×
China

Qualcomm Asks China To Ban the iPhone XS and XR (theverge.com) 53

After securing a win in court earlier this week to ban Apple's older phones, Qualcomm is trying to get the newer iPhones banned too. "According to the Financial Times, Qualcomm has now asked Chinese courts to issue an injunction that bans Apple from selling the iPhone XS, XS Max, and XR within the country due to the same case of possible patent infringement," reports The Verge. From the report: The new filing will escalate the companies' legal conflict in China, where Apple has so far ignored a court-ordered sales ban. Apple claims the ban only applied to phones running iOS 11 and earlier. Since its phones have now been updated to iOS 12, Apple believes they can remain on sale, and so it has continued to sell them. According to the Financial Times, the Chinese court's order doesn't specifically mention any version of Apple's operating system. That doesn't necessarily mean Apple is wrong, but it does mean that there's more to be hashed out.
Intel

Apple Is Making Its Own Modem To Compete With Qualcomm, Report Says (theverge.com) 80

An anonymous reader quotes a report from The Verge: Apple is apparently working on its own, in-house developed modem to allow it to better compete with Qualcomm, according to several new Apple job listings that task engineers to design and develop a layer 1 cellular PHY chip -- implying that the company is working on actual, physical networking hardware. Two of the job posts are explicitly to hire a pair of cellular modem systems architects, one in Santa Clara and one in San Diego, home of Qualcomm. That's alongside several other job postings Apple has listed in San Diego for RF design engineers. The Information, which spotted the first job posting, cites sources that go a step further, claiming that Apple is not only potentially working to develop its own modem, but is in fact specifically targeting it for use in future iPhones, with the company looking to leave longtime partner Intel behind in favor of its own, in-house solution.

According to The Information's report, the new modem would still be years away, with even Apple's purported 5G iPhone slated for 2020 using Intel's in-development 5G modem instead. It makes sense logically, too -- if Apple is only just starting to hire now, it'll take at least a few years before it'll actually be ready to ship hardware. But the move would have big ramifications for the mobile space, particularly for Qualcomm and Intel, two of the biggest modem suppliers in the world.

Privacy

Border Agents Fail To Delete Personal Data of Travelers After Electronic Searches, Watchdog Says (gizmodo.com) 89

The Department of Homeland Security's internal watchdog, known as the Office of the Inspector General (OIG) found that the majority of U.S. Customs and Border Protection (CBP) agents fail to delete the personal data they collect from travelers' devices. Last year alone, border agents searched through the electronic devices of more than 29,000 travelers coming into the country. "CBP officers sometimes upload personal data from those devices to Homeland Security servers by first transferring that data onto USB drives -- drives that are supposed to be deleted after every use," Gizmodo reports. From the report: Customs officials can conduct two kinds of electronic device searches at the border for anyone entering the country. The first is called a "basic" or "manual" search and involves the officer visually going through your phone, your computer or your tablet without transferring any data. The second is called an "advanced search" and allows the officer to transfer data from your device to DHS servers for inspection by running that data through its own software. Both searches are legal and don't require a warrant or even probable cause -- at least they don't according to DHS. It's that second kind of search, the "advanced" kind, where CBP has really been messing up and regularly leaving the personal data of travelers on USB drives.

According to the new report [PDF]: "[The Office of the Inspector General] physically inspected thumb drives at five ports of entry. At three of the five ports, we found thumb drives that contained information copied from past advanced searches, meaning the information had not been deleted after the searches were completed. Based on our physical inspection, as well as the lack of a written policy, it appears [Office of Field Operations] has not universally implemented the requirement to delete copied information, increasing the risk of unauthorized disclosure of travelers' data should thumb drives be lost or stolen."
The report also found that Customs officers "regularly failed to disconnect devices from the internet, potentially tainting any findings stored locally on the device." It also found that the officers had "inadequate supervision" to make sure they were following the rules. There's also a number of concerning redactions. For example, everything from what happens during an advanced search after someone crosses the border to the reason officials are allowed to conduct an advanced search at all has been redacted.
Network

Eastern European Banks Were Attacked Via Backdoors Directly Connected To Local Networks, Report Finds (securelist.com) 43

