Monday, June 6, 2011

Apple boss unveils iCloud service

Apple has unveiled its much-anticipated iCloud service at its annual developers' conference.

Apple boss Steve Jobs returned from medical leave to show off the features of the web-based service.

He said iCloud was necessary because the PC was no longer the digital hub of users' digital lives.

The web-based service aims to synchronise and co-ordinate the key content people store and share across their devices.

Music match

Contacts, calendar and mail applications have been re-written so a change to one propagates across the other versions on separate devices. This re-writing means Apple's MobileMe service will soon cease to exist.

Anyone buying an app, book or music track for one device will see it replicated on the other Apple devices they own. Similarly, bookmarks for interesting web pages will be shared across all gadgets.

Mr Jobs stressed that iCloud was "not just a hard disk in the sky".

"We are demoting the PC and Mac to just be a device," he said. "And moving the digital hub centre of your digital life to the cloud."

This would end the current frustration of keeping content such as photos and songs synchronised.

One key element of iCloud was Apple's music store iTunes, he said. This now has a iCloud element so music bought on one device can be propagated across all the Apple gadgets that person owns.

One part of the cloud-version of iTunes, called iTunes Match, will also scan the songs that people have ripped from their own CDs. This will recreate the library in the cloud without the need for the music to be uploaded. The service will cost $24.99 a year in the US. UK prices have yet to be given.

The release of iTunes Cloud pits Apple against Google and Amazon which have both unveiled their own web-based music storage services. However, both those lack the involvement of record labels and the ability to replicate an existing library.

"This is the first set of cards on the table for the long game which is increasingly moving access to all your media up into the cloud, " said Mike McGuire, senior analyst with research firm Gartner.

"We are seeing people putting pieces in place for the time when more and more consumers have those assets, not just in their immediate vicinity, but up in the cloud," he said. "Those kinds of transitions for consumers take a long time. They don't happen overnight."

Cheaper code

Apple also talked about updates for the iOS operating system that runs on iPhones, iPads and iPod Touches. It said it had sold more than 200 million iOS devices.

One novel feature integrates micro-blogging service Twitter into camera and photo apps to make it easier for people to share snaps with followers. iOS5 also introduces a auto-focus feature that lets a user zoom in on a particular.

Apple said it also planned to introduce a system that will update iOS devices without the need to plug them in to a PC or Mac. The new version of iOS will be available in the Autumn.

Lion, the forthcoming update for the Apple Mac operating system was also demonstrated at the WWDC. Apple marketing boss Phil Schiller said the software had more than 250 new features.

One key update, he said, was the inclusion of multi-touch keypads so Apple's notebooks can handle gestures such as pinch-to-zoom and momentum based scrolling seen before now on the iPhone.

Another gesture will take users to Ground Control, a global overview of everything happening on a notebook. Lion also has an autosave feature that automatically keeps copies of documents and other files.

Also introduced was a peer-to-peer wi-fi feature called Air Drop that lets Mac owners share files with friends and colleagues by dragging and dropping an icon onto a picture.

Apple said Lion will no longer be available on a physical CD, instead the software will have to be downloaded. Apple also cut the price of the update from more than $100 to $29 (�20.99 in the UK) when it goes on sale in July.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

French media tweet and poke ban

French TV and radio presenters have been banned from mentioning social networking sites such as Facebook and Twitter on air.

The country's broadcasting watchdog has ruled that doing so would break guidelines on advertising.

Stations can still talk about services without naming them, it said.

The French government is seen by many internet watchers as overly keen to regulate in relation to new media and the web.

In a ruling, published online, the Conseil Superieur de l'Audiovisuel (CSA), said: "Referring viewers or listeners to the page of the social network without mentioning it has the character of information.

"Whereas the referral by naming the social network in question has the character of advertising, contrary to the provisions of Article 9 of the decree of 27 March 1992 forbidding covert advertising."

Many French broadcasters - as in other countries - make extensive use of social networking sites, particularly Facebook and Twitter to interact with their viewers.

"Start Quote

Each company should have the right to say which communication channel they want to use."

End Quote Emmanuel Cassimatis Founder, Goodwizz.com

It is unclear how they would be able to direct people to such sites without identifying them.

Freedom of choice

The regulation effectively prevents market leading sites from gaining additional promotion by virtue of their size.

However, smaller, local competitors have mixed feelings about the clampdown.

"It is about finding a balance between freedom and fairness," said Emmanuel Cassimatis, founder of French site Goodwizz.com.

"Each company should have the right to say which communication channel they want to use.

"But 10 or 20 years down the line, we may have a string of lobbies created through those three or four channels that prevent small companies like ours from emerging. This move prevents that."

The French government has been criticised in the past, with claims that its apparent reliance on regulation is stifling innovation.

President Nicolas Sarkozy passed a three-strikes-and-out rule for online copyright infringers, in apparent defiance of EU guidelines on free access to the internet.

However, speaking at last month's E-G8 summit, the President defended his position.

He said there was a need to safeguard the rights of traditional creative industries in the rush promote online innovation.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Nintendo server hit by hackers

Nintendo has become the latest company to suffer an online security breach due to an attack by hackers, Lulz Security.

The Japanese game company said that a server of one of its affiliates in the US was attacked by the group some weeks ago.

Lulz Security is the same group that attacked the websites of Sony over the past few weeks.

However, the maker of the Wii said that no consumer data or company information was lost.

"There were no third-party victims," company spokesman Ken Toyoda said.

"But it is a fact, there was some kind of possible hacking attack," he added.

'Utmost priority'

Over the past few months, there has been a spate of attacks by hackers on the websites of leading companies resulting in the loss of valuable consumer data.

Japanese electronics maker Sony suffered a massive security breach earlier this year when hackers targeted the PlayStation Network and the details of 77 million users were compromised.

However in this case, Nintendo says there was no consumer data stored on the server accessed by the hackers and the company insists it is constantly working to ensure consumer safety.

"The protection of our customer information is our utmost priority," said Tomokazu Nakaura of Nintendo Japan.

"Therefore, we constantly monitor our security," he added.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Friday, June 3, 2011

Google to abandon older browsers

Google is phasing out support for older browsers from 1 August.

Those using IE7, Safari 3, Firefox 3.5 and their predecessors to view Gmail, Google Calendar, Talk, Docs and Sites will then lose some functions.

Eventually, it warned, these web services will stop working for those sticking with older browsers.

The move is part of a trend to stop the use of ageing browsers which can be insecure and not sophisticated enough to handle the latest web technologies.

Code malfunction

Statistics on browser versions gathered by StatCounter suggest about 17% need to change in the light of Google's decision.

Google made its announcement in a blogpost saying its engineers were keen to make use of the latest capabilities in browsers, and that required support for HTML5 technology.

As a result, from 1 August, Google will only support what it calls "modern browsers". By this it means the latest versions and major prior releases of Chrome, Firefox, Internet Explorer and Safari.

As new versions of these are released, Google will get its web services working with that and then drop support for the third-oldest version.

Support in this sense means that Google will only do compatibility testing with more up-to-date browsers. It will make not test with older programmes and can make guarantees that web services will work with them.

Concluding the blogpost, Venkat Panchapakesan, vice president of engineering at Google, wrote: "These new browsers are more than just a modern convenience, they are a necessity for what the future holds."

In mid-May, Mozilla, which oversees development of Firefox, kicked off a plan to get the 12 million or so people using version 3.5 of its browser to update.

It said it was "frustrated" with efforts to get people to upgrade and had taken a series of steps to force change.

It used pop-up screens, adverts, re-directs and updates to steer people towards more recent versions of Firefox.

Figures gathered by Mozilla suggest the campaign has had some success as the number of users on Firefox 3.5 has now dropped to about one million.

Microsoft's campaign to stop people using Internet Explorer 6 is one of the longest running upgrade efforts.

The software giant has used its automatic update system to get newer versions of its browser out to many users.

However, many companies prefer not to use this system and that has meant IE6 clinging on in some firms and nations.

Globally about 11% of browsers are IE6, suggest figures compiled by Microsoft, and there is a wide variation around the world.

About 34% of Chinese net users are on IE6, as are 22.3% of South Koreans and 11.6% of Vietnamese people.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Toshiba prices tablet below iPad2

Toshiba has announced its foray into the fast-growing tablet market with its latest gadget called Thrive.

The Japanese electronics maker has priced its entry level model at $429 (�262), which is cheaper than the base model of Apple's iPad2.

The company said its base model comes with wi-fi ability and is targeted at consumers who use tablets at home.

The tablet will go on sale in the US on 10 July.

'Non-Apple products'

The success of Apple's iPad has encouraged many computer and electronics companies to enter the segment.

Samsung has launched its Galaxy tab, while Sony has also announced its entry with two new models.

While none of them have been able to make a significant dent in Apple's market share, Toshiba said demand for other products was increasing gradually.

