Internet.org turns one year old this week, and Facebook says it’s ready to scale the project to reach more people.
The company is making it easier for more mobile operators to join the project by launching an online portal where they’ll find technical tools and best practices to help them get started.
So far, Facebook has been working with about a dozen operators in 17 countries to provide an app that gives people free access to a set of basic Internet services.
According to Facebook, people who use the app quickly become paying subscribers — something that will no doubt appeal to the mobile operators it’s trying to partner with.
“Internet.org brings new users onto mobile networks on average over 50 percent faster after launching free basic services, and more than half of the people who come online through Internet.org are paying for data and accessing the Internet within the first 30 days,” Facebook said.
The Internet.org mobile app is perhaps the most tangible element in Facebook’s efforts to expand Internet access — and its own services — to more people throughout the world. It’s also using satellites, drones and lasers that can beam Internet signals through space to bring people online.
While the number of people with Internet access continues to grow, 4.2 billion of the world’s roughly 7.4 billion people will still be offline by the end of the year, according to data from the International Telecommunication Union.
The Internet.org app typically includes a stripped-down version of Facebook and access to other free services like weather reports, health information and services for finding jobs.
CEO Mark Zuckerberg has said Facebook could become the Internet on-ramp for the world.
The technology involves smartphones broadcasting data over a short-range radio channel to nearby cars, so the cars can determine if a collision is likely. Unlike today’s radar-based systems, this has the ability to warn around blind corners and can alert both the driver and pedestrian.
It’s being developed by engineers at Honda and was demonstrated last week at the company’s new research and development center in Mountain View, Calif., the heart of Silicon Valley.
In the demonstration that took place in a parking lot, a car was slowly cruising a row looking for a space. Ahead, and unseen to the driver, a pedestrian was walking between a car and SUV while listening to music, and was about to step into the path of the oncoming vehicle.
Seconds before the pedestrian could emerge and the two come close to collision, an alert sounded in the car: “Distracted pedestrian” and a warning appeared on the car’s LCD screen to brake. The pedestrian too got a similar alert, telling him to watch out. If the driver hadn’t hit the brakes, the car would have automatically come to a halt.
Honda has been working on the technology for three years and the first iteration is expected to be submitted for standardization around the end of this year, said Sue Bai, a principal engineer at Honda R&D, who has been developing it.
he communication takes place over a channel in the 5.9GHz band that is dedicated for intelligent transportation systems. That’s a frequency not used in current smartphones, but close enough that Qualcomm engineers were able to come up with a firmware modification so that it works on an off-the-shelf handset. No custom hardware is required in the phone.
The SE370 monitor will come in 23.6-inch and 27-inch formats and is the industry’s first to have an integrated wireless charging station, the South Korean manufacturer said Monday.
But your phone will have to support the Qi wireless charging standard, which was developed by the Wireless Power Consortium (WPC) and is supported by makers such as Samsung, Sony, LG, HTC and Huawei.
The charging area is on the stand for the monitor, and an LED lights up when it’s in use. The monitor has a 1920 x 1080 resolution and is optimized for video games, with richer black hues when it’s in game mode. The screen will not distort graphics with stutter and lag and has a response time of 4 milliseconds, Samsung said.
Compatible with Mac OS X and Windows 10, the SE370 also has an eye-saver mode that reduces blue light, which is believed to cause eye strain and sleep problems.
Samsung did not provide information about pricing or availability for the SE370 monitor and did not immediately respond to a request for more information.
The company’s Galaxy S6 and GS6 edge flagship smartphones support the Qi and rival Power Matters Alliance (PMA) standards for wireless charging. Earlier this year, Samsung released its own branded charging pad to juice them up.
The latest Qi specification, announced last month, will allow manufacturers to provide much faster wireless power charging options than earlier versions.
The platform has also caught on with makers such as Ikea, which launched a collection of furniture in April with built-in Qi-enabled wireless chargers.
Qi had been competing with PMA and the Alliance for Wireless Power (A4WP). Following a decision earlier this year, however, the two organizations announced their merger in June, with a new name yet to be decided.
It is possible that one day we will report on which companies made it through the night without being hacked or without exposing their users.
For now, though, the opposite is the norm and today we are reporting about a problem with gaming system Steam that, you guessed it, has dangled the personal details of punters within the reach of ne’er-do-wells.
The news is not coming out of Steam, or parent Valve, directly, but it is running rampant across social networks and the gaming community. The problem, according to reports and videos, was a bad one and made the overtaking of user accounts rather a simple job.
No badass end-of-level boss to beat here, just a stage in the authentication process. A video posted online demonstrates the efforts required, while some reports – with access to Steam’s PR hot air machine – say that the problem is fixed.
A statement released to gaming almanac Kotaku finds the firm in apologetic clean-up mode.
Steam told the paper that some users would have their passwords reset, those being the ones who might have seen their log-in changed under suspicious circumstances, and that in general users should already be protected from the risks at hand.
“To protect users, we are resetting passwords on accounts with suspicious password changes during that period or may have otherwise been affected,” the firm said.
“Relevant users will receive an email with a new password. Once that email is received, it is recommended that users log-in to their account via the Steam client and set a new password.
“Please note that, while an account password was potentially modified during this period, the password itself was not revealed. Also, if Steam Guard was enabled, the account was protected from unauthorized log-ins even if the password was modified.”
The firm added its apologies to the community.
Police in Beijing have raided a factory that made more than 41,000 fake iPhones worth as much as 120 million yuan ($19 million), including some that reached the United States, and have arrested nine suspects in the counterfeiting operation.
Apple is one of the most popular brands in China, where authorities have stepped up efforts in recent years to dispel the country’s reputation for turning out counterfeit goods.
Officials have taken stiffer action to enforce intellectual property (IP) rights, pushed firms to apply for trademarks and patents and cracked down on fakes.
Police arrested nine people, including a married couple who led the operation, after a raid in May on the factory, run under the guise of a gadget maintenance shop on the northern outskirts of the Chinese capital.
The details were revealed in a social media posting on Sunday by the public security bureau in Beijing.
The group, headed by a 43-year old man, surnamed Yu, and his 40-year old wife, surnamed Xie, both from the southern hardware manufacturing city of Shenzhen, allegedly set up the Beijing factory with six assembly lines in January, the bureau said.
They hired “hundreds” of workers to repackage second-hand smartphone components as iPhones for export, it added.
Police seized 1,400 handsets and large quantities of accessories during the May 14 raid. In the United States, the newest Apple Inc handsets can fetch $649, or more, depending on the model.
Beijing police said their investigation followed a tip-off from U.S. authorities who seized some of the fake devices.
The destination of the counterfeit phones, and how many made it there, remains unknown.
Public security representatives declined to comment on Monday, telling Reuters they had no additional information.
Apple also declined to comment, saying the investigation was ongoing.
The software genii at Apple have redesigned their OSX software to allow malware makers to make designer micro-software that can infect Macs with rootkits.
Obviously the feature is one that Apple software experts designed specifically for malware writers, perhaps seeing them as an untapped market.
The bug in the latest version of Apple’s OS X allows attackers root user privileges with a micro code which could be packed into a message.
Security researcher Stefan Esser said that this was the security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.
The OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Plainly the software genii did not believe that standard safeguards involving additions to the OS X dynamic linker dyld applied to them because they were protected from harm by Steve Job’s ghost.
This means that attackers to open or create files with root privileges that can reside anywhere in the OS X file system.
“This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem. And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege-escalation,” Esser said.
The vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability.
An Apple spokesman said that engineers are aware of Esser’s post of course they did not say they would do anything about it. They will have to go through the extensional crisis involved in realising that their product was not secure or perfect. Then the security team will have to issue orders, signed in triplicate, sent in, sent back, queried, lost, found, subjected to an internal inquiry, lost again, and finally bury it in soft peat for three months and recycled as firelighters.
The promotion launched later this year than in the past: In 2014, for example, Apple started its back-to-school campaign July 1.
Buyers who purchase a qualifying Mac between now and Sept. 18 receive a $199.95 credit toward a a pair of Beats Solo2 On-Ear Headphones, which list for that amount. Alternately, the credit can be applied to a pair of Beats Solo2 Wireless On-Ear Headphones, which run $299.95, making the out-of-pocket expense $100.
The promotion launches today in Apple’s retail stores and participating authorized on-campus stores but won’t appear on the company’s e-store until Aug. 6.
9to5Mac.com first reported on the promotion earlier today.
This year’s back-to-school promotion gives parents of college students and incoming freshmen, and teachers and staff members of all grade levels — including K-12 — the credit when they buy a new iMac, Mac Pro, MacBook, MacBook Pro or MacBook Air. Unlike years past, iPads and iPhones do not qualify.
For the last four years, Apple has handed out gift cards and maxed the amount of the offer at $100. Before that, a more generous Apple gave rebates of up to $300 toward the purchase of an iPod Touch.
Educational discounts on the hardware also apply. MacBooks and MacBook Airs are reduced by $50 for parents of students and for faculty and staff. The discounts on other products are $100 on MacBook Pros, $100 to $200 on Retina 5K iMacs, $50 to $100 on iMacs, and $200 to $300 on Mac Pros.
The flaws could potentially be exploited to execute malicious code on computers when users visit compromised websites or open specially crafted documents. They were reported through Hewlett-Packard’s Zero Day Initiative (ZDI) program.
HP’s TippingPoint division, which sells network security products, pays researchers for information on unpatched high-risk vulnerabilities in popular software. The company uses the information to create detection signatures, giving it a competitive advantage, but also reports the flaws to the affected vendors so they can be fixed.
The ZDI team gives vendors 120 days to develop fixes before making limited information about the flaws reported to the public. That deadline was apparently reached for the four Internet Explorer vulnerabilities this week.
The ZDI advisories describe the type, impact and general location of the flaws, but intentionally leave out technical details that could help attackers create exploits for them. In other words, they don’t classify as full disclosure.
Three of the new ZDI advisories don’t have sufficient information for other researchers or hackers to easily rediscover the issues, said Carsten Eiram, the chief research officer at vulnerability intelligence firm Risk Based Security, via email. The fourth one, however, is a bit more detailed, he said.
That advisory, tracked as ZDI-15-359, covers a vulnerability that was used by security researcher Nicolas Joly during the Mobile Pwn2Own hacking contest organized by ZDI in November last year. As part of the contest rules, researchers disclose the vulnerabilities they use with ZDI, which then shares them with the affected vendors.
Microsoft said in an emailed statement that it would take “appropriate steps” to protect its customers, but noted that no attacks had been reported so far.
Named Send, the new tool aims to deliver a simple experience much like that offered by text messaging or instant messaging software but without the need to know a co-worker’s mobile number or username. Instead, Send lets users quickly fire off a message to any co-worker using just their email address; no subject line, salutations or signatures are required.
“On my way,” might be one example, or “Are you in the office today?”
The app connects to Office 365 business and school email accounts to find frequent and recent contacts; users need only tap on one to start a conversation. A “Quick Reply” option allows for speedy responses.
That Office 365 connection, meanwhile, also means conversations are synced with Outlook, letting users continue them from anywhere. Messages sent using Send are treated internally like any other work email and comply with an organization’s email compliance policies, Microsoft said.
Send is now available free for iPhone through the Microsoft Garage in the U.S. and Canada. Versions for Windows Phone and Android are coming soon, as are additional IT controls. Currently the app works with Office 365 business and school email accounts, but Microsoft plans to make it more broadly available in the coming months, it said.
The case involves the chairman of the Airport Board in Kenton, Kentucky, which oversees the Cincinnati/Northern Kentucky International Airport. The chairman, James Huff, was on a business trip in Italy with his wife and a colleague when he accidentally pocket-dialed the secretary of the airport’s CEO back in the U.S.
The secretary, Carol Spaw, said “hello” a few times and soon figured out the call wasn’t meant for her. But she overheard Huff and his colleague talking about personnel matters, including the possibility that the airport’s CEO — Spaw’s boss — might be replaced. The inadvertent call continued after Huff got back to his hotel room with his wife.
The call lasted 91 minutes and Spaw stayed on the line the entire time, court records show. Spaw claims that she thought Huff was discussing a plan to illegally discriminate against the CEO, a woman. She says she felt obliged to record the call and report it.
Spaw took handwritten notes for most of the call, but managed to record the last four minutes after a colleague brought her an iPhone. By that time, Huff was back in his hotel room, where he discussed personal matters with his wife Bertha but also shared some details of the personnel discussion from earlier.
Huff and his wife sued Spaw, alleging she had breached their privacy by violating a law often called the Wiretap Act, which prohibits interception of “wire, oral or electronic communications.”
However, the catch is that the law applies only where people can show they had a reasonable expectation of privacy. And that’s not case with pocket-dialed calls, the appeals court ruled, upholding in part a lower court’s decision.
Citing case law, the Sixth Circuit Court of Appeals said people must “exhibit” that they have an expectation of privacy, by taking reasonable steps to ensure their conversation won’t be overheard.
Microsoft has begun to open source some more of its code, this time for the Microsoft Research Software Radio (Sora).
“We believe that a fully open source Sora will better support the research community for more scientific innovation,” said Kun Tan, a senior researcher on the Sora project team.
Sora was created to combat the problem of creating software radio that could keep up with the hardware developments going on around it.
The idea behind it is to run the radio off software on a multi-core PC running a basic operating system. In the example, it uses Windows. But then it would.
A PCIe radio control board is added to the machine with signals processed by the software for transmission and reception, while the RF front-end, with its own memory, interfaces with other devices.
The architecture also supports parallel processing by distributing processing pipelines to multiple cores exclusively for real-time SDR tasks.
Sora has already won a number of awards, and the Sora SDK and API were released in 2011 for academic users. More than 50 institutions now use it for research or courses.
As such, and in line with the groovy open Microsoft ethos, the software has now been completely open sourced, with customizable RF front-ends, customizable RCB with timing control and synchronization, processing accelerators and support for new communication models such as duplex radios.
The Sora source code is now up on GitHub. Use cases already in place include TV whitespace, large scale MIMO and distributed MIMO systems.
Microsoft has made a number of moves towards open sourcing itself over the past year. Most notably, The .NET Framework at the heart of most Windows programs was offered up to the newly created .NET Foundation.
It was announced yesterday that Google is releasing its Kubernetes code to the Linux Foundation to set up a standardized format for containerization.
HP has released a study suggesting that anyone who uses a smartwatch is offering their wrist to vagabonds, criminals and privacy probers.
Blam! HP ain’t messing. “You got a smartwatch?” it says. “Then damn, son, you are in trouble!”*
A report apparently straight outta HP finds that the smartwatch lets us all down by not doing encryption right, not considering privacy and using second rate authentication.
In the current threat market, this would be a pretty much a full house of problems and pretty bad form on the part of providers like Apple.
Security firm Bitdefender has wrapped itself around the study, and describes the threat as “extreme” in its reporting of the HP smartwatch horror story.
The INQUIRER has not been able to find the report, but it has found mention of it. We shall turn to what we can while our inquiries hang in PR purgatory.
ESET has its own report on the study and offers advice on securing wearable technology, including smartwatches, on its website.
The security firm quotes from the report, saying that HP security personnel are fretting about increased adoption and the rising tide of threats.
“Smartwatches have only started to become a part of our lives, but they deliver a new level of functionality and we will increasingly use them for sensitive tasks,” Jyoti Prakash, country director for India and south Asia at HP Enterprise Security Products, is quoted as saying.
“As this activity accelerates, the watch platform will become vastly more attractive to those who would abuse that access, and it’s critical that we take precautions when transmitting personal sensitive data or bringing smartwatches into the workplace.”
The best practice if a zombie has bitten your arm and infected you with a virus, for example, would be to chop it off. Your arm, that is.
Here, we suggest that perhaps you consider what you share, where you share it and what you share it on as your best response.
The company’s online promotions in advance of the launch featured a mysterious high-end Android device. The marketing scheme paid off, according to Adam Zeng, CEO of ZTE’s mobile devices business, sparking media interest. It even caused some to wonder if the product was Korean-made, since Chinese brands have a low-end image to U.S. consumers, according to Zeng.
ZTE was happy to clear up any preconceived notions. “Chinese brands can also come out with top-tier products,” Zeng maintained.
The Axon is a premium handset that the company claims can rival flagship phones from Apple, Samsung and LG.
It is scheduled to go on sale in the U.S. in early August, and is already available for pre-order, with a no-contract price of $449. That’s about $200 less than an iPhone 6 when bought without carrier subsidies. But consumers are still getting the latest in smartphone technology.
For the Axon, this includes a 2560 by 1440 screen, an eight-core Qualcomm Snapdragon 810 processor, 4GB of RAM, all fitted in a sleek metal case with leather on the back cover.
Zeng noted that it took ZTE 18 months to develop the product. The company wanted to make sure it had everything, such as the ability to shoot 4K video, and a rear-facing camera with dual lenses.
ZTE kept pushing the phone’s launch date back to include more features, Zeng said. It also tapped talent from North America, hiring Seattle-based design firm Teague and former BlackBerry employees to help build the product.
ZTE has been expanding in the U.S., although competition remains stiff. In this year’s first quarter, it was ranked as the U.S.’s sixth largest smartphone vendor, with a 4.5 percent market share, according to research firm IDC. Industry leaders Apple and Samsung, on the other hand, have a combined market share of 62 percent.
BlackBerry Ltd announced that it will acquire privately-held AtHoc, a provider of secure, networked crisis communications, as it moves to broaden its software offering and generate revenue from its BBM messaging service.
San Mateo, California-based AtHoc’s services are used by a number of top clients including the U.S. Department of Defense, Homeland Security and a host of blue-chip companies, to provide software that seamlessly allows them to reach staff via their smartphones, or via digital displays, radios, and even sirens, in times of crisis. Its services help organizations and people share information during business continuity and rescue efforts.
The terms of the transaction, which is expected to close by November, were not disclosed.
“AtHoc is an alerts system, but it also needs richer content and that can be provided by BlackBerry Messenger (BBM), which offers not just text, but voice, picture and video sharing, so we can provide a much richer experience to their clients,” said BlackBerry Chief Executive John Chen in an interview.
The deal is the latest in a string of acquisitions made by the smartphone pioneer, as it pivots to focus more on software and turn around its faded fortunes.
Earlier this year, Chen said he saw a part of the company’s targeted software revenue growth in the current fiscal year coming from acquisitions of companies that will allow it to sell more value-added services.
In April, Waterloo, Ontario-based BlackBerry announced plans to acquire privately-held software maker WatchDox, which secures files. Its services are used by some of the world’s top federal agencies, private equity firms, and a slew of Hollywood studios.
This followed last year’s buyout of Secusmart, a German firm that specializes in voice and data encryption and British tech start-up Movirtu, whose software allows users to have two phone numbers on the same device with a single SIM card.
“AtHoc, with its messaging alerts, is the next piece in the puzzle,” said Chen, noting that the firm has some large marquee clients that compliment BlackBerry’s own customer base.
The acquisitions made so far have helped BlackBerry ramp up its portfolio of services that cater to the needs of its core base of clients, such as corporations and government agencies.
Google will begin closing down the service on Aug. 1 on Android, with the Web and iOS devices to follow soon after.
For a time, Google touted the service as a key element in Google+, with a range of editing tools and image enhancement technologies rolled out over the years.
But Google hinted that its days might be numbered when the company rolled out its new Google Photos service at Google I/O in May.
The closure of Google+ Photos is likely to prompt more questions about the future of Google+, which has struggled to rival the success of Facebook.
Photos and videos stored in Google+ Photos will be moved to Google Photos. People who don’t want to use the new service can download their images using Google Takeout, the company said.
Google Photos provides free, unlimited photo and video storage in Google’s cloud, along with tools to organize the media.