Showing posts with label Microsoft. Show all posts
Showing posts with label Microsoft. Show all posts

Thursday, October 6, 2011

Apple founder, Steve Jobs, passed away on Wednesday [October 5]

Apple founder, Steve Jobs, passed away on Wednesday [October 5] at the age of 56, succumbing to pancreatic cancer.

The company announced his death this week. However, did not give any specific cause.

We are deeply saddened to announce that Steve Jobs passed away today, the company said in a brief statement. Steve's brilliance, passion & energy were the source of countless innovations that enrich & improve all of our lives. The world is immeasurably better because of Steve.

Jobs had been diagnosed with a rare form of pancreatic cancer called pancreatic neuroendocrine cancer. While those suffering can live as long as 20 years with the disease, it obviously wasn't the case with the Apple visionary.

His cancer eventually spread to his liver, so he was forced to have a liver transplant in 2009 & took an extended medical leave from Apple last January.

Even after a liver transplant, the cancer can recur, which may have been what happened in Jobs' case.

Jobs started Apple with a high school friend in a Silicon Valley garage in 1976, but 10 years later, he was forced out of the company. Eventually, in 1997, he returned to rescue the company he helped build. During his second stint, it grew into the most valuable technology company in the world with a market value of $351 billion.

He's responsible for inventing & masterfully marketing ever-sleeker gadgets that transformed everyday technology, from the personal computer to the iPod & iPhone.

Jobs is survived by his wife Laurene, whom he has two daughters & a son with. He also has another daughter from a previous relationship.

Young Steve Jobs
His death became a trending topic on Wednesday, drawing actions from Apple fans, as well as celebrities & political figures.

Steve was among the greatest of American innovators -- brave enough to think differently, bold enough to believe he could change the world, & talented enough to do it, said President Obama in a statement. Steve was fond of saying that he lived every day like it was his last. Because he did, he transformed our lives, redefined entire industries, & achieved one of the rarest feats in human history: he changed the way each of us sees the world.

I'm truly saddened to learn of Steve Jobs' death, said Microsoft founder, Bill Gates. Melinda & I extend our sincere condolences to his family & friends, & to everyone Steve has touched through his work. Steve & I first met nearly 30 years ago, & have been colleagues, competitors & friends over the course of more than half our lives. The world rarely sees someone who has had the profound impact Steve has had, the effects of which will be felt for many generations to come. For those of us lucky enough to get to work with him, it's been an insanely great honor. I will miss Steve immensely.

Wednesday, October 5, 2011

Tags Added in HTML5 and Sitepoint - HTML5 & CSS3 for the Real World

Free Download

Tag Description Covered in Chapter
<article> Defines an article 11
<audio> Defines sound content 15
<canvas> Defines graphics 16
<command> Defines a command button 14
<datagrid> Defines data in a tree-list 14
<datalist> Defines a drop-down list 14
<datatemplate> Defines a data template 14
<details> Defines details of an element
<dialog> Defines a dialog (conversation)
<embed> Defines external interactive content or plug-in 16
<eventsource> Defines a target for events sent by a server 16
<figure> Defines a group of media content, and their caption 9
<footer> Defines a footer for a section or page 11
<header> Defines a header for a section or page 11
<mark> Defines marked text
<meter> Defines measurement within a predefined range
<nav> Defines navigation links 10
<nest> Defines a nestingpoint in a datatemplate 14
<output> Defines some types of output
<progress> Defines progress of a task of any kind
<rule> Defines the rules for updating a template
<section> Defines a section 11
<source> Defines media resources 15
<time> Defines a date/time
<video> Defines a video 15


Monday, October 3, 2011

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

To add phishing safety net, Facebook works with Websense

Users will see this notice if they are about to visit a potentially harmful website, giving them the option to go back to the previous page.

Facebook have stepped up their battle against phishing & malware scammers by partnering with security firm Websense.

As of next week, users will be warned if they are about to be taken to a malicious website.

The social network has suffered to date as many of its 700 million users unwittingly click on dangerous links supposedly posted by their friends.

Such attacks usually trick users into sharing passwords or data.

Facebook already tells users if they are about to visit an external site, but the current set up makes no distinction between friendly & dangerous sites.

The new technology will present a warning screen whenever it suspects a page poses a threat to the users, giving details of the risk.

From here, users are encouraged to return to the previous page.

