Skip to content

Posts tagged ‘Software’

13
Jul

Microsoft is turning Windows 10’s launch into a global upgrade party


With Windows 10’s July 29 launch just a few weeks away, Microsoft is offering up more details on how it’ll celebrate the birth of its new baby. And one thing is clear: This is a far bigger deal than when Windows 8 hit the streets. Along with the usual festivities and a new marketing campaign, Microsoft is also promoting the idea of “upgrading the world” by offering consumers a bit of help with moving towards Windows 10, as well as celebrating inspirational non-profits all over the world. Microsoft stores, as well as retailers like Best Buy, Walmart and Staples, will offer in-store upgrade help and “experience stations” to let you try out Windows 10. The educational push makes sense, since Microsoft is making Windows 10 available for free to existing Windows 7 and 8 users for its first year. This time around getting people to upgrade means a lot more to Microsoft than making them pay retail price for a new OS.

As we’ve previously reported, Microsoft is making Windows 10 available to its five million beta testers first on July 29. Afterwards, there will be a staggered rollout for everyone else. That also means Windows 10 won’t be available for new computers sold on July 29, Bloomberg reports. Instead, you can either upgrade your new computer inside a store (we’ve love to see how smoothly that process goes), or get bumped ahead in the Windows 10 download queue if they want to upgrade later.

As for those non-profits, Microsoft is committing $10 million to supporting 10 global firms, as well as 100 smaller outfits in 10 countries. On top of the cash, it’s also offering help with organizing initiatives to “upgrade the world.” And of course, we’d imagine that Windows 10 will be a big part of Microsoft’s good-will initiative. Similarly, it’s giving employees an extra day off to upgrade their local communities to Windows 10 on launch day.

Filed under: Software, Microsoft

Comments

Source: Microsoft

13
Jul

Microsoft wants you to teach computers how to learn


Microsoft Research's Patrice Simard and his machine teaching project

As clever as learning computers may be, they only have as much potential as their software. What if you don’t have the know-how to program one of these smart systems yourself? That’s where Microsoft Research thinks it can help: it’s developing a machine teaching tool that will let most anyone show computers how to learn. So long as you’re knowledgeable about your field, you’d just have to plug in the right parameters. A chef could tell a computer how to create tasty recipes, for example, while a doctor could get software to sift through medical records and find data relevant to a new patient.

The technology is still young, but it’s already being used in an invitation-only beta that helps apps understand what people are saying using natural language. Ultimately, Microsoft believes that it can “democratize” machine learning. It wants you to call on artificial intelligence to solve everyday problems, not just the sort you’d find at a technology giant.

Filed under: Science, Software, Microsoft

Comments

Source: Next at Microsoft

11
Jul

Microsoft killing its Photosynth 3D panorama apps


For better or worse, tech companies have to do a bit of product housekeeping every now and then. Today’s Microsoft’s turn to do exactly that. Most notably, the Redmond company announced it will be retiring its mobile apps for Photosynth, the platform it created to let people capture and view the world in 3D. While the applications, which had been available on Windows Phone 8 and iOS, are expected to continue to work for existing downloads, they won’t be officially supported moving forward.

“We are doing this because the new Photosynth Preview technology and its cloud processing is a more immersive way to capture a place than the spherical panoramas that our apps produce,” the Photosynth team said in a blog post. Microsoft also revealed that, later this year, it plans to discontinue a few of MSN’s lifestyle mobile apps.

Filed under: Cameras, Misc, Software, Mobile, Microsoft

Comments

Via: Thurrott

Source: Photosynth

11
Jul

Calendar app Sunrise starts integrating with Office 365


Kioloa Bay Sunrise

Now that it owns Sunrise, the sleek and social calendar app, it makes sense for Microsoft to integrate it with its other productivity tools. That’s why Sunrise now plugs directly into Office 365 on iOS, Android and the desktop, giving you access to all of your scheduled events under a single calendar. Microsoft says the added compatibility will help down the road as well, since there’s more flexibility to test features that’ll make Sunrise work better with Office 365 applications. If you use Exchange, however, the Sunrise support is only for iOS and Android at the moment, and there’s no word on whether that’s expected to change anytime soon. Either way, this is great news for those of you who rely on these services.

