Tag: techeye

Snowden did not seem too worried about snooping

snowdenThe NSA has poured cold water on the central plank of Edward Snowden’s statements that he was worried about overwhelming government spying and could not make anyone listen.

Snowden said that he had complained to his fellow workers about the snooping programmes but had to take action when no one listened.

The NSA said that it had reviewed all of Edward Snowden’s available emails in addition to interviewing NSA employees and contractors to determine if he had ever raised concerns internally about the agency’s vast surveillance programs.

According to documents the government filed in a federal court last Friday, NSA officials were unable to find any evidence Snowden ever had shared his concerns with anyone.

In a sworn declaration, David Sherman, the NSA’s associate director for policy and records, said the agency launched a “comprehensive” investigation after journalists began to write about top-secret NSA spy programs upon obtaining documents Snowden leaked to them.

The investigation included searches of any records where emails Snowden sent raising concerns about NSA programs “would be expected to be found within the agency.”

Sherman said the NSA searched sent, received, and deleted emails from Snowden’s account and emails “obtained by restoring back-up tapes.”

Still, the agency says it did not find any evidence that Snowden attempted to address his concerns internally — as he has said he did — before leaking the documents.

This is problematic for Snowden’s supporters because VICE News filed a case against the NSA earlier this year seeking copies of emails in which Snowden raised concerns about spy programs he believed were unconstitutional.

However if he did not then some of Snowden’s reputation as a whistleblower suffers. If Snowden was really concerned about the antics of the NSA he never even mentioned his concerns to his colleagues.   Of course that might mean that he simply did not want to end up unemployed, or given a nice walk around a German forest somewhere, but it could also mean that he was not concerned about snooping.

Of course, there is the small matter if you believe the spooks, whose reputation for truth is about on a par with Robert Maxwell’s.

So far, the NSA has found a single email Snowden sent to the NSA’s general counsel in April 2013 in which he raised a question about NSA legal authorities in training materials.

That email poses a question about the relative authority of laws and executive orders — it does not register concerns about NSA’s intelligence activities.

 

Data centre readies for nukes

atomJust in case you thought that the fear of a nuclear attack was so 1980s it was not worth worrying about, a US data centre is advertising that it can survive a nuclear event.

The centre in Boyers, is a 2,000-sq.-ft. building purpose-built to protect against an electromagnetic pulse (EMP).  To be fair an EMP burst could also come during a solar storm, but it does indicate that someone is still worried about nukes in the US.

The company that built the facility is not disclosing exactly how the data centre was constructed or what materials were used. It appears that the structure has an inner skin and an outer skin that use a combination of thicknesses and metals to provide EMP protection.

So far, the only other data centres that protect against electromagnetic pulses are underground, or offer containers and cabinets that shield IT equipment from EMPs.

While it sounds groovy, it is not clear how concerned people have to be about EMP protection. Most solar storms are not strong enough to hurt electronics, though they could disrupt GPS and radio communications. Sure there could be an apocalyptic storm, but if that were the case, your data might be safe but there would not be a single working PC in the United States.

The last one which happened was the 1859 Carrington Event, a solar storm that disrupted and knocked out the telegraph.

Then there is the question of a nuclear attack, which means you have to start worrying about Russians and Chinese again, which is unlikely. Finally, you have to worry about terrorists getting their paws on enough uranium to build an EMP device. Then you would have to be worried that instead of detonating it in New York, where they would do the most damage, they would chose to drop it in Boyers.

If you are worried about those sorts of things then EMP protection is exactly what you need for your data protection. Of course, you are also the sort of person who wears belt and braces and probably does not leave the building out of a fear of badgers falling from the sky and killing you.

 

 

Broadwell will be Intel’s red-headed stepchild

Rupert-Grint-Ron-Weasley-Harry-Potter-GingerBroadwell is set to be the chip that Intel does not want to talk about as it enters next year with two chip line-ups.

Intel says that both Broadwell and Skylake will be in the shops in the same year, something the chip maker has managed to avoid doing before, with very good reason.

Skylake is supposed to be better technology, but having it so close to Broadwell will mean that punters will wait for it rather than buying something out-of-date.  They will not have long to wait. Broadwell will ship in the first quarter next year, but in the second half next year, users will be able to buy PCs with processors based on the newer Skylake architecture.

This sorry state of affairs has come about because Broadwell has been cursed with delayed chip shipments which lead to delayed manufacturing.  The world should have Broadwell machines already, but they are still not around.

Intel appears to have decided to put the whole mess behind it and move to Skylake as planned.

Chipzilla claims that Skylake chips will lead to the biggest PC innovations in the last 10 years. Skylake will bring wireless charging and data transfers, and also a significant increase in performance, battery life and power efficiency. At IDF Intel did not hardly bother showing off any Broadwell chips.

On the plus side, the transition to Skylake will also lead to Intel dumping Broadwell processors, which could help cut laptop prices by year end. That could benefit customers looking for low-cost laptops and prop up PC shipment volumes.

 

Doom for hacked printer

doom_sprite_wallpaper_by_bobspfhorever78-d6lij4oIn what has to be the best proof of concept hacking of a printer, Context Information Security analyst Michael Jordon managed to get a Canon Pixma printer to run the game Doom.

Jordon said that Canon Pixma wireless printers have a web interface that shows information about the printer, for example the ink levels, which allows for test pages to be printed and for the firmware to be checked for updates.

He found that the interface doesn’t need any sort of authentication to access and while you would think that the worst that anyone could do is print off hundreds of test pages and use up all of the printer’s ink, Jordon found a hacker could do a lot more damage.

The interface lets you trigger the printer to update its firmware. It also lets you change where the printer looks for the firmware update.

A hacker could create a custom firmware that spies on everything that printer prints, it can even be used as a gateway into the network.

To show what was possible Jordon got the printer to run Doom.

Canon offers very little protection against this. If you can run Doom on a printer, you can do a lot more nasty things. In a corporate environment, it would be a good place to be.

Who suspects printers?  Well other than Nigel from accounts and he thinks aliens are trying to take over the coffee machine.

Canon has promised that it is working on a fix and is taking a chainsaw to the problems highlighted by Contecxt.

“All PIXMA products launching from now onwards will have a username/password added to the PIXMA web interface, and models launched from the second half of 2013 onwards will also receive this update, models launched prior to this time are unaffected,” Canon said.

 

UK biggest public sector IT spender

ukflagWhile the UK is the biggest IT public spender, growth is very slow.

That’s according to a report from IDC, which surveyed western European spending in the IT sector.

The big five western European countries – the UK, Germany, France, Spain and Italy –  represent over 75 percent of the $53 billion spent on hardware, software and IT services by the different government.  Over 50 percent of the spend takes place in local government.

IDC says that public administration and compulsory social activities are larges spenders within the sector.

It predicts that investment in pension administration, tax and revenue collection managment will grow more than investments in public safety and security.  Some areas, however, such as immigration and borders are attracting spends.

Germany will show the highest compound annual growth rate with a measly 1.2 percent, while Spain and Italy will suffer the biggest slump.

Toshiba releases 20 megapixel sensor

Toshiba imageThe chip division of Japanese giant Toshiba said it has started making fast 20 megapixel CMOS image sensors aimed at the high end smartphone market. Samples went out last month and full production will start in February next year.

That type of censor will give a smartphone the kind of capabilities more associated with high end and expensive digital cameras.

The sensor, bilt on a 1.12 micron CMOS process has an optical size of ½.4 inch and lets camera modules on smartphones be built to a-height of 6mm or less.  The chip has a pixel count of 5384×3752 with digital zoom capabilities, and includes 16Kbit memory.

The sensor – dubbed the T4KA7 – ddelivers a frame rate of 22 frames per second at full resolution image capture.  That’s an improvement of 83 percent compared to Toshiba’s previous 20MP sensor.

A Toshiba representative said that the sensor will let manufacturers to design next generation ultrathin, power aware high end mobile products.

The sensor will cost around $20 when bought in volumes.

Toshiba said that the CMOS image sensor market will experience a compound annual growth rate (CAGR) of 10 percent between 2013 and 2018, with revenues reaching $13 billion.

Big Data gets very big indeed

server-racksRevenues for Big Data technology and services will be worth $41.5 billion by 2018 and is growing now at a 26.4 percent compound annual growth rate (CAGR).

That’s an estimate by market research company IDC. Ashish Nadkarni, research director at the company, said the hype was simmering down.  “This is a sign that the technologies are maturing and making their way into the fabric of how organisations operate and firms conduct their business,” he said.

This year, infrastructure has a large share of the entire market, with a 48.2 percent slice of the Big Data pie.

While America leads the way in Big Data investment, it isn’t going to stay that way. EMEA and Asia Pacific have nearly 45 percent market share in infrastructure, software, and services.

IDC predicts there will be a mergers and acquisitions boom in the sphere.

Microsoft coughs $2.5 billion for Mojang

Microsoft campusSoftware giant Microsoft said it has bought Mojang, which makes the video game Minecraft for $2.5 billion.

The Swedish company has sold over 50 million copies but the three founders will leave the company.

Mojang said on its website change is scary, but “it is going to be good though. Everything is going to be OK.”

Mojang said Minecraft had grown and grown like Topsy.  “Though we’re massively proud of what Minecraft has become. It was never Notch’s intention for it to get this big.”

“Notch” is the brains behind Minecraft and the majority shareholder.  He doesn’t want to run such a big company and the pressure was getting too much. “The only option was to sell Mojang. He [Notch] will continue to do cool stuff though. Don’t worry about that.”

Driverless car growth set to surge

Rolls Royce Silver GhostA staggering 42 million driverless vehicles will be on our roads by 2035.

That’s the prediction of market research company ABI Research which said the numbers of driverless cars will ramp from 1.1 million in 2024 to over 42 million in 2035.

But these optimistic forecasts don’t take into account bottlenecks including user acceptance, security, liability and regulation.

Google has already been forced by the California Department of Motor Vehicles to test prototypes with steering wheel, brake and acceleration pedals installed.

Tesla said last week that it will move into the driverless car market but other car manufacturers are havering over making a decision.

“While autonomous driving under the control of a human standby driver is quickly gaining acceptance, robotic vehicles mostly remain out of bounds, especially for car manufacturers, despite Google’s recent announcement to start prototype testing. However, only driverless vehicles will bring the full range of automation benefits including car sharing; driverless taxis, and delivery vans; social mobility for kids, elderly, and impaired; and overall economic growth through cheaper and smoother transportation critical in an increasing number of smart mega cities. Many barriers remain but the path towards robotic vehicles is now firmly established with high rewards for those first-to-market,” said ABI Research director Dominique Bonte.

Majority of mobile apps are insecure

SmartphonesA Gartner report claimed that 75 percent of mobile applications fail the most basic security tests.

That poses threats for corporations, it said.  Enterprise employees download apps and also use mobile apps to access business networks. Such apps can violate enterprise policies and expose enterprises to threats.

Dionisio Zumerle, a principal analyst at Gartner said: “Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance  Most enterprises are inexperienced in mobile application security. Even when application security testing is undertaken, it is often done casually by developers who are mostly concerned with the functionality of applications, not their security.”

He claimed that vendors supplying static and dynamic application testing can prevent problems on the enterprise.  And a new test, called behavioural analysis, is emerging for mobile apps.

He added: “Today, more than 90 percent of enterprises use third-party commercial applications for their mobile BYOD strategies, and this is where current major application security testing efforts should be applied,” said Mr Zumerle. “App stores are filled with applications that mostly prove their advertised usefulness. Nevertheless, enterprises and individuals should not use them without paying attention to their security. They should download and use only those applications that have successfully passed security tests conducted by specialized application security testing vendors.”

Often the biggest problem is misconfiguring devices, so for example by misusing personal cloud service through apps on smartphones and tablets.

Turin places a shroud on Microsoft

turinThe Italian city of Turin, famous for its medieval Jesus shroud hoaxing, is dumping Microsoft and heading toward something more Open Saucy.

Turin is currently running Windows XP which goes to show that not only is its famous shroud mediaeval.

Apparently Turin thinks that it can save €6 million over five years by switching from Windows XP to Ubuntu Linux in all of its offices.

The plan is to install it on 8,300 PCs, which will generate an immediate saving of roughly €300 per machine. This figure is made up by the cost of Windows and Office licences.

Another good reason why Turin did not want to upgrade to Windows 8 is that its computers were so old their designs were found in Leonardo Da Vinci’s scrapbooks and it was not believed that the new Windows would run very well on them.

The switch to Ubuntu was officially approved in early August and is expected to take around a year and a half to complete.

The move has been talked about for two years. The project was temporarily put aside due to economic concerns — it probably would have been too costly switching from XP while Turin still had valid and paid licences running. Now that those Windows licences are expiring, however, the time is ripe to experiment with new products.

Turin is one of the biggest municipalities in Italy to switch to Open Source and it could be an example for other cities to follow.

Pishing Eskimo twitches to steal Steam Wallet

Greenland in the 19th century - picture Wikimedia CommonsA new piece of pishing malware has taken over Twitch’s user pool tempting users to go into a fake sweepstake or lottery, so that it can nick cash from their Steam Wallets.

For those who came in late, Twitch is a video game-centric website on which people show live streams of game play to others. Amazon bought the site and it has about 50 million users, paying $970 million in cash.

Dubbed Eskimo, the malevolent bot does not look out of place to usual visitors to the streaming site — live streamers, who earn cash via viewer subscriptions, frequently use bots in the chat area of their channels to push donations, inspire supporters and run promotions.

However one of the bots has been cleaning out Steam inventories, which might hold rare digital collectibles, and Steam Wallets, which are source by real-world funds to purchase games on Valve’s admired distribution platform.

F-Secure said Eskimo can wipe your Steam wallet, armory, and inventory dry. It even dumps your items for a discount in the Steam Community Market. Earlier variants were selling items with a 12 percent discount, but a recent sample showed that they changed it to 35 percent discount — to sell the items faster.

According to F-Secure, Eskimo requests users to track a link to fill out a form for a raffle, which it claims provides them an opportunity to win digital weapons and collectibles for Counter-Strike: Global Offensive.

As it has the right to use a Steam account, will get screenshots, add new friends on Steam, accept friend requests, deal with new friends, buy items with Steam funds, send trade offers and accept trades, F-Secure says Eskimo. Once all of a user’s money has been used to purchase collectibles, the malware will trade all of the victim’s digital items to their new “friends.”

F-Secure says, “It might be helpful for the users if Steam were to add another security check for those trading several items to a newly added friend and for selling items in the market with a low price based on a certain threshold. This will help in lessening the damages done by this kind of threat.”

 

Apple’s iPhone 6 chip is a lemon

CD153It looks like Apple’s new iPhone 6 will have the same performance of its older gizmos according to Hot Hardware benchmarking 

Normally one of the few things that is different about the new model iPhone is a that it comes with a better chip.  Last time it was the A7 System-on-Chip (SoC) which was the world’s first 64-bit smartphone processor.

Even Apple naysayers said that the A7 chip was rather good and dominated benchmark runs and consistently outperformed previous generation iPhone models.

However if Apple fanboys were hoping for a performance bump from the iPhone 6 and iPhone 6 Plus, both of which sport a custom A8 SoC they are going to be disappointed.

Hot hardware noted only modest gains compared to the iPhone 5s. The dual-core 1.4GHz Cyclone CPU and A8 GPU, the iPhone 6 scored 21,204.26 and a earned a place at the top of the chart, though not by much. The iPhone 5s scored 20,253.80 in the same benchmark so the iPhone 6 is less than 5 percent faster than the iPhone 5s.

What is strange is that not only was everyone expecting a better performance gain the iPhone 6 launch live stream implied that the difference would be huge.

Apple said that the all-new A8 chip is our fastest yet. Its CPU and graphics performance are faster than on the A7 chip, even while powering a larger display and incredible new features. And because it’s designed to be so power efficient, the A8 chip can sustain higher performance.

Well it is sort of true – the chip is faster, but not by enough for anyone to notice.

According to Apple, it offers 84x faster graphics performance than the original iPhone and is up to 50x faster in CPU performance.

Hang on a minute, Apple is comparing its current chip with that of the first iPhone which was released in  June 29, 2007. Of course, the iPhone 6 is going to be faster. However, this means that Apple is aware that its new chip is disappointing and it is trying to pretend it is hot.

World moves to smartphones

shoe phoneFortune tellers at the Groupe Speciale Mobile Association (GSMA) have been consulting their tarot cards and are predicting that either there will be a tall dark stranger who will ask them out to lunch, or by the end of the decade, there will be nine billion mobile connections across the globe.

If it is the latter meaning, GSMA predicts that while three billion of those connections will be data terminals, dongles, routers and feature phones, the other two thirds will be smartphone handsets.

The organisation claims that the smartphone market is poised for huge growth over the next six years.  There are currently two billion handsets in active use.  It predicts that the demand is being driven by people in emerging countries.

In a report with the catchy title,  Smartphone forecasts and assumptions, 2007-2020, the GSMA said that developing economies overtook mature markets such as the US and western Europe in 2011.

GSMA chief strategy officer Hyunmi Yang said that in the hands of consumers, these devices are improving living standards and changing lives, especially in developing markets, while contributing to growing economies by stimulating entrepreneurship.

“As the industry evolves, smartphones are becoming lifestyle hubs that are creating opportunities for mobile industry players in vertical markets such as financial services, healthcare, home automation and transport,” he said.

Asia Pacific already accounts for half of global smartphone connections yet smartphone penetration is still below 40 percent in the region, even when China’s 629 million smartphone connections are included.

By the end of the decade, emerging countries will account for four in five smartphone connections, as regions like North America and Europe hit the 70-80 percent mark and growth drops off.

The fastest growing region is expected to be sub-Saharan Africa. When figures are based on smartphone adoption as a percentage of all mobile connections, the region currently has the lowest adoption rate of 15 percent in the world.

However, the wider availability of affordable handsets and the roll-out of networks are expected to change everything.

The GSMA claims that the main factors driving smartphone adoption in emerging countries is falling prices. The price difference between feature phones and smartphones is getting smaller and smaller and $50 smartphones are now a reality.

Mature markets have seen operator subsidies and the roll-out of 4G networks helping to maintain growth in the premium end of the market, while more intelligent, individualised data plans are also helping to win consumers over from feature phones in all markets.

“Smartphones will be the driving force of mobile industry growth over the next six years, with one billion new smartphone connections expected over the next 18 months alone,” said Yang.

Comcast declares war on Tor

Newspaper Seller, 1939The most popular telco in the US, famous for its happy customers and commitment to a positive future for an open internet, Comcast has declared war on the encrypted system Tor.

Comcast agents have contacted customers using Tor and instructed them to stop using the browser or risk being cut off.

According to Deep Dot Web one Comcast agent named Jeremy insisted Tor an “illegal service” and was against usage policies. The Comcast agent then repeatedly asked the customer to tell him what sites he was accessing on the Tor browser. Of course the customer told him to go forth and multiply.

What is scary is that Comcast knew that any customer was using Tor. This would mean that Comcast is spying on the online activities of its users.

There is some bad blood between Tor and Comcast. The Tor project has listed Comcast as a Bad ISP. The Tor project cited Comcast’s Acceptable Use Policy for its residential customers which claims to not allow servers or proxies.

A Comcast spokesperson insisted that the outfit did respect customer privacy and security and would only investigate the specifics of a customer’s account with a valid court order.

However, this did not happen in the case of Comcast’s treatment of Ross Ulbricht, alleged Dread Pirate Roberts.

Comcast previously collaborated with the FBI by providing information on alleged Silk Road mastermind Ross Ulbricht’s internet usage. Ulbricht was most certainly never given a warning by Comcast or given time to contact a lawyer before he was arrested in a San Francisco library last October.