Skip to content

Archive for

14
Nov

VW says Audi software can distort emissions during tests


No, the Volkswagen Auto Group’s emission cheating scandal isn’t done unfolding. VW has confirmed earlier reports (including one from Suddeutsche Zeitung) that Audi software can distort emissions during tests. Cars with automatic transmissions can change their shift patterns in a way that lowers carbon dioxide and nitric oxide emissions, making it appear as if the vehicles are more eco-friendly than they are during typical driving. The transmission normally adapts based solely on the driving conditions, VW says.

The admission was likely given that VW is already under intense scrutiny, and there are hints that things are only going to get worse. Bild claims that the US’ Environmental Protection Agency has already started an investigation into Audi over the software, and will talk to VW engineers about its concerns as soon as next week. VW has declined to comment on whether or not that’s happening, but it makes sense in light of the EPA’s interest in finding as many cheating mechanisms as possible. And if an additional EPA investigation wasn’t on the cards before, it’s likely to be after this public revelation.

Source: Reuters, Bild, Suddeutsche Zeitung

14
Nov

Secret’s anonymous sharing is coming back as a response to Trump


Secret’s air-your-dirty-laundry service collapsed about as quickly as it rose to prominence, but it looks like it’s poised for a comeback thanks to the new political climate. Co-creator David Byttow has vowed that “Secret V2” is on the way as an explicit answer to Donald Trump winning the US election — “it’s too important not to exist,” he says. In a chat with our friends at TechCrunch, he paints it as a way to both encourage authenticity and bridge political divides. The US can’t “heal and work together” if people aren’t comfortable being themselves and aren’t self-aware, Byttow argues. This wouldn’t be a simple matter of turning the servers back on and re-releasing the apps, though.

The developer won’t actually create the new Secret himself, to begin with. He’s currently running an enterprise startup, Bold, and would hire a new team that operates under his watch. Also, Byttow wants to be cautious this time around, avoiding the mistakes that plagued Secret in its brief original existence. He’ll consult with many other people to make sure it’s done well.

Version 2 could be a long time in coming. Byttow doesn’t have a timetable, and he won’t be leaning on venture capital to build the new app. This isn’t a profit-making endeavor, he stresses — if there are any profits, they’ll go directly to good causes. Still, the revival is good news for anyone who saw Secret as a tool for promoting free speech and healthy discussion, not just a rumor mill.

Source: TechCrunch

14
Nov

Kaspersky says Windows’ security bundle is anti-competitive


Windows 10’s bundled Defender security tool can be helpful for basic antivirus protection, but what if you prefer third-party software? The operating system normally steps aside when you run other programs, but antivirus mainstay Eugene Kaspersky (above) believes Microsoft still isn’t playing fair. He just filed complaints in both the European Union and Russia alleging that Windows 10’s handling of third-party antivirus tools is anti-competitive. The argument mostly hinges around when Microsoft switches you to Defender and the amount of breathing room given to other developers.

Kaspersky points out that Windows automatically uninstalls unsupported antivirus software when you upgrade to the new OS, regardless of your settings, and will sometimes revert to Defender even if you pass an initial check. Also, if your third-party antivirus tool is compatible, you’ll still get a warning that Defender is off with a “big juicy” button to turn it on. These wouldn’t be so bad if Microsoft gave independent developers more slack, Kaspersky argues. Third parties supposedly don’t get much lead time before new releases (just a week in one case), so they’re left scrambling to make their apps compatible. And to top it off, notices for expired antivirus software licenses are buried in Security Center notifications for three days before you get a more explicit warning. You may not realize that your preferred software is inactive until Defender automatically kicks in.

If successful, the complaints would have Microsoft clearly tell Windows users about software compatibility problems before an upgrade, preventing rude surprises with antivirus protection. Microsoft would also have to ask for your approval whenever it wants to turn on Defender, and give outside developers “good time” to address compatibility issues.

We’ve asked Microsoft for its response to Kaspersky’s issues, and we’ll let you know if it has something to say. However, Kaspersky might have a tougher time with its case than in other antitrust situations, such as when Microsoft’s rivals attacked it over browser choice. For one thing, it’s not as if Microsoft keeps Windows development completely in the dark. Ars Technica notes that the Windows Insider program gives just about anyone a peek at where Windows is going in the future, and explicitly warns you if antivirus apps aren’t compatible. Also, antivirus is more of a must-have than a nicety these days. Regulators may be hesitant to make any moves that potentially leave users unprotected, even if that’s unlikely with Kaspersky’s proposals.

