Friday, August 31, 2012
Thursday, August 30, 2012
Monday, August 27, 2012
Published on Aug 27, 2012 by ABCNews : Pinterest, A Social Bookmarking Website, Skyrockets in Popularity among adult women.
Published on Aug 24, 2012 by AlJazeeraEnglish : The Indian government has called on social media websites like Twitter and Facebook to remove what it calls objectionable content after sectarian violence broke out in the state of Assam. Last week the authorities blamed groups in Pakistan for circulating hate videos showing attacks against Muslims, but among the sites banned are news agencies covering the violence.
Published on Aug 27, 2012 by Euronews : Samsung's big loss to Apple in a potentially game changing US patent lawsuit over smartphones meant a dramatic fall in the South Korean company's shares in Soeul - down almost 7.5 percent - while Apple's stock rose in New York on Monday.
But the industry is still sorting out who will be the long term winners and losers in the smartphone world.
Google may suffer as it supplies the Android operating system for Samsung phones. That means it could lose out if Apple manages to get permanent bans on the sale of some Samsung handsets.
A decision on that is due from the court next week.
Partially blocking Samsung from the US market could dramatically change the league table where the South Koreans dominate with 32.6 percent of all smartphone sales worldwide between April and June. Apple had 16.9 percent, Nokia 6.6 percent, Taiwan's HTC 5.7 percent and China's ZTE had 5.5 percent.
Investors obviously think Nokia could be a winner from Samsung's setback.
The Finnish firm's shares shot up on Monday. Its newest smartphones use a Microsoft operating system, which Apple has no problems with.
Other handset makers will now be worrying whether they will be next on Apple's litigation list and how much this case will change the dynamics of the highly competitive mobile phone industry.
Sunday, August 26, 2012
Published on Aug 26, 2012 by AlJazeeraEnglish : South Korean technology giant Samsung says consumers will now face fewer choices, less innovation and higher prices. That is after a US jury ordered the company to pay more than one billion dollars to Apple for stealing its technology. It is only one of the many international legal battles between the two, all of which could change the industry.
Samsung ordered to pay Apple $1bn
Published on Aug 24, 2012 by AlJazeeraEnglish : A California jury has found that Samsung, the Korean electronics giant, deliberately copied elements of Apple's iOS-based product line.
The jury ruled that Samsung willfully infringed at least three of Cupertino-based Apple's patents, including navigation, zoom features and icons.
USMC Lt. Gen. Richard Mills speaks during a ceremony in Avondale, La., July 28, 2012.
The US military has been conducting cyber-attacks against its perceived opponents in Afghanistan, according to one of its generals.
Marine Corps Lieutenant General Richard Mills made the unusually explicit acknowledgment at a conference in Baltimore last week, The Associated Press reported on Friday.
Mills was in command of US-led foreign forces in southwestern Afghanistan between 2010 and 2011.
At the conference, he explained how US commanders regard cyber weapons as an important part of their arsenal.
“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,” he said.
“I was able to get inside his nets, infect his command-and-control, and in fact defend myself against his almost constant incursions to get inside my wire, to affect my operations,” he added.
There’s been no immediate comment so far from the Pentagon on Mills' speech.
The US has been accused of conducting cyber warfare in many countries in the Middle East and North Africa.
A recent book by New York Times reporter David Sanger recounts how US President Barack Obama ordered a wave of electronic incursions to sabotage Iran's nuclear energy program.
The US-led war in Afghanistan began in 2001. The offensive removed the Taliban from power, but insecurity continues to rise across the country, despite the presence of about 130,000 of US-led troops.
Source here >>
Saturday, August 25, 2012
For most of the recorded history of malware, viruses, Trojans and other malicious software have been specialists. Each piece of malware typically targeted one platform, be it Windows, OS X or now, one of the mobile platforms. But the last few months have seen the rise of cross-platform malware that have the ability to infect several different kinds of machines with small variations to their code.
Attackers, like people in other walks of life, tend to specialize. They find something that they're good at, say, writing Windows rootkits or creating OS X Trojans, and they often will stick with that. There's not much reason to branch out if they're having success with something already. For a long time, most malware was written for Windows, because that's where most of the users are. Going after OS X or Linux didn't make a lot of sense.
