Low-price Hisense and TCL sets with Roku’s brains built in may have the best shot yet at moving smart TVs from niche shopping consideration to popular norm.
Mr. Ballmer, fresh off his $2 billion purchase of the Los Angeles Clippers basketball franchise, indicated that his duties as team owner, among other interests, wouldn’t leave enough time to stay on Microsoft’s board.
“I think it would be impractical for me to continue to serve on the board, and it is best for me to move off,” Mr. Ballmer said in a public letter to Mr. Nadella, who became CEO in February. “I see a combination of the Clippers, civic contribution, teaching and study taking a lot of time.”
USB 3.0 Promoter Group has announced that it has finalised its redesign of the USB.
Called USB Type-C, the specification — which was announced last December — aims to solve several problems with current USB design; possibly the most exciting of which is the eradication of “right way up” with a reversible plug. Like Apple’s Lightning connector, it can be plugged into its port either way.
“Interest in the USB Type-C connector has not only been global, but cross-industry as well,” said USB 3.0 Promoter Group chairman Brad Saunders. “Representatives from the PC, mobile, automotive and IoT industries have been knocking down our door anticipating this new standard. This specification is the culmination of an extensive, cooperative effort among industry leaders to standardize the next generation USB connector as a long-lasting, robust solution.”
The USB is comparable in size with micro USB 2.0 Type-B connectors, with a port size of 8.4 by 2.6mm, yet will be compatible with SuperSpeed USB at 10Gbps (USB 3.1). It will also support USB Power Delivery up to 100W, with additional support for scalable power charging and future USB performance needs
At WWDC14 Apple announced that it was opening up Touch ID to all developers.AgileBits, developer popular password vault 1Password, has demonstrated several promising new applications of the biometric fingerprint sensor built into the home button on the iPhone 5s.
- unlock the 1Password app (replacing the master password)
- enter passwords in Safari (via the 1Password browser extension), and
- enter login credentials into third-party iOS apps (via the 1Password app extension)
Make no mistake about it, this is revolutionary. These three features alone make Touch ID a viable and powerful security technology, a generation ahead of the anemic unlock code and App Store purchases that Touch ID is limited to today.
Perhaps no news about HealthCare.gov, the Federal healthcare exchange website and supporting systems, is shocking anymore. We all know that it was an utter disaster at launch on October 1, 2013 and was completely unusable for some time thereafter. But eventually they got it to the point of being usable, so no harm no foul, right?
You may not think so after reading the recent GAO (Government Accountability Office) report HEALTHCARE.GOV — Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management. The report is embedded at the bottom of this story.
It’s a common scene from TV: Our hero sneaks into the villain’s office, plugs in a USB stick and — flash! — all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out with stolen data everyday on their flash drives.
It could be worse. USB sticks can also carry malware. Or, as SRLabs security researchers Karsten Nohl and Jakob Lell propose to show at Black Hat, an ordinary USB pen drive can be turned into an automated hacking tool.
The base problem, according to the pair, is “USB has become so commonplace that we rarely worry about its security implications. USB sticks undergo the occasional virus scan, but we consider USB to be otherwise perfectly safe — until now.”
August 7, 2014 By Richard Stiennon
Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quotedwarning of impending Russian cyber attacks in the wake of an escalating response from the West to Russia’s intransigence in the Ukraine.
While there have certainly been a spate of defacements that are two sided and confusing to sort out during this burgeoning conflict, there has been nothing as dramatic as the Estonia ’07, or Georgia ’08 attacks.
But things have changed. In the wake of the downing of passenger jet MH17 the European Union and United States have come together to impose combined economic sanctions against Russia. According to the New York Times thesanctions include “the closing of European capital markets to Russian state banks, an embargo on new weapons sales and the transfer of sophisticated oil drilling technology.”
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million email addresses, security researchers say.
The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, including household names, and small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems.
AT&T, Verizon, Sprint, and T-Mobile all allegedly “crammed” customers with third-party charges that cost hundreds of millions of dollars, Senate report says.
The Senate has joined the Federal Trade Commission and Federal Communications Commission in chastising the four top US wireless carriers for skimming money from customers.
In a lengthy report (PDF) released by Senate Commerce Chairman Jay Rockefeller (D-W.Va.) on Wednesday, AT&T, Verizon, Sprint, and T-Mobile are accused of a practice known as “cramming,” in which wireless carriers allow mystery fees to appear on consumers’ phone bills without notification.
These mystery fees are typically fraudulent and unauthorized third-party charges, ranging from $1.99 to $19.99 a month, for things like ringtones or “premium” services, such as a daily horoscope. Users don’t normally see these charges because they’re buried deep within monthly phone bills.
The report calls cramming a “widespread” problem and says that “hundreds of millions of dollars” in unauthorized charges have likely racked up on users’ monthly phone bills.