"There is a market out there of folks who want to buy non-Apple products," said Jeff Barney of Toshiba America.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Thursday, June 2, 2011

Hackers attack Sony network again

A hacker group has claimed it has attacked the Sony network and stolen more than one million passwords, email addresses and other information.

Lulz Security said it broke into servers that run SonyPictures.com.

Sony said it was aware of Lulz Security's statement and was investigating, the Associated Press reported.

In April, hackers broke into Sony's PlayStation Network and stole data from more than 77 million accounts.

That attack was considered the biggest in internet history and led to Sony shutting down the PlayStation Network and other services for almost a month.

The company has estimated the data breach will result in a $170m (�104m) hit to its operating profit.

Since then, Sony's networks have become targets for hackers and the company has confirmed at least four other break-ins prior to the claimed attack on Sony Pictures.

Lulz Security claims to be behind one of those attacks: an assault on Sony Music Japan.

The latest alleged attack will come as a blow to the Japanese firm, 24 hours after it announced the PlayStation Network would be fully restored in the US and Europe, and said it had beefed up its security systems.

'Asking for it'

In a statement on Thursday, Lulz Security said it had hacked into a database that included unencrypted passwords as well as names, addresses and dates of birth of Sony customers.

"From a single injection, we accessed EVERYTHING," it said. "Why do you put such faith in a company that allows itself to become open to these simple attacks?"

"What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plain text, which means it's just a matter of taking it.

"This is disgraceful and insecure: they were asking for it."

The group also recently claimed responsibility for hacking the website of the PBS network and posting a fake story in protest at a new programme about WikiLeaks.

Are you affected by any of the issues raised in this story? Send us your comments and experiences using the form below.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Future mobile to hit digital TV

Interference from future mobile signals might make digital TV unwatchable for some Britons, Ofcom has said.

The telecoms watchdog is starting a research program to find out how to help people affected when future mobile technology is switched on.

About 3% of TV-watching Britons could suffer interference from fourth-generation (4G) mobile, said Ofcom.

Filters will solve the problem for some, said Ofcom, but others may have to use other ways to get TV signals.

The problem of mobile and digital TV signals interfering with each other will arise because the chunk of spectrum reserved for 4G sits next to that used for broadcasting terrestrial digital TV signals.

The auction for the 800Mhz band is due to take place in 2012 and 4G services are expected to follow soon after. The rollout of 4G mobile will mean faster download and browsing speeds for handsets.

However, signals from base stations handling 4G services might cause interference in set-top boxes and digital televisions in homes nearby, said Ofcom in a briefing document.

Up to 3% of viewers of digital terrestrial television, about 760,000 people, might see interference if no action is taken, it warned.

In a bid to limit how many people suffer from poor picture quality, Ofcom has proposed running an education campaign to alert viewers about the possibility of interference.

Companies who buy a licence for part of the 800MHz spectrum will be expected to contribute to the costs of the education program.

For the vast majority of affected viewers, filters will strip out the interfering signals.

However, said Ofcom, in 0.1% of cases, filters will not help and it is considering how best to handle those instances. Some viewers may have to find alternative ways to watch digital TV.

A consultation exercise which will consider ways to tackle the interference issue is being started at Ofcom and will run until 11 August.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

E-mail hack attacks an 'epidemic'

The targeted attack used by hackers to compromise e-mail accounts of top US officials is reaching 'epidemic' proportions, say security experts.

The scam, known as spear phishing, was used in a bid to get passwords of Gmail accounts so they could be monitored.

Via a small number of customised messages it tries to trick people into visiting a web page that looks genuine so users type in login names.

Such attacks are often aimed at top officials or chief executives.

Such attacks are not new, say security professionals, but they are becoming more commonplace.

"What is happening more and more is the targeting of a couple of high value individuals with the one goal of acquiring valuable information and valuable data," said Dan Kaminsky, chief scientist at security firm DKH.

"The most interesting information is concentrated in the accounts of a few people," he said. "Attackers using information to impersonate the users is at epidemic proportions and why computer security is in the state it is in."

In March, security firm RSA was hit by a sophisticated spear-phishing attack that succeeded despite only two attacking e-mails being sent. The phishing e-mail had the subject line "2011 Recruitment Plan" and contained a booby-trapped spreadsheet.

Total access

Google said it uncovered the deception through a combination of cloud based security measures, abuse detections systems and user reports. It also cited work done by a website called contagio dump.

The founder of the site is technologist and researcher Mila Parkour who said the method used in this attack was "far from being new or sophisticated".

She told the BBC she was first alerted to the problem by one individual back in February. She would not reveal their name or position.

Google said that among those targeted were senior US government officials, military personnel, journalists, Chinese political activists and officials in several Asian countries, predominately South Korea.

"Someone shared the incident with me," she said. "I did a mini research and analysis and posted the findings as I heard it happened to other people in the military and US government. I just wanted them to be aware and be safe."

Ms Parkour said attackers got access to the entire mailboxes of victims.

"I did not read the contents of the mailbox so not sure if anything extra interesting was there," she said. "I hope not."

Chinese connection

Cyber attacks originating in China have become common in recent years, said Bruce Schneier, chief security technology officer at telecoms firm BT.

"It's not just the Chinese government," he said. "It's independent actors within China who are working with the tacit approval of the government."

China has said repeatedly it does not condone hacking, which remains a popular hobby in the country, with numerous websites offering cheap courses to learn the basics.

In 2010 Google was the victim what it called a "highly sophisticated and targeted attack on our corporate infrastructure originating from China" that it said resulted in the theft of intellectual property.

Last year, US. investigators said there was evidence suggesting a link between the Lanxiang Vocational School in Jinan and the hacking attacks on Google and over 20 other firms. The school denied the report.

This time Google is stressing that the security of its products was never compromised and that it was users who were scammed into unwittingly giving away their passwords.

"It's important to stress that our internal systems have not been affected - these account hijackings were not the result of a security problem with Gmail itself," said Eric Grosse, engineering director of the company's security team.

"But we believe that being open about these security issues helps users better protect their information online."

The White House has said it is investigating the issue.

Easy access

Security experts said spear phishing attacks were easy to perpetrate because of the amount of information people put on the internet about themselves on social networking sites such as Facebook and Twitter.

The mountain of data lets canny hackers piece together enough information to make e-mails they concoct appear convincing and genuine.

In this attack, some Gmail users received a message that looked like it came from a work colleague or was linked to a work project.

On Ms Parkour's site, she shows some of the spoof e-mails indicating how easy it was for people to be hoodwinked.

"It makes sense these bad guys would go that way given the amount of time, effort and investment they have to make in orchestrating an attack," said Dr Hugh Thompson, chief security strategist at People Security who also teaches at Columbia University.

People tend to trust messages that look like they come from people bearing details of where they last met or what they did, he said.

"I can then point you to a site that looks very much like Gmail and you are not going to question that because I already have your trust," he said.

While security experts criticised user behaviour, some also said the combination of login and passwords was at fault too.

"Passwords don't work as an authentication technology," said Mr Kaminsky.

"They are too flexible, too transferable and too easy to steal," he said. "However, we are stuck with them for now due to technical limitations and because users find them easy to use."



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Windows 8 'sneak previews' given

Microsoft has shown off early releases of the next version of Windows.

Demonstrations of Windows 8 running on tablets, phones and desktop computers were given at separate conferences in the US and Taiwan.

As expected, the software can be used via either traditional keyboard and mouse or by gestures on a gadget's touchscreen.

No date has been given for the release of Windows 8 but it is expected to be available before October 2012.

The start screen for Windows 8 seen at the demonstrations closely resembles the tiled layout seen on Microsoft's newest mobile operating system. The live tiles, that link to popular applications and data streams, can be manipulated via pressing on a screen.

The demo suggests that Windows 8 will have a unified look even though it will run on phones and tablets as well as portable and fixed computers.

The system has been designed first and foremost around touch and gesture, said Microsoft, but would also be manipulable by more traditional methods.

Despite rival Apple's success with its iPad tablet, Microsoft declared that it was not "out of the game" in that market.

The demos were given at the D9 conference in California and Computex in Taipei.

In a bid to speed up its efforts to get more tablets running Windows in the hands of consumers, Microsoft has reportedly demanded that hardware firms work with a single chip maker as they produce their gadgets.

Typically, laptop and notebook makers take chipsets from different suppliers as they build up a product range.

Firms expected to be producing chipsets for tablets include Qualcomm, Texas Instruments, Nvidia, Intel and others.

The news did not go down well with computer firms.

"This industry doesn't belong to Microsoft or Google, it belongs to all the participants," said Jim Wang, president of Acer, at a Computex press conference. "So they can't make the decision for all of us. That's the problem."



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

China rejects Gmail spying claims

China has rejected allegations of involvement in a cyber-spying campaign targeting the Google e-mail accounts of top US officials, military personnel and journalists.

A foreign ministry spokesman said it was "unacceptable" to blame China.

Google has not blamed the Chinese government directly, but says the hacking campaign originated in Jinan.

The US company said its security was not breached but indicated individuals' passwords were obtained through fraud.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials