This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, December 04, 2015

FortiGuard Labs Researchers Predict That IoT Attacks and New Evasion Techniques Will Characterize Emerging Threats in 2016

As 2016 approaches, Fortinet® (NASDAQ: FTNT) – global leader in high performance cybersecurity solutions – and its threat research division, FortiGuard Labs, have made their annual predictions of the most significant trends in malware and network security going into 2016. As in years past, the Internet of Things (IoT) and cloud play heavily in the predictions but new malicious tactics and strategies will create unique challenges for vendors and organizations alike. FortiGuard also predicts the emergence of increasingly sophisticated evasion techniques that will push the boundaries of detection and forensic investigation as hackers face increasing pressure from law enforcement.


New Rules: The Evolving Threat Landscape in 2016 report is designed to reveal the new trends and strategies that FortiGuard researchers anticipate cyber criminals will employ in the year to come. Fortinet researched these predictions to arm our customers with the knowledge they need to maintain their advantage in the cybersecurity arms race and proactively change the way all businesses look at their security strategies going into the new year.

FortiGuard Infographic-Threat-Predictions 2016 





The top cybersecurity trends for 2016 include:

Increased M2M Attacks and Propagation Between Devices

Several troublesome proofs of concept made headlines in 2015 demonstrating the vulnerability of IoT devices. In 2016, though, we expect to see further development of exploits and malware that target trusted communication protocols between these devices. FortiGuard researchers anticipate that IoT will become central to “land and expand” attacks in which hackers will take advantage of vulnerabilities in connected consumer devices to get a foothold within the corporate networks and hardware to which they connect.


Worms and Viruses Designed to Specifically Attack IoT Devices

While worms and viruses have been costly and damaging in the past, the potential for harm when they can propagate among millions or billions of devices from wearables to medical hardware is orders of magnitude greater. FortiGuard researchers and others have already demonstrated that it is possible to infect headless devices with small amounts of code that can propagate and persist. Worms and viruses that can propagate from device to device are definitely on the radar.


Attacks On Cloud and Virtualized Infrastructure

The Venom vulnerability that surfaced this year gave a hint about the potential for malware to escape from a hypervisor and access the host operating system in a virtualized environment. Growing reliance on virtualization and both private and hybrid clouds will make these kinds of attacks even more fruitful for cybercriminals. At the same time, because so many apps access cloud-based systems, mobile devices running compromised apps can potentially provide a vector for remotely attacking public and private clouds and corporate networks to which they are connected.


New Techniques That Thwart Forensic Investigations and Hide Evidence of Attacks

Rombertik garnered significant attention in 2015 as one of the first major pieces of “blastware” in the wild. But while blastware is designed to destroy or disable a system when it is detected (and FortiGuard predicts the continued use of this type of malware), “ghostware” is designed to erase the indicators of compromise that many security systems are designed to detect. Thus, it can be very difficult for organizations to track the extent of data loss associated with an attack.


Malware That Can Evade Even Advanced Sandboxing Technologies

Many organizations have turned to sandboxing to detect hidden or unknown malware by observing the behavior of suspicious files at runtime. Two-faced malware, though, behaves normally while under inspection and then delivers a malicious payload once it has been passed by the sandbox. This can prove quite challenging to detect but can also interfere with threat intelligence mechanisms that rely on sandbox rating systems.

Each of these trends represents a significant and novel challenge for both organizations deploying security solutions and for vendors developing them. Fortinet is on the cutting edge of threat research and network security, providing complete network protection from edge to endpoint, continuously updated by FortiGuard and the threat intelligence feeds from millions of devices deployed worldwide.

As Derek Manky, global security strategist for Fortinet explained, “FortiGuard Labs was formed over a decade ago to monitor and detect the latest threats, zero days, and emerging malware to provide the best possible protection for our customers. We leverage our incredible visibility into the global threat landscape to develop actionable threat intelligence, allowing us to respond quickly to new threats.”

Ken Xie, Fortinet founder and CEO, also noted that “As we look ahead at the threats associated with our increasing connectedness and the proliferation of new devices, Fortinet is committed to delivering uncompromising security and further enhancing our solutions to meet both the current and future needs of our customers.”

 
Copyright © 2015 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and unregistered trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiManager, FortiMail, FortiClient, FortiCare, FortiAnalyzer, FortiReporter, FortiOS, FortiASIC, FortiWiFi, FortiSwitch, FortiVoIP, FortiBIOS, FortiLog, FortiResponse, FortiCarrier, FortiScan, FortiAP, FortiDB, FortiVoice and FortiWeb. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, binding specification or other binding commitment by Fortinet, and performance and other specification information herein may be unique to certain environments. This news release contains forward-looking statements, including, among others, predictions related to threats, that involve uncertainties and assumptions. Threat predictions by their nature are uncertain and may not materialize, and changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.

