Blogger Widgets

Selasa, 25 September 2012

Hacker Brings Google Maps to iOS 6

Hacker Ryan Petrich recently posted a YouTube video showing Google Maps installed on an iPhone 3GS running iOS 6.

"Before you watch, Petrich would like to apologize for the poor video quality as he says 'YouTube mangles source video if it’s less than a certain width,'" writes The Next Web's Emil Protalinski. "While the iOS hacker hasn’t revealed how he pulled off the feat, the video’s description does offer a bit more detail: 'Preview of the old Google Maps application from iOS5.1 and earlier running on an iPhone 3G S updated to iOS 6.0. Still crashy and cannot be distributed to the public yet, but it mostly works :)'"

"Apple carved out some trouble for itself last week when its new Maps app launched as part of iOS 6," notes CNET News' Lance Whitney. "Users soon discovered a rash of problems with the app, including missing or lost cities, duplicated islands, mislabeled locations, and fuzzy images. The company specifically kicked out Google Maps from iOS to make way for its own Maps app."

"Petrich didn’t say when, if ever, the working version of Google Maps will be released for jailbroken iOS 6 devices through Cydia," writes TechnoBuffalo's Todd Haselton. "If you need a solution in the meantime, we suggest checking out Nokia or Google’s web applications, which are both free."

"Considering the iPhone 3GS in the video doesn't have a SIM card installed, its likely that GPS services are one of the features still being prepped by Petrich," writes International Digital Times' Scott Craft.

"Regardless, to have the iOS 5 Google Maps app ported to iOS 6 in such a short period of time is an impressive feat, and one that will be welcome news to a great many early adopters of both the iPhone 5 and iOS 6."

(from: http://www.esecurityplanet.com/hackers/hacker-brings-google-maps-to-ios-6.html)

ASUS Italy Hacked

Hacker "Maxney," a member of the Turkish Ajan Hacker Group, recently hacked and defaced a Web site belonging to ASUS, and published more than 8,000 user details on Pastebin.

"The website that was attacked is the Italian notebook based (notebook.asus.it/) site that has information on ASUS' Notebook range as well as offering some online services to its clients," Cyber War News reports.

"The leak has been posted in 4 different pastes," writes E Hacking News' Sabari Selvan. "It contains a bunch of user information such as names, numbers, address and company information totalling over 8000 all together."

"'Hearts a petrified Monster Israeli Zionists. You will find us in the face of all the games you've played,' the attackers wrote on the defaced page," writes Softpedia's Eduard Kovacs. "The same collective has claimed responsibility for the hacks that targeted Siemens and Domino’s India. From the site of Domino’s they have leaked the details of over 37,000 customers."

(from:http://www.esecurityplanet.com/hackers/asus-italy-hacked.html)

iPhone 5 'jailbroken' by hackeriPhone 5 'jailbroken' by hacker



An American man has claimed that he hacked the new iPhone 5, less than eight hours after it was released to the public. Grant Paul, who develops software for Apple's iOS operating system, posted photos on his Twitter page of a 'jailbroken' iPhone 5.Tech news site The Next Web reports that Paul's hack of the new phone is remarkably fast.

According to the Daily Mail, instructions for stable 'jailbreaks' are posted online, which allow normal users to free their phones of Apple's restrictions.
 
Paul tweeted a photo of an iPhone5 screenshot that included Cydia, the app used to download non- Apple -approved software on jailbroken iPhones.

The implication of the photo was that Paul had been able to download Cydia to his iPhone 5 only because he was successfully able to hack it, the report said.

He celebrated the remarkable achievement by tweeting, 'taller screens like Cydia too. :)'
According to the paper, the tech community has largely accepted the pictures as proof that the iPhone 5 has successfully been cracked.

(from:http://www.hindustantimes.com/technology/BusinessComputing-Updates/iPhone-5-jailbroken-by-hacker/SP-Article1-934743.aspx)

Hacker Challenge Winner: Create a Dock Out of Just Your Smartphone Box

Walter Glenn

In last week's Hacker Challenge, we asked you to craft a DIY smartphone accessory. You sent us some great stuff, but the winning hack belongs to Matthew Dias.
Check out the description of Matthew's winning entry below and read about some of our other favorites.

Hacker Challenge Winner: Create a Dock Out of Just Your Smartphone Box

Winner: Create a Dock With Just Your Box

Matthew Dias made a dock (see lead image) using just his phone's box. He slit the back for the cable (using the instruction pack for extra padding under the connector) and one in the middle of the packaging tray small enough for the connector to stay firmly wedged. We loved that Matthew used only pieces that any smartphone buyer already has at hand.

Honorable Mentions

We got a lot of great entries and we'd be remiss if we didn't share some of our favorites. Here are some of the entries that really impressed us.

Mount Your Phone in Your Car Using Magnets

Hacker Challenge Winner: Create a Dock Out of Just Your Smartphone Box
Reader LMahesh used magnets to mount his phone to his dash. There are no buttons to press and no clamps to squeeze. All functions work as expected—compass, GPS, reception, and WiFi. Since his iPhone did not have sufficient metal in the rear panel, LMahesh used a custom replacement rear panel with metal elements. You could also use a case with metal elements.

Build a Car Mount With LEGOS

Hacker Challenge Winner: Create a Dock Out of Just Your Smartphone Box
Reader Paul Rea was frustrated with clunky, oversized universal car mounts, so he built one just for his phone—using LEGO Technic pieces and zip ties. His construction holds the mount securely in an empty slot under his stereo, providing a ready place to slide his phone. You can check out more details of his build in the PDF he provided.

Knit a Cozy For Your Smartphone

Hacker Challenge Winner: Create a Dock Out of Just Your Smartphone Box
Reader Jacquie Howard knitted a great-looking cozy for her iPhone. When you look at it straight on, it appears to feature just red and black stripes. But when you hold it at an angle, a cleverly-hidden Apple Logo is revealed. She also left a small window so she could swipe to answer a call without removing the phone from the cozy.

A big thanks to everyone who took the time to send us entries! Be sure to check back every week for a new challenge. 
 
(from:http://lifehacker.com/5945966/hacker-challenge-winner-create-a-dock-out-of-just-your-smartphone-box)

Selasa, 11 September 2012

Biz Break: HP trims more jobs; solar panel installations jump


Today: Hewlett Packard's (HPQ) planned layoffs grow by 2,000. Plus: Solar panel installation jumps. Also: Hacker group attacks web host Go Daddy. And: Microsoft expected to raise dividend 15 percent.
HP trimming more than expected Hewlett Packard's massive restructuring is claiming an additional 2,000 jobs, bringing the total to 29,000 workers who will be trimmed through 2014 in a combination of early retirements and layoffs.

In a filing with the Securities and Exchange Commission Monday, the Palo Alto computer giant did not explain the additional cuts, but much of that increase is attributed by insiders to more employees than expected signing up for an early retirement plan. The plan is open to U.S. employees whose combined age and years of service equals 65 years or more.

About 8,500 employees are taking early retirement, the company said in the filing. Most will leave the company on Aug. 31. HP is paying out lump sum benefits of five to 14 months salary depending on years of service. Another 3,800 were laid off in the last quarter.

Employees taking early retirement can continue health coverage at active employee contribution rates for two years, according to the filing. For employees not eligible for company subsidized medical plans, HP is providing up to $12,000 in employer credits under a company retirement medical savings account program.

The downsizing was announced at the end of May by CEO Meg Whitman as part of a streamlining of the company, which has run into competitive headwinds aggravated by some acquisitions over the past few years that haven't panned out. The workforce trimming affects nearly every department and the layoffs and buyouts come to about 8 percent of HP's workforce.

Part of the streamlining involves consolidating units in the company's lackluster business services division and eliminating 8,000 positions. A big part of that operation was acquired with Texas-based EDS, which HP bought in 2008.

Solar panel installations jump, powered by utilities The installed base of solar panels jumped 45 percent nationwide to 742 megawatts, with California and Arizona leading the market.

Much of the growth was fueled by the completion of more than 20 large solar power plant projects in Arizona, California and other key states, according to a report released today by GTM Research and the Solar Energy Industries Association.

Utility installations accounted for nearly 478 of the 742 megawatts, according to the report.

"The price of solar continues to come down, and utilities are turning more and more to solar," said Shayle Kann, vice president of research at GTM research.

