Tuesday, December 31, 2013

Hackers are finding SD cards to be more interesting than imagined


old-sd-card

Putting malicious code on USB thumb drives are an old hack.  But putting malicious code on SD cards have become a new trend.

While MicroSD cards are becoming less common with mobile devices, many phones and tablets rely on some kind of a version of the SD storage format.

There is a high probability that these cards will be plugged into a computer at some point, which could be detrimental to the health of your mainframe.

SD cards have their own micro-controllers and allow you to manipulate them as you please.

The Bunnie Studios team explained that SD cards can’t exist in their current state without some form of on-board micro-controller.  The failure rate for cheap storage is very high, these tiny ARM CPUs have assigned error correction tasks to fight failure rates.

SD cards are micro-porcessors that need a firmware loading mechanism.  Usually the factory is the only one that can exploit the code, but in time, code is usually able to be overwritten.

In a hack demonstration at 30C3, researchers reversed-engineered the instruction set of a mico-controller to access the firmware loading mechanism.  The SD card appeared to operate normal while hacking a PC or mobile device.  This included Wi-Fi equipped cameras it was plugged into.

With across the board usage of SD and microSD card slots, this could turn out to be a very profitable hack.


30c3-callbacks


The above are commands available on the SD card.

Computers don’t have anyway to inspect code running on an SD card before it interacts your PC.  A “Man in the Middle” attack is easily able to be put on your PC.

There is no way to be sure that any information has been removed from the program that may have grabbed information from your computer.

If you ever discover an SD card that’s been reprogrammed or misbehaving, immediately take it out and destroy it.

When stumbling across something that is on one hand a concerning issue, but on the other hand somewhat intriguing, people may not know what action to take.

It’s possible for malicious code to be carried out on these SD cards, be watchful of an attack.

Unless you are working in a secure environment, the random chance of having an affected SD card is likely.

Like the adage, never take candy from a stranger, never use someone else’s SD card.  You don’t know what you may be really getting.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+


References:

Hackers discover SD cards are a lot more interesting than previously imagined – Geek
http://www.geek.com/mobile/hackers-discover-sd-cards-are-a-lot-more…

SD cards hacked – ZDNet
http://www.zdnet.com/sd-cards-hacked-7000024686/

Monday, December 30, 2013

Facebook’s ‘Closed for Maintenance’ Prank

You may notice a post appearing on your Facebook page that says, “Facebook will be closed for maintenance between the 29th and 31st of February“.


facebook-closed-february


Don’t fret, Facebook will not be closed for maintenance, you may continue combing through your friends posts and scowling for sophomoric aphorism’s to make you look cool and clever.

The Facebook message is a silly prank, although it appears to fool many.  Facebook is NOT planning on being closed for maintenance.  If Facebook was planning on closing, it clearly would not be closed on February 30th and 31st.  It is not leap year, so February 29th will not be coming up either.  None of these dates exist on our calendar.

prank-keyboard


Versions of the same “warning” have been circulating since 2011.

Late in 2013, a graphical version of the hoax began circulating on Facebook.

The prank shows how the immediacy of social media usage, and how it causes users to re-post without much thought of the pseudo prank.

There have been plenty of similar hoaxes that continue to fool gullible Internet users.  A long running hoax from April Fools Day claimed that the entire Internet was scheduled to be closed for maintenance for a 24 hour period during which a “tune-up” will be performed and “high pressure information jets” will be used to “clear out the bottlenecks”.

Other outrageous hoaxes on Facebook claim that Facebook is to be shutdown due to congestion or because managing the site has become too stressful for the all knowing Mr. Zukerburg.

These pranks and fake messages are nothing more than to pull your leg.  But, as long as users are out there and are quick to hit the share button, the pranks will be passes on.

Have you seen a Facebook prank like this?  Please share your story with us!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:
Facebook ‘Closed for Maintenance’ Prank – Hoax Slayer
http://www.hoax-slayer.com/facebook-closed-maintenance-hoax.shtml

Friday, December 27, 2013

[Scam Alert] ‘Free Walmart Gift Cards’

WALMART GIFT CARD****WARNING*****SCAM ALERT***** WARNING**** SCAM ALERT*****

Warning!  This Facebook scam promises free gift cards in exchange for a couple minutes of your time to complete a short survey.
Face_Book
This scam is spread by deceitful Facebook applications.  The accounts infected should manually delete any posts and remove the damaging application.

The applications are designed to obtain account information from the user, this spreads spam and infects the account along with friends of the account.

Some examples are:
  • Profile Viewer Apps
  • Apps that redirect to phishing links and forms
  • Apps that lead to malicious downloads
  • Apps that lead to survey scams

Here are the best way to guard your account from third-party Facebook applications entirely.
  1. Don’t go crazy on installing applications.  Stick with known developers and software companies.  Be sure to read about the application before committing to it.
  2. Double check your permissions granted on Facebook.  You can access permissions through privacy settings or account settings.  Click the padlock or gears icon, and navigate to the page.

app_settings


Here you can click the Edit link to review permissions of any apps you have installed or click the ‘x’ to remove them.


edit_app



Here you can see the Facebook data application that you have access to. There is a ‘Remove app’ link on the screen, you can click the link to easily remove it from your account.

Be suspicious if you see applications that request the following:
  • Complete access to your Facebook account – An app requesting too many permissions is a big warning sign.
  • Access to Facebook Chat – You don’t want the app spamming malicious links via chat messages to your friends.
  • The right to manage your Pages or Events – it is a common tactic for scammers is to create bogus pages and events to spread their messages viral across Facebook.

To stay up-to-date on scams you can visit these sites:
WWW.SNOPES.COM
WWW.FACECROOKS.COM
WWW.HOAX-SLAYER.COM
WWW.URBANLEGENDS.COM

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Thursday, December 26, 2013

Tech predictions of imminent disasters for 2014

There are some major disasters predicted for next year in 2014.

Lets take a look at what’s to be expected and what was expected for 2013 that came true.

The end of the power grid

 power-grid

The National Intelligence Council, released this year, geomagnetic storms “pose substantial threat” to electronics and the power grid.  This past year we’ve seen a huge increase in solar storms since 1859, the solar super storm.

In 1989, a solar storm knocked out the Quebec power grid, impacting 6 million customers in the region.

Records show a return of a 50 year period for Quebec-level storms and 150 years for extreme storms.

Scientists at the Idaho National Laboratory demonstrated in tests that “geomagnetic disturbances have the ability to disrupt and possibly destroy electrical transformers.


