iOS 8 upgrades grind to a halt


It appears that the excitement over iOS upgrades has waned as huge swathes of iOS 7 users appear to be reluctant – or unable – to upgrade to iOS 8.

Data released by Apple shows that 56 percent of users accessing the Apple App Store are currently running iOS 8 or above, with 40 percent still clinging onto iOS 7. The needle has barely shifted since the end of October when iOS 8 adoption hit 52 percent.
Since the end of October iOS 8 usage has only increased by four percentage points.
At its peak, iOS 7 hit 78 percent adoption.

There are a number of obstacles in the way of people upgrading their iOS device. The first is that the OTA – Over The Air – download is many gigabytes, making it problematic for people with a slow internet connection.

Then there's the fact that the update requires a huge amount of free space to install, forcing users to delete apps and data. Depending on your hardware, you'll need between 4.7GB and 6.9GB of free storage space, and that's massive, especially for devices that started out with only 16GB of space in the beginning (minus what iOS takes when installed).

This problem can be overcome by doing the update through iTunes on a PC or Mac, but many users no longer connect their iDevice to a computer.
Then there was the iOS 8.0.1 update that wreaked havoc for new iPhone 6 Plus owners. This incident, albeit rather limited in scope, dented confidence in Apple being able to deliver problem-free updates.
While 56 percent adoption in 40 days is slow for Apple, put in the context of Android it is excellent penetration. Android 4.4 KitKat, debuted at the end of October 2013, is still hovering at around 30 percent a year later.

Obama Urges F.C.C. to Adopt Strict Rules on Net Neutrality



WASHINGTON — President Obama on Monday put the full weight of his administration behind an open and free Internet, calling for a strict policy of so-called net neutrality and formally opposing deals in which content providers like Netflix would pay huge sums to broadband companies for faster access to their customers.
The president’s proposal is consistent with his longstanding support for rules that seek to prevent cable and telephone companies from providing special access to some content providers. But the statement posted online Monday, as Mr. Obama traveled to Asia, is the most direct effort by the president to influence the debate about the Internet’s future.
In the statement, and a video on the White House website, Mr. Obama urged the Federal Communications Commission to adopt the strictest set of neutrality rules possible and to treat consumer broadband service as a public utility, similar to telephone or power companies.


“We cannot allow Internet service providers to restrict the best access or to pick winners and losers in the online marketplace for services and ideas,” Mr. Obama wrote in the statement.
The F.C.C. is an independent agency not subject to Mr. Obama’s direct authority. But the president is adding his voice to the 3.7 million people who submitted comments to the agency, most on behalf of a free and open Internet in which broadband companies could not pick which content would arrive quickly and which would be slowed down.
Mr. Obama said that new rules under consideration by the F.C.C. should adhere to several key principles: No website or service should be blocked by an Internet service provider; no content should be purposefully slowed down or sped up; there should be more transparency about where traffic is routed; and no paid deals should be made to provide a speed advantage to some providers over others in delivering content.


That last principle would directly affect some of the megadeals already being made by companies like Netflix, whose video streaming service has been gobbling up bandwidth and slowing down the Internet as millions of people attempt to watch movies and television shows on their computers and tablets.
Earlier this year, Netflix struck a deal with Comcast under which it pays Comcast for a direct connection into its broadband network so subscribers experience less delay in viewing Netflix’s streaming video.
Mr. Obama said he opposed such deals and urged the commission to adopt rules that would prevent them.
“Simply put: No service should be stuck in a ‘slow lane' because it does not pay a fee,” Mr. Obama wrote. “That kind of gatekeeping would undermine the level playing field essential to the Internet’s growth. So, as I have before, I am asking for an explicit ban on paid prioritization and any other restriction that has a similar effect.”
Tom Wheeler, chairman of the Federal Communications Commission, on Monday said he welcomed the president’s input and said he agreed that the Internet should remain free and open. But he did not say whether he would fully support reclassifying broadband as a utility. He did say, however, that the F.C.C. would need more time to formulate its rules, meaning that a proposal was unlikely to come by the end of the year.
Mr. Wheeler had most recently been leaning toward a hybrid approach to net neutrality, one that would keep a light touch on the consumer end of Internet service but that would apply the more strict Title II oversight to the relationship between an Internet service provider and content companies.
“Whether in the context of a hybrid or reclassification approach,” he said, “Title II brings with it policy issues that run the gamut from privacy to universal service to the ability of federal agencies to protect consumers, as well as legal issues ranging from the ability of Title II to cover mobile services to the concept of applying forbearance on services under Title II.”


