Sponsored
Apple, Samsung smartphones outdo Nokia in 2Q (AP) : Technet |
- Apple, Samsung smartphones outdo Nokia in 2Q (AP)
- Insulin pumps, monitors vulnerable to hacking (AP)
- LinkedIn's 2Q earnings climb as growth accelerates (AP)
- Just Show Me: How to update your Nintendo 3DS (Yahoo! News)
- It turns out Mars might have flowing water after all (Yahoo! News)
- GQ Names Zuckerberg Worst-Dressed Man in Silicon Valley (Mashable)
- Online jobs index dips in July, gains from year ago (Reuters)
- Top China paper scoffs at suggestion Beijing is hacking (Reuters)
- End of road for Starbucks laptop loungers? (Digital Trends)
- Seagate GoFlex tops Android Apps of the Week (Appolicious)
- Facebook mulling news feed changes that benefit advertisers (Digital Trends)
- Microsoft about to deliver some security love with 13 patches (Digital Trends)
- Cut the Rope: Experiments tops iPhone Games of the Week (Appolicious)
- Hack turns Square into criminal tool (AFP)
- Rapper Lil Wayne slapped with $15 million lawsuit (Reuters)
- Warner Bros. encouraging consumers into Flixster Collections to choose entertainment (Digital Trends)
- Security expert warns of way to attack SAP systems (Reuters)
Apple, Samsung smartphones outdo Nokia in 2Q (AP) Posted: 04 Aug 2011 02:35 PM PDT NEW YORK – Apple Inc. and Samsung Electronics Co. zoomed to the top of the list of global smartphone makers in the second quarter, blowing past Nokia Corp. and BlackBerry maker Research In Motion Ltd., according to research firm IDC. Korea's Samsung made the biggest jump, from No. 4 in the first quarter to No. 2 in the second, on the strength of its Galaxy phones, which run Google Inc.'s Android software. It sold 17.3 million smartphones in the second quarter, up from 10.8 million in the first, IDC said. Apple rose to No. 1, taking the spot from Nokia, by selling 20.3 million iPhones, up from 18.7 million in the first quarter. That relegated Finland's Nokia, the long-time leader, to third place. Apple has yet to top Nokia's high-water mark of 28.1 million phones in a quarter. "But given Apple's momentum in the smartphone market, it may not be a question of whether Apple will beat that milestone, but when," IDC said. Remarkably, Apple's sales record comes nearly a year after it released its latest model, the iPhone 4, and it's still selling millions of the even older iPhone 3GS. Competitors such as Samsung put out new models every few months. Nokia sold 16.7 million smartphones, a sharp drop from 24.2 million in the previous quarter. The company has struggled to come up with an answer to the iPhone. Nokia is now transitioning to smartphone software from Microsoft Corp., but it's first Windows Phones won't be on sale until late this year, at the earliest. Canada's RIM fell from third to fourth place, as it saw a decline in BlackBerry sales from the first quarter to the second. Like Nokia, it has been struggling to update the high end of its line to compete with touch-screen phones such as the iPhone. It unveiled five new models with updated software this week. HTC Corp. of Taiwan remained in fifth place, but it's seeing rapidly growing sales. Like Samsung, it has bet on Google's Android software for its phones. |
Insulin pumps, monitors vulnerable to hacking (AP) Posted: 04 Aug 2011 11:14 AM PDT LAS VEGAS – Even the human bloodstream isn't safe from computer hackers. A security researcher who is diabetic has identified flaws that could allow an attacker to remotely control insulin pumps and alter the readouts of blood-sugar monitors. As a result, diabetics could get too much or too little insulin, a hormone they need for proper metabolism. Jay Radcliffe, a diabetic who experimented on his own equipment, shared his findings with The Associated Press before releasing them Thursday at the Black Hat computer security conference in Las Vegas. "My initial reaction was that this was really cool from a technical perspective," Radcliffe said. "The second reaction was one of maybe sheer terror, to know that there's no security around the devices which are a very active part of keeping me alive." Increasingly, medical devices such as pacemakers, operating room monitors and surgical instruments including deep-brain stimulators are being made with the ability to transmit vital health information from a patient's body to doctors and other professionals. Some devices can be remotely controlled by medical professionals. Although there's no evidence that anyone has used Radcliffe's techniques, his findings raise fears about the safety of medical devices as they're brought into the Internet age. Serious attacks have already been demonstrated against pacemakers and defibrillators. Medical device makers downplay the threat from such attacks. They argue that the demonstrated attacks have been performed by