Tuesday, September 6, 2011

Dell in tie-up with China's Baidu

Dell has confirmed it is one of a number of companies partnering with Baidu, China's top search engine, on mobile devices.

A Dell spokesperson said the company was developing smartphones that would run Baidu's new software platform for the Chinese market.

Baidu announced the platform, Baidu Yi, on Friday.

Many Chinese internet companies are trying to increase their presence in the mobile market.

"The partnership is to provide users with an out-of-box experience, so Baidu Yi will be installed," said Dell spokesperson Adeline Lee.

Baidu Yi is Android-based, but Ms Lee did not say with operating systems would be installed on the Dell smartphones.

Baidu executives have not ruled out the possibility of releasing their own operating system at a later date.

Baidu's announcement also said that it was working with a number of developers and handset makers as part of an alliance to support the Baidu Yi platform.

Ms Lee would not give a date for the release of the Dell smartphones.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Monday, September 5, 2011

Fake certificate risk to Iranians

Fresh evidence has emerged that stolen web security certificates may have been used to spy on people in Iran.

Analysis by Trend Micro suggests a spike in the number of compromised DigiNotar certificates being issued to the Islamic Republic.

It is believed the digital IDs were being used to trick computers into thinking they were directly accessing sites such as Google.

In reality, someone else may have been monitoring the communications.

Hundreds of bogus certificates are thought to have been generated following a hack on Netherlands-based DigiNotar.

The company is owned by US firm Vasco Data Security.

Web passport

Authentication certificates are used by many websites to give their users secure access.

Typically these take the form of a TLS or SSL connection - which can be identified by the appearance of a padlock logo and "https" prefix.

Together, they are supposed to guarantee that the site is what it appears to be, and that the user's session is not being monitored.

Hundreds of bodies - known as certificate authorities (CAs) - are allowed to provide such authentication.

Web browsers, such as Safari, Chrome, Firefox and Internet Explorer have a built-in list of which CAs they can trust.

However, if a third-party was able to steal certificate details or generate their own, they may be able to launch a "man-in-the-middle" attack, similar to tapping a phone line.

The presence of an apparently genuine certificate means browser security would be unlikely to detect the surveillance.

Issued and revoked

On 19 July, Dutch CA DigiNotar detected an unauthorised intrusion into its systems.

The company immediately revoked a number of bogus certificates that had been created as a result.

It emerged later that some were missed, and other new ones generated, after the initial attack.

Unconfirmed information published online suggested that more than 500 false DigiNotar certificates exist.

Among the domains listed are Google, Facebook, Twitter and Skype.

At the same time, it was noticed that a sizeable portion of the Dutch company's certificates were mysteriously going to users in Iran.

By August, 76.5% of DigiNotar validations were in the Netherlands. 18.7% were in Iran and 4.8% elsewhere in the world, according to security firm Trend Micro.

Iranian activity dropped off after the certificates were revoked.

DigiNotar eventually went public about the intrusion on 30 August, at which time most web browsers stopped recognising DigiNotar certificates altogether.

Soft target

There are many reasons why Iran may have been targeted using the bogus certificates, according to security experts.

The republic's tight controls on dissent mean that monitoring web traffic could yield useful information.

Iran's internet setup also makes some types of interception easier, according to Rik Ferguson, Trend Micro's director of security research and communications.

"All the internet traffic has to go through an Iranian government proxy before it goes out to the final destination.

"If you want to spy on normal HTTP traffic, that is not a problem - you get to see all the outbound requests and all the inbound responses," he explained.

For secure websites, attempts to intercept would ring alarm bells with the web browser and therefore the user.

One option is to make the Iranian national proxy server look like it is the target website - using a fake DigiNotar certificate.

The proxy then relays information to and from the real website, e.g. Google.com, but there is no indication that the secure chain has been broken.

Government involvement?

While much online debate has centred around the role of the Iranian authorities, there is no firm evidence to support such a theory.

However, a spokesman for the Dutch Interior Ministry, Vincent van Steen told the Netherland's-based ANP news agency that the cabinet was looking into claims of Iranian government involvement.

Iran has previously been on the receiving end of cyber attacks, including the elaborate Stuxnet conspiracy which enabled a computer worm to take control of machinery in a uranium enrichment plant.

The DigiNotar incident has also raised broader concerns about the security of the global certificate authorisation system.

"The more there are, the more opportunities there are to attack the system," said Paul Mutton, a security analyst from Netcraft.

"Whenever there is a certificate authority that is trusted by all the mainstream web browsers, if someone was to compromise them it is just as bad as compromising the largest CA."

Alternatives to the current system have been suggested, including one by former hacker Moxie Marlinspike, known as Convergence, which verifies site authenticity by checking with multiple online "notaries".



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Hackers carry out website hijacks

Visitors to the websites of Vodafone, the Daily Telegraph, UPS and four others were re-directed to a site set up by Turkish hackers on Sunday night.

The divert was the result of the group's attack on computers that hold web address information.

Real URL names were deliberately mistranslated into the IP address of the hackers' site.

No data from the seven victims was lost or compromised as a result of the attack.

The hacking group, called Turkguvenligi, targeted the net's Domain Name System (DNS).

This acts as an address book for the web and turns the names that people use (e.g. bbc.co.uk) into IP address numbers that computers understand (e.g. 212.58.246.90).

DNS is consulted by a person's web browser when they want to visit a particular site.

In its attack, the Turkguvenligi group changed the records relating to seven sites in DNS databases run by NetNames and Ascio - two subsidiaries of domain name management firm Group NBT.

In an interview with The Guardian, Turkguvenligi revealed that it got access to the files using a well-established attack method known as SQL injection.

It said it had targeted the sites and found that attacking their DNS records was the easiest way to achieve their ends.

"The hardest one is reaching the domain company but if you can succeed there will be a treasure for you," Turkguvenligi told The Guardian.

According to Zone-H, which logs website defacements and hack attacks, Turkguvenligi has carried out 186 defacements since late 2008.

In a DNS attack, the sites targeted are not affected at all. The only impact is for visitors who will be re-directed to a site they were not expecting.

A statement by The Register about the attack suggests the re-direct was active for about three hours.

Writing on the blog of security company Sophos, Graham Cluley said: "We have to be grateful that the message displayed appears to be graffiti, rather than an attempt to phish information from users or install malware."

When contacted by the BBC, a spokesperson for Group NBT said it would release an official statement soon.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Samsung's Galaxy pulled from show

Samsung Electronics will not promote its new tablet computer at one of the world's largest electronics shows after sales of the product were blocked in Germany.

The new Galaxy Tab 7.7 was pulled out of the IFA electronics fair in Berlin.

On Friday a Dusseldorf court granted a request from Apple to ban Samsung from selling the product in Germany.

The two rivals are locked in a global patent war over their smartphone and tablet products.

The new court injunction comes after a temporary ban on sales in Germany of another Samsung product - the Galaxy Tab 10.1 - by the court in August.

Ongoing battle

Apple claims that South Korea's Samsung has infringed on its patents with the Galaxy line of smartphones and tablet computers.

It argues Samsung copied the design, look and feel of Apple's popular iPhone and iPad devices.

Samsung has counter-sued Apple, saying it infringed on Samsung's wireless patents.

The two companies have been fighting legal battles in the US, Europe, South Korea and Australia since April.

In Australia, Samsung has already been forced to delay the introduction of the Galaxy Tab 10.1 twice.

Galaxy Tab

Samsung was planning on displaying its Galaxy Tab 7.7, as well as other new devices, at this year's IFA.

The electronics fair is one of the most important showcases for companies looking to attract European consumers.

However, the injunction means it will miss out on the opportunity.

"The product is not on sale yet, but we've decided to respect the court order," said Samsung spokesman James Chung.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Friday, September 2, 2011

Suspected hackers arrested in UK

Four men have been arrested in separate parts of the UK by police investigating the hacker groups Anonymous and LulzSec.

The suspects - from Doncaster, Warminster, Northampton and London - are being questioned by Scotland Yard's e-Crime unit.

Their arrests are part of a wider operation involving UK law enforcement and the FBI.

At the same time, 14 suspected members of Anonymous appeared in a US court.

Authorities around the world have been rounding up suspects following a wave of attacks by both groups on major corporations and government institutions.

Amazon, PayPal, the CIA, US Senate and the UK's Serious Organised Crime Agency have all suffered either intrusions or denial of service attacks, designed to take their websites offline.

Mass arrests

In the latest round of British arrests, police detained 20-year-old Christopher Weatherhead from Northampton and 26-year-old Ashley Rhodes from Kennington, near London.

The pair are due to appear at Westminster Magistrates Court on 7 September.

Detectives also arrested a 24-year-old man from Doncaster, and a 20-year-old from Wiltshire for conspiring to commit offences under the Computer Misuse Act 1990.

In the United States, a mass court appearance saw 14 suspected Anonymous members appear before a judge in San Jose, California.

All of them denied being involved in a denial of service attack on PayPal's website in December 2010.

Anonymous had publicly declared its intent to target both PayPal and Amazon for, what the group perceived as, their complicity in isolating whistle blowing website Wikileaks.

Following the leaking of confidential US State Department memos, PayPal stopped processing donations to Wikileaks, while Amazon kicked the site off its web hosting service.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Video games get classical concert

Final Fantasy, Angry Birds and Enemy Zero <!-- Empty - Wide embedded hyper -->

Music featured in video games ranging from Angry Birds to Mario Bros is set to feature in a classical concert.

The London Philharmonic Orchestra (LPO) is playing more than 20 songs as part of a music festival in the city.

Two of this year's most hotly-anticipated games series, Battlefield and Call of Duty, will also be among the play list.

By going as far back as titles like Tetris the concert is tracing the history of music in gaming.

The festival's director Andrew Missingham says music plays an essential role in the gaming experience.

He said: "Video games from Heavenly Sword to Little Big Planet are taken to the next level by music."

Having recorded music in the past for blockbuster films like The Lord of the Rings trilogy the orchestra might be more suited to Final Fantasy and Legend of Zelda.

Tongue-in-cheek

Andrew Skeet was asked to compose the concert for the LPO.

"I was recording, by coincidence, a score for a film based on a video game called Ghost Recon when I got a call from the London Philharmonic," he revealed.

"I thought, 'We've got to go a little bit on the nostalgia front but also find the best bits of music.'

"The slightly darker ones like Advent Rising, it's quite romantic but dark romantic, so I like that.

"I love the ones to work on that are a bit different to the originals because they're a bit more fun.

"But then I loved doing Tetris and Angry Birds because they're completely new versions and a little bit tongue-in-cheek."

The full list of video games included in the concert is:

  • Advent Rising
  • Elder Scrolls
  • CoD Main Menu Theme
  • CoD Modern War 2: Theme
  • Legend of Zelda
  • Mario Bros Theme
  • Little Big Planet
  • Splinter Cell
  • Battlefield 3
  • Final Fantasy
  • Metal Gear Solid
  • Dead Space
  • Uncharted: Drake's Fortune
  • World of Warcraft
  • Halo 3
  • Blood Stone 007
  • Grand Theft Auto
  • Bioshock
  • Mass Effect
  • Fallout 3
  • Tetris
  • Super Mario
  • Angry Birds
  • Enemy Zero

Follow our technology reporter Dan Whitworth on Twitter



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Schmidt rates Jobs as &#39;best&#39; CEO

Steve Jobs was "probably the best" company boss in 50 or 100 years, said Google chairman Eric Schmidt.

Mr Schmidt, a former Apple board member, handed down the praise in an interview at a technology conference.

He said Mr Jobs deserved the praise because he built Apple into a powerful corporation not once, but twice.

The assessment puts Mr Jobs ahead of other American industry giants such as oil magnate John D Rockefeller and car maker Henry Ford.

Ongoing health problems forced Steve Jobs to resign as Apple chief executive on 24 August. He continues to serve as the company's chairman.

World leader

The resignation ended a 15 year stint at the head of Apple which saw Mr Jobs turn it into the most valuable company in the US by stock market valuation, ahead of oil giant Exxon.

Mr Jobs' first term as head of Apple lasted from the late 1970s when the company was founded until 1985. During that time he drove Apple to become a significant force in the home computer industry.

He resigned after losing a boardroom battle over the future of the company.

In 1997, Steve Jobs returned as CEO and launched the iMac range of personal computers.

Since then he has introduced the iPod, iPad and iPhone, all of which have redefined their respective markets, as well as making huge amounts of money for Apple.

Mr Schmidt made his comments during an on-stage interview at Salesforce.com's Dreamforce conference.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Thursday, September 1, 2011

Germany lifts Doom ban after 17 years

A German ban on selling Doom to teenagers has been lifted after 17 years.

The classic video game was put on an index of controlled titles in 1994 as it was deemed likely to harm youth.

Like pornography, sales of the violent shoot 'em up were restricted to adult-only stores.

The rules have been relaxed because officials believe that Doom is now only of artistic and scientific interest and will not appeal to youngsters.

However, one version of the game remains on the index because it features Nazi symbols on some levels.

Sadistic violence

The restrictions on Doom and Doom II officially expired on 31 August following a meeting of the Federal Department for Media Harmful to Young Persons (Bundesprufstelle) earlier in the month.

The Bundesprufstelle reportedly decided to reconsider the game's status following an appeal by Bethesda Softworks, the current owner of iD Software, which created Doom.

Bethesda argued that the game's crude graphics had been surpassed by many modern titles and, as a result, the violence it depicted had far less of an impact.

In a document detailing its reasons, the Bundesprufstelle said its original decision was not solely based on the graphic quality of the game, although it noted that most mobile phones now supported far more realistic images.

The panel explained that it was originally concerned because the story played out in Doom involved a relentless cycle of gunplay and "bloody sadistic" violence.

The Bundesprufstelle said it had relaxed the restrictions because Doom was now "mainly of historical interest" and was far less likely to be played by children. Not least, it added, because much more realistic and challenging games were more widely available.

Some members of the Bundesprufstelle panel wanted to keep the restrictions in place but were outvoted by those deeming it acceptable.

If Doom goes on sale in Germany it will still only be available to those aged 16 or over.

The adults only rule was beginning to look like an anomaly because other versions of Doom games, such as one for the Game Boy Advance, had previously been approved in Germany.

Restrictions on "Doom II - Hell on Earth" have also been lifted.

However, the panel decided to maintain controls on the American version of Doom II because it incorporates two levels from Wolfenstein 3D which makes use of Nazi symbols including swastikas.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Hologram microscope spots E. coli

A cheap holographic microscope capable of detecting E. coli and other bacteria has been developed by researchers in the US.

The handheld device uses a laser instead of lenses to identify bugs in water, food or blood, and costs less than $100 (�60) to build.

Images can be uploaded to remote computers for further analysis.

Scientists hope the technology will improve healthcare in areas that lack sophisticated diagnostic equipment.

Details of the microscope - created at the University of California, Los Angeles (UCLA) - were published in the journal Biomedical Optics Express.

Micro 3D

The device has two modes of operation: a "transmission" mode which can analyse liquids such as blood and water, and a "reflection" mode which produces holographic images of denser surfaces.

"Transmission mode is great for looking at optically transparent things like cells or very thin slices," explained Dr Karl Ryder of Leicester University's Advanced Microscopy Centre.

"However, if you want to look at more solid surfaces, you can't use transmission mode, because the light wouldn't get through."

In reflection mode, the microscope used holography to create a 3D image of the sample being studied.

"You take a laser and you split the beam in two using a mirror. Then you use one of these beams to illuminate your sample," said Dr Ryder.

"You can then recombine these two beams using clever mathematics to build a 3D image of your object."

"Start Quote

Doctors could use devices like these to improve health care in remote areas of the world"

End Quote Professor Aydogan Ozcan UCLA
Cheap chips

A key advantage of the design is that it employs cheap electrical components instead of heavy and expensive lenses.

"There are no optics at all in this system. They've made it really small, and they're looking at small sample sizes, so you don't need complex focusing," said Dr Ryder.

Instead, the microscope uses digital photo sensors commonly found in devices like iPhones and Blackberrys. These can cost less than $15 each to produce.

Despite its price, researchers claim that the microscope can help to monitor outbreaks of difficult-to-detect bacteria such as E. coli.

"It's a very challenging task to detect E. coli in low concentrations in water and food. This microscope could be part of a solution for field investigation," said Prof Aydogan Ozcan from UCLA.

The device captures raw data, but its simple design means that processing needs to be done on an external device with more computing power.

A user in the field can forward the image data to their mobile phone, a laptop PC, or even upload it to an internet server.

Prof Ozcan believes the microscope could prove invaluable for medics working in developing countries.

"With just a small amount of training, doctors could use devices like these to improve healthcare in remote areas of the world with little access to diagnostic equipment."



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Codebreakers remember Tony Sale

Veteran codebreakers will return to Bletchley Park this weekend for the annual Armed Forces Weekend and Enigma Reunion.

The two-day event will also remember Tony Sale, the National Museum of Computing founder, who died this week.

Mr Sale was the mastermind behind the re-building of Colossus, the world's first operational computer.

"Tony was one of our best known characters," said Bletchley Park Trust director Simon Greenish.

"His contribution to the early days of the development of the trust, when the site was under very real threat of development, was fundamental and, without him, the Bletchley Park site and its hugely important history would not have survived."

Vital role

The event, which is open to the public, will look back at the role of the armed forces through history and the vital role Bletchley Park's codebreakers played during World War II.

About 100 former codebreakers are expected to attend the reunion, which will include a memorial service on Sunday.

"A lot of our veterans who knew Tony personally, and indeed his wife Margaret, will be attending the memorial service where we remember those who worked here at Bletchley Park, so tributes to Tony will certainly feature in that service," said Mr Greenish.

Other attractions will include a field gun run competition and a display by the Vintage Military Amateur Radio Society of radio equipment spanning the last 100 years, showing how communication in the armed forces has changed over time and become more vital.

World War II re-enactors dressed in uniforms and civilian costumes of the day will reflect the wartime era.

The weekend will also include flypasts by the Battle of Britain Memorial Flight (subject to weather conditions and aircraft serviceability).



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials