Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

U.S. Wants To Help Supercomputer Makers

March 1, 2016 by  
Filed under Computing

Comments Off on U.S. Wants To Help Supercomputer Makers

Five of the top 12 high performance computing systems in the world are owned by U.S. national labs. But they are beyond reach, financially and technically, for many within the computing industry, even larger ones.

That’s according to U.S. Department of Energy (DOE) officials, who run the national labs. A new program aims to connect manufacturers with supercomputers and the expertise to use them.

This program provides $3 million, initially, for 10 industry projects, the DOE has announced. Whether the program extends into future fiscal years may well depend on Congress.

The projects are all designed to improve efficiency, product development and energy use.

For instance, Procter & Gamble will get help to reduce the paper pulp in products by 20%, “which could result in significant cost and energy savings” in this energy- intensive industry, according to the project description.

Another firm, ZoomEssence, which produces “powder ingredients that capture all the key sensory components of a liquid,” will work to optimize the design of a new drying method using HPC simulations, according to the award description.

Some other projects in the initial implementation of what is being called HPC4Mfg (HPC for Manufacturing) includes an effort to help Global Foundriesoptimize transistor design.

In another, the Ohio Supercomputer Center and the Edison Welding Institute will develop a welding simulation tool.

The national labs not only have the hardware; “more importantly the labs have deep expertise in using HPC to help solve complex problems,” said Donna Crawford, the associate director of computation at Lawrence Livermore National Laboratory, in a conference call. They have the applications as well, she said.

HPC can be used to design and prototype products virtually that otherwise might require physical prototypes. These systems can run simulations and visualizations to discover, for instance, new energy-efficient manufacturing methods.

Source-http://www.thegurureview.net/computing-category/u-s-wants-to-help-supercomputer-makers.html

Is Microsoft A Risk?

February 29, 2016 by  
Filed under Security

Comments Off on Is Microsoft A Risk?

Hewlett Packard Enterprise (HPE) has cast a shade on what it believes to be the biggest risks facing enterprises, and included on that list is Microsoft.

We ain’t surprised, but it is quite a shocking and naked fact when you consider it. The naming and resulting shaming happens in the HPE Cyber Risk Report 2016, which HPE said “identifies the top security threats plaguing enterprises”.

Enterprises, it seems, have myriad problems, of which Microsoft is just one.

“In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown,” said Sue Barsamian, senior vice president and general manager for security products at HPE.

“We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organisation to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth.”

Microsoft earned its place in the enterprise nightmare probably because of its ubiquity. Applications, malware and vulnerabilities are a real problem, and it is Windows that provides the platform for this havoc.

“Software vulnerability exploitation continues to be a primary vector for attack, with mobile exploits gaining traction. Similar to 2014, the top 10 vulnerabilities exploited in 2015 were more than one-year-old, with 68 percent being three years old or more,” explained the report.

“In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications.”

It is not all bad news for Redmond, as the Google-operated Android is also put forward as a professional pain in the butt. So is iOS, before Apple users get any ideas.

“Malware has evolved from being simply disruptive to a revenue-generating activity for attackers. While the overall number of newly discovered malware samples declined 3.6 percent year over year, the attack targets shifted notably in line with evolving enterprise trends and focused heavily on monetisation,” added the firm.

“As the number of connected mobile devices expands, malware is diversifying to target the most popular mobile operating platforms. The number of Android threats, malware and potentially unwanted applications have grown to more than 10,000 new threats discovered daily, reaching a total year-over-year increase of 153 percent.

“Apple iOS represented the greatest growth rate with a malware sample increase of more than 230 percent.”

Courtesy-TheInq

Twitter To Revive Tweets

January 11, 2016 by  
Filed under Around The Net

Comments Off on Twitter To Revive Tweets

Right on the heels of the first U.S. presidential primaries and caucuses, a popular archive of sometimes-misguided or embarrassing tweets that have been deleted by politicians and their staff has been resurrected by Twitter.

Politwoops had been a popular social media destination for political junkies and others looking to unearth social media gaffes by politicians.

But in a move widely lambasted by open-government advocates, Twitter effectively shuttered Politwoops last summer when it revoked access to its interface by the government accountability watchdog, the Sunlight Foundation, that had developed the tool and had been publishing the tweets.

On Thursday, Twitter said it had reached a deal with Sunlight and another organization, the Open State Foundation, to restore the tool.

