Connect with us

Technology

Beats Powerbeats Pro Review: Pros And Cons

Published

on

Beats

It’s Beats time to shine as their new EarPods is out! Let us all welcome the new Powerbeats Pro that is set to be released next month.

Beats took their time to release a new version of their earphones. And it seems like the long wait is over and worth it. Beats Powerbeats line last issued was in 2016, and it was the time Apple’s EarPods was released. We all know that Beats do not want to compete in the market with Apple. Besides, they are one big happy family with a little dash of partnership in some parts.

The Powerbeats Pro is Beats’ first wireless earbuds. It was released after Apple’s second-generation AirPods. I know that we are all itching to know the pros and cons of the Powerbeats Pro, as this kind of routine is standard nowadays. Before purchasing an item, we always tend to check the review – the pros and cons of the accessories to widen our understanding further before buying.

Here’s our review of the Powerbeats Pro with the Pros and Cons for better guidance.

The Pros

(1) When it comes to the physical features of the Powerbeats Pro, it is a perfect earpiece for the user because aside for from being ergonomic, the shape of the EarPod is ideal for the ears, making it extremely comfortable to wear. With its comfortability, you can wear it conveniently even with your glasses on.

(2) Of course, we cannot eliminate the fact that the latest Powerbeats Pro is compatible with any Apple products like iPhones and iPads. Hence, Apple users will have no issues connecting the wireless earbuds to any of their devices.

(3) Aside from the usual white color, Powerbeats Pro comes with three sets of colors such as black, dark green, and navy.

(4) When it comes to the battery lifespan, the Powerbeats Pro has an impressive range of battery life, running up to 9 hours with the pods alone and 24 hours when combined with its charging case. Using the earbuds for an everyday routine like running, carrying the charging case is not essential. Convenience-wise, you don’t have to worry for the Powerbeats Pro to run out of battery while jogging, unless you exercise for 9-hours straight. But, for activities that would take you more than 24-hours, then bringing the case with you is highly recommended.

(5) The Powerbeats Pro is highly similar to the second edition of Apple’s AirPods. The accessory has a built-in H1 chip for hands-free “Hey Siri” voice commands and easy access on iOS syncing.

(6) Sound-quality wise, the Powerbeats Pro has an excellent quality compared to others. Beats assured that their new product would surpass competitors by improving quality and eliminating distorted bass, which is usually the problem with other earphones. You can never go wrong in using the earbuds while listening to music as it gives a great clear sound even when listening to upbeat tunes.

(7) The Powerbeats Pro has an automatic paused function that you can set up once one or both earbuds are removed from the ears. You can then resume playing once you put it back on.

The Cons

(1) Although it may not sound lousy thing for the Powerbeats Pro, everything has its downside, unfortunately. In this particular juncture, the charging case of the Pro. The charging case is too big. Yes, it’s noticeably bulky enough when you carry it around inside your pocket, especially when you decide to bring it with you while running in the morning. In a sense, it’s quite uncomfortable running around with the charging case.

(2) Similar to Apple’s AirPods, what is lacking is the light status showing if your EarPods are fully charged. There is no indication if it is charging or not. In the case of the Powerbeats Pro, the LED light on the front only shows the status of its battery. Nothing more, nothing less. So, it’s quite a guessing game.

(3) Beats assured that the Powerbeats Pro is water resistant. Once worn, and sweats are all over it, rest assured that the earbuds are fine. But, not with the charging case. Hence, you need to wipe off the sweat of the EarPods before placing it in the case.

Regardless of the above-mentioned pros and cons, buyers will for sure never go wrong in purchasing the Powerbeats Pro due to its excellent features, disregarding the minimal drawbacks of it. I won’t have any ounce of worries that the Powerbeats Pro will flop, for sure, it’ll be endorsed by famous athletes like Lebron James or Stephen Curry, soon.

The Powerbeats Pro will cost $249.95 once released in May. Nonetheless, Beats’ latest offering is considered as the best fitness earphones out there. We’re fascinated. So, grab yours and be inspired to get fit with the newest Powerbeats Pro from Beats!

Hi, I'm Tiffany, a mom, and a news contributor. I enjoy writing stories about the current status quo of today's society. From science, technology, and even fictional characters; I take great passion with everything I do.

Technology

Hackers Can Manipulate Media Files Sent Through WhatsApp And Telegram With A Zero-Day

The vulnerability is dubbed as “Media File Jacking.”

Published

on

Photo: Microsiervos | Flickr | CC BY 2.0

Popular instant messaging apps WhatsApp and Telegram contain an unpatched zero-day vulnerability that can be exploited by threat actors and hackers to manipulate files shared across the messaging platform.

Security researchers from Symantec Modern OS Security team found out that there is an existing vulnerability that can allow hackers and cybercriminals to manipulate images, audio files, documents, and other forms of data sent from one user to another.

Both WhatsApp and Telegram, along with other instant messaging platforms, have end-to-end encryption — which makes the message safe to send and receive. End-to-end encryptions only allow the sender and the receiver to read the contents of the images, and even the company has no human-readable copies of the messages sent.