The installation figures also include those on homes and businesses as well as much larger, utility-scale power plants.

The report also found that in the residential market, third-party ownership models accounted for 70 percent of residential installations. Bay Area companies like SolarCity, SunRun and Sungevity have led the way, offering consumers a way to go solar with no-money-down via leases or power purchase agreements. San Jose-based SunPower (SPWRA), which makes its own solar panels, has also gotten into the leasing game.

"In markets where third-party ownership is an option, it quickly becomes the preferred option," said Kann.
Hacker attacks web hosting service Go Daddy A hacker took down the web hosting service Go Daddy (godaddy.com) Monday, apparently shutting down its servers and the accounts and e-mails of thousands of users.

The hacker announced the attack on Twitter, signing his tweets Anonymous Own3r.

"I'm taking godaddy down because well i'd like to test how the cyber security is safe and for more reasons that i cannot talk now," Anonymous Ow3r tweeted.

Go Daddy tweeted that it was working on the problem, and by late afternoon had restored some service. Go Daddy is one of the largest web hosting services.

In more hacking news, a Florida mobile publishing company says its files, and not the FBI's, were hacked by the group that released Apple (AAPL) user identification codes last week, claiming they were obtained from an FBI laptop.

The codes actually came from BlueToad, a small Florida company that hosts publications and creates mobile apps for its clients, Reuters reported. AntiSec, an affiliate of the hacker group Anonymous, has claimed responsibility for releasing the codes.

"We want to apologize, announce what happened and set the record straight," Paul DeHart, chief executive officer of BlueToad, told Reuters.
 
He said the company quickly realized that its files had been compromised after the hackers announced the release of the material on Sept. 3. There were fewer than 2 million user identification codes released, not the 12 million claimed by AntiSec, he told Reuters.

An FBI spokesman said BlueToad indeed appears to have been where the group got the user ids.
The codes are assigned to Apple products such as iPhones and iPads and are used by mobile applications and gaming networks to identify individual users.

Microsoft to raise quarterly dividend by 15 percent

Some analysts are predicting that Microsoft will raise its quarterly dividend by three cents to 23 cents a share at its annual meeting this month.

The company is sitting on $63 billion in cash and short-term assets, $54 billion of which is held and can't be repatriated to the U.S. without facing taxation.

Not every analyst is predicting a 15 percent increase, Bloomberg noted. An analyst at Goldman Sachs is forecasting a two cent, or 10 percent boost, it said.

The Redmond, Wash. software giant has raised its dividend in each of the past two years.

Silicon Valley tech stocks
Up: HP
Down: Apple, Google (GOOG), Intel (INTC), Cisco (CSCO), eBay (EBAY), Yahoo (YHOO), Netflix (NFLX), LinkedIn, Facebook, Zynga

The tech-heavy Nasdaq composite index: Down 32.40 or 1.03 percent to 3,104.02

The blue chip Dow Jones industrial average: down 52.35, or 0.39 percent to 13,253.98.

And the widely watched Standard & Poor's 500 index: Down 8.84 or 0.61 percent to 1,429.08.

Check in weekday afternoons for the 60-Second Business Break, a summary of news from Mercury News staff writers, The Associated Press, Bloomberg News and other wire services.

(from: http://www.mercurynews.com/60-second-business-break/ci_21510080/biz-break-hp-trims-some-more-solar-installations-hacker-attacks-godaddy-microsoft-dividend)

Silicon Valley isn't sharing Facebook's misery

MENLO PARK, Calif. —

Silicon Valley, it turns out, doesn't revolve around the stock prices of Facebook and its playful sidekick, Zynga.

By most indications, tech companies in this hub of innovation are humming along, even as two of its rising stars endure steep declines in their stock prices that have wiped out more than $60 billion in wealth in the past six months.

Companies catering to mobile devices, business software and data management products are thriving, while longtime Silicon Valley stalwarts such as Apple Inc. and Google Inc. remain among the most revered brands in the world.

"Nothing has fundamentally changed about the opportunities that are possible," says Aaron Levie, CEO of Box, an online data-storage company based in Los Altos, Calif.

The optimism in Silicon Valley can be seen in a variety of ways in this area that covers roughly 40 miles from San Jose to San Francisco:
- Entrepreneurs are still pursuing big ideas and raising millions of dollars.
Silicon Valley startups raised $3.2 billion from venture capitalists during the April-June quarter, far more than in any other part of the U.S as tracked by the National Venture Capital Association. Venture capital flowing into Silicon Valley increased by 4 percent from the same time last year, while it dropped 12 percent nationwide.
- Apartment rents in San Francisco have soared beyond the lofty levels of the original Internet boom more than a decade ago. This time, it's being driven by well-paid software engineers and Web designers who are flocking to Silicon Valley.
San Francisco apartments rented for an average of $2,734 in June, up 13 percent from a year ago and well above the average of $2,128 when technology stocks were at their peak before the dot-com bubble burst in 2001, according to the research firm RealFacts. Renting in San Jose - the region's largest city - is less expensive than San Francisco, but even there the average lease cost $1,811 a month in June, a 10 percent increase from last year.
- Computer coding programmers still command top dollar for their services because there aren't enough of them to meet demand.
Jeremy Stoppelman, CEO of the 8-year-old online reviews service Yelp Inc., said his company is always behind on its hiring goals for software engineers.

"There is no one who is like `Oh, we have all the engineers we need and we don't need more,'" he says. Competition is fierce from all sides - massive companies such as Google and Facebook, tiny startup incubators and everything in between.

"And there is attrition," Stoppelman says. "From what I gather from engineers, two, three times a week they get calls from recruiters."

Software engineers working in the San Francisco area are now paid an average of about $115,000, up from $106,000 in 2008, according to Glassdoor.com, which analyzed compensation figures collected from users. The average salary for software engineers in the Bay Area is about 17 percent higher than the national average for the same occupation, according to Glassdoor.

Google now pays its engineers an average of $142,000, up from just under $104,000 in 2008, Glassdoor calculated. During that time, Google's workforce has swelled by 70 percent to about 34,000 employees, including thousands of engineers working at or near its headquarters in Mountain View, Calif.
Even Facebook and Zynga remain on hiring sprees.

Facebook still plans to transform its Menlo Park headquarters into the equivalent of a small town that is supposed to eventually house 6,000 workers. The social networking leader has hired famed architect Frank Gehry to design a 420,000-square-foot warehouse that will feature a garden growing across its roof. Plans also call for a town square featuring restaurants, a bike shop and health clinic.

Levie moved Box from Seattle several years ago because he believed his company had to be in Silicon Valley to succeed. Box now employs about 500 workers and raised $125 million this summer. Levie is just 27, a few months younger than Facebook founder Mark Zuckerberg, who turned 28 the week his company went public in May.

Echoing an oft-repeated Silicon Valley ethos, Levie says startups are much more focused on their long-term prospects than their performance from one quarter to the next.

Wall Street, though, isn't known for its patience. Investors' fixation on short-term results has left Facebook's stock trading at about half of its initial public offering price, while Zynga's stock has lost more than two-thirds of its value.

Driven by the hype leading up to its IPO, Facebook Inc. opened with a stock price of $38 and a market value of $104 billion. Less than four months later, share prices have lost half their value.

Investors have been unhappy that Facebook's revenue growth is slowing, seen as a sign the company won't be able to make as much money as more people use Facebook on mobile devices, where there is less room to show ads. The worries have hammered Facebook's stock, even though many analysts still see the company as a solid long-term investment.

"The challenge of the public markets is that it has the ability to create a lot of these near-term distractions if you start paying attention to the day-to-day stock price changes," Levie says. "A lot of those day-to-day changes have no bearing or relevance on the ultimate opportunity for your business."

Facebook has consistently declined to talk about its stock price. But CFO David Ebersman told analysts in July that "obviously we're disappointed about how the stock has traded."

"But I think the important thing for us is to stay focused on the fact that we're the same company now as we were before," he added.

Zuckerberg will get a chance to muse about Facebook's fall on Tuesday when he is scheduled to speak at a technology conference in San Francisco.

Zynga Inc., the maker of "FarmVille," "Mafia Wars" and other games that first became popular on Facebook, appears to face more uncertainty.

