Friday, July 5, 2013

Samsung is to spend $4.5 billion on R&D



Research and development spending is absolutely crucial for leading technology companies that hope to stay on 
top, and Samsung is a company that isn’t afraid to spend when it comes to R&D. The company has stated in the past that it planned to make some huge investments in marketing and R&D in an effort to keep rivals at bay, and now The Korea Timesreports that Samsung will spend roughly $4.5 billion over the next three years solely to build five new research and development centers in South Korea. “R&D is crucial to ensuring success in the rapidly-changing consumer electronics industry. Total investment will amount to 5 trillion won,” an unnamed Samsung executive told the paper. The exec said that one design center alone, which will be built in southern Seoul, will house nearly 10,000 Samsung designers, developers and other R&D workers. Samsung spent approximately $10.5 billion on R&D in 2012 alone, while top rival Apple spent about $3.4 billion.

Thursday, July 4, 2013

A massive protest have planned over web NSA spying revelations

The NSA's actions were revealed by whistleblower Edward Snowden
Some of the web's biggest names have backed mass protests over internet surveillance carried out by the US National Security Agency (NSA).
The Restore the Fourth movement - referring to the US constitution's fourth amendment - said it wants to end "unconstitutional surveillance".
Reddit, Mozilla and Wordpress are among the big web names backing the action, due to take place on Thursday.
Almost 100 events have been planned across the US.
An interactive map detailing their locations has been published.
The site quotes a line from the fourth amendment which pledges "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures".
As well as the "real-world" protests, many influential websites plan to display messages of protest on their homepages on Thursday, co-ordinated by a group called the Internet Defence League (IDL).
Petition
The action has taken inspiration from similar efforts that took place last year.
Wikipedia, Google and others went "dark", or put black boxes over parts of their pages, to show their disagreement with proposed anti-piracy measures being discussed by US lawmakers.

In reaction to the revelations made by whistleblower Edward Snowden, Mozilla, maker of the widely used Firefox browser, launched stopwatching.us - a petition calling for full disclosure of the US's "spying" programmers.
At the time of writing, the site had amassed 536,559 signatures. Dissident Chinese artist Ai Weiwei is listed as being among the petition's backers.
The demand comes at a time when one top US intelligence official was forced to apologise for telling Congress in March that the NSA did not have a policy of gathering data on millions of Americans.
National intelligence director James Clapper said in a letter to the Senate intelligence committee that his answer had been "clearly erroneous".

Source:BBC

Twitter is going to use cookies for ad targeting

Twitter is only the latest Web company to use cookies, which have been deployed for years by firms like Google Inc, Facebook Inc, Amazon Inc and practically every other major website. These small files, placed on Web surfers' computers, contain bits of information about the user, such as what other sites they have visited or where they are logging in from.
In the case of Twitter, the company will further allow retailers to attach anonymous versions of their customers' email addresses, known as hashes, to Twitter's advertising engine to individually target their customer base.
Privately owned Twitter, valued at close to $10 billion by investors, has ramped up its advertising capabilities ahead of a widely expected initial public offering in 2014.
Twitter's new feature, which is expected to raise advertising rates and revenues for the company, arrives in the midst of heightened public debate over the erosion of online privacy.
In recent years both the European Union and the U.S. Federal Trade Commission have probed the extent of tracking technologies used by sites like Facebook. Last year, European authorities began requiring websites to inform visitors that cookies were being placed on their computers.
Twitter noted in a blog post Wednesday that its use of cookies was "how most other companies handle this practice, and we don't give advertisers any additional user information."
In a blog post on Wednesday, Twitter said it would give its users the option of disabling cookies by enabling a "Do Not Track" option in their browser. Many leading browsers such as Mozilla Firefox and Internet Explorer contain such options. Twitter users can also wholly opt out of ads tailored by outside data by opening their account settings, the company said.