skilled security researchers and are unlikely to occur in the real world. But hacking is like athletics. Showing that a far-fetched attack is possible is like cracking the 4-minute mile. Once someone does it, others often follow. Free or inexpensive programs eventually pop up online to help malicious hackers automate obscure attacks. Though there has been a push to automate medical devices and include wireless chips, the devices are typically too small to house processors powerful enough to perform advanced encryption to scramble their communications. As a result, most devices are vulnerable. Radcliffe wears an insulin pump that can be used with a special remote control to administer insulin. He found that the pump can be reprogrammed to respond to a stranger's remote. All he needed was a USB device that can be easily obtained from eBay or medical supply companies. Radcliffe also applied his skill for eavesdropping on computer traffic. By looking at the data being transmitted from the computer with the USB device to the insulin pump, he could instruct the USB device to tell the pump what to do. Radcliffe, who is 33 and lives in Meridian, Idaho, tested only one brand of insulin pump — his own — but said others could be vulnerable as well. Although an attacker would need to be within a couple hundred feet of the patient to pull this off, a stranger wandering a hospital or sitting behind a target on an airplane would be close enough. Radcliffe also found that it was possible to tamper with a second device he wears. He found that he could intercept signals sent wirelessly from a sensor to a machine that displays blood-sugar levels. By broadcasting a signal that is stronger than the real-time, authentic readings, the monitor would be tricked into displaying old information over and over. As a result, a patient who didn't notice wouldn't adjust insulin dosage properly. With a powerful enough antenna, Radcliffe said, an attacker could be up to half a mile away. This attack worked on two different blood-sugar monitors, Radcliffe said. "Everybody's pushing the technology to do more and more and more, and like any technology that's pushed like that, security is an afterthought," Radcliffe said. Radcliffe refused to identify any of the three device makers, in part out of concern for his own safety. He is concerned that the devices don't appear to have an easy way to be updated with new software to fix the problems. He said he intends to notify the manufacturers after Thursday's presentation outlining the weaknesses. The hacking fears come on top of human errors and technical glitches tied to medical devices. The U.S. Food and Drug Administration has identified software and design errors as critical concerns in investigating hundreds of deaths potentially linked to drug pumps. FDA officials declined to comment specifically on Radcliffe's findings, saying they hadn't seen the research. But the FDA said that any medical device with wireless communication components can fall victim to eavesdropping. It warns device makers that they are responsible for making sure they can update equipment after it's sold. Industry officials downplay the potential threat. "The risk to a patient with diabetes of having their monitors hacked is extraordinarily small, and there's a greater health risk of not monitoring than the risk of being hacked," said Wanda Moebius, a vice president at the Advanced Medical Technology Association, an industry group. Few public studies have been done on the susceptibility of medical devices to hacking. One such study, which appeared in 2008 from a consortium of academics, found that a popular type of device that acted as both a pacemaker and defibrillator could be remotely reprogrammed to deliver potentially deadly shocks or run out its battery. The problem was the way the device transmitted data unencrypted and accepted commands wirelessly from unauthorized devices. One limitation of the study was that researchers only examined an attack from a few centimeters away from the targeted device. Yoshi Kohno, a University of Washington professor of computer science who was a co-author of that study, said that Radcliffe's new research reinforces the urgency of addressing security issues in medical devices before attacks move out of research labs. "The threat hasn't manifested yet, so what they and we are trying to do is see what the risk could be in the future," said Kohno, who wasn't part of Radcliffe's research. Radcliffe said the point of his research is not to alarm people. He said the issues he's discovered are important to address publicly as the medical industry moves aggressively toward more networked devices. "It would only take one person to do this to kill someone and then you have a catastrophe," he said. |
