Jump to content

Search the Community

Showing results for tags 'leak'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 27 results

  1. zanderthunder

    Intel Frost Canyon NUC Details Leak

    Intel's tiny desktop PC gets 10th-gen Core i3, Core i5, and Core i7 processor upgrades. If you're looking for a tiny/budget desktop PC you can't go far wrong by choosing to buy an Intel NUC. It's worth holding off on purchasing one right now, though, as the next generation of NUCs just leaked. As Liliputing reports, the new Intel Frost Canyon NUC models are expected to be officially announced soon, but promotional images for the new tiny PCs have leaked via Chinese website Kgula. As the images reveal, it's hard to make the NUC look much different from previous generations. The key change for Frost Lake on the exterior is a USB Type-C port appearing on the front of the case as a replacement for one of the Type-A ports. It's inside where the most important change has happened, though. Intel is set to offer the short and tall NUC models again, with the short restricted to an M.2 SSD slot for storage, while the tall version adds the option of a 2.5-inch drive, be that an SSD or hard drive. Three processors will be offered in the form of the 10th generation Core i3-10110U, Core i5-10210U, and Core i7-10710U. The Core i3 offers two cores and four threads running at 2.1GHz (boosting to 4.1GHz), the Core i5 offers four cores and eight threads running at 1.6GHz (boosting to 4.2GHz), and the Core i7 offers six cores and 12 threads running at 1.1GHz (boosting to 4.7GHz). All three chips rely on Intel UHD Graphics rather than Intel Iris GPUs, which is a shame. The good news is, all three chips can be configured at either a 15W or 25W TDP, with 25W allowing for better performance. FanlessTech confirmed that these NUCs will be configured at 25W, so they should offer a noticeable performance benefit over the previous generation NUC line-up, with the one exception being the Bean Canyon NUC which used a 28W 8th-gen Coffee Lake Core i7 complete with Iris Graphics 655. It's unlikely this leak shows the complete line-up of Intel's next-gen NUCs. Don't forget we're already expecting an eight core Xeon Quartz Canyon NUC at some point. Source: Intel Frost Canyon NUC Details Leak (via PCMag)
  2. Google has fired an employee for leaking and sharing names and personal details of staffers to the media. Additionally, it has placed two other employees on leave for violation of company policies. The move comes amidst rising tension between employees and management. Workers have been unhappy with the way the management has dealt with sexual harassment cases. Last year, Google employees worldwide staged a walkout in protest of this. The search giant is currently investigating the employees who were placed on leave. A Google spokeswoman said that one of the employees looked for and shared confidential documents that were beyond the scope of their job. These documents relate to a new Chrome tool that Google has made mandatory for workers to install on their computers. Many employees have raised concerns about this tool as they believe it is being used by the management to spy on them. The tool automatically reports employees that create calendar meetings with more than 100 people or 10 rooms. The Google spokesperson said that the tool was aimed at keeping calendar spam in check; she said that the person was put on leave for accessing a wide range of company documents and not for opening or accessing just one file. The second employee was put on leave for tracking individual calendars of the staff working in human resources, communications teams, and community platforms. As per the Google spokeswoman, this tracking made the staff in these departments feel unsafe. Both employees had taken part in activism activities against Google's management for poorly handling sexual harassment cases as well as for working on projects like a censored version of the search engine for China. The investigation against them has angered many employees inside the company as they believe Google is punishing them for protesting against the management. They now believe that the work culture of Google is no longer as open as it was before. Previously, Google employees could access any of the company's internal documents on any of the projects. However, in a bid to reduce leaks to the media, Google's management cut down access to documents to thousands of contractors and other employees. Instead, access is now provided to employees or a group on a "need-to-know" basis. Source: Google fires an employee for leaking personal staff details to media, puts two others on leave (via Neowin)
  3. Images of what appears to be packaging boxes of AMD's upcoming third-generation Threadripper processors have leaked, and it seems like the company is set to continue the tradition of fancy-looking packaging for Threadripper CPUs. The leak indicates that the launch of Threadripper 3000 series processors is nearly upon us and in fact, Videocardz alleges that these, alongside the accompanying TRX40 chipset motherboards, may be launching as early as tomorrow. A previous report had mentioned a possible November 5 announcement which has evidently been pushed back. As reported earlier, the Threadripper 3990X is reportedly launching later with only a teaser awaiting us at the alleged launch tomorrow. Information on the pricing of these HEDT parts has still managed to elude us but we could expect to see some competitive pricing judging by AMD's past practices. Source: 1. AMD's Threadripper 3000 packaging leaked, allegedly launching tomorrow (via Neowin) 2. AMD 3rd Gen Ryzen Threadripper packaging leaked (via VideoCardz)
  4. So small that it doesn’t require FAA approval An early retail listing on Newegg’s Canadian store has given us official images of DJI’s unannounced Mavic Mini, as well as listing its specs. DJI’s new drone is something of an open secret at this point. We saw an FCC listing for the drone back in August, and DroneDJ published hands on images just last week. But the retailer listing adds credence to those earlier leaks, and prices the diminutive drone at $646.15 Canadian dollars (around $494) when sold with DJI’s Fly More kit. One of the more important specs listed on Newegg’s page is the drone’s weight of just 249g. This means that any owners in the US (and soon the UK) won’t have to register this drone with the authorities in order to fly it. Previously, DJI’s lightest Mavic drone was the Mavic Air, which weighs 430g, far above the FAA registration cutoff of 8.8 ounces (250g). Both the retailer listing as well as images leaked earlier this month from DroneDJ show how it’s small enough to sit in the palm of your hand. DroneDJ notes that it has a similar width and height to a smartphone. Flight time is rated at 30 minutes according to the product listing (which corroborates with DroneDJ’s previous report), and recording resolution apparently tops out at 2.7K rather than 4K, which DroneDJ speculates is an attempt to stop the Mavic Mini from cannibalizing sales of DJI’s Mavic Air or Mavic Pro drones. You can find more pictures of the new drone over on WinFuture. The retailer listing doesn’t give any information about when the Mavic Mini might see a release, but with a DJI announcement set to take place at 9am ET on Wednesday, it sounds like we might not have long to wait. Update October 28th, 6:55AM ET: Updated with details of DJI event taking place on Wednesday. Source: DJI Mavic Mini images and specs leak in new retailer listing (via The Verge)
