Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Raspberry Pi Growing

September 16, 2016 by  
Filed under Computing

Comments Off on Raspberry Pi Growing

Since it was launched in 2012, the Raspberry Pi has sold 10 million units, making it the most popular British computer ever.

A new starter kit for Raspberry Pi, including a keyboard and mouse, has been released to celebrate the success. The kit also includes an SD storage card, official case, power supply, HDMI cable, mouse, keyboard and guidebook – it costs $120.00 plus VAT and will be available in the coming weeks.

Company founder Eben Upton wrote in his bog that he thought they might sell 10,000 units during the product’s lifetime and were a little surprised about the product’s success.

“There was no expectation that adults would use Raspberry Pi, no expectation of commercial success and certainly no expectation that four years later we would be manufacturing tens of thousands of units a day in the UK and exporting Raspberry Pi all over the world.”

The mini-PCs are being used for more than just teaching kids how to assemble PCs. They are useful for setting up smart houses and other settings. One was even used in the hacker drama Mr Robot to bring down eVil corp by triggering the heating systems.

Courtesy-Fud

Raspberry Pi To Get Mass Storage

September 25, 2015 by  
Filed under Computing

Comments Off on Raspberry Pi To Get Mass Storage

Bittorrent and WD have teamed up to create a 1TB drive for the Raspberry Pi. The Pi Drive has been designed especially for the Raspberry Pi Model B+ and the Raspberry Pi 2 Model B, and offers a viable way to turn a Pi into a media centre, NAS and PVR all in one.

BitTorrent Sync makes it possible to sync content from all your devices straight to the drive, bypassing the cloud and making it an excellent backup device.

It differs from a standard hard drive, not least because it’s low-powered enough to be run off the USB port that charges your Pi, using a splitter cable supplied – no mean feat for a mechanical drive.

It’s not perfect. It’s a standard 2.5in drive but with a USB connection rather than a SATA which means it’s bigger than the Pi and you’ll need to create a bespoke case or let it all hang out in true maker fashion.

Essentially, it’s the same type of drive that you would see if you smashed open one of WD’s external drives, but it would take a brave soul to do so and this way you get the right cable and software to make it all work together.

The tie-up between BitTorrent and WD comes as the former announces version 2.2 of the Sync service which we have been following since inception.

The new version offers a clearer delineation between home and pro users. Home users can buy a lifetime licence for $39.99 which covers all 2.x releases. This comes in addition to the perpetual free version which will no longer be limited to 10 folders.

Instead the monetized version will come from business customers who remain on a monthly fee, and pro user subscriptions for advanced features such as collaboration and file sharing introduced in version 2.1.

The Pi Drive retails at $80 with a 35 percent discount offer through BitTorrent with the code WDPIDRIVE1TB. UK sellers are yet to be confirmed, but will form part of the newly launched BitTorrent Sync reseller programme that launches with this edition.

Source-http://www.thegurureview.net/computing-category/raspberry-pi-to-get-mass-storage.html

Raspberry Pi Making Moves

March 2, 2015 by  
Filed under Computing

Comments Off on Raspberry Pi Making Moves

The Raspberry Pi Foundation has announced that its pint-sized computer has now sold a whopping five million units.

The announcement came via Twitter, where the official Raspberry Pi account boasted that the five million milestone makes it the big-selling computer manufacturer in the UK of all time.

Just confirmed the big news we’ve all been waiting for: we’ve now sold more than 5 million Raspberry Pis.

— Raspberry Pi (@Raspberry_Pi) February 17, 2015

We think that this means that in just under 3 years, we’ve gone from zero to being the biggest selling UK computer manufacturer ever. Yowza.

— Raspberry Pi (@Raspberry_Pi) February 17, 2015

This comes just two weeks after the firm announced sales of 4.5 million Raspberry Pi computers, suggesting that its latest model, the Raspberry Pi 2 Model B, has proved popular since it went on sale on 2 February.

Raspberry Pi said previously that it aims to ship three million units of the new model within 12 months, and Tuesday’s announcement suggests that it’s on track to smash that target.

The firm has yet to announce exactly how many Raspberry Pi 2 models have shipped, but we are likely to hear official figures in the next few weeks.

The second-generation device was unveiled at the beginning of this month, improving on the original Raspberry Pi with 1GB RAM and support for Microsoft’s Windows 10 operating system.

It also boasts expanded GPIO pins and advanced power management and connectivity, making it possible to connect up to four USB devices, including powered devices such as hard drives.

