Easy Ways to Prevent Hacking

Everything that is on the Internet can be hacked.  It can happen to an ordinary individual or to the government and even to the gigantic companies. However, Corliss Tech Review Group can give you ways on how to reduce your vulnerability against hacking. If you are an owner of a business with a website and you have business accounts that you handle online, use the following ways to lessen your probability of being hacked.

Use Strong Passwords

Corliss Tech Review Group suggests that you use a 15-character password which includes upper and lower case letters, numbers and punctuations.

For the business accounts that you have, you need to create a strong and separate passwords for each so that if one of your accounts gets hacked, the other accounts together with the rest of their information will not be affected.

Password management tools can help you to have all of your passwords in order because it is sometimes hard to remember every password especially the strong ones with punctuations, etc. A password generator can also be a helpful tool to make a strong password that is harder to hack.

Two-Step Authentication

Each of us possessed different kinds of devices or gadgets like laptops, desktop computers and smartphones that we are using to log-in onto our bank and email accounts. But these devices can increase your vulnerability to hackers.

This can be the reason why several websites nowadays are moving towards to a two-step verification process. An example would be Google 2-step verification wherein whenever you sign in to Google, you’ll input your password as usual and then, a code will be sent to your phone through text, voice call, or their mobile app.

Change Your Habits

Lots of us browse the web openly, shares everything on social media, and we are not used to updating our softwares often. Each of these habits can also make us more vulnerable to hackers.

Using secure or private browsing is safe for your computer’s data security wherein no one can discover your data.

We all know that social media is a great place to communicate with friends and family. However, sharing everything can leave a nice timeline for hackers to know about your behavior, your personal information with pictures of yourself, etc.

Finally, updating your software is also a very simple way to keep hackers at bay because it fixes loop holes hackers have discovered.

The Corliss Group Latest Tech Review: Space simulation technologies inspire anti-fraud systems on Earth



Main Control Room at ESOC, ESA’s operations centre in Darmstadt, Germany. Credit: ESA-J.Mai

Drawing on their experience building complex software for simulating spaceflight, Portuguese scientists have created a 21st-century way of detecting banking fraud here on Earth.

Today, every electronic purchase in Portugal runs through their software. Around the globe, Feedzai products screen some US$229 billion-worth of payments every year.

But what do space missions and software designed to find thieves have in common? More than you might think – in addition to high-tech hardware, space missions require a great deal of sophisticated software.

“When you launch a spacecraft, you need software to guide it,” explained Feedzai’s Paulo Marques, who was an ESA consultant before founding Feedzai in 2009. “You also need software for communications from the ground.”

Long before a spacecraft is launched, the software must be thoroughly tested for flaws. There’s just one problem, explained Paulo: “You don’t have an actual spacecraft yet.”

So, scientists build a software universe to simulate the mission.

“What you need to have is something that represents the spacecraft, mission control and ground stations, along with many other components, in order to check it all.”

At ESA, Paulo and Feedzai’s Nuno Sebastiao called on high-performance computing techniques to create virtual satellites: “Clusters of computers pretend to be everything involved. A computer acts like a spacecraft.”

The software must be very robust in order to mimic each element of the mission and spacecraft perfectly.

And it must be able to do this quickly – in far less time than it would take to complete an actual mission.

“The software has to be able to process all the information it gets in a very, very effective way,” said Paulo, “as if it were the real spacecraft.”

Spacecraft operators also train using this software. “You are not going to put a spacecraft in the hands of someone who hasn’t trained before.”

Space experience for stopping fraud

Fraud detection and space mission software face similar challenges. For one thing, both need to process huge amounts of information in real time. “If we talk about a bank, you need to process thousands of transactions every single second.”


Engineers from the Venus Express control team at ESA’s operations centre, ESOC, in Darmstadt, Germany, training for the demanding aerobraking campaign taking place in June and July 2014. Credit: ESA

In bank fraud detection, as in space, software must recognise anything that is out of the ordinary.

