Showing posts with label systems. Show all posts
Showing posts with label systems. Show all posts

Thursday, 5 September 2013

Phone makers roll their own operating systems as Google and Microsoft close ranks

Sometimes, you can’t help but pay attention to what the man behind the curtain is doing. Earlier this week, Microsoft announced plans to acquire Nokia’s device and services business for more than $7 billion, effectively seizing control of the entire Windows Phone experience, from software to hardware to services.

Just like that, the companies behind every major smartphone operating system now compete directly with their manufacturing partners. And while Google erected a "firewall" between Android and Motorola when it bought the handset maker in 2012, Microsoft has no plans to separate Nokia from the core Windows Phone business. It’s full steam ahead for Microsoft-made smartphones as Redmond tries to single-handedly turn Windows Phone from an also-ran into a contender.

Wednesday, 4 September 2013

Spotify Connect is like Chromecast for connected audio systems

Spotify is introducing a new cloud-based feature for premium subscribers designed to make it easy to start to play music on your mobile device, then push the stream to wireless home speakers, which will continue rocking even if you wander away with your phone—similar to the way Google's Chromecast works.

Called Spotify Connect, the new service is rolling out over the next few months to iOS devices as well as home audio systems from companies such as Argon, Bang & Olufsen, Denon, Hama, Marantz, Philips, Pioneer, Revo, Teufel, and Yamaha.

Think of Spotify Connect as a remote control for Spotify—a remote that lets you switch quickly between devices. You can, for example, start listening to a playlist on your iPhone, and then when you get home switch to listening on your home stereo or iPad.

The list of audio manufacturers pledged to support Spotify Connect.

That may sound a lot like other services that let you share data and files between devices, such as Miracast or Apple’s AirPlay functionality. But instead of streaming music from your iPhone directly to a pair of speakers, Connect streams the music directly from Spotify's servers.

The company says its approach will help users save on battery life as well as cut down on interruptions to your Metallica listening sessions from phone calls or notification alerts.

When Spotify Connect lands on your device, you should see a green speaker icon next to the play controls inside the Spotify app. Tap it and a menu comes up with all the various devices that can receive your playlist—all devices must be logged in to the same account for Connect to work.

Spotify Connect is aimed at encouraging more users to pay $10 per month for Spotify instead of freeloading with the ad-supported service. In addition to Connect, Premium subscribers also get full access to their Spotify playlists on mobile devices (free users can only use the radio feature) and ad-free listening.

Spotify Connect certainly sounds interesting—assuming the audio manufacturers indeed release hardware to support it—but it will also be a fairly exclusive addition out of the gate.

Connect will also be absent from Android and PC desktops at first, with plans to add the new service to these platforms at a later date. Spotify did not specify exactly when Android users can expect to see Connect on their devices.

Also, while the roster of companies supporting Spotify Connect is vast, one notable audio hardware maker missing from that list is wireless system maker Sonos. Spotify wouldn’t comment on whether Sonos is coming, but Spotify did say that more hardware makers will be added in the future.

Spotify has certainly been busy this summer. Earlier this year, the service also released a number of new music discovery tools, includingBrowse and Discover.

Ian is an independent writer based in Tel Aviv, Israel. His current focus is on all things tech including mobile devices, desktop and laptop computers, software, social networks, Web apps, tech-related legislation and corporate tech news.
More by Ian Paul


View the original article here

Friday, 30 August 2013

Feds developing guidelines to help businesses to better secure their IT systems

Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.

The agency has released a draft of its preliminary cybersecurity framework and is seeking feedback from industry.

The agency is scheduled to release a full preliminary draft in October, for public review. It will then issue the final 1.0 version of the framework in February 2014 and continue to update the framework thereafter.

When finished, the framework will provide guidance for organizations on how to manage cybersecurity risk, “in a manner similar to financial, safety, and operational risk,” the document states.

In February the White House issued an executive order tasking NIST to develop a cybersecurity framework, one based on existing standards, practices and procedures that have proven to be effective.

In July, NIST issued an outline of the framework and held a workshop in San Diego to fill in some details. This draft incorporates some of that work, and was released to gather more feedback ahead of the next workshop, to be held in Dallas starting on Sept. 11.

“The Framework complements, and does not replace, an organization’s existing business or cybersecurity risk management process and cybersecurity program. Rather, the organization can use its current processes and leverage the framework to identify opportunities to improve an organization’s cybersecurity risk management,” the draft read.

When finished, the framework will consist of three parts. One component, called the core functions, will be a compilation of commonly practiced activities and references. The second component, the implementation tiers, provides guidance on how to manage cybersecurity risks. The third component, the framework profile, provides guidance on how to integrate the core functions within a cybersecurity risk strategy, or plan.

On Twitter, framework ideas are being submitted and discussed with the hashtag #NISTCSF.

Joab Jackson covers enterprise software and general technology breaking news for the IDG News Service.
More by Joab Jackson


View the original article here

Monday, 5 August 2013

Industrial control systems targeted by malicious attackers, research shows

Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.

The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.

The researcher shared new data regarding attacks at the Black Hat security conference on Thursday and also released the tools for others to build and deploy similar systems.

Since March, he has made significant changes to the system architecture. He virtualized it and deployed it in additional countries, including Brazil, Russia, Ireland, Singapore, China, Japan and Australia.

The new architecture uses a tool called the Browser Exploitation Framework (BeFF) to inject JavaScript code into attackers' browsers if they break into the system and access secure areas.

The injection is not malicious in nature, but it allows the honeypot operator to obtain information about the attacker's computer, which significantly enhances the ability to attribute attacks, Willhoit said. The JavaScript code can perform Wi-Fi triangulation to determine the attacker's location and can gather information about his computer and local network, including the OS, computer name and IP address, he said.

Wilhoit has identified 74 attacks against the ICS honeypot systems, 10 of which can be considered critical and could have compromised the integrity of the water pump.

In one case, an attacker tried to change the water temperature in the pump to 130 degrees Fahrenheit and in two other cases, the attackers issued commands to shut down the water pump.

Overall, 58 percent of attacks originated from Russia, but all of them were non-critical in nature.

Attacks classified as non-critical would have not have severely affected the water pump, but they could have led to critical attacks in the future, the researcher said.

Five of the critical attacks originated from China, and one each from Germany, the U.K., France, Palestine and Japan.

The critical attacks were targeted in nature and the attackers behind them generally tried to manually identify vulnerabilities in the components of the simulated water pump system, Willhoit said.

Meanwhile, the individuals behind the non-critical attacks first performed port scans and then used automated vulnerability scanners or known ICS vulnerabilities to try to break in.

The goal of some of the critical attacks was probably espionage or reconnaissance, as attackers were actively monitoring the data coming from the system, the researcher said.

During the past few years, security researchers have identified a large number of vulnerabilities in various components of industrial control systems. However, real-world information on who might attack such systems, and how likely attacks are, has been limited.

The big takeaway from this research is that attacks against Internet-facing ICSs are occurring and some of them appear to be targeted, Wilhoit said. Many ICS engineers are likely not aware that this is happening, he said.

The researcher hopes the tools he released will help ICS owners build and deploy their own honeypots in order to see who's targeting them and why and what changes they need to make to protect their real systems.

The ICS world needs more security information sharing, Wilhoit said. Researchers and IT professionals are sharing good information in other fields of IT security and same thing needs to happen for ICS, especially in those areas that could be considered critical infrastructure, he said.


View the original article here