Wednesday 14 October 2015

Crippling Linux Botnet Strikes Gaming, Education Sites


Botnet
Botnet Plundering Linux Computers – Attack Powerful


The IT world has recently revealed that a botnet has been plundering the Linux computers and the attacks seem to be quite powerful. Several of the targets seem to be in Asia and the security experts are making efforts in tracking them and the botnet appears to be of Asian origin.

A network of Linux computers seems to be flooding gaming as well as education sites with about 150 gigabits per second of malicious traffic, according to Dan Goodin of Ars Technica, which in some cases is adequate to knock the targets offline.

This is a DDoS – distributed denial-of-service network and the discoveries are from Akamai Technologies. The Security Intelligence Response Team – SIRT, at Akamai reflected the botnet XOR DDoS as `High Risk’ in an advisory posted recently.

 It is said that the XOR DDoS botnet had developed and now has the potential of mega DDoS attacks at 150 plus Gbps and are utilising a Trojan malware in hijacking the Linus system. The first access was obtained by brute force attacks in order to discover the password to Secure Shell services on a Linux machine. When the Login has been attained, the attackers used root privileges in order to run a Bash shell script, thereby downloading and executing the nasty binary

SIRT Tracking XOR DDoS – Trojan Malware


Akamai’s Security Intelligence Response Team has been tracking XOR DDoS, which is a Trojan malware that DDoS attackers seemed to have used in hijacking Linux machines in building a botnet for distributed denial of service attack campaigns with DNS and SYN floods.

Some of the key points observed by Akamai were that the gaming sector had been the main target, which was followed by educational institutions. The botnet seemed to attack around 20 targets each day, 90% of which were from Asia.

The malware tends to spread through Secure Shell – SSH services vulnerable to brute force attacks owing to weak passwords. This could turn from bad to worse. The team at Akamai expect the XOR DDoS activity would continue since attackers refine and improve their methods, inclusive of a more diverse selection of DDoS types of attack.

Advisory Describing DDoS Mitigation/Malware Removal Information Available


As per the Akamai team, the IP address of the bot seems at times hoaxed though not always. The botnet attacks noticed that in the DDoS campaigns against Akamai consumers were a mixture of hoaxed and non-hoaxed attack traffic. According to Lucian Constantin of IDC News Service recently stated that this power to generate crippling attacks at more than 150 Gbps represent several time greater than a usual company’s organization could endure.

 In the meanwhile an advisory describing this threat inclusive of DDoS mitigation payload analysis as well as malware removal information is made available for download from Akamai. Eliminating the XOR DDoS malware seems to have a four step procedure wherein most of the scripts are provided in the advisory.

Senior vice president and general manager of Akamai, Stuart Scholly has said that XOR DDoS is an example of attackers switching focus and developing botnets utilising compromised Linux systems to launch DDoS outbreaks. This occurs more frequently now than earlier, when Windows machines were the main targets for DDoS malware.

Monday 12 October 2015

Researchers Use Augmented Reality to Turn Coloring Books into 3D Experience

Disney

Colouring App Developed – Disney Research


A colouring app developed by Disney Research could cause characters to spring from the page in a 3D wonderthrough augmented reality. A child tends to colour a character on the book page normally while a smartphone or tablet running the app tends to monitor the drawing.

Based on the colouring of the child, the app fills the colours in real time on a 3D animated version of the character which is visible on the screen of the device and integrates it into a video. The core focus on the traditional activity of the colouring is maintained by the app while providing the magical digital overlay which tends to improves the engagement.

User testing performed by adults rather than the children in the early study, researchers observed that most of the users informed that the app increased their enthusiasm to draw in colouring books while 80% stated that the app increased their feeling of linking with the character.

Disney researchers, ETH Zurich as well as the Swiss university EPFL presented the augmented reality app at the ISMAR 2015 – IEEE International Symposium on Mixed and Augmented Reality in Fukuoka, Japan.

Disney Color & Play


Though the work of the research was presented to scientific audience, it had gone through the tech transfer process already, motivating the commercial product known as `Disney Color and Play’ which was launched earlier in the year by Disney Publishing Worldwide and Bendon.

The work tends to fit in a huge initiative known as Augmented Creativity at Disney Research that aims on utilising augmented reality in improving creative play. Robert W, Sumner, principal research scientist leading the group on animation and interactive graphics at Disney Research stated that `augmented reality holds unique and promising capabilities in bridging between real world activities and digital experiences enabling user in engaging their imagination and boost their creativity.

They are thrilled to have the opportunity in presenting the scientific advances behind this technology and are particularly happy that it is available to consumers, thanks to the cooperation with Disney Publishing’.