The efforts by authorities, particularly in Europe, to clamp down on tracking technologies have spurred a furious backlash from the media and technology industries, which argue that cookies are critical to practically the whole $100 billion internet advertising market.
Via: Reuters

Samsung blames Apple wouldn’t have sold a single iPhone without stealing our technology


Another day, another Apple (AAPL) vs. Samsung (005930) trial. The two consumer electronics companies are preparing to do battle in San Jose, California next week, and now-public court documents shed light on the positions each firm is taking. On Tuesday, Apple told Samsung exactly what it thinks its technology patents are worth (spoiler: barely anything at all), and subsequent filings from Samsung reveal that the South Korea-based company has a few choice words for Apple as well.
As highlighted by The Wall Street Journal, Samsung’s trial brief pulls no punches in telling the court exactly where it stands regarding Apple’s repeated patent-related accusations. In short, Apple is the thief here, not Samsung. A few key excerpts (emphasis is ours):
Samsung has been researching and developing mobile telecommunications technology since at least as early as 1991 and invented much of the technology for today‘s smartphones.Indeed, Apple, which sold its first iPhone nearly twenty years after Samsung started developing mobile phone technology, could not have sold a single iPhone without the benefit of Samsung‘s patented technology.
For good measure, Apple seeks to exclude Samsung from the market, based on its complaints that Samsung has used the very same public domain design concepts that Apple borrowed from other competitors, including Sony, to develop the iPhone. Apple‘s own internal documents show this. In February 2006, before the claimed iPhone design was conceived of, Apple executive Tony Fadell circulated a news article that contained an interview of a Sony designer to Steve Jobs, Jonathan Ive and others. In the article, the Sony designer discussed Sony portable electronic device designs that lacked “excessive ornamentation” such as buttons, fit in the hand, were “square with a screen” and had “corners [which] have been rounded out.”
Contrary to the image it has cultivated in the popular press, Apple has admitted in internal documents that its strength is not in developing new technologies first, but in successfully commercializing them. . . . Also contrary to Apple‘s accusations, Samsung does not need or want to copy; rather, it strives to best the competition by developing multiple, unique products. Samsung internal documents from 2006, well before the iPhone was announced, show rectangular phones with rounded corners, large displays, flat front faces, and graphic interfaces with icons with grid layouts.
Apple relied heavily on Samsung‘s technology to enter the telecommunications space, and it continues to use Samsung‘s technology to this day in its iPhone and iPad products. For example, Samsung supplies the flash memory, main memory, and application processor for the iPhone. . . .  But Apple also uses patented Samsung technology that it has not paid for. This includes standards-essential technology required for Apple‘s products to interact with products from other manufacturers, and several device features that Samsung developed for use in its products.
It’s clear that we’re in for yet another action-packed adventure when the trial kicks off next week.

Via: Bgr

Samsung sell 20 million s4 units

Samsung's Galaxy S4 is still selling extremely well, a new report out of Korea claims.
Samsung has sold 20 million Galaxy S4 units worldwide since that device's launch two months ago, Korea-based news outlet Yonhap News is reporting (Translate Page). That's roughly 1.7 times faster than sales of the Galaxy S3 (that's global channel sales, not sales to consumers) at the same point in that device's life cycle.

Samsung has yet to confirm that it has sold 20 million units. The company will hold its earnings call later this week, and could announce the sales milestone at that time.


(Source: Engadget)

Wednesday, July 3, 2013

Does Microsoft Helps NSA Hacker?

Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.


These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.
Many of these same Internet and telecommunications companies voluntarily provide U.S. intelligence organizations with additional data, such as equipment specifications, that don’t involve private communications of their customers, the four people said.
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency (0112917D), the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.

Microsoft Bugs

Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.
Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.
Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.
In an e-mailed statement, Shaw said there are “several programs” through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.

Willing Cooperation

Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.
In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.
The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.
Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.’s major spy agencies, the people familiar with those programs said.

‘Thank Them’

Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”
“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.
Cooperation between nine U.S. Internet companies and the NSA’s Special Source Operations unit came to light along with a secret program called Prism. According to a slide deck provided by Snowden, the program gathers e-mails, videos, and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges.
U.S. intelligence agencies have grown far more dependent on such arrangements as the flow of much of the world’s information has grown exponentially through switches, cables and othernetwork equipment maintained by U.S. companies.