The San Francisco company is losing money and players while facing stiff competition as more games are played on mobile devices instead of personal computers. CEO Mark Pincus insists the company will rebound, though many analysts consider Zynga hopelessly adrift. Zynga's shares are now hovering around $3, down from a peak of nearly $16 in early March.

Nonetheless, there are nothing but good vibes emanating from many other technology companies in Silicon Valley and San Francisco.

Even as Zynga employees watch the value of their stock options deflate, the 65 or so workers at Pinterest are settling in to the online scrapbooking service's new San Francisco headquarters just a block away.

Around the same time Facebook went public, Pinterest raised $100 million from investors who valued the company at $1.5 billion, according to several media reports.

Meanwhile, iPhone maker Apple has established itself as the world's most valuable public company - ever. It hit another all-time high Monday as anticipation builds for Wednesday's expected unveiling of the latest iPhone.

"We have completely forgotten the bad days at Apple," says Alfred Chuang, former CEO of software maker BEA Systems and founder of software startup Magnet Systems.

Bankruptcy loomed at Apple in the mid-1990s until exiled co-founder Steve Jobs returned.

Today, Apple boasts a market value of about $630 billion and is riding a wave of culture-shaping innovation that Jobs unleashed with the development of the iPod, iPhone and iPad before he died last year.

Apple's ups and downs are emblematic of Silicon Valley's often-turbulent climate, Chuang says.

"But when we see something heading down fast, the next wave can be heading up very quickly," he says.
Professional networking service LinkedIn, whose IPO preceded Facebook's by a year, has become the best-performing Internet stock to go public since the start of 2011, according to Dealogic, a research firm. LinkedIn is doing so well that it recently signed a lease to expand into Sunnyvale, Calif., offices spanning 560,000 square feet beginning in 2014. The additional space will enable LinkedIn to add about 3,000 more workers in Silicon Valley.

Meanwhile, a slew of unsexy, business-focused tech startups are raising big money from prominent venture capitalists drawn to the companies' stability and predictable business models.

"Facebook is yesterday's story. People are looking at the next thing," says Terry Connelly, dean emeritus at Golden Gate University's Ageno School of Business in San Francisco.

Some of the best examples include Silicon Valley-based software companies Palo Alto Networks Inc., ServiceNow Inc. and Splunk Inc.

All have seen their value grow by more than half since their IPOs this year, even as IPOs of better-known companies such as Facebook proved to be a disappointment.

The difference? Rather than focusing on consumers whose tastes can be finicky and rise and fall with trends, these three court corporations and government agencies as customers. Palo Alto makes firewall technology that protects computer networks, ServiceNow's software automates technology operations and Splunk's analyzes massive amounts of data.

"You can make a lot of money selling stuff that nobody understands," jokes Ben Horowitz, who went through the first Internet boom as an executive at Web browser pioneer Netscape Communications during the late 1990s. He's now a partner at the venture capital firm Andreessen Horowitz.

On average, the 60 technology companies that have gone public since the start of 2011 had seen their stock price increase by 11 percent through August, according to Dealogic. That was slightly better than the 9 percent gain posted by the Standard & Poor's 500.

Even companies that have seen their market values grow know they can't afford to slow down.

Splunk's stock price has more than doubled to about $37 since its April IPO, which Chief Marketing Officer Steve Sommer says "makes everyone feel good."

But he says signs posted around the company's San Francisco office remind employees that they are at "mile 3 of the marathon."

"It does feel good to have a successful stock price (to) look at, but everybody is focused on what we can do to get to mile four, five," he says.
---
Michael Liedtke reported from San Francisco.

(from: http://seattletimes.com/html/businesstechnology/2019116085_apustecgoodtimesinsiliconvalley.html)

The iPhone 5 Technology Rabbit Hole

What could possibly have caused Apple's (AAPL) iPhone 5 to fall fifteen months behind schedule? A slip-up in a recent Apple patent application might provide the answer - and the investment opportunity of a lifetime.
The release of the iPhone 5 was initially expected on Apple's normal release schedule in June of last year. This is ideal timing for optimizing back-to-school sales. After all, students are Apple's largest customer base. But when the kids found themselves back in school without any new Apple gear, some speculated that the company was busy working on some groundbreaking new technology to further set them apart from the competition. And after what seemed like an eternity to the millions of frothing Apple enthusiasts, a new iPhone was finally announced in October. But it wasn't the expected fifth generation model.
Sure, the 4S had an upgraded processor, a retina display and apologists attempted to justify the otherwise unexplained delay on Siri, which was, admittedly, a very impressive feature. When the iPhone 3GS was introduced, everyone learned that Apple is able to command such premium prices because their products are more than just technology - they are fashion. Fewer people are going upgrade if it isn't outwardly apparent that they didn't spend a tidy sum in order to do so. Had Steve and Tim made the same mistake twice while burning up an extra three months in the process?
Due to information disclosed within a seemingly benign patent application and some very under-the-radar deals, it is my opinion that the iPhone 4S was a rushed, stop-gap cover-up for a botched iPhone 5 launch. This realization provokes but one big question: what technology is Apple bringing to market?
And down the hole we go...
Realize that fifteen months behind schedule doesn't just happen for something trivial. Especially in the context of the most valuable corporation on the planet. They have a stable of cash that only Dr. Evil can comprehend. They should be able to buy anything, right? I call US Patent Application 20120185797 to the stand. While the assignee of this patent is not listed, it should be obvious from the content that it is Apple (e.g. - the inventors work for Apple, there is an Apple copyright, several mentions of iPhone, iPad, Mac, etc).
This is a pretty boring patent app with one exception: the mention of "phase change memory" or PCM, a next-generation memory that has the potential to displace flash and DRAM memory types with dramatic power-efficiency. Now, it is important to note that PCM is listed in many of Apple's other patents. But these mentions always been in conjunction with the other leading next-gen memory types (which is a typical patent strategy). In this particular application, it is listed exclusively alongside the traditional memory technology incumbents - RAM, ROM and flash.
If the iPhone 5 uses PCM, then it will have breathtaking processing power with incredible energy efficiency - handheld panacea.
If you are still with me, connecting the dots is not too difficult. Most notably, Apple relies on Samsung in order to fabricate the custom microprocessors that power the iPhone and iPad. It should be no surprise that Samsung is the leader in PCM research, having produced a functional 8 gigabit PCM array on cutting-edge 20 nanometer technology. While Samsung has presented this as simple research, it is my opinion that nobody would invest such a substantial amount into just research. Tying up a brand new 20 nanometer fab cost them a fortune in both direct and opportunity costs. This was to be a commercial part - one that, potentially, was to sit in the core of the iPhone 5.
But something went awry with this part and, thus, the iPhone 5 was delayed. Samsung discussed this 8Gb PCM array at the International Solid-State Circuits Conference last February and the focus was on the need to redesign the chip in order to increase bandwidth. I submit that the engineers had proofed the chip using a larger fab process (say, on an old 45 nanometer fab) and anticipated certain performance after scaling it down to 20 nanometers. When these expectations were not met, they had to go back to the drawing board. And Apple had to scramble to churn out a stop-gap 4S.
What exactly does PCM technology facilitate? Before we can understand the answer to this question, it is important to understand the current technology. Briefly, when your smartphone notifies you of some activity (e.g. - an email, Facebook activity, text message, etc), understand that this notification is provided by way of a running application. When you power-on your phone, applications are copied from flash memory, which lacks the durability and speed to execute applications, to system memory which is provided by DRAM, a memory that is durable and fast but loses its state when power is removed ("volatility").
Realize that, even if you can't see them, these applications are always running in the background in order to provide such notifications or other functionality. Since they need to be in DRAM in order to be running, there is a requisite power consumption associated with any active functionality. This is why battery life decreases as more active applications are installed - a problem that has become the bane of the smartphone industry. Uphill. Both ways. In the snow.
PCM, however, has the non-volatile characteristics of flash memory and the effective speed of DRAM memory. So, once an application is loaded into PCM, it never needs to be loaded again - even after power has been removed from the underlying memory. The application will always be in the state that it was in when it was last executed. So instead of supplying continuous battery power to the Facebook application, for example, PCM allows the phone to simply power-up the underlying memory once or twice a minute so that it can check for new activity. PCM-enabled phones will sip battery instead of guzzle. This is applicable for the operating system as well. After PCM, "booting up" will be a story that we tell to the grandchildren.
The technical types will be quick to point out that PCM bandwidth is not high enough to serve as main memory in a high-performance smartphone application. This issue has been addressed in the form of "hybrid memory", which leverages a small DRAM cache to mitigate the performance penalties of PCM (Side note: what is "hybrid" in the "hybrid memory cube"?).
With eight bits in a byte, the aforementioned 8 gigabit Samsung PCM array works out to a gigabyte which, not surprisingly, coincides with the rumored specification of the iPhone 5. Again, this specification has also puzzled industry analysts because 2GB RAM is the current high-end standard. Just realize that 1GB was the standard 15 months ago.
The hypothesis of a PCM-enabled iPhone is further reinforced by the leaked battery specification, which is fully expected to be entirely insufficient in the face of the power-hungry LTE network requirements.
"Either way, Apple will likely have something up its sleeve if these leaked pictures really are the final battery, as it's tough to imagine the company will launch its first-ever LTE iPhone with poor battery life." -- Brad Reed, bgr.com
Furthermore, to the befuddlement of industry analysts, Toshiba (one of Apple's largest suppliers) recently announced a dramatic cut in flash memory production capacity. Still, the PCM-enabled iPhone idea is certainly a stretch and I will be the first to admit that. But events like this can produce the investment of a lifetime. If the iPhone 5 does show up with PCM, how can one capitalize?
The base PCM technology is owned by a company called Ovonyx, which was established by Intel (INTC), some ex-Micron employees and Energy Conversion Devices (ECD). ECD was put into bankruptcy this past February and the stock has gone dark as of last week. It is my opinion that this bankruptcy was orchestrated with the sole purpose of quietly extracting ECD's 38.6 percent interest in Ovonyx. This transaction was recently completed - Micron purchased the interest for just $12 million.
Ethical (and speculative) rants aside, Micron (MU) is now positioned to capitalize on a hypothetical PCM-enabled iPhone. Even if this speculation proves to be false, the PCM technology is now real and expected to be a foregone conclusion in displacing a broad part of the $70+ billion DRAM and flash markets. IBM, for example, expects PCM to play a role in dramatically reducing the power consumption of data centers.
Intel owns 45 percent of Ovonyx with the remaining 16.4 percent being held by private interests. Because Intel's market cap is much higher, the impact on share price will be less dramatic. I do, however, see Intel acquiring Micron, which owns Intel's old flash memory business Numonyx (not to be confused with Ovonyx) at this point since PCM is the solution to Intel's inability to penetrate the mobile markets. A relationship is already in place - with PCM fruit.
With PCM, your phone can have an Intel processor just like your laptop or desktop. And so it can run the same operating system. Your PC will always be with you - in your pocket or purse. When you go home, a wireless monitor, keyboard, mouse and speakers will allow you to use it as a regular PC (or Mac, which also leverage Intel processors).
This is a fundamental shift in the way that we use computing. Disruptive.


