Android 7.1.2 leaves beta, arrives on Pixel and Nexus devices

After a lengthy beta period that began in January, Google released Android Nougat 7.1.2 on Monday. Images and OTAs  are up on Google’s factory image page , and a rollout has started to creep across the Google device landscape. Google is releasing the update for the Pixel, Pixel XL, Pixel C, Nexus 6P, 5X, and Nexus Player. As we reported during the beta release, 7.1.2 marks the end of the line for the Nexus 6 and Nexus 9, Google’s flagship devices from 2014. Read 6 remaining paragraphs | Comments

See more here:
Android 7.1.2 leaves beta, arrives on Pixel and Nexus devices

OPM Says 5.6 million Fingerprints Stolen In Cyberattack

mschaffer writes: The Office of Personnel Management data breach that happened this summer just got a little worse. The OPM now says that 5.6 million people’s fingerprints were stolen as part of the hacks. The Washington Post reports: “That’s more than five times the 1.1 million government officials estimated when the cyberattacks were initially disclosed over the summer. However, OPM said Wednesday the total number of those believed to be caught up in the breaches, which included the theft of the Social Security numbers and addresses of more than 21 million former and current government employees, remains the same.” Read more of this story at Slashdot.

Read More:
OPM Says 5.6 million Fingerprints Stolen In Cyberattack

Spyware Demo Shows How Spooks Hack Mobile Phones

An anonymous reader writes: Joe Greenwood, of cybersecurity firm 4Armed, recently gave a live demonstration of some of Hacking Team’s leaked spyware to the BBC. Tracking Bitcoin payments, recording audio from the microphone of a locked device, and secretly gaining control of an infected phone’s camera are just a few of the software’s capabilities. The BBC reports: “Both Mr Greenwood and 4Armed’s technical director, Marc Wickenden, said they were surprised by the sleekness of the interface. Both point out, though, that customers could be paying upwards of £1m for the software and would expect it to be user-friendly, especially if it was intended for use by law enforcers on the beat. For the tracked user, though, there are very few ways of finding out that they are being watched. One red flag, according to Mr Greenwood, is a sudden spike in network data usage, indicating that information is being sent somewhere in the background. Experienced spies, however, would be careful to minimize this in order to remain incognito.” Read more of this story at Slashdot.

View the original here:
Spyware Demo Shows How Spooks Hack Mobile Phones

The New Google Glass Is All Business

An anonymous reader writes: Google scrapped an early version of its smart glasses in January, but has developed another model just for businesses. The company hopes to get this newest version of Glass in the hands of healthcare, manufacturing and energy industry professionals by this fall. Recode reports: “The new model can fold up like a traditional pair of glasses and is more rugged for outdoor use. However, unlike most other smart glasses, it still sports a small screen to the upper right of the user’s vision, rather than displaying an image in the center of one’s view like the ODG R7 or Microsoft HoloLens.” Read more of this story at Slashdot.

Link:
The New Google Glass Is All Business

Google Accidentally Reveals Data On ‘Right To Be Forgotten’ Requests

Colin Castro points out an article from The Guardian, who noticed that Google’s recent transparency report contained more data than intended. When perusing the source code, they found data about who was making requests for Google to take down links under the “right to be forgotten” law. The data they found covers 75% of all requests made so far. Less than 5% of nearly 220, 000 individual requests made to Google to selectively remove links to online information concern criminals, politicians and high-profile public figures, the Guardian has learned, with more than 95% of requests coming from everyday members of the public. … Of 218, 320 requests to remove links between 29 May 2014 and 23 March 2015, 101, 461 (46%) have been successfully delisted on individual name searches. Of these, 99, 569 involve “private or personal information.” Only 1, 892 requests – less than 1% of the overall total – were successful for the four remaining issue types identified within Google’s source code: “serious crime” (728 requests), “public figure” (454), “political” (534) or “child protection” (176) – presumably because they concern victims, incidental witnesses, spent convictions, or the private lives of public persons. Read more of this story at Slashdot.

Read More:
Google Accidentally Reveals Data On ‘Right To Be Forgotten’ Requests

How Etak Built a Car Navigation System In 1985

harrymcc writes: Thirty years ago, a startup called Etak released the Navigator, an in-car navigation system. It provided turn-by-turn driving directions despite the fact that GPS did not exist, and stored its maps–which Etak had to create itself–on cassette tapes. And some of its data and technologies are still in use in today’s navigation apps. Over at Fast Company, Benj Edwards tells this amazing story. I remember reading about (and lusting over) this system back then, in the much-missed DAK catalog. Read more of this story at Slashdot.

Taken from:
How Etak Built a Car Navigation System In 1985

NIST Workshop Explores Automated Tattoo Identification

chicksdaddy writes: Security Ledger reports on a recent NIST workshop dedicated to improving the art of automated tattoo identification. It used to be that the only place you’d commonly see tattoos was at your local VA hospital. No more. In the last 30 years, body art has gone mainstream. One in five adults in the U.S. has one. For law enforcement and forensics experts, this is a good thing; tattoos are a great way to identify both perpetrators and their victims. Given the number and variety of tattoos, though, how to describe and catalog them? Clearly this is an area where technology can help, but it’s also one of those “fuzzy” problems that challenges the limits of artificial intelligence. The National Institute of Standards and Technology (NIST) Tattoo Recognition Technology Challenge Workshop challenged industry and academia to work towards developing an automated image-based tattoo matching technology. Participating organizations in the challenge used a FBI -supplied dataset of thousands of images of tattoos from government databases. They were challenged to develop methods for identifying a tattoo in an image, identifying visually similar or related tattoos from different subjects; identifying the same tattoo image from the same subject over time; identifying a small region of interest that is contained in a larger image; and identifying a tattoo from a visually similar image like a sketch or scanned print. Read more of this story at Slashdot.

More:
NIST Workshop Explores Automated Tattoo Identification

Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

An anonymous reader writes: The Linux 4.1 kernel has been announced and its release brings expanded features for the Linux kernel including EXT4 file-system encryption, open-source GeForce GTX 750 support, performance improvements for Intel Atom / Bay Trail hardware, RAID 5/6 improvements, and other additions. Read more of this story at Slashdot.

Read more here:
Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

‘Brain-to-Text’ Interface Types Thoughts of Epileptic Patients

Jason Koebler writes with a link to Motherboard’s article about research from the Schalk Lab of Albany, New York, where researchers “have just demonstrated for the first time that it’s possible to turn a person’s thoughts into a legible phrase using what they’re calling a “brain-to-text” interface, ” writing “It’s still still the early days of this technology—electrodes had to be placed directly on the brain and the ‘dictionary’ of phrases was limited. Still, brainwaves of thought patterns were turned into text at a rate much better than chance.” Read more of this story at Slashdot.

Read More:
‘Brain-to-Text’ Interface Types Thoughts of Epileptic Patients