An anonymous reader writes: Karspesky security researcher Sergey Golovanov writes about recent cybertheft incidents involving hardware backdoors planted by criminals. Each attack had a common springboard: an unknown device directly connected to the company's local network. In some cases, it was the central office, in others a regional office, sometimes located in another country. At least eight banks in Eastern Europe were the targets of the attacks, which caused damage estimated in the tens of millions of dollars. Hardware backdoors are cheap and immune to antivirus. A firmware modified OpenWrt based router can provide covert remote access, painless packet captures, and secure VPN connections with the flip of a switch. Will a flashlight and a ladder be common tools of computer security someday? After the cybercriminals entered a organization's building, connected a device to the local network and scanned the local network seeking to gain access to the resources, they proceeded to stage three. "Here they logged into the target system and used remote access software to retain access," writes Golovanov. "Next, malicious services created using msfvenom were started on the compromised computer. Because the hackers used fileless attacks (PDF) and PowerShell, they were able to avoid whitelisting technologies and domain policies. If they encountered a whitelisting that could not be bypassed, or PowerShell was blocked on the target computer, the cybercriminals used impacket, and winexesvc.exe or psexec.exe to run executable files remotely."
Encryption

Quantum Computers Pose a Security Threat That We're Still Totally Unprepared For (technologyreview.com) 193

An anonymous reader quotes a report from MIT Technology Review: The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A new report from the U.S. National Academies of Sciences, Engineering, and Medicine says we need to speed up preparations for the time when super-powerful quantum computers can crack conventional cryptographic defenses. The experts who produced the report, which was released today, say widespread adoption of quantum-resistant cryptography "will be a long and difficult process" that "probably cannot be completed in less than 20 years." It's possible that highly capable quantum machines will appear before then, and if hackers get their hands on them, the result could be a security and privacy nightmare.

Today's cyberdefenses rely heavily on the fact that it would take even the most powerful classical supercomputers almost unimaginable amounts of time to unravel the cryptographic algorithms that protect our data, computer networks, and other digital systems. But computers that harness quantum bits, or qubits, promise to deliver exponential leaps in processing power that could break today's best encryption. The report cites an example of encryption that protects the process of swapping identical digital keys between two parties, who use them to decrypt secure messages sent to one another. A powerful quantum computer could crack RSA-1024, a popular algorithmic defense for this process, in less than a day.
The U.S., Israel and others are working to develop standards for quantum-proof cryptographic algorithms, but they may not be ready or widely adopted by the time quantum computers arrive.

"[I]t will take at least a couple of decades to get quantum-safe cryptography broadly in place," the report says in closing. "If that holds, we're going have to hope it somehow takes even longer before a powerful quantum computer ends up in a malicious hacker's hands."
Security

Researchers Discover SplitSpectre, a New Spectre-like CPU Attack (zdnet.com) 48

An anonymous reader writes from a report via ZDNet: Three academics from Northeastern University and three researchers from IBM Research have discovered a new variation of the Spectre CPU vulnerability that can be exploited via browser-based code. The vulnerability, which researchers codenamed SplitSpectre, is a variation of the original Spectre v1 vulnerability discovered last year and which became public in January 2018. The difference in SplitSpectre is not in what parts of a CPU's microarchitecture the flaw targets, but how the attack is carried out. Researchers say a SplitSpectre attack is both faster and easier to execute, improving an attacker's ability to recover code from targeted CPUs. The research team says they were successfully able to carry out a SplitSpectre attack against Intel Haswell and Skylake CPUs, and AMD Ryzen processors, via SpiderMonkey 52.7.4, Firefox's JavaScript engine. The good news is that existing Spectre mitigations would thwart the SplitSpectre attacks.
Japan

Japan's Final Pager Provider To End Its Service In 2019 (bbc.com) 45

Tokyo Telemessage, Japan's last pager provider, has announced that it will end service to its 1,500 remaining users in September 2019. It will bring a national end to telecommunication beepers, 50 years after their introduction. The BBC reports: The once-popular devices are able to receive and show wireless messages. Users would then find a phone to call the sender back. Developed in the 1950s and 1960s, they grew in popularity in the 1980s. By 1996, Tokyo Telemessage had 1.2 million subscribers. However, the rise of mobile phones rendered the pager obsolete, and few remain worldwide. Emergency services, however, continue to use the reliable technology -- including in the UK.
Intel

