Inside the ongoing fight to stamp out govt-grade Android spyware

Sad Android

Black Hat A study into government-grade Android spyware led researchers to a new strain of surveillance malware lurking in the Google Play app store – a strain that has now been unceremoniously booted out of the software marketplace.

Last month it was revealed that the Mexican government was infecting smartphones with malware to spy on lawyers, journalists, and activists. Researchers at Google and mobile security shop Lookout did some further digging into this covert surveillance tool, and discovered this kind of state-level software nasty is slightly more common than some might think.

The Mexican government used some iOS malware called Pegasus, which was built by Israeli hackers-for-hire NSO Group. That organization also offers an Android equivalent dubbed Chrysaor. This Android variant was considerably less sophisticated than its Apple cousin, as it exploited really old vulnerabilities in Google’s OS whereas Pegasus exploited zero-day flaws in iOS to compromise phones. In fact, it appeared Chrysaor was tailored to compromise Android 4.3 and earlier.

“This was a known set of vulnerabilities,” Andrew Blaich, a security researcher at Lookout, told The Register this week at the Black Hat conference in Las Vegas. “We’re guessing that the malware was designed to target older versions of Android that are no longer being patched and which are more common in developing countries.”

Samples of Chrysaor, which were disguised as legit-looking apps, were found by Lookout and forwarded to Google, which used its Verify Apps tool in Android to kill any instances of the spyware.

We’re told fewer than three dozen copies were found in the wild, and the booby-trapped applications were never in the official app store, so the malware’s distribution was obviously highly targeted to specific people. It’s typically sent in phishing attacks, for which NSO charges thousands of dollars to execute.

Google and Lookout took a closer look at the malware’s operation, and examined its techniques for gaining powerful access privileges and escaping its sandbox, and monitored its network traffic. They then used that knowhow to search for similar evil applications out in the wild, and uncovered tools released by Equus Technologies.

Lipizzan

Equus, which like NSO also claims to sell only to governments for legit purposes, has developed smartphone monitoring software Google has dubbed Lipizzan. Once on a device, it can siphon off a victim’s email and SMS messages, their whereabouts, their voice calls, and their photos and videos to remote systems.

We’re told this surveillance tool was hidden in about 20 apps in the Google Play store, and installed on fewer than 100 Android devices, suggesting specific selected targets were tricked into downloading it.

Lipizzan was a two-stage piece of malware that was designed to fool the code-checking mechanisms Google uses to prevent software nasties appearing in the Play Store. The first stage, available from the marketplace, would appear to be a simple app, such as a backup tool or a cache cleaner. When run, the code would download and execute a “license verification” stage.

This second stage would scan the infected phone for vulnerabilities and exploit use them, if possible, to gain root-level access. With that power, it could record calls, subvert apps like Whatsapp, Gmail and Snapchat, and so on.

Google kicked the Lipizzan apps out of its store, warned folks hit by the malware, and stopped the code from running on devices. However, its creators wouldn’t give up. New but similar apps were uploaded, and the web giant was able to detect them due of code reuse by the authors.

“There were fewer than 100 devices that checked into Google Play Protect with the apps listed below,” the team said on Wednesday. “That means the family affected only 0.000007 per cent of Android devices. Since we identified Lipizzan, Google Play Protect removed Lipizzan from affected devices and actively blocks installs on new devices.”

This isn’t the first time malware mercenaries have used these techniques to smuggle malicious apps into the Play store, and it probably won’t be the last. However, for now, Google and its friends have the upper hand on cyber-mercenaries who peddle government spyware.

Source:-.theregister.

Lipizzan Spyware Detected by Google Had the Potential to Control Your Android Device

Lipizzan Spyware Detected by Google Had the Potential to Control Your Android Device

Back in April, researchers at Google discovered an Android malware, called Chrysaor, that could give an attacker remote control of the infected device. Android Security was able to find and block potentially harmful apps (PHAs) with that family of spyware, but in the process of doing so discovered a new spyware family called Lipizzan.

Researchers believe that the new spyware is unrelated to Chrysaor, and has the ability to monitor and exfiltrate a user’s email, SMS messages, location, voice calls, and media. The code behind the spyware has been traced to a cyber arms company, Equus Technologies.

On the Android Developers blog, researchers say that the newly discovered spyware works in two stages. It is firstly distributed through several channels, including Google Play, and hides behind a harmless app like “Backup” or “Cleaner”. After installing such an app, Lipizzan would load a second “licence verification” stage, which check out the infected device and validates certain abort criteria. Once the all-clear is given, the spyware proceeds to root the device with known exploits to take control of the device and exfiltrate data to a Command & Control server.

