Posts

Samsung SDS unveils Brightics AI analytics platform

Image
Samsung SDS has unveiled its AI-based analytics platform Brightics AI aimed at the enterprise market Samsung SDS has unveiled its artificial intelligence (AI)-based analytics platform called Brightics AI, which is aimed at the global enterprise market. Brightics AI automates data analytics modeling, allowing for easy processing and analysis of big data for clients, the company said. Samsung said processing big data conventionally takes two experts up to three months to create and apply an analytics model. By comparison, Brightics AI will complete this process within two hours by automatically suggesting the best analytics algorithm. Collecting, analysing, and visualising data, which takes conventional counterparts three hours, only takes 10 minutes. The platform also has a "prescriptive" algorithm based on AI technology that offers solutions for problems faced by clients, the company said. The company said it has been testing the platform on 70 different busi

Workers in China detained for selling Apple user information

Image
Local police in China announced this week that they have uncovered an underground operation which has illegally traded Apple user data for profit. Police in Zhengjiang -- a wealthy Chinese province adjacent to Shanghai -- has recently cracked down on an underground network which has obtained personal information associated with iPhone accounts and traded them for huge profits. Twenty-two suspects, who were spread across several Chinese provinces including Guangdong, Jiangsu and Fujian, have been detained for suspicion of obtaining computer information and invading citizen's personal information, according to a Wednesday  Sohu news report . These suspects have reportedly used Apple's internal system to obtain user information connected with iPhone accounts -- including telephone numbers, names, as well as Apple ID information. This information has been resold for 10 yuan (US$1.50) to 180 yuan per item and total income in the case has exceeded 50 million yuan, it is

OneLogin security chief reveals new details of data breach

Image
Two breaches in as many years. Is the trust gone? Alvaro Hoyos, the company's chief information security officer, answered key questions. A week after OneLogin disclosed it had been hacked, the company's security chief has said that thousands of its customers may have been affected -- but admitted that it still has a lot to learn about how it was breached. The company has spent the past week investigating how it was breached. OneLogin is similar to a password manager, but also manages the identities and login information of enterprise and corporate users -- from hospitals, law firms, financial giants, and even newsrooms. OneLogin acts as a central sign-in point to allow its customers -- which includes millions of staff and end users -- to access their accounts on other popular sites and services, like Microsoft and Google accounts. At the end of last month, the company announced news that nobody wants to hear.An attacker obtained and used highly-sensitive keys for

Union blames Indian IT for British Airways systems collapse, but CEO points to power surge

Image
British Airways' CEO has blamed a local power supply issue rather than outsourcing tech to TCS, which should be a big relief for Indian IT. If Indian IT isn't already embattled by President Donald Trump's war against H-1B visas and a surge in automation that is threatening domestic jobs, another problem reared its head over the weekend that threatened to tarnish the industry further: An accusation that Indian IT companies were responsible for the devastating outage suffered by British Airways over the weekend. As you probably know by now, British Airways experienced a major global computer failure that severely disrupted the airline's IT systems and caused thousands of passengers to be stranded at both London's Heathrow and Gatwick airports due to cancelled flights. The crash affected BA's booking system, baggage handling, mobile phone apps, and check-in desks, affecting more than 1,000 flights and causing mayhem across the two airports. So what actual

Twitter flaw allowed you to tweet from any account

Image
All this time, a rather simple Twitter bug could have caused chaos on the platform. A Twitter security flaw which went undetected for years allowed attackers to post messages masquerading as any user they chose. A security researcher that goes under the moniker Kedrisch  disclosed the flaw  on Tuesday, which was present on the microblogging platform until 28 February this year. Discovered in  Twitter Ads Studio , a platform for advertisers to upload media and content, the high-severity bug appeared in the service library where users can review media before publishing. When handling media and tweet publishing requests, by sharing this media with an intended victim and then modifying the post request with the victim's account ID, the media in question would be automatically posted from the victim's account rather than the attacker's. As only the parameters of the code needed to be tweaked, there was no need to have any account credentials belonging to the vi

Network slicing the next step to automated telecom networks: Nokia

Image
Following virtualisation, network slicing is the next step towards automated and programmable networks and 5G, Nokia has said, with an upgrade to optical transmission key to this. Network operators will go through a staged process of network virtualisation, slicing, and automation in the years towards 5G, Nokia has said, with an emphasis on upgrading optical transmission networks key to this. According to managing director of Nokia Oceania Ray Owen and Global VP of Nokia Optics Sam Bucci, Nokia is one of only two companies in the world that can offer an end-to-end solution across the whole network for this journey towards 5G -- which begins with the optical transmission backbone. "What we're seeing today is the need to do a massive infrastructure renewal, which is in the backbone of that network,". "The investment for 5G for us in Australia has started already, and it's mainly in this optical transport networking area ... behind every wireless netwo

Microsoft releases emergency patch for 'crazy bad' Windows zero-day bug

Image
The vulnerability has been dubbed the worst Windows remote code execution flaw in recent memory. Microsoft has released a patch rapidly developed to combat a severe zero-day vulnerability discovered only days ago. Late Monday, the Redmond giant issued a security advisory for  CVE-2017-0290 , a remote code execution flaw impacting the Windows operating system.The security vulnerability was disclosed over the weekend by Google Project Zero security experts Natalie Silvanovich and Tavis Ormandy. On Twitter , prominent vulnerability hunter Ormandy revealed the existence of a zero-day flaw in Microsoft Malware Protection Engine (MsMpEng), used by Windows Defender and other security products. The researcher deemed the find a "crazy bad" bug which may be "the worst Windows remote code exec [execution flaw] in recent memory." Ormandy did not reveal anything else at the time, to give Microsoft time to fix the scripting engine memory corruption vulnerability aft

Intel AMT vulnerability hits business chips from 2008 onwards

Image
Silicon giant releases new firmware to patch holes in separate management processor. Intel has  announced  its Active Management Technology (AMT), Standard Manageability (ISM), and Small Business Technology (SBT) firmware has been vulnerable to a pair of privilege escalation issues that could allow an attacker to remotely take control of a machine. The first, found on AMT and ISM units could allow a remote unprivileged attacker to "gain system privileges to provisioned [chips]," Intel said. The second would allow a local attacker to gain "unprivileged network or local system privileges" on chips with AMT, ISM, and SBT. Chips from Intel's 2008-released Nehalem architecture onwards are impacted by the vulnerabilities if they run manageability firmware between versions 6 and 11.6. "Intel highly recommends that the first step in all mitigation paths is to unprovision the Intel manageability SKU to address the network privilege escalation vulnerabili

FalseGuide malware victim count jumps to 2 million androiders

Image
With five additional apps found containing FalseGuide, Check Point has estimated 2 million Android users have unknowingly downloaded malware. An estimated 2 million Android users have now fallen victim to malware mistakenly downloaded from Google Play, which was initially reported to have affected approximately 600,000 users. The malware, dubbed FalseGuide, was hidden in more than 40 guide apps for games, the oldest of which was uploaded to Google Play as early as November last year, security researchers from  Check Point said . "Since April 24, when the article below was first published, Check Point researchers learned that the FalseGuide attack is far more extensive than originally understood," Check Point said. "The apps were uploaded to the app store as early as November 2016, meaning they hid successfully for five months, accumulating an astounding number of downloads." The security firm said it found five additional apps containing the malware

Microsoft is testing new battery-saving technology for the Windows 10 machines(Redstone 3)

Image
Microsoft is working to add a new battery-saving feature to Windows 10 'Redstone 3', and it has begun testing it on machines with Intel sixth-generation and beyond Core processors. Microsoft rolled out its second "Redstone 3" test build for PCs on April 14. On April 18, officials went public with one of the under-the-cover features in that build:  Power Throttling . Microsoft officials first talked up intentions to provide this kind of battery-saving feature in January, when the company was testing the Windows 10 Creators Update. In Build 15002 of the Creators Update. Microsoft officials said they were experimenting with power throttling with some, but not all, testers. In early experiments, Microsoft executives said Power Throttling showed up to an 11-percent savings in CPU power consumption for "some of the most strenuous cases."Power Throttling (a temporary, not final, name for this feature) is in the Insider Preview build 16176 for Fast Ring PC t