2010年10月10日 星期日

iPhone蚊型警告 被指瞞健康風險

文匯報

手機幅射致癌爭議不絕,雖然法律規定手機生產商須提供安全使用建議,但蘋果、RIM(黑莓生產商)、諾基亞和宏達國際(HTC)等手機巨擘,僅用極細小字體,在說明書隱晦地作出警告,很多用家不會留意,被外界抨擊企圖隱瞞安全風險。

 iPhone說明書裡,警告用家最少與手機保持1.5厘米距離,及不要使用金屬配件。黑莓說明寫著 用家應盡量使用免提裝置,並與身體保持約2.5厘米距離,尤其是不要接觸「孕婦腹部或年輕人下腹」,及「減少通話時間」。這些細小的字句都埋藏在說明書的 字海裡,難以察覺。手機生產商又強調,手機貼近耳朵或腦部不會危害健康。英美兩國已有團體指出,警告字句應印在手機盒上和說明書「開始使用」章節裡。  

■《每日郵報》

2010年9月27日 星期一

網絡戰

finance.yahoo.com

WASHINGTON (AP) -- A powerful computer code attacking industrial facilities around the world, but mainly in Iran, probably was created by experts working for a country or a well-funded private group, according to an analysis by a leading computer security company.

The malicious code, called Stuxnet, was designed to go after several "high-value targets," said Liam O Murchu, manager of security response operations at Symantec Corp. But both O Murchu and U.S. government experts say there's no proof it was developed to target nuclear plants in Iran, despite recent speculation from some researchers.

Creating the malicious code required a team of as many as five to 10 highly educated and well-funded hackers. Government experts and outside analysts say they haven't been able to determine who developed it or why.

The malware has infected as many as 45,000 computer systems around the world. Siemens AG, the company that designed the system targeted by the worm, said it has infected 15 of the industrial control plants it was apparently intended to infiltrate. It's not clear what sites were infected, but they could include water filtration, oil delivery, electrical and nuclear plants.

None of those infections has adversely affected the industrial systems, according to Siemens.

U.S. officials said last month that the Stuxnet was the first malicious computer code specifically created to take over systems that control the inner workings of industrial plants.

The Energy Department has warned that a successful attack against critical control systems "may result in catastrophic physical or property damage and loss."

Symantec's analysis of the code, O Murchu said, shows that nearly 60 percent of the computers infected with Stuxnet are in Iran. An additional 18 percent are in Indonesia. Less than 2 percent are in the U.S.

"This would not be easy for a normal group to put together," said O Murchu. He said "it was either a well-funded private entity" or it "was a government agency or state sponsored project" created by people familiar with industrial control systems.

A number of governments with sophisticated computer skills would have the ability to create such a code. They include China, Russia, Israel, Britain, Germany and the United States. But O Murchu said no clues have been found within the code to point to a country of origin.

Iran's nuclear agency has taken steps to combat the computer worm that has affected industrial sites in the country,ghout the country, including its first nuclear power station just weeks before it was set to go online. Experts from the Atomic Energy Organization of Iran met this past week to discuss how to remove the malware, according to the semiofficial ISNA news agency.

The computer worm, which can be carried or transmitted through portable thumb drives, also has affected the personal computers of staff working at the plant, according to IRNA, Iran's official news agency. The news agency said it has not caused any damage to the plants major systems.

German security researcher Ralph Langner, who has also analyzed the code, told a computer conference in Maryland this month that his theory is that Stuxnet was created to go after the nuclear program in Iran. He acknowledged, though, that the idea is "completely speculative."

O Murchu said there are a number of other possibilities for targets, including oil pipelines. He said Symantec soon will release details of its study in the hope that industrial companies or experts will recognize the specific system configuration being targeted by the code and know what type of plant uses it.

At the Homeland Security Department's National Cybersecurity & Communications Integration Center, a top U.S. cyberofficial on Friday displayed a portable flash drive containing the Stuxnet code and said officials have been studying it in the lab.

"I've let this run wild to see what it would do," said Sean McGurk, director of the cyberoperations center. "So far we haven't seen a lot of smoke coming out, so we know it's not doing anything specifically malicious right now."

Experts at the Energy Department's Idaho National Laboratory have been analyzing it.

McGurk said that "it's very difficult to know what the code was developed for. When you talk about specifically attributing it to a facility with a set purpose from a nation-state actor or criminal actor or 'hacktivist,' it's very difficult for us to say specifically, 'This is what it was targeted to do.'"

Experts in Germany discovered the worm, and German officials transmitted the malware to the U.S. through a secure network. The two computer servers controlling the malware were in Malaysia and Denmark, O Murchu said, but both were shut down after they were discovered by computer security experts earlier this summer.

In plain terms, the worm was able to burrow into some operating systems that included software designed by Siemens AG, by exploiting a vulnerability in several versions of Microsoft Windows.

Unlike a virus, which is created to attack computer code, a worm is designed to take over systems, such as those that open doors or turn physical processes on or off.

AP Broadcast Correspondent Sagar Meghani and AP writer Nasser Karimi in Tehran, Iran, contributed to this report.

2010年9月5日 星期日

Barcamp Hong Kong 2010

Time : 2010-09-18 9:30 - 18:00
Location : Hung Hom, Poly U, 1/F, N+M core, MIC studio G/F P core

Registration : http://www.barcamp.hk/

Facebook : http://www.facebook.com/group.php?gid=6146785447

「BarCamp 香港 2010」已經訂了新日子和地點!

日期:2010 年 9 月 18 日星期六

地點:香港理工大學

* 上午 9:30 在 Core P 的 Multimedia Innovation Centre (MIC) Studio 開始
* Sessions 會在 Core M 和 Core N 一樓的八間房進行

如果你想協助籌辦今次活動,請聯絡左方的任何一位管理員 (Admins)。

你亦可以在這 Wiki 上寫下你的想法和提議 :
http://barcamp.org/BarCampHongKong

世界各地的 BarCamp 主頁:
http://barcamp.pbwiki.com/

2010年9月4日 星期六

三星東芝 齊推iPad殺手

文匯報

蘋果4月推出iPad後賣個滿堂紅,短短80日便賣出超過300萬部,其他廠商亦想分一杯羹,韓國三星和日本東芝都在德國柏林一個展覽上,公布運行Google Android作業系統的全新平板電腦,與iPad對撼。

7吋屏幕重量減半

 三星推出的平板電腦Galaxy Tab有7吋觸控屏幕,較iPad的9.7吋小,但採用Android 2.2作業系統,可顯示Adobe的Flash格式。Galaxy Tab重0.8磅,只有iPad的一半,將於月中在歐洲率先推出。

 iPad在歐美售價分別是499歐元和499美元(約4,995和3,878港元),但據稱三星Galaxy Tab在德國會貴達799歐元(約7,998港元)。

 東芝推出的平板電腦則名為Folio 100,擁有10.1吋屏幕,售價只需399歐元(約3,994港元)。

 除了三星和東芝,韓國LG和美國的HP都將很快推出平板電腦,戴爾(Dell)亦推出5吋屏幕、儼如智能手機的平板電腦。聯想、摩托羅拉、華碩等等都已對這個市場虎視眈眈。

 雖然其他廠商都磨拳擦掌,但有市場調查公司表示,蘋果的iPad 2012年前都會繼續壟斷全球平板電腦市場,今年出貨量佔全球的74.1%。

 ■綜合外電消息/《華爾街日報》

2010年8月12日 星期四

試玩多項創新IT科技 event

www.jonathansin.com

微軟香港辦公室及數碼港數碼媒體中心 ~ 親身試玩多項創新IT科技

感謝「微軟」及「數碼港」兩公司的支持及協助, 上星期終於建立了一個 “敗家 facebook 專頁” (http://facebook.com/Buy.Family)
今個星期便正式安排了第一次的非常精彩的聚會招待各位 Bloggers / Twitter-er / 新浪微博用戶 / facebooker 友好。

是次活動內容主要包括兩部份:
(1) 參觀Microsoft Hong Kong辦公室

- 親身體驗 WP7 於Mobile World Congress上的產品示範
- Microsoft Surface 即場試玩
(2) 參觀數碼港數碼媒體中心及數碼娛樂培育暨培訓中心

- 動態捕捉技術介紹 (Motion capture technology)
- 3D 模型製作展示
- 3D 電影播放技術介紹
- 受培育公司方案展示

請大家積極參與支持, 好讓日後有更多的活動安排給大家,
如果可以, 請各博友都寫三兩隻字提下啦~~謝謝!

日期: 本月 21日 (星期六) (Aug)
時間: 2:00 – 5:30pm

地點: 數碼港 / 另備專車接送往返金鐘海富中心地下 (德立街對開)

對象: Bloggers / Twitter-er / 新浪微博用戶 / facebooker

人數: 共70位
(此Blog+MobileRadio.hk)

名額有限,本活動將以抽籤形式選出幸運兒

參加抽籤之截止日期為: 8月18日 00:00

抽籤結果公佈日期: 8月19日
(另有電郵或facebook 信息通知)

集合及點名時間: 2:00pm

集合地點: 金鐘港鐵站

木馬襲俄Android手機 狂發昂貴短訊

文匯報

手機保安公司Lookout警告,一款在Android手機使用的媒體播放程式包含木馬病毒,能使手機發出昂貴的短訊而不自覺。該病毒在俄羅斯發現,也是首次出現在Android手機上的短訊木馬。Lookout呼籲手機用戶保持警覺,留意下載的手機程式。

 該程式名為「Movie Player」(電影播放器),用戶下載後,會要求用戶允許使用「會讓你花費的服務」。電腦防護公司卡巴斯基稱,該媒體播放程式看似沒有惡意,其實暗藏木 馬,會讓手機傳送短訊到需付昂貴費用的電話號碼,用這種方式悄然將機主的錢轉到網絡罪犯手中;但該木馬程式只影響俄羅斯的Android手機。

■綜合外電 消息

2010年7月30日 星期五

「殭屍」黑客王被捕 曾侵逾千萬電腦

文匯報

美國、西班牙和斯洛文尼亞警方前日公佈,已在斯洛文尼亞拘捕懷疑創建「蝴蝶殭屍電腦網絡」(Mariposa Botnet)的23歲男子。該電腦網絡能盜取信用卡資料、網上銀行及社交網站密碼等,全球多達800萬至1,200萬台電腦曾中毒。

斯洛文尼亞落網 僅23歲

 被捕23歲斯洛文尼亞男子別名「伊瑟多」(Iserdo),名字倒轉來讀,在斯洛文尼亞語解作「救贖」。他於上周在斯國西北部的馬里博爾被捕。「蝴蝶殭屍電腦網絡」於2008年12月出現,能遙距控制受惡意程式感染的電腦,散佈病毒及導致網站癱瘓。該網絡感染了家庭、大學、銀行、政府機構和公司的電腦,包括財富1000大企名單上過半數美國公司及至少40家大型銀行,全球190個國家受影響。  

■綜合外電消息

2010年7月28日 星期三

花旗理財App現泄密碼漏洞

hk.news.yahoo.com

【明報專訊】美國 花旗銀行 (Citibank)的iPhone應用程式(App)設計出現保安漏洞,用戶重要資料包括戶口密碼有外泄風險,呼籲用戶下載更新程式。本港花旗表示,亞洲區用戶不受事件影響。金管局 已向本地銀行了解它們提供的iPhone程式是否存在同類問題。

東亞App可做買賣:已多次測試

香港多間銀行已推出iPhone應用程式,其中東亞銀行 及恒生銀行的程式提供戶口查詢及證券、外幣買賣服務。東亞銀行發言人表示,已回應金管局查詢,銀行自家研發的iPhone程式並無保安漏洞,而該軟件推出前已經過多次測試,客戶資料不會儲存在iPhone內。恒生發言人則表示,可進行證券及外幣買賣的「恒生外匯孖展買賣」,目前仍在試用階段,未全面推出。其餘銀行推出的iPhone程式,如匯豐、花旗及渣打,只提供基本客戶資訊,如港股報價,櫃員機位置等資料,沒有戶口或買賣服務。

密碼存隱藏檔案易外泄 美花旗促下載更新

《華爾街日報 》報道,存在保安漏洞的美國花旗銀行iPhone程式Citi Mobile,自去年3月推出已來已有11.76萬人登記使用,報道引述銀行表示,相信今次事件未有引致客戶重要個人資料外泄。報道稱,該程式會將客戶的個人資料及交易紀錄存放在電話的隱藏檔案(hidden file)內,當中包括戶口號碼及密碼,若該電話與任何電腦進行資料同步(synchronization),有關資料更會存在電腦裏,一旦有關檔案外泄,不法之徒有可能擅自進入客戶的網上銀行戶口。花旗發言人表示,目前香港使用的Citi Mobile與美國版本不同,本地版只提供基本客戶資訊,因此不存在美國方面的問題。

香港電腦保安事故協調中心經理古煒德指出,用手機進行網上買賣,風險與在家中使用網上銀行風險相若,即使手機應用程式沒有將用戶資料存放在手機內,一旦保安不夠安全,同樣會有資料外泄風險,已「越獄」(Jailbreak)的iPhone風險更高。他提醒,看來只是遊戲的的手機程式或屬惡意程式,可以利用病毒盜取手機的資料。金管局發言人表示,已得悉本港花旗銀行不受是次事件影響,金管局正向本港其他銀行了解是否有相同問題。

2010年7月6日 星期二

iTunes Store買家帳戶 疑遭中國黑客入侵

hk.news.yahoo.com

【明報專訊】監察蘋果產品的著名博客網站AppleInsider,聲稱iTunes Store用戶帳戶可能遭中國黑客入侵。報道指黑客在取得戶口資料後,透過「淘寶網」向其他買家兜售,買家得以盜用帳戶進行不法交易,令iTunes用戶蒙受損失。

「淘寶網」買iTunes帳戶出事

要購買iTunes的音樂、電影及iPhone手機的Apps,用戶要有一個iTunes帳戶。報道指有用戶較早時發現iTunes帳戶遭入侵,一 名用戶在網上論壇解釋,不法分子利用「淘寶網」盜用他人帳戶。只要登入「淘寶網」,就會發現大量iTunes 帳戶25元人民幣就有交易。當買家決定交易,賣方會先要求買方設定一個iTunes新戶口名稱及密碼,黑客會將入侵的iTunes帳戶戶口名稱及密碼,改 成買方所提供的資料。

賣方之後會要求買方確認交易及付款,但帳戶有限期不會多於24小時(因受害人發現不屬於自己的交易就會取消信用卡帳戶),而賣方更會告訴買方,在帳 戶取消前盡量在iTunes Store購買產品。同一個被黑客入侵的帳戶,甚至被賣給多個買家。本報記者昨日登上淘寶網以「iTunes帳戶」搜尋,的確搜得大量宣稱「15元保證 24小時」的iTunes帳戶。

程式商涉銷售排名榜造假

AppleInsider又指,程式供應商涉嫌在iTunes Store銷售榜造假,推高部分產品的銷售排名,試圖吸引用戶下載這些產品。例如有單一程式供應商的日本 漫畫書程式,在美國 蘋果商店50大暢銷書榜佔據了40個席位,大部分交易都在短短幾日內進行,令人懷疑涉及造假;而這些漫畫書程式更可能涉及非法盜用版權。

2010年6月30日 星期三

Maemo 開發與 MeeGo

日期:2010 年 7 月 13 日 (二)
時間:晚上 7:15 - 9:45
地點:香港城市大學教學樓 G4302 課室 (香港九龍塘)

語言:廣東話
費用:全免
人數:50

活動詳情:http://www.opensource.hk/node/604 (詳情請參閱全文的英文部份)
參加者網上登記:http://bit.ly/bLUSTL

參加者對象:電腦系學生、手機及應用開發者、用家。

主辦:開放系統研用協會 (OAKA, http://www.oaka.org/)
場地贊助:香港城市大學電腦系

Maemo is a software platform developed by Nokia for smartphones and Internet Tablets. It is based on the Debian Linux distribution.

MeeGo is an open source, Linux project which brings together the Moblin project, headed up by Intel, and Maemo, by Nokia, into a single open source activity.

Agenda:
  1. MeeGo - (Intro and Demo) (Raymond Liu)
  2. Comparison OS with Chromium and Ubuntu 10.04 Netbook Remix (Fai / Haggen)
  3. Maemo Development - The power of Qt (Ben Lau)
  4. Maemo Development - Hildon/GTK (Amanda Lam)
  5. Q&A
Speakers:
  • Miss Amanda Lam, author of 1st Maemo 5 Trad. Chi. lang pack, Maemo 5 app developer.
  • Mr. Ben Lau, vice-chairperson, OAKA, and ARM Inc approved instructor.
  • Mr. Fai Wong, Fedora ambassador, Hong Kong region.
  • Dr. Haggen So, host of Software Freedom Podcast.
  • Mr. Raymond Liu, head of product marketing, Nokia.