However, according to the researchers, the vulnerability, dubbed as “Media File Jacking” can bypass the end-to-end encryption in the said apps and works on Android by default for WhatsApp and on Telegram if certain features are enabled.

“It stems from the lapse in time between when media files received through the apps are written to the disk, and when they are loaded in the apps’ chat user interface (UI) for users to consume. This critical time lapse presents an opportunity for malicious actors to intervene and manipulate media files without the user’s knowledge,” wrote Yair Amit, VP & CTO, Modern OS Security in a blog post together with Alon Gat, a software engineer.

“If the security flaw is exploited, a malicious attacker could misuse and manipulate sensitive information such as personal photos and videos, corporate documents, invoices, and voice memos. Attackers could take advantage of the relations of trust between a sender and a receiver when using these IM apps for personal gain or wreak havoc.”

End-to-end encryption does not make an app immune to threat actors

The researchers said that users of instant messaging platforms are particularly vulnerable in this instance because of the assumptions that because these apps have end-to-end encryption, they are automatically immune from hacking. But that is definitely not the case, as illustrated by Symantec’s discovery.

“As we’ve mentioned in the past, no code is immune to security vulnerabilities. While end-to-end encryption is an effective mechanism to ensure the integrity of communications, it isn’t enough if app-level vulnerabilities exist in the code,” they added.

How the exploit works. Photo: Symantec

The problem comes from how these apps store media files as end-to-end encryptions don’t work if the files were saved externally. When files are stored on external storage, other apps can access and manipulate them. On WhatsApp, data are stored externally by default, while on Telegram, the vulnerability is present if “Save to Gallery” is enabled.

Additionally, the Media File Jacking vulnerability, as the researchers said, points to a more significant issue of app developers’ non-secure use of storage resources.

Impact of the exploits

Researchers from Symantec raised the alarms as malicious actors can use the discovered vulnerability in different ways. Hackers can fundamentally alter images in a near real-time manner as sent by one user to another just by exploiting the zero-day. In a demo video released by Symantec, the researchers were able to change the faces of two men in an image to that of Nicolas Cage as the picture was being sent from one test account to another.

Furthermore, threat actors can also exploit the vulnerability by altering numbers in invoices in a bid to rewire payments to a different bank account number. To make matters worse, researchers said that the invoice-jacking modus can also be carried out without a specific target and could be broadly distributed, looking for any invoices to manipulate, affecting multiple victims who use IM apps like WhatsApp to conduct business.

“As in the previous scenario, an app that appears to be legitimate but is, in fact, malicious, watches for PDF invoice files received via WhatsApp, then programmatically swaps the displayed bank account information in the invoice with that of the bad actor. The customer receives the invoice, which they were expecting to begin with, but has no knowledge that it’s been altered. By the time the trick is exposed, the money may be long gone,” the report said.

The exploitation of the vulnerability may also come in the form of audio-spoofing where an attacker exploits the relations of trust between employees in an organization a the attacker can also program the new and manipulated file to mimic the voice of another person.

At the end of the day, Symantec is encouraging IM users to by disabling the feature that saves media files to external storage in order the mitigate the possible attacks using the exposed vulnerability.

Continue Reading

Technology

Huawei Exec Backtracks: Hongmeng OS Is Not For Smartphones

Liang Hua said they prefer Android as the OS of their smartphones.

Published

on

Photo: Kārlis Dambrāns | Flickr | CC BY 2.0

When Chinese smartphone giant, Huawei, was caught off-guard by Google’s revocation of its Android license following the ban imposed by Washington against the company, the smartphone maker made people believe that they are ready for such situation, and announced that they are developing an alternative operating system called Hongmeng.

However, in an interview, Liang Hua, an executive from the tech superpower, backtracks and says that Hongmeng was developed not as an alternative for Android but for the development of their IoT products instead.

Liang Hua said at a Friday press conference in Shenzhen that the operating system, which was rumored to be 60% faster than android, was not developed for smartphones and that the company still prefers Android as their “first choice” for a smartphone OS.

“The Hongmeng OS is primarily developed for IoT devices that will reduce latency… In terms of smartphones, we are still using the Android operating system and ecosystem as a “first choice.” We haven’t decided yet if the Hongmeng OS can be developed as a smartphone operating system in the future,” said Liang Hua.

Earlier reports revealed that Huawei has been developing Hongmeng since 2012. The company has been testing the new OS on selected devices under a closed door and closed environment. The source also said that the testing was accelerated for the new operating system to be ready for situations such as the latter.

Nonetheless, it is still unclear whether Hongmeng will be the official name of the OS coming from Huawei. Experts note that even if Huawei can successfully launch its operating system, the company will still be faced with the challenge of establishing an app ecosystem. It would take Huawei a lot of time to build apps that are compatible with the new operating system.

When Huawei was subjected to a witch hunt by the US government for allegedly aiding the Chinese government in its efforts to spy on the country, and as a pivotal player to potentially economically sabotage the country, an executive order was launched against the China-based tech giant that effectively forced U.S. tech companies to sever ties with Huawei.

The ban from Google has brought Huawei’s future into limbo; making it uncertain for users, especially concerning security updates for their Huawei and Honor phones —or the general idea whether their devices will still be able to run altogether. Following the announcement, Huawei assured its users that all phones that were sold ahead of the banning and those that are already in stock would continue receiving updates from Android.

Now, Huawei’s backtrack follows the bilateral meeting between Trump and China’s Xi Jinping in the recently concluded G-20 Meeting held in Tokyo; the American president announced that American companies could already resume in selling their products to Chinese companies.

The two presidents, in a closely watched sit-down with each other, have agreed for a truce and cease-fire over the long-disputed trade wars between the two superpowers.

“U.S. companies can sell their equipment to Huawei. We’re talking about equipment where there’s no great national security problem with it. I said that’s O.K., that we will keep selling that product, these are American companies that make these products,” Donald Trump said after his meeting with the Chinese president. “That’s very complex, by the way. I’ve agreed to allow them to continue to sell that product so that American companies will continue.”

While the relief is what Huawei has been looking forward to from the G-20 meeting today, it seems like it could be a temporary relief as negotiations regarding the matter is bound to continue, and the ad hoc decision of Trump may still be overturned at some point of the negotiations. Nonetheless, it’s time for the Chinese smartphone superpower to breathe better.

Washington officials are reportedly holding meetings on how they will implement the new orders from Trump. However, special attention has to be given on how to deal with Huawei and its presence on the “entity list,” as the relief does not explicitly remove Huawei from the said list.

Continue Reading

Technology

This App Uses AI To Track Dogs By Their Unique Nose Prints

Authorities can also use it to monitor “uncivilized dog keeping.”

Published

on

Photo: Soumyaroop Chatterjee | Flickr | CC BY-ND 2.0

There’s no denying: facial recognition and biometrics identification is everywhere. They are in airports to help passengers board faster, in smartphones to allow users to unlock their devices automatically, in conservation reservoirs to track endangered animals, and in law enforcement agencies to help catch criminals.

And the development of artificial intelligence (AI) that allows facial recognition technology to evolve is moving faster every day. This time, a China-based start-up has developed an AI that has the capability of identifying and recognizing dogs through their nose prints.

Similar to how human fingerprints are unique to every human, dog nose prints are also unique to every dog. That is why, Megvii, a Chinese start-up, who is also an independent surveillance system contractor for the Chinese government, have developed and trained an AI to recognize dogs using their nose prints.

Photo: Megvii

The identification system is available through the Megvii app, and users need to scan their dog’s noses from multiple angles — same as how users register their fingerprint credentials to use the biometric unlock system of a smartphone.

The company says, that unlike previous identification methods like chip implants to pets the Megvii nose print identification app is much cheaper and is less invasive.

Apps that could identify and recognize animals like dogs aren’t new in the market at all. An app called Finding Rover uses facial recognition and machine learning to match photos of dogs submitted by owners of lost pets to a massive database of shelters and dog homes to recognize and find lost dogs.

Moreover, using nose prints to identify and recognize dogs and other pets aren’t new as well. Kennel clubs around the world are known to use nose prints to match lost dogs with shelter dogs. One primitive way to take a nose print is by coating the nose with ink and pressing it against white cardboard.

What’s new with Megvii’s market offering is the method by which dog prints are collected. In the new app, coating dog’s nose isn’t necessary anymore, as the AI only need photos of dog noses to locate key identifying markers — creating a unique profile of a dog in the database.

The company claims that amidst the differences in camera resolution, their identification system can verify a dog’s identity against an existing record with 95% accuracy. It also says that the system could identify a dog with “high precision” by checking it against records from a larger database, although the company didn’t elaborate on the accuracy rate in that scenario.

Aside from identifying lost dogs, Megvii says that their apps can also be used to track inappropriate pet-owner behaviors, and authorities can monitor “uncivilized dog keeping.” In China, actions, like walking a dog in public without a leash and not scooping after a dog has pooped, are considered uncivilized, and in some instances in several cities, are considered illegal.

Biometrics identification tech application on animals

The advent of facial recognition and biometric identification technology has not only helped pet owners in keeping track of their beloved pets. The technology has also been known to be used by conservators in China to track the movement of endangered animals like the endemic panda population.

A group of researchers from the China Conservation and Research Centre for Giant Pandas have developed an app that could recognize individual pandas using facial recognition technology. The app will draw from more than 120,000 images and video clips of giant pandas to identify the animals that are living in the wild.

Camera traps in China have captured images and video footage of giant pandas that are often difficult to see in the wild. The photographs and video are some of the most amazing photos ever of pandas and other species in their remote habitat, which were caught on film as part of long-term wildlife monitoring projects set up in panda nature reserves by the Chinese government and WWF.

The development of the new facial recognition app will presumably help conservationist monitor their programs by keeping track of how many pandas are left. It will also provide significant insight regarding the breeding program that conservationist has been implementing to encourage an increase in the panda population.

Continue Reading

Trending