Subscribe to:

Subscribe to :: TheGuruReview.net ::

Does Spreadtrum’s Chip Really Have Intel Inside?

March 16, 2017 by  
Filed under Computing

China-based mobile chip vendor Spreadtrum has announced a new chip dubbed the SC9861G-IA, targeted at the “global mid-level and premium smartphone market”.

The chip is based around Intel’s Atom-based Airmont processor cores and it was made by Chipzilla using its 14-nanometer chip manufacturing technology.

Spreadtrum said the chip will go into mass production in the second quarter of 2017 which means we should see it in the shops in the second half of 2017.

One thing should be noted is that Intel is not involved in the branding at all. Spreadtrum is pitching it as being made by the Intel Custom Foundry (ICF) but other than that its name is off it.

Spreadtrum claims the Airmont CPU core inside the SC9861G-IA runs at 2GHz and it is unlikely to beat the Snapdragon 652 in per-core performance. Running on x86 make it less useful as a rival to ARM based chips. Intel’s mobile chips were not as bad as was claimed by the armies of Android fans, but it was not as robust, which is one of the reasons we suspect Intel pulled the plug on it.

There can be only one reason why a smartphone maker would opt for this chip and that is that it is considerably cheaper than the rivals.

Courtesy-Fud

Can Toshiba 1TB Flash Chip Make Waves?

March 6, 2017 by  
Filed under Computing

Troubled Japanese chipmaker Toshiba has begun shipping samples of its third-generation 3D NAND memory product.

The new 512 gigabit, 64-layer device has three-bit-per-cell triple-level cell (TLC) technology and will be part of Tosh’s BiCS FLASH product line. This technology will enable a 1-terabyte chip solution later this year. 

For those who came in late, BiCS FLASH is a 3D flash memory stacked cell structure.

Sample shipments of the new 512Gb devices have begun, with mass production scheduled for the second half of 2017.

The new flash memory product has 65 percent greater capacity than the previous generation technology, which used 48 layers of NAND flash cells.

In addition to the new 512Gb device, Toshiba’s BiCS FLASH lineup also includes a 64-layer 256Gb offering, which is currently in mass production.

According to Scott Nelson, senior vice president of TAEC’s memory business unit, “The introduction of our third generation BiCS FLASH coupled with the industry’s largest 1TB chip solution strongly reinforces Toshiba’s flash leadership position. These innovations underline our commitment to developing leading-edge memory solutions, and we will continue to advance our 3D technology to meet the ever-increasing storage market demand.”

The chip will be used in data centres but also consumer SSD products so it could be cheap enough to get into high-end gaming rigs.

This announcement comes as Toshiba talks about off-loading its lucrative SSD operations to pay for the accounting fiasco and the dodgy nuclear power plant deal it lost billions on.
A previous report about Western Digital, Foxxcon, SK Hynix and Micron Technology have now also thrown their hats in the ring to purchase a majority share in Toshiba’s memory spin-off.

Courtesy-Fud

Researchers Show How Heartbeats Can Be Used As Passwords

January 23, 2017 by  
Filed under Around The Net

Researchers at Binghamton State University in New York believes your heart could be the vital to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients’ health records.

The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously collect physiological data and transmit it to the patients’ doctors. Because electrocardiogram (ECG) signals are already collected for clinical diagnosis, the system would simply reuse the data during transmission, thus reducing the cost and computational power needed to create an encryption key from scratch.

“There have been so many mature encryption techniques available, but the problem is that those encryption techniques rely on some complicated arithmetic calculations and random key generations,” said Zhanpeng Jin, a co-author of the paper “A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth Systems.”

Those encryption techniques can’t be “directly applied on the energy-hungry mobile and wearable devices,” Jin added. “If you apply those kinds of encryptions on top of the mobile device, then you can burn the battery very quickly.”

But there are drawbacks. According to Jin, one of the reasons ECG encryption has not been widely adopted is because it’s generally more sensitive and vulnerable to variations than some other biometric measures. For instance, your electrical activity could change depending on factors such as physical exertion and mental state. Other more permanent factors such as age and health can also have an effect.

“ECG itself cannot be used for a biometric authentication purpose alone, but it’s a very effective way as a secondary authentication,” Jin said.

While the technology for ECG encryption is already here, its adoption will depend on patients’ willingness to don wearables and on their comfort with constantly sharing their biometrics.

