Author: Serkadis

  • Yahoo Issues Mandatory 'Vacation' for Employees Worldwide

    Things are going great at Yahoo, so great, in fact, that everyone is off to celebrate for an entire week; regardless if they like it or not. The company has just issued a mandatory company-wide shutdown of all but “essential” operations for a week starting December 25, 2009 until January 1, 2010. It’s the first time that the company issues such a move worldwide, but it has had similar ‘vacations’ in the US. Apparently, the shutdown was made known to the employees since summer.

    The shutdown “during a traditionally slow week allows employees to recharge, and the company to reduce operating costs for the week,” Yahoo spokeswoman Dana Lengkeek told the Wall Street Journal. Employees in the US will be able to use their vacation time for the days which don’t fall into the regular holiday schedule in order to get paid or they can take unpaid leave. Elsewhere, Yahoo says it will follow local laws and practices to handle the free days. Some functions will be operational though and Yahoo says customer service will function as regular for the period.

    The reason behind the shutdown is, of course, cost cutting as the company isn’t doing very well financially, despite all the talk of a comeback. It has been undergoing a big cost cutting campaign, shutting down services and letting people go on several occasions… (read more)

  • Marc Faber: Avoid The US Disaster, Buy Wheat, Sugar, Natural Gas, And Japan In 2010

    marc faberHeads up to Marc Faber fans: Mr. Gloom Boom Doom has given an extensive interview with the Economic Times of India, laying out some specific ideas for the coming year.

    You can read a full transcript here. Among other things, he likes wheat, sugar, and natural gas, and he hates the US for all the obvious reasons

    Perhaps his most surprising, uber-contrarian call is that he’s bullish on… Japan! He says it’s the ultimate contrarian play:

    So Marc Faber what are your keen investment themes and ideas for 2010?

    I avoid US government bonds I think as a contrarian you really want the contrarian play. You should buy Japanese stocks and Japanese banks this is the absolute contrarian play. Nobody is interested in Japan all the funds have withdrawn money from Japan they have given up on Japan I guarantee you the economy would not do well, forget about the economy the population is shrinking but you can have an economy that does not do well but the companies do well that is a big difference and I think the Japanese banks are very depressed. All the banks in Asia have actually recovered very strongly but not the Japanese banks so as a contrarian play I would look at that.

    Full transcript >

    See the three part video of the interview starting here >

    Join the conversation about this story »

    See Also:

  • NYC Foreclosures Surge, As Unemployment Goes Into The Teens In Several Neighborhoods

    New York NYC skyline night

    A decent theme for understanding the current economic situation, as we slowly roll out of 2009, is the concept of there being two economies.

    You see it everywhere.

    You see it in Europe, where the difference between a country like Greece or Ireland and Germany is huge.

    In the US, the gap between large and small businesses is enormous.

    And in New York — which surprisingly never became the post-Wall Street ghost town many expected it to become — some areas are recovering, while in other areas unemployment soars into the teens, bringing about the kinds of calamities that seemed to be reserved for elsewhere.

    WSJ: Restaurant employee Gregory Ramsden, a 46-year-old renter in the Norwood neighborhood of the north Bronx, has been looking for full-time work since June 2008. He has been teaching classes in English as a second language, but hasn’t had enough money to pay the rent on his apartment since July. His landlord has begun eviction proceedings.

    “I’d take anything. I’d take a job cleaning toilets,” said Mr. Ramsden, who, as a full-time waiter, used to make $50,000 a year, the area’s median income. “I believe I’m running out of options.”

    On the southeastern strip of Queens, where generations of families have entered the middle class by buying starter homes, unemployment has doubled in the past two years to 12.2%.

    In 2008, there were more than 1,800 foreclosure cases filed in the area, and 1,589 filed as of the third quarter of this year, according to the Furman Center for Real Estate and Urban Policy at New York University.

    Neighborhood-wide unemployment data was compiled by the Fiscal Policy Institute think tank.

    Their full announcement:

    —-

    With no respite in sight for New York’s Main Street economy, a tale of two distinct recessions is emerging for the city. That’s the message of a new report released today by the Fiscal Policy Institute, a nonpartisan think tank that focuses on tax, budget, and economic issues.

    “With each passing day, the disconnect grows. Wall Street is recovering, but in the boroughs and neighborhoods, unemployment has doubled in the past year,” said James Parrott, deputy executive director and chief economist at the institute.

    According to the report, more than 400,000 New York City residents are currently out of work – and fully 40 percent of them have been without a job for more than six months. Moreover, the unemployment rate, 10.3 percent in September, is likely to stay in double digits for many more months.