  5. Oops Microsoft has accidentally released an internal-only version of Windows 10 to testers, revealing a new Start menu design. The software giant has distributed Windows 10 build 18947, meant for internal Xbox development, to Windows Insider testers using 32-bit devices. It’s an internal-only build from the company’s canary branch, and yet Microsoft has published it to all Windows 10 testers whether they’re in release preview, fast ring, or even slow ring testing. Thankfully, it’s only released to 32-bit systems, which aren’t widely used, but it’s an embarrassing mistake for Microsoft’s Windows 10 testing efforts. This internal build appears to include a new Start menu design, that’s very early in testing, without Microsoft’s Live Tiles. It’s something Microsoft is testing internally, but it’s not clear whether Windows 10 will fully drop Live Tiles in the Start menu anytime soon. This new build also includes a GIF search tool within the emoji picker for Windows 10. This isn’t the first time Microsoft has made this mistake. Back in 2017 the company released internal versions of Windows 10 for PC and mobile, and caused some devices to enter a reboot loop. Microsoft quickly spotted the mistake, and helped affected Windows 10 users with a device recovery tool. Microsoft’s Windows Insider chief, Dona Sarkar, says the company is “looking into” this latest issue. We’ve also reached out to Microsoft for further comment, and we’ll update you accordingly. Source
  6. Pirated Promo Screeners of ‘American Gods’ and Other TV-Shows Leak Online Unreleased episodes of several high-profile TV-shows including American Gods, The 100, Bless This Mess, and Knightfall have leaked online. The leaks appear to come from promotional screeners, some of which carry revealing watermarks. The pirate releases are sponsored by a Russian gambling site. Roughly a decade ago, new episodes of TV-series regularly found their way onto the Internet, before appearing on TV. These leaks were often linked to promotional screeners, which are generally sent out to reviewers and critics at the start of a new season. In recent years these TV-screener leaks have become rarer, but a series of pirated releases that have appeared over the past several days is one of the largest breaches ever. While the source is unconfirmed, all signs suggest that a serious security hole has been exploited. It all started when a new episode of The CW’s hit series “The 100” leaked online, weeks before the sixth season officially premieres. Soon after, a pattern started to emerge when three unreleased episodes of “American Gods” came out too. The leaked American Gods episodes show the typical hallmarks of a promotional screener. There is a clearly visible “For Screening Purposes Only” message popping up, for example, and the name “Jessica Silvester” is visible as a permanent watermark throughout the episodes. From one of the leaked episodes The name in question could point to the reviewer who received the screeners, or was supposed to at least. While the source of the leak has not yet been confirmed, the name matches that of a New York Magazine editor. Whether that’s the same “Jessica Silvester” is presently unknown. What we do know is that the leaks didn’t stop there. Advance screener leaks of other shows including “Bless This Mess,” “The Bold Type,” “The Act,” “The Code,” “Knightfall,” and “The Chi” followed (full overview below). In the case of the “The Bold Type,” which airs on Freeform, it’s clear that the review copies are for the press. This leak includes the first three episodes of season two, which starts this June. The Bold Type There are also two full and unreleased seasons of Starz’ “The Spanish Princess” and Hulu’s “Ramy” among the leaked files. Both series have yet to premiere. The leaks are from various production companies, distributors, and TV networks. The only clear pattern we see is that they all appear to be promo screeners. These are obviously not intended to show up at pirate sites, which the leak of the aptly named show “Bless This Mess” nicely illustrates. “For Review Only. Not for Downloading, Recording, File Sharing, Sale or Public Performance,” an embedded message reads. Bless This Mess Aside from the screener watermarks, there are other messages visible as well, pointing to the ‘Russian’ gambling site 1XBET. This name has popped up regularly in recent months as a “sponsor” of pirate releases. 1XBET promo in the leaked video Andrey Busargin, Director of Brand Protection at international cybersecurity outfit Group-IB, previously told us that casinos are increasingly teaming up with pirates to increase their revenues. “This scheme allows online casinos to generate leads, wherever a user watches a pirated copy and whatever ads are displayed on a website with pirated copies,” Busargin said. The name of the site is per manently visible throughout the various episodes, and there’s a promo code for a deposit bonus, in case any pirates want to take a gamble. The leaks are a major setback for the rightsholders as it will draw people to pirate sites. Whether author Neil Gaiman, whose novel American Gods is based on, will complain has yet to be seen. In 2011 he admitted that in some instances piracy had boosted his book sales by 300%. The big question that remains is the source of the leak, and whether the breach is a one-off or something more structural. — Here’s overview of the leaked screeners that have come out thus far: The 100, Season 6, Episode 1 and 2 American Gods, Season 2, Episode 5, 6 and 7 In The Dark, Season 1, Episode 1, 2 and 3 The Code, Season 1, Episode 1 The Bold Type, Season 3, Episode 1, 2 and 3 Bless This Mess, Season 1, Episode 1 Knightfall, Season 2, Episode 3 and 4 The Chi, Season 2, Episode 2, 3, 4 and 5 The Act, Season 1, Episode, 5, 6, 7 and 8 The Spanish Princess, Full Season Ramy, Full Season Source
  7. NASA and its Russian counterparts identified a tiny pressure leak on the International Space Station Wednesday, which may have been caused by a micrometeorite strike. The International Space Station is seen in this view from the space shuttle Discovery after the undocking of the two spacecraft. NASA and its Russian counterparts identified a tiny pressure leak on the International Space Station Wednesday, which may have been caused by a micrometeorite strike. Dmitry Rogozin, head of Russian space agency Roscosmos told state news agency TASS that a “micro-fracture” was found in a side compartment of the Soyuz MS-09 spacecraft currently docked with the space station. The fracture, he said, may be external damage and is believed to be the result of a micro-meteorite. The fracture caused a drop in pressure and an air leak on the station, according to Rogozin, who said that the problem has been resolved. NASA said that flight controllers in Houston and Moscow spotted “a minute pressure leak” around 7 p.m. EDT Wednesday. The space station crew is conducting troubleshooting and repair work on the leak, NASA explained in a blog post Thursday morning. "The leak has been isolated to a hole about two millimeters in diameter in the orbital compartment, or upper section, of the Soyuz MS-09 spacecraft attached to the Rassvet module of the Russian segment," the space agency explained. "This is a section of the Soyuz that does not return to Earth." Once the hole was identified, crewmembers applied Kapton tape, which slowed the leak. "Flight controllers are working with the crew to develop a more comprehensive long-term repair," NASA added. "Once the patching is complete, additional leak checks will be performed. All station systems are stable, and the crew is in no danger as the work to develop a long-term repair continues." NASA and the Russian space agency Roscosmos operate the orbiting space lab along with the European Space Agency, Japan’s JAXA and the Canadian Space Agency. Six crew members are on the ISS, led by station Commander and NASA astronaut Drew Feustel. NASA Flight Engineers Ricky Arnold and Serena Auñón-Chancellor are also on the space station, along with Alexander Gerst of ESA and Oleg Artemyev and Sergey Prokopyev of Roscosmos. The six crew members gathered in the Russian segment of the station after they were notified of the leak, NASA said. The space station, which has been continuously occupied since November 2000, has an internal pressurized volume equal that of a Boeing 747, according to NASA. Source
