PC Magazine – May 2016
May 13, 2016 17:35Virtual reality is no longer virtual! With the recent releases of the HTC Vive and Oculus Rift headsets, VR is now upon us in full force. And, what do you know, it’s pretty good! We tell all in this issue of PC Magazine, which focuses not only on those two hot products but also what hardware you need to run them, what the experience is like, and what the future holds for this next-wave technology. Not sure you want a dedicated VR system yet? No worries. We also dig into the top mobile VR systems, which give you a similar experience for a fraction of the price, using the smartphone you already have. Lastly, we take a look at a new application of the technology that will revolutionize the way you take vacations – by giving you an “in-person” tour before you arrive at your destination. One thing’s for sure: This is potentially game-changing technology that is not the next 3D TV.
We cover plenty more in this issue, too. Ransomware is one of the most insidious online threats, targeting your data in exchange for real-world money. The worst part: By the time you know you’re infected, it’s too late to do anything but pay up or lose your information. But if ransomware is spreading every year, the good news is that you can easily protect yourself from it. Our feature tells you everything you need to know, including which PC security programs will help keep you and your files safe.
No matter how locked-down your computer is, keeping backups of your most important data is always a good idea. After all, even if you avoid malware attacks, you could still fall victim to a power surge, feline-induced deletion, or other unexpected data calamity. But are you backing up all your data, or are there some crucial files and settings you may be missing? We walk you through the most common types of information on your comptuer that you’re probably not backing up and tell you how to protect that just as surely as you do your vital documents.
Maintaining a healthy work-life balance is something almost everyone struggles with these days – in no small part because the constant presence of your phone, tablet, or computer means you can be doing work at literally any time of day. But it doesn’t have to be this way. Organizational expert Jill Duffy explains the tools and techniques you need to keep your work and your personal files separate, so you don’t have to worry about managing your time while you’re away from the office, too.
Samsung’s Galaxy S7 is the latest in the company’s line of powerful, innovative smartphones. But these devices are so packed with features, the chances are good you’re not using yours to its fullest. Our resident phone guru, Sascha Segan, has unearthed a bevy of tricks that will give you lots of fresh functionality you never expected. Follow his advice and you’ll be a Galaxy Superstar in no time.
Not that many years ago, toy airplanes were the amusement of choice for boys of all ages the country over. Now, though, they’re being replaced by even more powerful personal aircraft: drones. James Barnes of Ringoes, New Jersey, is parlaying his love for remote-controlled planes into a new academy where aspiring pilots can learn to fly drones safely and creatively. Read all about his efforts and how everyone from students to business types are benefiting from what he has to teach.
We also dig into the news to see how the computing landscape is about to change drastically. What does the wind-down of Intel’s “tick-tock” processor development mean to you? Why should you wait a few months to buy your next video card, and what major advancements are coming down the pike? And what are the details of this forward-thinking chip design that are modeled after synapses in the brain? Our reports on all of this will give you a better undersatnding of where the industry is and, more important, where it’s going in the not-too-distant future. And you won’t need VR to see all these amazing things – and much more.
Plus, as always, you’ll find expert analysis, thorough reviews of some of the hottest and most innovative technology products you can buy, and much, much more.
Intel vê na pesquisa atômica o futuro do mobile
May 13, 2016 16:55
Semanas depois de cancelar duas gerações de chips móveis Atom – chips de baixo consumo energético voltados para smartphones e tablets, a Intel anunciou uma nova pesquisa em colaboração com um laboratório francês de energia atômica. O objetivo da Intel é pavimentar seu caminho para tecnologias de baixo consumo de energia para o futuro.
O foco da colaboração com a Comissão de Energias Alternativas e Energia Atômica Francesa (CEA) se dará em pesquisas para redes sem fio mais rápidas, tecnologias de baixa energia para Internet das Coisas e até mesmo telas 3D.
A Intel e CEA já trabalham juntas no campo de computação de alta performance, e um novo acordo assinado nessa quinta-feira (12/05) prevê o trabalho da Intel no Laboratório para Eletrônicos e Tecnologia da Informação (LETI), da CEA, nos próximos cinco anos, segundo Rajeeb Hazra, vice-presidente do grupo de data center da Intel.
