Your Ad Here

The Bluetooth 3.0 buzz is building. The short-range wireless standard Bluetooth 3.0 will get its official launch on April 21. The developers of the standard, the Bluetooth Special Interest Group, have confirmed multiple reports forecasting the release of Bluetooth 3.0 specs. According to the Bluetooth SIG on April 21 it will announce the groups latest Bluetooth standard. At that time the Bluetooth 3.0 specifications will be unveiled.

Here's What We Know About Bluetooth 3.0

The Bluetooth 3.0 standard is expected to deliver even faster short-range wireless speeds (up to 480 Mbit/s), improvements to reduce chances of device disconnections when syncing, and the addition of Generic Alternate MAC/PHY (AMP) technology that will reportedly allow Bluetooth 3.0 devices to transfer data at speed on par with Wi-Fi. Another advancement will allow the Bluetooth wireless frequency to piggyback on the Wi-Fi 802.11 protocol - in affect allowing Bluetooth over Wi-Fi. We'll have to wait until April 21 to find out more.

What's unique about Bluetooth is its low cost and low power consumption, allowing it to be used in devices such as cell phones where cost and power consumption are huge concerns for developers. However, Bluetooth technology has struggled in its efforts to be adopted widely.

What the blogs are saying

The Bluetooth SIG claims Bluetooth 3.0 can wirelessly transfer an entire music library, a complete DVD [or] a vacation's worth of photos, all within seconds, according to the blog the Bluetooth SIG. In addition to pumped-up speed, Bluetooth 3.0 could also feature "Enhanced Power Control," which reduces those annoying headset disconnects caused by putting your phone in your pocket or purse.

There are no details at the moment about Bluetooth 3.0-ready devices, but most Bluetooth watchers expect the Bluetooth SIG to release a list of manufacturers that have products ready to go at the Bluetooth 3.0 launch on April 21.

Bluetooth in the smart phone age

The new Bluetooth standard comes as smart phones are growing way beyond e-mail and voice calling into full-fledged mini-computers. For some time now, cell phone users have turned to Bluetooth for wireless headsets and to sync calendar and contact information. Now that many people are listening to music and watching movies on their mobile devices, Bluetooth needed to get faster to remain an effective solution for wireless syncing.

In the meantime, Bluetooth technology will have to compete with the Wireless USB standard that is going in popularity and influence.

April 1 has come and gone, and the Internet has not disintegrated and no major cyber-attacks were reported. But Conficker still remains a threat. Now don't panic, this doesn't mean cyber-Armageddon could strike at any minute, it just means you need to make sure your computer is fully updated if it isn't already. Feel better? Good, then let's take a look at what's going on.

Why It Ain't Over Yet

The Conficker Working Group -- which is made up of 27 tech companies and agencies including AOL, F-Secure, Facebook, ICANN, Kaspersky, McAffee, Microsoft, Symantec -- says that Conficker, also known as Downup, Downadup, and Kido, is the largest worldwide computer infection since the SQL Slammer in 2003. The CWG estimates anywhere from 3 to 15 million computers are infected worldwide, and says 30 percent of Windows computers across the globe are not updated with the latest patches to protect against Conficker. The virus authors are also still at large and able to communicate with Conficker, although that capability has been significantly reduced.

Problem Spots

As you can see from this map provided by the CWG, Conficker infections in the United States are happening pretty much everywhere you can find an Internet connection. However, despite all that ominous-looking red, only 6 percent of Conficker infections are in North America. The biggest problem areas are actually concentrated in Asia and South America including Vietnam, Brazil, the Philippines, and Indonesia, as well as Algeria.

The hardest hit areas may also have a correlation to the number of unpatched Windows computers since Asia, Eastern Europe, and South America are areas known to have widespread use of pirated Windows software. Since Microsoft automatically blocks illegitimate copies of Windows from receiving critical updates, those computers remain vulnerable to Conficker, thus perpetuating the risk.

What Conficker is Doing

Yesterday, Conficker began its daily exercise of contacting 500 Web sites from a randomly generated list of 50,000 sites. Conficker will continue to do this every day until it receives instructions to do something else. Further instructions could be a simple software update or the infected computers could work as a botnet to commit theft or attack other computer networks. The problem is that while security and IT professionals are working to block Conficker from getting further instructions, they haven't been able to block all Conficker traffic. So some infected machines have gotten through, but luckily further instructions haven't been issued, yet. Conficker's authors may be laying low until publicity surrounding Conficker dies down before contacting their creation.

If Conficker is updated or receives further instructions, that capability could pass between infected machines without further need of a server or Web site, because Conficker uses a peer-to-peer (p2p) protocol to communicate with other infected machines. That's right, Conficker is file-sharing. With p2p, the worm can distribute software updates much faster than if every infected machine had to communicate with a main server.

The Final Countdown?

Does this mean the world could still end? Probably not, and that was never the concern with Conficker despite the doomsday scenarios you may have read. The fact is that most security experts believe that Conficker is just a typical botnet worm that can be used for identity theft or to commit other forms of cybercrime. Conficker is most likely controlled by an organized crime syndicate in Asia, Eastern Europe, or South America, and the group may even rent out Conficker's capabilities if the botnet every becomes active.

Conficker is a threat only if your computer does not have the latest security patches from Microsoft and an up-to-date antivirus program.

source: PCWORLD

The Conficker worm today has begun to phone home for instructions but has done little else. Conficker was programmed to today begin actively visiting 500 out of 50,000 randomly generated web addresses to receive new instructions on how to behave. Conficker has begun to do this, according to security company F-Secure, but so far no doomsday scenarios have emerged.

Among security experts, the consensus seems to be that very little will happen today. This may be in part because of the high amount of publicity Conficker has received, but then again April 1 is not the first time Conficker has been programmed to change the way it operates. Similar trigger dates have already passed with little change, including January 1, according to according to Phil Porras, a program director with SRI International. Security experts at Symantec, the maker of Norton Antivirus, also believe the threat is overblown and says Conficker today will "start taking more steps to protect itself" and "use a communications system that is more difficult for security researchers to interrupt."

Technology companies and experts across the globe have been working together to halt the spread of Conficker, disrupt its communications and uncover who created the worm. Microsoft has even issued a $250,000 bounty for information leading to the arrest and conviction of Conficker's authors. Despite the security sector's best efforts, very little is known about the origins of Conficker or its purpose. Nevertheless, some breakthroughs have been achieved. On March 30, Security experts with the Honeynet Project discovered a flaw in Conficker that makes it much easier to detect infection. IBM researcher Mark Yayson also believes he has discovered a way to "detect and interrupt the program's activities," according to The New York Times.

Since the Conficker worm was discovered in October 2008, the malware has only received programming updates from its author and worked to infect other computers. Conficker is believed to have infected 10 million computers worldwide mostly in Asia, Europe and South America. According to IBM, only 6 percent of North American computers have been infected.

While today may be a non-event, Conficker could be used to create harm in the future. Possiblities include a massive botnet, which would give Conficker's authors control over millions of computers worldwide. The botnet could then be used to attack corporate or government networks, commit identity theft, or deliver massive amounts of spam. Security experts warn that all Windows users must make sure their operating system and antivirus programs are up to date with the latest patches and virus protections. So far, Windows is the only operating system known to be vulnerable to Conficker.

source: PCWORLD