Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is Samsung Ditching Android?

March 13, 2014 by  
Filed under Around The Net

Comments Off on Is Samsung Ditching Android?

Samsung appears to have delivered a huge snuff to Android OS maker Google. Samsung’s new smartwatch Gear 2 and Gear 2 Neo, the sequels to the poorly reviewed original Galaxy Gear are going to ship without Android.

Instead, the new Gears run Tizen, another open source operating system that Samsung, Intel, and others are working on. It is starting to look like Samsung wants to distance itself from its reliance on Google for software and services.

Samsung’s official reason is that Tizen has better battery life and performance. The new Gears can get up to an extra two days of battery life by running Tizen, even though they have the same size battery. The Galaxy Gear barely made it through a day on one charge.

To be fair Android isn’t optimized to run on wearable devices like smart watches, but Samsung didn’t want to wait around for Google to catch up. It was clearly concerned about beating Apple to market. So far Apple has not shown up.

Source

Can BB Benefit From The WhatsApp Deal?

March 3, 2014 by  
Filed under Around The Net

Comments Off on Can BB Benefit From The WhatsApp Deal?

Facebook Inc’s awe-inspiring $19 billion bid for fast-growing mobile-messaging startup WhatsApp sent shares of BlackBerry Ltd surging after the closing bell as early as Wednesday, as investors were cheered by the lofty valuation for the messaging platform.

The deal sent shares in BlackBerry up as much as 9 percent in trading after the bell because it put a rough valuation metric around the smartphone maker’s own BlackBerry Messaging service.

BlackBerry Messaging, or BBM as it is more commonly known, was a pioneering mobile-messaging service, but its user base has failed to keep pace with that of WhatsApp, in part because BlackBerry had long refused to open the service to users on other platforms.

WhatsApp, with a user base of some 450 million, has grown rapidly. Its service works on Apple Inc’s iOS platform, Google Inc’s market-dominating Android operating system, along with devices powered by both the Windows and BlackBerry operating systems.

BBM remains popular, even though BlackBerry devices have waned in popularity. Late last year, the Waterloo, Ontario-based smartphone maker finally opened the messaging platform to users of iPhones and Android devices, and the service currently has over 80 million active users.

However, investors have attributed little value to the asset within the company. On Tuesday, Raymond James analyst Steven Li, in a note to clients, broke out a sum-of-parts valuation of the company and pegged the value of BBM at merely $240 million, or $3 per user.

Facebook’s valuation of WhatsApp translates into roughly $42 per user, and that could lead investors and analysts to rethink their valuation of the asset within BlackBerry.

BlackBerry has given no indication it is keen to sell the asset. While there has been some speculation that BlackBerry may seek to carve out the unit, or even sell it, the company’s new Chief Executive John Chen has so far said that BBM remains a core asset for the company.

Source

Was Dropbox Really Hacked?

January 24, 2014 by  
Filed under Around The Net

Comments Off on Was Dropbox Really Hacked?

Dropbox suffered a major outage over the weekend.

In one of the more bizarre recent incidents, after the service went down on Friday evening a group of hackers claimed to have infiltrated the service and compromised its servers.

However, on the Dropbox blog, Dropbox VP of engineering Ardita Ardwarl told users that hackers were not to blame.

Ardwari said, “On Friday evening we began a routine server upgrade. Unfortunately, a bug installed this upgrade on several active servers, which brought down the entire service. Your files were always safe, and despite some reports, no hacking or DDOS attack was involved.”

The fault occurred when a bug in an upgrade script caused an operating system upgrade to be triggered on several live machines, rendering them inoperative. Although the fault was rectified in three hours, the knock-on effects led to problems that lasted through the weekend for some users.

Dropbox has assured users that there are no further problems and that all users should now be back online. It said that at no point were files in danger, adding that the affected machines didn’t host any user data. In other words, the “hackers” weren’t hackers at all, but attention seeking trolls.

Dropbox claims to have over 200 million users, many of which it has acquired through strategic partnerships with device manufacturers offering free storage with purchases.

Source

The company is looking forward to an initial public offering (IPO) on the stock market, so the timing of such a major outage could not be worse. Dropbox, which includes Bono and The Edge from U2 amongst its investors, has recently enhanced its business offering to appeal to enterprise clients, and such a loss of uptime could affect its ability to attract customers.

