Skip to content

Archive for

10
Jul

Splendor is Days of Wonder’s latest board game to make the digital jump




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

Back in 2014, Days of Wonder, creator of popular board games Ticket to Ride and Small World, released a new board game called Splendor. The game has since been a critical success, so much so that Days of Wonder decided to bring a digital version of Splendor to Android and iOS. That version released today and is available on the Play Store for the tidy sum of $6.99 USD.

SplendorFor your hard earned cash, you will get access to a resource collection card game that will see you scrabbling for scarcely available resources to build up your prestige points – enough prestige will see you get a visit from nobility, further boosting your prestige count, with the winner being the first one to reach 15 prestige points. While that doesn’t sound like much, Splendor is a surprisingly intensely strategic game for 2 to 4 players, one that is befitting of Days of Wonder’s pedigree – stay tuned for our full review of the game in the coming days.


If Splendor sounds like the type of game you want to get your hands on, hit the Play Store link below:

What do you think about Splendor? Let us know your thoughts in the comments below.

The post Splendor is Days of Wonder’s latest board game to make the digital jump appeared first on AndroidSPIN.

10
Jul

Blackberry and Google join forces in partnership to make business data secure




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

Blackberry is name that has been heard on the grapevine quite a lot the last few weeks, due to a rumoured Android-powered Blackberry handset that is supposedly currently in development. Interestingly, Blackberry has made the news again today, but for a decidedly different reason – Blackberry and Google have officially joined forces to make Android devices business secure, marrying Google’s Android Lollipop and Blackberry’s BES12. As Blackberry puts it:

“New features are now available through Android and BES12 that enable organizations to further secure enterprise and personal data on Android devices, set new levels of hardware based encryption, and ensure tight integration with Google Play for Work, for increased application management, while delivering a consistent end-user and management experience across their Android fleet.”


This is the move that Blackberry needed to make considering that they are struggling in hardware sales, and partnering their prowess in corporate data security with the world’s most common smartphone operating system is exactly what the doctor ordered. We do wonder whether Google had already inked this deal when Android for Work was released earlier this year, but there’s no point speculating now. Hopefully this is the real start of Android’s uptake in the corporate world, so we’ll have to see if this partnership has any legs.

What do you think about Blackberry and Google teaming up? Let us know your thoughts in the comments below.

Source: Blackberry via Phone Arena

The post Blackberry and Google join forces in partnership to make business data secure appeared first on AndroidSPIN.

10
Jul

WSJ says Samsung will announce Samsung Galaxy Note 5 a few weeks early to combat iPhones




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

A lot has been made of the competitiveness between Samsung and Apple, however it looks like this year could be reaching a fever pitch. For as long as the Galaxy Note family of Samsung devices has existed, they have been announced at IFA in September, and it was expected that the Samsung Galaxy Note 5 would continue this tradition. This is usually followed by an Apple announcement just a week later, and this year’s Apple announcement is expected to be an iPhone 6S. According to WSJ, Samsung is about to change up its game plan and announce the Galaxy Note 5 a few weeks earlier than IFA, as early as mid-August, to give it a few extra weeks’ grace before Apple’s device is announced.

This has a number of benefits for the Korean manufacturer, namely being able to actually physically release their device around the same time as the new iPhone as well as helping to stabilize their sales performance which has been less than stellar despite the critical success of its Galaxy S6 and Galaxy S6 Edge. If Samsung hadn’t changed up so many things this year, I would have dismissed this story like all the others, but it’s been reported so many times lately that it can’t be just a coincidence.


Do you think Samsung is going to announce the Samsung Galaxy Note 5 early? Let us know your thoughts in the comments below.

Source: WSJ via The Verge

 

The post WSJ says Samsung will announce Samsung Galaxy Note 5 a few weeks early to combat iPhones appeared first on AndroidSPIN.

10
Jul

OnePlus 2 to be smaller than OnePlus One, have 3,300mAh battery and will still use an invite system




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

Being a smaller, young company, OnePlus is actually relatively well suited to holding a Reddit AMA, so that’s exactly what they did today, fielding questions about their upcoming smartphone, the OnePlus 2 (yes, it’s definitely spelt with a “2” and not a “Two”). From the AMA, we’ve learn that the OnePlus 2 is going to be smaller than their first smartphone, the OnePlus One – the above image was provided with the comment “I can only tell you that under this OnePlus One there is a OnePlus 2″. Whether that means the screen size has actually decreased or that the bezels are thinner remains to be seen.

The AMA also revealed that the OnePlus 2 is going to have a 3,300mAh battery, and is going to be sold through an “improved” invite system. We’ll reserve judgement until we see how this newer invite system fares in the device’s first few weeks, but the invite system to sell the OnePlus One probably made the device harder to get than expected. OnePlus also teased earlier this week that the OnePlus 2 will have 4GB RAM, but later clarified that some regions will have a 3GB RAM variant too.


What do you think about the OnePlus 2? Let us know your thoughts in the comments below.

Source: Reddit via TalkAndroid

The post OnePlus 2 to be smaller than OnePlus One, have 3,300mAh battery and will still use an invite system appeared first on AndroidSPIN.

10
Jul

Hackers stole 21.5 million Social Security Numbers in government breach


Last month, the US Office of Personnel Management (OPM) learned it was the victim of a massive cyberattack — a breach that compromised personnel data of 4.2 million current and former federal employees. That’s really bad. While investigating the incident, the OPM found evidence of another attack: one that compromises the privacy of 21.5 million individuals from the organization’s background check database. That’s a lot worse.

According to The New York Times, the two attacks are separate, but related — though this second attack is obviously much bigger. In fact, if you’ve had a background check run through the OPM any time in the last 15 years, you’re probably personally affected: The agency says any background investigation that occurred after 2000 is highly likely to be compromised. Potentially compromised data can include the Social Security Numbers, fingerprints (for 1.1 million of the aforementioned total), data from interviews conducted by background investigators and usernames and passwords used by applicants who filled out background check paperwork.

It’s bad, and the OPM know it is — but the agency is trying to mitigate the situation. The organization’s cybersecurity page has been updated with a list of steps you can take to protect your identity, including warnings signs of identify theft, tips to update your passwords and avoid phishing scams and what to do if you think you might be a victim. If you are affected by the hack, the OPM is willing to help — victims will be automatically be enrolled in 18 months of identity theft insurance, an identity-restoration program and credit-monitoring programs.

Think you might be affected? Check out the source link below.

[Image Credit: AP Photo/Cliff Owen]

Filed under: ,

Comments

Source: OPM, New York Times

10
Jul

How spyware peddler Hacking Team was publicly dismantled


Early Monday morning, around 400GB of stolen internal company files belonging to Italian surveillance and intrusion software firm Hacking Team were distributed online through its freshly hacked Twitter account (changed to “Hacked Team”).

They were hacked by a hacker, or hackers. It was hackenfreude.

And because Hacking Team — a Reporters Without Borders “enemy of the internet” — was so universally reviled by infosec professionals for their dealings with despotic governments (among other things), it became a group effort. Hackers around the world dug into the illicit files and all but completely dismantled Hacking Team’s business, and reputation.

Global security research communities tore into the docs in waves around the clock; hackers created a GitHub repository named “Hacked Team (Hacking Team) We Kill People[TM].” The docs showed Hacking Team’s operational security to be abysmal, its code to be inelegant and childlike and its email communications revealed a petty, arrogant and extremely sloppy organization that actively endeavored to avoid scrutiny about the human rights abuses of its clients.

All of this happened while Hacking Team was asleep, prompting the Twitter hashtag #IsHackingTeamAwakeYet, to which infosec professionals appended the most egregious examples of Hacking Team’s foibles and lawlessness.

This included the sharing of leaked email evidence that the company sold its Remote Control System (RCS) spyware to Sudan, a country the company publicly denied selling to when in the spotlight of a UN commission regarding Sudanese sanctions. Sudan is “not officially supported” — which we can surmise to be a PR failsafe; the country’s National Intelligence Security Service received its last service from Hacking Team in December 2014.

That very month, Human Rights Watch published “Sudan: Soldiers, Militias Killing, Raping Civilians” highlighting the country’s situation. “Entire communities are trapped in camp-like conditions behind government lines, terrorized by government forces,” said Daniel Bekele, Africa director at Human Rights Watch. “In addition to indiscriminate bombing, Sudanese government forces are getting away with abusive and illegal tactics under a guise of counterinsurgency, including rape, arbitrary detentions and killings.”

Hacking Team clients by country

canada brazil british...

The Hacking Team dump contains:

Who are Hacking Team’s clients? Australia, Azerbaijan, Chile, Colombia, Cyprus, Czech Republic, Ecuador, Egypt, Ethiopia, Honduras, Hungary, Iraqi Kurdistan, Kazakhstan, Luxembourg, Malaysia, Mexico, Mongolia, Morocco, Nigeria, Oman, Poland, Panama, Russia, Saudi Arabia, Singapore, South Korea, Spain, Sudan, Syria, Thailand, Tunisia, Turkey, United Arab Emirates, United States, Uzbekistan.

Countries not on the maintenance list that were discovered to be active with Hacking Team’s services and products include France, Ireland, the UK and Switzerland.

Eventually, Hacking Team woke up — to be greeted by an online sea of memes and mockery, and its entire business dealings smeared across the internet.

Senior System and Security Engineer Christian Pozzi took to Twitter in a frantic fury saying it was all lies, that the dump’s file had a virus (it didn’t) and mentioned law enforcement. He threatened a Twitter user with jail for making fun of Hacking Team’s astonishingly amateur password practices. There was also an unsuccessful (and un-denied) attempt to DDoS some of those hosting the torrent file — only resulting in more sharing, of course.

Pozzi’s Twitter account was swiftly hacked, and subsequently removed. Hours later, Hacking Team sent out an email blast — not from its own email accounts, which were allegedly still compromised — telling its clients to stop using its software immediately.

So, who did this?

Among the most notorious companies in the “government hacks for sale” category are Italy’s Hacking Team, VUPEN (France) and the British-German Gamma Group, also known as FinFisher. Almost a year ago to the month, FinFisher was popped and served to the internet on a platter — very much in the same way as Hacking Team. When online persona PhineasFisher hacked and exposed Gamma Group in August 2014, they posted the spoils to Reddit and in a parody @GammaGroupPR Twitter account. The Reddit post said, “Two years ago their software was found being widely used by governments in the Middle East, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents.”

PhineasFisher described how Gamma Group “had denied having anything to do with it, saying they only sell their hacking tools to ‘good’ governments. … I have hard proof they knew they were selling (and still are) to people using their software to attack Bahraini activists, along with a whole lot of other stuff in that 40GB.”

The @GammaGroupPR account resurrected itself Monday to take credit for the Hacking Team hack — and to poke at the company as it flails through its biggest-ever PR crisis.

Paper files at a UK hospital

The first haul, of Gamma Group’s internal files, was only 40GB — literally a tenth of what PhineasFisher was able to exfiltrate from Hacking Team (400GB).

PhineasFisher wrote in Hack Back: A DIY Guide for those without the patience to wait for whistleblowers that they originally planned to obtain a copy of the FinSpy software, hack FinSpy’s C&C (command and control) servers, alert all the targets to the spying while uninstalling FinFisher and use the former C&C servers to DDoS Gamma Group.

PhineasFisher explained, “It was only after failing to fully hack Gamma and ending up with some
interesting documents but no copy of the FinSpy server software that I had to make do with the far less lulzy backup plan of leaking their stuff while mocking them on Twitter.”

As to why PhineasFisher freely distributes the stolen data, they wrote last year about the Gamma dump:

“I’m unconvinced that news stories about government’s surveillance capabilities are actually effective in fighting those systems of control. Listening to stories all day about how we’re all being hacked and spied on just feels disempowering. When everyone can participate it’s more empowering, more fun, and far more effective. … I want everyone having access to the data, not just the headlines!”

Say what you will about the ethics of PhineasFisher and Hack Back. It’s in PhineasFisher’s results that things start to get… sickening.

And important.

A revenue stream based on war crimes

Uzbekistan Massacre Forgotten

What Hacking Team sold, trained users on and maintained for over 20 countries expressly facilitated the ability of despotic regimes to discover, track, surveil and act upon the people those governments sought to suppress, or worse.