Intel Sues Ex-Engineer For Trying To Steal 3D XPoint Technology On His Way To Micron (theregister.co.uk) 33

Intel has filed a lawsuit last week against one of their former hardware engineers, alleging they tried to steal confidential chip blueprints to potentially pass on to Micron. "The lawsuit [...] is the latest twist in the tale of Intel and Micron's difficult partnership over 3D XPoint memory," reports The Register. From the report: The legal complaint, aimed at former employee Doyle Rivers, alleges that having "secretly" accepted a position at Chipzilla's former bedfellow, Micron, Rivers had a go at taking confidential trade and personnel data with him as he left. Intel alleged that a few days before leaving, "Rivers tried to access and copy a 'top secret' designated Intel file that Intel's electronic security system blocked from being copied."

Chipzilla said the document was related to what it was at pains to say is its "independent" work to productize the 3D XPoint tech into its Optane product line. In other words, blueprints secret to Intel. No one outside Intel, "including Micron" had been privy to such data, the complaint alleged. Intel's security system stopped the file from escaping, but according to the complaint, that did not stop Rivers from allegedly hoovering up a selection of personnel files into a USB device plugged into his computer. The chipmaker also claimed that Rivers "aggressively" recruited his former colleagues to join him on his grand adventure to pastures new.
Intel demanded that Rivers return the USB drive, but he apparently "never responded" to them. Instead, "he handed the USB device over to his new employer." It was later discovered by a forensic investigator that it had been wiped. Intel is now demanding "a neutral forensic investigator" be allowed to take a look at Rivers' PC to see what was on there, and when exactly the USB stick was erased. There's a deadline of November 16 for Rivers to agree to this probing.
Australia

Australian Fence of Sound Halves Roadkill On One Deadly Stretch of Road (digitaltrends.com) 47

Researchers in the Australian state of Tasmania are using a "virtual fence" system, consisting of alarm units mounted on posts along the side of a three-mile stretch of road, to reduce the number animals that get struck and killed by cars on a particularly deadly stretch of road. "These alarm units, around 80 feet apart, emit sounds and flashing lights to warn animals when a car is approaching," reports Digital Trends. "These do not distract drivers because the sound and light are directed to the edge of the road. They are also only loud and bright enough to be noticeable to wildlife in the immediate vicinity." From the report: "The virtual fence technology involves small devices, approximately the size of a mobile phone, mounted on a pole on the side of the road which are triggered by car headlights when they hit a sensor in the device," Samantha Fox, the researcher who led the project, told Digital Trends. "This sets off blue and yellow flashing lights and a high pitched siren. These together warn local wildlife that a car is coming, and give the animal time to move away from the road." Over the course of a three-year trial, the technology has reduced roadkill on one particular road by a massive 50 percent. On this stretch of road alone, this has meant saving the lives of around 200 animals, ranging from wombats to possums.
Medicine

Researchers Develop Hydrogel-Based Electrodes For Brain Implants (phys.org) 32

An anonymous reader quotes a report from Phys.Org: Hydrogels are physical and chemical polymer networks capable of retaining large quantities of liquid in aqueous conditions without losing their dimensional stability. They are used in a whole host of applications, and in combination with other components and they acquire specific properties such as electrical conductivity. The Materials + Technology research group in the Department of Chemical Engineering and Environment of the UPV/EHU's Faculty of Engineering selected a biopolymer that had not previously been used for applications of this type: starch. They created the hydrogel for use in neural interfaces. "Due to the fact that electrodes of neural interfaces made of platinum or gold are rigid, they require conductive polymer coatings to bring their flexibility closer to that of neural tissue. Right now, however, smaller devices are required that offer better mechanical, electrical and biological properties," explained the researcher.

The hydrogels "address these demands very well." To provide the hydrogel with electrical conductivity, they used graphene. "It provides electrical properties that are highly suited to the hydrogel, but this also has a drawback: It is not easily stabilized in water. We used extracts of salvia to overcome this obstacle and to render the graphene stable in an aqueous medium. These extracts also make the hydrogel even more suitable, if that is possible, for use in medicine as it also has antimicrobial and anti-inflammatory properties." The researchers used "click chemistry" to produce the hydrogel. "Unlike other means of synthesis, click chemistry does not tend to use catalysts in the reactions; in addition, no by-products are generated and they are high-performance reactions."

Businesses

Lowe's To Sell Off Its 'Under-Performing' Iris Smart Home Automation Business (cepro.com) 119

CIStud shares a report from CE Pro: Giant home improvement retailer Lowe's is giving up on the smart home market. The company announced its "difficult decision" to exit the home automation market and is seeking a buyer for its Iris Smart Home business as part of a "strategic reassessment." The announcement is part of multiple other maneuvers by Lowe's that include closing its Orchard Supply Hardware business, dumping its Alacrity Renovation Service, shutting down all its locations in Mexico, and shutting more than 50 locations in the U.S. and Canada. Lowe's Iris was hailed as the only entry-level home automation system that handled ZigBee, Z-Wave and Wi-Fi when it came out in 2012. Speaking to investors, president and CEO Marvin Ellison [lumped Lowe's Iris in with other initiatives as an] "underperforming... non-core business."
Iphone

Trump Suggests US Could Slap 10 Percent Tax On iPhones, Laptops From China (cnbc.com) 387

An anonymous reader quotes a report from CNBC: President Donald Trump suggested he could place a 10 percent tariff on iPhones and laptops imported from China, in an interview with the Wall Street Journal published Monday. He also said it's "highly unlikely" that he would delay an increase in tariffs from 10 percent to 25 percent on Jan. 1, just four days before a summit with Chinese President Xi Jinping. "Maybe. Maybe. Depends on what the rate is," the president said to The Wall Street Journal about the possible iPhone and laptop tariffs. "I mean, I can make it 10 percent, and people could stand that very easily."
Software

Paralyzed Individuals Operate Tablet With Brain Implant (ieee.org) 61

Last year, a study from the BrainGate consortium reported that a brain-computer interface (BCI) enabled a paralyzed man to type up to eight words per minute via thoughts alone. Now, according to new results from a BrainGate2 clinical trial, the same BCI was used to help three participants operate an off-the-shelf tablet. IEEE Spectrum reports: All three participants suffer from weakness or loss of movement in their arms due to amyotrophic lateral sclerosis (ALS, also called Lou Gehrig's disease) or spinal cord injury. Each received the brain implant, an array of microelectrodes, as part of the BrainGate2 clinical trial. For this particular study, decoded neural signals from the implant were routed through an industry-standard Human Interface Device protocol, providing a virtual mouse. That "mouse" was paired to a Google Nexus 9 tablet via Bluetooth.

Each participant was asked to try out seven common apps on the tablet: email, chat, web browser, video sharing, music streaming, a weather program and a news aggregator. The researchers also asked the users if they wanted any additional apps, and subsequently added the keyboard app, grocery shopping on Amazon, and a calculator. The participants made up to 22 point-and-click selections per minute and typed up to 30 characters per minute in email and text programs. What's more, all three participants really enjoyed using the tablet.

Medicine

Human Images From World's First Total-Body Scanner Unveiled (medicalxpress.com) 54

An anonymous reader quotes a report from Medical Xpress: EXPLORER, the world's first medical imaging scanner that can capture a 3-D picture of the whole human body at once, has produced its first scans. The brainchild of UC Davis scientists Simon Cherry and Ramsey Badawi, EXPLORER is a combined positron emission tomography (PET) and X-ray computed tomography (CT) scanner that can image the entire body at the same time. Because the machine captures radiation far more efficiently than other scanners, EXPLORER can produce an image in as little as one second and, over time, produce movies that can track specially tagged drugs as they move around the entire body.

EXPLORER will have a profound impact on clinical research and patient care because it produces higher-quality diagnostic PET scans than have ever been possible. EXPLORER also scans up to 40 times faster than current PET scans and can produce a diagnostic scan of the whole body in as little as 20-30 seconds. Alternatively, EXPLORER can scan with a radiation dose up to 40 times less than a current PET scan, opening new avenues of research and making it feasible to conduct many repeated studies in an individual, or dramatically reduce the dose in pediatric studies, where controlling cumulative radiation dose is particularly important.

Iphone

Apple's Siri May Soon Process Voice Locally On a Device, No Cloud Required (appleinsider.com) 83

Proudrooster writes: "Apple wants Siri to become more useful to users when not connected to the internet, including the possibility of an offline mode that does not rely on a backend server to assist with voice recognition or performing the required task, one that would be entirely performed on the user's device," reports Apple Insider. Just give it 10 years and everything old is new again. Siri will join the ranks of Ford/Microsoft Sync and Intel Edison. Do any other phones/cars/speakers have this option right now? The new capabilities are outlined in a recently-published patent application that describes an "Offline personal assistant."

"Rather than connected to Apple's servers, the filing suggests the speech-to-text processing and validation could happen on the device itself," reports Apple Insider. "On hearing the user make a request, the device in question will be capable of determining the task via onboard natural language processing, working out if the requested task as it hears it is useful, then performing it. "
Android

Mid-Range Google 'Pixel 3 Lite' Leaks With Snapdragon 670, Headphone Jack (9to5google.com) 94

The first alleged images of the rumored "budget" Pixel 3 have been leaked. The Pixel 3 Lite, as it is being called, looks very similar to the Pixel 3, although it features a plastic build construction, slower processor, and a headphone jack. 9to5Google reports: Just like the standard Pixel 3, there's a display that's roughly 5.56-inches in size, but this time it's an IPS LCD panel at 2220x1080 rather than an OLED panel. Obviously, there's also no notch to be seen on this alleged Pixel 3 Lite. There's a single front-facing camera as well as one speaker above that display, relatively thick bezels on the top and bottom, and a speaker along the bottom of the device as well.

Perhaps most interesting when it comes to the hardware, though, is that there's a headphone jack on the top of the phone. That's certainly unexpected since the Pixel 2 dropped the jack and Google hasn't looked back since. Tests from Rozetked reveal some of the specifications running this device as well. That includes a Snapdragon 670 chipset, 4GB of RAM, and 32GB of storage. Previous reports have pointed to a Snapdragon 710. Battery capacity on this device is also reported at 2915 mAh and there's a USB-C port along the bottom.
It is rumored to include the same 12MP and 8MP cameras found in the standard Pixel 3 and Pixel 3 XL, which will be a huge selling point for the affordable phone market. The price is expected to be around $400-500.
Security

MiSafes' Child-Tracking Smartwatches Are 'Easy To Hack' (bbc.com) 29

The location-tracking "MiSafe" smartwatch may not be as safe as the name proclaims. According to security researchers from Pen Test Partners, the watches are easy to hack as they do not encrypt the data they use or secure each child's account. The researchers found that they could track children's movements, surreptitiously listen in to their activities and make spoof calls to the watches that appeared to be from parents. The BBC reports: The MiSafes watch was first released in 2015. It uses a global positioning system (GPS) sensor and a 2G mobile data connection to let parents see where their child is, via a smartphone app. In addition, parents can create a "safe zone" and receive an alert if the child leaves the area. The adult can also listen in to what their offspring is doing at any time and trigger two-way calls.

Pen Test Partner's Ken Munro and Alan Monie learned of the product's existence when a friend bought one for his son earlier this year. Out of curiosity, they probed its security measures and found that easy-to-find PC software could be used to mimic the app's communications. This software could be used to change the assigned ID number, which was all it took to get access to others' accounts. This made it possible to see personal information used to register the product, including: a photo of the child; their name, gender and date of birth; their height and weight; the parents' phone numbers; and the phone number assigned to the watch's Sim card.

Encryption

Safari Tests 'Not Secure' Warning For Unencrypted Websites (cnet.com) 66

Similar to Chrome, Apple's Safari browser is testing a warning system for when users visit websites that aren't protected by HTTPS encryption. "The feature for now is only in Safari Technology Preview 70, a version of the web browser Apple uses to test technology it typically brings to the ordinary version of Safari," reports CNET. From the report: Apple didn't immediately respond to a request for comment on its plans for bringing the warning to mainstream Safari. Apple's browser does warn you already if you have an insecure connection to a very sensitive website for typing in passwords or credit card numbers.
Desktops (Apple)

Apple Confirms Its T2 Security Chip Blocks Some Third-Party Repairs of New Macs (theverge.com) 179

An anonymous reader shares a report from The Verge about Apple's new security-focused T2 chip found in the newest Mac computers. The introduction of the chip "has renewed concerns that Apple is trying to further lock down its devices from third-party repair services," The Verge reports. From the report: The T2 is "a guillotine that [Apple is] holding over" product owners, iFixit CEO Kyle Wiens told The Verge over email. That's because it's the key to locking down Mac products by only allowing select replacement parts into the machine when they've come from an authorized source -- a process that the T2 chip now checks for during post-repair reboot. "It's very possible the goal is to exert more control over who can perform repairs by limiting access to parts," Wiens said. "This could be an attempt to grab more market share from the independent repair providers. Or it could be a threat to keep their authorized network in line. We just don't know." Apple confirmed to The Verge that this is the case for repairs involving certain components on newer Macs, like the logic board and Touch ID sensor, which is the first time the company has publicly acknowledged the tool's use. But Apple could not provide a list of repairs that required this or what devices were affected. It also couldn't say whether it began this protocol with the iMac Pro's introduction last year or if it's a new policy instituted recently.

First revealed last month by MacRumors and Motherboard, both of which got their hands on an internal Apple document, the T2 chip could render a computer inoperable if, say, the logic board is replaced, unless the chip recognizes a special piece of diagnostic software has been run. That means if you wanted to repair certain key parts of your MacBook, iMac, or Mac mini, you would need to go to an official Apple Store or a repair shop that's part of the company's Authorized Service Provider (ASP) network. If you want to repair or rebuild portions of those devices on your own, you simply can't -- at least, according to this document. The parts affected, according to the document, are the display assembly, logic board, top case, and Touch ID board for the MacBook Pro, and the logic board and flash storage on the iMac Pro. It is also likely that logic board repairs on the new MacBook Air and Mac mini are affected, as well as the Mac mini's flash storage. Yet, the document, which is believed to have been distributed earlier this year, does not mention those products because they were unannounced at the time. Regardless, to replace those parts, a technician would need to run what's known as the AST 2 System Configuration suite, which Apple only distributes to Apple Stores and certified ASPs. So DIY shops and those out of the Apple network would be out of luck.

Data Storage

Mac Mini Teardown Reveals User-Upgradable RAM, But Soldered Down CPU and Storage (macrumors.com) 242

iFixit has released their teardown of the new Mac mini, providing a look inside the portable desktop computer. Some of the notable findings include user-upgradable RAM and soldered CPU and SSD. Mac Rumors reports: While the RAM in the previous-gen Mac mini from 2014 was soldered to the logic board, the new Mac mini has user-upgradeable RAM, as discovered earlier this week. As seen in older iMacs, the RAM is protected by a perforated shield that allows the memory modules to operate at a high frequency of 2666 MHz without interfering with other device functions, according to iFixit. To upgrade the RAM, the shield can be removed by unfastening four Torx screws.

Other silicon on the logic board of this particular Mac mini includes the Apple T2 security chip, a 3.6GHz quad-core Intel Core i3 processor, Intel UHD Graphics 630, 128GB of flash storage from Toshiba, an Intel JHL7540 Thunderbolt 3 controller, and a Gigabit Ethernet controller from Broadcom. Despite the good news about the RAM, the CPU and SSD are soldered to the logic board, as are many ports, so this isn't a truly modular Mac mini. iFixit awarded the new Mac mini a repairability score of 6/10, with 10 being the easiest to repair, topping the latest MacBook Air, MacBook, MacBook Pro, iMac, and iMac Pro, and trailing only the 2013 Mac Pro.

Slashdot Top Deals