    The so-called Great Recession hit New York City in August 2008, later than the country as a whole, for which the recession began in December 2007. Since then, according to the report, the local economy has suffered in a number of ways:

    • Unemployment has more than doubled over the past year – the sharpest rise in the 34-year history of monthly unemployment data.
    • Two thirds of the job loss in the six months following the September 2008 financial meltdown were outside the finance sector.
    • Median wages have fallen by five percent in this decade and by 11 percent since 1990.
    • New York City consumer spending dropped by 11 percent over the past year.
    • Fifty thousand New York City homeowners have lost their homes through mortgage foreclosures over the past two and a half years.
    • Personal and business bankruptcies are skyrocketing.

    Parrott credits the financial bailout with softening the blow to Wall Street, but said it was not a cure-all. “New York City’s job decline is only half that of the nation’s, but the unemployment crisis is every bit as severe here as it is nationwide,” he said.

    The official unemployment rate masks deeper troubles in the city’s labor market:

    • A greater share of New York’s unemployed have been without work for more than six months.
    • There are large numbers of long-term unemployed, underemployed and discouraged workers – the city’s real unemployment rate is 16 percent.
    • Growing numbers of people are entering or re-entering the labor market spurred by economic hardship.
    • Young workers face 25 to 40 percent unemployment rates.

    “This recession underscores the disparities that characterize our city, with unemployment rates and economic well-being clearly diverging along lines of race and ethnicity,” said Parrott, citing the “real unemployment rate” (which factors in under-employed and discouraged workers) of over 20 percent for blacks and Hispanics who make up half of the city’s workforce.

    Restoring the city’s economy to health requires additional federal stimulus and job creation funding and state action to increase New York’s low unemployment benefit. But Parrott believes that the city government has a role, too: “We need skillful management of the city budget to protect vital services while ensuring that the millions we spend on economic development actually result in good jobs, and not more poverty-wage jobs.”

    Join the conversation about this story »

    See Also:

  • Car Crash Leaves Woman With Insatiable Sex Drive

    2B144F33-1808-4780-B708-3F45D349DFF4.jpg

    Joleen Baughman, 39, was injured two years ago in a car crash which damaged a nerve in her pelvis. This nerve, however, is a very special nerve. It’s the one that controls sexual desire and unfortunately for Baughman, hers is permanently switched on.

    The mother of two from New Mexico now gets sexually turned on by the smallest movement, like sitting on a bus or vacuuming. Baughman suffers from a rare condition known as Restless Genital Syndrome, also known as Persistent Sexual Arousal Syndrome (and no, we’re really not making this up).

    In the April 2007 car crash, Joleen suffered severe injuries including a broken spine. Six months after recovering from the crash she started getting uncontrollable sexual urges.

    The saddest part about this tale is that Baughman gets no release from her turn-ons. Sex with her husband provides no relief and only ends up hurting.

    [via Telegraph.co.uk]

    Related posts:

    1. Woman Cancels Wedding After Discovering Fiance is Secret Porn Star
    2. Woman Has Literally Mind Blowing Sex
    3. The Best Tiger Woods Crash Jokes on the Web

  • T1-45 Vibro-alarm

    T1 -45 is a complete device featuring maximum reliability and favourable cost designed forcontinuous detection and measurement of the vibrations of any type of rotating machine.

    As prescribed by international standards, the speed of vibration is measured. When a presettable vibration threshold is reached, the system supplies a digital oulput signal able to actuate the device installed for protecting the machinery (e.g. relay, PLC etc.).
    Connection mode is similar to the standardized one for photocells. proximity sensors, etc.

    The device consists of professional integrated components embodying SMD technology and is able to withstand electrical tests in accor dance with IEC 801 standards.

  • Teralus 170 S from MEWAG

    Once again Mewag Maschinenfabrik AG has set a cornerstone in the tube bending world. The TERALUS 170 S can now be presented to the public.

    The TERALUS 170 S has a new design, a new way of power transmission and a modular structure. This combination has many advantages – not only with respect to bending results but also concerning ergonomic aspects.

    The bending sequence of the Teralus was optimized. To change from one level to another within the bending cycle, the tube is moved vertically while the bending head is only moved horizontally. Due to this technology, the TERALUS 170 S could be designed with a very stable machine structure for bending large tube diameters.
    Thus MEWAG launches a machine that combines the stability of a big machine with the operator convenience of a small machine.

    Latest technology makes it possible …
    16 servo axes guarantee complete command of the bending process. The power and speed of each individual machine movement can be programmed.

    The design allows it …
    The structure of the bending head and machine base has been optimized in such a way that an absolute stability of the supports of all components that are important for the bending process is ensured.

    Separate drives for positioning and clamping
    Two separate drives each are used for the advance movement of the clamping device and the follow bar support.

    Modular construction of clamping unit and follow bar support
    Due to the arrangement of two guide systems that support each the advance feed slide on the bottom and on the top of the follow bar support, all torques are reduced to a minimum. Therefore, a compact but highly stable machine structure could be realized.

    Gantry drive for advance feed carriage …
    Power and stability can also be found here. The tube advance feed carriage is driven by one drive on the top and one on the bottom. This arrangement guarantees high angular synchronous positioning stability without dynamic distortion of the machine base, regardless whether bending takes place in the bottom-most or in the top-most level.

    Teralus 170S
    MEWAG’s answer to your requirements.

  • Plug kit for swimming pools & spas

    For the owners of swimming pools and spas, a low cost kit of plugs has been developed, that will expand into all of the pipes and nozzle found in modern pools and spas.

    Known as “Pool and Spa Plug Test Kits” these kits have been developed as a result of many years of use of individual plugs by many people in the pool and spa leisure industry, including domestic ponds, fish farms and wetland drainage areas.

    The plugs are manufactured from Nylon 6, an engineering plastic that is resistant to chlorinated water and sea water and can be used under the most arduous temperature and atmospheric conditions for long periods of time.

    The plugs can be used for the stopping of leaks and for testing pipework systems for leaks, using the simple manometer kit provided.

    In addition to the Manometer, the kit comprises 2 each ½”, 2”, 3” and 4” plugs all fitted inside a high quality ABS storage case, along with a series of hose connects for attaching to the plugs if and when required.

    These kits can be adapted to include plugs of different sizes to cater for special requirements and the manufacturer has a range of other kits that are suitable for other branches of pipework service and maintenance companies.

    For larger pools, the use of these plugs could save dramatic levels of costs by not having to empty hot water, reheat new water and add new chemicals, by plugging drain holes while the ork is being done.

    In the event that the plugs in the kit are not large enough for one particular duty, the Company manufactures individual plugs up to 2,000 mm diameter.

    Further information can be obtained from the company

  • Micronizer Jet Mill for the Cosmetic Industry

    Sturtevant’s “Open Manifold Design” Micronizer® Jet Mill pulverizes cosmetic powders, as well as chemicals, pharmaceuticals, pigments, ceramics, and minerals . The Micronizer® grinds and classifies powders to low and sub-micron particle sizes in a single operation using high pressure air, gas or steam to induce particle-on-particle impact reduction. The product size is controlled by the operating pressure, which affects the particle collision velocity and by the feed rate, which affects the powder’s retention time in the grinding chamber. Particles are size classified by centrifugal force that holds larger particles in the grinding area and centripetal force that drags finer particles into the vortex for discharge. Micronizer® Jet Mills have successfully processed many pigments, minerals, metal oxides, ferrites, titanates, nitrides, silicates, carbonates, etc.

    Using a unique fluid energy grinding system to generate particle-on-particle impact with no moving parts to create smooth, silky and grit free powdered ingredients, Sturtevant’s Micronizer Jet Mill is an exceptional tool for the Cosmetic Industry.

    The Micronizer allows complete access to the internal material grinding chamber & compressed air chamber for easy cleaning & disassembles in minutes.

    For processing cosmetic powders, product contact parts can be made from stainless steel, aluminum oxide as well as tungsten carbide. The variety of replaceable liners provides protection against wear and contamination. Laboratory, pilot plant and continuous production models are available.

  • Mikron NAD transfer system Economical machining of precision

    Mikron NAD transfer system: is big for small series production

    Flexibility
    100% CNC controlled for simple and quick change-overs
    Quick exchangeable clamping fixtures with automatic repositioning of the CNC-axis
    Up to 32 readily available spindle modules for fast change-over.

    Versatility
    Machining on 6 faces with pre-machining on wire or bar
    Large spectrum of machining is possible, including turning directly on wire or bar being fed
    Ability to configure machine for entirely different applications

    Precision
    Heavy Duty machining operations are done fast and accurately ¨C directly on the wire or bar.
    Compact and rigid structure for maximum stability
    Transfer Table position accuracy +/- 2 ¦Ìm
    Stable coolant temperature: +/- 1¡ã

  • LXE Expands Connectivity Offerings with Wavelink® Solutions

    LXE to offer factory licensed Wavelink Terminal Emulation and Industrial Browser software across its Windows Mobile® and Windows® CE mobile computers.

    LXE Inc. announced today it has expanded its relationship with Wavelink to now include pre-loading and pre-licensing Wavelink Terminal Emulation and Wavelink Industrial Browser software, in addition to existing Wavelink® Avalanche Mobility Center™ enablers, on all of its Windows Mobile and Windows CE mobile computers. LXE can now deliver Wavelink licensed software, enabled for its mobile computers, directly from its Norcross manufacturing facility.

