More stories

  • in

    AMD, Qualcomm to offer Wi-Fi 6 and 6E, and secure Wi-Fi remote management

    Written by

    Adrian Kingsley-Hughes, Contributor

    Adrian Kingsley-Hughes
    Contributor

    Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology — whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored/co-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs.

    Full Bio

    AMD and Qualcomm have been in collaboration to optimize the FastConnect 6900 wireless connectivity for the Ryzen PRO line of processors aimed at business laptops.By using the 6GHz wireless band, FastConnect can improve video conferencing, reduce latency, and enhance connection reliability by using multiple Wi-Fi bands.

    But FastConnect offers more. IT administrators can now leverage the AMD Manageability Processor and make use of FastConnect’s support for almost three dozen of the most widely used Open Standard-Based (DASH) profiles to carry out remote management on AMD commercial platforms.This is a fantastic built-in ready-to-use solution for enterprise customers where hybrid working is now a big part of what IT admins have to deal with.”Out-of-band Wi-Fi remote management is an important tool for enterprise IT managers to diagnose and fix issues, even when the operating system is not running,” said Jason Banta, CVP and General Manager, OEM Client Computing AMD. “AMD Ryzen PRO 6000 Series processors with Qualcomm FastConnect 6900 enable next-generation business laptops to have the processing and connectivity tools needed to perform in modern environments, offering professional-strength remote manageability for users in the new, hybrid workplace.”The first chips to offer FastConnect will be the AMD Ryzen PRO 6000 Series processors, and these will be found in systems such as the Lenovo ThinkPad Z Series and HP EliteBook 805 Series.Along with FastConnect, these chips bring with them the power, performance, and great battery life — the features that business laptop users need.”Our collaboration with AMD reflects Qualcomm Technologies’ commitment to the mobile computing space. By optimizing FastConnect 6900 for platforms powered by AMD Ryzen 6000 Series processors, we’re bringing secure Wi-Fi remote management to AMD enterprise customers,” said Dino Bekis, vice president and general manager, Mobile Compute and Connectivity, Qualcomm Technologies, Inc. “This represents the first step in our relationship to bring superior wireless connectivity to the AMD mobile computing roadmap.”

    Processors More

  • in

    Chromebook data sanitization comes to Blancco Drive Eraser

    Written by

    Adrian Kingsley-Hughes, Contributor

    Adrian Kingsley-Hughes
    Contributor

    Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology — whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored/co-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs.

    Full Bio

    The use of Chromebooks is exploding. During the past couple of years, they became (and continue to be) the go-to cheap hardware for people working remotely.This has resulted, however, in piles and piles of Chromebooks that need their data securely wiped, either to put them back into service or to allow them to be disposed. But sanitizing the data on Chromebooks can be a pain.

    Until now.Blancco has announced that Blancco Drive Eraser now supports Chromebook data sanitization. The new support allows a wide range of organizations — enterprises, IT Asset Disposition service providers, academic institutions, etc. — with an easy-to-use, fast, and secure data sanitization specifically for Chromebooks. Blancco Drive Eraser has been designed to decreases the amount of time needed to erase each device while still allowing the preservation of its native operating system, which speeds up the preparation of each Chromebook for reuse. Once data has been thoroughly erased, Blancco Drive Eraser then confirms that the data sanitization has been completed successfully. It provides a tamper-proof, digitally-signed certificate of erasure to support any regulatory compliance and reporting mandates.”While most students have returned to the classroom and employees are increasingly coming back to offices, the demand for Chromebooks has not waned,” said Alan Bentley, Blancco’s President of Global Strategy. “One forecast predicts nearly 30 million Chromebooks will be shipped globally in 2022 — a decrease of 21 percent from 2021 but more than double the number of units recorded in 2019,” Bentley added, “As more of these devices enter the ecosystem, and as more organizations look to be participants in the circular economy, they need a solution that allows them to quickly and safely reuse these devices. Blancco Drive Eraser now meets that need.”One of Blancco Drive Eraser’s main selling points is that it protects personally identifiable information (PII).”We are now able to give… organizations the ability to ensure device data is rendered completely unrecoverable. This capability allows them to confidently reuse or sell end-of-life devices instead of adding to the growing electronic waste crisis in our landfills,” Bentley said.Secure data sanitization for Chromebook is now available as part of Blancco Drive Eraser at no extra cost. More

