Welcome to my blog!

Meet the Author

Security is everyone's responsibility, fringilla nunc non, consectetur magna. Suspendisse potenti.

Looking for something?

Subscribe to this blog!

Receive the latest posts by email. Just enter your email below if you want to subscribe!

Friday, June 6, 2014

Windows 8 a 'threat' to China's security

Microsoft's Windows 8 has been branded a threat to China's cybersecurity in a state-backed news report.

https://ssl.bbc.co.uk/media/images/75320000/jpg/_75320136_021935474-1.jpg
China has worries about what happens to data stored on Windows 8 machines
China's CCTV broadcast a strongly critical story in which experts suggested it was being used to grab data about Chinese citizens.

The report comes only days after China banned the use of Windows 8 on many government computers.

Separately, other Chinese media firms called for tech firms that aided US spying to face "severe punishment".
US monitoring

In the story Prof Yang Min of Fudan University was quoted as saying that Windows 8 posed a "big challenge" to the nation's cybersecurity efforts,

"Microsoft would no longer open its Windows 8 source code to the Chinese government," he said. "However the security scheme of the Windows 8 operating system is designed to provide better access for Microsoft to users' database."

The report also suggested that Windows 8 was one of the methods the NSA was using to spirit data out of the country. China has been a consistent critic of the wide-ranging surveillance programme carried out by the NSA.

"Your identity, account, contact book, phone numbers, all this data can be put together for big data analysis," said Ni Guangnan, a member of the Chinese Academy of Engineering.

"The data might be a good way for the US to monitor other countries," he added.

In late May, China issued a notice which stopped Windows 8 machines being procured for government departments. The ban was apparently imposed because of a decree about energy-saving devices. However, many media reports said it was brought in because of fears over the security of the operating system.

Microsoft told CCTV that it was "actively co-operating" with the Chinese government on a review of its products to allay fears about what was being done with user data.

Many US tech companies were also criticised in the Chinese media for the help they have given to the NSA surveillance programme.

Yahoo, Cisco, Facebook, Apple, Google and others were described as "pawns" of the US government that had aided attempts to spy on Chinese citizens and steal secrets. All should be punished for their co-operation, said editorials in state-backed media.source

Bill to allow Tesla to sell cars in New Jersey advances.

A bill that would allow Tesla Motors Inc. to open four sales outlets selling the company’s electric cars in New Jersey gained approval from an assembly committee Thursday amid strong support from the environmental community.

http://www.northjersey.com/polopoly_fs/1.579240.1401981809!/fileImage/httpImage/image.jpg_gen/derivatives/box_650/0510b-telsa-50p-kk.jpg
The Tesla Model S rolling off an assembly line in June. The electric car was praised for performance and fuel efficiency.
The Assembly Consumer Affair Committee released the legislation - which allows the company to sells its vehicles directly to consumers, rather than through a dealership - after about an hour of almost of testimony that was entirely supportive.

The move comes about three months of the New Jersey Motor Vehicle Commission enacted a rule that required all new car vendors to sell their vehicles through a franchise, effectively shutting down two Tesla sales outlets - one in the Garden State Mall in Paramus and the other Short Hills. The two now operate as showrooms only, and can show but not sell cars.

Auto dealer groups argue that consumers are better served by franchise dealerships because they promote price competition and have more interest than dealers in responding to repair and recall issues. No dealers or industry representatives testified at the hearing.

Supporters of the measure said it should be passed because it would help control air pollution, create jobs and promote innovation.

“We can either embrace the fossil foolishness of the past” or pass the bill, said Jeff Tittle, executive director of the Sierra Club’s New Jersey Chapter. He said the measure would help the state tackle the fact that it has some of the worst air pollution in the nation.

