Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is Apple Pay A Success?

June 13, 2016 by  
Filed under Around The Net

Comments Off on Is Apple Pay A Success?

Over a year ago after Apple Pay took the United States by storm, the smartphone giant has made only tiny ripple in the global payments market, hindered by technical challenges, low consumer take-up and resistance from banks.

The service is available in six countries and among a limited range of banks, though in recent weeks Apple has added four banks to its sole Singapore partner American Express; Australia and New Zealand Banking Group in Australia; and Canada’s five big banks.

Apple Pay usage totaled $10.9 billion last year, the vast majority of that in the United States. That is less than the annual volume of transactions in Kenya, a mobile payments pioneer, according to research firm Timetric.

And its global turnover is a drop in the bucket in China, where Internet giants Alibaba and Tencent dominate the world’s biggest mobile payments market – with an estimated $1 trillion worth of mobile transactions last year, according to iResearch data.

Anecdotal evidence from Britain, China and Australia suggests Apple Pay is popular with core Apple followers, but the quality of service, and interest in it, varies significantly.

To use Apple Pay, consumers tap their iPhone over payment terminals to buy coffee, train tickets and other services. It can be also used at vending machines that accept contactless payments.

Apple Pay transactions were a fraction of the $84.5 billion in iPhone sales for the six months to March, which accounted for two-thirds of Apple’s total revenue.

Apple has leveraged its huge U.S. user base to push Pay, but has met resistance in Australia, Britain and Canada where banks are building their own products.

“Payments in general is such a complicated system with so many incumbent providers that revolutionary change like this was not going to happen very quickly,” said Joshua Gilbert, an analyst at First Annapolis Consulting.

The upshot: Apple has rolled out Pay in a dribble, adding countries and partners where it can – Hong Kong is expected to be added next – resulting in an uneven banking landscape with users and retail staff not always sure what will work and how.

Source- http://www.thegurureview.net/mobile-category/apple-pay-struggling-to-gain-traction-outside-u-s.html

Swift To Focus More On Security

June 6, 2016 by  
Filed under Around The Net

Comments Off on Swift To Focus More On Security

The SWIFT secure messaging service that underpins international banking announced that it will launch a new security program as it fights to rebuild its reputation in the wake of the Bangladesh Bank heist.

The Society for Worldwide Interbank Financial Telecommunication (SWIFT)’s chief executive, Gottfried Leibbrandt, told a financial services conference in Brussels that SWIFT will launch a five-point plan later this week.

Banks send payment instructions to one another via SWIFT messages. In February, thieves hacked into the SWIFT system of the Bangladesh central bank, sending messages to the Federal Reserve Bank of New York allowing them to steal $81 million.

The attack follows a similar but little-noticed theft from Banco del Austro in Ecuador last year that netted thieves more than $12 million, and a previously undisclosed attack on Vietnam’s Tien Phong Bank that was not successful.

The crimes have dented the banking industry’s faith in SWIFT, a Belgium-based co-operative owned by its users.

The Bangladesh Bank hack was a “watershed event for the banking industry”, Leibbrandt said.

“There will be a before and an after Bangladesh. The Bangladesh fraud is not an isolated incident … this is a big deal. And it gets to the heart of banking.”

SWIFT wants banks to “drastically” improve information sharing, to toughen up security procedures around SWIFT and to increase their use of software that could spot fraudulent payments.

SWIFT will also provide tighter guidelines that auditors and regulators can use to assess whether banks’ SWIFT security procedures are good enough.

Leibbrandt again defended SWIFT’s role, saying the hacks happened primarily because of failures at users. “Many of the less protected banks are in countries were skills are really scarce,” he said, pointing the finger at providers of services to banks.

“We will have to create an ecosystem of providers and partners, for example by introducing certification requirements for third-party providers,” he said.

Courtesy-http://www.thegurureview.net/uncategorized/swift-to-implement-new-security-program-after-recent-hacking.html

DARPA Goes Robtic

May 27, 2016 by  
Filed under Computing

Comments Off on DARPA Goes Robtic

The U.S. military is funding research for a mind-controlled prosthetic arm that is surgically implanted into the user’s body.

“This is the most advanced arm in the world,” Johnny Matheny, who lost his left arm to cancer in 2008 and demonstrated the robotic arm for DARPA, said in a statement. “This one can do anything your natural arm can do, with the exception of the Vulcan V. But unless I meet a Vulcan, I won’t need it.”