O CEA foi fundado em 1945 para desenvolver energia nuclear para uso civil e militar. Seu trabalho com a Intel começou logo depois que cessou seus programas de testes subterrâneos de armas nucleares, a medida que se voltou para modelos de computação para continuar sua pesquisa de armas, disse o diretor da CEA, Daniel Verwaerde.
Tais esforços continuam, mas atualmente os interesses de pesquisa da organização são mais amplos, englobando matérias de ciência, clima, saúde, energia renovável, segurança e eletrônica.
Essas duas últimas áreas estarão no coração da nova colaboração, que terá cientistas do LETI trocando informações com os da Intel.
No entanto, ambas as partes evitaram perguntas sobre quem teria os direitos comerciais para os frutos de suas pesquisas, limitando-se a dizer que ambas protegeram seus direitos. O acordo levou um ano para ser negociado.
“É um acordo equilibrado”, disse Stéphane Siebert, diretor da CEA Technology, divisão da qual o LETI integra.
Quem detém o que na colaboração de cinco anos pode se tornar um assunto espinhoso, para acionistas da Intel e contribuintes franceses, já que levarão vários anos antes de ficar claro quais tecnologias ou patentes serão, de fato, importantes.
Hazra enfatizou que a Intel depende de pesquisadoras fora dos Estados Unidos. A companhia conta com mais de 50 laboratórios na Europa, quatro deles que se dedicam a chamada computação exascale, sistemas capazes de cálculos de bilhões de bilhões por segundo.
“Todos nossos laboratórios exascale são fora dos Estados Unidos. Todos estão na Europa”, disse.
Fonte
French Distributor Retracts Statement on PS4 Neos October Release
May 13, 2016 14:41
Yesterday the French video game and multimedia distributor Innelec released its financial results, and within the press release they made a statement mentioning that the rumored PS4 Neo would release this October.
This afternoon they followed up with an announcement basically retracting everything.
Source link
Analista de Sistemas / Desenvolvedor
May 13, 2016 14:39
Analista de Sistemas / Desenvolvedor
– Postado por temonteiro
| 13 maio 2016
Av. Pontes Viêira, 326 – São João do Tauape, Fortaleza – CE, 60130-240, Brasil
Emprego
Descrição da Vaga
Cargo: Analista de Sistemas / Desenvolvedor
Escopo de trabalho: implementação de consultas T-SQL avançadas (procedure, functions, view, modelagem) voltadas para área de análise da informação/ETL/BI
Desejável experiência em desenvolvimento para web utlizando:
– Microsoft .NET Framework 2.0 ou superior;
– HTML, JavaScript
Experiência em Análise de Sistemas mínima de 5 anos.
Salário: a combinar
Relacionado
Como aplicar
Enviar curriculo para: fonseca.junior@redeinova.net
Relacionado
Job Categories: Free.
Job Types: Emprego.
Job Salaries: Não informado.
Vaga expira em 5 days
Você deve fazer login ou criar uma conta, a fim de enviar uma vaga
Fonte
4 Ways to Protect Against the Very Real Threat of Ransomware
May 13, 2016 14:37
Ransomware is a multi-million-dollar crime operation that strikes everyone from hospitals to police departments to online casinos.
It’s such a profitable scheme that experts say traditional cyberthieves are abandoning their old ways of making money—stealing credit card numbers and bank account credentials—in favor of ransomware.
But now that lawmakers on Capitol Hill are in the sights of cyber extortionists, the government will finally do something to stop the scourge, right?
Don’t count on it. You’re still largely on your own when it comes to fighting ransomware attacks, which hackers use to encrypt your computer or critical files until you pay a ransom to unlock them. You could choose to cave and pay, as many victims do. Last year, for example, the FBI says victims who reported attacks to the Bureau enriched cyber extortionists’ coffers by $24 million. But even if you’ve backed up your data in a safe place and choose not to pay the ransom, this doesn’t mean an attack won’t cost you. Victims of the CryptoWall ransomware, for example, have suffered an estimated $325 million in damages since that strain of ransomware was discovered in January 2015, according to the Cyber Threat Alliance (.pdf). The damages include the cost of disinfecting machines and restoring backup data—which can take days or weeks depending on the organization.
