Monthly Archives: October 2018

Software Centre raises E3m

Lero, the Irish Software Engineering Research Centre, raised an additional E3m in research funding in 2012 according to its annual report issued today.

New projects included research contracts with the European Space Agency, United Technologies Research Centre and several EU-funded research consortia. During 2012 Lero announced funding of E22.4m over 5 years through Science Foundation Ireland and technology firms such as IBM and Intel.

Lero also reported that it was awarded five new patents in 2012 covering areas such as self-sacrificing spacecraft swarms and methods of protecting autonomous systems. Forkstream, a spinout company, was established and it has recently been acquired by Openet, a leading Irish transaction management software and services provider. 170 Lero researchers recorded a 47pc increase in journal papers and a 41pc increase in conference papers during the year.

“Our researchers are in demand globally,” commented Prof Mike Hinchey, director, Lero. “The work which is being done in Ireland is world leading across a number of areas including medical devices, agile, cloud and space flight software.”

He said the prolonged Ulster Bank and RBS outage in 2012 was a reminder of what can happen when critical software systems crash due to badly managed changes. In the United States a recent report by the US Food & Drug Administration showed that 20pc of the medical device recalls in the US in 2012 were due to software faults. “Today it is almost impossible to lead a software-free life. Software is the enabling factor in smartphones, smart cities, smart homes, smart health and just about smart anything.”

He added, “Because software can be easily changed, it is often changed badly. Lero specialises in Evolving Critical Systems research which aims to develop methods, techniques, tools, and processes for the development and evolution of highly reliable software systems that maintain, or improve, their reliability as they evolve.”

Easy Solutions Helps Fight Mobile Banking Fraud with Detect Safe Browsing (DSB) 4.0, Now Available for iPhone and Android

Easy Solutions, the Total Fraud Protection® company, today released Detect Safe Browsing (DSB) version 4.0. With DSB 4.0, financial institution can provide an important additional layer of fraud prevention to the end-user, to better protect against malware and other sophisticated threats such as, pharming, man-in-the-middle (MITM) and man-in-the browser (MITB) attacks. With DSB 4.0, Easy Solutions now extends this support to the two most popular mobile platforms: Android and iOS, ensuring that over 90%1 of mobile users can securely access their mobile banking accounts.

The APWG recently reported over 1.3 million confirmed-malicious files for Android alone2, making mobile malware one of the fastest growing classes of threats.

“Mobile banking has become the preferred method for many consumers to conduct their online banking. Unfortunately for financial institutions, some of the most insidious and difficult-to-detect malware is now being targeted at the mobile end-point,” said Daniel Ingevaldson, CTO of Easy Solutions. “With Detect Safe Browsing now available for iPhone and Android devices, financial institutions will be able to provide their customers with a simple and unobtrusive way to secure their mobile banking experience.”

DSB is a critical component of Easy Solutions’ Total Fraud Protection platform, which provides comprehensive fraud protection across all channels, and extended to the end-user. By combining cross-channel risk-scoring, transaction anomaly detection, multi-factor authentication, secure browsing, and detection and take-down services, Easy Solutions blocks criminals at all three phases of the fraud lifecycle – planning, launching, and cashing – while ensuring that authorized users can conduct business.

DSB 4.0 from Easy Solutions provides visibility and real-time intelligence of the threats impacting consumers. Based on a proprietary cross validation technology that prevents re-direction to fraudulent websites, DSB 4.0 includes some of the following capabilities:

  • Secure Mobile Browsing with the DSB App: The free DSB app, now available for both iOS and Android devices, gives customers a simple way to protect bank transactions performed on their mobile device or tablet
  • Accelerated Disinfection: DSB enables customers to quickly deploy on-demand cleanup procedures for malware related advanced persistent threats (APTs), enabling financial institutions to mitigate zero-day and targeted attacks.
  • Active Phishing Protection: DSB provides enhanced phishing protection based on Detect Monitoring Services’ (DMS) black list. Since DMS detects phishing attacks in early stages, DSB users are protected from the very latest phishing scams, minimizing their exposure to fraud.
  • Proactive, Real-time Malware Protection: DSB employs proprietary cross-validation technology that detects DNS poisoning and ensures that the end user can connect to the protected site. When an active redirection is detected, DSB stops the fraudulent connection.

ABOUT EASY SOLUTIONS

Easy Solutions delivers Total Fraud Protection® to over 100 clients, with over 32 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.

HP Releases Desktop PC with Military Standards

Global desktop PC sales continue to slow. However, this does not preclude Hewlett-Packard (HP) to continue releasing the latest desktop PC product lines.