  8. Hot on the heals of the news that Asus has announced its very own smartphone with a display notch ala the iPhone X with the arrival of the ZenFone 5, we also have news that another popular Android smartphone maker appears to be set to follow Apple’s lead in making a flagship phone that has a notch at the top of the display, allowing for an almost bezel-free phone while still having somewhere for all those important sensors and camera lenses to live. Photos of what appears to be a OnePlus 6 have started to pop up online, and they show what is becoming a bit of a trend among Android phone makers. While plenty of people, and indeed competitors, mocked Apple for its decision to include a notch at the top of the iPhone X’s display, it is becoming increasingly clear that this is one of the best ways of producing a smartphone today with almost no bezels while also being able to offer a front-facing camera as well as the proximity and light sensing hardware that a modern smartphone needs. While the iPhone X’s notch has been lauded as a way of Apple differentiating the iPhone X from the competition, as well as the tech it packed in there in the form of Face ID, it is important to remember that it is not something of which Apple is likely particularly proud. That notch is, however, a necessary evil in Apple’s quest to not only remove all physical buttons from the face of the iPhone but to also make the bezels around an iPhone’s screen as small as possible. Until Apple’s TrueDepth sensors and cameras can live beneath the display itself, a notch is something that is begrudgingly required, rather than sought after. That is something other smartphone makers are starting to come around to, even though they don’t necessarily have TrueDepth module of their own. Though I am sure that the likes of OnePlus and Asus are not too disappointed that their new smartphones are being mentioned in the same breath as Apple’s current flagship due to this. What I personally can’t get around though is the noticeably thick chin at the bottom. I mean, if you are putting a notch in the phone, at least make the screen on all the other three sides of the device go right to the edges. Also can be seen in the photos is the back of the device, with an iPhone X-like dual vertical camera configuration and glass back, likely meant for wireless charging. Redmondpie.com
  9. TESTS on USB connections have shown they are highly susceptible to information “leakage”, making them less secure than previously thought. Researchers from the University of Adelaide in South Australia tested more than 50 different computers and external USB hubs and found that more than 90 per cent of them leaked information to an external USB device. The results will be presented in Canada at the USENIX Security Symposium in Vancouver next week. Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science, said it had been thought that because USB-connected devices only sent information along a direct communication path to the computer, it was protected from potentially compromised devices. He said USB-connected devices were the most common interface used globally to connect external devices to computers and included keyboards, cardswipers and fingerprint readers, which often sent sensitive information. “But our research showed that if a malicious device or one that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured. That means keystrokes showing passwords or other private information can be easily stolen,” Dr Yarom said. Dr Yarom said this “channel-to-channel crosstalk leakage” was analogous with water leaking from pipes. “Electricity flows like water along pipes – and it can leak out,” he says. “In our project, we showed that voltage fluctuations of the USB port’s data lines could be monitored from the adjacent ports on the USB hub.” The leak was discovered by University of Adelaide Computer Science student Yang Su in collaboration with Dr Daniel Genkin (University of Pennsylvania and University of Maryland) and Dr Damith Ranasinghe (Auto-ID Lab, University of Adelaide). The tests were conducted in late 2016 and early this year. The team used a modified cheap novelty plug-in lamp with a USB connector to “read” every keystroke from the adjacent keyboard USB interface. The data was sent via Bluetooth to another computer. Dr Yarom said other research had shown that 75 per cent of USB sticks dropped on the ground were picked up and plugged into a computer. But they could have been tampered with to send a message via Bluetooth or SMS to a computer anywhere in the world. He said Bluetooth was a more secure way of transferring information. “We wanted to understand better what things are secure, what things are not and what risks people might be facing,” said Dr Yarom, who will attend the symposium in Vancouver from August 16-18. “The main take-home message is that people should not connect anything to USB unless they can fully trust it. “For users it usually means not to connect to other people devices. For organisations that require more security, the whole supply chain should be validated to ensure that the devices are secure.” Dr Yarom said the long-term solution was a redesign of USB connections to make them more secure. “The USB has been designed under the assumption that everything connected is under the control of the user and that everything is trusted – but we know that’s not the case,” he said. “The USB will never be secure unless the data is encrypted before it is sent.” South Australia’s capital Adelaide has three long-standing public universities, Flinders University, University of South Australia and the University of Adelaide, each of which are consistently rated highly in the international higher education rankings. Article source
  10. A leaked copy of Expendables 3 was made available to 'pirate' release groups mid-July, TF has learned. Concerned at the nature of the leak, a release was shied away from, but a small public torrent uploaded by a fairly low profile Pirate Bay user changed all that. Last week saw the leak online of the brand new Expendables movie. Earmarked for an August 15 U.S. release, Expendables 3 leaked in near DVD quality a full two weeks ahead. The timing and quality combined to make the leak one of the most prominent in recent years. While the original sources of these leaks are nearly always shrouded in mystery, once made publicly available on sites like The Pirate Bay they are anyone’s for download. Originally it was believed that Pirate Bay releaser Drarbg uploaded the first public torrent, but that was not the case. Flying under the radar a hugely less popular torrent (still only with a handful of seeds) actually preceded it by almost 20 minutes. It’s certainly feasible that another release preceded even this one, but with torrents on sites other than Pirate Bay regularly deleted due to copyright complaints, it’s now too late for any certainty. It’s also impossible to say how many people were in the chain after the leak and before the first public torrent upload, but numerous public sources (including RARBG themselves) are now pointing to postings on 4chan as indicating the start of events. The thread is right here and obviously everything happened in public. The postings don’t specifically mention the title of the movie but a source close to the situation assures TF that the chat does indeed refer to The Expendables 3. Less than two hours after his initial posting on July 15, ‘Anonymous’ was back on 4chan with an update. “I am in contact with a release group that works with private trackers. They asked me for proof of what I had and I took pictures with a written timestamp of the disc in and out of the box,” he wrote. “I dumped them into some special submission link they had and they will get back to me. I’m just waiting in a secured IRC room for them to get back to me once the staff takes a look.” Precisely what happened after then is a mystery (as is the leaker’s apparent disregard for security by posting in public) but a source informs TF that whoever obtained the copy knew they had something hot – perhaps too hot. “We know that the leak was back then, around July 15, but everyone was scared to leak it. Most private groups had it for more than 10 days, but again they were scared to leak it,” TF was told. After the leaked copy was allegedly handed over July 15, the comments of ‘Anonymous’ as he returned to 4chan predicted the events of last Thursday. “Keep an eye out for the leak. No telling how long this will take, but I’m sure it will make its way to public trackers due to the demand for it,” he wrote. Interestingly, although initial demand for The Expendables 3 was brisk, downloads now sit at an estimated 500,000, and it’s currently less popular on file-sharing networks than “Divergent” which was released on the same day. Source: TorrentFreak
  11. Hackers from Cyber Berkut group are claiming to hack and leak personal emails belonging to Colonel V.M. Pushenko. of the Ukrainian Ministry of Defense. In an email one of the representative from Cyber Berkut claimed that the leaked emails contain confidential conversation between officials about ongoing conflict between Ukraine and Russia. The content of email conversation is available below: The claimed leaked emails are available here in Russian language. This is not the first time when hackers have a high profile leak. In February 13, 2014 Anonymous hackers claimed to hack and leak secret email conversations of Vitali Klitschko’s UDAR party. NOTE: We at HACKREAD are not responsible for the leaked data nor can we confirm if these emails are authentic or not. Source
  12. The Expendables 3, featuring every action hero known to man, was set for an August 15 debut but has appeared online in near DVD quality. In just 12 hours, more than 100,000 copies have been downloaded. It's worth bearing in mind, however, that production company Nu Image sued those who downloaded the original movie. You’d have to be enjoying a Mars residency not to know that all big (and most small) movies get leaked online. If it’s available in a cinema, someone, somewhere will have a copy in a matter of days and it’s just a question of when, not if, it appears on the Internet. As such, these events aren’t particularly big news but every now and again one comes along to make people sit up and listen. Several hours ago, July 24, 2014, marked one such notable leaking event. Featuring every action hero known to man, from Sylvester Stallone, Arnold Schwarzenegger, Wesley Snipes, Jason Statham and Jet Li, to UFC stars Randy Couture and Ronda Rousey, Expendables 3 was always going to be a hit. However, the plan was to have it become a hit on the big screen before breaking into the home market. That is not going to happen. Around twelve hours ago, a near perfect copy of The Expendables 3 appeared online and it’s already a smash hit with home audiences. Screenshot from the leak Figures gathered by TorrentFreak reveal that more than 100,000 200,000 (update) people have downloaded the presumed ‘DVD screener’ copy using BitTorrent alone, and at one point in excess of 65,000 users were engaged in transfers on a single torrent. These stats push the leak well ahead of the initial pre-release popularity of the infamous X-Men Origins: Wolverine leak back in 2009 and once the news begins to spread today, things are only going to get worse. Needless to say, the folks at distributor Lionsgate are going to be absolutely furious. While ‘cams’ are an annoyance, most movie-goers won’t want to destroy the movie experience by watching them. High-quality copies like this one are a different matter altogether and the soaring download numbers are a testament to that. No blurry cams here, high-quality all the way So who is behind the leak? At this stage it’s impossible to point the finger at the person who obtained the DVD copy. However, we can take a look at who brought the copy to the wider public Internet. When leaks come from a so-called ‘Scene’ source it’s possible to track the copy at least as far back as the group that placed it online but with so-called P2P releases, as is the case with Expendables 3, that’s not quite so easy. However, the initial and most popular copy appears to be attributable to an entity known as Drarbg. Drarbg has accounts on several major torrent sites, including The Pirate Bay, and is one of the most prolific BitTorrent releasers online today. Many presume that this is a single person, but Drarbg has previously indicated that it’s a group of individuals working together as a team. Drarbg, as the name suggests, has affiliations with RARBG, a popular public torrent site. It seems likely that this high-profile, high-quality leak will become a talking point in the hours, weeks and months to come and will probably be seized upon as a prime example of why piracy crackdowns are needed. However, there is also another angle to be aware of. Nu Image, the production company behind all three Expendables titles, sued previous downloaders of its titles. Will history repeat itself? Time will tell…. Update: Downloads climbing well over 200K copies now… Source: TorrentFreak
  13. Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding $5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec. Symantec and RSA published details on their blogs on Tuesday about iBanking, which is being used by two Eastern European cybercrime groups to intercept one-time SMS passcodes used for logging into bank accounts. IBanking is notable for its wide range of features and defensive measures that thwart analysis by security researchers. It can steal just about any information on an Android device, record calls or forward calls to another phone, Symantec wrote. The malware often appears in Android app marketplaces as a legitimate banking application. It appears victims who are targeted already have a separate type of malware installed on a desktop system, which prompts them to enter their phone number after navigating to their bank's website. Then, an SMS code with a link to iBanking is sent to their phone. It alternatively displays a QR code thatA also leads victims to the malware, Symantec wrote. Two gangs, which Symantec called the Neverquest crew and Zerafik, have used iBanking, with Zerafik targeting customers of the financial institution ING, Symantec wrote. In that case, iBanking was modified to appear to look like an official application from ING. RSA found that iBanking's code is scrambled in a way to make it harder for malware experts to study, using techniques that have been seen on desktop-based malicious software but not widely on mobile malware. IBanking sells for around $5,000 or for a cut of the proceeds from theft it facilitates, Symantec