LinkedIn's 2Q earnings climb as growth accelerates (AP) Posted: 04 Aug 2011 04:52 PM PDT SAN FRANCISCO – In its first quarterly update since its sizzling IPO, online professional networking service LinkedIn Corp. reassured investors who have been buying into the hype surrounding a promising crop of Internet companies. The second-quarter results announced Thursday injected some hope into a grim stock market and could feed the mounting excitement for upcoming initial public offering of stocks from other rising Internet stars such as online coupon Groupon Inc. and Web game maker Zynga Inc. The reason: LinkedIn reported the accelerating revenue and membership growth that it needed to support its lofty stock price and delivered higher earnings when analysts were bracing for a loss. It marked the first update since LinkedIn's headline-grabbing initial public offering of stock in May. The company's shares immediately doubled from their IPO price of $45 and remained in that range, stirring debate about whether investors are overvaluing Internet companies that build large audiences with mostly free services. The fervor has raised fears that the Internet may be in the early stages of an investment bubble akin to the late 1990s hysteria that culminated in a devastating collapse. LinkedIn's performance served as a reminder that there is at least one significant difference in the latest Internet frenzy: Some of today's online companies are making money, unlike the ones hatched in the Web's early days. LinkedIn earned $4.5 million, or 4 cents per share, in the April-June period. That contrasted with earnings of $938,000, or 2 cents per share, at the same time last year. Revenue more than doubled from last year to $121 million while membership climbed 61 percent to 116 million at the end of June. Analysts, on average, had projected a loss of 4 cents per share on revenue of $104.5 million, according to FactSet. LinkedIn shares rose $3.50, or almost 4 percent, to $99.02 in extended trading to recover part of a steep decline that occurred during the regular trading session amid a sweeping market sell-off. "The IPO and attention certainly helped raise the company's profile and compounded the momentum we had already been seeing," LinkedIn CEO Jeff Weiner said in a Thursday interview. The earnings in LinkedIn's most recent quarter represented the most money the company has made in any three-period so far in its eight-year history. It's still a puny profit for a company whose market value is sitting around $10 billion. Losses could loom ahead too. LinkedIn has indicated it's willing to sacrifice short-term earnings to increase spending on technology and new product development. Growth is also expected to slow, partly because of economic uncertainty and partly because of the temporary lift provided by the IPO publicity LinkedIn expects its third-quarter revenue to climb as high as $125 million, which would be slightly below the second-quarter growth rate of 120 percent. For the full year, LinkedIn sees its revenue rising to as high as $485 million, roughly doubling from $243 million in 2010. The company, which is based in Mountain View, Calif., thinks it is better positioned to weather another recession than most businesses because its network has been designed to help people find better jobs. "We connect talent with opportunity on a massive scale," Weiner said in the interview. "When times get tough like this, I think our platform can make a real difference in the lives of people." If LinkedIn loses money for a couple quarters, it may not bother investors too much, as long the company is still persuading millions more people to post their resumes and other information about their careers on its website. As its audience grows, LinkedIn's website will become a more attractive place for advertisers to promote their wares and for employers to recruit talent. LinkedIn gets more than two-thirds of revenues from fees that it charges companies, corporate recruiting services and other people who want broader access to the profiles and other data on the company's website. The remainder comes from advertising. In a conference call with analysts, Weiner said LinkedIn is adding about two members every second. That works out to about 173,000 new members, a pace that would give LinkedIn about 132 registered accounts by the end of September. Weiner told analysts the company had more than 120 million members as of Thursday. |
Just Show Me: How to update your Nintendo 3DS (Yahoo! News) Posted: 04 Aug 2011 06:31 PM PDT |
It turns out Mars might have flowing water after all (Yahoo! News) Posted: 04 Aug 2011 06:25 PM PDT |
GQ Names Zuckerberg Worst-Dressed Man in Silicon Valley (Mashable) Posted: 03 Aug 2011 06:00 PM PDT