About FortiGuard Labs
The FortiGuard Labs global research team continuously monitors the evolving threat landscape and distributes on a daily basis to Fortinet customers worldwide preventative measures to protect those customers from newly introduced, sophisticated cyber-threats. More than 200 researchers and automated detection and prevention technology provide around-the-clock coverage to ensure your network stays protected, despite a sophisticated and ever-changing threat landscape. FortiGuard Labs delivers rapid updates and detailed security knowledge, providing protection from the latest threats.

About Fortinet
Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com, or follow Fortinet at the Fortinet Blog,Google+Linkedin or Twitter.



Thursday, December 03, 2015

Researchers Discover New Form Of Carbon That Can Make Diamonds At Room Temperature

Scientists from North Carolina State University have discovered a new phase of solid carbon, called Q-carbon, and it has some unusual properties: Q-carbon is ferromagnetic, harder than diamond, and glows when exposed to energy. These properties make it different from graphite and diamond, Graphite is one of the solid phases of carbon; diamond is another. (the other two possible forms of solid carbon, known as phases), and the researchers discovered that Q-carbon can be used to construct diamond structures at room temperature. 

To create Q-carbon, it's necessary to have two things: a source of carbon and a substrate, a material where the reaction can take place. The source is called amorphous carbon, where all the atoms are in a disorganized, irregular distribution. Coal is an example of amorphous carbon, while in this case the choice for the substrate was between sapphire, glass or plastic.




The substrate was coated in a layer of amorphous carbon, and was then hit with a single laser pulse for about 200 nanoseconds, heating it to 4,000 Kelvins (3,726 °C; 6,740 °F). The carbon was then rapidly cooled down, causing it to crystalize into Q-carbon.



Phases are distinct forms of the same material.

"We've now created a third solid phase of carbon," says Jay Narayan, the John C. Fan Distinguished Chair Professor of Materials Science and Engineering at NC State and lead author of three papers describing the work. "The only place it may be found in the natural world would be possibly in the core of some planets."

Q-carbon has some unusual characteristics. For one thing, it is ferromagnetic – which other solid forms of carbon are not.

"We didn't even think that was possible," Narayan says.

In addition, Q-carbon is harder than diamond, and glows when exposed to even low levels of energy.

"Q-carbon's strength and low work-function – its willingness to release electrons – make it very promising for developing new electronic display technologies," Narayan says.

But Q-carbon can also be used to create a variety of single-crystal diamond objects. To understand that, you have to understand the process for creating Q-carbon.

Researchers start with a substrate, such as sapphire, glass or a plastic polymer. The substrate is then coated with amorphous carbon – elemental carbon that, unlike graphite or diamond, does not have a regular, well-defined crystalline structure. The carbon is then hit with a single laser pulse lasting approximately 200 nanoseconds. During this pulse, the temperature of the carbon is raised to 4,000 Kelvin (or around 3,727 degrees Celsius) and then rapidly cooled. This operation takes place at one atmosphere – the same pressure as the surrounding air.

So far, Q-carbon has been produced in films between 20 to 500 nanometers thick. The researchers have a lot of control in the creation of Q-carbon, and by changing the substrate or the pulse length, they were able to create diamond nanostructures within the new material.
 


Shown is a scanning electron microscopy image of microdiamonds made with the new technique. NCSU

By using different substrates and changing the duration of the laser pulse, the researchers can also control how quickly the carbon cools. By changing the rate of cooling, they are able to create diamond structures within the Q-carbon.

"We can create diamond nanoneedles or microneedles, nanodots, or large-area diamond films, with applications for drug delivery, industrial processes and for creating high-temperature switches and power electronics," Narayan says. "These diamond objects have a single-crystalline structure, making them stronger than polycrystalline materials. And it is all done at room temperature and at ambient atmosphere – we're basically using a laser like the ones used for laser eye surgery. So, not only does this allow us to develop new applications, but the process itself is relatively inexpensive."

And, if researchers want to convert more of the Q-carbon to diamond, they can simply repeat the laser-pulse/cooling process.

If Q-carbon is harder than diamond, why would someone want to make diamond nanodots instead of Q-carbon ones? Because we still have a lot to learn about this new material.

"We can make Q-carbon films, and we're learning its properties, but we are still in the early stages of understanding how to manipulate it," Narayan says. "We know a lot about diamond, so we can make diamond nanodots. We don't yet know how to make Q-carbon nanodots or microneedles. That's something we're working on."

NC State has filed two provisional patents on the Q-carbon and diamond creation techniques.

The work is described in two papers, both of which were co-authored by NC State Ph.D. student Anagh Bhaumik. "Novel Phase of Carbon, Ferromagnetism and Conversion into Diamond" will be published online Nov. 30 in the Journal of Applied Physics. "Direct conversion of amorphous carbon into diamond at ambient pressures and temperatures in air" was published Oct. 7 in the journal APL Materials.

More information: "Novel Phase of Carbon, Ferromagnetism and Conversion into Diamond" Jagdish Narayan and Anagh Bhaumik, Published: Nov. 30, Journal of Applied Physics, DOI: 10.1063/1.4936595

Jagdish Narayan et al. Research Update: Direct conversion of amorphous carbon into diamond at ambient pressures and temperatures in air, APL Materials (2015). DOI: 10.1063/1.4932622



FireEye Finds Chinese APT Group Attacked Hong Kong Media Outlets

SINGAPORE - Media OutReach - Dec 1, 2015 - FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today released the results of its research into a recent campaign carried out by a Chinese cyber threat group--referred to as "admin@338" --targeting Hong Kong-based media organizations. 

Group lured journalists with decoy documents about newsworthy events and abused Dropbox for communications.

In August, the group sent spear phishing emails about newsworthy developments with malicious attachments to Hong Kong-based media organizations, including newspapers, radio, and television outlets. One email referenced the creation of a Christian civil society organization to coincide with the anniversary of the 2014 protests in Hong Kong known as the Umbrella Movement. Another email referenced a Hong Kong University alumni organization that fears votes in a referendum to appoint a Vice-Chancellor will be co-opted by pro-Beijing interests. 

Figure 1: Screenshots of spear phishing emails admin@338 sent to journalists

The group employed malware called LOWBALL which abuses Dropbox, a legitimate cloud storage service, for command and control purposes. When FireEye researchers alerted Dropbox to the group's activities, Dropbox promptly blocked the access token used by LOWBALL. In doing so, Dropbox disrupted the group's command and control capabilities in all observed versions of the malware.

FireEye has observed targeted attacks by multiple Chinese threat groups on journalists at international and domestic media organizations in Asia. These attacks have often focused on Hong Kong-based media, particularly those that publish pro-democracy material. Journalists located in Taiwan, Southeast Asia, and elsewhere in the region have also been targeted.

"Journalists in Asia are routinely subject to these targeted cyber attacks. They are dependent on information from many different sources, which makes them easy to target. The information journalists have and the identity of their sources can be valuable intelligence. Without adequate technological defenses, they make easy victims," said Bryce Boland, chief technology officer for Asia Pacific at FireEye.

FireEye has tracked admin@338's activity since 2013. The group has largely targeted organizations involved in financial, economic, and trade policy. FireEye first observed the group targeting media outlets in April 2015.

The group's previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences. This campaign, however, is clearly designed for those who read the Traditional Chinese script commonly used in Hong Kong.

In April, FireEye released a report on APT30, a Chinese-linked group which waged a decade-long cyber espionage campaign on Southeast Asia and India. APT30 also targeted journalists, but FireEye has not observed any direct links between that group and admin@338.


Find additional details in a post from FireEye Threat Intelligence: https://www.fireeye.com/blog/threat-research/2015/11/china-based-threat.html



About FireEye, Inc.

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,000 customers across 67 countries, including 650 of the Forbes Global 2000.



© 2015 FireEye, Inc. All rights reserved. FireEye is a registered trademark or trademark of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.



Power Mac Center and Microsoft Philippines Launch Office 2016 for OS and iOS devices

Power Mac Center, the premier Apple partner in the country, together with Microsoft Philippines recently launched Office 365 bundles for the coming holidays. Office 365 allows users to install Office on multiple platforms, including OS and iOS devices to be connected to the service with a single subscription, enabling users to do their best work – anywhere, anytime and with anyone.

“Power Mac Center is truly committed to provide Filipino consumers the complete Apple experience. We are always looking for ways to support their needs, which is why we know that a lot of our loyal patrons have been anticipating the Office 365 for OS and iOS,” said Joey Alvarez, Marketing Director of Power Mac Center. “Aside from familiar apps like Word, Excel, and PowerPoint, Office 365 has a lot of new and improved features like Skype, OneNote and OneDrive, optimized for OS and iOS devices.”



L-R: Jerry Bongco, Director for Consumer Business Division at Microsoft Philippines; Lawrence Sison, CEO of Power Mac Center; Karrie Ilagan, Country General Manager at Microsoft Philippines; and Richard Javier, Retail Sales and Marketing Channels Lead at Microsoft Philippines at the launch of Office 2016 for OS and iOS devices at Power Mac Center Rockwell.