[Image credit: ~Prescott/Flickr]

Filed under: Internet, Software, Mobile, Microsoft

Comments

Source: Sunrise

11
Jul

Amazon’s Fling is its version of AirPlay and Google Cast


If you’ve been hoping for an AirPlay or Cast-like tool to beam content to your Amazon streaming gadgets, you’ll soon be in luck. The company revealed its Fling feature this week, a tool that will allow developers to include a way to control media from a mobile device on your Fire TV. Right now, the software will let you send video, audio and still images from an Android or iOS device to the set-top box (or dongle, we’d surmise) for viewing. Devs can also employ “two-way communication” between the Fire TV and a phone or tablet to “engaging second screen experiences.”

The company released an SDK so eager app makers can get started, and Karaoke Party and Rivet Radio are among the first selections to employ the tech. Rather than building the tool into it’s OS like Apple and Google, Amazon is allowing app developers to add in Fling as they wish. Amazon’s mobile devices run a version Google’s operating system after all, and some folks who own its streaming gear probably also own an iOS or Android device. That being said, it’ll be interesting to see if the likes of Netflix, Hulu and others will decide to opt in.

Filed under: Home Entertainment, Software, HD, Mobile, Amazon

Comments

Via: CNET

Source: Amazon

10
Jul

New performance update comes to Verizon’s LG G3


LG_G3_Back_Slanted_LG_Logo_TA

When the Android 5.0 Lollipop update came to Verizon’s variant of the LG G3 in late March it brought an enhanced experience with a plethora of new features and Material Design. Along with that came a lot of problems such as bugs, frequent battery drain and a loss in performance. Ever since then, Verizon’s G3 owners have been posting away in the carrier’s forums pleading for an update to fix these bugs. Now it’s July, and Verizon has finally pushed out an update to help resolve these issues and add some new useful tools.

As with almost all software updates, patience is required here. You can check for the update but that really won’t force it upon the device. In any case, look for update version VS98524B or “24B” to appear in the coming days.

The software update brings changes to Bluetooth, interruptions, and advanced calling tweaks in addition to major bug and performance issues.

Source: Verizon

Come comment on this article: New performance update comes to Verizon’s LG G3

10
Jul

Android M Developer Preview 2 is now available for Nexus 5, 6, 9 and Player




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

At Google I/O 2015, Google unveiled that their next version of Android would predictably be called Android M and gave an early look at operating system with the Android M Developer Preview. It’s now time for that Preview to get update with improvements that have been made thanks to feedback from the community. Intuitively dubbed the Android M Developer Preview 2, the latest update is available on all the devices the Developer Preview was (i.e. Nexus 5, 6, 9 and Player). As for the changes made in this update, Google says that:

“The update includes a variety of enhancements and bug fixes made across the system, including those related to issues reported by developers through the external issue tracker.”

Of course, being a Preview, there are still known issues that haven’t been stamped out yet, most notably that you can’t share YouTube videos from within the app, among other things. But overall, it’s been reported that the Developer Preview has been relatively stable as a daily driver, all things considered – just don’t expect everything to be hunky dory just yet.


As for getting the update, if you’re currently already using the first Developer Preview, you should be getting an OTA update for Preview 2 anytime now. If you’re just joining the Developer Preview bandwagon now, Google says to flash the Preview to your device and wait a few hours while your device subscribes to OTA updates. For more info, check out the Preview notes on the Android website.

Android – Developer Preview 2

Have any of you been updated to the new Preview yet? Let us know your thoughts on it in the comments below.

Source: Android via Phandroid

The post Android M Developer Preview 2 is now available for Nexus 5, 6, 9 and Player appeared first on AndroidSPIN.

10
Jul

Blackberry and Google join forces in partnership to make business data secure




<ins class="adsbygoogle"
style=”display:block”
data-ad-client=”ca-pub-8150504804865896″
data-ad-slot=”8461248232″
data-ad-format=”auto”>

(adsbygoogle = window.adsbygoogle || []).push();

Blackberry is name that has been heard on the grapevine quite a lot the last few weeks, due to a rumoured Android-powered Blackberry handset that is supposedly currently in development. Interestingly, Blackberry has made the news again today, but for a decidedly different reason – Blackberry and Google have officially joined forces to make Android devices business secure, marrying Google’s Android Lollipop and Blackberry’s BES12. As Blackberry puts it:

“New features are now available through Android and BES12 that enable organizations to further secure enterprise and personal data on Android devices, set new levels of hardware based encryption, and ensure tight integration with Google Play for Work, for increased application management, while delivering a consistent end-user and management experience across their Android fleet.”


This is the move that Blackberry needed to make considering that they are struggling in hardware sales, and partnering their prowess in corporate data security with the world’s most common smartphone operating system is exactly what the doctor ordered. We do wonder whether Google had already inked this deal when Android for Work was released earlier this year, but there’s no point speculating now. Hopefully this is the real start of Android’s uptake in the corporate world, so we’ll have to see if this partnership has any legs.

What do you think about Blackberry and Google teaming up? Let us know your thoughts in the comments below.

Source: Blackberry via Phone Arena

The post Blackberry and Google join forces in partnership to make business data secure appeared first on AndroidSPIN.

10
Jul

How spyware peddler Hacking Team was publicly dismantled


Early Monday morning, around 400GB of stolen internal company files belonging to Italian surveillance and intrusion software firm Hacking Team were distributed online through its freshly hacked Twitter account (changed to “Hacked Team”).

They were hacked by a hacker, or hackers. It was hackenfreude.

And because Hacking Team — a Reporters Without Borders “enemy of the internet” — was so universally reviled by infosec professionals for their dealings with despotic governments (among other things), it became a group effort. Hackers around the world dug into the illicit files and all but completely dismantled Hacking Team’s business, and reputation.

Global security research communities tore into the docs in waves around the clock; hackers created a GitHub repository named “Hacked Team (Hacking Team) We Kill People[TM].” The docs showed Hacking Team’s operational security to be abysmal, its code to be inelegant and childlike and its email communications revealed a petty, arrogant and extremely sloppy organization that actively endeavored to avoid scrutiny about the human rights abuses of its clients.

All of this happened while Hacking Team was asleep, prompting the Twitter hashtag #IsHackingTeamAwakeYet, to which infosec professionals appended the most egregious examples of Hacking Team’s foibles and lawlessness.

This included the sharing of leaked email evidence that the company sold its Remote Control System (RCS) spyware to Sudan, a country the company publicly denied selling to when in the spotlight of a UN commission regarding Sudanese sanctions. Sudan is “not officially supported” — which we can surmise to be a PR failsafe; the country’s National Intelligence Security Service received its last service from Hacking Team in December 2014.

That very month, Human Rights Watch published “Sudan: Soldiers, Militias Killing, Raping Civilians” highlighting the country’s situation. “Entire communities are trapped in camp-like conditions behind government lines, terrorized by government forces,” said Daniel Bekele, Africa director at Human Rights Watch. “In addition to indiscriminate bombing, Sudanese government forces are getting away with abusive and illegal tactics under a guise of counterinsurgency, including rape, arbitrary detentions and killings.”

Hacking Team clients by country

canada brazil british...

The Hacking Team dump contains:

Who are Hacking Team’s clients? Australia, Azerbaijan, Chile, Colombia, Cyprus, Czech Republic, Ecuador, Egypt, Ethiopia, Honduras, Hungary, Iraqi Kurdistan, Kazakhstan, Luxembourg, Malaysia, Mexico, Mongolia, Morocco, Nigeria, Oman, Poland, Panama, Russia, Saudi Arabia, Singapore, South Korea, Spain, Sudan, Syria, Thailand, Tunisia, Turkey, United Arab Emirates, United States, Uzbekistan.

Countries not on the maintenance list that were discovered to be active with Hacking Team’s services and products include France, Ireland, the UK and Switzerland.

Eventually, Hacking Team woke up — to be greeted by an online sea of memes and mockery, and its entire business dealings smeared across the internet.

Senior System and Security Engineer Christian Pozzi took to Twitter in a frantic fury saying it was all lies, that the dump’s file had a virus (it didn’t) and mentioned law enforcement. He threatened a Twitter user with jail for making fun of Hacking Team’s astonishingly amateur password practices. There was also an unsuccessful (and un-denied) attempt to DDoS some of those hosting the torrent file — only resulting in more sharing, of course.

Pozzi’s Twitter account was swiftly hacked, and subsequently removed. Hours later, Hacking Team sent out an email blast — not from its own email accounts, which were allegedly still compromised — telling its clients to stop using its software immediately.

So, who did this?

Among the most notorious companies in the “government hacks for sale” category are Italy’s Hacking Team, VUPEN (France) and the British-German Gamma Group, also known as FinFisher. Almost a year ago to the month, FinFisher was popped and served to the internet on a platter — very much in the same way as Hacking Team. When online persona PhineasFisher hacked and exposed Gamma Group in August 2014, they posted the spoils to Reddit and in a parody @GammaGroupPR Twitter account. The Reddit post said, “Two years ago their software was found being widely used by governments in the Middle East, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents.”

PhineasFisher described how Gamma Group “had denied having anything to do with it, saying they only sell their hacking tools to ‘good’ governments. … I have hard proof they knew they were selling (and still are) to people using their software to attack Bahraini activists, along with a whole lot of other stuff in that 40GB.”

The @GammaGroupPR account resurrected itself Monday to take credit for the Hacking Team hack — and to poke at the company as it flails through its biggest-ever PR crisis.

Paper files at a UK hospital

The first haul, of Gamma Group’s internal files, was only 40GB — literally a tenth of what PhineasFisher was able to exfiltrate from Hacking Team (400GB).

PhineasFisher wrote in Hack Back: A DIY Guide for those without the patience to wait for whistleblowers that they originally planned to obtain a copy of the FinSpy software, hack FinSpy’s C&C (command and control) servers, alert all the targets to the spying while uninstalling FinFisher and use the former C&C servers to DDoS Gamma Group.

PhineasFisher explained, “It was only after failing to fully hack Gamma and ending up with some
interesting documents but no copy of the FinSpy server software that I had to make do with the far less lulzy backup plan of leaking their stuff while mocking them on Twitter.”

As to why PhineasFisher freely distributes the stolen data, they wrote last year about the Gamma dump:

“I’m unconvinced that news stories about government’s surveillance capabilities are actually effective in fighting those systems of control. Listening to stories all day about how we’re all being hacked and spied on just feels disempowering. When everyone can participate it’s more empowering, more fun, and far more effective. … I want everyone having access to the data, not just the headlines!”

Say what you will about the ethics of PhineasFisher and Hack Back. It’s in PhineasFisher’s results that things start to get… sickening.

And important.

A revenue stream based on war crimes

Uzbekistan Massacre Forgotten

What Hacking Team sold, trained users on and maintained for over 20 countries expressly facilitated the ability of despotic regimes to discover, track, surveil and act upon the people those governments sought to suppress, or worse.

One example of a current — and typical — Hacking Team client is Uzbekistan. According to leaked documents, Hacking Team’s account with Uzbekistan’s National Security Service is active. “Uzbekistan’s human rights record is atrocious,” Human Rights Watch said. “Thousands are imprisoned on politically-motivated charges. Torture is endemic in the criminal justice system.”

Last month, Uzbek police detained human rights activist Elena Urlaeva. Uzbek authorities have frequently subjected her to abuse, including beatings, forced psychiatric treatment, arbitrary detention, house arrest and fines for peaceful protests. At her last detention, she was drugged, interrogated for 18 hours and subjected to what can only be described as an abusive body cavity search.

Hacking Team also targets individuals on behalf of its clients.

We’ve learned from the docs that Hacking Team also targets individuals on behalf of its clients. One leaked email shows Ethiopia’s Biniam Tewolde contacting Hacking Team over its (successful) help in getting an unnamed “high value target.”

Hacking Team also targeted other hackers, like security researcher, The Intercept journalist, First Look Media director of security and former Google employee Morgan Marquis-Boire. Among the leaked Hacking Team files, Marquis-Boire discovered a surveillance photo of himself presenting at the Milan Tech and Law Center on February 1st. He described that presentation, For Their Eyes Only: The Changing Face of Online Spying to Engadget as, “a talk on the use of surveillance malware during the Arab Spring and the implications of the sale of such technology to repressive regimes.”