  • in

    FBI: Hackers used malicious PHP code to grab credit card data

    The Federal Bureau of Investigations (FBI) is warning that someone is scraping credit card data from the checkout pages of US businesses’ websites. “As of January 2022, unidentified cyber actors unlawfully scraped credit card data from a US business by injecting malicious PHP Hypertext Preprocessor (PHP) code into the business’ online checkout page and sending the scraped data to an actor-controlled server that spoofed a legitimate card processing server,” the FBI said in an alert.

    It said the “unidentified cyber actors” also established backdoor access to the victim’s system by modifying two files within the checkout page. SEE: Just in time? Bosses are finally waking up to the cybersecurity threatJavaScript-based Magecart card-skimming attacks have been the main threat to e-commerce sites in recent years, but PHP code remains a major source of card skimming activity. The attackers began targeting US businesses in September 2020 by inserting malicious PHP code into the customized online checkout pages. But earlier this year, the actors changed tactics using a different PHP function.  The actors create a basic backdoor using a debugging function that allows the system to download two webshells onto the US firm’s web server, giving the attackers backdoors for further exploitation. The FBI’s recommended mitigations include changing default login credentials on all systems, monitoring requests performed against your e-commerce environment to identify possible malicious activity, segregating and segmenting network systems to limit how easily cyber criminals can move from one to another, and securing all websites transferring sensitive information by using secure socket layer (SSL) protocol.Security firm Sucuri observed that 41% of new credit card skimming malware samples in 2021 were from PHP backend credit card skimmers. This suggested that solely scanning for frontend JavaScript infections could be missing a large proportion of credit card skimming malware. As Sucuri explains, webshell backdoors give attackers full access to the website file system, often providing a full picture of the environment, including the server operating system and PHP versions, as well powerful functionality to change permissions of files and move into adjacent websites and directories. Webshells accounted for 19% of 400 new malware signatures gathered by Sucuri in 2021. The firm saw a “hugely disproportionate” rise in signatures in 2021 for PHP-based credit card stealers impacting e-commerce platforms Magento, WordPress and OpenCart.    More

  • in

    US warning: North Korea's tech workers posing as freelance developers

    Skilled software and mobile app developers from North Korea are posing as US-based remote workers to land contract work as developers in US and European tech and crypto firms. The warning comes in a new joint advisory from The US Department of State, the US Department of the Treasury, and the Federal Bureau of Investigation (FBI) outlining the role North Korean IT workers play in raising revenue for North Korea, which contributes to its weapons of mass destruction (WMD) and ballistic missile programs, in violation of U.S. and UN sanctions.

