Intel Selling 3D Smartphone
January 18, 2016 by admin
Filed under Smartphones
Comments Off on Intel Selling 3D Smartphone
Intel has created a new smartphone with a 3D RealSense camera that can recognize objects and detect motion and gestures, much like a Kinect camera.
The smartphone is being made available as a reference device for anyone interested in discovering new uses for 3D cameras in handsets. The 3D camera is a smaller and more advanced version of the RealSense cameras in PCs and tablets.
For $399, users will get an Android smartphone with a 6-inch screen that can display images at a 2560 x 1440-pixel resolution. The RealSense ZR300 depth camera, which is placed at the edge of the phone, can capture 10 million points per second. The phone also has a 2-megapixel front camera and 8-megapixel rear camera.
The phone isn’t for daily use, but more for capturing 3D images, taking cool selfies and experimenting with the RealSense camera. It has only 3G connectivity, so aside from the camera features it isn’t very useful beyond making basic phone calls. It has an Intel Atom x7-Z8700 processor, which is in Microsoft’s Surface 3, so don’t expect long battery life. It has 64GB of storage, Bluetooth, Wi-Fi and an HDMI port.
Users can reserve the smartphone; Intel did not provide a shipping date. It will only ship to U.S. customers.
Source- http://www.thegurureview.net/mobile-category/intels-3d-smartphone-to-go-on-sale-for-399.html
Stagefright 2.0 Exploits Android Vulnerabilities
Comments Off on Stagefright 2.0 Exploits Android Vulnerabilities
Newly found vulnerabilities in the way Android handles media files can allow attackers to compromise devices by tricking users into visiting maliciously crafted Web pages.
The vulnerabilities can lead to remote code execution on almost all devices that run Android, starting with version 1.0 of the OS released in 2008 to the latest 5.1.1, researchers from mobile security firm Zimperium said in a report published Thursday.
The flaws are in the way Android processes the metadata of MP3 audio files and MP4 video files, and they can be exploited when the Android system or another app that relies on Android’s media libraries previews such files.
The Zimperium researchers found similar multimedia processing flaws earlier this year in an Android library called Stagefright that could have been exploited by simply sending Android devices a maliciously crafted MMS message.
Those flaws triggered a coordinated patching effort from device manufacturers that Android’s lead security engineer, Adrian Ludwig, called the “single largest unified software update in the world.” It also contributed to Google, Samsung and LG committing to monthly security updates going forward.
One of the flaws newly discovered by Zimperium is located in a core Android library called libutils and affects almost all devices running Android versions older than 5.0 (Lollipop). The vulnerability can also be exploited in Android Lollipop (5.0 – 5.1.1) by combining it with another bug found in the Stagefright library.
The Zimperium researchers refer to the new attack as Stagefright 2.0 and believe that it affects more than 1 billion devices.
Since the previous attack vector of MMS was closed in newer versions of Google Hangouts and other messaging apps after the previous Stagefright flaws were found, the most straight-forward exploitation method for the latest vulnerabilities is through Web browsers, the Zimperium researchers said.
Zimperium reported the flaws to Google on Aug. 15 and plans to release proof-of-concept exploit code once a fix is released.
That fix will come on Oct. 5 as part of the new scheduled monthly Android security update, a Google representative said.
Source-http://www.thegurureview.net/mobile-category/stagefright-2-0-exploits-android-vulnerabilities.html