In space, an unexpected change in temperature could indicate a crack in the wall. In banking, anomalies often point to fraud: if a petrol station suddenly starts generating sales figures like those of a luxury car dealership, it is a sign of trouble.

However, there are differences. While hard-and-fast rules are set to detect an anomaly in space, fraud requires decisions on a case-by-case basis. A sudden temperature change in a spacecraft is always a problem, but each bank customer has his own, individual habits.

As a result, the software must recognise what is normal for a business-owner and what is normal for a teacher, based on the past practices of each, before it can identify any odd behaviour.

To make this possible, Feedzai came up with an artificial intelligence software system.

“We developed software that can process a huge number of transactions,” said Paulo. This software can look at every transaction a customer has made for the last four years.

By applying both ‘machine learning’ and ‘big-data techniques’ to look at all the data, the software learns to distinguish fraudulent-looking from non-fraudulent-looking transactions.

“The software creates the rules.”

Feedzai’s software is certainly robust. Tracking over 300 variables per person, it creates very detailed, individualised spending profiles for as many as 20 million credit cardholders per system. “In total we are tracking over five billion variables continuously.”


Artist’s impression of Sentinel-4. Credit: ESA – P.Carril

“It’s like having 500 very intelligent people looking at every single transaction and making a call based on their experience if it’s fraud or not. It’s a huge amount of computing power.”

Carlos Cerqueira from Instituto Pedro Nunes, the Portuguese broker in ESA’s Technology Transfer Network part of ESA’s Technology Transfer Programme, believes Feedzai’s technology will mean savings for banks, as well as improved customer loyalty: “Feedzai’s machine learning models and big data science are able to detect fraud up to 30% earlier than traditional methods, and illustrate how the competencies developed at ESA research centres can be useful to other sectors.”

Space knowledge generates growth

This year, Feedzai moved its headquarters from Portugal to California as they expand further into the world market.

“It is great to see that the expertise and knowledge generated on European space programmes also can lead to innovative techniques in fighting credit card fraud,” said Frank M. Salzgeber, Head of ESA’s Technology Transfer Programme Office.

“It illustrates very well the spin-off potential from our space programmes. Dealing with space calls for leading-edge technological solutions, which explains why the space industry is often far ahead of others.”

Portugal’s delegate to ESA, Luís Serina, emphasised that, “This success case shows us that the investment in ESA also contributes to the creation of jobs and growth through technological innovation, which is even more important nowadays.”

Certainly, there is plenty of fraud to go around: each year, $11.4 billion is lost to credit card fraud. As cybercriminals grow more sophisticated, that number is likely to grow.

“We’re part of the defence mechanism,” said Feedzai spokesperson Loc Nguyen. “The invisible layer you as a consumer never think about. If you don’t know about us, it means that we’re working.”

The Corliss Group Latest Tech Review: Mobile malware and operating system vulnerabilities come under the spotlight at GISEC 2014

Mobile malware and operating system vulnerabilities come under the spotlight at GISEC 20149% of large organisations face security, hacking, phishing scams and internet fraud in mobile devices

Industry experts to share insights helping businesses defend from cyberattacks during security sessions and workshops at Gulf Information Security Expo & Conference

Dubai, United Arab Emirates: As the Middle East and Africa region continue to experience a rapid growth in the sales and penetration of smartphones, with a population of more than 525.8 million using mobile devices in 20131, an increasing number of malware attacks also pose a threat to millions of smartphone users. Tackling the importance of mobile security, the second Gulf Information Security Expo & Conference (GISEC) 2014, taking place from 9 to 11 June at Dubai World Trade Centre (DWTC), will discuss ways to secure the mobile environment against evolving threats.

The unfettered growth in mobility created an alluring opportunity for cybercriminals with 9% of large organisations experienced a security or data breach in smartphones or tablets, according to a 2013 PricewaterhouseCoopers (PwC) survey. The widespread use of mobile devices resulted to various cybercrimes such as hacking, phishing scams and internet fraud. Smartphones are usually attacked through malwares, Trojan horse viruses and malicious software such as Loozon and FinFisher.