Equipment Specs

In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.
Typically, a key executive at a company and a small number of technical people cooperate with different agencies and sometimes multiple units within an agency, according to the four people who described the arrangements.

Committing Officer

If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.
Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.
Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.
McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.

McAfee’s Data

McAfee (MFE)’s data and analysis doesn’t include information on individuals, said Michael Fey, the company’s worldwide chief technology officer.
“We do not share any type of personal information with our government agency partners,” Fey said in an e-mailed statement. “McAfee’s function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity.”
In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.
In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.

China’s Military

Following an attack on his company by Chinese hackers in 2010, Sergey Brin, Google’s co-founder, was provided with highly sensitive government intelligence linking the attack to a specific unit of the People’s Liberation Army, China’s military, according to one of the people, who is familiar with the government’s investigation. Brin was given a temporary classified clearance to sit in on the briefing, the person said.
According to information provided by Snowden, Google, owner of the world’s most popular search engine, had at that point been a Prism participant for more than a year.
Google CEO Larry Page said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Snowden’s disclosures and that the Mountain View, California-based company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. He said Google provides user data to governments “only in accordance with the law.”
Leslie Miller, a spokeswoman for Google, didn’t provide an immediate response June 13.
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.

Metadata

That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.
According to Snowden’s information, Blarney’s purpose is “to gain access and exploit foreign intelligence,” the Post said.
It’s unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge’s order.

Less Scrutiny

Stewart Baker, former general counsel for the NSA, said if metadata involved communications between two foreign computers that just happened to be crossing a U.S. fiber optic cable “then the likelihood is it would demand less legal scrutiny than when communications are being extracted one by one.”
Lawmakers who oversee U.S. intelligence agencies may not understand the significance of some of the metadata being collected, said Jacob Olcott, a former cybersecurity assistant for Senator John D. Rockefeller IV of West Virginia, the Democratic chairman of the Senate Commerce Committee.
“That’s what makes this issue of oversight so challenging,” said Olcott, now a principal at Good Harbor Security Risk Management in Washington. “You have a situation where the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs.”
While companies are offered powerful inducements to cooperate with U.S. intelligence, many executives are motivated by patriotism or a sense they are defending national security, the people familiar with the trusted partner programs said.

Einstein 3

U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems’ architecture or equipment schematics so the agencies can analyze potential vulnerabilities.
“It’s natural behavior for governments to want to know about the country’s critical infrastructure,” said Chisholm, chief security officer at Irvine, California-based Cylance Inc.
Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.
Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn’t authorized to discuss the matter.

AT&T, Verizon

Before they agreed to install the system on their networks, some of the five major Internet companies -- AT&T Inc. (T), Verizon Communications Inc (VZ)., Sprint Nextel Corp. (S), Level 3 Communications Inc (LVLT). and CenturyLink Inc (CTL). -- asked for guarantees that they wouldn’t be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn’t meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.
Mark Siegel, a spokesman for Dallas-based AT&T, the nation’s biggest phone carrier, declined to comment. Edward McFadden, a spokesman for New York-based Verizon, the second-largest phone company, declined to comment.
Scott Sloat, a spokesman for Overland Park, Kansas-based Sprint, and Monica Martinez, a spokeswoman for Broomfield, Colorado-based Level 3, didn’t immediately respond to requests for comment.
Linda Johnson, a spokeswoman for Centurylink, formerly Qwest Corp., said her Monroe, Louisiana-based company participates in the Enhanced Cybersecurity Services program and the Intrusion Prevention Security Services program, which includes Einstein 3. Both programs are managed by the U.S. Department of Homeland Security.
Beyond that, she said, “CenturyLink does not comment on matters pertaining to national security.”
To contact the reporter on this story: Michael Riley in Washington at
Source: Bloomberg

