Diberdayakan oleh Blogger.

Popular Posts Today

Fake chargers prompt Apple action

Written By Unknown on Selasa, 06 Agustus 2013 | 23.44

6 August 2013 Last updated at 06:15 ET

Apple has begun a worldwide programme to replace third-party and counterfeit USB chargers.

The initiative comes after reports that a Chinese woman was electrocuted by a non-Apple charger.

Apple said it would swap third-party chargers for an official replacement on payment of $10 or the equivalent in local currency.

The programme begins on 16 August and will run to 18 October.

In mid-July, Apple said it was investigating reports that a Chinese woman, Ma Ailun, was killed when she answered her iPhone 5 while it was plugged into a wall charger. The third-party charger was later blamed as the cause.

No mention was made of Ms Ma's death in the blogpost announcing the trade-in programme but Apple said that the initiative was prompted by "safety issues".

Give serial number

In a related move, Apple has recently updated its Chinese website with information to help people identify fake USB chargers.

Those who want to get an official charger must hand over the third-party device and give the serial number of the iPhone, iPod or iPad it is being used to charge. The $10 or equivalent fee is a discount on the usual price of a charger. In the UK an Apple charger costs about £15.

Owners will only be able to trade in one adapter for each relevant Apple gadget they own. Trade-ins can be made at Apple stores or via authorised service providers.

Apple said that the third-party and fake chargers would be "disposed of in an environmentally friendly way".


23.44 | 0 komentar | Read More

Dark net child abuse sites breached

5 August 2013 Last updated at 12:00 ET

A service accused of helping distribute child abuse images on a hidden part of the internet has been compromised.

Sites using service provider Freedom Hosting to deliver their material have had code added to their pages, which could be used to reveal the identities of people visiting them.

Freedom Hosting delivered sites via Tor, a network designed to keep net activity anonymous.

The news has led some to claim that Tor no longer offers a "safe option".

"This challenges the assumption people have made that Tor is a simple way of maintaining your anonymity online," Alan Woodward, chief technology officer at security advisors Charteris, told the BBC.

"The bottom line is that is not guaranteed even if you think you are taking the right steps to hide your identity. This is the first time we've seen somebody looking to unmask people rather than just security researchers discussing the possibility."

Continue reading the main story

Invented by the US Naval Research Laboratory to help people use the web without being traced, Tor (The Onion Router) aids anonymity in two ways.

First, it can be used to browse the world wide web anonymously. It does this by routing traffic through many separate encrypted layers to hide the data identifiers that prove useful in police investigations.

Second, there are hidden sites on Tor that use the .onion domain suffix. These are effectively websites but, as they sit on Tor, are almost impervious to investigation.

Although many media reports about Tor have focused on how it is used to spread pornography and images of child abuse as well as to sell drugs via sites such as the Silk Road, it is also used for many legitimate means.

Journalists and whistle-blowers use it to communicate with each other, with the New Yorker magazine's Strongbox being one example of a "dead drop" service based on the technology.

It is also used by military and law enforcement officers to gather intelligence.

The project's developers also suggest it be used as a way for people wishing to research Aids, birth control or religion anonymously in areas where information on such topics is restricted.

Tor has been funded by, among others, the EFF, Google, Human Rights Watch and the US National Science Foundation.

Mr Woodward added that the way the added code had been designed suggested a US law enforcement agency was behind the breach.

Tor users expressed mixed feelings about the news.

"This exploit targets kiddie porn viewers only. If that's not you, you have nothing to worry about," suggested one.

An "exploit" refers to software that makes programs, websites and other code do something they were not originally designed to do.

But another said: "This week it's child porn, next week it may be a whistle-blower or an activist."

Malware attack

News of the action was confirmed by an administrator of the Tor Project on its blog.

It said that over the weekend people had contacted it to say that a large number of sites using Tor, which were hidden from other net users, had gone offline simultaneously.

"The current news indicates that someone has exploited the software behind Freedom Hosting," it said.

"From what is known so far, the breach was used to configure the server in a way that it injects some sort of Javascript exploit in the web pages delivered to users. This exploit is used to load a malware payload to infect users' computers."

Freedom Hosting was previously targeted by the Anonymous hacktivist collective, whose members temporarily forced it offline in 2011 after claiming it was the largest host of material showing child abuse on Tor.

The Daily Dot news site reports that paedophiles continued to use the hosting service and have been warning each other of the breach since the news emerged.

They also told each other to stop using TorMail, a service used to allow people to send and receive email anonymously, which used Freedom Hosting's servers.

Freedom Hosting also provided access to HackBB, a hacking-themed discussion forum, and the Cleaned Hidden Wiki, an encyclopaedia of Tor and other dark nets.

The hosting service's terms and conditions had stated that illegal activities were not allowed on the sites it supported, but added that it was "not responsible" for its users' actions.

Tor's developers have stressed that "the person, or persons, who run Freedom Hosting are in no way affiliated or connected to The Tor Project".

Law enforcers

Analysis of the Javascript exploit suggests that it takes advantage of a vulnerability in Firefox 17, which meant that people using that version of Mozilla's browser could be identified, despite the protections built into Tor.

"It appears to connect the machine using the compromised browser to an address which appears to originate from Reston, Virginia, US, and sends the hostname and MAC [media access control] address of the machine," Mr Woodward said.

"Unlike IP [internet protocol] addresses, media access control addresses are considered unique to a particular piece of hardware, although they can be spoofed under certain circumstances.

"It seems unlikely that the malware was written by criminals as the information it is sending back to its masters is of little use to anyone other than law enforcement agencies who are trying to track down machines that are using the Tor network to remain anonymous."

Irish arrest

News of the breach came shortly after the Irish Times reported that a 28-year-old Dublin-based man had been arrested and accused by the FBI of being "the largest facilitator of child porn on the planet".

It said that Eric Eoin Marques faces allegations that he had aided and abetted a conspiracy to advertise material showing the abuse of prepubescent children.

The paper reported that the US authorities are seeking his extradition on four charges.

It said the judge in the case ruled that while Mr Marques was entitled to the presumption of innocence, he should remain in custody pending a further hearing because he posed a flight risk.

A spokesman for the FBI told the BBC: "An individual has been arrested in Ireland as part of an ongoing criminal investigation in the United States. Because this is matter is ongoing, longstanding Department of Justice Policy prohibits us from discussing this matter further."


23.44 | 0 komentar | Read More

Sony rejects Loeb spin-off proposal

6 August 2013 Last updated at 02:13 ET

Sony has rejected a proposal by one of its biggest shareholders, hedge fund Third Point, to spin off part of its entertainment division.

Daniel Loeb, founder of the fund, had called for cash from the move to be used to boost Sony's electronics arm.

But Sony said demand for entertainment content was increasing and it would benefit from "owning all, rather than a part" of the division.

Sony's shares fell as much as 5% after the company rejected the proposal.

"Demand for content is increasing its value in a dynamic industry environment characterized by emerging distribution platforms and the proliferation of both powerful mobile devices and access to broadband," Sony said in a letter sent to Mr Loeb.

"Sony believes its entertainment businesses will increasingly benefit from these trends, and the company's shareholders will benefit from owning all, rather than a part, of these valuable assets."

Earlier this month, Sony reported a jump in earnings for the April-to-June quarter. It made a net profit of 3.5bn yen ($35m; £23m) in the quarter, reversing a loss of 24.6bn yen last year.

Its Pictures division made a profit of 3.7bn yen during the period, reversing a loss of 4.9bn yen last year, while its music unit saw its operating profit rise to 10.8bn yen, from 7.3bn yen a year earlier.

Mr Loeb's fund, which owns nearly 7% of Sony's shares, said that it would continue to explore further options with the company.