Among the GISEC Conference speakers is Nader Henein, Advance Security Solutions, Advisory Division at Blackberry, who will talk about devising a fit-for-purpose bring-your-own-device (BYOD) security plan that capitalises on the innovation and productivity of a mobile workforce. Also included in his presentation are the introduction of more stringent authentication and access controls for critical business apps and balancing the legal and electronic recovery implications of mobile devices with governance and compliance.

Heinen will also tackle mobile malware tactics and recent advances in Android malware as well as dissecting the anatomy of a mobile attack. According to Sophos Mobile Security Threat Report 2014, the exponential growth in Android devices and the buoyant and largely unregulated Android app market produced a sharp rise in malware targeting that platform. SophosLabs has seen over 650,000 individual pieces of malware for Android, which has grown quickly in a short period of time due to the increasing use of mobile devices.

“Security for mobile devices, applications and content is a paramount concern in a mobility management strategy,” said Ian Evans, Managing Director and Senior Vice President, AirWatch by VMware EMEA. “Allowing corporate-owned or employee-owned devices to access corporate data requires a strong enterprise security strategy to ensure the deployment is secure and corporate information is protected.”

Brian Lord, Managing Director, PGI Cyber, commented: “PGI (Protection Group International) recognises that the growth of mobile device use is essential for commerce, governments and individuals. They increase efficiency, drive down costs and afford maximum flexibility. As with all information and communication media, they also come with their own security risks. PGI’s solutions, whether advisory or technical, all encompass the security risk posed by mobile devices – whether that is an individual device or an integral part of an organisation’s infrastructure – and afford protection without detracting from the huge value such devices bring.” he added.

During the two-day conference, leading information security experts headlined by Robert Bigman, former Chief Information Security Officer at the CIA; Mikko Hypponen, Chief Research Officer at F-Secure and Wim Remes, Chairman of the Board of Directors at (ISC)2 will discuss various topics on cyber threats and cybersecurity.

Bigman’s keynote address of Day 1 of the GISEC Conference will shed light on the vulnerability of Heartbleed, especially clear prevention methods the audience can use to protect their internal corporate networks under the theme ‘Change the way you connect to the internet’. Hypponen – the man who tracked down the authors of the first PC virus ever recorded – will deliver his keynote address on Day 2 of the GISEC Conference and will discuss critical information security issues to empower one with superior protection. Remes will focus on strategies to map out existing infrastructures to adequately protect them against realistic threats among several others.

Meanwhile, GISEC will also hold free-to-attend security sessions on vendor-run educational presentations, workshops, demonstrations, informative speeches and case-studies giving I.T. professionals useful insights to help defend their businesses from cyberattacks. Based on the Official CISSP CBK® Review Seminar, (ISC)2 will offer an education programme focusing on two of the most challenging domains of the CISSP CBK: Information Security Governance and Risk Management; and Access Control delivered by an Authorised (ISC)2 Instructor. All attendees will receive CISSP certificate.

As the region’s only large-scale information security platform, GISEC will gather industry, government and thought leaders as well as international and regional cybersecurity experts in various business verticals such as I.T., oil & gas, banking & finance, government, legal, healthcare and telecoms to meet the growing requirements for information security and countermeasures in the region.

The must-attend event is set to draw 3,000 trade visitors from 51 countries and more than 100 exhibitors from the world’s leading information security companies and brands. 91% of last year’s attendees were purchasing decision makers from a wide range of industries.

Among the key sponsors of the exhibition are BT Global as Strategic Sponsor; GBM as Diamond Sponsor; Spire Solutions and Protection Group International as Platinum Sponsors; Access Data, Websense International, Fire Eye and F5 Networks as Gold Sponsors; Research in Motion (Blackberry), CSC Computer Sciences, Guidance Software and Palo Alto Networks as Silver Sponsors. Meanwhile, Palladium is the sponsor for the IT Security Awards.

