mpicpp writes "It looks thicker than most of the phones you see at Best Buy, but Boeing's first smartphone isn't meant to be used by the average person. The company that's known for its airplanes is joining the smartphone game with the Boeing Black, targeted at people that work in the security and defense industry. One of its security features is self-destructing if it gets into the wrong hands, although not quite in the Mission Impossible sense. According to the company's letter to the FCC, the phone will have screws with a tamper-proof coating, revealing if a person has tried to disassemble it. 'Any attempt to disassemble the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,' writes Bruce Olcott, an attorney for Boeing."
An anonymous reader writes "Earlier this week, Google Android chief Sundar Pichai spoke at the Mobile World Congress where he explained, rather bluntly, that Android is designed to be open more so than it's designed to be safe. He also added that if he were a hacker today, he too would focus most of his efforts on Android on account of its marketshare position." Related: wiredmikey writes "Boeing is launching 'Boeing Black phone,' a self-destructing Android-based smartphone that the company says has no serviceable parts, and any attempted servicing or replacing of parts would destroy the product. 'Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,' the company explained. ... The device should not be confused with the new encrypted Blackphone, developed by the U.S. secure communications firm Silent Circle with Spanish manufacturer Geeksphone."
harrymcc writes "Google is releasing more details on Project Ara, its effort — originally spearheaded by Motorola — to reinvent the smartphone in a form made up of hot-swappable modules that consumers can configure as they choose, then upgrade later as new technologies emerge. Google is aiming to release about a year from now."
alphadogg writes "Ahead of a major new spectrum auction scheduled for next year, America's four major wireless carriers are jockeying for position in the frequencies available to them, buying, selling and trading licenses to important parts of the nation's airwaves. Surging demand for mobile bandwidth, fueled by an increasingly saturated smartphone market and data-hungry apps, has showed no signs of slowing down. This, understandably, has the wireless industry scrambling to improve its infrastructure in a number of areas, including the amounts of raw spectrum available to the carriers. These shifts, however, are essentially just lateral moves – nothing to directly solve the problems posed by a crowded spectrum. What's really going to save the wireless world, some experts think, is a more comprehensive re-imagining of the way spectrum is used."
An anonymous reader writes "Researchers at the University of Liverpool have shown for the first time that WiFi networks can be infected with a virus that can move through densely populated areas as efficiently as the common cold spreads between humans. The team designed and simulated an attack by a virus, called 'Chameleon,' that not only could spread quickly between homes and businesses, but avoided detection and identified the points at which WiFi access is least protected by encryption and passwords. The research appears in EURASIP Journal on Information Security." The technical details are explained in the journal article.
An anonymous reader writes "Jeff Atwood, co-founder of Stack Overflow, says the mobile app ecosystem is getting out of hand. 'Your platform now has a million apps? Amazing! Wonderful! What they don't tell you is that 99% of them are awful junk that nobody would ever want.' Atwood says most companies trying to figure out how to get users to install their app should instead be figuring out just why they need a mobile app in the first place. Fragmentation is another issue, as mobile devices continue to speciate and proliferate. 'Unless you're careful to build equivalent apps in all those places, it's like having multiple parallel Internets. "No, sorry, it's not available on that Internet, only the iOS phone Internet." Or even worse, only on the United States iOS phone Internet.' Monetization has turned into a race to the bottom, and it's led to worries about just what an app will do with the permissions it's asking for. Atwood concludes, 'The tablet and phone app ecosystem is slowly, painstakingly reinventing everything I hated about the computer software industry before the web blew it all up.'"
exomondo writes "Following hot on the heels of the iOS (and OS X) SSL security bug comes the latest vulnerability in Apple's mobile operating system. It is a security bug that can be used as a vector for malware to capture touch screen, volume rocker, home button and (on supported devices) TouchID sensor presses, information that could be sent to a remote server to re-create the user's actions. The vulnerability exists in even the most recent versions of iOS and the authors claim that they delivered a proof-of-concept monitoring app through the App Store."
pacopico writes "About 24 years ago, a tiny chip company came to life in a Cambridge, England barn. It was called ARM, and it looked quite unlike any other chip company that had come before it. Businessweek has just published something of an oral history on the weird things that took place to let ARM end up dominating the mobile revolution and rivaling Coke and McDonald's as the most prolific consumer product company on the planet. The story also looks at what ARM's new CEO needs to do not to mess things up."
alphadogg writes "U.S. cellphone carriers were offered a technology last year that supporters say would dramatically cut incidents of smartphone theft, but the carriers turned it down, according to sources with knowledge of the proposal. The so-called 'kill-switch' software allows consumers to remotely wipe and render their phones useless if stolen. Law enforcement and politicians believe the incentive for stealing a smartphone or tablet would be greatly reduced if the technology became standard, because the devices could quickly be rendered useless. A proposal by Samsung to the five largest U.S. carriers would have made the LoJack software, developed by Canada's Absolute Software, a standard component on many of its Android phones in the U.S. The proposal followed pressure from the offices of the San Francisco District Attorney and the New York Attorney General for the industry to do more to prevent phone theft."
squiggleslash writes "Despite some industry skepticism, Nokia has indeed been working on an Android smartphone and finally unveiled the Nokia X today. As rumored, it's not a Google Play compatible device, running instead a Google-less AOSP build with a Nokia app store, and Windows Phone style shell. The budget phone will also not be marketed in North America. The Media seems convinced Microsoft — who are in the process of acquiring Nokia — will kill the project, but it's hard to see why Nokia would be working on such a project at this time if Microsoft had plans to do this."
wiredmikey writes "Users of iOS devices will find themselves with a new software update to install, thanks to a certificate validation flaw in the mobile popular OS. While Apple provides very little information when disclosing security issues, the company said that an attacker with a 'privileged network position could capture or modify data in sessions protected by SSL/TLS.' 'While this flaw itself does not allow an attacker to compromise a vulnerable device, it is still a very serious threat to the privacy of users as it can be exploited through Man-in-the-Middle attack,' VUPEN's Chaouki Bekrar told SecurityWeek. For example, when connecting to an untrusted WiFi network, attackers could spy on user connections to websites and services that are supposed to be using encrypted communications, Bekrar said. Users should update their iOS devices to iOS 7.0.6 as soon as possible." Adds reader Trailrunner7: "The wording of the description is interesting, as it suggests that the proper certificate-validation checks were in place at some point in iOS but were later removed somehow. The effect of an exploit against this vulnerability would be for an attacker with a man-in-the-middle position on the victim's network would be able to read supposedly secure communications. It's not clear when the vulnerability was introduced, but the CVE entry for the bug was reserved on Jan. 8."
Nerval's Lobster writes "Google's Advanced Technology and Projects Group is working on a new initiative, Project Tango, which could allow developers to quickly map objects and interiors in 3D. At the heart of Project Tango is a prototype smartphone with a 5-inch screen, packed with hardware and software optimized to take 3D measurements of the surrounding environment. The associated development APIs can feed tons of positioning and orientation data to Android applications written in Java, C/C++, and the Unity Game Engine. In addition to a 'standard' 4-megapixel camera, the device features a motion-tracking camera and an aperture for integrated depth sensing; integrated into the circuitry are two computer-vision processors. Google claims it only has 200 developer units in stock, and it's willing to give them to independent developers who can submit a detailed idea for a project involving 3D mapping of some sort. The deadline for unit distribution is March 14, 2014. In theory, developers could use ultra-portable 3D mapping to create better maps, visualizations, and games. ('What if you could search for a product and see where the exact shelf is located in a super-store?' Google's Website asks at one point.) The bigger question is what Google intends to do with the technology if it proves effective. Google Maps with super-detailed interiors, anyone?"
An anonymous reader writes "Sailfish, the Linux-based mobile operating system developed by Finnish devicemaker Jolla, has reached version 1.0. Sailfish arose from the ashes of several failed and interrupted projects to bring a new, major Linux-based platform to mobile devices. It's already running on phones sold in India and Russia, but more importantly, Sailfish was designed to be easily ported to existing Android devices. It's also built to support many Android apps. Jolla will begin providing complete firmware downloads during the first half of the year."
An anonymous reader writes "Attackers have crafted the E-Z-2-Use malware code that exploits a 14-month-old vulnerability in Android devices. The vulnerability exists in the WebView interface a malicious website can utilize it to gain a remote shell into the system with the permissions of the hijacked application. Vulnerable devices are any device that is running a version earlier than 4.2 (in which the vulnerability was patched) which is a staggeringly large amount of the market. The vulnerability is in Android itself rather than the proprietary GMS application platform that sits atop the base operating system so it is not easily patched by Google."
colinneagle writes "Amid all the talk about Microsoft forking Android for a smartphone OS, one suggestion involves a look back to Microsoft's DOS days. Microsoft DOS was designed per IBM's specification to run exclusively on IBM's PC hardware platforms. Phoenix Technologies employed software developers it nicknamed 'virgins,' who hadn't been exposed to IBM's systems, to create a software layer between Microsoft's DOS system and PCs built by IBM's competitors. This helped Microsoft avoid infringing on IBM's patents or copyrights, and subsequently helped fuel the explosive growth of PC clones. Microsoft could use the same approach to 'clone' the proprietary Android components in its own Android fork. This would prevent copyright infringement while giving Microsoft access to Google Play apps, as well as Android's massive base of developers." Microsoft (or anyone) could generate a lot of goodwill by completely replacing the proprietary bits of Android; good thing that doing so is a work in progress (and open-source, too), thanks to Replicant. (Practically speaking, though, couldn't Google just make access to the Play Store harder, if Microsoft were to create an Android-alike OS? Even now, many devices running Android variants don't have access to it.)