P27 Layout 1
Total Page:16
File Type:pdf, Size:1020Kb
MONDAY, APRIL 27, 2015 technology Russian hackers read Obama email: Report NEW YORK: Emails to and from President Barack even working for-Moscow. Obama’s BlackBerry and the White House has said account itself did not appear to have been hacked. Obama were read by Russian hackers last year in a The hackers, who also got into the State that no classified networks were compromised. “But “Still, the fact that Mr Obama’s communications breach of the White House’s unclassified computer Department’s unclassified system, obtained access officials have conceded that the unclassified system were among those hit by the hackers-who are pre- system, The New York Times said Saturday. Earlier to the email archives of people inside the White routinely contains much information that is consid- sumed to be linked to the Russian government, if this month, US officials admitted there was a cyber House, and perhaps some outside, with whom ered highly sensitive: schedules, email exchanges not working for it-has been one of the most closely “event” late last year, but refused to confirm reports Obama regularly communicated, the Times said. It with ambassadors and diplomats, discussions of held findings of the inquiry,” the newspaper said. “It’s Russia was behind the attack. However the incursion was from those accounts that they reached emails pending personnel moves and legislation, and, the Russian angle to this that’s particularly worri- was “far more intrusive and worrisome” than publicly that the president had sent and received, according inevitably, some debate about policy,” the Times some,” a senior official was quoted as saying. Most of acknowledged, the newspaper said, citing senior to the officials. reported. Obama’s classified briefings are delivered orally or American officials briefed on the investigation, and The hackers did not appear to have penetrated It was not clear how many of Obama’s emails on paper and are usually confined to the Oval Office saying the hackers were presumed to be linked to-or the servers that control the message traffic from were read, the Times said, adding that his email or the Situation Room, the Times said. — AFP MEA smartphone market rockets as cheap devices demand increases KUWAIT: Smartphone shipments to devices increasing 34% year on year in the Middle East and Africa saw Q4 2014. “Vendors such as Samsung unprecedented year-on-year growth and HTC launched variants of their of 83% in 2014, according to - Q4 2014 flagship S5 and HTC One M8 models Handsets Tracker released by with dual-SIM capabilities,” says Isaac T. International Data Corporation (IDC). Ngatia, a senior research analyst at IDC Spurred by the increased availability of Middle East, Africa, and Turkey. cheaper models and dual-SIM devices, “Demand for such devices stems from the global advisory and consulting the fact that a growing band of con- services firm announced that smart- sumers want to enjoy cheap cross-net- phones accounted for 41.9% of all work calls and offers from multiple tel- mobile handset shipments to the cos and therefore retain more than region in 2014, up from 27% in 2013, one SIM card for their personal use.” with the overall handset market The majority of the growth in the expanding 19.6% in volume year on smartphone category was witnessed year. in countries that have larger popula- Feature phones have been hit hard tions but previously had low penetra- by the increased availability of more tion rates. For example, smartphone shipments to Nigeria and Kenya increased 135% and 112%, respective- ly, year on year in 2014, while Pakistan saw growth of 105% over the same period. “The increased appetite for smartphones in Pakistan is being driv- en by a combination of the deploy- ment of 3G networks across the coun- try and the wider availability of more affordable devices,” says Popal. Meanwhile, the more mature GCC smartphone market expanded 31.8% SAN FRANCISCO: A presentation is made in the Symantec booth during the RSA Conference. — AP year on year in 2014, contributing to the region’s penetration rate reaching an impressive 72.6%. The overall handset market’s ven- Feeling safe? Try attending the dor dynamics also changed by the end of 2014. Although Samsung main- tained its number-one position in Internet security conference MEA, its smartphone share fell from 51.5% in 2013 to 43.8% for 2014. Nabila Popal, IDC’s research manager Huawei and Apple followed in second for handsets and display solutions in and third place with shares of 8.9% Hackers are outmaneuvering safety measures the Middle East and Africa. and 7.8%, respectively. The same trend can be seen quarter on quarter, with SAN FRANCISCO: A conference of Internet secu- error, especially people falling for bogus phish- tion and other safeguards, the tests found others affordable smartphones, with ship- Samsung’s share dropping 7.8 points rity experts is not for the