Things that may go boom next year

bitcoin


“Bitcooin will explode. KABOOM!” CEO and co-founder of Gliph, Rob Banagale, predicts.
“OpenStack will implode,” said Jason Bloomberg, at ZapThink anticipates.

In 2013, scientists confirmed the existence of the largest volcano on the planet.  This volcano is also among the largest in the solar system.  Tamu Massif volcano is in the Northwest Pacific Ocean and is as large as the state of New Mexico.  Fortunately for us, it is inactive.


Google thinks about life extension, as did Edison

In 2013, Google created the company, Calico.  Calico is to focus on health as well as mental and spiritual well-being.

Thomas Edison figured out how to live a long life well before Google.  In a 1914 interview with The Day Book, Edison outlined a disciplined lifestyle.

Edison, at the age of 67, was very strict on himself.  He slept about five and a half hours a night.  He would not let himself work through the night anymore, before he only slept four hours to get more work done.  His daily diet didn’t exceed a pound and a half of food.  He smoked cigars and chewed tobacco but avoided cigarettes.  He read 118 scientific and trade periodicals and five newspapers daily.

“I read four lines at once,” said Edison.  “They should teach that kind of reading in the public schools.”


Too fast and too big for humans?

machine-to-machine

There have been warnings that machine-to-machine trading could disrupt financial markets.

Humans are losing the ability to intervene in machine actions in real time.  Systems are reducing communication and computational operating times down to several orders of magnitude below human response times.


Now lets take a look at what was predicted for the year of 2013.  I think all predictions came true.
  1. Second-Screen Revolution – More users are watching TV on their smartphones and tablets.  By the enriched viewing experience, portability, and new apps, viewing on your portable device has risen to 80%.
  2. Big Data – Companies and marketers have embraced big data because they are finally trusting it.  Data targeted information on channels, new discoveries that impact all walks of life based on deep data dives.
  3. End of Anonymous Trolls – Internet and big data has not remained anonymous.  The watchful eye of the NSA has been made known and still, we can not do anything about it.
  4. End of Privacy – Constant data collection, scanned emails and phone calls and hardware is able to see what we are doing as well as third-party sensors.
  5. Death to Desktops – Traditional computers are becoming scarce, tablets and laptops have taken over.
  6. 3D Printing – From retail stores the $2,000 3D Printer exploded.  Companies, hospitals, and homes, have utilized 3D printers since the beginning of the year.
  7. Flexible Devices – TVs, computers, tablets, and phone screens, devices have gotten bendable and flexible.  The Samsung Galaxy S5 came out with its curved screen design.
  8. Embedded Technology – Embedded technology has shown up with corporations wanting to put a chip into employees bodies so they don’t have to scan into work.  Also talk of embedding chips into children at schools has been talked about.
  9. Robots Rise – It was expected for robots to rise, and it happened.  Robots are in cars, driving for us, on the phone, acting as customer service agents and replacing factory workers.  Robots have even come out looking as real as the person sitting next to you.

Cheers to 2014, and everything it will bring!

References:

Looming disasters, and other tech predictions, for 2014 and beyond – Computer World
http://www.computerworld.com/s/article/9244964/Looming_disasters_and_other_…
 

11 Big Tech Trends You’ll See in 2013 – Mashable
http://mashable.com/2012/12/06/tech-trends-2013/

Tuesday, December 24, 2013

9 Year Old Suspended for Saying Merry Christmas’ – Hoax

There are reports circulating claiming that a fourth grade boy from San Francisco was suspended from school for wishing his atheist teacher a Merry Christmas.

The claim in reports are not true.  There was not a suspension, nor was there a boy getting in trouble for saying Merry Christmas at school.

The story originates from a satirical fake-news website, National Report.

The National Report, reads “America’s #1 Independent News Team as the headline in search engines.



national-report


Only if you look at the “Disclaimer”, you will see this is a satire website.  There is no where in the description that tells visitors the website is fake.


merry-christmas-hoax

 

Analysis

This story is a report that is going around via social media, blogs, and forums.  The tale of Timothy Dawson, a 9-year old boy was suspended from his San Francisco elementary school, because he wished Paul Horner, his atheist teacher a Merry Christmas.

Supposedly, the teacher was offended by Timothy’s Christmas greeting and arranged for him to be suspended for the rest of the week as a punishment.  The report is advertising this as an ongoing “war on Christmas”.

This story is fake, but the school really exists.  The fake news story originally referred to the “Argon Elementary School”, close enough to San Francisco’s “Argonne Elementary School” for false assumptions to be made.  The school was forced to publish the following notice on its website:


Dear Argonne School Community,

I am writing to inform you that a news story was published stating that a fourth grade student from Argon Elementary in San Francisco was suspended for saying “Merry Christmas” to a teacher. The incident did not occur at our school, Argonne Elementary or any school in the San Francisco Unified School District.

Thank you for continuing to support our school community.Warm regards,
Cami Okubo Principal at Argonne Elementary


Since the report, the National Report article has changed the name of the school it mentions to “Anon Elementary School”.  Even-though,  the damage is already done.

Paul Horner, the supposed atheist teacher, is not new to National report stories.  He was supposedly the first man to marry an animal in a “State Recognized Human-Animal Marriage”.  Also, he is the same man to have won an award for having a very large appendage.

This goes to show, not everything you read in the news is true.  What stories have you seen spreading through social media that are made up?  Please leave your comments below.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:

Hoax – ’9 Year Old Suspended From School for Saying Merry Christmas’ – Hoax-Slayer
http://www.hoax-slayer.com/nine-year-old-suspended-merry…
December 18, 2013

A look at the “techies” we lost in 2013

There have been amazing technological advances in the past century.  2013 saw it’s share of  innovative, pioneers that have impacted the industry dramatically.  Young and old, each person on this list helped shape our technology industry with a lasting impression.

Here are the trailblazer’s and their accomplishments:


hank-asher

Hank Asher (Pioneered Databases)
Hank Asher didn’t make it through highschool but he did create “data fusion”.   A software integrating databases and mining them.  Asher founded two data companies; Database Technologies, and Seisant.  AutoTrack, Accurint and Matrix are some of his products used by law enforcement for data-mining.

He died peacefully at his home at the age of 61.




aaron-swartz

Aaron Swartz (Programming Prodigy)
At 14 years old, Swartz contributed to RSS standard code.  In his teens, he founded a company that merged into Reddit.  Swartz became an activist, hacking the legal database PACER, so public court decisions were freely available. JSTOR was also hacked by Swartz, an academic database, which resulted in his arrest and charged with multiple felonies.

