Google launches Nearby for Android (again), to help you discover things that are… nearby

Google launches Nearby for Android (again), to help you discover things that are… nearby

Google is rolling out an update for most phones running Android 4.4 or later which is designed to let your phone display notifications from nearby items.

It’s called Nearby, and Google says it could let you know when there are apps or Android features you may want to take advantage of. For example, if you’re near a Google Cast device or Android Wear smartwatch, you may see a notification asking if you want to set up those devices from your phone.

Continue reading Google launches Nearby for Android (again), to help you discover things that are… nearby at Liliputing.

Google launches Nearby for Android (again), to help you discover things that are… nearby

Google is rolling out an update for most phones running Android 4.4 or later which is designed to let your phone display notifications from nearby items.

It’s called Nearby, and Google says it could let you know when there are apps or Android features you may want to take advantage of. For example, if you’re near a Google Cast device or Android Wear smartwatch, you may see a notification asking if you want to set up those devices from your phone.

Continue reading Google launches Nearby for Android (again), to help you discover things that are… nearby at Liliputing.

Why it’s doubtful that 32 million Twitter passwords are really circulating online

It’s doubtful that all of them are usable against active Twitter accounts.

(credit: Matthew Keys)

The jury is still out, but at this early stage, there's good reason to doubt the legitimacy of claims that more than 32 million Twitter passwords are circulating online.

The purported dump went live on Wednesday night on LeakedSource, a site that bills itself as a breach notification service. The post claimed that the 32.88 million Twitter credentials contain plaintext passwords and that of the 15 records LeakedSource members checked, all 15 were found to be valid. Twitter Trust and Info Security Officer Michael Coates has said his team investigated the list, and he remains "confident that our systems have not been breached."

Lending credibility to Coates's claim, Twitter has long used the bcrypt hash function to store hashes. Bcrypt hashes are so slow and computationally costly to crack that it would have required infeasible amounts of time and effort for anyone to decipher the underlying plaintext. As of press time, there were no reports of a mass reset of Twitter users' passwords, either.

Read 3 remaining paragraphs | Comments

Nationwide blackout in Kenya caused by marauding monkey

Monkey dropped onto a transformer, knocking 180MW hydro plant offline for four hours.

The adventurous vervet monkey, sitting on a transformer at Gitaru power station. Little did he know that millions of Kenyans were suffering as a result of his curiosity. (credit: KenGen)

A monkey, falling onto a transformer at the Gitaru hydroelectric power station in Kenya, caused a nationwide blackout on Tuesday.

KenGen, the operator of Gitaru dam and Kenya's largest electricity producer, posted a photo on Facebook of the dastardly monkey still perched atop the transformer. Using our crack zoological skills, it appears to be a vervet monkey, which is native to Kenya.

The monkey climbed onto the roof of the Gitaru power station and then dropped onto a transformer, tripping it. This then caused the other transformers to overload and trip, which in turn caused the whole power station to go offline. The loss of 180MW from the hydro plant was enough to cause a national blackout, according to KenGen.

Read 4 remaining paragraphs | Comments

Businesses can finally spend 50 percent too much for the HTC Vive

Pricey, industry-focused VR solution comes with warranty, “customer support line.”

Don't you want your business to be as futuristic as this stock art? Buy today! (credit: HTC)

Virtual reality can be used for much more than some interesting gaming experiments, and HTC wants users in "business and commercial environments" to be able to take advantage of its Vive VR hardware. Thus, the company announced its new Vive Business Edition (Vive BE), a full Vive system being sold for the low, low price of $1,200—or 50 percent more than the $800 consumer Vive.

Despite the increased cost, there doesn't seem to be anything different about the physical hardware you get with the Vive BE. The "business" system still comes with a headset, two controllers, two base stations, and all the necessary cables and face cushions you could need. All that extra money will instead help pay for a 12-month limited warranty and a "dedicated Vive Business Edition customer support line" (as well as "commercial licensing," if that's something your lawyer says you need for some reason).

That support line might be useful when one of your employees can't figure out how to plug the headphones into the little dongle on top of the headset, we suppose. Still, the $400 markup is a pretty dear price to pay for support on a system that's already pretty user-friendly. The "limited warranty" doesn't even cover things like "physical damage," "rough handling," or "accidents" that might arise from the headset being exposed to the general public in a business setting.

Read 1 remaining paragraphs | Comments

Rockchip RK3399 hexa-core chip coming soon to tablets, VR headsets and more

Rockchip RK3399 hexa-core chip coming soon to tablets, VR headsets and more

Rockchip’s RK3399 processor is a hexa-core chip with two ARM Cortex-A72 CPU cores and four Cortex-A53 cores. It features Mali-T864 graphics, support for 4K video playback, HDMI 2.0 output, and Rockhip says it’s designed to work in a range of devices including tablets, notebooks, TV boxes, and VR headsets.