Once Lipizzan gains full control of the infected device, it has the ability to record call, track the user’s location, take screenshots and photos with the device’s camera, fetch information and files stored in the device and other user information such as contact, call logs and more. Researchers say that the PHA had specific routines to retrieve data from apps like Gmail, LinkedIn, Skype, Snapchat, and WhatsApp.

The most notable thing about the new spyware is how easily the authors can change the branding of the implanted apps. Soon after Google detected and blocked the first set of apps on Google Play, new apps began cropping up with the same spyware. These apps changed from ‘backup’ apps to apps like “cleaner”, “notepad”, “sound recorder”, to name a few. Google says that it has so far detected the spyware in fewer than 100 devices that checked into Google Play Protect. Now that Lipizzan is detected, Google Play Protect has managed to remove the family from affected devices and will block installs on new devices.

Google says that Android users can protect themselves by making sure they opt into Google Play Protect, and making sure apps are downloaded exclusively from Google Play. The company also urges users to keep their phones patched to the latest Android security update.

There have been a bunch of Android malware-related reports such as SpyDealer, LeakerLocker, and CopyCat in recent months that have raised an alarming concern over the safety of the platform and the potential risks of storing personal information over the digital space.

Source:-gadget360

‘Insidious and sick’ Fruitfly malware has been spying on Mac users via their computer’s camera for YEARS

A type of malware that has infected hundreds of Macs remained undetected for years

FruitFly malware uses the Mac’s camera to spy on users and log what is happening on screen.

A security firm called Malwarebytes discovered FruitFly earlier this year, but researchers have since found a new strand of it hiding under a slightly different code.

Scroll down for video

FruitFly uses the computer's camera to spy on users and logs what is happening on screen - and it's been infecting computers for years (stock image)

FruitFly uses the computer’s camera to spy on users and logs what is happening on screen – and it’s been infecting computers for years (stock image)

FRUITFLY

FruitFly uses the computer’s camera to spy on users and captures key strokes and what is happening on screen – and it’s been infecting computers for years.

There are multiple strains of FruitFly which rely on different codes, making it particularly hard to detect.

According to security firm Synack, there are around 400 computers known to be infected with FruitFly and likely to be many more.

Although they are not sure when the bug first came around, researchers have found it works on the Mac Yosemite operating system – which was released back in October 2014.

According to security firm Synack, there are around 400 computers known to be infected with FruitFly and likely to be many more.

Although they are not sure when the bug first came around, researchers have found it works on the Mac Yosemite operating system – which was released back in October 2014.

‘Mac users are over-confident’, Patrick Wardle, chief security researcher at security firm Synack told CNN.

‘We might not be as careful as we should be on the internet or opening up email attachments’, he said.

Mr Wardle anaylsed the strain for months and then managed to decrypt it to set up a server that intercepted signals from computers that had been infected.

‘Immediately, tons of victims that had been infected with this malware started connecting to me,’ he said.

There are multiple strains of FruitFly which rely on different codes, making it particularly hard to detect.

It is now known how it first got on computers but Mr Wardle does not believe it is part of state espionage.

MacSpy (pictured) allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents

MacSpy (pictured) allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents

MACSPY AND MACRANSOM

In June, Mac users were warned to be vigilant after two separate pieces of malware emerged from the dark web – MacSpy and MacRansom.

MacSpy allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents.

MacRansom worked in a similar manner to the WannaCry software that plagued computer systems around the world, including the NHS, last month.

It encrypted the contents of a user’s computer and threatens to delete all of the information it contains, unless a ransom of 0.25 Bitcoins, around £530 ($684), is paid.

‘I believe its goals were a lot more insidious and sick: spying on people,’ Mr Wardle said

Apple has been contacted for comment.

In June, Mac users were warned to be vigilant after two separate pieces of malware emerged from the dark web.

The tools were specifically developed to allow would-be hackers to takeover Apple’s desktop and laptop machines, and even ransom their data.

They were being given away for free by their creators, who are believed to be professional software engineers.

The two systems were called MacSpy and MacRansom.

MacSpy allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents.

MacRansom worked in a similar manner to the WannaCry software that plagued computer systems around the world, including the NHS, last month.

