Logitech H800 Wireless Headset


by John Zorabedian on June 25, 2015
Malware that encrypts all of a victim's files and holds them for ransom - what's commonly called crypto-ransomware or cryptoware - continues to be hugely successful in making money for the criminal gangs who perpetuate it.
According to a public service announcement from the FBI's Internet Crime Complaint Center (IC3), the CryptoWall variant of crypto-ransomware cost US businesses and consumers at least $18 million between April 2014 and June 2015.
That figure is based on complaints from 992 CryptoWall victims, and includes related damages such as the cost of network mitigation, loss of productivity, legal fees, IT services and credit monitoring services.
It's not clear how much of the $18 million was paid out in ransom fees to the CryptoWall criminals, but the FBI said that the ransom demanded typically ranged from $200 to $10,000.
The FBI called CryptoWall the "most current and significant ransomware threat" in the US.
Although the FBI's report of financial damages caused by CryptoWall is significant, it's likely those figures represent only a tiny minority of the cost to victims worldwide.
It's difficult to determine the exact number of crypto-ransomware victims, in part because many businesses caught in the ransomware trap don't want to come out and say so (public sector organizations like police departmentshaven't had the same luxury).
Equally hard is figuring out how much money the crooks have hauled in from their ransomware enterprises.
What we do know is that crypto-ransomware is highly effective, and lucrative enough for criminals to keep coming up with new forms of it - one survey found that 3% of UK citizens had been victims, and 40% of those had paid the ransom.
CryptoWall's predecessor, CryptoLocker, was extremely successful - the crew behind CryptoLocker raked in an estimated $27 million in the first two months after it was unleashed in September 2013.
Although CryptoLocker was fatally damaged by a law enforcement take-down of its server infrastructure in May 2014, cybercriminals soon began spreading other dangerous forms of ransomware based on CryptoLocker's successful model.
We began seeing CryptoWall in April 2014, along with another similar variant called CryptoDefense.
Since then, other copycats have emerged that have proved to be just as dangerous, some even borrowing the CryptoLocker name.
Recently we even saw crypto-ransomware that borrowed themes and imagery from the popular television series "Breaking Bad."
The crooks have figured out some fiendish ways to get people to pay up: by making their illicit software "consumer-friendly" with easy-to-follow instructions on how to pay with bitcoins or other forms of untraceable e-payment, and offering "user support."
Crypto-ransomware crooks have also figured out that they can earn their victim's trust (more or less) by offering to decrypt one file for "free" - so you'll know the crooks will follow through on their promise to decrypt the rest of your files once you pay them.
If the crooks have implemented the encryption process properly - and they often have - you're left with a choice of losing your files, or paying for a copy of the decryption key.
It presents an ethical dilemma - one which Sophos security expert and fellow Naked Security writer Paul Ducklin captured well in his excellent post "Ransomware - should you pay?"
His spot-on and simple advice is summed up here:
The founder of one of the Dark Web's fledgling search engines is warning Tor users about the presence of hundreds of fake and booby trapped .onion websites.
Sites with addresses that end in .onion are anonymous, Dark Web websites (properly called hidden services) that can only be accessed using the Tor browser.
The fake sites were discovered by Juha Nurmi, a founding member of the ahmia.fi project, an open source search engine that aims to search, index and catalogue all the content present on the Tor network.
Nurmi first noticed a fake of his own site before discovering that there are multiple clones of hundreds of other Dark Web sites, including a fake of the .onion version of the popular DuckDuckGo search engine.
Nurmi raised his concerns on Monday, on the Tor-Talk mailing list and published a full list of fake or booby trapped sites to Pastebin.
I noticed a while ago that there is a clone onion site for Ahmia. Now I realized that someone is actually generated similar onion domains to all popular onion sites and is re-writing some of the content.
In his post to the mailing list he claims that there are multiple copies of each target site with similar-looking addresses.
Tor sites are often found through directories rather than search engines and they have addresses that are quite difficult to read, which probably makes it easier to plant fakes than on the regular World Wide Web.
For example, the real and fake addresses for DuckDuckGo are the equally immemorable:
http://3g2upl4pq6kufc4m.onion/ (real)
http://3g2up5afx6n5miu4.onion/ (fake)
Nurmi also claims that the fake sites aren't just duplicates of the real sites but proxies for them (he could presumably verify this for his own site but he doesn't state how or if he tested it for the others).
If he's correct then the proxies would allow the attacker to launch so-called Man-in-the-Middle attacks, stealing or modifying data as it passes through the fake site.
