Saturday, January 24, 2015

Programme Language Introduced by Apple


Swift
The programme language introduced by Apple for developers, for iOS and OS X Swift has gained a lot of popularity over the past six months as per the developer focused analyst firm RedMonk. The latest programming language rankings of the company has indicated Swift rise from the 68th place to the 22nd since its last survey. Stephen O’Grady, RedMonk co-founder and principal analyst, had commented that `during the Q3 rankings marking its debut, Swift is a language that is going to be a lot more popular and very soon, even so, the growth that Swift experienced is essentially unprecedented in the history of these rankings’.

In early 2012, RedMonk had started on regular basis, ranking the popularity of programming languages though its first analysis was done in 2010 and the WWDC app which was launched in June last year was the first app written in the new language. It was intended to be more concise so that the same functions could be created in few lines of code and would be much safer than competing languages. Its assessment is based on the relative rankings of various computer languages which were noticed on two different programming sites namely GitHub and Stack Overflow.

Swift – Tendency to Combine Performance/Efficiency

Apple had introduced Swift at the same time with iOS 8 which was the biggest release since the App Store launch and OS X Yosemite. According to Apple, billed as a language which is much easier for developers to create incredible apps, Swift has the tendency to combine the performance and efficiency of compiled languages with the simplicity as well as the interactivity of popular scripting languages. RedMonk has described Swift as `the Apple anointed successor’ to Objective-C which is presently ranked 10th on the firm’s programming language list. O’Grady had stated that `being sanctioned officially everywhere as the future standard for iOS applications, it would lead to growth. It would also make Apple’s new language a clear outlier in an ecosystem of programming languages and is known for not changing much each year. Swift’s meteoric growth notwithstanding, the high level takeaway from these rankings is stability.

Large Leap in Ranking

RedMonk it is said creates a league table of programming language each year which is believed to become more popular in the future, by mentioning them on Stock Overflow with the number of lines of code posted to GitJub. The latest week’s list indicated that Apple’s Swift had made a large leap up in its ranking. RedMonk had stated that the results were not meant to be indicators of how much a language is utilised presently but is predictive of future use’ since it portrays that programmers are learning and interacting with the language. On the website of RedMonk, a blog post by Stephen O’Grady states that at the time of the last rankings, Swift had been listed as the language to watch, a choice given status as Apple’s anointed successor to the #10 language on the list, Objective – C.

Tuesday, January 20, 2015

Apple Laptops Vulnerable To Virus That 'Can’t Be Removed


Thunderstrike
Thunderstrike – Malicious Code in Boot ROM 

Security researcher has discovered a way to install malicious code on a small chip built in Apple laptop which would resist any attempt in removal of it and even replacing the entire hard disk will not be capable of deleting it.

 The attack named, `Thunderstrike’ installs the malicious code in the Boot ROM of the system through the Thunderbolt port. Thunderstrike is undetectable and would need an attacker to get access to a machine for a few moments and since it is new, no security software would be on the lookout for it. Trammel Hudson working for New York hedge fund Two Sigma Investments noted the discovery when his employer asked him to check into the security regarding Apple laptops.

He wrote a comment in an annotated version of a talk given at the 31C3 conference stating that they were considering deploying MacBook and was asked to use his reverse engineering experience to look into the reports of rootkits on the Mac. The first step he took was in dismantling one of the laptops in order to gain access to the boot ROM which is a small chip containing the code that enables the computer to operate when switched on, before the main operating system is loaded.

Bootkit – Difficult to Delete

The malicious code could be hidden in this ROM and unlike other normal virus residing on the hard disk, this particular one cannot be deleted which is known as bootkit. The code could be used to do anything, an attacker would desire, from covertly probing the user to leaking sensitive data that is available on the machine.

 Researchers, though earlier have observed that modifying the contents of the ROM in Apple laptops causes the computer being completely unusable and as security measures, one should look for any changes and shut down if they come across anything. Hudson was of the opinion that these security measures could always seem to be `doomed to fail’ or `futile’ since anyone getting access to the contents of the ROM could also get access to the code which checks the ROM for changes.

On the contrary, he states that there should be some unchangeable hardware chip which could perform these checks. It was also observed that the attack could be done without the need of physically taking the machine apart in order to get the chip, which can be done by using the Thunderbolt port and theoretically any device, a monitor, printer or hard disk could be utilised in stalling malicious code by plugging it in some simple steps.

Partial Fix - By Apple

Hudson informed that Apple is planning a `partial fix’, as a firmware update would stop the ROM from being overwritten with malicious code in certain situations, though not all, like when a machine is being rebooted with a malicious Thunderbolt device plugged in. He had approached the company regarding the flaw in 2013.

