Skip to content

Archive for

3
Nov

Android’s November security update now available for Nexus devices


nexus 6p review aa (6 of 12)

Google has just released the November security patch for most of its Nexus devices as part of its Android Security Bulletin Monthly Release procedure. New factory images have already been posted on the company’s Google Developer website. Google says its partners were notified about the issues taken care of with this security patch on October 5th, and that source code patches will be released to AOSP over the next 48 hours.

This new patch takes care of seven security vulnerabilities, two of which are marked as critical. Google says that the most severe of these issues patched is a vulnerability that could “enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files.” Although there are currently no reports on any of the vulnerabilities being exploited at the moment, it’s still great news to hear Google has done a swift job at releasing a security patch before things got out of hand.


android 6.0 marshmallowDon’t miss: Android 6.0 Marshmallow updates roundup – October 29, 201546

If you’re interested in downloading the new factory images for yourself, head to the Google Developers link below to get started. Or if you don’t mind waiting, the update should be rolling out to your Nexus device over the next few days. Oh, and if you’re unsure as to how you’d go about flashing a factory image, feel free to check out our guide.

You might also like

.rvs_wrapper
width: 350px;

.rvs_wrapper.align_left
float: left;

.rvs_wrapper.align_right
float: right;

.rvs_wrapper.align_center,
.rvs_wrapper.align_none
width: 100%;

.rvs_wrapper.align_center
text-align: center;

.rvs_wrapper.align_center.cbc-latest-videos ul li
float: none;
display: inline-block;
vertical-align: top;

.rvs_wrapper.cbc-latest-videos:not(.align_none) ul li:nth-child(2n+1)
clear: both;

.rvs_title
font-weight: 600 !important;
margin: 0 !important;
font-size: 24px !important;

.rvs_wrapper.align_right .rvs_title
padding-left: 20px;

.rvs_title a
font-family: ‘Roboto Condensed’;
color: #3a3a3a;

.rvs_wrapper.cbc-latest-videos ul
padding-top: 10px;

.rvs_wrapper.align_left.cbc-latest-videos ul li,
.rvs_wrapper.align_none.cbc-latest-videos ul li
padding: 0 15px 0 0;

.rvs_wrapper.align_right.cbc-latest-videos ul li
padding: 0 0 0 15px;
float: right;

.rvs_wrapper.align_center.cbc-latest-videos ul li
padding: 0 7px;

.rvs_wrapper.cbc-latest-videos ul li > a
font-weight: 400;

.rvs_wrapper.cbc-latest-videos ul li > a .yt-thumbnail
margin-bottom: 0;

@media only screen and (min-width : 480px)
body #page .rvs_wrapper.cbc-latest-videos ul
width: 100% !important;

@media only screen and (max-width : 480px)
body #page .rvs_wrapper.cbc-latest-videos
width: 100%;
float: none !important;
overflow-x: auto;
overflow-y: hidden;

body #page .rvs_wrapper.cbc-latest-videos ul
overflow: auto;
max-height: none;

body .rvs_wrapper.cbc-latest-videos ul li
float: left !important;
clear: none !important;

3
Nov

Play video game emulators on your Android Wear watch


Nintendo 64 on Android WearSomeone has found a way to play video game emulators on Android Wear! Although the screen may be super small, and the buttons even smaller, it’s still cool that it can be done.

YouTuber Hacking Jules has posted a video on his YouTube channel that clearly shows him playing Super Mario 64 and The Legend of Zelda: Ocarina of Time. He is using an LG G Watch and the games seem to be running relatively smooth on it.

Click here to view the embedded video.

I didn’t think Android Wear would be able to run a full game console emulation, but I would be wrong. Not only can he run Nintendo 64, but he also has PSP, Nintendo DS, Game Boy Advance and even Windows 7 emulators. You can see the videos for those too on his channel.

Unfortunately, you can’t download any of these emulators right now. However, hopefully Hacking Jules keeps working on them and releases them for all to use in the future.

Source: Hacking Jules
Via: MobileSyrup

Come comment on this article: Play video game emulators on your Android Wear watch

3
Nov

Browser-Based iOS 9.1/9.2 Jailbreak Wins $1M Bounty, Will Be Sold for Corporate and Government Use


remotejailbreakEarlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars to hackers who managed to develop a browser-based untethered jailbreak for iOS 9, which it could then sell to clients interested in shelling out a lot of money to gain illicit access to iOS devices.

The contest expired at the end of October, and Zerodium today announced one hacking team had successfully created a browser-based jailbreak for iOS 9.1 and iOS 9.2, the latest versions of iOS 9, earning $1 million.

Zerodium foundar Chaouki Bekrar told Wired that the exploit developed by the hackers will be given to its customers, which include major technology, finance, and defense corporations, along with government agencies. The contest rules required the exploit to be achievable remotely without requiring user interaction beyond reading a text message or visiting a website via Chrome or Safari on an iOS device.

Bekrar confirmed that Zerodium plans to reveal the technical details of the technique to its customers, whom the company has described as “major corporations in defense, technology, and finance” seeking zero-day attack protection as well as “government organizations in need of specific and tailored cybersecurity capabilities.”

Because it’s selling the jailbreak (“likely” to U.S. customers only), Zerodium does not plan to report the vulnerabilities in the operating system to Apple, though Bekrar says the company may share the details at a later date. The jailbreak also won’t be provided to the general public, but Bekrar says Zerodium announced the results of the contest to remind people that while iOS security is “very hardened,” it’s not unbreakable.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.
Discuss this article in our forums

3
Nov

Possible Upcoming Mac Pro Reference Discovered in OS X El Capitan


It’s been two years since Apple launched its radically redesigned Mac Pro, but the professional-level workstation has not seen any updates since that time despite the availability of upgraded versions of many of the components used in the machine. We may be getting closer to an update, however, as Pike’s Universum has discovered a reference to a new Mac code name of “AAPLJ951” within OS X El Capitan.

The identity of the Mac corresponding to that code name is not explicitly revealed in OS X, but Pike points to the similar AAPLJ90 code name for the current Mac Pro as a reason to believe this new machine is a Mac Pro.

aaplj951

The data is identical to that of the late 2015 (iMac17,1 in the same file) so it may as well be a remnant of the new iMac, but the strange thing is that the XHCI data for the late 2015 iMac is also there, which is why I believe that this is not/was not added for the/a new iMac but another Mac.

And like I said earlier in the comments, there are too many USB 3 ports defined to fit on a MacBook (Pro) and Mac Mini. This and the fact that there is already support for newer graphics chips [baked] into El Capitan… is why I think that it was added for a new Mac Pro. I personally sure hope so.

Looking toward possible specs for the next Mac Pro, it seems likely it will run on Xeon-branded Broadwell EP chips and include significantly faster graphics based on AMD’s Fury platform, along with faster memory and storage and perhaps Thunderbolt 3 connectivity involving a partial shift to USB-C connectivity.

Related Roundup: Mac Pro
Tag: AAPLJ951
Buyer’s Guide: Mac Pro (Don’t Buy)

Discuss this article in our forums

3
Nov

Bunk Baidu SDK puts backdoor on millions of Android devices


CHINA-BAIDU-UBER-INTERNET-TRANSPORT

A software development kit created by Baidu, China’s Google, has reportedly opened more than 100 million Android devices to malicious hackers. Baidu’s Moplus SDK may not be available to the public but it’s already made its way into more than 14,000 Android apps — only 4,000 of which Baidu actually created. The SDK allows its apps to open an unsecured and unauthenticated HTTP server connection.

Via: PCWorld

Source: Trend Micro

3
Nov

Pentagon launches cybersecurity exchange to combat hackers


The Department of Defense is taking a number of steps to up its cybersecurity game, Terry Halvorsen, the Pentagon’s Chief Information Officer recently told a reporters breakfast hosted by The Christian Science Monitor. “There’s not a time when I’m not being attacked somewhere in the world,” Halvorsen said. “We’re looking to industry to help us solve some specific areas.” To that end, the DoD has begun assigning its civilian personnel to 6-month tours of private cybersecurity companies, such as Cisco, as well as inviting employees from those firms to help train its personnel to defend the DoD’s networks against hacks.

Via: Bloomberg

Source: DoD

2
Nov

Google confirms Chrome OS will stick around, but will bring tighter Android integration


chrome_os_launcher_google_now_cardsThere were rumours that Google would merge Chrome OS and Android into one. Google has now said they do not plan on going that far, but will bring them closer together.

If you just bought a Chromebook, do not worry, Google has “no plans to phase out Chrome OS”. You will still receive updates and support for them in the future.

Google is very much committed to Chrome OS. Chrome OS is a big part of classrooms, offices and homes with 30,000 new Chromebooks activated in U.S. classrooms everyday.

In fact, every school day, 30,000 new Chromebooks are activated in U.S. classrooms—that’s more than all other education devices combined.

Google also just introduced the very affordable $149 Chromebook and the $85 Asus Chromebit that turns any display into a computer. Something they probably wouldn’t of done if they planned on getting rid of Chrome OS.

However, Google will be adding more Android integration to Chrome OS. Also, they will be bringing new features like a new media player and refreshing the look with Material Design.

We have plans to release even more features for Chrome OS, such as a new media player, a visual refresh based on Material Design, improved performance, and of course, a continued focus on security.

Source: Google

Come comment on this article: Google confirms Chrome OS will stick around, but will bring tighter Android integration

2
Nov

Pump Alarm’s Verizon network certified monitoring device is now available in 96 Home Depot stores


verizon new logoPump Alarm’s Verizon network certified monitoring device is now available in 96 Home Depot stores in Indiana, Michigan, Kentucky, and Ohio. This cellular alarm will allow property owners to monitor sump pumps, low temperatures, and power outages. It does this by sending alerts via text message to the owner’s mobile device.