He committed suicide days before his trial at the age of 26.




amar-bose

Amar Bose (Genius of Boss)

Amar Bose the problem solver.  In 1956 Bose had a problem with some hi-fi speakers he purchased, so figured out how to make them better.  He started his “Bose” speaker company in 1964 and developed new approaches on acoustics and noise-canceling headphones.  Bose made breakthrough’s with aviation, defense, and even nuclear physics.

He died at the age of 83 in Wayland, Massachusetts.




ken-brill

Ken Brill (Father of Datacenters)

Brill was an electrical engineer in training when he founded the UpTime Institute in 1993.  He used the platform to mark the data center, which built the foundation on which cloud computing emerged.  UpTime is known best for its tier classification for comparing data centers.

Brill died at the age of 69 after developing cancer.




doug-engelbart

Doug Engelbart (The Mouse of Man)

One of computing’s greatest visionaries, Engelbart invented the computer mouse.  He contributed to the development of hypertext, word processing, graphical user interfaces, networking and real-time collaboration, including videoconferencing.  Although he was the visionary and inventor, he didn’t commercialize his ideas.  That was left to others at the Stanford Reasearch Institute.

Engelbart died at the age of 88.




barnaby-jack

Barnaby Jack (“Jackpotter”)

Barnaby Jack was able to make cash spit out money from atm’s like it was “jackpotting”.  He showed his ability to hack a pacemaker from 30 feet to make it discharge enough electricity to kill its user.  Jack was able to find flaws embedded in the devices.

The New Zealand-born hacker died the week before giving a talk to the Black Hat security conference on how pacemakers and other medical devices could be hacked.  Barnaby Jack died at the age of 35 in his home in San Francisco, with the cause unknown.





ray-dolby

Ray Dolby (Amplification & Clarification)

In 1971, starting with A Clockwork Orange, Dolby revolutionized movies with surround sound.  Sound became an art form, Dolby pioneered to work on inspiring technologies that fueled the imagination of the entertainment and communications industries.

The modest Dolby, died at the age of 80.




wayne-green

Wayne Green (Take a Byte out of life)

Wayne Green began writing on amateur radio in the 1950′s.  The facinator of laptops, cell phones, e-mail, and consumer computing. Wayne was the editor of CQ magazine before he went on to 73, 80 Micro, Byte, CD Review, Cold Fusion and many more in his career.  In the 1980′s, Green created the groundbreaking Brazilian microcomputing magazine.

Wayne Green died at the age of 91.





yamauchi

Hiroshi Yamauchi (Game Man)

Hiroshi Yamauchi took over his family’s Japanese playing-card company Nintendo in 1949, at the age of 21.  Nintendo was revolutionary in the gaming industry.  Even though Yamauchi was not a gamer, Nintendo dominated the business.

Hiroshi Yamauchi died at the age of 85 from phenumonia.





willis-ware

Willis Ware (Electronics Visionary)

Few saw the future of computing like Willis Ware did.  Ware worked on classified electronics during World War II.  Ware built an early digital computer with John von Neumann, then another for RAND.  In 1972, Ware recommended against secret databases, saying that people should know what data is help on them and how it is used.  He was ignored.

Ware died at the age of 93.


Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.

References:

Tech luminaries we lost in 2013 – ComputerWorld
http://www.computerworld.com/slideshow/detail/133540#slide1

Friday, December 20, 2013

Apple webcam bug allows spying on you


apple-webcam-sensor
http://www.hyphenet.com/blog/2013/12/20/apple-webcam-bug-allows-spying-on-you/


Apple (NASDAQ:AAPL) webcams are known to be vulnerable to a malware attack.
It was believed that no one could turn your iSignt webcam on without you knowing, thus illuminating the LED light on the webcam.

Security researchers at Johns Hopkins University have debunked that theory, the flaw is not only limited to older MacBooks and iMacs, but newer computers may be hacked as well.

The target attacks the firmware inside the iSight camera’s controller chip. Apple designed the iSight camera with a “hardware interlock” between the camera sensor and the indicator LED.  When the camera is activated the sensor is triggered and the light turns on.

The LED is connected straight into the standby pin on the camera sensor, which sparks the light.  When the camera comes out of standby mode, the LED immediately turns on.

The system is able to be bypassed by interlocking and reprogramming the firmware on the camera’s micro-controller.  The camera ignores standby signals sent by the USB interface that the camera uses to connect with the rest of the computer.

Ashkan Soltani and Timothy B. Lee tag-team to tell thee this: The woman was shocked when she received two nude photos of herself by e-mail. … Most laptops with built-in cameras have…a light that is supposed to turn on [when] the camera is in use. But Wolf says she never saw the light…go on.

That wasn’t supposed to be possible. … New evidence indicates otherwise. … Johns Hopkins University provides the first public confirmation that it’s possible to do just that, and demonstrates how.

The vulnerability they discovered affects “Apple internal iSight webcams found in earlier-generation Apple products.” … Researchers like Charlie Miller suggest that the attack could be applicable to newer systems as well. … Apple did not reply to requests for comment.


These attacks are alarming because it does not require administrator-level privileges or access to laptops.  At this time, Macbooks and iMacs manufactured prior to 2008 with built-in iSight cameras are being effected.

Researchers disclosed the vulnerability to Apple’s security team already.

According to the paper this was stated, “Apple employees followed up several times but did not inform us of any possible mitigation plans.”

So double tap your webcam, close your laptop when it’s not in use, do what would you can to take preventative measures not to be spied on from cybercriminals.

 
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:
iSeeYou: Apple webcam bug allows creepy peeps to peep in on you – ComputerWorld
http://blogs.computerworld.com/malware-and-vulnerabilities/23300/iseeyou-apple-webcam-bug-itbwcw
Researchers find way to activate iSight cameras without alerting users – Apple Insider
http://appleinsider.com/articles/13/12/18/researchers-find-way-to-activate-isight-cameras-without-alerting-users
Research shows how MacBook Webcams can spy on their users without warning – Washington Post
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams…

The Biggest Security Stories of 2013

As the year ends, lets take a look at all the security activity that has taken place in 2013.  

Information security is priority for companies.  Security threats and data privacy have been a major concern, there have been big stories of success and failures in the tech industry.
Here are some of cybersecurity’s highs and lows:

Apple Biometrics

iphone5s-touchid

Apple launched the iPhone 5s with a fingerprint sensor for identification.  Biometrics has been adopted by smartphones but have been used for years on Corporate laptops as an alternative form of identification.

Companies Embrace Two-Factor Authentication

LinkedIn, Twitter and Evernote launched a two-factor authentication feature.  Providers require stronger passwords including encryption of customers passwords stored on their servers.