No half-hearted, at an event in Jakarta, Wednesday (07/24/2013), HP released 4 series desktop PCs at once, namely EliteOne 800 G1, G1 EliteDesk 800, ProOne 600 G1, and G1 ProDesk 600. The four were aimed at the business segment.

Present as a business device, HP equip these devices with a variety of features that do not exist in the PC consumer.

For example, four of which are equipped with a safety feature called HP Client Security. Using these features, users can protect the devices at every layer, including hardware, software, and BIOS.

Other value, the products have passed the test of military standards. According to Ricky Handrian, MDM Business Desktop PC HP Indonesia, standardization include durability, shock, and temperature.

These devices have to endure or withstand heavy overwritten with a maximum weight of 75 kg. In addition, products with military standards must withstand shock, although it has been taken away in a car in the distance.

“Devices that pass this certification should still be able to operate, though it was taken in a truck and suffered shock, for example, 1,000 miles,” said Ricky.

HP Series 800 G1 EliteOne a version All-in-one PC from EliteDesk 800 G1. This product is available in one version a touch screen and non-touch also.

Those who are interested can choose the specifications of the product. To EliteOne 800 G1, specification available is generation Intel Core processors up to 4 Haswell, Windows 8 Pro, up to 16 GB of RAM, up to 1 TB HDD, and a 23-inch LED screen.

Meanwhile, the desktop version of this device, EliteDesk 800 G1, comes with a slightly higher specification, namely 4-generation Intel Core processor Haswell, Windows 8 Pro, 32 GB RAM, and up to 2 TB HDD.

Carrying the same concept with the EliteBook 800, ProOne 600 HP version of the G1 is the all-in-one PC from HP ProDesk 600 G1. For the problem specification, these two products have the same choice as the Elite 800 series.

So, what distinguishes the two series? According to Ricky, the two series have different processor platforms support. 800 Series uses Intel Q87 platform. While the Pro 600 series using Q85.

“ProDesk Series 600 is a downgraded version of the EliteBook 800. ProDesk device 600 is certainly cheaper than EliteBook 800. Yeah, let’s just ProDesk 600 as the sister of the EliteBook 800,” added Ricky.

Vectorform’s Toolbox For Windows 8 Is Great For Multi-Tasking

Based in Royal Oak, Michigan,Vectorform invents digital products and experiences with a focus on innovative mobile and emerging technology solutions. Vectorform partners with premier global brands including Microsoft MSFT +0.72%, Disney, Coca Cola, and Volkswagen to create the next iconic experience. Vectorform was founded in 1999 and now has over 100 employees across the globe with additional studios in Seattle, New York, Munich and Hyderabad.

Aside from designing experiences for clients, their elite team of artists, engineers, entrepreneurs and technologists has also developed a number of its own applications that have proven very successful.

 

“Vectorform has evolved from a digital agency to part think tank, part lab, and part studio,” stated Vectorform Director of Product Vision, Kevin Foreman.

One of Vectorform’s most popular applications is the ever-evolving Toolbox for Windows 8.  The free application has recorded over 850,000 downloads and is currently the number 1 productivity app available on the Windows Store. With Toolbox you can view and interact with up to six different tools at once, giving you the power and flexibility to customize your workspace for maximum productivity.

There are currently 12 tools available within Toolbox, including a Facebook FB -1.02% application, voice notes, real-time currency converter, web browser, and a Twitter client that was added just this past May. The Twitter application refreshes in real time so that you can view details of content without having to leave the timeline.

When asked why Vectorform was primarily focused on developing apps for the Windows 8 app store, Foreman said “Toolbox specifically was focused on Windows 8, and Toolbox may be ported to additional operating systems.  As a company, we’re focused on mobile and emerging technologies.  We’re platform agnostic.”

Foreman told me that they were one of the companies that had the Microsoft Surface table product a few years ago.  They created a 360-degree user interface where music chips could be dragged around and they used this application create the Vectorform Surface DJ.

Another major project for Vectorform involved the 2008 election where President Barack Obama faced off against John McCain.  Vectorform worked with MSNBC to create virtual charts of aggregated electoral votes used on air by anchor Chuck Todd.

Vectorform was able to take this campaign from concept to final product in 3 weeks.  Vectorform has a passion for creating great products and this is what keeps the company growing.