    With Wavelink software already installed on the LXE devices, customers have readily available access to industry-leading software that manages their devices and connects them to host systems. Wavelink Terminal Emulation certification on LXE Windows Mobile and Windows CE mobile computers also enables the use of Wavelink Speakeasy plug-ins for rapid deployment of LXE devices in voice logistics applications. Product licenses, for Wavelink software, can be enabled either through existing Wavelink channels or now purchased factory licensed directly from LXE. LXE is including the first year of Wavelink maintenance free with the purchase of Wavelink Terminal Emulation or Industrial Browser licenses from LXE.

    “LXE is committed to delivering innovative and reliable products to the marketplace. Many of our partners have standardised on deploying with Wavelink software. Working with Wavelink ensures that our partners and customers have the ability to take advantage of many of the features and functionality that Wavelink is known for,” said Ian Davies, country manager at LXE UK. “Our commitment to provide products that help customers gain efficiencies through data collection is supported by including Wavelink software.”

    “We have enjoyed a great relationship with LXE for many years and are excited to expand our partnership to offer pre-licensed Wavelink software on all LXE Windows CE devices,” said Steve Bemis, Wavelink vice president of worldwide sales. “This agreement further strengthens our position within the industry as Wavelink software ships on more mobile devices than all of our competitors combined.”

    For more information on LXE handheld, wearable, and vehicle-mounted computers, go to www.lxe.com.
    More information about Wavelink solutions is available at www.wavelink.com

  • Zwick’s new PrecisionLine – a new generation of precision testing machines

    The requirements placed on testing technology are experiencing a similar increase; the smaller specimens become, the greater the demands on the mechanical accuracy of the entire test arrangement (dimensional stability/accuracy, form and positional errors, bearing play etc.). The resolution and accuracy of force and displacement measurement systems must keep pace with the increasingly fine tolerances of the characteristics being determined, with test equipment gage R&R certification representing an ever greater challenge.

    Intensive development work by Zwick has resulted in PrecisionLine – a testing system more than equal to these increased demands and featuring significant innovations. In order to minimize load frame compliance effects and Abbe displacement measurement errors, the load application axis and the travel measurement reference are aligned with the test axis, while an innovative and patented displacement compensates the error caused by deformation of the load-cell The displacement measurement system has a resolution of 0.12 µm, and force measurement accuracy lies well within the limits of Class ISO 7500-10.5

    Three new machine types
    PrecisionLine Manual is a manually operated instrument for testing compression springs and many other engineered components. This is followed by a motorized version – PrecisionLine Automatic. This machine has been developed specially for high-accuracy measurement and where maximum reproducibility is requireed. PrecisionLine Vario, the third variant features modular construction, making it a genuine universal testing machine for a wide range of applications.

    Maximum flexibility for tests
    PrecisionLine Vario features modular construction and the PrecisionLine Automatic Measurement Head, whose position can be adjusted manually along a very stiff 4-column load frame. The machine can operate in a horizontal or vertical position and mechanical system compliance compensation is optionally available.

    An interchangeable fixture platen enables many different devices and fixtures to be attached. With the testControl measurement and control system plus testXpert® II test software, PrecisionLine Vario is a high-precision all-round universal testing system offering a high degree of test scalability thanks to testXpert® II’s full functional range.

  • The new Ransburg Electrostatic Spray Gun that sprays anywhere!

    ITW Ransburg the world’s leading manufacturer of Electrostatic Spray Technology is pleased to announce the introduction of a completely new “ground breaking” range of manual spray guns and outfits. Ransburg have reinvented the electrostatic spray gun by creating a gun that operates by compressed air alone utilising an air driven alternator coupled to a high voltage cascade assembly that is used to generate the electrostatic charge internally, eliminating the need for an external power supply and cable. Ransburg have really “cut the cord” by improving paint atomisation, transfer efficiency, durability and operator comfort with greatly simplified controls that allow the operator to independently adjust the spray fan pattern, fluid flow and the electrostatic effect “on the gun” to give the best possible spray finish, and transfer efficiencies. A wide range of tips and air caps cover all industrial applications from intricate metal work to spraying an entire air craft.

    Ransburg SOLO for :-

    •Cordless portability and convenience – no generators or controllers
    •Simplified Electrostatic Spraying
    •Best Atomisation, Transfer Efficiency and Operator Comfort
    •Quick and easy to set up “Straight from the Box”
    •Lower running costs and easy maintenance

    Typical Markets and Applications include; the Aerospace Industry, General Metal Spraying, Commercial and Off Road Vehicles, plus many others….

    ITW Ransburg SOLO sprays anywhere without electric cables for improved mobility!

  • OPTISWIRL 4070 put to test

    •Vortex flowmeter tested at the pigsar test facility under practical conditions
    •The accuracy of natural gas measurement was better than device specifications at the tested pressures
    •Advantages for the user: Highly accurate monitoring of natural gas pipelines in the plant, improved burner control and more accurate billing

    Duisburg, December 10, 2009:, Today, natural gas is one of the most important energy carriers in many factory processes with constantly increasing sales. In many companies and plants it is an easy to handle fuel, without which operation is virtually unimaginable. Although the current price tag of around 40 cents per cubic metre seems very low in and of itself, there are considerable costs that come to bear in practice: For example, at this gas price in a DN 100 natural gas pipe at 25 bars of pressure, 35 million euros flow through the pipe per year. In this case, it is worth investing in precise measuring equipment, especially if internal balancing of energy consumption is a goal.
    In this application, a vortex flowmeter such as the OPTISWIRL 4070 C provides high accuracy at minimal investment cost. In order to check the characteristics of the OPTISWIRL when measuring natural gas, KROHNE had a production model tested under practical conditions at the pigsar testing facility in Dorsten.

    The high pressure gas meter testing facility operated by EON Ruhrgas is the national standard for the Federal Republic of Germany and as such is responsible for maintaining the reference value for unit of volume for high pressure natural gas and passing on this reference value to other laboratories. In association with and under the control of the Federal Institute of Physics and Metrology (PTB), pigsar conducts calibrations and verifications as an independent laboratory.

    An OPTISWIRL 4070 C DN150 PN40 featuring integrated pressure and temperature compensation was used as a test device. The purpose of the test was the volumetric measurement (standard cubic metres) of natural gas routed directly to the calibration rig from the EON Ruhrgas operating network. Results were then compared to those of the turbine-type meters used as reference devices. Two series of tests at 16 and 41 bars of pressure were run as these are representative of the prevailing pressure range of 16-40 bar in practice. The result did not only confirm the specific measuring accuracy – it exceeded it considerably: at 16 bar of pressure, the measuring accuracy of the OPTISWIRL only deviates an average of ±0.24% from the turbine, while measuring uncertainty is at ±0.15%. At the higher pressure, the values were even somewhat better with the same measuring uncertainty, measuring inaccuracy was only ±0.135%. This puts the device clearly above the standard specified accuracy of 1% for gases in both tests.

    For the user, improved measuring accuracy means more precise monitoring and, in the case of internal balancing that means more accurate billing: In the first example cited, 0.1% measuring accuracy corresponds to a sum of 35000 EUR. The price of an OPTISWIRL (size DN150) does not even amount to a fifth of this.
    About KROHNE: Established in 1921, the family business of KROHNE employs 2,564 people around the world and has representatives on all continents. The company has its headquarters in Duisburg, Germany and develops, manufactures and sells products in the field of measuring technology, standing for innovation and superior product quality. KROHNE is one of the market leaders in industrial process measuring technology.

  • 12 things computer users should fear in 2010

    About once a year, computer security news leaps out of the technology section and onto the front page and the top of network news broadcasts.  This year, the day was April Fools' Day, as the Conficker worm became the latest malicious program with the power to eat the Internet.  Somehow, we soldiered on, most of us without ever having to kick on the emergency power generators or dig into that can of spam in the basement shelter.

    But Conficker, while no dramatic outbreak, was also no laughing matter to the hundreds of thousands of Web users who were infected.  The problem with the hype cycle in computer security news is that it can have an incremental "cry wolf" effect on computer users.  The odds that the Internet will topple over in 2010 are, once again, quite low.  But serious threats abound and bad guys are mostly still outpacing good guys in our virtual world, which will be slightly more dangerous than this year. Here are 12 reasons why:

    1. E-mail attachments are back

    The LoveBug and Melissa virus, which did bring the Web to its knees 10 years ago, both used the simplest of delivery mechanisms — an e-mail attachment.  Sure enough, that method stopped working after companies banned attachments and users wised up. Attachment viruses nearly dried up.  Then, a new generation of users came online who hadn't learned the Melissa lesson and older users forgot. So this year, virus writers began dusting off their old methods and — surprise! — they worked again.  Next year, be on guard for unexpected attachments,  says Carl Leonard, head of the Websense threat lab.

    "Sometimes you think this stuff has gone away and then it comes back," he said. "We're definitely seeing an uptick in Trojans that come through e-mail." 

    2. Anti-virus products less effective

    Old-fashioned virus screening tools now catch only about three out of every four viruses through what's called "signature-based" detection, says Martin Lee of Symantec.  Basic anti-virus tools scan all programs using a list of known malicious programs, looking for electronic "signatures."  Virus writers now generate so much malicious software that the good guys just can't keep up. Logo_miniTo make matters worse, virus writers are employing a technique known as "polymorphism," so the virus can electronically mutate and evade detection.  That means about 25 percent of viruses can evade detection by scanners. New "heuristic" antivirus software detects malicious programs by watching what they do rather than inspecting what they are, but these products are far from perfect.

    Making matters worse, viruses are now more stealthy after infections. Once upon a time, an infection was obvious, thanks to a dramatic slowdown in performance or some other obvious symptom.  Not true today.

    "It's become increasingly difficult for people to be aware they've become infected," Lee said. "Often, end users just will not realize something has happened."

    With few guarantees for protection, it's more important than ever to keep the kids off music piracy sites and for you to avoid other unsavory Web places — and you know the ones I mean.

    3. Fake anti-virus software

    Knowing that your antivirus product might not be doing the job, you might be tempted to look online for an alternative, or to try one that surprisingly pops up on your desktop.  That’s a bad idea: It's probably a criminal trying to extort you for money.  The art of selling rogue anti-virus software was perfected in 2009. Leonard says consumers shelled out $150 million for fake antivirus programs last year.

    "People are selling malicious software and dressing it up as an antivirus product," he said.  "It surprises me the volume that they are selling. You would think people have become used to seeing these things." 

    Obviously not. The Federal Trade Commission did shut down two rogue sellers last year, but not until they allegedly tricked nearly 1 million consumers into downloading their software.

    The technique, which works like a charm, will expand next year.

    4. Social networking

    Facebook-based attacks grew dramatically in 2009, and will continue to increase in the coming year.

    There are basically two flavors — viruses that take advantage of the platform's liberal rules for information sharing among applications; and impersonation/identity theft, where a criminal hijacks an innocent user's account and tricks trusted friends and family. But other variations are certain to appear. Criminals can use publicly available information to personalize attacks ("Hey, check out these pictures from Paramus Catholic's Class of 1986!"). Facebook is easily farmed for password-generating information such as "What was your high school mascot?"  And all those "click here" e-mails from Facebook are a Christmas present for would-be phishers, who can easily imitate them.

    "People are getting comfortable in social networking situations and I think that they should really re-examine their level of trust and interaction," said Mary Landesman, senior security researcher at ScanSafe. 

    And remember, even if Facebook old-timers are too smart for all these tricks, the service is teeming with older newbies.  If you've been friended by mom (or grandma) you know what I mean.  They'll have to endure the Facebook privacy learning curve, too. Be generous.  Spend a few minutes with older relatives this holiday getting them to tighten up their privacy settings.

    5. Botnets

    The bane of the Internet for the past five years — botnets, or armies of compromised home computers — will remain a problem this year.  And they it may be even worse: botnets have become much more resilient.  Once upon a time, botnets could be disrupted by "cutting off their head," or disabling their command and control computers.  But now, criminals are "building disaster recovery" into the networks, Symantec's Lee said.  That makes them even more difficult to knock off line.

    "You must have grudging respect for them and their techniques," Lee said.

    6. Spam

    Spammers took a body blow during 2009 when the notorious McColo Internet Service Provider was kicked off-line.  The volume of spam plummeted from around 80 percent of all e-mail to 20 percent.  Temporarily.  By year's end, nine out of 10 e-mails were spam, and the number keeps climbing.

    "Can it get to 95 percent?," Lee asked, rhetorically. "It never ceases to amaze me how much we put up with this." 

    7. Finally, Apple gets respect – from cybercriminals

    For years, the worst-kept secret in the computer security world was the safety of using Macintosh computers. It seemed that criminals didn't bother trying to attack Macs. This was no political statement, however. It was merely pragmatism: Apple products were a small target. But with the uptick in Mac market share, the increasingly popularity of Apple's Safari Web browser and the ubiquity of the iPhone, expect criminals to target Steve Jobs’ products, says Leonard.  Already, he says, there have been a handful of iPhone attacks. 

    "Malware authors know where people are going," he said. "It's more worthwhile for them to go after these platforms."

    8. Cell phones

    Speaking of iPhones, 2010 might be the year that we see a significant attack against cell phone or smart phone users. Such an attack has been predicted for years, and has not yet materialized.  But each year, cell phones become more powerful, contain more personal information and are used for more financial transactions. In other words, they become "juicier targets" for criminals, says Lee.  An obvious attack — like something that wipes out phone books — might not be the breakthrough cell phone virus.  Lee says consumers should be on the lookout for a simple automated way to use mobile phones to steal cash. One possibility: some TV shows urge consumers to send text messages at $1 apiece. What happens when a criminal figures out how to redirect such messages, or initiate them?