Tom Ward, CEO of PumpAlarm.com said:

“Pump Alarm offers a great opportunity for homeowners to keep their homes safe in a simple and convenient way through a mobile device,” “Cellular is key to residential applications and a cost-effective choice for homeowners.”

American Housing Survey of the United States said “nearly 43 percent of U.S. homes have basements where sump pumps are installed”. Indiana has been hit hard with rain and flooding which has caused tons of damage recently. However, Pump Alarm’s built-in wireless capability bypasses power outages and immediately gives homeowners a notification when something goes wrong.

Press Release:

INDIANAPOLIS, Nov. 2, 2015 /PRNewswire/ — PumpAlarm.com, an Indiana-based company, and Verizon, a technology leader with the nation’s largest and most reliable 4G LTE Network, announced today thatPumpAlarm.com, with its Verizon network certified monitoring devices, is now available in 96 Home Depot stores in Indiana, Michigan, Kentucky, and Ohio. The Verizon powered, cellular alarm allows property owners the ability to remotely monitor sump pumps, low temperatures, and power outages with alerts via text message to their mobile device.

“Pump Alarm offers a great opportunity for homeowners to keep their homes safe in a simple and convenient way through a mobile device,” said Tom Ward, CEO of PumpAlarm.com. “Cellular is key to residential applications and a cost-effective choice for homeowners.”

“Pump Alarm is a great innovation in home monitoring and designed with a reliable cellular network to keep properties safe from the kind of harm that can be caused by disastrous event, including the unprecedented flooding that has occurred in Indiana,” said Aimee Novak, Director of Strategic Sales for Verizon inIndiana.

PumpAlarm.com is a partner in Verizon’s Innovation Program, which is designed to help innovators leverage platform technology, state-of-the-art labs and expert know-how to bring ideas to life. The program is a way to accelerate the development of machine-to-machine and wireless technology innovations, ensuring we use our knowledge, expertise and connections to continue to lead the way around the Internet of Things, which is projected to involve over 5.4 billion connected devices by 2020. The device, made in Indianapolis, Ind., went through Verizon’s rigorous certification process at Intertek.

According to the most recent data from the American Housing Survey of the United States, nearly 43 percent of U.S. homes have basements where sump pumps are installed. Indiana has been particularly hard hit by rain and flooding this season that’s caused considerable property damage. The product’s built-in wireless capability bypasses power outages giving homeowners an immediate notification when the power goes out and when it returns.

About PumpAlarm.com
PumpAlarm.com is a cellular, Machine-to-Machine (M2M), technology leader located in Indianapolis, Indiana.  We provide a better way to monitor high and low water, power failure and low temperature.  Our easy-to-use solutions help prevent property damage in the form of basement floods, appliance leaks, furnace failures, and systems reliant on electrical power.  PumpAlarm.com has thousands of units installed across the USA with products available for purchase at pumpalarm.com, in retail, and through select resellers nationwide.   For more information, contact sales@pumpalarm.com, or visit www.pumpalarm.com. For the latest news and updates about Pumpalarm.com, visit us on Facebook at facebook.com/pumpalarm or follow us on Twitter at @pumpalarm.com.

About Verizon Wireless
Verizon Wireless operates the nation’s largest and most reliable 4G LTE network. As the largest wireless company in the U.S., Verizon Wireless serves 110.8 million retail connections, including 105 million retail postpaid customers. Verizon Wireless is wholly owned by Verizon Communications Inc. (NYSE, Nasdaq: VZ). For more information, visit www.verizonwireless.com. For the latest news and updates about Verizon Wireless, visit our News Center at http://www.verizonwireless.com/news or follow us on Twitter at @VerizonNews.

SOURCE Verizon Wireless

Come comment on this article: Pump Alarm’s Verizon network certified monitoring device is now available in 96 Home Depot stores

2
Nov

EPA discovers defeat device in more VW TDI engines


US-GERMANY-AUTOMOBILE-VOLKSWAGEN

In a sternly worded letter, the United States Environmental Protection Agency has issued a new set of allegations against Volkswagen claiming that so-called emissions defeat software has been found in the company’s 3.0-liter TDI V6 diesel engines. This is a completely different engine than the 2.0 TDI that has already been identified as an emissions cheater. In addition to VW, the EPA has included Audi and Porsche in this notification, as the non-compliant engine has been used in vehicles from all three manufacturers from model years 2014 through 2016.

Source: Autoblog

2
Nov

Anonymous says it’s outing 1,000 prominent KKK members (updated)


APTOPIX Mideast Lebanon Corruption

Anonymous is no stranger to risky internet activism, and its latest campaign is no exception to the rule. The hacking-focused collective claims that it’s outing “up to” 1,000 people who are either Ku Klux Klan members or “close associates” of KKK factions. It says it’ll reveal all on November 5th, but an early data leak already purports to name-and-shame mayors, members of Congress and police officers (including cops in Ferguson, Missouri). If true, the details would potentially wreck more than a few careers — especially those of people who use roundabout methods to support the Klan while keeping their racist connections a secret.

Via: Urban Intellectuals

Source: Anonymous Intelligence Group