Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Intel Rewards RealSense Developers

May 21, 2015 by  
Filed under Computing

Comments Off on Intel Rewards RealSense Developers

Intel has awarded  $1m to a number of developers as part of its RealSense 3D App Challenge, which was launched last year.

Announced by Intel president Renee James at Computex 2014, the RealSense App Challenge was part of Intel’s efforts to boost RealSense globally and generate software innovation around the ecosystem.

More than 7,000 software creators in 37 countries applied to compete, and 400 were selected to develop new applications for entertainment, learning and collaboration.

Several hundred developers of creative app ideas in these categories received the latest edition of the RealSense 3D Camera and RealSense software development kit, which included free tools, examples and application programing interfaces with which to develop their ideas.

Intel announced on Thursday that the grand prize winner, who picks up $100,000, is Brazilian developer Alexandre Ribeiro da Silva of Anima Games.

His Seed app requires gamers to use reflexes and rational thinking to solve puzzles. The goal of the game is to guide a little floating seed through its journey to reforest a devastated land.

The second prize of $50,000 was awarded to Canadian developer David Schnare of Kinetisense. His OrthoSense app uses RealSense to help medical professionals remotely rehabilitate a patient who has suffered a hand injury by tracking their range of movement over time.

“This practical application of human-computer interaction is an impressive example of how technology can make our lives better,” Intel said.

Another notable winner was Lee Bamber from the UK, who received recognition for his virtual 3D video maker. The app allows a user to record themselves as a 3D hologram and then transport to a variety of scenes.

Once recorded, they can then change the camera position over the course of the playback to add an extra dimension to a video blogs, storybook or v-mails, for instance.

“The idea of the app is that you can choose the backdrop then set the lighting as you would in a studio then do the acting,” Bamber explained in his video.

Doug Fisher, SVP and general manager of Intel’s Software and Services Group, said in a blog post that now the app challenge is complete “the real work begins”, as Intel Software will continue to encourage all finalists to bring products to market.

“We also will continue mobilising our resources to inspire, educate and advance innovation through programmes such as the Intel Developer Zone, where developers can engage to find new software tools and build industry relationships,” he said.

“Human-computer interactions will no longer be defined by mice, keyboards and 2D displays. Our physical and digital worlds are coming together. When they do, the opportunities for us as consumers and businesses will explode.”

Source

Should Encryption Be The Norm?

December 1, 2014 by  
Filed under Computing

Comments Off on Should Encryption Be The Norm?

Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.

The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.

It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.

“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”

The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.

The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.

However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.

These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.

Source

Hackers Infiltrate Jimmy Johns

October 7, 2014 by  
Filed under Around The Net

Comments Off on Hackers Infiltrate Jimmy Johns

Sandwich restaurant chain Jimmy John’s said there was a potential data breach involving customers’ credit and debit card information at 216 of its stores and franchised locations on July 30.

An intruder stole log-in credentials from the company’s vendor and used the credentials to remotely access the point-of-sale systems at some corporate and franchised locations between June 16 and Sept. 5, the company said.

The chain is the latest victim in a series of security breaches among retailers such as Target Corp, Michaels Stores Inc and Neiman Marcus.

Home Depot Inc  said last week some 56 million payment cards were likely compromised in a cyberattack at its stores, suggesting the hacking attack at the home improvement chain was larger than the breach at Target Corp.

More than 12 of the affected Jimmy John’s stores are in Chicago area, according to a list disclosed by the company.

The breach has been contained and customers can use their cards at its stores, the privately held company said.

Jimmy John’s said it has hired forensic experts to assist with its investigation.

“Cards impacted by this event appear to be those swiped at the stores, and did not include those cards entered manually or online,” Jimmy John’s said.

The Champaign, Illinois-based company said stolen information may include the card number and in some cases the cardholder’s name, verification code, and/or the card’s expiration date.

Source

Some ATMs Still On XP

January 9, 2014 by  
Filed under Computing

Comments Off on Some ATMs Still On XP

Cyber-criminals have been cutting holes into European cash machines in order to infect them with malware.

The holes were cut so that the hackers could plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank’s cash dispensers were presented at the hacker-themed Chaos Computing Congress in Hamburg, Germany.

The thefts came to light in July after the lender involved noticed several its ATMs were being emptied. The bank discovered the criminals were vandalising the machines to use the infected USB sticks. Once the malware had been transferred, they patched the holes up. This allowed the same machines to be targeted several times without the hack being discovered.

The attackers could take the highest value banknotes in order to minimise the amount of time they were exposed. Interestingly the software required the thief to enter a second code in response to numbers shown on the ATM’s screen before they could release the money and the thief could only obtain the right code by phoning another gang member and telling them the numbers displayed. This stopped the criminals going alone.

Source

ATM Malware Found In Mexico

November 8, 2013 by  
Filed under Computing

Comments Off on ATM Malware Found In Mexico

A malicious software program identified in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.

Two versions of the malware, called Ploutus, have been discovered, both of which are engineered to empty a certain type of ATM, which Symantec has not identified.

In contrast to most malware, Ploutus is installed the old-fashioned way — by inserting a CD boot disk into the innards of an ATM machine running Microsoft Windows. The installation method suggests that cybercriminals are targeting standalone ATMs where access is easier.

The first version of Ploutus displays a graphical user interface after the thief enters a numerical sequence on an ATM’s keypad, although the malware can be controlled by a keyboard, wrote Daniel Regalado, a Symantec malware analyst, on Oct. 11.

Ploutus is programmed for a specific ATM model since it assumes there is a maximum of four cassettes per dispenser in the ATM. It then calculates the amount of money that should be dispensed based on the number of bills. If any of the cassettes have less than the maximum number of 40 bills, it releases whatever is left, repeating that process until the ATM is empty.

Kevin Haley, director of Symantec Security Response, said in an interview earlier this month that the attackers have deep knowledge of the software and hardware of the particular ATM model.

“They clearly know how this machine worked,” he said.

The source code of Ploutus “contains Spanish function names and poor English grammar that suggests the malware may have been coded by Spanish-speaking developers,” Regalado wrote.

In a new blog post, Regalado wrote that the attackers made Ploutus more robust and translated it into English, indicating the same ATM software can be exploited in countries other than Mexico.

The “B” variant of Ploutus has some differences. It only accepts commands through the keypad but will display a window showing the money available in the machine along with a transaction log as it dispenses cash. An attacker cannot enter a specific number of bills, so Ploutus withdraws money from the cassette with the most available bills, Regalado wrote.

Symantec advised those with ATMs to change the BIOS boot order to only boot from the hard disk and not CDs, DVDs or USB sticks. The BIOS should also be password protected so the boot options can’t be changed, Regalado wrote.

Source

RIM Goes Non-BlackBerry

April 9, 2012 by  
Filed under Smartphones

Comments Off on RIM Goes Non-BlackBerry

Research In Motion on Tuesday launched software that will allow its large “enterprise” customers to manage Apple and other rival devices through the same servers as they use for the BlackBerry smartphone and Playbook tablet.

The new Mobile Fusion software, first announced in November, is an acknowledgement of sorts by RIM of a growing preference by many users inside big corporations and government to access professional communications over their personal devices, often the Apple iPhone or iPad, or devices running Google’s Android.

RIM, which long dominated the so-called enterprise market, has watched the BlackBerry’s market share steadily erode in recent years. Unable to arrest the trend, the company now aims to generate a fresh revenue stream from it. Mobile Fusion will cost $99 per user to license and $4 per user a month, with discounts available for bulk orders.

In a second announcement on Tuesday that highlights RIM’s eroding market position, it said its PlayBook tablet now boasts 15,000 applications – still just a tiny fraction of the number available on the iPad. One of the biggest complaints about RIM’s products is the dearth of content and applications.

A recent survey from Appcelerator and IDC showed less than 16 percent of developers were “very interested” in creating programs for RIM, compared with 90 percent for Apple and 80 percent for Android.

Source…