Technology - Google News |
- App Store rules are preventing game streaming services from reaching iPhone and iPad users - 9to5Mac
- Japanese Charts: Switch Sales Soar As Animal Crossing: New Horizons Dominates - Nintendo Life
- Coronavirus hackers face the wrath of the cybersecurity community - Verdict
App Store rules are preventing game streaming services from reaching iPhone and iPad users - 9to5Mac Posted: 25 Mar 2020 04:37 AM PDT As highlighted in a new report from Bloomberg, Apple's current rules prevent makers of game streaming services to get an app on the App Store. The rules disallow an app from acting as a game repository that can contain content from other publishers. This means burgeoning services like GeForce Now, xCloud, PS Now, and Google Stadia cannot access iPhone and iPad customers.
Online game streaming services work by hosting the game on servers in the cloud, essentially streaming a video of the rendered game to user's devices. This means a game can be played on a mobile device but have the graphical fidelity of a console or high-end PC; the tradeoff is the inherent latency of streaming. Many companies are trying to launch this kind of service. Naturally, these companies are annoyed that their platforms are incompatible with App Store guidelines and they cannot launch on iOS. Meanwhile, Apple has launched and is heavily promoting its own game subscription service, Apple Arcade, which is integrated into the App Store app on every iOS 13 device. Technically, Apple Arcade does not violate the rules. Here's the relevant paragraph from the App Store Review Guidelines:
Apple Arcade is a game subscription service where all games are downloaded directly from the store, and are published or exclusively licensed by Apple. Arcade is not a streaming service; games are downloaded and saved locally. The clause, as written, essentially invalidates the business of all game streaming services. Bloomberg notes that a third-party game subscription service, GameClub, was approved. It is a similar model to Arcade though (offline only, no streaming, and a separate app is downloaded for each title) and even then it took them 127 tries to get past App Review.
The rules about not allowing more than one partner game in a game library app is strange as Apple does let library apps exist for other types of content like ebook stores, magazines and music services. The rules specific to game licensing are further complicated by the usual issues third-party apps face around Apple's In-App Purchase rules. Even if the games could be made available on the App Store, the apps would have to let all in-game upgrades also be available as In-App Purchases. This adds even more work for the third-party services to do, in order to let Apple capture 30% of revenues. It's not clear if Apple is actively working with these services to try and find a solution. The App Store has come under increased scrutiny in the last few years as 'big tech' has come under fire from governments around the world for exhibiting anticompetitive control over platforms. The European Commission is actively investigating Apple for its App Store practices, fuelled by complaints from Spotify and others. FTC: We use income earning auto affiliate links. More. |
Japanese Charts: Switch Sales Soar As Animal Crossing: New Horizons Dominates - Nintendo Life Posted: 25 Mar 2020 06:30 AM PDT Famitsu's Japanese chart figures are now in for 16th - 22nd March, reconfirming Animal Crossing: New Horizons' huge debut success. As had been reported earlier today, the game has managed to sell a phenomenal 1,880,626 physical copies in its first three days on sale in Japan. It's the strongest launch for any Nintendo Switch game in history across the region and comfortably places it in number one this week. It was a great week for Switch software all round, with nine of the top ten games being on Nintendo's platform. Only Nioh 2 managed to break up the Nintendo party, dropping to second place from its first-place debut last week. Here are the top 10 (first numbers are this week's estimated sales, followed by total sales): 1) [NSW] Animal Crossing: New Horizons (Nintendo) {2020.03.20} - 1.880.626 / NEW New Horizons has also had a major impact on the hardware market, with the total sales of Nintendo Switch consoles reaching higher numbers than in the console's launch week. Combined, 392,576 Switch and Switch Lite systems were sold. Here are this week's figures, followed by lifetime sales in brackets: Nintendo Switch: 129,473 (11,022,420) Nintendo Switch Lite: 263,103 (1,778,802) Any surprises this week? Let us know in the comments. |
Coronavirus hackers face the wrath of the cybersecurity community - Verdict Posted: 25 Mar 2020 01:10 AM PDT Hell hath no fury like the cybersecurity community during a pandemic. As Covid-19 continues to spread around the planet, bringing much of it to a standstill and claiming thousands of lives, cybercriminals are capitalising on the chaos. Malicious hackers are pumping out scams that prey on people's fear. They are flooding health agencies with traffic to slow their systems. And they are even attacking the central nervous system of the planet's coronavirus response – the World Health Organization. These attacks, which in some cases pose a direct risk to life, have infuriated cybersecurity professionals. "Hospital and medical organisations are already strained, and their work must not be jeopardised by computer attacks," says Mikko Hypponen, chief research officer at Finnish cybersecurity firm F-Secure. "We have a very clear message to ransomware gangs: do not target hospitals. If you do, you face the full wrath of the cybersecurity community." Hypponen has good reason to be angry. On 11 March, the Champaign-Urbana Public Health District was held hostage by a ransomware attack, just as the Illinois public health agency was gearing up for its coronavirus response. Loading ... Two days later, malicious hackers launched a cyberattack against Brno University Hospital in the city of Brno, Czech Republic. The attack forced the hospital to shut down its entire IT network and was severe enough to postpone urgent surgical interventions – all as the number of Covid-19 cases increased in the European country. Then, on 15 March, threat actors launched a cyberattack against the US Health and Human Services Department (HHS). The attack appeared to be a low level, Distributed Denial of Service (DDoS) attack that flooded HHS' servers with millions of hits over the period of a few hours. While the damage was limited, it represented the latest in a disturbing trend of coronavirus-related attacks. "Cybercriminals show no ethical boundaries and will continue to attack wherever there could be a vulnerability," says Jake Moore, cybersecurity specialist at Slovak internet security firm ESET. The grassroots fightbackFor Lisa Forte, partner at Red Goat Cyber Security, enough was enough. Forte, alongside PwnDefend's Daniel Card and Radosław Gnat, information security expert at pharmaceutical firm GSK, set up the Cyber Volunteers 19 group to provide cybersecurity assistance to healthcare agencies. "We decided then and there that something had to be done, however small, to help [healthcare providers] defend against attacks so they can focus on making people well again," she says. The direction of the group's support is led by the healthcare providers and charities, says Forte, and sees more than 3,000 volunteers contribute to regular threat briefings, advice on best practice and business continuity assistance. 