Will 5G Be A Game Changer?

January 19, 2017 by  
Filed under Around The Net

The maker of chips Qualcomm has issued a new report which identifies 5G as a significant technology worldwide game-changer.

Its new report, “The 5G Economy” looks at the potential economic and social impact of 5G around the world. The study was conducted jointly by research firms IHS Markit, PSB and leading economist Haas School of Business’s, and principal executive officer of the Berkeley Research Group (BRG). Professor David Teece. The 5G Economy includes an economic impact study and opinion research about the expectations for 5G among business and technology leaders carried out by PSB.

The combined findings of the study show how 5G will profoundly affect the global economy and that business decision makers in technology and other industries overwhelmingly believe in the transformational nature of 5G.

Qualcomm CEO Steve Mollenkopf said that the researchers confirmed our strong belief that 5G will be a fundamental game changer.

“We have been hard at work helping create some of the key technologies and applications that will make 5G a reality, pushing the boundaries of LTE, collaborating with industry leaders, and spearheading the critical research behind the next-generation global wireless standard.”

The study indicates that 5G will catapult mobile into the exclusive realm of General Purpose Technologies, like electricity and the automobile, that provide the foundation for massive innovation, give rise to new industries and benefit entire economies.

This will happen as 5G advances mobile from a set of technologies connecting people to people and information to a unified fabric connecting people to everything.

Dr. Teece said he had spent many years studying the impact of general purposes technologies, and it’s clear that 5G will propel mobile into that category, assuring the technology’s long-term impact on society and continued growth for decades.

According to the study, in 2035, when 5G’s full economic benefit should be realized across the globe, a broad range of industries – from retail to education, transportation to entertainment, and everything in between – could produce up to $12.3 trillion worth of goods and services enabled by 5G.

The 5G value chain will generate up to $3.5 trillion in revenue in 2035, supporting as many as 22 million jobs. Over time, 5G will boost real global GDP growth by $3 trillion dollars cumulatively from 2020 to 2035, roughly the equivalent of adding an economy the size of India to the world in today’s dollars.

Complementing the economic study, polling research done by PSB confirms that business decision makers and opinion leaders around the globe expect 5G to bring widespread benefits for society and the economy overall, enabling new products and services, increasing productivity and allowing for new industries to emerge. Over 90 percent of the more than 3,500 respondents agreed that 5G will enable new products, services and use cases that have not been invented yet.

Courtesy-Fud

Symantec Finally Putting Security Into IoT

January 6, 2017 by  
Filed under Computing

Symantec has announced that it has come up with an IoT router which can secure your Internet of Things. 

Dubbed Norton Core, the device is a new app-enabled router that has built-in security to protect the entire home,. Symantec claims the device aims to keep safe up to 20 devices connected to it, including Windows computers, Macs, phones, tablets or any internet-of-things devices, in real time.

The router gets regular updates on cyber-crime information and protection mechanisms to keep any device connected to it safe. In case an infected device is connected to the network, it can isolate it from the rest of your devices to prevent the spreading of the malware.

Router level security is not new but it is rarely seen at for home users

Via the mobile app, you can monitor the network and see a list of online threats that the router has blocked. It even shows you the current safety level of your home network. You can also use the app to pause the internet for any connected device and set a bed time, during which the broadband connection is turned off.

Norton Core is a compact dome-shaped device that measures just 6 by 6 by 5 inches (15 by 15 by 13 cm). It has a dual-core 1.7GHz processor, 1MB of system memory and 4GB of flash memory. The router supports the latest 4×4 AC2600 Wi-Fi standard, with a top speed on the 5GHz band of 1.73 megabits per second and up to 800Mbps on the 2.4GHz band.

Symantec says the Norton Core’s Wi-Fi can cover a home of somewhere between 3,000 and 5,000 square feet. It also comes with four Gigabit LAN ports for wired clients.

The Norton Core is now available for preorder at $200, with a regular price of $280, in either titanium gold or granite gray. The price includes one year of subscription to its security protection, called Norton Core Security Plus, after which the ongoing cost is $99 per year.

Courtesy-Fud 

Amazon Video Launches Worldwide, Challenges Netflix

December 15, 2016 by  
Filed under Consumer Electronics

amazon-prime-video-150x150Amazon.com Inc has officially rolled out its video-on-demand service, Prime Video, in nearly every country except China, coming into direct competition with video-streaming pioneer Netflix Inc .

Prime Video, home to popular shows such as “The Grand Tour”, “Transparent” and “The Man in the High Castle”, will now be bundled with Prime subscriptions in 19 countries including India, Canada and France.

In other new regions, Prime Video customers will have to pay $2.99 or 2.99 euros per month for the first six months, after which the price will be doubled to $5.99 or 5.99 euros.

Amazon has been spending heavily, sometimes at the cost of profits, on the creation and marketing of movies and TV shows.

The company hopes that people will sign up for its Prime service to watch these videos – and in turn buy more goods from its online store to make the annual subscription worth it.

The Prime Video launch comes almost a year after Netflix Inc went global with its video-streaming service – rolling it out in more than 130 countries with the notable exception of China.

Subscriptions for Netflix, known for shows such as “Stranger Things”, “Daredevil” and “Narcos”, start at $8.99.

Amazon Prime Video members can also access videos offline on mobile devices, a feature Netflix introduced late last month.

Will The U.S. IoT Have A Market Value Of One Half Billion By 2020?

December 15, 2016 by  
Filed under Around The Net

A report by a research company is predicting that the internet of things (IoT) revenues will soar to be worth $500 million in 2020 in the USA alone.

Navigant Research which created the forecast, said that the IoT market covers not just only devices but includes secure data networks, software and services. Casey Talon, a principal research analyst at Navigant said: “If utilities seize the opportunity, they can leverage this to enhance customer offerings and increase customer engagement.”

By this, Talon is suggesting that utilities haven’t got their act together yet and should get on with developing, acquiring or making partnerships so that they can provide IoT enabled managed services.

He said that IoT in the utility field has the ability to give customers manage their energy independent from their utility company and that means re-thinking of business models to grab market share.

Talon estimates too that by 2020 there will be 1.7 million customers for IoT offerings.

Courtesy-Fud

The NHTSA Wants To Block Mobile Apps From Drivers

December 1, 2016 by  
Filed under Mobile

distracted-driving-150x150The National Highway Traffic Safety Administration (NHTSA) has proposed new guidelines that is requesting automakers to create a way to block applications on smartphones or tablets that can distract drivers.

Currently no safety guidelines exist for mobile devices when they are used while driving, the NHTSA said.

The new guidelines, which were published last week and are in a comment period, instruct automakers to create a “Driver Mode” similar to Apple’s Airplane Mode on iPhones, which takes the smartphone offline.

The new guidelines are the latest effort by the federal government to reduce accidents caused by distracted driving.

 In proposing the guidelines, the NHTSA pointed to a rise in U.S. traffic fatalities and injuries in the past two years, a good percentage of which can be connected to drivers who are distracted by mobile technology, it said.
In 2015, some 10% of the 35,092 U.S. traffic fatalities on record involved one or more distracted drivers, and those crashes resulted in 3,477 fatalities, an 8.8% increase from the 3,197 distracted-driving-related fatalities in 2014, according to the NHTSA.

Of the 5.6 million non-fatal, police-reported crashes in 2014 (the most recent year for which this data is available), 16% were distracted-driving-related crashes and resulted in 424,000 injuries.

The Centers for Disease Control and Prevention (CDC) defines distracted driving activities to include using a cell phone, texting, and using in-vehicle infotainment (IVI) technologies such as navigation systems.

In 2013, the NHTSA published Phase 1 Driver Distraction Guidelines that focused on visual-manual interfaces of electronic devices installed as original equipment, such as infotainment centers.

Those phase 1 guidelines included a definition for distracted driving as any “single average glance” that takes a driver’s attention away from the roadway for more than two seconds or “where the sum of… individual glances” are 12 seconds or more while performing a testable task, such as selecting a song from a satellite radio station.

The Phase 1 guidelines recommended that interfaces and tasks determined to be more distracting than its specified levels should not be accessible to a driver on the road.

 

Symantec Agree To $2.3 Billion Acquisition Deal For LifeLock

November 22, 2016 by  
Filed under Around The Net

symantec-150x150Symantec Corp announced plans to acquire U.S. identity theft protection services company LifeLock Inc  for $2.3 billion, in a deal that it hopes will prop up sales at its Norton cybersecurity unit.

