Tag Archive for AAPL

F-Secure Top Security Predictions for 2013

F-Secure Top Security Predictions for 2013As the new year looms, all kinds of firms start making predictions, mostly to boost their sales next year, I will be looking at a number of firm’s predictions for next year, a let’s see how smart they are this time next year. Here are the top security predictions for 2013 from Finland-based F-Secure Labs shared with Help Net Security.

ITU WCIT in Dubai could mean the end of the Internet1. The end of the Internet as we know it? – Secure Labs predicts that the ITU WCIT in Dubai could mean the end of the Internet (which I covered here and here). Sean Sullivan, Security Advisor at F-Secure Labs says that the World Conference on International Telecommunications could have a major impact on the Internet as we know it. “The Internet could break up into a series of smaller Internets,” Sullivan says. “Or it may start to be funded differently, with big content providers like Facebook and Google/YouTube having to pay taxes for the content they deliver.

rb- WCIT has concluded with the U.S. and most of Europe refusing to sign the treaty due to language backed by Russia and China that could have large-ranging impacts on Internet freedom.

2. Leaks will reveal more government-sponsored espionage tools – “It’s clear from past leaks about Stuxnet, Flame, and Gauss that the cyber arms race is well underway,” says Mikko Hypponen, Chief Research Officer at F-Secure Labs. While we may not always be aware of nation-states’ covert cyber operations, we can expect that governments are more and more involved in such activity.

mobile malware will increase3. Commoditization of mobile malware will increase – The Google (GOOG) Android operating system has solidified in a way that previous mobile operating systems haven’t, extending from phones to tablets to TVs to specialized versions of tablets. The more ubiquitous it becomes, “the easier to build malware on top of it and the more opportunities for criminals to innovate business-wise,” Sullivan says. Mobile malware will become more commoditized, with cyber-criminals building toolkits that can be purchased and used by other criminals without real hacking skills. In other words, malware as a service, for Android.

4. Another malware outbreak will hit the Mac world – First it was Mac Defender and then Flashback that attacked Apple.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

OMG Texting bday

OMG Texting bday20 years ago this week, one of the largest phenomenons of web 2.0 emerged. On December 3rd, 1992, a 22-year-old Canadian test engineer sat down and typed out a very simple message, “Merry Christmas.” Gizmodo says the text flew over the Vodafone (VOD) network to the phone of Richard Jarvis, and since then, we just haven’t been able to stop texting.

Texting is a major staple of communication now,Texting is a major staple of communication now, and by far the main use of a phone for many, but it didn’t start out that way. In the very beginning, texts were just a way to send network notifications, namely to let you know you had a voice mail. In 1993, Nokia (NOK) became the first company to make GSM handsets capable of person-to-person texting, but it still didn’t skyrocket to popularity for several years.

Growth of texting

ComputerWorld reports that in late 1995, three years after Papworth’s first text message, users were only sending an average of one text every two and a half months. In 2000 the industry counted 17 billion text messages, according to data from Ericsson. In 2010, the world sent over 6.1 trillion SMS messages or roughly 193,000 per second.

POTUS TextsToday, upwards of 7 trillion text messages are sent every year—that’s more than 200,000 per second.  So while you’re launching your daily flurry of textuals, take a second to consider the fact that your inane contributions are part of zeta-flood of data.

Digital Trends claims that texting is becoming obsolete. They cite data from Chetan Sharma, an independent mobile analyst and wireless carrier consultant, who reports that the number of text message exchanges in the U.S. had dropped by about 2 percent in the third quarter. This is a sharp difference from the steady growth that text messaging had previously seen. Sharma says it’s the first time that text messaging has begun to dwindle in the United States.

rb-

Texting is still a huge part of the way people communicate via mobile devices, but the emergence of new messaging options has led to the first decline in SMS volume.

Apple‘s (AAPLiMessage, which operates almost Texting is becoming obsoleteexactly like a text message but only communicates between Apple devices. iMessage completely bypasses the carrier when sending text messages between iPhones.

Facebook‘s (FB) Messenger app, which essentially exists as the mobile presence for the social network’s instant messaging feature. Facebook’s Messenger app can be used across multiple platforms, which could give it an advantage when it comes to text messaging alternatives.

Hopefully, the competition will force AT&T (T) to stop overcharging its customer. Gizmodo claims AT&T’s New Text Plan Overcharges You by 10,000,000 Percent. Literally lead the way toward cheaper texting plans.

The history of SMS

Related articles
  • Text messages direct to your contact lens (telegraph.co.uk)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

iPad thefts from Cleveland Heights-University Heights middle school students prompt community soul searching

iPad thefts from Cleveland Heights-University Heights middle school students prompt community soul searchingCleveland.com reports that iPad thefts from middle school students in the Cleveland Heights-University Heights school district is causing an iPad re-think.

The school district gave 1,300 Apple (AAPL) iPad tablets to middle school students at the start of the school year. The report says students were permitted to take the iPads home as a continuing educational tool.

The experiment lasted less than three weeks because the students became targets for thieves. Between Sept. 26 and Oct. 13, a dozen middle school students had their iPads stolen while on their way to and from school, Cleveland Heights police chief Jeff Richardson said.

Since mid-October, the district has collected the tablets at the end of the school day and students no longer could take them home.

More than 130 people attended a meeting seeking answers about how to go ahead and whether crime will win out over education. The reporter writes that the meeting was meant as an information-gathering session. Police, principals, and other officials wanted to decide if the district could safely revive the “Take home iPad Plan” sometime in the near future.  The crowd reaction was mixed about how to proceed.

Related article
Superintendent John Deasy’s $17.5M request for computer tablet funds nixed

Superintendent John Deasy's $17.5M request for computer tablet funds nixed

The Los Angles Daily News reports that the panel that oversees the spending of Los Angeles Unified’s bond revenue refused Superintendent John Deasy’s request for nearly $17.5 million to jump-start the purchase of computer tablets for every student. The Bond Oversight Committee voted 7-3 for the plan, but that was one vote short of the eight needed for passage, officials said.

The $17.5 million would have funded the first phase of his long-range technology program. The plan included the tablet pilot project at 14 secondary schools. Mr. Deasy said the tablets are needed for the district to start the new curriculum known as Common Core State Standards taking effect in 2014.

Ultimately, he wants to buy tablets for all 650,000 LAUSD students, a project estimated to cost upwards of $400 million.

Related article
  • LAUSD Superintendent Warns Of Shorter School Year Due To Budget Crisis (losangeles.cbslocal.com)
IDC Figures Show Samsung and ASUS Challenging Apple’s Grip on the Tablet Computing Market

http://www.stripersonline.com/t/628984/check-out-what-im-doing-tonightMIT’s Technology Review pointed out new data from IDC suggest that Apple’s dominance of the global tablet computer market may be giving way. Competing tablet makers, led by Samsung (005930), gained substantial ground during the third quarter of 2012.

Apple‘s (AAPL) market share dropped from 65 percent in the second quarter to just over 50% in the third quarter. Meanwhile, Samsung’s share doubled to 18%, and Amazon (AMZN) and ASUS (2357) each saw their share rise from under five percent to around nine percent.

2012 3Q Worldwide tablet shipments

As is clear from the graph above, TR concludes that it’s too early to tell how quickly the market is diversifying. Apple’s lag was at least partly due to rumors about its plans to release the iPad Mini, which led some consumers to hold off on buying a new iPad, according to IDC. Now that the Mini is out, analysts expect Apple to have a strong fourth quarter.

The iPad Mini’s $329 starting price, however, is well above that of many Google (GOOG) Android tablets, which is why IDC’s analysts believe there is “plenty of room for Android vendors to build upon the success they achieved in the third quarter.”

Android-powered smartphones are already more popular than Apple’s iPhone in the U.S. as well as in other countries, like China

Related article
Tablet Makers Pursue Public Schools

Tablet Makers Pursue Public SchoolsSchools are a large and growing market for Apple’s iPad. Teachers claim that tablets help students with lessons, improve memory and language skills, and cause them to act more independently. The excitement among tablet makers is almost as great. Tablet makers like Apple are pursuing public schools for more sales.

MIT’s Technology Review brings us data from IDC which says global shipments of tablets will reach 177 million this year, and 11 million of them were purchased by businesses or government of those, IDC analyst Tom Mainelli says, the “vast majority” were sold to schools.

Mr. Mainelli thinks that within a few years all U.S. students will have some access to a tablet at school. With 55 million students in the country’s schools, that’s a lot of potential sales. The article says it’s not just a one-time product push: beyond selling tablets to schools and districts, tablet makers see a chance to set up future sales by establishing brand loyalty with young users. “All these guys see huge opportunities here,” he says.

The most successful tablet maker in the education market is Apple (AAPL). In its July 2012 quarterly report, the company said it sold one million iPads to schools. TR notes that Apple hasn’t reported education numbers since then, but it did unveil a smaller, cheaper model that it expects will also appeal to students and educators: the $329 iPad Mini.

Amazon (AMZN) also highlighted its interest in the education market with the debut of Whispercast, a service to manage its Kindle e-readers en masse. Jay Marine, vice president of product management for the Kindle, the company sees the education market as “a meaningful business opportunity.

Smaller companies are making tablets aimed specifically at the education market. Two firms are CurriculumLoft, which makes the Kuno tablet, and Brainchild, which sells the Kineo.

Brainchild CEO Jeff Cameron claims his company’s $299 tablet, which runs on Google‘s (GOOG) Android software is better than mass-market devices because it was built for educational use. TR says that, unlike most tablets, the Kineo has a replaceable battery, resulting in a longer lifespan. Its touch screen is meant to withstand spills, and it has more physical buttons than an iPad.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Cloud-Based Anti-Virus Ready?

Is Cloud-Based Anti-Virus Ready?Cloud computing technology is one of the most disruptive technologies in recent history. Xath Cruz at CloudTimes argues in a recent article that cloud computing is also disrupting security software such as anti-virus and he asks how effective are cloud-based anti-viruses?

malwareThe article, How Effective are Cloud-Based Anti-Viruses? claims the demand for cloud-based anti-virus software has gone up steadily as more cloud-dependent computing devices have invaded the market. Cloud-dependent computing devices like iPads, Nooks, iPhones, and Galaxy’s are as susceptible to malware as their big desktop brethren.

In order to fight the malware threats to cloud-dependent computing devices, cloud-based anti-virus has evolved.  Cloud based anti-virus works differently than popular cloud-based document editors like Google Docs, where you only need a web browser and internet access. The blog post explains that cloud-based anti-virus software can’t function if it’s only in the cloud, since your PC won’t easily give the right kind of administrative access needed by antivirus software to programs hosted remotely, as that would leave your PC at risk of being intruded upon by other programs.

small native app that runs on the deviceIn order to protect a PC, tablet, or smartphone, a cloud-based anti-virus software requires a small native app to run on the device. When downloaded, the app acts as the anti-virus, with its database and heuristics data being hosted on the cloud. There is also cloud-based anti-virus software that use web browser extensions or Active X and Java to gain proper access to your PC.

Like any technology, cloud-based antivirus software has specific pros and cons when compared to native anti-virus suites, Mr. Cruz lays out some of the pros and cons of cloud-based anti-virus:

Cloud advantages

cloud based anti-virus1. No Installation Required – The first advantage of cloud-based anti-virus is that there’s no need to install them on your PC. Cloud-based anti-virus does not eat up hard disk space, with its storage and memory footprint being a fraction of what local anti-virus need. Additionally, you can get them up and running immediately, and there’s no likelihood of messing up the installation (which usually results in a non-working antivirus or corrupted file volume).

2. No Updating Necessary –  With cloud-based anti-virus, there is no need to update data files, since it’s hosted on the cloud, and will automatically be patched or updated by the provider. This will offer the latest in protection when it becomes available.

3. Double Security Layer – With cloud-based anti-virus software, it is possible to run a locally installed anti-malware app and run another different cloud-based antivirus without worrying about conflicts or PC slowdown. Different anti-virus software are better able to catch or inoculate different viruses.

collective intelligence4. An advantage of cloud-based anti-virus software the author missed is collective or community intelligence. SearchSecurity reports that when a system identifies malware, it’s able to give feedback to the cloud anti-malware provider, thus providing a wider surface area for rapidly detecting 0-day attacks.

Cloud disadvantages

1. Won’t Run in the Background – Cloud-based anti-viruses are not effective against viruses that run on startup. Cloud-based anti-viruses are not TSR (terminate and stay resident) programs and only run on an as-needed basis.

2. Limited Scan – Cloud-based anti-viruses risk missing dormant viruses in unopened or archived files. Windows’ security protocols will prevent some cloud anti-viruses from scanning the computer. They will only be able to scan core windows files and what’s currently loaded in the memory.

Network connection3. It Requires an Internet Connection – Cloud-based anti-virus is useless without access to the Internet. This is a problem for portable device users who can’t be connected 24×7. Without an Internet connection viruses will be free to do whatever they want.

rb-

The author concludes for the best protection your PC can get, you need to use the services of both a locally installed anti-virus software and a cloud-based one.

The main concern I have about cloud-based anti-virus apps is downtime. Cloud providers like Microsoft, Amazon, and Amazon have had issues lately providing their services. Downtime at the upstream ISP on the LAN can also play havoc with cloud-based anti-malware apps.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Voice Mail Open to Hacking

Voice Mail Open to HackingMobile carriers ‘proven’ to be open to surveillance and customer ID theft. The New York Times reports on a study by Karsten Nohl, a Berlin hacker and mobile security specialist who found that many mobile operators provided poor protection of voice mail from hacks.

Original mobile phoneIn a study of 31 mobile operators in Europe, Morocco, and Thailand, Mr. Nohl, found that he could hack into mobile conversations and text messages. The NYT says he used an inexpensive, seven-year-old Motorola mobile phone and free decryption software available on the internet.

He tested each mobile operator more than 100 times and ranked the quality of their defenses. He presented the findings at a recent Chaos Computer Club convention. While his research focused mostly on Europe, Mr. Nohl, a German with a computer science doctorate from the University of Virginia, said the level of security provided by network operators in the US was on a par with that provided by European operators, meaning there was room for improvement.

Voice mailIn Asia, the Middle East, and Latin America, mobile security varies widely and can be much lower. Operators in India and China, Mr. Nohl said, encrypt digital traffic poorly or not at all, either to contain operating costs or to allow government censors unfettered access to communications.

In 2009 Mr. Nohl, who runs Security Research Labs in Berlin, published the algorithms used to encrypt voice and data conversations on GSM digital networks, used in Europe and elsewhere.

Cell phne towerAccording to the NYT article, Mr. Nohl focused on deciphering the predictable, standard electronic ”conversations” that take place between a mobile phone and a mobile network at the start of each call. Typically, Nohl said, as many as 40 packets of coded information are sent back and forth, many just simple commands like, ”I have a call for you,” or ”Wait.” Most operators vary little from this set-up procedure, which he said allowed him to use hacking software to make high-speed, educated guesses to decipher the complex algorithmic keys networks use to encrypt transmissions. (rb- seems like the same problem that WEP has)

Once he derived this key, he said, he could intercept voice and data conversations by impersonating another user to listen to the user’s voice-mail messages or make calls or send text messages on the user’s mobile accounts.

Software patchThe author claims operators could easily end this vulnerability in the GSM system, which is found in older 2G networks used by almost every cellphone, including smartphones, with a simple software patch. His research found that only two operators, T-Mobile in Germany and Swisscom in Switzerland, used this enhanced security measure, which involves adding a random digit to the end of each set-up command to thwart decoding. For example, ”I have a call for you 4.”

This is a major vulnerability in most networks we tested, and the irony is that it costs very little, if nothing, to repair,” he said.

really old mobile phonePhilip Lieberman, CEO of Lieberman Software, a LA company that sells identity management software to large businesses and the US government, said much of the digital technology that protects the privacy of mobile calls was developed in the 1980s and 1990s and is ripe for attack.

The researcher found that Telefonica’s O2 network in the Czech Republic, Belgacom Proximus in Belgium, and Orange Switzerland provided the least security preventing the impersonation and use of another’s mobile account details for calling, texting, or other purposes. T-Mobile Slovakia, T-Mobile Germany, and SFR in France had the best.

least effective in guarding against the trackingThe study reports that T-Mobile Slovakia and the Moroccan operators Wana and Medi Telecom were least effective in guarding against the tracking of a cellphone user’s geographic position through the Internet and global positioning satellites had the weakest safeguards; Vodafone Italy, T-Mobile Germany, and Vodafone Germany had the best.

Protect your voice mail

The author concludes that voice mail security does not seem to be a priority for mobile phone networks. Hence, users should be proactive about their privacy. Anyone’s phone can be hacked, if it was easy for Rupert Murdoch’s journalists, it would be easy for anyone to do…

In order to prevent your mobile voice mail from being hacked set an unlock password on your phone. Experts urge you to avoid the following  popular passwords on mobile phones:

  • 1234
  • 0000
  • 2580 (the middle column of numbers on a telephone keypad)
  • 1111
  • 5555Monkey typing
  • 5683 (Spells “LOVE”)
  • 0852 (the middle column of numbers on a telephone keypad in reverse)
  • 2222
  • 1212
  • 1998

Set a secure voice mail password. You shouldn’t need to memorize it as your phone will store the information. In most cases you should be able to do this manually, but if not contact your mobile network.

Maintaining completely different passwords for all of your various telephone and online accounts is vital, if slightly tricky to do.

Change your passwords regularly.

Hang on to your cell phone. Voice mail hacking can be done from your own phone if the device is left unsecured and there is no unlock PIN setup.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.