    ZDNet Recommends

    Hackers working for North Korea – officially known as the Democratic People’s Republic of Korea (DPRK) – have gained notoriety for sophisticated hacks on cryptocurrency exchanges during the past five years. In 2021 alone they stole over $400 million worth of cryptocurrency for the DPRK. SEE: Just in time? Bosses are finally waking up to the cybersecurity threatThe FBI, US Cybersecurity and Infrastructure Security Agency (CISA), and Treasury last month warned that North Korea’s Lazarus Group, or APT 38, was targeting exchanges in the blockchain and cryptocurrency industry using spear-phishing campaigns and malware. Treasury also in April linked Lazarus to the $600 million heist in March from the Ronin blockchain network underpinning the play-to-earn game Axie Finity.  However, the skilled North Korean IT workers play another function for DPRK, using their access as sub-contracted developers within US and European contracting firms to enable DPRK-sponsored hacking. The US government has outlined “red flag” indicators that firms might be hiring North Korean freelance developers and tips to “protect against inadvertently hiring or facilitating the operations of DPRK IT workers.” “The DPRK dispatches thousands of highly skilled IT workers around the world to generate revenue that contributes to its weapons of mass destruction (WMD) and ballistic missile programs, in violation of U.S. and UN sanctions,” the advisory states. DPRK IT workers are primarily located in the People’s Republic of China (PRC) and Russia, but some are located in Africa and Southeast Asia, the US says. “The vast majority of [DPRK IT workers] are subordinate to and working on behalf of entities directly involved in the DPRK’s UN-prohibited WMD and ballistic missile programs, as well as its advanced conventional weapons development and trade sectors. This results in revenue generated by these DPRK IT workers being used by the DPRK to develop its WMD and ballistic programs, in violation of US and UN sanctions.” Rather than engaging directly in malicious cyber activity, DPRK IT workers use privileged access within contractor roles to provide logistical support to DPRK hackers by sharing access to virtual infrastructure, facilitating sales of stolen data, and assisting in DPRK’s money laundering and virtual currency transfers.”Although DPRK IT workers normally engage in IT work distinct from malicious cyber activity, they have used the privileged access gained as contractors to enable the DPRK’s malicious cyber intrusions. Additionally, there are likely instances where workers are subjected to forced labor,” the warning notes.A tight labor market coupled with high demand for software developers in the US and Europe are working in favor of North Korean software developers, who can earn at least ten times more than a conventional North Korean laborer working in a factory or on a construction project overseas. The list of roles that DPRK tech workers specialize in reflect the hottest areas of tech in the West and globally, including mobile and web apps, building crypto exchange platforms and digital coins, mobile games, online gambling, AI-related applications, hardware and firmware development, VR and AR programming, facial and biometric recognition software, and database development. The DPRK workers often take on projects that involve virtual currency in categories spanning business, health and fitness, social networking, sports, entertainment, and lifestyle, according to the advisory.SEE: Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breachesUnsurprisingly, DPRK IT workers are using VPNs and third-country IP addresses to conceal their internet connections and avoid violating terms of service of online platforms they use. They’re also using proxy accounts to bid for work, and might use a dedicated device for banking services to evade anti-money laundering measures. And they’re using forged and stolen identity documents to hide their identity.   Red flags include: multiple logins into one account from various IP addresses linked to different countries in a short time; developers logging into multiple accounts on the same platform from one IP address; developers being logged into accounts continuously for one or more days at a time; router ports such as 3389 and other configurations associated with the use of remote desktop-sharing software; multiple developer accounts receiving high ratings from one client account in a short period; extensive budding on projects and a low number of accepted project bids; and frequent money transfers through payment platforms, especially to China-based bank accounts.       The advisory notes that DPRK IT workers employed by a US firm fraudulently charged its payment account $50,000 in 30 small installments over a matter of months. The US agencies recommend contracting firms conduct video interviews with applicants to verify their identity and to reject low-quality images as verification of identity.  More

  • in

    Uber Eats delivery goes fully autonomous

    Written by

    Greg Nichols, Contributor

    Greg Nichols
    Contributor

    Greg Nichols covers robotics, AI, and AR/VR for ZDNet. A full-time journalist and author, he writes about tech, travel, crime, and the economy for global media outlets and reports from across the U.

    Full Bio

    Motional
    Uber Eats is turning to autonomous vehicles in a major market. Along with AV partner Motional, the third-party delivery platform will be launching a new autonomous delivery experience in Santa Monica, California.Deliveries will be conducted in Motional’s IONIQ 5 vehicles, which are capable of operating autonomously. Participating restaurants bring packaged orders to the curb and place them inside a locking compartment. Once the car arrives at its destination the customer is notified and retrieves the order from the car. Uber Eats and Motional have been working on the various customer touchpoints for months with an eye toward a seamless rollout.”At Uber, we’re always looking for ways to use new technology to help consumers go anywhere and get anything,” said Noah Zych, Global GM for Uber’s Autonomous Mobility and Delivery business. “We’re thrilled to begin piloting with Motional in California and are eager to see how their promising autonomous technology will begin to change how people and goods move throughout the world for the better.”