[More from Mashable: Randi Zuckerberg Leaves Facebook, Starts Own Company] GQ's "15 Worst-Dressed Men of Silicon Valley" is a mean-spirited little article that seems to attack many of these billionaire gentlemen because of their shape or weight issues. And all of the descriptions of the men are simply catty. For example, here's GQ's writeup for Mark: "Style Sins: Oblivious to the fact that jeans and ties come in skinny sizes—or that suits exist—the father of Facebook (and we do mean father) loves to recycle the fresh-from-Stats-class look. Zuck's style is so poor, it even inspired a mock fashion line, Mark By Mark Zuckerberg, which thankfully doesn't sell any actual clothing." [More from Mashable: Nielsen Ratings Coming to Facebook This Month] Jeez, guys – that's just harsh. [Via GQ] This story originally published on Mashable here. |
Online jobs index dips in July, gains from year ago (Reuters) Posted: 04 Aug 2011 09:15 PM PDT NEW YORK (Reuters) – A gauge of online labor demand in the United States grew in July compared to a year earlier, but dipped on a monthly basis as the need for employees slowed in the summer months, a private research group said on Friday. Monster Worldwide Inc, an online careers and recruiting firm, said its employment index was at 144, up 4.3 percent from 138 in July 2010. Even so, the index dipped 1.4 percent from 146 in June when it was at its highest level in more than 2-1/2 years. The report saw annual growth in 11 of the 20 industries and 16 of the 23 occupations monitored last month. Demand was seen particularly in jobs that require specialized skills, such as information technology, engineering and healthcare, Monster said. "For highly skilled positions, recruitment is pretty strong, and companies are aggressive and even having challenges finding the right people," said Jesse Harriott, a senior vice president at Monster. Harriott said a month-over-month decline during the summer was typical. The Monster Employment index is a monthly analysis based on a selection of corporate career sites and job boards. The margin of error is approximately plus or minus 1 percent. The report was another look at the labor market ahead of the U.S. government's key jobs report due later on Friday. Nonfarm payrolls are expected to have increased 85,000 last month after rising only 18,000 in June. (Reporting by Leah Schnurr, Editing by Chizu Nomiyama) |
Top China paper scoffs at suggestion Beijing is hacking (Reuters) Posted: 04 Aug 2011 08:56 PM PDT BEIJING (Reuters) – China's top official newspaper on Friday dismissed as irresponsible suggestions that Beijing was the "state actor" that security company McAfee said this week was likely behind massive Internet hacking of government and companies. The report in the People's Daily, the main mouthpiece of China's ruling Communist Party, did not quote any official reaction to the hacking allegations but is the closest to an official response that Beijing has given to the McAfee report. McAfee said this week that it discovered a five-year long campaign of cyber attacks on the networks of governments, organisations and businesses. It did not name the "state actor" it believed was behind the attacks but several experts pointed the finger at China. Not so, said the People's Daily. "Linking China to Internet hacking attacks is irresponsible," it said. "The McAfee report claims that a 'state actor' engaged in hacking for a large-scale Internet espionage operation, but its analysis clearly does not stand up to scrutiny." McAfee said the 72 victims in the hacking campaign included the governments of the United States, Taiwan, India, South Korea, Vietnam and Canada. Other targets were the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee; and an array of companies, from defense contractors to high-tech enterprises. Jim Lewis, a cyber expert with the Center for Strategic and International Studies, earlier told Reuters it was very likely China was behind the hacking because some of the targets had information that would be of special interest only to Beijing. The People's Daily cited comments on the Internet that suggested McAfee published the report to alarm people into buying more of its cyber security technology. "In fact, as the number of hacking attacks on prominent international businesses and organisations has grown this year, some Western media have repeatedly depicted China as the villain behind the scenes," said the paper. The Chinese government has used the People's Daily to round on earlier foreign claims of hacking. In early June, Google said it suspected Chinese hackers of trying to steal the passwords of hundreds of Google email account holders, including those of U.S. government officials, Chinese rights activists and journalists. The overseas edition of the People's Daily hit back by saying that Google had become a "political tool" used to vilify the Chinese government, and warning that the U.S. Internet giant's statements could hurt its business. (Reporting by Chris Buckley; Editing by Ken Wills and Jonathan Thatcher) |