“We found we would need more time to examine these to ensure that whatever approach is taken, it can withstand any legal challenges it may face,” he said.
Reaction from some of the biggest broadband companies was swift and negative. Shares of some of the big broadband providers, including Comcast and Time Warner Cable, were down about 3 percent on Monday morning.
Verizon, which brought the court challenge that struck down the F.C.C.'s 2010 rules on net neutrality, called Mr. Obama’s proposal “a radical reversal of course that would in and of itself threaten great harm to the Internet.”
Both Verizon, which provides both wired and wireless broadband services, and CTIA-The Wireless Association, the leading mobile phone association, also decried Mr. Obama’s call to apply net neutrality rules to wireless broadband.
“Imposing antiquated common carrier regulation, or Title II, on the vibrant mobile wireless ecosystem would be a gross overreaction,” said Meredith Attwell Baker, president and chief executive of the trade association and a former Republican commissioner for the F.C.C.
Such action “would impose inappropriate regulation on a dynamic industry and would threaten mobile providers’ ability to invest and innovate, all to the detriment of consumers,” she said.
Consumers groups hailed the president’s statement. Gene Kimmelman, president of Public Knowledge, said: “Today the Obama administration expanded its leadership to promote an open Internet by supporting the strongest tools to prevent blocking or throttling of Internet traffic, and by also supporting the strongest tools to deter fast lanes and prioritized traffic on the public’s most essential communications platform of the 21st century.”
Video

Play Video|2:53

How Net Neutrality Works

The future of protecting an open Internet has been the subject of fierce debate, and potential changes to the rules by the Federal Communications Commission could impact your online experience.
Video by Natalia V. Osipova and Carrie Halperin on Publish Date May 15, 2014.
Read More >>

We petition the obama administration to: President Obama, Lets Preserve Net Neutrality. Lets start treating broadband like a communications service!

We petition the obama administration to:

President Obama, Lets Preserve Net Neutrality. Lets start treating broadband like a communications service!

The FCC is spitting in the eyes of the millions of Americans who demanded real Net Neutrality by reclassifying ISP's as Title II services.
We need the FCC to implement a strong Title II rule that bans fees and discrimination.
If they don’t, Obama will go down in history as the president who broke the Internet.
But there’s hope:
FCC Chairman Tom Wheeler can correct the agency’s past mistakes and truly protect our nation’s communications infrastructure. The agency must take the necessary steps to make broadband networks open, accessible, reliable and affordable for everyone.
Tell the FCC to do its job and preserve the openness of the Internet.

SIGN PETITION HERE

Yet another major ISP is using your cable modem to offer free WiFi hotspots


Several Internet Service Providers in the United States use subscribers’ cable modems to broadcast free WiFi hotspots to other customers in the area. While notes about this practice are always buried somewhere in terms and conditions or other notices, subscribers are often unaware of this practice. And as might be expected, they’re often taken aback when they learn for the first time that their Internet connections are being used to provide strangers with free WiFi.

Earlier this year, Comcast subscribers in Minnesota were surprised to learn that their modems were broadcasting free WiFi to anyone and everyone nearby who might be a Comcast customer. While ISPs claim these free WiFi networks are secure and completely separate from consumers’ home Internet service, the continued threat from hackers who find new ways to steal our data is a concern that might still weighs heavy.

Now, customers are being reminded once again that Cablevision will also use its customers’ home Internet modems to broadcast free WiFi hotspots.

As reported by LightReading, Cablevision confirmed during its recent earnings call that it is upgrading its Optimum Online modems in order to add free WiFi hotspot functionality. Once the upgrades are complete,

Cablevision says it will offer more than 1 million WiFi hotspots across the country.
It should be noted that Optimum Online subscribers will have the ability to disable the free public hotspot feature on their modems.
Read More >>

How To Install Windows 10 Technical Preview In A Sandbox

If you love Windows and just can’t wait for the final public release of Windows 10 then don’t worry Windows 10 Technical Preview is here and available to download and install at your leisure. Microsoft made the OS available for download recently and it’s available free of charge.