Powered by GITEX TECHNOLOGY WEEK, the region’s leading Information and Communications Technology (ICT) event, GISEC is strictly a trade-only event and is open to business and trade visitors from within the industry only. GISEC is open 10am-6pm from 9-11 June. Visitor attendance is free of charge. For more information, please visit www.gisec.ae.

The Corliss Group Latest Tech Review on the Best Antivirus for 2014

It’s easy to feel overwhelmed by all the Heartbleed and NSA-spying stories in the news. But there’s still a lot you can do to keep your computer safe. The first thing? Install antivirus software.


With all the NSA, Edward Snowden, and Heartbleed stories in the news, security is arguably the tech story of the year. But while these big glitzy stories are grabbing most of the attention, the most important thing you, the consumer, can do, is to perform the decidedly unglamorous but vital task of securing your own machines. And that means antivirus. All the big players have got 2014 edition products out, and some are even starting to ship 2015 editions! Many of the latest versions have morphed their appearance to match the Windows 8 style, tile-based and touch-friendly. Others remain unchanged, perhaps hoping to attract users by keeping the same familiar face.

Whether they look the same or not, most of the same products retain their positions at the top of the heap. Here are the best from the current crop of antivirus products.

With all the NSA, Edward Snowden, and Heartbleed stories in the news, security is arguably the tech story of the year. But while these big glitzy stories are grabbing most of the attention, the most important thing you, the consumer, can do, is to perform the decidedly unglamorous but vital task of securing your own machines. And that means antivirus. All the big players have got 2014 edition products out, and some are even starting to ship 2015 editions! Many of the latest versions have morphed their appearance to match the Windows 8 style, tile-based and touch-friendly. Others remain unchanged, perhaps hoping to attract users by keeping the same familiar face.

Whether they look the same or not, most of the same products retain their positions at the top of the heap. Here are the best from the current crop of antivirus products. See here…

Independent Lab Tests

I spend hours or days with every product performing hands-on testing, but the independent antivirus labs have whole squads of researchers for even more in-depth testing. I follow a half-dozen labs that perform ongoing tests and that make their results public: AV-Test, AV-Comparatives, Dennis Technology Labs, ICSA Labs, Virus Bulletin, and West Coast Labs.

I take independent testing quite seriously, and I recently worked up a new systemto evaluate each product in light of its lab results. I’ve identified five important categories: detection, cleaning, protection, false positives, and performance. When there’s enough data from the labs, I use it to calculate a star rating in each category, and an overall rating.

image 2

As you can see in the chart below, Kaspersky and Bitdefender get really excellent scores across the board. That’s certainly a good sign. Note that while Microsoft Security Essentials appears in the chart, most of the labs treat it as a baseline, not as a serious contender. Microsoft agrees; they’re not trying to compete with the third-party vendors. They just want to make sure everyone has some degree of protection.

Even the independent labs don’t have unlimited resources, so there’s a dearth of results for some products. I’ll be talking with some of the more flexible labs about the possibility of expanding the collection of products they test.

The cloud-based behavioral monitoring of Webroot SecureAnywhere Antivirus (2014)$19.99 at Webroot is wildly different from almost any other product, and it’s just not compatible with many test setups. As a result, it hardly gets tested at all. That’s a shame, because it’s amazingly tiny and scans amazingly fast.

For a detailed description of the lab tests that I follow and of the way I summarize them into a chart like the one below, please see How We Interpret Antivirus Lab Tests.

* The Best Antivirus Lab Results Chart

Hands-On Testing

For every antivirus review, I run a hands-on test of the product’s ability to detect and prevent malware attacks. I also check each product’s ability to detect and prevent download of the very latest malware. Starting with a feed of links from London-based MRG-Effitas, I sift out those that point directly to a malicious executable online. Using executable file links makes it easy for me to measure success. If a malicious download reaches the desktop, the antivirus failed. If it wipes out the file during download, or blocks access to the URL completely, it succeeded.