But that's begun to change lately. One recent example is the Crisis Trojan, which has the ability to infect both Windows and Mac OS X machines. The first version of Crisis that researchers discovered targeted various versions of OS X, and it was a typical data-stealing Trojan, listening in on email and instant messenger communications. The interesting thing about Crisis is not only that there are versions for multiple platforms, but also that the installer for the malware, which masquerades as an Adobe Flash installer, checks to see what operating system it's on and then installs the appropriate version.
The malware also has a function that looks for VMWare images stored on the infected machine, and if it finds one, it will mount the image and then copy itself to the virtual machine image.
Researchers found a similar piece of malware back in April. That one was disguised as a Java applet that would install different payloads depending upon what OS the target machine was running. So, attackers have decided that more is better when it comes to platforms. Why restrict your creation to just Windows or OS X when you can have both?
Microsoft researchers looked at a recent attack that involved a piece of malware using similar techniques and found that the attackers have been honing their skills.
Read more >>
Friday, August 24, 2012
Thursday, August 23, 2012
In advance of one of the most significant waves of product launches in Microsoft’s history, today we are unveiling a new logo for the company.
It’s been 25 years since we’ve updated the Microsoft logo and now is the perfect time for a change. This is an incredibly exciting year for Microsoft as we prepare to release new versions of nearly all of our products. From Windows 8 to Windows Phone 8 to Xbox services to the next version of Office, you will see a common look and feel across these products providing a familiar and seamless experience on PCs, phones, tablets and TVs. This wave of new releases is not only a reimagining of our most popular products, but also represents a new era for Microsoft, so our logo should evolve to visually accentuate this new beginning.
The Microsoft brand is about much more than logos or product names. We are lucky to play a role in the lives of more than a billion people every day. The ways people experience our products are our most important “brand impressions”. That’s why the new Microsoft logo takes its inspiration from our product design principles while drawing upon the heritage of our brand values, fonts and colors.
read more >>
read more >>
Published on Aug 22, 2012 by AssociatedPress : Jurors began deliberating Wednesday in a multibillion dollar patent infringement case pitting Apple against Samsung over the design of iPhones and iPads, but few experts were expecting a quick verdict. (Aug. 22)
While researchers continue to dig into the Shamoon malware, looking for its origins and a complete understanding of its capabilities, a group calling itself the Cutting Sword of Justice is claiming responsibility for an attack on the massive Saudi oil company Aramco, which some experts believe employed Shamoon to destroy data on thousands of machines.
The attack on Aramco occurred on August 15, taking the main Web site of Saudi Aramco offline. Officials at the company said that the attack affected some of the company's workstations, but did not have any effect on oil production or on the main Aramco networks. The attackers claiming responsibility for the incident dispute that, saying that they deployed a destructive piece of malware that erased data on infected machines and then made them unusable.
"As previously said by hackers, about 30000 (30k) of clients and servers in the company were completely destroyed. Symantec, McAfee and Kaspersky wrote a detail analysis about the virus, good job. Hackers published the range of internal clients IPs which were found in the internal network and became one of the phases of the attack target," the group said in a post on Pastebin shortly after the attack.
The first indications that the attack might be connected to the Shamoon malware came in the group's original Pastebin post, which included a start time for the attack on Aramco, 11:08 a.m. local time in Saudi Arabia on August 15. Researchers who dissected Shamoon found that the same time was hard-coded into the Shamoon malwareas a kind of checkpoint. The attackers claiming responsibility for the operation said that the attack ended a few hours after it began, but that plenty of damage was done.
- "In the first step, an action was performed against Aramco company, as the largest financial source for Al-Saud regime. In this step, we penetrated a system of Aramco company by using the hacked systems in several countries and then sended a malicious virus to destroy thirty thousand computers networked in this company. The destruction operations began on Wednesday, Aug 15, 2012 at 11:08 AM (Local time in Saudi Arabia) and will be completed within a few hours," the post says.read more >>
Sunday, August 19, 2012
Thursday, August 16, 2012
Tuesday, August 14, 2012
There’s a saying when it comes to online passwords: they’re like a toothbrush. That’s because you want a good toothbrush (just like a password), you should change it often (just like a password) and you should never share it (just like a password!).
There are some key dos and don’ts that can help:
- use personal information that could be easily guessed or accessed, like your birthday (which happens more often than you might think) — it’s easy for you to remember, but easy for someone shady to find
- use actual words that you can find in actual language (any language)
- use the same password for all of your accounts
- use a different password for each account
- combine capital letters, numbers and special characters
- change your password once every three months or so — and immediately if a site notifies you of a security breach
- use the Master Password feature in Firefox (more on that here.)
By now you’re probably thinking, “I can’t remember my keys in the morning. How am I supposed to remember all these new passwords all the time?”
Here are a few steps to creating easy-to-remember passwords that are still secure.
- Choose a phrase — let’s try “The quick brown fox jumps over the lazy dog.”
- Use the first letter in each word and capitalize the first one: Tqbfjotld
- Make it stronger by adding a special character: Tqbfjotld!
- Now, associate it with each website you log in to. For example, you could use YT for YouTube, FB for Facebook, your bank’s initials — you get the point. So your password would now look like this:
YTTqbfjotld! (for YouTube)
FBTqbfjotld! (for Facebook)
and so on, and so on…
Choosing secure passwords will go a long way to keeping you safe online.
Original here | 7 Aug 2012
Sunday, August 12, 2012
Published on Aug 10, 2012 by PressTVGlobalNews : The new technology partnership between Microsoft and the New York Police department will pair America's largest municipal law enforcement agency with one of the worlds largest developers of computer software and hardware. The mayor of New York has billed the collaboration as a new tool for fighting crime.
Saturday, August 11, 2012
We've been reeling a bit ever since Mat Honan was the victim of that ruthless social hack that wiped all his devices. Sure, that was an extreme case. But it's also one that could happen to anyone, at any time. So we put together a list of the best ways to make sure your internet self—your accounts, your cash, and your information—stays secure.
Fortify Your Passwords
Password strength is vital to your frontline defense. Obviously your password should be a combination of letters and numbers, but don't stop at the bare minimum. Use uppercase letters in random spots. Subsitute numbers for letters. Mash multiple word phrases together. Deliberately misspell those words. Space them out. If you're feeling particularly hardcore, you can just create a random string of characters. In fact, XKCD's excellent comic sums this up in a way more eloqent than any words could.
Oh, and for the love Woz, don't use the same password for everything. Particularly not your most sensitive (read: banking) accountsAll HTTPS, All The Time
Many of the vital online services (Google, Facebook, Twitter, etc.), allow you to only connect to their servers via an HTTPS connection. This will encrypt any stream of data between you and the service, ensuring that anyone using Firesheep or a packet sniffer on a (usually public) Wi-Fi network can't glean your login data. Never work at a coffee shop without it.
Secure Those Security Questions
Just the security questions are a backup doesn't mean you shouldn't put the same thought into them as you password. Use numbers instead of letters. Mash entire phrases together into one word. Deliberately misspell things. Or best of all, Kaspersky Labs expert Dmitry
Bestuzhev explains, don't directly answer the security question at all:
Bestuzhev explains, don't directly answer the security question at all:
- The tips are quite simple but effective. Since all social engineering attacks work based on the information of interest for the victim or the information related to the victim, it's important to provide secret questions with the answers absolutely not related to it.
- For example, for the question "What is the name of your first pet?" I would register an answer like sw3SwuTu
- When I bought my last car... The vendor provided me with a list of secret questions and I had to provide them with the secret answers they registered in their systems. So, instead of providing real answers I provided a password like the [aforementioned] one. They said I was the first customer to do this and they congratulated me.
- ... So, basically the rule is never provide real answers for the secret questions."
Friday, August 10, 2012
Social network settles dispute with FTC over 'deceptive act' of making confidential information public without consent
Published on Aug 9, 2012 : The Federal Trade Commission says it hopes its record $22.5 million fine against Google will force the Internet search behemoth to pay better attention to its practices. The FTC says Google duped Web surfers who use Apple's Safari browser.