Source

Can Imagination Push IoT?

December 15, 2014 by  
Filed under Computing

Comments Off on Can Imagination Push IoT?

Imagination Technologies will take on the Raspberry Pi with the release of a single-board minicomputer for both Android and Linux developers.

In a bid to power a range of devices in the ever-growing world of the Internet of Things (IoT) space, the MIPS-based Creator CI20 can run both Linux and Android operating systems (OS) and is said to deliver both high performance and low energy consumption.

When it hits the market in January, the development board will target the likes of open source developers, the maker community and system integrators to provide them with tools and encourage them to create a wide range of applications and projects.

The Creator CI20 is based around a system on a chip (SoC) combining CPU, graphics and I/O circuitry, featuring an I/O connector block compatible with that of the Raspberry Pi, meaning it could be plugged into many of the same projects.

The board comes with a 1.2GHz MIPS32-based dual-core processor and 1GB of RAM with PowerVR SGX540 graphics for OpenGL 2.1 and ES 2.0 compatibility, meaning its capable of 1080p gaming at 30fps. It also features Ethernet connectivity alongside 802.11b/g/n Wi-Fi and Bluetooth 4.0 plus 4GB storage onboard.

While it’s easy to compare the Creator CI20 to the Raspberry Pi, Imagination’s executive vice president of marketing, Tony King-Smith, told V3.co.uk that the develop board is not intended as a direct rival.

“We’re not trying to compete with devices like Raspberry Pi and Arduino, which many developers will already have, we’re giving them more options, and we believe this is a pretty rich offering,” he said.

King-Smith said that the Creator CI20 is ideal for the IoT revolution because of its embedded wireless capabilities, but also because it is capable of running mature OS such as Linux and Android that support graphical user interfaces.

“This will make IoT interesting, whether you’re looking at a thermostat or a sensor or whatever, it’s a compelling user interface that gets people excited,” he added.

Imagination has also launched a Creator Programme alongside the developer board to stimulate an IoT ecosystem around the device.

Source

Malware Targets Job-seekers

April 10, 2014 by  
Filed under Around The Net

Comments Off on Malware Targets Job-seekers

A new version of the Gameover computer Trojan is targeting job hunters and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.

Gameover is one of several Trojan programs that are based on the infamous Zeus banking malware, whose source code was leaked on the Internet in 2011. Like Zeus, Gameover can steal log-in credentials and other sensitive information by injecting rogue Web forms into legitimate websites when accessed from infected computers.

The ability to inject content into browsing sessions in real time has traditionally been used by computer Trojans to steal online banking credentials and financial information. However, cybercriminals are increasingly using this technique to compromise other types of accounts as well.

For example, in February, researchers from security firm Adallom found a Zeus variant that stole Salesforce.com log-in credentials and scraped business data from the compromised accounts.

The latest development involves a new Gameover variant that contains a configuration file to target Monster.com accounts, one of the largest employment websites in the world, security researchers from antivirus firm F-Secure said.

“A computer infected with Gameover ZeuS will inject a new ‘Sign In’ button [into the Monster.com sign-in page], but the page looks otherwise identical,” they said.

After the victims authenticate through the rogue Web form the malware injects a second page that asks them to select and answer three security questions out of 18. The answers to these questions expose additional personal information and potentially enable attackers to bypass the identity verification process.

Targeting Monster.com is a new development, but the Gameover malware had already been targeting CareerBuilder.com, another large employment website, for some time.

Recruiters with accounts on employment websites should be wary of irregularities on log-in pages, especially if those accounts are tied to bank accounts and spending budgets, the F-Secure researchers said. “It wouldn’t be a bad idea for sites such as Monster to introduce two factor authentication beyond mere security questions.”

The authors of the Gameover Trojan program have been particularly active recently. In early February researchers from security firm Malcovery Security reported that a new variant of Gameover was being distributed as an encrypted .enc file in order to bypass network-level defenses. Later that month researchers from Sophos detected a Gameover variant with a kernel-level rootkit component that protected its files and processes, making it harder to remove.

Unlike most other Zeus spinoffs, Gameover is also using peer-to-peer technology for command-and-control instead of traditional hosted servers, which improves its resilience to takedown efforts by security researchers.

Source

Google Had Developed Own Currency

March 5, 2012 by  
Filed under Smartphones

Comments Off on Google Had Developed Own Currency

Google once contemplated the idea of issuing its own currency, to be called Google Bucks, company Executive Chairman Eric Schmidt said on stage at the Mobile World Congress in Barcelona,Spain on Tuesday.

