Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

BlackBerry And Amazon Team Up

June 30, 2014 by  
Filed under Smartphones

BlackBerry Ltd has agreed to a licensing deal with Amazon.com Inc that will let the Canadian smartphone maker offer some 240,000 Android applications from Amazon’s app store on its lineup of BlackBerry 10 devices this fall.

The move allows the Waterloo, Ontario-based company to add a vast array of consumer-focused apps to its devices, while at the same time directing its own efforts toward developing enterprise and productivity applications.

Customers who own smartphones powered by its BlackBerry 10 operating system will now be able to access popular Android apps such as Groupon, Netflix, Pinterest, Minecraft and Candy Crush Saga on their BlackBerry devices this fall. Google Inc makes Android, the mobile operating system used in more than a billion phones and tablets.

The apps will become available after the Canadian smartphone maker rolls out the upgraded BlackBerry 10.3 operating system, the company said.

The move is the latest by the smartphone pioneer to streamline its focus as it attempts to reinvent itself under new Chief Executive Officer John Chen as BlackBerry phones have lost ground to Apple Inc’s iPhone and Samsung Electronics Co Ltd’s Galaxy devices.

Analysts saw the move as a step in the right direction, but are not sure whether it will help turn the tide for BlackBerry.

“While this will widen the BB10 app ecosystem, the consumer

smartphone environment still remains challenging,” Wells Fargo analyst Maynard Um said in a note to clients.

Um views the announcement as a positive for BlackBerry, but said “whether it stems consumer churn remains to be seen.”

Chen wants to remain a competitor in the smartphone segment, but is focused on making BlackBerry a dominant force in machine-to-machine communications. The company’s QNX software already is a mainstay in the automotive industry, powering electronic and other systems in a wide range of cars.

BlackBerry already works with hundreds of large enterprise clients, including corporations and government agencies, to manage and secure mobile devices on their internal networks.

Chen intends to build on those ties and BlackBerry’s security credentials to let these enterprise clients build and customize in-house corporate and productivity applications for their employees.

Source

June 27, 2014 by  
Filed under Computing

During the 3D Revolution 2014 presentation held in Rome, Intel has showed its updated SSD roadmap unveiling the new August Ridge SSD 750 Series which will be available in multiple form-factors, including lately popular M.2.

Spotted by Techpowerup.com, the Intel SSD 750 Series will be aimed at both the consumer and the professional market segments and be available in three form-factors, including 2.5-inch SATA 6Gbps, mSATA 6Gbps as well as the M.2 form-factor.

The new 750 SSD Series will most likely be available in all the popular capacities, up to 960GB, and be based on 20nm MLC NAND flash.

Unfortunately, the roadmap does not reveal many details regarding the performance of the SSD 750 Series but does note that it should launch in Q4 2014.

Source

June 26, 2014 by  
Filed under Security

Malwarebytes has launched anti-exploit services to protect Windows users from hacking attacks on vulnerabilities in popular targets including Microsoft Office, Adobe software products and Java, a service which even offers protection for Windows XP users.

Consumer, Premium and Corporate versions of the service are available, and are designed to pre-emptively stop hackers from infecting Windows machines with malware.

“An exploit will typically first corrupt the memory of an application process, take control, then execute code,” said Malwarebytes director of special projects Pedro Bustamante.

“From the shell code it executes a payload that tells the exploit what to do and that in turn usually downloads malware from the internet and executes it. The final stage is usually where antivirus kicks in, when it’s being downloaded from the internet, and starts doing things like behavioural analysis to see if it’s malicious.

“We don’t care about that, what we do comes before then. We just look for exploit-like behaviour and block anything that looks like it at the shellcode or payload stages. We come into play before the malware even appears on the scene.”

The Consumer version of the anti-exploit service is free and offers basic browser and Java protection.

The Premium version costs $37.00  per user and adds Office and Adobe protection services as well as the ability to add custom shields to other internet-facing applications, like Messenger or Netflix.

The Corporate version costs$40.00 person user and offers complete anti-exploit protection and comes with Malwarebytes’ Anti-malware service and a toolkit for IT managers.

Bustamante explained that the technology is designed to help businesses and general web users defend against the new wave of exploit-based cyber attacks.