App Functions on Device With Camera


The researchers, inorder to create a new experience, at first created animated 3D virtual characters and then utilised custom software in generating 2D line art representations of the characters for colouring book.

 The app functioning on a device with a camera that viewed the user and the colouring book automatically detects the character the user tends to colour, displaying the 3D version. As the child progresses with the colour to the 2D drawing, the app tends to apply the same colour to the 3D characters in the areas visible in the 2D drawing as well as to the remainder of the 3D form which is not visible in the book.

 Owing to the colouring occurring in real time, the illusion is developed that the user is also colouring the blocked areas with the same texturing of the colour. Defining how to apply colour to the blocked areas seems one of the most difficult issue, according to Sumner.

By mirroring the user’s strokes on colours does not seem to work since the patter of colours used for a character’s face would not be the same for the back of the character’s head. The colour also needs to be continuous in order that no seams are seen between the visible areas and the blocked areas or where dissimilar portions of the textures tend to meet.

Google Patent Application is about Head Display with Holograms

patent

Google’s Patent Application for Holograms


Google has filed a patent application regarding holograms and the heading in the application states `Lightguide with several in-coupling holograms for display inhead wearable’. The two inventors named are Evan Richards and John Perreault and the application had been first filed in March 2014. Observer state that this could be linked to hardware platform for Magic Leap’s augmented reality content.

 Josh Constine in TechCrunch commented that `the patent contextualizes Google Inc.chief $542 million funding round for improved reality start-up Magic Leap. In TechCrunch, Constine seems to be asking Google - `when asked about the patent and its significance, he received from Google, a boilerplate no-comment response:

We hold patents on a variety of ideas, some of those ideas later mature into real products or services, and some do not. Prospective product announcement should not necessarily be inferred from our patents’. Jon Mundy had stated in TrustedReviews that the technology discussed in the patent application would overlay computer-generated imagery over the real world, not entirely unlike to Microsoft’s HoloLens.

The patent application reads – Single eye displays are referred as monocular HMDs while double eye displays are considered as binocular HMDs. Some HMDs display only CGI -computer generated image and other types of HMDs are capable of covering CGI overreal world view.

Patent Describes Technology – Several CGI Holograms


The later type of HMD includes come kind of see-through eyepiece and could serve as hardware platform in comprehending augmented reality. With this the viewer’s image of the world is amplified with an overlapping CGI as well as referred to as heads-up display –HUD.

The patent tends to describe technology which would enable several CGI holograms to appear in real world while the user seems to be wearing a see-through smart eyepiece. It would focus on the problem of mapping real world light sources on AR digital substances.

It means holograms, an extremely complicated issue and one which oculus Rift CEO Brendan Iribe stated as a purpose in pursuing VR over AR. The only reference of the field of view is in the list of encounters for headgear though it is expected that Google would be looking into developments on Microsoft’s hard work.

With regards to the uses of AR, Google’s patent states that the `public safety applications comprise of tactical displays of maps and thermal imaging. Other application field consist of transportation, video games,and telecommunications.

Magic Leap – Content Provider for Google Glass


There are sure to be new found applied and leisure applications as the technology evolves, but several of these applications tend to be limited due to the cost, weight, size, field of view and the efficiency of conventional optical system utilised in implementing prevailing HMDsMagic Leap had been very discreet with regards to what hardware its amplified reality software would essentially run on.

Mikhail Avady, StartUp Legal’s founder who had monitored Magic Leap’s latest AR content trademark application, had informed TechCrunch that `they believe Google wants Magic Leap to be the content provider for Google Glass and if they look at the trademark application it shows story and content based trademarks.

 Magic Leap wants to turn the world into a movie theatre and Google want it to be through Glass’.Presently it seems to be all assumption though it could be based on research, patents and investments and hence could be the safest form on which to place your dreams and hopes for the impending of improved reality

Friday 9 October 2015

IBM Breakthrough Improves Carbon Nanotube Scaling Below 10nm

nanotube

IBM – Beneficial Scaling Abilities in Carbon Nanotubes


IBM has invested a great amount of time and effort in researching carbon nanotubes – CNTs in the past few years. The presence of single walled carbon nanotubes together with their marvellous semiconductor properties happened independently at NEC as well as at IBM with Big Blue being interested in capitalizing on the discovery for over a decade.

Researchers at IBM published a paper wherein they claimed to have demonstrated extremely beneficial scaling abilities in carbon nanotubes. Discussions were on, regarding the difficulties of scaling semiconductors since the distance between features tends to contract with each passing generation.

