Friday, 22 November 2013

Report: Snapchat Turns Down $3 Billion Offer From Facebook

3snapchat_facebook
The messaging app Snapchat is once again the focus of acquisition rumors as a new report claims that the company recently turned down a $3 billion offer fromFacebook.
According to sources in contact with The Wall Street Journal, Facebook made an offer of “$3 billion or more,” but Snapchat cofounder Evan Spiegel is opting to wait until 2014 in hopes of a better valuation for the company

Ohh what a features of Android KitKat 4.4

We already wrote about the notable features of KitKat, however this will be a more detailed article about what you can expect in the new version. As you probably know Android operating system powers one billion smartphones and tablets across the globe. But things just got sweeter with the launch of KitKat. In Google's words “Android KitKat brings all of Android's most innovative, most beautiful, and most useful features to more devices everywhere.” While KitKat can work with different RAM, as well as devices with low 512MB limit, this new version is definitely much more agile and responsive to changes. In this article, I will be discussing new features of Android that will help both developers and users alike.

Full-Screen Immersive mode

Now you can take advantage of the very last pixel on the screen. Be it smartphone or tablet, Android 4.4 adopts a full-screen immersive mode that allows you to create UIs reaching from edge to edge, hiding all menu and navigation bars and chrome to create a full screen app for users. This feature simply conceals entire system interface even while users are interacting with your app or game. You can eliminate all forms of visual distraction for richer user experience. It comes across as a very handy feature news app, e-readers, books, videos, and games. KitKat has a new gesture where a user can reveal navigation, menus and buttons by swiping from top or bottom.

Animate Between Scenes

KitKat 4.4 allows developers to animate between different events within the app by utilizing a new transitions framework. This framework allows developers to define and animate scenes based on the time a user enters or exits app. So now you can provide features such as fades, resizing, and much more. You can automatically manage animations and transitions by a feature called TransitionManager which allows you to set specific scenes.

Screen Recording

Now developers can create video of apps from an Android device. The screen recording utility lets you capture video of your app and save as an MP4 file. You can record at any device-supported resolution and share directly from the device to computer for post-production. You can access screen recording function from Android Debug Bridge (ADB) tool in the Android SDK or via Android Studio integrated developer environment.

Near Field Communications Platform Support

Host Card Emulation (HCE) in Android 4.4 supports Near Field Communications (NFC) transactions. This feature enables Android NFC device to be used for secure mobile payments and no provisioned secure element (SE) in the device is needed. Application Identifier (AID) can route various NFC function from the hardware in a device to the right app. While HCE does not eliminate the need for an NFC chip in a device, it essentially makes NFC compliant and widely available.

Print API

Printing with Android gets a lot easier. With KitKat, your Android apps will print content either through a Wi-Fi setup or the cloud. Android 4.4 has introduced native platform support along with application programming interfaces for new types of printer support. Now it will be easy for printer makers to make their devices compatible using APIs and build apps available in Google Play for users to download for specific printers.

Infrared Blasters

Ever thought of controlling your electronic devices from your smartphone? Well, here is your chance. Now developers can tap into the fact that if your Android phone has infrared support, the application programming interface will tune the frequency from the phone to the remote it is pointed at.

New Bluetooth Profiles

Android KitKat 4.4 supports two new Bluetooth profiles that lets apps support a broader range of low-power and media interactions. Bluetooth HID over GATT (HOGP) gives apps a low-latency link with low-power peripheral devices whereas Bluetooth MAP lets apps exchange messages with a device in near location.

Translucent system UI styling

Now you can maximize the impact of your content with all new window styles and themes for translucent system UI. Subtle gradients are shown behind the system bars to ensure that navigation bar buttons or status bar information are legible.
Conclusion: KitKat marks a significant step forward for Android and aims at changing the ways users interact with Android phones and tablets. This new operating system makes Android far more receptive to change and less robotic. It understands pulse of the user and simplify android app developer's life for sure. Certainly so far KitKat is developer's delight.
Types of Attacks on a System



These are the Passive type of Computer Attacks:
Eavesdropping:
 This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.
Identity spoofing:
Every computer has an IP address, due to which it is considered as a valid and independent entity on the network. One of the common computer attacks is to assume the identity of another computer. Here IP packets may be sent from valid addresses and gain access to a particular IP.once access is gained, the data on the system may be deleted, modified or rerouted .Alternatively, the hacker can make use of this hacked IP and cause attacks on the other systems within or outside the network.
Snooping Attacks:
This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand involves someone searching through your electronic files trying to find something interesting.
Interception:
This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.
Replay Attacks:  (Replay an authentication session to fool a computer into granting access)
These are becoming quite common, this occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as Kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.
Data Modification Attacks:
This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.
Repudiation Attacks:
This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email server and inflammatory information to others under the guise of one of your top managers. This information might prove embarrassing to your company and possibly do irreparable harm. This type of attack is fairly easy to accomplish because most email systems don't check outbound email for validity. Repudiation attacks like modification attacks usually begin as access attacks.
Dos Attacks:
Denial of service (DoS) forces the target computer to allocate so much memory for TCP connections so that it runs out of memory.
1.     Ping of death - Uses IP to cause large packets to be reassembled in order to make the target computer crash.
2.     A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack.

DDos Attacks:
Distributed Denial-of-services this is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and Cable. The conclusion is that uses many machines to attack one system or network.
Password Guessing Attacks:
This occurs when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:

Brute-force attack: Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.
Dictionary attack: This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.



Man-in-the-Middle Attacks:
During this attack an attacker can read, insert and modify any messages between two other people or computers without either victim knowing that the connection between them has been compromised. The attacker can observe and intercept messages going between the two victims. The attacker can change the message content going to both victims.
Back door Attacks:
Also called a trapdoor this can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running.
The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as earlier versions), Subseven, NetBus, and Net Devil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Spoofing Attacks:
A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against networks hosts, steal data, spread malware, or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this. Some of the most common methods include IP address spoofing attacks, ARP (Address resolution Protocols) spoofing attacks and DNS server spoofing attacks.
Compromised-Key Attacks:
To store sensitive data, a secret code or number may be used. Obtaining the key is no doubt a real huge task for the hacker; it is possible that after intense research the hacker is indeed able to lay his hands on the key. Once the key is in possession of the hacker will now have access to the sensitive data and can make change to the data.However, there are also chances that the hacker will try different permutations and combination of the key to gain access to other sets of sensitive data as well.
Application-Layer Attacks:
The aim of the application layer attack is to cause fault in the server’s operating system once a fault is created in the operating system, the hacker is able to gain access to the server controls. This in turn leads to the hacker modifying the data in various ways. A virus may be introduced into the system or may send numerous requests to the server, which can result in its crash or security controls may be disabled, due to which restoring the server back can became difficult.






The Cisco 2013 Annual Security Report & Security Intelligence Operations

Standing Up to Threats: The Cisco 2013 Annual Security Report & Security Intelligence Operations [Infographic]

asrsio1