Showing posts with label News. Show all posts
Showing posts with label News. Show all posts

Sunday 15 September 2013

Future of smartphone Biomatrics

Sorry, Apple. The fingerprint recognition feature on the upcoming iPhone 5s, Touch ID, might be eye-catching, but you still have to log into your device. Identifying someone by the way they tap and swipe on a touchscreen might be the more natural, unobtrusive future of smartphone biometricsMovie Camera.

Developed by Cheng Bo at the Illinois Institute of Technology and his colleagues, SilentSense does just that. Using the phone's built-in sensors, it records the unique patterns of pressure, duration and fingertip size and position each user exhibits when interacting with their phone or tablet.

Machine learning algorithms then turn this into a signature that identifies the user – and will lock out anyone whose usage patterns do not match.


To increase the system's accuracy, the smartphone's accelerometer and gyroscope measure how much the screen moves when you are jabbing at it. They can also pick up on your unique gait as you walk while using the screen.

"Different users, dependent on sex and age among other things, will have different habits in interacting," says Bo.

In tests, 100 users were told to use the smartphone's touchscreen as they would normally. SilentSense was able to identify the phone's owner with 99 per cent accuracy after no more than 10 taps. Even with an average of 2.3 touches the system was able to verify the user 98 per cent of the time.

To save on power, the software stops checking the user's identity when apps like games are being used. To maintain security, it automatically switches on when more sensitive applications, such as email or SMS, are accessed.

"This is interesting, creative research," says Kevin Bowyer, a biometrics researcher at the University of Notre Dame, Indiana. "It could help preserve privacy if the phone could recognise if the owner or a guest was using it and lock guests out of some applications."


Journal reference: arXiv:1309.0073v1

Sunday 18 August 2013

Google Chromium project leaves WebKit to work with Blink browser engine

When Opera announced in February that it would switch to the WebKit browser engine, the same basic technology that powers Chrome and Safari, critics wondered if this was a bad move for the open Web.
The worry was that browser vendors were putting too much power in the hands of one rendering engine. Many, no doubt, were recalling the years when Internet Explorer dominated browser usage requiring Web developers to cater to IE's peculiarities.
Fears of a so-called WebKit monoculture may be over now that the Chromium Project is splitting with WebKit, an open source project created by Apple in 2001. Google will instead work on its own rendering engine called Blink, taking the new engine’s initial codebase from WebKit, a practice called forking. Chromium is the Google-led open-source browser project that supplies the code for the company's Chrome Web browser.
With the addition of Blink, there are now four major Web engines including WebKit, Mozilla's Gecko engine powering Firefox, and Microsoft's Trident for Internet Explorer.

Why the change?

"[WebKit was] the obvious choice for Chromium's rendering engine back when we started," Google's Chromium Project said in a blog post Wednesday. "However, Chromium uses a different multi-process architecture than other WebKit-based browsers, and supporting multiple architectures over the years has led to increasing complexity for both the WebKit and Chromium projects."
Google says that at first, there will be little difference in how Blink works as the first round of changes to the new engine will be largely architectural. Right from the start, Blink will have a smaller codebase as it eliminates from its WebKit source about 7,000 files and 4.5 million lines of code. A smaller codebase could translate into smaller download packages for new browser installations and perhaps faster start-up times for browsers.
Chromium Logo

Introducing a new rendering engine could either be a blessing or a boon for users and developers. Catering to multiple rendering engines can put a heavy burden on Web coders who need to make sure their sites work no matter if someone is viewing their site in Chrome, Firefox, Internet Explorer, Opera, or Safari. Even when those browsers are supposed to respect the same Web standards, minor differences in each browser can require code tweaks by developers to keep their sites working.
Chrome and Chromium won't be the only browsers using Blink. Opera confirmed to PCWorld that it will also follow Chromium into the Blink project. When Opera announced it was going WebKit in February, the company said it would base its new browser on elements from Chromium, so the switch to Blink makes sense.
Others, however, feared a singular Web culture ruled by the technological capacities and limitations of WebKit. There’s little doubt that WebKit is currently a dominant factor in Web development, especially when it comes to optimizing websites for mobile devices.

Apple's Safari for iOS and Google's Android browsers rely on WebKit and account for more than 90 percent of the mobile browser market worldwide, according to stats from Internet backbone company Akamai Technologies. WebKit's mobile dominance even prompted Microsoft to write a blog post with guidelines on how to tweak a WebKit-optimized site to work with Internet Explorer 10 for Windows Phone 8.
Google says it is keenly aware that introducing a new rendering engine has the potential to break Web compatibility, but the company argues that multiple rendering engines will "spur innovation and over time improve the health of the entire open web ecosystem."
So when will we see the first version of Chrome fully powered by Blink? Google hasn’t said yet, and Opera said it cannot comment on its roadmap plans. Opera released its first beta version of Opera based on WebKit earlier in March.

Wednesday 14 March 2012

Intel plans strategic shift toward internet television

CHIPMAKER Intel is developing an internet-based TV service for consumers in a strategic shift from its traditional business, and has reportedly reached out to media companies in a bid to obtain the rights to shows.
The world’s top chipmaker plans to create a “virtual cable operator” that would offer TV channels in a bundle over the internet – via television sets, computers, tablets and smartphones.

The product, which the chip company wants to roll out before the end of the year, could use an Intel set-top box and Intel’s name.

In October, Intel wound down its efforts to make chips for digital “smart” TVs, although it continues to make chips for set-top boxes.

At the same time, it formed the Intel Media business group, headed by former BBC executive Erik Huggers, aimed at promoting digital content on Intel-based platforms.

An Intel spokeswoman declined to comment.

Apple sued over iPhone 4S 'assistant' Siri





AN iPhone 4S buyer has sued Apple for promising more than it delivered with automated "Siri" voice-activated assistant software built into the coveted smartphones. 

 
A suit filed in a California federal court argued that Apple advertising touting the wonders of Siri amounted to "intentional misrepresentation" and unfair competition, according to documents available online yesterday.
Lawyers representing a New York City man who bought an iPhone 4S want class action status to represent millions of people who bought the latest generation Apple smartphone.

The suit included Apple - which runs showing people asking Siri to help them find restaurants, learn chords to songs, tie neck ties, and even figure out if there is a rodeo in town - had disappointed some users.


Lawyers representing the iPhone 4S buyer, identified as Frank Fazio of Brooklyn, argued that Siri claims were "misleading and deceptive" and are calling for California-based Apple to pay unspecified damages. "Promptly after the purchase of his iPhone 4S, plaintiff realized that Siri was not performing as advertised," the lawsuit said.

"For instance, when plaintiff asked Siri for directions to a certain place, or to locate a store, Siri either did not understand what plaintiff was asking, or, after a very long wait time, responded with the wrong answer."
Apple does not comment on pending litigation.

Siri has been a hit since its US debut with the iPhone 4S in October and was even referred to as a direct challenge to Google's search engine by the Internet giant's chairman Eric Schmidt.

The artificial intelligence software was derived from research conducted to make computers more intuitive at understanding and working with soldiers in action.

Siri is designed to understand context so people can speak naturally when asking it questions.
For example, spoken queries of "Will I need an umbrella this weekend?" and "What is the traffic like around here?" will prompt online searches for local weather forecasts or road conditions.

Siri helps make calls, send text messages or email, schedule meetings and reminders, make notes, find local businesses, and get directions. It will even perform mathematical calculations if asked.

LG Display supplying panels for Apple’s new iPad


Flat screen maker LG Display Co Ltd is supplying touch-screen panels for Apple Inc's new iPad, a source close to the matter said on Wednesday.

Bloomberg reported earlier that Samsung Electronics Co Ltd was the sole supplier for the new iPad, launched last week, after LG and Japan's Sharp Corp failed to meet the US company's quality requirements, quoting an analyst from research firm iSuppli.

"LG is also in a panel supply deal with Samsung for the new iPad," the source said.
The source was not authorised to speak to the media and declined to be identified.
Among the iPad's tablet competitors, Samsung remains in a distant second position.

The new iPad will be available in Singapore on March 16.

Sunday 13 November 2011

Android's Face Unlock security fooled by photograph?

The Face Unlock security feature in Google's Ice Cream Sandwich OS can reportedly be tricked into unlocking a phone by showing it a digital image of the user's face.

The Face Unlock feature raised a few eyebrows when it was unveiled along with the rest of the Ice Cream Sandwich edition of Android. Using your smartphone's front-facing camera, the phone side-steps the need for passwords or traditional unlock screens by scanning the user's face to identify its owner from Joe Public, and only granting access to the face it recognises.

At the time, cynics were asking how an Ice Cream Sandwich phone would be able to tell the difference between a real-world face and a photograph, although Google rebuffed the idea that the system could be so simply exploited. However, a new video that's cropped up on YouTube suggests that Face Unlock might be more vulnerable than Google are willing to admit, with one user unlocking his ICS-powered mobile with a picture taken of himself on a Samsung Galaxy Note.

While there are accusations in the YouTube comments that the uploader could have set up his phone deliberately to unlock when presented with a 2D picture of himself, we imagine the experiment is being busily recreated at Google HQ as we speak. Fake or legit? Check out the video for yourself below.

ASUS Announces P9X79 WAS (LGA 2011) Motherboard for Workstations

ASUS today announced its new workstation motherboard P9X79 WAS which would support Intel’s upcoming Sandy Bridge-E Processors. The motherboard would be suitable for professional workstation usage while the other Rampage IV Extreme, ASUS P9X79 and Sabertooth X79 would be aimed towards the Consumer market.


The P9X79 WAS would be based on the X79 Chipset featuring the LGA 2011 Socket which would support Intel’s Sandy Bridge-E, More specifically the i7 3900 Series. The motherboard features eight DDR3 memory modules allowing Quad channel memory interface and Six PCI-e 3.0 Memory slots allowing for Quad Way SLI and CrossfireX Support.

Storage includes 4 SATA 6Gbps and 4 SATA 3GBps ports while connectivity ports include four USB 3.0 and 13 USB 2.0. Backpanel I/O includes Dual Gigabit network, FireWire and 7.1 audio.

The release of the motherboard is expected next week along with Sandy Bridge-E platform launch on November 14th.

Once and for all: Modern Warfare 3 or Battlefield 3 - Who won the FPS crown?

And there you have it ladies and gentlemen, after close to a year's worth of teasing, promising and fair bit of showboating Activision's Call of Duty: Modern Warfare 3 and EA's Battlefield 3 are both in the wild. But which one delivers?

EA has made it known through its advertising campaign and numerous confrontational soundbites that it's aiming for Call of Duty's throne with DICE's latest shooter.

Meanwhile Activision has observed a quiet confidence in its genre-leading franchise, holding an assured silence that some would posit borders on arrogance.



Battlefield 3 reached European shores on October 28 and - on the same day - EA revealed DICE's shooter got off to "a fantastic start on sales and quality". He wasn't kidding.

EA CEO John Riccitiello said during an earnings it had shipped 10 million units to retail and was already receiving reorders. Later that week Battlefield 3 was declared to be 'the fastest-selling EA game ever'.
Critics gave the game a very warm reception and the generally positive reviews pushed its Metacritic review average to a high of 93%.

Although Call of Duty: Modern Warfare 3 has only been official available for a few days now (close to a week unofficially courtesy of a few cheeky retailers) industry analysts have said Infinity Ward's shooter is expected to move between 5.5 and 6 million copies during its first 24 hours on sale.

Like it's opposition MW3 has gone down a treat with critics, with the majority of reviews landing around the 9/10 mark.

Gamers however haven't been as kind and flocked to review aggregator Metacritic and submitted hundreds of scathing reviews, dragging its user review average down to rock bottom. Some would say unfairly so.



If numbers are the metric of success the obvious answer is both games are huge success' in their own right, but what we're interested in is your opinion, how you feel about both games individually and relative to each other.

Do you think Battlefield is everything EA claimed it to be? Has Activision delivered another title worthy of the crown? Which out of the two do you expect to be playing months from now? Let us know in the comments below.

Friday 21 October 2011

The “world’s most wanted hacker,” Kevin Mitnick, has gone straight (interview)

This story is taken from VentureBeat

Kevin Mitnick was once labeled the world’s most wanted hacker. Back in 1992, he tangled with a mystery hacker named Eric, setting off a duel that led to a chain of events that spun out of control.
 
After a FBI manhunt, he was caught in 1995 with the help of security expert Tsutomu Shimomura, who wrote about the experience with New York Times writer John Markoff. Mitnick spent five years in jail, including eight months in solitary confinement.

At first, Mitnick wasn’t allowed to tell his side of the story, thanks to a gag order. Now he has penned a book on about his life on the run, co-written with author William L. Simon.  Called “Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker,” the title has stayed on the New York Times Bestseller list for several weeks.

After getting out of prison, Mitnick pulled his life together as a “white hat” hacker, or one who helps companies by testing the security of their networks via Mitnick Security Consulting. Now he frequently talks about how to protect yourself from wily cyber attacks.
Here’s an excerpt from the book. And below is an edited transcript of our interview with Mitnick.

VB: Hi Kevin. We’ve talked before when you published your books, The Art of Intrusion and The Art of Deception. At the time, you had a gag order that did not allow you to write about your arrest and the events leading up to it. Now that it has expired, you’ve revisited those memories. Why?

KM: I had a deal with the government for about, for seven years after I was released from custody. So it expired around Jan. 21, 2007.  After that, we decided to work on my memoir, Ghost in The Wires. That was finally published on August 15. The other two books mentioned my life on the run, but they were really about the lessons I learned with social engineering and how organizations could mitigate the risk of falling victim to it. That book was The Art of Deception. Art of Intrusion was really kind of just talking about the stories of other hackers that were in the news and some where the perpetrators were never identified.
So what I like about the best of all these three is my life story Ghost in The Wires because it’s kind of like a Catch Me If You Can version for a computer hacker. What is unique about it that it is a true story. People really seem to like it.

