Apple Job Listing Hints At Plans With Solar Technology


Could solar technology power our iPhones or iPads in the future? Or perhaps even Apple’s Mac computers? While that question remains unanswered for now, it seems that at the very least Apple is interested in the technology, thanks to a recent job listing on Apple’s website which calls for a “thin films” engineer who has experience in the solar industry to join Apple’s Mobile Devices group, with the job description reading, “assist in the development and refinement of thin films technologies applicable to electronics systems.”

Given that the job was for a position in the Mobile Devices division, it has been speculated that perhaps it could be used on future iPhone or iPad products, although others have suggested that maybe it could see integration in display and touch technology as well, maybe for future iWatch devices, perhaps? Solar technology is not new to Apple as the company has in the past used the technology with its data centers, so to see Apple trying to find a way to incorporate the technology into their other products would not be a stretch of the imagination.

Source: Ubergizmo


New Crisis Malware Infecting Macs, VMware and Windows

Security experts have discovered a virus strain that compromises VMware virtual machines, and is infecting Mac OS X, Windows computers as well as Windows Mobile devices.

This virus strain has capabilities that have yet to be seen before, the Crisis malware normally arrives in a Java archive file (.jar). It is typically installed by posing as a Flash Player Java applet to trick a victim into opening it, letting the Crisis malware onto the PC. This archive contains executable files (.exe). And the malware is able to detect which platform it is running on and serve up the correct variant, targeting Apple and Windows operating systems.

According to a Kaspersky Lab Expert, once launched the worm puts in place a rootkit to hide itself from view; installs spyware to record the user’s every move on the computer; and opens a backdoor to the IP address, allowing miscreants to gain further access to the machine. The code is also said to survive after a system reboots.

The Windows variant of the virus will snoop into these user applications: Firefox, Internet Explorer, Chrome, Microsoft Messenger, Skype, Google Talk and Yahoo! Messenger. It will also shut off any anti-virus programs, log keypresses, download and upload files, lift the contents of the user’s clipboard, take screenshots, and record from the computer’s webcam and mic.

The Mac variant is very similar to Windows. It monitors Adium, Mozilla, Firefox, MSN Messenger (for Mac) and Skype, and records keystrokes. But on Mac OS X, the user does not need administrative privileges to install the software although its functionality is affected if there is insufficient information used. With admin-level access, the virus can slot in the rootkit.

According to The Register Crisis uses three methods to spread itself from Windows desktops: it can copy itself and an autorun.inf file to a removable drive in order to infect the next machine the storage stick is plugged into; it can sneak onto virtual machines; and it can drop modules onto a Windows Mobile device.

The virus does not use a vulnerability in the VMware software, it relies on a feature that allows the virtual machine’s files to be manipulated while it is not even running. The virus searches for the virtual machines images on the Windows PC and attempts to copy itself onto the system using a VMware Player tool.

“This may be the first malware that attempts to spread onto a virtual machine. Many threats will terminate themselves when they find a virtual machine monitoring application, such as VMware, to avoid being analyzed, so this may be the next leap forward for malware authors,” Symantec researcher Takashi Katsuki concludes.