These sites are actually working as a transparent proxy to real sites. However, the attacker works as MITM [Man-in-the-Middle] and rewrites some content. It is possible that the attacker is gathering information, including user names and passwords.
In another sinister twist user 'garpamp', who claims that such activity has been "going on for years", states that he's seen pages that list .onion addresses being modified by malicious Tor exit nodes.
This is a completely different attack from the one identified by Nurmi and it occurs on the regular web, not the Dark Web, but it's aimed at achieving the same thing - getting you to visit a fake Dark Web service instead of a real one.
It works like this:
The Tor browser can be used to browse hidden services on the so-called Dark Web, where both the browser and the site are completely anonymous, or the regular World Wide Web, where only the user with a Tor browser is anonymous.
When it's used on the regular web, Tor encrypts your traffic and sends it on an eccentric journey between a number of Tor nodes before it's decrypted again before making the final hop to its destination like any other internet traffic.
This decryption (and the encryption of responses) is performed by a special Tor node called an exit node. Anyone can set up an exit node and because they deal with unencrypted information they are an excellent place to spy on traffic, or even to modify it on-the-wire (you can read more about exit nodes in my recent article Can you trust Tor's exit nodes?).
What garpamp claims to have seen is malicious exit nodes being used to rewrite regular web pages.
In other words, if you looked at this page through Tor and you happened to get a malicious exit node in your circuit you might not see the legitimate DuckDuckGo address at the top of this page, you might see two fake ones instead.
During the course of the discussion, garpamp noticed that a bad exit node was actually rewriting the addresses on the pastebin page posted by Nurmi!
...I've also seen exits [1] rewriting onion addresses found on clearnet.
[1] Like the ****** behind this piece of **** is doing to that pastebin url... Arag0n 185.77.129.189 dc914d754b27e1a0f196330bec599bc9d640f30c
The thread closed with Roger Dingledine, one of the original Tor developers, reporting that the bad exit node discovered by garpamp has now been given the BadExit flag which should prevent it from acting as an exit node.
The battle to shut down bad exit nodes is ongoing.
We don't know who is behind the fake sites, who is behind the exit nodes rewriting real addresses for fake ones or why they're doing it, but there are no shortage of suspects.
The Dark Web is an online safe haven for dissidents, journalists and champions of free speech but it is also a small and highly concentrated den of the very worst criminality.
So, not only is there is an abundance of thieves on the Dark Web, and no honour amongst them, there is no shortage of government hackers or undercover agents either.
A new PowerPoint addin that is free from Microsoft. Follow the download directions to install it into your PowerPoint program. Once it is installed you will see a new tab called Mix that will give you the abilty to create your Mix media.
So what is Mix? If you are aware of TechSmith's Camtasia and the way that it works with PowerPoint Presentations, then my explanation is simple. It is Microsoft's version of that function. Mix allows you to automate your PowerPoint presentation and save it as a video for sharing. It has many other features built into it but one of the things that it does that is useful in classroom situations, is to allow you to create quizzes with in the presentation. It also provides screen and sound capture that you can insert in a slide, insert other video files, insert audio and then do playback/recording your narration of your slideshow. You can then publish this recording to your online onedrive storage area and share it with whomever you wish.
It's pretty slick. Once you get the general function of it, then it becomes very easy to use. All you have to do is dream up and produce your content and then deliver it to the world.
by Ross McKerchar on May 21, 2015 from nakedscurity
There’s been a lot of talk about encryption in the media lately.
You hear about who uses encryption, and who doesn’t (lots of companies don’t, to their own detriment).
And you hear about who wants to be able to bypass encryption (some law enforcement and national security agencies), and who doesn’t (Google, Apple, privacy advocates, etc.).
The encryption debate is important, but unfortunately, encryption is complex and the discussion can be hard to follow for people outside of the security community.
Businesses often don't realise why encryption is important, and how they can use it to protect their data.
In this article I will seek to answer some common questions about encryption by covering two areas: 1) a very brief explanation of encryption, and 2) a couple of the most common use-cases which business needs to be aware of.
What is encryption?
Encryption is a method of scrambling messages in a format that is unreadable by unauthorised users - it is, simply put, the best way to keep data secure from spies, thieves or accidental exposure. (Not to be confused with steganography, which is all about hiding messages, rather than making them unreadable).
Cryptography - the art and science behind encryption - uses algorithms to turn readable data (plaintext) into unreadable format (ciphertext).