The company first unveiled the RK3399 chip at CES in January, but when Charbax from ARMDevices caught up with the Chinese chip maker recently, he discovered that the processor is ready for mass production, which means we could see the first RK3399-powered devices in the coming months.

Continue reading Rockchip RK3399 hexa-core chip coming soon to tablets, VR headsets and more at Liliputing.

Rockchip RK3399 hexa-core chip coming soon to tablets, VR headsets and more

Rockchip’s RK3399 processor is a hexa-core chip with two ARM Cortex-A72 CPU cores and four Cortex-A53 cores. It features Mali-T864 graphics, support for 4K video playback, HDMI 2.0 output, and Rockhip says it’s designed to work in a range of devices including tablets, notebooks, TV boxes, and VR headsets.

The company first unveiled the RK3399 chip at CES in January, but when Charbax from ARMDevices caught up with the Chinese chip maker recently, he discovered that the processor is ready for mass production, which means we could see the first RK3399-powered devices in the coming months.

Continue reading Rockchip RK3399 hexa-core chip coming soon to tablets, VR headsets and more at Liliputing.

Ex-Verfassungsschutzpräsident: Veraltete Analysesoftware für 45 Millionen gekauft

Der Verfassungsschutz hat für viel Geld eine Software zur Auswertung von Datenströmen gekauft. Da sie schon beim ersten Einsatz technisch überholt war, kam ein Angebot der NSA sehr gelegen. (NSA, Internet)

Der Verfassungsschutz hat für viel Geld eine Software zur Auswertung von Datenströmen gekauft. Da sie schon beim ersten Einsatz technisch überholt war, kam ein Angebot der NSA sehr gelegen. (NSA, Internet)

There’s a new entry-level Tesla Model S, and it’s even cheaper

Tesla unveils new entry-level Model S 60, available in July.

On Thursday, Tesla filled the gap in its range with a new entry-level Model S 60. The car starts at $66,000 before tax incentives. Tesla previously discontinued the Model S 70 due to lack of demand, but this new model is several thousand dollars cheaper. Once rebates and gas savings factor in, the company says "the effective cost of owning Model S 60 comes to about $50k."

The Model S 60 gets a 60kWh battery, good for 0-60mph (0-96km/h) in 5.5 seconds and 200 miles of range between charges. It comes with the full suite of driver assists, and if you decide at some point you want more juice, a software upgrade will unlock the battery to 75kWh.

Tesla's approach to selling electric vehicles has been fascinating. Launching straight into the upper end of the market with the Model S was clever, and it laid the groundwork for the Model 3 mass-market follow-up. With the top and bottom ends covered (reminiscent of Shaka Zulu's "Buffalo Horns" strategy perhaps?), Tesla has moved in for the kill at the middle. This new Model S fits nicely between the $35,000 Model 3 and $89,500 Model S 90D, and the price is aimed squarely at buyers of mid-level luxury cars like the A6, 5 Series, and E-Class.

Read on Ars Technica | Comments

Daala-Entwickler: Freie Videocodecs teilweise besser als H.265

Ein Daala-Entwickler berichtet vom Fortschritt des freien Videocodecs, der schon jetzt teilweise besser sein soll als HEVC alias H.265. Einige der in Daala getesteten Neuerungen werden außerdem Teil des neuen Codecs AV1 der Alliance for Open Media. (Video-Codec, Film)

Ein Daala-Entwickler berichtet vom Fortschritt des freien Videocodecs, der schon jetzt teilweise besser sein soll als HEVC alias H.265. Einige der in Daala getesteten Neuerungen werden außerdem Teil des neuen Codecs AV1 der Alliance for Open Media. (Video-Codec, Film)

More corporate shared folders in cloud filled with malware, research finds

In related studies: Ice is cold; fire still hot.

About 11 percent of shared cloud folders contain nasty surprises, according to recent research.

Internet file sharing has long been a prime route for malware to spread. The situation is one of the reasons (aside from the exposure of proprietary data) that many companies restrict the use of cloud file sharing to corporate-approved systems. But it turns out that those enterprise cloud folders are just as bad. As more companies sanction the use of cloud applications for collaboration and sharing data—even just between individuals' computers and mobile devices—those cloud apps have increasingly become fertile ground for malware.

In a study based on data collected from millions of users over the first three months of 2016, cloud security company Netskope found that 11 percent of corporate-approved cloud applications harbored malware. That total more than doubled, up from just 4.1 percent in the previous quarter's data.The malware discovered included JavaScript exploits, droppers used to spread other malware, malicious embedded macros in document files, actual backdoor malware, spyware, and adware. Some mobile device malware was found as well.

All of the malware was found in file sharing applications, though only 26.2 percent of it appeared to be actually shared (whether internally to others in the affected company, externally with partners, or even publicly shared). That means the cloud folders were either infected because they were connected to a device exploited by malware, or the files were moved to the folders by the user.

Read 1 remaining paragraphs | Comments