At the end of his keynote speech, Schmidt hit on a wide array of topics in response to audience questions. “We’ve had various proposals to have our own currency we were going to call Google Bucks,” Schmidt said.

The idea was to implement a “peer-to-peer money” system. However, Google discovered that the concept is illegal in most areas, he said. Governments are typically wary of the potential for money laundering with such proposals.

“Ultimately we decided we didn’t want to get into that because of these issues,” Schmidt said.

He also hinted that Google might be preparing for a battle in China once its acquisition of Motorola is complete.

“Google’s been willing to take on China pretty well,” he said in response to a question about whether Google expected to continue to ignore theft of Motorola intellectual property in China, as Motorola has been doing. The acquisition hasn’t closed yet, Schmidt noted. “We’ve taken a pretty strong position on IP. We are well aware of the issues and we are considering your question,” he said.

Google is still waiting for some government approvals of its proposed acquisition of Motorola.

Source…

AES Encryption Cracked

August 24, 2011 by  
Filed under Computing

Comments Off on AES Encryption Cracked

CRYPTOGRAPHY RESEARCHERS have identified a weakness in the Advanced Encryption Standard (AES) security algorithm that can crack secret keys faster than before.

The crack is the work of a trio of researchers at universities and Microsoft, and involved a lot of cryptanalysis – which is somewhat reassuring – and still does not present much of a real security threat.

Andrey Bogdanov, from K.U.Leuven (Katholieke Universiteit Leuven), Dmitry Khovratovich, who is full time at Microsoft Research, and Christian Rechberger at ENS Paris were the researchers.

Although there have been other attacks on the key based AES security system none have really come close, according to the researchers. But this new attack does and can be used against all versions of AES.

This is not to say that anyone is in immediate danger and, according to Bogdanov, although it is four times easier to carry out it is still something of an involved procedure.

Recovering a key is no five minute job and despite being four times easier than other methods the number of steps required to crack AES-128 is an 8 followed by 37 zeroes.

“To put this into perspective: on a trillion machines, that each could test a billion keys per second, it would take more than two billion years to recover an AES-128 key,” the Leuven University researcher added. “Because of these huge complexities, the attack has no practical implications on the security of user data.” Andrey Bogdanov told The INQUIRER that a “practical” AES crack is still far off but added that the work uncovered more about the standard than was known before.

“Indeed, we are even not close to a practical break of AES at the moment. However, our results do shed some light into the internal structure of AES and indicate where some limits of the AES design are,” he said.

He added that the advance is still significant, and is a notable progression over other work in the area.

“The result is the first theoretical break of the Advanced Encryption Standard – the de facto worldwide encryption standard,” he explained. “Cryptologists have been working hard on this challenge but with only limited progress so far: 7 out of 10 for AES-128 as well as 8 out of 12 for AES-192 and 8 out of 14 rounds for AES-256 were previously attacked. So our attack is the first result on the full AES algorithm.”

Read More…

“TDL-4″ Botnet Is Practically Indestructible

July 7, 2011 by  
Filed under Computing

Comments Off on “TDL-4″ Botnet Is Practically Indestructible

A new and improved botnet that has infected more than four million computers is “practically indestructible,” software security experts say.

“TDL-4,” the name for both the bot Trojan that infects PCs and the ensuing collection of compromised computers, is “the most sophisticated threat today,” said Kaspersky Labs researcher Sergey Golovanov in a detailed analysis Monday.

“[TDL-4] is practically indestructible,” Golovanov said and others agree.

“I wouldn’t say it’s perfectly indestructible, but it is pretty much indestructible,” said Joe Stewart, director of malware research at Dell SecureWorks and an internationally-known botnet expert, in an interview today. “It does a very good job of maintaining itself.”

Golovanov and Stewart based their assessments on a variety of TDL-4′s traits, all which make it an extremely tough character to detect, delete, suppress or eradicate.

Because TDL-4 installs its rootkit on the Master Boot Record (MBR), it is invisible to both the operating system and more, importantly, security software designed to sniff out malicious code.

Further,what makes the botnet indestructible is the combination of its advanced encryption and the use of a public peer-to-peer (P2P) network for the instructions issued to the malware by command-and-control (C&C) servers.

“The way peer-to-peer is used for TDL-4 will make it extremely hard to take down this botnet,” said Roel Schouwenberg, senior malware researcher at Kaspersky, ”The TDL guys are doing their utmost not to become the next gang to lose their botnet.”

Read more….