Moto G5, G5 Plus Launched at MWC 2017; Coming to India in March

As expected, Motorola has launched the Moto G5 and Moto G5 Plus in Barcelona at MWC 2017. The new Moto G5 and Moto G5 Plus have received a much needed design refresh, with a metal chassis and a circular camera frame at the back. Specifications

Moto G5, G5 Plus Launched at MWC 2017; Coming to India in March

The Moto G5 will start at EUR 199 (roughly Rs. 14,000) and the Moto G5 Plus will start at EUR 279 (roughly Rs. 15,300).

Lenovo is expected to launch the Moto G5 and Moto G5 Plus in India sometime in March. The devices are expected to launch in various markets, with India being in the priority list. Motorola announced that India is on the second spot when it comes to market share, and rakes in about 10 percent of overall sales. Other international markets include the US, and UK as well.

Both the smartphones come with fingerprint scanners in the front underneath the Home Button. However, the big highlight is that the devices integrate Google Assistant, a feature first exclusive only to the Pixel devices. Both the smartphones come with Motorola exclusive features such as Moto Display, Actions, twist gesture, and a new one-hand mode on the larger G5 Plus as well.

Beginning with the Moto G5, the smartphone features a 5-inch full-HD (1080×1920 pixels) display and be powered by a 1.4GHz Snapdragon 430 processor. It offers 2GB or 3GB of RAM and 16GB or 32GB of internal storage, with the option to expand further via a a microSD card slot(up to 128GB). The Moto G5 packs a 2800mAh removable battery with support for fast charging. As for optics, the Moto G5 sports a 13-megapixel rear camera with PDAF, f/2.0 aperture, and dual-LED flash, and a 5-megapixel wide-angle front camera for selfies.

Coming to the Motorola G5 Plus, the smartphone features a 5.2-inch full-HD (1080×1920 pixels) display. It is powered by the 2GHz Snapdragon 625 octa-core processor, and offers RAM from the range of 3GB to 4GB. It offers 32GB and 64GB of internal storage, with the option to expand further via a microSD card slot (up to 128GB).

In the camera department, the Moto G5 Plus sports ‘the most advanced’ 12-megapixel rear camera with dual autofocus, 4K video recording, f/1.7 aperture, and dual-LED flash. The Moto G5 Plus packs a 3000mAh non-removable battery with TurboPower charging that claims to give you six hours’ worth of battery life in just 15 minutes.

Nokia Branded Smart Health Products Are Coming This Summer

Nokia on Sunday at its MWC 2017 event in Barcelona announced that all Withings products will acquire the Nokia brand name. Withings is a fitness and health-focused brand that Nokia had acquired in June 2016.

Nokia Branded Smart Health Products Are Coming This Summer

Withings is known for its Activite range of fitness trackers and all of its products will be Nokia branded from the summer 2017, the company said in a statement on its website. “We are excited to announce that in early summer 2017, our award-winning range of products will transition to the Nokia brand,” the statement read.

The brand name change is just the beginning, Withings said, “The company aims to totally revamp its Health Mate app that includes new coaching programmes and a new feature called Patient Care. Details are scarce at the moment but Withings claims this will “revolutionise the relationship between caregivers and patients”.

If you already have a Withings product, the company says nothing will change and these will continue to receive support and software updates in the future. All of your existing activity data will be available via the Withings app you’ve been using all this while.

If your Withings product develops a fault that’s covered under warranty, and you exchange it after the company switches over to the Nokia brand name, you will receive a Nokia product. The date hasn’t been announced yet and until that day, Withings will continue to sell its products under its own brand name.

The Potent and the Realistic Drug of the Day

Here is the right option to help you lose weight at random. The solution is usually recommended by the physicians and the bariatric specialists. This is the supplement to offer solution for obesity and weight loss. However, the medicine comes with some of the potential side effects in case of the user. However, the solution is usually prescribed for short term usage. You can continue having the medicine for three months and in specific situations the same can be used for long term applications. However, now it is time that you get aware of the long term effects of the solution.

