Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

LinkedIn Acquires Startup Refresh

April 16, 2015 by  
Filed under Around The Net

Comments Off on LinkedIn Acquires Startup Refresh

In a move that could produce even more automated suggestions and tips for LinkedIn users, the professional network has purchased California startup Refresh, the maker of an app that gathers news and insights about participants in meetings.

Launched three years ago, Refresh is designed to be a “digital briefing book” that can call up online information related to people that users are scheduled to meet. The information can be anything from blog posts, news articles or Facebook posts to personal notes or favorite sports teams.

The Refresh mobile and desktop app is aimed at helping people relate to one another more quickly, but it can also be used to refresh one’s memory when running into acquaintances unexpectedly.

The details of the deal were not disclosed. Refresh has stopped taking on new users and its app will shut down April 15.

“Refresh has surfaced insights associated with hundreds of millions of meetings, and has been central to countless connections and closed deals,” co-founder Bhavin Shah wrote on the Refresh blog in announcing the deal.

LinkedIn already has an app called Connected that was somewhat of a rival to Refresh. It can log the people users have met and offer updates and information about interests shared with “connections,” which are acquaintances in the LinkedIn lingo. It’s unclear whether Refresh features will be added to Connected or the LinkedIn website itself.

“Our team will focus its efforts on providing LinkedIn members with more insights to help them better do their jobs,” Shah wrote.

Source

U.S. And Britain Ramping Up Cyber Defense

January 30, 2015 by  
Filed under Security

Comments Off on U.S. And Britain Ramping Up Cyber Defense

The U.S. and Britain are increasing their collaboration to thwart digital threats. They are planning to launch more attacks against each other to test their defenses and scare away possible enemies.

The U.S. and the U.K. have been working together to prevent cyber attacks for some time, but are going to increase the collaboration. They will combine their expertise to set up “cyber cells” on both sides of the Atlantic to increase sharing information about threats and to work out how to best protect themselves and create a system that lets hostile states and organization know they shouldn’t attack, said U.K. prime minister David Cameron in an interview published by the BBC.

Cyber attacks “are one of the biggest modern threats that we face,” according to Cameron who is visiting Washington for talks with U.S. president Barack Obama. One of the topics high on the agenda is digital security.

The countries will increase the “war games” launched at each other to test defenses. “It is happening already but it needs to be stepped up,” Cameron said, adding that British intelligence service GCHQ and the U.S. equivalent NSA have know-how that should be shared more.

“It is not just about protecting companies, it is also about protecting people’s data, about protecting people’s finances. These attacks can have real consequences to people’s prosperity,” he said.

However, in order to protect companies and citizens better, increased snooping powers to track terrorists on social networks are necessary, said Cameron. He is planning to discuss this issue with Obama and U.S. companies including Google and Facebook.

The increased cooperation between the countries comes in the wake of the Sony hack and the apparent hacking of the U.S. Central Command’s Twitter account by ISIS (Islamic State of Iraq and Syria), which posted tweets threatening families of U.S. soldiers and claiming to have hacked into military PCs.

Source

NSA Spies With Tracking Cookies

December 23, 2013 by  
Filed under Around The Net

Comments Off on NSA Spies With Tracking Cookies

The browser cookies that online businesses use to track Internet customers for targeted advertising are also used by the National Security Agency to track surveillance targets and break into their systems.

The agency’s use of browser cookies is restricted to tracking specific suspects rather than sifting through vast amounts of user data, theWashington Post reported Tuesday, citing internal documents obtained from former NSA contractor Edward Snowden.

Google’s PREF (for preference) cookies, which the company uses to personalize webpages for Internet users based on their previous browsing habits and preferences, appears to be a particular favorite of the NSA, the Post noted.

PREF cookies don’t store any user identifying information such as user name or email address. But they contain information on a user’s general location, language preference, search engine settings, number of search results to display per page and other data that lets advertisers uniquely identify an individual’s browser.

The Google cookie, and those used by other online companies, can be used by the NSA to track a target user’s browsing habits and to enable remote exploitation of their computers, the Post said.

Documents made available by Snowden do not describe the specific exploits used by the NSA to break into a surveillance target’s computers. Neither do they say how the NSA gains access to the tracking cookies, the Post reported.

It is theorized that one way the NSA could get access to the tracking cookies is to simply ask the companies for them under the authority granted to the agency by the Foreign Intelligence Surveillance Act (FISA).

Separately, the documents leaked by Snowden show that the NSA is also tapping into cell-phone location data gathered and transmitted by makers of mobile applications and operating systems. Google and other Internet companies use the geo-location data transmitted by mobile apps and operating systems to deliver location-aware advertisements and services to mobile users.

