Connect with us

Technology

Marshall Adds Two New Speakers On Portable Bluetooth Lineup

Published

on

Marshall Speakers

As much as we enjoy any form of entertainment, music has become a go-to especially when it comes to being on the road. It also means a sturdy portable speaker would be a great company to this long travel for those who would love to sing their hearts out while driving or to chill while steering the wheel. Thanks to Marshall Headphones, a licensee of the world-renowned guitar amplifiers since 1962 have created their line of headphones and speakers licensed to Zound Industries.

This year, Marshall expands its lineup of Bluetooth speakers with an additional two new models: the Stockwell II and the Tufton. Stockwell II is a smaller yet updated version of the original Stockwell. The Tufton, on the other hand, is bigger as compared to Stockwell II and the formerly launched Kilburn II. These two complete Marshall’s line of portable speakers of varying sizes.

Marshall Stockwell II Photo: marshallheadphones.com

Size is the obvious answer when asked about the difference between Stockwell II and Tufton. Despite their varied size, these two portable speakers have almost similar qualities.

Looking at the two models, Stockwell II resembles a miniature guitar amplifier that is the size of a vintage transistor radio. The Tufton, however, is the largest portrait oriented portable speaker in the market at least in Euro.

These two models have the same flush mounted corners that protect the speaker and makes it a lot sturdier. This feature helps the speakers to stand the travel it will take because of its portability.

Stockwell II and Tufton also have three knobs for Volume, Bass, and Treble. At the rear of the speaker is a 3.5mm stereo aux socket where you can plug in different analog sources like tape and CD. With the USB-C charging port feature of the Stockwell II, it can serve as a chunky power bank for your smartphones. Tufton also has these main sockets to charge the speaker.

Marshall New Speakers Knobs. Photo: marshallheadphones.com

Furthermore, both of these speakers have a carrying handle with a red fabric lining for more comfortable travel. This makes carrying, especially the Tufton, a lot easier with a weight of 4.9kg (10.8lb). They also offer the latest version of Bluetooth that is the v5.0 which provides strong signals and better transmission in varying distances.

However, this will only work if your device also features the Bluetooth v5.0. Also, the new speakers have the red LED ladder that illuminates in 10 levels showing how much battery your speakers have left.

Stockwell II and Tufton can last up to 20 hours of nonstop playing time when it is fully charged. But if you’re someone who’s always in a hurry, especially when charging your devices, you still can enjoy hours of music with only 20 minutes of charging time. For Stockwell II, 20 minutes will give you a playing time of 6 hours and 4 hours for Tufton.

Unlike other Bluetooth speakers, Stockwell II and Tufton have a multi-host functionality. This means that these two can connect to more than one device. A great way to host parties where everyone can enjoy each others’ playlist. These speakers also emit a noise that confirms when devices have successfully connected.

Now speaking of hosting parties, Stockwell II and Tufton can pump the beats by the poolside. With IPX 4 and IPX2 ratings for Stockwell II and Tufton respectively, these new speakers can take a splash for some people who would love to jump on the pool. Just be warned that the water-resistant for these speakers does not mean you can throw them into the water

Thanks to the Blumlein Stereo Sound built around Tufton and Stockwell II, they deliver a multi-directional experience which projects an all-around sound from its stereos. Stockwell II stereo speakers rates at an overall 5W to 10W. But for Tufton, its stereos have a combined output of up to 80W. Blumlein Stereo Sound is a pattern of speaker and microphone that helps with the multi-directional sound experience.

The goal for every company is to have a range of quality products of every possible need of the market. And for Stockwell II and Tufton, sound quality and portability in varying sizes are what they offer. That is why starting this month Stockwell II, and Tufton are now available on the market. Stockwell II retails at $249, and Tufton is at $399.

Living a double life: marketing executive by day, writer at the dead of the night.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cybersecurity

Indictment Against Hackers Involved In Anthem Data Breach Unsealed

Two men are indicted for allegedly part of a group of hackers from China linked in the Anthem Insurance data breach in 2015. Click To Tweet

Published

on

Twor men are indicted for allegedly part of a group of hackers from China linked in the Anthem Insurance data breach in 2015.
The indicted individuals are allegedly part of a group of hackers from China linked in the Anthem Insurance data breach in 2015. Photo: Tim Reckmann | a59.de | Flickr | CC BY 2.0

Two men were indicted in the U.S. in connection with the data breach at the health insurance company, Anthem, that siphoned more than 78.8 million customer and employee records between 2014 and 2015.