End of road for Starbucks laptop loungers? (Digital Trends) Posted: 04 Aug 2011 08:25 PM PDT If you haven't done it yourself, you'll have seen others at it. Starbucks (or any coffee shop with free Wi-Fi, for that matter) is a magnet for laptop owners who love coffee and the Internet in equal amounts….or perhaps the Internet a bit more than coffee. Those that have time on their hands might spend all afternoon in their seat, surfing the web, checking emails, and downloading songs, the long-ago bought bean-based beverage slowly metamorphosing from hot coffee to iced coffee. Well, if a practice reportedly operating in some of Starbucks' New York stores becomes more widespread, it could spell the end for the so-called laptop lounger. According to Cnet (via Gawker), several stores in the city have started covering their AC outlets with solid plates in the hope that the lounger will drink up and leave, thereby allowing another person (with a laptop?) to take their place and spend some money. Cnet said that a poster on the Starbucks Gossip site mentions two Starbucks stores where the AC outlets have been covered over: one at 14 West 23rd Street near Madison Square Park and the other at 8th Avenue and West 39th Street. Another poster wrote: "I will tell you that the NY Metro leadership team has stated they are against covering the outlets because it is a passive aggressive way to deal with the issue. However, in extreme cases, they have approved this action because (and let's be real here) some people just cannot be reasoned with." The Wall Street Journal has been informed by a Starbucks spokesman that there is currently no company-wide policy regarding the availability of power outlets, although individual stores are permitted to make a decision on the matter if they feel it is necessary. We can understand it if the store is full of loungers sipping on one coffee for eight hours, preventing customers who want a quick drink from getting a seat. But just blocking the outlets without any announcement may be the wrong way to go about it. Of course, they could always start charging for Wi-Fi, or limit the time allowed on the net. For those who use Starbucks as their office and are keen to continue their nine-to-five shift there, the simple solution would be to turn up at the coffee shop with a bagful of fully charged batteries.
Image: Elvert Barnes |
Seagate GoFlex tops Android Apps of the Week (Appolicious) Posted: 04 Aug 2011 01:30 PM PDT |
Facebook mulling news feed changes that benefit advertisers (Digital Trends) Posted: 04 Aug 2011 09:32 PM PDT Likely to announce more changes for Facebook users at the 2011 Facebook f8 developer conference, Facebook is currently testing a version of the news feed that shows all friend behavior including application activity and product likes. This version of the Facebook news feed offers developers and advertisers a greater chance at exposure. This unfiltered news feed will also increase viability of comments around brand pages or product likes. By including comments within the news feed, Facebook is hoping for greater interest in brands. Facebook is also mulling over increased functionality to the Like button. By increasing the variety of responses to "Want", "Need" or "Have", Facebook can better identify what a user desires and use that information to target advertising more effectively. While proponents of the long-desired "Dislike" button are quick to believe these revisions will include the negative response as well, but it's unlikely that Facebook will launch a button that will turn advertisers against the social network. For instance, cyber vigilantes could quickly turn on a brand or business with the dislike button on the associated brand page. Brands are already actively policing social media pages when negative press is released about the corresponding company. Facebook has yet to announce a date for the Facebook f8 developer conference held in San Francisco, California. Last year's event was held during April 2010. It's also possible that the unfiltered news feed isn't welcomed by members of the site and won't roll out to all 750 million users. Before the updated, much-maligned chat bar appeared on the right side of the page for users with widescreen monitors, Facebook was testing a scrolling version of the news feed in the same area of the page. However, if Facebook combines the two ideas, the right side of the page could contain the unfiltered news feed and middle of the page would remain the same. |