    9. SEO poisoning

    You have probably noticed that companies can "game" Google and other search engines, puffing up their search engine results using a series of tricks such as creating fake pages that link heavily to each other.  Annoying, but relatively harmless.  Unfortunately, bad guys have perfected this method and use it to mercilessly attack information seekers every time a large news event occurs. Perhaps hundreds of thousands of users were infected after the death of Michael Jackson through this technique — getting a booby-trapped Web page to rank 5th or 6th on a Google "Michael Jackson" search, even for just a few minutes, is probably the most effective malicious program attack used today. 

    "We see this sort of attack daily and especially when a signature event occurs, like Michael Jackson's death," said Leonard. Expect much more next year.  When the next big news hits — however self-serving this may sound — stick with news Web sites you trust.

    10. WINDOWS 7

    Naturally, as the year progresses, criminals will set their sights on the increasing install base of Windows 7.  Microsoft has continued to improve security and delivery of updates to its flagship operating system.  But there will be problems, no doubt. And then there's this troubling notion: Eight out of 10 existing Windows viruses will run on Windows 7, says Leonard.  Impressive forward-compatibility from the bad guys. For consumers, it means there's no time to be complacent.

    11. URL shorteners

    Services like bit.ly make sending links through Twitter and e-mail infinitely easier. Unfortunately, it also means criminals can turn obvious troublesome URLs, like https://RomanianDarkLords.Ro/$$$eBay.com into friendly-sounding links like http://bit.ly/5uuWwo.

    That makes life easier for criminals, and harder for you, as it takes away one possible hint that a link is trouble.

    Websense recently partnered with Bit.ly to help make the process safer. But you should stick with the old rule: Never click on a link you didn't expect, and always manually type URLs into your browser's address bar.

    12. Gumblar

    Last but not least, Landesman says the most troublesome development of 2009 could be the breakout security problem of 2010. The so-called Gumblar worm used an advanced technique to build a new kind of botnet. Rather than target thousands of home computers, Gumblar attacked Web hosts (Web sites) and turned them into "carriers."  The program managed to download a Web site’s code, inject a hidden malicious program, then reload the now booby-trapped site. 

    HerbboxBecause Web sites act as a kind of hub online, they have the potential to spread a serious attack much more quickly. And 10,000 compromised Web sites are much harder to shut down than 10,000 compromised home computers, Landesman said.

    Worse yet, a seriously successful Gumblar-style attack could undermine Web users' trust in the Internet. Sites that are one day safe and trustworthy may the next day be dangerous. That would severely hamper security systems that are based on "trusted" sites.

    "When you have compromised sites acting as the host itself, the notion of good vs. bad is completely gone," Landesman said.  "Users will find that fewer and fewer sites that they can trust whatever trust they do have could be very fleeting."

    Already, Gumblar-infected sites have transmitted code to visiting PCs that redirected all Google searches to pay-per-click Web sites, netting a tidy sum for creators.

    Gumblar was declared a bigger problem than Conficker in May by Scansafe, and even though its network of compromised Web sites was eventually tamed during the year, Landesman is convinced that the technique will see many copycats.

    "It's one of the attacks we are assured of seeing in large quantities in 2010," she said.

    Become a Red Tape Chronicles Facebook fan or follow me at http://twitter.com/RedTapeChron

  • Fiscal Sanity Spreading Around The World, As Japan Is Latest To Promise A Cut In Debt

    yukio hatoyama japan

    What’s happening?

    First Nancy Pelosi makes noises about ratcheting back the spending, and now Japan has vowed to limit the amount of new debt it issues next year.

    It would seem that goverments — perhaps spooked by what they’re seeing at some of their European counterparts — are waking up to the fact that there’s not an unlimited pool of money out there for them. Perhaps.

    At the very least, it certainly should make bond selling easier now to promise austerity down the road — even if there’s nothing credible about that.

    Japan, meanwhile, remains an odd case. Folks have been warning about a funding crisis for a long time, but the Yen remains elevated and yields cheap, so certainly the market isn’t pricing in such a scenario at all (arguably same for the US).

    Join the conversation about this story »

    See Also:

  • AutoblogGreen for 12.22.09

    Better Place’s Renault Fluence EV to sell for under $20,000
    Could be quite the bargain.
    Free Electric Car!
    Read the fine print.

    Smart Ed’s cell phone connection; RWE offering 22 kW home chargers
    Sorry, Dr. Horrible, it won’t move the car.
    Other news:

    AutoblogGreen for 12.22.09 originally appeared on Autoblog on Tue, 22 Dec 2009 05:57:00 EST. Please see our terms for use of feeds.