If they wish, users can continue to the intended page, albeit very much at their own risk.
'Profitable target'

Both Facebook & Websense will hope the extra measures will be enough to deter potential scammers from focusing their efforts on the network.

Scams regularly catch out hundreds of thousands of users at a time.
Continue reading the main story
“Start Quote

As more of these 'friend in the middle' attacks happen, you start to trust your friends less.”

Spencer Parker Websense

"There's over 700 million users on Facebook," Websense's Spencer Parker told the BBC.


"As a piece of real estate, it's extremely profitable to be targeted by malware writers."


The protection will be powered by Websense's "Threatseeker Cloud", a system which stores a database of known malicious URLs.


The system can also detect unknown dangerous URLs by assessing threats in real-time.


This means harmful URLs can be blocked even before they are known to the company - cutting off a key tactic used by phishers in which constantly changing URLs fool database-driven protection.


In addition, the system will "follow" links made using popular URL shorteners - such as bit.ly & ow.ly - to verify their safety.

Due to the nature of how we interact with our friends, Mr Parker says phishing attacks on Facebook are much harder to prevent than other commonly used techniques.

"One of the things with Facebook, of course, is that you have that element of trust in a social network. If one of your friends posts something, you automatically trust it more than if it just received as a spam email.

"As more of these 'friend in the middle' attacks happen, you start to trust your friends less."

To add phishing safety net, Facebook works with Websense

Users will see this notice if they are about to visit a potentially harmful website, giving them the option to go back to the previous page.

Facebook have stepped up their battle against phishing & malware scammers by partnering with security firm Websense.

As of next week, users will be warned if they are about to be taken to a malicious website.

The social network has suffered to date as many of its 700 million users unwittingly click on dangerous links supposedly posted by their friends.

Such attacks usually trick users into sharing passwords or data.

Facebook already tells users if they are about to visit an external site, but the current set up makes no distinction between friendly & dangerous sites.

The new technology will present a warning screen whenever it suspects a page poses a threat to the users, giving details of the risk.

From here, users are encouraged to return to the previous page.

If they wish, users can continue to the intended page, albeit very much at their own risk.
'Profitable target'

Both Facebook & Websense will hope the extra measures will be enough to deter potential scammers from focusing their efforts on the network.

Scams regularly catch out hundreds of thousands of users at a time.
Continue reading the main story
“Start Quote

As more of these 'friend in the middle' attacks happen, you start to trust your friends less.”

Spencer Parker Websense

"There's over 700 million users on Facebook," Websense's Spencer Parker told the BBC.


"As a piece of real estate, it's extremely profitable to be targeted by malware writers."


The protection will be powered by Websense's "Threatseeker Cloud", a system which stores a database of known malicious URLs.


The system can also detect unknown dangerous URLs by assessing threats in real-time.


This means harmful URLs can be blocked even before they are known to the company - cutting off a key tactic used by phishers in which constantly changing URLs fool database-driven protection.


In addition, the system will "follow" links made using popular URL shorteners - such as bit.ly & ow.ly - to verify their safety.

Due to the nature of how we interact with our friends, Mr Parker says phishing attacks on Facebook are much harder to prevent than other commonly used techniques.

"One of the things with Facebook, of course, is that you have that element of trust in a social network. If one of your friends posts something, you automatically trust it more than if it just received as a spam email.

"As more of these 'friend in the middle' attacks happen, you start to trust your friends less."

Friday, September 30, 2011

Netflix to Split DVD & Streaming Businesses


The company is betting heavily on the growth of online video delivery.
Netflix will spin off its foundational DVD-by-mail service, the company announced this morning, ceding its iconic red envelopes to a new site that will go by the name of Qwikster. Netflix says it intends to focus on the increasingly popular streaming-video model. Customers, already upset by an earlier decision to split DVD & streaming services & change the rates, are bemoaning this further split, which will increase costs & hassle for those who want the same service as before. All the same, the change could lead to some concrete technological improvements.

Netflix forever changed the movie rental market in 1999, when it began offering subscribers DVDs by mail for set rates. The company's wide selection & distribution technology laid waste to competitors that operated physical retail stores. In 2007, Netflix scored another coup with the launch of "Watch Instantly," a feature that allows customers to stream certain movies on demand over the Internet. In the years since, the service has grown in scope & popularity, owing in part to integration with televisions & game consoles.