Parallel and Concurrent Programming in Haskell

As one of the developers of the Glasgow Haskell Compiler (GHC) for almost 15 years, I have seen Haskell grow from a niche research language into a rich and thriving ecosystem. I spent a lot of that time working on GHC’s support for parallelism and concurrency. One of the first things I did to GHC in 1997 was to rewrite its runtime system, and a key decision we made at that time was to build concurrency right into the core of the system rather than making it an optional extra or an add-on library. I like to think this decision was founded upon shrewd foresight, but in reality it had as much to do with the fact that we found a way to reduce the overhead of concurrency to near zero (previously it had been on the order of 2%; we’ve always been performance-obsessed). Nevertheless, having concurrency be non-optional meant that it was always a first-class part of the implementation, and I’m sure that this decision was instrumental in bringing about GHC’s solid and lightning-fast concurrency support.

Haskell has a long tradition of being associated with parallelism. To name just a few of the projects, there was the pH variant of Haskell derived from the Id language, which was designed for parallelism, the GUM system for running parallel Haskell programs on multiple machines in a cluster, and the GRiP system: a complete computer architecture designed for running parallel functional programs. All of these happened well before the current multicore revolution, and the problem was that this was the time when Moore’s law was still giving us ever-faster computers. Parallelism was difficult to achieve, and didn’t seem worth the effort when ordinary computers were getting exponentially faster.

Around 2004, we decided to build a parallel implementation of the GHC runtime system for running on shared memory multiprocessors, something that had not been done before. This was just before the multicore revolution. Multiprocessor machines were fairly common, but multicores were still around the corner. Again, I’d like to think the decision to tackle parallelism at this point was enlightened foresight, but it had more to do with the fact that building a shared-memory parallel implementation was an interesting research problem and sounded like fun. Haskell’s purity was essential—it meant that we could avoid some of the overheads of locking in the runtime system and garbage collector, which in turn meant that we could reduce the overhead of using parallelism to a low-single-digit percentage. Nevertheless, it took more research, a rewrite of the scheduler, and a new parallel garbage collector before the implementation was really usable and able to speed up a wide range of programs. The paper I presented at the International Conference on Functional Programming (ICFP) in 2009 marked the turning point from an interesting prototype into a usable tool.

All of this research and implementation was great fun, but good-quality resources for teaching programmers how to use parallelism and concurrency in Haskell were conspicuously absent. Over the last couple of years, I was fortunate to have had the opportunity to teach two summer school courses on parallel and concurrent programming in Haskell: one at the Central European Functional Programming (CEFP) 2011 summer school in Budapest, and the other the CEA/EDF/INRIA 2012 Summer School at Cadarache in the south of France. In preparing the materials for these courses, I had an excuse to write some in-depth tutorial matter for the first time, and to start collecting good illustrative examples. After the 2012 summer school I had about 100 pages of tutorial, and thanks to prodding from one or two people (see the Acknowledgments), I decided to turn it into a book. At the time, I thought I was about 50% done, but in fact it was probably closer to 25%. There’s a lot to say! I hope you enjoy the results.

Audience

You will need a working knowledge of Haskell, which is not covered in this book. For that, a good place to start is an introductory book such as Real World Haskell (O’Reilly), Programming in Haskell (Cambridge University Press), Learn You a Haskell for Great Good! (No Starch Press), or Haskell: The Craft of Functional Programming (Addison-Wesley).

How to Read This Book

The main goal of the book is to get you programming competently with Parallel and Concurrent Haskell. However, as you probably know by now, learning about programming is not something you can do by reading a book alone. This is why the book is deliberately practical: There are lots of examples that you can run, play with, and extend. Some of the chapters have suggestions for exercises you can try out to get familiar with the topics covered in that chapter, and I strongly recommend that you either try a few of these, or code up some of your own ideas.

As we explore the topics in the book, I won’t shy away from pointing out pitfalls and parts of the system that aren’t perfect. Haskell has been evolving for over 20 years but is moving faster today than at any point in the past. So we’ll encounter inconsistencies and parts that are less polished than others. Some of the topics covered by the book are very recent developments: Chapters 4, 5, 6, and pass:[14 cover frameworks that were developed in the last few years.

The book consists of two mostly independent parts: Part I and Part II. You should feel free to start with either part, or to flip between them (i.e., read them concurrently!). There is only one dependency between the two parts: Chapter 13 will make more sense if you have read Part I first, and in particular before reading “The ParIO monad”, you should have read Chapter 4.

While the two parts are mostly independent from each other, the chapters should be read sequentially within each part. This isn’t a reference book; it contains running examples and themes that are developed across multiple chapters.

Hackers use Dropbox, WordPress to spread malware

The Chinese cyberspies behind the widely publicized espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks.

The gang, known in security circles as the DNSCalc gang, has been using the Dropbox file-sharing service for roughly the last 12 months as a mechanism for spreading malware, said Rich Barger, chief intelligence officer for Cyber Squared. While the tactic is not unique, it remains under the radar of most companies.

“I wouldn’t say it’s new,” Barger said on Thursday. “It’s just something that folks aren’t really looking at or paying attention to.”

The gang is among 20 Chinese groups identified this year by security firm Mandiant thatlaunch cyberattacks against specific targets to steal information. In this case, the DNSCalc gang was going after intelligence on individuals or governments connected to the Association of Southeast Asian Nations. ASEAN is a non-governmental group that represents the economic interests of ten Southeast Asian countries.

The attackers did not exploit any vulnerabilities in Dropbox or WordPress. Instead, they opened up accounts and used the services as their infrastructure.

The gang uploaded on Dropbox a .ZIP file disguised as belonging to the U.S.-ASEAN Business Council. Messages were then sent to people or agencies that would be interested in the draft of a Council policy paper. The paper, contained in the file, was legitimate, Barger said.

When a recipient unzipped the file, they saw another one that read, “2013 US-ASEAN Business Council Statement of Priorities in the US-ASEAN Commercial Relationship Policy Paper.scr.” Clicking on the file would launch a PDF of the document, while the malware opened a backdoor to the host computer in the background.

Once the door was open, the malware would reach out to a WordPress blog created by the attackers. The blog contained the IP address and port number of a command and control server that the malware would contact to download additional software.

Dropbox is a desirable launchpad for attacks because employees of many companies use the service. “People trust Dropbox,” Barger said.

For companies that have the service on its whitelist, malware moving from Dropbox won’t be detected by a company’s intrusion prevention systems. Also, communications to a WordPress blog would likely go undetected, since it would not be unusual behavior for any employee with access to the Internet.

In general, no single technology can prevent such an attack. “There’s no silver bullet here,” Barger said.

The best prevention is for security pros to share information when their companies are targeted, so others can draw up their own defense, he said.

In The New York Times attack, the hackers penetrated the newspaper’s systems in September 2012 and worked undercover for four months before they were detected.

The attack coincided with an investigative piece the newspaper published on business dealings that reaped several billion dollars for the relatives of Wen Jiabao, China’s prime minister.

Tablet Tabulet Tabz Voice

One of the local players present Tabulet one variant tablet at an affordable price. Tabulet Tabz Voice offers its flagship feature supports high definition multimedia content and also provides GSM slot that can be used to make phone calls and SMS. By using a battery capacity of 3000mAh, the device is claimed to last longer: 7 to 8 days in standby mode.

u2-436-TabuletDengan adds Voice name, this device is indeed favor the communication features via phone and SMS. All are able to run smoothly without any obstacles, it’s just a network that supports only a 2.75 G which is less convenient if you want to use it for internet connection. The solution, Voice Tabz support the use of USB modem via USB OTG cable.

Using unibodi design, no casing that must be removed. You just insert your SIM card if you want to use it for communication via phone / SMS. However, this function does not support hot swap. If you directly install the SIM card without turning off the tablet, the SIM card is not immediately detectable. You can do the first restart to activate it.

Tabulet Tabz Voice has front and rear cameras, and you can use the front camera for video calls. However, this function can be done using third party applications such as Skype. Rear camera with 2 megapixel resolution to produce images that are optimal in conditions outside the brightly lit room, in addition to the results look less blurry and the colors are natural. You can also use it to record video with VGA resolution.

To run high-definition video, which has included supporting applications Super HD-Player. Video codec and format support diverse, ranging from RM / RMVB, AVI, MKV, MOV, DAT, FLV, H.264 to be directly executed here. So if you have a video file and move it to this tablet, can be directly executed without the need to convert it first. Output sound through the internal speakers produce a sound that is quite loud, but it just is mono only. If you want to produce stereo sound, can use headphones.

The default application is fairly small but has included three exciting games are Angry Birds, Fruit Ninja, and Temple Run. To support your activities, of course stay put himself through Google Play.

One interesting alternative to the tablet at an affordable price offered by Tabz Tabulet Voice. His ability to make phone calls and SMS as well as running high definition video to excellence that is rarely found in the price range of millions.

Software for Smooth Action Plow Car Found

New York – Hacking a car is not a new field, but the secret of ‘success’ steal grounded sophisticated control of the car during the closed meeting. recently, two peratas successfully decode software commonly used among others by car thieves to disable siatem safety and escape easily incarannya car.

Charlie Miller and Chris Valasek, the two hackers, said they would publish details of engineering blueprint to attack the security system in the Toyota Prius and Ford Escape. This 100-page findings compiled after several months of research they conducted with a grant from the U.S. government Sserikat.

Two “white hats” – the nickname for hackers who try to uncover software vulnerabilities before criminals can exploit them – also will release software that they built for hacking a car in a hacker convention in Las Vegas this week.

They say they found a way to force Toyota Prius brake suddenly at a speed of 80 miles per hour, determine the direction of the steering wheel, to speed up the machine. They also say that they can disable the brakes of the Ford Escape at very slow speeds, so the car continued to move no matter how hard the driver depresses the pedal.

Both men said they hope the data they publish will encourage other white hat hackers to uncover security flaws more advanced automotive products that can be fixed.

“I believe the 100 eyes of security researchers more powerful than the eyes that are in Ford and Toyota,” said Miller, a well-known security expert who was formerly known Twitter reveals burglary of Apple Inc. App Store.

Toyota Motor Corp. spokesman John Hanson said the company is reviewing its security systems car after referring to their findings. He said the automaker to invest in electronic security, although they acknowledge hackers continue to find loopholes.

“It is impossible to do,” said Hanson, referring to the newly exposed hacking. “Certainly we take it seriously.”

Being a spokesman for Ford Motor Co., Craig Daitch, said the company considers the vehicle electronic security seriously. But he guarantees that the product is now in the hands of consumers is equipped with adequate safeguards.

Google Maps for iPad Launched

Jakarta – After a week after Google Maps launched for Android users, the information technology company is now re-presenting feature map for iPad users. Google Maps 2.0 can be enjoyed globally since Tuesday, July 16, 2013.
Features that are designed for use with the device’s larger screen choose the look with clearer images and soft colors.
Just like the Android version, iOS-based applications include traffic information in real time. Google Maps 2.0 comes with Foursquare and navigation that includes information about a variety of places, including restaurants and shopping centers.
This application actually has not been downloaded from the App Store could in their home country, the United States. Yet it can be downloaded for users in Asia.
Google Maps before, they can be enjoyed by users of smart phones iPhone. Launch the application updates to follow up on complaints that come from iPhone users, especially iPhone 5 to Apple Maps. Users complained about the lack of accuracy especially on Apple Maps. Apple Management then apologized in writing to the users of the iPhone and iPad.
Service on the map offers features traffic information, navigation, transit directions, satellite, road, indoor photos, restaurant reviews, and the integration of the Google profile. Unlike other Google apps made​​, this map is a special feature produced for the default operating system iOS. The application advantages are speed and small file size so it does not take much memory.

Google Nexus 7 Generation 2, Pack Full HD Screen And Processor Quad-Cor

Last year, many manufacturers began to play with the seven-inch tablet and the price competition is getting fierce. Google hit the market with the launch of the first Nexus tablet, named Nexus 7. Now, the biggest search engine in the world announced the second generation of its flagship tablet. Changes in what is offered?

Nexus 7 2 7 Generation Google Nexus 2, Pack Full HD Screen And Processor Quad Core tablet pc computer news
Still manufactured by ASUS and uses soft touch material on the back side, second-generation Nexus 7 carries a smaller design. Although the screen size remains the same, the Nexus 7 II appear slimmer and lighter. Compared to previous Nexus 7, bezel or frame is now thinner 2.8 mm, 1.8 mm thinner body and lighter weight 50 grams. To display sector, the resolution increased to 1920 × 1200 pixels with a density of 323 ppi or 50% denser than the predecessor model.

Also a significant increase in performance. The second-generation Nexus 7 processor quad-core Krait Snapdragon S4 Pro with 1.5 GHz speed, capacity is doubled to 2GB RAM, and Adreno 320 graphics cards. Unlike the previous model, this time carrying the Nexus 7 rear 5MP resolution camera that can record 1080p video and 1.2 MP sensor on the front of the camera.

This time Google immediately offers two models of the Nexus 7, WiFi and 4G LTE. WiFi model comes in a choice of 16GB capacity priced at $ 230 and 32GB at U.S. $ 270, while the 4G LTE models are only offered with capacities of 32GB and priced at U.S. $ 350. Google plans to start marketing its new seven-inch tablet on July 30. Hopefully not too late to Indonesia as the first generation of Nexus 7 newly announced into Indonesia after a year.