Marquis-Boire told Engadget, “I was not aware that Hacking Team was secretly recording me. It’s certainly unsettling to be surreptitiously recorded by a surveillance vendor with a record of being implicated in human rights abuses.”

Ethiopia’s Information Network Security Agency (INSA) was employing Hacking Team to target Marquis-Boire, likely over his tracking of the company’s malware for Citizen Lab and at Google’s anti-malware team — one which culminated in a particularly bad PR moment for Ethiopia.

The Citizen Lab research in question found Ethiopia’s INSA using Hacking Team’s malware to target journalists; Ethiopian authorities use arbitrary arrests to silence journalists, and detainees routinely allege torture and ill treatment. The Ethiopian government’s spokesperson in Washington vehemently denied the use of products provided by Hacking Team.

Yet PhineasFisher’s haul shows Hacking Team not only provided its products to Ethiopia, but also proposed a new contract with Ethiopia because, according to a leaked email from operations chief Daniele Milan, “700K is a relevant sum.”

Incidentally, Marquis-Boire’s former employer, Google, also appeared in a transaction with Hacking Team, in the form of selling its SDK, according to documents seen by Engadget. While innocuous enough — the mapping engine is sold like any product — it’s uncomfortable to note that while Google’s anti-malware team was working to track Hacking Team’s malware, Google’s marketing team was selling the spyware company its mapping services.

No one was immune to the stain of Hacking Team; the doc dump holds the names of some of the world’s biggest tech companies. Documents show Hacking Team to have held an iOS Enterprise Developer Cert, apparently offering among its suite of tools a fake iOS Newsstand backdoor app.

The release of its documentation will help to stop the types of attacks enacted by Hacking Team; Adobe has already issued a patch for one of the vulnerabilities Hacking Team relied on.

It’s not just companies being pulled into Hacking Team’s implosion. The client list and ancillary financials show an Italian company to be doing business with sanctioned countries, with revenue streams directly derived from sales to despotic regimes. In fact, the docs show that all the countries Hacking Team denied doing business with were its customers.

A good number of security researchers find what Hacking Team was doing to be so reprehensible that they’re tearing apart everything they find — though, not without humor.

Hacking Team was doing business with sanctioned countries, with revenue streams directly derived from sales to despotic regimes.

The GitHub repository “The Italian Job” shows one researcher using Shodan to locate HackingTeam C&C servers, “Only releasing the fingerprints because they are burned to the fucking ground now.”

A member of the European Parliament has called for an investigation into Hacking Team’s actions; the European Commission has six weeks to respond.

In its press statement Wednesday, Hacking Team maintains that it was a responsible gatekeeper for its products, and that the world is at risk now that Hacking Team no longer controls its surveillance tools. Hacking Team also implied that companies (like Adobe) are patching against Hacking Team’s exploits for the sole reason that its exploits have suddenly fallen into “criminal” hands.

As Rome burns, Hacking Team’s representatives are keen on spinning to press that the hack on their systems is why its company is righteous in its mission; that the hack and dump is the “kind of activity that is a threat to everybody who uses the internet.”

But based on what we’re learning, it’s looking more like Hacking Team’s activity is the real threat to everybody who uses the internet.

Filed under: ,

Comments

10
Jul

Google uses AI to rid your Gmail inbox of more spam


Spam is always annoying, but it can occasionally be disastrous. Google has now deployed its artificial neural network to stop more of it from arriving in your Gmail inbox, something it hinted at earlier. It’s designed to “detect and block the especially sneaky spam — the kind that could actually pass for wanted mail,” according to the company. The system also uses machine learning to track your usage patterns and figure out if you want certain kinds of mail, like newsletters or promos. Most critically, Google said that Gmail is now better at catching impersonation — when emails appear to be from a known contact, but were sent by someone who is definitely not your friend.

Google is also working the other side of the spam equation with its new Postmaster Tools, aimed at high-volume senders. Qualified companies who meet Google’s reputation requirement will get access to services that show how Gmail handles their emails. For instance, a company that sends out tons of legitimate mail — like order or flight confirmations — will see how often users mark it as spam. They can then tweak it so that customers treat it more seriously. From an end-user perspective, Google said the new tools will make it less likely you’ll need to go “dumpster diving” in spam to find important messages.

Filed under: , ,

Comments

Source: Google