Tag Archive for Google

IDC Predicts MSFT Smartphone Comeback

IDC Predicts MSFT Smartphone ComebackThe prognosticators at research firm International Data Corporation (IDC) have looked into their crystal ball and predicted that by 2015 Microsoft (MSFT) will take second place to Google’s (GOOG) Android in the smartphone market. IDC claims that in 2015, Windows 7 will pass Apple (AAPL) iOS as the alternative operating system to Android. Android will have about half the market and what is left will be divided between Research In Motion’s (RIMM) Blackberry and Apple.

TechEye points out in their indubitable way:

For that to happen, Apple followers will have to suddenly have a realisation that Jobs’ Mob’s walled garden of delights is not all it’s cracked up to be and would have to defect to the arch-enema of the Apple cargo cult – Steve Ballmer.

Symbian market will blindly follow Nokia to MSFTThe latest stats show how far Ballmer’s Boys have to go to meet IDG’s projections. MSFT has 5.5 percent of the market, apparently, IDG believes that all the Symbian market will blindly follow Nokia to MSFT because the firms made a billion-dollar deal. Sometimes it is also about functionality, copy and paste, multi-touch.

IDC Smartphone Market Share Predictions

20112015
Android 39.5 %Android 45.4 %
Symbian 20.9 %Windows 7 / Windows Mobile 20.9 %
iPhone 15.7 %iPhone 15.3 %
Research In Motion Ltd. BlackBerry 14.9 %Research In Motion Ltd. BlackBerry 13.7 %
Windows 7 / Windows Mobile 5.5 %Others 4.6 %
Others 3.5%Symbian 0.2 %

rb-

Well good for IDG, TechEye says they failed to see the rise of the iPhone or Android in 2006. History says that a full-frontal assault on a firm’s core business is not effective. MSFT has to create a market to make iPhone and Android irrelevant. I think the MSFT for MSFT sake opportunity is long gone.

What do you think?

Is IDG dreaming?

Can Windows Phone 7 reach second place on the market by 2015?

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IPv4 Address Worth $11.25

IPv4 Address Worth $11.25Now that the last IPv4 addresses are gone, the Internet numbers are increasing in value. Microsoft is spending $7.5 million for 666,625 IPv4 addresses from Nortel (NRTLQ). As Google (GOOG) and Apple (AAPL) fight over Nortel’s 4G bones (which I noted earlier), DownloadSquad reports that Microsoft (MSFT) jumped all over Nortel’s stash of IPv4 addresses when they became available for purchase through bankruptcy proceedings.

NORTELMicrosoft ponied up $7.5 million for the Nortel pool, which works out to $11.25 per IP address. There were 13 other interested buyers, but only Microsoft and three others actually submitted bids according to DownloadSquad. With the last block of IPv4 addresses already issued (which I wrote about when it happened), snatching up over 666,000 IPv4 addresses in one fell swoop is a smart move by Microsoft.

rb-

Microsoft CEO Steve BallmerCould Ballmer‘s boys be planning a cloud-based IPv6 <–> IPv4 transition service?

Are they trying to jump-start an IPv4 address space underground economy?

As the authors say, we’ll just have to wait and see.

What do you think?

What is Redmond up to?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Cyber Attack on Google, Yahoo, Skype Certs

TechyEye says that the Iranian paramilitaryBasij” group appears to have its own cyber warfare division which is launching attacks on the websites of Iran’s “enemies.” TechEye says the paramilitary group is an arm of the Revolutionary Guard.

Iran flagThe Associated Press cites General Ali Fazli, acting commander of the Basij, in the state-owned IRAN paper as saying Iran’s cyber army consists of university teachers, students, and clerics. He said its attacks were a retaliation for similar attacks on Iran. The AP quotes Fazli, “As there are cyber attacks on us, so is our cyber army of the Basij, which includes university instructors and students, as well as clerics, attacking websites of the enemy … Without resorting to the power of the Basij, we would not have been able to monitor and confront our enemies.”

Iran has sought to master the digital world as a crucial step to prepare for what it calls “soft war”, which includes fighting against cyber attacks such as the Stuxnet computer worm that Iran said was aimed at sabotaging its uranium enrichment program.

Until now the secretive “Cyber Army” that emerged to fight opposition websites and blogs after President Mahmoud Ahmadinejad’s disputed re-election in 2009 was believed to be part of the Revolutionary Guard. However in February according to the AP, General Mohammad Ali Jafari, signaled that the Revolutionary Guard supports the cyber army, describing it as a “defensive, security, political and cultural need for all countries”. Jafari claimed at the time that the Guard has been successful in cyber warfare.

