Subscribe to:

Subscribe to :: ::

Adidas To Offer Sneaker Customization Via 3D Printer

October 12, 2015 by mphillips  
Filed under Around The Net

Adidas announced a new performance running shoe line named Futurecraft 3D, which will give consumers the option of a custom-formed and 3D-printed midsole.

The midsole can be tailored to the shape and the cushioning needs of an individual’s foot.

Linked with existing data sourcing and foot-scan technologies, it opens unique opportunities for immediate in-store fittings, Adidas said in a statement.

“Imagine walking into an Adidas store, running briefly on a treadmill and instantly getting a 3D-printed running shoe – this is the ambition of the Adidas 3D-printed midsole,” the company said.

Adidas said with 3D printing using CAD software, it can create a flexible, fully breathable carbon copy of the a runner’s footprint, matching exact contours and pressure points. The midsole with be printed using a modified thermoplastic polyurethane (TPU).

“It’s brand-new in the marketplace and convinced us with its durable elasticity as well as high tear strength and abrasion resistance,” Adidas’s footwear development manager, Daniel Cocking, wrote in a recently published blog post.

Adidas is partnering with Materialise, a 3D printing service provider that will be creating the midsoles for the sports equipment company.

Cocking did not mention when the company will begin offering the custom-printed  midsole.

Materialise will use a 3D printing process called Laser Sintering, which uses a light beam to melt together powdered material on a print bed layer by layer.

Cocking said since 3D printing is so fast in prototyping stages, within 2 weeks “I had run in the shoe myself.” But there were other hurdles, he added.

“We found that stiffness of the midsole varied significantly as a result of very minor process or design changes,” Cocking stated. “We began a thorough investigation into the process parameters required to achieve the perfect cushioning.”

Adidas involved 15 of its development teams, adding a complex range of test methods and technical support that Cocking said created the world’s first running shoe that is “impossible to create in any other way.”





AT&T Finally Offers Wi-Fi Calling

October 12, 2015 by mphillips  
Filed under Mobile

AT&T has finally rolled out Wi-Fi calling on newer-model iPhones running iOS 9  after winning permission from the Federal Communications Commission.

Wi-Fi Calling helps users get better connections indoors where cellular service can be spotty. Where permitted by a carrier, it can also eliminate international calling costs of up to $1 a minute.

T-Mobile and Sprint already offer Wi-Fi calls on certain devices, and T-Mobile started the practice as early as 2007 without securing the same permission from the FCC that AT&T received.

AT&T said the iPhone 6S, iPhone 6S Plus, iPhone 6 and iPhone 6 Plus will support Wi-Fi Calling if they have iOS 9 installed.

To add Wi-Fi calling to an eligible iPhone, according to Apple’s website, go to Settings> Phone> Wi-Fi Calling. You will then be prompted to answer a few questions.

With AT&T’s announcement, Verizon Wireless is expected to follow suit.

T-Mobile allows customers on certain devices to make Wi-Fi calls “virtually anywhere” there is Wi-Fi access. However, AT&T said its Wi-Fi Calling service will be available only when calling or texting from the U.S., Puerto Rico and the U.S. Virgin Islands.

AT&T didn’t offer an explanation for its restriction to those geographies.

In a blog post AT&T bemoaned that T-Mobile and Sprint were allowed to move ahead so much earlier, without receiving the same permission in the form of a waiver that AT&T sought and received.

“We are left scratching our heads as to why the FCC still seems intent on excusing the behavior of T-Mobile and Sprint who have been offering these services without a waiver for quite some time,” said Jim Cicconi, senior executive vice president of external affairs at AT&T.

The FCC waiver permits AT&T to begin offering Wi-Fi calling without also offering teletypewriter (TTY) communications for the deaf, hard of hearing and speech-impaired.

AT&T wants to set up RTT (Real Time Texting) instead, arguing it works better over the Internet. Once implemented, RTT would be backward compatible with TTY, AT&T said in a blog in July.

Roger Entner, an analyst at Recon Analytics, said AT&T probably sought and received the waiver to avoid an FCC fine for proceeding without permission.

He said Verizon has also proceeded slowly on Wi-Fi calling, hoping also to avoid a fine for the same reason.

“Verizon has not launched Wi-Fi calling but now that AT&T has the waiver, I would expect Verizon to launch shortly,” Entner said. “Sprint and T-Mobile didn’t bother to get a waiver and apparently they are less afraid of the FCC. Historically, they have gotten nicer treatment from the FCC.”





Qualcomm Goes LTE For Microsoft

October 12, 2015 by Michael  
Filed under Computing

Qualcomm has continued its friendship with Microsoft by extending its latest LTE-Advanced modem, the X12, to Windows 10 notebooks and tablets.

The chipmaker was the only major chip provider to optimize its architecture for Windows Phone, and Microsoft’s Lumia devices, which run on Snapdragon 808 and 810 chips.

The Windows 10 devices which come to market later this year will have the option to integrate cellular connectivity with the X12, X7 or X5 LTE modems, which support the Microsoft operating system’s native Mobile Broadband Interface Model (MBIM).

Qualcomm said this would give business users, in particular, a similar experience on their large-screened devices as on their smartphones, giving the particular examples of location-based services and security driving LTE usage on PCs and tablets.

Integrated cellular connectivity has not been so important for notebook users, outside of a few scenarios such as WiFi-less trains, most wireless access from notebooks, and even tablets, is over a WLAN.

Qualcomm makes WiFi chips for portable devices but it does not have such a big market share. Working with Microsoft means it could have a higher presence and a far better chance of delivering mass sales. The Surface Pro and its new Surface Book, is getting good reviews and might even be popular.


Uber Cast Suspicion Towards Lyft Over Hacking

October 9, 2015 by mphillips  
Filed under Around The Net

Eight months after admitting a major data breach, ride service Uber is focusing its legal efforts on obtaining more information about an internet address that it has persuaded a court could lead to identifying the hacker. That address, two sources familiar with the matter say, can be traced to the chief of technology at its main U.S. rival, Lyft.

In February, Uber revealed that as many as 50,000 of its drivers’ names and license numbers had been improperly downloaded, and the company filed a lawsuit in San Francisco federal court in an attempt to unmask the perpetrator.

Uber’s court papers claim that an unidentified person using a Comcast IP address had access to a security key used in the breach. The two sources said the address was assigned to Lyft’s technology chief, Chris Lambert.

The court papers draw no direct connection between the Comcast IP address and the hacker. In fact, the IP address was not the one from which the data breach was launched.

However, U.S. Magistrate Judge Laurel Beeler ruled that the information sought by Uber in a subpoena of Comcast records was “reasonably likely” to help reveal the “bad actor” responsible for the hack.

On Monday, Lyft spokesman Brandon McCormick said the company had investigated the matter “long ago” and concluded “there is no evidence that any Lyft employee, including Chris, downloaded the Uber driver information or database, or had anything to do with Uber’s May 2014 data breach.”

McCormick declined to comment on whether the Comcast IP address belongs to Lambert. He also declined to describe the scope of Lyft’s internal investigation or say who directed it.

Lambert declined to comment in person or over email.



Kemoge Malware Menacing Android Phones

October 9, 2015 by mphillips  
Filed under Mobile

Smartphone owners running Google’s Android operating system in more than 20 countries have been infected with a particularly aggressive malware program that bombards devices with unwanted advertisements.

Researchers from FireEye found that the malicious component, nicknamed Kemoge, has been seeded inside what appear to be legitimate apps offered on third-party application stores.

“This is another malicious adware family, possibly written by Chinese developers or controlled by Chinese hackers, spreading on a global scale that represents a significant threat,” wrote Yulong Zhang, a staff research scientist with FireEye.

Whomever created Kemoge repackaged legitimate apps with the malware and then promoted them on websites and through in-app ads to persuade people to download them.

Zhang listed a dozed affected apps: Sex Cademy, Assistive Touch, Calculator, Kiss Browser, Smart Touch, Shareit, Privacy Lock, Easy Locker, 2048kg, Talking Tom 3, WiFi Enhancer and Light Browser.

Third-party apps stores are considered risky places to download Android apps, as hackers frequently upload malicious apps to them. Google performs a security check on apps in its Play store, although harmful ones occasionally sneak in.

Kemoge not only displays unwanted ads, but it’s also loaded with eight root exploits that target a wide range of Android devices, Zhang wrote. A successful attack using those exploits means an attacker would have complete control over the device.

Kemoge will collect a device’s IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

That command-and-control server was still running, Zhang wrote. An analysis of traffic exchanged between an infected device and the server showed Kemoge also tries to uninstall antivirus apps.

FireEye came across an app called Shareit in Google’s Play store that was signed by the same digital certificate as the malicious one found on the third-party source.

The Google Play version of ShareIt did not have the eight root exploits or contact the command-and-control server, but it did have some of the same Kemoge code libraries. It now appears to be gone from Google Play.





DDoS Attacks Appear To Be Growing Fast

October 9, 2015 by Michael  
Filed under Computing

Distributed Denial-of-Service (DDoS) attacks continue to plague companies and have spiked in numbers in the past three months, according to security firm and interested party Corero Network Security.

Some poor companies were hit with an average of 4.5 DDoS attacks a day in the past three months, an increase of about a third against the previous quarter.

While the attacks increased, they softened a bit, and Corero said that studies of its customer network found a number of low-bandwidth attacks, under 10Gbps, that lasted for less than 30 minutes. In fact, these attacks accounted for 95 percent of all those during the period.

Corero reckons that these quick fire DDoS attacks have been enabled by the ease of access to cheap, sometimes even free, attack tools that are easy to launch and easy to execute.

“Attackers are continuing to leverage DDoS attacks as part of their cyber threat arsenal to disrupt business operations or access sensitive corporate information, and they’re doing it in increasingly creative ways that circumvent traditional security solutions or nullify the previous effectiveness of scrubbing centres,” said Dave Larson, CTO and VP for product at Corero.

“In order to effectively protect their networks, prevent disruptions to customer operations, and better protect against data theft and financial loss, companies need real-time visibility and mitigation of all DDoS attack traffic targeting their networks, regardless of size or duration.”

Corero’s findings differ from predictions by Akamai, which reported a rise in mega DDoS attacks that are large in size and scale. Akamai has previously warned that big attacks with a 100Gbps hammer blow are likely to affect companies during the quarter and in the future.

Whatever, any kind of DDoS attack is a bad thing but, as Corero helpfully points out, companies offer protective solutions for the threat. So mega or mini, we can sleep safely knowing that the threat is in safe hands.


Dell Said To Be Pursuing Purchase Of EMC

October 9, 2015 by mphillips  
Filed under Computing

Dell Inc, the world’s third largest personal computer maker, is holding discussions to acquire data storage company EMC Corp, a person familiar with the matter said, in what could be one of the biggest technology deals ever.

A deal could be an option for EMC, under pressure from activist investor Elliott Management Corp to spin off majority-owned VMware Inc.

The terms being discussed were not known, but if the deal goes through it would top Avago Technologies’ $37 billion offer for Broadcom. EMC has a market value of about $50 billion.

Dell is also in talks with banks to finance an all-cash offer for EMC, the person told Reuters on condition of anonymity as the talks were confidential.

Dell spokesman David Flink and EMC spokesman Dave Farmer declined to comment.

A deal could further strengthen Dell’s presence among corporate clients at a time when founder Michael Dell has been trying to transform the company he founded in 1984 into a complete provider of enterprise computing services such as Hewlett-Packard Co and IBM.

The talks come two years after Michael Dell and private-equity firm Silver Lake took Dell private for $24.9 billion, ending its decades-long run as one of the world’s largest publicly traded PC makers.

In August, Re/code reported that EMC was contemplating a takeover by VMware. The Wall Street Journal reported last year that EMC was exploring options and had held talks with Dell and HP.




Panasonic Announces World’s Most Powerful Solar Panel

October 8, 2015 by mphillips  
Filed under Around The Net

Panasonic’s Eco Solutions division has announced the launch of what it is calling the most powerful photovoltaic panel in the world.

The new prototype solar panel has a solar energy conversion efficiency of 22.5% on a commercial-sized module. The prototype was built using solar cells based on mass-production technology, Panasonic said.

Last year, Panasonic announced it had achieved a photovoltaic cell efficiency rating of 25.6%.

“This new record on module-level efficiency adds to the 25.6% efficiency record achieved last year at cell-level. The new panel efficiency record demonstrates once again Panasonic’s…ongoing commitment to move the needle in advanced solar technology,” Daniel Roca, senior business developer at Panasonic Eco Solutions Europe, said in a statement.

The latest advance, in theory, allows Panasonic to squeak past SolarCity as having the most efficient solar panel in the world. SolarCity announced last week that it had achieved an efficiency rating of 22.04% in panels that it will begin manufacturing this month.

However, Panasonic’s solar panels are based on “thin-layer” solar cells, which are more expensive to produce than the standard solar cells being used by SolarCity.

Panasonic was also unable to give a date for when its panels would be used in commercial solar panels. However, it did say it’s planning for a mid- to late-2016 release time.

The new solar panel test results were confirmed by the Japanese National Institute of Advanced Industrial Science and Technology (AIST), Panasonic said.

The 72-cell, 270-watt prototype solar module incorporates “newly developed enhanced technology” that will eventually be scaled to volume production, Panasonic said.



Verizon Finds New Use For Its ‘Supercookie’

October 8, 2015 by mphillips  
Filed under Mobile

Verizon’s purchase of AOL means that ads for some U.S. mobile users are about to get a whole lot more targeted.

The company has updated its privacy policy, saying that it now shares unique identifying information about users of its mobile phone network with the AOL Advertising Network, which claims as customers 74 of the top 100 websites tracked by ComScore.

The move will allow AOL to target ads at visitors to its sites and others using information from Verizon’s databases as well as its own. According to Verizon’s October 2015 privacy notice, the targeting criteria include visitors address, email address, age range, gender, interests, location, mobile web browsing history and app usage. The company can also track some non-mobile web browsing, to sites carrying AOL ads, it said.

Verizon links all this information together using a patchwork of identifiers, including ad IDs from Apple and Google, browser cookies from AOL, and its own Unique Identifier Header (UIDH) which it adds to mobile data traffic on its network. It’s this last item that ads significantly to AOL’s ad targeting power, as it’s easy to delete or change the other identifiers.

It’s also now possible to opt out of Verizon’s UIDH system too, thanks to reporting by ProPublica, which earlier this year revealed that the company was still using the identifier to track users who had deleted it.

Concern about targeted advertising is rising, with an increasing number of Internet users opting out of advertising altogether through the use of ad-blocking software. Apple recently made it possible to download content blockers for its Safari browser on iOS, prompting a flurry of players to enter the market.

Some see such blockers as a tool to force the online advertising industry to change its ways. One, Eyeo, deliberately lets through certain ads, as long as they are unobtrusive. It introduced has its own iOS content blocker — but also taken steps to win over other developers to its platform by making its process for allowing some ads through the blocker more transparent.



Google Issues Patch For Latest Stagefright Flaw

October 7, 2015 by mphillips  
Filed under Mobile

Google has released fixes for two new Stagefright-related vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.

The flaws were found by security company Zimperium, which also unearthed the original Stagefright flaws in April.

In an advisory Google said it didn’t appear that attackers have started exploiting the vulnerabilities yet.

The latest flaws are only slightly less dangerous than their predecessors, which allowed a device to be compromised merely by sending a specially crafted multimedia message (MMS). An attacker needed only to know the victim’s phone number.

To exploit the latest flaws, dubbed Stagefright 2.0, an attacker would have to convince a user to visit a website and play a piece of audio or video content.

The vulnerabilities relate to problems with how Android processes metadata within that content, Zimperium said in a blog post.

Google has released an over-the-air update for its Nexus Android devices and had notified its partners of the issues by Sept. 10, the company said.

Zimperium held off releasing proof-of-concept exploit code but will allow some of its partners to see it later this month, it said.

In light of the number of users affected by Stagefright, Google said in August it would begin issuing monthly security patches, mirroring steps taken years ago by companies including Microsoft for desktop software.

Still, fixing software problems on mobile devices is a disjointed affair and users are dependent on device manufacturers and operators for timely patching. After Google’s announcement, major manufacturers including Samsung and LG also committed to monthly patching.



The Linux Foundation Goes To Intel To Accelerate Development

October 7, 2015 by Michael  
Filed under Computing

Jim Zemlin, chief executive of the Foundation, said in his opening remarks that this year’s opening day falls on the 24th anniversary of Linux itself and the 30th of the Free Software Foundation, giving credit to delegates for their part in the success of both.

He also noted that research conducted into the value of the Linux codebase has shown that in the past few years the code has been worth over $5bn.

As part of the launch he also made three key announcements. Firstly, a workgroup is being created to standardise the future of the software supply chain. The Openchain workgroup is centred on creating best practices to ease compliance for open source developers and companies.

In doing so it is hoped that cost and duplication of effort can be reduced significantly, and in doing so ease friction points in the supply chain. The workgroup’s founder members include ARM, Cisco, NexB, Qualcomm, SanDisk and Wind River.

By providing a baseline process, which can then be customised according to customer need, Linux developers will have a basis for monitoring and developing compliance programmes.

Existing best practices such as Debian and the Software Package Data Exchange will be used as foundations for the framework.

The second announcement involves an acceleration to the process of real-time Linux development. the Real-Time Linux Collaborative Project will bring together industry leaders and thinkers to advance the type of tech that is crucial for areas such as robotics, telecom, manufacturing, aviation and medical industries.

Two of this morning’s keynotes centred around the ideas of real-time Linux. Sean Gauley, founder of big data analysts Quid, talked about the $300m spent on a new London to New York undersea cable to cut just five milliseconds off data speed, coupled with the seven minutes of downtime the New York Stock Exchange has to suffer while humans crunch the impact of a Treasury announcement.

The Real-Time Linux Collaborative Project brings together organisations as diverse as Google, Texas Instruments, Intel, ARM and Altera.

Thomas Gleixner of the Open Source Automation Development Lab has been made a Linux Foundation fellow in order to lead the process of integrating real-time code into the main Linux kernel, which Zemlin joked would be finished within six months.

In reality this is a long-term goal, albeit a highly achievable one that could revolutionise a number of key industries.

Finally, FOSSology, the open source licence compliance software project and toolkit founded by HP in 2007, is moving home to become part of the Linux Foundation. With it comes FOSSology 3.0, due for release this week.

“As Linux and open source have become the primary building blocks for creating today’s most innovative technologies, projects like FOSSology are more relevant than ever,” said Zemlin.

“FOSSology’s proven track record for improving efficiency in licence compliance is the perfect complement to a suite of open compliance initiatives hosted at the Linux Foundation. This work is among the most important that we all do.”

FOSSology allows companies to run licence and copyright scans in a single click, and generate a Software Package Data Exchange, or readme file.

By moving the project to the Linux Foundation, the toolkit is kept in neutral hands alongside other initiatives such as the Core Infrastructure Initiative, the Open Container Project and Dronecode.

Dronecode’s Loenz Meier spoke alongside Tully Foote of the Open Source Robotics Foundation about their quest to “take back” the term ‘drone’ from its negative military connotations.

The team, whose work in Switzerland dates back to “when they were still called model aircraft”, included information about Mavlink, the self-styled ‘HTML for drones’, and Robot Operating System, a meta operating system for autonomous devices.

The team has been concentrating primarily on using telemetry data to allow drones to navigate around objects, in a similar way to that being achieved by Google’s self-driving cars.

LinuxCon Europe runs until Wednesday, bringing together representatives from back bedroom developers to giant corporations like Facebook, all sharing a common goal to nurture the community which approaches its quarter century primed to take over even more aspects of our everyday lives – quiet, unassuming but always there.

Speakers this year include people from Suse, Red Hat, Google, Raspberry Pi and the godfather of Linux, Linus Torvalds.

The INQUIRER will be talking tomorrow to some top bods from the Linux community. So early to bed for us tonight and absolutely no Guinness.


SanDisk Building Industrial Strength Components For IoT

October 7, 2015 by mphillips  
Filed under Consumer Electronics

Consumers use flash memory cards in phones, tablets and cameras almost daily. But put those same cards in security cams, cellular base stations or the electrical grid and you’ll have a problem.

Industrial devices need flash that can work harder and withstand more extreme temperatures than consumer gear, and they’ll be operating out in the field years after a typical phone or camera card has been replaced. So SanDisk is introducing a line of components built for the Internet of Things.

IoT is expected to put thousands of sensors, meters, robots and machines into the field with growing needs to process and store data.

The SanDisk Industrial line includes cards for the familiar SD, microSD and eMMC (embedded MultiMediaCard) standards, but built to tougher specifications.

For example, the SanDisk Industrial XT SD Cards and XT iNAND embedded flash drives announced Monday are rated to work in temperatures as low as -40 degrees Celsius (-40 Fahrenheit), compared with -25 Celsius for a typical consumer SD card.

The industrial cards can also write more data before they have to be replaced: as much as 128TB, far more than is typical for a consumer-grade part, said Martin Booth, director of SanDisk Industrial and SanDisk Automotive. This kind of endurance is what’s needed in IoT devices like remote video cameras that will capture video around the clock for as long as five years, he said. Otherwise they would have to be replaced more frequently, a costly proposition if the owner needs to send out a truck and a technician.

Another feature, Enhanced Power Immunity, will help prevent data loss in case of power failure. It uses special firmware for recovering data if the power is cut off, something ordinary flash cards may not be able to do if, for example, the user pulls a card out of a PC while it’s still transferring data.

The new parts range in size from 4GB or 8GB up to 64GB and will cost more than comparable consumer-grade products, but less than twice as much, Booth said.




T-Mobile Customer Data Already For Sale on The Dark Web

October 6, 2015 by Michael  
Filed under Around The Net

Data hacked from Experian is already on sale on the dark web and is available for grabbing by bad actors, phishers, malware writers and ID thieves.

Security firm Trustev is credited with the dark web discovery, although is it very possible that the underworld got to it first. Trustev and the internet are calling the dump a fullz, which means that it contains a lot of personal information.

T-Mobile customers make up a chunk of the potentially affected 15 million victims. The firm’s CEO, John Legere, went ballistic about what happened.

“We have been notified by Experian, a vendor that processes our credit applications, that they have experienced a data breach,” he said in a statement.

“Obviously I am incredibly angry about this data breach and we will institute a thorough review of our relationship with Experian, but right now my top concern and first focus is assisting any and all consumers affected. I take our customer and prospective customer privacy very seriously.”

Experian has also gone public on this with a statement on its website, and has, perhaps ironically, offered to help victims sort their credit lives out.

“Experian North America today announced that one of its business units, notably not its consumer credit bureau, experienced an unauthorised acquisition of information from a server that contained data on behalf of one of its clients, T-Mobile USA,” the statement said.

“The data included some personally identifiable information for approximately 15 million consumers in the US, including those who applied for T-Mobile USA postpaid services or device financing from 1 September 2013 through 16 September 2015, based on Experian’s investigation to date. This incident did not impact Experian’s consumer credit database.”

The agency said that it acted quickly to fix the problem once it was discovered, and immediately told the authorities and began an investigation into the hows and the whys.

It is the crown jewels of data that has been lost. Experian fessed to a breach of “names, dates of birth, addresses and Social Security numbers and/or an alternative form of ID like a driver’s licence number, as well as additional information used in T-Mobile’s own credit assessment”.

Experian added that no payment card or banking information was lost to the hackers.

Affected punters are being contacted and will be offered credit services, including two years of credit monitoring (although this may have lost some of its shine), and some identity protection services through its own ProtectMyID service.

Experian recommended that these services are embraced. “Although there is no evidence to-date that the data has been used inappropriately, Experian strongly encourages affected consumers to enroll in the complimentary identity resolution services,” the firm said.

Craig Boundy, CEO of Experian North America, took the opportunity to apologise and remind people that the company takes privacy very seriously.


Scottrade Unaware Of Hacking Until Notified By Feds

October 6, 2015 by mphillips  
Filed under Around The Net

When an organization gets hacked, hopefully they’ll realize it promptly and warn their customers immediately. Scottrade, an investment brokerage company, is different, and not in a good way.

The company confirmed that it suffered a security breach over a period of several months from late 2013 to early 2014, affecting approximately 4.6 million customers. But in a statement, Scottrade said it had no idea that the breach had occurred until law enforcement officials told them about it.

The FBI notified Scottrade of the breach in August but asked that the company hold off on disclosing the attack until it had wrapped up another part of its investigation. The company was cleared to disclose the breach at the end of last week and began informing customers last Friday.

To its credit, Scottrade said that it believes attackers obtained only clients’ names and street addresses — not the social security numbers, email addresses and other sensitive data stored in the compromised system. According to the company, the attackers didn’t compromise Scottrade’s trading platforms, and clients’ funds were untouched.

People who had a Scottrade account prior to February 2014 may have been affected by the breach. Those people who Scottrade knows were affected will be notified of that by email. The company isn’t suggesting that users change their passwords, since it believes that they remained encrypted during the attack.

As is expected in these sorts of cases, Scottrade is offering affected customers a free year of identity theft protection. It’s not clear how much good that will do, since the data was taken more than a year ago, but offering that sort of service is something consumers expect from a breach response at this point. 

Looking forward, the company said that it has secured the intrusion point the attackers used to get into its systems, and conducted an internal investigation with the help of an unnamed computer security firm. The company also said that it has further secured its network.




Can IBM Beat Moore’s Law?

October 5, 2015 by Michael  
Filed under Computing

Big Blue Researchers have discovered a way to replace silicon semiconductors with carbon nanotube transistors and think that the development will push the industry past Moore’s law limits.

IBM said its researchers successfully shrunk transistor contacts in a way that didn’t limit the power of carbon nanotube devices. The chips could be smaller and faster and significantly surpass what’s possible with today’s silicon semiconductors.

The chips are made from carbon nanotubes consist of single atomic sheets of carbon in rolled-up tubes. This means that high-performance computers may well be capable of analysing big data faster, and battery life and the power of mobile and connected devices will be better. The advance may enable cloud-based data centres to provide more efficient services, IBM claims.

Moore’s law, which has for years governed the ability of the semiconductor industry to double the processing power of chips every 24 months is starting to reach the limits of physics when it comes to doubling the power of silicon chips. This could mean a slowing of significant computing performance boosts unless someone comes up with something fast.

IBM researchers claim to have proved that carbon nanotube transistors can work as switches at widths of 10,000 times thinner than a human hair, and less than half the size of the most advanced silicon technology.

The latest research has overcome “the other major hurdle in incorporating carbon nanotubes into semiconductor devices which could result in smaller chips with greater performance and lower power consumption,” IBM said.

Electrons found in carbon transistors move more efficiently than those that are silicon-based, even as the extremely thin bodies of carbon nanotubes offer more advantages at the atomic scale, IBM says.

The new research is jump-starting the move to a post-silicon future, and paying off on $3 billion in chip research and development investment IBM announced in 2014.