But don’t fear—you aren’t totally at the mercy of hackers. If you’re at risk for a ransomware attack, there are simple steps you can take to protect yourself and your business. Here’s what you should do.
First of All, Who Are Ransomware’s Prime Targets?
Any company or organization that depends on daily access to critical data—and can’t afford to lose access to it during the time it would take to respond to an attack—should be most worried about ransomware. That means banks, hospitals, Congress, police departments, and airlines and airports should all be on guard. But any large corporation or government agency is also at risk, including critical infrastructure, to a degree. Ransomware, for example, could affect the Windows systems that power and water plants use to monitor and configure operations, says Robert M. Lee, CEO at critical infrastructure security firm Dragos Security. The slightly relieving news is that ransomware, or at least the variants we know about to date, wouldn’t be able to infect the industrial control systems that actually run critical operations.
“Just because the Windows systems are gone, doesn’t mean the power just goes down,” he told WIRED. “[But] it could lock out operators from viewing or controlling the process.” In some industries that are heavily regulated, such as the nuclear power industry, this is enough to send a plant into automated shutdown, as regulations require when workers lose sight of operations.
Individual users are also at risk of ransomware attacks against home computers, and some of the suggestions below will apply to you as well, if you’re in that category.
1. Back Up, as Big Sean Says
The best defense against ransomware is to outwit attackers by not being vulnerable to their threats in the first place. This means backing up important data daily, so that even if your computers and servers get locked, you won’t be forced to pay to see your data again.
“More than 5,000 customers have called us for help with ransomware attacks in the last 12 months,” says Chris Doggett, senior vice president at Carbonite, which provides cloud backup services for individuals and small businesses. One health care customer lost access to 14 years of files, he says, and a community organization lost access to 170,000 files in an attack, but both had backed up their data to the cloud so they didn’t have to pay a ransom.
Some ransomware attackers search out backup systems to encrypt and lock, too, by first gaining entry to desktop systems and then manually working their way through a network to get to servers. So if you don’t back up to the cloud and instead backup to a local storage device or server, these should be offline and not directly connected to desktop systems where the ransomware or attacker can reach them.
“A lot of people store their documents in network shares,” says Anup Ghosh, CEO of security firm Invincea. “But network shares are as at risk as your desktop system in a ransomware infection. If the backups are done offline, and the backup is not reachable from the machine that is infected, then you’re fine.”
The same is true if you do your own machine backups with an external hard drive. Those drives should only be connected to a machine when doing backups, then disconnected. “If your backup drive is connected to the device at the time the ransomware runs, then it would also get encrypted,” he notes.
Backups won’t necessarily make a ransomware attack painless, however, since it can take a week or more to restore data, during which business operations may be impaired or halted.
“We’ve seen hospitals elect to pay the ransom because lives are on the line and presumably the downtime that was associated, even if they had the ability to recover, was not considered acceptable,” says Doggett.
2. Just Say No—To Suspicious Emails and Links
The primary method of infecting victims with ransomware involves every hacker’s favorite bait—the “spray-‘n’-pray” phishing attack, which involves spamming you with emails that carry a malicious attachment or instruct you to click on a URL where malware surreptitiously crawls into your machine. The recent ransomware attacks targeting Congressional members prompted the House IT staff to temporarily block access to Yahoo email accounts, which apparently were the accounts the attackers were phishing.
But ransomware hackers have also adopted another highly successful method—malvertising—which involves compromising an advertiser’s network by embedding malware in ads that get delivered through web sites you know and trust, such as the malvertising attacks that recently struck the New York Times and BBC. Ad blockers are one way to block malicious ads, patching known browser security holes will also thwart some malvertising.
When it comes to phishing attacks, experts are divided about the effectiveness of user training to educate workers on how to spot such attacks and right-click on email attachments to scan them for malware before opening. But with good training, “you can actually truly get a dramatic decrease in click-happy employees,” says Stu Sjouwerman, CEO of KnowBe4, which does security awareness training for companies. “You send them frequent simulated phishing attacks, and it starts to become a game. You make it part of your culture and if you, once a month, send a simulated attack, that will get people on their toes.” He says with awareness training he’s seen the number of workers clicking on phishing attacks drop from 15.9 percent to just 1.2 percent in some companies.
Doggett agrees that user training has a role to play in stopping ransomware.
“I see far too many people who don’t know the security 101 basics or simply don’t choose to follow them,” says Doggett. “So the IT department or security folks have a very significant role to play [to educate users].”
3. Patch and Block
But users should never be considered the stop-gap for infections, Ghosh says. “Users will open attachments, they will visit sites that are infected, and when that happens, you just need to make sure that your security technology protects you,” he says.
His stance isn’t surprising, since his company sells an end-point security product designed to protect desktop systems from infection. The product, called X, uses deep learning to detect ransomware and other malware, and Ghosh says a recent test of his product blocked 100 percent of attacks from 64 malicious web sites.
But no security product is infallible—otherwise individuals and businesses wouldn’t be getting hit with so much ransomware and other malware these days. That’s why companies should take other standard security measures to protect themselves, such as patching software security holes to prevent malicious software from exploiting them to infect systems.
“In web attacks, they’re exploiting vulnerabilities in your third-party plug-ins—Java and Flash—so obviously keeping those up to date is helpful,” Ghosh says.
Whitelisting software applications running on machines is another way Sjouwerman says you can resist attacks, since the lists won’t let your computer install anything that’s not already approved. Administrators first scan a machine to note the legitimate applications running on it, then configure it to prevent any other executable files from running or installing.
Other methods network administrators can use include limiting systems’ permissions to prevent malware from installing on systems without an administrator’s password. Administrators can also segment access to critical data using redundant servers. Rather than letting thousands of employees access files on a single server, they can break employees into smaller groups, so that if one server gets locked by ransomware, it won’t affect everyone. This tactic also forces attackers to locate and lock down more servers to make their assault effective.
4. Got an Infection? Disconnect
When MedStar Health got hit with ransomware earlier this year, administrators immediately shut down most of the organization’s network operations to prevent the infection from spreading. Sjouwerman, whose firm distributes a 20-page “hostage manual” (.pdf) on how to prevent and respond to ransomware, says that not only should administrators disconnect infected systems from the corporate network, they should also disable Wi-Fi and Bluetooth on machines to prevent the malware from spreading to other machines via those methods.
After that, victims should determine what strain of ransomware infected them. If it’s a known variant, anti-virus companies like Kaspersky Lab may have decryptors/a> to help unlock files or bypass the lock without paying a ransom, depending on the quality of encryption method the attackers used.
But if you haven’t backed up your data and can’t find a method to get around the encryption, your only option to get access to your data is to pay the ransom. Although the FBI recommends not paying, Ghosh says he understands the impulse.
“In traditional hacks, there is no pain for the user, and people move on,” he says. But ransomware can immediately bring business operations to a halt. And in the case of individual victims who can’t access family photos and other personal files when home systems get hit, “the pain involved with that is so off the charts…. As security people, it’s easy to say no [to paying]. Why would you feed the engine that’s going to drive more ransomware attacks? But … it’s kind of hard to tell someone don’t pay the money, because you’re not in their shoes.”
Source link
Governo seleciona projetos para criação de Cidades Inteligentes
May 13, 2016 12:53
O Ministério das Comunicações publicou na quinta-feira (12/05) uma portaria que abre o processo de seleção dos municípios para o programa Minha Cidade Inteligente. O esforço representa uma evolução da iniciativa Cidades Digitais. As prefeituras interessadas poderão concorrer em três grupos, de acordo com o tamanho de sua população.
O projeto tem como objetivo modernizar a gestão das prefeituras contempladas por meio de infraestrutura de rede de fibra óptica de alta capacidade, que conectará órgãos públicos locais, além de pontos públicos de acesso gratuito à internet pela população e capacitação aos servidores.
O programa também prevê ações na área de Internet das Coisas, também por meio de instalação de recursos tecnológicos que permitam monitorar serviços como iluminação, trânsito e segurança. “O objetivo é obter dados que permitam uma gestão mais eficiente desses setores por parte das prefeituras”, informa o órgão.
A seleção dos municípios será feita em três diferentes categorias: pequeno (menos de 100 mil habitantes); médio (entre 100 mil e 1 milhão de habitantes) e grande (mais de 1 milhão de habitantes). Preferencialmente, 60% dos municípios selecionados em cada grupo deverão ser das regiões Norte e Nordeste.
As prefeituras poderão, a partir da próxima segunda-feira (16), encaminhar ao Ministério das Comunicações a manifestação de interesse em participar da seleção. O e-mail é cidades.inteligentes@comunicacoes.gov.br. Já o prazo de inscrição das propostas terá início no dia 1º de junho e se estenderá até o dia 30 de junho. Em seguida, haverá a análise e seleção dos municípios. A previsão é de que a divulgação dos municípios selecionados ocorra em agosto.
Fonte
First Hitman Elusive Target Goes Live At 12 P.M. Eastern / 9 A.M. Pacific
May 13, 2016 10:40
Update: Square Enix and IO Interactive are giving you a head start. The first elusive target will be available later today, and here’s what we know about him.
Your mark is Sergei Larin, a forger. You’re traveling back to Paris for this mission, and you only have 48 hours. Remember, you only have one chance to make this happen. Good luck!
Original Story (May 12, 2016 @ 8:38 a.m. Central)
The Hitman series has always been a sandbox filled with opportunities for experimentation. You try, you fail, you try again. Not this time.
Starting this Friday, May 13, you have 48 hours to take down the first Elusive Target. But don’t expect to have your full suite of tools.
The victim won’t appear on your mini-map or in instinct mode. Information will be limited. If you die, you’ve lost your chance to finish the mission. The target can only die once, so make it count.
Square Enix says that it won’t give quite so much warning about these in the future, but because this is the first, you’re being given more time to prepare. Let us know how you fare.
For more on Hitman, check out our coverage of episode one and episode two.
Source link
Prefeitura de Fortaleza abre inscrições para a seleção de bolsistas TI
May 13, 2016 10:36
Prefeitura de Fortaleza abre inscrições para a seleção de bolsistas TI
Descrição da Vaga
Serão selecionados sete bolsistas para a realização do Projeto de Integração e Análise de Dados para Políticas Públicas de Juventude
A Prefeitura de Fortaleza, por meio da Coordenadoria Especial de Políticas Públicas de Juventude e em parceria com a Fundação de Ciência, Tecnologia e Inovação de Fortaleza (Citinova), abre inscrições, no período de 11 a 16 de maio, para a seleção de sete bolsistas para a realização do Projeto de Integração e Análise de Dados para Políticas Públicas de Juventude. O processo seletivo se dará por meio de análise curricular.
Os interessados devem possuir o nível de escolaridade exigido, preencher a ficha de inscrição, disponível no Anexo A do Edital, e entregá-la junto com a documentação especificada na Coordenadoria Especial de Políticas Públicas de Juventude, de segunda a sexta-feira, das 8h às 17h.
Após a classificação e a formalização do contrato, os bolsistas do projeto terão uma dedicação de seis horas diárias durante seis meses ininterruptos. O resultado preliminar será divulgado no dia 17 de maio.
Vagas:
* (1) – Especialista com doutorado ou cursando doutorado com experiência em Data Science e Data Mining
* (1) – Especialista em Business Intelligence e desenvolvimento de Dashboard, preferencialmente mestre ou cursando mestrado.
* (1) – Especialista com conhecimento avançado de ferramentas de CMS, HTML5, CSSB, Javascript, ferramentas de edição de imagens e noções sobre Usabilidade e Acessibilidade.
* (3) – Especialista em análise de sistemas e/ou programação web.
* (1) – Coordenador técnico de projeto com especialização em Business Intelligence e com experiência em análise de sistemas
Serviço:
Relacionado
Como aplicar
Local de entrega da documentação:
Coordenadoria de Juventude de Fortaleza
Avenida Luciano Carneiro, nº 2235 – Vila União
Via http://www.fortaleza.ce.gov.br/noticias/juventude/prefeitura-de-fortaleza-abre-inscricoes-para-selecao-de-bolsistas
Relacionado
Job Types: Emprego.
Job Salaries: Não informado.