Comodo logoIn another article TechEye recounts a possible Iranian cyber-warfare success. The article identifies Iran as the “state player” which hacked important Certificate Authority (CA) certificate information at Comodo. Digital certificates are used to vouch for the authenticity of a site owner and secure encrypted communications between sites and their users. A government that controls Internet traffic inside its country would be able to use such a server to gain access to encrypted e-mail and chat conversations and collect user names and passwords for individuals’ accounts, Mikko H. Hypponen, chief research officer at F-Secure, said in a blog post.

Security researcher and Tor developer Jacob Appelbaum found the compromise and alerted  Google and Mozilla.  USERTRUST Network, a part of Comodo issued the compromised certificates. Writing from his blog Mr. Appelbaum initially suspected the hack “was taken by a state-level adversary.” Comodo confirmed the attack and issued a statement naming Iran as the country it suspects. According to the Comodo blog, the incident happened on March 15th, when unknown attackers managed to get access to one of the user accounts for the RA.

An attacker obtained the username and password of a Comodo Trusted Partner in Southern Europe.  We are not yet clear about the nature or the details of the breach suffered by that partner other than knowing that other online accounts (not with Comodo) held by that partner were also compromised at about the same time.

The attacker used the username and password to log in to the particular Comodo RA account and effect the fraudulent issue of the certificates.

F-Secure logoAccording to F-Secure, the targets included Google (GOOG), Microsoft (MSFT), and Yahoo (YHOO):

  • login.live.com,
  • mail.google.com,
  • www.google.com,
  • login.yahoo.com,
  • login.skype.com,
  • addons.mozilla.com, and
  • “Global Trustee.”

Google patched Chrome last week and Mozilla managed to include the blacklist in Firefox 4.

rb-

It appears that Comodo did the right thing and made a responsible disclosure. According to reports, immediately after the breach was identified, they contacted the browser publishers and domain owners and filled them in on the situation.

As for the why? There is speculation that the Iranians wanted to control their internal dissidents. If they compromise the certificates, they could set up man-in-the-middle attacks by faking some of the world’s leading sites.

Some are speculating that it was China and not Iran behind this attack. The logic being, if they are good enough to take out a security company’s certificates, they are smart enough to spoof a few IP addresses as a decoy for investigators.

What do you think?

Did Comodo act fast enough?

Are Certificate Authority structures to complex for their own good?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The Value of Stolen Credentials

The Value of Stolen CredentialsThe evolution of Web 2.0 services and the parallel world of cybercrime is driving up the value of stolen credentials. That is the price that criminals charge each other for stolen user login information. The price of a file of user credentials, aka a `dump’ depends on the Internet service(s) where they can be used, Amichai Shulman, CTO of Imperva told Help Net Security.

Impeva logoImperva CTO Shulman told Net Security, “Just five years ago, the illegal trade in credit card details was a rising problem for the financial services industry, as well as their customers, with platinum and corporate cards being highly prized by the fraudsters … there are reports of Twitter credentials changing hands for up to $1,000 owing to the revenue generation that is possible from a Web 2.0 services account. This confirms our observations that credentials can fetch a high sum according to both the popularity of the application and the popularity of the account in question.”

The value of stolen credentials

This is illustrated by the ‘going rate’ of $1.50 for a Hotmail account, and $80.00-plus for a Gmail account. As a service, Hotmail has fallen out of favor, while Gmail’s all-around flexibility means it is a central service for business users, Mr. Shulman said. The result is that Gmail credentials can also give access to a range of Google cloud services. The vulnerable services including Google Docs and Adword accounts. Mr. Shulman explained that Google Docs can contain valuable additional information on the legitimate owner. Furthermore, an Adwords account can allow criminals to manipulate existing and trusted search engine results.

Twittter logoIt is a similar story with Twitter accounts. The added dimension of the immediacy of a social networking connection said, Mr. Shulman. “Twitter accounts are valuable to criminals that they will use almost any technique to harvest user credentials, including targeted phishing attacks. Once a fraudster gains access to a Twitter account, they can misuse it in a variety of ways to further their fraudulent activities,” he said. This happens because users are reusing passwords on other sites Some of those other sites turn out to have not been secure.

That’s the thing; as soon as any of the sites you log in to gets compromised, the email address or username and password associated with it can be tried by the bad guy on various other services. Since most people re-use passwords, there’s a high likelihood that they will gain access to your account. From there, who knows what kind of damage they might cause. If you’re lucky, you’ll notice something’s amiss. Twitter advised that people are continuing to use the same email address and password (or a variant) on multiple sites. We strongly suggest that you use different passwords for each service you sign up for.

Stolen online banking credentials

In a related article, Trusteer reports that most online banking customers reuse their login credentials on non-financial websites. Trusteer found that 73% of bank customers use their banking account passwords to access much less secure websites. They also found that 47% use both their online banking user ID and password to log in elsewhere on the Internet.

