Fitag times 3rd edition
-
Upload
kalp-systems -
Category
Documents
-
view
233 -
download
3
description
Transcript of Fitag times 3rd edition
www.fitag.inTuesday Ahmedabad, Gujarat
15 10 2013Vol. 1, Issue No. 3, Pages 8
Monthly Edition
FITAGFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
With best compliment
Times
- Editorial
Dear Fitagians,
Come October and it is a
season of festivals in
India. Navratri has already
gone and Diwali is just few
days ahead. India is a country
of fairs and festivals, which
are celebrated in all the com-
munity and fraternity. IT fra-
ternity is not an exception
with Navratri and Diwali
functions are celebrated
amongst all our member asso-
ciations across Gujarat. Garba
organised by BITA and Diwali
function of ACMA are well-
known for their style and cel-
ebration.
Fluctuating Dollar against
ruppee has created a sizable
upset in the price factors of
every IT product. Financial
pressures are difficult to han-
dle every Diwali, but this year
it has worsen due to such mul-
tiple fac-
tors. It
n e e d s
courage
and con-
f i d e n c e
within to
f i g h t
such situ-
ation. I hope each member of
FITAG's member associations
will overcome such situation
and flourish in coming future.
In this edition of FITAG
Times, we have incorporated
articles related to new busi-
ness avenues in the field of
Surveillance. I am sure this
will help members to under-
stand the market scenario and
decide on the future avenues. I
have also incorporated anoth-
er very important aspect of
Information Technology i.e.
Cyber threat attacks. E-busi-
ness is becoming a routine in
everybody's life and parallel
cyber threats are increasing
day by day. I am sure this arti-
cle will give you excellent
knowledge about this highly
important aspect of our life.
I am short of feedback
from members. You are
requested to send me more
and more inputs to improvise
FITAG Times.
Enjoy 3rd edition of
FITAG Times n
Mr. Kaushik PandyaEditor
With best compliment
Mo: 98252 63484
98245 33546
98245 00846
IMS Research (now part
of IHS Inc. (NYSE:IHS)), has
recently released its fourth
annual video surveillance
trends for the year ahead
white paper. These predic-
tions for 2013 and beyond,
serve to provide insight
into key trends and
opportunities in the
video surveillance
industry. They are:
8 New Battle Groundin Image Quality
8 Mobile VideoStreaming - The Next
Gear of Mobile Video
Surveillance.
8 India to Remain a HighGrowth Market
8 Keeping it Simple in 2013
8 Intelligent VideoSurveillance
8 Private Cloud – the futurefor enterprise video sur-
veillance systems?
8 Remote VideoApplications
8.Chinese CompaniesLooking West
8 Video Surveillance GoesVertical
8 Video Content Analysisand Video Meta-data as
“Big Data”
1. New Battle Ground in
Image Quality
The increased popularity
of HD and megapixel resolu-
tion security cameras has
been a hot topic in the video
surveillance industry over
recent years. And quite right-
ly so, world shipments of
megapixel resolution net-
work security cameras are
predicted to out-sell standard
resolution network security
cameras in 2012 for the first
time.
However,
IMS Research
does not expect
higher megapixel resolutions
to be a mass-market trend.
Instead, it expects to see new
technology developments
and camera features that
improve image quality
become the key battleground
as manufacturers try to estab-
lish their own USPs.
2. Mobile Video Streaming -
The Next Gear of Mobile
Video Surveillance
Traditionally, in the
mobile video surveillance
market, recorded video on an
on-board device is down-
loaded wirelessly when the
vehicle returns to the station
or depot. Recently, there has
been increased buzz around
the capability to wirelessly
stream video from a mobile
video surveillance camera
back to a control centre.
For a control room opera-
tive this brings a number of
advantages. For the police,
the ability for a control room
to view an incident live
allows for an instantaneous
assessment of
the situation and
more effective
guidance for offi-
cers on the ground. It could
also provide assistance for
lone workers on buses and
trains. In the coming year,
IMS Research predicts that
there will be renewed empha-
sis on this type of solution.
3. India to Remain a High
Growth Market
Economic growth in India
has slowed. IHS expects that
GDP in Asia’s third-largest
economy will grow by just 5.1
percent in 2012, down from
6.9 percent in 2011 and 9.6
percent in 2010. However,
despite this background,
spending on video surveil-
lance equipment has
remained resilient with
the Indian market fore-
cast to enjoy healthy
double-digit growth in
2012. The unique charac-
teristics of the Indian mar-
ket make it an exciting
place to do business. What
is more, compared to other
high growth markets, barriers
to entry for foreign-owned
suppliers are much lower.
4. Keeping it Simple in 2013
Many suppliers of network
video surveillance are now
targeting smaller installations
to grow their businesses. IMS
Research therefore predicts
2013 to be the year where
suppliers focus on developing
products that are easy to
install, easy to operate, and
easy to maintain.
Video SurveillanceTrends for 2013
Video SurveillanceTrends for 2013
Ph
.: 0
26
8-2
55
18
49
2560588
Fax:
2560588
Fitag Times reaches to 21,000 retailers / dealers across Gujarat
Contined on page 2...
2www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Fitag Times reaches to 21,000 retailers / dealers across Gujarat
Network video surveil-
lance can be an overly com-
plex topic, particularly for
those responsible for smaller
installations. 2013 will be all
about manufacturers making
it more straightforward.
5. Intelligent Video
Surveillance
Forums discussing this
concept are not new. In 2011,
IMS Conferences ran an
intelligent video conference
in Los Angeles and the
Embedded Vision Alliance
has regularly been bringing
together engineers from
leading companies to discuss
the industry.
However, with the explosion
of interest in intelligent
video and the success of
products such as Microsoft’s
Kinect, will 2013 be the year
of intelligent video?
6. Private Cloud – the
future for enterprise video
surveillance systems?
IMS Research forecasts
that private cloud being used
for the infrastructure of
enterprise video surveillance
systems will become a trend
over the coming years.
Private cloud offers the same
advantages as public cloud,
which includes: remote
access to data providing
there is an internet connec-
tion, and shared use of data
processing and storage
resources.
Video surveillance serv-
ice providers have used
aspects of cloud computing
in their solutions for more
than ten years. However, the
prevalence of enterprise
video surveillance systems
using private cloud is start-
ing to gain some traction as
IT managers increasingly
take responsibility for the
management of video sur-
veillance systems.
7. Remote Video
Applications
“Remote” has been a bit
of a buzz word for video sur-
veillance in 2012. Video sur-
veillance as a service
(VSaaS), and its ability to
provide remote access, has
been keenly debated with
opinion divided on whether
it will be successful.
Additionally, remote video
monitoring has become an
increasingly important recur-
ring monthly revenue
(RMR) generator for many
alarm receiving centres.
Both of these examples
relate to physical security;
however, there are a number
of applications that can
leverage “remote” video sur-
veillance in non-security
applications. IMS Research
predicts a number of exciting
new applications will enter
the market in 2013.
8. Chinese Companies
Looking West
It has been well docu-
mented that China is one of
the largest and fastest grow-
ing markets for video sur-
veillance equipment. To
date, much of the narrative
on this topic has centered on
estimating the market oppor-
tunity, identifying the lead-
ing local vendors and dis-
cussing how western compa-
nies can take advantage of
this high growth opportunity.
There has been little debate
on the potential for Chinese
video surveillance vendors
to take advantage of the
growth opportunities in other
regional markets. However,
this is beginning to change
with the emergence of key
Chinese vendors on the
world stage.
9. Video Surveillance Goes
Vertical
Systems integrators and
installers have been special-
ising in specific end-user
industries for decades, with
installation, design, service
and maintenance offerings
targeted to the unique
requirements of customers in
that industry.
IMS Research predicts that
2013 will be the year that
video surveillance vendors
and PSIM platform
providers follow suit.