“Traditional security can’t deal with exploits. Every day we see people getting infected, even if they have the latest up-to-date antivirus readers, because of exploits,” he said. “This is why we care about the applications you run – Firefox, Chrome, Internet Explorer, Java, Acrobat [and Microsoft] Word, Excel [and] Powerpoint.”

Bustamante added that the service is doubly important for Windows XP users since Microsoft officially ceased support for the OS in April.

“We’re still seeing over 25 percent of our users running XP. For them this product is even more important,” he said.

“We see new zero-days if not every week, every month, and for XP users who are not getting any more patches from Microsoft this product will be essential.

“Every month Microsoft will be releasing security patches for newer versions of Windows. Every time Microsoft does this it’ll be a treasure map for hackers to find exploits on Windows XP.

“It’ll show them exactly where the vulnerabilities are, so every month will see an influx of new exploits targeting Windows XP.”

Source

June 25, 2014 by  
Filed under Computing

PC Advisor has been going through Apple’s latest iOS 8 operating system and is finding features which appear to be a direct lift from Google. Of course it has to say that Apple is being brilliant and original about stealing the ideas. After it points out that Apple did not invent the music player but it did steal it better than anyone else.

The top 5 iOS 8 features Apple stole from Android include:

Typing suggestions: Start typing and suggested words will appear letter by letter. Hit the correct word and you save the time it would have taken to type the while word and it is a pretty intelligent selection process.

Okay Google: Hotword detection is also the basis of the Google Now Launcher that shipped with the Nexus 5. As long as your phone is awake, saying ‘Okay Google’ wakes up the voice assistant. In iOS 8 Apple has added something similar in the guise of ‘Hey Siri’, the ability to immediately engage Siri simply via a voice command.

Third-party keyboards: Google has long given Android users the opportunity to explore the world outside its own platform. Apple is allowing the same thing on its system now.

Widgets: Widgets have always been part of Android and Apple finally is letting it happen. Of course Apple is not entirely prepared to let you have full control of your device’s desktop. iOS 8 widgets are small app extensions that take up a spot in the Notification Center. Not as good as Android but better than a poke in the eye with a short stick.

Useful notifications: Android has long allowed developers to add up to two action buttons to a notification. So when the message pops up telling you that you have a message you can reply right from the notification, the relevant app opening as required. Now Apple can do that.

While it is accepted that ideas are copied, at least until one of the sides turns into a Patent Troll, what is strange about Apple is that it markets itself as the innovation hub that others follow. It appears that if this was ever true it is not the case now.

Source

June 24, 2014 by  
Filed under Computing

Oracle has added systems to its enterprise-class x86 server line featuring elastic computing capabilities that dynamically adapt their configurations in response to workloads.

The Oracle Sun Server X4-4 and Sun Server X4-8 are four-socket and eight-socket systems designed for data centre workloads such as virtualisation, Oracle databases and scale-up enterprise applications.

However, the two servers are fitted with a unique variant of Intel’s Xeon E7 v2 processor family that combines the capabilities of three different Xeon processors into one.

Oracle said it worked with Intel to create this chip, the Xeon E7-8895 v2, which can dynamically switch its core count, clock frequency and power consumption without the need for a system level reboot.

This chip is the heart of the elastic computing capability of the Sun Server X4-4 and Sun Server X4-8, enabling them to adapt to the requirements of different workloads based on its runtime configuration.

It might be configured for transaction processing at a high clock speed for one hour, then switched to higher core counts for the next hour for higher throughput computing, according to Oracle.

“Through close collaboration with Intel, we are the first to announce servers based on the new Xeon E7-8895 v2 processors and the first with unique capabilities that allow customers to dynamically address different workloads in real time,” said Ali Alasti, senior vice president for hardware development at Oracle.

Enhancements have also been made to the system firmware and to Oracle’s Solaris, and Oracle Linux operating systems to support the elastic computing features.

Oracle also said the new systems have a modular design that allows the processors to be upgraded to future Xeon chips, while all the disks are hot-swappable, plus there is hot-pluggable I/O support for industry-standard low-profile PCI Express cards via a dual PCIe card carrier.

The servers also feature a “glueless” architecture that removes the need for a node controller. As node controllers typically change from one processor generation to the next because of modifications to inter-processor communication and coherency protocols, the elimination enables Oracle to offer a future-proof chassis that will support future processor releases from Intel, the firm said.

The Sun Server X4-8 is touted by Oracle as ideal for running its Oracle Database, which has just been updated with an in-memory processing option. It supports 120 processor cores with up to 6TB of memory in its 5U rack-mount chassis, plus up to 9.6TB of hard drive or 3.2TB of solid state drive (SSD) storage.

Meanwhile, the Sun Server X4-4 is said to be well suited for applications requiring large memory footprint virtual machines and running real-time analytics software.

It can be configured with two or four of the Xeon E7-8895 v2 processors, with up to 3TB of memory and 4.8TB of PCIe flash plus 2.4TB of SSDs or 7.2TB of hard drives.

Source

June 23, 2014 by  
Filed under Around The Net

MasterCard Inc, the world’s second-largest credit card association, sees business booming from selling data to retailers, banks and governments on spending patterns found in the payments it processes, a top executive told Reuters.

MasterCard, which handles payments for 2 billion cardholders and tens of millions of merchants, uses that information to generate real-time data on consumer trends, available more quickly that regular government statistics.

“It is an incredibly fast growing area for us,” Ann Cairns, who heads MasterCard’s business outside North America, said in an interview, stressing that the company respects cardholder privacy, using anonymous data rather than personal information.

MasterCard does not give figures for its information services products but “other revenues”, which include the sale of data, grew 22 percent in the first quarter of 2014 to $341 million, outpacing the growth of total revenue dominated by payments processing, which rose 14 percent to $2.177 billion.

Cairns said clients for the data include retailers, banks and governments, with MasterCard tailoring it to their needs.

“Retailers are fantastic at using the data they have available about how people shop in their store, how their inventory turns over, but what they don’t know is what happens outside their store,” she said. “The data we’ve got is ubiquitous across the whole market. We can help retailers see what they need to do to capture more sales.”

Cairns, 57, a statistician by training who joined MasterCard in 2011 after helping manage the disposal of Lehman Brothers assets in Europe, revels in the insights real-time card data can provide, such as London’s popularity as the world’s top travel destination and a rise in spending on experiences such as eating out or going on holiday rather than shopping in stores.

MasterCard has recorded a spike in spending in Brazil on groceries and a drop in spending on luxury goods as the price of food has risen ahead of the World Cup, she said, the kind of insight valued by companies such as Nike and Adidas that are hoping to sell $300 soccer boots during the competition.

While MasterCard expands in “big data”, Cairns sees no slowdown in its traditional business of processing payments, with plenty of potential for growth as 85 percent of consumer transactions are still made by cash or check.

“Moving money and doing it safely and securely is so deeply cared about by so many people around the world that it will be a business that has fantastic value now and for years to come,” said Cairns, who previously worked at Citigroup and ABN Amro.

Source

June 20, 2014 by  
Filed under Security

After hackers played several high-profile pranks with traffic signs, including warning San Francisco drivers of a Godzilla attack, the U.S. government advised operators of electronic highway signs to take “defensive measures” to better secure their property.

Last month, signs on San Francisco’s Van Ness Ave were photographed flashing “Godzilla Attack! Turn Back” and highway signs across North Carolina were tampered with last week to read “Hack by Sun Hacker.”

The Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, this week advised cities, highway operators and other customers of digital-sign maker Daktronics Inc to take “defensive measures” to minimize the possibility of similar attacks.

It said that information had been posted on the Internet advising hackers how to access those systems using default passwords coded into the company’s software. “ICS-CERT recommends entities review sign messaging, update access credentials and harden communication paths to the signs,” the agency said in an alert posted on Thursday.

Jody Huntimer, a representative for Daktronics, declined to say if the recent attacks involved the bug reported by ICS-CERT.

“We are working with the ICS-CERT team to clarify the current alert and will release a statement once we have assessed the situation and developed customer recommendations,” Huntimer said via email.

Krebs on Security, a widely read security blog, posted a confidential report from the Center for Internet Strategy, or CIS, which was sent to state security officials. It warned that the pranks created a public safety risk because drivers often slow or stop to view the signs and take pictures.

CIS also predicated that amateur hackers might attempt to hack into other systems in the coming weeks following the May 27 release of “Watch Dogs,” a video game from Ubisoft focused on hacking critical infrastructure.

Source

June 19, 2014 by  
Filed under Computing

Broadcom has come out with a new “smart” chip which it hopes will be at the cutting edge of wearable PCs, such as smartwatches, heart and blood-pressure monitor.

Dubbed Wireless Internet Connectivity for Embedded Devices (WICED) smart chip, Broadcom’s designs are supposed to support wireless charging for devices that are too small to connect via a power cord. The devices run an ARM Cortex M3 applications processor that reduces size and cost for OEMs and supports A4WP wireless charging and enhanced data security modes in addition to secure over-the-air firmware updates.

This is an integrated ARM CM3 microcontroller unit with radio frequency and Embedded Bluetooth Smart Stack, all on a single chip. Brian Bedrosian, Broadcom senior director of Embedded Wireless and Wireless Connectivity said that his outfit wanted to push the boundaries on what wearables are capable of with our new smart chip. Broadcom competes in the marketplace with companies such as Taiwan Semiconductor, Marvell and Xilinx.

The Broadcom WICED Smart chip is currently sampling with evaluation boards and SDKs. It is expected to become available sometime in 2014.

Source

June 18, 2014 by  
Filed under Security

Android users have been warned again that they too can become victims of ransomware.

A Cryptolocker-style Android virus dubbed Simplocker has been detected by security firm Eset, which confirmed that it scrambles files on the SD cards of infected devices before issuing a demand for payment.

The message is in Russian and the demand for payment is in Ukrainian hryvnias, equating to somewhere between £15 and £20.

Naturally, the warning also accuses the victim of looking at rather unsavoury images on their phone. However, while the source of the malware is said to be an app called “Sex xionix”, it isn’t available at the Google Play Store, which generally means that anyone who sideloads it is asking for trouble.

Eset believes that this is actually more of a “proof of concept” than an all-out attack, and far less dangerous than Cryptolocker, but fully functional.

Robert Lipovsky of Eset said, “The malware is fully capable of encrypting the user’s files, which may be lost if the encryption key is not retrieved. While the malware does contain functionality to decrypt the files, we strongly recommend against paying up – not only because that will only motivate other malware authors to continue these kinds of filthy operations, but also because there is no guarantee that the crook will keep their part of the deal and actually decrypt them.”

Eset recommends the usual – use a malware app. It recommends its own, obviously, and advises punters to keep files backed up. Following such advice, said Lipovsky, ensures that ransomware is “nothing more than a nuisance”.

This is not the first Android cryptolocker style virus. Last month a similar virus was found, which Kaspersky said was “unsurprising, considering Android’s market share”.

Source

June 17, 2014 by  
Filed under Around The Net

Blackberry’s QNX Software Systems has announced a partnership that will allow its infotainment system to be placed in car’s digital instrument clusters.

The technology will allow drivers to see their music lists and album art, turn-by-turn navigation directions and local news in between instruments such as the speedometer and tachometer.

BlackBerry announced its collaboration with Rightware, a maker of automotiveuser interface design tools, at the Telematics Detroit show here. The collaboration combines the QNX Neutrino operating system and the Rightware Kanzi user interface.

QNX demonstrated the instrument cluster in a Mercedes-Benz concept car. The system also uses MirrorLink, an industry standard for the integration ofsmartphones into infotainment systems. The system is able to mirror Android-based smartphones to both the infotainment center on the console and the instrument cluster display.

With the MirrorLink connection, the instrument cluster can display realtime information, such as local speed limits, turn-by-turn directions, traffic reports and incoming phone calls. Because the cluster is fully digital, it can dynamically change views, highlighting the most important information and using advanced visualizations to help the driver process information more quickly.

“QNX Software Systems and Rightware have already worked together on successful production programs, including the exciting new Audi virtual cockpit,” said Peter McCarthy, director of global alliances for QNX.

With the Kanzi software, developers can create UIs with photorealistic, real-time 2D and 3D graphics. The QNX OS enables the Kanzi UI to access vehicle data and services, including navigation, multimedia, speed, RPM, and car diagnostics. It essentially provides an abstraction layer based on QNX’s persistent publish/subscribe (PPS) technology.

Source

Comments