Vaga expira em 5 days
Você deve fazer login ou criar uma conta, a fim de enviar uma vaga
Fonte
Gavilon renova ambiente de TI com apoio da CorpFlex
May 13, 2016 8:53
A Gavilon avançou de forma intensa no Brasil. No ano passado, impulsionando atividades e filiais nas principais áreas produtoras, a gestora de commodities agrícolas atingiu a marca de 3 milhões de toneladas de grãos exportadas. Para suportar esse processo de expansão, a companhia precisou redesenhar seu ambiente tecnológico.
O plano era montar uma operação de cloud corporativa para sustentar toda a área de negócios, tanto na matriz quanto nas filiais e fazendas espalhadas pelo país, com todos estes usuários conectados e disponibilizar uma área de service desk.
A empresa resolveu levar o novo ERP da Totvs para uma infraestrutura 100% baseada em nuvem privada. Todo o processo de construção e formatação das necessidades foi conduzido, realizado e concluído pela CorpFlex, que também manteve os dois sistemas rodando em paralelo até chegar à aderência total ao novo sistema.
Após o Go Live do software de gestão empresarial, a parceira tecnológica assumiu a gestão 24x7x365 dos ambientes de segurança, backup, suporte, monitoração, relatoria.
A integradora também provê o Gerenciamento de Switch, de Firewall e as features de segurança como antivírus, antispyware, IPS, IDS e filtro de conteúdo, serviços de segurança que atendem às necessidades da matriz, filiais e usuários móveis.
Os serviços de monitoração da disponibilidade de ativos de rede como firewalls, switches e appliances de alta criticidade são realizados pelo NOC da provedora de TI, e o SNOC realiza os serviços de segurança e monitoração da segurança, como tentativas de invasão, inclusão e alteração das regras de firewall.
Todo o processo de detecção de falhas, lentidão, quedas, abertura, acompanhamento e fechamento de chamados junto às operadoras é de responsabilidade do parceiro tecnológico. Assim, a Gavilon diminuiu o custo para contratação de redes MPLS, uma vez que a solução VPN permite conexões com vários serviços de internet, o que flexibiliza os investimentos e reduz os custos mensais.
Quanto ao custo, de ponta a ponta o projeto foi avaliado em R$ 600 mil/ano, num contrato de 36 meses. “A virada do data center ficou em torno de R$ 15 mil/mês. Hoje, em função do roll out das filiais, meu custo com a CorpFlex é em torno de R$ 35 a R$ 40 mil por mês”, estima Adilson Machado, gerente de TI da companhia.
Fonte
Disney Infinity 4.0 Would Have Had Cool New Figures and Ambitious Story Mode
May 13, 2016 6:39
Had it not been discontinued, the next entry in the Disney Infinity series would have featured content from upcoming movies including Rogue One: A Star Wars Story and Guardians of the Galaxy 2, along with new 12-inch figures.
In a report published by Kotaku, multiple sources close to Disney Infinity’s development laid out the plans for its 4.0 version, which would have also included a story mode that brought together characters from the Star Wars, Marvel, and Disney universes.
12-inch figures were also planned for select, popular characters such as Buzz Lightyear, Elsa, Hulk, Iron Man’s Hulkbuster suit, Jack Skellington, and Darth Vader. These would have been more intricately detailed than the standard figures and even light up.
Disney Infinity 4.0 would have also featured in-game content based on Cars 3, Star Wars Episode VIII, Pirates of the Caribbean: Dead Men Tell No Tales, and Coco.
DmC: Devil May Cry developer Ninja Theory was reportedly working on the Rogue One content, while Studio Gobo was working on content based on Moana.
Along with the cancellation of its Disney Infinity product, for which it incurred a $147 million charge, Disney also announced it would no longer publish video games, and instead focus on partnering with other companies.
It is currently in partnership with Electronic Art, which is making multiple new Star Wars games, including Battlefront sequels, as well as a third-person game from Titanfall developer Respawn. Dead Space developer Visceral Games and new EA studio Motive are also working on Star Wars projects.
The latest Disney Infinity game released was Disney Infinity 3.0, which launched in August 2015 for consoles and PC. Disney has confirmed it will still release the previously announced three new characters from Alice Through the Looking Glass in May, followed by the Finding Dory Play Set in June.
Source link