The Justice Department recently unsealed an indictment against two people who prosecutors say are part of a sophisticated hacking network group, based in China that was behind not only in Anthem data breach, but also the attacks against three other US businesses.

While the Justice Department did not name the said Chinese hacking group victimized the three other businesses who they said, they said that these companies were “data-rich.” One was a technology business, one was in necessary materials, and the third was in communications. They said that all of these three companies store a substantial amount – and some confidential – of data on their servers and data networks.

The suspects are 32-year-old Wang Fujie with the Western name of “Dennis” and another one that until now remained unnamed. The Justice Department could not find the real name of the unnamed man but said that he goes by various online nicknames such as “Daniel Jack,” “Kim Young” and “Zhou Zhihong.”

The charges are one count of conspiracy to commit fraud and related activity in relation to computers and identity theft, one count of conspiracy to commit wire fraud, and two counts of intentional damage to a protected computer.

According to the indictment documents, the hacker group where Dennis and the unnamed man belongs have carried out attacks using “sophisticated techniques” including spearphishing and malware from February 2014 and up until around January 2015.

They allegedly sent tailored spearphishing emails with links to malware and sent them to employees at the target companies. Once the targeted employee opened the email, the system would get affected by the malware that would later plant a backdoor Trojan that gives the hackers remote access via their command and control servers.

Wang is also accused of having set up the servers, hosted in California and Arizona that were used in the Anthem attacks.

The cyber attack suffered by the insurance company has had them cough up large amounts of money as settlement, making it the most significant data breach settlement ever. In 2017, the company agreed to pay $115 million to settle a class action suit over the breach.

The Anthem attack is also the most massive health insurance data breach, and the amount of data lost to the hackers dwarfed the biggest data breaches in the following years with 11 million breached at Premera and 10 million from Excellus.

The DOJ through a press release and Assistant Attorney General Brian Benczkowski called the hacking event as “unprecedented.”

“The allegations in the indictment unsealed today to outline the activities of a brazen China-based computer hacking group that committed one of the worst data breaches in history. These defendants allegedly attacked U.S. businesses operating in four distinct industry sectors and violated the privacy of over 78 million people by stealing their PII. The Department of Justice and our law enforcement partners are committed to protecting PII, and will aggressively prosecute perpetrators of hacking schemes like this, wherever they occur.”

Meanwhile, another set of indictments were released by the Justice Department against European hackers over the hacking of different private and public institutions in the United States. Ten individuals were charged with conspiracy to commit computer fraud, conspiracy to commit wire and bank fraud and conspiracy to commit money laundering.

The ten people who were charged were allegedly involved in the malicious software attacks that infected tens of thousands of computers and caused more than $100 million in financial losses, the US and European authorities announced Thursday.

According to the officials who filed the charges, the malware, which enabled cybercriminals and hackers from Eastern Europe infiltrate computer systems remotely and siphon funds from victim’s bank accounts, targeted companies and institutions across all sectors of American life.

The victims of the malware attacks included a Washington law firm, a church in Texas, a furniture business in California and a casino in Mississippi.

The investigation started following the dismantling of a network of computer servers, known as Avalanche, which hosted more than two dozen different types of malware. The Justice Department had successfully taken their operation apart in 2016.

Continue Reading

Cybersecurity

Winnti For Linux: Researchers Found Linux Variant Of Malware Used By Chinese Hackers In 2015

A Linux version of Winnti malware was discovered by tech researchers from Chronicle. The malware was used in 2015 by Chinese hackers. Click To Tweet

Published

on

A Linux version of Winnti malware was discovered by tech researchers from Chronicle. The malware was used in 2015 by Chinese hackers.
The discovered Linux malware bears significant similarities with its Windows counterpart. Photo: Christiaan Colen | Flickr | CC BY-SA 2.0

Linux systems are cybersecurity kings, but on a historic first, tech researchers have found a variant of a widespread malware, a favorite of Chinese hackers, have been discovered in a Linux system.

The discovery was made by researchers from the Chronicle, Alphabet’s cybersecurity department. The researchers revealed that they found a Linux variant of the Winnti malware that works as a backdoor on infected hosts, granting attackers access to compromised systems. It was the malware used by Chinese hackers in the high-profile cybercrime against a Vietnamese game company in 2015.

Chronicle researchers said that they discovered the malware following the news that Bayer, one of the biggest pharma company in the world, had been hit by Chinese hackers, and the Winnti malware was discovered on its servers.

After the team scanned Bayer’s system using its VirusTotal platform, they found what appeared to be a Linux variant of the Winnti, dating back to 2015 when it was first used by Chinese hackers to attack a Vietnamese gaming company.

According to the Chronicle, the malware that they have discovered comes in two parts: a rootkit to disguise the malware in the infected host and the actual backdoor Trojan. Further analysis the discovered Linux variant of the Winnti malware bears a lot of similarities to the malware’s Windows version. Other connections with the Windows version also included the similar way in which the Linux variant handled outbound communications with its command-and-control (C&C) server — which was a mixture of multiple protocols (ICMP, HTTP, and custom TCP and UDP protocols).

“As with other versions of Winnti, the core component of the malware doesn’t natively provide the operators with distinct functionality. This component is primarily designed to handle communications and the deployment of modules directly from the command-and-control servers. During our analysis, we were unable to recover any active plugins. However, prior reporting suggests that the operators commonly deploy plugins for remote command execution, file exfiltration, and socks5 proxying on the infected host. We expect similar functionality to be leveraged via additional modules for Linux,” said the researchers in their comprehensive report.

Lastly, the Linux version, just like the Window’s version, also has the ability for Chinese hackers to initiate communication with the infected host without going through the C&C servers – distinct characteristics in Windows Winnti.

“This secondary communication channel may be used by operators when access to the hard-coded control servers is disrupted,” Chronicle researchers said in a report published last week.

While infecting Linux systems is something already done especially by American and Russian hackers, it is also extremely rare, as pointed out by the Chronicle.

“Clusters of Winnti-related activity have become a complex topic in threat intelligence circles, with activity vaguely attributed to different codenamed threat actors. The threat actors utilizing this toolset have repeatedly demonstrated their expertise in compromising Windows-based environments. An expansion into Linux tooling indicates iteration outside of their traditional comfort zone. This may indicate the OS requirements of their intended targets, but it may also be an attempt to take advantage of a security telemetry blindspot in many enterprises, as is with Penquin Turla and APT28’s Linux XAgent variant,” added Chronicle.

Meanwhile, malware have become one of the most common tools to attack computer systems, even those of public institutions. A few days ago, ten Europeans were indicted for the malware attacks that have victimized several businesses and government agencies in the U.S.

The ten people who were charged were allegedly involved in the malicious software attacks that infected tens of thousands of computers and caused more than $100 million in financial losses, the US and European authorities announced Thursday last week.

The victims of the malware attacks included a Washington law firm, a church in Texas, a furniture business in California and a casino in Mississippi.

The charged individuals are now facing conspiracy to commit computer fraud, conspiracy to commit wire and bank fraud and conspiracy to commit money laundering.

The investigation started following the dismantling of a network of computer servers, known as Avalanche, which hosted more than two dozen different types of malware. The Justice Department had successfully taken their operation apart in 2016.

Officials reveal that the malware in the current court case has infected more than 41,000 computers by disguising as legitimate messages or invoice and was sent as spam emails. Once the email was opened, hackers will be able to record all keystrokes in the infected computer, sweeping data like baking information and wire money away from the victim’s account.

Continue Reading

Animals

Facial Recognition To Be Used In Panda Conservation

A group of researchers in China have develop an app to track pandas using facial recognition technology. Click To Tweet

Published

on

A group of researchers in China have develop an app to track pandas using facial recognition technology.
There are currently 67 panda nature reserves in China, an increase of 27 since the last report. Photo: WWF Website

While facial recognition technology is widely frowned upon when used against humans, it could be an ally for conservators of giant pandas in China.

A group of researchers from the China Conservation and Research Centre for Giant Pandas have developed an app that could recognize individual pandas using facial recognition technology. The app will draw from more than 120,000 images and video clips of giant pandas to identify the animals that are living in the wild.

According to a census conducted last 2004 by the Chinese government, there are approximately 1,864 pandas live in the wild. That’s a 16.8% increase since the last survey released in 2003. The country has taken a proactive role in conservation efforts, announcing last year that it would build a 10,476-square-mile panda reserve called the Giant Panda National Park at the cost of at least 10 billion yuan ($1.45 billion).

“The latest rise in the estimate is particularly encouraging, as the 2004 increase was in large part down to researchers using better techniques and surveying a wider area. The new figures show that the hard work of the Chinese government, local communities, nature reserve staff, and WWF is paying off,” wrote WWF.

Camera traps in China have captured images and video footage of giant pandas that are often difficult to see in the wild. The photographs and video are some of the most amazing photos ever of pandas and other species in their remote habitat, which were caught on film as part of long-term wildlife monitoring projects set up in panda nature reserves by the Chinese government and WWF.

Camera trap footage of a Giant Panda scenting a tree is marking his territory to attract female pandas. © Anzihe Nature Reserve

“These photos offer a fascinating glimpse into the lives of giant pandas, as well as other animals, which are difficult to see in the wild,” says Dr. Sybille Klenzendorf, managing director of WWF’s species program. “They demonstrate that by saving the iconic giant panda, we secure a vibrant future for other incredible wildlife, wild places, and people – it’s the best kind of win-win proposition.”

The development of the new facial recognition app will presumably help conservationist monitor their programs by keeping track of how many pandas are left. It will also provide significant insight regarding the breeding program that conservationist has been implementing to encourage an increase in the panda population.

“he app and database will help us gather more precise and well-rounded data on the population, distribution, ages, gender ratio, birth and deaths of wild pandas, who live in deep mountains and are hard to track,” Chen Peng, a researcher at the China Conservation and Research Center for Giant Pandas, said.

This is not the first time that facial recognition technology has been used against animals. According to several reports, facial technology has been used in Italy as part of an app that can match photos of lost pets from those that are in shelters and to determine a cat apart from other feline species.

Nonetheless, the use of facial technology in China is a complicated issue. Many nations have been vocal in their accusations that the Chinese government and Xi Jinping is using the technology against people’s consent for the government to spy on its citizens.

Meanwhile, facial recognition technology is also something frowned upon in Western governments. Last week, San Francisco, one of the technology capitals of the world, has voted to ban the police and city agencies from using facial recognition technologies against their people. The groundbreaking vote aims to become a model in other city and states as San Francisco recognizes the harms that an unregulated technology can have over people’s privacy.

The science and tech community has not failed to become wary over facial recognition technology and has urged companies to stop selling their versions of the technology to law enforcement agencies. Recently, a study from the Georgetown Law School has revealed that police have been feeding images of celebrities and composite and computer-generated suspect sketches to the facial recognition system to generate possible matches.

While using the technology on animals does not necessarily have direct harms, many experts have argued that governments can use the camera set up for animal facial recognition systems against humans and could be exploited. Nevertheless, the possible use of facial recognition by conservators might be the hope of the giant panda population.

Continue Reading

Today’s Latest

Our Voices

Silicon Valley Silicon Valley
Our Voice2 days ago

How Tech Companies Affect Communities In Places They Call ‘Home’

Tech companies are today’s driving forces in the economic world, mostly because of the introduction of the Internet. It allows...

We reviewed RingCentral's VoIP offers We reviewed RingCentral's VoIP offers
Our Voice6 days ago

RingCentral VoIP Review

VoIP has had a significant shift from a technology exclusively used by the early adopters or hobbyist to a widely...

April Fools April Fools
Our Voice2 months ago

April Fools Jokes Aren’t Just “Jokes”

April Fools is undoubtedly a fun day, exceptionally if you have crafted the most elaborate prank on your friends and...

Facebook Facebook
Facebook2 months ago

Facebook Should Do Better At Processing Community Standard Violations, And They Should Do It Fast

A few months ago, I saw a photo of myself used by another Facebook account with a “R.I.P. (Rest in...

With reports of artists committing harassments, should you separate the art from the artist? With reports of artists committing harassments, should you separate the art from the artist?
Our Voice2 months ago

Supporting Problematic Artists And Their Arts, An Opinion

As the world becomes swarmed by reports of famous artists – musicians, comedians, actors, painters – being alleged or in...

How to regulate facial recognition without possible risks How to regulate facial recognition without possible risks
Our Voice2 months ago

Ethical Regulation Of ‘Facial Recognition’ Is A Shared Responsibility

There is an ongoing discussion both in online and offline spaces regarding the growth of facial recognition technology and its...

Solving Data Breachs, must focus on SMBs Solving Data Breachs, must focus on SMBs
Cybersecurity2 months ago

Data Breach Epidemic: Solving The Problem In SMBs Will Solve The Problem For All

In the last two weeks, we’ve witnessed a vast amount of data breaches and information leaks, and the issue has...

Here's why we agree to Jacinda Ardern, New Zealand Prime Minister words of not naming mass shooter suspects Here's why we agree to Jacinda Ardern, New Zealand Prime Minister words of not naming mass shooter suspects
Our Voice2 months ago

We Agree To PM Ardern Of Keeping Christchurch Murderer Nameless, And The Media Should Listen

In the wake of Christchurch mosques shooting in New Zealand that killed 50 people at two mosques, the shooter is...

Apple Anti-Snooping Paten Apple Anti-Snooping Paten
Apple2 months ago

Apple vs. Police Authorities; A Cold War Against iPhone’s Anti-Snooping Patent

To protect its customers from hackers and illegal surveillance, Apple is developing an anti-snooping technology that would impede police and...

Fighting misinformation over measles outbreak Fighting misinformation over measles outbreak
Our Voice2 months ago

An Epidemic: Measles Or Misinformation?

2018 was the year when people started asking the question: ‘should I get my child vaccinated?’ Most people answered yes,...

Join us as we delve into the future of the VoIP industry Join us as we delve into the future of the VoIP industry
Our Voice3 months ago

Take A Look At The Predicted Future Of The VoIP Industry

For the past 20 years, VoIP has become an integral part of the lives of millions of people around the...

Contact Center Solutions Contact Center Solutions
Business3 months ago

Choose The Right Call Center And The Best Contact Center Solutions of 2019

The Ins And Outs Of Business Communication Management For your business to exist in today’s world, you must know how...

Instagram poses as a threat to some of the world's most famous location Instagram poses as a threat to some of the world's most famous location
Our Voice3 months ago

How Instagram Corrupts Famous Locations In The World

Is Instagram corrupting the beauty of breathtakingly beautiful locations and sucking all the joy out of traveling? With the era...

How one can earn crypto How one can earn crypto
Our Voice4 months ago

Ways To Earn Cryptocurrency

Cryptocurrency is one of the growing medium for exchange in most countries as it offers a more convenient and safer...

Ending Payday Loans Ending Payday Loans
Our Voice4 months ago

Can We End Payday Loans?

We can’t neglect the fact that debt is one of the pressing problems in the country, especially in today’s economy....

How will 5G change our lives -- Our Voice How will 5G change our lives -- Our Voice
Our Voice4 months ago

Jumping From 4G To 5G: Here’s What 5G Can Do For You

One of the most awaited advancements in technology is the cellular industry. With its monthly updates on software, model and...

VoIP vs Traditional Telephones: Cost Factors to consider VoIP vs Traditional Telephones: Cost Factors to consider
Our Voice4 months ago

What are the cost factors of VoIP?

In the next few years, we might be saying goodbye to traditional telephone systems in exchange for Voice over Internet...

Manufacturing Firms Investment on Technology Manufacturing Firms Investment on Technology
Our Voice5 months ago

Manufacturing Firms are Investing More on Technology

Based on the recent research on how manufacturing companies are coming up in the market industry, they have been increasing...

How to properly take Technology Innovation in companies How to properly take Technology Innovation in companies
Our Voice5 months ago

Technology innovation in companies—for the better or the worse?

Technology has significantly impacted both homes and workplaces in the last years. As much as we want to keep our...

Trending