[Researcher Wanqiao] Zhang says the attacks are possible because LTE networks allow users to be handed over to underused base stations in the event of natural disasters to ensure connectivity. "You can create a denial of service attack against cellphones by forcing phones into fake networks with no services," Zhang told the conference. "You can make malicious calls and SMS and...eavesdrop on all voice and data traffic."
The deal reflects "big changes in consumption of video particularly among millennials," according to one former FCC commissioner, and the article also reports that the deal "will face serious opposition." Massachusetts Democrat Edward Markey warned "we need more competition, not more consolidation... Less competition has historically resulted in fewer choices and higher prices for consumers..." And in a Saturday speech, Donald Trump called it " an example of the power structure I'm fighting...too much concentration of power in the hands of too few."
"I was frankly a bit shocked," said Andrew Crocker, a staff attorney at the Electronic Frontier Foundation, when he learned about the scope of search warrant. "As far as I know, this warrant application was unprecedented"... He also described requiring phones to be unlocked via fingerprint, which does not technically count as handing over a self-incriminating password, as a "clever end-run" around constitutional rights.
'I know my show is protected, and it empowers me to be more honest and open with the audience,' says Dave Chappelle...But some fans object to not being able to disseminate and see live shows via videotape...
"In this day and age, my phone is how I keep my memory," one live-music fan told the Washington Post, adding "If you don't want your music heard, then don't perform it." But the device is becoming more common, and according to the Times it's now also being used at weddings, restaurants, schools, and when movies are being prescreened.
Their article also lists AR companies that Apple's bought over the last three years -- plus their patents for a "head-mounted display" and a "peripheral treatment for head-mounted displays." BGR adds that Tim Cook "likes to tease future products," and points out that Cook has even said Apple is working on AR features "behind the curtain". This casts a new light on those rumors of an all-glass case for next year's iPhone 8. Will the whole body of the phone become part of an Augmented Reality display system? (And could AR also explain Apple's aggressive push for wireless headphones?)
Despite contacting Apple five separate times, the reporter has yet to receive any official response, although "I have gotten hundreds of emails from consumers who have had to buy new phones to replace their broken iPhone 6 Pluses."
Of course, last year Baidu was also accused of gaming the testing for their image-recognition software.
When it comes to internet browsing time, arguably the more important measurement, the results were a lot closer...but the iPhone 7 still came bottom. The 615 minutes of battery life offered by the iPhone 7 is 25 minutes less than its nearest rival, the LG G5, and 175 minutes less than the top performing HTC 10.
The researchers point out that the iPhone 7 has a smaller battery -- but that's leaving critics unimpressed. The Guardian newspaper is asking, "How good can a phone be if the battery doesn't last even a day?"
The article runs through great moments in the history of false alerts -- including a 1971 incident where the national warning system mistakenly sent out the pre-nuclear attack warning, "normal broadcasting will cease immediately," and warnings in 2013 about zombie attacks in Montana, New Mexico, and Michigan. "To tell anybody that an agency is immune to these attacks would be a grave injustice," said the IT overseer at Iowa's Department of Public Safety.
The trouble, of course, is not so much the code, but in the training. The best speech recognition code isn't going to be competitive unless it has been trained with about as many millions of hours of example speech as the closed engines from Apple, Google and so forth have been. How can we do that? The same problem exists with AI. There's plenty of open-source AI code, but how good is it unless it gets training and retraining with gigantic data sets?
And even with that data, Siri gets trained with a massive farm of GPUs running 24/7 -- but how can the open source community replicate that? "Who has a plan, and where can I sign up to it?" asks jernst. So leave your best answers in the comments. Who's building the open source version of Siri?
"Demand is off the charts!" the app informed its users, adding "Fares have increased to get more Ubers on the road." Uber soon tweeted that they'd deactivated their surge pricing algorithm for the affected area in Chelsea, "but passengers in other areas of Manhattan said they were still being charged higher than normal fares." One of the affected passengers was Michael Cohen, who is Donald Trump's lawyer, who tweeted that Uber was "taking total advantage of chaos and surcharging passengers 1.4 to 1.8 times." And another Uber user tweeted "I'm disgusted. People are trying to get home safe. Shame on you #DeleteApp."
Three Australian airlines have already banned use of the phone, and by last week 35 incidents had been reported to Samsung, which believes that the exploding batteries affect 24 phones out of every million (or one phone out of every 41,666).
This was the last key iPhone component that didn't have two sources, and the Journal estimates that Intel's revenues could now increase by up to $700 million before the end of 2016.
The Commission is advising renters to avoid syncing their mobile phones to their rental car, or to power devices via a USB port, where settings on your device may allow automatic syncing of data. Consumers who do connect their device should scrutinize any requests for permissions.
Security researchers have also discovered another car-related vulnerability. The software connecting smartphones to in-vehicle "infotainment" systems could also make cars vulnerable to remote attacks.
According to Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify the employees who can enable network mapping and man-in-the-middle attacks.