Wireless computer of Intel will be the smart computer of 2016


https://upload.wikimedia.org/wikipedia/en/5/5b/Intel_i7_logo.png

Intel has been surprising people of this world since a long time. They are well known for their immense innovative ideas. Keeping that repute intact, they have come up with the idea of making Wireless computer this time. It is entirely a new concept in the world of technology.

This project is being done by the next generation platform of Intel called Skylake. They are expecting to launch this new form of Wireless computer by 2016 which will not require any cable for power or connections.

The senior VP of Intel who also turns out to be the general manager of PC client group explained this new technology at Taipei’s show. He said, “Charging, docking and display are few of those things which cannot be imagined without cables. But our new technology will be able to change this mainstream concept by eliminating cables.”

Cables have always been a matter of hassle and distress. Elimination of cable will take the technology of today’s world one step ahead. Intel has already made a sketch of how they are going to work and they have started their project too.

http://www.legitreviews.com/images/reviews/1060/intel_lynnfield_cpu.jpg
They will be using WiGig which is a new code of behavior for connectivity and docking. It transfers data at a speed of around 7 Gbps. WiGig connects to any laptop or tablet automatically as soon as it comes within the range, and disconnects as it moves away.

But most remarkable thing is getting power without using cables. Wireless computer will be using magnetic resonance for supplying power which can deliver power to more than one device. It can also pass power through a wood of thickness of 2 inches.

This form of delivering power has been demonstrated by charging headset, laptop, tablet and a cell at Computex by Skaugen. Wireless computer is going to be a huge success and will provide a new dimension to the computer world.


OpenSSL bug allows hackers to see private communication

The world hasn't yet recovered from the Heartbleed vulnerability in OpenSSL and now there's news of a new bug affecting the popular open-source security package. This recently announced, and already patched, exploit could allow an attacker to see and modify traffic between an OpenSSL client and an OpenSSL server.

https://s.aolcdn.com/dims-shared/dims3/GLOB/crop/3872x2546+0+0/resize/630x414!/format/jpg/quality/85/http://hss-prod.hss.aol.com/hss/storage/adam/7b8c7dc325713c36cb1a64484cc1314b/53294329.jpeg

This sounds worse than it really is. The extent of the issue is extremely limited because we're talking about specific versions of OpenSSL server. Plus, you need to be using that same server software on a client application, and the attack itself is quite a complicated affair.

The vulnerability, originally discovered in May by researcher Masashi Kikuchi, could allow for an attacker to lower the security of the communication between a client and a server using OpenSSL.

In fact, this point is key: the package has to be present on both ends and then the attacker has to use what's known as a "man-in-the-middle" attack, something not necessarily easy to do.

For the uninitiated, a man in the middle attack could be accomplished through a bit of compromised hardware -- like, say a router in your local coffee shop -- that strips the encryption from the information.

The bug affects all client versions of OpenSSL and servers on version 1.0.1 or 1.0.2-beta1, though it is recommended to update earlier versions as a precaution.

The biggest problem is that we don't really know how many of our applications are using this security package, as this information is not normally disclosed. That said, Adam Langley, a security engineer from Google, confirmed that desktop browsers such as "IE, Firefox, Chrome on Desktop and iOS, Safari, etc." are not vulnerable, as they don't use OpenSSL.


The problem is serious if all the required variables are in place, but you shouldn't worry about it too much. That is, if you're not a systems administrator. And you shouldn't even worry about using software with OpenSSL in general.

You may be surprised to hear this after the Heartbleed issue and this new problem, but the fact is that this latest exploit was discovered because there are more eyes reviewing the OpenSSL code, which means that the software is getting even better and safer.

Verizon demands Netflix stop messages on slow streaming


http://newsbcpcol.stb.s-msn.com/amnews/i/fc/5cf24d8b6bb83082248a15f372fa4c/_h0_w295_m6_otrue_lfalse.jpg

Verizon Communications Inc on Thursday demanded that Netflix Inc immediately stop displaying messages to customers that place blame on Verizon's broadband service for slow delivery of Netflix TV shows and movies.

The letter is the latest sign of tension between content providers like Netflix and Internet service providers over who should pay the price for companies that stream heavy traffic online.

In a cease-and-desist letter sent to Netflix, Verizon also asked the video streaming service to provide information including a list of customers on the Verizon network to whom Netflix delivered the notices, or face legal action.

"Failure to provide this information may lead us to pursue legal remedies," Verizon general counsel Randal Milch said in a letter to Netflix general counsel David Hyman.


In mid-May, Netflix started a test of messages displayed on the screen for some customers when a video is buffering. The messages say that there is congestion on the network of Verizon or another Internet service provider.

Netflix said on Thursday the test is continuing and meant to provide customers more information about their service, similar to a speed index that Netflix has published for months with a ranking of Internet service providers.

"This is about consumers not getting what they paid for from their broadband provider," Netflix spokesman Jonathan Friedland said. "We are trying to provide more transparency, just like we do with the ISP Speed Index, and Verizon is trying to shut down that discussion."

David Young, Verizon's vice president of federal regulatory affairs, told Reuters he felt the messages were part of a Netflix agenda to promote its views in Washington. Netflix has been urging the Federal Communications Commission to prevent broadband providers such as Verizon from charging Netflix fees for faster delivery of videos.

"That seems to be the motivation, to try to make a point or make points in that discussion that is going on in Washington D.C.,” Young said in a phone interview, though he wouldn't specify the issues.

In the letter, Verizon said the message's assertions were deceptive and inaccurate and that the responsibility for slow streaming on the site falls on Netflix.

Verizon said that in order to save money, Netflix relies on middlemen to distribute its content knowing that some of them have issues with congestion in some networks.

In April, Netflix said it reluctantly signed a deal to pay fees to Verizon to bypass those middlemen and deliver content directly to the company, ensuring faster speeds. But Verizon is still working to implement the needed architecture and expects to finish improvements by the end of 2014, said Young.

"I sincerely hope this is not a harbinger of things to come in terms of how Netflix treats its partners and our mutual customers," Milch said in the letter.

The Verizon notices came to light this week when a reporter who was a Verizon user tweeted about them. Comcast Corp, which also receives connection fees from Netflix, is not aware of any reports of Netflix buffering messages to its customers, a Comcast spokeswoman said.
Thursday, June 5, 2014

side share









side-share




==================

======================

==========================

<style type="text/css">
    #floating_bar {
    background-attachment:fixed;
    background:
        /* top, transparent White */
        linear-gradient(
        rgba(255, 255, 0, 0.2),
          rgba(255, 0, 255, 0.2)
        ),
        /* bottom, image */
        url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRj6dDS54KdFjPqsQH-_sOLcYYLRAweBhD9MF2Z0wkoxEvLZyehyodF1FxsXg4caw2PtI5dY2h2RmcpHAA_0Zk1HGGY3wghROU7h8c2RBuRDlQQ2aOt1iiCFrj1z5e63R3VndVGnMHUm5/s1600/bg.jpg);
    background-repeat: repeat;
    position:fixed;
    padding:0 0 3px 0;
    bottom: 30%;
    margin-left:-75px;
    float:left;
    border-top:2px groove #00a4ef !important;
    border-bottom:2px groove #ffb900 !important;
    border-right:2px groove #7fba00 !important;
    border-left:2px groove #f25022 !important;
    border-radius: 5px;
    -moz-border-radius:5px;
    -webkit-border-radius:5px;
    -webkit-box-shadow:1px 1px 1px rgba(0,0,0,0.2);
    box-shadow:1px 1px 1px rgba(0,0,0,0.2);
    z-index:10;
    }

    #floating_bar {
    clear:both;
    }
    </style>
    <div id='floating_bar'>
    <div style='margin:10px 0 5px 13px;' id='like'>
    <div class="fb-like" data-send="false" data-layout="box_count" data-width="40" data-show-faces="false"></div>
    </div>
    <div style='margin:0px 0 0 10px;' id='gplusone'>
    <g:plusone size="tall"></g:plusone>
    </div>

    <div style='margin:5px 5px 5px 6px;'>
    <a href="https://twitter.com/share" class="twitter-share-button" data-via="mybloggertriks" data-lang="en" data-count="vertical">Tweet</a>
    <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>
    </div>

    <div style='margin:5px 5px 5px 5px;' id='linkedin'>
    <script src="//platform.linkedin.com/in.js" type="text/javascript">
    lang: en_US
    </script>
    <script data-counter='top' type='IN/Share'></script>
    </div>
    <div style='margin:0px 0px 5px 10px;'>
    <a class="addthis_counter"></a>
    <script type="text/javascript" src="//s7.addthis.com/js/300/addthis_widget.js"></script>
    </div>
    <p style='line-height:10px; margin-bottom:8px; font-size:10px; font-weight:bold; text-align:center;'><a href='http://www.myblogger-tricks.com/2013/09/add-awesome-floating-sharing-bar-on.html' rel='nofollow' style='color:#777;'> Get Widget </a></p>
    </div>

=====================

==========================

Netflix blames slow speeds on Verizon, other Internet providers

Netflix Inc is telling customers that Verizon Inc and other Internet providers are to blame for slow speeds as the video streaming service pushes to avoid paying for faster delivery of its movies and TV shows.

http://newsbcpcol.stb.s-msn.com/amnews/i/ff/ec5efe65a3c7d2ea3b68e11dc2a/_h353_w628_m6_otrue_lfalse.jpg

Netflix has been calling on the U.S. Federal Communications Commission to do away with fees content companies pay to Internet service providers for smooth delivery of their services to consumers.

The FCC is expected to consider that idea as it seeks public comment on recently proposed Internet traffic, or "net neutrality," rules that suggest content companies should be allowed to strike "commercially reasonable" deals with broadband providers to give priority to their traffic.

"The Verizon network is crowded right now," reads a notice Netflix sent to some customers on the screen when a video is buffering.

Netflix is sending similar messages to U.S. customers of other broadband providers when the networks are congested, spokesman Jonathan Friedland said on Wednesday. The test began in mid-May and is reaching a few hundred thousand subscribers.

"We are testing ways to let consumers know how their Netflix experience is being affected by congestion on their broadband provider's network," he said. "At present, we are testing in the U.S. in areas serviced by many broadband providers."

Netflix for months has been telling customers around the world which Internet providers offer the fastest, or slowest, service through a speed index it posts on a company blog.

Verizon spokesman Robert Elek called the new alerts a "PR stunt."

"We're investigating this claim, but it seems misleading and could confuse people," Elek said.

In April, Netflix signed a deal to pay Verizon for faster delivery of its TV shows and movies. But the agreement has not taken full effect. Verizon is working to implement the needed architecture and expects improvements throughout 2014, a source with knowledge of the agreement said.

In a blog post on Wednesday, Verizon said Netflix chooses how to route its traffic. If speeds are slow, the company said, "the problem is most likely congestion on the connection that Netflix has chosen to use to reach Verizon’s network."

Netflix, which has raised concerns about the FCC's net neutrality proposal, has said it reluctantly agreed to pay Verizon and Comcast Corp for faster connections but believes the Internet companies should provide quicker delivery for free. Netflix Chief Executive Officer Reed Hastings argues free connections are key to ensuring "net neutrality," the equal treatment of data on the Internet.

Netflix may be trying to encourage customer complaints to regulators or broadband providers, BTIG analyst Rich Greenfield said.

"We suspect Netflix hopes (the buffering alerts) will generate enough call volume to ISPs, politicians and the FCC that it forces ISPs to rethink their paid interconnection policies," Greenfield said in a blog post.

U.S. technology companies beef up security to thwart mass spying

 A year after Edward Snowden exposed the National Security Agency's mass surveillance programs, the major U.S. technology companies suffering from the fallout are uniting to shore up their defenses against government intrusion.

http://newsbcpcol.stb.s-msn.com/amnews/i/9b/2055d69e3d38f4898c638dc48bbd9a/_h353_w628_m6_otrue_lfalse.jpg
Google on Wednesday said it was releasing a test version of a program allowing Gmail users to keep email encrypted until it reaches other Gmail users.
Instead of aggressively lobbying Washington for reform, Google Inc, Microsoft Corp and other tech companies have made security advancements their top priority, adopting tools that make blanket interception of Internet activity more difficult.

"It's of course important for companies to do the things under our own control, and what we have under our own control is our own technology practices," Microsoft General Counsel Brad Smith told Reuters. "I don't know that anyone believes that will be sufficient to allay everyone's concerns. There is a need for reform of government practices, but those will take longer."

As part of a "Reset the Net" campaign now reaching a mainstream audience, Google on Wednesday said it was releasing a test version of a program allowing Gmail users to keep email encrypted until it reaches other Gmail users, without the company decrypting it in transit to display advertising.

Google, Microsoft and Facebook Inc moved to encrypt internal traffic after revelations by Snowden, a former NSA contractor, that the spy agency hacked into their connections overseas. The companies have also smaller adjustments that together make sweeping collection more difficult.

"Anyone trying to perform mass surveillance is going to have a much harder job today than they would have even six months ago," said Nate Cardozo, a staff attorney with the civil liberties group Electronic Frontier Foundation.

Cardozo said the most-improved major company was Yahoo Inc, which went from not encrypting email by default to having protection comparable to that of its peers.

BUSINESS THREAT

The topic of boosting security has gained urgency after countries such as China faulted big tech companies as tools of a powerful U.S. surveillance state, and threatened to curb purchases of American tech products.

Surveillance opponents say the companies could do much more than they have. An NSA slide released last month by journalist Glenn Greenwald, titled "NSA Strategic Partnerships," touted "alliances with over 80 major global corporations" that supported the NSA's cyber offensive and defensive missions.

The slide named 12 companies, including the largest U.S. telecom carriers and Microsoft, Intel Corp, Hewlett-Packard Co and Cisco Systems Inc. None of those companies have renounced working with the agency or said that they would limit their cooperation to defensive measures.

All four of the tech companies in the group said they do not deliberately incorporate spying "back doors" into their products, but that leaves open a number of possibilities, including mandated or voluntary efforts to target individual customers or groups.

"Legally, the NSA can compel you to provide access to information," said Ashkan Soltani, a privacy researcher in Washington D.C. "The only way around this is to engineer systems to prevent access, or at least make it detectable." Google's new email tool is one example of that, and smaller companies are trying other formulas that retain little information about users.

PRESSING FOR REFORMS

The tech companies see improving their defenses as only the first step. Microsoft and other companies are also pressing governments to negotiate limits on cyber-spying.

A group of nine major companies formed a group called Reform Government Surveillance, which on Thursday took out newspaper advertisements urging the Senate to strengthen a House reform bill and ban bulk Internet surveillance.


Both Cisco and Microsoft also have said U.S. law should clearly protect data stored elsewhere. Smith said Microsoft would fight to overturn a recent federal magistrate's ruling forcing it to produce customer information from Dublin.

If that fails, Smith said, there are other means to draw the line at the U.S. border, including administration policy changes and new legislation.

Even if none of the three branches of government end up backing Microsoft's position, Smith said the company can change its business processes, such as by using joint ventures instead of subsidiaries, or its technology, such as by giving only users the encryption keys to their data.
 
© Copyright 2010-2014 Tutorneto All Rights Reserved.
Edit by Edit | Edit by Edit | Edit by Edit.