Schlagzeilen |
Freitag, 25. Oktober 2013 00:00:00 Technik News
Aktualisiert: Vor 3 Min.
1|2|3|4|5  

Reto Fankhauser ist Senior Security Architect bei Elca Zürich. Im Interview erklärt er, welche falschen Annahmen ihm hinsichtlich der Risikobewertung häufig begegnen.

Ubisoft hat die Zürcher Niederlassung geschlossen. 16 Mitarbeiter sind davon betroffen. Grund sei die Einstellung eines kleinen Projektes.

Weltweit und auch in der Schweiz soll die Nachfrage nach Tablets massiv zunehmen. Verstärkt wird der Trend durch zahlreiche neue Geräte und sinkende Preise. Apples Dominanz im Tablet-Markt ist gebrochen.

Ende November findet in Bern der Software Contest 2013 statt. Lösungsanbieter wie Abacus, Vertec und Asseco werden in einem Live-Duell anhand eines vorgegebenen Drehbuchs Aufgaben lösen.

Hewlett-Packard (HP) wolle die meisten seiner WebOS-Patente verkaufen, haben Insider der Nachrichtenagentur Bloomberg verraten. Bestätigen will HP dies aber nicht.

Flash-Speicher-Hersteller Fusion-io strauchelt. Im ersten Quartal seines laufenden Geschäftsjahres hat das Unternehmen herbe Verluste hinnehmen müssen. Zudem kündigte Chief Financial Officer Dennis Wolf seinen Rücktritt an.

Dell hat nach Paris zum Technology Camp 2013 geladen: Neben Produzenten für die Band Linkin Park stand am Mittwoch auch CEO Michael Dell auf der Bühne.

Microsoft hat das Start-up Apiphany übernommen. Das Unternehmen entwickelt eine Technologie für das Management von Schnittstellen, die nun in der Microsoft-Cloud Azure eingesetzt werden soll.

Swisscom Broadcast hat eine Photovoltaikanlage in Niederhorn in Betrieb genommen. Um die Sonneneinstrahlung optimal zu nutzen, sei diese in einem Winkel von 55 Grad errichtet worden, so Swisscom.

Der Online-Shop von Elektro-Material ist überarbeitet worden. Die E-Commerce-Lösung für B2B ist von Hybris gemeinsam mit Avato Systems Schweiz implementiert worden.

Strong earnings news from Internet and IT vendors gave a boost to tech stocks Friday, with Microsoft shares touching a six-year high. The Nasdaq Computer Index rose 8.28 points to 1896.93 Friday, less than 4 points shy of a 12-year high. The last time the Nasdaq Computer Index was at this level was October 2000, as tech stocks were in free fall during the dot-com bust. A strong , released Thursday, helped fuel the rise in tech shares. Microsoft reported record fiscal first-quarter sales, up 16 percent year over year to $18.5 billion, while net income was $5.2 billion, up from $4.5 billion. The report, however, highlighted work the company needs to do in hardware and the consumer market.

A small number of docking stations for Microsoft’s Surface Pro 2 tablets appear to have escaped into the wild months before their official release date next year—but they’ve quickly disappeared. , appearing—for a split second—as “in stock.” The widget then refreshes, however, to show that the tablets are out of stock. : tablets, laptops, and desktop workstations. “We know what a docking station does,” Panay said at the launch. “Everybody uses a docking station. But just take your mind here really quick: We went from a tablet to a laptop, and we can use it in both forms. But we can move it to a desk. Now we have a workstation PC right in front of us.”

The first of the are in the Macworld Lab, and the results show that the internal updates in new pro laptops help to increase performance in nearly every application. The new line of MacBook Pros consists of five standard configurations, three with 13-inch displays and two 15-inch models. All use Intel’s fourth generation Core processors, dual-core integrated graphics. Only the $2599 high-end 15-inch MacBook Pro adds discrete graphics, in the form of Nvidia’s GeForce GT 750m with 2GB of dedicated video memory. We have two 13-inch Retina models, the entry-level $1299 system with a 2.4GHz dual-core Core i5 processor, 4GB of RAM, and 128GB of flash memory, as well as the high-end $1799 13-inch model with a 2.6GHz dual-core Core i5 processor, 8GB of RAM and 512GB of flash storage. (Apple sells a $1499 model that we didn’t test that has the same processor as the $1299 laptop and has 8GB of RAM and 256GB of flash storage.) The new Retina MacBook Pros are the first computers to ship with . Macworld Lab is in the process of updating our Speedmark overall system performance benchmarking suite to version 9, which takes advantage of Mavericks and includes updated versions of the many applications included in Speedmark. With Apple releasing brand new versions of iTunes, iPhoto, iMovie, and Aperture on the same day as Mavericks, we’re still in the process of updating Speedmark. For this report we’ll be relying on the results of 12 individual applications and not an overall Speedmark score.

The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other’s prying eyes—like the government’s. On Thursday night, the nonprofit announced new privacy protections to make it more difficult to see users’ reading behavior on the site, by implementing the encrypted Web protocol standard HTTPS and making it the default. Most users will soon be using the secure protocol, which is designed to protect against eavesdropping and what are called “man-in-the-middle attacks,” the group said. The protections were announced during an event at the organization’s headquarters in San Francisco. Recent revelations over government surveillance and National Security Agency programs like Prism were a major driver behind the changes. “Based on the revelations of bulk interception of web traffic as it goes over the Internet, we are now protecting the reading behavior as it transits over the Internet by encrypting the reader’s choices of webpages all the way from their browser to our website,” the group said in a Friday , pointing to NSA’s “XKeyscore” tool in particular. The XKeyscore tool, for instance, lets NSA analysts search through vast numbers of emails, online chats and browsing histories without prior authorization, have said.

What does your son or daughter want to be when they grow up? A doctor? A lawyer? An actor? , far too few are interested in a career in cyber security. And when you consider the exploding growth of malware, the threat of cyber warfare, and the fact that even major players like Adobe get hacked from time to time, you have to recognize that cyber security is a growing market. Michael Kaiser, executive director of the National Cyber Security Alliance, worries about a coming shortage of skilled technicians: "Given that we need to add thousands of cyber security professionals to the workforce in the coming years, the data shows we have a long way to go in engaging young people in the idea of a career path in cyber security." At first glance, the numbers don't sound too frightening. The survey revealed that 24 percent of millennials show interest in cyber security as a profession. But showing interest is not the same as choosing it for a career, and many young people are rightfully considering several possibilities. By comparison, 40 percent showed interest in the entertainment business. Of the 14 career choices listed on the study, only two received less interest than cyber security: Elected Official (18%) and Wall Street Analyst (17%).  That may reflect a lack of practicality among youngsters (hey, maybe they’re entitled to it for a little while), and certainly reflects the glorification of celebrity that pervades the media.

Finally, fans may be able to watch Game of Thrones and Boardwalk Empire without being forced to pay for the Game Show Network.

HealthCare.gov, the malfunctioning insurance-shopping website at the heart of the controversial Obamacare program, should be running smoothly for the vast majority of users by the end of November, about two months after its launch, officials said. , a former acting director at the White House Office of Management and Budget brought in by the U.S. Department of Health and Human Services to assess the site. The website is “fixable,” Zients said during a Friday press briefing. “It’ll take a lot of work, and there are a lot of problems that need to be addressed.” Visitors to the site should see improvements every week, he said. By the end of November, “the vast majority of consumers will be able to successfully and smoothly enroll through HealthCare.gov,” he said. “The issues with HealthCare.gov today will be resolved, and the system will operate as its designed to. There will be much-improved response times and fewer time outs.”

New prices on the Moto X have dropped from $50 to $100, depending on the carrier.

The PHP Group will reset the passwords for accounts on php.net, the official website of the PHP programming language, and will change the site’s SSL certificate after attackers compromised two servers and injected malicious code into the website. The security breach after earlier in the day the Google Safe Browsing service blacklisted the site for distributing malware, which caused Mozilla Firefox and Google Chrome to block users from visiting it. The PHP Group initially thought the warnings were the result of a false positive detection, but a more thorough investigation revealed that attackers managed to inject malicious JavaScript code into one of the site’s files called userprefs.js. That code executed exploits from a third-party website that, if successful, installed a piece of malware on visitors’ computers. The PHP Group’s investigation, which is still in progress, revealed that the compromise extended to two servers: the server that hosted the www.php.net, static.php.net and git.php.net domains and the server that hosted bugs.php.net, the project’s bug tracking system.

. Choosing another smartphone platform is simple. Android and iOS are the leading platforms, and Windows Phone is a distant, but certainly viable, runner up. The challenge is finding a platform that can meet the same needs in terms of security, especially for companies in sensitive and highly-regulated industries like finance or healthcare.  (DoD). Most companies have fewer security concerns than the DoD, so if the iPhone or Samsung Galaxy S4 will work for Uncle Sam, they’re probably secure enough for your company as well. Still, secure communications is a hallmark of BlackBerry. It is arguably the prevailing feature that established BlackBerry as a dominant platform in the first place, and it’s almost certainly the one thing that has kept BlackBerry from completely fading away by now. Organizations that still depend on BlackBerry devices are not going to just throw darts at a wall to choose an alternate mobile platform.

The European Parliament’s research department has found that four out of five member states surveyed carry out wide-scale telecommunications surveillance. In a report released on Friday the department revealed that the U.K., France, Germany and Sweden all engaged in bulk collection of data. The Netherlands, which was also examined, has not done so, so far, but is engaged in setting up an agency for that purpose. The report notes that although surveillance has been carried out for decades, there is no room for complacency because the amount of data currently available is so large. It says the current surveillance programs “go largely beyond what was called before targeted surveillance or a non-centralised and heterogeneous assemblage of forms of surveillance.” The U.K. leads the European surveillance field and is the only country to come close to the scale of the U.S. National Security Agency (NSA), the report says.

Salesforce.com really wants lots of developers to come to its Dreamforce conference next month in San Francisco. As in, really. On Friday, the cloud software vendor announced a “hackathon” would be held at the conference, with $1 million going to the developer or team who creates the top prize-winning mobile application with Salesforce.com technology. “It’s not going to be easy—$1 million is going to bring out the best of the best,” Salesforce.com said in Friday’s announcement. “So don’t wait until Dreamforce! You’re going to want to get started now. With Force.com, Heroku, ExactTarget Fuel, Mobile Services and more—you’ve got a killer array of platform technology to use.” Salesforce.com will also be providing some “pretty amazing new technology” for use at the show, the announcement adds.

Vendors are working on products to lower the cost of building copper-based broadband with bandwidth up to 100M bps, and are at the same time getting ready to increase speeds even further. The death of copper and the ascent of fiber has long been discussed. However, the cost of rolling out fiber is too high for many operators who instead want to upgrade their existing copper networks. The technology that lets them do that and still offer competitive speeds is VDSL2 with vectoring, which was a hot topic at this week’s Broadband World Forum conference in Amsterdam. Vectoring improves VDSL (Very-high-bit-rate DSL) performance by removing crosstalk interference. It works by continuously analyzing the noise conditions on copper lines, and then creates a new, antinoise signal to cancel it out, much like noise-cancelling headphones. In Amsterdam, discussions centered on cutting the cost of installing vectoring, with products from the likes of equipment manufacturers Adtran and Alcatel-Lucent, as well as chip maker Broadcom.

. And by that, I mean your personal information is considered a very hot commodity among people you have never even met. We all leave behind little bits of personal information with every new new step in our digital footprint: What sites we visit, what searches we conduct, what links we follow, and so on. Collecting that information is big business. Every time you visit a website—even this one—a ripple of data is sent through the Internet, often without our knowledge and sometimes without our consent. Lightbeam, a visually striking new add-on from Mozilla, helps illuminate the sometimes-invisible connections that weave our digital lives. . Once installed, users will find the Lightbeam logo in the bottom right of the browser. Clicking it will open a new tab with three visualization options: Graph, Clock, and List. The default Graph option creates an zoomable, interactive visualization of your Web activity. Every time you voluntarilly visit a site, Lightbeam records this hit with a circle icon. Lightbeam assigns a triangle icon for every third-party site actively sucking data from the page you visited. Each site you visit is visually connected with a drawn line; a purple line means that a cookie is involved in the data transfer. Each site icon will be sized according to the amount of connections, and each icon will be closer to other icons depending on how many connections they share.

. with Retina Display received scores of 1 out of 10 for repairability. That's one point lower than last year's 13-inch model, and the same dismal score as last year's 15-inch version. Though most users will likely turn to Apple's Genius Bar for help anyway, difficult repairs and replacements could be a problem for some enterprise users who might look to service and upgrade their own machines. , using proprietary pentalobe screws rather than a giant mess of glue to keep the frame together. With a special screwdriver, you can at least have a look at the MacBook Pro's innards. But it's all downhill from there as iFixit tried to remove internal components. The battery assembly is firmly glued to the case on both the 13- and 15-inch MacBook Pros, and it covers the cable for the trackpad. You can't replace the trackpad without removing the battery, and prying the battery assembly apart risks shearing the trackpad cable.

European Union leaders have given themselves room for maneuver in implementing new data protection laws, while pledging to introduce them in a timely fashion. All 28 leaders of the E.U. member states discussed issues of data protection, mass surveillance and the digital economy at a meeting that continued late into the night on Thursday. They agreed that there is a strong need for an improved, robust digital economy in Europe and that artificial barriers between member states must be removed to create the so-called “digital single market.” However, the meeting was dragged out with discussion on the subject of alleged illegal snooping by the U.S. National Security Agency, among others. Allegations that the NSA hacked German Chancellor Angela Merkel’s mobile phone gave impetus to this debate.

If you use Microsoft services like SkyDrive, Outlook.com webmail, or Xbox Live, you have a Microsoft account. If you have a Microsoft account, you might use it to store personal information that you wouldn't want hackers to be able to get at. You know, credit cards and tax returns and such. Turning on two-factor authentication can help keep would-be data thieves out, and your secrets secret. Two-factor authentication—which Microsoft accurately calls two- authentication—is based on a simple premise: It requires you to enter a single-use security code in addition to your username and password when you log in. This can help keep bad guys out of your account, even if they get ahold of your account name and password. To start, log into your Microsoft account by visiting  from the list on the left-hand side of your browser window. Microsoft may ask you to verify your identity by sending a security code to you via text message or phone call (if you provided a cellphone number when you set up your account), or via the email address associated with your account. Select the option you prefer from the list and press . You now have access to your security settings—and you just got a taste of what to expect from two-factor authentication.

Samsung Electronics’ net profit in the third quarter was up 25.6 percent year-over-year on record revenue driven by sales of its memory chips and smartphone products. The South Korean electronics giant reported Friday a net profit of 8.24 trillion won (US$7.8 billion), up from 6.56 trillion won in the same period a year ago. Revenue reached 59.08 trillion won, a year-over-year increase of 13 percent, and meeting the company’s forecast. Samsung is currently the world’s largest smartphone vendor. But during the quarter ended Sept. 30, the company saw “intensifying market competition” in the mobile devices space, it said. Shipments of its high-end smartphones remained flat quarter-over-quarter, despite the release of the company’s phablet in late September.

Visitors to the official website for the PHP programming language over the past couple of days might have had their computers infected with malware. Hackers managed to inject malicious JavaScript code into a file on the php.net site called userprefs.js. The code made requests to a third-party website that scanned visitors’ browsers for vulnerable plug-ins and executed exploits that, if successful, installed a piece of malware, said Daniel Peck, a research scientist at Barracuda Networks. One of Barracuda’s research tools detected and captured attack traffic from php.net late Tuesday evening, according to Peck. The exploits served during the attack came in the form of malicious SWF files, so they most likely targeted vulnerabilities in Adobe Flash Player. However, Barracuda’s researchers are still conducting their analysis and haven’t identified yet exactly which vulnerabilities were targeted, Peck said.

Microsoft’s operating system may be the primary engine in most businesses, but there is a world outside Windows. Microsoft offers an array of services that address some of the most common headaches small businesses face and enable them to operate like much bigger organizations. Here are five of the gems. license, but it allows you to install the full Office 2013 Professional suite on up to five devices—including iPhones and Android smartphones. is more than Microsoft Office in the cloud. Office 365 Small Business Premium also includes Exchange, SharePoint, and Lync, which give you a complete business infrastructure without the cost and overhead of buying and maintaining your own servers. Plus, Microsoft manages the server back-end. It’s like getting an IT department thrown in for free. Data is power. Power BI, Microsoft’s business intelligence service, lets you analyze and leverage data through a tool most businesses are already comfortable with—Excel. You can create analytical models, build interactive visualizations, and more.

Recent headlines about shadowy  drive home a crucial point: Your online privacy is best protected when you keep an iron grip on the information you're handing out. If your info is on a server somewhere, it's not truly yours. So many core aspects of our lives have shifted to the cloud, mostly to our great benefit: Gmail and Outlook.com maintain our email archives. Dropbox and SkyDrive make your files available anywhere, anytime. Windows 8.1 searches include Bing results by default. Google Now dishes out the information you need before you even know you need it. But every gain in convenience comes with a loss of control, and that loss of control all too often comes bundled with  woes. You can take some simple precautions to minimize the amount of personal information that you have online. But before we get started, remember that this data checkup is about what you're comfortable with. You could follow all the tips in this post, tighten up on just a few of the practices mentioned below, or go even farther down the rabbit hole than the suggestions offered here. Digital privacy is not a zero-sum or a one-size-fits-all proposition. If nothing else, this article can help you make better decisions about the information you share with the services you love.

These online Halloween goodies are so scary that they'll still be rattling around in your head long after the Great Pumpkin has disappeared for another year.

Six Eastern European men are being sought by U.S. prosecutors for allegedly netting up to US$3 million by placing fraudulent advertisements for vehicles, motorcycles and boats on major online marketplaces, including eBay. Ringleader Nicolae Popescu is accused of leading a group that placed advertisements for goods costing between $10,000 to $45,000, collecting the money from victims and never delivering the goods, according to a U.S. Department of Justice on Thursday. Interpol has issued notices seeking Popescu’s arrest, along with fellow Romanians Daniel Alexe, Dmitru Daniel Bosogioiu, Ovidiu Cristea, and Dragomir Razvan and an Albanian man, Fabjan Meme. They’re charged in U.S. District Court for the Eastern District of New York. Six co-defendants were arrested in December 2012, the DOJ said.

The U.S. monitored the phone conversations of 35 world leaders, according to a National Security Agency document provided by its former contractor, Edward Snowden, according to newspaper. The names of the world leaders is not disclosed in the document of 2006, and access to the 200 phone numbers of the leaders provided “little reportable intelligence,” as the phones were apparently not used for sensitive discussions. The numbers, however, provided leads to other phone numbers that were subsequently targeted, according to the document. The document is likely to add to concerns about NSA surveillance, including its monitoring of phones of political leaders. German officials into the email server of Mexico’s former president Felipe Calderon while he was in office, and also spied on Brazil’s President Dilma Rousseff. alleged that the NSA recorded data relating to over 70 million phone calls involving French citizens over a period of 30 days. U.S. Director of National Intelligence James R. Clapper said the allegation that the NSA had collected recordings of French citizens’ telephone data was false.

A court order forcing former NSA contractor Edward Snowden’s email provider to turn over its master encryption key undermines a critical security feature used by major Internet services, the Electronic Frontier Foundation said Thursday. The EFF, a digital rights watchdog, filed a brief on Thursday in support of the email provider, Lavabit, in the U.S. Court of Appeals for the Fourth Circuit. Lavabit founder Ladar Levison was found in contempt of court for resisting an order to turn over his company’s private SSL (Secure Sockets Layer) key, used to encrypt communications for 400,000 users. He is appealing. The U.S. government is believed to have sought access to the account of Snowden, who gave out a Lavabit email address after arriving in Russia, but he has not been named in the court documents.

OS X Mavericks could end up on more than 90 percent of Macs, according to statistics from Web analytics firm Net Applications.

Twitter has hired a top digital executive at NBC News, Vivian Schiller, to help boost its partnerships with news organizations. Schiller will join Twitter as head of news in January, she said in a Thursday. Twitter is already a go-to destination for real-time news and chatter about current events. With Schiller on board, Twitter hopes to make its service a stronger resource for news outlets, and also usher in more media deals, possibly through advertising. Schiller was chief digital officer at NBC News for two years. Before that she worked at NPR, profile.

We need some files stored directly on our PCs, some backed up to protect important data, and others to be accessible everywhere we go.  To accomplish this, most of us are at our best with a combination of local and network-based drives that work together across multiple devices. refers to drives inside or attached to your PC. These can be internal disks installed at the factory, external drives that sit on your desk, or small drives that fit easily in a bag or pocket. is a type of drive that you access over your network, or via the Internet. These can be physical boxes located inside your home or office, or they could be remote drives that you access via an online service. When storage is hosted on a remote service that you access via the Internet, it’s referred to as “cloud storage,” or “the cloud.” As cloud storage has grown in popularity, a hybrid approach has emerged, combining the security benefits of having your data in your home with the convenience of the cloud. drives such as the WD My Cloud can save everything from all your PCs right on your own network, giving you a central point of control for all your data.  They also connect to other cloud services, like Dropbox, giving you access to your files from any device, anywhere.