The app lets users see who’s online for a private or group chat, and lets them decorate messages with pictures and stickers. Users can also share their location, and contacts are automatically added to the app.
For now, some features available on the Android and iOS versions — such as the ability to record messages and send photos privately — are missing on the Windows Phone app. The pop-up chat heads Facebook has implemented on Android are also missing.
The availability of apps on Windows Phone has been a problem for Microsoft when competing with Apple’s iPhones and the Android camp. At an event in conjunction with Mobile World Congress, Joe Belfiore, who runs Microsoft’s Windows Phone platform, highlighted recent additions such as Instagram, Vine, Waze and Mint.
The arrival of these apps is more than a coincidence: It’s a result of Microsoft working with third party app developers and slowly growing phone sales, according to Paolo Pescatore, director of apps and media at market research company CCS Insight.
“They are very much needed. Microsoft has been trying to bridge the gap with iOS and Android, but frankly the rate of development hasn’t been as fast as it should have been,” Pescatore said.
The company still needs to convince or help developers of many local video and entertainment apps to create Windows Phone versions, according to Pescatore. For that to happen, Microsoft and its partners need to sell more phones, he said.
The Mobile World Congress event also detailed the company’s plans to make Windows Phone a better fit for low-end smartphones and presented new hardware partners, including Foxconn, Karbonn, Lenovo, LG Electronics and ZTE. With Microsoft soon closing its acquisition of Nokia’s handset division, Windows Phone is at a critical juncture.
Target Corp announced an overhaul of its information security processes and the departure of its chief information officer as the retailer tries to re-gain customers and investors after a massive data breach late last year.
CIO Beth Jacob is the first high-level executive to leave the company following the breach, which led to the theft of about 40 million credit and debit card records and 70 million other records of customer details.
Jacob, who comes from a sales background and has been CIO since 2008, will be replaced by an external hire, according to sources at Target.
“It’s a decision that should have been made by the CEO on January 1, not through the resignation of an employee that overlooked critical weakness in the operating model,” Belus Capital Advisors CEO Brian Sozzi said.
The breach at Target was the second largest at a U.S. retailer, after the theft of more than 90 million credit cards over about 18 months was uncovered in 2007 at TJX Cos Inc, operator of the T.J. Maxx and Marshalls chains.
Hacking has become a major concern for retailers in the United States. In the latest reported breach, beauty products retailer and distributor Sally Beauty Holdings Inc said on Wednesday its network had been hacked but no card or customer data appeared to have been stolen.
Target Chief Executive Gregg Steinhafel said the company would elevate the role of chief information security officer as part of its plan to tighten its security.
The company will also look externally to fill that position as well as the new position of chief compliance officer.
Steinhafel said Target would be advised by security consultant Promontory Financial Group as it evaluates its technology, structure, processes and talent.
“I believe this is definitely a measure in restoring faith and really showing that they are taking the breach seriously,” Heather Bearfield, who runs the cybersecurity practice for accounting firm Marcum LLP, told Reuters.
Target, the third-largest U.S. retailer, said last week customer traffic had started to improve this year after falling significantly toward the end of the holiday shopping season when news of the cyber attack spooked shoppers.
AMD’s Mantle has been a hot topic for quite some time and despite its delayed birth, it has finally came delivered performance in Battlefield 4. Microsoft is not sleeping it has its own answer to Mantle that we mentioned here.
Oddly enough we heard some industry people calling it DirectX 12 or DirectX Next but it looks like Microsoft is getting ready to finally update the next generation DirectX. From what we heard the next generation DirectX will fix some of the driver overhead problems that were addressed by Mantle, which is a good thing for the whole industry and of course gamers.
AMD got back to us officially stating that “AMD would like you to know that it supports and celebrates a direction for game development that is aligned with AMD’s vision of lower-level, ‘closer to the metal’ graphics APIs for PC gaming. While industry experts expect this to take some time, developers can immediately leverage efficient API design using Mantle. “
AMD also told us that we can expect some information about this at the Game Developers Conference that starts on March 17th, or in less than two weeks from now.
We have a feeling that Microsoft is finally ready to talk about DirectX Next, DirectX 11.X, DirectX 12 or whatever they end up calling it, and we would not be surprised to see Nvidia 20nm Maxwell chips to support this API, as well as future GPUs from AMD, possibly again 20nm parts.
The deal would mirror a first-of-its kind agreement that Disney and satellite rival Dish Network Corp announced earlier this week.
The Internet rights being discussed are part of a large-scale programming agreement that would replace a deal between the companies that expires in late December. Disney and Dish are in negotiations but the timing of the new deal could be not be learned.
“The deal and terms are not unexpected as the Dish contract was the most recent in the Disney timeline to expire,” DirecTV spokesman Darris Gringeri said on Wednesday. “The DirecTV contract is up next and we’re in the process of working with Disney on a similar long-term agreement of our own.”
A Disney spokesman declined to comment.
A new pact could give both Disney and DirecTV, the No. 1 satellite operator, an additional revenue source as consumers gravitate toward online video services such as Netflix Inc and watch more television online.
The agreement between Dish and Disney marked the first time that a U.S. pay TV operator has been given the flexibility to offer its content over the Web through smartphones, tablets and computers outside of a pay TV subscription.
In that agreement, Disney allows for Dish to stream linear and on-demand content from ABC broadcast stations as well as cable channels, ABC Family, Disney Channel, ESPN and ESPN2. Dish has not revealed plans for its streaming service.
DirecTV, which has 20.3 million subscribers, is expected to secure better rates on programming than Dish, which has 14.1 million subscribers, because of its size. Both companies have complained about the rising cost of programming and have been involved in high-profile blackouts over the past few years.
DirecTV Chief Executive Mike White has previously said the company is working on an “over-the-top” video package to suit niche audiences featuring Hispanic or kids programming, but has not yet given details on that offering.
Analysts speculate that Facebook may want to use the drones to bring Internet connectivity to the two-thirds of the world that are not connected.
The social networking company is reportedly paying $60 million for Titan Aerospace, according to TechCrunch, which cited unnamed sources.
Neither Titan Aerospace nor Facebook responded to requests for confirmation.
The aerospace company builds light-weight, high-flying drones that can take off at 20 mph and remain aloft for five years. The company’s Solara 50 drone, for instance, can fly as high as 65,000 feet above Earth.
“Drones are the latest rage with tech companies these days,” said Dan Olds, an analyst with The Gabriel Consulting Group. “Amazon, Google and Facebook, plus a whole lot more seem to be looking for ways they can shoehorn drones into their business plans. And what young geek didn’t dream of having a remote control flying machine that could do anything they wanted it to do?”
But could Facebook use these drones to bring Internet connectivity to remote areas? Sure, but it’s not the only way they could go about it.
Last June, Google’s research arm, Google X, announced that it was working on affordable Internet connectivity through the use of a fleet of high-altitude balloons. The company tested its plan by launching 30 balloons that flew twice as high as commercial airplanes with 50 users trying to connect to the Internet from below.
Amazon.com had another use for drones, and in December announced plans to use the machines to deliver merchandise to customers. Possibly taking a page from Domino’s old promise of delivering pizzas in 30 minutes or less, Amazon said with drones, some customers could get their purchases within half an hour.
“Could drones be the way to provide net connections in Third World countries?” asked Olds. “Yeah, maybe, but wouldn’t a set of non-sexy, long-range cell towers or low-power, cost-optimized microwave repeaters be a better solution? Sure, there are some drawbacks to physical infrastructure on the ground, but they can be worked around.”
He reiterated that drones simply are the cool new tech tool. How could a tech company with very deep pockets resist?
Verizon Communications is engaged in discussions with content providers to deliver web-based TV services to mobile platforms, chief executive Lowell McAdam, said at an investor conference earlier in the week.
Just recently, Dish Network Corp and Walt Disney Co announced a landmark deal that will allow the No. 2 satellite TV provider to deliver Disney-owned network content online, outside of a traditional TV subscription.
Verizon’s goal “is to work with the content providers,” said
McAdam at the Morgan Stanley Technology, Media & Telecom Conference.
“I have personally had discussions with the CEOs of the large content companies, and we would love to partner with them to see how we can take FiOS contact mobilely across the country.” he said.
McAdam said the company could also look at providing a service delivered over wireless airwaves and not just broadband.
According to PwC’s annual entertainment and media forecast, North American consumers will spend $6 billion in 2014 on entertainment from services such as Netflix that are offered over the top, meaning they are utilized over a network but not offered by the network operator.
“I think you can actually get a virtuous cycle where broadcast viewing goes up and over-the-top viewing goes up, if you time this properly,” McAdam said.
In January, Verizon acquired Intel Corp’s OnCue service for an undisclosed sum to accelerate its push into next-generation video services, including integrating it with Verizon’s FiOS fiber-based Internet and TV service that has more than 5 million video subscribers, about 5 percent of pay TV households. The company said it was open to providing over-the-top content to any device.
McAdam also stressed that Verizon expects Netflix to pay for faster video delivery as part of a so-called interconnect deal, in an arrangement similar to the one the video provider has made with Comcast Corp.
“I have spoken live and via email with (Netflix CEO) Reed Hastings, and I believe that we will get some sort of an arrangement with them as well,” said McAdam.
We already knew that Android was the mobile operating systems most targeted by malware, and that isn’t about to change any time soon.
Security firm F-Secure has reported that malicious activity on Android accounted for 97 per cent of all detected mobile threats for 2013.
The figures were revealed in F-Secure’s latest Threat Report for the second half of 2013, finding that there were 566 more Android malware variants found last year than during the previous year.
“97 percent of the mobile threats in 2013 were directed at the Android platform, which racked up 804 new families and variants,” F-Secure said in its report (pdf). “The other three percent (23) were directed at Symbian. No other platforms had any threats. In contrast, 2012 saw 238 new Android threats.”
F-Secure found that the top 10 countries reporting Android threats saw a little over 140,000 Android malware detections, with 42 percent of the reported detections coming from Saudia Arabia and 33 percent from India. European countries accounted for 15 percent of the total and the US just five percent.
F-Secure said that due to Android itself having relatively few vulnerabilities, the main distribution method is still through shady apps downloaded from third-party app stores.
“For mobile platforms, the continued dominance of the Android operating system makes it almost the exclusive target for mobile threats we’ve seen this period,” F-Secure’s report explained.
“Though the relatively low number of vulnerabilities found in Android makes the operating system itself difficult to attack, this security is largely circumvented by the relative ease with which malware authors can provide their ‘products’ and dupe users into installing it on their own devices, with the necessary permissions to straightforwardly use the device (and the user’s data) for the attacker’s own benefit.”
The Android malware families most commonly reported in that period were Ginmaster, Fakeinst and Smssend, which either harvest data from the device or send premium-rate SMS messages.
The F-Secure report also found that web based attacks, which typically involve techniques that redirect the browser to malicious websites, were the most commonly reported type of attack for the period, making up 26 percent of malware detections, followed by the Conficker worm with 20 percent.
“The three most common exploits detected during the period were all Java-related,” the report said. “Java exploits, however, declined compared to [the first half of] 2013. Mac malware continues a slight but steady increase, with 51 new families and variants detected in 2013.”
Cisco has leant its support to the Internet of Things (IoT) with a security competition.
The “Internet of Things Grand Security Challenge” will be offering prizes of up to $300,000 for innovations designed to close security loopholes surrounding internet-connected objects.
Because the IoT is a loose concept rather than a standard or protocol, the criteria for the solutions are quite far reaching, with a Cisco blog post citing that it will evaluate entries based on:
Feasibility, scalability, performance, and ease-of-use
Applicability to address multiple IoT verticals (manufacturing, mass transportation, healthcare, oil and gas, smart grid, etc.)
Technical maturity/viability of proposed approach
Proposers’ expertise and ability to feasibly create a successful outcome
We now live in a world where even the most benign objects are hackable and the numbers of devices involved will only increase, so it therefore will become imperative that the interconnectivity involved does not overstep boundaries of safety or privacy.
Sierra Wireless recently launched Legato, a Linux distro specifically engineered for the IoT, which actually plays up its capacity for gathering Big Data. Meanwhile the IT industry continues to be excited about the IoT with Intel claiming it will be the next major disrupter in tech.
Winners of Cisco’s security challenge will be announced this Autumn at the Internet of Things World Forum, with six prizes of between $50,000-$75,000 up for grabs, as well as the overall winner’s $300,000 bounty.
The U.S. company’s CarPlay makes its debut in Ferrari, Mercedes-Benz and Volvo vehicles at the show, demonstrating the software system that allows drivers to control their iPhones via touch and voice, Apple revealed on Monday.
Carmakers have already enabled some access to smartphones via Bluetooth technology, but Apple’s latest offering aims to integrate iPhone functionality more seamlessly with dashboard-mounted display and speaker systems.
CarPlay enables drivers to access to contacts stored on the iPhone, make calls, return missed calls or listen to voicemails without taking their hands from the steering wheel.
Drivers can also use maps, listen to music and access messages “with just a word or a touch”, Apple said. Drivers will also be able to read messages and dictate responses via Apple’s voice-activated Siri software.
Apple said that CarPlay will also be available in cars from manufacturers including BMW,Ford, General Motors, Honda, Hyundai, PSA Peugeot Citroën, Subaru, Suzuki and Toyota Motor Corp.
Samsung appears to have delivered a huge snuff to Android OS maker Google. Samsung’s new smartwatch Gear 2 and Gear 2 Neo, the sequels to the poorly reviewed original Galaxy Gear are going to ship without Android.
Instead, the new Gears run Tizen, another open source operating system that Samsung, Intel, and others are working on. It is starting to look like Samsung wants to distance itself from its reliance on Google for software and services.
Samsung’s official reason is that Tizen has better battery life and performance. The new Gears can get up to an extra two days of battery life by running Tizen, even though they have the same size battery. The Galaxy Gear barely made it through a day on one charge.
To be fair Android isn’t optimized to run on wearable devices like smart watches, but Samsung didn’t want to wait around for Google to catch up. It was clearly concerned about beating Apple to market. So far Apple has not shown up.
Sears Holdings Corp acknowledged it has launched an investigation to determine whether it was the victim of a security breach, following Target Corp’s revelation at the end of last year that it had suffered an unprecedented cyber attack.
“There have been rumors and reports throughout the retail industry of security incidents at various retailers and we are actively reviewing our systems to determine if we have been a victim of a breach,” Sears spokesman Howard Riefs said in a statement on Friday.
“We have found no information based on our review of our systems to date indicating a breach,” he added.
He did not say when the operator of Sears department stores and Kmart discount stores had begun the investigation or provide other information about the probe.
Sears Holdings Corp operates nearly 2,500 retail stores in the United States and Canada.
Bloomberg News reported on Friday that the U.S. Secret Service was investigating a possible secret breach at Sears, citing a person familiar with the investigation. The report did not identify that source by name.
The Bloomberg report said that its source did not disclose details about the scope or timing of the suspected breach.
A spokesman for the U.S. Secret Service declined comment when Reuters asked if the agency was investigating a possible breach at Sears.
The Secret Service is leading the U.S. government’s investigation into last year’s attack on Target, which the company has said led to the theft of some 40 million payment card numbers as well as another 70 million pieces of personal data.
The company has produced the Kinetis KLO3 MCU, a 32-bit ARM system that is 15% smaller than its previous iteration but with a 10% power improvement.
Internet of Things is a buzzword for the trend toward network-connected sensors incorporated into devices that in the past were standalone appliances. These devices use sensors to capture things like temperatures in thermostats, pressure, accelerometers, gyroscopes and other types of MEMS sensors. A microcontroller unit gives intelligence and limited computational capability to these devices, but is not a general purpose processor. One of the roles of the microcontroller is to connect the data with more sophisticated computational power.
The Kinetis KLO3 runs a lightweight embedded operating system to connect the data to other devices, such as an app that uses a more general purpose processor.
Kathleen Jachimiak, product launch manager at Freescale, said the new microcontroller will “enable further miniaturization” in connected devices. This MCU is capable of having up to 32 KB of flash memory and 2 KB of RAM.
Consumers want devices that are light, small and smart. They also want to be able to store their information and send it to an application that’s either on a phone or a PC, Jachimiak said.
This microcontroller, at 1.6 x 2.0 mm, is smaller than the dimple on a golf ball, and uses a relatively new process in its manufacturing, called wafer level chip scale packaging. The process involves building the integrated package while the die is still part of a wafer. It’s a more efficient process and produces the smallest possible package, for a given die size.
Growth in global smartphone shipments will fall sharply this year and will continue to slow down through 2018, with average prices dropping significantly as demand shifts to China and other developing countries, according to market research firm IDC.
Annual growth in 2014 is expected to be 19.3 percent and then decline to 6.2 percent in 2018, IDC said in a recently released report. That follows a 39.2 percent jump in 2013 when smartphone shipments topped 1 billion units for the first time.
The forecast reinforces concerns on Wall Street that the explosion in smartphones that began with Apple’s iPhone in 2007 is coming to an end, at least in the United States and other developed countries where consumers favor pricey, top-tier handsets.
Smartphone growth in North America and Europe is expected to shrink to single digits and Japan could even see a slight slowdown in shipments in the next few years, IDC said.
Manufacturers are increasingly focusing on China where many consumers are upgrading from basic cellphones to smartphones selling for under $300.
“New markets for growth bring different rules to play by and ‘premium’ will not be a major factor in the regions driving overall market growth,” IDC analyst Ryan Reith said in a report.
The average selling price for smarpthones last year was $335, already far below flagship devices like the iPhone 5S or Samsung Galaxy S4, and will fall to $260 by 2018, IDC said.
A cybersecurity firm has stated that it has found stolen credentials from some 360 million accounts that are available for sale on cyber black markets, though it is unsure where they came from or what they can be used to access.
The discovery could represent more of a risk to consumers and companies than stolen credit card data because of the chance the sets of user names and passwords could open the door to online bank accounts, corporate networks, health records and virtually any other type of computer system.
Alex Holden, chief information security officer of Hold Security LLC, said in an interview that his firm obtained the data over the past three weeks, meaning an unprecedented amount of stolen credentials is available for sale underground.
“The sheer volume is overwhelming,” said Holden, whose firm last year helped uncover a major data breach at Adobe Systems Inc in which tens of millions of records were stolen.
Holden said he believes the 360 million records were obtained in separate attacks, including one that yielded some 105 million records, which would make it the largest single credential breaches known to date.
He said he believes the credentials were stolen in breaches that have yet to be publicly reported. The companies attacked may remain unaware until they are notified by third parties who find evidence of the hacking, he said.
“We have staff working around the clock to identify the victims,” he said.
He has not provided any information about the attacks to other cybersecurity firms or authorities but intends to alert the companies involved if his staff can identify them.
The massive trove of credentials includes user names, which are typically email addresses, and passwords that in most cases are in unencrypted text. Holden said that in contrast, the Adobe breach, which he uncovered in October 2013, yielded tens of millions of records that had encrypted passwords, which made it more difficult for hackers to use them.
The email addresses are from major providers such as AOL Inc, Google Inc, Microsoft Corp and Yahoo Inc and almost all Fortune 500 companies and nonprofit organizations. Holden said he alerted one major email provider that is a client, but he declined to identify the company, citing a nondisclosure agreement.
Heather Bearfield, who runs the cybersecurity practice for accounting firm Marcum LLP, said she had no information about the information that Hold Security uncovered but that it was plausible for hackers to obtain such a large amount of data because these breaches are on the rise.
She said hackers can do far more harm with stolen credentials than with stolen payment cards, particularly when people use the same login and password for multiple accounts.
“They can get access to your actual bank account. That is huge,” Bearfield said. “That is not necessarily recoverable funds.”
After recent payment-card data breaches, including one at U.S. retailer Target, credit card companies stressed that consumers bear little risk because they are refunded rapidly for fraud losses.
Wade Baker, a data breach investigator with Verizon Communications Inc, said that the number of attacks targeting payment cards through point-of-sales systems peaked in 2011. That was partly because banks and retailers have gotten better at identifying that type of breach and quickly moving to prevent crooks from making fraudulent transactions, he said.
In addition to the 360 million credentials, the criminals are selling some 1.25 billion email addresses, which would be of interest to spammers, Hold Security said in a statement on its website.
In what may be one of Facebook’s first failures, the social media giant said that it has begun notifying email users that the service is ending.
The service will be shut down and users’ emails will be redirected to their alternate email address by early to mid-March.
Facebook had a simple problem with its email service: Not enough people were using it. The company did not respond to a question on how many people use the email service.
“This reminds me of that old saw about a tree falling in the forest,” said Dan Olds, an analyst with The Gabriel Consulting Group. “If a tech service that no one knows about goes away, does it make a noise? In this case, not much of one, no.”
In the fall of 2010, Facebook unveiled what CEO Mark Zuckerberg called a “modern messaging system” — one that encompassed e-mail, instant messages, Facebook messages and SMS. Facebook was looking to move all of these different styles of communication under one social umbrella.
The move gave users a chance to have a facebook.com e-mail address.
Zuckerberg noted at the time that more than 4 billion messages were sent every day on Facebook, with the vast majority of them between two people. He said he started thinking about those numbers after talking with a group of high school students who told him that they rarely used e-mail.
And then come to found out, those students were part of a trend. People didn’t use the email service that Facebook developed to bring them in.
“By the time Facebook became popular, pretty much everyone had email, plus plenty of free email services available,” Olds said. “In fact, I wonder if there are more people still using @AOL.com than currently use @facebook.com.”
Zeus Kerravala, an analyst with ZK Research, said shutting down the email service is a big failure for Facebook, but it won’t hurt the company because there won’t be many disappointed users.
“If you’re not failing, it means you’re not trying hard enough,” he said, explaining that big, successful companies have to take chances.
Olds agreed that closing down email won’t hurt Facebook.
“You can’t hit home runs, or even singles, every time at bat,” said Olds. “Facebook has definitely struck out when it comes to email services, but that’s OK. It doesn’t really impact any of their other lines of business.”