Category Archives: Technology

Silicon valley & technology news. Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way. The word technology can also mean the products resulting from such efforts, including both tangible tools such as utensils or machines, and intangible ones such as software. Technology plays a critical role in science, engineering, and everyday life

Apple to Issue Fix for iPhones, Macs at Risk From Chip Flaw

Apple Inc. will release a patch for the Safari web browser on its iPhones, iPads and Macs within days, it said Thursday, after major chipmakers disclosed flaws that leave nearly every modern computing device vulnerable to hackers.

On Wednesday, Alphabet Inc.’s Google and other security researchers disclosed two major chip flaws, one called Meltdown affecting only Intel Corp. chips and one called Spectre affecting nearly all computer chips made in the last decade. The news sparked a sell-off in Intel’s stock as investors tried to gauge the costs to the chipmaker.

In a statement on its website, Apple said all Mac and iOS devices were affected by both Meltdown and Spectre. But the most recent operating system updates for Mac computers, Apple TVs, iPhones and iPads protect users against the Meltdown attack and do not slow down the devices, it added. Meltdown does not affect the Apple Watch.

Macs and iOS devices are vulnerable to Spectre attacks through code that can run in web browsers. Apple said it would issue a patch to its Safari web browser for those devices “in the coming days.”

Intel Shares Fall as Investors Worry About Costs of Chip Flaw

Intel Corp shares fell nearly 2 percent Thursday as investors worried about the potential financial liability and reputational hit from recently disclosed security flaws in its widely used microprocessors.

The largest chipmaker had confirmed Wednesday that flaws reported by researchers could allow hackers to steal sensitive information from computers, phones and other devices. Apple Inc, Microsoft Corp and other software makers have issued patches to protect against the vulnerabilities.

Intel may be on the hook for costs stemming from lawsuits claiming that the patches would slow computers and effectively force consumers to buy new hardware, and big customers will likely seek compensation from Intel for any software or hardware fixes they make, security experts said.

“The potential liability is big for Intel,” said Eric Johnson, dean of Vanderbilt University’s Owen Graduate School of Management. “Everybody will be scrambling over the next few days to figure out just how big it is.”

Intel has said that the patches for the bugs would slow its chips down somewhat but that most users will not notice.

Amazon Web Services (AWS), the largest seller of cloud computing services, said in a statement it does not “expect meaningful performance impact for most customer workloads.”

Microsoft and Alphabet Inc’s Google both said in statements on their websites that they expect few performance problems for most of their cloud computing customers.

Financial repercussions

But the incident is likely to spur cloud companies to press Intel for lower prices on chips in future talks, said Kim Forrest, senior equity research analyst at Fort Pitt Capital Group in Pittsburgh, which owns shares in Intel.

“What [Intel’s cloud customers] are going to say is, ‘You wronged us, we hate you, but if we can get a discount, we’ll still buy from you,'” Forrest said.

Forrest also expects Intel will have to increase its chip development spending to focus on security.

Government agencies and security experts said they knew of no cyberattacks that had exploited the vulnerabilities.

Financial services firms were studying information on the vulnerabilities to determine how to best respond, said the Financial Services Information Sharing and Analysis Center, a global industry group known as FS-ISAC that shares data on cyberthreats.

Banks and other firms are trying to understand what it will cost to respond to the issue, FS-ISAC said in an emailed statement.

“In addition to the security considerations raised by this design flaw, performance degradation is expected, which could require more processing power for affected systems to compensate and maintain current baseline performance,” FS-ISAC said. “There will need to be consideration and balance between fixing the potential security threat vs. the performance and other possible impact to systems.”

Lawsuit filed

Lawyers filed a lawsuit in San Jose, California, federal court on Wednesday that sought class-action status and compensation for people who had bought vulnerable Intel chips or computers that came with them already installed.

Intel did not immediately respond to a request for comment on Thursday about the lawsuit.

While more lawsuits are expected, Intel’s biggest customers are likely to quietly seek compensation for any harm caused by the vulnerabilities, including costs to patch machines or replace microprocessors, Johnson said.

Legal experts said that consumers would have to prove concrete damages and harm to proceed with claims.

