Tuesday, December 31, 2013

Cheers 2013

2013 was a big year for us, and not only because we released Emsisoft Anti-Malware 8, complete with a new cleaning engine and an optimized user experience. 2013 was also a year where we took new efforts to communicate with our customers.


It was a year where we focused on providing timely solutions to emerging threats, by keeping a keen eye on all of the latest malware developments, and also a year where we received numerous industry awards.


In 2013, Emsisoft Anti-Malware achieved a Perfect Protection score in AV-Comparatives’ Real World Protection and On Demand File Detection Tests. We also received top marks from several MRG Effitas Assessments and Virus Bulletin VB100 Awards.


 


2013-retro-big


 


As we move into 2014, we’d like you to know that Emsisoft will remain committed to the continuous improvement of our product line and to the assurance that your computer is kept safe and secure. We’re growing fast, but we’d be nowhere without the recognition of people like you, our customer.


Please know that keeping you up to date is our number one concern. That’s why we’ve streamlined Emsisoft Anti-Malware 8’s update process, and that’s why we’ll continue to make the effort to stay in touch through newsletters, Facebook, and our blog.


2014 will be a new year of challenges, but we’re ready to help you face them with a secure computer optimized for safety and success.


 


Cheers to 2013 and The (Malware-Free) Year Ahead!




Cheers 2013

Sunday, December 29, 2013

RSA’s Deal With The NSA Reflects A General Mistrust

233172679_03e856527e_z


Here’s how it works when a big company believes that its power is in its girth: They enter this bizarre world that leads them to believe that what comes from their PR organs is enough to float their troubles away. It’s all about denial and avoiding any potential shareholder backlash. And so we come to the sad state of affairs at RSA, the security division of EMC, one of the big-bellied enterprise kings that apparently made a deal with the National Security Agency.


It’s a deal that is now affecting the trust that people have in the company and raises questions about other technology companies and how they have profited from their relationships with the government. It’s fine enough for technology executives to sit down with President Barack Obama like they did last week and say how awful the NSA is behaving. But the RSA’s work with the NSA shows that technology companies need scrutiny as well. The reality: mistrust is spreading, writes security expert Bruce Schneier.



I think about this all the time with respect to our IT systems and the NSA. Even though we don’t know which companies the NSA has compromised — or by what means — knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they’ll be able to say is: “We have secured ourselves from the NSA, except for the parts that we either don’t know about or can’t talk about.”



There’s proof that RSA made a deal with the NSA to use the spy agency’s random number generator as the preferred or default formula in Bsafe, its software for enhancing security on personal computers and other technologies, Reuters reports. This has put RSA in the bright light of scrutiny.  The $10 million deal looks especially bad, considering the connection it has to documents released by Edward Snowden and reported by the New York Times in September. In those documents it was revealed that the NSA formula was actually flawed and had been used by the agency to create a backdoor into encryption products.


RSA said in a blog post on Monday that it does not  ”ever divulges details of customer engagements, but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA’s products, or introducing potential ‘backdoors’ into our products for anyone’s use.” But many in the security profession are just not buying it. Here’s a tidbit from an awesome rant and good summary of what happened from Melissa Elliott, a security analyst and novelist:



September 2013: Revelations derived from the Snowden leak show* that Dual EC is definitely deliberately backdoored by the NSA. RSA acts really surprised. RSA offers some weak excuse that elliptic curves were totally hip (literally in vogue) at the time. RSA does not mention anything about taking anyone’s money. Allegations are posted that an unspecified company accepted ten million dollars to make it their default. Everyone paying attention is pretty sure it’s RSA. (* Full disclosure: smart people disagree with the smoking-gunness of Dual EC being called out specifically by the leak. It’s complicated.)


December 2013: Reuters points to RSA specifically regarding the ten million dollars. RSA issues a non-denial of such magnitude that I’m driven to rage blog.



The denial makes their predicament worse than it now is. It has even led to a backlash. Mikko Hypponen, chief of research at F-Secure,  announced this week in an open letter to EMC Chairman Joe Tucci that he would not participate in the RSA’s annual lavish conference slated for February in San Francisco. Hypponen is a well-respected security expert who had planned to lead a talk titled: “Governments as Malware Authors.”


It’s clear that the actions of RSA and EMC have cast a shadow across the IT world. Until now, it has been the NSA that has been perceived as the true force of darkness, worming its way into systems to monitor our data streams. Now we see a side of the business that is more intertwined with the NSA and by proxy, its agenda for spying.


(Feature image via Flickr)




RSA’s Deal With The NSA Reflects A General Mistrust

Thursday, December 26, 2013

Windows Premium Shield Detected

http://www.aheliotech.com/wp-content/plugins/wp-o-matic/cache/c4a94b3bc0_WPS1.png


Hard at work even over the holiday, Emsisoft’s Malware Research team has just detected a new variant within the GuardSoftware Protector Rogue re-emergence known as Windows Premium Shield.


Like Windows Expert Console, Windows Cleaning Toolkit and Windows Active Hotspot, “Windows Premium Shield” is yet another rogue scanning application designed to trick users into installation by leading them to believe their computer is infected.


As has been the case with its predecessors, Windows Premium Shield begins infection by restarting your computer and then locking Windows until you ‘purchase’ the rogue in full.


Fortunately, Windows Premium Shield is fully prevented by Emsisoft Anti-Malware; and, anyone else who may have been infected can view full removal instructions at the Emsisoft Support Forum.


Have another Great (Anti-Malware Free) Day!




Windows Premium Shield Detected

2013: The Year We Were “Snowden”


Edward Snowden: A new synonym for cyber space security, or perhaps a lack thereof.  A new public figure the world now instantly associates with spying, and data, and that suspicious governmental organization that back in 2012 was just another acronym — the NSA.


