Mobile Application Testing – 01 Synergy

April 4th, 2012 by Rahul No comments »

01 Synergy offers a complete and comprehensive range of Mobile Application testing services from Unit Testing to User Acceptance Testing. Complexities across handset makers, carriers, locations and operating systems has made building bug-free mobile apps really difficult.

Our areas of expertise include:

  • Requirements Capture and Analysis
  • Test Planning
  • Test case Design
  • Test Execution
  • Defect Tracking & Management
  • Reporting
  • Test Metrics

01 Synergy offers a wide range of Mobile Application testing services, including:

  • Functional Testing
  • Security Testing
  • Load & Performance Testing
  • Localization Testing
  • Usability Testing

Our QA professionals can help you with all your Mobile App testing projects,  including:

  • iOS Application Testing (iPhone, iPad, iPod Touch)
  • Android Application Testing
  • BlackBerry Application Testing
  • Windows Phone 7 Application Testing

01 Synergy is here to help, if you have a need to discuss Mobile application testing, agile testing, do count on us to help. Visit us online at www.01sqa.com or send us a mail here: mobile.testing@01synergy.com

Defru Malware Disguised as Anti-Virus Software Targets Windows Users in Russia

August 21st, 2014 by Amrinder No comments »

Researchers at Microsoft have detected a new, relatively simple rogue anti-virus variant called Defru that attacks Windows users, and blocks them from accessing popular websites on the internet.

The malware, detected as Rogue:Win32/Defru, masquerades as a genuine anti-virus program, and initiates fake scans within Windows computers.

This malware creates a fake threat page looks like a warning prompt from an anti-virus company, and asks users to pay to obtain the full virus removal solution from the company.

The rogue program also displays a high-alert prompt that deceives users into paying for the fake anti-virus software.

“When the user is browsing the Internet, the rogue will use the hosts file to redirect links to a rather infamous specific fake website that is often used in social engineering by fake antivirus malware,” states Daniel Chipiristeanu, an anti-virus researcher at Microsoft’s Malware Protection centre (MMPC).

Russia

Chipiristeanu says the Defru malware is currently targeting Russian Windows users, a fact evident by a fake virus alert that he received (below) which is written in Russian.

The translation of the Russian warning reads:

“Detected on your computer malicious software that blocks access to certain Internet resources, in order to protect your authentication data from intruders the defender system Windows Security was forced to intervene.”

An important aspect to note at this juncture would be the fact that systems targeted by Defru, will be forced to display the fake virus alert (as explained above) every time users navigate to their favourite (or popular) websites.

The so-called anti-virus scanner even displays a list of fake malware which it claims have been found within the computer.

Since Defru constantly bugs users with fake virus/malware alerts, users may be compelled to click on the ‘Pay Now’ option that is generally displayed in the fake alert window.

Users who do press the Pay Now button are redirected to a payment portal called Payeer and Microsoft states that even after paying for the service, computer systems are not free of Defru.

Combating Defru

“The users can clean their system by removing the entry value from the “run” registry key, delete the file from disk and delete the added entries from the hosts file,” states Chipiristeanu.

Chipiristeanu also cautions Windows users not to fall prey to paid anti-virus software. He warns people to make thorough investigations before paying for any particular digital security solution.

Source:https://uk.news.yahoo.com/defru-malware-disguised-anti-virus-software-targets-windows-083414227.html#UFPSAG0

Yumi and i.LEVEL Software implement integrated EPOS solution

August 21st, 2014 by Amrinder No comments »

Following a successful installation, i.LEVEL Software announces the launch of a new integrated EPOS system for women’s fashion brand Yumi.

The solution allows Yumi, one of the UK’s leading high street and online fashion brands, to add i.LEVEL’s EPOS system* to its existing i.level modules of fashion wholesale, concession and supply chain software. (*Electronic Point Of Sale)

By integrating its EPOS system with existing i.LEVEL modules, Yumi is now able to manage its multi-sales channels process using one stock control system – simplifying Yumi’s entire wholesale, distribution and sales process whilst also helping the company improve cash flow and minimise redundant stock.

The EPOS development and integration was managed by i.LEVEL Software’s development team headed by Douglas Cryer. As part of the project, the team also integrated payment system RedCard with Yumi’s EPOS system.

Uttam Nepal, Founder and Owner of Yumi, says: “We have worked with Leif and the i.LEVEL team for many years now and have always found them to be responsive to our ever changing business needs. The successful implementation of the EPOS system is just another example of this in practice.”

Leif Roenn, CEO of i.LEVEL Software, says: “Women’s fashion is becoming ever more competitive and fragmented across a variety of sales channels. These include high street retail outlets, concessions, online stores and websites. By integrating its EPOS system with its existing i.LEVEL supply chain software, Yumi can now manage stock across its business more robustly – giving them an enormous competitive advantage.”

Source:http://www.sourcewire.com/news/84130/yumi-and-i-level-software-implement-integrated-epos-solution#.U_XKeqMjrXQ

Police use cutting-edge facial recognition software to trace Tube sex attackers

August 21st, 2014 by Amrinder No comments »

Police are using facial recognition software to track down serial sex offenders harassing passengers on London’s Tube and rail network.

The head of British Transport Police said extra undercover officers were also being deployed to tackle a surge in the number of sex attacks on the Tube.

New figures show the number of sex attacks on the Underground and the Docklands Light Railway rose by 31 per cent last year. There were 429 assaults in 2013/14 compared to 327 in the previous year.

Chief constable Paul Crowther said part of the increase was due to more people coming forward following the Jimmy Savile scandal while police were also encouraging more victims to report crime.

The police chief, who was appointed in March, said his force had launched Operation Guardian to tackle the problem and increase people’s confidence in coming forward to report attacks.

He said: “We are determined to make a big impact on this crime. We are specifically tackling sex offences on the Tube where some women are reporting they are being harassed on a day to day basis.

“We have plain clothes officers on the network catching people in the act while we are using new techniques such as facial recognition technology to identify those people who think they can carry out these crimes without detection because they are in a crowded carriage and they think they are anonymous.”

He added: “We are particularly interested in offences which are often unreported such as sexual assault, exposure, lewd comments and harassment.”

Around one in four of sex attackers on the Tube are caught but police are now using a new CCTV centre at Victoria with access to 55,000 cameras to help tackle the crime.

Detectives are also using Twitter and Facebook to trace offenders – in one case they received 1,800 pieces of information from people replying to a single image on social media.

Mr Crowther said some crimes were now being solved entirely by appeals on social media.

He said: “People think they can carry out stealth crimes, whether that is sex offences or pickpocketing, and not be detected but the power of social media and new technologies such as facial recognition are very powerful new crime fighting tools.”

In June this year a man who admitted four sex assaults on women on Tube trains over a 15 month period was jailed for 12 months.

Lloyd Weekes, 52, of Finsbury Park was sentenced at Blackfriars Crown Court after pleading guilty to four counts of sexual assault, and one of resisting a police officer.

New figures show crime overall on the Underground fell slightly last year and Mr Crowther says there are just eight offences recorded per million passengers on the Tube and DLR.

Crime on the Uk railways fell for the tenth year in a row.

However, the total number of violent offences on the Tube jumped by 9.5 per cent to a total of 2,077 last year while there were also big rises in cases of violent incidents on trains in the capital.

These included rises in the number of incidents of racially aggravated harassment – up by more than 27 per cent to a total of 397 cases last year – assaults on police and possession of ‘firearms’. The number of actual assaults on the Tube fell.

Police say more people are coming forward to report cases of verbal racist attacks.

There were significant falls in the number of theft offences – particularly pickpocketing – on the trains and on the Tube network after police launched Operation Magnum last year which alerted passengers to the tricks used by thieves.

On the Underground there was a significant 34 per cent reduction in the number of pickpocketing offences down from 16 a day to 11 a day.

The number of people caught in possession of drugs jumped by 52 per cent to a total of 892.

There were also significant falls in cable theft across the Tube and rail network – the number of cases across the UK was down by 37 per cent.

Source:http://www.standard.co.uk/news/crime/police-use-cuttingedge-facial-recognition-software-to-trace-tube-sex-attackers-9682689.html

Get Adobe Flash player