“This partnership is a key milestone for Microsoft Philippines as we make Office 365 available across all platforms in the mobile-first, cloud-first world. Microsoft’s mission is to empower every individual and organization to achieve more – and we’ve taken this to heart by breaking down ‘competitive barriers’ and partnering with Power Mac Center. We want to make Office accessible across all platforms, most especially in a wide range of Apple devices,” said Jerry Bongco, Director for Consumer Business Division at Microsoft Philippines.





A lot to love in the new Office for Mac

The new versions of Word, Excel, PowerPoint, Outlook, and OneNote provide the best of both worlds for Mac users—the familiar Office experience, paired with the best of Apple devices. Office 365 is also cloud-connected, so users can quickly get to their documents they’ve recently used on other devices and pick up where they left off. Sharing documents have also been made easier as Office 365 offers unparalleled compatibility on computers, tablets, phones, and online. No more sending documents back and forth in email: it’s easy for users to share their work and have others review it, since several people can edit the same document simultaneously.

Office 2016 also includes professionally designed online templates, sharper graphics on Apple’s retina display, and multitouch gestures for navigating between apps. Office 2016 also has a redesigned ribbon menu and improved integration with OneDrive, OneDrive for Business, and SharePoint.


Office wherever, whenever you want it

Office 365 Personal can be installed on two devices (one OS and one iOS device). Office 365 Home can be installed on up to five OS and five iOS devices, while Office 365 University can accommodate two OS or iOS devices.

Apart from being synced across multiple devices, Office 365 provides 1TB OneDrive online storage that can be accessed anytime, anywhere. Office 365 also allows users to stay connected with 60 minutes of free Skype calls per month to landline and mobile phones in more than 60 countries.

Furthermore, subscription to Office 365 assures that one’s version of Office is always up to date. Users don’t have to worry about upgrading again because with Office 365, the latest Office applications, features, and services are always included. Subscribers can also get support right away from Microsoft-trained experts, by phone or chat—at no extra charge.

New and loyal patrons of Power Mac Center stand to benefit from this milestone partnership. Office 365 with Office 2016 is now available at all Power Mac Center branches nationwide. Customers who will purchase any Mac device on cash or installment will get a special offer on the Office 365 Personal. Promo period is from December 1, 2015 to February 29, 2016.

For those who already have Apple devices, Office 365 is available as a standalone product at Power Mac Center as well. Office 365 Personal goes for ₱2,730, Office 365 Home is at ₱3,500, and Office 365 University costs ₱3,360. Meanwhile, Office for Mac Home Student 2016 is priced at ₱7,650 and Office for Mac Home and Business 2016 costs ₱14,500. Office 365 requires 4GB RAM and at least Mac OS X 10.10.

Visit any of Power Mac Center’s 26 stores nationwide to know more about Office 365.

​​
# # #



About Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices, and solutions that help people and businesses realize their full potential.



Microsoft Philippines, the local subsidiary of Microsoft Corporation, has been constantly bringing innovation and making its technology available to Filipino businesses and individuals since 1995.  As a committed and trusted partner in nation-building, Microsoft Philippines has made it its mission to fuel growth and healthy communities, as well as transform locally-based businesses and empower them to compete in the global economy.



About Power Mac Center

Power Mac Center is a recognized Apple Premium Reseller, Authorized Education Reseller, Apple Authorized Training Center, and Apple Authorized Service Provider in the Philippines. Power Mac Center has become a reliable retail shop and service provider of Apple products to the Filipino consumer.



The company has grown to 26 branches, with stores located in Greenbelt 3, Glorietta 5, The Annex at SM City North EDSA, SM City Fairview, TriNoma, Robinsons Magnolia,  SM Megamall, The Podium, SM Mall of Asia, SM Aura Premier, Festival Supermall, Cash and Carry Mall, Abreeza Mall, SM Lanang Premier, SM City Marikina, Power Plant Mall, SM City BF Parañaque, Harbor Point, SM City Southmall, SM City Pampanga, SM City Bacoor, SM City Lipa, SM City Santa Rosa, SM City Batangas, SM City Dasmariñas and Circuit Makati.



​Visit a Power Mac Center store or find more online:

​www.powermaccenter.com

www.facebook.com/powermaccenter

www.twitter.com/powermaccenter

www.instagram.com/powermaccenter



Additional Info / Proper Terminologies

-       Power Mac Center (not Power Mac or PowerMac)

-       Office 365

-       Office 2016 for OS and iOS devices