This Christmas 2013, Snowden decided to open his mouth again and grace the world with an Alternative Christmas Message, which aired on Great Britain’s Channel 4 and has been uploaded to the web.  In his short message, Snowden looks into the camera and urges viewers to recognize the state of the world in which they are living — a world where conventional privacy is a thing of the past and where newborn children will “never know what it means to have a private moment to themselves.”


An uplifting holiday message, to say the least, Snowden’s Orwellian provocation caps off 2013 as what seems to have become the year where we were “Snowden,” and where what we all suspected was going on anyway became  yet another dramatic talking piece for the mainstream media.  Snowden told us that the government was watching our activity from anything and everything that’s connected to the web; and, yet for most web users this was something that had been suspected and accepted for a number of years.


The real question is what is allowing Edward Snowden to continue his crusade?  And for how much longer will he remain relevant?  For most computer users, the realization that the government could be watching them occurred the moment they realized that the Internet literally was a “world wide web.”  Such a realization was usually then followed by a shoulder shrug, and a continuance of normal activity.  That’s because most people who use computers don’t do anything illegal, online or off.  Most people are just normal people, who use computers to do normal things.  The biggest threat that most people face when browsing online isn’t a malevolent government that seeks to control their behavior and destroy the world; instead, it’s usually just other people who want to commit fraud, using a computer.


The reason Snowden has dominated the cyber security landscape is that Snowden is a voice on the fringe, who’s chosen to speak up.  What’s interesting about most (political) issues like this one is that the majority of people are moderate, and so the majority of people never say a word.   This means that those who believe in extremes are those that fill the conversational void, and that the rest of us are stuck listening to them blather.  Meanwhile, 40 million banking accounts get stolen from Target and yet another personal laptop gets destroyed by an infected USB.


This isn’t to say that governmental surveillance is a good thing.  Far from it, it is admittedly a little messed up; but, it is a reality that’s existed for a long time before Snowden and one that will continue to exist for a long time to come.  The good news, however, is that it isn’t quite as pervasive as the talking heads would suggest.  Not every thought is monitored and not every action takes place under governmental watch.


For one thing, you’re probably not that important.  And for another, you’re really not recording every thing you think.  What most people choose to ignore when engaging in the Snowden debate is that you do still have the freedom to choose how you will interact with your computer.  No one is making you chart your thoughts onto your social media feed, and no one compelled you to upload that video where you rant into the webcam for a good ten minutes about the injustices of the NSA.


Like antivirus security itself, ensuring personal privacy is largely determined by user responsibility and discretion.  Even with the world as computerized as it is, computers are still just tools that we get to control in any way we’d like.  This includes not using them, too.


So here’s to 2013!  The year where we were “Snowden” by a conversation we never really needed to have!


Anyone care to share their thoughts? ;)


 


 


 


 




2013: The Year We Were “Snowden”

Tuesday, December 24, 2013

Target May Be Liable For Up To $3.6 Billion From Credit Card Data Breach

8531912717_3a0b920ecc_b


This is not exactly the merriest of times for Target. Last week the retailer revealed that credit card data from 40 million customers had been stolen. Now it looks like the giant retailer could be liable for up to $3.6 billion.


Target could face a $90 fine for each cardholder’s data compromised, which translates to the $3.6 billion liability, according to a post on the SuperMoney website.


Here’s how it breaks down. Target will already likely face all sorts of lawsuits and the added cost to assure that everything in its infrastructure is secure, SuperMoney explains. But that’s just part of it. Back in 2006, Visa, American Express, JCB, Discover and MasterCard formed the PCI Council to oversee the new Payment Card Industry Data Security Standard (PCI DSS).


The data security standard defines how organizations manage cardholder information. The standard, obviously, is meant to help reduce the likelihood of credit card fraud. Target and other vendors usually get reviewed by the PCI Council once a year to make sure they are keeping their house in order. It’s also a bit of a sham, too. The PCI Council likes to say none of those that they have certified have ever been breached. Well, not exactly. The PCI Council has retroactively revoked certification after a retailer has had a breach.


Regardless, things can get pretty brutal for the retailer. They can face civil fines, suspension of credit card acceptance by a merchant’s credit card account provider and a loss of all the trust that retailers bank on so much with their customers. Four states are now asking Target questions for a potential class action lawsuit. Suddenly, the retailer’s big target logo has a whole new meaning.


But the real damage becomes apparent when the fines are added up on a per cardholder basis. Even if a company is 100 percent PCI-compliant and validated, “a breach in cardholder data may still occur,” according to the Focus On PCI website. Cardholder breaches can result in $50 to $90 fines per “cardholder data compromised.”  T.J. Maxx faced a similar dilemma in 2007 when the data from 90 million cards was stolen.


There are lots of theories for how the breach happened. But the worst part is how this affects people like you and me. The credit cards we use here in the United States for the most part have magnetic strips. All that data is being pulled off the credit cards and put on counterfeit cards that are then sold on the black market, as pointed out by security expert Brian Krebs and discussed in a post by TechCrunch’s John Biggs.


But it’s easy to pin all the blame on Target. The old-fashioned magnetic strip makes fraud so much easier for the crooks out there. Data encrypted on microchips has been used in Europe  and other parts of the world for years but the U.S. lags way behind, making it a haven for black market hackers. Encrypted microchips are not a cure-all, but it could go a long way in protecting consumers, the most vulnerable out of this whole monster mess.


[Image: Flickr/Sean Davis]




Target May Be Liable For Up To $3.6 Billion From Credit Card Data Breach

Monday, December 23, 2013

What is a PUP?