Matheny showed the arm during Demo Day for the Defense Advanced Research Projects Agency, the military’s research unit, which was held Wednesday at the Pentagon. The device was developed at the Research and Exploratory Development Department at Johns Hopkins Applied Physics Laboratory.

The robotic arm is attached to a piece of metal that is surgically implanted into the bone of the user’s arm in technique called osseointegration. Matheny is the first person in the U.S. to have undergone the procedure, according to the U.S. Army.

The Army called the system a “true man/machine interface.”

The mind-controlled aspect of the arm comes into play via the nerves and muscles in what remains of the user’s arm. Those tissues send signals to the robotic arm, which responds to them as a real arm would.

“This is part of the Revolutionizing Prosthetics Program, where we set out to restore near-natural upper extremity control to our military service members who have lost limbs in service of our country,” said Dr. Justin C. Sanchez, director of the Biological Technologies Office at DARPA, in a statement. “The goal is to control the arm as naturally as possible.”

The robotic arm, according to Sanchez, has the same size, weight, shape and grip strength as an adult biological arm.

Source-http://www.thegurureview.net/aroundnet-category/darpa-shows-off-mind-controlled-robotic-arm.html

Is Apple In A Free Fall?

May 26, 2016 by  
Filed under Smartphones

Comments Off on Is Apple In A Free Fall?

Apple shares are continuing to fall as more investors realise that the share price is not going to go up any more.

For a while now people have been buying Apple shares with the expectation that they will always go up. This always was largely based on a fantasy created by the Tame Apple Press that assumed the company would keep coming up with new technology ideas which would always be successful.

However lately Apple has not come up with any new ideas and has taken to re-issuing its old phone designs. It has also been floundering in its key Chinese market. The company’s only new idea has been for content creation through its Apple Music streaming brand. The only problem with that is that the software has been killing off user’s iTune libraries.  It has also been banned in China which means that hopes that Apple would make money there are still thwarted.

Shares of Apple dropped below $90 on Thursday for the first time since 2014 as Wall Street worried about slow demand ahead of the anticipated launch of a new iPhone later this year. Some more reasonable analysts even think that the iPhone 7 is going to be a disaster because it lacks any new tech and has the same design as the poor performing iPhone 6S

Component suppliers in Taiwan have confirmed that they have received fewer orders from Apple in the second half of 2016 than in the same period last year.

Rosenblatt Securities analyst Jun Zhang saidt that investors were getting negative data points about component orders and production forecasts, and the features on the new iPhone do not seem to be a big change from the 6S.

Apple briefly relinquished its position as the world’s largest company by market capitalisation to Alphabet – oh the horror.

At the close, Apple and Google each had market values of about $495 billion, according to Thomson Reuters data. In the past year, Apple’s market capitalization has fallen by more than $200 billion. Which just goes to show this whole value thing was an illusion.

Suppliers of iPhone components also fell, with Skyworks Solutions off 4.54 percent, Broadcom down 1.95 percent and Qorvo declining 1.76 percent.

Revenue from China slumped 26 percent during the March quarter. Apple faces increasing competition from Chinese manufacturers like Xiaomi and Huawei selling phones priced below $200, Rosenblatt’s Zhang said.

Last week, Dialog Semiconductor, which sells chips used in iPhones and other smartphones, cut its revenue outlook due to ongoing softness in the smartphone market.

The Tame Apple press is trying to do its best to find analysts who recommend buying the stock claiming it is too cheap.However how much should you pay for an outfit which has milked its cash cow and has nothing new on the horizon.

Courtesy-Fud

Google And Yahoo Get Blocked

May 24, 2016 by  
Filed under Around The Net

Comments Off on Google And Yahoo Get Blocked

The IT department of the U.S. House of Representatives is prohibiting access to Yahoo Mail and the Google App Engine platform due to malware threats.

On April 30, the House’s Technology Service Desk informed users about an increase in ransomware-related emails on third-party email services like Yahoo Mail and Gmail.

“The House Information Security Office is taking a number of steps to address this specific attack,” the Technology Service Desk said in an email obtained and published by Gizmodo. “As part of that effort, we will be blocking access to Yahoo Mail on the House Network until further notice.”

The ban on Yahoo Mail access suggests that some House of Representatives workers accessed Yahoo mailboxes from their work computers. This raises questions: Are House workers using Yahoo Mail for official business, and, if they’re not, are they allowed to check their private email accounts on work devices?

If they use the same devices for both personal and work activities, one would hope that there are access controls in place to separate the work and personal data. Otherwise, if they are allowed to take those devices outside of the House’s network, they could just as easily become infected there, where the ban is not in effect.

“The recent attacks have focused on using .js files attached as ZIP files to e-mail that appear to come from known senders,” the House’s Technology Service Desk said. “The primary focus appears to be through Yahoo Mail at this time.”

The increase in ZIP and RAR attachments that contain malicious JavaScript (JS) files has been observed by multiple security companies in recent months. Microsoft offers several recommendations, like using the Windows AppLocker group policy to restrict the execution of .JS files.

The House Information Security Office also banned access to appspot.com, the domain name used by applications hosted on the Google App Engine platform, Reuters reported.

Source- http://www.thegurureview.net/aroundnet-category/u-s-house-of-representatives-block-yahoo-and-google-apps.html

IBM’s Watson Goes Cybersecurity

May 23, 2016 by  
Filed under Computing

Comments Off on IBM’s Watson Goes Cybersecurity

IBM Security has announced a new year-long research project through which it will partner with eight universities to help train its Watson artificial intelligence system to tackle cybercrime.

Knowledge about threats is often hidden in unstructured sources such as blogs, research reports and documentation, said Kevin Skapinetz, director of strategy for IBM Security.

“Let’s say tomorrow there’s an article about a new type of malware, then a bunch of follow-up blogs,” Skapinetz explained. “Essentially what we’re doing is training Watson not just to understand that those documents exist, but to add context and make connections between them.”

Over the past year, IBM Security’s own experts have been working to teach Watson the “language of cybersecurity,” he said. That’s been accomplished largely by feeding it thousands of documents annotated to help the system understand what a threat is, what it does and what indicators are related, for example.

“You go through the process of annotating documents not just for nouns and verbs, but also what it all means together,” Skapinetz said. “Then Watson can start making associations.”

Now IBM aims to accelerate the training process. This fall, it will begin working with students at universities including California State Polytechnic University at Pomona, Penn State, MIT, New York University and the University of Maryland at Baltimore County along with Canada’s universities of New Brunswick, Ottawa and Waterloo.

Over the course of a year, the program aims to feed up to 15,000 new documents into Watson every month, including threat intelligence reports, cybercrime strategies, threat databases and materials from IBM’s own X-Force research library. X-Force represents 20 years of security research, including details on 8 million spam and phishing attacks and more than 100,000 documented vulnerabilities.

Watson’s natural language processing capabilities will help it make sense of those reams of unstructured data. Its data-mining techniques will help detect outliers, and its graphical presentation tools will help find connections among related data points in different documents, IBM said.

Ultimately, the result will be a cloud service called Watson for Cyber Security that’s designed to provide insights into emerging threats as well as recommendations on how to stop them.

Source-http://www.thegurureview.net/computing-category/ibms-watson-to-get-schooled-on-cybersecurity.html

Do Smartphones Cause Cancer?

May 18, 2016 by  
Filed under Around The Net

Comments Off on Do Smartphones Cause Cancer?

It is looking incredibly unlikely that mobile phone use is giving anyone cancer.  A long term study into the incidence of brain cancer in the Australian population between 1982 to 2013 shows no marked increase.

The study, summarized on the Conversation site looked at the prevalence of mobile phones among the population against brain cancer rates, using data from national cancer registration.

The results showed a very slight increase in brain cancer rates among males, but a stable level among females. There were significant increases in over-70s, but this problem started before 1982.

The figures should have even been higher as Computed tomography (CT), magnetic resonance imaging (MRI) and related techniques, introduced in Australia in the late 1970s can spot brain tumors which could have otherwise remained undiagnosed.

The data matches up with other studies conducted in other countries, but in Australia all diagnosed cases of cancer have to be legally registered and this creates consistent data.

The argument that mobile phones cause cancer has been running ever since the phones first arrived. In fact the radiation levels on phones has dropped significantly over the years, just to be safe rather than sorry. However it looks like phones have had little impact on cancer statistics – at least in Australia.

http://www.thegurureview.net/mobile-category/do-smartphones-cause-cancer.html

Groupon Starts Fight With IBM

May 16, 2016 by  
Filed under Around The Net

Comments Off on Groupon Starts Fight With IBM

The online marketplace Groupon Inc has filed a lawsuit against IBM Corp, accusing it of infringing a patent related to technology that assists businesses  to solicit customers based on the customers’ locations at a given moment.

Groupon filed its lawsuit on Monday with the federal court in its hometown of Chicago, two months after IBM accused Groupon of patent infringement in a separate lawsuit.

“IBM is trying to shed its status as a dial-up-era dinosaur” by infringing the rights of “current” technology companies such as Groupon, according to Groupon spokesman Bill Roberts.