But despite these successes, the company is still running scared. In an e-mail sent to customers early this morning, Netflix CEO Reed Hastings wrote, "Most companies that are great at something—like AOL dialup or Borders bookstores—do not become great at new things people want (streaming for us)." So Netflix has decided to take drastic action in the name of technological progress, moving the foundation of its business to a different brand name.

"Over time, we realized DVD & streaming were becoming more & more different & that we could do a better job for both services if we separated them," Hastings said in a video about the split posted to YouTube. In a related blog post, he added, "We feel we need to focus on rapid improvement as streaming technology & the market evolve, without having to maintain compatibility with our DVD-by-mail service."

Experts see strong technical justification for the move. "I really believe [DVD & streaming] are different businesses," says Jay Cofield, an associate professor in the mass communication department at the University of Montevallo, in Alabama, who has studied streaming video. The DVD, he says, is a proven technology that is most appealing when delivered with special features & beautiful physical packaging. But streaming is a work in progress, & Cofield believes improvements are likely to come in forms that are incompatible with DVDs.

For example, Cofield believes Netflix could potentially implement powerful social features. Some companies that stream live events already allow viewers to chat while watching. Cofield suggests that Netflix could move toward streaming events such as moderated chats with actors & directors. "If Netflix added this as a pay-per-view feature, or went ad-supported, I would imagine that for certain movies, you could announce a showing starting at [a certain time], with tweet-like commentary by the director or whoever," Cofield says. "Aspiring filmmakers would love it. & I reckon that Hollywood would lose track of the cash generated if the Twilight stars did something like this when the movie hit Netflix."

Cofield adds that the importance of mobile devices can't be overstated. Though it's not clear whether people would watch feature-length films on small screens, he believes Netflix may want to focus on mobile support for streaming shorter content such as television shows.

Besides adding new features, Netflix may also have to solve some existing technical problems. "As people pay more money for premium content, consumers will expect more quality," says Hui Zhang, cofounder & chief scientist of Conviva, a company that optimizes & personalizes live video streams. Today's consumers are accustomed to smooth delivery of HD television content through cable networks, & Zhang says it's difficult to provide the same level of service over the Internet. Though customers may forgive occasional hiccups, the coming increase in Netflix's prices may make them less forgiving. Netflix & other streaming-video companies will have to deal with growing loads on the network & unpredictable network conditions, he says, adding, "Online video will be a very software-intensive business."

Though consumers might well enjoy such improvements to streaming service, today they are criticizing Netflix for breaking something that was working well. In the online comments on Hastings's post, customers complain particularly about being forced to maintain accounts on two different sites & about having to pay attention to how they want to watch a movie rather than simply deciding which movie they want to watch.

Netflix to Split DVD & Streaming Businesses


The company is betting heavily on the growth of online video delivery.
Netflix will spin off its foundational DVD-by-mail service, the company announced this morning, ceding its iconic red envelopes to a new site that will go by the name of Qwikster. Netflix says it intends to focus on the increasingly popular streaming-video model. Customers, already upset by an earlier decision to split DVD & streaming services & change the rates, are bemoaning this further split, which will increase costs & hassle for those who want the same service as before. All the same, the change could lead to some concrete technological improvements.

Netflix forever changed the movie rental market in 1999, when it began offering subscribers DVDs by mail for set rates. The company's wide selection & distribution technology laid waste to competitors that operated physical retail stores. In 2007, Netflix scored another coup with the launch of "Watch Instantly," a feature that allows customers to stream certain movies on demand over the Internet. In the years since, the service has grown in scope & popularity, owing in part to integration with televisions & game consoles.

But despite these successes, the company is still running scared. In an e-mail sent to customers early this morning, Netflix CEO Reed Hastings wrote, "Most companies that are great at something—like AOL dialup or Borders bookstores—do not become great at new things people want (streaming for us)." So Netflix has decided to take drastic action in the name of technological progress, moving the foundation of its business to a different brand name.

"Over time, we realized DVD & streaming were becoming more & more different & that we could do a better job for both services if we separated them," Hastings said in a video about the split posted to YouTube. In a related blog post, he added, "We feel we need to focus on rapid improvement as streaming technology & the market evolve, without having to maintain compatibility with our DVD-by-mail service."

Experts see strong technical justification for the move. "I really believe [DVD & streaming] are different businesses," says Jay Cofield, an associate professor in the mass communication department at the University of Montevallo, in Alabama, who has studied streaming video. The DVD, he says, is a proven technology that is most appealing when delivered with special features & beautiful physical packaging. But streaming is a work in progress, & Cofield believes improvements are likely to come in forms that are incompatible with DVDs.

For example, Cofield believes Netflix could potentially implement powerful social features. Some companies that stream live events already allow viewers to chat while watching. Cofield suggests that Netflix could move toward streaming events such as moderated chats with actors & directors. "If Netflix added this as a pay-per-view feature, or went ad-supported, I would imagine that for certain movies, you could announce a showing starting at [a certain time], with tweet-like commentary by the director or whoever," Cofield says. "Aspiring filmmakers would love it. & I reckon that Hollywood would lose track of the cash generated if the Twilight stars did something like this when the movie hit Netflix."

Cofield adds that the importance of mobile devices can't be overstated. Though it's not clear whether people would watch feature-length films on small screens, he believes Netflix may want to focus on mobile support for streaming shorter content such as television shows.

Besides adding new features, Netflix may also have to solve some existing technical problems. "As people pay more money for premium content, consumers will expect more quality," says Hui Zhang, cofounder & chief scientist of Conviva, a company that optimizes & personalizes live video streams. Today's consumers are accustomed to smooth delivery of HD television content through cable networks, & Zhang says it's difficult to provide the same level of service over the Internet. Though customers may forgive occasional hiccups, the coming increase in Netflix's prices may make them less forgiving. Netflix & other streaming-video companies will have to deal with growing loads on the network & unpredictable network conditions, he says, adding, "Online video will be a very software-intensive business."

Though consumers might well enjoy such improvements to streaming service, today they are criticizing Netflix for breaking something that was working well. In the online comments on Hastings's post, customers complain particularly about being forced to maintain accounts on two different sites & about having to pay attention to how they want to watch a movie rather than simply deciding which movie they want to watch.

GPS Data on Beijing Cabs Reveals the Cause of Traffic Jams

[ Communications ]
The data could lead to novel urban planning solutions that would work in sprawling cities everywhere.

Traffic tracking: To understand the causes of Beijing’s traffic problems, researchers divided the city into regions, shown above, & analyzed the ways that taxis travel between them.
Microsoft Research Asia.

Beijing is a city famous for traffic jams. In 2006, rush hour reportedly lasted 11 hours a day, & the city has been called a "virtual car park" during daylight hours. As in most major cities, urban planners have been trying for years to relieve the pressure by adding new roads or public transit lines, or providing better enforcement for traffic laws.

Now a group working at Microsoft Research Asia has shown that tracking the location of taxicabs could be a better way to identify the underlying problems with a city's transportation network, helping officials determine how to best ease congestion.

The researchers used GPS data from more than 33,000 Beijing taxicabs. That data was collected in 2009 & 2010. The researchers were not just looking for bottlenecks—trouble spots that regular commuters may know only too well. "[Congested] road segments are only the appearance—they're not the problem," says Yu Zheng, who led the research. "We try to identify the true source of the problem in our work."

The researchers presented their work last week at the 13th International Conference on Ubiquitous Computing, which took place in Beijing.

To get at underlying causes of traffic problems, the researchers needed to get information about the trips people are taking—where journeys start, finish, & how a commuter travels in between. The researchers divided Beijing into regions & analyzed the taxi data to find places where two regions weren't properly connected.

Even if a taxi never encounters a slowdown, clues from the trip can indicate an underlying problem with urban planning. For example, the taxi driver might take a circuitous route from point A to point B, instead of a direct one. The added distance could indicate that the driver knows about a problem with what appears to be the fastest route.

The researchers' algorithms indicate when the network of roads & subway lines between two regions cannot support the number of people traveling between those regions. By pointing out underlying problems, the system shows urban planners where to focus their attention, Zheng says.

In some cases, Zheng says, the busy regions aren't really the ones that are flawed. For example, it may be that people from region 1 are going through region 2 on their way to region 3, in which case it may be better to connect region 1 & 3 directly, rather than trying to widen highways in region 2.

The researchers evaluated their system by examining how their calculations changed as Beijing's transportation network evolved during the two-year period they monitored. They found that when city planners added new connections between regions that algorithms had identified as flawed, conditions did indeed improve. Where flaws were identified but not fixed, traffic conditions did not improve.