It encrypts the contents of a user’s computer and threatens to delete all of the information it contains, unless a ransom of 0.25 Bitcoins, around £530 ($684), is paid.

[“Source-dailymail”]

Huawei Mate 10 Will Sport Bezel-Less Display, Take on iPhone 8, Says CEO

Huawei Mate 10 Will Sport Bezel-Less Display, Take on iPhone 8, Says CEO

HIGHLIGHTS

  • Huawei CEO confirms bezel-less display for Mate 10
  • Mate 10 to take on Apple’s upcoming iPhone 8
  • Expected to be unveiled in September

We’re fast approaching a new age where bezel-less displays are the new norm. Xiaomi kicked it off with the Mi MIX, while LG and Samsung followed with the G6 and Galaxy S8, respectively, and Apple is expected to do the same with its upcoming tenth anniversary iPhone. Huawei is also looking to shift to ‘full-screen’ displays when it launches the Mate 10 flagship, CEO c confirms.

Bezel-less displays have been trend for smartphones in 2017, and Huawei’s CEO has confirmed rumours that began earlier this month that the successor to the Mate 9 will feature a near bezel-less display as it looks to grow mobile shipments tis year and take on the giant Apple. In an interview with Bloomberg, Richard Yu said that the Mate 10 will be unveiled right around the time Apple reveals its next iPhone, which means we’re looking at a possible September unveiling. In fact, Huawei’s CEO unabashedly revealed that the Mate 10 will have features that will trump Apple.

“We will have an even more powerful product,” Yu says. “The Mate 10, which has much longer battery life with a full-screen display, quicker charging speed, better photographing capability and many other features that will help us compete with Apple.”

The CEO’s remarks comes soon after Huawei reported a slowdown in smartphone shipments the year with an estimated 140 million-150 million smartphones expected to ship by year-end. This is only marginally better than last year’s 139 million figure. Huawei claims the reason behind this is that the company is focusing on chasing profits rather than volumes, and it plans on doing this by shifting focus towards high-end phones.

The Chinese manufacturer also plans on unveiling an “AI processor” this year that looks to make smartphones “intelligent”. Yu, however, did not clarify whether Huawei’s dedicated AI processor will be included with the upcoming Mate 10.

As for everything else that is expected to come with the Mate 10, earlier this month it was reported that the upcoming smartphone will come with facial recognition, support for AR, and could have 3D sensing as well. Additionally, the smartphone is tipped to come with iris scanning and is expected to be powered by Huawei’s HiSilcon Kirin 970 SoC based on the 10nm process.

The Huawei Mate 10 is tipped to come with a 6-inch (1080×2160 pixels) display with an 18:9 aspect ratio, identical to the LG G6 and similar to the Galaxy S8. Cameras on the smartphone are expected to be Lieca-branded, as was the case with the Mate 9. Going by CEO Richard Yu’s statement, the Huawei Mate 10 could be unveiled some time in September.

[“Source-gadgets.ndtv”]

Subway gives itself a makeover — with tech updates

Subway is debuting a new look.
On Monday, the fast-casual restaurant chain unveiled a new store design intended to provide a more distinctive and welcoming customer experience. The new “fresh forward” design, by FRCH Design Worldwide, includes a bright color palette, inspired by the hues of fresh vegetables, wall decor that communicates the brand’s emphasis on quality ingredients, and more contemporary-looking seating. It also features such tech enhancements, such as self-ordering digital kiosks.
“We’ve created a modern design that gives our guests choices – from how they order, to how they pick up their food, to how they enjoy their meal,” said Trevor Haynes, VP of operations at Subway, which operates more than 44,800 franchised locations.
Highlights of the redesign include:
Digital: Self-order kiosks in select locations, digital menu boards and, as always, Apple and Samsung Pay options. A separate food preparation area and a designated pre-order pick-up location for kiosk, mobile app, delivery, catering and bot for Messenger orders allow  for a speedy customer experience.
Dine-In Experience: Bright and playful décor, curated music, and comfortable seating with USB charging ports and complimentary Wi-Fi create a welcoming environment.
Food: Fresh veggie display with whole tomatoes, green peppers, onions and cucumbers that are sliced daily, plus new bread and cookie displays on the front of the line.
Subway debuted its new “fresh forward design” in nine pilot locations in the United States, including four in Florida (Tamarac, Winter Park, and two in Orlando), along with two in Canada and one in the United Kingdom.
Subway’s new design will be featured in all future locations and remodels starting this year, with the majority of remodels to begin in 2018, reported CNBC. About 85 locations in North America are in the process of rolling out the new format, the report stated.
[“Source-chainstoreage”]