Cybercriminals are exploiting the widespread reuse of online banking credentials. These criminals have devised various methods to harvest login credentials from less secure sources, such as webmail and social network websites. Once acquired, these usernames and passwords are tested on financial services sites to commit fraud.

The report’s key findings include:

  • 73% of users share the passwords which they use for online banking, with at least one nonfinancial website.
  • 47% of users share both their user ID and password with at least one nonfinancial website.
  • When a bank allows users to choose their own user ID, 65% of users share this ID with nonfinancial websites.
  • When a bank chooses the user ID for its customers, 42% use the bank-issued user ID with at least one other website.

Using stolen credentials remains the easiest way for criminals to bypass the security measures implemented by banks to protect their online applications, so we wanted to see how often users repurpose their financial service usernames and passwords,” said Amit Klein, CTO of Trusteer and head of the company’s research organization. “Our findings were very surprising, and reveal that consumers are not aware, or are choosing to ignore, the security implications of reusing their banking credentials on multiple websites.

If this isn’t a wake-up call to anyone with multiple IDs that use the same password, I don’t know what is. Internet users – especially those with business accounts – need to use different passwords for different services, or they could face the disastrous consequences of taking a slack approach to their credentials,” Shulman told Help Net Security.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Apple Disrupts Mobile PC Market

Apple Disrupts Mobile PC MarketApple is riding a wave of success now and is disrupting the mobile PC market for its competition. KPCB says that social networking will drive the mobile PC market for the rest of this decade. Facebook has 662 million users and Twitter has 253 million users which will continue to grow. TechEYE points out that mobile products now have more processing power, improved user interfaces, and lower prices meaning that there are now ten times more mobile devices globally than a decade ago.

social networking and mobile devicesTechEYE says that the link between social networking and mobile devices can be seen clearly in the Japanese market where a general rise in access to social networking sites has increased, while the number of people accessing them from a traditional PC has steadily decreased – 85 percent of users accessing sites from mobile devices in the last quarter of 2010.

Surging iPad shipments have propelled Apple (AAPL) to a 17.2% share of the global mobile PC market. ITnewsLink reports that this puts Apple at the top of the Q4’10 DisplaySearch market share ranking of worldwide mobile PC shipments. The preliminary results from the Quarterly Mobile PC Shipment and Forecast Report says Apple shipped more than 10.2 million notebook and tablet PCs combined. This was nearly a million more units than HP in Q4’10. ITnewsLink quotes Richard Shim, Senior Analyst at DisplaySearch on Apple’s success.

“While we anticipate increased competition in the tablet PC market later this year with the introduction of Android Honeycomb-based tablets, Apple’s iPad business is complementing a notebook line whose shipments widely exceed the industry average growth rate. Apple is currently benefiting from significant and comprehensive growth from both sectors of the mobile PC spectrum, notebooks and tablet PCs. Cannibalization seems limited at this point.”

Apple ComputersThe top five brands in the mobile PC market Q4’10 are:

  1. Apple
  2. HP (HPQ)
  3. Acer (2353)
  4. Dell (DELL)
  5. Toshiba (TOSBF)

The top five brands accounted for 65.4% of the total mobile PC market. In Q4’10, worldwide mobile PC shipments (including tablet PCs) reached 59.6 million units according to DisplaySearch.

The drive to keep up with the Jobs’s will cause supply chain disruptions for Apple’s mobile PC competition TechEYE says. DigiTimes reports that supplies of notebook components are running short, including CMOS image sensors, chassis, batteries, and LED’s. TechEYE sources report that touchpads are suffering the most serious shortage as a result of Apple hogging the supply from manufacturers such as Wintek and TPK. Reports are that Apple has reserved 60% of global touchpad production capacity. RIM (RIMM), Motorola (MMI), HP. HTC, Samsung, LG, and Dell now all have to fight it out for the remaining 40% of touchpads.

TechEYE predicts that panels will be like gold dust. Bob Raikes, Managing Director at Meko, The European Display Market Research specialist, told TechEye, “Touch technology also tended to limit the visual quality of the display …  Then Apple’s iPhone started to use projected capacitive touch technology. which didn’t degrade the image and allowed a new level of user experience.”

In the last year, there has been a huge swing to use projected capacitive technology in high volume portable devices, and the supply chain has struggled to catch up.  Chunghwa Picture Tubes is teaming up with Compal, one of the biggest manufacturers of laptops for multinationals, to piece together a business in touch panel glass. Compal recognizes that tablets are here to drain the world of its glass supplies and wants to capitalize.

rb-

Looks like Steve Jobs is at it again. In the past, Apple bought up flash memory stores to secure an advantage for their iPod  MP3 players. You have to imagine that the rest of the tablet field is none too pleased with Apple’s tactics.

What do you think?

Do you use a tablet?

View Results

Loading ... Loading ...

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.