“Politwoops is an important tool for holding our public officials, including candidates and elected or appointed public officials, accountable for the statements they make, and we’re glad that we’ve been able to reach an agreement with Twitter to bring it back online both in the U.S. and internationally,” said Jenn Topper, communications director for The Sunlight Foundation.

While the announcement was a victory for government-transparency advocates, it could prove to be a setback for politicians hoping to avoid the social media rumpus that can accompany an ill-timed tweet or misconstrued online musing.

The deal comes as the clock ticks closer to the first vote casting in the 2016 U.S. presidential campaign. The Iowa caucuses will take place on Feb. 1, followed by the first primary in New Hampshire on Feb. 9.

Source-http://www.thegurureview.net/aroundnet-category/twitter-to-revived-archived-deleted-tweets-of-politicians.html

Is Russia Behind Recent US Malware Attacks?

September 30, 2015 by  
Filed under Computing

Comments Off on Is Russia Behind Recent US Malware Attacks?

It would appear that while the US has been blaming China for all its cyber break-ins it appears to be ignoring Tsar Putin’s elite hacking team for the last seven years.

For the past seven years, a cyberespionage group operating out of Russia on the orders of Tsar Putin have been conducting a series of malware campaigns targeting governments, political think tanks and other organizations.

Researchers at F-Secure have been looking into the antics of an outfit called “the Dukes” which has been active since at least 2008. The group has evolved into a methodical developer of “zero-day” attacks, pulling together their own research with the published work of other security firms to provide a more detailed picture of the people behind a long-running family of malware.

The Dukes specialize in “smash and grab” attacks on networks, but have also used subtle, long-term intrusions that harvested massive amounts of data from their targets.

The group’s targets do include criminal organisations operating in the Russian Federation, which suggest there is some form of policing element to it. But they are mostly interested in Western governments and related organisations, such as government ministries and agencies, political think tanks and governmental subcontractors.

F-Secure team wrote. “Their targets have also included the governments of members of the Commonwealth of Independent States; Asian, African, and Middle Eastern governments; organisations associated with Chechen terrorism; and Russian speakers engaged in the illicit trade of controlled substances and drugs.”

The group was named after its earliest-detected malware, known as PinchDuke. Its targets were associated with the Chechen separatist movement. Later that year they were going after Western governments and organisations in search of information about the diplomatic activities of the United States and the NATO.

Most of the attacks used spear phishing emails as the means of injecting malware onto targeted systems, one of their attacks have spread malware through a malicious Tor exit node in Russia, targeting users of the anonymising network with malware injections into their downloads.

The targets have always followed Russian government interests. There are a number of Russian-language artifacts in some of the malware, including an error message in PinchDuke. GeminiDuke also used timestamps that were adjusted to match Moscow Standard time.

Before the beginning of the Ukraine crisis, the group began using a number of decoy documents in spear phishing attacks that were related to Ukraine. They included a letter undersigned by the First Deputy Minister for Foreign Affairs of Ukraine.

However, after the crisis happened the attacks dropped off suggesting that it was an intelligence gathering operation. It is also a big operation, which, if operating in Russia would most likely require state acknowledgement, if not outright support.

Source-http://www.thegurureview.net/computing-category/is-russia-behind-us-malware-attacks.html

Microsoft To Release Advanced Threat Analytics

August 5, 2015 by  
Filed under Computing

Comments Off on Microsoft To Release Advanced Threat Analytics

Microsoft is very close to releasing Advanced Threat Analytics (ATA) the security sure-up that it first announced three months ago.

ATA, or MATA as we called it for our own small amusement, is the result of three months’ real world testing, and the culmination of enough user feedback to inform a final release.

That final release will happen in August, which should give you plenty of time to get your head around it.

Hmmm. Microsoft’s Advanced Threat Analytics seems like a very good idea focused on the enterprise.

— Kevin Jones (@vcsjones) May 4, 2015

Idan Plotnik, who leads the ATA team at Microsoft, explained in an Active Directory Team Blog post that the firm is working towards removing blind spots from security analytics, and that this release should provide a strong and hardy tool for the whacking away of hacking.

“Many security monitoring and management solutions fail to show you the real picture and provide false alarms. We’ve taken a different approach with Microsoft ATA,” he said.

“Our secret sauce is our combination of network Deep Packet Inspection, information about the entities from Active Directory, and analysis of specific events.

“With this unique approach, we give you the ability to detect advanced attacks and stolen credentials, and view all suspicious activities on an easy to consume, simple to explore, social media feed like attack timeline.”