The biggest data breach on Facebook, 6 million user’s contact info exposed

Facebook accidentally shared 6 million users' email addresses or telephone numbers due to a software bug, the company announced Friday.
The breach was caused by an unfortunate combination of Facebook's "People You May Know" and "Download Your Information" features. "People You May Know" offers friend suggestions based in part on other users' uploaded contact lists or address books; "Download Your Information" offers a downloadable version of your Facebook Timeline archive.
When some users downloaded their Facebook archives with "Download Your Information," the archive included contact information for second-tier connections with whom Facebook thought those users might want to connect but who hadn't yet received or approved a friend request from that user. Translation: Data breach.
Facebook says for every email address or phone number lost in the breach, each individual piece of information was included in an archive download "only once or twice." Facebook has no evidence there was any malicious exploitation of the bug before it was found and the service was deactivated.
A security researcher found the bug and reported it to Facebook, which shared details about it on its Facebook Security page, posted in full below. Facebook says it's notifying government regulators to the problem.
All affected Facebook users will be notified via email. Have you received an e-mail about the data breach from Facebook? Are you concerned about the breach? Tell us in the comments.
At Facebook, we take people’s privacy seriously, and we strive to protect people’s information to the very best of our ability. We implement many safeguards, hire the brightest engineers and train them to ensure we have only high-quality code behind the scenes of your Facebook experiences. We even have teams that focus exclusively on preventing and fixing privacy-related technical issues before they affect you.
Even with a strong team, no company can ensure 100% prevention of bugs, and in rare cases we don’t discover a problem until it has already affected a person’s account. This is one of the reasons we also have a White Hat program to collaborate with external security researchers and help us ensure that we maintain the highest security standards for our users.
We recently received a report to our White Hat program regarding a bug that may have allowed some of a person’s contact information (email or phone number) to be accessed by people who either had some contact information about that person or some connection to them.
Describing what caused the bug can get pretty technical, but we want to explain how it happened. When people upload their contact lists or address books to Facebook, we try to match that data with the contact information of other people on Facebook in order to generate friend recommendations. For example, we don’t want to recommend that people invite contacts to join Facebook if those contacts are already on Facebook; instead, we want to recommend that they invite those contacts to be their friends on Facebook.
Because of the bug, some of the information used to make friend recommendations and reduce the number of invitations we send was inadvertently stored in association with people’s contact information as part of their account on Facebook. As a result, if a person went to download an archive of their Facebook account through our Download Your Information (DYI) tool, they may have been provided with additional email addresses or telephone numbers for their contacts or people with whom they have some connection. This contact information was provided by other people on Facebook and was not necessarily accurate, but was inadvertently included with the contacts of the person using the DYI tool.
After review and confirmation of the bug by our security team, we immediately disabled the DYI tool to fix the problem and were able to turn the tool back on the next day once we were satisfied that the problem had been fixed.
We've concluded that approximately 6 million Facebook users had email addresses or telephone numbers shared. There were other email addresses or telephone numbers included in the downloads, but they were not connected to any Facebook users or even names of individuals. For almost all of the email addresses or telephone numbers impacted, each individual email address or telephone number was only included in a download once or twice. This means, in almost all cases, an email address or telephone number was only exposed to one person. Additionally, no other types of personal or financial information were included and only people on Facebook – not developers or advertisers – have access to the DYI tool.
We currently have no evidence that this bug has been exploited maliciously and we have not received complaints from users or seen anomalous behavior on the tool or site to suggest wrongdoing. Although the practical impact of this bug is likely to be minimal since any email address or phone number that was shared was shared with people who already had some of that contact information anyway, or who had some connection to one another, it's still something we're upset and embarrassed by, and we'll work doubly hard to make sure nothing like this happens again. Your trust is the most important asset we have, and we are committed to improving our safety procedures and keeping your information safe and secure.
We have already notified our regulators in the US, Canada and Europe, and we are in the process of notifying affected users via email.
We appreciate the security researcher's report to our White Hat program, and have paid out a bug bounty to thank him for his efforts.
Courtesy: Mashable