The links I use are never more than a day old, sometimes just hours old. That means each product hits a different set of links, but in every case they’re extremely recent. I do plug away until I’ve tested about 100 links, figuring the daily differences will average out. This is definitely more real-world than my standard malware blocking test, which necessarily uses the same samples for as much as a year.

I’ve been running this test since November, and found a very wide range of scores.avast! Free Antivirus 2014 detected 79 percent of over 100 malicious URLs, blocking access to most at the URL level. At the other end of the spectrum areMalwarebytes Anti-Malware Premium 2.0 and Outpost Antivirus Pro 9.0. Malwarebytes blocked just 14 percent, a little over half at the URL level. Outpost didn’t block any malicious URLs but wiped out 8 percent of the malicious executables during the download process.

The chart below shows results from both tests. For more detail on my test methods, see How We Test Malware Blocking.

* Malware blocking chart

In the past I’ve run tests evaluating how well products clean up systems infested with live, active malware. An incident with GameOver Zeus co-opting my test systems for its own dastardly purposes convinced me that this kind of testing isn’t as safe as it once was. I can’t in good conscience keep running a test that might cause harm outside my testbed, so I’ll be relying more on the independent labs. I will, of course, continue to explore and report on the tools and services that each vendor offers to handle malware that prevents antivirus installation, or subverts the scanning process.

The Best Products

The antivirus field is huge; I currently track over 45 products. In a field that big there’s room for multiple products to earn the title of Editors’ Choice.

Three products share the Editor’s Choice honor for best overall antivirus:Bitdefender Antivirus Plus (2014)$39.95 at BitDefender, Norton AntiVirus (2014)$49.99 at Norton, and Webroot SecureAnywhere Antivirus (2014)$19.99 at Webroot. With its impressive sweep of the independent labs, Kaspersky Anti-Virus (2014)$34.99 at Amazon is another very good choice.

AVG AntiVirus FREE 2014 is our current Editors’ Choice for free antivirus. It shares the top score in my hands-on malware blocking test with four others, among themAvira Free AntiVirus (2014) and FortiClient 5.0 (also free). If you can’t even get antivirus installed, give Malwarebytes Anti-Malware 2.0 a try. It’s our Editors’ Choice for free, cleanup-only antivirus.

Whatever your antivirus needs, one of the more than forty tools listed here should do the job. Continue reading…


Consumer Electronics Show stage set for new wave of gadgets

The Consumer Electronics Show hopes to be a launch pad for a new must-have device as spending on new gadgets drops as the whole world is seem to be drowned with smartphones and tablets.

Starting Tuesday, CES promises to showcase an “Internet of Things” with users at its heart.

The technology extravaganza that held yearly in the glitz-laden city of Las Vegas has developed beyond the eye-popping television technology for which is popular, to serve as a stage for once-dumb devices given brains in the form of computer chips and Internet connections.

“You will see two types of technology here,” Shawn DuBravac, chief economist at the Consumer Electronics Association which puts on the international show, said Sunday.

“You will see the technologically feasible and the ones that are commercially viable.”

Innovations on display except prime for market will include bendable screens.

Potentially troublesome technology that is available like 3D printers that let users print objects in a fashion alike to printing documents.

“It is still a very nascent market, but we are starting to see it grow,” DuBravac said.

The CES stage is usually a key showcase for gizmos that don’t normally get a attention.

“You will see a lot about the Internet of things; all the gadgets that are not a tablet, smartphone or personal computer but are attached to the Internet,” said Forrester analyst Frank Gillett.

“Like your car telling you that you are speeding too much or door locks that you unlock with a smartphone. There are all kinds of gadgety things like that we will see.”

A driver of the hot CES trend of wearable computers like bracelets or pendants that track wearers’ activities or health is proliferation of low-cost sensors.

Sensors in cars assist drivers to park or allow cruise-control features to adapt speed depending on traffic, at the same time as Internet-linked thermostats in homes can detect when residents’ smartphones are nearing and adjust temperatures when they arrived. The door locks with wireless connectivity and sensors can open automatically for people arriving home, or be controlled remotely using smartphones.

As a result, protecting personal information gathered by sensors is “certainly on the radar for all manufacturers at CES,” according to DuBravac.

“I almost wonder sometimes if privacy is an anomaly instead of the other way around,” DuBravac said, noting that in small towns of days gone by everyone seemed to know everyone else’s doings.

“If I can get a richer experience by sharing my data, that is a fair trade-off,” he suggested.

The newest in television ultra-high definition screens will be on display, however analysts predicted them to land in the market with a thud alike to that made by 3-D televisions.

“Your television gets a zillion more pixels, but most people won’t be able to notice the difference,” Gillett said, though DuBravac expects scores of Ultra HD television announcements at CES.

UItra HD television is made to benefit from ease of use of rich content at online venues lnaming Netflix, YouTube as well as from major film studios.

The global market for technology hit a record high of $1.068 trillion in 2013 powered by uptake in smartphones and tablets, according to Steve Koenig, director of industry analysis at the Consumer Electronics Association.

He predicts that the amount would fall a little this year and level off at $1.055 trillion.

“North America is no longer in the lead in terms of technology spending,” Koenig said.

“The spending coming on line in Asia has sealed the deal in terms of leadership and America will have to settle for number two. Simply put, there is strength in numbers in China.”

Astonishingly, 43 cents of every dollar spent on consumer electronics this year was forecasted to go on smartphones and tablets.

“We are now awaiting that next wave of innovation, and that is really what CES is all about,” Koenig added.

Take pictures using Google Glass without anyone knowing

Soon everyone would be wearing glasses while surfing the net, check messages, and pretend we work at Google.

But still others are anxious that the glasses present too much opportunity to photograph or film people sneakily.

But according to the defenders of the Google faith point out that no, no, you can tell when the glasses are in use. There’s a light that beams to the world.

A perverse few find this unfortunate as they wanted to use this in a mischief way. They want to be cleverer than thou and more creepy than thou.

Then there is the very fine Google Glass 3D Printed Sunshade.

Chris Barrett is the inventor of this Google Glass 3D Printed Sunshade, a PR man who has made some hay by being a Google Glass explorer and, well, exploring the boundaries of life and taste.

It was he who was first to film an arrest using his new glasses. Then he was also responsible as the man who wandered into an Atlantic City casino beglassed. Bon Jovi’s keyboard player even wore Barrett’s goggles during a show as in what seemed then as the apogee of Glassing fame.

Barrett, though, was having personal issues with his eyepiece like according to him that he was having trouble seeing the graphics when it was sunny.

So his solution was to get together with Next Fab Studio. As one, they created the 3D Printed Sunshade.

He’d tried wearing a hat, but that didn’t really work. So he came up with the solution with the Sunshade, he’s happy, as will be those who can download the open-source code.

One feature of the Sunshade is that it hides the light that tells you Google Glass is in use. Making you free to shoot whatever you like, whenever you like, and from whatever angle you can get your head around.

Accused of encouraging sneakiness, Barrett repeated that his only motivation had been poor visibility during sunny days. He said: “I did not create the Sunshade to be sneaky. The 3D printed Sunshade does make Glass less noticeable. Less people ask me what I’m wearing when they can’t see the prism light up.”

Every new technology creates aspects that the good-hearted wish didn’t exist. It sometimes as though it is otherwise whether the good-hearted are so enamored of the technology that they choose to enjoy a little denial.

Barrett insisted: “With any new technology like Glass or a wearable watch with a camera, it’s up to the user to decide how and when he or she will use the camera to record video or take photographs.”

Google Glass is not a stingy invention except Barrett’s Sunshade has now given a eyeful of glee to those whose core interests might upset many.

Samsung Fined For Paying People to Criticize HTC’s Products

HTCIf you are planning to buy a new smartphone or laptop, you look up internet reviews and customer ratings to check out what device is best for you. But remember not to always believe everything you read on the internet. Samsung was fined $340,300 by Taiwan’s Fair Trade Commission for paying people to post messages online that attacked HTC products at the same time as they flattered Samsung’s.

The site lists almost 4,000 examples of these kinds of assaults, with a lot of instigating on the Chinese message forum Mobile 01. People on Mobile 01 are permitted to state their love of Samsung or detest of HTC, but Samsung openly paid them to make these types of posts, in spite of. This approach is also known as astroturfing because it emulates a grass-roots campaign, but is completely fake and unnatural.

Sun Lih-chyun, a spokesman for the Taiwan FTC, said that Samsung’s astroturfing was the first case of its kind in the country. “The deceitful behavior has negative impacts on market order and violated the fair trade law,” he said, as reported by the wire news service AFP.

“We are disappointed that the Taiwan FTC has decided that we have violated the Fair Trade Act based on online marketing activities,” said a spokesman for Samsung. “Samsung Electronics Taiwan is carefully reviewing the decision and will take all necessary steps to protect our reputation as a company which values its customers.

Astroturfing doesn’t only take place with companies overseas. Lately, the online reviews site Yelpsued the McMillan Law Group in San Diego for astroturfing when it shaped fake positive reviews from nonexistent clients.

Sinan Aral, an associate professor of IT and marketing at the Massachusetts Institute of Technology, said the effects of those fake reviews might be felt long after they’re removed. His research found that positive reviews, regardless of whether they’re fake or genuine, snowball into more positive reviews. “It has this kind of insidious effect,” he told ABC News. “Yelp might go and pluck those fake reviews out, but all of the subsequent reviews are influenced to be more positive.

If a business in the states gets caught astroturfing while Yelp instituted its own policies, customers can also choose to report it to the Better Business Bureau.

“Online reviews may represent a new medium, but the principles of honest advertising are longstanding,” said Katherine Hutt, a spokesperson for the Better Business Bureau. “The Federal Trade Commission has had guidelines in place for nearly 40 years that make it clear that astroturfing is an unacceptable business practice. Ultimately, only businesses that meet our standards can remain accredited by the Better Business Bureau.”

While Aral’s research also says that fake negative reviews don’t spiral into more negative reviews because of an online community’s tendency to neutralize negative feedback, he says that it’s important for all reviewers to be honest. “The bottom line is that ratings and consumer feedback is a centerpiece of e-commerce,” he said. “We have to be really attuned and sensitive to detecting fraud.

Samsung Aspires 20nm-Class DDR4 at the Data Center

This month of September, Samsung said it is now mass producing DDR4 memory based on 20nm-class process technology, this means that the process tech node is somewhere between 20 and 30nm. The objective of these high-density modules is enterprise servers in next generation, large scale data centers and other applications. This enterprise service relies on higher performance and reduced costs stemming from lower power consumption.

The adoption of ultra-high-speed DDR4 in next-generation server systems this year will initiate a push toward advanced premium memory across the enterprise,” said Young-Hyun Jun, Executive Vice President, Memory Sales & Marketing, Samsung Electronics.

Samsung said early market availability of the 4 Gb (512 MB) DDR4 20 nm-class chips will facilitate demand for 16 GB and 32 GB memory modules/sticks. For a further analysis of its viewpoint, it supposed to be taking 64 of these new 4 Gb chips to produce a 32 GB stick of DDR4 RAM — 32 chips for the 16 GB modules.

According to the company, its new 4 Gb chip is the smallest and highest performing device yet, providing transfer speeds up to 2,667 Mbps. It is an increase of 25% over the top speed on an equivalent DDR3 model currently offered on the market.

The company said, the new DDR4 device also consumes 30 percent less power than DDR3, making it the ideal solution for the rapidly expanding data center sector. Thus, by adopting DDR4 memory technology early, OEMs can minimize operational costs and maximize performance to provide more favorable returns on investments.

The 2012 issue of DDR4 standard is dissimilar from DDR3 that being said, instead of using a multi-drop bus that permits several memory sticks to sit in the same memory channel. This new tech uses a point-to-point bus to the controller, limiting one stick to one RAM channel. Therefore, a dual-channel setup should only physically allow for two DDR4 modules, one in each channel.

After providing cutting-edge performance with our timely supply of 16 GB DDR3 earlier this year, we are continuing to extend the premium server market in 2013 and will now focus on higher density and added performance with 32 GB DDR4, and contribute to even greater growth of the green IT market in 2014,” Jun added.

Revenue down in Q2 2013 while Worldwide Server Shipments Up

IBM leads the worldwide server market in Q2 2013, claiming a 25.6 percent share with a revenue of $3.156 billion USD, Gartner reports. As per the same quarter in 2012, that number is actually down 9.7 percent from a 27.2 percent market share and a revenue of $3.496 billion USD. Both HP and Oracle saw a decline year-over-year while Dell, Cisco, and another of others saw growth.

Whereas the general server market revenue drops to 3.8% in the second quarter, worldwide server shipments actually elevated 4 percent year-over-year. Inspur Electronics saw the most shipments, up 211.8 percent with 20,960 shipments in 2012 and 65,350 shipments in 2013. Only with distant second, Cisco came next with a 58.5 percent increase year-over-year then followed by “others” (14.4 percent) and Dell (1.7 percent). IBM shipments fell 8 percent year-over-year and HP dropped 13.6 percent.

Despite HP’s drop in server shipments, the company remained the worldwide market leader in Q2 2013 with a 23.9 percent market share and 586,857 shipments. Dell with a 22.4 market share came in at a close second followed by IBM (8.5 percent), Cisco (3.2), and Inspur Electronics (2.7 percent). According to Gartner reports that Inspur entered the top five thanks to a significant High-performance Computing (HPC) deal that it won in its native China during the quarter.

In terms of server form factors, x86 blade servers declined by 3 percent in shipments and 4.5 percent in revenue for the quarter,” the firm said. “The x86 rack-optimized form factor climbed 3.9 percent in shipments and 2.4 percent in revenue for the second quarter.

Server shipments decline 5.9 percent in Q2 2013 weigh against to Q2 2012, with server shipments reaching 550,537 units particularly in the European, Middle Eastern, and African regions (EMEA). HP led the server market in this region, shipping 222,016 units and owning 40.30 percent of the market. Dell followed with 114,057 shipments as well as IBM (47,550), Fujitsu (24,325) and Cisco (14,484).

Regarding the revenue during the same quarter, HP is still leading the pack with $1.045 billion USD, then IBM with the raking in $834.8 million USD followed by Dell ($434.9 million), Oracle ($193.5 million), and Fujitsu ($175.8 million) — revenue for all others combined was $426.5 million USD. From the top five to show revenue growth, Dell and Fujitsu remained the only two vendors. The EMEA market lacks the hyperscale segment growth that other regions benefit from, Gartner said.

In the second quarter of 2013, x86 server revenue decreased 4.7 percent in EMEA, while RISC/Itanium UNIX revenue fell 22.6 percent,” the firm said. “Revenue for the ‘other’ CPU segment grew 44.3 percent. The RISC/Itanium UNIX segment continued to suffer from migrations to alternative platforms as users sought lower cost alternatives and more flexibility. The ‘other’ CPU category, which is primarily driven by mainframes, saw a double-digit increase thanks to platform refreshes.

Adrian O’Connell, research director at Gartner, said that weak enterprise demand, combined with consolidation and platform migration, continued to dampen the EMEA server market during Q2 2013. Recognized vendors like HP, Dell, and IBM were also gradually more challenged. These challenges are relatively-new vendors such as Cisco and local OEMs like Huawei and the current worldwide PC market leader Lenovo. ODMs selling directly to large end-users also posed as a problem for the larger companies.