(from: http://seekingalpha.com/article/858041-the-iphone-5-technology-rabbit-hole)

Technology Stocks With Record Dividends Send Bearish Signal

U.S. technology companies have pushed their dividends to the highest level on record, a signal to investors that profit growth in the industry is slowing. 

Computer and software makers, the biggest contributors to this year’s 14 percent rally in the Standard & Poor’s 500 Index, will pay out $45.10 in total dividends per share in the next 12 months, according to data compiled by Bloomberg. Technology companies that started or raised dividends in 2012 have climbed 1.3 percent on average since the announcement, compared with gains of 15 percent for those that didn’t increase payouts.

While bulls say bigger dividends are a sign of confidence after 11 straight quarters of rising earnings in the industry left companies with ample funds to compensate shareholders, bears say boosting payouts shows chief executive officers are running out of ways to use their cash. Microsoft Corp. (MSFT), which started returning cash to shareholders in March 2003, has increased 31 percent since then, compared with 73 percent for the S&P 500.

“The signal that they are sending to the shareholders is, ‘look, growth prospects just aren’t there,’” Malcolm Polley, who manages $1.1 billion as chief investment officer at Stewart Capital in Indiana, Pennsylvania, said by phone Sept. 5. “Those companies that are paying dividends and increasing dividends, they used to be businesses that were fast growing, they needed every dime of cash flow to reinvest in the business, but these are by and large very mature businesses now.”

Central Banks

The S&P 500 rallied to the highest level since 2008 last week, climbing 2.2 percent to 1,437.92 after the European Central Bank said it would buy bonds to ease the sovereign debt crisis. Technology shares rose 2.1 percent, extending their 2012 gain to 22 percent, the most of the 10 industries in the S&P 500. (SPX) Futures on the S&P 500 declined 0.2 percent at 8:27 a.m. in London today.

Apple Inc., Dell Inc. (DELL) and SAIC Inc. (SAI) are among the 13 companies in the S&P 500 that have initiated a quarterly payout this year, according to data from S&P. Dell dropped (DELL) 11 percent and SAIC slumped 6.9 percent since announcing the decision, while Apple is up 13 percent.

Technology companies still have the lowest dividends among S&P 500 groups, at 1.1 percent of share prices, data compiled by Bloomberg show. The S&P 500 yields 2.1 percent.

Intel Forecasts

Intel, which cut its third-quarter sales forecast last week on falling demand for personal computers, has increased its dividend three times in the past 18 months. The world’s largest semiconductor maker, based in Santa Clara, California, has raised the award to 22.5 cents a share in May and the shares have retreated 13 percent since then.

Dell said in June that it would start to pay dividends (DELL) and has reported three consecutive quarters of declining earnings.

While investors expect utilities, phone companies and pharmaceutical makers to pay dividends, the technology industry has traditionally been different, using excess cash to fund research, development and acquisitions that would drive up profits faster than in more mature sectors of the economy.

Telecommunication stocks pay the most, with a yield of 4.5 percent, and utilities are the next-highest at 4 percent. Five of the eight S&P 500 phone stocks pay a dividend, with Windstream Corp. (WIN), based in Little Rock, Arkansas, yielding 9.9 percent.

‘Solid Companies’

“If we’re talking about growth technology stocks, paying out a dividend probably isn’t a good thing,” Timothy Ghriskey, the chief investment officer at Solaris Group LLC, which manages about $2 billion, said in a phone interview from Bedford Hills, New York. Now, they are “good companies, solid companies, but they don’t have the same growth profile generally as a non- dividend payer,” he said.

Earnings growth among computer companies is forecast to slow for the next two years. Profits may increase 18 percent in 2012, 14 percent in 2013 and 12 percent in 2014, according to about 1,600 analysts’ estimates compiled by Bloomberg.

New dividends have historically preceded weaker stock performance. In the last decade, computer companies that started the programs rose 2.2 percent on average in the three months after the announcement, Bloomberg data show. That compares with an average 5.7 percent three-month gain for stocks in the industry that haven’t made a payout.

(from: http://www.businessweek.com/news/2012-09-09/tech-stocks-with-record-dividends-send-bear-signal-for-investors)

Attention on iPhone as holiday lineups unveiled

NEW YORK —
Attention is turning to Apple this week amid expectations that it's announcing a new iPhone.

Amazon, Nokia and Motorola all tried to generate interest in their products last week, hoping that a head start on the buzz will translate into stronger sales.

Amazon announced four new Kindle Fire models and a new line of stand-alone e-readers, while Nokia and Motorola unveiled five new smartphones between them. Makers of consumer electronics are refreshing their products for the holiday shopping season.

Nokia and Microsoft, in particular, are trying to generate interest in a new Windows operating system out next month. The two phones announced by Nokia are among the first to run Windows Phone 8.

Sales of Apple's iPhones are still strong, though the company lost the lead in smartphones to Samsung this year. Samsung Electronics Co. benefited from having its Galaxy S III out in the U.S. in June, while Apple was still selling an iPhone model released last October. A new iPhone is expected as early as this month, allowing Apple to recapture the attention and the revenue.

Apple dominates the market for tablet computers. Seven out of every 10 tablets shipped in the second quarter were iPads, according to research firm IHS iSuppli.

Rivals have been trying to compete with smaller, cheaper models - such as Amazon's Kindle Fire. New models from Amazon include ones with screens nearly as large as the iPad's, while there's speculation that Apple will be coming out with a smaller iPad.

Here's a look at what to expect in the coming months:

- NEW IPHONE

Apple Inc. has come out with a new iPhone each year, and that's likely to continue. The new model is expected to work with fourth-generation, or 4G, cellular networks that phone companies have been building. That capability is something the S III and many other iPhone rivals already have. A bigger iPhone screen is also possible.

Apple will host an event in San Francisco on Wednesday. The topic wasn't disclosed, but the email invitation contains a shadow in the shape of a "5" - a sign that the iPhone 5 is coming. Sales usually begin a week or two after such an announcement.

One thing is known: Apple plans to update its phone software this fall and will ditch Google's mapping service for its own, as a rivalry between the two companies intensifies.

- SMALLER IPAD

Apple has done well selling its full-sized tablet computer, which has a screen that measures nearly 10 inches diagonally. Many companies have tried to come out with iPad alternatives, but the ones that have had moderate success have tended to be those with smaller, 7-inch screens and lower price tags.

There's speculation that Apple will come out with a mini iPad this fall - possibly with a 7.85-inch screen - to compete with those competitors. It's not as much a certainty as a new iPhone, though. Apple hasn't said anything about its plans.

- REKINDLING THE FIRE

Amazon.com Inc.'s 7-inch Kindle Fire is one of the smaller tablets with decent sales. On Friday, it will sell an updated version with a faster processor, more memory and longer battery life. It will also cut the price to $159, from $199, making it far cheaper than the iPad, which starts at $399 for the 2011 version still on sale. (The most recent ones start at $499.)

Amazon is also releasing higher-end models under the Kindle Fire HD line. A 7-inch one will go for $199, while an 8.9-inch one will go for $299. There's also a $499 model that can use the 4G cellular networks that phone companies have been building. A data plan will cost an extra $50 a year. The smaller HD model will start shipping Friday, while the larger ones will be available Nov. 20.

Amazon also refreshed its line of stand-alone e-readers, offering the Paperwhite, with its own light source. Tablets such as the iPad and the Fire don't work as well in bright light because they are lit from the back. Amazon says the light on the Paperwhite is directed down at the display.

Barnes and Noble Inc., which makes the 7-inch Nook Tablet, may have an update this fall as well.

Toys R Us, meanwhile, said Monday that it is making a 7-inch tablet aimed at children. The Tabeo will go on sale Oct. 21 for $149.99.

- MOTOROLA'S RETURN

Though it's a pioneer in the cellphone industry, Motorola hasn't had a hit since the Razr phone came out in 2004. Under new owner Google Inc., Motorola Mobility is trying to change that.

Last week, Motorola announced three new smartphones bearing the Razr name. The $99 Droid Razr M will be in Verizon Wireless stores this Thursday, the day after Apple's announcement.

Motorola will have two high-end models, the Razr HD and Razr Maxx HD, later this year. It's emphasizing long battery life - up to 21 hours of talk time for the Maxx HD, or 10 hours of video streaming.

These are the first major products from Motorola since Google bought the company for $12.4 billion in May. Google, meanwhile, continues to sell a 7-inch Android tablet, the Nexus 7, made in partnership with AsusTek Computer Inc.

- CALLING ON WINDOWS

Microsoft Corp. will release a new version of the Windows operating system on Oct. 26, one that's designed to work on both traditional computers and tablet devices. A new version of the Windows Phone system is coming out, too.

Once-dominant phone maker Nokia Corp. has been struggling in the shadow of Apple and Android, and it's counting on the new Windows system for a revival. Last week, Nokia and Microsoft unveiled two new devices under Nokia's Lumia brand - the 820 and the 920.

Nokia CEO Stephen Elop says the new phones will go on sale in the fourth quarter in "select markets." He didn't say what they would cost or which U.S. carriers would have them. Investors were disappointed, and Nokia's stock fell 16 percent on the day of the announcement.

Samsung, which surpassed Nokia as the world's largest maker of mobile phones in 2011 and overtook Apple in smartphones this year, showed off a Windows 8 phone late last month. It didn't announce an availability date either.

- SURFACE

Microsoft plans its own tablet computer, too. It's new territory for Microsoft, which typically leaves it to others to make devices using its software. Now, it will be competing against its partners.

The Surface tablet will come in two versions, both with 10.6-inch screens, slightly larger than the iPad's. One model will run on phone-style chips, just like the iPad, and will be sold for a similar price. A heavier, more expensive version will run on Intel chips and be capable of running standard Windows applications. The Surface will go on sale on Oct. 26.

- NEW BLACKBERRYS

A year ago Research In Motion Ltd. disclosed that it was working on a next-generation phone system for the BlackBerry, which now looks ancient next to the iPhone and Android devices. It was supposed to be out in time for this year's holiday season. That won't happen.

In June RIM pushed the release of BlackBerry 10 devices into early next year, saying it wasn't ready. That means RIM will not only compete with the new iPhone and Android devices out this fall, but it will also have to contend with the new Windows devices.

(from: http://seattletimes.com/html/businesstechnology/2019116322_apustecholidaygadgets.html)

Pinch technology, pay the price

It is yet to be seen whether Apple's ‘thermonuclear' war will lead to a nuclear winter for the world of technology or it will herald a new urgency in technological development. The consequences of this case will impact every single consumer

A jury in a California court recently sided with Apple in a patent case versus Samsung. This, most analysts agreed, was a huge victory for Apple. Not only was it awarded a billion dollars, it was also found that several devices by the South Korean manufacturer infringed on various Apple patents, for both hardware and software. While the endgame of the court victory still has to be played out, and courts in other countries have ruled quite differently, this decision by a jury of nine people will have a profound impact on the world of consumer technology.

Apple did not invent the mobile phone (or the smartphone for that matter), nor did it invent the tablet computer. What it did do was to make using such devices incredibly easy. Apple also made them very good-looking and marketed them to make them objects of desire, even lust. In the process of creating such devices, Apple filed a whole host of patents to protect themselves from any infringement.

In one of the most widely quoted passages from Walter Issacson’s biography of Apple founder and its former Chief Executive Steve Jobs, it is said that Jobs was willing to spend each penny of Apple’s not inconsiderable cash hoard to go ‘thermonuclear’ on Google’s Android operating system. It was believed that Jobs looked at Google’s creation of Android as a breach of trust, particularly after he took Google’s founder Larry Page and Sergey Brin under his wing and Google’s Chairman and former Chief Executive Eric Schmidt sat on the Apple board.

The legal battle with Samsung, which ironically is one of Apple’s largest suppliers, was widely seen as part of the huge proxy war that Apple is having with Google. Everything from product design to the user-interface of devices was challenged. And when Apple won, Samsung sent out a terse note saying that the defeat was a defeat for ‘consumers’. Which brings us to a simple crux, the patent system.

The United States Patent and Trademark Office which issues the largest number of patents of any patent office in the world is widely seen as an organisation that protects the rights of innovators. The USPTO has played a clear role in America’s massive technological and industrial domination of global affairs. But can a system, essentially designed for the late-eighteenth century continue to be valid today?

It is not as if patent laws have not changed. Controversially, process patents have been allowed and even though the system does allow for licensing, there has also been the issue of patent trolls. Patent trolls are companies that do not make any tangible product; they just own a patent and file lawsuits ostensibly to force product manufacturers that breach patents to pay up for using a patented product. The patent laws have also allowed companies to patent ‘plant’ products which have often brought controversy as companies have tried to patent traditional plants and medicines.

But this issue is not about the rights and wrongs of that. A comprehensive updating of patent laws is required not just in the United States but across the whole world including India. Intellectual Property Rights cases are clogging legal systems across the world, although these include not just patent violations in the technology sphere but also in the medical and entertainment worlds.

In a world where technology evolution has reached breakneck speed, the term of patent protection of twenty years is proving to be a hindrance to technology evolution. The granting of some patents which some people see as obvious and other do not can lead to such issues. One such patent is that granted to Apple, which allowed the US company to claim a patent on rectangular devices with ‘rounded corners’.

Was this abuse or was the company simply trying its luck with the patent office, remains to be seen. But patents like these neither protect innovation nor do they foster competition. Apple did highlight during the case that it is not impossible to create a differentiated device or operating system, and gave Microsoft’s Windows Phone devices as an example. So while it is not impossible to innovate ‘around’ patents and license those that are needed, sometimes the patent system shoots itself in the foot.

