Showing posts with label Technology News. Show all posts
Showing posts with label Technology News. Show all posts

Wednesday, March 26, 2014

Do you know how to stay protected after Windows XP ends?

Do you know how to stay protected?

To stay protected after Windows XP support ends, you have two options; upgrade your software or purchase new hardware.

Upgrading your software will enhance security, lower cost of ownership through improved competence, and provide you with higher productivity.

Upgrading your hardware will ensure compatibility with Windows 8.1, give you a longer life-span with your system, boost yield for your company, and improve graphics on your operating system.

Upgrade your current PC

Time is beginning to run out!  Microsoft Windows XP support will end on April 8th.


red fear microsoft windows xp 3d



There are only a few older computers that will be compatible with Windows 8.1, which is the latest version of Windows.

Its recommended that you download and run the Windows Upgrade Assistant to check if your PC meets the system requirements for Windows 8.1 and then follow the steps in the tutorial to upgrade if your PC is able to. For more detailed information, read the FAQ.

You may also call us at 619-325-0990 and we can help you with your system upgrade.

What does it mean when XP ends?  It means there will be no more support for Windows XP, leaving your system vulnerable to security issues.

Take action and upgrade your system today.  Vulnerabilities could exploit your system with malware and your data will no longer be safe.

It is important to migrate to a current operating system, so you can receive regular updates to protect your computer.

Whats the risk?

There are many risks you will face if you are still running Windows XP after April 8th:
  • Security – Without security updates, your PC is vulnerable to viruses, spyware, and other malicious software.
  • Compliance – Businesses have regulatory obligations like HIPAA and will no longer be in compliance with the requirements with unsupported software.
  • No Software Support – Software vendors will no longer support any equipment running on Windows XP.
  • Hardware Manufacturer Support – PC hardware manufacturers will stop supporting existing hardware running Windows XP.

Every Windows product has a lifecycle.  It starts with the release of the software and ends with the software no longer being supported.  Below is a list of dates to keep you informed and help you make decisions on when to upgrade your hardware and software.


Client operating systems Latest update or service pack End of mainstream support End of extended support
Windows XP
April 14, 2009
Windows Vista
April 10, 2012
April 11, 2017
Windows 7 *
January 13, 2015
January 14, 2020
Windows 8
January 9, 2018
January 10, 2023


There are roughly more than a half-a-billion active users worldwide that are still using XP.  The longer your Windows XP machine is unpatched, the more vulnerable it will become to zero-day attacks.

Now that manufacturers are switching to a newer version of Windows, many devices like cameras and printers will no longer be compatible with Windows XP, according to Microsoft.

There are also issues with long-term support.  The new hardware and software will stop working on the old operating system.

With a new upgraded system, your life run smoother, your business will thrive, and your day will become easier. 

Don’t wait until the very last minute to upgrade.  Call us today! 619-325-0990
 

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

Windows XP: Feds Brace For End Of Support – InformationWeek Government
http://www.informationweek.com/government/cybersecurity/windows-xp-feds-brace-for-end-of-support…

How do I migrate off Windows XP? – Microsoft
http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx

Monday, July 29, 2013

HzO WaterBlock is waterproofing everything!

[caption id="attachment_11475" align="aligncenter" width="600"] Photo Credit:[HzO][/caption]All the panic attacks from damaging your phone because a couple droplets of water touched your smartphone will no longer exist.  This new WaterBlock technology called HzO is waterproofing everything.  This technological advancement is a game changer.

Click here to view a video provided by FoxBusiness.com

This simple spray makes your cellphone, tablets, shoes, clothes, and just about everything you can think of water resistant.  HzO is a nano-coating that protects even the smallest electronics on the inside.  The WaterBlock technology defends against any moisture at the molecular level.  The product attaches to the circuits in devices and repels liquids away.  The HzO doesn't add any weight nor does it affect the performance of your device.

Not for consumers


The HzO is not for consumers, HzO is something device makers are going to start to incorporate into the manufacturing processes. HzO is soon appearing in gadgets from NavELite, putting it in the luxaury TAG Heuer smartphone. This special liquid blocking technology began for emergency response communications equipment that could function in maritime environments. This waterproof equipment would save thousands of lives, since electronic devices would never fail from water damage. In 2009, ZAGG had a vision of protecting electronics and other commercialized technology with the HzO solution.

Gorilla Glass


[caption id="attachment_11476" align="alignright" width="270"] Photo Credit: [cnet News][/caption]Gorilla Glass is another alternative to check out for protecting your smartphones. Although this isn't a waterproof protect ant, the Gorilla Glass is 8 to 10 times more resistant than normal smartphone screens. According to Corning, consumer complaint rates are more than twice as high for scratches on touch-screen notebooks than for scratches used for other mobile devices.   Dell is the first one in line to sign up for installing the Gorilla Glass this fall.

So relief is on the way...spending hundreds for your smartphone will be safer than ever. Clumsy mistakes, won't be so crucial to the life of your gadgets anymore.

Please visit http://www.hyphenet.com/blog/ for more posts on the latest technology and IT security news.

References:

New Gorilla Glass protects touch-screen notebooks - c|net
http://news.cnet.com/8301-1001_3-57595779-92/new-gorilla-glass-protects-touch-screen-notebooks/
July 29, 2013

HzO WaterBlock Technology
http://www.hzoinside.com/

HzO Makes Your Smartphone Waterproof... on the Inside - Mashable
http://mashable.com/2013/01/09/hzo-waterblock/
Jan 9, 2013

Waterproof Phones a Must Have in 2013 - Fox Business
http://video.foxbusiness.com/v/2080938609001/waterproof-phones-a-must-have-in-2013/
Jan 8, 2013



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Tuesday, July 23, 2013

Viber Gets Attacked By Electronic Syrian Army


Viber Syrian Hack

Viber's online help desk, an instant-messaging and VoIP service was phished by pro-Syrian hackers. They claimed to have accessed e-mail addresses, phone numbers, and other personal information belonging to the company's users and employees.

Viber has confirmed the situation in which they have been hacked by the Syrian Electronic Army.  This is a pro-government group of hackers in Syria aligned with the President Bashar al-Assad.  AppleSpot reported the hack affected the Viber support page, although it was very unclear to the extent upon which hackers accessed Viber systems.

Viber has now verified that the only hack allowed access of two small systems.  One being a customer support panel and the other a support administration system.  According to the company's official response, "no sensitive user data was exposed and Viber's databases were not 'hacked'." Viber did not attest weather or not the attack cam from the Syrian Electronic Army, though the hacker group does take responsibility for the compromise. Viber did claim the hack was the product of a phishing attack that was pinpointed on one of their employees.


Viber's Story


Viber is a system that allows user to send free text mesages, photo messages, video messages and share locations with other users. Viber users can make free HD-quality calls to other Viber users on iPhone, Android, Windows Phone, Blackberry, Windows, Mac, and many other devices. There are more than 200 million users in over 193 countries, Viber is repeatedly evolving by introducing new platforms and adding new features to gain popularity.

Please visit http://www.hyphenet.com/blog/ for more posts on the latest technology and IT security news.

References:
Viber Attacked By Syrian Electronic Army - TechCrunch
http://techcrunch.com/2013/07/23/viber-attacked-by-syrian-electronic-army/
July 23, 2013

Viber’s online help desk sacked by pro-Syrian hackers - arstechnica
http://arstechnica.com/security/2013/07/vibers-online-help-desk-sacked-by-pro-syrian-hackers/
July 23, 2013

Friday, July 12, 2013

Android gets Attacked: Breaking Cryptographic Singnatures

The weakened Android apps allow hackers to break signatures


Android's vulnerability has affected more than a million devices allowing attackers to turn reliable apps into Trojan programs.   The Android app records digital signatures of applications and installs it into a sandbox when created.  The updates for the app are cryptographically signed by the same author in order to verify that they haven't been adjusted.  Researchers from the mobile security association Bluebox Security released the threat of the vulnerability that verifies digital signatures from the Android and allows attackers to modify them without breaking the signature code.  This has apparently been going on for the past four years!



Infected Android Apps

Tricky Tricky


Android's record digital signatures to match other signatures so it can verify that they came from the same author.  The Android security model ensures sensitive data is being stored by an application in its sandbox can be accessed by the latest versions of that application that are signed with the primary author's key.  So the attackers add malicious code to the already signed APKs and it doesn't break their signatures.

The Android security model safeguards the susceptible data stored by one application in its sandbox and can only be viewed by new versions of that application that are signed with the author's archetypal key.  The transparency of the Bluebox allows assailants to gain full access and manipulate signatures then using them for distributing Trojan apps, sending them via email, uploading them to a third-party app store, hosting them on any website, and copying them to the intended devises via USBs.

Pau Oliva Fora, a mobile security engineer who works at security firm ViaForensics, developed a proof-of concept Linux shell script that can be benefited by modifying an app in a way that exploits the flaw. This code operates with the APKTool program and was released this past Monday on Github.


"It's a problem in the way Android handles APKs that have duplicate file names inside," Oliva Fora said Tuesday via email. "The entry which is verified for signature is the second one inside the APK, and the entry which ends up being installed is the first one inside the APK -- the injected one that can contain the malicious payload and is not checked for signature at all."


Response from Google


Google made changes to Google Play to make sure it detects apps modified and patches it up, sharing the information with device manufacturers.  Users who install applications from sources other than Google Play is known as sideloading, this is an action potentially vulnerable to being tampered with.  However, if an adversary manually installs malicious updates for an app, it will be replaced and the new version will no longer interact with the app store.

It's confirmed that the third party device,  Samsung Galaxy S4, has the solution at bay.   Google is now working on arranging the Nexus devices, although nothing is completed.

The gradual distribution of patches in the Android ecosystem has been criticized by both security researchers and Android users.  Duo Security reported, the statics gathered through it's X-Ray Android  poor assessment app, more than half of Android devices are vulnerable to at least one of the known Android security flaws.

It's good to check the apps before you install them, do some research and look at the reviews.

Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

Vulnerability allows attackers to modify Android apps without breaking their signatures - C World
http://www.pcworld.com/article/2043610/vulnerability-allows-attackers-to-modify-android-apps-without-breaking-their-signatures.html
July 3, 2013

Proof-of-concept exploit available for Android app signature check vulnerability - ComputerWorld
http://www.computerworld.com/s/article/9240645/Proof_of_concept_exploit_available_for_Android_app_signature_check_vulnerability
July 9, 2013

Researchers find another Android attack that can get past signature checks - InfoWorld
http://www.infoworld.com/d/mobile-technology/researchers-find-another-android-attack-can-get-past-signature-checks-222532
July 11, 2013

Quick & dirty PoC for Android bug 8219321 discovered by BlueboxSec - GitHub
https://gist.github.com/poliva/36b0795ab79ad6f14fd8
July 8, 2013



Image courtesy of [emptyglass] / FreeDigitalPhotos.net

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Wednesday, July 10, 2013

America's Building Serious Cybersecurity Framework

Fighting Cyber SecurityEveryday in this country we rely on infrastructures to get us from point A to B.  The bridge we cross to get to work, the elevator we take to get to the doctors and the school we take our children to for their education and

refinement.  Critical infrastructures are made up of bridges, power supply, medical facilities, telecommunications networks, and more.   More so now, we rely on cyber infrastructures like working on our laptop from home to have a business meeting.  Or Skyping with the grandparents that are across the country so they can see how big their grandchildren are getting.

In this day, the critical infrastructure relies on digital systems of calculation and communication, most widely known as "cyber."  We've all heard of those cyber criminals hacking into our computers.  Gather our personal information, getting into our emails, stealing our identity.  Our cyber infrastructure is under attack and it seems like no one knows what to do about it or how to stop it.  We are helpless and lost, our computers are being invaded with malware and viruses while we watch.  No worries though,  America is taking charge and building a critical infrastructure cybersecurity framework.

 

Land of the Great


In February, President Obama issued an executive order to improve cybersecurity.  He intends to promote better protection of the country's infrastructure from cyber attacks that are growing in our economy and national security.  This week, that executive order is taking place here in San Diego-home of ESET North America at the University of California, San Diego (UCSD) and the National Health Information Sharing and Analysis Center (NH-ISAC) are hosting the 3rd Cybersecurity Framework Workshop today July 10 until Friday, July 12, 2013.  The intent is to work with stakeholder to organize a voluntary framework for reducing cyber risks.

 
Executive Order 13636, Improving Critical Infrastructure Cybersecurity, has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructures. This cybersecurity framework is being developed in an open manner with input from stakeholders in industry, academia, and government, including a public review and comment process, workshops, and other means of engagement. - National Institute of Standards and Technology (NIST)

 

The San Diego event will have sessions that go into the depths of cybersecurity functions and it's workings.

  • Know – Gaining the institutional understanding to identify what systems need to be protected, assess priority in light of organizational mission, and manage processes to achieve cost effective risk management goals

  • Prevent – Categories of management, technical, and operational activities that enable the organization to decide on the appropriate outcome-based actions to ensure adequate protection against threats to business systems that support critical infrastructure components.

  • Detect –Activities that identify (through ongoing monitoring or other means of observation) the presence of undesirable cyber risk events, and the processes to assess the potential impact of those events.

  • Respond – Specific risk management decisions and activities enacted based upon previously implemented planning (from the Prevent function) relative to estimated impact.

  • Recover – Categories of management, technical, and operational activities that restore services that have previously been impaired through an undesirable cybersecurity risk event.


The next chapter is to observe the key categories and subcategories for the above functions.  They will examine the standards, guidelines, and practices for each suite and lower groups alike.  The US business and government agencies are hyper focusing on criminal hacking attacks and acts of cyber warfare, which is believed to be the work of state sponsored foreign agencies and home-grown hacktivist groups.   Online registration for the San Diego workshop is closed and already under way.  You may still register today at Madneville Auditorium, University of California, San Diego, 9500 Gilman Drive, La Jolla, California.

So know that America is seeing this epidemic of cyber criminals on the rise and we are doing something about it.  We are taking charge and fighting.

 

Image courtesy of [Victor Habbick] / FreeDigitalPhotos.net

References:
A cybersecurity framework to protect digital critical infrastructure
http://www.welivesecurity.com/2013/07/08/a-cybersecurity-framework-to-protect-digital-critical-infrastructure/
Published July 8, 2013

3rd Cybersecurity Framework Workshop, July 10-12, 2013, San Diego, CA
http://www.nist.gov/itl/csd/3rd-cybersecurity-framework-workshop-july-10-12-2013-san-diego-ca.cfm

Monday, July 8, 2013

Linux/Cdorked.A Malicious Malware

Malware blackhole

The investigation with Linux/Cdorked.A continues.  There have been significant discoveries that this subtle and sneaky backdoor is designed to drive traffic to malicious websites.

  • There are over four hundred webservers infected with the Linus/Cdorked.A. 50 ranked at Alexa's top 1000,000 hottest websites.

  • The backdoor has been applied to alternative webserver daemons.  Lighttpd and nginx binaries have already been documented Apache binaries.

  • The Linux/Cdorked.A threat is even more sneaky than thought.  The malicious content is not delivered to victim's IP address' that have long IP ranges.

  • If the internet browser's language is set to Japanese, Russian, Finnish, Ukrainian, Kazkh, or Belarusian, it will not be affected.

  • 1000,000 user's of ESET security products have browsed these infected websites by being redirected.  Even though the attack was blocked.

  • In some cases fo the configurations, the tendency to analyze specific re directions were designed for Apple iPad and iPhone users.

These victims are redirected to a malicious web server that is hosting a Blackhole kit.  The infrastructures use compromised DNS servers, that's how they are able to get into them.  There is belief that the infection vector is not unique.   It can not be attributed only to installations of cPanel as a result of solely a fraction of the infected servers square measure exploitation this management software system.  This malware doesn't propagate by itself and it doesn't exploit any vulnerability during a specific software system.  Linux/Cdorked.A may be a backdoor, employed by malicious actor to serve malicious content from legitimate websites.


Typical Linux/Cdorked.A configuration


Thanks to the system administrators and Sucuri, the code has been reviewed and analyzed.   The configurations so far are only with a single URL.  The redirect is served to people using Internet Explorer or Firefox on Microsoft Windows XP, Vista or 7.  iPhone and iPads are also victims, they are not directed to the exploit kit but instead pornographic websites.

IPhone malicious content
Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

Redirection Stats


In analyzing web traffic of the targeted websites, over 400 were identified with being affected by Linux/Cdorked.A.  50 of those sites are in the 100,000 websites ranked by Alexa.  All of these re directions have something in common.  The efforts in keeping their operation under the radar are putting in as much resistance as possible.  These sites are more concerned with not being detected instead of infecting as many as possible.


Hijacking the DNS


The URLs on the Linux/Cdorked.A infected servers adjust often.  The domain usually looks like numbers or letters.  The sub domain also matches a 16 character hexadecimal string.   The numbers at the beginning of the domains were hosting sites and shared hosting servers.  The pages that show pornographic images and links contain an iframe leading to the Blackholde landing page.  There is no clarity on if the pornographic domains are malicious or referred.

It is recommended to keep browsers, browser extensions, operating systems, and third party software like Flash players and PDF's up to date to avoid these infections.  Antiviruses are always recommended.

[via:WeLiveSecurity]

Friday, July 5, 2013

Phishing Scams: Think Before You Click

Cyber-criminals are installing malicious software onto your computer and taking everything they can with a click-of-the-mouse.  Phishing emails, scam websites, and suspicious phone calls are all designed to make them money at your expense.   With the use of social engineering, cyber-criminals are able to convince people to install malicious software without you knowing you are handing over your personal information.  So beware when you start seeing spam mail bombarding your accounts or annoying unknown numbers popping up on your phone.

Recognizing Phishing Phishing Email Example


Online banking and e-commerce are pretty safe, but giving out your personal information or financial material should be done with caution.

  1. Think before you click.

If something looks too good to be true, it most likely is.   Be aware of the websites you are on and information they contain so you don't get caught up in the glitz and glam of a thought out scam. If there are a lot of spelling errors or bad grammer, know that it might be a scam.



  1. Trust who you know, not their emails

Don't trust unsolicited files or embedded links, even if it's from your friend. Look at the subject line of your message or link to determine if it's unreadable or looks foreign. If you have no idea what is on the page, don't click on it just to satisfy your curiosity. Be smarter than the malware.



  1. Don't be fooled

Cyber-criminals are smart, they know ways to disguise a link to make it look as if it's something safe. Malicious links are sometimes disguised in phishing e-mails with known company's to make you think they are legitimate. Validate the page and roll your cursor over the link to see if another link shows up, you will know if this link will redirect you to another site or not.



  1. Short URL's

A technique for hiding malicious links are hiding it through a URL shortener. This is a service that Twitter uses to shorten long URL's. TinyURL, bit.ly, and t.co are all legitimate Short URL services that can be used.



  1. Don't be threatened

Be on top of your game. Cyber-criminals often use a threats to put you into a panic and catch you off guard. If you receive mail that you are being sued or an account is being closed, make sure you do some research before pulling out your pocketbook.



  1. Spoof websites

Scammers use graphics in emails that appear to be attached to a legitimate site. When clicking on these websites it will direct you to the real site but penetrate your screen with a mass amount of pop-up windows. Be wary ofirresponsible clicking when surfing the net.

Phishing Diagram



Fishy phone calls


Cyber-criminals might call you to offer help with solving computer problems, or sell you some kind of software license. Do not take these unsolicited phone calls. You might be persuaded into giving out your account information or personal information that could be the birth of identity fraud.


If you are a victim or are suspicious of any phishing activity, please report to Anti-Phishing Workers Group at www.antiphishing.org.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

http://www.welivesecurity.com/2013/05/29/phishing-the-click-of-death/

http://www.antiphishing.org/

http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

Tuesday, July 2, 2013

Instagram Bombarded with Fruit Attack

Instagram Fruit Spam

We all love showing the world our captured moments through Instagram.  This weekend many of you have noticed a plethora of fruit filled pictures popping up on the photo-sharing network.  Those photo's weren't all of your friends showing off the delicious seasonal fruit they were enjoying.  It was a mass spam attack that seized the network!  So don't give in to these photos with messages advertising for a great new miracle fruit diet.


The Juice


Fruit filled photographs began showing up in users' feeds, linking to fake BBC pages.  With headlines like, "Tropical Fruit Burns 17 Pounds in 22 Days. "  Or, "I saw it on the Dr. Oz show, this really works!"

These images were linked using the URL shortening service Bit.ly, disguising the real alias.  Now Bit.ly has issued a warning on the link, and Instagram confirmed the attack via email, according to a report on GigaOM.  Users have been experiencing the spam incident with the unwanted photos blasting on their accounts.  "Our security and spam team quickly took actions to secure the accounts involved, and the posted photos are being deleted.” reports GigaOM.

The Facebook-owned company admitted that "a small portion of our users experienced a spam incident where unwanted photos were posted from their accounts involved, and posted photos are being deleted."  The distorted view of a  "small portion" are more like 30,000 clicks to these deceiving photos.  There are over 130 million users on Instagram world-wide,  this photo-bomb is the first spam attack on the app.  A quick password reset and a little knowledge of who usually posts what kind of photos, can keep your personal information and computer safe.


Get the Facts



  •  The free photo sharing app allows users to "filter" their image and share with friends through social networks.

  •  When Instagram launched as an iPhone app, it hit one million users in two years

  •  April 2012 Instagram was aquired by Facebook for 1 million $ in funds and stock

  •  About 58 photographs are uploaded to Instagram each second

  •  One new user is introduced to Instagram per second
Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:

Instagram hit by fruity spam attack
http://www.welivesecurity.com/2013/07/01/instagram-hit-by-fruity-spam-attack/
Published on July 1, 2013

Beware of Fruit: Instagram Experiences a Massive Fruit Diet Spam Attack
http://petapixel.com/2013/06/30/instagram-experiences-its-first-massive-spam-attack/
Published on Jun 30, 2013

Facts about Instagram
http://www.seemycity.com/about/some-facts-about-instagram/

Image courtesy of [adamr,rakratchada torsap] / FreeDigitalPhotos.net

Friday, June 28, 2013

Google Goes Wild

Google Trekker has revealed their street view expansion project is being taken to new heights.  Google is recruiting  third-party organizations such as non-profits, tourism boards, research organizations, government agency's, Google Trekkerand universities to literally "take a hike"!   These hikers will strap on the Street View Trekker back-pack equipped with a 15-lens camera system that takes photos every 2.5 seconds.  The lens sticks up over your head to get a 360-degree view of the world less traveled.  It works similarly like the Google Maps Street View car cameras.

So now you can be a part of history, by taking the world to the secluded islands of Indonesia, or through the thick jungles of Costa Rica.  Hikers will gain the ability to visualize their hike before they even start packing for it.


"With 360-degree interactive imagery of the islands, people all over the world can see and explore the beautiful islands before they go, including some remote and hard-to-reach places they may never have discovered on their own," Google Street View program manager Deanna Yick wrote in a blog post.


Trekker for All Around TravelTrekker Trail


This amplification of the Trekker program will likely inspire people to travel more often, in turn boosting our Travel and Tourism.  Google is very ambitious to, "build the very best map of the world."   The decision to partner with third-party organizations are going to move this project along at lightening speed.   In March, Google Maps released a way for on goers to  visit the peaks of Mount Everest, Kilimanjaro, Aconcagua, and Mount Elbrus.

If you're heading to someplace awesome and want to take the world along with you, sign up for the Trekker backpack and start planning your adventure.   So instead of taking the guided tour on your next vacation, you can be our tour guide.  Happy Travels!

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:
Google loans out Street View Trekker for global exploration
http://news.cnet.com/8301-1023_3-57591455-93/google-loans-out-street-view-trekker-for-global-exploration/
Published June 27, 2013

Capture the World With a Borrowed Google Trekker Backpack
http://www.wired.com/gadgetlab/2013/06/borrow-a-google-trekker/
Published June 28, 2013

Google Trekker Gets You Off-Limits Access To Exotic Locations Like The Island From Bond’s Skyfall
http://techcrunch.com/2013/06/28/google-trekker-gets-you-off-limits-access-to-exotic-locations-like-the-island-from-bonds-skyfall/
Published June 28, 2013

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Thursday, June 27, 2013

XBox Update

Microsoft is bowing down to the fans.   They have removed the draconian restrictions on the Xbox One!  When the XBox One was first introduced, fans expressed great concern that  the system might demand unreasonable online requirements...they were right!  So now you don't have the internet check-ins every 24 hours and no fees for the used games.   If users didn't check in every Xbox One24 hours, Microsoft would block the entire games library.  Users would then be limited to only TV and Blu-ray ffunctionality.   Now the system only requires the internet set-up once during installation.   Even though, the system isn't as smart as we would like it to be.  When playing games online, you still have to make the connection, but offline, single-player games can be played for days, months, or however long you wish.

The XBox One will allow users to lend games freely among themselves, the same goes for the XBox 360.
"There will be no limitations to using and sharing games" - Don Mattrick, president of Microsoft's Interactive Entertainment Business

This "sharing" applies to disc-based games, even though, there is no convenient way to share downloadable titles.

One potential drawback is that the Xbox One disc-based games will require the disc in order to function, as does the Xbox 360.    Users used to be able to install entire games from discs.    Microsoft has not told us why this functionality was removed, but it may be to provide downloadable versions of titles with a feature to set them apart from physical copies.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

[TechNewsDaily]

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Head-To-Head: Samsung vs. Apple


Apple-Samsung


Samsung ATIV Book 9 vs. Apple MacBook Air


The newly announced slim Samsung ATIV Book 9  runs Windows 8 comes with an industry-leading 3200 x 1800 display , but can it hold a candle to Apple’s newest Retina Display MacBook Air?  The two competing flagships seem evenly matched for the most part.

Samsung has tinkered with the 9's hinge to make it lock in place when open, for more stability.  If you want more leverage, you can disable the screen lock and push it back so it lies flat onto your surface area. With the battery pack withstanding 9 hours of life, this puts it in the same ballpark of the MacBook Air.  In comparison to Samsung's new line with Apple's latest MacBook Air series, which launched June 10.  There is mention that Apple, always on the cutting edge, built its new line using a chip that was unveiled only a week earlier--Intel's 4th generation Haswell chip, its most advanced and power-efficient processor to date.
New Specs

In performance, Apple’s 13-inch Retina Display MacBook Pro comes equipped with a 2.5-GHz dual-core Intel third generation Core i5 chip with 8GB of RAM configurable to Core i7.  If you opt for the $1,699 version instead of the $1,499 edition, you’ll get a slightly faster 2.6-GHz CPU instead.  Samsung’s ATIV Book 9 Plus comes with Intel’s new fourth generation Core i5 CPU and is configurable up to Core i7 with 8GB of RAM.

The Run Down


Currently, the Samsung ATIV Book 9 has better specs in every category with a newer processor, sharper screen, lighter chassis and higher-resolution screen.  With that said, the MacBook Air has Retina Display with a bigger battery life of Lithium polymer and 10 hours of movie playback or 12 hours of wireless web. As well as the Intel HD Graphics 5000 processor, and supports multi digital output ports with optional adapters. The ATIV Book 9 comes with a 1.4GHz Intel Core i5 2537M CPU with Intel HD Graphics 3000 and 1600x900 maximum resolution. Adding more pixels is great, but color quality is equally important, particularly when both displays are sharper than many human eyes can see.

Samsung offers seven different models while Apple is a bit simpler. Samsung's product is compelling compared to the MacBook Air, it stands up in nearly every aspect. With the MacBook Air, for about $100 more you get the same specs with a slightly lower resolution and slower dual-core but with more HD capabilities. So you choose...


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:



CRN
http://www.crn.com/slide-shows/mobility/240156973/head-to-head-samsung-ativ-book-9-vs-apple-macbook-air.htm?pgno=1
Published by Edward J. Correia June 20, 2013

CNET
http://www.cnet.com/laptops/samsung-ativ-book-9/4505-3121_7-35796875.html
Published on June 20, 2013

LAPTOP
http://blog.laptopmag.com/ativ-book-9-plus-vs-macbook-pro
Published by Lisa Eadicicco June 20, 2013



Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Tuesday, June 25, 2013

Your Privacy is at Risk!

The Spy Next Door: Private Surveillance Has Never Been Easier



Government Spying
Do you feel like your personal information is being freely thrown around at your expense?  Not only can the government  spy on you, surveillance hardware and software are just a purchase away. These spying tools have never been more accessible or affordable than they are now.  Understanding how your privacy is at risk can help you gain control of your life.

What's more, the legal regulations dealing with privacy are unpolished and lacking in clarity. In other words,


"There's never been a better time to be the spy next door." -TechNewsDaily



To purchase the necessary spying gear isn't that hard. All you need is money!

Spy-goers can purchase cameras disguised as dictionaries, alarm clocks, house plants, desk lamps, teddy bears and sunglasses, from the range of $95-$300.

We're talking about going all James Bond status with the purchase of a few gadgets.


A License to Spy


Aaron SwartzThe Fourth Amendment protects against unreasonable searches and seizures. The wording of the Amendment is geared specifically towards the government, it does not apply to private citizens performing these acts.

Cindy Southworth, vice president of development and innovation at the National Network to End Domestic Violence, says that domestic surveillance becomes illegal when it becomes systemic.
"If you walk by once and hear something versus if you walk by every day for a year, that's a very difference. It's what differentiates domestic violence and stalking from other things. It's a pattern of behavior."


Aaron's Law


Legislation that would make it more difficult for the government to prosecute people for violating an online company's terms of service was introduced on June 20th, 2013 by U.S. Rep. Zoe Lofgren (D-Calif.).

The bill is called Aaron's Law. This is in remembrance of the activist Aaron Swartz. If passed, this law would modify the Computer Fraud and Abuse Act (CFAA), the law makes unauthorized use of computers or digital technology a federal offense. This bill would remove noted redundancies in the CFAA at which point a person can be charged multiple times for the same crime.

Swartz  was charged in 2011 for allegedly using Massachusetts Institute of Technology servers to download a total of 4 million academic journal articles from JSTOR, a digital library that offers subscription-based access.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

[via: technewsdaily]

Jillian Scharr, TechNewsDaily Staff Writer
Published June 20, 2013
http://www.technewsdaily.com/18402-spy-next-door.html?cmpid=527305

http://www.technewsdaily.com/18404-aarons-law-hacking.html?cmpid=527305



Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Monday, June 24, 2013

Disposable Hardware

Coming To the Point Of Disposable Hardware


Today powerful hardware is available in the market for such cheap rates that researchers are considering developing hardware that is disposable. Due to the competition in the market producers today are coming out with more and more affordable gadgets. Today we can buy Android tablets for thirty dollars. Many people would assume that the specifications are terrible, but the truth is that it comes with a ten inch screen, fully Wi-Fi enabled, four GB worth of storage space, and a 512 RAM running the Android 4.1 software.
Disposable Hardware


What You Lose to Win


The truth is, today you lose almost nothing to get a bargain. Quite a few of us would doubt low cost hardware since we have this pre-conceived notion that the lower the cost for such gadgets, the lower the quality. Surprisingly however, you actually find that although the cost is dropping drastically, the hardware quality remains top-notch. An amazing feat, today you may purchase video recorders at eight dollars, cell phones at a meager eleven dollars (without a contract), and even a touch screen video player at less than thirty dollars a pop.


How Disposable Hardware Will Help


The fact is, although today you are able to get hardware at a reasonable price, people want more. This unfortunately means that whenever there is a new model out, the previous one is considered outdated, and is soon tossed. There are schemes where you get discounts for returning old hardware, however, something slightly more environment friendly could be incorporated.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

Hack Things
http://www.hackthings.com/get-ready-for-disposable-hardware/

Disposable Hardware
http://www.computorcompanion.com/LPMArticle.asp?ID=356

Android 4.1
http://gigaom.com/2012/09/24/android-4-1-update-samsung-galaxy-s-iii/



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Wednesday, June 19, 2013

Sony PS4 Remote Play

Remote Play with the PS4 and PSP Vita


PSP Remote Play



At the reveal event for the new Sony PS4, it was mentioned a few times that the new update to Sony’s gaming console the PlayStation may be able to interact with its equivalent handheld device, the PSP Vita. The newest IP, Knack, was used by Mark Cerny, a famous video game industry figure, as a demo piece to show how the device need not be connected only to your television set. Remote Play is an option that has been available in many previous versions of the PlayStation, but had not been supported well. You may now experience a new generation of gaming where you have the option of gaming on your console while you are connected to the internet.


What’s Good and What’s Not


Live streaming theoretically allows you to use your handheld PSP while you are on the move, and yet be connected to your console at home. This is similar to the way Microsoft’s Nintendo Wii U’s new gamepad controller works. Sony is trying to bring forth this feature, as it is under-used today, and is trying to propagate the usage of this option in gaming consoles worldwide, not only restricted to their own appliances. If everything goes as expected, Remote Play could become a feasible option and may even go to become standard for any new releases related to gaming consoles or other hardware devices. The only place this option is not feasible, however, is the fact that some titles require the camera of the PS4 for the entire experience.


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:

PS4 Gaming Requires Remote Play Compatibility
Published June 1st, 2013 - http://www.bit-tech.net/news/gaming/2013/06/01/ps4-games-require-vita-remote-play-compatib/1



PS4 Games Require Vita Remote Play
Published May 30th, 2013 - http://metro.co.uk/2013/05/30/ps-vita-remote-play-mandatory-for-all-ps4-games-3820266/



Sony Mandates Vita Remote Play
Published May 29th, 2013 - http://www.eurogamer.net/articles/digitalfoundry-sony-mandates-vita-remote-play-for-ps4-games



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Wednesday, June 12, 2013

Malware on the Rise

Microsoft is clearly the industry leader in terms of operating system and it still has a firm hold over that position. In recent times, the company has had a quiet time in terms of security risks, especiallyBackdoor Malware after the introduction of  Windows 8. However, a new type of malware is being distributed for the Windows OS through German spam that affects the boot record of the infected computer. Also, this malware can also give the hacker control of the infected computer.

Distributed Via Attachment


Trend Micro was the company that was responsible for the detection of this new type of malware. The researchers who analyzed this malware said that it was attached to the German spam mail, and is code named BKDR_MATSNU.MCB. The mail will claim that the recipient has to pay some money to the sender, and all the relevant details have been attached to the mail. Trend micro researchers claimed that this method is very effective in influencing the recipients to open the attachment.



Ransomware Reaction


Once the malware is downloaded and installed on the victim’s computer, the data is collected and sent to the hacker who planted the malware. Once that is done, the malware is capable of erasing the boot record on the drive, erasing data, and also locks the screen of the computer. The victim is then asked to pay a certain sum of money if the screen has to be unlocked, the classic ransomware approach.

 

Links:

German Ransomware Threatens Victims, Disables PCs | Security ...

www.technewsdaily.com/18282-german-ransomware-disables-computers...

6 days ago – If you become a victim of the BKDR_MATSNU.MCB ransomware, getting it off of your system may not be as simple as running a virus scan.

 

Compromised Japanese Sites Lead to ... - Threat Watch

www.trendmicro.eu/smartphone/content.php?m=TrendLabs...i...

Jun 5, 2013 – Like any backdoor, BKDR_MATSNU.MCB performs certain malicious commands, which include gathering machine-related information and ...

 

Backdoor.AndroidOS.Obad.a, an Advanced Android Malware Threatens Users

http://thedroidguy.com/2013/06/backdoor-androidos-obad-a-an-advanced-android-malware-threatens-users/

Jun 8, 2013 - A known computer security company revealed that there is an advanced Android malware..

 

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

 

Super Malware that Attacks Android Discovered

Android and security threats go almost hand in hand as new and imminent Android_Malware_Newsthreats are discovered on almost a weekly basis in today’s market. However, there was no threat that could potentially uproot Google’s Android as one of the most popular mobile operating systems in the world. But all that is set to change now, as a new virus has been detected that is very advanced and attacks the Android operating system in a new and innovative way. Also, the code is a little hard to completely remove, and can potentially detract users from using Android in the future.

Super_Malware_Android

Deadly Characteristics of the Virus


When a security researcher performs an assessment of any malicious software, he or she considers the most dangerous traits of that malicious software. From that viewpoint, this is one of the most dangerous Android malware discovered. Firstly, the code is so complex that it looks almost like a code that is written for a Windows computer, or even more advanced. The code also uses obfuscation techniques to confuse the OS about its true nature, thus evading detection. But the most dangerous trait of this malware is that it has been programmed to resist attempts of uninstallation by the user.

Kaspersky Labs behind the Discovery


Kaspersky, a leading security products company, detected this malware in Android and said that is has the capability of single handedly bringing down the Android operating system. They also reported that this malware exploits vulnerabilities in the Android OS that were previously, quite literally unknown.

References:
Android super-malware discovered – Is Google's platform in peril ...

virusfreephone.com/.../android-super-malware-discovered-is-googles-pla...

View shared post

4 days ago – Android super-malware discovered – Is Google's platform in peril? ... Android Mobile Attacks Spreading Across The Globe, McAfee Finds ›.

Android super-malware discovered – Is Google's platform in ..

malware.rsspump.com/?...android-super-malware-discovered--is...

View shared post

4 days ago – Android super-malware discovered – Is Google's platform in peril? ... and anti- malware software in light of the recent malicious attacks across  ...

Saturday, June 1, 2013

More Digitally Signed Versions of OS X Spyware Found

The Mac has been one of the highly targeted operating systems for the online miscreants and it seems that the ‘KitM’ spyware has more versions than the online security firms had found. The KitM had caused a huge uproar in the Mac community due to its effect. Recently, researchers reported that they found the spyware from as long ago as 2012 December. This version was apparently targeting users who converse in the German language.

 

mac_spyware



What is HackBack?


The KitM virus is known by a lot of other names, ‘Kumar in the Mac’ and ‘HackBack’ being the most prominent of the lot. According to the security threat researchers that unearthed this spyware, this is a typical backdoor program. The spyware has the capability of taking screen shots of the infected computer screen without authorization, and sends these shots to the command and control server. The command and control server, also known popularly as C&C, is controlled by the miscreant that planted the spyware.

Another dangerous activity that the KitM virus enables is the reverse shell opening. This shell will enable the hacker to control the infected computer from the C&C server. Commands can be executed, data can be stolen, and the range of activities that can be executed is virtually unlimited.

 

Signed with Apple ID


The most amazing property of the KitM spyware, detected in a human rights activist’s computer, was that it had a valid Apple employee ID as a digital signature. The ID corresponded to one Rajinder Kumar. This enables the spyware to actually bypass the security checks of many older versions of the Mac system.

 

Reference Links:

Researchers find more versions of digitally signed Mac OS X spyware
www.macworld.com/.../researchers-find-more-versions-of-digita...

by Lucian Constantin - in 98 Google+ circles

May 23, 2013 – Researchers find more versions of digitally signed Mac OS X spyware. Security researchers have identified multiple samples of the recently ...

 

Slyck.com • View topic - Researchers Find More Versions Of ...
www.slyck.com/forums/viewtopic.php?t=61458

May 23, 2013 - 1 post - 1 author

Security researchers have identified multiple samples of the recently discovered " KitM" spyware for Mac OS X, including one dating back to ...

 

Researchers find more versions of digitally signed Mac OS X spyware
www.phoenixlocalshops.com/researchers-find-more-versions-of-digitally...

May 23, 2013 – Security researchers have identified multiple samples of the recently discovered “ KitM” spyware for Mac OS X, including one dating back to ...

 

Researchers find more versions of digitally signed Mac OS X spyware
news.yahoo.com/researchers-more-versions-digitally-signed-mac-os-x-1...

May 23, 2013 – Researchers find more versions of digitally signed Mac OS X spyware ... of the recently discovered "KitM" spyware for Mac OS X, including one ... Dog Found Standing Guard Over a Tornado Victim Reunited With Her Owner ...

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License.

Friday, May 31, 2013

Rumor's Claim that iOS 7 is to be Completely Overhauled

The worldwide developers’ conference to be held in June is being hotly anticipated for the announcement or launch of the latest version of mobile operating system form Apple, the iOS 7.  According to well-placed sources, Apple is currently in the process of virtually overhauling the existing framework and UI for the iOS, and will come up with a completely new version. If the rumors are true, there is another bit of news that might disappoint fans and experts.  Apple is on the path to make the interface simpler, shedding the lifelike graphics interface that was immensely popular with the users.
black_white

Black, White and Flat


The terms that are being used to describe the new version of iOS, the iOS 7, are black, white and flat. Unnamed sources quoted that Jony Ive, the VP of Industrial Design at Apple, is in favor of a very simple interface for the iOS 7, and that is one of the reasons why we will see a toned-down UI.  The source added that there have been talks of replacing the popular color schemes of the iOS like linen and leather, with dour shades of black and white.

A Genius on the part of Apple?


Apple has been known to pull the rabbit out of the proverbial hat time and again, and it seems like the rabbit has to come out this time, if this rumor is true. People appreciate the iOS interface for its lifelike appearance and a black and white scheme could cause a major hit to Apple’s popularity. However, all we can do at this point is wait for June.

 

ios


 

Reference Links:

Apple Rumored to Go Black, White and Flat for iOS 7 - Mashable
mashable.com/2013/05/24/apple-ios-7-flat-report/

by Christina Warren - in 924,125 Google+ circles
May 24, 2013 – While we previously heard rumors that Ive was planning a broad UI overhaul with iOS 7, we didn't have many specific details. Now, 9to5 Mac is ...

 

Apple iOS 7 Rumors: Jony Ive Will Cramp Microsoft's Style With ...
www.huffingtonpost.com/.../apple-ios7-rumors-jony-ive_n_3331637.ht...

7 days ago – Apple's iOS 7 is coming, and the iPhone is getting a complete design overhaul, or so the rumors go. The main words used to describe the ...

 

Latest rumors suggest iOS 7 to be "black, white and flat all over ...
www.imore.com/latest-rumors-suggest-ios-7-be-black-white-and-flat-all-...

May 24, 2013 – The latest rumors surfacing about iOS 7 suggest that it will be "black, white ... Those are two completely different fields of design. ... IMHO, Jony Ive will be focused more on improving 'usability' rather than overhauling all UI elements. .... fans, the same ones who claim to love iOS stale icons right now but will ...

 

Jony Ive's iOS 7 remake: black, white, flat all over
www.idownloadblog.com/2013/05/24/jony-ive-ios-7-black-white-flat/

May 24, 2013 – Now comes a claim the design change of the upcoming iOS 7 will ... Bloomberg: Apple's design guru Jony Ive 'methodically reviewing' iOS 7 overhaul .... It makes little sense when there are more rumors than ever saying .... Sounds completely like a WinterBoard theme is all iOS 7 brings to the table…lame.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License.

Wednesday, May 29, 2013

Most Mobile Malware Target's Android Devices

According to the NQ report, one type of malware is delivered through app repackaging in which a user downloads a mobile application that looks legitimate but is actually a harmful program.

Malware can also be downloaded through fake websites when a user clicks on a URL that appears authentic but is not.

Mobile users can also be duped through so-called "smishing" -- a combination of the words SMS and phishing -- where a user receives a text message asking for personal information like a credit card number, e-mail address or social security number.

Android's malware not limited to bad apps


Apple IOS

Stels, an Android trojan delivered via fake U.S. Internal Revenue Service-themed emails, uses "an Android crimeware kit to steal sensitive information from the device," and also makes calls to premium numbers. Sullivan said the new threat “could be a game changer.”

Users on any mobile platform, including iOS, can be targeted with spam that directs them to malware websites. However, while previous exploits have been demonstrated to allow a visited website to crack the security on iOS to "jailbreak" the device, Apple has been vigilant about patching these flaws and distributing iOS updates that scuttle the profitability of discovered threats, effectively frustrating the malware business on iOS.



Here’s Symantec’s breakdown of the types of mobile threat it identified last year, with information theft being the most common threat. Add in user tracking and more than fifty per cent of the mobile malware identified was trying to steal user info or track their movements:

Mobile Threats

Check your phone: Nations with the most mobile malware - CNN.com
edition.cnn.com/2013/04/16/.../world-most-mobile-infected-countries
Apr 19, 2013 – Security threats from mobile malware are on the rise and nearly 95% ... Android devices were targeted by malware in 2012; Mobile devices in ...

Mobile malware jumped 163 percent in 2012, mostly on Android
www.techradar.com › ... › Mobile phones
by Matt Swider - in 89 Google+ circles
Apr 16, 2013 – Another reason Android continues to be the most malware-targeted mobile OS is that it's more popular in pirate-heavy countries like China, ......

Android Remains Main Target For Mobile Malware Writers Despite
techcrunch.com/2013/04/16/symantec-mobile-malware/
by Natasha Lomas - in 770 Google+ circles
Apr 16, 2013 – Mobile malware remains a small and nascent issue, especially when ... In fact, while Apple's iOS had the most documented vulnerabilities in 2012, ... But clearly the vast majority of Android malware lands on devices via the ......

Mobile malware exploding, but only for Android - AppleInsider
appleinsider.com/.../mobile-malware-exploding-but-only-for-android
May 14, 2013 – Malware targeting mobile devices is rapidly growing in both the number of ... but the only platform being actively targeted is Google's Android, which ... an exploit and chose to address it with a patch, most Android users would ...

Mobile Malware grows massively, Android targeted most » Phone
www.phonesreview.co.uk/.../mobile-malware-grows-massively-android-t...
Apr 15, 2013 – There will be many of us that have some kind of security software installed onto our computers especially if its running Windows, but this is not ...

Thursday, May 23, 2013

Malware Threat to ATMs

ATM-Malware-Takes-Off-2

Malware has been a big threat to computers and there have been a lot of problems caused by this type of malicious software. As if that was not enough, a forensics and security threat firm has announced a threat that malware can be used to target ATMs. Group-IB, the firm that announced these findings, said that malware can be used to collect data from the ATMs or swiping machines, and hack into the bank accounts. According to the study, the malware stores the data and sends it to the hacker who planted the malware whenever a network connection is available for transmission.

A Few Researchers Disagree


While Group-IB discussed their findings, the Director of Research at the University of Alabama, Gary Warner, said that malware cannot be used in the way Group-IB is announcing. He said that ATM networks are secured at multiple levels and something as simple as malware cannot get through the layers of encryption and firewalls. Typically, malware tries to exploit the weaknesses in the security that protects a system.

Bank Networks Vulnerable from Inside


Warner added that banks don’t have to worry about the attacks from the outside. He said that banks should worry more about someone from the inside planting malicious software into the bank networks as that is where the vulnerability is at its highest. He said that an auto load malware can be inserted as easily as plugging in a USB drive into the computer.The jury is still out on whether malware can affect banks from the outside or not, but the question is how severe the repercussions will be in case malware does attack a bank network.

[via Bank Info Security]