Schlagzeilen |
Sonntag, 07. Juli 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

Unic realisierte die neuen Online-Präsenzen der Berner Kantonalbank (BEKB). Die Sites sollen die Kantonalbank bei der Akquisition und Bindung von Kunden unterstützen und den Direktvertrieb stärken, heisst es in einer Aussendung dazu. Die Webplattformen sind auch via Smartphone und Tablet verfügbar.

Der US-Geheimdienst NSA hat nach einem Bericht der in Rio de Janeiro erscheinenden Zeitung „O Globo" im grossen Stil auch brasilianische Bürger ausgespäht. Millionen von E-Mails und Telefongesprächen seien angezapft worden, heisst es in einem Artikel, den der Guardian-Enthüller Glenn Greenwald gemeinsam mit Reportern von „O Globo" verfasste.

Der Spionageskandal rund um den US-Geheimdienst NSA schlägt nun auch in Deutschland hohe Wellen. Wie der NSA- Aufdecker Edward Snowden in einem Interview mit dem Nachrichtenmagazin „Der Spiegel“ angab, sei die Zusammenarbeit zwischen dem US-Geheimdienst und dem Deutschen Bundesnachrichtendienst (BND) deutlich enger als bisher bekannt.

Google gerät aufgrund seiner mit März 2012 eingeführten Datenschutzbestimmungen europaweit immer stärker unter Druck. Das britische Information Commissioner's Office (ICO) übt scharfe Kritik unter anderem in Sachen Transparenz und droht mit rechtlichen Schritten, wenn der Konzern nicht nachbessert.

Dem österreichischen Bundespräsidenten Heinz Fischer zufolge ist das Flugzeug von Boliviens Präsident Morales bei dessen Zwischenlandung in Wien nicht „im kriminaltechnischen Sinne“ durchsucht worden. Dazu habe es völkerrechtlich kein Anlass gegeben, so Fischer im „Kurier“.

Der weltgrösste IT-Hersteller Hewlett-Packard (HP) hat neue Lösungen angekündigt, mit denen sich die Inbetriebnahme von SAP-Anwendungen beschleunigen lässt. Mit den neuen Lösungen sollen Unternehmen die nötige Flexibilität und Auswahl erhalten, um fundierte Entscheidungen schneller treffen zu können, heisst es in einer Aussendung dazu.

Nicht nur Venezuela und Nicaragua haben zuletzt ihre Bereitschaft bekundet, dem flüchtigen ehemaligen Geheimdienstmitarbeiter Edward Snowden Asyl zu gewähren - ein entsprechendes Angebot ist nun auch aus Bolivien gekommen. Evo Morales sorgte diese Woche mit einem Zwangsstopp in Wien in der Causa Snowden bereits für Schlagzeilen.

Der nach SAP zweitgrösste deutsche Softwarekonzern Software AG hat zur Umschuldung und zur Finanzierung weiterer Übernahmen bei deutschen und internationalen Banken 300 Mio. Euro über eine Schuldschein-Platzierung eingesammelt. Wegen guter Nachfrage sei die ursprünglich mit 150 Mio. Euro veranschlagte Darlehenshöhe verdoppelt worden, teilte das Darmstädter Unternehmen mit.

Nachdem die Ratingagentur Standard & Poor's das Rating des finnischen Smartphone-Herstellers und auch des Telekommunikationsausrüsters Nokia herunter gestuft hat, versuchen sich die Finnen dagegen zu wehren.

Der japanische Kommunikationskonzern Softbank ist bei der angestrebten Übernahme des drittgrössten US-Mobilfunkanbieters Sprint Nextel am Ziel. Als letzte Behörde genehmigte am Freitag der US-Netzregulierer FCC den Kauf.

The chances are pretty good that you have a or you've been asked by friends, family, or co-workers to help install one in their home. While we're sure that you've never made a mistake during these setups, advances in home networking equipment (new configurations, wireless standards, and so on) have also introduced some new complexities that could confuse non-IT customers who don't live, eat and breathe this stuff every day. For most people, connecting to the home network is a set-and-forget scenario. This causes potential problems once something bad happens—like the freak thunderstorm that knocks out power, and you get the phone call asking for help again (our first tip: connect the router to an uninterruptible power supply). We've asked a bunch of home networking companies and other experts to provide us with a bunch of scenarios where they're seeing a majority of customer service requests, along with how you can quickly fix these "mistakes." We've ordered the list from the mistakes made at the beginning of the setup process, to mistakes made during configuration and post-network setup.