Puppy_Love


When it comes to anti-malware terminology, there’s quite a bit of jargon floating around the web.  This is true of most things computerized.  You’ve got bits and bytes, .exes and .mp3s.  Trojans, rootkits, social media, and RSS feeds.  Platforms, consoles, operating systems, applications.  Articles on websites that are posted on blogs.


It can all get very confusing, especially when terms overlap.  In the world of anti-malware, one term that is particularly troublesome is that of the PUP.


First thing’s first, a PUP is not a Pet


Though named like one, a PUP is a program, not a four legged pet.  PUP stands for Potentially Unwanted Program, and programs that fall under this moniker are slightly different than malware.


From a technical standpoint, a PUP is not malware.  PUPs are not created with the intent to destroy your computer or steal your personal information.  Rather, PUPs are usually just marketing tools that find their way onto people’s computers through a bit of social engineering.


In the past, PUPs were referred to as spyware and ad-ware, but many of the companies that create these programs didn’t like these terms.  They found them counterproductive, as they associated their programs with malware and scared people away.  As such, there now exists a fine legal line between what constitutes a PUP and what constitutes malware, and anyone in the business of labeling programs must be cautious about which term they use.


How can I get one?


Fittingly enough, getting a PUP is kind of like getting a puppy.  Let’s consider two scenarios.


Scenario One


10731980_s


Every day when you come from work, your 10 year old child asks if she can get a puppy.  Early on, she’s very upfront about it.  “Mommy, can we get a puppy,” she politely asks.  You say no, because you’re well aware of everything that’s involved.  Chewed-up furniture, obnoxious yellow stains, hair everywhere, and who knows what else.  All sorts of things that won’t per se destroy your home, but will certainly make it look, feel, and smell much worse.


But your child is persistent.  She continues her puppy campaign for a good month, every day after work asking if the family can get one.  She grows more creative in her approach, drawing out detailed action plans and comparing the benefits of owning a puppy to the costs.  “It will teach me to be responsible,” she says.  This goes on and on, until you grow tired and in a moment of weakness breakdown and say, “Okay.  A puppy it is.”


Yet it doesn’t stop there.  On Saturday morning when you get to the pet store, you walk in to find that they’re having a Puppy Extravaganza.  There’s puppies everywhere, and a bubbly, young salesgirl informs you and your child that they’re having a 2-for-1 Puppy Day Sale!   Your daughter’s eyes light up with glee.  You think about slapping the salesgirl, but you know that it’s simply too late.  You’re going home with two new puppies, whether you want to or not.


Scenario Two


10497029_s


Every day when you come home from work, you log onto your computer and surf the web.  You’ve just purchased a brand new laptop and man is it fast!  You can run with upwards of 30 separate windows at once, and when it comes to finding new entertainment or information you are simply unstoppable.


You’re excited, because the Internet is just about exploding at the seams with all sorts of new plug-ins and applications.  Most of them are free, and many of them are useful.  Every single day you find something new and intriguing that you’ve just got to try, and you fall into a routine where you click INSTALL, INSTALL, INSTALL on repeat until everything is done.


In one way, you’re kind of like the excited child who wants a puppy.  You simply want to try something that’s fun, and you don’t consider the long term implications of what you’re doing.  Even worse, you can have what you want instantaneously, without having to beg your mom or your dad.


In another way, you’re kind of like the exhausted parent.  You know that downloading all sorts of freeware realistically can’t be good, but you’re tired from work and simply don’t care about all of the fine print included in every install.  You just want to relax, and enjoy your freeware.


What’s really going on?


Doma PUP2


Freeware is great, but the reason that most of it is free is because it serves as a vector of advertisement for proprietary software.  How does this happen?  In cases of installation-induced-glee or its counterpart, the “I’m too tired to read the fine print” variant, people end up installing much more than they had originally bargained for.


Creators of PUPs know this well.  They know that people don’t take the time to read through all the steps of every installation wizard they encounter, and, being software developers, they see this as a prime opportunity to advertise their software for free.


What do you end up getting?  Well, it depends on the developer.  Sometimes, it’s an Internet toolbar that helps you accomplish some novel task, all the while displaying its creator’s logo right where your eyes go every time you search.  Other times, it’s something like a branded desktop weather monitor that informs you of the environmental conditions from your hometown to Dubai and everywhere else in between.  In still other cases, PUPs are simply spyware (don’t repeat that), that monitor your search habits and try to coax you into buying things you really don’t need.


Alone, a single PUP is relatively harmless.  But walk into the pet store during Puppy Day Extravaganza, and we can guarantee that you’re going to walk away biting off much more than you can chew.


The Problem with PUPs


The problem with PUPs is that most people don’t have just one; they have a whole litter.  This happens because, over time, most computer users download a lot of freeware – and most of this freeware comes loaded with at least one PUP.


Load your computer with too much of anything, and you can be sure that it will slow down.  At the end of the day, this is why PUPs are named the way they are.  “Potentially unwanted” because if you install enough of them, your computer is going to turn into a slug.  Kind of like how one puppy comes loaded with just enough destruction to ruin your carpet or your couch, but 2-3 puppies will make you want to burn your home down.


In an even simpler analogy, consider PUPs the junk food to the body that is your computer.  One or two won’t kill you, but eat the whole bag and, well, you know how that goes…


PUP Breeds


Like our canine friends, PUPs can come in near infinite variations, from large to small, to clumsy and drooling, to overly yippy and on all accounts downright annoying.  Some of them look like this:


pc_speed_up


If you click on the image and take a closer look, you’ll notice many things.  One is that the Windows taskbar along the bottom of the screen has a new shortcut (the blue P).  In this specific screenshot, the user has clicked on the shortcut.  Because this ‘short cut’ is actually a PUP, it has automatically directed the user to the web address in the URL field, rather than launch a program.  What this amounts to is basically an automated advertisement for computer security software, and the advertisement is designed to appear as though it has scanned your computer and your situation is desperate.


