Microsoft is gearing up to launch a wearable device within the next few weeks. The gadget is a smart watch that will passively track a wearer’s heart rate and work across different mobile platforms. It will also boast a battery life of more than two days of regular use, sources close to the project say.
That could put it ahead of Samsung’s Galaxy Gear smart watch and Moto 360 which both need to be charged around once a day. The wearable will hit stores soon after launch in a bid to capture the lucrative holiday season, a timeline Apple was reportedly targeting before it delayed its own Watch.Read more
Jawbone wants to become a part of the workday. The company's new service, UP for Groups, will sell discounted fitness trackers to corporate customers who buy in bulk and subscribe to a monitoring service that aggregates data from all the devices.
The target: employers who think nudging their workers toward healthier habits is worth the investment. Jawbone already has been circling the workplace market, and some companies have adopted its bracelets as a way to encourage employees to walk more. But it wasn't until this fall, with the release of Jawbone's cheapest tracking device, that there was an inexpensive option for larger orders.Read more
A secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy.
The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program.Read more
Children are crazy about PCs. However, it is important that this enthusiasm be managed properly; without something that we call “kids management,” this interest might turn into obsession and lead to early isolation characteristics with unpredictable consequences.
This obsession may cause children to react to separation from their PCs, as well as their parents’ attempts to bring them back to the real world, with uncontrollable hysterics. Kids management is a complex psychological concept where each parent chooses their own way. The ability to wisely manage ‘tablet entertainment’ is not acquired by default, but instead it is seamlessly integrated into an overall system of education.Read more
Twitter users will be alerted to a change in the type of data the social network is collecting on them, and will be offered the option to opt-out by adjusting their settings. The data in question is a list of the apps you have installed on your mobile device.
The company says it’s using the app data to help “build a more tailored experience for you on Twitter,” which includes things like improving your “who to follow” recommendations by connecting you with those who have similar interests; showing your relevant promoted content; and adding content to your timeline like tweets and accounts that Twitter thinks you’ll find interesting.Read more
Researchers said they discovered and disclosed to Apple, the vulnerability exploited by the WireLurker malware, which targeted iOS mobile devices. Some experts claim that now WireLurker is the only existing malware, which uses the bug in iOS.
Although Apple tried to annul the certificates used by the malware quickly, but the problem is that the flaw relates to an iOS enterprise provisioning failure to double check the identity of a given app against its digital certificate when the developer does not upload the application to the App Store. It gives attackers the ability to replace legitimate iOS apps with malicious ones without notification.Read more
Apple Inc was ordered to face a federal lawsuit of the USA claiming it failed to tell consumers that its messaging system would block them from receiving text messages if they switched to Android-based smartphones from iPhones.
Apple must face plaintiff's claim that the message blocking interfered with her contract with Verizon Wireless for wireless service, which she kept after switching in April to a Samsung Galaxy S5 from an iPhone 4. Plaintiff, who seeks class-action status and unspecified damages, claimed that Apple failed to disclose how its iOS 5 software operating system would obstruct the delivery of messages from other Apple device users if iPhone users switched to non-Apple devices.Read more
A new kind of malicious software strikes at Mac OS X and iPhone users in China. Apple users in China have an active, new threat to contend with that attacks iPhones and iPads through Apple's Mac OS X operating system, a US security firm reported.
The malicious software waits for a device running iOS mobile operating system to connect via USB to a Mac laptop or desktop. The software stores adds malicious code to legitimate iOS apps. The malware attack is limited to China. The threat is new to Apple, though this sort of attack has been around since about 2003, said intelligence director. Apple did not return a request for comment.Read more
FBI Director has been on a media tour lately, making an anti-encryption pitch to the public. Apple's new encryption standards are an unnecessary hurdle to law enforcement — and the FBI needs an easy way to bypass them.
Now Comey is bringing the argument straight to Congress, asking them to update a law to allow backdoors in smartphones. CALEA required telephone providers to make it possible for law enforcement to wiretap phones. Newer forms of communication aren't explicitly mentioned in the law, and Apple's new encryption standards don't leave room for any government access. Even if government officials ask for data, Apple says, the company can't comply.Read more
Hackers know how to hack a bank account with the help of MITM. About 23% percent of applications, based on Android by means of which people use banking services were hacked. Everything is a bit better with iOS, there are only 14 percent of apps.
According to the research, hackers use such attack as Man-in-the-Middle in order to steal money. Theft happens during the information transfer from the sender to the recipient. A client will be redirected to fake Wi-Fi knot. Everything will happen very quickly and unexpectedly. To achieve their insidious purposes, hackers set network equipment and create their own Wi-Fi. The difference in wireless network does not matter for you.Read more