One example of a current — and typical — Hacking Team client is Uzbekistan. According to leaked documents, Hacking Team’s account with Uzbekistan’s National Security Service is active. “Uzbekistan’s human rights record is atrocious,” Human Rights Watch said. “Thousands are imprisoned on politically-motivated charges. Torture is endemic in the criminal justice system.”

Last month, Uzbek police detained human rights activist Elena Urlaeva. Uzbek authorities have frequently subjected her to abuse, including beatings, forced psychiatric treatment, arbitrary detention, house arrest and fines for peaceful protests. At her last detention, she was drugged, interrogated for 18 hours and subjected to what can only be described as an abusive body cavity search.

Hacking Team also targets individuals on behalf of its clients.

We’ve learned from the docs that Hacking Team also targets individuals on behalf of its clients. One leaked email shows Ethiopia’s Biniam Tewolde contacting Hacking Team over its (successful) help in getting an unnamed “high value target.”

Hacking Team also targeted other hackers, like security researcher, The Intercept journalist, First Look Media director of security and former Google employee Morgan Marquis-Boire. Among the leaked Hacking Team files, Marquis-Boire discovered a surveillance photo of himself presenting at the Milan Tech and Law Center on February 1st. He described that presentation, For Their Eyes Only: The Changing Face of Online Spying to Engadget as, “a talk on the use of surveillance malware during the Arab Spring and the implications of the sale of such technology to repressive regimes.”

Marquis-Boire told Engadget, “I was not aware that Hacking Team was secretly recording me. It’s certainly unsettling to be surreptitiously recorded by a surveillance vendor with a record of being implicated in human rights abuses.”

Ethiopia’s Information Network Security Agency (INSA) was employing Hacking Team to target Marquis-Boire, likely over his tracking of the company’s malware for Citizen Lab and at Google’s anti-malware team — one which culminated in a particularly bad PR moment for Ethiopia.

The Citizen Lab research in question found Ethiopia’s INSA using Hacking Team’s malware to target journalists; Ethiopian authorities use arbitrary arrests to silence journalists, and detainees routinely allege torture and ill treatment. The Ethiopian government’s spokesperson in Washington vehemently denied the use of products provided by Hacking Team.

Yet PhineasFisher’s haul shows Hacking Team not only provided its products to Ethiopia, but also proposed a new contract with Ethiopia because, according to a leaked email from operations chief Daniele Milan, “700K is a relevant sum.”

Incidentally, Marquis-Boire’s former employer, Google, also appeared in a transaction with Hacking Team, in the form of selling its SDK, according to documents seen by Engadget. While innocuous enough — the mapping engine is sold like any product — it’s uncomfortable to note that while Google’s anti-malware team was working to track Hacking Team’s malware, Google’s marketing team was selling the spyware company its mapping services.

No one was immune to the stain of Hacking Team; the doc dump holds the names of some of the world’s biggest tech companies. Documents show Hacking Team to have held an iOS Enterprise Developer Cert, apparently offering among its suite of tools a fake iOS Newsstand backdoor app.

The release of its documentation will help to stop the types of attacks enacted by Hacking Team; Adobe has already issued a patch for one of the vulnerabilities Hacking Team relied on.

It’s not just companies being pulled into Hacking Team’s implosion. The client list and ancillary financials show an Italian company to be doing business with sanctioned countries, with revenue streams directly derived from sales to despotic regimes. In fact, the docs show that all the countries Hacking Team denied doing business with were its customers.

A good number of security researchers find what Hacking Team was doing to be so reprehensible that they’re tearing apart everything they find — though, not without humor.

Hacking Team was doing business with sanctioned countries, with revenue streams directly derived from sales to despotic regimes.

The GitHub repository “The Italian Job” shows one researcher using Shodan to locate HackingTeam C&C servers, “Only releasing the fingerprints because they are burned to the fucking ground now.”

A member of the European Parliament has called for an investigation into Hacking Team’s actions; the European Commission has six weeks to respond.

In its press statement Wednesday, Hacking Team maintains that it was a responsible gatekeeper for its products, and that the world is at risk now that Hacking Team no longer controls its surveillance tools. Hacking Team also implied that companies (like Adobe) are patching against Hacking Team’s exploits for the sole reason that its exploits have suddenly fallen into “criminal” hands.

As Rome burns, Hacking Team’s representatives are keen on spinning to press that the hack on their systems is why its company is righteous in its mission; that the hack and dump is the “kind of activity that is a threat to everybody who uses the internet.”

But based on what we’re learning, it’s looking more like Hacking Team’s activity is the real threat to everybody who uses the internet.

Filed under: ,

Comments

10
Jul

Join us next week for #EngadgetLive Boston!


In just about one week, you can join your fellow gadget enthusiasts in Boston for our very first Engadget Live event of 2015! If you plan to be in town on Friday, July 17th at 7pm, grab your FREE ticket and join your fellow gadget enthusiasts at the Royale Nightclub at 279 Tremont Street in downtown Boston.

We’re also excited to announce that all of our Engadget Live events (including Los Angeles on August 21st and Austin on October 16th), will now be fueled by Ford and its SYNC 3 system!

SYNC 3 adds the next generation of voice-activated technology, with an easier to use design and fresh interface. If you come out to Engadget Live, you’ll get to sit inside a 2016 Ford Escape and experience the new SYNC 3 system in the car or in standalone screens set up around the venue.

You’ll also get to drink fabulously thanks to Drizly; try vaporized spirits from Vapshot; get hands-on with Lenovo’s slick hardware and check out Boosted Boards’ Dual+ electric skateboard. Be sure to get your free ticket on Eventbrite and RSVP on our Facebook Events page and when you’re at the event, share your pictures with the #EngadgetLive hashtag on Instagram and Twitter. We’ll see you there!

Filed under: ,

Comments

10
Jul

Become a mechanical centaur with this wild drill-walker


The best part about the Segway craze is that it’s now over. It’s time for a ballin’ new form of personal transportation like whatever the heck this thing is. Created by fabricator Izzy Swan, this machine is a strange mix of Segway and AT-ST. It uses a cordless 20V drill and homebrew gearbox for propulsion. The leg motion was reportedly inspired by was inspired by Theo Jansen’s Strandbeest. What’s more, it can reportedly hold up to 370 pounds though, according to Swan, “You should see this thing get down and boogie with just one of the kids on it. It moves pretty quick.”

Filed under: ,

Comments

Via: Boing Boing

Source: Makezine

10
Jul

The $200 ‘Mirror’s Edge Catalyst’ bundle might be worth it


Note the operative word, “might,” in that headline. It’s difficult to quantify a bundle of egregiously nerdy items, but for those with Faith in their hearts, the Mirror’s Edge Catalyst Collector’s Edition looks like a real treat. For $200, the Collector’s Edition comes with a 14 inch statue featuring Faith as an adult and as a child, sitting shoulder-to-shoulder with a pane of glass between them, plus 10 concept-art prints, a limited-edition lithograph and steelbook case, two temporary tattoos and a box to house it all. This package will be available in limited quantities at “select retailers” for PlayStation 4, Xbox One and PC versions of Mirror’s Edge Catalyst, and of course the full game is due to launch on February 23rd.

Filed under: ,

Comments

Source: Mirror’s Edge

10
Jul

‘The Talos Principle: Road to Ghenna’ promises more robotic philosophy


Haunting. Creative. Beautiful. Intelligent–these are the words we used to describe The Talos Principle and its narrative-driven first-person puzzles. It’s a charming, well-written game that gently convinces the player to question the very nature of consciousness. If you liked it, you’re about to get more of it–Croteam and Devolver Digital recently announced The Talos Principle: Road to Gehenna, the game’s first episodic expansion pack.

Gehnna promises to guide players into new, unseen areas of Uriel’s simulation–introducing new characters, in a new society with loads of history and philosophical challenges. It sounds creepy and intriguing, exactly what you’d want after playing the original game.

The expansion will be available on Steam on July 23rd–but pricing isn’t clear. “The original plan was to divide The Talos Principle: Road to Gehenna into over 100 different $5 DLCs,” teases the game’s official press release in the guise of Devolver Digital’s fictional CFO, Fork Parker. “But the Devolver Digital DLC Ethics Department advised against it. That particular department has subsequently been disbanded.” Good, I guess?

Filed under:

Comments

Source: Croteam