Monday, February 22, 2016

Linux Foundation Introduces "Zephyr", a tiny OS for Internet Of Things


The 21st century is witnessing a great change over in the daily life of folks with the advent of IoT devices that are capable of talking to each other without any human intervention.

Yeah! Now you do not have to individually cascade an instruction to each of your home devices to accomplish a task. All have gone automated with the actuators and sensors which are infused into the home appliances.

The fact is that your IoT devices would only comply within the family of same manufacturers. For example, if you have a Samsung smart refrigerator, and your wearable device is from Apple or any other vendors, then it couldn't sync as both are from different genres.

No need to worry now!

Zephyr: Future of IoTs


The Linux Foundation has broken all the barriers of compatibility issues by releasing a Real-Time Operating System (RTOS) for Internet of Things devices, dubbed "Zephyr". This OS enables connected devices to communicate with the same protocol.

So, no more digital barricades between your thermostat and your wearable devices, as they could communicate with each other using the same protocols.

The Zephyr project is supported by multiple platforms like NXP Semiconductors, Synopsys, and UbiquiOS Technology and is licensed under Apache 2.0.

Why is Zephyr so important?


Zephyr stands out from the crowd as it provides a scalable, customizable, secure and open source operating system to be used across multiple architectures.

Doing so, Zephyr could help solve many of the current limitations that prevent, so far, Internet of Things from becoming really mainstream.

Zephyr is expected to take the best of both sides: low-consumption as well as speed. 

Here's some key points about Zephyr:
  • Scalability: Universality of Interconnected devices
  • Umbrella Platform: All smart devices could run under a single roof.
  • Baby Footprint Kernel: Zephyr kernel can run on 8kb memory devices
  • Modularity: Supports to integrate 3rd party modules for additional functions as intended by the developer.
  • Licensing: As startups does not have to bother about any licensing clash, as a unique license file would be mailed to everyone.
Apart from the special features, Zephyr also supports technologies including Bluetooth, Bluetooth Low Energy, IEEE 802.15.4, 6Lowpan, CoAP, IPv4 and IPv6, NFC, Arduino 101, Arduino Due, Intel Galileo' Gen 2, and NXP FRDM-K64F Freedom board.

Security in Mind


Since connected devices are most hack prone items, these devices may malfunction when gets compromised.

However, Linux is more concerned about the Security of Individuals, and generally open source software is considered more secure, as anyone can inspect flaws and debug the code.

For this, the Linux Foundation is maintaining a dedicated security working group and a delegated security maintainer to be available through IRC Chats, so that anyone could help report the vulnerabilities in open discussions.

Although there are many other alternatives available for Internet of Things RTOS like Brillo from Google, Rocket from Intel, and Ubuntu Core from Canonicals, nothing would be as fascinating as Zephyr.

Just Opening a MS WORD file can HACK every file on your System


If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it.

Doing so could cripple your system and could lead to a catastrophic destruction.

Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into installing a deadly ransomware, dubbed "Locky," into their systems.

So if you find .locky extension files on your network shares, Congratulations! You are infected and left with just two solutions: Rebuild your PC from scratch or Pay the ransom.

Locky ransomware is spreading at the rate of 4000 new infections per hour, which means approximately 100,000 new infections per day.

Microsoft MACROS are Back


It is hard to digest the fact that, in this 2016, even a single MS Word document could compromise your system by enabling 'Macros.'

This is where the point to appreciate hacker's sheer brilliance of tactics.


Locky ransomware is being distributed via Microsoft 365 or Outlook in the form of an Invoice email attachment (Word File that embeds vicious macro functions).

The concept of macros dates back to 1990s. You must be familiar with this message: "Warning: This document contains macros."

Now macros are back, as cyber criminals discover a new way to get internet users to open Microsoft Office documents, especially Word files that allow macros to run automatically.

How Does Locky Work?



Once a user opens a malicious Word document, the doc file gets downloaded to its system. However, danger comes in when the user opens the file and found the content scrambled and a popup that states "enable macros".

Here comes the bad part:
  • Once the victim enables the macro (malicious), he/she would download an executable from a remote server and run it.
  • This executable is nothing but the Locky Ransomware that, when started, will begin to encrypt all the files on your computer as well as network.
Locky ransomware affects nearly all file formats and encrypts all the files and replace the filename with .locky extension.

Once encrypted, the ransomware malware displays a message that instructs infected victims to download TOR and visit the attacker's website for further instructions and payments.

Locky ransomware asks victims to pay between 0.5 and 2 Bitcoins ($208 to $800) in order to get the decryption key.

One of the interesting note on Locky is that it is being translated into many languages, which heighten its attack beyond English boundaries to maximize the digital casualties.

Locky Encrypts Even Your Network-Based Backup Files


The new ransomware also has the capability to encrypt your network-based backup files. So it's time for you to keep you sensitive and important files in a third party storage as a backup plan in order to evade future-ransomware infections.

A researcher named Kevin Beaumont along with Larry Abrahms of BleepingComputer initiallydiscovered the existence of Locky encrypted virus.

To check the impact of Locky, Kevin successfully intercepted the Locky traffic yesterday and realized that the cryptovirus is spreading out rapidly in the wild.
"I estimate by the end of the day well over 100,000 new endpoints will be infected with Locky, making this a genuine major cybersecurity incident — 3 days in, approximately a quarter of Million PCs will be infected," Kevin said in a blog post.

One hour of infection Statistics:



Among the highly impacted countries include Germany, Netherlands, United States, Croatia, Mali, Saudi Arabia, Mexico, Poland, Argentina and Serbia.

Gmail Features Now on Non- Gmail Accounts with Gmailify


For the past year or so, Google has allowed users to check their other email accounts, like Yahoo, Hotmail or Outlook, from the Gmail app. Google is taking things a step further and has introduced a new feature today called Gmailify. This new feature will allow anyone to take advantage of every great feature available for Gmail users.

Gmailify Features

In other words, users will be able to check and manage their @yahoo.com, @hotmail.com, @msn.com or @Outlook.com mail accounts using the Gmail app. The added advantage here is the management of these email accounts using the Gmail interface and exclusive features. This makes a lot of sense for people who have multiple accounts on different email providers, but prefer to use and manage emails via the intuitive Gmail interface that they’ve grown to love.
This will allow anyone to take advantage of features such as Gmail’s spam protection, inbox organization, Google Now integration and more, just like those email accounts reside on Google servers. In addition to these, your non-Gmail emails will be organized like Gmail, i.e. in Social, Updates, Promotions and Primary categories. Double all of that with being able to search your other emails via advanced search operators, better notifications on smartphones and automatic Google Now integrations for all reservations and meetings. It’s almost a Gmail-like user experience.

How to Get Gmailify Working?

If you are already accessing your non-Gmail accounts using the Gmail app, you will still be required to opt for the Gmailify feature. Users will have to open the Gmail app, sign-in to external accounts and then enable Gmailify.

To link your non-Gmail accounts to Gmail, go to app’s Settings, tap on non-Gmail account and choose “Link Account”. This linkage enables the advanced Gmail features. After the accounts are linked, they will work on the Gmail apps and on the web (at mail.google.com). Users can unlink their accounts anytime they want as well.

Google is not alone in offering non-account holders to make use of their features. Other top email providers are also working on similar features for those who want to try different features without changing their current email address. A couple of months ago, Yahoo started allowing users to manage their Gmail and Hotmail accounts. Both Yahoo’s mobile apps and web merge with other accounts to offer features like Smart Contacts, Smart categories and password free sign-in. Microsoft even offers an import tool to transition from Gmail to its service easier.
At launch, Gmailify only works with Yahoo and Microsoft accounts, but Google promises that more providers will be added in the future.

P@SHA to Launch ‘Digital Pakistan 2020’ Campaign




Chairman of Pakistan Software Houses Association (P@SHA) Syed Ahmad, announced the launch of  ‘Digital Pakistan 2020’ campaign at its 3rd Grand Tech Executive Meetup held in Karachi this evening.

Previous two events in the series were held in Islamabad and Lahore, while the fourth meeting will be organized in Peshawar.
The event was part of an ongoing series to unite top tech executives in the industry with young and emerging startups to collectively address the issues that the industry is facing. The objective is to promote diversity in technology and innovation and collaborate with the Government to address impediments to growth, such as quality human capital, infrastructure and taxation related issues, that are being faced by individuals as well as companies in the IT sector.


Syed Ahmad explained that several other regional countries like Malaysia, Vietnam, Jordan, Indonesia and India have successfully established a knowledge-based economy powered by technology. “Digital Pakistan 2020” campaign aims to create a similar environment in Pakistan.
“The IT industry can address two of Pakistan’s major issues; creation of almost 300,000 new white collar jobs for the youth, and an export jump to reach 5 billion US dollars per year by 2020,” said Syed Ahmad.

According to Syed, P@SHA will be spearheading the Digital Pakistan 2020 campaign in collaboration with key stakeholders in the industry. However, support and strength of IT companies in big numbers would be needed to create a major impact and get quantitative results in this regard.

He elaborated that P@SHA is also in the process of creating separate community platforms for freelancers and startups in Pakistan, where they will be able to find information and advice on how to take their ventures forward. They will also be able to get their queries answered through an official platform and voice their concerns related to issues like payments, taxation etc.
The Pakistan Software Houses Association for IT & ITES (P@SHA) is the trade association representing the IT and IT Enabled Services sector. It aims to continue being the voice of the IT sector by providing platforms that are geared towards creating more opportunities for members of the ecosystem both domestically and internationally, create a collaborative sphere and arrange workshops and trainings aimed to enhance the quality of startups and freelancers.

Impressions from the Event

Many dignitaries and tech professionals were in attendance at the event in Karachi. Given Pakistan’s potential in IT, many of the attendees were of the view that official support and lack of education about IT amongst the decision makers at the provincial level was a serious matter that had to be tackled as well. For a country’s IT sector to flourish, there was a need to induct professionals who understand the ebbs and flows of the global, and more crucially, the local technological landscape at both the provincial and federal levels.

Even though the event focused on answering the queries of tech companies with regards to various taxation, political, technological and infrastructural issues that were unique to the Pak IT sector, a query was raised from one of the attendees about what P@SHA can do to better serve the interest of freelancers. Freelancers from Pakistan are another focus area for P@SHA, given how instrumental they’ve grown in bringing invaluable foreign exchange into Pakistan.

All in all, P@SHA has taken a step in the right direction, setting off a debate about the need for Pakistani tech companies to come together and represent the interests of a vital component of 21st century Pakistan.


Neverware CloudReady Turns old PCs into Productive use or Chrome OS Rigs


Do you have an old, unusable Windows PC from the 2000s that has become unusable? Want to give it a new lease of life? Then you need to migrate to Chrome OS.  A new startup called Neverware has started to bring the dual boot option with Chrome OS to old systems and laptops for free.

Neverware charges a fee for bringing the same option for enterprise or large buyers. The OS comes as a part of an update in the company’s CouldReady software. The option is not just limited to Windows. If you have a Mac you can still try it out.
As noted by The Verge, the result is quite similar to what you’d expect from a regular Chromebook. The system boots reasonably fast, the performance is understandably acceptable and most of all, the aging machine won’t compel you to tear your hair apart anymore as it’s actually productive.
There are also understandable some caveats with this.  Most notably amongst them is the battery issue which is lackluster to say the least. So if you have an old Windows laptop, you have to have a charger with you to make the most of it.
Yes, Chrome OS isn’t the most fancy but given how well it works on meager hardware, with more storage and RAM, if anything it will work only better with CloudReady.

How To Install

  • Get the install file from here. Its 593 MB large for Windows laptops.
  • Once the file is downloaded, you’ll need a USB drive of 1GB capacity minimum.
  • Check out the guide how to make a bootable USB installer for Neverware here. Once your USB is ready, keep following the instructions provided in the link to install it.
  • To run it, you will have to make a partition to install the OS. Don’t forget to read the fine print.
Neverware CloudReady only works with the UEFI mode on Windows 7, 8 or 10 for dual-booting purposes. Even if you are an enthusiast who hasn’t tried anything new in a month, this is a free treat you should take. That is until it is taken down, or anything.