fitag times 3rd edition

8
www.fitag.in Tuesday Ahmedabad, Gujarat 15 10 2013 Vol. 1, Issue No. 3, Pages 8 Monthly Edition FITAG FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION With best compliment Times - Editorial Dear Fitagians, C ome October and it is a season of festivals in India. Navratri has already gone and Diwali is just few days ahead. India is a country of fairs and festivals, which are celebrated in all the com- munity and fraternity. IT fra- ternity is not an exception with Navratri and Diwali functions are celebrated amongst all our member asso- ciations across Gujarat. Garba organised by BITA and Diwali function of ACMA are well- known for their style and cel- ebration. Fluctuating Dollar against ruppee has created a sizable upset in the price factors of every IT product. Financial pressures are difficult to han- dle every Diwali, but this year it has worsen due to such mul- tiple fac- tors. It needs courage and con- fidence within to fight such situ- ation. I hope each member of FITAG's member associations will overcome such situation and flourish in coming future. In this edition of FITAG Times, we have incorporated articles related to new busi- ness avenues in the field of Surveillance. I am sure this will help members to under- stand the market scenario and decide on the future avenues. I have also incorporated anoth- er very important aspect of Information Technology i.e. Cyber threat attacks. E-busi- ness is becoming a routine in everybody's life and parallel cyber threats are increasing day by day. I am sure this arti- cle will give you excellent knowledge about this highly important aspect of our life. I am short of feedback from members. You are requested to send me more and more inputs to improvise FITAG Times. Enjoy 3rd edition of FITAG Times With best compliment Mo: 98252 63484 98245 33546 98245 00846 IMS Research (now part of IHS Inc. (NYSE:IHS)), has recently released its fourth annual video surveillance trends for the year ahead white paper. These predic- tions for 2013 and beyond, serve to provide insight into key trends and opportunities in the video surveillance industry. They are: New Battle Ground in Image Quality Mobile Video Streaming - The Next Gear of Mobile Video Surveillance. India to Remain a High Growth Market Keeping it Simple in 2013 Intelligent Video Surveillance Private Cloud – the future for enterprise video sur- veillance systems? Remote Video Applications .Chinese Companies Looking West Video Surveillance Goes Vertical Video Content Analysis and Video Meta-data as “Big Data” 1. New Battle Ground in Image Quality The increased popularity of HD and megapixel resolu- tion security cameras has been a hot topic in the video surveillance industry over recent years. And quite right- ly so, world shipments of megapixel resolution net- work security cameras are predicted to out-sell standard resolution network security cameras in 2012 for the first time. However, IMS Research does not expect higher megapixel resolutions to be a mass-market trend. Instead, it expects to see new technology developments and camera features that improve image quality become the key battleground as manufacturers try to estab- lish their own USPs. 2. Mobile Video Streaming - The Next Gear of Mobile Video Surveillance Traditionally, in the mobile video surveillance market, recorded video on an on-board device is down- loaded wirelessly when the vehicle returns to the station or depot. Recently, there has been increased buzz around the capability to wirelessly stream video from a mobile video surveillance camera back to a control centre. For a control room opera- tive this brings a number of advantages. For the police, the ability for a control room to view an incident live allows for an instantaneous assessment of the situation and more effective guidance for offi- cers on the ground. It could also provide assistance for lone workers on buses and trains. In the coming year, IMS Research predicts that there will be renewed empha- sis on this type of solution. 3. India to Remain a High Growth Market Economic growth in India has slowed. IHS expects that GDP in Asia’s third-largest economy will grow by just 5.1 percent in 2012, down from 6.9 percent in 2011 and 9.6 percent in 2010. However, despite this background, spending on video surveil- lance equipment has remained resilient with the Indian market fore- cast to enjoy healthy double-digit growth in 2012. The unique charac- teristics of the Indian mar- ket make it an exciting place to do business. What is more, compared to other high growth markets, barriers to entry for foreign-owned suppliers are much lower. 4. Keeping it Simple in 2013 Many suppliers of network video surveillance are now targeting smaller installations to grow their businesses. IMS Research therefore predicts 2013 to be the year where suppliers focus on developing products that are easy to install, easy to operate, and easy to maintain. Video Surveillance Trends for 2013 Video Surveillance Trends for 2013 Ph.: 0268-2551849 2560588 Fax: 2560588 Fitag Times reaches to 21,000 retailers / dealers across Gujarat Contined on page 2...