However the specific breakthrough which IBM tends to claim is in an area of chip design and not much has been discussed over it. In the case of conventional silicon, a known problem as semiconductors tends to shrink and the contact area from the metal and semiconductor has not been scaling.

Smaller contact area, generally lead to increased resistance which means higher heat. Manufacturers have battled against these developments with various methods. However the lack of contact scaling seems to be one of the main barriers in pushing silicon to ever smaller sizes.

Carbon Nanotube Technology – Solution to Problem


IBM is of the opinion that its carbon nanotube technology could solve that issue. EETimes has an amazing write-up of the technology, though it amusingly refers to EUV lithography as `already in place’, a declaration which would surprise Intel as well as TSMC. With the recent innovation,Shu-Jen Han, IBM Manager of nanoscale science and technology at its T.K. Watson Research Centre informed EE Times that `they know how to scale and it is no longer the limiting factor for carbon nanotube transistors.

 The new contacts are measured in angstroms and they have just 36 k-ohms of resistance inclusive of both ends’. The new method involves welding – nanowelding – nanotube with molybdenum prior to self-align as transistor channels. The last step is to heat the assembly to around 850C, melting the molybdenum off and developing carbide. Richard Doherty of Envision engineering is of the opinion that this solution gives IBM an exceptional advantage in scaling along the way to 1.8nm.

Group Evaluating Changes to Measuring Standards


IBM could be preparing the technology, in readiness at the 5nm node for the introduction at 3nm and below, according to EETimes. With the method which has already been proven in theory at 9nm, it seems to be a bit of a block to further scaling. However, there are some cautions pointed to these findings.

Firstly, the fact that IBM is presently capable of building p-type transistors utilising this method which does not mean that the technology seems useless. Several of the proposed near term solutions for enhanced silicon scaling depends on various materials for the p-channel and n-channel, though it positively presents additional complexity.

The International Technical Roadmap for Semiconductors had not been issued since 2013 and the group is presently evaluating changes to its measuring standards for formulating latest reports. However the 2013 data set is yet online and viewing it, the roadmap for near term introduction of carbon nanotubes is not very appealing.

How to Tackle the Network Intruders

network_

Spotting intruders on Network


Spotting intruders on network could take a long time and according to Peter Woollacott, head of security firm Huntsman, he states that `the time between attacks and detection could stretch to 200 days. It tends to take so long since there is a shortage of capable security analysts but there seems to be huge amount of technology with provision for threat information’.

Analysis recommends one reason US retailer Target suffered one of the largest data breaks in American corporate history was due to the company’s threat detection systems overwhelmed its security staff with fake alarms and in the midst of all the noise they failed to recognize the real intruders.

There were some clues that infidelity site Ashley Madison had also been exposed by an insider who had taken data from its internal network. According to chief technology officer at Trend Micro, Raimund Genes, and thereason for so much data to siftthrough is due to the intruders changing their tactics.He added that they usually began with a social engineering attack and grab information from Facebook to sound believable, making it appear that they know you’.

Fake Familiarity to Trick People


This fake familiarity tends to trick the people in opening a booby-trapped email, enabling them to steal credential which are then utilised to get at a company network. Probably it could lead to a link which provides the attacker entry to a work computer.

Mr Genes states that for that reason, several firms tend to monitor what occurs on their internal network, a space which earlier they had presumed to be trustworthy. Several of the companies operate on a `castle and moat’ basis though this means that their defences being strong are largely outward facing.

 They could miss the attacks which could come from within, or perhaps by sappers channelling under the walls or vandals that have made their way in tricking them. Rotating their defences inward could resolve this issue. However, May Turner from security firm Solar Winds, states that watching all that internal traffic on an intranet is hard. The infrastructure has got very complex and there are a lot of moving parts.

Machine Power for Information Collection – Essential


On daily operations each device on the network tends to generate information on what it is doing. The image is more complicated by the way modern threat intelligence systems monitor as well report the activity on the intranet which could sum up to million if not billions, with each daily event in need of analysis.

Turner state that the importance lies in understanding what is happening on that network and whether the events seem to be normal. The patterns are probably unique to that network so more traditional approaches established around signatures of known attacks could be less useful.

Gradually companies as well as large organisations are revolving to tools which tend to watch traffic flows around their networks, alerting their staff to irregularities. Several modern attacks those which begin with emails hoaxed to look like they have come from some known person do not resemble an attack since they have used your login name and password.

 It seems like you are logging in. On the contrary, the cyber thieves utilise the stolen identifications to navigate the network and obtain valuable resources. Mr Woollacott is of the opinion that machine power to do some of the information collection is essential. Anomaly detection is great, it is very powerful though it needs to be utilised in combination with high speed procedures