Cryptolocker

Cryptolocker ransomware is a high-grade encryption against victim’s files which is spread to network-based storage applications and cloud-based backup services.
Bitcoin payments are demanded to retrieve keys needed to unlock the files from the infection.

Huawei Turmoil

China-based Huawei is under surveillance, following concern from the U.S.  that its hardware components could contain back-door access for Chinese spies.

Cisco’s Sourcefire

Sourcefire founder and CTO Martin Roesch  leads security product innovation under Cisco.  Sourcefire’s intrusion prevention system conducts real-time traffic analysis, sniffing and packet logging.

FireEye is Public

fireeye-security

At the core, FireEye’s technology is a virtualized sandbox. With cloud-based mobile and email protection service, and detects suspicious files for malware threats, FireEye is the next generation firewall.

Java Attacks

The Java platform saw an increase of attacks targeting weaknesses in the programming language.  Java vulnerabilities accounted for more than 90 percent of attacks in 2013.

reportedchin

Adobe Source Code Breach

More than 35 million customers passwords were exposed as well as the product source code.  Investigators are still figuring out the cause of the massive fallout.

 

Mandiant APT1 Report

The Mandiant APT1 report exposed China as the source of cyberspionage activity towards the U.S.  The report discovered attacks designed to steal intellectual property from many government agencies and defense contractors.

Edward Snowden’s Leaks

The government contractor stole thousands of classified documents outlining the extent of the National Security Agency’s surveillance.  Cell phone metadata collection, used encryption algorithms to gather massive amounts of Internet communication from major firms.
Lets hope next year tech industries will have more achievements than defeats…

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:
The 10 Biggest Security Stories Of 2013 – CRN
http://www.crn.com/slide-shows/security/240164781/the-10-biggest-security-stories…

Wednesday, December 18, 2013

ESET’s Threat Predictions for 2014

ESET predicts the three new trends for 2014: battle on internet privacy, new assaults on Androids, and a new wave of malware in the hi-tech industry.


eset_wallpaper


The concern for privacy on mobile devices has sky rocketed.

After the reaction from Edward Snowden’s leaks, the US National Security Agency (NSA) reveals that Internet users are fearful about their privacy and security in the digital age.

ESET experts are ensuring data is locked down (using encryption) which is the first step towards substantial security.

“The challenge to internet privacy has not meant a decrease in cases of people affected by any malicious code or other kind of computer threat,” the researchers write. “Concern about privacy is a good starting point, but it is essential for people to be aware of all aspects of Information Security. Otherwise, it is not possible to mitigate the impact of computer threats.”

ESET predicts an increase in serious threats targeting Android phones and tablets.  Detections show malware increased more than 60% between 2012 and 2013.  The increase is predicted to continue thru 2014.

The Latin American Research Laboratory for ESET in Buenos Aires points out that malware infested Androids use native PC attack methods to discover vulnerabilities.  Then they are exploited through malicious code.

Filecoders like ransomware Cryptolocker is the year’s most well-known attacks.  Cryptolocker is still spreading worldwide and is expected to continue in 2014.  Bitcoin and other e-currencies are targets for cybercriminals, along with threats against smart cars, game consoles, and smart TVs.

Here is the full Trends 2014 Report: The Challenge of Internet Privacy.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+


References:
ESET’s Threat Trends Predictions 2014: – We Live Security
http://www.welivesecurity.com/2013/12/17/esets-threat-trends-predictions…
December 17, 2014

Tuesday, December 17, 2013

Mavericks fixes Gmail bug [Update]


mavericks-update

Mavericks OS X, the new software for Mackintosh had it’s share of bugs after the release of Mavericks OS X 10.9.1.  There was a compatibility issue between Gmail and Mail, which contained a handful of security flaws in Safari.

The update, released overnight, should give relief for Gmail users who upgraded earlier last month to Mavericks.

Users who installed Mavericks reported the OS was slow, and Gmail to Mail delivery lagged.

The folders re-indexed, and ended up cramming up the storage inbox with already read messages.  Smart Folders and the folder rules also were removed.

Apple knew about the complaints and addressed them in November, leading to an update for Mail in Mavericks.

Apple’s support documentation stated, Mavericks v10.9.1 comes with “improved support for Gmail in OS X Mail, and fixes for users with custom Gmail settings”.

mail-token

Apple also released a new version of Safari 6 and Safari 7, which address nine other vulnerabilities affecting the browser.  A huge security flaw was one that autofilled users names and passwords.

Other issues Apple says are addressed in Mavericks include:
  • Fixes an issue that prevented iLife and iWork apps from updating on non-English systems
  • Addresses an issue that may cause multiple prompts to unlock “Local items” keychain
  • Addresses an issue that may cause Japanese keyboards to retain a previously used language
  • Includes Safari 7.0.1
  • Fixes an issue that could cause Safari to become unresponsive when filling out forms on fedex.com, stubhub.com, and other websites
  • Improves Credit Card Autofill compatibility with websites
  • Improves VoiceOver compatibility with facebook.com
  • Updates Shared Links periodically when open in the Safari Sidebar
The patch fixes a variety of concerns, including an issue that prevented VoiceOver from working with emoji.
If you are running an OS X Mavericks, an update is recommended.  There are always fixes coming out to help and improve your web experience.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+


Research:
Apple delivers OS X Mavericks update with Mail fixes – CNet
http://reviews.cnet.com/8301-13727_7-57615782-263/apple-delivers-os-x-mavericks-update-with-mail-fixes/
December 16, 2013

Apple releases OS X 10.9.1 with Mail fixes – MacWorld
http://www.macworld.com/article/2080846/apple-releases-os-x-10-9-1-with-mail-fixes.html
December 16, 2013

Monday, December 16, 2013

Buy of the Week: Dell Laser Printer B1260dn for only $97 + tax!

http://www.hyphenet.com/blog/wp-content/uploads/2013/12/dell-b1260dn-printer-overview11.png
http://www.hyphenet.com/blog/2013/12/16/buy-of-the-week-dell-laser-printer-b1260dn-for-only-97-tax/


An efficient printer to help improve productivity with the compact B1260dn Mono Laser Printer from Dell.
It can bring value to any small office or workgroup. It provides two-sided printing, high-quality printouts, network connectivity with built-in Ethernet and high-speed printing. Now it’s easy to print directly from a wide variety of mobile devices right to your printer.

The Dell B1260dn lets you and your team easily prints documents, photos, images and reports directly from a wide range of mobile phones and tablets. This printer gives vital office network connectivity with a built-in Ethernet. Easily share your printer with multiple users on the network. Additionally, it gives convenience of high-speed mono printing.

  • Experience the convenience of high-speed mono printing
  • Get a high-duty cycle of up to 20,000 pages per month
  • Prints large files quickly

Product Description Dell Laser Printer B1260dn – printer – monochrome – laser
Printer Type Workgroup printer – laser – monochrome
Weight 15.9 lbs
Max Media Size (Standard) Legal, A4
Print Speed Up to 28 ppm – A4 (8.25 in x 11.7 in)
Up to 29 ppm – Letter A Size (8.5 in x 11 in)
Max Resolution ( B&W ) 1200 dpi
Automatic Duplexing Yes
Interface USB, LAN
Processor ARM11 533 MHz
RAM Installed ( Max ) 64 MB DDR2 SDRAM
Language Simulation PCL 6, SPL (Samsung Printer Language), XPS
Media Type Envelopes, transparencies, labels, plain paper, cards, bond paper, recycled paper, cotton paper, thick paper, thin paper
Total Media Capacity 250 sheets
Media Handling 250-sheet paper cassette, 1-sheet multipurpose tray
Monthly Duty Cycle (max) 20000 pages
Networking Print server – Ethernet, Fast Ethernet
System Requirements HP-UX 11.0, Microsoft Windows 2000, Novell NetWare 5.x, IBM AIX 5.2, IBM AIX 5.1, Novell NetWare 6.x, SunSoft Solaris 9, HP-UX 11i v2, HP-UX 11i v1, openSUSE 11.0, openSUSE 11.1, IBM AIX 5.3, Red Hat Enterprise Linux WS 4, IBM AIX 5.4, Red Hat Fedora Core 9, Red Hat Fedora Core 10, Ubuntu 8.10, Ubuntu 9.04, Ubuntu 6.06, SUSE Linux Enterprise Desktop 11, SuSE Linux 10.1, SUSE Linux Enterprise Desktop 10, Red Hat Fedora Core 5, HP-UX 11i v3, Red Hat Enterprise Linux WS 5, Red Hat Fedora Core 6, openSUSE 10.2, openSUSE 10.3, Red Hat Fedora Core 7, Debian Linux 4.0, Mandriva Linux 2007, Red Hat Fedora Core 8, Ubuntu 6.10, Ubuntu 8.04, Microsoft Windows Vista (32/64 bits), Ubuntu 9.10, openSUSE 11.2, Ubuntu 7.10, Microsoft Windows Server 2008 R2 x64 Edition, Red Hat Fedora 13, openSUSE 11.3, Ubuntu 10.04, Ubuntu 7.04, Microsoft Windows 7 (32/64 bits), Microsoft Windows XP (32/64 bits), Microsoft Windows Server 2008 (32/64-bits), Microsoft Windows Server 2003 (32/64-bits), Oracle Solaris 10, Red Hat Fedora 11, Red Hat Fedora 12, Red Hat Fedora 14, Mandriva Linux 2009.1, Debian Linux 6.x, Red Hat Fedora 15, Apple MacOS X 10.4 – 10.7, openSUSE 11.4, Mandriva Linux 2008, Mandriva Linux 2009, Mandriva Linux 2010, Ubuntu 11.04, Red Hat Enterprise Linux WS 6, Debian Linux 5.0
Microsoft Certification Compatible with Windows 7
Manufacturer Warranty 1 year warranty
Dimensions (WxDxH) 13.7 in x 13.3 in x 7.8 in

Extended Specifications
General
Printer Type Workgroup printer – laser – monochrome
Printer
Print Speed Up to 28 ppm – A4 (8.25 in x 11.7 in)
Up to 29 ppm – Letter A Size (8.5 in x 11 in)
Connectivity Technology Wired
Interface USB, LAN
Max Resolution ( B&W ) 1200 dpi
Automatic Duplexing Yes
PostScript Support Included
Language Simulation PCL 6, SPL (Samsung Printer Language), XPS
Media Handling 250-sheet paper cassette, 1-sheet multipurpose tray
Processor
Processor ARM11 533 MHz
RAM
RAM Installed ( Max ) 64 MB
Technology / Form Factor DDR2 SDRAM
Media Handling
Media Type Envelopes, transparencies, labels, plain paper, cards, bond paper, recycled paper, cotton paper, thick paper, thin paper
Media Weight 60 g/m2 – 220 g/m2
Total Media Capacity 250 sheets
Media Feeder(s) 1 x manual load – 250 sheets – Legal (8.5 in x 14 in) weight: 60 g/m2 – 163 g/m2
1 x manual load – 1 sheets – Legal (8.5 in x 14 in) weight: 60 g/m2 – 220 g/m2
Output Trays Capacity 150 sheets
Duty Cycle
Monthly Duty Cycle (max) 20000 pages
Networking
Networking Print server
Data Link Protocol Ethernet, Fast Ethernet
Expansion / Connectivity
Connections 1 x LAN – RJ-45
1 x USB 2.0 – 4 pin USB Type B
Miscellaneous
Consumables Included 1 x toner cartridge ( black ) – up to 1000 pages
Compatible with Windows 7 “Compatible with Windows 7″ software and devices carry Microsoft’s assurance that these products have passed tests for compatibility and reliability with 32-bit and 64-bit Windows 7.
Supported Windows 7 Features Windows HD Imaging
Compliant Standards RoHS
Software / System Requirements
Software Included Drivers & Utilities, Dell Printer Manager, Dell Supplies Ordering Utility, Lite StatusMonitor
OS Required HP-UX 11.0, Microsoft Windows 2000, Novell NetWare 5.x, IBM AIX 5.2, IBM AIX 5.1, Novell NetWare 6.x, SunSoft Solaris 9, HP-UX 11i v2, HP-UX 11i v1, openSUSE 11.0, openSUSE 11.1, IBM AIX 5.3, Red Hat Enterprise Linux WS 4, IBM AIX 5.4, Red Hat Fedora Core 9, Red Hat Fedora Core 10, Ubuntu 8.10, Ubuntu 9.04, Ubuntu 6.06, SUSE Linux Enterprise Desktop 11, SuSE Linux 10.1, SUSE Linux Enterprise Desktop 10, Red Hat Fedora Core 5, HP-UX 11i v3, Red Hat Enterprise Linux WS 5, Red Hat Fedora Core 6, openSUSE 10.2, openSUSE 10.3, Red Hat Fedora Core 7, Debian Linux 4.0, Mandriva Linux 2007, Red Hat Fedora Core 8, Ubuntu 6.10, Ubuntu 8.04, Microsoft Windows Vista (32/64 bits), Ubuntu 9.10, openSUSE 11.2, Ubuntu 7.10, Microsoft Windows Server 2008 R2 x64 Edition, Red Hat Fedora 13, openSUSE 11.3, Ubuntu 10.04, Ubuntu 7.04, Microsoft Windows 7 (32/64 bits), Microsoft Windows XP (32/64 bits), Microsoft Windows Server 2008 (32/64-bits), Microsoft Windows Server 2003 (32/64-bits), Oracle Solaris 10, Red Hat Fedora 11, Red Hat Fedora 12, Red Hat Fedora 14, Mandriva Linux 2009.1, Debian Linux 6.x, Red Hat Fedora 15, Apple MacOS X 10.4 – 10.7, openSUSE 11.4, Mandriva Linux 2008, Mandriva Linux 2009, Mandriva Linux 2010, Ubuntu 11.04, Red Hat Enterprise Linux WS 6, Debian Linux 5.0
Environmental Standards
ENERGY STAR Yes
Manufacturer Warranty
Service & Support 1 year warranty
Service & Support Details Limited warranty – 1 year

 

Call (619) 325-0990 to order a HP Laser Printer B1260dn today!

Buy of the Week offer valid through December 20th, 2013.

Note: Shipping and taxes apply.

Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Microsoft wages on Windows XP disaster


windows-xp-countdown

Microsoft is forecasting a huge increase in cybercrime and exploits from the unsupported Windows XP software next year.  Support for Windows XP will be ending on April 8, 2014, so the software will be vulnerable to attacks and cybercrime.

Windows XP was released in September 2001, the 12-year old operating system is outdated and expiring.
Microsoft won’t issue patches or other security fixes for its operating system.  So, if an attacker develops an exploit code, they can take advantage of the vulnerable Windows XP software.

Windows XP will essentially have a ‘zero-day’ vulnerability forever!

Within the last year, Windows XP was targeted 45 times.


windows-infection


Hackers are sure to “bank” on the zero-day XP attacks, a migration strategy should be taking place, now.
With less than four months from now, the anticipated rate of infection for Windows XP is 66%.  There are 34% of all Windows on PCs still using Windows XP.  And with a two-month stall in decline, it is apparent the OS will be running on a quarter of PCs come April.

Now is the time to upgrade.  Either install Windows 7 or 8 on your PC or maybe it’s time to get a new PC all together.  Check out our store for great deals on computers and other hardware or take a look at our monthly specials.


References:

Zero day forever–move away from Windows XP, now – PC World
http://www.pcworld.com/article/2046839/zero-day-forever-move-away-from-windows-xp-now.html

Microsoft bets on Windows XP disaster – Computer World
http://www.computerworld.com/s/article/9244757/Microsoft_bets_on_Windows_XP_disaster

Friday, December 13, 2013

Are you being explotied?

Software exploits are attack techniques managed by attackers to quietly install malware.  Trojans or backdoors are fastened into computers without requiring social engineering to trick victims into manually running a malicious program.

Malware installation through an exploit would be invisible to users and gives attackers an obvious advantage.

Exploitation Targets

Here are some applications most targeted by attackers through exploitation:
  • Web browsers (Microsoft Internet Explorer, Google Chrome, Apple Safari, Mozilla Firefox and others).
  • Plug-ins for browsers (Adobe Flash Player, Oracle Java, Microsoft Silverlight).
  • The Windows operating system itself – notably the Win32 subsystem driver – win32k.sys.
  • Adobe Reader and Adobe Acrobat
The most dangerous exploit attack is remotely installing code into the operating system.  Downloading or running vulnerable software increases the chance of your system becoming infected with malware.

While PDF’s are the most common document files, they can be dangerous if obtained from an unreliable source.  Adobe has extended the file format to maximize its data exchange functionality by  granting scripting and the embedding of various objects into files.  This can be exploited by an attacker.



pdf-security



Another target is the Adobe Flash Player.  This plug-in is used for playback of content on various browsers.  The Adobe Flash Player is updated regularly and notifies you when it’s time to upgrade.  Most vulnerabilities are of Remote Code Execution (RCE) which indicates that attackers use susceptibilities for remotely executing malicious code on a victim’s computer.

Java is also a popular browser plug-in attractive to attackers.  More than three billion devices are using this platform.  Java is vulnerable to malicious attacks and is one of the most dangerous components.  When you use Java on Windows, its security settings can be changed using the control panel applet.  Latest versions of security settings allow you to configure the environment more accurately.


Windows operating systems itself can be used by attackers to remotely execute code.  The figure below shows the number of patches the each components have received during 2013.



patches
This shows Internet Explorer fixed the greatest number of vulnerabilities.  More than a  hundred vulnerabilities have been fixed in the course of fourteen updates.

internet-options

Windows Operating System

Newer versions of Microsoft Windows – i.e., Windows 7, 8, and 8.1 have built-in mechanisms which help protect users from destructive actions delivered by exploits.  Features became available with Windows Vista was upgraded in the most recent operating system versions.


Operating-system-updates

http://www.hyphenet.com/blog/2013/12/13/are-you-being-explotied/



This shows Internet Explorer fixed the greatest number of vulnerabilities.  More than a  hundred vulnerabilities have been fixed in the course of fourteen updates.




internet-options

Windows Operating System

Newer versions of Microsoft Windows – i.e., Windows 7, 8, and 8.1 have built-in mechanisms which help protect users from destructive actions delivered by exploits.  Features became available with Windows Vista was upgraded in the most recent operating system versions.

Operating-system-updates


http://www.hyphenet.com/blog/2013/12/13/are-you-being-explotied/

 

Windows Operating System

Newer versions of Microsoft Windows – i.e., Windows 7, 8, and 8.1 have built-in mechanisms which help protect users from destructive actions delivered by exploits.  Features became available with Windows Vista was upgraded in the most recent operating system versions.





All operating systems or programs used are studied by attackers for vulnerabilities.  Their intent is to exploit for financial gain.  Adobe, Google, and Microsoft are all taking steps to make these attacks more difficult to achieve.

To protest yourself, change your system settings for a more secure application and keep your software up-to-date.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

Exploit Protection for Microsoft Windows – We Live Security
http://www.welivesecurity.com/2013/12/13/exploit-protection-for-microsoft-windows/

Thursday, December 12, 2013

Disconnected Computers are still at Risk for Cyberthreats


air-gap-malware

Are we really aware of the cyberthreats faced with our computers?  Don’t click on the bothersome floating advertisement, never open mail from suspicious senders, don’t trust your friends sending you a message containing just a link.

Being tricked into installing malware on your own computer is just a click away.  You think you need a new version of Flash because your computer tells you so.  So you click, install, then realize something is funny about the download process.

What do you do then?  Frantically turn your computer off, hoping you just stopped what ever invasion your computer is experiencing?  If your computer is infected with a virus or malware, disconnecting it from the Internet is the first step of security you should take.  But is it enough?

German computer scientists have come up with a prototype for building “covert channels” between computers using the machines’ speakers and microphones.  This potentially defeats high-security measures that rely on the “air gap” between computers.

malware-airgap

The air gap is a network security measure that ensures a secure computer network is physically isolated from unsecured networks.  Sometimes the air gap is not completely literal, and dedicated cryptographic devices can tunnel packets over questionable networks while avoiding pack rate or size variation.
Dan Goodin from Ars Technica explains:

“The proof-of-concept software — or malicious trojans that adopt the same high-frequency communication methods — could prove especially adept in penetrating highly sensitive environments that routinely place an ‘air gap’ between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals.”

Research has shown that computers which were unplugged from networks and had their Wi-Fi and Bluetooth cards removed, were infected with malware that used high-frequency transmissions.
Hackers are “jumping the air gap” and worrying even military officials.

“If you take a cybernetic view of what’s happening [in the Navy], right now our approach is unplug it or don’t use a thumb drive,” retired Navy Capt. Mark Hagerott, a cybersecurity professor at the U.S. Naval Academy, said at a recent defense conference. But if hackers “are able to jump the air gap, we are talking about fleets coming to a stop.” – Geoffrey Ingerson of Business Insider

“Acoustical networking as a covert communication technology is a considerable threat to computer security,” the scientists wrote in their paper. However, they said such audio snooping could be prevented using “a software-defined lowpass filter” or a “detection guard” that analyzes audio to identify hidden messages. – Hanspach and Goetz, German scientists

System devices designate security levels as low side (unclassified) and high side (classified).  I’m sure the military has much more interesting information in their computers, but just the thought that nothing can stop computer invasion is scary.

What’s your take on this?  Please leave your comments below!

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest computer security threats.

References:

Even Disconnected Computers May Face Cyberthreats – NPR
http://www.npr.org/blogs/alltechconsidered/2013/12/03/248576739/even-disconnected-computers-may-face-cyber-threats
December 4, 2013

Wednesday, December 11, 2013

By 2015 One in Four Cloud Providers will be gone

cloud-computing

Gartner research firm is predicting a considerable unification in cloud services and estimates around 25% of the top 100 IT service providers in the groundwork will not be around by 2015.

“One in four vendors will be gone for whatever reason — acquisition, bankruptcy,” said William Maurer, a Gartner analyst.

We are in the era of buyer beware with cloud, there’s no safety net.

Large vendors are a safer option because of the costs cuts.

It is said, there is a 50% perceived risk of using cloud-based solutions. 33% saw “somewhat” of a risk, and 12% express the sense of a small risk.

Gartner also predicts that a segment of organizations using cloud services will reach to 80% by the end of the year.


Cloud Computing

Cloud computing services used to be viewed as an alternative for large enterprises. The rapid rate of technology and evolution over the past 12 months show it is inevitable around cloud migration.
Solutions for security, privacy, and data sovereignty are a concern.

OffShoring

Cloud has some parallels with the migration of offshoring. Risks and challenges around offshoring build angst and political heat.  The idea of companies data streaming to other countries shows concern for security.

Offshoring  to other countries is an alternative method used for resources very popular with technical and administrative service support.

Due to many concerns, the lack of onshore skills, costs, and the need to rebuild controls,  a new “normal” has come with a considerable bulk of IT and business processes migrated offshore.

Offshoring may be the help Cloud services need to stay afloat.

If your not aware of what Cloud Computing is here is an Infographic to help you out.


cloud-computing-infographic
Source link via : Mashable.com

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest computer security threats.


References:

Cloud debate now about speed and sophistication – CIO
http://www.cio.com.au/article/533970/cloud_debate_now_about_speed_sophistication/

One in four cloud providers will be gone by 2015 – ComputerWorld
http://www.computerworld.com/s/article/9244694/One_in_four_cloud_providers_will_be_gone_by_2015

Tuesday, December 10, 2013

Tech Support Scams Still Evolving


tech-support-scam

The ESET tech support have been running into customers who think they’ve been getting help from ESET or it’s partners but it turns out they have been tricked by scammers.

Customers are receiving calls from an “ESET 3rd party tech support rep” who says their computer had been corrupted and needed to be fixed.

Also, customers are getting calls from “Microsoft”, informing them that a notification had been received concerning a virus infection on their PC, offering his services to help.  Scammers are installing cracked versions of ESET’s software and other software while retracting information from your computer, along with taking their money.

Here is an example of the dialogue from these scammers:

Scammer: Hello, we are calling you because we see your computer has a lot of infections and is approaching a system crash.  If you let me remote in I can assist with removing the infections to save your computer for only $300.00.

User: Well that’s odd, I typically use  and their support for issue like this.

Scammer: We are 3rd party support for , so we can support you.

User: “Oh that’s great!” or “Let me call  first.”

A customer said he was told to ‘press Windows R’ (Runs the Command) and then type ‘inf location virus’ into the dialog box.  “inf” is a search term for C:\\Windows\Inf, which contains files used in installing the system.


inf-copy


A company called Speak Support offering “Mac® Technical Support” misused the internet utility ping in hope of convincing a potential victim that he has no active protective software on his system.

The phony tech asked the customer to open a terminal window and used ping from the command line to query a site called protection.com.  This is what shows up:

wilbur:~ davidharley$ ping protection.com
PING protection.com (72.26.118.81): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
Request timeout for icmp_seq 3
Request timeout for icmp_seq 4
Request timeout for icmp_seq 5
Request timeout for icmp_seq 6
Request timeout for icmp_seq 7
Request timeout for icmp_seq 8
Request timeout for icmp_seq 9
Request timeout for icmp_seq 10
^C
--- protection.com ping statistics ---
10 packets transmitted, 0 packets received, 100.0% packet loss
The ^C shows where I got bored with counting timeouts and terminated the request.

Here’s how to contact ESET if you’re a customer with malware-related problems:
  • If you’ve received specific information about support from your local distributor when you bought the product, that’s the first place to look.
  • Go to http://www.eset.com  and check out the resources on the Support tab. This tab will offer a number of options, including a search facility, access to the ESET Knowledgebase, a form that enables you to contact Customer Care to submit a specific case, and a link to contact pages for ESET’s offices around the world.
  • You can also get there via the help and support facility in the product itself.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

Tech Support Scammers: Talking to a Real Support Team – We Live Security
http://www.welivesecurity.com/2013/11/22/tech-support-scammers-talking-to-a-real-support-team/
November 22, 2013

Tech support scam update: still flourishing, still evolving – We Live Security
http://www.welivesecurity.com/2013/10/29/tech-support-scam-update-still-flourishing-still-evolving/
October 29, 2013

Monday, December 9, 2013

Buy of the Week: HP LaserJet Pro 200 Color Printer M251nw for only $199 + tax!

hp-laserjet-pro-200-color-printer-m251nw
The HP LaserJet Pro 200 color M251nw is the perfect color laser printer that fits into the smallest spaces!
The M251nw offers fast printing, easy Wi-Fi direct connection, and a touch screen control panel.

Specifications for the HP LaserJet Pro 200 Color M251nw

Product Description HP LaserJet Pro 200 color M251nw – printer – color – laser
Printer Type Workgroup printer – laser – color
Weight 41.4 lbs
Localization English, French, Spanish / Canada, Mexico, United States, Latin America (excluding Argentina, Brazil, Chile)
Max Media Size (Standard) Legal, A4
Min Media Size (Custom) 3 in x 5 in
Max Media Size (Custom) 8.5 in x 14 in
Print Speed Up to 14 ppm – black normal – Letter A Size (8.5 in x 11 in)
Up to 14 ppm – color normal – Letter A Size (8.5 in x 11 in)
Max Resolution ( B&W ) 600 x 600 dpi
Max Resolution ( Color ) 600 x 600 dpi
Image Enhancement Technology HP ImageREt 3600
Interface USB 2.0, LAN, Wi-Fi(n), USB host
AirPrint Enabled Yes
Preview Screen Size 3.5″
Processor 750 MHz
RAM Installed ( Max ) 128 MB ( 128 MB )
Language Simulation PCL 5C, PostScript 3, PCL 6
Media Type Envelopes, transparencies, labels, plain paper, glossy paper, photo paper, heavy-weight paper, cards, bond paper, recycled paper
Total Media Capacity 150 sheets
Monthly Duty Cycle (max) 30000 pages
Recommended Monthly Volume 250 – 1500 pages
Networking Print server – Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n
Printer Features HP ePrint
Power AC 120 V
System Requirements SunSoft Solaris 8, SunSoft Solaris 9, Microsoft Windows XP SP2 or later, HP-UX 11, Red Hat Fedora Core 9, Red Hat Fedora Core 10, Ubuntu 8.10, Ubuntu 9.04, SuSE Linux 11, Apple MacOS X 10.6, Debian GNU/Linux 5.0, Red Hat Enterprise Linux 5, Apple MacOS X 10.5, Microsoft Windows Server 2003 SP3 or later, SuSE Linux 10.3, Linux Linpus 9.4, Ubuntu 8.04, Microsoft Windows Vista (32/64 bits), Ubuntu 9.10, Red Hat Fedora Core 11, Red Hat Fedora Core 12, Debian GNU/Linux 5.0.1, Ubuntu 10.04, Microsoft Windows 7 (32/64 bits), Microsoft Windows Server 2008 (32/64-bits), Apple MacOS X 10.7 Lion, Linux Linpus 9.5, SuSE Linux 11.1, SuSE Linux 11.2, Ubuntu 8.04.1, Ubuntu 8.04.2, Debian GNU/Linux 5.0.2, Debian GNU/Linux 5.0.3
Manufacturer Warranty 1 year warranty

Call (619) 325-0990 to order a HP LaserJet Pro 200 color M251nw printer today!

Buy of the Week offer valid through December 14th, 2013.
Note: Shipping and taxes apply.
Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Tuesday, December 3, 2013

India seeks help from the US to monitor Web chats

India’s government plans on using the U.S. to help decrypt data sent via messaging services to aid in cyber-crime investigations.

India-United-States
http://www.hyphenet.com/blog/india-seeks-help-us-monitor-web-chats/

 The U.S. is the leader in monitoring phone calls, web chats, and everything else that can be under surveillance.  India is requesting the United States’ help in unraveling messages from online chat services to gain an upper hand in cybercrime for their investigations.

It is noted the Indo-US Police Chiefs conference will take place on Wednesdays at India’s Union Home Ministry.  The conference will focus on online messaging services like Viber, Whatsapp, Slype, and Webchat, which challenges security agencies to intercept and monitor conversations.

India is requesting the U.S. share its knowledge and information on the technology used to do so.

The Asian economic giant has been pressuring  chat services to share their decryption keys, but have not seen any changes.

“The availability of their Web servers in India is required for legal interception of communications in real-time for timely action by security and intelligence agencies,” the India ministry said in its note. “The communication over these services is encrypted, and the encryption-decryption technologies available with the service providers will be required by security agencies even if the facility for lawful interception of these communications is extended to security agencies in India. The technology in use by U.S. agencies may be an area of co-operation.”

In November 2008, there was a terrorist attack in Mumbai.  The Indian government said the terrorist were able to organize the attacks throught mobile phones and  Internet messages.

india-national-security-agencys-spying-list
http://www.hyphenet.com/blog/india-seeks-help-us-monitor-web-chats/

BlackBerry has set up a server in India to assist the government’s demand for tracking communications.  The device tracks messages sent to and from all BlackBerry devices.

The Indian Union Home Ministry expressed great displeasure to the U.S.  because of service providers like Microsoft, Google, Facebook and Twitter, have not agreed to the request for information of e-mail contents to aid in the investigations.

According to The Economic Times, India’s Intelligence Bureau Chief Asif Ibrahim called for the establishment of an “Indo-American Alert, Watch and Warn” network to help ease  cybercrime investigations between law enforcement agencies and other corporations.

Service providers currently take between 15 to 80 days to respond to India’s request for Internet log data.  There’s no guarantee that the information required to fight cybercrime will be provided at all.

For India’s Nation Investigation Agency (NIA): cooperation from companies would mean accessing, monitoring, and call interception data from all organizations.  For India’s people: privacy fears, self-censorship, and  paranoia will consume their thoughts while their personal conversations are being collected.

What do you think about surveillance programs tapping into internet traffic to counteract terrorist attacks?  Is it invading our privacy or protecting our people?

Leave your comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

References:
Analysis: NSA’s data grab ought to boost privacy concerns – USA Today
http://www.usatoday.com/story/cybertruth/2013/10/30/nsas-data-grab-should-boost-privacy-concerns/3315789/
October 30, 2013
India agency petitions for monitoring system – ZDNet
http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/
October 15, 2013
India to seek US help in monitoring Web chats – ZDNet
http://www.zdnet.com/in/india-to-seek-us-help-in-monitoring-web-chats-7000023867/
December 3, 2013