Saturday, March 28, 2009

Giant Internet worm set to change tactics April 1



SAN FRANCISCO - The fast-moving Conficker computer worm, a scourge of the Internet that has infected at least 3 million PCs, is set to spring to life in a new way on Wednesday — April Fools' Day.

That's when many of the poisoned machines will get more aggressive about "phoning home" to the worm's creators over the Internet. When that happens, the bad guys behind the worm will be able to trigger the program to send spam, spread more infections, clog networks with traffic, or try and bring down Web sites.

Technically, this could cause havoc, from massive network outages to the creation of a cyberweapon of mass destruction that attacks government computers. But researchers who have been tracking Conficker say the date will probably come and go quietly.

More likely, these researchers say, the programming change that goes into effect April 1 is partly symbolic — an April Fools' Day tweaking of Conficker's pursuers, who for now have been able to prevent the worm from doing significant damage.

"I don't think there will be a cataclysmic network event," said Richard Wang, manager of the U.S. research division of security firm Sophos PLC. "It doesn't make sense for the guys behind Conficker to cause a major network problem, because if they're breaking parts of the Internet they can't make any money."

Previous Internet threats were designed to cause haphazard destruction. In 2003 a worm known as Slammer saturated the Internet's data pipelines with so much traffic it crippled corporate and government systems, including ATM networks and 911 centers.

Far more often now, Internet threats are designed to ring up profits. Control of infected PCs is valuable on the black market, since the machines can be rented out, from one group of bad guys to another, and act as a kind of illicit supercomputer, sending spam, scanning Web sites for security holes, or participating in network attacks.

The army of Conficker-infected machines, known as a "botnet," could be one of the greatest cybercrime tools ever assembled. Conficker's authors just need to figure out a way to reliably communicate with it.

Infected PCs need commands to come alive. They get those commands by connecting to Web sites controlled by the bad guys. Even legitimate sites can be co-opted for this purpose, if hackers break in and use the sites' servers to send out malicious commands.

So far, Conficker-infected machines have been trying to connect each day to 250 Internet domains — the spots on the Internet where Web sites are parked. The bad guys need to get just one of those sites under their control to send their commands to the botnet. (The name Conficker comes from rearranging letters in the name of one of the original sites the worm was connecting to.)

Conficker has been a victim of its success, however, because its rapid spread across the Internet drew the notice of computer security companies. They have been able to work with domain name registrars, which administer Web site addresses, to block the botnet from dialing in.

Now those efforts will get much harder. On April 1, many Conficker-infected machines will generate a list of 50,000 new domains a day that they could try. Of that group, the botnet will randomly select 500 for the machines to actually query.

The bad guys still need to get only one of those up and running to connect to their botnet. And the bigger list of possibilities increases the odds they'll slip something by the security community.

Researchers already know which domains the infected machines will check, but pre-emptively registering them all, or persuading the registrars to neutralize all of them, is a bigger hurdle.

"We expect something will happen, but we don't quite know what it will look like," said Jose Nazario, manager of security research for Arbor Networks, a member of the "Conficker Cabal," an alliance trying to hunt down the worm's authors.

"With every move that they make, there's the potential to identify who they are, where they're located and what we can do about them," he added. "The real challenge right now is doing all that work around the world. That's not a technical challenge, but it is a logistical challenge."

Conficker's authors also have updated the worm so infected machines have new ways to talk to each other

Sunday, March 22, 2009

growth of iPhone gaming submitted by iGames Summit






When the iPhone was first announced, few people would have anticipated the waves the device would make in the gaming community.



 Now, only a few days before San Francisco’s Game Developers Conference, a separate iGames Summit addressed the growing popularity of the iPhone gaming platform.






Australian Internet prompts `blacklist'




SYDNEY, Australia - A whistle-blower organization claims a secret list of Web sites that Australian authorities are proposing to ban includes such innocuous destinations as a dentist's office.

Wednesday, March 18, 2009

iPhone offer Cut and paste enhancements to up coming version






Apple Inc. is updating its software for iPhones so that users can cut, copy and paste text — a basic computing feature that was missing from the gadget that seems to do everything.



At an iPhone event for journalists Tuesday at Apple headquarters, the company also pledged to broaden the way that third-party software programmers can build and sell content for the device.
Among other things, software developers now will be able to create applications that have items for sale within them, such as electronic books or additional levels of a video game. And developers will be able to access the music within users' iPhone libraries, so songs they own can be included in games, for example.



IBM in talks to buy Sun Microsystems




IBM Corp. is in talks to buy Sun Microsystems Inc. for at least $6.5 billion in cash, a deal that would shake up Silicon Valley and the corporate computing market, The Associated Press has learned



Wednesday, March 11, 2009

Battery breakthrough promises phone




PARIS (AFP) - Think of an electric car that can accelerate swiftly to cruising speed, laptop computers that can recharge in a couple of minutes rather than hours and a generation of super-miniature mobile phones. That's the vision sketched on Wednesday by a pair of scientists in the United States, unveiling an invention that they say could lead to a smaller, lighter and more power-packed lithium battery than anything available today. Current batteries made of lithium iron phosphate (LiFePO4) are good at storing large amounts of electricity but stumble at releasing it. They are better at dispensing the power in a steady flow than at discharging it or gaining it in a sudden burst.

Google to target ads based on Web surfing habits


Google will use the information it collects on people's Web surfing habits to show more ads tailored to their individual interests. Under the program announced Wednesday, someone who frequents sites about dogs might see more ads for flea treatment products. The program expands upon the Internet search leader's efforts to figure out which marketing messages are most likely to appeal to different people at different times. Google already makes billions of dollars showing ads tied to search requests and other content on a Web page. Now, it will analyze people's favorite Web sites to divine individual tastes and package ads falling under the same areas of interest.