Intel shares fell 1.8 percent, following a 3.4 percent decline Wednesday.

Shares in rival Advanced Micro Devices Inc climbed 4.9 percent as investors speculated the No. 2 maker of microprocessors would woo customers away from Intel.

Still, researchers had said some of AMD’s chips had one of the two vulnerabilities disclosed on Wednesday, as do processors from ARM Holdings.

YouTube Star Logan Paul Steps Away From Posting After Outcry

YouTube star Logan Paul has stepped away from posting videos following an outcry when he uploaded images of what appeared to be the body of someone who killed themselves in a Japanese forest.

Paul took to Twitter on Wednesday to say he was suspending his video blog “for now” and “taking time to reflect.”

A petition on Change.org that demands his YouTube channel be deleted had been signed by more than 125,000 people by Thursday morning.

Paul created a furor when he posted a video of him in a forest near Mount Fuji showing what seemed to be a body hanging from a tree.

The video was viewed some 6 million times before being removed from Paul’s YouTube channel, a verified account with more than 15 million subscribers.

A storm of criticism followed despite two apologies, with commenters saying Paul seemed disrespectful and that his initial apology was inadequate.

In Paul’s initial apology, he said he had wanted to raise awareness about suicide and possibly save lives, and he denied his goal was to drive clicks to his social media content.

“I thought I could make a positive ripple on the internet, not cause a monsoon of negativity,” he said in his Twitter post.

“I don’t expect to be forgiven. I’m simply here to apologize,” he said on the more somber video apology uploaded on YouTube and Twitter late Tuesday. “None of us knew how to react or how to feel.”

Security Flaws Put Virtually All Phones, Computers at Risk, Researchers Say

Security researchers on Wednesday disclosed a set of security flaws that they said could let hackers steal sensitive information from nearly every modern computing device containing chips from Intel Corp., Advanced Micro Devices Inc. and ARM Holdings.

One of the bugs is specific to Intel but another affects laptops, desktop computers, smartphones, tablets and internet servers alike. Intel and ARM insisted that the issue was not a design flaw, but it will require users to download a patch and update their operating system to fix.

“Phones, PCs — everything is going to have some impact, but it’ll vary from product to product,” Intel CEO Brian Krzanich said in an interview with CNBC Wednesday afternoon.

Researchers with Alphabet Inc.’s Google Project Zero, in conjunction with academic and industry researchers from several countries, discovered two  flaws.

The first, called Meltdown, affects Intel chips and lets hackers bypass the hardware barrier between applications run by users and the computer’s memory, potentially letting hackers read a computer’s memory and steal passwords.

The second, called Spectre, affects chips from Intel, AMD and ARM and lets hackers potentially trick otherwise error-free applications into giving up secret information.

The researchers said Apple Inc. and Microsoft Corp. had patches ready for users for desktop computers affected by Meltdown. Microsoft declined to comment and Apple did not immediately return requests for comment.

Daniel Gruss, one of the researchers at Graz University of Technology in Austria who discovered Meltdown, said in an interview with Reuters that the flaw was “probably one of the worst CPU bugs ever found.”

Specter a long-term issue

Gruss said Meltdown was the more serious problem in the short term but  could be decisively stopped with software patches. Specter, the broader bug that applies to nearly all computing devices, is harder for hackers to take advantage of but less easily patched and will be a bigger problem in the long

term, he said.

Speaking on CNBC, Intel’s Krzanich said Google researchers told Intel of the flaws “a while ago” and that Intel had been testing fixes that device makers who use its chips will push out next week. Before the problems became public, Google on its blog said Intel and others planned to disclose the issues on January 9.

The flaws were first reported by The Register, a tech publication. It also reported that the updates to fix the problems could cause Intel chips to operate 5 percent to 30 percent more slowly.

Intel denied that the patches would bog down computers based on Intel chips.

“Intel has begun providing software and firmware updates to mitigate these exploits,” Intel said in a statement. “Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.”

ARM spokesman Phil Hughes said that patches had already been shared with the companies’ partners, which include many smartphone manufacturers.

“This method only works if a certain type of malicious code is already running on a device and could at worst result in small pieces of data being accessed from privileged memory,” Hughes said in an email.