If you want to get up close and personal with the latest version of Windows then you have a couple options. First up, if you have an old PC that isn’t doing very much then you could install Windows 10 from a flash drive. That may not be the best solution. We think it would be better to run the new OS inside a “sandbox,” a virtual machine. This way it won’t affect your system in any way and it’ll be more convenient than rummaging around for that old PC.




To install Windows 10 Technical preview doesn’t take too long, the whole process takes approximately 30 (depending on the speed of your PC).

This is a quick guide on how to install what you need in a few steps:


1: Start off by navigating Microsoft’s website and download the Windows 10 Technical Preview ISO file. Just simply click through the “Get Started” and “Join Now” screens, then scroll down and choose the appropriate language and version (32- or 64-bit).

2: Download and install Oracle VM VirtualBox, the free virtualization tool which is going to make it possible for you to run Windows 10 inside Windows.

3: Run VirtualBox, then click the New icon. In the Create Virtual Machine dialog box, type ‘Windows 10,’ then click the version selector and choose Windows 8.1 You must ensure that you match the ISO to what you downloaded, either 32 or 64 bit, to what version is listed for 8.1.

Read More >>

How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper

Tomorrow at MALCON 2014, security researcher Mordechai Guri with guidance of Prof. Yuval Elovici from the cyber security labs at Ben Gurion University in Israel will present a breakthrough method (“AirHopper) for leaking data from an isolated computer to a mobile phone without the presence of a network. In highly secure facilities the assumption today is that data can not leak outside of an isolated internal network. It is called air-gap security. The common policy in such secure organizations is to leave your mobile phone in some locker when you enter the facility and then pick it up when you go out. We at the cyber security labs challenged this assumption and found a way to leak data from a computer inside the organization to a remote a mobile phone without using Wifi or Bluetooth. “Such technique can be used potentially by people and organizations with malicious intentions and we want to start a discussion on how to mitigate this newly presented risk.” said Dudu Mimran CTO of the cyber security labs. - See more at: http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper#sthash.kYL7nazK.dpuf
 Tomorrow at MALCON 2014, security researcher Mordechai Guri with guidance of Prof. Yuval Elovici from the cyber security labs at Ben Gurion University in Israel will present a breakthrough method (“AirHopper) for leaking data from an isolated computer to a mobile phone without the presence of a network. In highly secure facilities the assumption today is that data can not leak outside of an isolated internal network. It is called air-gap security. The common policy in such secure organizations is to leave your mobile phone in some locker when you enter the facility and then pick it up when you go out. We at the cyber security labs challenged this assumption and found a way to leak data from a computer inside the organization to a remote a mobile phone without using Wifi or Bluetooth. “Such technique can be used potentially by people and organizations with malicious intentions and we want to start a discussion on how to mitigate this newly presented risk.” said Dudu Mimran CTO of the cyber security labs.

The following video demonstrates AirHopper:

The main idea behind the research is to use radio frequencies in order to transmit the secret data from the computer to the mobile phone. Mobile phones usually come equipped with FM radio receivers and it is already known that software can intentionally create radio emissions from a video display unit. Yes, from the computer screen. Still, this is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer. AirHopper demonstrates how textual and binary data can be exfiltrated from physically a isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second). Enough to steal a secret password.
The full paper will be published here tomorrow following the conference presentation so stay tuned. Journalists and media can contact cyber-labs@bgu.ac.il for an early peek to the research results and more info. Follow the story on twitter @cyberlabsbgu #airhopper.
The team of cyber security labs @ Ben Gurion University of the Negev in Israe
- See more at: http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper#sthash.kYL7nazK.dpuf
 The following video demonstrates AirHopper:

http://youtu.be/2OzTWiGl1rM

The main idea behind the research is to use radio frequencies in order to transmit the secret data from the computer to the mobile phone. Mobile phones usually come equipped with FM radio receivers and it is already known that software can intentionally create radio emissions from a video display unit. Yes, from the computer screen. Still, this is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer. AirHopper demonstrates how textual and binary data can be exfiltrated from physically a isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second). Enough to steal a secret password.

The full paper will be published here tomorrow following the conference presentation so stay tuned. Journalists and media can contact cyber-labs@bgu.ac.il for an early peek to the research results and more info. Follow the story on twitter @cyberlabsbgu #airhopper.

The team of cyber security labs @ Ben Gurion University of the Negev in Israel

Read More >>

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More