Symantec’s security software often comes bundled with personal computers. As a result, the company has suffered as consumers use mobile devices more than traditional computers. While Norton remains profitable, its sales have been falling.

“(Norton) had been declining with the declines in PC market share. This acquisition brings $660 million in revenue to the consumer business and returns it to longer sustainable growth,” Symantec Chief Executive Greg Clark said in an interview.

Reuters was first to report earlier on Sunday that Symantec was in the lead to acquire LifeLock.

Symantec’s purchase of LifeLock is in line with its efforts to diversify its offerings. In August, it bought Blue Coat Inc, which helps firms maintain security over the internet, in a $4.65 billion deal. Clark previously held the top job at Blue Coat, and made the switch after the deal closed.

Based in Tempe, Arizona, LifeLock offers services such as monitoring new account openings and credit-related applications in order to alert consumers about unauthorized use of their identity. It also works with government agencies, merchants and creditors to remediate the impact of identity theft.

Fran Rosch, executive vice president of Norton Business Unit, said that Symantec had dabbled in identity security but had nowhere near Lifelock’s 4.4 million members.

“We had to extend our value proposition. It was a no brainer for us to get back to growth,” Rosch said.

Symantec expects to finance the transaction with cash on balance sheet and $750 million of new debt.

The Mountain View, California-based company has been moving away from what is sees as more commoditized services, selling its data storage business Veritas in January to private equity firm Carlyle Group LP for $7.4 billion. Technology-focused firm Silver Lake Partners has also made a $1 billion investment in the company in two parts this year.

Symantec said the LifeLock deal is not expected to have a material impact on its financial results next year, and reaffirmed its fiscal year 2017 and 2018 guidance. The deal also represents a victory for activist hedge fund Elliott Management Corp, which had pushed LifeLock to explore its options.

WhatsApp Adds Full Encryption To Video Calls

November 16, 2016 by  
Filed under Mobile

whatsapp-logo-150x150One of the most popular means of communication, Facebook’s  WhatsApp, had included fully encrypted video calling to its messaging app as of Monday, a move that comes as privacy advocates worry about the potential for stepped-up government surveillance under a Trump administration.

WhatsApp, which boasts more than a billion users worldwide, adopted end-to-end encryption early this year, making it technically impossible for the company or government authorities to read messages or listen to calls.

The new video calling service will thus provide another means for people to communicate without fear of eavesdropping though WhatsApp does retain other data such as an individual’s list of contacts.

WhatsApp co-founder Jan Koum said in an interview that video calls will be rolled out to 180 countries within hours after the feature is introduced at an event in India.

“We obviously try to be in tune with what our users want,” Koum said at the company’s unmarked Mountain View, California headquarters building. “We’re obsessed with making sure that voice and video work well even on low-end phones.”

Koum told Reuters that improvements in phone cameras, battery life and bandwidth had made the service viable for a significant proportion of WhatsApp users, even those using inexpensive smartphones.

Apple Inc  offers its FaceTime video calls to iPhone users, and Microsoft Corp’s  Skype offers video calls on multiple platforms. But WhatsApp has built a massive installed base of mobile customers and has been steadily adding more features to what began as a simple chat applications.

Amazon Ordered To Reimburse Parents For Children’s In-app Purchases

November 14, 2016 by  
Filed under Around The Net

amazon-logo-1-150x150A federal judge has ordered Amazon.com Inc to set up a year-long process to reimburse parents whose children made in-app purchases without permission, but rejected a U.S. regulator’s request for a $26.5 million lump-sum payout.

U.S. District Judge John Coughenour, in Amazon’s hometown of Seattle, issued his order more than six months after finding the online retailer liable, in a case brought by the Federal Trade Commission.

The FTC in July 2014 accused Amazon of making it too easy for children to run up bills while playing games such as “Pet Shop Story” and “Ice Age Village” on mobile devices, resulting in an estimated $86 million of unauthorized charges.

 The order calls for Amazon to set up a notice-and-claims process beginning in early 2017 to alert parents of their eligibility for refunds, and then to reimburse them.

Coughenour said this approach “removes the uncertainty of the proper lump sum amount that the parties have vigorously disputed. Moreover, it accomplishes the goals of placing liability on Amazon and refunding eligible customers.”

Coughenour called the FTC’s $26.5 million damages request “too high,” agreeing with Amazon that it might have taken into account failed password attempts unrelated to unauthorized purchases by children.

But the judge rejected Amazon’s request to issue refunds in the form of gift cards, saying the company would “undoubtedly recapture some of the profits that are at issue.”

Neither Amazon nor the FTC immediately responded to requests for comment.

ARM Finally Adds Security To IoT Chips

November 1, 2016 by  
Filed under Computing

 ARM has announced that it will introduce tiny processors which have Trustzone baked in to run the next generation of IoT devices.

The ARM TechCon in Silicon Valley was told that the new designs will stop devices from being hacked and recruited into huge botnet swarms.

TrustZone has been around for a decade for Windows, Mac OS and Android products but never for chips this small or low-powered.

ARM’s new Cortex-M33 chip design is just one-tenth of a square millimeter, and the Cortex-M23 is 75 percent smaller than that. They are based on the new ARMv8-M architecture and are designed to work with ARM’s mbed OS. Already Chip vendors including Analog Devices, NXP and STMicroelectronics have already licensed the design.

ARM expects chips based on them to be used in products like bandages that collect and send medical data, tracking tags for packages in transit, and portable blood-monitoring devices.

These things won’t be plugged in to an outlet and may not even have batteries: A pocket-sized blood-testing device for diabetics could harvest enough energy to do its job just from the motion of the user removing the cap, ARM says.

ARM also introduced a cloud-based platform for managing and updating IoT processors for as long as they’re deployed. The mbed Cloud software-as-a-service platform is designed to solve the problem of how to manage millions of chips in devices that may be deployed all over a city or a global enterprise.

When a device boots up, mbed Cloud can provide a security key for the communications channel and specify who can get access to the data from the device, based on enterprise policies.

The service can also help to prevent IoT-based denial-of-service attacks by monitoring what’s going on in the network. If there are abnormally chatty devices, it can isolate them or shut them down.
The service can be run on multiple public clouds.

Courtesy-Fud

Qualcomm Plans To Ship 5G Modems In 2018

October 19, 2016 by  
Filed under Mobile

qualcom-bldg-150x1505G networks will be five times as fast as the quickest LTE technology by taking advantage of the highest cellular frequencies ever, according to Qualcomm.

The X50 modem won’t ship until the first half of 2018, and 5G networks aren’t expected to go commercial until 2020. But Qualcomm will have a lot to say about the new technology at its 4G/5G Summit in Hong Kong. At the same event, it’s announcing plans around its gigabit-speed X16 LTE modem.

The X50 will offer download speeds as high as 5Gbps (bits per second), where networks support them, using millimeter-wave frequencies and futuristic techniques for beaming signals to devices, according to slides prepared for the 4G/5G Summit. Qualcomm shared the materials in advance.

The X50 initially will use the 28GHz band, which is also the focus of 5G development work at the Verizon 5G Technology Forum and Korea Telecom 5G Special Interest Group. It’s one of several millimeter-wave bands that are widely expected to be used for 5G.

Cellular networks up to now have stayed below 6GHz, because higher frequencies don’t naturally travel as far or go through objects as easily. But a lot more bandwidth is expected to become available in millimeter-wave bands in the coming years. Qualcomm says the X50 will be able to use a combined 800MHz of spectrum, compared with up to 80MHz for the X16.

The future modem will use several emerging techniques to make this work. Key tools are beam-forming and beam-tracking, in which a cell can focus its signal to reach a specific mobile device and then follow that device as it moves around. The X50 will even be able to bounce its signal off hard surfaces in order to get around objects between the cell and the user.

Qualcomm expects the X50 modem to ship to system makers in sample quantities starting in the second half of next year. Combined with a gigabit-speed LTE modem, the X50 will form the basis of dual-mode 4G/5G devices. LTE and 5G are expected to coexist for many years.

Meanwhile, the X16 LTE modem will be coming out in a consumer device in the next few months. The NetGear Mobile Router MR1100, a mobile hotspot that provides a Wi-Fi connection on the go, will be sold by Australian carrier Telstra, Qualcomm announced Tuesday.

Is A 200,000 Core PC In The Making?