Many times, PUPs will take advantage of the Windows taskbar because it makes them seem more legitimate.  Some PUPs will even go as far as ‘enhancing’ Windows features, by adding novel elements.  One recent PUP tried to impress its owners by bringing the Start button back to Windows 8.  Why did it do this?  Mostly, it’s a case of puppy eyes.  PUPs know they’re bad, but they still want you to love them.  Still other PUPs will appear something like this:


too_many_toolbars


Notice the (over) abundance of Internet toolbars at the top of the screen.  Each one is a PUP, waiting to be clicked and waiting to display an obnoxious new advertisement.  Given enough PUP toolbars, your Internet browser will eventually crash, as each PUP simultaneously battles for your attention (i.e., eats memory on your computer).  What has happen here is that the battle for PUP dominance has caused one PUP to get desperate and revert to displaying a ‘System Failure’ alarm that tells you you’ve downloaded too many PUPs.  Its solution?  Downloading more PUPs of course!


How Can I Avoid Getting a PUP?


Fortunately, preventing your computer from getting a new PUP is much, much easier than telling your children No.  Computers aren’t as cute as kids (at least not yet), and they don’t really care what you do to them.


The best way to avoid PUPs is simply to slow down your installation process.  PUPs can come in on any new software, freeware or not, and all it takes to keep them from entering your computerized home is a bit of close reading and a few clicks to un-check what’s usually a pre-checked box.


real_player


This particular example displays just how deeply layered PUP installs can be.  ‘Delta Search‘ is itself a PUP toolbar, and its installation is preset to install yet another PUP.  RealPlayer is a legitimate product, but it does include a lot of automated marketing many users would prefer to live without.  This is relatively benign enough on its own, but click ‘Next’ and the Delta Search installer displays yet another PUP install screen.


delta_search


This time it’s for a free trial of TuneUp Utility 2013, which in PUP speak translates to a free means of advertising.  Like the PC Speed Up described above, TuneUp Utility 2013 is designed to convince you that your computer is broken and that the only way to fix it is to buy the TuneUp Utility program.  Not malicious, per se, but certainly what one could describe as aggressive salesmanship.  One  program that takes this shark mentality to a whole new level is called Install IQ.


IIQ PUP1 IIQ PUP2


IIQ PUP3 IIQ PUP4


That’s 4 separate install screens for 4 separate PUPs!  Ask yourself how likely it would be for you to read through the finer print of each one, and you’ll have an answer as to whether or not your computer is vulnerable to PUPs.


Emsisoft’s PUP Signature Database


Beyond a bit of patient reading, another method of PUP prevention is to utilize an antivirus software that’s designed to identify PUPs, such as Emsisoft Anti-Malware.  Emsisoft focuses specifically on PUPs that come packaged in freeware because they are the most common.  In fact, our extensive signature database identifies 1000s of PUPs so that you don’t have to, and brings them to your attention before you click INSTALL.


PUPs


Consider us the slap you wished you could have given that overzealous puppy seller, before they announced their 2-for-1 sale.  And don’t worry, our installation process is completely PUP free.




What is a PUP?

Everything You Wanted To Know About The Giant Elance, oDesk Merger & Ensuing Backlash (But Were Afraid To Ask)

Screen Shot 2013-12-20 at 6.25.51 AM


Earlier this year, Seamless and Grubhub announced that their companies would be joining forces in a blockbuster merger. Already two of the biggest names in online food-ordering, the prospect of a combined “Grubless” sent ripples through the market. Once upon a time, these kind of massive private mergers only happened once in a blue moon, but those were different times.


Last week, the online employment industry became the latest victim of this kind of blockbuster consolidation, as oDesk and Elance announced a deal that, pending regulatory approval, will see their two companies unite into the new online freelancer marketplace to be reckoned with. Like Seamless and Grubhub, up until pen hit paper, oDesk and Elance were considered rivals in the world of online staffing, but unlike the former, the response to the oDesk-Elance merger has been, well, less than positive.


While visions of strategic synergies and competitors running for cover danced in the heads of company executives, the scores of freelancers who use oDesk and Elance to find work or hire support don’t seem ready to break out the pom-poms. Angry customers let their opinions be heard en masse on Elance’s blog this morning, while oDesk’s Facebook page drew a similar reaction. And so did the announcement in its community portal.


In short, the consensus among oDesk and Elance users is that both sites are separated by some fundamental differences and that any integrations to result from merging the two platforms will significantly reduce their usability and overall value. Many said, for example, that they use the platforms exclusively and had a long list of reasons why they chose to use one and not the other.


One commenter, Moonsis Mansor, commented on both oDesk and Elance’s Facebook pages, saying that he had used both platforms and thought the merger needed to accomplish three key items to be successful: “Elance’s minimum hourly rate restriction ($3/hr) and Escrow Guarantee on fixed price projects do not change and oDesk platform also incorporates these policies, [second, that] oDesk’s team application is replaced with Elance’s tracker because oDesk’s software is way better than Elance [and, third that] Elance’s way of treating Agencies, a.k.a. companies, is far better than oDesk…”


And that being said, he continued on Elance’s page, if oDesk’s product were to be favored more after the merger, he would likely go elsewhere. The main gripe that surfaced again and again about oDesk centered around its reputation as favoring low-cost labor at the expense of quality.


In other words, an anything-goes approach in which oDesk eschews a minimum rate — with some freelancers offering to work for as low as $1/hour or $0.50/hour — and a model that favors the client at the expense of the freelancer. Ultimately, the most frequently-expressed concern seemed to be that, were the marketplaces ever to merge, oDesk freelancers would undercut pricing and dilute the quality.


Another commenter on Elance’s Facebook page said, in no uncertain terms: “This is awful. The monopoly created by the merger will significantly cost users.”


Of course, representatives from both Elance and oDesk were quick to assure users in social feeds and in comment sections of blog posts that the two companies planned to “continue to operate as separate, independent services … [and that] … as usual, and there are no planned changes to the fees.” The companies both pointed users to an FAQ section they added to their sites to address and flesh out specific questions about the merger.


One important point to note is that, in the wording of the FAQ, while it says that both companies will continue to operate as separate entities, they would do so “for now.” Those can be two very powerful, qualifying words, especially for the seemingly unhappy masses.


Conversation With Elance And oDesk CEOs


When I caught up with Elance CEO Fabio Rosati and oDesk CEO Gary Swart after the announcement and asked them about the backlash, both opted to explain the reaction as a function of the fierce loyalty that each user base has to its platform of choice. In fact, Rosati expressed pride in this loyalty and said that a certain amount of backlash should be expected as a result.


Screen Shot 2013-12-20 at 6.16.43 AM“We have two very distinct platforms, each of which has value to its specific user base … so, in our case, we’re not focused on the traditional synergies two mature businesses might have, we’re trying to approach [the deal] in a unique way,” the Elance CEO told TechCrunch.


In other words, rather than reflexively force the two businesses to become one entity across the board, which would be like forcing a square peg into a circular hole in many respects, the CEOs said they want to operate two micro businesses under one collective umbrella. Furthermore, instead of focusing on the “traditional” where merging companies might promote synergy, Rosati reiterated the language in the FAQ, saying Elance and oDesk would look to create synergies from their investments.”


With their combined financial resources and audience, it becomes a matter of finding areas where that bigger balance sheet can support investments that benefit both platforms, both models and both companies. On the one hand, this kind of thinking makes sense. There are ways to avoid forcing the issue, especially when the gulf between the two appears to be wide — at least in some respects.


The Realities


And, yes, one could say that the display of frustration among users is a heart-warming show of loyalty and that change is frightening and a small group of loyal and vocal dissenters will always react emotionally to the prospect of that change. Having gone through several TechCrunch redesigns, I can say that I’m familiar with this kind of adverse reaction to change, even if some of it may have been justified.


However, on the other hand, when this many users not only perceive but delineate some significant differences in the use cases, models and potential value of the two companies, there’s usually some truth to it. Which then begs the question, are the companies better off? Well, after the torch-and-pitchfork crown poked so many holes in oDesk, it seems they, at least, may be better off. And certainly, if their ambition is to build the next Google or Facebook-sized platform for freelancing and hiring, then they’re a lot closer today than two weeks ago — at least on paper.


But, as George Anders points out, unless oDesk/Elance can figure out a way to rely less on algorithmic matchmaking and more on building human trust and human relationships, it won’t matter whether they go forward as two companies or one.


Looking Forward


The prevailing model at work in staffing marketplaces needs to be optimized by, say, making it easier for employers (or clients) to connect with their regular and most trusted freelancers — or by giving freelancers the potential to, over time, be able to turn hourly gigs into full-time gigs (and incentivize clients to hire their favorite freelancers).


To a certain extent, it’s okay if the Elance and oDesk merger isn’t seamless right away, or that the synergies aren’t perfect, and maybe now together they can attract bigger customers and clients. In the end, whatever shape it takes, the company will have to prove that the new version has the ability to bring more business into the marketplace — and to its freelancers.


After all, in 2013, the average freelancer on Elance and oDesk made less than $100. Yes, there are ways to explain away that stat, and that will work for awhile, but those “8 million registered users” between the two companies aren’t going to stick around for less.


For more, find oDesk’s Merger FAQ here and Gary Swart’s follow up blog post here.




Everything You Wanted To Know About The Giant Elance, oDesk Merger & Ensuing Backlash (But Were Afraid To Ask)

Augmented Reality Is Almost Everywhere

arglasses


There is less difference between our work and home devices, our tablets and our mobile phones. They are not meant for “work” or for the “home.” We just use them wherever we are. The idea of a balance or even the concept of an enterprise hardware manufacturer seems quaint.


The difference, really, is in the applications we choose to apply with these things we wear over our eyes and hold in our hands. Hardware like Google Glass and Atheer Labs 3D Augmented Reality glasses are all badass, of course.  But the data is the special sauce that makes these tools work for us. Like the smartphone, augmented reality is also something neither for work or at home. Instead it’s a layer that can be applied to our home and work life.


And now just as we saw with smartphone and tablets, examples are emerging that show how augmented reality is applying in universal ways.


For example, in the workplace the complexity of repair gets simplified when the various mechanical parts get treated as something digital. An animated wrench can be shown how to be used on a piece of heavy equipment that has also been rendered into a data object. Like smartphones, augmented reality can be used anywhere to get work done.


ResolutionTube, a TechStars Seattle startup, has raised $1.5 million in seed funding for an augmented reality app that helps the technician fix everything from a heating vent to sophisticated medical equipment. Madrona Ventures led the investment with participation from TechStars CEO David Cohen and other angel investors.


The company is targeting the field services market with a knowledge base and a smartphone app that a technician can use to fix things without needing to call a toll-free number for help. Instead, the technician can use the app to scan the serial number that connects to the ResolutionTube knowledge base. If the technician gets stuck, the app can be used to contact an expert who connects with the the technician over video. The technician uses the smartphone camera to show the expert the machinery in question. That is followed with some advice and use of a whiteboard to draw and show what the technician needs to do for the issue to get resolved.