10. Video Content Analysis
and Video Meta-data as
“Big Data”
“Big Data” has been a hot
topic for businesses in 2012.
While Big Data is not going
to be a mainstream concept
for video surveillance in
2013, IMS Research predicts
that the use and aggregation
of analytics and video feed
meta-data as Big Data will
continue to grow, and that
businesses looking to utilise
Big Data will increasingly
look at the potential to incor-
porate video feed meta-data
streams into their data sets n
Contined on page 1...
3www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
retailers / dealers across Gujarat
reaches to
21,00021,000
Fitag TimesFitag Times
Hi,
FITAG times is very good and apprecia-
tive step of FITAG as per my view.
There are several benefit of it. Where
one major benefit is UNITY.
I Congratulate FITAG Team for
the FITAG Times as well as for
their ABCD-IT activity.
I wish FITAG will do cre-
ative activites like these in
future too.
Respected Fitag President &
General Secretary,
Congratulations for your Launching of
Fitag times on 15th of August 2013 and
even Second Edtion of Fitag times.
Great initiative by Fitag by the way of
Digital technology of FITAG TIMES.
As President of Gandhidham IT
Association I Congratulate Fitag on behalf
of All the Gita members and with a great
success for more and more FITAG TIMES.
Fitag times will bring All 24
Association close to each other.Thanking You
for Gandhidham IT Association
President
Satish J.Awatramani
FITAG Times
Review
For Space Booking in
Sejal: 98240 53863 Dhaval: 98240 66111
FITAG TIMESFITAG TIMES
Chita Precident
Anand
FITAG ENDORSE LEGAL Softwere
4www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
What you can do with “Google”What you can do with “Google”
When you first open Picasa, you
can choose to scan your entire hard
drive, or just My Pictures, My
Documents, and Desktop. It will then dis-
play your pictures it its Library view. You will
find pictures you forgot you had because
Picasa makes it so easy to view them. If
you have pictures in folders other
than My Pictures, My
Documents, and Desktop you can
add new folders manually by
clicking on Tools / Folder
Manager. The program
will show photos in
their respective
folders.
Double click on a photo to take you to the editing window. Learn what each button in the
"Basic" editing box does. Here is a
brief rundown to help you get started:
< The first button, "Crop", is pretty obvi-ous. By clicking on it, you can cut out a part
of your image. You can choose a manual
size, or choose one of the preset ratios. Click
"Apply" when you are finished cropping.
< The second button, "Straighten", can fixa slanting horizon. Click on it, and use the
grid and slider to rotate the photo until
straight. Click "Apply" to save your
changes.
< The third button, "Redeye", is also pret-ty self-explanatory. If you click it, Picasa
will automatically fix any red eyes on a
photo and indicate them with a green square.
If the program has missed any eyes, you can
drag a box around them with your mouse
and the program will fix them. If Picasa
boxed anything that is not a red eye, you can
click on the box for the program to ignore it.
Click "Apply" when you are done!
< The fourth button, "I'm Feeling Lucky"adjusts the lighting and colour of your photo,
to what the program thinks is a better shade.
This button is handy for fixing hazy and
dull photos.
< The fifth button, "Auto Contrast"heightens the contrast of your photo to
a better level.
< The sixth button, "Auto Colour"improves the colour of your photo and
works well on dull photos.
< The seventh button, "Retouch" canremove dust spots on your photo, which
helps a lot if you had dust on your camera
lens. Click the "Retouch" button and then
click on a blemish on the photo, then move
the mouse around the spot until it is removed.
< "Sharpen" sharpens the edges in your photograph. Use this when your photo is slightly fuzzy and out of
focus. Click on "Sharpen" and then move the "Amount" slider until you are happy with the changes. Click "Apply"
to save your changes. < "Sepia" gives your photo an old-fashioned sepia tone. < "B&W" turns your photo into an
old-fashioned black and white shot. < "Warmify" turns the 'colour temperature' (mentioned above) in your photo
warmer. < "Film grain" gives your photo an old-fashioned film grain. This button combined with "Sepia" or "B&W"
turns modern photographs into lovely old-looking shots. < "Tint" washes your photo in a colour of your choice. Click
on the button and pick a colour with the eyedropper icon to wash your photo with. Then move the "Colour
Preservation" slider until you are happy with the results. Click
"Apply" to save your changes. < "Saturation" heightens your
photo's saturation. Click on it and then move the "Amount" slid-
er to the desired effect. Click "Apply" to save your changes. <
"Soft focus" softens the photo focus around a point of your
choice. This tool is handy for making a single object in a photo
stand out. Click it, and then move the "Size" and "Amount"
sliders until you are happy with the effects.
< The "FillLight" slider has
the same purpose as
the last button on the
"Basic" editing box. Slide it
up and down to lighten your
photo. Useful for when you forget to
switch on your flash.
< The "Highlights" slider makes the lightcolours on your photograph lighter and more
obvious. Use it when you want the light parts in
your photo to stand out.
<The "Shadows" slider serves the opposite pur-pose the "Highlights" one. Use it when you want
to make the dark parts of your photo darker.
< The "Colour Temperature" slider changes the"warmth" of your photo. Blue is cold and red is
warm. Move the slider to the left if you want to
turn your photo bluer and move it right if you
want to turn your photo redder.
< The "Neutral Colour Picker" removes colourcast from photos. Click on the eye-dropper icon
and then on a neutral black, grey or white area of
the photo to adjust the colour.
Download the latest version of
Picasa. You can obtain the latest
version for free from
http://picasa.google.com. It will recog-
nize whether your operating system is
PC, Mac, or Linux when you arrive.
1
2 3 4
6
How to
Use 5
Picasa
< Click on "Upload" to upload your pictures to Picasa Web Albums. This only works if you have a Web Albums account (locat-
ed at: http://picasaweb.google.com). < Click on "Email" to email your pictures to a friend. You can choose to use your default
email programme, which is more complicated to access from Picasa, or you can use your Gmail account, which is simpler to
access because it can simply open in a pop-up, if you have one. <Click on "Print" to send your selected pictures to your printer.
You can choose your layout preferences first, before hitting "Print" (at the bottom right) again. < Click on "Export" to move your
pictures to another folder on your computer's hard drive. This is handy if you want to copy them onto a USB drive or CD later.
7
5www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
6www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
NEWS CORNER
Smartphones cause rise in myopiaif smartphones have made our lives easier,
there is a flip side too-they cause vision
impairment, according a leading laser eye
surgeon. Dr. David
Allamby has revealed that
smartphones have caused
a surge in cases of myopia
( s h o r t - s i g h t e d n e s s )
among young Britons.
Allamby, the founder of Focus Clinics, has
reported a 35 percent increase in patients
with advancing myopia since the launch of
smartphones in 1997, and warns that
myopia in young adults could increase by
50 percent within 10 years. According to
allamby, excessive screen watching at a
close proximity keeps the
genes that control myopia
activated well beyond the
age that short-sightedness
would historically have
stabilized - around the age
of 21. This is known as “epigenetics”.
Allamby says today’s generation is most at
risk, with children as young as seven being
given their first smartphones.
The next version of Androidwill be called KitKat!
Amidst the rumours of
Android 5.0, code-
named Key Lime Pie,
Android boss Sundar Pichai
opened a Pandora’s box
by revealing android KitKat.
Yes, that’s true - your next
Android will be Android 4.4
and will be fondly called
Android Kitkat.
Raising a toast to the suc-
cess of Android with over 1
billion device activations,
Pichai wrote in a Google+
post, “On my return from
Asia, I was also thrilled to
find this guy waiting to
greet me on the front lawn -
love the new # Android
Kitkat statue and can’t
wait to release the next ver-
sion of the platform that is a
sweet as the candy bar that’s
one of our team’s
favourites:)”
Since it is going to be
Android 4.4 and not Android
5.0 (Key Lime Pie), we do
not expect any major
changes in it. The tech
experts opine that we should
expect only a small upgrade
with A ndroid KitKat.
Firefox 24 arrives for Android
Mozilla has officially launched
Firefox 24 for Android. The new
version comes with a number of
new features, improvements and
tools that aid easy sharing and sup-
port for WebRTC.
Wondering how WebRTC will
work on a mobile? Well, with this
new feature, Mozilla is
now on per with Chrome
for Android, as Chrome
users have had access to
WebRTC in their mobile
browsers for a
while now. You
may not be able to
start using this
real-time commu-
nication protocol
right away, but it
will surely encourage
more developers to write
applications for it.
Additionally, there is a new
‘quickshare’ feature in the Firfox
Share menu. This means that the
new version lets you automate the
process of sharing links on Twitter,
Facebook or via email.
This new version also supports
sharing over NFC, which means
you can now bump your phone
with your friend’s and share easily.
It also gets an improved Reader,
which lets you read seamlesssly. It
can swithc lights between night
and day mode automatically,
depending on the ambient light in
the room.
The ‘shiny’ Linux kernel 3.11
arrives!
The ‘all shiny and ready to be
compiled and loved’ Linux kernel
3.11 is here. Making the
announcement, Linus Torvalds,
the creator of Linx, revealed
that the final version of the
kernel doesn’t have too
many changes as compard
to the rc7, but it surely
has some important
bug fixes, Most of
the bug fixes have
been made in the net-
working tree, along
with some in the file
system and the sound fea-
tures.
In his release announce-
ment, Torvalds regretted
missing out on announcing the
recently released rc7. Some of the
features packed into the Linux ker-
nel 3.11 include LZ4 compression,
Zswap, XFS and EXT4 file system
improvemnts, inclusion of Lustre,
Dynamic Power Management
(DPM) for Radeon GPUs, new
DRM display, AVX2 optimisation,
ARM improvements, Power PC
architecture updates, input device
and audio stack improvements,
among others.
Indian companies shiftingto open source software
Increased licensing costs due
to the falling rupee are push-
ing Indian firms to switch to
open source software.
Accroding to a report, compa-
nies are recognising the cost
benefits and flexibility offered
by such software compared to
their proprietary counterparts.
Companies like Hungama
Digital Entertainment, Uttam
Energy, Bilcare, Euronet, Star
Union Dai-Chi and iGate have
all switched to open source
software. The list, according to
the report, is growing. The
report said that shifting to open
source software is not limited
to servers only- critical func-
tions are now turning to open
source.
Customer relationship
management softwere, busi-
ness intelligence softwere, etc,
are now running on open
source softwere, Rahul De,
chair professor in HP was
quoted as saying.
The rumours that were doing the
rounds for a long time now have
finally been proved right with
Microsoft buying Nokia’s devices
and services unit. A Microsoft post read, “Under the rerms of
the agreement, Microsoft will pay EUR (convert to $) 3.79
billion to purchase substantially all of Nokia’s devices and
services business, and EUR 1.65 billion to license Nokia’s
patents, for a total transaction price of EUR 5.44 billion in
cash. Microsoft will draw upon its overseas cash resources to
fund the transaction. The transaction is expected to close in
the first quarter of 2014, subject to approval by Nokia’s share-
holders, regulatory approvals and other closing conditions.”
Microsoft acquires Nokia�s devicesand services unit for $7.2 billion
7www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
Articals
Publisher : Gaurang Vyas, President, Fitag Editor : Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi
Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad-380015. All rights reserved. No part of this publication
can be reproduced without the prior permission from the publisher.
Ransomware is hijacking systems in greater numbers, and AutoRun malware infections,
spread by thumb drives, are also rising, according to McAfee’s latest threat reportMalware Increasing Steadily
Malware has risen sharply
over the last three quarters,
according to the McAfee Threat
Report: Second Quarter 2013.
McAfee said it currently has more
than 147 million malware sam-
ples.
Spam is also on the rise, help-
ing spread malware and phishing
attacks. Mobile threats are also
increasing, McAfee said, includ-
ing new backdoor Trojans and
banking malware targeting mobile
devices this quarter.
Malware that uses stolen digi-
tal certificates to pose as legiti-
mate software increased by 50
percent, McAfee said. In addition,
Web-based attacks, designed to
target vulnerable browser compo-
nents comprise almost three-
fourths of the Internet's malicious
activity.
Here's a look at the latest
attack trends and hacking tech-
niques.
AutoRun MalwareAutoRun malware, a long-
standing threat targeting
Microsoft PCs using malware on
thumb drives, doubled at the start
of the year, according to McAfee.
Microsoft addressed the issue
years ago, but it continues to tar-
get PCs that haven't been patched
with the latest security updates.
Security vendor Kaspersky
Lab recently analyzed two new
JavaScript worms that are both
designed to spread using AutoRun
functionality. Once a corporate
network is infected, the worms are
difficult to wipe out, according to
Kaspersky lab, because they
quickly spread by copying them-
selves into the root folders of log-
ical volumes of removable stor-
age media and network disks.
Rootkits In DeclineRootkits, which are designed
to evade detection and remain on
victim's systems for a lengthy
period of time, continue to
decline, according to McAfee.
The company said rootkits have
been trending downwards since
the middle of 2011.
The rootkit itself is only
designed to remain stealthy, but it
typically contains other malware,
such as keyloggers, designed to
record keystrokes, and password
stealers. Rootkits are also used to
bring an infected machine into a
larger botnet. ZeroAccess is the
most prevalent rootkit, according
to recent studies. According to
security firm Sophos, ZeroAccess
is often connected to popular
exploit toolkits including
Blackhole. It is used to fuel click-
fraud campaigns and spread spam.
Mobile Spyware RisingSecurity vendors have been
increasingly labeling freely avail-
able Android applications as spy-
ware due to their behavior of
uploading SMS messages, call
logs and location information to a
remote server without informing
the device owner. And, McAfee
said the threat is increasing. One
of the latest attacks detected by
McAfee uses a mobile app that
masquerades as a legitimate font
installer app for Android devices.
Another threat pretends to be soft-
ware for syncing a user's phone.
A recent report by San
Francisco-based Lookout Mobile
Security tied mobile spyware
activity to Russian cybercriminal
gangs. An affiliate net-
work has earned some
attackers up to
$12,000 a month, the
firm said.
Master BootR e c o r dMalware
Master boot record malware,
which can add malicious functions
when a user starts up the PC,
declined slightly in the second
quarter, but it remains at a level
that is the second-highest figure
McAfee has recorded.
One high-profile malware
called Shamoon targets Windows
NT systems and was used in the
attacks on Saudi oil production
firm Aramco. The attacks are dan-
gerous because the malware con-
tains destructive functionality,
giving cybercriminals the ability
to erase the entire hard drive of a
victim's system and the servers of
businesses. The attacks prompted
security experts to call for system
redundancy and offline backups of
critical systems and files.
Ransomware RisingRansomware, which locks a
victim's infected machine and
demands payment for the unlock
code, has been steadily increasing,
McAfee said. The number of new,
unique malware samples this
quarter is greater than 320,000,
more than twice as many as last
quarter, the company said.
Ransomware attacks are grow-
ing in popularity over fake
antivirus software because attack-
ers have figured out that they can
use anonymous payment services
to keep security researchers and
law enforcement from tracking
them down.
Suspicious URLs Rise
The number of suspicious
URLs that lead to sites hosting
malware and phishing attacks con-
tinues to increase. McAfee said it
logged more than 74.7 million
suspicious URLs by the end of
June, which represents a 16 per-
cent increase over the first quarter
of 2013.
Google, Bing, Yahoo and oth-
ers join McAfee and other securi-
ty firms to constantly rate the rep-
utation of websites. McAfee said
it will label a URL suspicious if its
automated systems "find combi-
nations of questionable code and
functionality." The 74.7 million
URLs it is tracking refer to 29 mil-
lion domain names, up 5 percent
from the previous period.
Phishing Attacks DeclineMcAfee said it is charting a
decline in the number of new
phishing URLs over the last quar-
ter. The firm said the number of
new phishing URLs ebbs and
flows throughout the year, trend-
ing upward typically during the
holiday season.
The top five industries being
targeted by phishers include
finance, online auction sites, gov-
ernment, shopping and services,
McAfee said. Companies in the
U.S. are the most frequently tar-
geted, with Amazon, American
Express, Deloitte and eBay lead-
ing as the top companies being
targeted.
Spam On The RiseSpam volume has now
reached 2010 levels at 2 trillion
messages, McAfee said. Spam
volume also rises and falls
throughout the year. Spam in the
United States decreased by 16 per-
cent, McAfee said.
The U.S. hosts the most sites
used for spam purposes, McAfee
said. Delivery service notification
teasers remain popular as well as
drug offers. Much of the spam
identified in the last quarter con-
tained subject lines related to the
Boston Marathon bombings.
Many of the messages contained
links to malware.
Botnet Infections Rise,Cutwail King
Botnet infections had been on
the decline since May of 2012, but
McAfee said it has begun charting
an increase in the last quarter.
Cutwail remains the largest bot-
net, infecting 6 million PCs during
the second quarter, McAfee said.
Cutwail sends out spam, but it
is also connected to the spread of
banking Trojans and other mal-
ware that are embedded in mali-
cious document files. Researchers
said in May that a new Cutwail
communications mechanism
makes it more resilient to take
downs. The bulk of the latest
Cutwail infections are in India,
Iran and Mexico.
Attacks Target E-CurrencyDistributed denial-of-service
attacks against the infrastructure
that supports the Bitcoin have
resulted in wild swings in the vir-
tual currency's value, McAfee
said. Law enforcement cracked
down on some of the cybercrimi-
nals behind the attacks. But, mal-
ware is available on the black mar-
ket that can be used to infect PCs
and servers to use the computing
power to mine Bitcoins without
the owner's knowledge. Account
holders are at an increased risk of
attack from phishers and attackers
attempting to drain accounts,
McAfee said. Other forms of e-
currency are available and also
come with serious risks n
10TRENDING
CYBERTHREATATTACKS IN
2013
Content by: Computer Reseller
News (www.crn.in)
n ROBERT WESTERVELT
8www.fitag.in
Tuesday 15 10 2013FITAGTimesFLOURISH KNOWLEDGE NETWORKING POWER PROTECTION
ACTIVITY CORNER
Fitag Times reaches to 21,000 retailers / dealers across Gujarat
FITAG as promised had arrange ABCD-IT at Baroda & in future will continue the same across Gujarat. ABCD-IT was lead by official mentor
Mr. Nandak Pandya.. All BITA members enjoyed the programme. FITAG team thanks Bita team for good arrangment.
FITAG ABCD-IT 2nd Session At BITA (Baroda IT Association)
Baroda IT Association (BITA), celebrated Navratri by organizing BITA Garba Mahotsav 2013
at Akota Stadium from 5th to 13th October backed by the theme 'Technology meets Tradition'.
BITA had roped Shri Pankajkumar Goswami of "Soor Group" a well known name in the field
of Garba as a lead singer.
With joint effort of BITA Board and other members this turned into a huge success. The
entire association members have worked really hard to make this event a successful event."
With a jam packed stadium with various different stands like Member's Pavalion, Invitee, VIP,
Executive lounge more than 10,000 people participated on daily basis in BITA Garba Mahotsav
2013. Apart from this prizes like LED TV, Tablet, Phone Pad and Memo Pad were given to best
performers in different categories on daily basis.
This year BITA Garba Mahotsav moved to second place from its third place as best garba
organization in Vadodara.
BITA Garba Mahotsav 2013