AMD chips are also affected by at least one variant of a set of security flaws but that can be patched with a software update. The company said it believes there “is near zero risk to AMD products at this time.”

Google’s report

Google said in a blog post that Android phones running the latest security updates are protected, as are its own Nexus and Pixel phones with the latest security updates. Gmail users do not need to take any additional action to protect themselves, but users of its Chromebooks, Chrome web browser and many of its Google Cloud services will need to install updates.

The defect affects the so-called kernel memory on Intel x86 processor chips manufactured over the past decade, allowing users of normal applications to discern the layout or content of protected areas on the chips, The Register reported, citing unnamed programmers.

That could make it possible for hackers to exploit other security bugs or, worse, expose secure information such as passwords, thus compromising individual computers or even entire server networks.

Dan Guido, chief executive of cybersecurity consulting firm Trail of Bits, said that businesses should quickly move to update vulnerable systems, saying he expects hackers to quickly develop code they can use to launch attacks that exploit the vulnerabilities.

“Exploits for these bugs will be added to hackers’ standard toolkits,” said Guido.

Shares in Intel were down by 3.4 percent following the report but nudged back up 1.2 percent to $44.70 in after-hours trading, while shares in AMD were up 1 percent to $11.77, shedding many of the gains they had made earlier in the day when reports suggested its chips were not affected.

It was not immediately clear whether Intel would face any significant financial liability arising from the reported flaw.

“The current Intel problem, if true, would likely not require CPU replacement in our opinion. However the situation is fluid,” Hans Mosesmann of Rosenblatt Securities in New York said in a note, adding it could hurt the company’s reputation.

Blackberry Surges on Deal With Baidu for Self-driving Cars

BlackBerry Ltd and Chinese internet search firm Baidu Inc on Wednesday signed a deal to jointly develop self-driving vehicle technology, sending BlackBerry’s Toronto-listed shares up 13 percent to a four-year high.

The deal follows similar agreements with firms including Qualcomm Inc, Denso and Aptiv Plc to develop autonomous-driving technology with BlackBerry’s QNX software, which are expected to start generating revenue in 2019.

Investors and analysts are closely watching what comes of those agreements amid expectations that QNX could become a key technology in the burgeoning self-driving vehicle industry, serving as the operating system for computer chips used to run self-driving vehicles.

QNX will be the operating system for Apollo, a platform for self-driving vehicles that Baidu announced in April and has billed as the “Android” of the autonomous driving industry.

“The opportunity is global, it’s for a very large market and I think it’s a very solid win for BlackBerry,” said CIBC Capital Markets analyst Todd Coupland.

Apollo has since signed up several major automakers, including Ford Motor Co, Hyundai Motor Group and several Chinese carmakers.

QNX has long been used to run car infotainment consoles. BlackBerry has recently developed the software to run sophisticated computer chips for autos that manage multiple safety-critical systems.

BlackBerry shares rose 13 percent in Toronto to C$16.95, their sharpest one-day gain since April and highest close since March 2013.

The two companies said they will also integrate Baidu’s CarLife, a leading smartphone integration software for connected cars in China, its conversational AI system and high definition maps with BlackBerry’s infotainment platform.

 

One Difference Between 2009 vs 2018 Iran Protests? 48 Million Smartphones

In 2009, the world watched as Iranians marching in the streets turned to social media sites like Twitter and Facebook to organize and share information.

The technology-assisted protests were dubbed the first “Twitter revolution.”

Flash forward to 2018 and technology again is playing a role in demonstrations sweeping cities across Iran.

But much has changed in the intervening years when it comes to the communication tools used by Iranian citizens for organizing and publicizing protests.

Here are some of the main changes:

  1. The rise of smartphones has brought more Iranians on to the internet

In 2009, fewer than 15 percent of Iranians had internet access, according to the World Bank.

While Twitter was used to get news of the protests out to the world, it is unclear how much of a role it or any service played to help organize political actions. Word of mouth, in some accounts, as well as SMS messaging over cellphones (and just 30 percent of Iranians owned a cell phone) played a larger role than internet services.