Experts: Software theft shows threat of mercenary hackers

Experts: Software theft shows threat of mercenary hackers

This image released by the FBI shows a poster containing a photo of Mohammad Reza Rezakhah, who the agency is seeking to apprehend on charges of conspiring with others to hack into a Vermont defense contractor and to steal sophisticated software, outlined in an indictment unsealed Monday, July 14, 2017. (FBI via AP)

On an October morning in 2012, the system administrator of a tiny Vermont defense contractor arrived at work to find the business’ computers had been hacked and a sophisticated software program stolen. Prosecutors later concluded the thieves were a group of Iranians who sold the software to organizations within the Iranian government.

The hack, revealed in an indictment unsealed last week, shows that mercenary hackers who sell stolen data to friendly governments are a growing threat to defense contractors, experts say.

“They are essentially nonsanctioned espionage groups,” said Brian Wallace, the lead security data scientist for the Irvine, California-based company computer security company Cylance Inc. “The government doesn’t create them, they don’t own them. They operate and get almost of their income from the government.”

The South Burlington company, Arrow Tech Associates, makes software used to monitor projectiles in flight.

Arrow Tech President Charles Hillman said the firm was able to track the hackers’ every keystroke, which helped the FBI trace the intrusion to three Iranians.

“We were very impressed with what they got done in just a few hours,” he added.

Iranian officials in Washington referred an emailed question on the issue from The Associated Press to “the pertinent department.” There was no further reply.

The eight-count indictment released last week alleged that from at least 2007 through May 2013 the three men broke into computers in “Vermont and elsewhere.” It said the group also stole software from an unidentified Western aerospace company in July 2012.

Arrest warrants were issued for two of the men: Mohammed Reza Rezakhah, 39, and Mohammed Saeed Ajily, 35. They were indicted in April 2016, and FBI wanted posters say the two men are believed to be in Iran.
Experts: Software theft shows threat of mercenary hackers

This image released by the FBI shows a poster containing a photo of Mohammad Saeed Ajily, who the agency is seeking to apprehend on charges of conspiring with others to hack into a Vermont defense contractor and to steal sophisticated …more

The third man, Nima Golestaneh, had been indicted in 2013, but the case was sealed until February 2015, when he was brought to the U.S. from Turkey.

Golestaneh pleaded guilty in Vermont in December 2015. The next month, he was pardoned by then-President Barack Obama as part of a prisoner swap with Iran that included the release of Washington Post reporter Jason Rezaian and former U.S. Marine Amir Hekmati.

Such hacks are a growing threat for defense contractors, said Phil Sussman, the president of Norwich University Applied Research Institutes, which works on cyber security issues at the private Vermont military college.

“In the last five or six years anyways, it has been common knowledge that these kinds of services are readily available on the dark web and could be purchased,” Sussman said.

Wallace said such arrangements are not exclusive to Iran.

“We can see a lot of similar activities coming out of Russia where you had independent hacking groups that don’t work directly for the Russian government, but they do have very strong ties to the Russian government,” he said.

Arrow Tech, which employs fewer than 10 people, sells software that measures the performance of projectiles. “Anything that comes out of a gun tube is in our wheelhouse,” Hillman said.

It’s unclear if the stolen ballistics software, used to analyze and design bullets and GPS-guided artillery shells, ever worked for the hackers. Hillman said he doubts the hackers could have even unlocked the software, because it requires a physical key, called a dongle, to operate.

Hillman said Arrow Tech has had to assure some of its 600 licensed customers in more than two dozen countries that their information is safe.

“Their information is not stored on these servers that are accessible from the outside,” Hillman said. “I can’t even access our servers from outside the building.”

[“Source-phys”]

The stupidity of South African workers’ fight against technology

Image result for The stupidity of South African workers’ fight against technologyWhen Pick n Pay unveiled self-service terminals at its Ottery store in Cape Town last year, consumers praised the excellent use of technology to make their lives easier.

Cobus Barnard, Pick n Pay’s group executive for retail office and supply chain, said the self-help checkout points are aimed at making shopping more convenient.

He said the checkout points will help customers who are in a hurry, letting them go through the checkout process themselves.

Not everyone was happy, however. Cosatu and its affiliates were up in arms, saying it was not consulted regarding the self-service terminals.

According to Cosatu, Pick n Pay employees were fearful the self-service tills would impact their jobs.

Cosatu said it would oppose the self-service terminals and even threatened boycotts – as the technology was “anti-worker, and anti the objectives of South Africa”.

The same situation is now playing out in the taxi industry, where metered taxi operators are fighting against Uber in South Africa.

Instead of embracing technological advances in the transport industry, which make consumers’ lives easier, metered taxi workers are attacking Uber drivers and destroying their cars.

While aggression and violence may result in small wins against Uber and self-service terminals, progress is inevitable.

To embrace new technologies which enhance consumer experiences is always better, and more profitable, as many Uber drivers found out.

And if a local industry is concerned that an international player may eat its lunch, there is always the option to develop your own technology.

Be the technological advance

If anyone thinks it is impossible to fight against global giants like Uber, think again.

Ride-sharing company Didi Chuxing crushed Uber in China, and acquired Uber’s China unit in August 2016.

The argument that technological advances will cost jobs is also not informed.

The World Economic Forum said investments in technology create jobs and are an important enabler of innovation and development.

This is in addition to other benefits, such as contributing to GDP growth, creating new and sustainable industries, and business innovation.

Technological progress does not cost jobs, it creates jobs, and is necessary for South Africa to remain competitive in a global market.

The idea that technological advances are “anti-worker, and anti the objectives of South Africa” is misguided and should be dismissed with contempt.

Unfortunately, the ANC government continues to buckle under pressure from workers’ unions and other groups which are holding technological progress – and job creation – back. Let’s hope this changes soon, for the sake of South Africa and its citizens.

[“Source-mybroadband”]

Yogi Adityanath calls for solution to Ayodhya issue through talks

Image result for Yogi Adityanath calls for solution to Ayodhya issue through talksHe said the Ramayana circuit will connect all cultural and traditional centres mentioned in the epic, adding that the circuit would be extended to Rameshwaram.

AYODHYA: Uttar Pradesh chief minister Yogi Adityanath today stressed that a peaceful solution to the Ram Janambhoomi-Babri Masjid issue should be found through bilateral talks.

Both parties must abide by the Supreme Court’s advice regarding negotiations, said Adityanath who was on a visit here. He added that the government would take care of the sentiments of both Hindus as well as Muslims.

In his speech, the chief minister referred to Indonesia and said it was the biggest Muslim country where Ramayana was celebrated.

Indonesians have accepted Islam as a way to worship God, but they are still very much attached to their old tradition of Ramayana, he said.

Adityanath also said that the Union government is thinking seriously to construct a Ram Sethu (Adam Bridge) connecting India to Lanka to give a full and final shape to Ramayana circuit.

He said the Ramayana circuit will connect all cultural and traditional centres mentioned in the epic, adding that the circuit would be extended to Rameshwaram.

The Centre as well as the state government are developing all spots which are traditionally and culturally connected with the Hindu religion, he said.

Development of ghaats along the rivers and cultural activities such as ‘Ram Leela’ and ‘Krishna Leela’ were also priorities, he said.

Adityanath was in Ayodhya to pay tributes to Ram Mandir movement leader Ram Chandra Das Paramhans whose death anniversary falls today. Paramhans, one of the accused in the Babri Masjid demolition case, had died fourteen years ago.

This was Adityanath’s second visit to Ayodhya in less than two months.

After becoming chief minister he had visited Ayodhya on 31 May to take part in the birthday celebration of VHP leader Nritya Gopal Das, president of the Ram Janambhoomi trust.

Yogi, had during his last visit to the temple town also offered prayers at the makeshift Ram temple here.

About a thousand people including sadhus and BJP leaders attended the chief minister’s public meeting in a small place adjacent to Digambar Akahara.

Some persons including some sadhus expressed displeasure saying they were forcefully removed by the police as the chief minister was to arrive.

Faizabad district magistrate S K Rai however said “no one was removed forcefully but we requested some sadhus to go before the arrival of CM for security reasons”.

[“Source-economictimes”]

Doctors view technology as largely problematic

Image result for Doctors view technology as largely problematic

SAN FRANCISCO (Reuters Health) – When an endurance runner with a history of heart failure felt under the weather, he brought his activity tracker data from a workout to his cardiologist.

Dr. Michael Blum examined the runner’s heart rate readings. The cardiologist could see when his patient was pushing to climb a hill or to increase his speed, and when he was slowing down.

“I could tell how hard he was working,” said Blum, a professor at the University of California, San Francisco. “I had this amazing data.”

Ultimately, though, he had to inform his worried patient: “This is all really interesting, but I can’t tell you what it means.”

Blum joined three other doctors who spoke last week on the promise – and the reality – of technology in a San Francisco panel discussion sponsored by Medscape and titled “Technology, Patients and the Art of Medicine.”

Technology in the form of diagnostic software helped one of the panelists, Dr. Abraham Verghese, conclude that a patient was suffering from neurosarcoidosis – a diagnosis the Stanford University professor didn’t initially consider but one a software program immediately recognized given the patient’s symptoms.

Technology offers doctors a view inside patients’ hearts, brains and bowels. And technology may speed the diagnosis of diabetic retinopathy, the leading cause of blindness, said panelist Dr. Jessica Mega, who leads the healthcare team at Verily, formerly Google Life.

Nonetheless, 69 percent of the 100 doctors in the audience said increased reliance on technology and electronic health records only served to separate them from their patients.

As evidence of the problem, the panelists cited apps that claim to do things they don’t really do, like accurately measure blood pressure.

But the biggest problem stemming from technology for the doctors, and the bane of many doctors’ existence, is the electronic health record, also known as an EHR.

The U.S. government has touted electronic records, initially designed for billing, as a way to dramatically improve patient care and has used financial incentives to speed their adoption. The hope was that the widespread use of EHRs would reduce medical errors, inefficiencies and inappropriate care.

The effort has failed, according to Dr. Eric Topol, editor-in-chief of Medscape and the panel moderator.

American doctors continue to make 12 million diagnosis errors a year; one in four patients in U.S. hospitals continue to be harmed; and healthcare costs continue to soar, he said.

Topol called electronic health records “a complete mess.”

“Why do we just put up with pathetic technology?” he asked.

The panelists, as well as the doctors in attendance, bemoaned the time it took them to complete electronic records, time they longed to spend with patients.

Verghese credited electronic records with billing well, with reducing medical errors and with keeping him out of dusty basements in search of patient files. At the same time, he blamed EHRs for tying doctors to their computers and at least partially for his colleagues’ unprecedented suicide rates, depression, burnout and disillusionment.

“I find it pretty incredible,” he said, that with “all the wonderful, sophisticated imaging technology, we still have this dinosaur of an electronic medical record.”

Verghese, a best-selling author, is vice chair for the theory and practice of medicine at Stanford University and has championed the return of what he considers the lost art of the physical exam. He questioned how physicians allowed EHRs to take over medical practices without physician input on how to make them work.

“We allowed this to happen on our watch,” he said. “How did we let this happen?”

“My sense is that the current dysphoria in medicine revolves to a great degree around the electronic medical record but not solely. I think the other piece of it is everything moving much faster, so many more patients, so much more information per patient,” he said.

Blum had nothing good to say about electronic health records. But he refused to blame them for all medicine’s ills.

High rates of physician burnout, depression and suicide predate the government’s relatively recent push for electronic records, he said. He traced the problem back at least 10 years to increased government regulations that turned doctors’ notes into billing documents.

“Then you throw the electronic health record on top of that,” Blum said. “That just took a bad situation and made it horribly worse.”

Blum, who leads the Center for Digital Health Innovation at the University of California, San Francisco, considers electronic health records separate from technology.

He believes technology has transformed medicine in a positive way and will continue to do so.

“The office visit and the experience of the bonding has clearly been disrupted” by doctors having to type into electronic records, Blum said. On the other hand, he said, “patients can send me a note whenever they want, and within a day, I’ll get back to them.”

As further evidence of technology’s benefits, he cited a study showing that patients expressed more satisfaction following a video visit with their doctors than visits to the office.

“It’s going to explode,” he said, “when we see the next generation of technology.”

Source:-.reuters.

MS Paint to be removed in the next Windows 10 update

Microsoft published a list of applications and services that will be removed or deprecated in the upcoming Windows 10 Fall Creators Update. One of the applications stated for deprecation is the 32 year old MS Paint, that has been part of every version of Windows ever made.

After an overwhelming response from users on the internet, Microsoft announced in a blog post that the venerable drawing utility will be removed as part of default software suite but will be available as a download through the Windows Store. Microsoft instead wants users to use Paint 3D, which was introduced earlier this year in the Windows 10 Creators Update and features a much expanded set of drawing tools, including 3D objects.

The new version of Windows will be available later this year in fall.

[Source:-gsmarena.]