The Microsoft approach is an on-premise device that detects and analyses threats as they happen and on a retrospective basis. Plotnik said that it combines machine learning and knowledge about existing techniques and tactics to proactively protect systems.

“ATA detects many kinds of abnormal user behaviour many of which are strong indicators of attacks. We do this by using behavioural analytics powered by advanced machine learning to uncover questionable activities and abnormal behaviour,” he added.

“This gives the ability for ATA to show you attack indicators like anomalous log-ins, abnormal working hours, password sharing, lateral movement and unknown threats.”

A number of features will be added to the preview release, including performance improvements and the ability to deal with more traffic, before general availability next month.

Source

Text To 911 Has Low Adoption Rate

May 19, 2015 by  
Filed under Around The Net

Comments Off on Text To 911 Has Low Adoption Rate

Only 5% of the nation’s 6,500 emergency dispatch centers are capable of receiving and responding to emergency text-to-911 messages.

That’s not good enough for more than 41,000 signers of a Change.org petition. They want Congress to pass legislation requiring emergency centers to update their systems to accommodate texting.

Text-to-911 would have provided much-needed help for Lisbeth (not her real name), a mother of two who said she was repeatedly battered by her boyfriend in her home over several years. One day three years ago, when he was yelling at her, she tried to call 911 on her cell phone for help, but he broke down the door where she was hiding and demanded to know whom she was calling.

“I was trying to whisper, but he got in and punched me and asked me who I was talking to,” Lisbeth said in an interview. That time, a neighbor overheard the fight and called 911 to bring police to the scene.

“911 works, but I wish it worked with text,” she added. “If they had it back then, it might have made a difference.” Lisbeth later moved into a shelter for abused women in California’s San Fernando Valley and said her life has improved for herself and her children. “Anybody who is going through the same situation as I was should ask for help,” she said.

The Federal Communications Commission last yea rrequired U.S. carriers and makers of some texting apps to provide emergency texting with their services, but the FCC doesn’t regulate the nation’s emergency dispatch centers. Instead, the centers are regulated locally by 3,200 different states, counties and cities, even though many of those jurisdictions receive federal funds for the dispatch centers.

FCC Commissioner Ajit Pai last August expressed concerns that FCC mandates for carriers might give the public a false impression that they can send texts to emergency responders when so few are prepared to receive texts.

Source

Anthem Gets Hacked

February 17, 2015 by  
Filed under Computing

Comments Off on Anthem Gets Hacked

Health insurer Anthem Inc, which has nearly 40 million U.S. customers, has confirmed that hackers had breached one of its IT systems and stolen personal information relating to current and former consumers and employees.

The No. 2 health insurer in the United States said the breach did not appear to involve medical information or financial details such as credit card or bank account numbers.

The information accessed during the “very sophisticated attack” did include names, birthdays, social security numbers, street addresses, email addresses and employment information, including income data, the company said.

Anthem said that it immediately made every effort to close the security vulnerability and reported the attack to the FBI. Cybersecurity firm FireEye Inc FEYE. said it had been hired to help Anthem investigate the attack.

The company did not say how many customers and staff were affected, but the Wall Street Journal earlier reported it was suspected that records of tens of millions of people had been taken, which would likely make it the largest data breach involving a U.S. health insurer.

Anthem had 37.5 million medical members as of the end of December.

“This attack is another reminder of the persistent threats we face, and the need for Congress to take aggressive action to remove legal barriers for sharing cyber threat information,” U.S. Rep. Michael McCaul, a Republican from Texas and chairman of the Committee on Homeland Security, said in a statement late Wednesday.

Source

U.S. And Britain Ramping Up Cyber Defense

January 30, 2015 by  
Filed under Security

Comments Off on U.S. And Britain Ramping Up Cyber Defense

The U.S. and Britain are increasing their collaboration to thwart digital threats. They are planning to launch more attacks against each other to test their defenses and scare away possible enemies.

The U.S. and the U.K. have been working together to prevent cyber attacks for some time, but are going to increase the collaboration. They will combine their expertise to set up “cyber cells” on both sides of the Atlantic to increase sharing information about threats and to work out how to best protect themselves and create a system that lets hostile states and organization know they shouldn’t attack, said U.K. prime minister David Cameron in an interview published by the BBC.

Cyber attacks “are one of the biggest modern threats that we face,” according to Cameron who is visiting Washington for talks with U.S. president Barack Obama. One of the topics high on the agenda is digital security.

The countries will increase the “war games” launched at each other to test defenses. “It is happening already but it needs to be stepped up,” Cameron said, adding that British intelligence service GCHQ and the U.S. equivalent NSA have know-how that should be shared more.

“It is not just about protecting companies, it is also about protecting people’s data, about protecting people’s finances. These attacks can have real consequences to people’s prosperity,” he said.

However, in order to protect companies and citizens better, increased snooping powers to track terrorists on social networks are necessary, said Cameron. He is planning to discuss this issue with Obama and U.S. companies including Google and Facebook.

The increased cooperation between the countries comes in the wake of the Sony hack and the apparent hacking of the U.S. Central Command’s Twitter account by ISIS (Islamic State of Iraq and Syria), which posted tweets threatening families of U.S. soldiers and claiming to have hacked into military PCs.

Source

Net Neutrality Vote Coming Next Month

January 14, 2015 by  
Filed under Around The Net

Comments Off on Net Neutrality Vote Coming Next Month

The U.S. Federal Communications Commission will finally vote on new net neutrality rules in their February meeting.

FCC Chairman Tom Wheeler will bring a proposal to a vote during the commission’s Feb. 26 meeting, FCC spokeswoman Kim Hart said Friday, following a report in the Washington Post.

It’s unclear, however, what form those rules will take. Hart declined to comment further on the net neutrality order Wheeler plans to circulate in February.

Many telecom policy experts had expected the FCC to take action on net neutrality early this year after a year-long fight over the issue.

Nearly a year ago, a U.S. appeals court threw out a large portion of net neutrality rules the FCC approved in late 2010. The court ruled that the FCC’s rules came too close to common carrier regulations when the commission didn’t take the step of reclassifying broadband providers as regulated utilities. The court, however, pointed to a couple if sections of the Telecommunications Act that the FCC could use to pass net neutrality regulations.

After launching a net neutrality proceeding in early 2014, the FCC has received nearly 4 million public comments about proposed regulations. Wheeler originally proposed that the FCC adopt rules that would allow broadband providers to engage in “commercially reasonable” traffic management, and in limited cases, charge Web content providers and services for prioritized traffic.

But many people filing comments, and groups like Free Press and Public Knowledge, called on the FCC to pass stronger rules prohibiting traffic prioritization deals. Many advocates of strong net neutrality rules want the FCC to reclassify broadband as a regulated public utility, while exempting them from some common carrier rules, like price regulation.

Recent news reports have suggested Wheeler is leaning toward so-called hybrid net neutrality rules that would classify a part of broadband service as a regulated public utility.

Source

Will Marriott Block Wi-Fi

January 5, 2015 by  
Filed under Around The Net

Comments Off on Will Marriott Block Wi-Fi

The U.S. Federal Communications Commission will render a decision on whether to establish rules regarding hotels’ ability to block personal Wi-Fi hotspots inside their buildings, a practice that recently earned Marriott International a $600,000 fine.

In August, Marriott, business partner Ryman Hospitality Properties and trade group the American Hotel and Lodging Association asked the FCC to clarify when hotels can block outside Wi-Fi hotspots in order to protect their internal Wi-Fi services.

In that petition, the hotel group asked the agency to “declare that the operator of a Wi-Fi network does not violate [U.S. law] by using FCC-authorized equipment to monitor and mitigate threats to the security and reliability of its network,” even when taking action causes interference to mobile devices.

The comment period for the petition ended Friday, so now it’s up to the FCC to either agree to Marriott’s petition or disregard it.

However, the FCC did act in October, slapping Marriott with the fine after customers complained about the practice. In their complaint, customers alleged that employees of Marriott’s Gaylord Opryland Hotel and Convention Center in Nashville used signal-blocking features of a Wi-Fi monitoring system to prevent customers from connecting to the Internet through their personal Wi-Fi hotspots. The hotel charged customers and exhibitors $250 to $1,000 per device to access Marriott’s Wi-Fi network.

During the comment period, several groups called for the agency to deny the hotel group’s petition.

The FCC made clear in October that blocking outside Wi-Fi hotspots is illegal, Google’s lawyers wrote in a comment. “While Google recognizes the importance of leaving operators flexibility to manage their own networks, this does not include intentionally blocking access to other commission-authorized networks, particularly where the purpose or effect of that interference is to drive traffic to the interfering operator’s own network,” they wrote.

Source

« Previous PageNext Page »