Now, with the advent of smartphones in Iran – about half of Iranians, or 48 million people, have smartphones. More than 50 percent of Iranians are online.

  1. An explosion in messaging options

In 2009, Facebook and Twitter were relatively new with Iranians accessing the services mostly on their desktop computers.

As the 2009 protests unfolded, the Obama administration asked Twitter to delay an update that would have taken the service offline to allow Iranians to continue to use it.

Now, Iranian citizens have a number of ways of receiving and sending messages – straight from the device they carry in their pockets.

Of these newer services, the most popular in Iran is Telegram, an instant messaging service that offers encrypted secret chats and channels, where people discuss news and current events. By one count, more than 100,000 Iranian channels are on Telegram. Facebook’s Instagram is the second most popular service.

“Telegram channels are frequently used for organizing protests and for sharing political opinion,” said Eva Galperin, director of cybersecurity for the Electronic Frontier Foundation.

As the protests continued, the Iranian government shut down Telegram and Instagram. But other messaging apps give users options.

“Regime in Iran can shut down signal, telegram, etc., but differently from 2009, the whole country is connected and they have a long list of other messaging apps to use,” tweeted Jared Cohen, founder and chief executive of Jigsaw, an Alphabet company, and a senior fellow on the Council of Foreign Relations. “This time around, it’s much harder to win a game of technology wack-a-mole.”

And indeed, the head of Telegram took to Twitter on Tuesday to suggest users go to Whatsapp, which “remains fully accessible in Iran.”

  1. Wider adoption of anti-filtering tools

Since the 2009 Green Movement, more Iranians have access to anti-censorship technology, such as VPNs and proxies, servers that transmit content that can evade government controls.

“Iranian internet users are making use of a wider variety of circumvention tools that allow for selective access to blocked resources,” said Alp Toker, founder of NetBlocks.org, a digital rights group.

“This could be down to a more mature understanding of internet filtering that has developed since the Green Movement protests after 2009, supported by domestic technical expertise and earlier initiatives to develop tools for Iran,” Toker said. “This suggests that workarounds for Iran’s internet filters have become a way of life for many mobile and desktop internet users.”

  1. Dangers exist for Iranians using mobile technology

With more communication technologies available to Iranians, they are more regulated and less open than they were in 2009, says Toker. Mobile devices are more restricted than computers, making it more difficult to circumvent Iran’s internet filters, he added.

In addition, many Iranians are using outdated iPhone devices and skipping software security updates, which means they may be more vulnerable to state-sponsored hacking and surveillance, Toker said.

Since 2009, the Iranian government has worked to create its own internet service and restricted content it considers objectionable on commercial services.

“Iran’s own strict regime of internet filters, but also U.S. sanctions limiting the transfer and sale of technology and security products, are likely contributing factors that mean the choke points are still an effective mechanism for mass control,” Toker said.

China’s WeChat Denies Storing User Chats

Tencent Holdings’ WeChat, China’s most popular messenger app, on Tuesday denied storing users’ chat histories, after a top businessman was quoted in media reports as saying he believed Tencent was monitoring everyone’s account.

“WeChat does not store any users’ chat history. That is only stored in users’ mobiles, computers and other terminals,” WeChat said in a post on the social media platform.

“WeChat will not use any content from user chats for big data analysis. Because of WeChat’s technical model that does not store or analyze user chats, the rumor that ‘we are watching your WeChat everyday’ is pure misunderstanding.”

Li Shufu, chairman of Geely Holdings, owner of the Volvo car brand, was quoted in Chinese media on Monday as saying Tencent Chairman Ma Huateng “must be watching all our WeChats every day”.

Like all Chinese social media platforms, WeChat is required to censor public posts deemed “illegal” by the Communist Party.

WeChat’s privacy policy says it may need to retain and disclose users’ information “in response to a request by a government authority, law enforcement agency or similar body”.

WeChat did not immediately respond to a request for further comment.

According to a report by Amnesty International, Tencent ranked at the bottom of 11 tech firms running the world’s most popular messenger apps for how they use encryption to protect user privacy.

China’s cyber watchdog in September announced a new rule making chat group administrators and companies accountable for breaches of content rules.