Apple has begun expanding its iWork for iCloud beta, inviting developers free accounts to start testing the in-browser versions of Apple’s Pages, Keynote and Numbers applications. Apple first at its Worldwide Developers Conference in June. The company then began inviting registered developers to try out the beta of the new service. reports that Apple has been sending out beta invites for iWork for iCloud on a rolling basis since WWDC, now to both paid and free developer accounts. On July 3, it is believed that Apple sent out a large batch of invitations to get more people to participate in the beta testing process. Some reports had suggested that non-developers have been invited to test the beta, but Apple told The Next Web that .

There is no debate in the security community that the nation needs to from cyberattacks. But not everybody agrees that all infrastructure sectors are equally critical. According to the most recent Presidential Policy Directive on cyber security, the U.S. has 16 critical infrastructure (CI) sectors, ranging from transportation to energy, food, water, financial services, and others. But Mark Sparkman, a former CIA officer and now a senior international affairs analyst with the RAND Corporation, argued in a recent post on CNN that "cyber Armageddon" scenarios focused on physical infrastructure are overblown. Major sections of the U.S., he noted, have gone without electricity and water for days or weeks following natural disasters, and life has returned to normal. However, that, he said, would not be the case with finance.

Countries with a coordinated national strategy for rolling out broadband are making significantly faster progress than those taking a more laissez-faire approach to broadband development, according to a new report. The research, conducted by the International Telecommunication Union (ITU), together with the Broadband Commission for Digital Development and Cisco, indicates that countries with a national broadband plan have fixed broadband penetration some 8.7 percent higher on average than countries without plans. Once the potential impact of factors like higher average income per capita, market concentration, and urbanization are discounted, countries with plans benefit from fixed broadband penetration on average 2.5 percent higher than countries without plans, according to the report. In mobile, the impact is almost as significant. Countries with national broadband plans have some 7.4 percent higher on average than countries without plans.

Microsoft today said it had received "a few submissions" so far for its Internet Explorer 11 (IE11) bug bounty program, the first for the company. . and kicked off June 26, with a limited-time run until July 26. During the month-long program, Microsoft will pay researchers up to $11,000 for each IE11 vulnerability they find and report. , the upgrade for Windows 8 and Windows RT, that does not yet have a definitive launch date. Microsoft has said it will ship Windows 8.1 this fall.

Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims' inboxes, according to a report released last week by a cloud security provider. The technique, called Distributed Spam Distraction (DSD), began appearing early this year, in its Global Threat & Spamscape Report for the first half of 2013. "This technique is highly targeted towards a specific individual, and is difficult to block in its entirety," the report said. "It's also difficult to understand if you have no idea what is happening." may last from 12 to 24 hours, and inundate an inbox with as many as 60,000 messages, according to AppRiver's research. The purpose of the assault is to prevent a target from reading their legitimate email.

A one-of-a-kind solar-powered aircraft completed a two-month journey across the United States at just after 11 p.m. EDT Saturday evening (3 a.m. GMT Sunday) when it landed at New York's JFK Airport. The landing came several hours earlier than planned because of a tear that developed Saturday afternoon in the delicate wing of the aircraft. The tear didn't put the craft in immediate danger, but did prompt the flight crew to curtail the flight originally scheduled to end at 2 a.m. local time on Sunday. The early landing closed a runway at JFK, causing delays to some outgoing commercial flights, and also meant pilot André Borschberg didn't get to achieve his wish to fly around the Statue of Liberty in the plane. Solar Impulse has the wingspan of a jumbo jet but weighs about the same as a family car. Coated with solar panels, the Swiss plane can theoretically stay aloft indefinitely, but its 35 mile per hour cruising speed means the entire trip would take many days to complete. So, to give the pilot a break, the aircraft flew in six stages, taking off in the early morning and landing late at night. It at dawn on May 3 when it soared into the sky above Silicon Valley from Moffett Field in Mountain View, California. From there, it flew to Phoenix, Dallas, St. Louis, and Washington, D.C., where it departed early Saturday morning.

Thanks to , we know that the National Security Agency is listening. But what if we spoke in a language we could understand but they couldn’t? What if we wrote in a typeface we could read but would look like gibberish to the NSA’s massive supercomputers? That’s the puzzle Sang Mun set out to solve. During his two years in the Sourth Korean military, Mun worked as a contractor for the NSA, extracting information from intelligence intercepts. He’s also a graduate of the Rhode Island School of Design. So Mung designed a typeface that can be deciphered by humans, but not by the optical character recognition software employed by spy agencies to rapidly scan billions of documents as they fly across the InterWebs. The typeface, called , inserts artifacts and extraneous bits of information that our brains can easily filter out, but machines can’t (at least, not yet). Some versions of ZXX can be scanned by OCR, some can’t. For example, the text at the top of the graphic at the left is composed in ZXX Combination and not computer readable. The text immediately below is written in ZXX Bold, which can be read by machines and humans alike.

The underground economy that sells fake Twitter and other social media accounts is now so large that is it easily making millions of dollars for the leading abusers, an updated study by Barracuda Networks has found. The firm has made a speciality of researching the burgeoning economy that now creates and markets a number of different fake social media accounts, including Facebook, Instagram, Pinterest, LinkedIn, YouTube, and even the much-ignored Google+, but it is Twitter that is now the core of this industry. As with the established click-fraud scams, the con is made interesting by the huge currency the Internet places on followers, fans, connections, and views, all of which now have a price attached to them. For its from a number of sources before analysing who was selling (the dealers) and buying (the abusers), and the special fake accounts through which the market sells its wares.

Microsoft's monthly patch release for July will cover seven security issues, six of which could be remotely exploited by an attacker. The company publishes an advisory in advance of its patch date, which is the second Tuesday of the month, so administrators knows what products will be affected. It does not describe the vulnerabilities, however, until the security fixes are released. The are in the Windows OS, .NET Framework, Silverlight, Office, Visual Studio, Lync, and Internet Explorer (IE). A seventh bulletin, ranked as "important," affects Microsoft's Windows Defender security software. The most important bulletin addresses IE, Wolfgang Kandek, CTO for Qualys. It affects IE versions six through 10 on Windows XP, Vista, 7, 8, Server 2003, Server 2008, and RT.

Lockheed Martin, BT, and BAE Systems are among a group of defense and security companies that have pledged to support the U.K. government in bolstering the security of the country against sophisticated cyber attacks. By pooling their experience of operating under the so-called Defense Cyber Protection Partnership (DCPP) says the alliance will identify and implement actions that have a real impact on the cyber defenses of the members of the partnership and the U.K. defense sector as a whole. The DCPP model is intended to lead the way in industry collaboration and action on cyber security and to act as a template which can then be followed by commercial sectors to improve resilience across U.K. industry. "I'm absolutely delighted by the level of commitment shown by the participating companies in helping us to build our national resilience against cyber attack, and I look forward to more of our key contractors coming on board," said Minister for Defense Equipment, Support and Technology Philip Dunne.

Venezuela's president Nicolas Maduro has offered to give asylum to Edward Snowden, the former contractor of the National Security Agency who about the agency's surveillance programs. Maduro said in a on Friday that his country would give "humanitarian asylum." Neighboring Nicaragua has also said it is considering offering Snowden asylum if circumstances permit, according to . But there are questions as to how he will get to Venezuela. Earlier this week, a plane carrying Evo Morales, president of Bolivia, was denied permission to enter airspace over some European countries as it was returning to Bolivia from Moscow. The countries had apparently been informed that Snowden was on board and their refusal to handle the aircraft sparked protests in Bolivia and the strong complaints from the Bolivian government.

The founder of an eavesdropping-resistant instant messaging application called Cryptocat has apologized over a now-fixed bug that made some types of messages more vulnerable to snooping. which runs inside a web browser, is an open-source application intended to provide users with a high degree of security by using encryption to scramble messages. But Cryptocat warns that users should still be very cautious with communications and not to trust their life with the application. The vulnerability, found by Steve Thomas, affected group chats and not private conversations, said Nadim Kobeissi, in an interview from Germany Friday. The encryption keys used to encode those conversations were too short, which in theory made it easier for an attacker to decrypt and read conversations. The error was the result of an oversight spotted by Thomas, Kobeissi said. The encrypted conversations were still carried over SSL (Secure Sockets Layers), another overlay of encryption. But if an attacker broke the SSL encryption and had the underlying encrypted chats, "it would be significantly easier to crack" using brute-force techniques, he said.

A court in Pakistan has ordered a continuation of the block on YouTube in the country, after the government argued that a removal of the ban would have implications on law and order in the country. YouTube was over a controversial video clip, called "Innocence of Muslims," which mocked Prophet Muhammad. The country's telecom regulator said it was blocking the entire site as it was not able to separately block individual URLs (uniform resource locators) linking to copies of the video. The plaintiff, Bytes For All, Pakistan, has argued that the PTA has Internet filtering technology that is already used to selectively filter Internet content, said Shahzad Ahmad, country director, of the civil rights group on Friday. A report released in June by Citizen Lab, based at the Munk School of Global Affairs at the University of Toronto, , for example, that Pakistan is actively filtering content, with Netsweeper filtering devices actively used to censor content on an ISP-wide level in Pakistan. Bytes for All had asked the court for an interim order unblocking YouTube. "We wanted the government to go ahead and block the 700 to 800 URLs with the blasphemous content, and remove the block on the rest of the site," Ahmad said. He alleged that the government is intent on continuing to block YouTube as part of its overall plan to control Internet access in the country. The YouTube issue is part of a broader petition by Bytes For All against Internet censorship in the country.

Several members of the Icelandic Parliament introduced a bill Thursday that seeks to grant Icelandic citizenship to U.S. National Security Agency document leaker Edward Snowden, but the bill won't be discussed until September. On Thursday, Snowden formally filed a request for citizenship to the Icelandic Parliament, according to Birgitta Jónsdóttir, member of the Icelandic Parliament for the Icelandic Pirate Party. Snowden, who almost two weeks ago. With assistance from a legal advisor to WikiLeaks, Snowden has from more than 20 countries, including Iceland, but none of the requests have been granted so far. Some countries have already rejected the requests on different grounds, including the fact that their laws require asylum requests to be made on their soil.

A European Union team will arrive in Washington, D.C. on Monday to assess how the U.S. is using data it receives from the E.U. As part of a scheduled review, experts from the European Commission's home affairs department will conduct an examination of the Passenger Name Record (PNR) deal and the Terrorist Finance Tracking Programme (TFTP). The European Parliament gave its consent Thursday to the possibility of suspending the two data-sharing deals following allegations that the U.S. National Security Agency (NSA) bugged E.U. offices in New York and Washington. The NSA's activities have come under the spotlight following of telecommunications metadata and its Prism program to collect data from a broad range of Internet services. Parliament's resolution, which was approved by 483 votes to 98 with 65 abstentions, said that the European Commission, the Council of Ministers, and E.U. member states should consider "all levers at their disposal" in negotiations with the U.S., including suspending the current PNR and TFTP arrangements.

The U.K. Information Commissioners Office has ordered Google to change the privacy policy it to make it more informative for users. If Google does not change its policy to comply with the U.K. Data Protection Act by September 20, it could face formal enforcement action, the ICO said in on Thursday. ICO can issue monetary penalties of up to $752,000 for serious breaches of the Data Protection Act. ICO has written to Google warning that its privacy policy raises serious questions about its compliance with U.K. data regulation. "In particular, we believe that the updated policy does not provide sufficient information to enable U.K. users of Google's services to understand how their data will be used across all of the company's products," the ICO said.

A privacy debate has erupted in Japan over a new service from a major rail operator that sells private e-ticket records as marketing data. This week East Japan Railway (JR East), the country's largest rail company, has begun offering for sale the anonymized histories of millions of its passengers. The data is gleaned from its Suica train pass system, which is Japan's most popular with 43 million users, roughly equivalent to a third of the national population. JR East and Hitachi, which will handle the technical aspects of the service, announced it last week via a terse news release that initially drew little attention. But this is the first time Suica information has been sold to third parties, and the news was soon highlighted by prominent bloggers, triggering a discussion that has now spread to Twitter and other online forums. "Even if there is a proper way to use this (data), it must be done with the approval of society," wrote Hiromitsu Takagi, a professor and prominent commentator on data privacy, on his Twitter account.

HTC's second quarter net profit plummeted 83 percent year on year as sales of the company's latest flagship handset failed to meet expectations. Revenue totaled $2.3 billion, down 22 percent. which went on to reach sales of 10 million units within a month of its launch in late April. to help create more brand visibility.

It’s scorching out. Any housework that needs doing is already done. And with the long weekend ahead, it’s time for a simple computing project. Here’s one: Install the Windows 8.1 preview. Last week, , the next iteration of its Windows 8 operating system. From a marketing standpoint, Windows 8.1 is a do-over, a bid to simplify and personalize an operating system that, quite frankly, turned off a lot of people. If you own Windows 8 and dislike it, we encourage you to follow along and consider giving Windows 8.1 a try. Not only does it have features designed to make Windows 8.1 a friendlier experience, but it has tons—yes, tons—of new features. Note that, eventually, Windows 8.1 will be available to you, for free, when the software is released to “general availability,” most likely this fall. What Microsoft released last week is a preview, and so it may contain a bug or two. If you have any critical apps or data, make sure that you have backup copies, or that your data is also stored within Microsoft’s SkyDrive. Though I haven’t encountered a single bug in Windows 8.1, there’s no guarantee that you’ll have the same experience. If you do run into problems, try visiting the (Have you already seen this message? According to Microsoft, your PC might be running a 32-bit Intel Atom chip that’s currently unsupported.)

Samsung Electronics predicted a big jump in profit for the second quarter compared to a year earlier, but the company's explosive growth is slowing amid signs its top end Galaxy smartphones are less popular than expected. Samsung said Friday that its operating profit for the April-June quarter will probably be between $8.1 billion and $8.3 billion. This is at least a 44 percent gain from what it generated during the same stretch in 2012, and Samsung said sales are also likely up around 20 percent. Those are strong gains, but analysts and investors had expected better. Bloomberg said a survey of 34 financial analysts predicted an average of $8.7 billion in earnings. A number of investment banks have cut their ratings on the Korean company in recent weeks, and its stock has fallen. The results correspond to the launch of and the company held a major launch event at New York City's Radio City Music Hall, with a live broadcast to people watching in nearby Times Square.

A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users' computers and demanding a fee of $300 to free their data. Researchers from Eset wrote that the is an extension of a long-running attack that compromises the infrastructure of web hosting companies with a variant of a malicious Apache module called "Darkleech." "Malicious modification of server binaries seems to be a very popular trend for malware distribution," wrote Sebastien Duquette, an Eset malware researcher, on a . Eset also suspects that hackers also may have figured out how to compromise , which are both software programs used by hosting companies to manage their networks and websites.

Cyber criminals could face tougher penalties across the European Union under new rules adopted by the European Parliament, which include the creation of a specific offense of using botnets. The draft directive adopted by the parliament on Thursday defines specific criminal offenses for and sets specific sanctions for each. It also requires E.U. countries to assist fellow member states and respond to urgent requests for help within eight hours in the event of a cyber attack. The text has already been informally agreed with member states, and that agreement is expected to be formalized shortly. The member states will the have two years to implement it in national law. Under the draft law, using botnets to establishing remote control over a significant number of computers by infecting them with malicious software carries a penalty of at least three years' imprisonment.

China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group. During the year, a total of 73,000 Trojan and botnet command-and-control servers had hijacked 14.2 million host machines in the country. The number of Trojan and botnet servers marks an almost 60 percent increase from 2011. Close to 13,000 of those servers were based in the U.S., the for the largest number of Trojan and botnet attacks targeting China. South Korea was second, followed by Germany. China's National Computer Network Emergency Response Technical Team (CNCERT) reported the figures on Thursday. They were later published by the nation's state press, Xinhua News Agency.

A German data protection authority has begun a formal action against Google over last year. The French privacy regulator announced a similar action last month. The Hamburg Commissioner for Data Protection and Freedom of Information announced Thursday that it will join other European privacy regulators in taking action against the company. The French National Commission on Computing and Liberty (CNIL) announced last month that to its complaints or face court action, after the company repeatedly rejected requests to reverse changes it made to its privacy policy in March 2012. Spain's privacy regulator too has notified Google of if Google does not comply with Spanish law.

The European Parliament gave European Commissioners and national ministers some extra ammunition Thursday in discussions with the U.S. following allegations about American spying and possible suspension of data-sharing agreements. The Parliament called on the U.S. to provide full disclosure of any and set up an inquiry to look into the allegations, but stopped short of suspending bilateral trade talks due to start on Monday. The resolution was approved by 483 votes to 98 with 65 abstentions. Members of the European Parliament (MEPs) said that the European Commission, the Council of Ministers and E.U. member states should consider "all levers at their disposal" in negotiations with the U.S., including suspending deals for sharing air passenger (Passenger Name Record) data and bank data (the Terrorist Finance Tracking Programme). The resolution also expresses grave concern that similar surveillance programs may be run by E.U. member states, including the U.K., Sweden, the Netherlands, Germany, and Poland. It calls on those countries to examine whether their programs are compatible with E.U. law.

The Internet held up in Egypt as the military deposed the country's president Wednesday, with both the former president's aides and the opposition using Twitter and Facebook extensively to communicate with followers in Egypt and the rest of the world. "Egypt remains online. So far no repeat of 2011," said Internet monitoring company Renesys in a late Wednesday. It said it was continuing to monitor. In January 2011, the government of former president Hosni Mubarak ordered service providers to in the wake of widespread unrest in the country. This time, Egyptians on both sides used social media services using hashtags like #WeAreWithMorsi and #EgyptRevolutionNotMilitaryCoup, as the military cut off many TV channels and news sources, according to reports.

We were using drive letters before DOS, and I'm surprised we're still using them. Everyone knows that C: is the main drive--or at least the one Windows boots from. (Why C:? Because A: and B: were originally reserved for floppies.) But not everyone knows that if you have an administrator-level account, you can reassign drive letters. Here's how to change a PC's drive letters: