Trang

Chủ Nhật, 15 tháng 7, 2012

Two More Tiny Linux PCs Each Cost Less Than $100

This year has already been a notable one on many technological fronts, but certainly one of the more exciting ones among them is the Linux-powered revolution that's taking place in personal computing.



Delivering significant computing power in tiny packages and at extremely low prices, this revolution has already produced the likes of the Raspberry Pi, the Cotton Candy, the Mele 1000, and the MK802, among others.
Today, the revolution shows no sign of slowing down. In fact, two new contenders recently emerged.
Looking for a taste of this new, Linux-enabled breed of tiny PCs? Here are two more to consider.
The Oval Elephant
First up is the Oval Elephant, a new mini PC much like the MK802 that costs just $72 and comes with Android 4.0, but can run Linaro Linux as well.
The Oval ElephantThe Oval Elephant mini PC (Credit: Oval Elephant)A microSD card slot supports up to 64GB, and a full HDMI port enables direct connections to a TV or monitor. The device is powered via a miniUSB port, and it also features built-in MIC and an external port for MIC audio.
A single-core 1.5GHz AllWinner A10 Cortex A8 ARM processor runs the device, and 1GB of DDR3 high-capacity memory is included, as is WiFi connectivity, a MALI400 graphics processing chip, and 1080p HDMI video output, with support for 2160p.
Optional add-ons include a Lenovo wireless keyboard/mouse for $24.99.
The Mini X
The Mini XThe Mini X (Credit: Miniand Tech)Next up--and uncovered on Tuesday by Liliputing--we have the Mini X, a tiny device that's powered by the same AllWinner A10 processor but can reportedly run a variety of Linux distributions as well, including UbuntuFedora, and Puppy Linux.
With support for both Android 2.3 and 4.0, the Mini X features 512MB of DDR RAM, 4GB of Nand Flash, a microSD slot, an HDMI port, and WiFi 802.11b/g/n with an external antenna. It plugs into a TV, where you can then run apps to your heart's content; a remote is included.
The Mini X is available for $78 at DealExtreme or for $99 at Miniand with a one-year warranty.

Source : pcworld.com

Cybercrime Defense: Think -- and Act? -- Like a Hacker


It is known in the industry as "active defense" or "strike-back" technology, andReuters' Joseph Men says that can range from "modest steps to distract and delay a hacker to more controversial measures," like hiring a contractor to hack the hacker -- something that could violate the laws of the U.S. or other countries.
Shawn Henry, former head of cybercrime investigations at the FBI who recently cofounded a new cybersecurity company CrowdStrike to help companies respond to, as well as defend against, hackers, told Menn: "Not only do we put out the fire, but we also look for the arsonist."
This, say some experts, is a bad idea that amounts to vigilante justice, and will just lead to an escalating battle between hackers and companies that the hackers are sure to win. John Pescatore, formerly with the National Security Agency and Secret Service, who now leads research firm Gartner's Internet security practice, told Reuters, "There is no business case for it and no possible positive outcome."

Take the Initiative

At least one famous example from about 18 months ago was security consultant HBGary Federal. CEO Aaron Barr said he had identified leaders of the hactivist group Anonymous and would sell their names to clients including the FBI. In response, Anonymous hacked HBGary, and posted more than 50,000 of its private e-mails. Barr resigned about a month later, at the end of February.
Still, there are some supporters of "strike back." Dr. Patrick Lin, director of the Ethics and Emerging Sciences Group at California Polytechnic State University, made what he called the"stand-your-cyberground" argument April 30 in The Atlantic.

While the focus of that article was the U.S. government being too constrained by international law to lead cyberdefense against foreign attacks, Lin told CSO at the time that self-defense is a basic right, authorized by the Second Amendment. He said it helped deter outlaws during the "Wild West" era. During modern times, commercial ships under attack from pirates are allowed to shoot and kill them, and bank security guards are allowed to shoot robbers, he said.
The same principle applies here, Lin said this week. While he agrees that escalation is a possibility, there would also be, "the deterrent to others to not cyberattack a company that could plausibly respond in kind," he said.
"It's also reasonable to think that failing to respond to a cyberattack is an incentive for hackers to continue, if not escalate, their activities. This is a reason why bad neighborhoods tend to get worse -- they can, given the absence of reliable law enforcement or self-defense.
"I don't see how doing nothing will de-escalate a situation like this," Lin said. "A hacker is not like the angry drunk who will eventually run out of steam and pass out or sober up. If cyberattacks are still profitable, then they will continue or increase."

Build a Better Firewall

However, Rebecca Herold, an information security, privacy and compliance consultant who goes by the name "The Privacy Professor," stands with those who say the best defense is simply better defense. Layered security, she said, will make it difficult enough for hackers to look elsewhere.
There could be multiple unintended consequences of retaliation, she said. "Becoming what I call a boomerang cyber-attacker in response to being attacked could end up doing your own systems, your data and reputation harm, not to mention innocent victim systems," she said. "The bad guys, if they're smart, will lead you to other networks, not their own."

Herold said businesses focused on getting revenge on hackers "end up taking resources away from important business activities, and will likely leave gaps in security elsewhere."
"Plus, networks are now so complex, and consist of so many components, that a lot can go terribly wrong if an organization starts trying to have automated defensive cyber attacks on attackers," she said. "Many would likely end up being the Barney Fife of the cyberworld, shooting themselves in their own cyber foot and having their digital bullets taken away by regulatory oversight agencies after bad things have happened."
Herold said also that counterattacks wouldn't deter hackers. "If hackers know you will counterattack, that would likely attract more harmful types of hackers who are looking for the thrill of a conquest and subsequent bragging rights," she said.
Patrick Lin still argues that weakness is more of an invitation to hackers than a show of strength. "Perhaps some hackers will take [a counterattack] as a challenge, but they're not so much the rational adversary, who is motivated by profit," he said. "Just as some hackers and muggers may strike back harder if the victim resists or fights back, this minority group shouldn't drive policy that's otherwise reasonable and potentially more helpful than not."
In the case of modern-day pirates, Lin argues that allowing commercial ships to countrerattack has not caused an escalation of conflict, "and it's hard to see why it would."
"Why shouldn't ships be able to defend themselves against pirates?" Lin said.
He agrees that letting law enforcement handle crime is best. "But in the case of cyber, there is no reliable law enforcement, and there isn't even an 'authority' we can appeal to," since there is a continuing debate in Congress over whether the Department of Defense or Department of Homeland Security should oversee cybersecurity laws.
Cyberattacks on industry amount to "a potential powder keg, and something is going to happen if government doesn't intervene and establish law," Lin said.

Thứ Hai, 9 tháng 7, 2012

Aggressive Ad Providers Spy on 80 Million Mobile Users


Some advertising inside free apps for smartphones pose a threat to consumer privacy, according to a company that makes security software for mobile phones.
More than 50 percent of free apps embed advertising in their offerings provided by ad networks, according to Lookout Mobile Security. Some of those networks access personal information on the phones they're running on without clearly explaining what they're doing to users, recent research by Lookout revealed.
It also noted that 5 percent of the apps on smarktphones, which represent 80 million downloads, are embedded with "aggressive" ad networks that perform "non-kosher" acts on a smartphone, such as changing bookmark settings  and delivering ads outside the context of the app they are embedded in.
An analysis of free apps in GooglePlay showed that the leading user of aggressive ad networks was personalization apps , like wallpaper apps (17 percent), followed by entertainment (eight percent) and games (seven percent).
Lookout makes a free app that can downloaded from GooglePlay that identifies what ad networks are running on a phone and what they do.
The security vendor has also released a set of comprehensive guidelines for mobile advertisers. They outline "best practices" for the pitch firms to follow and govern transparency and clarity, individual control, ad delivery behavior, data collection and other topics.
In addition to collecting personal data from smartphones, ad networks have also been reported to push "scareware," such as battery upgrade warnings, and shove marketing icons onto a phone's start screen or advertising into its notification bar.
Source : PCWORLD