Thursday, July 11, 2013

iPhone 6 Alert: World’s slimmest smartphone screen is here


Apple Inc. (NASDAQ:AAPL) remains embroiled with the numerous patent disputes with Samsung.

Even a US Court ruled yesterday that it violated antitrust law in a price-fixing case, saying the Cupertino-based tech giant “conspired to restrain trade” with publishers to boost the price of e-books. READ: iPhone-maker found guilty, vows to fight back.

In addition, Samsung's spearhead smartphone Galaxy S4 seems to be fighting its own set of fires. READ: Samsung Galaxy S4 catches fire while charging.

Grabbing that opportunity with both hands, smart smartphone-makers such as LG are quietly but quickly embarking on a road that made Apple Inc. as successful as it is today – the road to innovation.

This morning, LG Display showcased the world’s slimmest Full HD LCD panel for smartphones. The South Korean giant said it will soon unveil the screen in one of its premium smartphones, but did not reveal which smartphone exactly will be the first to sport it. However, with the company rumoured to launch the LG Optimus G2 in August, to beat the rumoured launch of iPhone 6 (or 5S, as the case may be) in September.

In fact, according to rumours floating around much before LG Display actually unveiled the world’s slimmest screen, the LG Optimus G2 will be so thin that it won’t be able to sport buttons on its side, and power and volume buttons have been taken off the side of the phone and LG has moved them to the back – which is another first. Until now, no smartphone maker has seemingly realized that since we hold the phone in our palm, we can use our index finger to control basic functional buttons. Still, it has to be a delicate balance between functionality and, well, complete inanity, and we’ll be quite interested in seeing how well can LG accomplish that.

There’s even a leak video that shows the functionality, and we must say it looks pretty impressive, at least in the first look. Coming back to the screens, smartphones with screens more than 5-inch have been generally criticized for being too bulky to be held in the average person’s palm, but LG Display maintains that its 5.2-inch panel features better “grip-ability,” as the screen will be just 2.2mm thin.

The state-of-the-art 5.2-inch panel is an exciting advancement for the premium mobile device market enabling sleeker Full HD smartphones featuring and a superior viewing experience, LG Display said in a statement.

Only 2.2mm thin with a 2.3mm bezel, LG Display’s new panel is both slimmest and narrowest among existing Full HD LCD panels designed for mobile devices. “Today’s introduction of the world’s slimmest Full HD LCD panel represents an exciting advancement for the high-end smartphone segment, and is possible due to our world-class expertise in IPS and touch technologies,” said Dr. Byeong-Koo Kim, Vice President and Head of LG Display’s IT and Mobile Development Group.

“LG Display will continue its commitment to developing products that maximise consumer value as well as opening new doors for the mobile and tablet PC industry,” he added.

This world’s slimmest Full HD LCD panel will provide larger visible display space on smartphones, critical as mobile devices are used for multimedia viewing more than ever before. Additionally, the panel will make devices easier to grip as well as lighter in weight.

Key to realizing the world’s slimmest panel is LG Display’s Advanced One-Glass-Solution (OGS), the latest touch technology enabling an enhanced touch screen experience, developed and applied to the new panel for the first time ever.

Dual Flexible Printed Circuits, superior to a single circuit, have been inserted between the panel and touch film, reducing the number of lines on the panel by more than 30 percent. Utilization of a direct bonding system has also resulted in Optical Clear Resin between the panel and touch film for greater brightness.

 The new panel’s superiority in displaying resolution, brightness, and contrast ratio results in enhanced outdoor readability. By utilizing 1,080X1,920 pixels consisting of Red, Green, Blue (RGB) sub-pixels, the panel is a true Full HD display.

And with a brightness of 535 nits at maximum, LG Display claims its panel outperforms all current mobile Full HD LCD panels. It adds that measuring contrast in real-life surroundings with Ambient Contrast Ratio results in a reading of 3.74:1 based on 10,000 lux, confirming the perfect performance of the panel even in strong outdoor sunlight conditions.

iPhone 6 Alert: World’s slimmest smartphone screen is here

Saturday, July 6, 2013

Internet-Wide Scan Finds Hundreds of Thousands of Ready-Made Backdoors


abney and associates hong kong reviews

Many poorly-secured company servers are exposed online, offering attackers ready-made backdoors to wipe or steal data.

A security researcher that (gently) probed every computer on the Internet to discover hundreds of thousands of unsecured systems (see “When One Man Pinged the Whole Internet”) has now repeated the exercise to find hundreds of thousands of servers that could be trivially taken over by an attacker.

HD Moore, chief research officer at Rapid7, did a fresh scan of the Internet after hearing about vulnerabilities in a standard component of servers that allows them to be monitored and controlled remotely. Independent researcher Dan Farmer recently showed that flaws in the design of many Baseboard Management Controllers (BMCs) mean they could all too easily provide unauthorized access and control, too.

Moore’s scan found 308,000 BMCs that used the problem protocol identified by Farmer. A total of 53,000 of them were configured in a way that allows access without a password; 195,000 stored passwords and other credentials unencrypted; 99,000 exposed encoded passwords that could be cracked by an attacker (Moore says that he unscrambled 10 percent in a preliminary test); 35,000 had vulnerabilities in the Universal Plug and Play protocol that Moore’s previous Internet scan highlighted.

Moore explains the consequences of what he found like this in an FAQ document:

“An attacker that is able to compromise a BMC should be able to compromise its parent server. Once access to the server is gained, the attacker could copy data from any attached storage, make changes to the operating system, install a permanent backdoor, capture credentials passing through the server, launch a denial of service attack, or simply wipe the hard drives.”

That information released by the researchers doesn’t reveal anything about what types of organizations are at risk, but the numbers make it clear that the problem is widespread. Moore told Wired that “essentially every modern company and government on the planet” relies on the flawed BMC protocol examined in his study.

These new results underline what Moore told us earlier this year, when speaking about his initial project to ping the entire Internet. Most public attention and industry effort is focused on the security of the computers on people’s desks, but it seems to common for powerful, core parts of IT systems to be exposed online.

Friday, June 21, 2013

NSA media hysteria misses the mark, abney and associates news bulletin

  
Recent revelations about U.S. government spying have fueled a media firestorm that has tacitly implicated programs unrelated to the more controversial electronic eavesdropping. In reality, these programs help to secure critical infrastructure, protect intellectual property, and make commercial software more reliable.

On Friday, Bloomberg ran an exposé overviewing U.S. National Security Agency (NSA) and other government initiatives to help software makers address security vulnerabilities. The programs it alludes to are voluntary and incentivize companies to share “zero day” information on security bugs and hardware specifications in return for access to classified intelligence information to defend their systems from hackers. The information is available to the U.S. government before it’s publicly disclosed. The fact that it’s happening isn’t very secret.

Cyber warfare puts infrastructure at risk from the power grid to stop lights. U.S. companies are frequently targeted in industrial espionage, and some systems have even been held for ransom by hackers. Ad networks like Google lose millions from sophisticated attempts at “click fraud” orchestrated by organized crime overseas. Companies that have been targeted and work with U.S. intelligence to protect their assets have said so.

Government involvement to address these issues is hot news in the wake of the PRISM leak controversy where it was “revealed” (some details were already known for years) that telecommunications and Internet companies were cooperating with the NSA to gather data. That snooping began illegally under the Bush administration, but Congress acted to shield participating companies from liability after it was done. President Obama carried the cyber spying forward and expanded its reach. It’s understandable that industry partnerships are under scrutiny, but it’s not another PRISM.

PRISM is presumably now legal, but secret interpretations of laws, shadow courts, a complete lack of judicial review, and the widespread nature of the program have upset civil libertarians and even some longstanding proponents. The author of the Patriot Act, which made some of this possible, now wants to see it amended. But none of that directly involves the aforementioned cyber security programs — even if press reports tie them in.