August 31, 2016 by  
Filed under Computing

Future Processor

Future Processor

Princeton University researchers have developed a 25-core open source processor that can be scaled to create a monster 200,000-core PC stuffed with 8,000 64-bit chips. The chip is called Piton after the metal spikes driven by rock climbers into mountain sides, and was presented at the Hot Chips symposium on high-performance computing in Cupertino this week.

“With Piton, we really sat down and rethought computer architecture to build a chip specifically for data centres and the cloud,” said David Wentzlaff, a Princeton assistant professor of electrical engineering and associated faculty in the Department of Computer Science.

“The chip we’ve made is among the largest ever built in academia and it shows how servers could run far more efficiently and cheaply.”

The current version of the Piton chip measures 6mmx6mm. It has more than 460 million transistors, each as small as 32nm, the bulk of which are contained in 25 cores.

Companies and academic institutions have produced chips with many dozens of cores in recent years, but the readily scalable architecture of Piton can enable thousands of cores on a single chip with half a billion cores in the data centre, said Wentzlaff, adding that more cores ought to mean more processing power.

“What we have with Piton is really a prototype for future commercial server systems that could take advantage of a tremendous number of cores to speed up processing,” he said.

At the same time, he suggested, the design could also cut power consumption and therefore heat dissipation.

The programs being run in a typical data centre used by hundreds of thousands or even millions of users rely on similar operations at the microprocessor level. The Piton chip’s cores can recognise these instances and execute identical instructions consecutively so that they flow one after another.

This can increase energy efficiency by about 20 per cent compared with a standard core, according to the researchers.

A second innovation is called a memory-traffic shaper that mediates between the demands of different applications accessing memory on the chip. The researchers claimed that this can yield an 18 per cent improvement in performance compared with conventional means of memory allocation.

Piton also assigns areas of the on-chip cache memory to specific cores, while the cores themselves can be reserved or assigned to particular applications.

Generously, rather than creating a startup to exploit the various innovations, Wentzlaff confirmed that the designs will be published under an open source licence.

“We’re very pleased with all that we’ve achieved with Piton in an academic setting, where there are far fewer resources than at large commercial chipmakers. We’re also happy to give out our design to the world as open source, which has long been commonplace for software, but is almost never done for hardware,” he said.

The architecture has been designed to be easily scalable, enabling it to handle the large-scale repetitive processing tasks increasingly demanded of servers running in cloud data centres.

Courtesy-TheInq

Is The IoT A Security Disaster Waiting To Happen?

August 8, 2016 by  
Filed under Computing

The craze for connecting anything and everything and controlling it over the internet will result in a major disaster without better built-in security, according to security expert Bruce Schneier.

Furthermore, if secret services really are trying to influence elections by hacking the systems of political parties and releasing embarrassing emails, they will almost certainly attempt to hack into the increasing number of internet-connected voting machines for the same ends.

Schneier is the author of multiple encryption algorithms, founder of security company Counterpane, and former chief technology officer of BT Managed Security Solutions.

“It’s one thing if your smart door lock can be eavesdropped on to know who is home. It’s another thing entirely if it can be hacked to allow a burglar to open the door or prevent you opening your door,” Schneier wrote in an article published by Motherboard.

“A hacker who can deny you control of your car, or take over control, is much more dangerous than one who can eavesdrop on your conversations or track your car’s location.

“With the advent of the Internet of Things [IoT] and cyber-physical systems in general, we’ve given the internet hands and feet: the ability to directly affect the physical world. What used to be attacks against data and information have become attacks against flesh, steel and concrete.”

Schneier explained that many of the devices now being connected to the internet, including industrial systems controlling major facilities, have security only as an afterthought, and that the IoT “will allow for attacks we can’t even imagine”.

The key weaknesses come from software control systems, the connections between systems and autonomous systems. Schneier highlighted a lack of security patching in control systems, the ability to compromise networks via insecure devices connected to them, especially IoT devices, and the security dangers of increased automation.

“Security engineers are working on technologies that can mitigate much of this risk, but many solutions won’t be deployed without government involvement. This is not something that the market can solve,” he said.

Schneier also suggested that if Russian security services were indeed behind the attack on the systems of the US Democratic National Committee there is no reason why they wouldn’t target internet-connected voting machines.

“Over the years, more and more states have moved to electronic voting machines and have flirted with internet voting. These systems are insecure and vulnerable to attack,” Schneier warned.

Courtesy-TheInq

 

Next Page »