His suggestion to prevent the attack is to overwrite the ROM with their own code which would disable any remote attacks through the Thunderbolt port and then paint over the screws on the laptop with nail varnish to detect any unauthorised physical access to the ROM. This measure however is time consuming since it is out of reach to all but only to the most advanced security experts.




Monday, January 19, 2015

Apple HomeKit Powers On With iDevices Switch Smart Plug


idevices
iDevices Switch – World’s First HomeKit Enabled Plug

Users of iPhone and iPad who have been waiting anxiously for news in the HomeKit connected product space, after Apple’s announcement at WWDC 2014 and CES 2015 will be seeing new consumer electronics making way in the market which includes the first devise compatible with Apple’s smart home feature.

The iDevices Switch has been described as `the world’s first HomeKit enabled plug’ helping users to control connected appliances with the help of Siri. The iDevices Switch specifically is a Bluetooth and Wi-Fi connected plug which interfaces with the wall outlet and to connect the appliance, one could plug it into the electrical outlet on the wall and plug your lamp, fan, or any appliance or device needed to power in the Switch.

The iDevices Switch can connect to home Wi-Fi network, interfacing with the iDevices Connected iOS app and is compatible with Apple’s HomeKit features. This indicates that users could also use Siri commands from iOS 8 with the capabilities to power appliances on or off by only talking to the iPhone, iPad or iPod touch.

Connected to Home Network – Wi-Fi/Bluetooth

The Switch is not the first smart plug, Many others namely Belkin, D-Link to mention a few have sold connected power plugs for several years. There is not much difference on the premise behind Switch, than its predecessors and due to networking capabilities, built in the outlet hardware, one can use the smartphone in order to manage things plugged into the Switch.

The Switch can connect to home network via Wi-Fi and through Bluetooth can also connect to other devices which do not have Wi-Fi. For instance, smart door locks usually tend to run on batteries since hardwiring is not practical for several residential door designs and to save power, majority of the smart locks utilise Bluetooth which connect to the phone and relies on some type of hub in order to get out to larger internet. Since it incorporated Wi-Fi and Bluetooth, the iDevices’ Switch acts as the hub.

Stand alone Product

Schlage, lock-maker will have a connected HomeKit compatible lock which could take advantage of this feature. The Switch operates as a standalone product which does not need any additional hub, subscription service or any add-ons and its connected app moreover adds the ability to schedule as well as automate tasks with the iDevices Switch, thereby saving the user from manually controlling it.

The company is likely to schedule the shipping in the first half of this year, with its demo conducted at CES, though its pricing is not yet disclosed. Potential consumers interested in following the availability of the Switch could sign up at the bottom of its product page, to receive notification for product updates.

Besides, iDevices’ announcement of HomeKit enabled smart plug at CES, iHome too shares its plans bringing in its own iSP5 SmartPlug in the market with a demo at the Consumer electronics Show soon, though no announcement with regards to its pricing and availability has been revealed. Some are speculating that the Switch would be costing $49.99 when it will be made available later this year. The Switch also will have a built in colour customizable night light, a charming touch added to it.

Wednesday, January 14, 2015

Thunderbolt Equipped Monitor – Replacing LED Cinema Display

Thunderbolt
As announced in July 2011, the current 27 inch Thunderbolt of Apple’s display has been debuted as the first Thunderbolt equipped monitor, replacing the outgoing LED Cinema Display.

When the Thunderbolt display offered cutting edge display technology with 2,560 pixel-by-1,440 pixel WQHD IPS screen from the 27 inch iMac which was launched a few months earlier, has now been overtaken by a higher resolution option or products, offering same feature though at a cheaper cost.

Rumours of updated Thunderbolt Display have been going on though Apple recently announced the stunning iMac with 5K Retina display. Speculations are on that the 5K iMac would be used as an external monitor but have been kept aside keeping in mind Thunderbolt’s bandwidth limitation..

The updated DisplayPort 1.3 supports 5K displays and the functions are not available in Thunderbolt 2 besides the original Thunderbolt protocol that was used by the Thunderbolt Display. Apple is aware of the consumers’ need for more advanced technologies, as observed from the Sharp 4K monitor that has been advertised with the top tier Mac Pro desktop.

Higher Screen Tech –Revised Thunderbolt with DisplayPort 1.3

Apple is likely to wait for a 5K or a higher screen tech which could be backed by a next gen revised Thunderbolt with DisplayPort 1.3. Till then, there are few options made available for Mac owners needing the cutting edge of monitor technology or an affordable method of expanding scream real estate.

UltraSharp monitors of Dell are a few of the best dealers with solid technology together with low prices and the 27 inch UltraSharp is the closest analogy to a theoretical 5K Thunderbolt display which has been made by Apple. Dell’s UltraSharp splits into 5,120 pixels by 2,880 pixels at 60 Hz, with the use of dual DisplayPort setup, while one cable saves a DisplayPortinput, it knocks resolution down to 3,840 pixels by 2,160 pixels at 60Hz.

Besides this, the LED backlighting is bright at 350 cd/m2, under the Thunderbolt Display specification, of 375 cd/m2. Moreover Dell sells an X-Rite i1Display Pro colorimeter which on combining with an on-board 12 bit user accessible 3D lookup table provides an option for precise colour control while advanced colorimetric setting has been reserved for expensive commercial displays.

27-Inch ColorPrime – Next Generation Thunderbolt Display 

Users interested in an updated Thunderbolt Display may not have to go further than LG’s commercial class 27MB85R-B that sports a WQHD display together with IPS technology and LG is known to be one of Apple’s LCD panel suppliers for Thunderbolt display and the ColorPrime has identical specification besides an anti-glare coating.

The LG takes pride in two Thunderbolt 3 ports, Dual-Link DVI-D, HDMI, DisplayPort as well as mini DisplayPort connections unlike other monitors in its category. Its ColorPrime feature comprises of Scaler and True Colour Pro software which works in tandem with a calibrator that is included for great accuracy. The 27-inch ColorPrime is the next generation Thunderbolt Display that Apple has not built which can be purchased from B&H Photo for $597.99.

Several leading manufacturers are happy employing DisplayPort or mini DisplayPort technology instead of Thunderbolt which means that their product could not be used as docking stations for other Thunderbolt equipped devices and for this reason, Apple’s Thunderbolt Display seems to be the most suitable option.

Saturday, January 10, 2015

Hackers Recreate Fingerprints Using Public Photos


finger_print
Fingerprints – Means of Ascertaining Identity 

Fingerprints have been used as a means of ascertaining a person’s identity for quite some time since 1900 and for the past 10 years or so; it has begun to get fairly common in the form of digital fingerprint readers. It first showed up on expensive laptops and external peripherals in enterprise settings and recently on smartphones like the latest iPhones and the Galaxy S5.A recent cyber security convention in Hamburg, the `Chaos Computer Club’ demonstrated on how someone’s fingerprint could be used which was done by analysing photographs.

Fingerprints could be developed from smudges on windows and from other smooth surfaces. Earlier forgers used tapes, scanner or some plastic material and glue in order to build a fingerprint which could fool scanners. A member of Chaos Computer Club, a European hacker association, showed the possibility of reproducing someone’s fingerprint and probe into systems that were protected by biometric fingerprint scanners, by using a photo of the finger.

A snap or a photo of a celebrity waving their hand could be sufficient to implement this task. The member of the CCC managed to get hold of the fingerprint of Germany’s defence minister Ursula von der Leyen from a photo which was taken during a press conference, which if the German government would use biometric access control systems, could be a kind of security breach.

Hacker Create Fingerprint from Public Photos

Jan Starbug Krissler, the hacker, portrayed his findings at Chaos Communication Congress recently. With the photo of von der Leyen’s thumb gained from a press conference, somewhere in October, together with some other photos of her thumb from various angles, he managed to rebuild her thumbprint with the use of commercially available software – VeriFinger.

Thereafter he used the thumbprint to develop a real world dummy by printing it out on a mask and exposed the mask to create a negative of the print on a substrate. He then filled the negative with wood glue in order to create a positive fingerprint. On testing it showed that this technique could trick Apple’s TouchID sensor. According to Chaos Computer Club, it states that this is the first time a fingerprint has been deceived so far and the group leader, Starbug has informed that he was capable of creating a thumbprint of Ursula von der Leyen, the German Minister of Defence, from several of her news photos.

Need for Fingerprint Security Systems

Starbugobtained the print of the fingerprint from the photos on the tracing paper and then copied it to a plastic board. Thereafter he covered it in graphite making a dummy print by coating the plastic in wood glue. In one of the demonstration, the dummy print managed to trick Apple’s TouchID – APPL, Tech30 that controls Apple Pay.

A statement made by the group states that there would be no need to steal objects carrying the fingerprints anymore and after this talk, politicians would probably wear gloves henceforth while talking in public. The Club also states that the presentation needs the validity of fingerprint security systems and it would be difficult to do any useful thing with the German Defence Minister’s fingerprints though one could use the hacking method to intrude into a friend’s iPhone.