Without getting too deep into the details, it's helpful to think about it like this: when you encrypt data you are storing it like you would money in a safe - you need a key to unlock the safe to get the money out (my apologies to any cryptographers reading this for the gross over-simplification!).
(If you want to learn more, I recommend my fellow Naked Security writer Paul Ducklin's great explanation of public-private key encryption.)
There are loads of ways to use encryption, but for organisations concerned about data loss, two very important areas to understand are full-disk encryption and file-level encryption.
Full-disk encryption vs. file-level encryption
Encryption can be used in many different ways.
Say your employee accidentally loses a USB drive with valuable data on a train, or their laptop gets stolen when they leave it alone in a coffee shop while they go to the bathroom (it happens).
The physical kit can be replaced, but the data on them could end up in the wrong hands and cause considerable harm - you might face financial penalties (depending on your local laws and industry regulations).
Or you might lose customers when word gets out that their personal data was leaked. You may very well be legally obliged to tell them. Of course, morally, telling them is always the right thing to do, regardless of legality.
However, if the laptop or USB drive was strongly encrypted, the data is unreadable to someone without they key and you likely won’t have legal issues to worry about.
Laptops, USB drives, and even smartphones can be encrypted using what is known as full-disk encryption. That means the entire hard drive of the device and everything on it is protected by encryption - from the operating system to program files all the way down to temporary files.
Full-disk encryption is also relatively simple to implement - laptops and smartphones now come with the capability built in, what’s called native encryption.
However, full-disk encryption can only keep your stuff secure when it's on the device. The second anything leaves the encrypted device, it is "magically" decrypted and readable by all. This has important implications for your backups or files you've uploaded to a cloud service or attached to an email.
If you think about the analogy of money in a safe, the encrypted disk is the safe, and the money is your data. Once you take your money out of the safe it is no longer protected.
Conversely, if you have file-level encryption, every file has a "padlock."
With file-level encryption, your data is protected when it is in transit, or stored somewhere in the cloud.
But there is a downside - file-level encryption is harder to manage than full-disk encryption, because whenever you want to access the data, you need the key. As you may want access from many devices and many places, this requires careful key management.
When and how should you use encryption?
Full-disk encryption barely affects system performance at all, but if you try to encrypt everything at the file level, it will quickly become unmanageable.
You need to think a bit more about what data you want to encrypt and why. You'll likely want to focus on file-level encryption for sensitive data and/or data that you copy to other places - for example, documents you want to access on your phone as well as your desktop, or from a service like Dropbox.
It's important to understand that file-level encryption doesn't replace full-disk encryption. They complement each other. If you only encrypt your own files and not the full disk then it's very easy to miss something. Chances are your computer stores copies of your data in all sorts of places you didn't think about.
Most companies will also want the IT department to carefully manage the encryption keys across various devices. Without this central management, data could easily be lost if a person leaves the company or loses their decryption password. Unlike passwords used for access, passwords used for encryption can't simply be reset by a sysadmin if they're forgotten.
A smart company will make sure the master decryption keys are very well protected. Even smarter companies will ensure that no single person has full access to the powerful key. One way of doing this is designing a system such that two or more people need to contribute towards the decryption process (segregation of duties).
Good encryption software will have capabilities to make key management and segregation of duties relatively simple.
I just picked up an original Microsoft Surface Pro and even with it's limitations I have been fairly impressed with it. So much so that I am now eyeing up the Surface Pro 3 as my next laptop computer. Of course, I'll wait until I find a good deal on that as well. The one I picked up has 64gb of storage and 4gb of RAM. It is an i5 so it is pretty snappy. My biggest issue with it is the screen size and the storage. I just upgraded it to Windows 8.1 and that gave me a bit back but I have 20GB's free with my basic load on it. I am running Office 2013 (Office 365 Load), Connectwise (this is our service management program, Netflix, Hulu Plus, Kindle, Plex, Readiy, Facebook Apps.
However, before I upgraded, I was all the way down to 8GB so that was a little worrysome, especially when I didn't have enough space to install the upgrade to 8.1.
It is snappy, runs well and I am beginning to really like the 8.1 interface. I have found a few programs that don't like the new operating system but for the most part I am running fine. I have signed up for the Windows 10 upgrade that should be availablle late July and this will give me a chance to work more with it as well.
An interesting viewpoint by Joyce Rosenburg from inc.com discusses the associated costs of having to upgrade your credit card readers to work with the new chip based credit cards that were designed to reduce credit card fraud. Businesses are required to update their equipment by October 1st or face the chance of being held liable for transactions made with phony chip cards. Most retailers are going to bear the brunt of these costs.
But that's not all! If your accounting system is connected to the readers they may not work with the new equipment and may require you to upgrade or replace your system to be able to automate the transaction processing.
What are the alternatives? I can't seem to think of anything but move forward and take the financial hit. Not a pleasant situation to be in for all of us small business owners.
Sunday, June 14, 2015
With Wi-Fi becoming more and more prevalent in the places that you frequent, are the services safe to use with your mobile devices?
The free connections in cafés and hotels don't encrypt network traffic so others on the network can read your traffic and possibly hijacked your sessions. One of the solutions we try to use, SSL Encryption, has its issues is as well. You initiate this when you insert the HTTPS:// in front of the url that you are wanting to access or in many cases the site itself redirects to an SSL session automatically. This is the case with many financial sites as well as anything that needs to be HIPAA compliant.
Using a VPN Tunnel to your site helps to encrypt the session from your device to the site but you will need to use a proxy service in the cases when you are not connecting back to the corporate or provided VPN controlled site.
While this is a much more secured connection, there is a security hole that can be taken advantage of. In many cases you must open a browser to a "'captive portal", which comes from a local router when you ask to connect to the Internet. You may have to manually accept a terms of service agreement before your session can start.
While this is occurring your VPN has not yet begun and depending upon the software that you run you might be exposed at this point. If you have services running on your mobile device that begin checking for updated data automatically, like email, you are not going through a VPN to access the. The data that is streaming through is potentially available for anyone to see.
While this Coverage may only be a matter of seconds, that could be enough to expose valuable information like logon credentials. So how do you protect yourself?
Shaun Murphy, a founder of PrivateGiant (www.privategiant.com), which makes products to protect the security and privacy of online communications, suggests that you do it with a software firewall, either one that comes with your operating system or a third-party one:
The basic approach is to prevent all inbound and outbound connections on your public networks (or zones) with the exception of a browser that you use to connect to captive portals and such. That browser should be one you only use for this purpose and, perhaps, some lightweight browsing (certainly not email, social, or any other personally identifiable purpose.) Using that same firewall, set up a profile/zone for VPN traffic where inbound / outbound traffic are less restricted (I recommend blocking outbound connections by default and then adding in programs as needed, it's surprising how many programs call home... all the time.) The nice thing about this approach is your email client, primary web browser, and other applications you use will be useless unless you are actively connected to the VPN.
And the real solution to this problem isn't hacking with firewalls. What we need is encryption being provided by default in public Wi-Fi. We don't see this very often now because that would mean supplying passwords to you the client, and the support overhead would be just too great in a busy environment like a café or restaurant. The result is that we have an insecure environment with bad but adequate usability.
In an article written by Larry Seltzer for arstechnica.com he talks about a solution has been available for years. He goes on to tell us that it is beginning to gain traffic and that hopefully will see this as the go to protocol in the future.
The Wi-Fi Alliance has had a solution for this problem nearly in place for years, called Passpoint. The Passpoint protocol was created to allow for Wi-Fi "roaming" by creating a way for access points to grant access by way of a third-party credential, such as your Google ID or your ISP account. When you connect to a public access point through Passpoint, it authenticates you and establishes a secure connection using WPA2-Enterprise, the gold standard in Wi-Fi security—instead of leaving your traffic unencrypted or visible on the shared wireless LAN.
The reason that you don't yet see Passpoint everywhere is that it requires the Wi-Fi provider—such as a consumer ISP, Google, or Boingo—to trust certain authentication providers and to advertise a list of them to connecting devices—the longer, the better. And users would need to configure Passpoint on their system to use one or more of their credentials when connecting to such a network. There hasn't been wide adoption of Passpoint yet—while it's been put to use in certain high-volume locations, such as many airports, it's still pretty uncommon.
The Wi-Fi Alliance now says that Passpoint is gaining traction in the enterprise as a way to handle BYOD. That's interesting if true, but it doesn't address the pain point of public Wi-Fi privacy. Passpoint has the potential to close the VPN data leakage window and make public Internet services far more secure. In its absence, there is no good solution.
Instapaper is a great program that I have been using for years in its free version that allows me to capture web articles that I can file in folders to make it easy for later consumption. You can access this information either through a web browser on your PC, using their iOS or Android apps on your mobile devices.
