Sony’s Blu-ray MegaChanger hits the streets next month with new ES standalone

Sony CX7000ES Blu-ray changer

When we first got our hands-on the 400 disc MegaChanger pictured above we’d hoped it would be out a little earlier; but never the less the wait is almost over as Sony officially announced plans to release the BDP-CX7000ES in August, for the hard to swallow price of $1,900 — about $400 less than rumored. The good news is that it does just about everything we can think of, like handle any Blu-ray Disc, DVD or CD with ease, and of course works with the latest codecs delivered via bitstream or LPCM. Now if you just have to have a Blu-ray changer, but wish it was half the price, you can wait a few more months for the BDP-CX960 for $800. You will however have to be willing to forgo things like RS-232 and IR-in, as well as the ES badge. Also shipping in August with the ES MegaChanger is the BDP-S1000ES. This standalone Blu-ray player is at the top of line and for $700 you get just about every feature and spec Blu-ray has to offer, as well as built-in WiFi and a DLNA client. The full details of all three are in the release after the jump.

Continue reading Sony’s Blu-ray MegaChanger hits the streets next month with new ES standalone

Filed under: ,

Sony’s Blu-ray MegaChanger hits the streets next month with new ES standalone originally appeared on Engadget on Thu, 23 Jul 2009 15:00:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Sony adds $700 Blu-ray player its ES line

Sony’s Blu-ray megachangers may be the big news today, but the company also announced a single-disc high-end Blu-ray player, the BDP-S1000ES ($700, August release date).

It’s the least expensive Blu-ray player in the Sony ES (“Elevated Standard”) line and comes with a few premium features like integrated 802.

An iLuv for all Apple audio devices

(Credit: iLuv)

I’ve always been reluctant to buy accessories for my iPhone 3G. This is because most of them are designed for a specific model of the phone (or the iPod) add would be useless when I move on to another. However, now there’s something that will fit …

Retro Game Alert: Monkey Island on the iPhone

The start of point-and-click adventure games to go?

(Credit: LucasArts)

As a gaming system, the iPhone has had its share of praises and attacks, but it’s hard to challenge the appeal of retro titles on the system. With a perfect version of Myst under its belt, the iPhone’s …

Originally posted at iPhone Atlas

Wal-Mart beats Best Buy with $298 laptop

Is $299 too much for a laptop? Wal-Mart has answered Best Buy’s $299 laptop challenge with a $298 offer.

$298 Wal-Mart laptop

Wal-Mart’s $298 laptop.

(Credit: Wal-Mart)

“For the first time, a 3GB memory laptop from a well-known brand has ventured below $300,” Wal-Mart said in a statement Thursday.

Starting July …

Originally posted at Nanotech – The Circuits Blog

Halo gets animated and new Xbox Live features

An obviously staged shot of Master Chief "in action".

(Credit: Microsoft/Warner Bros.)

A few years back in 2003, when the new Matrix movies were debuting, Warner Bros. also released a straight-to-video compilation of animated short stories based in the Matrix universe called “The Animatrix.”

Each segment was …

Samsung Mondi Hits Stores at $450 Unlocked

Samsung_Mondi_WiMAX.jpg

We’re still a little puzzled as to who exactly the WiMAX-enabled Samsung Mondi MID is for. But we’re about to find out, because it’s now on sale for $450 directly from Samsung, according to Sidecut Reports. Next week, you’ll also be able to buy one at Best Buy and at Clear stores in all current Clearwire markets–meaning Baltimore, Atlanta, Las Vegas, and Portland (Oregon).

The Samsung Mondi is one of those franken-PDAs, like the Nokia N810 WiMAX but not like the HTC Advantage (which is also a phone). The Mondi has a 4.3-inch LCD touch screen and runs Windows Mobile 6.1 Professional. It’s also packed with radios, including WiMAX, Wi-Fi, Bluetooth, and GPS, and there’s an HDMI out for watching videos on a large TV.

The Mondi is also your only choice for a WiMAX device aside from modems, since Nokia canned the N810 WiMAX within months of its introduction.

Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses

_mg_10531

Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.


“It is kind of like storing all your secret messages right next to the secret decoder ring,” said Jonathan Zdziarski, an iPhone developer and a hacker who teaches forensics courses on recovering data from iPhones. “I don’t think any of us [developers] have ever seen encryption implemented so poorly before, which is why it’s hard to describe why it’s such a big threat to security.”

With its easy-to-use interface and wealth of applications available for download, the iPhone may be the most attractive smartphone yet for business use. Many companies seem to agree: In Apple’s quarterly earnings conference call Tuesday, Apple chief operating officer Tim Cook said almost 20 percent of Fortune 100 companies have purchased 10,000 or more iPhones apiece; multiple corporations and government organizations have purchased 25,000 iPhones each; and the iPhone has been approved in more than 300 higher education institutions.

But contrary to Apple’s claim that the new iPhone 3GS is more enterprise friendly, the new iPhone 3GS’ encryption feature is “broken” when it comes to protecting sensitive information such as credit card numbers and social-security digits, Zdziarski said.

Zdziarski said it’s just as easy to access a user’s private information on an iPhone 3GS as it was on the previous generation iPhone 3G or first generation iPhone, both of which didn’t feature encryption. If a thief got his hands on an iPhone, a little bit of free software is all that’s needed to tap into all of the user’s content. Live data can be extracted in as little as two minutes, and an entire raw disk image can be made in about 45 minutes, Zdziarski said.

Wondering where the encryption comes into play? It doesn’t. Strangely, once one begins extracting data from an iPhone 3GS, the iPhone begins to decrypt the data on its own, he said.

To steal an iPhone’s disk image, hackers can use popular jailbreaking tools such as Red Sn0w and Purple Ra1n to install a custom kernel on the phone. Then, the thief can install an Secure Shell (SSH) client to port the iPhone’s raw disk image across SSH onto a computer.

To demonstrate the technique, Zdziarski established a screenshare with Wired.com, and he was able to tap into an iPhone 3GS’ data with a few easy steps. The encryption did not pose any hindrance.

Nonetheless, professionals using the iPhone for business don’t seem to care, or know, about the device’s encryption weakness.

“We’re seeing growing interest with the release of iPhone 3.0 and the iPhone 3GS due in part to the new hardware encryption and improved security policies,” Cook said during Apple’s earnings call. “The phone is particularly doing well with small businesses and large organizations.”

Clearly, the gigantic offering of iPhone applications is luring these business groups. Quickoffice Mobile, for example, enables users to access and edit Microsoft Word or Excel files on their iPhone. For handling transactions, merchants can use apps such as Accept Credit Cards to process a credit card on an iPhone anywhere with a Wi-Fi or cellular connection.

Several employees of Halton Company, an industrial equipment provider, are using iPhones for work, according to Lance Kidd, chief information officer of the company. He said the large number of applications available for the iPhone make it worthy of risk-taking.

“Your organization has to be culturally ready to accept a certain degree of risk,” Kidd said. “I can say we’ve secured everything as tight as a button, but that won’t be true…. Our culture is such that our general manager is saying, ‘I’m willing to take the risk for the value of the applications.’”

Kidd noted that Halton employees are not using iPhones for holding confidential customer information, but rather for basic tasks such as e-mailing and engaging with clients via social networking sites such as Facebook and Twitter. Halton also plans to code apps strictly for use at the company, Kidd said.

According to Kidd, a security expert performed an evaluation of Halton, and he said it was possible for any hacker to find an infiltration no matter the level of security. Therefore, Halton has measures in place to respond to an information security threat rather than attempt to avoid it.

“It’s like business continuity,” Kidd said. “You prepare for disasters. You prepare for if there’s an earthquake and the building breaks down, and you prepare for if there’s a crack in [information] security.”

But Zdziarski stands firm that the iPhone’s software versatility isn’t worth the risk for use in the workforce. He said sensitive information is bound to appear in e-mails or anything that can be contained on the iPhone’s disk, which can be easily extracted by thieves thanks to the new handset’s shoddy encryption.

Zdziarski said it’s up to the app developers to add an extra level of security to their apps because Apple’s encryption feature is so poor.

“If they’re relying on Apple’s security, then their application is going to be terribly insecure,” he said. “Apple may be technically correct that [the iPhone 3GS] has an encryption piece in it, but it’s entirely useless toward security.”

He added that the ability for the iPhone to self-erase itself remotely using Apple’s MobileMe service isn’t very helpful, either: Any reasonably intelligent criminal would remove the SIM card to prevent the remote-wipe command from coming through. (In a past Wired.com report, Zdziarski said the iPhone’s remote-wiping ability pales in comparison to Research In Motion’s BlackBerry, which can self-delete automatically after the phone has been inactive on the network for a preset amount of time.)

On top of that, the iPhone isn’t well protected in general usability, said John Casasanta, founder of iPhone development company Tap Tap Tap. He said though Apple’s approval process scans for malicious code, a developer could easily tweak the app to send a user’s personal data, such as his contacts list, over the network without his knowing.

“Apple can see if something is blatantly doing something malicious in the approval process, but it wouldn’t be very hard to do something behind the scenes,” Casasanta said.

Evidently, it isn’t difficult to sneak unauthorized content into the App Store. In May, Wired.com reported on an exploit demonstrated by the iPhone app Lyrics. Apple initially rejected the app because it contained profane words, and then Lyrics’ developer snuck the profanity into the app with a hidden Easter egg. Apple then approved the application.

Zdziarski added that there are other weaknesses with the iPhone: Pressing the Home button, and even zooming in on a screen, automatically creates a screenshot temporarily stored in the iPhone’s memory, which can be accessed later. And then there’s the keyboard cache: key strokes logged in a file on the phone, which can contain information such as credit card numbers or confidential messages typed in Safari. Cached keyboard text can be recovered from a device dating back a year or more, Zdziarski said.

Though Apple has declined to comment on iPhone security issues, the company has more or less admitted iPhones are vulnerable to security threats, because an emergency measure exists. In August 2008, Apple CEO Steve Jobs acknowledged the existence of a remote kill switch for iPhone apps, meaning if a malicious app made its way onto iPhones, Apple could trigger a command to delete the app from users’ devices. There is no evidence that the kill switch has ever been used.

So, what kind of business should you do with an iPhone if the device is not very secure? Zdziarski said there are some business-savvy apps that have managed to integrate better security (such as secure data fields to prevent key-stroke logging of credit card numbers, for example), but he warned companies to be cautious about investing too much trust in the iPhone and the apps available for it.

“We’re going to have to go with the old imperative of ‘Trust no one,’” he said. “And unfortunately part of that is, don’t trust Apple.”

See Also:

Photo: Jon Snyder/Wired.com


Razer intros Orochi portable Bluetooth gaming mouse, fancy Kabuto surface

It’s been a few months since the reptile fanatics over at Razer dished out a new input peripheral, but the wait for yet another ends today with the introduction of the ambidextrous Orochi ($79.99; ships mid-August). Rather than shooting for the desktop gamer, the company is aiming squarely at the laptop crowd with its freshest portable Bluetooth laser mouse, which is the first to offer a 4,000dpi Razer Precision 3G laser sensor and dual-mode wired / wireless functionality. There’s also seven programmable buttons, Bluetooth 2.0 connectivity and on-board memory for setting up performance profiles. In related news, the outfit is also issuing a new gaming surface in the Razer Kabuto, an ultrathin, ultra-soft mat that’s probably nice, but not quite $19.99 nice.

Filed under:

Razer intros Orochi portable Bluetooth gaming mouse, fancy Kabuto surface originally appeared on Engadget on Thu, 23 Jul 2009 14:11:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Campanola Cosmosign Watch from Citizen

I can’t claim to be much of an expert on space, but the new Citizen Campanola Cosmosign watch is like our favorite Astrodea Celestial watches on luxury steroids. It’s not cheap, but that’s a beautiful piece of the universe right there.

citizen campanola cosmosign watch japan

The stars rotate in real time as they do above your head (assuming you’re in Japan of course), which can come in handy on overcast eclipse days like we had this week.

Product Page via Citizen