"Third Point looks forward to an ongoing dialogue with management and intends to explore further options to create value for Sony shareholders," the fund was quoted as saying by the Reuters news agency.


23.44 | 0 komentar | Read More

US criticises Vietnam internet law

6 August 2013 Last updated at 02:58 ET

The US has criticised a new internet decree in Vietnam that would restrict online users from discussing current affairs.

The law, announced last week and due to come into force in September, says social media should only be used for "[exchanging] personal information".

The US embassy in Hanoi said it was "deeply concerned" by the decree.

Vietnam has convicted at least 46 activists, including bloggers, for anti-state activity this year.

The law, known as Decree 72, bans the online publication of material that "opposes" the Vietnamese government or "harms national security".

It also specifies that social networking sites such as Twitter and Facebook should only be used "to provide and exchange personal information".

In a statement on Tuesday, the US embassy in Hanoi said it was "deeply concerned by the decree's provisions that appear to limit the types of information individuals can share via personal social media accounts and on websites".

"Fundamental freedoms apply online just as they do offline," it said.

Campaign group Reporters Without Borders, which has included Vietnam among its list of "Enemies of the Internet", said: "If [the decree] takes effect, Vietnamese will be permanently deprived of the independent and outspoken information that normally circulates in blogs and forums".

The law would also require foreign internet companies to keep a server inside Vietnam, news agency AP reported.

The Asia Internet Coalition, an industry group that represents companies including Google and Facebook, said in a statement: "In the long term, the decree will stifle innovation and discourage businesses from operating in Vietnam."

Vietnam is a one-party communist state and the authorities maintain a tight grip on the media.


23.44 | 0 komentar | Read More

Warning over online gaming addiction

6 August 2013 Last updated at 04:05 ET

Online game companies need to do more to prevent players becoming too addicted in order to avoid government intervention, a study has warned.

Researchers at Cardiff, Derby and Nottingham Trent universities said some gamers play up to 90 hours a session, developing a "pathological" addiction.

They say while conventional video games have an ending, role-playing games involving numerous players may not.

But the gaming body Ukie said it took the health of users seriously.

It said it had a number of measures in place to ensure that games could be enjoyed safely and sensibly.

The universities' research warned if game companies did not create restraints for players and their games grew in popularity, Western governments might have no choice but to follow Asia and limit usage.

Continue reading the main story

"Start Quote

One idea could be to shorten long quests to minimise the time spent in the game obtaining a certain prized item"

End Quote Dr Zaheer Hussain Psychologist

The study, published in the Addiction Research and Theory journal, has said Massively Multiplayer Online Role Playing Games (MMORPGs) are an inexhaustible system of goals and success.

The character becomes stronger and richer by moving to new levels while accumulating treasures, power and weaponry.

The universities have said evidence suggests around seven to 11% of gamers were having real problems and were considered "pathological" gamers. Some were reported to have been playing for 40, 60, and even near 90 hours in a session.

Dr Shumaila Yousafzai from Cardiff Business School said popular online video games warned players not to overuse their products.

"These warning messages also suggest that the online video game industry might know how high the percentage of over-users is, how much time gamers spend playing and what specific features make a particular game more engrossing and addictive than others," he said.

"While they do not directly admit this, by showing the warning messages, they do take some responsibility into their own hands."

Warning messages

Cyber psychologist Dr Zaheer Hussain, from the University of Derby, said warning messages were not enough.

He said: "As a first step online game developers and publishers need to look into the structural features of the game design, for example the character development, rapid absorption rate, and multi-player features which could make them addictive and or problematic for some gamers.

"One idea could be to shorten long quests to minimise the time spent in the game obtaining a certain prized item."

Continue reading the main story

"Start Quote

There is no medical diagnosis of game addiction but like anything enjoyable in life, some people play games excessively"

End Quote Dr Jo Twist Association for UK Interactive Entertainment

Professor Mark Griffiths, of Nottingham Trent University and director of the International Gaming Research Unit, added: "The proportion of gamers who develop problems and/or become addicts may stay roughly constant but as online games get better and better and increasing numbers of people discover them, the number of addicts is most probably going to rise."

Dr Jo Twist from the Association for UK Interactive Entertainment (Ukie) said video games were played "safely and sensibly" by millions.

She said: "There is no medical diagnosis of game addiction but like anything enjoyable in life, some people play games excessively.

"We actively promote safe and sensible game playing through our askaboutgames.com site and encourage all players to take regular breaks of at least five minutes every 45-60 minutes.

"The games industry takes the health and wellbeing of all consumers very seriously and has a number of measures in place to ensure that games can be enjoyed safely and sensibly.

"There are also control systems available on all main games consoles that can be used to restrict the amount of time spent playing games, limit internet access and control access to age appropriate content."


23.44 | 0 komentar | Read More

Amazon's Bezos buys Washington Post

6 August 2013 Last updated at 08:02 ET
Jeff Bezos

Please turn on JavaScript. Media requires JavaScript to play.

The BBC's Michelle Fleury in New York: "They have turned to one of the innovators in the internet world"

The boss of Amazon, Jeff Bezos, has agreed to purchase the Washington Post newspaper for $250m (£163m).

Mr Bezos is buying the paper and its other print properties in a personal capacity.

The Post has been owned by the Graham family for 80 years.

"Years of familiar newspaper-industry challenges made us wonder if there might be another owner who would be better for the Post," said Post chief executive, Donald Graham.

"Jeff Bezos' proven technology and business genius, his long-term approach and his personal decency make him a uniquely good new owner for the Post."

Continue reading the main story

"Start Quote

We've all been broadsided by the acquisition"

End Quote Rebecca Lieb Industry Analyst, Altimeter Group

The Washington Post Company also owns Kaplan, a test preparation company, in addition to other properties. Those will stay under the ownership of the Grahams as part of a yet-unnamed entity.

The sale is expected to be completed in the next 60 days.

Declining circulation

The flagship paper, known for its coverage of the Watergate scandal, has suffered in recent years as the internet has hurt advertisement sales and it has struggled to adapt its print coverage to the web.

Continue reading the main story

Analysis

Leo Kelion Technology reporter


Jeff Bezos's latest move helps expand his role as one of the most influential content creators in the United States.

Amazon's e-book publishing unit recently scored its first million-copy hit when sales of the Hangman's Daughter series crashed through the seven-figure mark. Last week, Amazon Studios announced five new video-on-demand programme pilots. Meanwhile, its new video games wing is currently advertising for more than a dozen posts.

The Washington Post is different though, as Mr Bezos will personally own the business outright and has said Amazon has no role in the purchase. He has written a memo to the Post's staff saying he will not lead the paper's day-to-day operations, but his note was striking for the emphasis he placed on its need to "invent" and "experiment". Business as usual is clearly not an option.

Industry watchers will also be interested to see how he plans to use his increased political influence. Amazon has recently found itself on the same side as the Justice Department in an e-book competition probe and the Senate in its bill to impose a sales tax on online retailers. How Mr Bezos will act when his interests do not align with government could prove telling.

Journalist Carl Bernstein, who, along with Robert Woodward, broke the Watergate story in the 1970s, said he had high hopes the announcement would "represent a great moment in the history of a great institution".

He added that it showed "recognition that a new kind of entrepreneurship and leadership, fashioned in the age of the new technology, is needed to lead not just The Post, but perhaps the news business itself".

"Jeff Bezos seems to me exactly the kind of inventive and innovative choice needed to bring about a recommitment to great journalism on the scale many of us have been hoping for, while employing all the applicable tools and best sensibilities of a new era and the old," he said.

The Post has been "declining in circulation especially among young readers," Horizon Media analyst Brad Adgate told the BBC.

Nonetheless, he added: "I always thought this would be a newspaper that would be able to withstand the digital tide because of the name and the prestige. It is, next to the New York Times, the most prestigious paper in the country."

According to the Alliance for Audited Media, a newspaper auditing firm, the Washington Post was the seventh most popular daily newspaper in the US this year, with a total circulation of 474,767 - a 6.5% decline on last year.

The Washington Post building

Please turn on JavaScript. Media requires JavaScript to play.

Digital strategist Kevin Anderson on the possible motivation behind Mr Bezos' decision

In an open letter posted on the Washington Post's website, Mr Bezos said he would not be leading the paper on a day-to-day basis and sought to reassure nervous employees, but saying he would not seek to change "the values" of the paper.

However, he added: "There will, of course, be change at The Post over the coming years...The internet is transforming almost every element of the news business: shortening news cycles, eroding long-reliable revenue sources, and enabling new kinds of competition, some of which bear little or no news-gathering costs."

Mr Bezos said he did not have a plan yet for what exactly he thought those changes would be.

Faded glory

The sale took many by surprise.

"We've all been broadsided by the acquisition. There are few things that come as a surprise any more but this one did," said Rebecca Lieb, an industry analyst at the Altimeter Group.

"However, when you really start thinking about it, it makes sense - all because of digital," she said, citing Mr Bezos's experience with digital delivery and personalisation at Amazon.

In a filing with regulators, the company said, however, that Mr Bezos was not purchasing its other notable online properties: Slate magazine, TheRoot.com, and Foreign Policy.

This is the second sale of a major US newspaper in as many days.

Over the weekend, the New York Times announced it had sold another iconic newspaper, the Boston Globe, to John W. Henry, the owner of the baseball team the Boston Red Sox, for $70m - a fraction of the $1.1bn the company had paid for the paper in 1993.


23.44 | 0 komentar | Read More

Tor users advised to ditch Windows

6 August 2013 Last updated at 08:18 ET

Legitimate users of the Tor anonymous browsing service are being advised to stop using Windows if they want to keep their identity hidden.

The advisory comes after an attack on Tor that targeted Windows users sought to gather data that could be used to identify people.

In addition, Tor warned, people should turn off a widely used web technology that was exploited in the attack.

It is still not clear who was behind the sophisticated attack.

Data grab

The code to exploit the bug was fed into the Tor network via servers owned by Freedom Hosting that ran sites accessible only via Tor. In 2011, Freedom Hosting sites on Tor came under attack by the Anonymous hacktivist collective, which claimed they hosted large amounts of images of child sexual abuse.

Continue reading the main story

Invented by the US Naval Research Laboratory to help people use the web without being traced, Tor (The Onion Router) aids anonymity in two ways.

First, it can be used to browse the world wide web anonymously. It does this by routing traffic through many separate encrypted layers to hide the data identifiers that prove useful in police investigations.

Second, there are hidden sites on Tor that use the .onion domain suffix. These are effectively websites but, as they sit on Tor, are almost impervious to investigation.

Although many media reports about Tor have focused on how it is used to spread pornography and images of child abuse as well as to sell drugs via sites such as the Silk Road, it is also used for many legitimate means.

Journalists and whistle-blowers use it to communicate with each other, with the New Yorker magazine's Strongbox being one example of a "dead drop" service based on the technology.

It is also used by military and law enforcement officers to gather intelligence.

The project's developers further suggest it be used as a way for people wishing to research Aids, birth control or religion anonymously in areas where information on such topics is restricted.

Tor has been funded by, among others, the Electronic Frontier Foundation digital rights group, Google, Human Rights Watch and the US National Science Foundation.

The most recent attack is widely believed to have been carried out in an attempt to identify people viewing or swapping images of abuse via Freedom Hosting.

The Tor Project's overseers have stressed that it has no connection or affiliation with whoever is in charge of Freedom Hosting.

Tor advised people to stop using Windows as it feared that the action against Freedom Hosting might compromise the identity of other people who put the anonymous browsing service to legitimate uses.

Firefox vulnerable

Tor, aka The Onion Router, attempts to hide a person's location and identity by sending data across the net via a very circuitous route. Encryption applied at each hop along this route makes it very hard to connect a person to any particular activity.

On 4 August warnings about the action against Freedom Hosting started to circulate and revealed how it exploited a vulnerability in some versions of the Firefox browser. Versions before release 17.0.7 were open to the attack, which sought to log unique details of machines using Tor.

While versions of Tor running on any operating system were potentially vulnerable, in practice only those using Windows were being hit, the Tor project said in its latest update about the attack.

"Really, switching away from Windows is probably a good security move for many reasons," said the security advisory from Tor overseers.

It added: "... this wasn't the first Firefox vulnerability, nor will it be the last."

Security agency suspected

The advisory urged people to upgrade to a newer version of the Tor software bundle, which includes Firefox, that is not vulnerable to the bug. It also suggested people turn off Javascript, the programming language many websites use to add interactive features.

However, it cautioned, turning off Javascript would change the way many websites worked.

As an alternative, Tor suggested the Linux open-source operating system, Apple's OSX or more esoteric systems such as Tails.

The warning comes as security researchers and computer forensics experts try to trace where the unique IDs grabbed by the attack code were being sent.

Early work showed it was going to a location in the American state of Virginia. Further sleuthing now suggests the web address it is being sent to is run by the US National Security Agency.


23.44 | 0 komentar | Read More

Confused copiers rewriting documents

6 August 2013 Last updated at 08:28 ET

Photocopiers made by Xerox are changing numbers on documents, a German computer scientist has discovered.

David Kriesel found that copies he made of construction plans had altered room dimensions.

Other users have replicated the problem, which has been blamed on faults with compression software used by several Xerox models.

The company has not yet issued a fix for the problem, but it told the BBC it was preparing a statement.

Mr Kriesel said he worried that numbers could be altered on invoices and other important documents.

Shrinking room

He questioned whether incorrect figures could leave a company liable to legal action.

Niri Shan, a partner at London-based law firm Taylor Wessing, told the BBC it could raise interesting legal implications.

"The person who provided the figures would be liable [for any issues]. Then the question would be, could they turn round to the photocopying company and say, 'Hold on a minute, this is your fault'?

"Often in commercial contracts, the manufacturer may have limitations of liability on consequential loss."

In his tests, Mr Kriesel found that often the number "6" would be turned into an "8", and vice versa, with other numbers being affected too.

One room on his copied plans had its dimensions shrunk from 21.11m to 14.13m.

Substitute figures

He said the anomaly is caused by Jbig2, an image compression standard.

Image compression is typically used in scanners and copiers to make file sizes of scans smaller.

Jbig2 would substitute figures it thought were the same, meaning similar numbers were being wrongly swapped.

Mr Kriesel said the two models affected were the Xerox Workcentre 7535 and 7556.

However, since posting details of the fault online, several other users have come forward with problems on other machines.


23.44 | 0 komentar | Read More

Samsung readies smartwatch range

6 August 2013 Last updated at 09:13 ET By Leo Kelion Technology reporter

Details of Samsung's smartwatch plans have been revealed in a series of unearthed patent and trademark filings.

Drawings show a device with a flexible screen that wraps round the wrist, with other parts made of metal and synthetic materials.

Other documents reveal the company has registered the names Samsung Gear in South Korea and Samsung Galaxy Gear in the US.

Analysts are divided about how much demand there might be.

Tech consultancy Canalys has predicted that sales of smartwatches will "explode" from 330,000 units shipped last year to more than five million in 2014.

"Smartwatches will be the most important new product category in consumer electronics since the iPad defined the market for tablets," said analyst Chris Jones.

"Software platforms tied to smartwatches will also be a tremendous opportunity for developers to write apps in categories such as health and wellness or sports and fitness."

Smartglasses preference

But market research company IDC is taking a more tempered view after it surveyed 1,513 consumers in the US.

It said only a minority of respondents showed strong interest in any of the suggested features.

The most popular application was seeing who is calling your phone from your wrist, with about 14% of those questioned saying they were very interested in it.

Reading Twitter or Facebook messages via a watch when a mobile was nearby only appealed to about 7%.

"The small screen size means many of the suggestions didn't seem relevant," said Francisco Jeronimo, a mobile device expert at the company.

"We also found there was much more interest in smartglasses, with features such as recording a video or taking pictures of what you are looking at proving most popular. The reason for that is that this offers a new feature that consumers can't get from any other existing device."

South Korean news site Moveplayer revealed that Samsung has filed patents for three slightly different smartwatch designs with the country's patent office since the start of the year.

They indicate it is looking at creating a curved bendable screen that covers about half of the device. At one end of the display is a small panel with a back arrow and home keys similar in design to those found on its original Galaxy S Android handset.

Range of competitors

The drawings also show a physical power button and speaker, and the accompanying descriptions note that the screen can be attached to different straps to accommodate customers' varying wrist sizes.

The documents add that the devices should provide access to the internet; be able to make and receive phone calls, emails and texts; and store personal information.

Samsung will compete with several other tech firms who have all released, or at least announced, smartwatches since the start of the year, with contrasting marketing campaigns:

  • Sony is pitching its Smartwatch 2 as a rainproof "accessory" to its Xperia Android smartphones
  • Omate says its Truesmart watch is designed to be a "standalone" device featuring a five megapixel camera on its side
  • TomTom is targeting the fitness market with its Sport Watch range, offering a heart rate monitor and speed sensor as add-ons
  • Pebble highlights its energy-efficient electronic paper display and customisable watch face designs
  • Shanda talks of its Geak Watch's ability to play movies, record the user's blood pressure and track sleep patterns

Many of the predictions about the sector's expected growth are based on news from other companies: confirmation from Microsoft and Samsung that they are working on watch designs, and patent documents from Apple and Google suggesting they are at least considering the concept.

'Beat its rivals'

According to IDC's survey Samsung could find it hardest to crack the US market.

When IDC asked which of the brands they would most trust to develop a wearable device that embedded communication functions and internet features, 39% picked Apple, 27% Google, 21% Microsoft and just 17% Samsung.

This was even though the South Korean company shipped more than double the number of smartphones than its nearest competitor in the quarter to the end of June.

"A similar survey a few years ago would have shown Samsung far behind its rivals when it came to smartphones as well before the Galaxy range became established," Mr Jeronimo said.

"If it can beat its rivals over price, ease of use and the amount it spends on advertising, as well as offering unique features - perhaps acting as a TV control in a clever way - then it can still beat other smartwatch brands."

Samsung's next scheduled press event is at the IFA consumer tech show in Berlin on 4 September.


23.44 | 0 komentar | Read More

Girl, 14, died after 'web bullying'

6 August 2013 Last updated at 10:03 ET
Hannah Smith

Please turn on JavaScript. Media requires JavaScript to play.

Hannah's father told the BBC's Sian Lloyd that he was both grieving and angry

A 14-year-old Leicestershire girl killed herself after being bullied on a social networking site, her father has claimed.

Hannah Smith, from Lutterworth, was found hanged on Friday.

Her father Dave Smith, wrote on Facebook that he found bullying posts on his daughter's ask.fm page from people telling her to die.

Latvia-based ask.fm allows users to post anonymously. An inquest into Hannah's death has opened in Leicester.

Writing on Facebook last Friday, Mr Smith wrote: "Just to let all my friends know my youngest daughter took her own life last night."

'Broken heart'

He adds: "Rest in peace my baby and you will never be forgotten xxxxxxx."

Continue reading the main story

Leo Kelion Technology reporter


The question-and-answer site was set up by two Latvian brothers, Ilja and Mark Terebin, as a rival to Formspring in 2010 but has now eclipsed its predecessor.

Members can ask others questions and then get replies, which include text, photos and videos - via its website or apps.

Ask.fm had 13.2 million daily visitors worldwide in June with each one spending nearly six minutes on average on the site, according to internet research firm Comscore. It said that made the social network's web domain the 79th most popular in the world.

Ask.fm says users must be at least 13-years-old to join and requires them to provide a valid name and email address when they register, although reports suggest younger children sneak through using fake credentials.

One of its most controversial features is the ability for members to pose questions to others anonymously. Ask.fm's terms and conditions say members should never use the feature to ask things that are mean or hurtful, and it allows users to opt out of receiving anonymous questions via their privacy settings. However, safety campaigners have said many youths do not know how to do this.

The network also allows users to report abuse and says it may hand over identifying information to law enforcement if necessary.

But in June, Le Monde newspaper reported the service only had 50 external moderators which it contrasted with the 30 million questions and answers posted to Ask.fm every day.

Even so parents might wish to note that Ask.fm warns members they use the service "at your own risk" and that it says it bears no liability for content they might find to be objectionable or obscene.

He added: "My heart is broken in 2 and is gonna take a long time to repair i just hope that none of you have to go through the pain im goin through rite now [sic]."

Mr Smith has called for tighter controls to be applied to social networking sites such as ask.fm.

He wrote: "I have just seen the abuse my daughter got from people on ask fm and the fact that these people can be annoymous is wrong [sic]."

On a Facebook page set up in memory of his daughter, he asked people to sign an e-petition to introduce safeguarding measures on sites used by children.

The page now has nearly 30,000 "likes".

'Loss to understand'

The petition states: "Please sign if you would like the Government to step in and insist that Ask.fm and similar sites help us protect our young people. They are able to join from the age of 13 and can post anonymously."

In a statement, Hannah's headteacher at Lutterworth High School, Nora Parker, said: "The governors, staff and students of Lutterworth High School were deeply shocked and saddened to learn the news that on 2 August Hannah Smith, a year 9 student, took her own life.

"Hannah, who just completed her final year at the school and was looking to transfer to Lutterworth College in August, was a bright, bubbly, popular and thoughtful girl who was liked and respected by all those she came into contact with.

"She had everything to live for and her family, who are utterly devastated, are at a loss to understand why this has happened."

Peter Wanless, chief executive of the NSPCC, said: "This is a tragic case where Hannah felt like she had no other option but to end her life.

"The cruel nature of cyberbullying allows perpetrators to remain anonymous and hide behind their screens.

"This is something that must be tackled before it gets out of hand. We must ensure young people have the confidence to speak out against this abuse, so they don't feel isolated and without anywhere to turn."

The Department for Education said in a statement that no-one "should have to suffer the fear and victimisation of bullying".

"The law is clear that what is illegal off-line is also illegal on-line.

"Perpetrators of grossly offensive, obscene or menacing behaviour face stiff punishment.

"Through the UK Council of Child Internet Safety we are working with social networking sites and internet providers to make the internet a safer place for a young people."

It also added that under the new curriculum children would be taught from the age of five "how to stay safe online, and how to communicate safely and respectfully".

At the opening of the inquest into Hannah's death, Leicestershire Coroner's Court was told a post-mortem examination had so far proved inconclusive.

Leicestershire Police confirmed a computer and mobile phone had been secured on behalf of the coroner.

A spokesperson said there was no ongoing criminal investigation, adding: "We await the coroner's verdict before making a decision on whether to pursue that."

The inquest was adjourned until a later date.

The BBC contacted ask.fm for a comment and are still awaiting a response.


23.44 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger