ITunes was release to the world on January 9, 2001.Both iPod and iTunes played an important role in Apples eventual turnaround and its growth as the largest and most influential technology company on earth. With successive releases, iTunes became a significant part of people’s digital lives. With iTunes being a necessity for owners of iOS device, iTunes soon came to be a household name loved and loathed by its users.
ITunes 11 is the latest version of Apple’s music player and management software. Some of the users who have upgraded to iTunes 11 have found that the statistics are not being updated. This issue was linked to the use if iTunes cascade function. This minor issue in iTunes 11 is likely to be addressed in an upcoming update. This could be a bit of inconvenience to for those who wish to keep tabs on their songs and library. Another iTunes upgrade called as iTunes 11.01 is on the block. This upgrade fixes the bugs and issues of the earlier release.
Apple is a product development company and a maker of the popular iPhone and iPad. By opening a raft of retail stores last year in China, Apple has made China its fastest growing market. With China being the company’s second largest growing market, Tim Cook the chief executive of Apple has been meeting partners and government officials during his second visit to China this year. Apple saw the best ever Smartphone launch with a sale of more than 2 million iphone5’s in the country within three days of launch. There are also rumors in the market that Apple has a cheaper iphone in pipeline that is based on older technology. Apple is already manufacturing and selling smaller iphones called iphone 4 which is based on older technology. While manufacturing and selling a significantly cheaper iphone could be good for company sales, boosting market share at the expense of profit margins could be interpreted as the Cupertino technology giant blinking in the face of competition from Android and manufacturers such as Samsung and HTC.
In Dubai Police Publication,it is reported that one out of five of us have been affected by cyber criminals. And in reality, the number will increase because smart phones,social networking and cloud computing have become more common. To solve this, first make sure your smart phone is installed with anti software. It appears as if it is already installed but it does not have.We make sure our computers are safe, but not smart phones. So, cyber criminals are attacking them more,especially in the area of online banking. We need to see the protection (anti virus software) is there.Also ensure the password as impossible to find out. We should not give the password to anyone.
Gartner estimates that cyber criminals have stolen more than $3 billion from U.S. banks, businesses and municipalities using financial malware. The Anti-Phishing Working Group says that 39 percent of all computers are infected with financial malware designed to steal personal and account information. As a result, online banking account takeovers are growing at a rate of 150 percent each year, according to research published by the Financial Services Information Sharing and Analysis Center. But there are hundreds of antivirus products out there, some free and others high-end.
AV-Comparatives, an independent testing lab nestled in the mountains of Innsbruck, Austria, has tested 25 antivirus products and declared two to be the best: Bitdefender’s and Kaspersky Lab’s. (The two companies’ products were considered comparable in quality, but Bitdefender was granted the top slot because it hadn’t been selected before.) Products from Avast, Avira, BullGuard, Eset, F-Secure and G Data were also found to perform well. “Bitdefender is very strong, they’re a combination of signature-based detection, analytic detection, malware detection and behavior detection,” says Peter Stelzhammer, a co-founder of AV-Comparatives. Both Bitdefender and Kaspersky Lab were found to produce low false positive rates, which is important for corporate users. “If you have false positives most of the time, it can cost you more work than an infection,” Stelzhammer notes. The two products also tested well in administration tests: they were found to be easy to deliver to clients and scalable to a large number of users. “Of course, detection is the most important factor,” he says. “But these products are also lightweight, they don’t impact the system, and they’re easy for corporate users to handle.”
AV-Comparatives tests Windows, Mac, and mobile-based security software throughout the year. Although vendors pay to be considered in AV-Comparatives’ tests, “everyone pays the same amount,” Stelzhammer says. Vendors who don’t pay are included in the tests anyway and treated the same, he says. (Originally the company tried to get money from users, but “that didn’t work – readers don’t want to pay anything for information,” Stelzhammer says.) The products are all tested using the same automated testing framework, against the same malware, in collaboration with the University of Innsbruck, he says. In its “real world” tests, AV-Comparatives simulates a corporate environment and throws real-life malware at it. The testers actually visit malicious websites and fully download and execute malicious files. That gives the anti-malware software the opportunity to perform behavior detection as well as malicious file detection.
This is important for the spotting of brand-new strains of malware, for which there are no known fingerprints. Redwood Shores, Calif., security software company Imperva recently conducted an assessment of 40 antivirus products and concluded that by and large they don’t work well. That company, along with a group of students from The Technion – Israeli Institute of Technology, used 80 malware samples to test the effectiveness of these products and found that the initial detection rate for a newly created virus is less than 5%. These tests also found that some antivirus vendors take up to four weeks to detect a new virus from the time of an initial scan. But Stelzhammer believes these tests were faulty, due to the small sample size — AV-Comparatives uses more than 200,000 samples — and the lack of “real world” testing that includes the downloading of files for behavior analysis.
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications “top secret,” you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements). Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. Having control of your computer gives them the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you have a computer connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target. Intruders may be able to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data. Unfortunately, intruders are always discovering new vulnerabilities (informally called “holes”) to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. Also, some software applications have default settings that allow other users to access your computer unless you change the settings to be more secure. Examples include chat programs that let outsiders execute commands on your computer or web browsers that could allow someone to place harmful programs on your computer that run when you click on them.
Cyber security can be simply defined as protecting the computers,networks and programs with the help of technology from damage and unauthorized access.It can be simply considered as the protection of data or any files from unauthorised person or persons.It can be considered as a strong method to protect business in a modern way as loosing of any type of data may kill the business.cyber security can be made by well qualified persons in order to protect the cyber crimes.cyber security seems to the most important think nowadays as far as a big corporate and even for a small company is considered.cheating in many form occurs in the modern world due to the absence of proper cyber security,in the form of money transaction etc.Cyber security or the data stored in the computers are being destroyed in many form and the way in which they are destroyed are said as the attack of trojens,viruses,worms etc.So a firewall should be essential while working on line in order to protect the data and this protection of data is broadly said as
It will be too difficult to find correct information to safeguard your company details in 2013.The Australian Government’s DSD- Defence Signals Directorate’s Top 35 Mitiga
tion strategies is a very good beginning. The top 4 strategies can be considered as key in fighting with many cyber threats. These four can prevent 85% of intrusions.1. Applications Whitelisting should be used to prevent harmful software from running.2.Applications such a PDF reading, M.S Office, Java,flash player and web browsers should be protected. 3.Patching the operating system vulnerabilities.4. Number of users with administrative privileges should be decreased. This also compliments the Australian Government Information Security Manual(ISM).The banking and financial services, insurance organisations are protected by APRA- Australian Prudential Regulation Authority. AusCERT from University of Queensland gives regular bulletins for security professionals. CERT Australia makes the business understand what is normal behavior in their network so that they can easily find out the unusual behavior.
It’s been three months since a hacker got into the computer system at the South Carolina Department of Revenue and stole the personal information from 6.4 million taxpayers, their dependents, and businesses. But some state agencies have not put in place some recommended new computer security measures, while others won’t talk about what they have or have not done. After the hacking was discovered, security experts recommended that the Department of Revenue encrypt all its data, and add a new step for accessing computers that they say would likely have prevented the hack in the first place. It’s called dual authentication. Instead of needing only a username and password to log in to the computer system, users need a second authentication, which is a random number that changes every 30 or 60 seconds. Employees can have the numbers texted to their phones or they can carry small key fobs that show the changing numbers. The agency was also advised to use a monitoring service that watches its computer network around the clock for signs of hacking. The Department of Revenue has put in place all of those recommendations, or is in the process of doing so. Other agencies have also added that extra security, but not all agencies have added all of it. The Department of Public Safety is using 24/7 network monitoring. It encrypts some of its data but not all of it, and is studying whether to encrypt more. It’s moving to dual-factor authentication for access. The Department of Education says it encrypts student and teacher information and also uses identity management. The Department of Health and Human Services is using around-the-clock network monitoring, encrypts all its data and uses multi-factor authentication. The State Law Enforcement Division would not talk about what computer security measures it has in place. A spokesman says the agency doesn’t want to publicize any information that a hacker might use. The DMV, which has tons of personal information, also declined to talk about its specific computer security measures. State Treasurer Curtis Loftis says his agency’s network is monitored around the clock. “We banked $34 billion last year. We have $25 billion in a separate custody account for our investments. We manage a lot of money, and along with that comes a lot of responsibility,” he says. His agency encrypts some data and uses other methods on other information. He says the agency is moving to new, state-of-the-art computer security, though.
It’s a big day for Apple. The company announced it has passed the 40 billion download mark for its App Store, with that number deriving from unique downloads – rather than updates or multiple downloads of the same app – since the App Store’s creation in 2008. Even more impressively, almost half of that number came from 2012 alone. “It has been an incredible year for the iOS developer community,” Apple’s Senior Vice President of Internet Software and Services, Eddy Cue said an announcement released Monday morning. Cue also added that “developers have made over seven billion dollars on the App Store, and we continue to invest in providing them with the best ecosystem so they can create the most innovative apps in the world.”
To create some sense of context, Apple released a raft of figures that aimed to demonstrate just how successful the App Store has become. The company reported that the App Store currently offers more than 775,000 aps to iPhone, iPad and iPod Touch users across 155 countries, including more than 300,000 native iPad apps alone. Not only was 2012 the most successful year by far when it comes to App downloads (with nearly 20 billion downloads for the twelve month period), it ended on a highpoint with December seeing two billion app downloads by itself. More importantly, the number of iPads, iPods and iPhones given as holiday presents resulted in a whole new audience ready to see what new apps are out there. The Apple PR announcing the milestone came with testimonials from companies who have released apps via the App Store as to the wealth (both metaphorical and literal) that has been shared throughout the app ecosystem as a result of Apple’s success. “Our success on iOS has been incredible,” reported Samir Hanna, vice president of Consumer Products for Autodesk, going on to say “We set off with the modest goal of bringing SketchBook to iPhone users as a way of introducing them to Autodesk.
Fast forward three years, we now offer 20 apps to iOS users that have achieved more than 50 million downloads, and we continue to roll out new creativity and design tools that appeal to both professionals and consumers.” Movie director and Star Trek empresario J.J. Abrams added “The App Store provided us with opportunities beyond our wildest dreams” in reference to Bad Robot’s Action Movie FX app. “We’re just thrilled that millions of fans around the world were as excited as we were about the possibilities that this app brings.” The obvious question now is whether the velocity of app downloads will continue to increase over the next year or whether the two billion in one month figure represents a high water mark. How long before Apple’s App Store hits its 100 billionth download? Probably not too far away at all.
Authorities are warning people to disable Java software on their systems on a temporary basis as hackers have found a vulnerability in the coding that can be exploited. They are using it to install malicious software on PC’s which gives them full rein to commit identity theft or make the system a part of an ad-hoc network that can be used to attack websites. It is also possible for an attacker to upload malicious software onto a previously uninfected website, thus trapping users who trust it because they haven’t experienced any problems with it before. Java is a technical language that can be used on any operating system. Developers use it to write just about any internet or other software application, which is why a Bug in the software has all the more potential for harm. Oracle Corp launched an update to the Java software in response to the threat and the damage already done. However, the update has failed to fix several security flaws and researchers are not yet ready to declare that its safe to enable the software again. The update consisted of fixes for 2 vulnerabilities in Java 7 for web browsers. The security settings for Java have also been set on ‘high’ by default. Java was the prime target(50%) for the kind of cyber attacks that involve hackers using bugs into software to break into PC’s last year. Adobe Reader was the target for 28% of them, followed my Microsoft Windows and Internet Explorer, which were the target in 3% of the attacks.