Image result for The Potent and the Realistic Drug of the Day

Substance of the Right Order

Fentermina should be used with the best of caution. For this you need to discuss about the proper usage and the right dose of the medicine. So this is the time you should make the solution a part of the obesity or weight loss treatment plan. You have the finest of options to buy the component online and with this you come to learn the details of the supplement at the best. The solution is extremely popular on net and here you have the opportunity to judge the main traits of the solution.

True Component Ability

This is the right version to help you have apt appetite control and there is proper stimulation of the metabolic system. Now, you can enjoy high level of energy and this in turn also helps the individual burn fat successfully. You can call the solution the sort of stimulant and it can cause improvement in the status of the nerve impulse. There is also an increase in the amount of transmissions that can cause an increase in the mode of metabolism in human beings. A specific generic name given to the weight loss solution and this helps in the proper identification of the same. You get the same component with the different brand names.

Classifying the Solution Rightly

You can make use of the right kit in case you want to make the best use of the solution. It is believed that the sort of stimulant has similar traits like amphetamines. It can be well classified with the rest of the Scheduled IV controlled solutions as this can cause addiction in some cases. Thus, there are chances of misuse or abuse of the substance. This is the special substance you can rightly make use of and it can be used for treating obesity and it can even look after the status of the central nervous. The medicine has the role to play in managing the endocrine system.

Detailed Usage of the Solution

There are things to consider when making use of Fentermina. Obesity can have effect on the behaviour and the appetite of a person. As a cure one can take to the usage of the solution and there is change in the rate by which the body burns the amount of energy. The medicine also controls the level of metabolism and this can create a difference in your appetite. This is the reason the same is listed among the solutions known as anorectics. In case, you are not having the solution the right way you can suffer from dry mouth and you even have chances to suffer from constipation and nausea. So, careful usage of the solution is necessary.

The best free cloud storage

Free cloud storage

Cloud storage has really taken off thanks to fast, reliable internet connections. The appeal is understandable; you can store your files online and then access them from any device that’s connected to the internet – from desktops and laptops to tablets and smartphones. The only problem is choice. There are so many cloud storage services to choose from, it can be near impossible to know which is right for you.

Size isn’t everything, so as well as capacity, we’ve also considered the security offered by each service, multi-platform support, ease of use, and any limitations on file size or bandwidth. On with the evaluation…

1. Mega

Free storage allowance: 50GB

Mega (aka MegaUpload) gives free users a generous 50GB free cloud storage and the ability upload or download whole directories at once via the web app. You can only transfer 10GB data every 30 minutes, but this is unlikely to be a problem unless you’re storing large video files. You can use parallel connections for a speed boost, though this will chew through your bandwidth allowance more rapidly.

Security is one of Mega’s key selling points; all your files are secured with end-to-end encryption, and when you share a file or directory with other people (which you can do even if they don’t use Mega themselves) you can either send a link together with a decryption key, or send the two separately. Password protection is only available to paid subscribers, but in all other respects Mega is a superb free cloud storage service. It might not be the first name that comes to mind, but we think it’s the best free cloud storage service around right now.

2. Google Drive

Free storage allowance: 15GB

One of the best-known free cloud storage services, Google Drive gets off to a great start by giving you 15GB of space free of charge. You can earn more free storage in a variety of ways – such as using additional Google services, performing security checks and so on – or you can buy more via a monthly or annual subscription.

As this is Google, Drive integrates neatly with other products from the company such as Gmail. The desktop apps does a great job of synchronizing locally saved files to your online account, and there are mobile apps available so you can access files on the move. In addition to this, you can use the website to browse and even edit files, and Drive offers comprehensive file sharing and collaboration options.

3. Box

Free storage allowance: 10GB

With 10GB of storage provided free of charge, Box is on a par with Google Drive when it comes to capacity – especially if you don’t want to part with any money. If your needs are greater, 100GB of space is available for £7 (about US$8.50, AU$11.50) per month, and there are also business packages available that include unlimited storage.

There are limits on the size of file you can upload – 250MB for free accounts – so this is something you need to consider. Whether it’s a problem or not will depend entirely on what you intend to use the service for – media files will easily exceed this level, but text and photos will be fine.

There are mobile apps available, and these can be used to automatically synchronize files from your iOS or Android device to the cloud. Filesharing is handled nicely, and there’s neat integration with a wide range of apps and services that help to add real value to Box’s free cloud storage offering.

4. Microsoft OneDrive

Free storage allowance: 5GB

Microsoft OneDrive is integrated into Windows 10, which you’d think would give it something of an advantage. It’s therefore disappointing that only 5GB of storage is made available to users free of charge.

That seems quite steep, but it’s worth noting that the last two options also include an Office 365 subscription.

Like other cloud storage services, OneDrive offers free apps for iOS and Android (as well as macOS and Windows Phone), allowing for file access on the move, as well as file collaboration. There’s the ability to share files from within any of the apps and an integrated photo viewer for browsing the images you upload.

It’s all fairly impressive and easy to use, but OneDrive’s storage limitations count against it.

ZTE cancels ambitious self-adhesive smartphone

ZTE has cancelled the Kickstarter for its ambitious phone called Hawkeye . This comes after a troublesome campaign in which the product didn’t exactly fit consumer expectations. The irony is not lost on us.

Hawkeye, also known as Project CSX, was devised based on how the public saw fit, or so they thought. ZTE collected votes to decide on the product’s marquee features, but the final product pitched on Kickstarter didn’t exactly match up.

Cancelled late in its drive for consumer interest and money, ZTE only managed a small fraction of its fundraising goal. This comes after Jeff Yee stated that the company is listening to feedback and will work to meet customers at eye-level moving forward.

And while a cancelled Kickstarter clearly isn’t great news, ZTE isn’t finished with the project. The company has confirmed that it plans to release a similar offering by the end of 2017, complete with eye-tracking and self-adhesive capabilities, as well as higher-end specifications, the latter of which many felt that ZTE under delivered on with Hawkeye.

Speaking with Engadget, Yee said “This is maybe not exactly what we wanted at this stage, but we are able to swallow our pride and recognize that the specs that we listed were not exactly what the community wanted.”

We got our hands on the Hawkeye prototype at CES 2017 and we liked what we saw. Here’s to hoping that ZTE can strike the balance between making exactly what the people want without amping up the price too much during the process.

Everything we think we know about Samsung’s Galaxy Tab S3

It’s been a long time since there’s been any news about a premium Android tablet. What was once a burgeoning product category has fallen flat as high-end phones become bigger and more powerful, and most new tablets that have been released over the past year are either targeted at budget buyers or children. But with the Galaxy S8 delayed until the spring, Samsung has all but confirmed it will be bringing a new high-end tablet to Mobile World Congress this year.

And it looks to be a solid upgrade. The Galaxy Tab S2 has been on shelves since 2015, so Samsung has had a lot of time to think about what it wants from its flagship Android tablet. And while most people will probably still be talking about the Galaxy S8 teaser Samsung is expected to unveil at its MWC event, the Tab S3 isn’t a throwaway release.

With the Galaxy Tab S2, Samsung offered two sizes, an 8-inch model and a 9.7-inch one. According to a report from South Korea-based Naver News, the Tab S3 will reportedly narrow down those choices to just the bigger size, with a 9.6-inch, 2048×1536 display. And if you like the design of the S2, you’ll love the Tab S3. Based on the rendering that has been leaked on German-based WinFuture.de, the tablet looks to be nearly identical to the S2 it will replace, with a pill-shaped home button/fingerprint scanner flanked by a pair of standard navigation buttons. However, it is expected to be thinner than its predecessor, which is only 5.6mm thick, and come in black and silver, rather than the standard white.

galaxy tab s3 leak

Ads by Kiosked

WinFuture

The Galaxy Tab S3, seen here in a leaked rendering, looks a lot like the Tab S2.

But while it might look like a Tab S2, the S3 will get a significant upgrade under the hood, as you’d expect from a tablet that hasn’t been updated in nearly a year and a half. It starts with the chip, and the new tablet is rumored to sport a Qualcomm Snapdragon 820 processor, a change from the Exynos chip that was used in the S2. Additionally, it will get 4GB of RAM (up from 3GB in the S2), as well as a 12MP rear camera and 5MP front camera (bumped from 8MP and 2MP, respectively). And as always, it will come in both Wi-Fi and LTE variations.

Additionally, the tablet will ship with Android 7.0 Nougat, though it’s unclear whether Samsung will bring any additional features for the larger screen. One of the biggest issues with Android tablets is their lack of larger-screen features and app support, so we’ll have to see what Samsung has cooked up to spice up the experience.

The most interesting addition to the year’s tablet, however, could be the inclusion of an S Pen. While it wouldn’t be the only Samsung tablet to ship with the stylus, it would be a first for the Galaxy Tab S line. Unfortunately, Sammobile has reported that there isn’t a Note-style slot for it on the device, but the tablet will ship with an S Pen in the box, which could position the tablet as a more professional companion to the upcoming Galaxy S8.

Samsung has announced that it will be unveiling its new device at Mobile World Congress on Feb. 26 at 7:00 pm CET (1 p.m. EST) at the Palau de Congressos de Catalunya in Barcelona, Spain. According to the Naver report, the tablet is expected to cost a bit more than the $500 S2, likely coming at $600. It’s not entirely clear from the rumors we’ve heard why Samsung would be charging more the S3, though the inclusion of the S Pen would certainly add to the cost.

This story, “Everything we think we know about Samsung’s Galaxy Tab S3” was originally published by Greenbot.

JavaScript-based ASLR bypass attack simplifies browser exploits

Researchers have devised a new attack that can bypass one of the main exploit mitigations in browsers: address space layout randomization (ASLR). The attack takes advantage of how modern processors cache memory and, because it doesn’t rely on a software bug, fixing the problem is not easy.The AnC attack could spell the death of ASLR in browsers.

Researchers from the Systems and Network Security Group at Vrije Universiteit Amsterdam (VUSec) unveiled the attack, dubbed AnC, Wednesday after having coordinated its disclosure with processor, browser and OS vendors since October.

ASLR is a feature present in all major operating systems. Applications, including browsers, take advantage of it to make the exploitation of memory corruption vulnerabilities like buffer overflows more difficult.

The mitigation technique involves randomly arranging the memory address space positions used by a process so that attackers don’t know where to inject malicious code so that the process executes it.

There are methods to bypass ASLR, but they often involve chaining multiple vulnerabilities together, including one that allows for memory disclosure. This new attack removes the need for such additional vulnerabilities, making the exploitation of remote code execution bugs much easier.

“This new attack is indeed very interesting if as efficient and reliable as reported,” said Carsten Eiram, the chief research officer at vulnerability intelligence firm Risk Based Security, via email. “It can be chained with many code execution type vulnerabilities across different platforms and even different software that supports JavaScript, e.g. browsers. On top of that, it seems to pretty quickly allow breaking ASLR, so it is seems practical in real life and not just theoretical or academic.”

What makes the attack interesting is that it does not depend on any particular software feature. It takes advantage of the way in which the memory management unit (MMU) of modern processors perform memory caching to improve performance.

It turns out that this can be used as a side channel directly from JavaScript to leak heap and code pointers that ASLR is supposed to hide.

The same researchers devised a different ASLR bypass attack last year that worked against Microsoft Edge. That attack relied on a software feature called memory deduplication that Microsoft later disabled to protect users.

That’s not possible in case of AnC, because the core of the problem is at the hardware level and can’t be fixed in existing CPUs. However, browser vendors can make certain tweaks that would make the implementation of the attack harder.

For example, the attack requires a precise timer in JavaScript, and browser vendors previously disabled one function that could be used for similar cache timing attacks. The VUSec researchers found two new ways to build the timers used by AnC, so browser vendors could now block these too. However, there’s no guarantee that other methods won’t be found in the future.

The researchers suggested several changes to CPU, OS and browser vendors that could make AnC-like attacks harder to pull off, but some of them might have performance implications that need to be further investigated. So far, the Apple Product Security Team worked with the researchers to harden WebKit against the AnC attack.

“The problem is fundamental as it is in hardware and cannot be completely eradicated with software countermeasures,” said Cristiano Giuffrida, an assistant professor at VU Amsterdam and one of AnC’s authors, via email. “And even hardware countermeasures are perhaps too expensive to consider to save ASLR (as hinted by some hardware vendors we talked to).”

If this is not the last nail in ASLR’s coffin, it’s very much the last nail in the coffin for ASLR as we know it, Giuffrida said.

AnC might have implications beyond browsers, even though browsers are the most obvious target because of the wide use of JavaScript on the Web. However, any software that allows the execution of JavaScript code is potentially vulnerable, including PDF readers.

It’s not clear if this attack will lead to a resurgence of browser exploits. For the past several years, the exploit kits that are used in large-scale, drive-by download attacks have mainly focused on targeting vulnerabilities in browser plug-ins like Flash Player, Java or Silverlight instead of flaws in the browsers themselves.

Time will tell, but bypassing ASLR is just one of the exploitation puzzle, Eiram said. Browsers have other security mechanisms in place, like sandboxes, that also need to be defeated to achieve arbitrary code execution, he said.

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.Legislation of privacy security keyboard law legal gavel court ruling

That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.

“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.

On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.

In a controversial move, the agency then decided to use the site to essentially infect visitors with malware as a way to track them down.

As a result, the FBI is prosecuting hundreds who were found visiting the site, but it also happened to hack into computers from 120 countries.

On Friday, the three privacy groups filed briefs in a case involving Alex Levin, a suspect in the FBI’s Playpen investigation who’s appealing the way the agency used malware to gather evidence against him.

Privacy International claims that the warrant the FBI used to conduct the hacking is invalid. This is because the U.S. was overstepping its bounds by conducting an investigation outside its borders without the consent of affected countries, the group said.

According to Privacy International, the case also raises important questions: What if a foreign country had carried out a similar hacking operation that affected U.S. citizens? Would the U.S. welcome this?

The EFF and ACLU also claim that the FBI’s warrant was invalid, but they cite the U.S. Constitution, which protects citizens from unreasonable searches.

“Here, on the basis of a single warrant, the FBI searched 8,000 computers located all over the world,” EFF attorney Mark Rumold wrote in a blog post. “If the FBI tried to get a single warrant to search 8,000 houses, such a request would unquestionably be denied.”

A key concern is that a warrant to hack into so many computers will set a precedent. “Even serious crimes can’t justify throwing out our basic constitutional principles,” Rumold said.

U.S. attorneys have argued in court that the FBI followed proper procedures in obtaining its warrant from a federal judge. They said the FBI’s hacking techniques managed to identify hundreds of Playpen users who otherwise were cloaked in anonymity.

Allowing the Playpen suspects “to evade capture and carry on abusing children in the dark shadows of Tor would be repugnant to justice,” the U.S. attorneys argued in court in October.

Intel researches quantum computing and neuromorphic chips for future PCs

Intel realizes there will be a post-Moore’s Law era and is already investing in technologies to drive computing beyond today’s PCs and servers.0853 as 26

The chipmaker is “investing heavily” in quantum and neuromorphic computing, said Brian Krzanich, CEO of Intel, during a question-and-answer session at the company’s investor day on Thursday.

“We are investing in those edge type things that are way out there,” Krzanich said.

To give an idea of how far out these technologies are, Krzanich said his daughter would perhaps be running the company by then.

Researching in these technologies, which are still in their infancy, is something Intel has to do to survive for many more decades. Shrinking silicon chips and cramming more features into them is becoming difficult, and Intel is already having trouble in manufacturing smaller chips.

Smartphones, PCs, and other devices are getting smaller, faster and more power efficient thanks to Moore’s Law, a 1965 observation loosely stating that the number of transistors in a die area would double every two years, causing performance to double while driving down the cost of making chips.

Intel has been using Moore’s Law as a guiding star to make faster and smaller chips and reducing the price of devices. However, it is widely agreed that Moore’s Law is slowly dying, and Intel’s manufacturing struggles are growing.

For decades, Intel’s business has been heavily reliant on its ability to make and deliver chips. But the process is slowing down. Intel used to advance manufacturing processes every two years, and that has now changed to three to four years.

One way to resolve that crisis—which all chipmakers face—is to completely change the current computing model in PCs, smartphones, and servers. The current model—known as the Von Neumann approach—involves data being pushed to a processor, calculated, and sent back to memory. But storage and memory are becoming bottlenecks.

The answer is to adopt new models of computing, which is where quantum computers and neuromorphic chips fit in. Quantum computers have the potential to be powerful computers harnessing the unique quality of a large number of qubits to perform multiple calculations in parallel. Neuromorphic chips are modeled after the human brain, which could help computers make decisions based on patterns and associations.

Intel has made some advances in quantum computing and neuromorphic chips. But Krzanich’s comments lend more credibility to the company’s push to look at a future beyond today’s computing models.

Some short-term answers can resolve the bottlenecks based on Von Neumann model, including Optane, Intel’s new form of super-fast memory and storage. It could unite SSDs and DRAM in systems, cutting one bottleneck. Intel is also embracing silicon photonics, which could resolve throughput issues in data centers. Both technologies have researched for more than a decade and are now practical.

The chipmaker has lived off the PC industry for decades but is now looking to grow in markets like data centers, the internet of things, automotive and high-performance computing. The new focus is bringing a gradual change to the way Intel makes chips. It’s similar to the 1970s, when different types of chips like vector processors and floating point arrays were crammed together for complex calculations.

For example, Intel is slapping together two separate functional blocks for applications like machine learning and autonomous cars. Intel envisions FPGAs combining with CPUs in autonomous cars. Later this year, the company will release a chip called Lake Crest, which combines a Xeon server CPU with deep-learning chip technology it picked up through its Nervana Systems acquisition. Intel is also merging an FPGA inside an Intel Xeon chip to carry out machine learning tasks.

Intel is expecting a lot of data to be generated by sources like autonomous cars, which will need edge processing for tasks like image recognition, analysis, and map updates. Intel is pushing its wide roster of co-processors to the edge, and that is where the quantum and neuromorphic chips may fit.

Quantum computer research is also being done by other companies. D-Wave recently released a 2,000-qubit quantum computer based on quantum annealing, while IBM has a 5-bit quantum computer accessible via the cloud. IBM is also playing with brain-like chips and has benchmarked its TrueNorth chip, which has a million neurons and 256 million synapses.

Academic institutions like the University of Heidelberg in Germany, Stanford University, and the University of Manchester in the U.K. are also working on neuromorphic chips. HPE has shown a computer that emulates the human brain, and it intends to adapt ideas from that for servers.

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.0853 as 26

The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.

The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.

The two sides have now informed District Judge J. Paul Oetken of the U.S. District Court for the Southern District of New York that they consent to a settlement conference before Magistrate Judge Kevin Fox.

MGT announced in May last year it was teaming with John McAfee to set up a security company that would be named “John McAfee Global Technologies, Inc,” and would have him as the CEO and executive chairman.

Intel acquired McAfee Inc. in 2011 and uses the McAfee mark for security products, services, and publications for consumers and businesses. It countered in a letter in June that John McAfee does not have the right to use the McAfee name for security related goods and services.

The letter prompted John McAfee and MGT to file a suit to seek a judgment that “their use of or reference to the personal name of John McAfee and/or McAfee in their business,” including in the renaming of MGT, does not infringe on Intel’s trademark rights or breach any agreement between the parties.

John McAfee claims he entered in 1991 into an agreement with McAfee Associates, a precursor to McAfee Inc., to transfer certain assets to it in exchange for stock and a promissory note.

The maverick entrepreneur has argued in court that he had at no point in the agreement assigned rights to his personal name through an assignment of trademark or otherwise, or agreed to restrict his right to do business using his own name.

The settlement talks do not necessarily mean that the two sides will come to an agreement.