    Read | Permalink | Email this | Comments

  • Is A Tiger’s Skin Striped?

    Yes! Everyone knows that a tiger has a striped coat, but how many people know that the tiger’s skin is striped as well?! It is true! Underneath all those lovely stripes, the tiger’s skin is striped too, and even the rare white tiger has bluish stripes on its skin.

    The fact was first noticed by veterinarians, when they had to shave off patches of a tiger’s fur for surgery, and this was when they made the astonishing discovery that the tiger has stripes on its skin, below the fur.

    However, when one talks about the tiger’s stripes, one refers to the stripes on its fur, which are as unique as human fingerprints; no two tigers ever have the same stripes, and this is how individual tigers can be identified.

    A tiger is striped because it needs to camouflage itself when it is hunting, and the stripes cover the animal up when it stalks against the wild grasses from where it launches its attacks on its unsuspecting prey.

  • Google Isn't As Open As It Wants to Be

    No one is mistaking Google for anything else than a giant corporation these days; yet, it somehow managed to keep some of its clout from the early startup days when the “Don’t be Evil” motto first popped up. There is a rising amount of criticism for the company, but Google is maintaining that its ways are good for everyone, the users, the web and obviously itself. In its latest attempt to spell out what Google is all about, Jonathan Rosenberg, senior VP of product management at Google, tries to explain what ‘open’ means at the company.

    “At Google we believe that open systems win. They lead to more innovation, value, and freedom of choice for consumers, and a vibrant, profitable, and competitive ecosystem for businesses. Many companies will claim roughly the same thing since they know that declaring themselves to be open is both good for their brand and completely without risk,” Rosenberg starts off. The real problem, he says, is that there is no clear, universal definition of open.

    So, Google set out to clarify what open means for the company, in an internal email for employees which was now published for everyone to see. It says that there are two main components to openness at Google, open technology and open information.

    Open technology refers to the way Google builds its current and upcom… (read more)

  • Facebook's Top Status Trends of 2009

    T’is the season for number crunching. As the year draws to a close, everyone is releasing all sorts of stats, tops and trends. Facebook, with 350 million users and an unseemly amount of data flowing through its pipes, couldn’t pass out on this opportunity so it’s introducing what will become a yearly fixture, “Memology,” the study of ‘memes’ and meme-related topics.

    “In the tradition of year-end lists, we’re introducing Facebook Memology. “Memology” refers to the study of how “memes,” or new ideas and trends, are spreading on Facebook. For this year’s list, the Facebook Data Team mapped the top trending words and phrases in U.S. status updates for 2009,” Facebook’s Lars Backstrom wrote.

    “While significant news events and celebrities made the list, more personal topics like family, religion and even emerging digital slang were as common—no doubt reflecting the way people share their daily lives with friends on Facebook.”

    The list isn’t an exact account of the number of times the words popped up, rather Facebook grouped similar subject matters, words and phrases to come up with a top which looked at the topics discussed rather than the actual words.

    The biggest topic on Facebook for the year, no surprise here: Facebook Applications. With the number of spammy games and apps littering everyon… (read more)

  • Oh Look, People Are Already Looking At Expanding How Selectable Output Control Will Be Abused

    For quite some time we’ve been covering how the MPAA has been pushing to get the FCC to allow them to use “Selectable Output Control” (SOC) to stop you from being able to record certain movies. In theory, the Hollywood studios claim that this will let them put movies out on video-on-demand offerings earlier than they do now. In actuality, there’s nothing stopping them from putting these VoD offerings out now (and some do already). The studios’ claim that this is needed to stop “piracy” of these movies also makes little sense, since even the studios admit that all of their movies are quickly available through unauthorized means around the time they’re released in the theaters (i.e., well before they would be available on TV).

    The real issue, of course, is that Hollywood wants more control over your TV and what you can do with it. But when people suggest this, the MPAA and the studios scoff and say that’s ridiculous. They just want this one tiny exemption and nothing else. Except, that’s not true at all. Remember that recent Congressional hearing about live streaming and sporting events? Well, the folks at Public Knowledge noticed that one of the speakers there was already noting how the FCC exemption on SOC could be useful in stopping “piracy” of sports broadcasting — which of course is totally outside the realm of what the MPAA is asking for. But, of course, once the FCC allows someone to break your DVR or other consumer electronics device, it’s not hard to see everyone else asking for their own “exception” as well… How about rather than breaking the devices that everyone purchased for a reason, the content providers stop freaking out about technology, and start learning how to use it to their advantage?

    Permalink | Comments | Email This Story