Instapaper has launched a new premium service that costs $2.99 per month or $29.99 per year, a 15% savings by purchasing on an annual basis. The feature list for both services are as follows:
From <https://www.instapaper.com/premium>
The ability to have fulltext search and to add notes to the articles that you have saved help to make an interesting argument for moving to the premium service but probably the most compelling is that you are supporting the company for offering the service as well as for any new upgrades to the product. At under three dollars per month doing so will not break your bank.
Feature deprecation sectionMost of these items you can live without but if you still have some things on on floppies that you haven't moved to other media, you may want to consider doing that before upgrading. I think most people have already done that but here is the impetus to do so. Entire experience at the store more people will be worried about Solitaire than anything else.
- If you have Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate, Windows 8 Pro with Media Center, or Windows 8.1 Pro with Media Center and you install Windows 10, Windows Media Center will be removed.
- Watching DVDs requires separate playback software
- Windows 7 desktop gadgets will be removed as part of installing Windows 10.
- Windows 10 Home users will have updates from Windows Update automatically available. Windows 10 Pro and Windows 10 Enterprise users will have the ability to defer updates.
- Solitaire, Minesweeper, and Hearts Games that come pre-installed on Windows 7 will be removed as part of installing the Windows 10 upgrade. Microsoft has released our version of Solitaire and Minesweeper called the “Microsoft Solitaire Collection” and “Microsoft Minesweeper.”
- If you have a USB floppy drive, you will need to download the latest driver from Windows Update or from the manufacturer’s website.
- If you have Windows Live Essentials installed on your system, the OneDrive application is removed and replaced with the inbox version of OneDrive.
Echo is always ready, connected, and fast. Just say the wake word, "Alexa," for:
With all of these features, how can you help not wanting to own one for yourself?
Dropbox currently has over 300 million users and its For Business version has gone a long way to improve security of your information so that is becoming much safer for businesses to use this product. We have recently added Dropbox for Business as one of the many cloud base services that we can offer our clients. We are, after all, a Solutions Provider and we are strongly focused on Security for our clients networks, computer systemes, devices and information.
I started using dropbox almost from day one that I got my first iPad and as I continued to add new mobile devices to my personal inventory it became clear how important it is to have a service that is available on any device that I possibly know. I don't want to have an issue of having to find just the right device so I can access the data that I'm looking for.
What is Dropbox for Business?
Individual Dropbox for each user in your team
With all of this control and security doesn't it make sense to include Dropbox for Business as part of your business applications?
The cost is just hundred $150 per year per user with a minimum of five users to start. Let us know if you have any questions about this product.
A couple of our guys are really into drones but Ken is the craziest.
So Ken, this one is for you!
Built on these three key concepts:
Google Photos is available now from your iOS, Android or Web enabled platform. It provides free unlimited photo and video storage of compressed images up to 16 GB for photos and videos at 1080p. A lot of time was spent showing the automatic organization capabilities based upon time, facial recognition, and geolocation.
One of the demos showed the ability to pull out a baseball photo array by just typing in the work baseball. They continued on to demonstrate how you can easily select the group of photos and share them simply by holding down on the first image and dragging to the last image to select, and create a share link that you can send off to a friend or family member that they can have access to those photos. The recipient of that shared link had total access to those images and can do whatever they wanted with them on their own device.
Another new feature coming up in the soon to be release Android "M" operating system is "Now on Tap". This will be a feature adding more context aware responses from your mobile device. So in their demo of the product, the question "what is his name?" was asked while a song was playing on the device and "Now on Tap" was able to put it together that the question was in reference to the currently playing media. It then displayed the information about the artist and provided a list of links referencing the artist. This shows that the new updated feature was able to provide a quick answer to question that wasn't specific so it had to be more intuitive about what you were probably asking for.
A second demo showed them looking at an email discussing going to a movie with the movie title listed in the message. By tapping and holding down the Home Button, the system knew that it was being asked a question, searched the message and then found the movie title in the message and brought information about the movie. What went on behind the scenes and what they are really demonstrating is Google's progress in "Natural Language Processing". Google's search is getting better able to determine what it is looking at, or better, what you are looking at, and interpreting all of the things that you might be asking from the presented information. It makes these functions more interactive, and again, more intuitive.
In another example showing "Now on Tap" responding with an actiion, They showed a message from their spouse asking about going out to dinner and a second message stating that they did not get the dry-cleaning. Pressing and holding down the Home Button again, "Now on Tap" presented two cards as a response. The first showed the name of the restaurant and buttons for navigating, calling, Yelp and Open Table so that you could make reservations, see how good the restaurant is, call them for a reservation or get directions on how to get there. The second card provided the ability to add a reminder to "Get the dry-cleaning".