Microsoft about to deliver some security love with 13 patches (Digital Trends) Posted: 04 Aug 2011 07:19 PM PDT Microsoft's newest security offering is almost here, which means we're that much closer to breathing just a bit easier. Next Tuesday, the company is slated to release a set of 13 patches designed to fix 22 security holes in Windows, Internet Explorer and Office. It isn't exactly the biggest round of updates Microsoft has put out this year. Oddly enough, Computerworld says that's unexpected because the company usually delivers the largest updates on even-numbered months. The numbers support it: in July, updates fixed 22 holes, while in June they fixed 34 and in April 64 problems were addressed. While you're welcome to come up with your own conspiracy theories as to why there are more bugs to deal with on certain months, the pattern is mostly due to Microsoft's bi-monthly update schedule for Internet Explorer. And true to form, the first update (or bulletin, in Microsoft-speak) is a patch for IE labeled "critical," Microsoft's highest urgency rating. The patch applies to every generation of IE, including new-fangled IE9, and is probably the most important update of the bunch because the bugs in IE can provide an open window for hack attacks. There's one other update labeled critical, this time aimed at Windows operating systems themselves. Microsoft says its critical patches are for "vulnerabilit[ies] whose exploitation could allow the propagation of an Internet worm without user action." A quick installation is recommended. Interestingly, five of the 13 updates don't have support for Windows XP. It could be a sign that those with a hacking persuasion have moved on to newer pastures. Or, with Microsoft doing its best to shoo people away from the decade-old OS, perhaps the folks down at Redmond figured they'd save some time patching up a dying platform. With nearly half the world still using XP, it's doubtful, but even Microsoft's got to save money, right? Photo via Wikipedia |
Cut the Rope: Experiments tops iPhone Games of the Week (Appolicious) Posted: 04 Aug 2011 03:00 PM PDT |
Hack turns Square into criminal tool (AFP) Posted: 04 Aug 2011 09:26 PM PDT LAS VEGAS (AFP) – Hackers have shown how to turn mobile payment service Square into a convenient tool for criminals to pump cash from stolen credit card numbers. Adam Laurie and Zac Franken of computer security firm Aperture Labs used a homemade software program and an easily bought iPad audio wire to trick Square in a way that could be a bonanza for crooks. Laurie could type credit card numbers into his laptop, which converts to sound data sent to Square, where the transaction registers as if a real card were swiped in a dongle. "Traditionally, the way you make money from stolen credit cards is sell the data to someone else or buy goods on it, then resell the goods and get the cash," Laurie said while demonstrating the hack at a Black Hat computer security gathering in Las Vegas. "This really takes the hassle out of it... I can put the money right in the account and it only costs me 2.75 percent." The percentage he cited was the fee charged by Square, which was co-founded by Jack Dorsey, a Silicon Valley star who helped create popular micro-blogging service Twitter. Square markets a pocket-sized credit card reader that can be plugged into a smartphone to allow anyone to accept credit or debit card payments on the spot. Franken and Laurie, whose hacker name is "Major Malfunction," said that they were waiting for a flight at an airport when then figured out how to convert Square into a handy tool for cashing in on stolen credit cards. Laurie realized that the Square "dongle" used to swipe credit cards plugged into an iPad audio jack, indicating that the small device essentially converted magnetic stripe data to sound then interpreted by the service's software. He quickly modified software he wrote five years earlier for reading and replicating magnetic stripe data. Franken and Laurie strolled to an airport shop and bought a wire to plug his laptop into the iPad jack where the dongle would have gone. "Credit card data is getting skimmed all the time," Laurie said, holding up a pre-paid credit card he used for the demonstration. "Instead of buying this I could have bought it on the Internet from a criminal gang." Funds are dumped into an individual's Square account to be removed before anyone catches on, according to the hackers. "You'd have to set up dodgy accounts that don't trace back to you," Laurie said. "But, that is standard practice." Laurie and Franken said that they shared their findings with Square in February only to be told that it wasn't seen as a threat and that traffic analysis would expose those kinds of transactions. The hackers had also heard unconfirmed reports that Square planned to release new dongles that encrypt transaction data. "Encryption would be a good thing," Franken said. "The way it is at the moment a cable between two devices and you can inject credit card numbers right into the system," he continued. Since Square promises to have money from transactions in accounts within a day, money milked from stolen credit card data could be made off with quickly provided amounts were extreme enough to be noticed, Franken said. |
Rapper Lil Wayne slapped with $15 million lawsuit (Reuters) Posted: 04 Aug 2011 06:32 PM PDT LOS ANGELES (Reuters) – Rapper Lil Wayne has been slapped with a $15 million lawsuit by a Georgia company that claims he stole the song "BedRock," according to a lawsuit filed in New York. Georgia-based production company Done Deal Enterprises accuses the rapper, whose real name is Dwayne Carter, of copyright infringement for the song that Done Deal claims it created in 2009. The lawsuit, filed in District Court for the Southern District of New York on July 29, also names Universal Music Group, Cash Money Records and Young Money Entertainment as defendants. "BedRock" also features singers Drake, Nicki Minaj and Lloyd, and it reached No. 2 on Billboard's charts in 2010. Lil Wayne, who was released from jail in November last year after serving time on a gun possession charge, has been ordered to appear in court on October12. (Reporting and writing by Carly Mayberry; Editing by Bob Tourtellotte) |
Posted: 04 Aug 2011 07:56 PM PDT Built on the Adobe Air platform, Warner Bros. launched the public beta of Flixster Collections yesterday. The desktop app for PC and Mac allows users to import television shows and movies from third party services including Netflix, Hulu Plus and Amazon On-Demand. The app is very similar to the Digital Everywhere app that Warner Bros. showed off in early 2011, simple re-branded under the Flixster names. Warner Bros. acquired Flixster in May of this year in addition to Rotten Tomatoes for an amount between $60 and $90 million dollars. The purpose of the app is to organize and aggregate all entertainment options into a single place. When a user is attempting to decide which movie or television show to watch, Warner Bros hopes that decision starts with Flixster Collections. Warner Bros. is also using the app to market its theatrical and television content. The app allows users to rent Warner Bros. movies such as The Dark Knight for $2.99. It also provides links to renting movies on third party services, but does not provide pricing or the length of time of the rental. For instance, renting The Dark Knight on Amazon is the same price, but offers a 48-hour rental period. Flixster Collections also stores credit card information for any rentals purchased within the application. Early criticism of the application is directed at the slow performance of the application when importing collection information as well as misleading information around what's being shared in social feeds. Users have the ability to connect to Facebook and share every action around watching content on the social network. Users can also enter titles manually into the application in order to mark any DVD or Blu-ray in their collection. It's likely that Warner Bros. is planning to incorporate UltraViolet technology into the application at some point and allow users to utilize cloud service when attempting to access content when physical media isn't available. |
Security expert warns of way to attack SAP systems (Reuters) Posted: 04 Aug 2011 06:52 PM PDT LAS VEGAS (Reuters) – A software security expert warned that flaws in the design of business management software from SAP AG can allow hackers to easily break into corporate computer systems via the Internet. Alexander Polyakov, chief technology officer of software security firm ERPScan, unveiled the vulnerabilities on Thursday at the Black Hat hacking conference in Las Vegas. He said the flaws affect systems that corporate workers use to access their software systems over the Internet. Polyakov was one of dozens of hacking experts to make presentations at the annual gathering, which is attended by security professionals who want to learn about the latest security vulnerabilities. He said in an interview that he can set up a query using Google Inc's search engine that would identify systems that are vulnerable to attack. In some cases, he said, he could set up fictional accounts to access those systems, granting those users wide access to secret corporate data. He could also delete some valuable data by overwriting databases with "trash," he said. Officials with SAP could not be reached for comment. Polyakov said that the software maker has told him it expects to release a program to fix the security vulnerability within about a week. (Reporting by Jim Finkle; Editing by Gary Hill( |
You are subscribed to email updates from Yahoo Tech News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment