iOS 10.2.1 is all about fixing bugs and patching security holes

Enlarge (credit: Andrew Cunningham) After several weeks of beta testing, Apple has released iOS 10.2.1 to the public today. The update is fairly minor and includes no major improvements to core iOS apps or features. The release notes say only that it fixes bugs and includes security improvements. The security page for the update lists a number of vulnerabilities in the kernel, WebKit, and the Contacts app that have all been fixed. Apple also addressed a bug that could allow attackers  to briefly access the home screen on an Activation Locked iPad that had been reset . The update is available for everything that runs iOS 10: the iPhone 5 and newer, the fourth-generation iPad and newer, the iPad Mini 2 and newer, both iPad Pros, and the sixth-generation iPod Touch. Small updates for watchOS 3 and tvOS 10 , both of which are iOS-based, have been released as well. The release of iOS 10.2.1 clears the deck for betas of iOS 10.3, which is likely to be the final major revision to iOS 10 before work begins in earnest on iOS 11. We don’t know much about what Apple plans to include in this next update, but older rumors suggest that it may renew focus on the iPad in advance of some new tablet launches in the spring. Hope also springs eternal about a dark mode for iOS. Read on Ars Technica | Comments

View article:
iOS 10.2.1 is all about fixing bugs and patching security holes

Apple is reportedly reinventing the iPhone’s fingerprint reader

Future iPhones may revolve around more than just an eye-catching curved display . KGI Securities analyst Ming-Chi Kuo, who frequently (though not always) has a knack for hardware scoops, believes that Apple is designing a whole new Touch ID fingerprint reader for future iPhones and iPads. In order for Apple to virtually eliminate bezels, it needs a reader that sits under the screen — and that means a brand new optical sensor. Development is underway, the analyst says, but development is still early enough that the technology might not be ready in time for the 2017 iPhone. You might not even need a fingerprint sensor in the future, though. Kuo claims that Apple is looking at using face recognition (not just iris recognition) as a part of the next iPhone’s features, and may even scrap Touch ID in the long run. Face recognition isn’t new (just ask anyone using Android since 4.0 ), but it would have to be advanced if people are going to ditch fingerprint reading entirely. It couldn’t be fooled by a photo , for instance, and would have to be both very fast and adaptable to a wide range of conditions. You don’t want to have to enter your PIN just because it’s too dark. Biometrics might not be the only area getting an overhaul thanks to the reported new screen. Kuo understands that the iPhone 7’s existing approach to 3D Touch won’t work with the next iPhone’s curved OLED panel, prompting a switch to a “film sensor.” The change would lead to greater sensitivity and more pressure levels, so you might not have to jab the screen quite so authoritatively as you do today. As always, it’s important to take these claims with a grain of salt. Analysts can have the inside track on future products thanks to suppliers, but they may have incomplete info or discuss features that are subject to change. Don’t be alarmed if these features don’t make the cut, or if they show up in ways you didn’t expect. If there’s any credibility to the reports, though, unlocking and interacting with your iPhone may be much easier in the near future. Source: 9to5Mac (1)

Continue reading here:
Apple is reportedly reinventing the iPhone’s fingerprint reader

FTC Dismantles Two Huge Robocall Organizations

Billions of robocalls came from two groups selling extended auto warranties, SEO services, and home security systems over the last seven years — many to numbers on the “Do Not Call” list — but this week the Federal Trade Commission took action. Trailrunner7 shares this report from OnTheWire: Continuing its campaign against phone fraud operations, the FTC has dismantled two major robocall organizations… They and many of their co-defendants have agreed to court-ordered bans on robocall activities and financial settlements… The FTC and the FCC both have been cracking down on illegal robocall operations recently. The FCC has formed a robocall strike force with the help of carriers and also has signed an agreement to cooperate with Canadian authorities to address the problem. “The law is clear about robocalls, ” says one FTC executive. “If a telemarketer doesn’t have consumers’ written permission, it’s illegal to make these calls.” Read more of this story at Slashdot.

More:
FTC Dismantles Two Huge Robocall Organizations

Carbon nanotube transistors push up against quantum uncertainty limits

Enlarge / A diagram of the transistors built in this paper, next to a false-colored image of the actual hardware. Atomically thin materials like graphene and carbon nanotubes have the potential to provide significant benefits compared to today’s electronics, like smaller features, lower operating voltages, and more efficient performance. So, even though we’re struggling to figure out how to use them in bulk manufactured electronics, lots of organizations are spending money, brains, and time to work that out. Note the phrasing above—potential. Since it’s been incredibly hard to make transistors based on these materials, we aren’t entirely sure how all of them will behave. A group of researchers from China’s Peking University decided it was time to cut down on some of the uncertainty. The answer they came up with? Transistors made with carbon nanotubes and graphene perform so well that they’re pushing up against the fundamental limits set by Heisenberg’s uncertainty principle. That still doesn’t mean we can make a chip full of these things, but it does show it’s worth the continued effort to try to figure out how. Read 10 remaining paragraphs | Comments

More:
Carbon nanotube transistors push up against quantum uncertainty limits

Nintendo’s Fire Emblem Heroes will launch on Android before iOS

iOS users will have to wait longer for Nintendo’s next major smartphone game release. Nintendo’s push towards smartphone gaming will continue on February 2 with the launch of Fire Emblem Heroes , a touch-only take on the company’s longtime tactical RPG series—and possibly the company’s most micro-transaction driven game yet. Like Super Mario Run before it, Fire Emblem Heroes will have a period of platform exclusivity—but in a surprise twist, that exclusivity is reversed. Android users will get first crack at Heroes on that release date, while iOS users have been told their version is coming “soon.” (For an estimate of how long the left-behind platform might have to wait, remember:  Super Mario Run has yet to launch on Android over a month after its iOS release.) During this announcement, Nintendo did not mention  Animal Crossing , the other series set to receive a smartphone port in the near future. Read 5 remaining paragraphs | Comments

More:
Nintendo’s Fire Emblem Heroes will launch on Android before iOS

It’s shockingly easy to hijack a Samsung SmartCam camera

Enlarge Smart cameras marketed under the Samsung brand name are vulnerable to attacks that allow hackers to gain full control, a status that allows the viewing of what are supposed to be private video feeds, researchers said. The remote code-execution vulnerability has been confirmed in the Samsung SmartCam SNH-1011, but the researchers said they suspect other models in the same product line are also susceptible. The flaw allows attackers to inject commands into a Web interface built into the devices. The bug resides in PHP code responsible for updating a video monitoring system known as iWatch. It stems from the failure to properly filter malicious input included in the name of uploaded files. As a result, attackers who know the IP address of a vulnerable camera can exploit the vulnerability to inject commands that are executed with unfettered root privileges. “The iWatch Install.php vulnerability can be exploited by crafting a special filename which is then stored within a tar command passed to a php system() call,” the researchers wrote in a blog post published to the Exploitee.rs website. “Because the webserver runs as root, the filename is user supplied, and the input is used without sanitization, we are able to inject our own commands within the achieve root remote command execution.” Read 5 remaining paragraphs | Comments

Read more here:
It’s shockingly easy to hijack a Samsung SmartCam camera

Hackers Corrupt Data For Cloud-Based Medical Marijuana System

Long-time Slashdot reader t0qer writes: I’m the IT director at a medical marijuana dispensary. Last week the point of sales system we were using was hacked… What scares me about this breach is, I have about 30, 000 patients in my database alone. If this company has 1, 000 more customers like me, even half of that is still 15 million people on a list of people that “Smoke pot”… ” No patient, consumer, or client data was ever extracted or viewed, ” the company’s data directory has said. “The forensic analysis proves that. The data was encrypted — so it couldn’t have been viewed — and it was never extracted, so nobody has it and could attempt decryption.” They’re saying it was a “targeted” attack meant to corrupt the data rather than retrieve it, and they’re “reconstructing historical data” from backups, though their web site adds that their backup sites were also targeted. “In response to this attack, all client sites have been migrated to a new, more secure environment, ” the company’s CEO announced on YouTube Saturday, adding that “Keeping our client’s data secure has always been our top priority.” Last week one industry publication had reported that the outage “has sent 1, 000 marijuana retailers in 23 states scrambling to handle everything from sales and inventory management to regulatory compliance issues.” Read more of this story at Slashdot.

Read the original:
Hackers Corrupt Data For Cloud-Based Medical Marijuana System

Someone Is Trying to Sell Those Stolen Three-Screen Razer Laptops in China

Just a few days ago, Razer’s awesome Project Valerie laptops — the one with three 4K displays — were stolen. Now it looks like whoever stole them is trying to sell them. From a report: It turns out that the thief (or thieves) didn’t just nab one Project Valerie prototype. They actually got ahold of a pair. Razer CEO Min-Liang Tan understandably wants them back, really, really badly. The company was willing to offer $25, 000 to anyone who could offer information that led to the prototypes’ return. So where did the laptops end up? Somewhere behind the Great Wall, apparently. Whoever has them isn’t trying to quietly fence them in some dark Beijing alleyway, either. They’ve actually been listed on the immensely popular Chinese e-commerce site Taobao — where they were spotted by writers at Engadget Chinese and Wccftech. Read more of this story at Slashdot.

See the original article here:
Someone Is Trying to Sell Those Stolen Three-Screen Razer Laptops in China

Everything You Need To Know About The Upcoming 48-Volt Electrical Revolution In Cars

With each passing year, new cars get more complicated and high-tech. The new higher power requirements associated with these advancements—along with ever-stricter emissions regulations—are why 48-volt electrical systems are spreading like wildfire, with experts expecting the tech to make its way into one-fifth of all… Read more…

Read more here:
Everything You Need To Know About The Upcoming 48-Volt Electrical Revolution In Cars

Hacker Steals 900 GB of Cellebrite Data

An anonymous reader shares a Motherboard report: Motherboard has obtained 900 GB of data related to Cellebrite, one of the most popular companies in the mobile phone hacking industry. The cache includes customer information, databases, and a vast amount of technical data regarding Cellebrite’s products. The breach is the latest chapter in a growing trend of hackers taking matters into their own hands, and stealing information from companies that specialize in surveillance or hacking technologies. Cellebrite is an Israeli company whose main product, a typically laptop-sized device called the Universal Forensic Extraction Device (UFED), can rip data from thousands of different models of mobile phones. That data can include SMS messages, emails, call logs, and much more, as long as the UFED user is in physical possession of the phone. Read more of this story at Slashdot.

Read this article:
Hacker Steals 900 GB of Cellebrite Data