T Mobile Sees Growth

January 20, 2014 by  
Filed under Smartphones

Comments Off on T Mobile Sees Growth

T-Mobile US has reported a fourth-quarter boost in customer growth and offered to pay customers to ditch rival service providers, escalating already intense competition in the U.S. wireless market.

The company, the No. 4 U.S. mobile operator, promised payments of up to $350 per line to consumers who break their contract with any of its bigger rivals and switch to T-Mobile.

The offer came just days after AT&T Inc promised a $200 credit to T-Mobile customers who switch. While AT&T also offered up to $250 for switching customers who trade in their phone, T-Mobile said it would pay up to $300 for trade-ins.

The companies have been targeting each other because they use the same network technology, making it easy for consumers to bring their phone when they switch, but some on Wall Street are concerned they will cause an industry-wide price war.

T-Mobile said it hoped that whole families as well as individuals would switch to its service in response to the new cash offer, which is aimed at covering early contract termination fees typically charged by wireless operators.

John Legere, the outspoken chief executive of T-Mobile, said he hoped the offer would end the “industry scam” of family plans, which tie entire families into long-term contracts.

Legere joked that AT&T’s recent offer would actually play to T-Mobile’s advantage because it would allow AT&T customers to try a different service with less financial risk than before.

“If it doesn’t work they’ll pay you to come back,” Legere said in announcing the offer at the Consumer Electronics Show in Las Vegas.

T-Mobile, which is 67 percent owned by Deutsche Telekom, managed to turn the corner on four years of customers losses in 2013 by criticizing its rivals and promoting its service plans as being more flexible and consumer friendly.

It said it added 1.645 million net customers in the fourth quarter, up from 1.023 million in the quarter before, marking its third quarter of customer growth for 2013.

The fourth-quarter additions included 869,000 valuable post-paid customers, which was up 13 percent from the third quarter, according to the company.

It said customer defections, known in the industry as churn, stayed at third-quarter levels of 1.7 percent and compared with 2.5 percent in the fourth quarter of 2012.

Source

NSA Developing System To Crack Encryption

January 13, 2014 by  
Filed under Computing

Comments Off on NSA Developing System To Crack Encryption

The U.S. National Security Agency is working to develop a computer that could ultimately break most encryption programs, whether they are used to protect other nations’ spying programs or consumers’ bank accounts, according to a report by the Washington Post.

The report, which the newspaper said was based on documents leaked by former NSA contractor Edward Snowden, comes amid continuing controversy over the spy agency’s program to collect the phone records Internet communications of private citizens.

In its report, The Washington Post said that the NSA is trying to develop a so-called “quantum computer” that could be used to break encryption codes used to cloak sensitive information.

Such a computer, which would be able to perform several calculations at once instead of in a single stream, could take years to develop, the newspaper said. In addition to being able to break through the cloaks meant to protect private data, such a computer would have implications for such fields as medicine, the newspaper reported.

The research is part of a $79.7 million research program called “Penetrating Hard Targets,” the newspaper said. Other, non-governmental researchers are also trying to develop quantum computers, and it is not clear whether the NSA program lags the private efforts or is ahead of them.

Snowden, living in Russia with temporary asylum, last year leaked documents he collected while working for the NSA. The United States has charged him with espionage, and more charges could follow.

His disclosures have sparked a debate over how much leeway to give the U.S. government in gathering information to protect Americans from terrorism, and have prompted numerous lawsuits.

Last week, a federal judge ruled that the NSA’s collection of phone call records is lawful, while another judge earlier in December questioned the program’s constitutionality. The issue is now more likely to move before the U.S. Supreme Court.

On Thursday, the editorial board of the New York Times said that the U.S. government should grant Snowden clemency or a plea bargain, given the public value of revelations over the National Security Agency’s vast spying programs.

Source

Google Snubs Privacy

August 29, 2013 by  
Filed under Around The Net

Comments Off on Google Snubs Privacy

Search giant Google has told the British government it is immune to prosecution on privacy issues and it can do what it like. The US Company is accused of illegally snooping on its British customers by bypassing privacy settings on Apple devices, such as iPads, to track their browsing history.

A group of British people took Google to court but the search engine is trying to get the case thrown out. Its argument is that it is not subject to British privacy law because it is based in California. This is the second time that Google has tried to avoid British law by pretending to operate in another country. It has come under fire for failing to pay tax in the UK

Nick Pickles, director of Big Brother Watch, said: ‘It is deeply worrying for a company with millions of British users to be brazenly saying they do not regard themselves bound by UK law. Solicitor Dan Tench, of law firm Olswang, said this was another instance of Google being here when it suits them and not being here when it doesn’t. Ironically when the US ordered Google to stop what it was doing, it forced the search engine to pay a $22.5million to regulators.

There are some indications that Google may not get its way. In July the Information Commissioner’s Office told Google its privacy rules breached UK law so it will be very hard for it to stand up in court and say it didn’t.

Source

Samsung’s Eight-core Chip Goes Hacking

August 13, 2013 by  
Filed under Computing

Comments Off on Samsung’s Eight-core Chip Goes Hacking

A Samsung eight-core chip used in some Galaxy S4 mobile devices is now available for hackers to play with on a developer board from South Korea-based Hardkernel.

Hardkernel’s Odroid XU board has incorporated Samsung’s eight-core Exynos 5 Octa 5410 chip, which is based on ARM’s latest processor designs. Samsung recently announced a new eight-core chip, the Exynos 5 Octa 5420, which packs faster graphics and application processing than the 5410. The 5420 has not yet been shipped yet, however.

The Odroid board is priced at $149 through Aug. 31, after which it will be offered for $169. Samsung for many months has said that a board with an eight-core chip would be released, and has shown prototype developer boards at conferences.

Odroid-XU will provide developers an opportunity to write programs tuned for Samsung’s octa-core chip, which has been a source of controversy. Analysts have said the eight-core design is overkill for small devices like smartphones and tablets, which need long battery life.

The eight-core chip design also takes up a lot of space, which prevented Samsung from putting LTE radios inside some Galaxy S4 models. Qualcomm, which hesitantly moved from the dual core to the quad-core design on its Snapdragon chips, on Friday criticized eight-core chips, calling the idea “dumb.”

Despite the criticism, the board will give developers a first true glimpse of, and an opportunity to write and test applications for, ARM’s Big.Little design. The design combines high-power cores for demanding applications with low-power cores for mundane tasks like texting and calling.

Samsung’s iteration of Big.Little in the Exynos 5 Octa 5410 chip combines four processors based on ARM’s latest Cortex-A15 processor design, which incorporates four low-power Cortex-A7 CPUs. The Cortex-A15 is ARM’s latest processor design and succeeds the previous Cortex-A9 core, which was used in popular smartphones like Apple’s iPhone and the Galaxy S3. Samsung said the eight-core chip provides a balance of power and performance, with the high-power cores kicking in only when necessary.

The board has an Imagination Technologies PowerVR SGX544MP3 graphics processor, 2GB of low-power DDR3 DRAM, two USB 3.0 ports and four USB 2.0 ports. Other features include Wi-Fi, Ethernet and optional Bluetooth. Google’s Android 4.2 operating system is preloaded, and support for other Linux distributions like Ubuntu is expected soon. The board has already been benchmarked on Ubuntu 13.04.

Source

Yahoo Still Playing Pac-Man

July 16, 2013 by  
Filed under Around The Net

Comments Off on Yahoo Still Playing Pac-Man

Yahoo announced on Wednesday that it bought Qwiki for an undisclosed sum, as the firm’s spending spree continues.

Qwiki started out as a video focused search engine in 2011, before making its way into the iTunes Store as an app that turns images and videos into digital story boards.

Yahoo announced its acquisition of Qwiki on Wednesday, although it kept quiet about what it plans to do with the company and how much it spent. However, according to Allthingsd, Yahoo spent approximately $50m to further expand its digital offerings.

What’s more, while it’s unclear what Yahoo’s plans are at present, it’s likely that the firm is looking to challenge Vine and Instagram in the social video market.

Yahoo announced the news, naturally, on Tumblr. It said, “We’re excited to announce that Yahoo acquired Qwiki – a company that uses awesome technology to bring together pictures, music and video to capture the art of storytelling.

“We will continue to support the Qwiki app, and the team will join Yahoo in our New York city office to reimagine Yahoo’s storytelling experience. Stay tuned … there’s much more to come!”

Qwiki also had something to say, posting on its website, “Thank you for being a part of our story – one which is far from over. The Qwiki app will live on as a standalone entity inside Yahoo, where we will grow our thriving community and where our team will continue to work to help you share life’s best experiences.

“We are proud of the work we’ve done, and humbled by unwavering support from the NY tech community. New York is such a big part of who we are, and what we will become.”

Yahoo’s buyout of Qwiki is the latest in a series of acquisitions by the firm. Recently the firm announced that it bought Tumblr for a cool $1.1bn, with Yahoo CEO Marissa Mayer promising “not to screw it up”.

Source

Malware Infections On Android Rising

July 8, 2013 by  
Filed under Around The Net

Comments Off on Malware Infections On Android Rising

An increasing number of Android phones are infected with mobile malware programs that are capable of turning the handsets into spying devices, according to a report from Kindsight Security Labs, a subsidiary of telecommunications equipment vendor Alcatel-Lucent.

The vast majority of mobile devices infected with malware are running the Android operating system and a third of the top 20 malware threats for Android by infection rate fall into the spyware category, Kindsight said in a report released Tuesday that covers the second quarter of 2013.

The Alcatel-Lucent subsidiary sells security appliances to ISPs (Internet service providers) and mobile network operators that can identify known malware threats and infected devices by analyzing the network traffic.

Data collected from its product deployments allows the company to compile statistics about how many devices connected to mobile or broadband networks are infected with malware and determine what are the most commonly detected threats.

The malware infection rate for devices connected to mobile networks is fairly low, averaging at 0.52%, Kindsight said in its report. These infected devices include mobile phones as well as Windows laptops that use a mobile connection through a phone, a 3G USB modem or a mobile hotspot device.

In January the number of infected mobile phones accounted for slightly more than 30% of all infected devices connected to mobile networks, but by June they grew to more than 50%.

The vast majority of infected mobile phones run Android. Those running BlackBerry, iOS and other operating systems represent less than 1% of infected mobile devices, Kindsight said.

When calculated separately, on average more than 1% of Android devices on mobile networks are infected with malware, Kindsight said in its report.

The malware threat most commonly seen on Android devices was an adware Trojan program called Uapush.A that sends SMS messages and steals information, Kindsight said. Uapush.A was responsible for around 53% of the total number of infections detected on Android devices.

Source

Twitter’s Authentication Has Vulnerabilities

June 6, 2013 by  
Filed under Around The Net

Comments Off on Twitter’s Authentication Has Vulnerabilities

Twitter’s SMS-based, two-factor authentication feature could be abused to lock users who have not enabled it for their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure.

Twitter introduced two-factor authentication last week as an optional security feature in order to make it harder for attackers to hijack users’ accounts even if they manage to steal their usernames and passwords. If enabled, the feature introduces a second authentication factor in the form of secret codes sent via SMS.

According to Sean Sullivan, a security advisor at F-Secure, attackers could actually abuse this feature in order to prolong their unauthorized access to those accounts that don’t have two-factor authentication enabled. The researcher first described the issue Friday in a blog post.

An attacker who steals someone’s log-in credentials, via phishing or some other method, could associate a prepaid phone number with that person’s account and then turn on two-factor authentication, Sullivan said Monday. If that happens, the real owner won’t be able to recover the account by simply performing a password reset, and will have to contact Twitter support, he said.

This is possible because Twitter doesn’t use any additional method to verify that whoever has access to an account via Twitter’s website is also authorized to enable two-factor authentication.

When the two-factor authentication option called “Account Security” is first enabled on the account settings page, the site asks users if they successfully received a test message sent to their phone. Users can simply click “yes,” even if they didn’t receive the message, Sullivan said.

Instead, Twitter should send a confirmation link to the email address associated with the account for the account owner to click in order to confirm that two-factor authentication should be enabled, Sullivan said.

As it is, the researcher is concerned that this feature could be abused by determined attackers like the Syrian Electronic Army, a hacker group that recently hijacked the Twitter accounts of several news organizations, in order to prolong their unauthorized access to compromised accounts.

Some security researchers already expressed their belief that Twitter’s two-factor authentication feature in its current implementation is impractical for news organizations and companies with geographically dispersed social media teams, where different employees have access to the same Twitter account and cannot share a single phone number for authentication.

Twitter did not immediately respond to a request for comment regarding the issue described by Sullivan.

Source

« Previous PageNext Page »