Upload: kalp-systems

Post on 29-Mar-2016

239 views

Category:

Documents


3 download

DESCRIPTION

FITAG TIMES 3rd Edition

TRANSCRIPT

Page 1: Fitag times 3rd edition

www.fitag.inTuesday Ahmedabad, Gujarat

15 10 2013Vol. 1, Issue No. 3, Pages 8

Monthly Edition

FITAGFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

With best compliment

Times

- Editorial

Dear Fitagians,

Come October and it is a

season of festivals in

India. Navratri has already

gone and Diwali is just few

days ahead. India is a country

of fairs and festivals, which

are celebrated in all the com-

munity and fraternity. IT fra-

ternity is not an exception

with Navratri and Diwali

functions are celebrated

amongst all our member asso-

ciations across Gujarat. Garba

organised by BITA and Diwali

function of ACMA are well-

known for their style and cel-

ebration.

Fluctuating Dollar against

ruppee has created a sizable

upset in the price factors of

every IT product. Financial

pressures are difficult to han-

dle every Diwali, but this year

it has worsen due to such mul-

tiple fac-

tors. It

n e e d s

courage

and con-

f i d e n c e

within to

f i g h t

such situ-

ation. I hope each member of

FITAG's member associations

will overcome such situation

and flourish in coming future.

In this edition of FITAG

Times, we have incorporated

articles related to new busi-

ness avenues in the field of

Surveillance. I am sure this

will help members to under-

stand the market scenario and

decide on the future avenues. I

have also incorporated anoth-

er very important aspect of

Information Technology i.e.

Cyber threat attacks. E-busi-

ness is becoming a routine in

everybody's life and parallel

cyber threats are increasing

day by day. I am sure this arti-

cle will give you excellent

knowledge about this highly

important aspect of our life.

I am short of feedback

from members. You are

requested to send me more

and more inputs to improvise

FITAG Times.

Enjoy 3rd edition of

FITAG Times n

Mr. Kaushik PandyaEditor

With best compliment

Mo: 98252 63484

98245 33546

98245 00846

IMS Research (now part

of IHS Inc. (NYSE:IHS)), has

recently released its fourth

annual video surveillance

trends for the year ahead

white paper. These predic-

tions for 2013 and beyond,

serve to provide insight

into key trends and

opportunities in the

video surveillance

industry. They are:

8 New Battle Groundin Image Quality

8 Mobile VideoStreaming - The Next

Gear of Mobile Video

Surveillance.

8 India to Remain a HighGrowth Market

8 Keeping it Simple in 2013

8 Intelligent VideoSurveillance

8 Private Cloud – the futurefor enterprise video sur-

veillance systems?

8 Remote VideoApplications

8.Chinese CompaniesLooking West

8 Video Surveillance GoesVertical

8 Video Content Analysisand Video Meta-data as

“Big Data”

1. New Battle Ground in

Image Quality

The increased popularity

of HD and megapixel resolu-

tion security cameras has

been a hot topic in the video

surveillance industry over

recent years. And quite right-

ly so, world shipments of

megapixel resolution net-

work security cameras are

predicted to out-sell standard

resolution network security

cameras in 2012 for the first

time.

However,

IMS Research

does not expect

higher megapixel resolutions

to be a mass-market trend.

Instead, it expects to see new

technology developments

and camera features that

improve image quality

become the key battleground

as manufacturers try to estab-

lish their own USPs.

2. Mobile Video Streaming -

The Next Gear of Mobile

Video Surveillance

Traditionally, in the

mobile video surveillance

market, recorded video on an

on-board device is down-

loaded wirelessly when the

vehicle returns to the station

or depot. Recently, there has

been increased buzz around

the capability to wirelessly

stream video from a mobile

video surveillance camera

back to a control centre.