VB: Yeah I noticed you tweeted about how it’s still on the New York Times online bestseller list.

KM: Well this week it was 23 last week it was 12 the week before that it was 15, the week before that it was 16. So I have been on the New York Times best seller list a month so far.

VB: Congratulations. Why do people want to read it?

KM: Thank you so much. I never expected it but I guess it’s a great story and it’s written very well. So people are interested in it and I guess I’m the cyber version of Frank Abagnale.

VB: It’s probably only fair since there were other bestsellers that were written about you.

KM: I don’t think any of them actually made the bestsellers list. John Markoff’s book, [Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw, By the Man Who Did It], never made it the bestsellers list.

VB: Oh it didn’t?

KM: As far as I am aware, the only hacking book that made the bestseller list was a book called The Cuckoo’s Egg by Cliff Stoll. The Takedown book never made it to the list and in fact it was a very poorly reviewed book.

VB: Did you ever figure out why the government had such an unusual gag order in place here because that seems pretty rare?
 
KM: Well one of the things was they wanted to profit off my story and they wanted to keep everything under a protect order meaning that I was essentially forbidden to talk about it. So I had to be very careful because there is still stuff that is still under protective order that I couldn’t reveal. And so I had to be very careful to still tread around that restriction. The seven-year restriction was to prevent me from earning any revenue from my free public expression. They learned that from cases like the (murderer) Son of Sam.

So they had to do it that way because there are laws that are usually applied to violent crime cases to prevent people from profiting by telling the story. But it’s a prior restraint on free speech, so the Supreme Court has since struck down those laws. That was how the federal government dealt with it back then. It was part of the plea agreement.

VB: So what really drove you to write this new book after the gag order lifted and you were free?

KM: To get the story out. It wasn’t really about making money. I mean I make money from my security business and my public speaking career because I go around in the world doing a lot of public speeches, keynoting at conferences. I make plenty of money doing that. So it wasn’t really about the money it was about getting my side of the story out. I thought it was a great story to tell that people would enjoy it. And I want to really to focus on the chase because my story is kind of a cat-and-mouse game with the federal government.

VB: Tell us some stories about being on the run.

KM: I think the federal government came down harder on me is because I was playing games on them. At one point the government sent an informant to come and trap me, around 1992, after I was released from an earlier prison sentence. I quickly worked out what was going on and in the process I compromised the local cell phone company. I was able to identify the cell phones in Los Angeles that were calling the informant. I didn’t know the guy was an informant at the time, as this was part of my usual investigation.

I learned that people calling him were the FBI and it was the agency cell phone numbers. So what I did is I programmed these cell phone numbers into a device at a company where I was working as a private investigator. So if any of the cell phones came within a few miles radius of me, it would send me an alert. It was an early warning detection system that I had set up.

So in September of 1992, I was walking to my office one morning and I disabled the alarm. But I kept hearing a beeping. And I figured out that the alarm was disabled and I starting walking around everyone’s office to find out what this weird beeping was. It turned out it was coming from my office and it was my early warning system going off. A few hours earlier one of the FBI agents was actually making a phone call from the pay phone across the street from my apartment. He was within a mile of where I was.

I realized that the FBI happened to be to at my apartment when I was sleeping and nobody knocked on the door. So I realized they weren’t there to like arrest me immediately. They were probably preparing to get the stuff on my computer. I thought they would do a search. So I cleaned out my floppy disks, computers, and notes. I moved them over to a friend’s house. I went to Winchell’s doughnuts and got a box. I took a Sharpie and wrote “FBI doughnuts” on the box and stuck it in the refrigerator. The next day, the FBI executed the search warrant. The day before they were just gathering a description of my apartment to get the warrant.They searched my apartment and found nothing but the doughnuts. I think they were really pissed off.

I did these immature things that were funny at the time and it irritated them to no end. I think the agents took it personally. So when I was prosecuted, it felt like it was because I was playing games with them. When I was running from the government and living in Denver, I was working for this law firm. I had a legitimate systems administrator job. My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn’t stealing money or using other people’s credit cards. I was doing a 9-to-5 job. I was at this law firm in Denver for a year and a half. One of my jobs was supporting the firm’s telephone system. I put code into the system so that if anyone were to call the FBI in Los Angeles or Denver, or the U.S. Attorney’s office, it would send me a page. I would know if there was an internal investigation or someone working me. I lived under the name Eric Weisz, the real name of Harry Houdini. I did these smart ass things and the government really frowned on it. I made a mockery of them and that’s probably why they came down hard on me.

My hacking did cause losses. But the losses were minimal compared to what the government alleged. The government alleged that I caused $300 million worth of damage, where the damage was that I copied source code. I was interested in the source code for operating systems like [Digital Equipment Corp.'s] VMS. And I wanted to look at the source code; my only purpose was to examine the flaws within the operating system so I could bypass security. So it’s really just leveraging the source code to become a better hacker. Now certainly it was illegal to copy the source code but the government really took that and ran with it.

Some of the FBI agents solicited these companies to actually say their losses $80 million each, based on the value of the source code that I looked at. So basically that was the entire research cost for developing it. It’s kind of like stealing a can of Coke and then getting charged with stealing billions of dollars because you have Coca-Cola formula. In my case, the fair losses would have been like something a few hundred thousand dollars.

VB: So why didn’t that make sense?

KM: It was only in the thousands, not the millions. So what I had done was poked at the tiger too much. They were trying to get me a really substantial prison sentence. My lawyer checked with the Securities and Exchange Commission because any publicly traded company has to report it when they suffer a material loss. Otherwise, they are defrauding shareholders. My attorney founded that none of these companies had reported to the SEC any loss that was attributed to my hacking. So, again, I was punished for causing these multimillion dollar losses.

VB: So there was a mythology to being the world’s most wanted hacker.

KM: Yeah I was you know I was the world’s most-wanted hacker in the 1990s. I would hack in at all these companies and look at their source code and the source code was a trade secret. So the companies themselves had no idea why they have this mysterious person hacking into their system. They were doing investigations. There were some real losses for sure.  I’m sorry that I caused anybody any loss at the time. As a hacker, I was thinking that all they have to do is change a few passwords and they would fix it. They would patch a security hole in their operating system and then I would be locked out. It might take them 30 minutes for them to do that. What I didn’t realize was what the other side is doing. The other side is like rebuilding their operating system from scratch. They are auditing the source codes. They are going through all these significant measures because they don’t know who is on the other side. They don’t know it’s just me. So you know what I’m saying? The victims had to do a lot of work.

VB: Did you feel like you had to correct the record because of the book that John Markoff co-wrote?