wrote. IBanking's source code was leaked in February after a hacker nicknamed "ReVOLVeR" found it while avenging a friend's loss of 65,000 bitcoins that were pilfered by the malware, Symantec wrote. In the course of that quest, ReVOLVeR, believed to be Russian, also came across FTP login credentials for a server belonging to the broadcaster BBC, which he tried to sell. IBanking's price should have dropped after its source code was released. But iBanking's developer, who is someone going by the nickname "GFF," has continued to develop it and provide support, which has sustained its marketability. "Despite the availability of a free version, our research suggests that most of the large cybercrime actors are continuing to opt for the paid-for version," Symantec wrote. "They appear to be willing to pay a premium for the updates and support provided by GFF." RSA wrote that its analysis of iBanking showed that it will shut itself down if it detects it is running in a virtual machine. Virtual machines are often used by malware analysts to study the behavior of an application. Trying to halt analysts and security professionals "has been a standard among PC malware developers for quite a while but is far from standard practice in the mobile malware field," RSA wrote. "The iBanking malware shows that mobile malware developers are becoming aware of the necessity to protect their bots against analysis and indicates a possible new trend in this new and evolving mobile malware space," the company wrote. Source
  14. All's fair in love and war, including online trolling. Self-styled Ukrainian hackers are bragging they dumped millions of stolen credit card numbers online – but the claims may simply be a political smear job amid tensions between Russia and the West. A group calling itself "Anonymous Ukraine" boasted this week that it is in possession of 800 million credit and debit card details. In a bid to substantiate the claim, the crew said it had uploaded about 7 million of the cards to file-sharing sites and linked to archives of the data from two Pastebin posts. These archives, 300MB in size, contained a mix of account details and magnetic-strip information for MasterCard, Visa, Discover and American Express cards, it was claimed. There's been some speculation that the data was sourced in part from hacked sales tills in Target stores across the US – some senior politicians blame hackers from Ukraine for infiltrating the retail chain's computers to swipe 40 million or so cards.Curiously, a large number of the leaked cards appear to have expired. "There is one interesting set of files called 'Dumps + Pins' which contains around 35,000 records which look to be a lot more recent, with expiry dates in the future," noted Brook Zimmatore, chief exec at Massive PR, a firm that specializes in protecting the reputation of banks and other corporations. Massive has been working with colleagues at IT security company Digital Shadows to assess the authenticity and source of the archives. Their preliminary findings suggest that the card dump has nothing to do with the hacktivists who formed the official, if we can use that word, Anonymous Ukraine clan. Anonymous Ukraine has a few social network accounts to promote itself: @UkraineAnon on Twitter, Anon.Ukraine on Facebook, and Ukrhack on vk.com. These have been active for some time, and have drawn attention to the upheavals in Crimea, and the ongoing confrontations between Russia and Ukraine. But none of these accounts have mentioned the credit-card leak, which was instead promoted using @Op_Ukraine. This Twitter profile has only posted messages about this card dump, and has only been active for three days. "We think it is someone trying to make it look like Anonymous Ukraine," Zimmatore told El Reg. "[The leak] was not announced from their official social media accounts, and they are usually proud to announce such 'accomplishments'. We have seen it being discussed almost exclusively on Russian forums." Before the DataLossDB news website published an article about the credit-card dump claims, word of the alleged mega-leak was confined to a Russian-language site and a Russian forum. All this points to mischief-makers who are more likely to be aligned to Moscow than Kiev. However, the source and veracity of the data dump, much less who was behind the uploading of it, remains unclear. "Nothing there that provides evidence of who it is, however I would suggest that it is not Anonymous Ukraine – or at least not someone who is part of an identifiable section of it," Zimmatore concluded. Source
  15. How to upgrade the system by installing MSU files autonomous update to version RTM Escrow 9600.17025.WINBLUE_GDR.140214-1706 will be painted separately us! remind everyone that it is still not the final RTM build! article is not completed, to be continued! both msu and images this time new names for images as well as keys possible msu leak depends on tests upd1 3 msu need to be installed upd2 msu can be added to server r2 2012 image upd3 looks like 4 msu need to be installed in case of 8.1 rtm Installation order for 8.1 RTM 1. KB2919442 restart2. KB2919442-1 restart3. KB2919355 restart4. KB2932046 restart5. 17025 :) https://cloclo1.datacloudmail.ru/weblink/get/a7f79217a3c5/MICROSOFT.WINDOWS.8.1.2014.UPDATE.X86.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT.zipORhttps://mega.co.nz/#!IsxgiJgZ!aIRKCW4RE8bm7OM3oF15fUkNzJ5nB_KZ3vvzM5ELQz8rar password: timster =================================================================================== MICROSOFT.WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT RELEASE DATE: 16/02/2014 BUILD: 6.3.9600.17025.WINBLUE_GDR.140214-1706 BUILD: 2014/02/05 FILE: Windows8.1-KB2919442-x64.msu SIZE: 10,708,582 byte SHA1: 0ed435964e1f99e4fdbb4a9bdf88a62c8120b420 MD5: 1d0d09f46d8bfe5537f0e91aa9164415 CRC: 7dced403 BUILD: 2014/02/11 FILE: Windows8.1-KB2919442-1-x64.msu SIZE: 10,667,904 byte SHA1: 27daa89bc820aa1c3cf2496e55605e433df0ceb1 MD5: 25c8fa7a8e93172958a37096dac7da5b CRC: 246b1466 BUILD: 9600.17019.WINBLUE_GDR.140205-2003 FILE: Windows8.1-KB2919355-x64.msu SIZE: 730,632,862 byte SHA1: 3a53663fb1999a1372c3810c52bb942b6bc97362 MD5: 0d879b22bad773d4689ff6df337df258 CRC: 9416df02 BUILD: 9600.17025.WINBLUE_GDR.140214-1706 FILE: Windows8.1-KB2932046-x64.msu SIZE: 88,684,437 byte SHA1: 83447d80559b21244c658fc9f943e7f1012858a9 MD5: cb02deeabdc172cde801e471957fdf6b CRC: 975ab494 NOTE: this is original M$ MSU files. WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.140214-1706-WZT Magnet Link: magnet:?xt=urn:btih:C0EAC578B76EA04CF9DF847EAD208D1C4C444D55Direct Download Link: https://cloclo1.datacloudmail.ru/weblink/get/820b29ef7329/MICROSOFT.WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT.zipORhttps://mega.co.nz/#!IpBzGQTY!eCG4qnlkJo1P9vuSjgawMTYbll8E2azSKefgocF2o5Arar password: timster http://uploadinc.com/ivmsxekn4vsn.htmlhttp://hugefiles.net/rmxvofd0miv5http://www.jheberg.net/captcha/960017024winblue-gdr-s14sku-partner/ MICROSOFT.WINDOWS.8.1.UPDATE.2014.WITH.BING.X64.PRE-RELEASE.CORECONNECTED.ENGLISH.DVD-WZT PRE-RELEASE DATE: 15/02/2014PRE-RELEASE BUILD: 6.3.9600.17024.WINBLUE_GDR_S14SKU_PARTNER.140214-1700FILE: 9600.17024.WINBLUE_GDR_S14SKU_PARTNER.140214-1700_X64FRE_CLIENT_CORECONNECTED_EN-US-IR3_CCONA_X64FREO_EN-US_DV5.isoSIZE: 3,887,515,648 byteSHA-1: 4462ED0AAED34F39768D462CB0F4205C3CB4C118MD5: 68AC75195E2A23741FF923FAE1069DA0CRC: EB30C11BNOTE: this is original MS image.P.S: WZT does not take any responsibilities for any damage or loss of your PC associated with the installation of Windows 8.1 Update 2014 pre-release RTM! Magnet Download Link: magnet:?xt=urn:btih:DC3154BDF69ACD9649C0D518D51479CB02926E17Direct Download Links: http://uploadinc.com/bqn6a0xdqxe2.htmlhttp://hugefiles.net/7c6zz4uidp7ghttp://www.jheberg.net/captcha/960017024winblue-gdr-s14sku-partner-3/ Microsoft Windows 8.1 Update 2014 Coreconnected English DVD ISO Installation Keys *** Notice: Keys areonly for installation not for activation..! http://pastebin.com/JVpiNwsE
  16. Sun Feb 16, 2014 5:34am EST (Reuters) - Unusually high levels of radioactive particles were found at an underground nuclear waste site in New Mexico on Saturday in what a spokesman said looked like the first real alarm since the plant opened in 1999. U.S. officials were testing for radiation in air samples at the site where radioactive waste, such as plutonium used in defense research and nuclear weapon making, is dumped half a mile below ground in an ancient salt formation. "They (air monitors) have alarmed in the past as a false positive because of malfunctions, or because of fluctuations in levels of radon (a naturally occurring radioactive gas)," Department of Energy spokesman Roger Nelson said. "But I believe it's safe to say we've never seen a level like we are seeing. We just don't know if it's a real event, but it looks like one," he said. It was not yet clear what caused the air-monitoring system to indicate that radioactive particles were present at unsafe levels, Nelson said. No one was underground at the Department of Energy Waste Isolation Pilot Plant near Carlsbad, in New Mexico's south east, when the alarm went off at 11:30 p.m. MST on Friday, and none of the 139 employees working above ground at the facility was exposed to radioactive contaminants, he said. Workers were asked to shelter where they were until the end of their shifts and were allowed to leave the facility at 5 p.m. local time on Saturday, Nelson said. No air exchange with the surface was occurring after the ventilation system automatically switched to filtration, he said. Nelson said the facility may have accurate measurements as early as Sunday on the number of airborne alpha and beta particles, which can be harmful if inhaled or ingested. A team could be sent below ground before the end of the weekend and Nelson said the plant was "not in active operations. We're in a period we have normally reserved for shutting down the facility for maintenance". A different part of the site was evacuated this month after a truck used to haul salt caught fire. Several workers suffered smoke inhalation, an agency statement said. (Reporting by Laura Zuckerman; Additional reporting by Kevin Murphy; Editing by Louise Ireland and Chris Michaud) http://www.reuters.com/article/2014/02/16/us-radiation-leak-newmexico-idUSBREA1F06Y20140216
  17. By Eduard Kovacs February 4th, 2014, 16:19 GMT · On Monday, RedHack hacktivists claimed to have breached the systems of three major telecoms companies, namely TTNET, Turkcell, and Vodafone. Now, they’ve leaked the details of around 5,000 Vodafone customers. The leaked data includes names, dates of birth, phone numbers, and voicemail delivery details. The information has been posted on the website JustPaste.It. “Vodafone has shown great interest in controlling the global internet and lobbies USA and EU to give them the biggest piece from the cake,” the hackers wrote on Twitter just before leaking the information stolen from Vodafone. “But yet again they are unable you protect their own systems.” The hacktivists say they’ve redacted the phone numbers and deleted last names “to protect the public.” They’ve leaked the data to show that the telecoms giant is logging voicemails in Turkey. “Why would Vodafone keep log of voicecalls made in Turkey?” they noted. RedHack representatives have told Softpedia that they have half a million voicemail log records. They claim the logs are only for Istanbul and only for a period of two days. RedHack members say the goal of these attacks is to prove that no system is 100% secure. They’ve also warned that anyone who “commits injustices” is their next target. A few hours ago, RedHack leaked the details of over 600 Turkish officials and other individuals working for various government agencies. The hackers have told Softpedia that they will “hopefully” manage to leak the data stolen from Turkcell, which is their last target in this operation, tomorrow. The hacktivists have already leaked data from Turkcell. More precisely, they've leaked the phone numbers of thousands of Turkcell employees. The telecoms company came under fire after changing the phone numbers of deputies and ministries leaked by RedHack in protest against a controversial Internet bill. http://news.softpedia.com/news/RedHack-Leaks-Details-of-5-000-Vodafone-Customers-423862.shtml
  18. Microsoft's Windows 8.1 Update 1: Rumored release target is March 11 By Mary Jo Foley January 24, 2014 16:53 GMT First up, the target release date for Windows 8.1 Update 1 -- the relatively minor update coming to Windows 8.1 this spring -- is allegedly March 11, according to one of my accurate and trusted sources. Yes, that's a Patch Tuesday. Given that Microsoft will likely deliver Update 1 to Windows 8.1 users via Windows Update, this seems pretty believable to me. Windows leaker WZor previously indicated that Windows 8.1 Update 1 would likely be released to manufacturing in March, but didn't provide a specific date. http://www.zdnet.com...h-11-7000025559 By WZOR January 15th, 19:23 =MSU update was collected on January 3, details soon. (Google Translator)
  19. Documents that were leaked by NSA whistleblower Edward Snowden prove that the United States has been ruled by a race of tall, white space aliens who also assisted the rise of Nazi Germany in the 1930s. A Federal Security Services (FSB) report on the nearly two million highly classified top-secret documents obtained from the United States Department of Defense (DOD) run National Security Agency-Central Security Service (NSA/CSS) by the American ex-patriot Edward Snowden states that this information is providing “incontrovertible proof” that an “alien/extraterrestrial intelligence agenda” is driving US domestic and international policy. Snowden, who has been given asylum in Russia, leaked documents that a race of extraterestrial “tall whites” arrived on Earth, helped Nazi Germany build a fleet of advanced submarines in the 1930s, and then met in 1954 with President Dwight Eisenhower “where the ‘secret regime’ currently ruling over America was established. This FSB report warns that the ‘Tall White’ agenda being implemented by the ‘secret regime’ ruling the United States calls for the creation of a global electronic surveillance system meant to hide all true information about their presence here on earth as they enter into what one of Snowden’s documents calls the ‘final phase’ of their end plan for total assimilation and world rule.” The report further says that the U.S. government is embroiled in a “cataclysmic” power struggle between President Obama, who heads the alien shadow government, and some unknown force that opposed the U.S.-alien alliance. “Most to be feared by Russian policy makers and authorities, this [FSB] report concludes, is if those opposing the ‘Tall White’ ‘secret regime’ ruled over by Obama have themselves aligned with another alien-extraterrestrial power themselves.” Any good conspiracy theory needs a patina of truth, a bit of intellectual cover to camouflage the craziness. In this case, the whatdoesitmean.com/Fars story cites Paul Hellyer, the 1960s Canadian defense minister who is now a fervent UFO activist. Hellyer allegedly has confirmed the accuracy of Snowden’s UFO leaks. Source ======================== A rebuttal has been found, claiming the source is a "semi-official" news agency.
  20. WASHINGTON Sun Jan 19, 2014 2:12pm EST A picture of Edward Snowden, a contractor at the National Security Agency (NSA), is seen on a computer screen displaying a page of a Chinese news website, in Beijing in this June 13, 2013 photo illustration. Credit: Reuters/Jason Lee (Reuters) - The head of the U.S. House of Representatives Intelligence Committee said on Sunday he is investigating whether former spy agency contractor Edward Snowden had help from Russia in stealing and revealing U.S. government secrets. "I believe there's a reason he ended up in the hands - the loving arms - of an FSB agent in Moscow. I don't think that's a coincidence," U.S. Representative Mike Rogers told the NBC program "Meet the Press," referring to the Russian intelligence agency that is a successor of the Soviet-era KGB. Snowden last year fled the United States to Hong Kong and then to Russia, where he was granted at least a year of asylum. U.S. officials want Snowden returned to the United States for prosecution. His disclosures of large numbers of stolen U.S. secret documents sparked a debate around the world about the reach of U.S. electronic surveillance. Rogers did not provide specific evidence to back his suggestions of Russian involvement in Snowden's activities, but said: "Some of the things we're finding we would call clues that certainly would indicate to me that he had some help." Asked whether he is investigating Russian links to Snowden's activities, Rogers said, "Absolutely. And that investigation is ongoing." Senator Dianne Feinstein, who heads the Senate Intelligence Committee, said on "Meet the Press" that Snowden "may well have" had help from Russia. "We don't know at this stage," Feinstein said. Feinstein said Snowden gained employment at the National Security Agency "with the intent to take as much material down as he possibly could." On the ABC program "This Week," U.S. Representative Michael McCaul, chairman of the House Committee on Homeland Security, also expressed his belief that Snowden had foreign help. "Hey, listen, I don't think ... Mr. Snowden woke up one day and had the wherewithal to do this all by himself," he said. "I personally believe that he was cultivated by a foreign power to do what he did," McCaul said. Asked whether he thought Russia was that "foreign power," McCaul said, "You know, to say definitively, I can't. I can't answer that." 'TOTALITY OF THE INFORMATION' Rogers indicated that the nature of the material that Snowden obtained suggested foreign involvement. "When you look at the totality of the information he took, the vast majority of it had to do with military, tactical and operational events happening around the world," he told the CBS program "Face the Nation." Michael Morell, the former deputy CIA director, said he shared Rogers' concern about what Russian intelligence services may be doing with Snowden. "I don't have any particular evidence but one of the things I point to when I talk about this is that the disclosures that have been coming recently are very sophisticated in their content and sophisticated in their timing - almost too sophisticated for Mr. Snowden to be deciding on his own. And it seems to me he might be getting some help," Morell said on "Face the Nation." Other U.S. security officials have told Reuters as recently as last week that the United States has no evidence at all that Snowden had any confederates who assisted him or guided him about what NSA materials to hack or how to do so. Snowden told the New York Times in October he did not take any secret NSA documents with him to Russia when he fled there in June 2013. "There's a zero percent chance the Russians or Chinese have received any documents," Snowden told the Times. In remarks aired on Sunday on ABC's "This Week," President Vladimir Putin discussed Snowden's freedom of movement in Russia and that the American would be free to attend the upcoming Sochi Winter Olympics. "Mr. Snowden is subject to the treatment of provisional asylum here in Russia. He has a right to travel freely across the country. He has no special limitation. He can just buy a ticket and come here," Putin said. (Reporting by Will Dunham, Toni Clarke and Susan Cornwell; Editing by Jim Loney and Chris Reese) http://www.reuters.com/article/2014/01/19/us-usa-security-snowden-idUSBREA0I0EW20140119
  21. geeteam

    Sony D6503 leaks

    XDA member iRimas come some photos and rumored specs of a mystery Sony smartphone. The device in question belongs to the family Xperia and has the model number D6503. According to the leakster it sports a 5.2" display, thinner bezels than the Xperia Z1 and runs on a fresh new UI atop Android 4.3 Jelly Bean. The device is apparently unstable and the UI is crashing all the time but we expect to see UI screenshots from said XDA user soon. The camera on the back is reportedly the same 20.7 MP 1/2.3" unit found on the Z1 and Z1 Compact. Other differences with the Xperia Z1 include three large speaker-like grilles on the bottom, the microUSB slot and SIM tray sit on the left side, while on the right there's room for a microSD card slot. The lanyard eyelet is placed on the left side, instead of the right one. Then there are the usually-placed camera shutter button, power button, magnetic pin connectors, headphone jack and LED notification light (placed above the earpiece). Source
  22. By Woody Leonhard January 13, 2014 The search for leaked Windows builds is on, once again, and this time the prize pirate copy has already been overshadowed by reliable reports of what awaits next year. If you're waiting with bated breath for the latest leaked Windows beta, you don't understand the situation. Russian-language Windows leak site WZOR said on Jan. 8 that the next version of Windows -- dubbed, mellifluously, Windows 8.1 Update 1 and/or GDR 1 and/or Windows 8.1 2014 Update -- will likely leak on Jan. 15, the day Microsoft partners are due to get the bits. That's pretty remarkable 20/20 foresight, but WZOR has demonstrated its prescience repeatedly over the years. WZOR has several screenshots to prove their dominance, but they don't show much besides the build number 6.3.9600.16581.WINBLUES14_GDR_LEAN.13122 2-2030. Neowin has posted an additional leak screenshot, which appears to come from CentrumWindows.pl (oops?), that shows a whole lotta nothing. Except for the brand in the lower-right corner, it looks just like Windows 8.1. The WZOR article offers only one interesting tidbit that I didn't pick up last month in my Windows 8 "cause for hope" post: Unlike Windows 8.1, which was released through the Windows Store (if you ever found it), Windows 8.1 Update 1 will arrive via Windows Update. That's a giant step forward -- while, at the same time, being a giant step backward, if you know what I mean -- because many Windows users find it much more intuitive to handle Windows updates through, er, Windows Update. I have a feeling that one major reason why Microsoft is shifting back to its old distribution model is a question of penetration: Although the upgrade from Windows 8 to 8.1 is free and well worth the effort, only a third of the people running Windows 8 (probably fewer) have upgraded to 8.1. Some of the blame must be laid at the foot of the bizarre two-step Windows Store upgrade process. Windows 8.1 Update 1, currently scheduled for April 2014, seems like a stopgap that's designed to improve compatibilty with Windows Phone -- which is due for its own update at the same time. I can't think of a less compelling reason to get Windows 8, much less Windows 8.1 U1. But Windows 9, that's another story. Paul Thurrot said over the weekend that Windows 9 -- code name "Threshhold" -- is currently scheduled for April 2015. He goes on to say that Microsoft will likely announce its Win9 plans at the Build 2014 conference, which will be held just about the time Windows 8.1 Update 1 lands with a thud. Build 2014 will be "very much focused on Windows Phone and Xbox." That's not terribly surprising, considering Microsoft's headcount should shoot up by about 35,000 people (from 100,000 to 135,000, in round figures) when Nokia gets absorbed at just about that time. Thurrot says the Microsoft reorganization will be complete about that time, but I'll reserve judgment until we hear more about the new CEO. As I've discussed before, it looks like Windows 9 will in fact consist of three very different faces painted on the same pig -- er, core: A "Metro" version that's all about mobile; a "consumer" version, updated frequently, which may just be Windows 8.1 Update 2; and a "pro" version, which is stodgy and stable. It isn't clear, based on Thurrot's description, if we're looking at all three appearing in April 2015, but that seems to be the way Microsoft is heading. Given Thurrot's history defending Windows 8, it was like a breath of fresh air to read what he now thinks about the abomination, uh, product: In some ways, the most interesting thing about Threshold is how it recasts Windows 8 as the next Vista. It's an acknowledgment that what came before didn't work, and didn't resonate with customers. And though Microsoft will always be able to claim that Windows 9 wouldn't have been possible without the important foundational work they had done first with Windows 8 -- just as was the case with Windows 7 and Windows Vista -- there's no way to sugarcoat this. Windows 8 has set back Microsoft, and Windows, by years, and possibly for good. One could successfully argue, I believe, that comparing Windows 8 to Vista does Vista an injustice. Maybe, just maybe, Microsoft will give us mouse-and-keyboard users a Windows that's better than Win7. http://www.infoworld.com/t/microsoft-windows/windows-81-pirate-beta-due-any-time-its-yawner-234053 Also See: Windows 9 due in April 2015, but coding hasn't started yet http://www.infoworld.com/t/microsoft-windows/windows-9-due-in-april-2015-coding-hasnt-started-yet-234074
  23. The Samsung Galaxy Note 3 Neo looks to be more of a refresh to the Samsung Galaxy Note 2 rather than a dumbed-down version of the Note 3, as it features the Galaxy Note 2's 5.55" 720p Super AMOLED display, 8MP camera, and 3,100 mAh battery. Even the RAM and internal storage are the same at 2GB and 16GB, respectively. What is interesting, however, is the new 1.7GHz dual + 1.3GHz quad-core (Hexa) processor powering the Galaxy Note 3 Neo. We didn't get much details throughout the document beyond a mere mention of the name and the clock speed of the two sets of cores. It'll certainly be a step up from the 1.6GHz quad-core Exynos found on the Note 2, but the question is how will it compare to the Snapdragon 600 and 800 chipsets out there. Could it feature Samsung new HMP solution - the one that allows all cores to work simultaneously? It would be an odd move for Samsung to debut their new killer processor tech in a "lite" model device, but this industry has certainly seen stranger things happen. The good news is that Samsung is bringing over its slick new faux leather back cover from the Galaxy Note 3 (probably why it lends its name), and is a slimmer device than the Note 2 to boot. Also included are all of the Smart Features from the Note 3 and S4, including Air command and Advanced Multi Window. We've been hearing talk of a new 720p Note variant for quite some time now, and although the leaked promo packet doesn't mention a release or announce date, MWC 2014 next month sounds about right. Be sure to check back with us for all the breaking news on the Galaxy Note 3 Neo. Source
  24. We knew Samsung was working on a smartphone that sits right between the Galaxy Grand and the Galaxy Grand 2, but it was a mystery what exactly it will be. Now we know virtually all there is to know of the upcoming addition to the Galaxy Grand series, thanks to a leaked internal document that we got hold off. Samsung Galaxy Grand Neo will come with a 5-inch TFT display with a resolution of 800 x 480 pixels. Under the hood, there is a 1.2 GHz quad-core A7 chipset powering the smartphone along with 1 GB of RAM. The 5 megapixel rear camera with LED flash and the front facing VGA shooter completes the camera department, while the 8GB internal memory along with the microSD card slot takes care of storage. The connectivity options of the Samsung Galaxy Grand Neo include Bluetooth 4.0, HSPA+ (21Mbps down, 5.76Mbps up), WiFi 802.11 b/g/n, Wi-Fi Direct, micro USB, GPS and GLONASS support. However, there is no LTE or Wi-Fi ac radios built-in. Samsung Galaxy Grand Neo has a design, which is quite similar to its predecessor and the device measures 143.7 x 77.1 x 9.6mm. The Neo will be powered by Android 4.2 Jelly Bean OS and will feature the TouchWiz customizations on top of it. Lastly, a 2,100mAh battery will provide the required juice for the smartphone. The smartphone will cost €299 after tax in Europe and while we have no info on its availability, it can't take too long now that the sales materials are ready. We also know that the smartphone will be available in multiple color options. Source
  25. Several HTC employees, including a senior executive, have been indicted in Taiwan for leaking company secrets, falsifying expenses, and taking kickbacks, reports The Wall Street Journal. Thomas Chien, HTC's vice president of product design, is alleged to have leaked upcoming smartphone interface designs to a partner who he planned to start a new business with. Along with five other HTC employees, Chien has reportedly also been charged for collectively receiving around 33.57 million New Taiwan dollars (US$1.12 million) by falsifying expenses and receiving kickbacks from suppliers. Three employees from unidentified suppliers of HTC have also been indicted. Chien and the other HTC employees were first arrested in August regarding these charges. At the time, it was reported that the designs Chien leaked were of Sense 6.0, which would be an upcoming, unannounced version of HTC's Android software and interface. HTC's R&D director, Bill Wu, and design team senior manager, Justin Huang, were reported to be among the other five facing charges at the time of the initial report, but the Journal doesn't say specifically who else has been indicted beyond Chien right now. Should so many high-level employees be facing prosecution, it would certainly be bad news for HTC, which is dealing with slumping sales and several other executive departures already. Source
  • Create New...