For a control room opera-

tive this brings a number of

advantages. For the police,

the ability for a control room

to view an incident live

allows for an instantaneous

assessment of

the situation and

more effective

guidance for offi-

cers on the ground. It could

also provide assistance for

lone workers on buses and

trains. In the coming year,

IMS Research predicts that

there will be renewed empha-

sis on this type of solution.

3. India to Remain a High

Growth Market

Economic growth in India

has slowed. IHS expects that

GDP in Asia’s third-largest

economy will grow by just 5.1

percent in 2012, down from

6.9 percent in 2011 and 9.6

percent in 2010. However,

despite this background,

spending on video surveil-

lance equipment has

remained resilient with

the Indian market fore-

cast to enjoy healthy

double-digit growth in

2012. The unique charac-

teristics of the Indian mar-

ket make it an exciting

place to do business. What

is more, compared to other

high growth markets, barriers

to entry for foreign-owned

suppliers are much lower.

4. Keeping it Simple in 2013

Many suppliers of network

video surveillance are now

targeting smaller installations

to grow their businesses. IMS

Research therefore predicts

2013 to be the year where

suppliers focus on developing

products that are easy to

install, easy to operate, and

easy to maintain.

Video SurveillanceTrends for 2013

Video SurveillanceTrends for 2013

Ph

.: 0

26

8-2

55

18

49

2560588

Fax:

2560588

Fitag Times reaches to 21,000 retailers / dealers across Gujarat

Contined on page 2...

Page 2: Fitag times 3rd edition

2www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Fitag Times reaches to 21,000 retailers / dealers across Gujarat

Network video surveil-

lance can be an overly com-

plex topic, particularly for

those responsible for smaller

installations. 2013 will be all

about manufacturers making

it more straightforward.

5. Intelligent Video

Surveillance

Forums discussing this

concept are not new. In 2011,

IMS Conferences ran an

intelligent video conference

in Los Angeles and the

Embedded Vision Alliance

has regularly been bringing

together engineers from

leading companies to discuss

the industry.

However, with the explosion

of interest in intelligent

video and the success of

products such as Microsoft’s

Kinect, will 2013 be the year

of intelligent video?

6. Private Cloud – the

future for enterprise video

surveillance systems?

IMS Research forecasts

that private cloud being used

for the infrastructure of

enterprise video surveillance

systems will become a trend

over the coming years.

Private cloud offers the same

advantages as public cloud,

which includes: remote

access to data providing

there is an internet connec-

tion, and shared use of data

processing and storage

resources.

Video surveillance serv-

ice providers have used

aspects of cloud computing

in their solutions for more

than ten years. However, the

prevalence of enterprise

video surveillance systems

using private cloud is start-

ing to gain some traction as

IT managers increasingly

take responsibility for the

management of video sur-

veillance systems.

7. Remote Video

Applications

“Remote” has been a bit

of a buzz word for video sur-

veillance in 2012. Video sur-

veillance as a service

(VSaaS), and its ability to

provide remote access, has

been keenly debated with

opinion divided on whether

it will be successful.

Additionally, remote video

monitoring has become an

increasingly important recur-

ring monthly revenue

(RMR) generator for many

alarm receiving centres.

Both of these examples

relate to physical security;

however, there are a number

of applications that can

leverage “remote” video sur-

veillance in non-security

applications. IMS Research

predicts a number of exciting

new applications will enter

the market in 2013.

8. Chinese Companies

Looking West

It has been well docu-

mented that China is one of

the largest and fastest grow-

ing markets for video sur-

veillance equipment. To

date, much of the narrative

on this topic has centered on

estimating the market oppor-

tunity, identifying the lead-

ing local vendors and dis-

cussing how western compa-

nies can take advantage of

this high growth opportunity.

There has been little debate

on the potential for Chinese

video surveillance vendors

to take advantage of the

growth opportunities in other

regional markets. However,

this is beginning to change

with the emergence of key

Chinese vendors on the

world stage.

9. Video Surveillance Goes

Vertical

Systems integrators and

installers have been special-

ising in specific end-user

industries for decades, with

installation, design, service

and maintenance offerings

targeted to the unique

requirements of customers in

that industry.

IMS Research predicts that

2013 will be the year that

video surveillance vendors

and PSIM platform

providers follow suit.

10. Video Content Analysis

and Video Meta-data as

“Big Data”

“Big Data” has been a hot

topic for businesses in 2012.

While Big Data is not going

to be a mainstream concept

for video surveillance in

2013, IMS Research predicts

that the use and aggregation

of analytics and video feed

meta-data as Big Data will

continue to grow, and that

businesses looking to utilise

Big Data will increasingly

look at the potential to incor-

porate video feed meta-data

streams into their data sets n

Contined on page 1...

Page 3: Fitag times 3rd edition

3www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

retailers / dealers across Gujarat

reaches to

21,00021,000

Fitag TimesFitag Times

Hi,

FITAG times is very good and apprecia-

tive step of FITAG as per my view.

There are several benefit of it. Where

one major benefit is UNITY.

I Congratulate FITAG Team for

the FITAG Times as well as for

their ABCD-IT activity.

I wish FITAG will do cre-

ative activites like these in

future too.

Respected Fitag President &

General Secretary,

Congratulations for your Launching of

Fitag times on 15th of August 2013 and

even Second Edtion of Fitag times.

Great initiative by Fitag by the way of

Digital technology of FITAG TIMES.

As President of Gandhidham IT

Association I Congratulate Fitag on behalf

of All the Gita members and with a great

success for more and more FITAG TIMES.

Fitag times will bring All 24

Association close to each other.Thanking You

for Gandhidham IT Association

President

Satish J.Awatramani

FITAG Times

Review

For Space Booking in

[email protected]

Sejal: 98240 53863 Dhaval: 98240 66111

FITAG TIMESFITAG TIMES

Chita Precident

Anand

FITAG ENDORSE LEGAL Softwere

Page 4: Fitag times 3rd edition

4www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

What you can do with “Google”What you can do with “Google”

When you first open Picasa, you

can choose to scan your entire hard

drive, or just My Pictures, My

Documents, and Desktop. It will then dis-

play your pictures it its Library view. You will

find pictures you forgot you had because

Picasa makes it so easy to view them. If

you have pictures in folders other

than My Pictures, My

Documents, and Desktop you can

add new folders manually by

clicking on Tools / Folder

Manager. The program

will show photos in

their respective

folders.

Double click on a photo to take you to the editing window. Learn what each button in the

"Basic" editing box does. Here is a

brief rundown to help you get started:

< The first button, "Crop", is pretty obvi-ous. By clicking on it, you can cut out a part

of your image. You can choose a manual

size, or choose one of the preset ratios. Click

"Apply" when you are finished cropping.

< The second button, "Straighten", can fixa slanting horizon. Click on it, and use the

grid and slider to rotate the photo until

straight. Click "Apply" to save your

changes.

< The third button, "Redeye", is also pret-ty self-explanatory. If you click it, Picasa

will automatically fix any red eyes on a

photo and indicate them with a green square.

If the program has missed any eyes, you can

drag a box around them with your mouse

and the program will fix them. If Picasa

boxed anything that is not a red eye, you can

click on the box for the program to ignore it.

Click "Apply" when you are done!

< The fourth button, "I'm Feeling Lucky"adjusts the lighting and colour of your photo,

to what the program thinks is a better shade.

This button is handy for fixing hazy and

dull photos.

< The fifth button, "Auto Contrast"heightens the contrast of your photo to

a better level.

< The sixth button, "Auto Colour"improves the colour of your photo and

works well on dull photos.

< The seventh button, "Retouch" canremove dust spots on your photo, which

helps a lot if you had dust on your camera

lens. Click the "Retouch" button and then

click on a blemish on the photo, then move

the mouse around the spot until it is removed.

< "Sharpen" sharpens the edges in your photograph. Use this when your photo is slightly fuzzy and out of

focus. Click on "Sharpen" and then move the "Amount" slider until you are happy with the changes. Click "Apply"

to save your changes. < "Sepia" gives your photo an old-fashioned sepia tone. < "B&W" turns your photo into an

old-fashioned black and white shot. < "Warmify" turns the 'colour temperature' (mentioned above) in your photo

warmer. < "Film grain" gives your photo an old-fashioned film grain. This button combined with "Sepia" or "B&W"

turns modern photographs into lovely old-looking shots. < "Tint" washes your photo in a colour of your choice. Click

on the button and pick a colour with the eyedropper icon to wash your photo with. Then move the "Colour

Preservation" slider until you are happy with the results. Click

"Apply" to save your changes. < "Saturation" heightens your

photo's saturation. Click on it and then move the "Amount" slid-

er to the desired effect. Click "Apply" to save your changes. <

"Soft focus" softens the photo focus around a point of your

choice. This tool is handy for making a single object in a photo

stand out. Click it, and then move the "Size" and "Amount"

sliders until you are happy with the effects.

< The "FillLight" slider has

the same purpose as

the last button on the

"Basic" editing box. Slide it

up and down to lighten your

photo. Useful for when you forget to

switch on your flash.

< The "Highlights" slider makes the lightcolours on your photograph lighter and more

obvious. Use it when you want the light parts in

your photo to stand out.

<The "Shadows" slider serves the opposite pur-pose the "Highlights" one. Use it when you want

to make the dark parts of your photo darker.

< The "Colour Temperature" slider changes the"warmth" of your photo. Blue is cold and red is

warm. Move the slider to the left if you want to

turn your photo bluer and move it right if you

want to turn your photo redder.

< The "Neutral Colour Picker" removes colourcast from photos. Click on the eye-dropper icon

and then on a neutral black, grey or white area of

the photo to adjust the colour.

Download the latest version of

Picasa. You can obtain the latest

version for free from

http://picasa.google.com. It will recog-

nize whether your operating system is

PC, Mac, or Linux when you arrive.

1

2 3 4

6

How to

Use 5

Picasa

< Click on "Upload" to upload your pictures to Picasa Web Albums. This only works if you have a Web Albums account (locat-

ed at: http://picasaweb.google.com). < Click on "Email" to email your pictures to a friend. You can choose to use your default

email programme, which is more complicated to access from Picasa, or you can use your Gmail account, which is simpler to

access because it can simply open in a pop-up, if you have one. <Click on "Print" to send your selected pictures to your printer.

You can choose your layout preferences first, before hitting "Print" (at the bottom right) again. < Click on "Export" to move your

pictures to another folder on your computer's hard drive. This is handy if you want to copy them onto a USB drive or CD later.

7

Page 5: Fitag times 3rd edition

5www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Page 6: Fitag times 3rd edition

6www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

NEWS CORNER

Smartphones cause rise in myopiaif smartphones have made our lives easier,

there is a flip side too-they cause vision

impairment, according a leading laser eye

surgeon. Dr. David

Allamby has revealed that

smartphones have caused

a surge in cases of myopia

( s h o r t - s i g h t e d n e s s )

among young Britons.

Allamby, the founder of Focus Clinics, has

reported a 35 percent increase in patients

with advancing myopia since the launch of

smartphones in 1997, and warns that

myopia in young adults could increase by

50 percent within 10 years. According to

allamby, excessive screen watching at a

close proximity keeps the

genes that control myopia

activated well beyond the

age that short-sightedness

would historically have

stabilized - around the age

of 21. This is known as “epigenetics”.

Allamby says today’s generation is most at

risk, with children as young as seven being

given their first smartphones.

The next version of Androidwill be called KitKat!

Amidst the rumours of

Android 5.0, code-

named Key Lime Pie,

Android boss Sundar Pichai

opened a Pandora’s box

by revealing android KitKat.

Yes, that’s true - your next

Android will be Android 4.4

and will be fondly called

Android Kitkat.

Raising a toast to the suc-

cess of Android with over 1

billion device activations,

Pichai wrote in a Google+

post, “On my return from

Asia, I was also thrilled to

find this guy waiting to

greet me on the front lawn -

love the new # Android

Kitkat statue and can’t

wait to release the next ver-

sion of the platform that is a

sweet as the candy bar that’s

one of our team’s

favourites:)”

Since it is going to be

Android 4.4 and not Android

5.0 (Key Lime Pie), we do

not expect any major

changes in it. The tech

experts opine that we should

expect only a small upgrade

with A ndroid KitKat.

Firefox 24 arrives for Android

Mozilla has officially launched

Firefox 24 for Android. The new

version comes with a number of

new features, improvements and

tools that aid easy sharing and sup-

port for WebRTC.

Wondering how WebRTC will

work on a mobile? Well, with this

new feature, Mozilla is

now on per with Chrome

for Android, as Chrome

users have had access to

WebRTC in their mobile

browsers for a

while now. You

may not be able to

start using this

real-time commu-

nication protocol

right away, but it

will surely encourage

more developers to write

applications for it.

Additionally, there is a new

‘quickshare’ feature in the Firfox

Share menu. This means that the

new version lets you automate the

process of sharing links on Twitter,

Facebook or via email.

This new version also supports

sharing over NFC, which means

you can now bump your phone

with your friend’s and share easily.

It also gets an improved Reader,

which lets you read seamlesssly. It

can swithc lights between night

and day mode automatically,

depending on the ambient light in

the room.

The ‘shiny’ Linux kernel 3.11

arrives!

The ‘all shiny and ready to be

compiled and loved’ Linux kernel

3.11 is here. Making the

announcement, Linus Torvalds,

the creator of Linx, revealed

that the final version of the

kernel doesn’t have too

many changes as compard

to the rc7, but it surely

has some important

bug fixes, Most of

the bug fixes have

been made in the net-

working tree, along

with some in the file

system and the sound fea-

tures.

In his release announce-

ment, Torvalds regretted

missing out on announcing the

recently released rc7. Some of the

features packed into the Linux ker-

nel 3.11 include LZ4 compression,

Zswap, XFS and EXT4 file system

improvemnts, inclusion of Lustre,

Dynamic Power Management

(DPM) for Radeon GPUs, new

DRM display, AVX2 optimisation,

ARM improvements, Power PC

architecture updates, input device

and audio stack improvements,

among others.

Indian companies shiftingto open source software

Increased licensing costs due

to the falling rupee are push-

ing Indian firms to switch to

open source software.

Accroding to a report, compa-

nies are recognising the cost

benefits and flexibility offered

by such software compared to

their proprietary counterparts.

Companies like Hungama

Digital Entertainment, Uttam

Energy, Bilcare, Euronet, Star

Union Dai-Chi and iGate have

all switched to open source

software. The list, according to

the report, is growing. The

report said that shifting to open

source software is not limited

to servers only- critical func-

tions are now turning to open

source.

Customer relationship

management softwere, busi-

ness intelligence softwere, etc,

are now running on open

source softwere, Rahul De,

chair professor in HP was

quoted as saying.

The rumours that were doing the

rounds for a long time now have

finally been proved right with

Microsoft buying Nokia’s devices

and services unit. A Microsoft post read, “Under the rerms of

the agreement, Microsoft will pay EUR (convert to $) 3.79

billion to purchase substantially all of Nokia’s devices and

services business, and EUR 1.65 billion to license Nokia’s

patents, for a total transaction price of EUR 5.44 billion in

cash. Microsoft will draw upon its overseas cash resources to

fund the transaction. The transaction is expected to close in

the first quarter of 2014, subject to approval by Nokia’s share-

holders, regulatory approvals and other closing conditions.”

Microsoft acquires Nokia�s devicesand services unit for $7.2 billion

Page 7: Fitag times 3rd edition

7www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Articals

Publisher : Gaurang Vyas, President, Fitag Editor : Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi

Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad-380015. All rights reserved. No part of this publication

can be reproduced without the prior permission from the publisher.

Ransomware is hijacking systems in greater numbers, and AutoRun malware infections,

spread by thumb drives, are also rising, according to McAfee’s latest threat reportMalware Increasing Steadily

Malware has risen sharply

over the last three quarters,

according to the McAfee Threat

Report: Second Quarter 2013.

McAfee said it currently has more

than 147 million malware sam-

ples.

Spam is also on the rise, help-

ing spread malware and phishing

attacks. Mobile threats are also

increasing, McAfee said, includ-

ing new backdoor Trojans and

banking malware targeting mobile

devices this quarter.

Malware that uses stolen digi-

tal certificates to pose as legiti-

mate software increased by 50

percent, McAfee said. In addition,

Web-based attacks, designed to

target vulnerable browser compo-

nents comprise almost three-

fourths of the Internet's malicious

activity.

Here's a look at the latest

attack trends and hacking tech-

niques.

AutoRun MalwareAutoRun malware, a long-

standing threat targeting

Microsoft PCs using malware on

thumb drives, doubled at the start

of the year, according to McAfee.

Microsoft addressed the issue

years ago, but it continues to tar-

get PCs that haven't been patched

with the latest security updates.

Security vendor Kaspersky

Lab recently analyzed two new

JavaScript worms that are both

designed to spread using AutoRun

functionality. Once a corporate

network is infected, the worms are

difficult to wipe out, according to

Kaspersky lab, because they

quickly spread by copying them-

selves into the root folders of log-

ical volumes of removable stor-

age media and network disks.

Rootkits In DeclineRootkits, which are designed

to evade detection and remain on

victim's systems for a lengthy

period of time, continue to

decline, according to McAfee.

The company said rootkits have

been trending downwards since

the middle of 2011.

The rootkit itself is only

designed to remain stealthy, but it

typically contains other malware,

such as keyloggers, designed to

record keystrokes, and password

stealers. Rootkits are also used to

bring an infected machine into a

larger botnet. ZeroAccess is the

most prevalent rootkit, according

to recent studies. According to

security firm Sophos, ZeroAccess

is often connected to popular

exploit toolkits including

Blackhole. It is used to fuel click-

fraud campaigns and spread spam.

Mobile Spyware RisingSecurity vendors have been

increasingly labeling freely avail-

able Android applications as spy-

ware due to their behavior of

uploading SMS messages, call

logs and location information to a

remote server without informing

the device owner. And, McAfee

said the threat is increasing. One

of the latest attacks detected by

McAfee uses a mobile app that

masquerades as a legitimate font

installer app for Android devices.

Another threat pretends to be soft-

ware for syncing a user's phone.

A recent report by San

Francisco-based Lookout Mobile

Security tied mobile spyware

activity to Russian cybercriminal

gangs. An affiliate net-

work has earned some

attackers up to

$12,000 a month, the

firm said.

Master BootR e c o r dMalware

Master boot record malware,

which can add malicious functions

when a user starts up the PC,

declined slightly in the second

quarter, but it remains at a level

that is the second-highest figure

McAfee has recorded.

One high-profile malware

called Shamoon targets Windows

NT systems and was used in the

attacks on Saudi oil production

firm Aramco. The attacks are dan-

gerous because the malware con-

tains destructive functionality,

giving cybercriminals the ability

to erase the entire hard drive of a

victim's system and the servers of

businesses. The attacks prompted

security experts to call for system

redundancy and offline backups of

critical systems and files.

Ransomware RisingRansomware, which locks a

victim's infected machine and

demands payment for the unlock

code, has been steadily increasing,

McAfee said. The number of new,

unique malware samples this

quarter is greater than 320,000,

more than twice as many as last

quarter, the company said.

Ransomware attacks are grow-

ing in popularity over fake

antivirus software because attack-

ers have figured out that they can

use anonymous payment services

to keep security researchers and

law enforcement from tracking

them down.

Suspicious URLs Rise

The number of suspicious

URLs that lead to sites hosting

malware and phishing attacks con-

tinues to increase. McAfee said it

logged more than 74.7 million

suspicious URLs by the end of

June, which represents a 16 per-

cent increase over the first quarter

of 2013.

