Monday, October 20, 2008

Hackers & Cellphones

Georgia Tech security researchers say that hackers will likely target cell phones for use in creating botnet armies. They say that as cell phones get more computing power and better Internet connections, hackers will be able to exploit vulnerabilities in mobile-phone operating systems and Web applications. Millions of PCs have already become part of botnets, and owners generally never know. The Georgia Tech researchers say that if cell phones become absorbed into botnets, new types of scams could be created. For example, infected phones could be programmed to call pay-per-minute 900 numbers, or to buy ringtones from companies established by criminals. The researchers say hackers are particularly drawn to cell phones because they are always on, they are always sending and receiving data, and they generally have poor security. "This is the perfect platform (for hackers)," says Georgia Tech professor Patrick Traynor. "There are some challenges for the adversaries, but we've seen them overcome the challenges in their way before." One challenge for hackers is learning how cellular networks work, which are tightly controlled by cell phone operators.

Friday, October 3, 2008

The Future of Internet Search

Danny Fine of BrainDamage in Haifa, Israel, says computers, not people, should be carrying out Internet searches. He says searching is a form of artificial intelligence that analyzes documents and creates a map of keywords and their relationships to each other. "The search engine doesn't really understand what you're asking, of course--it's just a dumb computer, after all," Fine says. "The way it figures out what you're looking for is by comparing your request to a long list of keywords that are indexed in a database with other terms that could really be what you're looking for." BrainDamage is developing Noesis, a new approach to Internet searching based on natural thinking technology. Natural thinking technology puts the burden of understanding search queries on the search engine, enabling it to return more accurate results. Fine says Noesis gathers information and develops it, guided by the user, to reach a conclusion using the same patterns of logic and ideas that humans use. Noesis essentially teaches machines to understand what humans have in mind when they make a request. "Our system advances artificial intelligence far beyond where it is today, enabling computers to truly understand what is being asked of them--and to respond appropriately," Fine says.

2008 Technology Innovation Awards

The Wall Street Journal's 2008 Technology Innovation Award winners included Salesforce.com's Force.com software tool suite, which enables companies to build their own specially tailored business applications that are developed and delivered over the Internet. The cloud computing service enables companies to access computing power on an as-needed basis. Globalstar's Spot unit earned an award in the consumer electronics category for the Spot Satellite Messenger, a handheld device that transmits preprogrammed messages such as "I'm OK," along with users' whereabouts. Software that tests for security holes in new applications by searching for flaws in binary code netted an award for Veracode, and company co-founder Chris Wysopal says the method offers the accuracy of source code analysis without the need for disclosing proprietary source code. The winner in the network/Internet technologies category was Xsigo Systems for hardware and software that allows the replacement of physical cables in a data center with virtual connectors, each of which is capable of mimicking the performance of up to 14 separate cables. Dispersed Storage software from Cleversafe won for a technology that allows sensitive computer files to be stored more securely and reliably by slicing them up and sending the slices, which by themselves are unreadable to unauthorized parties, over the Internet to multiple storage locations on a network. Swiss Federal Institute of Technology professor Jane Royston says the software "could be an important part of Internet data storage systems." The winner in the wireless category was Tata Consultancy Services' mKrishi service, which can supply crop advice to farmers in rural India via cell phones using a combination of remote sensors, a voice-enabled text-messaging service, and a camera phone.

Web 3.0

Europe is in an excellent position to become the leader in Web 3.0 technology because of its focus on open and pro-competitive telecom networks and commitment to online privacy and security, says Viviane Reding, the European Commission's (EC's) commissioner for information society and media. "Web 3.0 means seamless 'anytime, anywhere' business, entertainment and social networking over fast reliable and secure networks," Reding says. "It means the end of the divide between mobile and fixed lines." She says there could be a 10-fold increase in the scale of the digital universe by 2015. The EC's consultation on the next generation of the Internet launched on Sept. 29 was accompanied by a roadmap. The report described social networking, online business services, nomadic services based on GPS and mobile TV, and smart tags using RFID as trends that would lead to Web 3.0. In a blog post, Vint Cerf welcomed Reding's stance on free and open networks and on open standards. "For Europe to keep up in the global online race, it needs to sprint ahead powered by an openness recipe encompassing a neutral network, users' rights, and open standards," Cerf wrote. "I'm delighted to see that Europe's policymakers stress the successful ingredients to promoting a robust, healthy Internet."