Intel chip vulnerability lets hackers easily hijack fleets of PCs

Security researchers say exploiting the vulnerability requires little technical expertise, and can result in a hacker taking full control of an affected PC.

A vulnerability in Intel chips that went undiscovered for almost a decade allows hackers to remotely gain full control over affected Windows PCs without needing a password.

The “critical”-rated bug, disclosed by Intel last week, lies in a feature of Intel’s Active Management Technology (more commonly known as just AMT), which allows IT administrators to remotely carry out maintenance and other tasks on entire fleets of computers as if they were there in person, like software updates and wiping hard drives. AMT also allows the administrator to remotely control the computer’s keyboard and mouse, even if the PC is powered off. …

Source: Intel chip vulnerability lets hackers easily hijack fleets of PCs

Share

John Chen successfully turned around BlackBerry

… About four years after his appointment as CEO, Chen’s disciplined strategy of playing to the company’s strong sides has paid off remarkably and BlackBerry has opportunities to increase its profits. Essentially, the company’s turnaround has been completed.

Equity analyst Paul Treiber has removed it from his risk watch, explaining that BB is no longer dependent on outside cash flow (such as Service Access Fees) and is no longer losing money on hardware production. Rather, it’s growing its software business and directing its efforts towards the ‘Enterprise of Things’ market.

This includes new handsets developed under license by contractors like TCL and Infracom, along with products like tablets and wearables – all based on Android, rather than BB 10, which the company abandoned long ago.

Chen believes there’s a place for BlackBerry’s Secure software into all kinds of devices, including BB-branded and co-branded ones. Security is the name of the game with BlackBerry, and the company can further strengthen its foothold there as it improves its financials and benefits from newfound investor interest. …

Source: John Chen successfully turned around BlackBerry

Share

Camera Review: BlackBerry KEYone vs. Samsung Galaxy S8

The new BlackBerry KEYone secure Android smartphone surprised many tech enthusiasts around the world. Not just the physical keyboard is exiting, but also the built-in camera.

The camera sensor is known from the Google Pixel smartphone and comes from Sony. It’s the high-end 12-megapixel Sony IMX378 sensor.

In a video review Danny Winget compared the BlackBerry KEYone camera against the Sony Galaxy S8 camera. Is the KEYone camera able to compete with the S8 camera? Let’s have a look …

Source: IS BLACKBERRY KEYONE CAMERA BETTER THAN SAMSUNG GALAXY S8?

Share

What you need to know about QNX Hypervisor

QNX Hypervisor is a Type 1 realtime priority-based microkernel hypervisor built for managing virtual machines. The QNX Hypervisor makes it easier to obtain and maintain safety certifications by separating safety-critical components from non-safety critical components in separate guest operating systems. The QNX Hypervisor boasts the ability to meet the precision requirement of an embedded zero-downtime production system. …

Source: What you need to know about QNX Hypervisor

Share

Will the Internet of Things always be so vulnerable?

The Internet of Things (IoT) has undergone an amazing transformation, from a pipe dream to a marketing buzzword, and now an impending reality. Recent estimates expect the number of internet-connected devices to reach 26 billion by 2020, with some studies suggesting an even higher output. With an exponential increase in devices communicating with us, other devices, and with the internet at large, how can anyone keep private information safe? …

In 2015, more than 165 million personal records were exposed, through cybersecurity breaches over the course of the year. A staggering 64 per cent of Americans have been personally affected by a major data breach. It’s no longer a question of “if” cyber criminals will target you — it’s a matter of “when.”

Cyberattacks have not only become common, they’ve also become exponentially more dangerous, as we connect more and more of our devices to global networks. The large majority of cybersecurity professionals are concerned about the potential weaponisation of IoT, and only 30 per cent of them believe their organisations are fully prepared for the risks inherent in IoT. Furthermore, experts feel only one out of every ten IoT devices has adequate security measures. …

Source: Will the Internet of Things always be so vulnerable?

Share

Millions of people have downloaded a nasty smartphone virus

Android owners have been put on high alert after researchers identified a new virus that has been downloaded more than two million times.

The malware is called Falseguide and is hidden in apps found on Google Play, the online store where Android users download new software.

The virus lurks inside apps which appear to be guides to popular games.

Once victims download these apps, their phones are infected.

Currently, the Russian hackers behind the malware appear to be trying to build a botnet – a large group of hacked devices which can be controlled as one and used to perform hack attacks against websites and other targets. …

Source: Millions of people have downloaded a nasty smartphone virus and YOU could be its next victim

Share