Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

NFC For ATM Transactions Catching On

August 3, 2016 by  
Filed under Around The Net

Comments Off on NFC For ATM Transactions Catching On

Several of the nation’s biggest banks in the U.S. now support the use of a smartphone to withdraw cash from an ATM — many by way of Near Field Communication (NFC) technology — instead of requiring customers to use a bank card.

One of the early adopters, Bank of America, said this week it currently supports cardless technology at 2,800 of its ATMs. That number will reach 8,000 ATMs by year’s end that rely on NFC and other technology. Bank of America, which has about 15,000 ATMs nationwide, created a video to show how a smartphone loaded with the bank’s mobile app can now withdraw cash from some ATMs.

Wells Fargo said it has a “handful” of ATMs that are NFC-ready and working to deliver cash and other transactions and is planning to reach 5,000 by the end of 2016. A total of 12,000 ATMs will be enabled in 2017.

JPMorgan Chase said it also will have many cardless ATMs available this year, but didn’t specify how many or when. Initially at Chase, customers will show up at an ATM and type in a numerical code they acquired wirelessly through use of the Chase smartphone app to get their cash. That numerical code verification process will be an early step in rolling out cardless technology at the bank’s nearly 15,000 ATMs.

In addition to using NFC or a numerical code to authenticate a transaction, some bank ATMs are expected to rely on scanning a QR code displayed on a phone.

The number of ATMs supporting cardless cash remains a small portion of the estimated 500,000 ATMs in the U.S. Crone Consulting, which monitors the mobile payment industry, recently said it expects about 95,000 ATMs in the U.S. to support cardless cash by year’s end.

Courtesy-http://www.thegurureview.net/mobile-category/nfc-for-atm-transactions-catching-on.html

Does M$ Have A Strategy For Windows?

July 27, 2016 by  
Filed under Computing

Comments Off on Does M$ Have A Strategy For Windows?

As we reported earlier today, Microsoft CEO Satya Nadella proclaimed the virtues of its cloud computing platform.

But he didn’t say very much about Windows at all.

And, according to Seeking Alpha financial analyst Mark Hibben in a note to his clients, it’s almost as if Nadella has given up the ghost on the now long in the tooth operating system.

He didn’t say much about smartphones either but admitted that Windows 10 won’t hit the one billion user mark.

But there are another billion and a bit people out there who are using previous versions of Windows and Hibben thinks that that’s Microsoft should really take advantage of that opportunity.

Hibben thinks that while Nadella is practically creaming himself about the cloud the same sort of urges don’t seem to apply to Windows.

Windows phone revenues have fallen 71 percent compared to the same period last year and Microsoft seems to lack a strategy for smartphones in the future.

So has Microsoft given up on Windows? That, surely, can’t be the case.

Courtesy-Fud

Was The Omni Hotel Chain Hacked?

July 21, 2016 by  
Filed under Security

Comments Off on Was The Omni Hotel Chain Hacked?

Omni Hotels & Resorts has reported that point-of-sale systems at some of its hotel locations were attacked by malware targeting payment card information.

The hacking of the systems of the luxury hotel chain follows similar breaches of point-of-sale systems at various hotels and retailers like Hyatt Hotels, Target, Starwood Hotels & Resorts Worldwide and Hilton Worldwide Holdings.

Omni — in Dallas, Texas — said in a statement Friday that on May 30 this year, it discovered it was hit by malware attacks on its network, affecting specific POS systems on-site at some of its properties. “The malware was designed to collect certain payment card information, including cardholder name, credit/debit card number, security code and expiration date,” Omni said. There isn’t evidence that other customer information, such as contact information, Social Security numbers or PINs, was compromised, it added.

The chain did not disclose how many of its 60 properties were affected and the likely number of cardholders that could have been affected. As there is no indication that reservation or select guest membership systems were affected, users were unlikely to be affected unless they physically presented their payment card at a POS system at one of the affected locations. The malware may have been in operation between Dec. 23 last year and June 14 this year, although most of the systems were affected during a shorter timeframe, according to the hotel.

The hotel chain, which operates hotels and resorts in the U.S., Canada and Mexico, could not be immediately reached for comment over the weekend for further details.

Omni said after discovering the malware attack, it had immediately hired IT investigation and security firms and has now contained the intrusion. It did not specify why it had delayed to inform customers.

Courtesy-http://www.thegurureview.net/aroundnet-category/omni-hotels-reports-hacking.html

Has The Smartphone Bubble Busted?

June 22, 2016 by  
Filed under Smartphones

Comments Off on Has The Smartphone Bubble Busted?

After sliding its slide-rules, flicking its abacus, and counting its toes, the bean counters at Gartner have decided that the smartphone business bubble has burst splattering in the face of those who depend on it.

Big G says the market will shrink from 14.4 per cent growth in 2015 to just 7 per cent in 2016 — with only 1.5 billion smartphone units being shipped globally this year. Compair this with 2010, when Gartner notes the market grew 73 per cent.

However the signs have been obvious for about a year. Mature Western markets saturated, China’s growth engine slowing as demand has topped out and other markets unable to afford the higher margin gear. The smartphone has come to the end of its ability to provide new technology too with companies only able to offer incremental upgrades. Carriers are moving away from subsidizing upgrades which means that them wasting their own profits to prop up the likes of Apple are over.

In emerging markets it says the average lifetime of premium phone is between 2.2 and 2.5 years, while basic mobiles have an average lifetime of three years and up.

Gartner sees the biggest remaining opportunity for smartphone growth in India, noting that sales of feature phones — aka dumbphones — accounted for a majority (61 per cent) of total mobile device sales last year, leaving plenty of scope for upgrades as smartphones continue to become more affordable.

It is estimating 139 million smartphones will be sold in India this year, growing 29.5 per cent year-over-year. It notes the average selling price of mobiles in the country remains below $70, and it expects smartphones priced under $120 to continue to contribute around half of overall smartphones sales there this year.  Apple’s hope that it can save its flailing business numbers by selling into India show the complete lack of understanding of how that market is working. It is tending to favor small local smartphone makers like Intex.

China is going to offer Apple no help either Gartner is expecting “little growth” in the region in the next five years. IT says it is “saturated yet highly competitive” market. Smartphones represented 95 per cent of total mobile phones sales last year.

Gartner analyst Annette Zimmerman said that “non-traditional” vendors in China could do well and thinks that by 2018 at least one such phone maker will be among the top five smartphone brands in the country.

“Chinese internet companies are increasingly investing in mobile device hardware development, platforms and distribution as they aim to grow their user bases and increase user loyalty and engagement,” she said.

The Sub-Saharan African region is also couched as an attractive region for smartphone vendors, with smartphone sales only overtaking mobile phones sales there for the first time last year. Nokia brand licensee and newly formed smartphone OEM HMD will want to take note, given it has paid for the right to build feature phones (and smartphones) bearing the previously iconic Nokia brand name.

Courtesy-Fud

DARPA Goes Robtic

May 27, 2016 by  
Filed under Computing

Comments Off on DARPA Goes Robtic

The U.S. military is funding research for a mind-controlled prosthetic arm that is surgically implanted into the user’s body.

“This is the most advanced arm in the world,” Johnny Matheny, who lost his left arm to cancer in 2008 and demonstrated the robotic arm for DARPA, said in a statement. “This one can do anything your natural arm can do, with the exception of the Vulcan V. But unless I meet a Vulcan, I won’t need it.”

Matheny showed the arm during Demo Day for the Defense Advanced Research Projects Agency, the military’s research unit, which was held Wednesday at the Pentagon. The device was developed at the Research and Exploratory Development Department at Johns Hopkins Applied Physics Laboratory.

The robotic arm is attached to a piece of metal that is surgically implanted into the bone of the user’s arm in technique called osseointegration. Matheny is the first person in the U.S. to have undergone the procedure, according to the U.S. Army.

The Army called the system a “true man/machine interface.”

The mind-controlled aspect of the arm comes into play via the nerves and muscles in what remains of the user’s arm. Those tissues send signals to the robotic arm, which responds to them as a real arm would.

“This is part of the Revolutionizing Prosthetics Program, where we set out to restore near-natural upper extremity control to our military service members who have lost limbs in service of our country,” said Dr. Justin C. Sanchez, director of the Biological Technologies Office at DARPA, in a statement. “The goal is to control the arm as naturally as possible.”

The robotic arm, according to Sanchez, has the same size, weight, shape and grip strength as an adult biological arm.

Source-http://www.thegurureview.net/aroundnet-category/darpa-shows-off-mind-controlled-robotic-arm.html

Intel Looking Into Atomic Energy

May 25, 2016 by  
Filed under Around The Net

Comments Off on Intel Looking Into Atomic Energy

Shortly after cancelling two generations of Atom mobile chips, Intel putting its weight behind future low-power mobile technologies with a new research collaboration with a French atomic energy lab.

Fundamental research leading towards faster wireless networks, secure low-power technologies for the Internet of Things, and even 3D displays will be the focus of Intel’s collaboration with the French Alternative Energies and Atomic Energy Commission (CEA).

Intel and the CEA already work together in the field of high-performance computing, and a new agreement signed Thursday will see Intel fund work at the CEA’s Laboratory for Electronics and Information Technology (LETI) over the next five years, according to Rajeeb Hazra, vice president of Intel’s data center group.

The CEA was founded in 1945 to develop civil and military uses of nuclear power. Its work with Intel began soon after it ceased its atmospheric and underground nuclear weapons test programs, as it turned to computer modeling to continue its weapons research, CEA managing director Daniel Verwaerde said Thursday.

That effort continues, but the organization’s research interests today are more wide-ranging, encompassing materials science, climate, health, renewable energy, security and electronics.

These last two areas will be at the heart of the new research collaboration, which will see scientists at LETI exchanging information with those at Intel.

Both parties dodged questions about who will have the commercial rights to the fruits of their research, but each said it had protected its rights. The deal took a year to negotiate.

“It’s a balanced agreement,” said Stéphane Siebert, director of CEA Technology, the division of which LETI is a part.

Who owns what from the five-year research collaboration may become a thorny issue, for French taxpayers and Intel shareholders alike, as it will be many years before it becomes clear which technologies or patents are important.

Hazra emphasized the extent to which Intel is dependent on researchers outside the U.S. The company has over 50 laboratories in Europe, four of them specifically pursuing so-called exa-scale computing, systems capable of billions of billions of calculations per second.

Source-http://www.thegurureview.net/mobile-category/intel-look-to-atomic-energy-for-mobile-technologys-future.html

Google And Yahoo Get Blocked

May 24, 2016 by  
Filed under Around The Net

Comments Off on Google And Yahoo Get Blocked

The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.

On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.

“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”

The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?

If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.

“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”

The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.

The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.

Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html

IBM’s Watson Goes Cybersecurity

May 23, 2016 by  
Filed under Computing

Comments Off on IBM’s Watson Goes Cybersecurity

IBM Security has announced a new year-long research project through which it will partner with eight universities to help train its Watson artificial intelligence system to tackle cybercrime.

Knowledge about threats is often hidden in unstructured sources such as blogs, research reports and documentation, said Kevin Skapinetz, director of strategy for IBM Security.

“Let’s say tomorrow there’s an article about a new type of malware, then a bunch of follow-up blogs,” Skapinetz explained. “Essentially what we’re doing is training Watson not just to understand that those documents exist, but to add context and make connections between them.”

Over the past year, IBM Security’s own experts have been working to teach Watson the “language of cybersecurity,” he said. That’s been accomplished largely by feeding it thousands of documents annotated to help the system understand what a threat is, what it does and what indicators are related, for example.

“You go through the process of annotating documents not just for nouns and verbs, but also what it all means together,” Skapinetz said. “Then Watson can start making associations.”

Now IBM aims to accelerate the training process. This fall, it will begin working with students at universities including California State Polytechnic University at Pomona, Penn State, MIT, New York University and the University of Maryland at Baltimore County along with Canada’s universities of New Brunswick, Ottawa and Waterloo.

Over the course of a year, the program aims to feed up to 15,000 new documents into Watson every month, including threat intelligence reports, cybercrime strategies, threat databases and materials from IBM’s own X-Force research library. X-Force represents 20 years of security research, including details on 8 million spam and phishing attacks and more than 100,000 documented vulnerabilities.

Watson’s natural language processing capabilities will help it make sense of those reams of unstructured data. Its data-mining techniques will help detect outliers, and its graphical presentation tools will help find connections among related data points in different documents, IBM said.

Ultimately, the result will be a cloud service called Watson for Cyber Security that’s designed to provide insights into emerging threats as well as recommendations on how to stop them.

Source-http://www.thegurureview.net/computing-category/ibms-watson-to-get-schooled-on-cybersecurity.html

Is Qualcomm Facing Another Security Flaw?

May 19, 2016 by  
Filed under Computing

Comments Off on Is Qualcomm Facing Another Security Flaw?

FireEye has found a vulnerability in Qualcomm software packages which are under the bonnet of hundreds of Android phone models.

Google announced this week that it released an Android update to patch shedloads of vulnerabilities, but the advisory mentioned an information disclosure vulnerability in the Qualcomm tethering controller (CVE-2016-2060) that allows a malicious application to access user information.

FireEye said that this vulnerablity is “high severity,” but Google noted that it does not affect Nexus devices. The patch for the issue is not in the Android Open Source Project (AOSP) repository but might make it in the  latest driver updates for affected devices.

The security outfit said that researchers informed Qualcomm about the vulnerability in January and the vendor developed a fix by early March, when it started reaching out to OEMs to let them know about the issue. Now it’s up to the device manufacturers to push out the patch to customers. So probably a long time then.

The flaw exists in an open source software package maintained by Qualcomm and is related to the Android network daemon (netd).

“The vulnerability was introduced when Qualcomm provided new APIs as part of the ‘network_manager’ system service, and subsequently the ‘netd’ daemon, that allow additional tethering capabilities, possibly among other things,” FireEye said.

The flaw has been confirmed to affect devices running Android 5.0 Lollipop and earlier, which currently account for roughly three-quarters of Android devices. Researchers noted that the affected Qualcomm software package is used in a variety of projects, including the popular CyanogenMod, and the vulnerable APIs appear to have been around since at least 2011.

The vulnerability can be exploited to escalate privileges to the built-in “radio” user, which has permissions that are normally not available to a third-party app. The most efficient way to exploit CVE-2016-2060 is via a malicious application that is granted the “ACCESS_NETWORK_STATE” permission.

Courtesy-Fud

Google, Microsoft Drop Regulatory Complaints

May 2, 2016 by  
Filed under Around The Net

Comments Off on Google, Microsoft Drop Regulatory Complaints

Microsoft Corp and Alphabet Inc’s Google have reached a deal to drop all the regulatory complaints against each other, the companies told Reuters.

“Microsoft has agreed to withdraw its regulatory complaints against Google, reflecting our changing legal priorities. We will continue to focus on competing vigorously for business and for customers,” a Microsoft spokesperson said in an email.

Google, in a separate email, said the companies would want to compete vigorously based on the merits of their products, not in “legal proceedings”.

The companies in September agreed to bury all patent infringement litigations against each other, settling 18 cases in the United States and Germany.

“… Following our patent agreement, we’ve now agreed to withdraw regulatory complaints against one another,” Google said on Friday.

Google’s rivals had reached out to U.S. regulators alleging that the Internet services company unfairly uses its Android system to win online advertising, people with knowledge of matter told Reuters last year.

The European Commission also accused Google last year of distorting internet search results to favor its shopping service, harming both rivals and consumers.

Source-http://www.thegurureview.net/aroundnet-category/google-microsoft-drop-regulatory-complaints-against-each-other.html

Next Page »