However, the NSA is using the same data to track surveillance targets with more precision than was possible with data gathered directly from wireless carriers, the Post noted. The mobile app data, gathered by the NSA under a program codenamed “Happyfoot,” allows the agency to tie Internet addresses to physical locations more precisely than was possible with cell-phone location data.

An NSA division called Tailored Access Operations uses the data gathered from tracking cookies and mobile applications to launch offensive hacking operations against specific target computers, the Post said.

An NSA spokeswoman Wednesday did not comment on the specific details in the Post story but reiterated the agency’s commitment to fulfill its mission of protecting the country against those seeking to do it harm.

“As we’ve said before, NSA, within its lawful mission to collect foreign intelligence to protect the United States, uses intelligence tools to understand the intent of foreign adversaries and prevent them from bringing harm to innocent Americans and allies,” the spokeswoman said.

The Post’s latest revelations are likely to shine a much-needed spotlight on the extensive tracking and monitoring activities carried out by major Internet companies in order to deliver targeted advertisements to users.

Privacy rights groups have protested such tracking for several years and have sought legislation that would give users more visibility and control over the data that is collected on them by online companies.

Source

Facebook Buys Onavo

October 25, 2013 by  
Filed under Around The Net

Comments Off on Facebook Buys Onavo

Facebook’s CEO Mark Zuckerberg has been shopping again. This time he picked up Onavo, the Tel Aviv based startup whose apps include services designed to monitor and compress mobile data.

The move will benefit Zuckerberg’s interests at two levels. With Facebook keenly emphasising its mobile credentials, the Onavo service could persuade doubters that it’s time to give the service a go.

Meanwhile his Internet.org initiative plans to bring internet connectivity to the parts that other means just can’t reach. Compression technology might make Facebook a viable option in parts of the developing world where data is an expensive luxury, while for the rest of us the prospect of lower roaming charges might be enticing.

As well as being a new subsidiary of Facebook, Onavo will become a satellite office for Facebook in Tel Aviv, the first time it has had a direct presence in Israel. So far there’s no information on how much money has changed hands, but figures of between $100m and $200m have been mentioned.

In a blog post, Onavo said, “We’re excited to join their team, and hope to play a critical role in reaching one of Internet.org’s most significant goals – using data more efficiently, so that more people around the world can connect and share.

“When the transaction closes, we plan to continue running the Onavo mobile utility apps as a standalone brand. As always, we remain committed to the privacy of people who use our application and that commitment will not change.”

However, we might speculate that the technology involved could also be integrated into mobile Facebook apps to make them more data efficient, luring more people to share their lives as they live them.

Source

Is Android Safer Than iOS?

March 21, 2013 by  
Filed under Computing

Comments Off on Is Android Safer Than iOS?

The general consensus is that iOS apps tend to be somewhat safer than their Android counterparts. Apple goes to great lengths to have apps vetted and as a result far fewer iOS apps end up with malware or security issues.

However, a new report fresh out of Appthority claims iOS apps have their fair share of issues and in some respects then can pose an even greater security risk than Android apps. The report covered the top 50 apps from the Apple App Store and Google Play and found that iOS apps exhibited riskier behaviour.

“The majority of iOS apps track for location (60%), share data with advertising or analytics networks (60%) and have access to the user’s contact list (54%). A small percentage of iOS apps also had access to the user’s calendar (14%),” the report found.

However, Android fans shouldn’t be too happy since their platform is not far behind. Half of them share data with ad networks or analytics companies, while 42 percent tracked location. Slightly better, but nothing to be proud about.
One of the most worrying findings is that both Android and iOS apps don’t do much to prevent personal data from leaking from our devices. Not a single iOS app analyzed in the study used encryption to send and receive data, and neither did 92 percent of Android apps.

So while it might seem that Android is a somewhat better platform for users with privacy concerns, both Google and Apple are pants at that sort of thing.

Source

Facebook Goes DRAM

March 19, 2013 by  
Filed under Computing

Comments Off on Facebook Goes DRAM

Facebook has come up with a data cache which runs on flash memory instead of DRAM. Dubbed McDipper it saves money while still delivering higher performance than disk.

The system is a Facebook-built implementation of the popular memcached key-value store the only difference is that runs on flash memory rather than pricier DRAM. Memcached is the open-source key-value store that caches frequently accessed data in memory so applications can access and serve it faster than if it were stored on hard disks.

Facebook runs thousands of memcached servers to power its various applications. The only downside is that it is expensive. McDipper can handle working sets that had very large footprints but moderate to low request rates. It provides up to 20 times the capacity per server and still supports tens of thousands of operations per second.

According to Gigaom, Facebook has deployed McDipper for a handful of these workloads. This has reduced the total number of deployed servers in some pools by as much as 90 per cent while still delivering more than 90 per cent of get responses with sub-millisecond latencies.

Source

Google Acquires Instagram’s Rival

September 24, 2012 by  
Filed under Around The Net

Comments Off on Google Acquires Instagram’s Rival

Google Inc said it purchased Instagram rival Nik Software, which makes award-winning photo editing application Snapseed, for an undisclosed amount.

Google and Facebook Inc are locked in a battle for social network followers that has increasingly shifted to mobile applications, such as photo editing.

While not as famous as Instagram, available for free on Apple’s mobile devices, Snapseed has won a following for its editing prowess among photographers, despite a $4.99 price tag.

Nik Software says Snapseed has more than 9 million users while Instagram says it has more than 100 million.

“We want to help our users create photos they absolutely love, and in our experience Nik does this better than anyone,” Vic Gundotra, Google’s senior vice president, engineering, said on a Google+ post.

Facebook this year bought Instagram, which made an app for users to add filters and effects to pictures taken on their smartphones, for a cool $1 billion.

“Google’s playing chase up in social,” BGC Partners analyst Colin Gillis said. “It’s yet another tuck in they have done, trying to boost their Google+ offering.”

Snapseed won Apple Inc’s “iPad App Of The Year” award in 2011 for its multitouch photo editing interface.

“We’ve always aspired to share our passion for photography with everyone, and with Google’s support we hope to be able to help many millions more people create awesome pictures,” Nik Software said on its Website.

Google’s Gundotra also said that Google+ had hit over 400 million users this week and had just crossed 100 million

Source…

Cisco Hits 50 Million Milestone For Its IP Phones

April 26, 2012 by  
Filed under Around The Net

Comments Off on Cisco Hits 50 Million Milestone For Its IP Phones

Cisco Wednesday announced Wednesday that it has sold its 50 millionth IP phone, a significant increase in just two years when 30 million were sold.

The switching technology giant today also said it will make software for presence, instant messaging and Cisco Jabber IM clients available for free to its Unified Communications Manager customers.

The latter move means organizations with UCM can roll out presence and IM to employees simply and cheaply to smartphones and tablets running various operating systems, Barry O’Sullivan, senior vice president of Cisco’s voice technology group, said in a blog post.

The supported OSs include Windows, Mac, iPad, Cisco Cius, iPhone, BlackBerry and, later in 2012, Android, O’Sullivan said.

The move helps companies “deploy a unified communications client that is BYOD-ready,” he added. BYOD refers to Bring Your Own Device, a trend where companies allow workers to use devices of their choosing to connect to company data wirelessly.

Source…

Corporate America Prefers iPads

March 19, 2012 by  
Filed under Around The Net

Comments Off on Corporate America Prefers iPads

Corporate customers who are planning tablet purchases next quarter overwhelmingly picked Apple’s iPad, a research firm said Tuesday.

Of the 1,000 business IT buyers surveyed last month by ChangeWave Research who said they would purchase tablets for their firms in the coming quarter, 84% named the iPad as an intended selection.

That number was more than ten times the nearest competitor and was a record for Apple.

“The percentage reporting they’ll buy Apple iPads has jumped to the highest level of corporate iPad demand ever seen in a ChangeWave survey,” the company said in a blog post.

Apple’s share of future business purchases has never been lower than 77% in any ChangeWave survey, which go back to November 2010.

Just over a fifth of all IT buyers — 22% — confirmed that they would be purchasing tablets for employees in the April-June quarter, ChangeWave said.

While Apple’s stock among corporate buyers rose by seven percentage points from the 77% that tapped the iPad as their preferred device last November, all other tablet makers’ numbers dropped in the most recent survey.
Source…

WordPress Attacked By Hackers

March 14, 2012 by  
Filed under Around The Net

Comments Off on WordPress Attacked By Hackers

Security outfit Websense said that more than 200,000 infected pages that redirect users to websites displaying fake antivirus scans have been created. The latest compromises are part of a rogue antivirus distribution campaign that has been going on for months, the Websense researchers said.

Cybercriminals gangs have switched to drive-by download attacks that exploit vulnerabilities in outdated browser plug-ins to automatically download and install their rogue software. The large number of infected Web pages seen in this campaign is an indication that these scams still work. Vulnerable websites are a rich source of opportunity for cybercriminals. More than 85 percent of the compromised sites were located in the US, but their visitors were geographically dispersed.

Source…

« Previous PageNext Page »