Via: Ars Technica

Source: Kaspersky

14
Nov

Origem combo Bluetooth LED light bulb/speaker: A party all on its own (review)


We review quite a few accessories here at AndroidGuys and some of my favorites are the ones that are unexpectedly fun. I’ve been using a Bluetooth combo led light and speaker from a company called Origem and think it’s worth your consideration.

Let’s check out the Origem Magic Lamp.

Design

dsc06259The Origem Magic Lamp is a combination LED lightbulb and wireless speaker. It’s a bit larger than regular light bulbs, since it houses a speaker, but uses the same standard E27 threading that almost all of your bulbs use. It’s intended to be used in lamps, light fixtures or anywhere else that has a light socket.

dsc06266

The speaker sits inside of the housing with the LED light ring at the top. You don’t typically see combination products like this in big box stores such as Best Buy or Walmart which is why this review is fun for me.

Features:

  • 16M color LED lights
  • E27 Base
  • Bluetooth speaker/light combo
  • 300 Lumens
  • 7.4 x 4.9 x 4.6 inches

Usage

dsc06309

For the sake of this review, I installed the Origem Magic Lamp into my photo light fixture in my office. However, I used the Magic Lamp on my patio for the duration of this review, since San Diego pretty much has year around good weather where I can sit outside and enjoy music.

The Magic Lamp connects over Bluetooth once screwed in and powered on. You can download the iLight app at the Google Play Store for Android or the iOS App Store for Apple devices. Once paired to a smartphone or tablet over Bluetooth, you can then open the iLight app and control the light and speaker independently.

screenshot_20161113-134340

The app is very intuitive and easy to use. In the center of the app is where you will find the color wheel that allows you to change the LEDs up to 16M different colors. Or you could simply select the four preset colors at the bottom and the light will change to them. At the top is where you will find different modes for enjoying your light – Normal (solid), Rhythm which flickers to the beat of the music, Rainbow which changes the light to the light spectrum, Pulse which changes at a regular frequency and Candle which makes the light mimic a candle flickering in the wind.

dsc06287-animation
I didn’t think the light features would excite me much, but to be honest the change in light made for a great mood setter. I found myself using the light modes and different colors when I had friends over for drinks. It was quite the conversation starter, but luckily, it was too high for them to unscrew and take home since they all wanted it for themselves.

The internal speaker is surprisingly loud in the Magic Lamp. It’s certainly loud enough to hear in other rooms when played at maximum volume. When sitting under it on the patio, it can be played at 50-75% of maximum for comfortable listening. There isn’t an excess of bass with the speaker, however the mids and highs are detailed enough to make it more than acceptable to listen, to no matter the room.

At 300 lumens you shouldn’t expect it to be the brightest light in the room. While I use the Magic Lamp as a patio light, it might be best suited in a desk or night stand lamp. It provides enough white light to read a book under, or colorful mood lighting when the room is dark.

It’s a great combination of two wireless devices that helps keep things simple.

Summary

dsc06280

The Origem Magic Lamp is a fun Bluetooth speaker/LED light combo that is well worth its price tag of $29.88 at Amazon. If you separated the two you would have a solid LED light and an above average mini speaker, but combining them makes them a fun accessory.

The included app for the iLight makes the experience of using the lamp very easy and simple. It only took me about two minutes to get the light screwed in, connected and flickering all without reading the instructions. You might have difficulty locating the app since it isn’t listed in words, instead it is listed as a 2D barcode on the side. I’ll list the app links below to make things easier for you if you get the Magic Lamp, or you can simply search for iLight in the Google Play Store or iOS App Store.

It’s a fun lamp and speaker that I enjoy regularly on my patio. This will make a great gift at the reasonable price of $29.88.

Check out the Origem Magic Lamp at Amazon today.

  • Android iLight App here
  • iOS iLight App here

dsc06298

14
Nov

AdultFriendFinder hack puts 412 million accounts at risk


There have been some massive data breaches in recent years, but the latest might just top them all. LeakedSource reports that a hack targeting Friend Finder Network has exposed over 412 million accounts, most of them (339 million) belonging to sex hookup site AdultFriendFinder. Users at Cams.com (62 million), Penthouse (7 million) and a handful of smaller sites were also affected. This reportedly represents about 20 years’ worth of data, and handily eclipses the 360 million records from the MySpace breach.

The vulnerable data includes some particularly sensitive details. While it’s not as bad as a 2015 breach, where sexual preferences were in the clear, the hack has revealed usernames, purchasing patters, internet addresses and easily crackable (or in some cases, unprotected) passwords. ZDNet has verified that at least some of the accounts are real.

Friend Finder Networks hasn’t directly confirmed the intrusion, but it does acknowledge that it received reports of “potential security vulnerabilities,” some legitimate while others were extortion schemes. The company says it fixed one hole in its code and has asked for help from the “right external partners” for its investigation. Penthouse, meanwhile, says it’s aware of the hack and is just waiting for a “detailed account” of what happened and what the solutions may be.

While the chances of someone going on a shopping spree with this info are slim, there’s still plenty of risk involved. Login details can reveal identities and open the door to account hijacks, and the age of the database raises extra potential for mischief — say, blackmailing someone who may have abandoned AdultFriendFinder years ago and doesn’t want their past coming back to haunt them. Either way, Friend Finder Networks will want to beef up its user data safeguards, not just prevent hackers from reaching that data.

Via: ZDNet

Source: LeakedSource

14
Nov

Top considerations when securing your Android phone


Security-Nexus6p-keys-1.jpg?itok=RIGMcE6

Know how to use the tools your given to keep your phone and your data secure.

Google, Apple, and Microsoft have great tools for managing your online security. Some implementations may be technically better than others, but you can be reasonably sure that your data — both on the phone and in the cloud — is safe. If you need more reassurance or have different needs, third-party companies are available that with the big three to provide enterprise-grade security assurances. No method is 100% secure, and ways to get around it are found regularly; then patched quickly so the cycle can repeat. But these methods are usually complicated and very time-consuming and rarely widespread.

This means you are the weakest link in any chain of security. If you want to keep your data — or your company’s — secured you need to force someone to use these complicated time-consuming methods if they wanted to get into your phone. Secure data needs to be difficult to obtain and difficult to decipher if someone does get hold of it.With Android, there are several things you can do to make someone work really hard to get your data — hopefully so hard that they don’t bother trying.

Use a secure lock screen

lock-screen-android.jpg?itok=I5KrE89x

Having a secure lock screen is the easiest way to limit access to the data on your phone or the cloud. Whether you just left your phone on your desk while you had to walk away for a moment or two or if you’ve lost your phone or had it stolen a lock screen that can’t be simple to bypass is the best way to limit that access.

The first step is to lock the front door.

If your company issued you a phone or you work for someone with a BYOD policy there’s a good chance your phone is forced by a security policy to have password protection and your IT department may have assigned you a username and password to unlock it.

Any method that locks your phone is better than none, but generally a random six-digit PIN is enough to require someone have special knowledge and tools to bypass it without triggering any self-destruct settings. Longer randomized alpha-numeric passwords mean they will need the right tools and a lot of time. Entering a long complex password on a phone is inconvenient for you and we tend not to use things that inconvenience us so alternatives have been thought up that use patterns, pictures, voiceprints and a host of other things easier to do than typing a long password. Read the instructions and overview for each and decide which works best for you. Just make sure you’re using one.

Encryption and two-factor authentication

Encrypt all of your local data and protect your data in the cloud with two-factor authentication on your account logins.

Recent versions of Android come encrypted by default. Android 7 uses file-level encryption for faster access and granular control. Your corporate data may have another level of security to reinforce this. Don’t do anything to try and lessen it. A phone that needs to be unlocked to decrypt the data is one that only someone dedicated is going to try to crack.

Online accounts all need to use a strong password and two-factor authentication if offered. Don’t use the same password across multiple sites and use a password manager to keep track of them. A centralized spot with all your account credentials is worth risking if it means you’ll actually use good passwords.