Zheng says the system could easily be adapted for any city that has a large number of taxicabs—many of which struggle with traffic in their own right. Beijing ranks fourth in the world for number of cabs. The top 10 includes Mexico City, Bangkok, Tokyo, New York, Buenos Aires, & Moscow. Zheng says that, with enough data, his techniques would work as well there as they do for Beijing.

"I think this is an interesting direction, though I wonder to what extent the real problem in urban planning is not having the resources—money—to do anything about it," says Sam Madden, an associate professor at the MIT Computer Science & Artificial Intelligence Laboratory who studies wireless sensor networks, including GPS units.

Madden adds that the huge quantity of data the researchers amassed—enough to analyze every road in a city—makes the work impressive. Even a few years ago, he says, it would have been a challenge to get so much information about road conditions. For his own research, Madden put GPS sensors on taxis to gather data, but cost & difficulty limited him to tagging tens of taxis, not thousands.

GPS Data on Beijing Cabs Reveals the Cause of Traffic Jams

[ Communications ]
The data could lead to novel urban planning solutions that would work in sprawling cities everywhere.

Traffic tracking: To understand the causes of Beijing’s traffic problems, researchers divided the city into regions, shown above, & analyzed the ways that taxis travel between them.
Microsoft Research Asia.

Beijing is a city famous for traffic jams. In 2006, rush hour reportedly lasted 11 hours a day, & the city has been called a "virtual car park" during daylight hours. As in most major cities, urban planners have been trying for years to relieve the pressure by adding new roads or public transit lines, or providing better enforcement for traffic laws.

Now a group working at Microsoft Research Asia has shown that tracking the location of taxicabs could be a better way to identify the underlying problems with a city's transportation network, helping officials determine how to best ease congestion.

The researchers used GPS data from more than 33,000 Beijing taxicabs. That data was collected in 2009 & 2010. The researchers were not just looking for bottlenecks—trouble spots that regular commuters may know only too well. "[Congested] road segments are only the appearance—they're not the problem," says Yu Zheng, who led the research. "We try to identify the true source of the problem in our work."

The researchers presented their work last week at the 13th International Conference on Ubiquitous Computing, which took place in Beijing.

To get at underlying causes of traffic problems, the researchers needed to get information about the trips people are taking—where journeys start, finish, & how a commuter travels in between. The researchers divided Beijing into regions & analyzed the taxi data to find places where two regions weren't properly connected.

Even if a taxi never encounters a slowdown, clues from the trip can indicate an underlying problem with urban planning. For example, the taxi driver might take a circuitous route from point A to point B, instead of a direct one. The added distance could indicate that the driver knows about a problem with what appears to be the fastest route.

The researchers' algorithms indicate when the network of roads & subway lines between two regions cannot support the number of people traveling between those regions. By pointing out underlying problems, the system shows urban planners where to focus their attention, Zheng says.

In some cases, Zheng says, the busy regions aren't really the ones that are flawed. For example, it may be that people from region 1 are going through region 2 on their way to region 3, in which case it may be better to connect region 1 & 3 directly, rather than trying to widen highways in region 2.

The researchers evaluated their system by examining how their calculations changed as Beijing's transportation network evolved during the two-year period they monitored. They found that when city planners added new connections between regions that algorithms had identified as flawed, conditions did indeed improve. Where flaws were identified but not fixed, traffic conditions did not improve.

Zheng says the system could easily be adapted for any city that has a large number of taxicabs—many of which struggle with traffic in their own right. Beijing ranks fourth in the world for number of cabs. The top 10 includes Mexico City, Bangkok, Tokyo, New York, Buenos Aires, & Moscow. Zheng says that, with enough data, his techniques would work as well there as they do for Beijing.

"I think this is an interesting direction, though I wonder to what extent the real problem in urban planning is not having the resources—money—to do anything about it," says Sam Madden, an associate professor at the MIT Computer Science & Artificial Intelligence Laboratory who studies wireless sensor networks, including GPS units.

Madden adds that the huge quantity of data the researchers amassed—enough to analyze every road in a city—makes the work impressive. Even a few years ago, he says, it would have been a challenge to get so much information about road conditions. For his own research, Madden put GPS sensors on taxis to gather data, but cost & difficulty limited him to tagging tens of taxis, not thousands.

 
Develop by SEO Booster Tips | Estates For Sales | Expert Zone