-http://www.thegurureview.net/aroundnet-category/facebook-developing-artificial-intelligence-to-patrol-live-videos.html

Intel Sheds McAfee

September 14, 2016 by  
Filed under Security

Comments Off on Intel Sheds McAfee

Intel has sold the Intel Security business for $3.5bn less than it paid for it six years ago.

Intel Security, previously and better known as McAfee, has been sold to private equity firm TPG for $4.2bn, despite Intel paying $7.7bn for it in 2010.

The chip firm will receive $3.1bn in cash as part of the transaction and retain a 49 per cent minority stake. TPG will take control with a 51 per cent stake, and will invest $1.1bn in the company.

Intel Security is based on the McAfee business and was renamed two years ago. The company will revert to the better known McAfee brand, despite John McAfee reportedly suing Intel over the use of his name.

The transaction is expected to close in the second quarter of 2017, and Chris Young, general manager of Intel Security Group, will become CEO of McAfee.

Young described TPG in an open letter to stakeholders as a “seasoned technology investor” that was “attracted to our current momentum and long-term potential”.

He claimed that McAfee currently protects “more than a quarter of a billion endpoints” and more than 200 million consumers, and is present in two thirds of the world’s 2,000 largest companies.

Intel CEO Brian Krzanich claimed that, despite the sale, security “remains important in everything we do at Intel”.

“We will continue to integrate industry-leading security and privacy capabilities in our products from the cloud to billions of smart, connected computing devices,” he added.

Bryan Taylor, a partner at TPG, said that the company had “long identified the cyber security sector, which has experienced strong growth due to the increasing volume and severity of cyber attacks, as one of the most important areas in technology”.

Intel’s acquisition of McAfee Security in 2010 was intended to enable the company to beef up security around PCs and sell McAfee antivirus and other security software around its core business.

However, the combination never worked as the money to be made in the security business became increasingly focused on the data center and cloud computing.

Courtesy-TheInq

MIT Researchers Triple Wireless Speeds

August 29, 2016 by  
Filed under Around The Net

Comments Off on MIT Researchers Triple Wireless Speeds

MIT researchers have uncovered a way to transfer wireless data using a smartphone at a speed about three times faster and twice as far as existing technology.

The researchers developed a technique to coordinate multiple wireless transmitters by synchronizing their wave phases, according to a statement from MIT on Tuesday. Multiple independent transmitters will be able to send data over the same wireless channel to multiple independent receivers without interfering with each other.

Since wireless spectrum is scarce, and network congestion is only expected to grow, the technology could have important implications.

The researchers called the approach MegaMIMO 2.0 (Multiple Input, Multiple Output) .

For their experiments, the researchers set up four laptops in a conference room setting, allowing signals to roam over 802.11 a/g/n Wi-Fi. The speed and distance improvement is expected to also apply to cellular networks. A video describes the technology as well as a technical paper (registration required), which was presented this week to the Association for Computing Machinery’s Special Interest Group on Data Communications (SIGCOMM 16).

The researchers, from MIT’s Computer Science and Artificial Intelligence Lab, are: Ezzeldin Hamed, Hariharan Rahul, Mohammed Abdelghany and Dina Katabi.

Courtesy-http://www.thegurureview.net/mobile-category/mit-researchers-develop-technique-to-triple-wireless-speeds.html

Courtesy-http://www.thegurureview.net/mobile-category/mit-researchers-develop-technique-to-triple-wireless-speeds.html

CVS Debuts CVS Pay

August 24, 2016 by  
Filed under Around The Net

Comments Off on CVS Debuts CVS Pay

CVS has rolled out its CVS Pay program that exists inside its mobile app. It allows customers to pay in store for prescriptions by scanning a barcode at the register.

Payments will be backed by a customer’s credit or debit card, the company said.

CVS Pay is currently available in New York, New Jersey, Pennsylvania and Delaware; a nationwide rollout at all 9,600 stores is expected to kick off later this year.

CVS doesn’t support Apple Pay or other NFC-based payment technologies, and its use of barcodes for payments is reminiscent of the way Starbucks customers pay for coffee. Working with the barcode technology was a faster way for CVS to bring forward technology for more convenient in-store payments, analysts said.

Other retailers have created in-store payments through their own apps. Walmart created Walmart Pay in December to allow payments through mobile device QR codes that can be read at checkout registers.

“There’s nothing really innovative here with CVS Pay,” said Gartner analyst Avivah Litan on Friday. “They are pretty much following the trend. It’s just mobile commerce with a credit card attached. It’s no big deal to put a credit card in a wallet.”

At one point, CVS was working with Walmart and dozens of other major retailers in the Merchant Customer Exchange, which was designed to process mobile payments electronically through bank accounts and not credit cards to cut out the card processing cost that merchants paid to banks. But MCX ended its pilot of its mobile app, CurrentC, in June. Analysts have predicted the concept will not continue.

Source-http://www.thegurureview.net/mobile-category/cvs-debuts-cvs-pay.html

Tech Firms Form OTrP To Support IoT Security

July 29, 2016 by  
Filed under Security

Comments Off on Tech Firms Form OTrP To Support IoT Security

A bunch of tech firms including ARM and Symantec have joined forces to create a security protocol designed to protect Internet of Things (IoT) devices.

The group, which also includes Intercede and Solacia, has created The Open Trust Protocol (OTrP) that is now available for download for prototyping and testing from the IETF website.

The OTrP is designed to bring system-level root trust to devices, using secure architecture and trusted code management, akin to how apps on smartphones and tablets that contain sensitive information are kept separate from the main OS.

This will allow IoT manufacturers to incorporate the technology into devices, ensuring that they are protected without having to give full access to a device OS.

Marc Canel, vice president of security systems at ARM, explained that the OTrP will put security and trust at the core of the IoT.

“In an internet-connected world it is imperative to establish trust between all devices and service providers,” he said.

“Operators need to trust devices their systems interact with and OTrP achieves this in a simple way. It brings e-commerce trust architectures together with a high-level protocol that can be easily integrated with any existing platform.”

Brian Witten, senior director of IoT security at Symantec, echoed this sentiment. “The IoT and smart mobile technologies are moving into a range of diverse applications and it is important to create an open protocol to ease and accelerate adoption of hardware-backed security that is designed to protect onboard encryption keys,” he said.

The next stage is for the OTrP to be further developed by a standards-defining organisation after feedback from the wider technology community, so that it can become a fully interoperable standard suitable for mass adoption.

Courtesy-TheInq

 

Does M$ Have A Strategy For Windows?

July 27, 2016 by  
Filed under Computing

Comments Off on Does M$ Have A Strategy For Windows?

As we reported earlier today, Microsoft CEO Satya Nadella proclaimed the virtues of its cloud computing platform.

But he didn’t say very much about Windows at all.

And, according to Seeking Alpha financial analyst Mark Hibben in a note to his clients, it’s almost as if Nadella has given up the ghost on the now long in the tooth operating system.

He didn’t say much about smartphones either but admitted that Windows 10 won’t hit the one billion user mark.

But there are another billion and a bit people out there who are using previous versions of Windows and Hibben thinks that that’s Microsoft should really take advantage of that opportunity.

Hibben thinks that while Nadella is practically creaming himself about the cloud the same sort of urges don’t seem to apply to Windows.

Windows phone revenues have fallen 71 percent compared to the same period last year and Microsoft seems to lack a strategy for smartphones in the future.

So has Microsoft given up on Windows? That, surely, can’t be the case.

Courtesy-Fud

Is Qualcomm Back in The Black?

July 25, 2016 by  
Filed under Computing

Comments Off on Is Qualcomm Back in The Black?

Qualcomm has had a better than expected results in its Q3 earnings, beating street and even its own estimates.

Qualcomm offered $5.2 billion to $6 billion revenue guidance and it managed to make $6 billion. Non-GAAP diluted EPS was projected at $0.90 – $1.00 and Qualcomm actually managed to make $1.16.

The MSM chip shipments were guided at 175 million to 195 million while the company actually sold 201 million of these chips.

Total reported device sales was expected to be between $52 billion and  $60 billion and in reality Qualcomm scored $62.6 billion. Qualcomm shipped between 321 million to  325 million 3G/4G devices and estimated reported 3G/4G device average selling price was at $191 – $197.

There are a few reasons for such good results, the first being Samsung. The company chose Snapdragon 820 for some markets with its flagship phones. The Snapdragon 820 ended up in 115 devices and it looks like one of the strongest high end phone chips in a while.

The introduction of the Snapdragon 821 will rekindle the fire and will make some additional sales for Samsung Galaxy Note 7 and a few other high end phones including some phones from LG and others. The 4G modem business is in good shape but one has to be careful as Qualcomm might lose some of the iPhone business to Intel. Everyone wants carrier aggregation capable modems these days, that is Cat 6 and up and Qualcomm offers this from Snapdragon 430 to the Snapdragon 820.

It is interesting to notice that while Apple iPhone sales were down, Qualcomm did better mainly as when Apple declines at   the high end, Qualcomm can make money from its high end Snapdragon chips.

We expect to see the announcement of Snapdragon 830 before the end of the year while devices shipping with the new chip in late Q1 2017 or early Q2 2017. As far as we know this might be the 10nm SoC but we will have to wait and see.

Qualcomm is investing heavily in improvements of 4G, current and future generations as well as a concentrated focus on 5G. From where we stand, Qualcomm still has the best chances to dominate the 5G market, especially due to the fact that 5G is an evolution of 4G with some new wave length and concepts added to it.

Last year’s loss of Samsung Galaxy S6 design win hurt a lot, and now the big customer is back, it seems that investing in a custom ARM Kryo core and dominating in Adreno graphics paid off.

Courtesy-Fud

Next Page »