faint of heart. Hallway ing emails, text messages or websites that were vulnerable to hackers eavesdropping on ments down 4.5% year on year in from Q3 to Q4 2014, while Huawei and chatter and keynote speeches are peppered appear to come from acquaintances or trusted data signals and learning residents’ habits, such 2014. Indeed, smartphones priced Apple saw their shares increase 5.1 with scary stories of increasingly sophisticated companies. Phishing attacks are a favored tactic as what time they leave the house and when under $100 captured 20% share of the points and 2.7 points, respectively, hackers siphoning off valuable personal and cor- of hackers working for foreign governments and they come home. MEA smartphone market in 2014, up over the same period. porate data. In the words of one expert, the bad criminal groups because they trick their targets from just 5% in 2013. Additionally, “Apple’s growth is primarily due to guys are outmaneuvering those charged with into handing over passwords or clicking on links More sophisticated hackers market share of smartphones in the the incredible success of its iPhone 6 keeping the wired world safe. This despite that install malicious programs. Verizon Hackers are sharing information about soft- $100-200 price bracket increased eight and iPhone 6 Plus models, which final- repeated vows from CEOs and government offi- researchers estimate one in five phishing emails ware vulnerabilities in a variety of industries, faster percentage points in just one quarter, ly placed the vendor in the large cials to tighten security after high-profile were read by their targets and one in 10 per- than many companies install “patches” to repair from 25% in Q3 2014 to 33% in Q4 screen size segment that had previous- breaches at Sony Pictures, health insurer suaded someone to open an attached file. them, several researchers said. Cyber-attackers are 2014. Meanwhile, smartphones priced ly been dominated by Samsung,” says Anthem and retailers Target and Home Depot. Security firm Proofpoint says middle managers also increasingly using programs that can scout a in the higher-end $250-500 bracket Popal.”Many users that had made the The recent wave of corporate data breaches are increasingly being targeted with emails con- computer network and change behavior depend- have seen their share of the overall switch from Apple to Samsung specifi- and cyber-attacks provided plenty of fodder for taining seemingly “official” attachments such as ing on what defenses they encounter. Even novice market fall from 23% in Q3 2013 to cally for the larger screen sizes have a weeklong cyber-security conference in San fax or voicemail alerts. “It only takes one person hackers can get their hands on tools to carry out 18% in Q4 2014 now started to switch back. Francisco. Some 28,000 threat analysts, security to click” on a link or attachment and put their sophisticated attacks. “Writing malware is not the “Many new vendors have been Meanwhile, Huawei has experienced a vendors and corporate IT administrators gath- employer’s entire network at risk, said Verizon hard part anymore. You can buy it” from other eager to get into the region’s burgeon- wave of growth in the mid to low-end ered to talk about malicious software, spear- senior analyst Marc Spitler. As for hackers, “they hackers online, said Ryan Olson, intelligence direc- ing smartphone space, with a number segment, with its Honor 3 and Ascend phishing and other attacks that can steal money don’t need a high rate of clicking because they tor at Palo Alto Networks. of them launching phones in this Y series enjoying great success. The or secrets from companies and consumers. can just churn out the emails.” One common refrain at the conference is that growing price band,” says Nabila Popal, vendor has struck the right balance Growing concern over cyber-threats has been companies must get better at detecting and con- IDC’s research manager for handsets between quality and price, particularly good for business, driving up revenue and stock Connected devices, easy targets taining computer breaches once they occur, and display solutions in the Middle in some of the region’s more emerging prices for many security firms. But researchers As more home appliances are connected to since old methods of prevention aren’t working. East and Africa. “This strategy of target- markets where it is even killing the say the dangers are real: Last year saw a record the Internet, experts warn they are vulnerable to The breaches of 2014 showed “that we’re losing ing the mid and low end of the market local competition.” Like in other global number of commercial data breaches and hackers intending mischief or worse. While actu- this contest,” RSA president Amit Yoran said in a has contributed significantly to the markets, the MEA market witnessed a “denial-of-service” attacks, aimed at shutting al hacking incidents have been rare, researchers keynote speech.