3 Things That Will Change the World Today"We believe strongly that attacking a healthcare provider at any time is disgraceful but attacking them now is quite frankly repulsive," says Forte. "We want to send the message to healthcare providers, their supply chains and charities that 'you are the heroes in this fight but 3,000 cyber volunteers have your back.'" "I've noticed an increased willingness amongst security folks to break down traditional bureaucratic and cultural barriers"Collaboration is not unusual in the cybersecurity community, with threat intelligence often shared between rival companies to assist each other in the perpetual game of cat and mouse with cybercriminals. "On the other hand, we're balkanised between commercial enterprises, government agencies, company IT security departments, and academia," says Joshua Saxe, chief scientist at Sophos. To overcome this problem, Saxe set up a Slack channel that brings together cybersecurity experts across all these disciplines. The result? A running update of the latest coronavirus email scams, malware samples, malicious domains and all things coronavirus and cybersecurity-related. These are then poured over by some 600 experts from agencies including the UK's National Cyber Crime Unit, threat researchers for tech giants and independent researchers who want to help in any way they can. "With the Covid-19 crisis, I've noticed an increased willingness amongst security folks to break down traditional bureaucratic and cultural barriers and collaborate with a speed and intensity that's rare," adds Saxe. "That's one of the silver linings of a crisis like this." Coronavirus hackers attack the WHOThe coronavirus does not discriminate between race, gender or age. It knows no borders. As such, it is almost unthinkable that criminals would attack the organisation most essential to coordinating the planet's response – the World Health Organisation (WHO). Yet hacking attempts against the agency have soared since the coronavirus outbreak. On 13 March, Alexander Urbelis, a cybersecurity expert and attorney with the New York-based Blackstone Law Group, discovered a hacking group set up a website that mimicked the internal email system of the WHO. The goal? To steal passwords and credentials from WHO members of staff in what is known as a watering hole attack. "I realised quite quickly that this was a live attack on the World Health Organization in the midst of a pandemic," Urbelis told Reuters, which first broke the news. It is believed that an advanced group of hackers known as DarkHotel was behind the WHO cyberattack. For Tony Cole, CTO at US cybersecurity firm Attivo Networks, if attacks on healthcare organisations – such as the WHO and HHS – are proven to be carried out by a nation state, it "should solicit the same response as bombing a hospital". "We should reserve the right to respond with force if someone does an attributed attack against a medical facility or facility doing research on vaccines, treatment, or cures during a pandemic," he says. "Just like our Geneva Convention agreements for wartime rules that you cannot bomb a medical care facility or a vehicle with the Red Cross emblem which could be administering care, you shouldn't go after a facility working on care for pandemic victims." Coronavirus scams are rifeNot all coronavirus cyberattacks have been directed at health agencies. The majority of criminal activity is low level and casts a wide net: spam, phishing emails, malicious websites and malvertisements. And with millions of workers switching to remote working to slow the spread of the virus, this has only created fresh opportunities for criminals to attack systems that might not be as protected outside of an office environment. None of this opportunism is new; criminals have always taken advantage of panic to maximise the damage of scams. But the coronavirus is proving particularly fertile ground for fear. On 19 March, US cybersecurity firm Agari detected the first Covid-19 business email compromise attack, which saw scammers imitate an employee asking for company funds be sent to a new account in light of the pandemic. Agari CEO and founder Patrick R. Peterson says that phishing and email authentication tools, as well as "leveraging the DMARC global standard to stop domain spoofing" are "extremely important right now to lessen the deluge of threats most companies are experiencing". Scammers have also been targeting healthcare professionals with phishing emails, with one asking them to click on a malicious link purporting to be a registration form for an online coronavirus awareness seminar. "There have been a lot of criminal groups targeting medical workers who are already fatigued from their day to day work," says Chad Anderson, senior security researcher at DomainTools. "This has not sat well with the security community and they're aiming to do something about it." So what are they doing about it? In addition to the new levels of collaboration, firms such as Coveware and Emsisoft are offering free ransomware tools to healthcare providers, and many other cybersecurity companies are providing pro bono assistance during the crisis. "We'll hunt you down, no matter how long it takes"But what offensive action can they take against malicious hackers capitalising on Covid-19? "Legally it's the same as it has been," says Anderson. "Map the attacker infrastructure and talk to network operators for takedowns. If you can attribute to a specific person then hand that over to law enforcement contacts." But there is a sense that, for cybersecurity experts protecting health organisations and members of the public, the gloves are off and the community is united by one goal. "The industry tends to be already pretty aggressive," adds Peterson. "What's changing is that the cyber community is coming together and joining forces to defend against these cybercriminals." And for the cybercriminals taking advantage of the biggest health crisis in more than a century, the message is clear. "We'll do what it takes to protect our hospitals," says F-Secure's Hypponen. "We'll hunt you down, no matter how long it takes." Read more: SOCs and the coronavirus: Why automation is key for security operations centres |
You are subscribed to email updates from Technology - Latest - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
This post have 0 komentar
EmoticonEmoticon