ResolutionTube will use the funding to develop new advanced product features like as superimposing 3D models into video. The vision is to create an augmented reality experience that instructs people how to repair items simply by pointing a device at whatever needs to be fixed. Currently the app listens to the worker and the expert. It then pulls out keywords that gets stored in the knowledge base. The next step is to use natural language processing so the entire conversation can be added to the ResolutionTube information network.  The transition will help ResolutionTube answer questions more so than provide a search capability.


The company is also creating a prototype app on Google Glass. With wearables they can work and get the instructions without having to use their hands to hold a device. Companies like Vuzix have even developed their own eyewear, showing how the market is expanding for augmented reality technologies to serve a workforce that has almost universal connectivity.


Metaio provides another example for how augmented reality is changing the way people work. The company developed an augmented reality app for technicians to  do service and repair work on the Volkswagen XLI,  the company’s latest concept car. The app shows the technician how to repair the car without any prior training.



Devices now enable augmented reality in the way people have always wanted to experience it, said Occipital Co-Founder Vikas Reddy in an email interview. The company has developed Structure, a 3D sensor that customers can strap to the back of their iPads. The 3D sensor, small enough to fit in your pocket, has an SDK for developers to build consumer-facing apps that take advantage of 3D data.



The future of augmented reality is tied to devices like the iPad. But that’s just the foundation for a next generation of apps. These apps will leverage endless stores of data that will take the form of physical objects and provide people with expert knowledge that will be immediately available. This will allow us to see the world in whole new ways and forever transform how we live and work.




Augmented Reality Is Almost Everywhere

Saturday, December 21, 2013

Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers

wifi


Let’s say you’re at the airport, checking your email on your iPhone over the wifi. Well, you’ve already made your first mistake. You’ve trusted the airport network to be secure enough to protect you from hacker attacks.


Zimperium announced today it has raised $8 million from Sierra Ventures to build out its mobile technology designed to protect you from those attacks at the airport or wherever else you might be.


The company also has a tool for IT administrators to monitor all those devices registered to the network. The company now has a super secret project in the works to turn the tables on the hackers. To do that, they are going to hire more hackers, which obviously makes sense. That should not be too difficult, considering Kevin Mitnick, one of the most famous hackers in the world, sits on the company’s board of advisors.


Zimperium has a mobile app called “zAnti” that is meant to give the every day user the ability to test networks to see if they have vulnerabilities such as the danger of “man in the middle,” attacks. These attacks hijack a user’s session and then act as a silent eavesdropper masquerading as a trusted participant.


For example, Frank and Veronica know and trust each other. But their network has gotten hacked and this dude, Lester, has put himself in the middle, pretending to be Veronica. Frank is so happy to check out the link from Veronica, and that’s all it takes. Lester has succeeded in taking over the conversation and gaining access to Veronica’s network of taco truck apps — or whatever the info she has that Lester now seeks to exploit. Lester has convinced Frank to give access to his network as well by sending him a link that he knows Frank will be enticed to open.


The people behind Zimperium are no joke. CEO Itzhak “Zuk” Avraham spent three years with the Israeli Defense Forces (IDF). So you can just imagine what he worked on while there.


It’s no surprise then that Avraham would boast that this new top-secret project will be able to stop attacks such as Stuxnet, the computer worm designed to attack nuclear operations.


Mobile — the next frontier — is a gold mine for the security pros. Angel List has 108 companies listed that specialize in mobile security. But Zimperium has already proven it has the chops. Now it has to show it can be a bad-ass business, too.




Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers

Farewell 2013

We would like to thank you for being with us during 2013, and for trusting and choosing Emsisoft Anti-Malware as your antivirus solution and/or Emsisoft Online Armor as your personal firewall. We hope you’ve had a 100% malware free year! 




2013 has been a significant year for us, and not only because of the major release of Emsisoft Anti-Malware 8 complete with a new cleaning engine, optimized user interface and faster updates.


We’ve been quick to provide you with solutions to new threats, long before other vendors were even aware that a new outbreak was occurring. We’ve made further improvements to the website experience for our non-English speaking audiences, by implementing a language switch for our main blog. Speaking of which, are you aware that a Cryptolocker copycat has begun circulating recently?


Emsisoft Anti-Malware repeatedly achieved a perfect protection score in both AV-Comparatives “Real-World” Protection and On Demand File Detection Tests, as well as several MRG Effitas and VB100 assessments throughout 2013. In 2014 we will continue to offer you the best protection available. Keep an eye out for hot malware related topics in our blog, newsletters and on facebook to make sure you are always up to speed!


 




Farewell 2013

Friday, December 20, 2013

Backed By Steve Blank & More, Startup Genome Founders Launch Next-Gen Benchmarking Tool For Startups

Screen Shot 2013-12-12 at 5.43.34 AM


Three years ago, a team of researchers, entrepreneurs and data geeks set out on an ambitious mission: To put the world’s technology startups under the microscope in an effort to better understand why some succeed and why 90 percent eventually go the way of the dinosaur.


Fast forward to today, and The Startup Genome (as it’s now called) has analyzed data from over 100,000 startups around the globe and has conducted hundreds of in-depth, qualitative interviews with entrepreneurs and investors. The results provide an exciting look into not only what characteristics and qualities make for a successful formula, but how different startup ecosystems stack up with each other.


The team behind the project has also begun to leverage its unique data sets to create a benchmarking tool to enable entrepreneurs to evaluate their progress compared to their peers and help them make more informed product and business decisions. This month, after more than a year of testing and tweaking, the team finally released Compass into the wild.


Compared to prior iterations, Compass founder and CEO Bjoern Herrmann (who is also one of the co-founders of The Startup Genome Project) tells us, the now fully-baked startup benchmarking tool offers automated data collection from a host of tools and services popular among SMBs, including services like Salesforce.com, MailChimp, Google Analytics, Mixpanel, PayPal, Quickbooks and Stripe.


Using data derived from the sources, Compass then funnels your startup’s business metrics into its revamped dashboard, allowing them to view company benchmarks across a range of categories, configure an alert system to stay up to date on company revenue, churn rate, user growth rate, acquisition costs and so on, while offering visualizations of that data in correlation charts, graphs and via tailored, supplemental analysis.


But the real key to the new Compass product, Herrmann says, its the new dynamic system its team developed to generate benchmarks based on large data sets. Up until today, most benchmarking solutions have relied on 50-year-old methodologies to collect and analyze data, so, the team has instead developed a methodology designed specifically for Big Data analysis.


Screen Shot 2013-12-20 at 9.49.35 AM


For example, prior iterations of Compass only grouped companies in to two categories — B2B or B2C — which, of course, is a fairly limited taxonomy given the diversity of startups out there. The new product, however, places companies along a continuous spectrum based on the “complexity of customer interaction,” Herrmann explains. On one end of the spectrum, for example, will be Google Search and businesses that rely on less complex customer interactions, while, on the others side would be, say, Oracle.


The spectrum for “complexity of customer interaction,” the founder explains, is defined by looking at the interplay between a business’ transaction and traffic history. The founder compares the methodology to Google’s first dynamic ranking system for indexing and search results, except, in this case, it’s the methodology used to determine the best benchmarks to use for your company. It’s also the technology that allows Compass to provide a similar level of benchmarking accuracy to a wide range of businesses — from restaurants to retail.


As of now, Compass is free to use and the CEO says that this will remain true for the forseeable future. However, Herrmann did says that the team has begun to test premium features, which will likely include full customization, additional filters, data segmentation and so on.


Screen Shot 2013-12-20 at 9.49.54 AM


Up until now, the Compass team has made most of its money via R&D for governments and consulting firms and by offering sponsored versions of its “Startup Genome Reports.” Moving forward, Compass will also begin piloting a handful of potential revenue channels, including matching companies to value-add products and services, providing automated audits of startups for investors or bye working specifically B2B transactions, or companies within large organizations. The other option, Herrmann said, is to allow financial customers, for example, to manage their relationships with their tech customers.


Going forward, in support of its launch and the continuing experimentation with new revenue channels, Compass’ team has raised a total of $700K from, you guess it, a flock of Angels. Those angels include Amir Banifatemi, Anil Sethi, Ben Congleton, Christopher Grey, Clemente Germanetti

Daniel Recanati, Erik Jansen and more.


With its new money in tow, and 1,400 new businesses joining its platform over the last 10 days, Herrmann said that the team plans to put its capital to work hiring data scientists for its research project and engineers for Compass.


For more, find Compass at home here and Startup Genome here.




Backed By Steve Blank & More, Startup Genome Founders Launch Next-Gen Benchmarking Tool For Startups

InVision Raises $11.6M From FirstMark Capital And Tiger Global

invision-pink


InVision, a prototyping tool for thousands of web developers and designers, has recently closed an $11.6 million Series A round from FirstMark Capital and Tiger Global.


The company launched in 2011 out of New York with a mission to make it easy for designers to share, interact with, and get feedback on their prototypes. Users can easily upload Photoshop files to the web and add interactions to form a simulation, all within a normal web browser under a single link (which can be password protected).


In February 2012, InVision raised a $1.5 million seed round with FirstMark. The startup has since focused on facilitating the conversation around these prototypes, which can now happen with a much wider range of people.


Founder Clark Valberg explained that traditionally, the communication between designers and coders about the final look and feel of a project was limited to an inner circle of people. With InVision, a wide range of people across the company can consult on the design and give their feedback asynchronously.


That might sound like data overflow, but one might also consider it a less risky alternative to launching a real product before the design department is ready. That is, after all, the argument. Some startups believe that design, in multiple drafts, should come before coding out the product, while others believe that you should push a real product out as quickly as possible to get users (and ultimately receive their feedback).


projects_screen


Valberg has told TechCrunch before that he isn’t opposed to iterating based on user feedback, but believes that it’s better to get much of that initial iteration process out of the way before you “lose a lot of control” by making your product publicly available.


The new funding will allow InVision to continue picking up new customers, which currently range from small startups to huge corporations. The company is also working on “some interesting partnerships”, as well as some enhanced marketing and new features.


InVision Video from InVision on Vimeo.




InVision Raises $11.6M From FirstMark Capital And Tiger Global

IBM Buys Aspera, A File Transfer Company That Counts Apple And Netflix As Customers

7796856900_c1552de2c0_b


IBM is acquiring Aspera, a bootstrapped file transfer company that counts media companies, SaaS providers and large enterprises as customers. Aspera has many enterprise use cases, including sending large amounts of genome data and feature-length movies. Terms of the deal were not disclosed.


Aspera’s software is built on “fasp,” its patented file transfer technology. Fasp is designed to leverage a company’s wide area network (WAN) and commodity hardware to achieve speeds that are faster than FTP and HTTP over a secure network. A WAN is essentially a company’s network across a large geographic region. Aspera’s technology optimizes the WAN through its software that allows for granularity in the way the technology is used. Through the process, Aspera optimizes the bandwidth, latency, bottlenecks and a host of other factors.


Apple uses Aspera for video uploads to the iTunes store. Before they started using Aspera it sometimes took content providers 3.5 hours to upload large video files. With Aspera, the content provider reported the time for upload decreased to five minutes.


IBM sees an opportunity to provide customers with a file transfer tool that will be needed as more data becomes available through social media, devices and sensors attached to almost everything we know. Sensors will be on the furniture in our homes, the cars we drive, even our own bodies. It will turn everything that we know into a data object requiring more innovation in how data moves around.


The “cloud” and “big data” get lots of mention in the IBM press release about the acquisition. It can be expected that IBM will highlight its file transfer capability as part of its cloud computing strategy. IBM is showing renewed vigor in the cloud computing market. Earlier this year the company acquired SoftLayer and yesterday it announced a partnership with 21Vianet, a hosting company to provide “enterprise” workloads to customers in China.


The WAN optimization market will hit $4.4 billion by 2014, according to Gartner Research. The IBM Sterling Commerce group also provides high-speed file transfer as do a broad set of other companies that include Ipswitch, Tibco and Globalscape.


(Feature image via Flickr)




IBM Buys Aspera, A File Transfer Company That Counts Apple And Netflix As Customers

Thursday, December 19, 2013

Emsisoft Windows 8.1 Handbook Give-away



The upcoming book “Windows 8.1 – Schritt für Schritt” (engl: Windows 8.1 – step by step) is featuring Emsisoft Anti-Malware and Emsisoft Online Armor in the section “How to make Windows more secure”.


The book is very easy to read and recommendable for Windows 8 novice and experienced users. Step by step, you learn everything you need to know about the new operating system; how to use apps; how to handle files and how tipps and tricks can help you with your daily work routines.



You can get a copy of the book (in German only) at the website of the publisher Vierfarben Verlag


OR:


You can win 1 of 3 German editions now!


All of you who are subscribed to our newsletter are now eligible for winning 1 of 3 books. Simply leave a comment about why you particulary like your Emsisoft product(s) in the German version of this post here. The lucky winners will be picked randomly out of all participants on Dec 23rd, 2013.




Emsisoft Windows 8.1 Handbook Give-away

Brick and Mortar Identity Theft Targets 40 million Accounts

20304381_sJust when you thought that Holiday Identity Theft could only occur online, North American big-box retailer, Target Corporation, announces a massive security breach that could affect up to 40 million American and Canadian consumers.  How did this happen!?


It would seem that a retail economy so focused on ensuring the security of online shopping has left its doors wide open for identity thieves poised to find another means of entry.  Current details on how exactly the thieves hacked their way in is limited, but one can only assume that there was some sort of gaping breach in Target’s internal accounting security.  One further possibility is that the theft was an inside job, years in the making.


Current facts are as follows


The breach affects anyone who swiped their credit card at a Target checkout terminal between November 27th and December 15th.  Strangely enough, the breach does not affect anyone who shopped online at Target’s website.


What the culprits stole away with includes just about everything they’ll need to use any one of the 40 million credit cards: account numbers, customer names, expiration dates, even CVV security codes.  Target states that the breach has since been fixed; but, the necessary data is already in the wrong hands.  For those who have fallen victim to the crime, all that can be done at this point is a vigilant self-monitoring of their own accounts.


A New Target?


In an industry that’s increasingly dominated by online competition, this massive theft represents a major blow to Target Corporation and probably also many other big box retailers that consumers associate with the store.  More than that though, the theft represents a new line of thinking within the identity theft community (that is, if this sort of community even exists ;) .


In other words, hackers seem to be taking a throwback approach to identity theft.  Because competition is tight, retailers have been forced to focus most of their efforts — security and otherwise — on their online sales channels.  This shifted focus may indeed be the reason Target’s identity thieves were able to sneak in, simply because no one thought that they would.  This development entails many broad scale implications that security experts the world around will need to take into consideration in the continual process of honing their own approach.


Antivirus security is much more than technical know-how and programming.  It’s also largely an act of social engineering.  Good hackers know how to exploit human behavior, and good computer security experts know how to anticipate this exploitation.  To be able to anticipate, we here at Emsisoft keep a keen eye on emerging trends.  We do this because we know that wherever there are computers, there needs to be computer security, and to provide it comprehensively we need to be able to adapt and evolve.


As for the Target security breach and just how many among the 40 million it will affect, it is still to early to tell.  Our recommendation to anyone who may have shopped at a Target location between Nov. 27th and Dec. 15th would be to keep a keen eye on potentially compromised accounts for at least the next month.  In some cases, it might even be wise to cancel the card and open a new account, which is a relatively painless process with most major providers — much less than being hacked.


In any event, Have a Great (Malware-Free) Holiday Shopping Season, both online and abroad!





Brick and Mortar Identity Theft Targets 40 million Accounts

Emsisoft Update Cleans Up Database and Identifies Over 6000 New PUPs

17789008_s


This week, Emsisoft releases an update that optimizes our extensive signature database and identifies over 6000 new PUPs!  What is a PUP, you say? Well, it’s not a canine and it’s not quite malware either.  A PUP is a potentially unwanted program that can slow down your computer.  These days, most PUPs come bundled in freeware and many users are unaware of the fact that they’re even installing them.


Fortunately, our dedicated tech-team made it their personal mission to identify a massive collection of some of the newest and most intrusive PUPs around.  In the end, all their hard work has re-optimized Emsisoft’s signature database and led to an enhanced experience for Emsisoft users the world around.


Those of you running already running a paid version of Emsisoft will be happy to hear that the update will be automatically installed, free of charge.


Those interested in learning about everything that went into this new update are encouraged to read on here!




Emsisoft Update Cleans Up Database and Identifies Over 6000 New PUPs