Google, Bing, Yahoo and oth-

ers join McAfee and other securi-

ty firms to constantly rate the rep-

utation of websites. McAfee said

it will label a URL suspicious if its

automated systems "find combi-

nations of questionable code and

functionality." The 74.7 million

URLs it is tracking refer to 29 mil-

lion domain names, up 5 percent

from the previous period.

Phishing Attacks DeclineMcAfee said it is charting a

decline in the number of new

phishing URLs over the last quar-

ter. The firm said the number of

new phishing URLs ebbs and

flows throughout the year, trend-

ing upward typically during the

holiday season.

The top five industries being

targeted by phishers include

finance, online auction sites, gov-

ernment, shopping and services,

McAfee said. Companies in the

U.S. are the most frequently tar-

geted, with Amazon, American

Express, Deloitte and eBay lead-

ing as the top companies being

targeted.

Spam On The RiseSpam volume has now

reached 2010 levels at 2 trillion

messages, McAfee said. Spam

volume also rises and falls

throughout the year. Spam in the

United States decreased by 16 per-

cent, McAfee said.

The U.S. hosts the most sites

used for spam purposes, McAfee

said. Delivery service notification

teasers remain popular as well as

drug offers. Much of the spam

identified in the last quarter con-

tained subject lines related to the

Boston Marathon bombings.

Many of the messages contained

links to malware.

Botnet Infections Rise,Cutwail King

Botnet infections had been on

the decline since May of 2012, but

McAfee said it has begun charting

an increase in the last quarter.

Cutwail remains the largest bot-

net, infecting 6 million PCs during

the second quarter, McAfee said.

Cutwail sends out spam, but it

is also connected to the spread of

banking Trojans and other mal-

ware that are embedded in mali-

cious document files. Researchers

said in May that a new Cutwail

communications mechanism

makes it more resilient to take

downs. The bulk of the latest

Cutwail infections are in India,

Iran and Mexico.

Attacks Target E-CurrencyDistributed denial-of-service

attacks against the infrastructure

that supports the Bitcoin have

resulted in wild swings in the vir-

tual currency's value, McAfee

said. Law enforcement cracked

down on some of the cybercrimi-

nals behind the attacks. But, mal-

ware is available on the black mar-

ket that can be used to infect PCs

and servers to use the computing

power to mine Bitcoins without

the owner's knowledge. Account

holders are at an increased risk of

attack from phishers and attackers

attempting to drain accounts,

McAfee said. Other forms of e-

currency are available and also

come with serious risks n

10TRENDING

CYBERTHREATATTACKS IN

2013

Content by: Computer Reseller

News (www.crn.in)

n ROBERT WESTERVELT

Page 8: Fitag times 3rd edition

8www.fitag.in

Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

ACTIVITY CORNER

Fitag Times reaches to 21,000 retailers / dealers across Gujarat

FITAG as promised had arrange ABCD-IT at Baroda & in future will continue the same across Gujarat. ABCD-IT was lead by official mentor

Mr. Nandak Pandya.. All BITA members enjoyed the programme. FITAG team thanks Bita team for good arrangment.

FITAG ABCD-IT 2nd Session At BITA (Baroda IT Association)

Baroda IT Association (BITA), celebrated Navratri by organizing BITA Garba Mahotsav 2013

at Akota Stadium from 5th to 13th October backed by the theme 'Technology meets Tradition'.

BITA had roped Shri Pankajkumar Goswami of "Soor Group" a well known name in the field

of Garba as a lead singer.

With joint effort of BITA Board and other members this turned into a huge success. The

entire association members have worked really hard to make this event a successful event."

With a jam packed stadium with various different stands like Member's Pavalion, Invitee, VIP,

Executive lounge more than 10,000 people participated on daily basis in BITA Garba Mahotsav

2013. Apart from this prizes like LED TV, Tablet, Phone Pad and Memo Pad were given to best

performers in different categories on daily basis.

This year BITA Garba Mahotsav moved to second place from its third place as best garba

organization in Vadodara.

BITA Garba Mahotsav 2013