Any review of the patent system has to ensure that patent protection terms are reduced. Half a century ago, product lifecycles lasted decades. However, a mobile phone would be fortunate to be used for over two years, lest the user be considered a technological dinosaur. In less than five years, most consumers have moved on from cathode-ray tube based televisions to smaller, slimmer flat panel displays. In the current system, the person who patents the technology that will allow for holographic three-dimensional phone calls will make a killing.

There is no doubt that innovation ought to be protected, but the very definition of innovation is being twisted by the patent system. Some aspects of Android and Samsung’s devices could easily be seen to have violated Apple’s intellectual rights, others less so. But the jury decided that they did, and while we have not heard the last of this case as it is expected to go up to the US Supreme Court, be sure that whatever decision they take will be as vital as a case they decided in November 2000 that controversially upheld the election of George W Bush in the US state of Florida thus handing him the US presidential election.

It might take a while yet, but the nine justices on the US Supreme Court might eventually decide whether Apple’s ‘thermonuclear’ war will lead to a nuclear winter for the technology world or it will herald a new urgency in technological development akin to what happened in Japan and West Germany after World War II.

Like it or not, the consequences of this case will impact every single consumer, no matter which tech brand or brands they purchase.

(from: http://www.dailypioneer.com/columnists/item/52430-pinch-technology-pay-the-price.html)

Hacker suspected of stealing scores of court documents


Cleared for publication: The police have arrested Moshe Halevi, 40, from Acre, for allegedly hacking into one of the Israeli courts' databases and accessing thousands of case files, some of which contain classified information.

Two additional suspects were arrested as well. One of the suspects, Attorney Boaz Guttman, is a former high-ranking police officer with the National Fraud Unit.

The database that was breached is a classified one, which holds documents pertaining to some of the Israeli authorities' most sensitive police and security-related investigations.

An investigation into a possible hacking into the courts' database was launched after details about a high-profile Tel Aviv rape case were leaked.
 
Police information security experts were able to detect the breach in the system's firewall and fix the problem.

The investigation was placed under a gag order pending the work's completion to minimize the possibility of copycats.
According to available details, Halevi and his accomplices hacked the court system systematically for four years and viewed – and at times copied – thousands of confidential court records, warrants and subpoenas.
מתוך עמוד הפייסבוק של הלוי

 Police believe that while in some cases Halevi sought to satisfy his own curiosity, more often than not he was doing the bidding of others who were seeking the information.

The police seized his personal computer, where thousands of sensitive documents were found.

Scope of breach 'shocking'

Among the documents Halevi was able to access were records pertaining to the Anat Kam espionage affair and former Prime Minister Ehud Olmert's court cases.

"This is a very serious thing. This man accessed and used thousands of classified documents. We still don't know who was affected and whether criminal elements were the ones to order such documents," Chief Superintendent Meir Cohen, who supervises the case, said.
Police sources added that the material Halevi accessed contained "some of the police's top secrets."
Halevi, who was in trouble with the law in the past over similar offenses, denied being involved in any illegal hacking and was quick to blame the courts' website administrator:
"I didn’t hack any database. All I did was go on the website. I accessed the files with my ID number – I didn't use anything.
"Documents from the Anat Kam and the Holyland cases were open and the court records had the full name of the State witness," he said.
"I accidently typed in a wrong case number and saw that I could access other cases. Some of them I just passed on to acquaintances. It's what you do today – like Twitter."
A police source told Ynet that the scope of the breach and the acute security failure discovered in the system came as a shock to the top brass.

The documents accessed reportedly contained material usually revealed to judges only, documentation of covert investigations, wiretap transcripts and arrest warrants.

"These are document that could be used to seal a person's fate in trial and in some case, they can place people in harm's way," a police official said.
Halevy was remanded to a three-day house arrest on Monday.
"The police say I hacked the website but I didn’t. There was a malfunction on the website when I was using it and I didn't know. I had no way of knowing the information I saw was classified," he insisted.
Halevy further leveled criticism at the website administrator: "If this is a database than it violates the Privacy Act. If they intended to keep the documents classified they should have build a secure site."

The Courts' dismissed the criticism: "The Courts' website enjoys high-level security and is constantly monitored by an information security company to ensure it is impregnable.
"Unfortunately, despite all our efforts, an unauthorized access took place. In order to deal with the problem the site was taken offline shortly and then went online again. The case in under investigation by the police. 




(from: http://www.ynetnews.com/articles/0,7340,L-4279655,00.html)

Apple UDID hack has BlueToad data, publisher says; Anonymous claims GoDaddy crash

The chief executive of the publisher BlueToad says that data used to identify Apple devices posted by hackers who said they stole the information from the FBI matches data from BlueToad servers.

Last week, hackers identifying as members of the Anonymous AntiSec movement posted data allegedly taken from an FBI laptop. The agency immediately denied the hack and the accusation that the FBI had “sought or obtained” data that developers can use to determine Apple device IDs.

Paul DeHart told NBC News in an interview released Monday that the file posted by the hackers was a “98 percent” match with BlueToad data.

“That’s 100 percent confidence level, it’s our data,” DeHart said.

In a statement on a company blog, DeHart apologized to his customers and said the security vulnerability on the company’s severs has been patched.

Apple also denied last week that the FBI had any of its user device identification data, or UDIDs. Apple spokeswoman Trudy Muller said then that Apple will “soon be banning the use of UDID.” The company’s upcoming operating system, iOS 6, will replace UDIDs with another developers tool, Muller said.

That should be welcome news to privacy advocates, including research Chris Sogohian, who wrote last week on the American Civil Liberties Union Web site that UDIDs could too easily become personally identifiable information.

DeHart said that he couldn’t say with certainty that BlueToad data did not somehow go through another party before it was posted by Anonymous. But he said that the attack on his company took place just a couple of weeks ago, while the hacker group claimed that information on millions of Apple gadgets was taken from the FBI in March.

Meanwhile, a hacker also identifying as a member of Anonymous took credit Monday for taking down the servers of GoDaddy.com, pulling many of the company’s Web sites off line. GoDaddy hosts millions of Web sites across the Web and is the world’s largest registrar.

“Status Alert: Hey, all. We're aware of the trouble people are having with our site. We're working on it,” the company tweeted Monday morning. Users are also reporting having problems with e-mail accounts hosted on the service.

According to the hacker claiming personal responsibility for the attack, AnonymousOwn3r, the hit is to “test how the cyber security is safe” as well as for “more reasons” that he or she did not disclose.

The person claiming responsibility for the attack did not mention the company’s past views on intellectual property legislation. GoDaddy was the target of a lot of criticism because the company had been a vocal supporter of the Stop Online Piracy Act and the Protect Intellectual Property (IP) Act, before a boycott convinced the company to stop its advocacy.

On Twitter, businesses affected by the site outage are appealing to the alleged Anonymous hacker to stop the attack. As one user from Charter Marketing tweeted, “you got your press, now put it back so we can get back to work.”

IF YOU WANT TO SEE THE GALLERY , CLICK THE LINK .

(from: http://www.washingtonpost.com/business/technology/publisher-says-udid-hack-matches-data-anonymous-claims-attack-on-godaddy/2012/09/10/eb3d5bc4-fb6e-11e1-b153-218509a954e1_story.html)

Hacker claims credit for crashing GoDaddy sites

A member of a hacker collective Anonymous has claimed credit for downing the web hosting firm GoDaddy, which manages millions of websites around the world.

AnonymousOwn3r, identified as the "security leader" of the loosely organised hacker group, took to Twitter to confirm responsibility for the outages.

"Hello http://godaddy.com/ now yes! all servers #tangodown by @AnonymousOwn3r," a tweet said, using the code word for a hack attack.

When some news sites blamed the attack on Anonymous, the same individual responded on Twitter by saying: "it is not Anonymous coletive it's only me don't use Anonymous coletive name on it, just my name."
GoDaddy issued its own statement on Twitter: "Status Alert: Hey, all. We're aware of the trouble people are having with our site. We're working on it."

The company added later: "So many messages, can't get to you all... Sorry to hear all your frustration. We're working feverishly to resolve as soon as possible."

The purported hacker, when asked about his motivation, tweeted; "I'm taking godaddy down bacause well i'd like to test how the cyber security is safe and for more reasons that i can not talk now."