In the fourth example, the context of the screen information was a discussion about Hugh Laurie. By just highlighting his name, "Now on Tap" was able to, without any other interaction, quickly lookup his name and provide more information about Hugh Laurie.
So what what Google was presenting is how responsive the system will be in providing information on the fly from the context of what you are viewing. If this works the way they were showing it, at the speed and responsiveness that they showed, this will truly be a very impressive new feature of the Android operating system.
Lenovo showed off a new smartwatch with a private screen that Lenovo says will give you a 20x increased perspective on the image being viewed. Because you have to hold the watch up to your eye to see it, it is naturally something that will normally only be done by the wearer. Termed "Magic View" Lenovo states that it solves the inherent problem found in smartwatches with their tiny screens.
Android Central say that the demo device was running an Android-based OS that was different to both Wear and Google's main mobile operating system. The second display is using optical reflection to achieve its display size and can be used for viewing larger images such as maps.
While your first thought might be of how silly it will look holding your wrist to your eye to get this increased view size, my biggest concern as I have stated in earlier articles are the idiots that will try to do this while they are driving. This road that we are going down with our mobile devices and our lack of control of when we use them is scaring me to death. I don't know what the answer is, but we need to come up with something.
In the keynote address, one of the things that was discussed was the new Android "M" opertating system and the six key feature updates that Google thinks we should be focused on. Their main direction with this upgrade was to "polish" the interface.
First: App Permissions - they have simplified the range of items that are being addressed (location, camera, microphone, contacts, phone, SMS, calendar and sensor). They are also changing when you have to decide whether to grant the App permission to use a feature. It will now be addressed at the time of first access and not during the intial installation. They are also going to give us the ability to go into settings and access the App and add or subtract permissions as you see fit. You also will be able to look at a feature and see what Apps have access to it and add or subtract for there as well. Google expects the new App persmissions will help get the App up and running faster.
Second: This is more of a programming feature but Google is giving access to a new feature called Chrome Custom Tabs so that programmers will be able to take advantage of the Chrome browser capabilities without having to build in their own web browser in their app. This will decrease programming time and increase the security that is inherent in the Chrome browser.
Third: They are giving the App developer/program to provide a more complete linking experience. You won't need to continue to pick which App you want to use everytime you click on a link. They claim that this will give the enduser a more seamless experience.
Fourth: Android Pay - So it sounds like they are going to replace Google Pay with something called Android Pay. Their claim it that it is focused on three things: Simplicity, Security and Choice. So what does this mean? The process is as follows: unlock your phone and place it near the NFC terminal. That is all. A virtual card is created so your real card is not used with the terminal. Google is working closely with banks and retailers to achieve a more comprehensive solution.
Fifth: Fingerprint - They are planning on increasing the use of fingerprint recognition with Android Pay as well as other Apps.
Sixth: Power Mangement - with the new "M" they are building in a smarter standby function to minimize power useage with up to 2x the battery useage. They are also promoting the new USB 3.0 format that will to decrease charge times by a fact of 5x. The "M" operating system will also give you the abiltiy to choose what the charging cable is doing for you, like, Charge or File Transfers etc... Ok.
Also highlighted were some editing feature changes as well as smarter data sharing. The smarter data sharing is based on your device being able to learn what Apps you use to share most often and to make them avaialble when you request sharing. Not a significant change but a nice one.
As direct competitiion to Chromecast, Roku Streaming Sticks and Amazon Firestick, this device offers a slightly wider choice of options for streaming from multimedia from your devices. It will have a bigger footprint than its competition, but still will plug into you TV's HDMI port to display the stream. It syncs up to your wireless network through either 2.5 or 5GHz networks. The device works with the same Google Cast standard that the Chromecast uses, it will also support Windoew 8.1 and iOS devices through Miracast and DLNA giving it more versatility.
It will display 1080O video to your TV and receive streams from up to 20 meters (65 feet). Just another interesting alternative out there to think about for connecting up your tablets, phones or pc's to your TV wirelessly. Expect deleveries to beging in August.
Another great service for members of Amazon Prime (membership cost $99/year) now provides same day delivery in fourteen metropolitan areas across the US. See this link to see if your area is included. Prime members in the the selected areas can now receive free same day service on qualifying orders over $35.00.
Just four key points:
Orders under $35 have a charge of $5.99 if you want them the same day. If you order after noon the item will come the next day for free.
Look out local brick and morter stores!