Loading

Monday, December 21, 2009

Protect Mobile Devices from Malicious Attacks

What you have a mobile device? and use it to access the network at your office? If so, be careful. Did you know if the mobile device can become the entrance malware, spyware and so forth? This does not just harm the user, but also can steal important company data. This occurs when the tool you use to access corporate networks, which may not be protected.

"The device moves and the number of users who continue to grow creating a larger target for the software and may be dangerous, including worms, viruses, and spyware," said Sean Ryan, Research Analyst of Mobile Enterprise Software, IDC. "Along with the continued rise in the number of mobile devices and the increasing need for information technology, the company needs to secure and manage these devices and the information in it increased significantly."

According to IDC research institutions, the number of convergent mobile devices, including notebooks, the world continues to grow. This year, the number predicted exceeded 167 million units. This number will continue to increase, with estimates of more than 291 million units in 2013, and grew 14 percent per year in combined (CAGR).

The amount of potential damage has triggered Symantec announces security strategy and management of mobile services. The focus is the integration of security and management solutions to reduce downtime, increase user productivity, improve response time and provide protection and management throughout the life cycle of mobile devices, including while on standby.

"Organizations need the control and management of larger companies to protect information and ensure user productivity - with less cost," said Art Gilliland, Vice President of Enterprise Security Group, Symantec. "Our mobile service strategy designed to protect and manage data wherever and automate procurement and supply, providing care and protection continuously, and non-activate mobile device immediately when the device is lost, damaged, stolen, or replaced."

What kind of management and security strategy to move Symantec services? There are three products, namely:
• Symantec Endpoint Protection Mobile Edition 6.0. Provide protection through advanced antivirus, firewall, and SMS anti-spam protection.
• Network Access Control Symantec Mobile Edition 6.0. Keeping the network access policy enforcement and e-mail in MS Exchange with Symantec Endpoint Protection Mobile Edition. Equipped logging, reporting, and centralized alert.
• Symantec Mobile Management 7.0. Improve efficiency with the implementation of IT applications and updates wirelessly.

Security solutions and mobile device management are made based Symantec Symantec Management Platform, and provides integrated management capabilities for enterprise-class desktops, laptops, servers, and mobile devices. This allows administrators to set and distribute the centralized security policies to mobile devices wirelessly. Timely content updates can be done through integration with Symantec LiveUpdate.

Predicted Malware Attacks Increased in 2010

Security solutions developer Kaspersky Lab has warned the risk of malware attacks increasingly nasty next year. Several types of attacks is expected to rise to attack the middle platorm popular today such as Google Wave, iPhone, Android, and Windows 7.  "Malware is much more sophisticated in 2010 and many antivirus programs will slow in the treatment of the infected computer because the file infection method and rootkit technology is increasingly sophisticated," said Alex Gostev, Director of Kaspersky Lab's Global Research and Analysis Team in the press release. He said the IT security firm will respond by developing tools to more complex protection. But a malicious program is able to pass these measures may be more or less immune to antivirus programs for some time.

According to the company's experts, in the coming years we will see a shift in the kinds of attacks against users from attacks through web sites and applications to attacks originating from file sharing networks. Since 2009 a series of mass epidemic of malware has been supported by the spread malicious files via torrent portals. This method has been used to spread threats such as the famous and TDSS and Virut first backdoor for Mac OS X. In the year 2010, predicted a significant increase in the incidence of this type of P2P networks (peer to peer).  Cyberspace criminals will continue to compete in the Internet traffic. Modern cyberspace crimes generate more and more efforts to legalize themselves, and there are many ways to earn money online with traffic in larger amounts that can be generated by a botnet that disusupkan applications to multiple computers and is ready commanded from a distance. Currently, most of the black-market services to take advantage of competing botnet traffic.

In the future, Kaspersky predicts the emergence of more transactions botnet scheme, called "partners program" where possible botnet owners to generate profits from such activities, send spam, DoS attacks or spreading malware without an explicit crime. Parties who want to stay memanaatkan pay the amount equivalent conducted infiltration.  However, predict a decline Kaspersky Trojan variants that occurred in the year 2009 through fake antivirus programs. The latter appears first in 2007 and in 2009 and seen increased activity of their involvement in a number of major epidemics. For example, worms Kido, install rogue antivirus program in the infected computer. The reason, fake antivirus market is now saturated and profits for cyber crimes decreased. In addition, these activities are monitored by the IT security companies and agencies of law enforcement. It is difficult to manufacture and distribution of fake antivirus programs.

In addition, attacks on Web services happen, Google would seem Wave headlines in 2010. The attack on Google's new service is no doubt going to use the usual pattern: first, followed by spamming phishing attacks, and then mengeskploitasi vulnerability and spread of malware. Planned launch of Chrome OS-based network is a noteworthy event, but the experts at Kaspersky Lab does not anticipate the emergence of interest in excess of the platform of this virtual world of evil.  Year 2010 will also certainly more difficult for the iPhone and Android. The first malicious programs for mobile platforms emerged in the year 2009, which is a sure sign that they have aroused interest cyberspace criminals. The only iPhone users at risk are those who have compromised devices, but the same can not apply for Android users are all vulnerable to attacks. Increasing popularity of mobile Android OS in China combined with the absence of effective checks to ensure the security application software will cause a third party a number of malware outbreaks with a high profile.

Detection of new vulnerabilities will remain a major cause of the epidemic. This vulnerability will be detected in the software developed by third parties (such as Adobe, Apple, etc..) And on Windows 7, the new operating system just memasukki market. If no serious vulnerability is detected, the year 2010 may prove to be one of the quietest year for some time.  In the year 2008, analysts estimate the company's increase in the global epidemic. Prediction was proven true since the year 2009 appears malicious programs by function sophisticated rootkits, worms Kido also known as Conficker, web attacks, botnet, SMS fraud and attacks on social networks.

Wednesday, December 9, 2009

Business Cooperation Microsoft and Yahoo Finally Signed

Yahoo-Bing

The business search engine and online advertising between Microsoft and Yahoo finally signed. Both sides claimed to have completed all parts of the cooperation agreement and hope to implement it starting next year.

"Microsoft and Yahoo believe this agreement will create an alternative search engine services more sustainable and more attractive, providing real choices, better benefits, and innovation for consumers, advertisers, and publishers," the joint statement released last Friday.

Memorandum of understanding between the two sides earlier agreed in July between CEO Steve Microsot Yahoo Ballamer and CEO Carol Bartz. In cooperation, they agreed to work together for ten years to compete with Google which currently dominate the market search engine and online advertising.

One of the main agreement is the Yahoo search engines will use artificial Bing Microsoft on their site. Yahoo also will get a share of advertising revenue earned from the Microsoft business search engine and ad network. The agreement is a form of compromise from Yahoo acquisition bid by Microsoft, but it was rejected several times.

Apple is Exploring the Acquisition Lala

Music Online

Currently Apple is exploring the acquisition Lala.com, an online service provider of streaming and downloading music. The presence of Lala is believed would end the era of MP3 because to enjoy music through the Lala can be done without the need to download it via high-speed streaming service.

In October, Lala.com cofounder Bill Nguyen demonstrates that the application can work on the iPhone. These applications provide 8 million song titles that can be heard live via the Internet. To be able to listen to a song, the user must pay a license at a price of 10 cents, but as soon as it entered the playlist of the song can be heard at any time.

Own voice quality is lower than the songs sold on iTunes. However, Lala developed technology enabling quick searches and direct songs can be heard in a short time. Laura cloud services apply technology in this service with a powerful streaming server.

Nguyen calls this concept as the beginning of the demise of MP3. However, Lala also provides download songs in MP3 format at a cost of 89 cents per song. By comparison, downloads on iTunes cost 69 cents per song. Lala also offers a streaming link to a profile posted on Facebook at the cost of 10 cents per song.

Lala is a new company that stood in Palo Alto, Caliornia. Launched in 2006 with an investment of U.S. $ 35 million from Bain Capital LLC, Ignition Partners and Warner Music Group Corp. The company debuted as a seller of online music CD sales but switch songs began in October 2008. For now, the new Lala services available in the U.S..

Speed SDXC achieve 300 MB/s

SDXC-memory

What you still remember the SDXC? This is a memory card format announced about a year ago. Unfortunately this card is less popular because of the standards / compatibility. However, recently reported, the standard SD memory card (Secure Digital) next generation, SD Specification Version 4.00, will be completed in the spring of 2010. This could mean that the cards will start SDXC can be bought in the early-or mid-2010. What is interesting?


Well, this card is suitable to answer the needs of high-definition video. For the promised transfer rate is 300MB/s, far above the rate of transfer of 104 MB/s which is currently offered by the SD Specification Version 3.00. To boost the speed, this card will use a new transfer scheme and also a new pin. Current parallel technology used will be replaced by serial transfer of technology, which will also be available for use in SD Input / Output (SDIO).

The goal is to make the bus SD can also be used as an internal bus in embedded systems, such as mobile phones. It is fun - but the leap is almost 3x the speed of folding - is the size and form factor of the ultra-fast SD card will remain the same as before. Parallel pins also remain there. This means that (theoretically) SDXC cards will be used, writeable and readable by the old SD card reader, of course at a slower pace.

Wednesday, December 2, 2009

His Girlfriend was Killed by Barbaric

Stewart Blackburn-KillerA British boy, Stewart Blackburn (18 years) charged with murdering his girlfriend, Jessica McCagh by burning. Jessica allegedly kicked, hit his head, then doused with gasoline and burned barbaric way. According to prosecutors at Superior Court Livingstone, Jessica lost their lives in the most horrible circumstances on April 25, ago. In the ninth session in court yesterday, the attorney general Frank Mulholland QC said Jessica died at the age of 17 years. Blackburn defendant admitted that his girlfriend died at the age of 17 years, but he denied murder. She was the girl who loved her family, but she died in a terrible state, and she burned to death."

"The core of this case, he burned to death at the hands of Blackburn Stewart, who poured gasoline and set fire to her body. This extraordinary crime. It's hard to imagine a cruel or sadistic treatment of other human beings like this." Therefore, the prosecutor urged the jury to convict the defendant guilty of murder. "You have to punish people guilty of murder, guilty of acts of barbarism and crimes against a defenseless young man."

The trial had previously been listening to confessions Blackburn as contained in the docket are made the police. Blackburn denied he had killed his girlfriend. He argued, the fire that appeared at that time, he turned on with the victim after they engaged conversation. But prosecutors insisted that Blackburn was the one who had killed Jessica. Mulholland said that Blackburn on the night in the drunk and angry. He deliberately pushed Jessica to a fence and hit his head.

"Violence like this is action thugs," said Mulholland. He also showed evidence that the previous Blackburn threatened to burn her boyfriend's family house with gasoline. Victim's parents, Garry and Marian McCagh, yesterday appeared in the High Court in Livingstone.
Why does the faith provision the advisory contempt?

Saturday, November 21, 2009

YouTube Introduces Automatic Text Translation

YouTube introduced a new feature that displays the text of all the conversations in the videos automatically. One of the benefits of this feature to meet the needs of visitors deaf / deaf-mute in order to enjoy the full video. Text translation to be done with voice recognition technology is now used in Google Voice management services. Google said the feature will begin to apply this week.

However, for the new will be done on the videos of some of the canal from partners like PBS, National Geographic, and several prominent universities. Google promises to text translator's voice will be applied in the entire video with voice recognition technology improvements are developed.

Hundreds of thousands of videos that appear on YouTube today is already equipped with the text through the service provided. However, to use it must be done manually by the user and added myself to the body of the video. With the number of the incoming video, the current average of 20 hours of video every minute, most of the videos that appear on YouTube has no text.

Even so, Google has updated the manual translation feature that is now with auto timing menu. Users simply make a text file containing the text of all conversations in the video and sound machine translation will match it to appear. Such a move is expected to boost the amount of video that has text.

Thursday, November 19, 2009

Found a Bug in Windows 7

Windows 7This may be a slap to Microsoft, a day after announcing his Windows 7 as a risk-free in the Microsoft monthly security bulletin, a bug of Windows 7 (zero day exploits) immediately found. Laurent Gaffie is the latest bug was discovered. Details have been presented in the Full Disclosure mailing list. Microsoft is currently investigating the reported defects, which basically makes the system that exploited Windows 7 will crash.

This crash caused by a flaw in Server Message Block protocol (SMB) which form the backbone of the Windows file sharing. When triggered, defects will cause endless loop that makes the computer can not be used. This weakness is detected in Windows 7 and Windows Server 2008 R2. But so far there has been no reports of attacks on vulnerabilities.

This weakness does not lead to remote access that is not legal that can cause important information theft or other malicious activity performed. One way to overcome this problem is to block TCP ports 139 and 135 to port 445, which will stop the SMB traffic from the network.

Google will Launch the Chrome OS for the Download

Google-Chrome OSOperating system from Google search engine authority, Chrome OS, ready to be downloaded next week. Thus the gossip on the Internet. The bad news, though Google says it has worked with Acer, Adobe, Asus, Freescale, Hewlett-Packard, Lenovo, Qualcomm, Texas Instruments and Toshiba on its OS Chrome, the number of devices that support earlier this operating system will be limited. According to TechCrunch, these limitations are due to the absence of support for basic components such as network interface hardware and graphics cards. As a result you will not be able to download the Chrome OS and run it on any machine.

Google initially said that the netbook that can run this OS will not be available to the public before the second semester of 2010. However, the code might be open (open source) in the coming weeks, as promised in Google Chrome Blog. Also Chrome web browser - Chrome should not be confused with the OS, despite the same name - will be coming to Apple machines in December. In a letter to the developers, Nick Baum (Project Manager Chrome browser) says that the Chrome beta version of 4.0 that was only available for Windows and Linux will also be present in the Apple Mac. For your information, Google launched Chrome browser in 2008 and currently still in experimental stages.

First Internet Domain Language Arabic

Domains using Arabic charactersShortly after the non-Latin characters can be used to address the web site, Egypt became the first country to propose a new domian name with Arabic characters. Domains using Arabic characters which reads ". Masr" means Egypt.

Technology Minister Tarek Kamel Egypt, Monday, expects that it can be further popularized the use of the Internet in developing countries. With the existence and content of Arabic web address, internet strived to reach wider segments of society are more familiar with local culture.

"The Internet is now in Arabic," Kamel says in the opening like the Internet Governance Forum. According to him, the new domain is a very important moment for Egypt. New domain in Arabic is believed will attract investment, innovation and economic growth.

Permit the use of Arabic domain name passed in the meeting of the Internet Corporation for Assigned Names and Numbers (ICANN), an independent body that regulates web addresses end of October and then in Seoul, Korea. Besides Arabic, non-Latin characters are also allowed to include China and Korea.

podcast directoryTopOfBlogsblog search directory Bloggers & Blogging Blogs - BlogCatalog Blog Directory

Strength of The Heroes of The City © 2008-2011, Template Source by template1st

TOP