    Conspicuous in the new testbed is the absence of drivers. Uber and its drivers have long had a tense relationship. Autonomous vehicle technology seems primed to enable Uber to move forward without those drivers before long.The partnership is relatively new, which makes the rollout all the more impressive. Motional and Uber announced their partnership in December of last year. This is the first on-road autonomous vehicle (AV) pilot on the Uber Eats network, which makes it an important milestone for the technology in general. Uber Eats controls an estimated 24% of the food delivery market, making its adoption of any new technology highly influential.Motional’s vehicles have been piloted in passenger conveyance but the move to food delivery represents a pivot. The Motional IONIQ 5 vehicles used in the service have been adapted to enable autonomous deliveries. The new service will allow Motional and Uber to study consumer response and technology integration. Uber clearly has long-term designs on AVs across its platform.

    ZDNet Recommends More

  • in

    Uber Eats to launch a fully autonomous delivery experience (in one major market)

    Written by

    Greg Nichols, Contributor

    Greg Nichols
    Contributor

    Greg Nichols covers robotics, AI, and AR/VR for ZDNet. A full-time journalist and author, he writes about tech, travel, crime, and the economy for global media outlets and reports from across the U.

    Full Bio

    Motional
    Uber Eats is turning to autonomous vehicles in a major market. Along with AV partner Motional, the third-party delivery platform will be launching a new autonomous delivery experience in Santa Monica, California.Deliveries will be conducted in Motional’s IONIQ 5 vehicles, which are capable of operating autonomously. Participating restaurants bring packaged orders to the curb and place them inside a locking compartment. Once the car arrives at its destination the customer is notified and retrieves the order from the car. Uber Eats and Motional have been working on the various customer touchpoints for months with an eye toward a seamless rollout.

    “At Uber, we’re always looking for ways to use new technology to help consumers go anywhere and get anything,” said Noah Zych, Global GM for Uber’s Autonomous Mobility and Delivery business. “We’re thrilled to begin piloting with Motional in California and are eager to see how their promising autonomous technology will begin to change how people and goods move throughout the world for the better.”Conspicuous in the new testbed is the absence of drivers. Uber and its drivers have long had a tense relationship. Autonomous vehicle technology seems primed to enable Uber to move forward without those drivers before long.The partnership is relatively new, which makes the rollout all the more impressive. Motional and Uber announced their partnership in December of last year. This is the first on-road autonomous vehicle (AV) pilot on the Uber Eats network, which makes it an important milestone for the technology in general. Uber Eats controls an estimated 24% of the food delivery market, making its adoption of any new technology highly influential.Motional’s vehicles have been piloted in passenger conveyance but the move to food delivery represents a pivot. The Motional IONIQ 5 vehicles used in the service have been adapted to enable autonomous deliveries. The new service will allow Motional and Uber to study consumer response and technology integration. Uber clearly has long-term designs on AVs across its platform.

    ZDNet Recommends More

  • in

    Singapore firms see high rate of security incidents, but struggle to respond promptly

    Written by

    Eileen Yu, Contributor

    Eileen Yu
    Contributor

    Eileen Yu began covering the IT industry when Asynchronous Transfer Mode was still hip and e-commerce was the new buzzword. Currently an independent business technology journalist and content specialist based in Singapore, she has over 20 years of industry experience with various publications including ZDNet, IDG, and Singapore Press Holdings.

    Full Bio

    A higher number of organisations in Singapore are experiencing at least six cybersecurity incidents in the past year, compared to their counterparts across 10 other global markets. However, just 49% in the Asian nation are able to respond to a threat within 24 hours, compared to the global average of 70%. Some 65% of organisations in Singapore saw at least six security incidents, which was the highest amongst the 11 markets surveyed in a study commissioned by Infoblox that polled 100 respondents in the country. Globally, 46% of organisations encountered at least six security incidents. Conducted by CyberRisk Alliance’s Business Intelligence Unit, the survey had a total of 1,100 respondents from markets that also included Australia, Germany, the US, and UK.