The Federal Bureau of Investigation, Defense Department and NSA all work with thousands of U.S. tech companies to fight cyber warfare. It isn’t used for spying (at least domestically), and isn’t anything that hasn’t been disclosed publicly. For instance, the NSA hosts a public Web site which describes what it does, so it’s not a new “scandal” or news to anyone — just fodder that media outlets use to generate Web traffic.

The NSA participates in a public worldwide effort to design and evaluate secure software called the Common Criteria Evaluation. The NSA’s expertise led to the creation of at least one ultra-secure operating system that has protected U.S. troops overseas, ensures that the complex systems found in commercial jetliners are reliable, and keeps vital infrastructure safe from attack. What exactly is the scandal there?  Nothing much.

Friday, June 14, 2013

Govt vurderer cyber sikkerhetsgruppe råd


reviews of abney and associates on cyber security

Regjeringen er vurderer å sette opp en gruppe for råd om hvordan å forbedre offentlig oppmerksomhet om risikoen ved cyber-sikkerhet, som Internett-baserte kriminalitet blir stadig mer utbredt.

Kommunikasjon og IT Minister Amy Adams til lanseringen av forumet Netsafe Cyber-sikkerhet Awareness Week i Wellington regjeringen vurderer å sette opp en rådgivende gruppeadresse landets mangel på nous når det gjelder web-baserte sikkerhetsspørsmål.

"Ett av alternativene som vi vurderer for øyeblikket er etableringen av en cyber-sikkerhet bevissthet rådgivende gruppe, slik at vi kan bidra til å fortsette å øke bevisstheten nasjonalt," sa Adams.

Regjeringen anslår cyber-kriminalitet koste New Zealand 625 millioner dollar det siste året, ifølge regulatory impact statement for regjeringen kommunikasjon sikkerhet Bureau Act gjennomgang, utarbeidet av avdeling av statsministeren og skap. Den eksterne Installasjonstjenesten blinket ut cyber-sikkerhetsrisikoer som en av de mest dynamiske delene i intelligens sektor.
Lovgivningen har vært tabled i parlamentet i forbindelse med endringer i telekommunikasjon (avskjæring evne og sikkerhet) regningen for å opprette en ny formalisert sikkerhet regimet for nettverksoperatører.
Regjeringen har trappet opp sitt engasjement for å bekjempe nettkriminalitet, med etableringen av National Cyber Policy Office innen avdeling av statsministeren og skap i fjorårets budsjett. Initiativet er tildelt $5 millioner over fem år.

Adams sa New Zealand kommer under et økende antall cyber-angrep med 149 forekomster av regjeringen informasjon og kritisk infrastruktur blir utsatt i år.

Cyber-kriminalitet har vært rettet mot immaterielle rettigheter og eierinformasjon, to voksende drivere av New Zealands økonomien, samt forbrukerbedrageri, sa hun.

Mens regjeringen må spille sin rolle, sier enkeltpersoner og bedrifter må også ta ansvar i å beskytte seg selv skjemaet cyber-kriminalitet, hun.


Thursday, May 30, 2013


abney and associates blog reviews, Erkunden Google Glass Technologie und kontextuellen computing im Unternehmen

Verbraucherorientierung heute ist vor allem über mobile Geräte und die Wolke, aber in Zukunft könnte es alles von der Kleidung, die Menschen zu tragen, um die Waschmaschinen und Trockner, die sie zu reinigen.Bei Solstice Mobile ein Chicagoer Entwicklung Softwareberatung und, Vice President von Technologie, Strategie und Umsetzung, Greg Cullen und sein Team sind aktiv auf der Suche bei Google Glass Technologie, andere Aspekte des kontextuellen computing und das "Internet der Dinge" und ihre mögliche Rolle in der Geschäftswelt. Dieses Konzept der Verbraucherorientierung macht Spaß zu arbeiten, sagte Cullen.

Cullen sprach über seine Erfahrungen mit Verbraucherorientierung, neue Technologie und immer vor den Trends, bevor sie beginnen, große Wellen.

Wie würden Sie Ihre Herangehensweise an Verbraucherorientierung beschreiben?

Greg Cullen: Wir uneingeschränkt befürworten es und ständig erneuern. Es gibt ein paar tiefe Einflüsse, die wir sehen, beginnen, sich auf zukünftige Nachfrage auswirken, die wir mit experimentiert haben.

Eine davon ist die kontextuelle computing. Die heutigen Anwendungen sind nicht viel anders [als] die alten Mainframeanwendungen. Wenn eine Person Informationen oder etwas tun muss, zu erhalten muss, muss er wissen, welche Anwendung zu gehen. Dann werde er reingehen und, welche Menüelement auswählen, wie Sie tatsächlich dort zu finden, diese Informationen zu erhalten wissen müssen Gewusst wie: Ausfüllen eines Formulars in der Lage, Dinge zu tun.
Kontextbezogene computing--vor allem mit Mobile, das weiß, wo du bist, was du tust, was mag Sie, ziemlich viel alles über Sie--geht um Verbraucher zu verstehen und Bereitstellung der Informationen oder die Möglichkeit, etwas zu tun, wenn sie es brauchen. Wir machen einige Entwicklung mit Google Glass, ist ein großer kontextuellen Spiel.

Was ist der Prozess für immer vor die Trends?

Cullen: Du musst es zu umarmen und injizieren sie in die Kultur. Ein Beispiel, wie wir das tun ist das Internet der Dinge. Das Internet der Dinge ist über die gewöhnlichen Objekten und intelligenter machen. Wir verwenden unsere Büros als auf dem Prüfstand für diese Technologien und neue Ideen.
Wir schweben Ideen gibt, und wir haben Brainstorming-Sitzungen, wo fahren wir eigentlich aus und möchte [Mitarbeiter], ' was als nächstes kommt? Was sehen Sie? Was denkst du wie? " Wenn Sie eine ganze Reihe von Menschen und Sie sind ständig pitching Ideen und reden von Grund auf in Ihrer Organisation, wollen Dinge Resonanz wie im Consumer-Bereich.
Das Internet der Dinge ist es ein weiter Schritt. Wir bauten einige Platinen, die ein Licht schauen, look at Bewegungsmelder [in Konferenzräumen] und Blick auf den Kalender, dann diese Informationen zusammen und senden diese Informationen an Handys. Ich bin sicher, dass Leute dies zu stoßen, wo sucht ein Konferenzraum gebucht. Aber wenn niemand in den Konferenzraum und es nicht gebucht hat, es werde zeigen als eine andere Farbe damit die Menschen wissen können, dass diese Konferenzraum zur Verfügung steht.

Unterstützen Sie Mitarbeiter, die mit persönliche mobilen Geräten für die Arbeit? Wenn ja, was? Sie vom support

Cullen: Wir unterstützen auf jeden Fall die verschiedenen Geräte--iOS, Android, Windows-- und wir tatsächlich Menschen zu ermutigen verschiedene Geräte ausprobieren, so dass sie verstehen können, was sind die Vorteile und was sind die Stürze. Manchmal, wenn Sie in ein Gerät gesperrt bekommen, verstehen Sie nicht wirklich die verschiedenen Dinge, die sind draußen zu nutzen.
Aus einem Aspekt Unterstützung geht es hand in hand mit Sicherheit. Wir versuchen wirklich, das Gerät zu unterstützen und sicherzustellen, dass die Sicherheit für die persönlichen Daten, sowie die Informationen zur Arbeit.

Hat Ihr Unternehmen eine Bring Ihr eigenes Gerät/Mobile-Geräterichtlinie?
Cullen: Wir tun. Wir haben unterschiedliche Richtlinien, die wir nicht, wie Kennwortinformationen durchsetzen. Wir ausprobiert eigentlich ziemlich viele verschiedene Anbieter für [mobile Device Management]--MobileIron, AirWatch, gut [Technologie]-- und sie bieten ähnliche Sicherheitsstufen. Die Richtlinien, die wir verdrängen Fernlöschen, um sicherzustellen, dass Kennwörter auf den Geräten--festgelegt werden kann sind diese MDMs wirklich kritisch zu der Möglichkeit, das in eine organisierte und einfache Weise zu tun.

Lassen Sie Mitarbeiter, die Verbraucher-orientierten Services wie Dropbox verwenden?

Cullen: Wir haben. Es ist stark getrieben, was Kunden arbeiten unsere Mitarbeiter mit. Finanzinstitute müssen viel mehr [Einschränkungen], so viel Zeit haben wir Richtlinien wo Mitarbeiter nicht Dropbox verwenden und stattdessen verwenden wir die Client-Lösung. Einige unserer Kunden haben weniger Beschränkungen und wir Dinge wie Dropbox.

Ist Verbraucherorientierung insgesamt eine Positive oder negative? Und was ist der schwierigste Teil für Ihre Organisation zu bewältigen?


Cullen: Verbraucherorientierung ist eine wunderbare Sache. Wenn Sie sind ein Unternehmen oder eine Einzelperson, die Innovation... sehen will ist den Consumer-Bereich wirklich was, die treibt. Sie haben Menschen, die [in Unternehmen] kommen als Verbraucher und sie diese verschiedenen Produkte verwenden und sie sagen, "Warum sind meine persönlichen Geräte und Werkzeuge bequemer und effizienter als die Tools habe ich bei der Arbeit?" IT-Gruppen haben wirklich [Verbraucherorientierung] erlassen, da sie keine Wahl, und da sie keine Antwort.

Monday, May 27, 2013

Web-savvy thieves finding creative new ways to commit financial fraud in D-FW area

http://www.dallasnews.com/news/crime/headlines/20130526-web-savvy-thieves-finding-creative-new-ways-to-commit-financial-fraud-in-d-fw-area.ece

A person inserts a debit card into an ATM machine. Authorities recently said an international cybertheft ring stole about $45 million by hacking into banks’ computer systems to access debit cards.

North Texas is one of the hot spots in a growing trend in which Web-savvy people are finding creative new ways to rob businesses, individuals and governments remotely.


Authorities recently said an international cybertheft ring stole about $45 million by hacking into banks’ computer systems to access debit cards. 

Sunday, May 19, 2013

3 must-do steps to recover from a phishing scam

http://www.usatoday.com/story/cybertruth/2013/05/17/phishing-scams-steps-to-recover-privacy/2193105/


abney and associates internet security reviews, 3 must-do steps to recover from a phishing scam

It's a sinking feeling, when you realized you've been had by a phishing scam. In the frenetic digital world we live in, it can happen to anyone.
So you've clicked on a link that now seems very suspicious. You're concerned that the bad guys may be in control of your computing device. Or perhaps you've typed some account information into a web form, and you're having second thoughts about the authenticity of the form.
Recovering will require work. Here are three things you can do if you believe you've fallen prey to a phishing scam delivered by e-mail, a social media posting or even a phone call, according to Adam Levin, Chairman of IDentity Theft 911. Update and scan: If you have clicked on or downloaded anything that might infect your system, then make sure you install or update anti-virus software and run a full scan of your system. Here is helpful guidance from ID Theft 911.
Contact credit agencies. If you have disclosed any personal information or you're worried your account may have been accessed, you can place an alert with any one of the three major credit bureaus signals to potential creditors that you could be a victim of identity theft.
Update account logons. If you have reason to believe that any of your email or social media accounts are compromised make sure you change.