Doug Shelton, an IBM spokesman, said: “This counter suit is totally without merit.” IBM’s full name is International Business Machines Corp.

The latest lawsuit concerns IBM’s WebSphere Commerce platform, which Groupon said lets merchants send messages to customers with GPS-enabled devices based on their real-time locations, and their use of social media including Facebook.

Groupon said the platform infringes a December 2010 patent, and that it deserves royalties based on the “billions of dollars” of revenue that Armonk, New York-based IBM has received through its infringement.

“IBM, a relic of once-great 20th Century technology firms, has now resorted to usurping the intellectual property of companies born this millennium,” Groupon said in its lawsuit.

On March 2, IBM accused Groupon in a federal lawsuit in Delaware of infringing four patents, including two related to Prodigy, a late-1980s forerunner to the Internet.

“Over the past three years, IBM has attempted to conclude a fair and reasonable patent license agreement with Groupon, and we are disappointed that Groupon is seeking to divert attention from its patent infringement by suing,” Shelton said.

The Chicago case is Groupon Inc v International Business Machines Corp, U.S. District Court, Northern District of Illinois, No. 16-05064. The Delaware case is International Business Machines Corp v Groupon Inc, U.S. District Court, District of Delaware, No. 16-00122.

Source-http://www.thegurureview.net/aroundnet-category/groupon-gets-into-patent-fight-with-ibm.html

Oracle Goes Deeper Into The Cloud

May 13, 2016 by  
Filed under Computing

Comments Off on Oracle Goes Deeper Into The Cloud

Right on the heels of a similar acquisition last week, Oracle has announced it will pay $532 million to buy Opower, a provider of cloud services to the utilities industry.

Once a die-hard cloud holdout, Oracle has been making up for lost time by buying a foothold in specific industries through acquisitions such as this one. Last week’s Textura buy gave it a leg up in engineering and construction.

“It’s a good move on Oracle’s part, and it definitely strengthens Oracle’s cloud story,” said Frank Scavo, president of Computer Economics.

Opower’s big-data platform helps utilities improve customer service, reduce costs and meet regulatory requirements. It currently stores and analyzes more than 600 billion meter readings from 60 million end customers. Opower claims more than 100 global utilities among its clients, including PG&E, Exelon and National Grid.

Opower will continue to operate independently until the transaction closes, which is expected later this year. The union will create the largest provider of mission-critical cloud services to an industry that’s worth $2.3 trillion, Oracle said.

Oracle’s Utilities business delivers applications and cloud services that automate core operational processes and enable compliance for global electric, gas and water utilities.

“Oracle’s industry organizations maintain unique domain knowledge, specialized expertise and focused product investments,” said Rodger Smith, a senior vice president who leads the Utilities global business unit, in a letter to customers and partners. “This model has proven highly successful across several industries, and we look forward to bringing these same benefits to the customers of Opower.”

Source- http://www.thegurureview.net/aroundnet-category/oracle-pushes-deeper-into-cloud-computing-with-another-acquisition.html

Phishing Apps Plague Google Play

May 12, 2016 by  
Filed under Computing

Comments Off on Phishing Apps Plague Google Play

Google’s attempts to safeguard the Android app store — Google Play — are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.

Researchers from security firm PhishLabs claim that they’ve found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.

The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies’ websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don’t see their actual location.

In some cases attackers registered domain names that are similar to those of the impersonated online payment services, PhishLab Security Threat Analyst Joshua Shilko said in a blog post.

More recently, attackers used domain names similar to those of cryptocurrency companies, suggesting that the cryptocurrency industry is also targeted.

PhishLabs did not name the exact payment card companies and online payment services whose users were targeted by these fake apps. However, most of those companies provide links to their official mobile applications on their websites and users should always use those links instead of manually searching for them on the Play store.

“In one case, a targeted company explicitly states on their website that no mobile application exists for their company and that users should be wary of any mobile application using their brand,” Shilko said.

The danger is that if phishers manage to routinely bypass Google’s review process and upload such apps to the Google Play store, their attacks might extend to other industries in the future.

Another problem is that even when these apps are detected by third-parties and reported, it can take several days for Google to remove them from the app store, leaving a sufficiently large window of opportunity for attackers. It’s not clear how attackers promote these fake apps or if they rely only on users finding them themselves, but in general phishing attacks are most effective during the first several hours after they’re launched.

Source- http://www.thegurureview.net/mobile-category/phishing-apps-continue-to-play-google-play.html

« Previous PageNext Page »