    In Singapore, 73% said cybersecurity incidents led to an actual breach, compared to 34% across the globe that saw at least one breach. Some 45% pointed to a cloud application or infrastructure as the source of a breach, while 42% cited an IoT device or network and 32% blamed an employee-owned endpoint device.  Globally, 32% said their organisation’s security breaches originated from Wi-Fi access points while 29% pointed to a cloud application or infrastructure. Another 29% cited an employee-owned endpoint device and 25% blamed a third-party or supply chain services provider. As a result of breaches, 57% in Singapore said hackers exposed sensitive data, while 53% suffered system outages or downtime and 43% had to deal with malware infections. The survey also found that 33% incurred losses–direct and indirect–of up to $1 million due to a security breach. Globally, this figure was a higher 43%, with respondents highlighting the associated cost of operating amidst the pandemic where more sensitive data had to be shared via multiple channels. Asked about challenges they faced safeguarding their network against attacks, 33% globally pointed to monitoring remote work access and 28% noted a lack of budget. In Singapore, 32% cited poor network visibility, while 32% highlighted a shortage of security skills and 28% faced budget restraints.Data leakage was the top cybersecurity concern for 51% of companies in Singapore, while 42% were anxious about remote connections and 35% felt the same about networked IoT attacks. Some 29% also expressed concerns about attacks through cloud services.Worldwide, data leakage also was the top concern for 49% of respondents, followed by ransomware at 39% and attacks via remote connections at 36%.To cope with the threat landscape, 73% in Singapore said their organisation had increased their IT security budgets last year, with another 69% expecting this upward trend to continue this year. Globally, 71% expected their IT security budgets to increase this year. Some 28% in Singapore said they would invest in DNS security, while 26% said likewise for network security tools. Another 37% would pump funds into data encryption and 36% were opting for cloud access security brokers. Some 60% currently tapped DNS controls as part of their cybersecurity strategy to block and flag malicious traffic and devices. Another 61% had implemented SASE (secure access service edge) infrastructures, with 29% indicating plans to do likewise.RELATED COVERAGE More

  • in

    US prosecutors allege Venezuelan doctor is ransomware mastermind

    on May 16, 2022

    | Topic: Legal

    US prosecutors have accused 55-year-old Venezuelan cardiologist Moises Luis Zagala Gonzalez, also known as Nosophoros, Aesculapius and Nebuchadnezzar, of being the mastermind behind a slew of notorious ransomware.According to Justice Department officials, Zagala is alleged to have set up a cybercriminal enterprise in which he held an economic and reputational interest in his software being used in successful cyber attacks. “We allege Zagala not only created and sold ransomware products to hackers, but also trained them in their use. Our actions today will prevent Zagala from further victimizing users,” assistant director-in-charge Michael Driscoll said.”Many other malicious criminals are searching for businesses and organizations that haven’t taken steps to protect their systems — which is an incredibly vital step in stopping the next ransomware attack.” Some of Zagala’s associated ransomware products include Jigsaw, and private ransomware builder Thanos. Jigsaw has been around since 2016, and is known for its dramatic means of pressuring victims to pay up fast, stealing the idea from the 2004 movie Saw, where characters have to solve puzzles within a time limit or face fatal consequences. Meanwhile, Thanos — named presumably after the Marvel supervillain — first appeared in 2019, allowing users to build their own ransomware.In 2020, while investigating security incidents at several Israeli prominent organisations, security researchers from ClearSky and Profero said they linked the use of the Thanos ransomware to MuddyWater, a known Iranian state-sponsored hacking group.”Combating ransomware is a top priority of the Department of Justice and of this Office.  If you profit from ransomware, we will find you and disrupt your malicious operations,” said US Attorney Breon Peace. Despite this, if convicted, Zagala only faces up to five years’ imprisonment for attempted computer intrusion, and five years’ imprisonment for conspiracy to commit computer intrusions. Related Coverage More