KM: Oh my God. I mean we could go on for hours. For example when I hacked into DEC and I copied the VMS source code with the co-defendant. I remember my co-defendant actually set me up for a FBI sting and I was arrested. I ended up in federal prison. Three days later, they finally took me to court and I was expecting to get bail. What had happened was that a federal prosecutor told the judge not only do we have to detain this guy, we have to make sure he can’t get to a pay phone inside the prison. We have to make sure he can’t get to a pay phone because he could dial up to the North American Air Defense System (NORAD) and whistle tones and possibly start a nuclear war.

[Markoff declined comment, beyond pointing out that Mitnick pleaded guilty to computer and wire fraud in March 1999.]

When the prosecutor said this I started laughing because I had never heard something so ridiculous in my life. It’s kind of like you taking something out of the movie War Games and manipulating it to a ridiculous degree. The judge, however, bought it hook line and sinker. I guess the prosecutor was to be believed and I ended up being held in solitary confinement in a federal detention center for nearly a year based on this myth. Then all these other rumors the government started using as fact. They said that I hacked into the National Security Agency and got to their secret access codes.

VB: That sounds a little implausible.

KM:    Back in the beginning, around the mid-90s you could do a “who is” command on a site. Nowadays, you do that it shows who it belongs to. Back then, they used to list the registered users of the host and their phone numbers. So I had a file on my floppy disk at the time called “NSA.txt” and it was a file that the output of a system called Dock Master. And Dock Master was a system that was run by the National Computer Security Center, which was the public arm of the NSA. And it listed the user names in a four-digit number and the four-digit number was their telephone extension.

The prosecutor characterized that file as proof that I hacked into the NSA and got their secret access codes and those four-digit numbers were secret access codes. I was said to be stalking the actress Kristy McNichol. I was supposedly messing with her telephone and calling her at all times of the day and night. The rumor went so far I ended up on the front page of the National Examiner which was like The National Enquirer. And so I remember going to the supermarket and seeing a  front page photo of me where it says Mitnick is stalking Kristy McNichol and this is I couldn’t believe it. The government used this in court as to what a danger I was. My mom at the time was a waitress at Jerry’s Delicatessen in Studio City. She saw Kristy McNichol and walked up to her. She said my son is Kevin Mitnick. She told my mom that whatever was happening wasn’t true. Kristy McNichol was going to write a letter to the court and explain these things had never happened. Her agents stopped her because they didn’t want it in the news that she was supporting me. There was a report that I hacked into a news wire service and was trying to discredit Security Pacific Bank and that cause them a big loss. That was a totally made-up allegation. I mean the list just goes on and on you know I don’t want to bore you.

Then the true thing is that when I was younger I was able to get celebrities’ unlisted telephone numbers and then I would verify that they were indeed the right number. Then I would never call again. There was an allegation that I had wiretapped the entire Los Angeles office of the FBI, which wasn’t true. I did however monitor the locations of cell phones and looked at the call detail records. So I would know a person A is calling person B.  But actually, in the New York Times, it said that I was wiretapping their conversations which wasn’t true. One chapter of the book describes the court drama. Most of the book is focused on the adventure, the crazy things I did as a juvenile. The book isn’t about me whining about this.

VB: What was the hack that you were most proud of?

KM: The hack I was most proud was actually hacking the McDonald’s drive-through window. I did this when I was 17. It wasn’t about hacking a computer. It was actually hacking their drive up windows so that I could overtake the radio in the drive-through window. I could sit across the street and talk and pretend that I was the employee inside McDonald’s. The poor employee could hear what’s going on but my transmitter was more powerful than his.

So you can imagine what fun you can have as a teenager when customers would drive up. I would say, ‘can I take your order please?’ They give the order. And I would say, ‘OK I have your order you are the 50th customer today so please right forward. Your order is absolutely free. And then the cops would drive up to order something. And I would say, ‘I’m sorry we only serve doughnuts to cops. We don’t serve any type of other food.’ Or I would say, ‘Hide the cocaine, hide the cocaine. May I take your order sir?’ One time, a manager of a McDonald’s came out to find out what the hell was happening. He walked around the parking lot and couldn’t see anybody. He looked in cars. He walked up to the drive-through speaker and he put his face next to the speaker as if there were someone hiding inside. I yelled into the microphone, ‘What the f*** are you doing?’ and the guy flies back 15 feet. These are the types of hacks I enjoyed. As a young kids, I was a prankster. I hacked into my friend’s home telephone service so that it became a pay phone. Whenever his parents tried to make a call, it would say, ‘please deposit 25 cents.’

I was doing this starting in the late 1980s and there were no computer crime laws at the time. I had a teacher in high school where he encouraged it. One of my first programming assignments was to write a FORTRAN program that found Fibonacci numbers. I thought that’s kind of boring. So I wrote a password stealer so I could get any of the other students’ passwords in class. I spent a longer time working on developing that program because it was my first and I didn’t have time to do the other assignment. So I ended turning in my password stealer instead and the teacher was clearly impressed and even gave me an A. He started telling all the other students how smart and clever this was. So I was raised at a time where the instructors in high school encouraged hacking and there were no laws against it.

VB: You know today you are in the business of being an ethical hacker. Do you find that today that the issues that ethical hackers have to deal with are pretty difficult in terms of being able to stay on the right side of the law?

KM: Not really. I was a hacker for a number of years before I became involved in security because there was no such occupation for doing it legally. Companies dealt with security by having their internal IT departments deal with it. There was no the security industry. In fact, if that did exist when I was younger, I might have taken a different path. But I was so interested in learning about computers. My primary goal of hacking was the intellectual curiosity, the seduction of adventure. The No. 1 thing was the pursuit of knowledge and there was no way to get the knowledge back then because those avenues didn’t exist.

Now today, a 14-year-old can use a laptop and set up their own entire lab on a laptop with different operating systems. There are different frameworks that you can download for absolutely free. There are tons of material on the internet so you can learn all about hacking and all about security. You can learn about offensive and defensive measures.  So you can be a part of a red team are trying to hack into a target to test their security or you could be on the defense side.

So today’s world is completely changed where young kids and even adults have a more social acceptable way to learn about this stuff. In fact, at Defcon this year was the first time they had kids come. There were kids who were eight, nine or ten who were attending a hacking conference. Of course, they are interested in hacking games. And one ten-year-old girl found a vulnerability. The world has changed from 1978.

VB: It’s also easier to become a criminal hacker.

KM: The ethical thing is actually the easier thing to do. Now if you are a criminal, then you will use hacking techniques to steal money and property. The hackers of my time were never in it to steal money. They could break into systems to get access to information. But it wasn’t a for-profit venture. Today, you have organized crime using hacking.

VB: What do you think is relevant today, from the days when you were learning to be a hacker?
 
KM: Hacking is exploiting security controls either in a technical, physical or a human-based element. Back in my day you know, I learned a lot about the human factor in security. I manipulated the human operator into doing something that gives the hacker an advantage. The Art of Deception, which was published in 2011, was about social engineering. Google, RSA, and Lockheed Martin were all successfully compromised through what we call spear phishing attacks. That took advantage of human weaknesses, where you respond to a message from a friend.

Back in my day, we would find servers that were on the company’s perimeter network: a mail server, a web server, a DNS server or whatnot. And then we would attack the server and find a vulnerability in a service. We would get into the server that way. Now the trend has changed towards client-side exploitation, meaning the software that is on the user’s desktop. You take advantage of weaknesses in Adobe Acrobat, Adobe Flash, Java, Active X. They are riddled with vulnerabilities.

So the hacker could break into that person’s desktop or workstation by exploiting that vulnerability. But the problem is they would have you have one component that I have written about extensively called social engineering. You have to trick the target into doing something that triggers the technical exploit. And that’s precisely how they were able to hack Google. It was by finding a vulnerability in the Internet Explorer 6 that was unpatched. They still had to get the user to click a link and once they clicked the link it would go to a website that would exploit the vulnerability. With RSA’s hack, it was through an Excel spreadsheet I believe was labeled a ’2011 recruitment plan.’  The spreadsheet in the Excel document had an embedded Flash object that was vulnerable.

So now when the victim opened up that Excel doc, it triggers the Flash object, and then the hacker got into that person’s desktop, which was connected to RSA’s network. I mean now so now the trend is instead of attacking the server side you’re now attacking the client side. But any time you attack the client side, you must have a component of social engineering. So I’d say social engineering is still a viable threat.

VB: Does it surprise you that so many companies have been hacked this year, with things like the PlayStation Network going down for six weeks? 

KM: I don’t think it surprises me because there is a lot of low hanging fruit out there. A lot of companies do not bother testing their security. So really what they will do is they will do is compliance. They hire a firm that would run a  scanner. If they don’t find anything, they say the company is in compliance. That is the problem because companies are not concerned enough about the underlying security. They are more concerned about compliance. I have to explain what the difference is between scanning security companies and what we do. Albert Gonzalez, who was sentenced to 20 years for hacking TJ Maxx and others, found that his team could break into systems for these huge brands that had met compliance. So there is a lot of low-hanging fruit like Sony.

VB: What do you think of all the hacktivism that has happened, and what should companies be doing about it?

We ought to be doing security assessments and deploying top security controls. But I think it’s a waste of time for the people behind the attacks because they’re not going to change public policy. I think the only good thing that comes out of it is the security awareness. Even my company we got a few new clients because they were concerned about this Anonymous hacking spree. That is the greater good that occurred out of it. But at the end of the day Anonymous doesn’t really get what it wants other than a lot of attention by law enforcement. Their goal is to make to change. The change will never happen that way.

VB: Do you have conversations with young hackers?

KM: Not really. I mean I go to conferences around the world and I have a substantial Twitter following. But I don’t really talk to them. I get people emailing all the time. They want to learn how to hack or they want to hack into their girlfriend’s Facebook account. I pretty much ignore them. They try to social engineer me sometimes. I got an email where they said a family member was murdered and they had to get into a person’s Hotmail account to investigate it. I told them they had to get a subpoena from a judge to get the information. The crazy requests make me chuckle.

VB: How do you talk someone out of being a criminal hacker? 

KM: Nobody comes up to me and says they’re a black hat hacker. But if they did, I would certainly encourage them not to follow in my footsteps. Now there are so many resources for them to learn how to hack legally. If they were true criminals, and they wanted to steal credit card numbers, you can’t change them. But if they are just curious, you can change their direction by letting them know that there are tools today that weren’t available to me. You can learn in a socially acceptable and ethical way.

VB: Have you ever heard from anyone who was a significant player in the book? Like maybe Markoff or Shimomura?

KM: Not them. I heard from one person who was my old boss when I was pretending to be Eric Weisz in Denver, at a law firm. I described her in the book. I said she had a school teacher mentality. She found me on LinkedIn and said her husband was loving my book. She said that my description was right because she became a school teacher. That was ironic. I heard from one of my social engineering victims who worked at Novell. He was wondering how the government could have held me for so long without a trial. We became good friends and he works at Fusion-io now. We have been really good friends.

VB: You mention you used the Freedom of Information Act in the book. Did you find things out about your case you didn’t know?

KM: That’s a good question because when we were writing the book we submitted the request to the FBI and the FBI claims that the Los Angeles bureau of the FBI lost my file and they could not find it. We went to Senator Barbara Baxter to get her to help because we thought the FBI was lying. How can they lose my file? That was about as ludicrous that I could launch a nuclear weapon. Doesn’t the FBI make copies? Baxter wrote a letter on our behalf as a constituent and the FBI lawyers reaffirmed that they cannot find the file.

They did provide files from when I was juvenile that were largely blacked out and they gave us 8,000 pages of newspaper articles. In summary, I was an obsessive hacker because I enjoyed beating the system and getting through security for the intellectual challenge. I’m here today and am a respected security consultant, and I even work for the federal government. Now the companies and even the federal government have recognized that I have learned my lesson. And now I’m an asset to the community rather than being a pain in the ass.

VB: Thanks very much, that’s a great way to end the conversation.



Monday 17 October 2011

Skinput: Appropriating the Body as an Input Surface


To download the research article on Skinput  Click Here

We present Skinput, a technology that appropriates the human body for acoustic transmission, allowing the skin to be used as an input surface. In particular, we resolve the location of finger taps on the arm and hand by analyzing mechanical vibrations that propagate through the body. We collect these signals using a novel array of sensors worn as an armband. This approach provides an always available, naturally portable, and on-body finger input system. We assess the capabilities, accuracy and limitations of our technique through a two-part, twenty-participant user study. To further illustrate the utility of our approach, we conclude with several proof-of-concept applications we developed.

Project Team

Chris Harrison

Dan Morris

Desney Tan

In Chris Harrison's ideal world, mobile phones would be the size of matchbooks. They'd have full-size keyboards. They'd browse the Web. They'd play videos.


And, most importantly, you'd never have to touch them.

Sound like too much to ask? Maybe not.

Harrison, a graduate student at Carnegie Mellon University and a former intern at Microsoft Research, has developed a working prototype of a system called Skinput that does just that, essentially by turning a person's hand and forearm into a keyboard and screen.

"People don't love the iPhone keyboard. They use them. But they don't love them," Harrison said in a interview at the recent Computer-Human Interaction conference. "If you could make the iPhone keyboard as big as an arm -- that would be huge."

Using Skinput, a person could tap their thumb and middle finger together to answer a call; touch their forearm to go to the next track on a music player; or flick the center of their palm to select a menu item.

All of these sign-language-like movements, which are customizable, would control a gadget in a person's pocket through a Bluetooth connection.

When fitted with a pico-projector, the Skinput system could display an image of a digital keyboard on a person's forearm. So, using Skinput, someone could send text messages by tapping his or her arm in certain places -- without pulling the phone out of a pocket or purse.
"You could pretty much do a lot of what you do on your iPhone," said Harrison, who says Skinput "is [like having] your iPhone on your palm."

The system, which has been under development for eight months, won't be commercially available for two to seven years, said Dan Morris, a Microsoft researcher who is working with Harrison on Skinput.

Before that can happen, Skinput's sensors need to get more accurate, he said. In a 13-person trial in Seattle, Washington, Skinput was found to be 96 percent accurate. But that test only used five buttons. The system would have to improve for people to make use of a full keyboard, which would be the "holy grail," Morris said.

"The accuracy is good, but it's not quite consumer-level yet," he said.

Skinput is one of a number of prototypes, ideas and near-products aiming to make computing more natural.

These devices seek to move beyond the mouse and physical keyboard, letting people communicate with their gadgets by gesturing, using sign language or, in the case of Skinput, tapping on their hands, fingers and forearms.

The arm as an instrument

Understanding how Skinput works makes it seem all the more futuristic.
The system turns a person's arm and hand into a wiggling, pulsating instrument, full of vibrations that can be picked up and translated.

Skinput users wear an armband -- the prototype version is made of an elbow brace -- that's lined with 10 sensors. These sensors look like tiny diving boards with dumbbells on one end, and they pick up inaudible sounds that range in frequency from 25 to 78 hertz.

When a Skinput user taps a thumb and middle finger together, the impact sends ripples down the skin and through the bones in the person's arm. "They sort of start resonating -- like guitar strings," Harrison said. The diving-board receivers read the sound waves to figure out what gesture the person made, and then relay that information to a phone.

Skinput can tell whether a person tapped a middle finger or an index finger, because the two moves sound slightly different to the springy receivers.

The system takes one or two minutes to learn the sounds of a particular person's arm, Morris said, and then it can be used however the user likes.

Trial and error

When they started working on Skinput, Morris and Harrison weren't sure if it would be possible to turn the human arm into a virtual keypad. The pair tried clipping sensors to the ends of peoples' fingers and other strange configurations that made users feel like cyborgs.
"We spent a lot of nights in the lab tapping on our arms and wondering if this would ever happen," Harrison said.

But the most profound achievement of Skinput is proving that the human body can be used as a sensor, he said.

Morris believes Skinput will make computing accessible to people in a way that never would have been possible before.

With Skinput, "literally, computing is always available," he said.

A person might walk toward their home, Harrison said, tap their palm to unlock the door and then tap some virtual buttons on their arms to turn on the TV and start flipping through channels.

"It's almost like magic," he said.

To download the research article on Skinput  Click Here

Video


Friday 14 October 2011

GTA 3 Coming to Android, iOS "This Fall"

Rockstar is bringing its classic Grand Theft Auto III game to specific iOS and Android devices, possibly next week.

Thursday Rockstar Games said that Grand Theft Auto III will be heading to select Android and iOS devices sometime "this fall." However, there's a good chance the game will be released on October 22, as that's the date the original Grand Theft Auto III game landed on the PlayStation 2, Xbox, Windows PC and Mac OS back in 2001.


"10 years ago, this month, the revolutionary open-world epic Grand Theft Auto III was released to the world – a game that set players loose as a small-time criminal at the bottom of the food chain in Liberty City, a sprawling metropolis where anything can happen – and probably will," the studio said Thursday.

For now the game is slated to land on eleven devices: the iPad 2 and iPhone 4S for Apple's iOS, the Droid X2, HTC Evo 2, LG Optimus X2, Motorola Atrix and Samsung Galaxy S2 for Android smartphones front, and the Acer Iconia, Asus Eee Pad, Motorola Zoom and Samsung Galaxy Tab 10.1 for Android tablets.

Rockstar also said that beginning Thursday, a limited-edition action figure of lead character Claude, created by collectible manufacturer Sideshow, will be available for pre-order in limited quantities at the Rockstar Warehouse. This figure costs $149.99, but Social Club members have an opportunity to get one for free. Head here and fill out the entry form by this Sunday October 16th for a chance to be one of three lucky winners.

Radiation hotspot in Tokyo linked to mystery bottles

A radiation hotspot has been detected in Tokyo seven months into Japan's nuclear crisis, but local officials said on Thursday high readings appeared to be coming from mystery bottles stored under a house, not the tsunami-crippled Fukushima atomic plant.



The Fukushima Daiichi nuclear power plant, struck by a devastating quake and tsunami in March, has released radiation into the atmosphere that has been carried by winds, rain and snow across eastern Japan.

Officials in Setagaya, a major residential area in Tokyo about 235 km (150 miles) southwest of the plant, said this week it found a radioactive hotspot on a sidewalk near schools, prompting concerns in the country's most populated area far from the damaged nuclear plant.

The radiation measured as much as 3.35 microsieverts per hour on Thursday, higher than some areas in the evacuation zone near the Fukushima plant, the center of the world's worst nuclear disaster since Chernobyl 25 years ago.

But the local government found several bottles under the floor of a nearby house emitting high levels of radiation.

"A measuring device, when pointed at them, showed very high readings. Radiation levels were even exceeding the upper limit for the device," Setagaya Mayor Nobuto Hosaka told a news conference.

Officials from the Education Ministry are now looking into the matter, including the contents of the bottles.

Public broadcaster NHK said no one had been living in the house in question.

The city of Funabashi, near Tokyo, said that a citizens' group had measured a radiation level of 5.8 microsieverts per hour at a park, but that the city's own survey showed the highest reading at the park was a quarter of that level.

Radiation levels in the 20 km radius evacuation zone around the Fukushima Daiichi plant ranged from 0.5 to 64.8 microsieverts per hour, government data showed this week.

About 80,000 residents have evacuated this zone. A microsievert quantifies the amount of radiation absorbed by human tissue.

In Yokohama, also near Tokyo, radioactive strontium-90, which can cause bone cancer and leukemia, was detected in soil taken from an apartment rooftop, media reported.
Strontium has been detected within an 80 km zone around the Fukushima Daiichi plant, but this is the first time it has been found in an area so far away, local media added.

Radiation exposure from natural sources in a year is about 2,400 microsieverts on average, the U.N. atomic watchdog says.

Japan's education ministry has set a standard allowing up to 1 microsievert per hour of radiation in schools while aiming to bring it down to about 0.11 microsievert per hour.


Posted by : Faran

'Robot Biologist' Solves Complex Problem from Scratch


First it was chess. Then it was Jeopardy. Now computers are at it again, but this time they are trying to automate the scientific process itself.


An interdisciplinary team of scientists at Vanderbilt University, Cornell University and CFD Research Corporation, Inc., has taken a major step toward this goal by demonstrating that a computer can analyze raw experimental data from a biological system and derive the basic mathematical equations that describe the way the system operates. According to the researchers, it is one of the most complex scientific modeling problems that a computer has solved completely from scratch.
The paper that describes this accomplishment is published in the October issue of the journal Physical Biology and is currently available online.

The work was a collaboration between John P. Wikswo, the Gordon A. Cain University Professor at Vanderbilt, Michael Schmidt and Hod Lipson at the Creative Machines Lab at Cornell University and Jerry Jenkins and Ravishankar Vallabhajosyula at CFDRC in Huntsville, Ala.

The "brains" of the system, which Wikswo has christened the Automated Biology Explorer (ABE), is a unique piece of software called Eureqa developed at Cornell and released in 2009. Schmidt and Lipson originally created Eureqa to design robots without going through the normal trial and error stage that is both slow and expensive. After it succeeded, they realized it could also be applied to solving science problems.

One of Eureqa's initial achievements was identifying the basic laws of motion by analyzing the motion of a double pendulum. What took Sir Isaac Newton years to discover, Eureqa did in a few hours when running on a personal computer.

In 2006, Wikswo heard Lipson lecture about his research. "I had a 'eureka moment' of my own when I realized the system Hod had developed could be used to solve biological problems and even control them," Wikswo said. So he started talking to Lipson immediately after the lecture and they began a collaboration to adapt Eureqa to analyze biological problems.

"Biology is the area where the gap between theory and data is growing the most rapidly," said Lipson. "So it is the area in greatest need of automation."

Software passes test

The biological system that the researchers used to test ABE is glycolysis, the primary process that produces energy in a living cell. Specifically, they focused on the manner in which yeast cells control fluctuations in the chemical compounds produced by the process.

The researchers chose this specific system, called glycolytic oscillations, to perform a virtual test of the software because it is one of the most extensively studied biological control systems. Jenkins and Vallabhajosyula used one of the process' detailed mathematical models to generate a data set corresponding to the measurements a scientist would make under various conditions. To increase the realism of the test, the researchers salted the data with a 10 percent random error. When they fed the data into Eureqa, it derived a series of equations that were nearly identical to the known equations.

"What's really amazing is that it produced these equations a priori," said Vallabhajosyula. "The only thing the software knew in advance was addition, subtraction, multiplication and division."

Beyond Adam

The ability to generate mathematical equations from scratch is what sets ABE apart from Adam, the robot scientist developed by Ross King and his colleagues at the University of Wales at Aberystwyth. Adam runs yeast genetics experiments and made international headlines two years ago by making a novel scientific discovery without direct human input. King fed Adam with a model of yeast metabolism and a database of genes and proteins involved in metabolism in other species. He also linked the computer to a remote-controlled genetics laboratory. This allowed the computer to generate hypotheses, then design and conduct actual experiments to test them.

"It's a classic paper," Wikswo said.
In order to give ABE the ability to run experiments like Adam, Wikswo's group is currently developing "laboratory-on-a-chip" technology that can be controlled by Eureqa. This will allow ABE to design and perform a wide variety of basic biology experiments. Their initial effort is focused on developing a microfluidics device that can test cell metabolism.

"Generally, the way that scientists design experiments is to vary one factor at a time while keeping the other factors constant, but, in many cases, the most effective way to test a biological system may be to tweak a large number of different factors at the same time and see what happens. ABE will let us do that," Wikswo said.

The project was funded by grants from the National Science Foundation, National Institute on Drug Abuse, the Defense Threat Reduction Agency and the National Academies Keck Futures Initiative.


Posted by : Faran Ali

Thursday 13 October 2011

Microsoft hopes to storm market with Mango launch

Dubai: Microsoft pins high hopes on the Windows Phone 7.5 to regain lost ground as the operating system competition enters a new phase.

"With Windows Phone, Microsoft has looked at the consumer experience as centric and in an absolutely fresh way. The system is stylish, innovative and one that seamlessly integrates the most sought-after user experiences such as search, gaming, e-mail and social networks across Bing, Office, Internet Explorer 9, Xbox Live, Office 365, Facebook, Twitter and much more including cloud service," Gustavo Fuchs, director of mobility for Middle East and Africa, Microsoft, told Gulf News in an exclusive interview.

Microsoft, which has entered an agreement with Nokia to launch Windows Phone 7.5, also known as Mango, said the conventional application icons have been replaced by Live Tiles on the start screen which comes to life with real-time updates from the web such as news, appointments or the status of friends.

Windows launched the first Windows Phone 7 in last November.

He said Acer will be the first vendor to launch the new operating system in this region on the Allegro handset before the end of the year ahead of Nokia.

The main screen of the phone is divided into six main hubs. The key features are threads, which enable users to switch between texts, Facebook chat and Windows Live messenger linked inbox where consumers can see multiple e-mail accounts in one inbox. Built-in voice-to-text and text-to-voice support system also enable hands-free texting and chatting.

He said HTC, Samsung, LG, Acer and Nokia are the main vendors launching the new operating system.

"Windows Phone will benefit from the partnership between Nokia and Microsoft to successfully enter lower tiers of the market, also leveraging Nokia's ability to maintain its position in markets where it is traditionally strong," said Luis Portela, analyst-at-large at Pyramid Research.

He said Mango will become the dominant platform by 2015, followed closely by Android and Apple. The competition will consolidate the operating ecosystem among the four big platforms — Android, Windows Phone, Apple iOS and BlackBerry OS.

Traditionally strong

In the Middle East and Africa, Portela said that Symbian will be the leader for the next couple of years, as customers in the region are loyal to Nokia and will take time for Microsoft to gain market share. The competition will be between Android, RIM and Apple.

According to Annette Zimmermann, Principal Analyst, Consumer Markets and Technology at Gartner Inc, Symbian's market share in MEA is eroding and in the second quarter of this year it had a market share of 41.3 per cent compared to 87.1 per cent in the second quarter of last year.

RIM had a market share of 31.4 per cent compared to 4.6 per cent in the second quarter of last year while Android had 14 per cent compared to two per cent in the second quarter of last year and iOS had 11.1 per cent compared to 2.5 per cent during the same period last year.
She said globally, Nokia's market share fell from 41 per cent to 22.1 per cent in the second quarter of this year while Android's market share rose from 17.2 per cent to more than 43 per cent in the second quarter of this year.

Microsoft's market share fell from 4.9 per cent to 1.6 per cent in the second quarter of this year and in the region, Microsoft had less than one per cent in the second quarter of this year.
According to Alex Bibi, Mobile Solutions Manager for Middle East and North Africa, "The apps market is crucial for the growth of Windows Phone. We have around 36,000 applications and more than 25 Arabic apps in a short period of time and by the way we have overtaken BlackBerry in terms of apps."

Accelerator

According to Chad Brown, co-founder and partner of identitymine, a US-based firm developing apps for top operating systems, the Windows phone offers a great opportunity for developers and the interface is easier and friendlier than Android and offers great user experience for end-users.

Fuchs said the apps are fully tested for viruses and go to the marketplace only if certified by Microsoft. He said the developers have already developed apps for Dewa, mParking and Gulf News, to name a few, through YallaApps on the new platform.

YallaApps, a regional Windows Phone 7 developer portal, is developed by Microsoft in association with Prototype Interactive.

Image search coming to eBay mobile apps a la Google Goggles


I wouldn’t say that I use it terribly often, but Google Goggles is an amazing little app. I take a picture of something — almost anything — and it will recognize what it is. If it’s a product, I can then do a quick online search for reviews and pricing information. eBay wants to do the same thing with its mobile apps.

eBay CEO John Donahoe announced at the Innovate eBay new developer conference that the company plans on rolling out image recognition technology in is mobile offerings before the end of the year. Once again, the core concept mirrors that of Google Goggles. You’re out in the world, you take a picture of something you want, and the eBay app starts searching through its online marketplace for similar products that you can bid on and buy.

Since this is eBay, the image search will be geared more toward buying products and related products. As such, snapping pictures of clothing and furniture may work a heck of a lot better (assuming they’ve got the algorithm nailed down) than with Google Goggles. The latter doesn’t recognize apparel all that well, for instance.

Android 'Ice Cream Sandwich' arrives Oct. 19 in Hong Kong

Computerworld - The big Google-Samsung event to launch Ice Cream Sandwich -- postponed at CTIA earlier this week -- will take place next Wednesday in Hong Kong, according to an invitation sent by the two companies.

It will be held Oct. 19 in Hong Kong at 10 a.m. local time, which translates to 10 p.m. ET on Tuesday in the U.S.

While Android 4.0 was always rumored to be the subject of the event, it now seems certain, since the invitation shows off an Ice Cream Sandwich in the shape of the familiar Android creature.
Also, recent reports pegged Verizon Wireless as the exclusive carrier for the Samsung Galaxy Nexus, which would run on 4G LTE and Android 4.0. (The Galaxy nexus is also known as the Nexus Prime.)

That device is expected to include a Texas Instruments OMAP 4460 dual-core 1.2GHz processor, putting it at the top of recent smartphones in speed. It's also expected to sport 1GB of memory and 32GB of internal storage, far ahead of most recent smartphones, and two cameras. One of the cameras is expected to be a 5-megapixel version, though that is below the 8-megapixel rear-facing camera in the iPhone 4S.

The iPhone 4S goes on sale Friday.

The somewhat impressionistic tickler advertisement for the Galaxy Nexus shows a curved device with a curved face.

A livestream of the Galaxy-Samsung event will be posted online.

Next week's event was delayed as a tribute to the death of Steve Jobs, Google officially said.
A Google official who asked not to be identified later said the delay was solely because of Jobs' death, not due to technical or patent concerns as some had suggested.

Apple wins Samsung tablet ban in Australian court


SYDNEY: A court slapped a temporary ban on the sale of Samsung Electronics’ latest computer tablet in Australia on Thursday, handing rival Apple another legal victory in the two firms’ global patent war.

Resolution of the case could take months — unless Samsung takes the potentially risky option of an expedited hearing — which, in the fast-moving industry, could mean the new Galaxy tablet is never launched in Australia.

The Galaxy is the hottest competitor to Apple’s iPad, which dominates global tablet sales.
“The ruling could further extend Apple’s dominance in the tablet market as it widens a sales ban of Samsung’s latest product,” said Lee Seung-woo, an analyst at Shinyoung Securities in Seoul.

Whilst the ruling is a blow for Samsung, the Australian market is not large. A more important legal battle was due to start on Thursday, when a Californian court begins hearing Apple’s bid to ban sales of Galaxy products in the United States.

The two technology firms have been locked in an acrimonious battle in 10 countries involving smartphones and tablets since April, with the Australian dispute centring on touch-screen technology used in Samsung’s new tablet.

The Federal Court in Sydney, in granting the temporary ban, ruled Samsung had a case to answer on at least two of Apple’s patents. The ban applies on sales of Samsung’s Galaxy 10.1 tablet until the same court rules on the core patent issue.

“I am satisfied that it is appropriate to grant an interim injunction, however I propose again the opportunity of an early final hearing on the issues presented in this application,” judge Annabelle Bennett told the court.

Intellectual property expert Florian Mueller said one of the patents at issue, a touchscreen heuristics patent, listed the late Steve Jobs as its first inventor, making it “emotionally but also strategically important to Apple.”

“None of the two patents will be at issue later today at a hearing in California on Apple’s motion for a US-wide preliminary injunction,” said Mueller. “But the Australian ruling nevertheless adds to Apple’s ‘copycat’ story and increases the likelihood of an injunction in the US“
Samsung shares fell after the ruling, and closed down 0.9 percent in Seoul, where the broader market finished up 0.8 percent.

The Australian ruling follows Apple’s successful legal move to block Samsung from selling its tablets in Germany and a case in the Netherlands that has forced Samsung to modify some smartphone models.

Samsung left open the option of appealing against the ruling and pointed out that it would continue to pursue its own patent claim against Apple involving Samsung’s wireless technology.
“We are disappointed with this ruling and Samsung will take all necessary measures, including legal action, in order to ensure our innovative products are available to consumers,” the company said in a statement.

The Australian court’s hearing of the patent issue could force Samsung to miss the Christmas gift-giving season there.

“It will take a long time to gather the expert evidence on how Samsung is or isn’t in breach of Apple’s patents, so without some sort of expedition, they are looking at a substantial time out of the market,” said Nathan Mattock, a telecoms intellectual property lawyer at Marque Lawyers in Sydney.

In her ruling, judge Bennett offered Samsung the opportunity of a quick final ruling on the patent dispute.

But Samsung has so far been reluctant to agree to an expedited Australian hearing, despite the risk of missing out on Christmas sales, because it says it needs time to prepare a proper defense against Apple’s case.

In short, Samsung has indicated that missing Christmas in Australia could be less of a problem for the company than rushing its defense and risking defeat on a key patent ruling.


Samsung can appeal against the decision on the temporary ban within 14 days of the release of the written judgment, due on Friday.

Windows 8’s Task Manager Is Surprisingly Awesome

Task Manager! Not exactly a nerve-stimulating tech term. In fact, it's a pretty dreaded area—the window you poke around in when your PC's in crisis. Part of the headache is poor design. Not anymore. Windows 8's looks stellar.


Microsoft has stripped away all the insane, obscure bullshit. No more dizzying cascade of ASusUSAUDNHOST.exe. No more endless, unsorted processes. When you first open Windows 8's Task Manager, all you see is your open applications. The most immediate similarity is to OS X's force quit menu—and it's a system that both looks good and makes sense. More often than not, what's clogging up your CPU is a frozen program that you need to kill, not some exotic .exe out of Hades.

But what if you do need to dig deeper? Sometimes those awful system processes need to be chewed through. No problem—click More Details, and you'll have them listed before you. But now it's not a pile of file vomit. Microsoft's not only grouped associated processes together, but given them "friendly" names that actually give you a clue of what their function is. Not just a string of characters. If you need more information, only a click will separate you from a web search of any given process.

Coolest of all, perhaps? Heat maps! The applications, windows, and processes that are eating up the most of your computer's power glow hottest, allowing you to visually lock on to problematic programs. And nuke them from orbit. Just more proof that Microsoft gives a giant damn about design more than ever. [MSDN Blog]