Another message said the attack had no specific time frame: "it can last one hour or one month," the tweet said.

(from: http://news.ninemsn.com.au/technology/8530820/hacker-claims-credit-for-outage-at-major-web-host)

Senin, 10 September 2012

Hacker Returns From Wilderness Exile To Disrupt Sally Struthers



Peter Ma says hadn’t switched on his HP laptop for nearly six months when he booted it up at the TechCrunch Disrupt Hackathon yesterday afternoon.

From May until August he backpacked alone in the Sierra Nevada, with no electronics other a watch and a head lamp, just trying to get away from society and come up with a truly new idea. “I wanted to get in touch with basic human needs,” he explains.

Ma says he has worked as a developer since he graduated from college five or six years ago. But last spring he felt like the startup he was working for wasn’t going anywhere, and he had just split up with his girlfriend of four years. It was time to do something new, but he didn’t know what. So he retreated to the mountains to figure it out.

He found more questions in the mountains, but that didn’t stop him from showing up at the hackathon ready to code. He says he didn’t have any idea of what he wanted to work on when he showed up, but he completed two apps: Project Care, an app that brings video conferencing and social networking to Sally Struthers style child sponsorship programs, and Dream Recorder, an Android app to make it easy to capture audio notes about your dreams before you forget them.

On Project Care he collaborated with Igor Lebovic, the founder of CalorieCount, a company that was acquired by About.com in 2006, and a contributor to last year’s Startup Bus winner TripMedi.



The idea is to bring greater transparency and personal connection to child sponsorship by giving you a more direct connection with the kids you sponsor via video conferences. Plus once you start sponsoring child, you can also connect with other people who sponsor the same child or children that you sponsor. It uses OpenTok for video conferencing (with the option to save video chats to Dropbox), Stripe for payments and DokuSign for agreements.

He built Dream Recorder on his own. It’s an audio recorder optimized to make it easy to capture audio even when you’re half asleep. You launch the app before you go to bed. If you have dream you want to remember, you can just grab the phone and shake it to start recording. Once the app has been inactive long enough it stops recording and saves the audio files to Evernote, Dropbox or Microsoft SkyDrive.

Once the hackathon is over Ma says he’s going to get back to work on starting a restaurant with a partner in LA — a San Francisco location Honey Badger Cafe.

Lead photo by Mel Stoutsenberger / CC

(from: http://techcrunch.com/2012/09/09/hacker-returns-from-wilderness-exile-to-disrupt-sally-struthers/)

Phony Al-Jazeera text messages sent by pro-Syrian gov't hackers

Al-Jazeera has become the second news agency in a little more than a month to be targeted by pro-Syrian government hackers.

The Qatar-based satellite TV station revealed in a tweet this morning that its short messaging service had been compromised and used to send false news reports, including a report that Qatar's prime minister had been assassinated:

"We'd like to inform our subscribers that Aljazeera SMS service is being compromised by pirates and they've sent fake news with no basis," the news organization said, according to a translation by The Hacker News.

A group calling itself the Syrian Electronic Army reportedly claimed responsibility for the hack, the second attack on the satellite network in less than a week. The broadcaster reported Wednesday that several of its Web sites had been hacked and defaced with pro-Syrian government slogans.

The group also claimed responsibility for a sophisticated attack on Harvard University's home page last year that briefly defaced the page with a message accusing the U.S. of supporting the uprising against Syria's president.

Pro-Syrian government hackers have stepped up their attacks on news agencies in recent weeks. In early August, Reuters suffered two security breaches in two days when hackers managed to gain control of one of its Twitter accounts and defaced with pro-Syrian government tweets. Earlier that week, hackers broke in to the Reuters.com Web site and added a phony post purporting to be an interview with the head of the Free Syrian Army.

(from: http://news.cnet.com/8301-1009_3-57509104-83/phony-al-jazeera-text-messages-sent-by-pro-syrian-govt-hackers/)

Minggu, 09 September 2012

PS Vita homebrew hacker says games can’t be pirated on the system

A hacker claims to have cracked the PlayStation Vita to allow for homebrew code to be run on the handheld. However, it appears that’s the extent of the hack as gamers won’t be able to pirate games on the PS Vita.
According to an interview with PlayStation Lifestyle, Yifan Lu, a “reverse engineer” claims to have hacked the PS Vita to allow it to run homebrew code. Apparently, Lu is known for jailbreaking the Kindle, which according to him nobody really cared about.
However, with the PS Vita, he made an announcement very early on on his progress in hopes to bring others together to work on exploit. Lu’s announcement actually backfired as it attracted the gaze of the Internet and probably that of Sony’s upon his progress prematurely as he does not have a working demo yet.
When probed about his stance on piracy, Lu responded that he was 100% against it and that his tool would not benefit piracy.
I am 100% against piracy and no tool I will make will benefit piracy. This tool, in fact, cannot be used for loading backups/pirated content even if I want to because of the physical limitations of the exploit (it is userland, no rights to decrypt/load games)
While Lu’s tool won’t allow piracy, it could help other hackers further analyze the inner workings of the PS Vita, and possibly leading to finding a kernel exploit which would open up to other possibilities such as CFWs, other OS, and ISO loaders.
Kindle-Touch-5.0-jailbreak
However, Lu feels that there isn’t anyone out there with the proper skills willing to find such an exploit. When asked how secure the PS Vita’s kernel was, Lu explained that Sony has cleverly designed the portable in a way to prevent hackers from looking at the memory to find the kernel. Apparently, the RAM is physically on the same chip as the CPU, which makes dumping the kernel memory extremely difficult.
Lu also explained that even if you were able to somehow dump the kernel, you wouldn’t be able to decrypt it without the key. This was possible on the PS3 due to the key being leaked out into the wild. It is widely speculated that the PS3 key was leaked from a Sony repair enter, leading to the eventual hack. However, Lu doesn’t believe that such a leak will ever happen again from Sony.
First of all, we don’t have any idea what the kernel looks like, where it is in memory, or anything. In order to even begin to look for a kernel exploit, you need to dump the kernel memory or decrypt the kernel files on the NAND. In order to dump the kernel memory, usually you need system privilege (which if we have, we already hacked the kernel), so it’s a circular problem there. Another method, as we see with the 3DS scene, is physically analyzing the RAM chip. Can’t do that for the Vita because the RAM is on the same chip as the CPU. In order to decrypt the kernel files, you need either a key leak like PS3 (it’s safe to say that that will never happen again) or find a kernel exploit to get it to decrypt itself. Either way, it’s a circular problem. Now a third way is blind chance, or fuzzing. Keep throwing data at the kernel and see what sticks. However, even if you do somehow get a crash that way, it’s impossible to run a payload until you have the kernel memory dumped. Now, this was easy on the PSP because FW1.0 ran unsigned code without modifications AND the kernel files were unencrypted. All they had to do was build on that for newer FW versions.
Lu advises anyone against stockpiling PS Vitas and not updating firmwares as his exploit will not lead to piracy and that he will stop his work if Sony asks him to.
And as mentioned before, Sony could unknowingly close the hole or scare me into stopping work (seen it happen, and I’m not going to mess with them if they tell me to stop). Anything could happen in the next couple of months. Nobody should get hopes up, or go out and stockpile on Vitas, or refuse to connect to PSN anymore or anything.
(from: http://gamer.blorge.com/2012/09/09/ps-vita-homebrew-hacker-says-games-cant-be-pirated-on-the-system/)

Think like a hacker, and make money snuffing them out

Hackers often are portrayed as basement-dwelling, junk-food eating computer geniuses who enjoy wreaking havoc on unsuspecting people by sneaking into their computers.
Their activities can be criminal and in worst-case scenarios can shut down infrastructures or drain bank accounts.




But some "white hat" hackers are not only chasing these cybercriminals but also thwarting the attacks before they can be launched. With sleuthing abilities that would make Sherlock Holmes proud, the good guys predict what cybercriminals will do next and put measures in place for companies or government agencies to stop them.

CORE Security, a Boston-based operation that employs people around the world, researches what cybercriminals are up to and develops software to plug security holes before the bad guys find them.
"It’s sort of like an MRI that helps you see inside a body. We are looking inside systems for potential problems and where an attack could happen," says Mark Hatton, CORE chief executive. "It’s a controlled way of looking at what a hacker would do."

Still, the skills needed to track the bad guys across cyberspace require unique talents, and managing these white-hat hackers requires some finesse, he says.

"What I’ve learned is that you’ve got to hire people that are really good at what they do -- and then you’ve got to let them do it," Hatton says. "I have to trust that they are choosing the right path."

At CORE, the researchers are extremely savvy computer sleuths who are tenacious in pursuing potential leads on where cybercriminals might strike next. He says employees must be given the independence to decide which trails to follow and be given the flexibility to stay on a case even if they sometimes encounter blind alleys or dead ends.

"You’re talking about people who work exhausting hours," he says. "They may come in at 10 a.m. and not leave until 2 a.m.."

Adding to Hatton’s management challenges: His research team operates out of Buenos Aires, Argentina, and some employees aren’t comfortable speaking English. That has prompted Hatton to change his management style during his quarterly visits there.

(from: http://www.sltrib.com/sltrib/money/54845108-79/says-hatton-core-hackers.html.csp)

Operation Aurora hackers still at large


 Security threats - password theft

The hackers responsible for 2010's infamous "Operation Aurora" attack are still using a sophisticated arsenal of security flaws and infiltration techniques to steal corporate information, say experts.

Security researchers with Symantec have issued a report outlining the techniques used by the so-called "Edgewood" hacking platform and the group behind it. The company said that the group is well-funded and armed with more than a half-dozen unpublished security vulnerabilities.

"Although there are other attackers utilizing zero-day exploits, we have seen no other group use so many," Symantec researchers Gavin O'Gorman and Geoff McDonald said in the report.

"The number of zero-day exploits used indicates access to a high level of technical capability."

The researchers said that the group appears to favour "watering hole" attacks techniques in which the attacker profiles a targeted group and places attack code into sites which the targets are likely to visit.
Additionally, the group is believed to use spear-phishing techniques to infect the systems of targeted individuals and organisations.

Overall, the group appears to be targeting companies in the defence and aeronautics sector, though researchers noted that targets have ranged from weapons manufacturers to software vendors and even non-government organisations.

Though incidents were noted in the UK, British firms are not believed to be a significant target for the attackers.

According to the report, the US is the most popular target for the attacks, with American firms accounting for 72 per cent of incidents. Canada, China, Hong Kong and Australia were also popular targets.

While Symantec did not indicate where the group behind the attacks was based, past reports have suggested that the hackers are part of a state-sponsored operation based in mainland China.

(from: http://www.v3.co.uk/v3-uk/news/2203966/operation-aurora-hackers-still-at-large)

Hundreds more cyber attacks linked to Google breach of 2009

system%20hacked.jpg


The hacker group that attacked Google Inc in 2009 has launched hundreds of other cyber assaults since then, focusing on U.S. defense companies and human rights groups, according to new research from security software maker Symantec Corp.

Google said in January 2010 that it and more than 20 other companies were the victims of a sophisticated cyber attack later dubbed Operation Aurora from China-based hackers that resulted in the theft of intellectual property.

Although the hackers were never publicly identified, the incident heightened tensions between Washington and Beijing over growing evidence that a significant number of cyber attacks against U.S. institutions originated from China.

"It was big news at the time, but what people don't realize is that this is happening constantly," said Eric Chien, a manager in Symantec's research group. "They haven't gone away, and we wouldn't expect them to go away."

Symantec said on Friday the hackers behind Operation Aurora have focused on stealing intellectual property, such as design documents from defense contractors and their suppliers, including shipping, aeronautics, arms, energy, manufacturing, engineering and electronics companies.

The hackers used components of a common infrastructure that Symantec termed the "Elderwood Platform," named after a word repeatedly found in the software code used in different attacks.

Over the past year, the Elderwood hackers have focused almost exclusively on stealing data from companies that supply parts to big defense contractors, rather than targeting the firms themselves, Chien said.
 
The second most common group of targets was non-government organizations involved in Tibetan human rights issues. Financial firms and software companies were also targeted, Symantec said.

The security firm, which sells anti-virus software to corporations and consumers under the Symantec and Norton brands, declined to identify specific victims and noted that it did not have evidence to prove the attacks originated from China.

Cyber security experts widely believe the Google attacks originated from China.

Dmitri Alperovitch, chief technology officer of security startup CrowdStrike, said his firm has linked the culprits to more recent attacks, including ones last year on EMC Corp's RSA Security division and Lockheed Martin Corp.

The hackers infected personal computers by exploiting what were major security flaws in commonly used software from Adobe Systems Inc and Microsoft Corp. Such flaws, known as zero-day vulnerabilities, are rare because they are difficult to find. The flaws have since been fixed.

Last year, security experts uncovered eight zero-day flaws being exploited by various hacking groups, according to Symantec.

Symantec said it believed the Elderwood hackers alone have used eight zero-day vulnerabilities from 2010 to 2012 the largest number it has seen from a single organization. That suggests the group had the money to hire large teams of skilled software engineers or purchase them.

Some experts estimate that a zero-day vulnerability that enables attackers to hack into highly secured systems can cost hundreds of thousands of dollars, even more than $1 million.

The fact that the Elderwood hackers has used so many zero-day vulnerabilities suggests it is either a very large criminal group, or backed by a nation-state, or a nation-state itself, Chien said.

Copyright Thomson Reuters 2012

(from: http://gadgets.ndtv.com/internet/news/hundreds-more-cyber-attacks-linked-to-google-breach-of-2009-264654)

Hackers from China target defense data, human rights groups: Symantec


 BOSTON: The hacker group that attacked Google in 2009 has launched hundreds of other cyber assaults since then, focussing on US defense companies and human rights groups, according to new research from security software maker Symantec.

Google said in January 2010 that it and more than 20 other companies were the victims of a sophisticated cyber attack - later dubbed Operation Aurora - from China-based hackers that resulted in the theft of intellectual property.

Although the hackers were never publicly identified, the incident heightened tensions between Washington and Beijing over growing evidence that a significant number of cyber attacks against US institutions originated from China.

"It was big news at the time, but what people don't realise is that this is happening constantly," said Eric Chien, a manager in Symantec's research group. "They haven't gone away, and we wouldn't expect them to go away."

Symantec said on Friday the hackers behind Operation Aurora have focussed on stealing intellectual property, such as design documents from defense contractors and their suppliers, including shipping, aeronautics, arms, energy, manufacturing, engineering and electronics companies.

The hackers used components of a common infrastructure that Symantec termed the "Elderwood Platform," named after a word repeatedly found in the software code used in different attacks.
Over the past year, the Elderwood hackers have focussed almost exclusively on stealing data from companies that supply parts to big defense contractors, rather than targeting the firms themselves, Chien said.

The second most common group of targets was non-government organisations involved in Tibetan human rights issues. Financial firms and software companies were also targeted, Symantec said.

The security firm, which sells anti-virus software to corporations and consumers under the Symantec and Norton brands, declined to identify specific victims and noted that it did not have evidence to prove the attacks originated from China.

Cyber security experts widely believe the Google attacks originated from China.

Dmitri Alperovitch, chief technology officer of security startup CrowdStrike, said his firm has linked the culprits to more recent attacks, including ones last year on EMC's RSA Security division and Lockheed Martin.

The hackers infected personal computers by exploiting what were major security flaws in commonly used software from Adobe Systems and Microsoft. Such flaws, known as zero-day vulnerabilities, are rare because they are difficult to find. The flaws have since been fixed.

Last year, security experts uncovered eight zero-day flaws being exploited by various hacking groups, according to Symantec.

Symantec said it believed the Elderwood hackers alone have used eight zero-day vulnerabilities from 2010 to 2012 - the largest number it has seen from a single organisation. That suggests the group had the money to hire large teams of skilled software engineers or purchase them.

Some experts estimate that a zero-day vulnerability that enables attackers to hack into highly secured systems can cost hundreds of thousands of dollars, even more than $1 million.

The fact that the Elderwood hackers has used so many zero-day vulnerabilities suggests it is either a very large criminal group, or backed by a nation-state, or a nation-state itself, Chien said.

(from: http://timesofindia.indiatimes.com/tech/enterprise-it/security/Hackers-from-China-target-defense-data-human-rights-groups-Symantec/articleshow/16308670.cms)