Know what you’re tapping on

Never open a link or message from someone you don’t know. Let those people email you if they need to make the first contact, and offer them the same courtesy and use email instead of a DM or a text message to get in touch with them the first time. And never click a random web link from someone you don’t trust. I trust the Wall Street Journal’s Twitter account, so I’ll click obscured Twitter links. But I won’t for someone I don’t trust as much.

Trust is a major part of security at every level.

The reason isn’t paranoia. Malformed videos were able to cause an Android phone to freeze up and had the potential to allow elevated permissions to your file system where a script could silently install malware. A JPG or PDF file was shown to do the same on the iPhone. Both instances were quickly patched, but it’s certain that another similar exploit will be found now that the “right” people for the job know where to look. Files sent through email will have been scanned and links in the email body are easy to spot. The same can’t be said for a text message or a Facebook DM.

Only install trusted applications

BlackBerry-Priv_Unknown-sources-1.jpg?it

For most, that means Google Play. If an app or link directs you to install it from somewhere else, decline. This means you won’t need to enable the “unknown sources” setting required to install apps that didn’t originate from a Google server in the Play Store. Only installing apps from the Play Store means Google is monitoring their behavior, not you. They are better at it than we are.

If you need to install apps from another source you need to make sure you trust the source itself. Actual malware that probes and exploits the software on your phone can only happen if you approved the installation. And as soon as you’re finished installing or updating an app this way, turn the Unknown sources setting back on as a way to combat trickery and social engineering to get you to install an app manually.

None of this will make your phone 100% secure. 100% security isn’t the goal here and never is. The key is to make any data that’s valuable to someone else difficult to get. The higher the level of difficulty, the more valuable the data has to be in order to make getting it worthwhile.

Some data is more valuable that others, but all of it is worth protecting.

Pictures of my dogs or maps to the best trout streams in the Blue Ridge Mountains won’t require the same level of protection because they aren’t of value to anyone but me. Quarterly reports or customer data stored in your corporate email may be worth the trouble to get and need extra layers.

Luckily, even low-value data is easy to keep secure using the tools provided and these few tips.

14
Nov

Ben Heck’s Atari junk keyboard, part 2


The Ben Heck Show - Episode 262 - Ben Heck's Atari Junk Keyboard Part 2:   Stepped Tone Generator

We’re not so sure about Ben and Atari making beautiful music together, though the Ben Heck Show team certainly builds good circuits. Previously, they took apart a keyboard and made a manually activated switch matrix to read the piano keys. Now it’s time to take those outputs and hook them up to a 555 logic chip array to create the Atari inspired sound effects.

There’s a lot of wiring to do, so Ben and Felix split up the tasks. Ben wires up the bank of chips onto a board that will sit on top of the transistor array that Felix is wiring, with a header interfacing them. Karen meanwhile, paints and designs the casing in a retro feel befitting of the time. Ben and Felix then go to work on making additional adjustments to the board and create a totally ’80s Atari junk keyboard. What instrument would you like the team to make? Join the element14 Community to tell us about your music hacks and suggest an instrument.

14
Nov

Watch the first live-action ‘Ghost in the Shell’ trailer


Want to see how Hollywood takes on Ghost in the Shell outside of a handful of tiny video clips? You just got your chance. Paramount has released a full-length trailer for its spin on the anime/manga classic, and it’s at least interesting — if not necessarily what purists would want. It’s visually stunning, with more than a few moments that will remind you of at least the 1995 animated movie. It’s mainly the casting and unanswered questions that might leave you on the fence ahead of the movie’s March 31st, 2017 launch date.

Scarlett Johansson’s Major (Motoko Kusanagi in the anime and manga) at least pays basic tribute to the original movie’s interpretation. She’s a confident, capable cyborg, but has questions about her origins and how much humanity she really has. However, it’s hard not to see Johansson and other key Western actors (Pilou Asbaek’s version of Batou, for example) as somewhat out of place in a story that revolves heavily around a futuristic Japan. Also, how many creative liberties has the studio taken with Ghost in the Shell that we can’t see? Does it retain the spirit of the original, or is it Lucy in a different setting? If nothing else, the fact that it’s conversation-worthy at all gives us hope that this might do justice to its forebears.

Source: Paramount Pictures (YouTube)