In the same month it handed down maximum penalties to tech firms including Tencent, Baidu Inc and Weibo Corp for failing to properly censor online content, and asked them to increase content auditing measures.

Minister: UK May Use Taxes to Get Tech Giants to Do More to Fight Extremism

Britain may impose new taxes on tech giants like Google and Facebook unless they do more to combat online extremism by taking down material aimed at radicalizing people or helping them to prepare attacks, the

country’s security minister said.

Ben Wallace accused tech firms of being happy to sell people’s data but not to give it to the government which was being forced to spend vast sums on de-radicalization programs, surveillance and other counter-terrorism measures.

“If they continue to be less than co-operative, we should look at things like tax as a way of incentivizing them or compen­sating for their inaction,” Wallace told the Sunday Times newspaper in an interview.

His quotes did not give further details on tax plans. The newspaper said that any demand would take the form of a windfall tax similar to that imposed on privatized utilities by former Prime Minister Tony Blair’s government in 1997.

Wallace accused the tech giants of putting private profit before public safety.

“We should stop pretending that because they sit on beanbags in T-shirts they are not ruthless profiteers,” he said. “They will ruthlessly sell our details to loans and soft-porn companies but not give it to our democratically elected

government.”

Facebook executive Simon Milner rejected the criticisms.

“Mr. Wallace is wrong to say that we put profit before safety, especially in the fight against terrorism,” he said in an emailed statement. “We’ve invested millions of pounds in people and technology to identify and remove terrorist content.”

YouTube, which is owned by Google, said it was doing more every day to tackle violent extremism.

“Over the course of 2017 we have made significant progress through investing in machine learning technology, recruiting more reviewers, building partnerships with experts and collaboration with other companies,” a YouTube spokeswoman said.

Deadly attacks

Britain suffered a series of attacks by Islamic extremists between March and June this year that killed a total of 36 people, excluding the attackers.

Two involved vehicles ramming people on bridges in London, followed by attackers stabbing people. The deadliest, a bombing at a concert in the northern city of Manchester, killed 22 people.

Following the second bridge attack, Prime Minister Theresa May proposed beefing up regulations on cyberspace, and weeks later interior minister Amber Rudd traveled to California to ask Silicon Valley to step up efforts against extremism.

“We are more vulnerable than at any point in the last 100 years,” said Wallace, citing extremist material on social media and encrypted messaging services like WhatsApp as tools that made life too easy for attackers.

“Because content is not being taken down as quickly as they could do, we’re having to de-radicalize people who have been radicalized. That’s costing millions. They can’t get away with that and we should look at all the options, including tax.”

Facebook said it removed 83 percent of uploaded copies of terrorist content within one hour of its being found on the social media network.

It also highlighted plans to double the number of people working in its safety and security teams to 20,000 by the end of 2018.

YouTube said that progress in machine learning meant that 83 percent of violent extremist content was removed without the need for users to flag it.

 

Using Simple Electric Currents to Clean Dirty Water

The World Health Organization estimates more than 800,000 people around the world die every year because of unsafe drinking water. But researchers at Massachusetts Institute of Technology may have figured out a simple and inexpensive way to clean the world’s dirtiest water. VOA’s Kevin Enochs reports.

The Biggest Consumer Electronics Show Opens in Two Weeks

January is almost here, and the world is bracing for the unofficial opening of this year’s race for the hearts, minds and pockets of tech enthusiasts. The international Consumer Electronics Show, CES for short, is the venue where technology manufacturers, from giants to startups, show their products, hoping they will become among the next must-haves worldwide. VOA’s George Putic looks at what may be expected.

Facebook, Twitter Threatened With Sanctions in Britain

Social media giants Facebook and Twitter could face sanctions in Britain if they fail to be more forthcoming in providing details about Russian disinformation campaigns that used their platforms in the run-up to last year’s Brexit referendum, the chairman of a British parliamentary inquiry committee warned.

The companies have been given until January 18 to hand over information.

Damian Collins, chairman of the Department of Culture, Media and Sport committee in the British parliament, which is looking into Russian fake news’ efforts, criticized both companies earlier this month, accusing them of stonewalling the parliamentary investigation. But he has now warned they risk being punished and he says his committee is exploring what sanctions could be imposed on Facebook and Twitter.

“What there has to be then is some mechanism of saying: if you fail to do that, if you ignore requests to act, if you fail to police the site effectively and deal with highly problematic content, then there has to be some sort of sanction against you,” he told Britain’s Guardian newspaper.

He dubbed the lack of cooperation by the social media firms as “extraordinary.”

“They don’t believe that they have any obligation at all to initiate their own investigation into what may or may not have been happening, he said. “They’ve not done any of that work at all.”

Parliamentary committees do not have the power in their own right to impose sanctions on erring companies. But British officials have expressed interest in punishing social media companies for failing to take action to stop their platforms from being exploited by agitators, whether they are working for foreign powers or non-state actors such as the Islamic State terror group.

In September in New York at the annual general assembly meeting of the United Nations, British Prime Minister Theresa May expressed frustration with social media companies, saying they must go “further and faster” in removing extremist content and should aim to do so within two hours of it appearing on their sites.

“This is a major step in reclaiming the internet from those who would use it to do us harm,” she said.

The prime minister has repeatedly called for an end to “safe spaces” on social media for terrorists. And British ministers have called for limits to end-to-end encryption, which prevents messages from being read by third parties if they are intercepted.

British lawmakers and ministers aren’t the only ones considering ways to sanction social media firms that fail to police their sites to avoid them from being used to spread fake news or being exploited by militants. This month, Germany’s competition authority accused Facebook of violating European data protection regulations by merging information collected through WhatsApp and Instagram with Facebook user accounts.

Collins has written twice to the social media firms requesting information about suspected Russian fake news campaigns in the weeks and months before Britons voted in June 2016 on whether to retain membership in the European Union, Britain’s largest trading partner.

In a letter to Twitter, he wrote: “The information you have now shared with us is completely inadequate. … It seems odd that so far we have received more information about activities that have taken place on your platform from journalists and academics than from you.”

In response to parliamentary requests for information about Russian interference in the EU referendum, including details of accounts operated by Russian misinformation actors, the social media firms passed on copies of the details they provided to Britain’s Electoral Commission, which is probing advertising originating from Russian actors during the lead up to the Brexit vote.

Facebook said only $0.97 had been spent on Brexit-related ads seen by British viewers. Twitter claimed the only Russian spending it received was $1,000 from the Russian state-owned broadcaster RT.

Russia has been accused of meddling in recent elections in America, France and elsewhere and of running disinformation campaigns aimed at poisoning political discourse in the West and sowing discord with fake news.

In November, Prime Minister May accused Vladimir Putin’s government of trying to “undermine free societies” and “planting fake stories” to “sow discord in the West. “Russia has denied the allegations.

Three days before Christmas, Britain’s foreign minister, Boris Johnson, sparred with his Russian counterpart, Sergei Lavrov, over the issue of alleged Russian meddling in the Brexit referendum.

During his trip to Moscow, the first visit by a British foreign secretary to the Russian capital for five years, Lavrov denied at a joint press conference that the Kremlin had sought to meddle, saying Johnson himself had previously said there was “no evidence of Russian interference in the Brexit referendum.” Johnson corrected Lavrov, saying: “Not successfully, is what I said.”

So far the evidence of a major Russian social media effort during the Brexit referendum remains thin, and at least not on the alleged scale seen, according to investigators, during the 2016 U.S. presidential race.

An investigation by the New York Times found that “Russian agents … disseminated inflammatory posts that reached 126 million users on Facebook, published more than 131,000 messages on Twitter and uploaded over 1,000 videos to Google’s YouTube service” ahead of the U.S. presidential vote.

In January 2017, the Office of the U.S. Director of National Intelligence concluded: “Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the U.S. presidential election.”

In October 2017, researchers at the City University of London found a “13,500-strong [Russian] Twitter bot army,” was present on the social media site around the time of the referendum.

Bot accounts post content automatically. Those accounts in the month prior to the Brexit vote posted a total of 65,000 tweets about the referendum with a slant towards the leave campaign, according to City University researchers.

But a subsequent study by the University of California, Berkeley, and Swansea University in Wales unearthed more pro-Brexit Russian bot accounts, tracking over 150,000 of them.

New Robot Teaches Autistic Adults to Navigate Office Politics

Autism is on the rise in many developed countries, and the reasons why are still unclear. But more autistic children mean that, one day, more autistic adults will be entering the workforce. A new robot is trying to help these workers navigate the emotional elements on the job. VOA’s Bronwyn Benito narrates this report by Kevin Enochs.

Apple Apologizes After Outcry Over Slowed iPhones

Facing lawsuits and consumer outrage  after it said it slowed older iPhones with flagging batteries, Apple Inc is slashing prices for battery replacements and will change its software to show users whether their phone battery is good.

In a posting on its website Thursday, Apple apologized over its handling of the battery issue and said it would make a number of changes for customers “to recognize their loyalty and to regain the trust of anyone who may have doubted Apple’s intentions.”

Apple made the move to address concerns about the quality and durability of its products at a time when it is charging $999 for its newest flagship model, the iPhone X.

Battery prices lowered

The company said it would cut the price of an out-of-warranty battery replacement from $79 to $29 for an iPhone 6 or later, starting next month.

The company also will update its iOS operating system to let users see whether their battery is in poor health and is affecting the phone’s performance.

“We know that some of you feel Apple has let you down,” Apple said in its posting. “We apologize.”

On Dec. 20, Apple acknowledged that iPhone software has the effect of slowing down some phones with battery problems. Apple said the problem was that aging lithium batteries delivered power unevenly, which could cause iPhones to shutdown unexpectedly to protect the delicate circuits inside.

Lawsuits filed

That disclosure played on a common belief among consumers that Apple purposely slows down older phones to encourage customers to buy newer iPhone models.

While no credible evidence has ever emerged that Apple engaged in such conduct, the battery disclosure struck a nerve on social media and elsewhere. Apple on Thursday denied that it has ever done anything to intentionally shorten the life of a product.

At least eight lawsuits have been filed in California, New York and Illinois alleging that the company defrauded users by slowing devices down without warning them. The company also faces a legal complaint in France, where so called “planned obsolesce” is against the law.

DOJ Charges 2 Romanians With Hacking of DC Police Surveillance Cameras

The Justice Department on Thursday unsealed details of its case against two Romanians who allegedly hacked computers tied to Washington, D.C., police surveillance cameras.

Police in Bucharest arrested Mihai Alexandru Isvanca and Eveline Cismaru on December 15. U.S. attorneys have charged them with conspiracy to commit computer and wire fraud.

They allegedly hacked into more than 120 computers tied to Washington police surveillance cameras last January. It was part of an alleged scheme to infect personal computers with ransomware.

Ransomware restricts users from accessing their own computers and demands a payment to the ramsomware operator to unlock it.

The Justice Department said the investigation was of the highest priority because the alleged hacking of the surveillance camera computers came just weeks before the presidential inauguration of Donald Trump.

However, it says there is no evidence anyone’s personal security was threatened or harmed.

If tried in the U.S. and convicted, the Romanian defendants could face up to 20 years in prison.

With Lineup Widening, Apple Depends Less on iPhone X

In years past, demand for Apple Inc.’s latest flagship phone was critical to the company’s results over the holiday shopping quarter. That dynamic might be changing, however, as Apple’s widening lineup of devices and services more than makes up for any tepidness in demand this quarter for its lead product, the $999 iPhone X.

On Tuesday, Apple’s stock fell 2.5 percent to $170.57 after Taiwan’s Economic Daily and several analysts suggested iPhone X sales in the fiscal first quarter would be 30 million units, 20 million fewer than initially planned by the company.

The cut in the forecast was not confirmed, and the stock regained ground Thursday, hitting $171.82 by midday. The mean revenue estimate for the holiday quarter among 30 analysts remains at $86.2 billion, near the high end of Apple’s forecast of $84 billion to $87 billion.

Apple declined to comment.

Part of the support for Apple may reflect a change in its business strategy.

Releasing two new models and keeping older ones have made

Apple less dependent on its flagship product. Apple shareholder Ross Gerber, chief executive of Gerber Kawasaki Wealth and

Investment Management in Santa Monica, California, said the higher price and better margins on the iPhone X would reduce fears of a sales decline.

Eye on combined sales

“We know that Apple’s strategy was different this quarter by releasing two phones, the iPhone 8 and the iPhone X, and I think combined sales will be in line with what people expect,” Gerber said.

Apple also has fattened its portfolio of accessories and other devices, from its AirPods wireless headphones to a new Apple Watch with cellular data features.

While none is a runaway hit, collectively they are an important contributor, with Apple’s “other products” segment growing 16 percent to $12.8 billion last year. Customers who buy those add-ons are also likely to buy services from the App Store and Apple Music, part of Apple’s services segment, which grew 23 percent to $29.9 billion last year.

“Ultimately, it will be this multidevice ownership” that will generate further revenue, said Carolina Milanesi, an analyst with Creative Strategies.

IPhone X sales still matter. Each unit generates nearly twice the revenue of an iPhone 7 and contains technologies like facial recognition that burnish Apple’s brand.

Bob O’Donnell of TECHnalysis Research said “hit products” still represent “an enormous amount of the company’s overall value.”

“Will it take hold in the mainstream? That’s the question that still remains,” he said.

Lackluster Year of Space Exploration

While the attention of much of the world was occupied with earthly happenings, space scientists had some notable achievements during the past year, ranging from new projects to the spectacular end of at least one program. VOA’s George Putic reviews the highlights of the year in space.

Vietnam Unveils 10,000-strong Cyberunit to Combat ‘Wrong Views’

Vietnam has unveiled a new, 10,000-strong military cyberwarfare unit to counter “wrong” views on the Internet, media reported, amid a widening crackdown on critics of the one-party state.

The cyber unit, named Force 47, is already in operation in several sectors, Tuoi Tre newspaper quoted Lieutenant General Nguyen Trong Nghia, deputy head of the military’s political department, as saying at a conference of the Central Propaganda Department on Monday in the commercial hub of Ho Chi Minh City.

“In every hour, minute and second we must be ready to fight proactively against the wrong views,” the paper quoted the general as saying.

Communist-ruled Vietnam has stepped up attempts to tame the internet, calling for closer watch over social networks and for the removal of content that it deems offensive, but there has been little sign of it silencing criticism when the companies providing the platforms are global.

Its neighbor China, in contrast, allows only local internet companies operating under strict rules.

The number of staff compares with the 6,000 reportedly employed by North Korea. However, the general’s comments suggest its force may be focused largely on domestic internet users, whereas North Korea is internationally focused because the internet is not available to the public at large.

‘Bad and dangerous content’

In August, Vietnam’s president said the country needed to pay greater attention to controlling “news sites and blogs with bad and dangerous content.”

Vietnam, one of the top 10 countries for Facebook users by numbers, has also drafted an internet security bill asking for local placement of Facebook and Google servers, but the bill has been the subject of heated debate at the National Assembly and is still pending assembly approval.

Cybersecurity firm FireEye Inc. said Vietnam had “built up considerable cyberespionage capabilities in a region with relatively weak defenses.”

“Vietnam is certainly not alone. FireEye has observed a proliferation in offensive capabilities. … This proliferation has implications for many parties, including governments, journalists, activists and even multinational firms,” a spokesman at FireEye, who requested anonymity, told Reuters.

“Cyberespionage is increasingly attractive to nation states, in part because it can provide access to a significant amount of information with a modest investment, plausible deniability and limited risk,” he added.

Vietnam denies such charges.

Vietnam has in recent months stepped up measures to silence critics. A court last month jailed a blogger for seven years for “conducting propaganda against the state.”

In a separate, similar case last month, a court upheld a 10-year jail sentence for a prominent blogger.

Securing Your Data in Cloud Storage

Saving digital files in commercial memory banks called cloud storage is a cheap and convenient way for long-term storage of documents, photos, music and video. Private users as well as businesses can access them from anywhere and share them with whomever they give the password to. Providers, such as Dropbox, Google Drive or Amazon S3, claim almost absolute security. But computer scientists say the protection should be in the users’ hands. VOA’s George Putic has more.