Microsoft, Qualcomm Tuck Windows 10 Into ARM Devices

2016-12-28-06

Microsoft on Wednesday announced the compatibility of Windows 10 and native Windows apps with ARM-based processors, including Qualcomm’s Snapdragon, which currently powers a large percentage of Android devices.

One of the highlights at this year’s Windows Hardware Engineering Community (WinHEC) event in Shenzhen, China, the new partnership will make it possible for Windows applications, peripherals and enterprise solutions to run on new mobile, power efficient and always-connected cellular PCs.

Through the collaboration, the companies aim to encourage hardware partners to develop Qualcomm Snapdragon-powered Window 10 devices that run x86 Win32 and universal Windows apps. In addition to Microsoft’s own productivity applications, such as Microsoft Office, they could include third-party programs such as Adobe Photoshop, as well as Windows games, which are developed by numerous companies.

The applications would be the same as those meant to run on a desktop or laptop, but they would be fully compatible with cellular PCs — meaning that mobile users no longer would have to sacrifice functionality or features.

Microsoft, Qualcomm Tuck Windows 10 Into ARM Devices

900 Million Androids Could Be Easy Prey for QuadRooter Exploits

2016.08.10 02Four newly identified vulnerabilities could affect 900 million Android devices, Check Point researchers told attendees at the DEF CON 24 security conference in Las Vegas this past weekend.

The vulnerabilities, which the researchers dubbed “QuadRooter,” affect Android devices that use Qualcomm chipsets. They exist in the chipset software drivers.

The drivers, which control communications between chipset components, are incorporated into Android builds manufacturers develop for their devices, so they’re preinstalled on devices and can be fixed only through installation of a patch from the distributor or carrier.

Exploiting any of the four vulnerabilities will let attackers trigger privilege escalations and get root access to the targeted device, Check Point said.

Attackers can exploit the vulnerabilities using a malicious app. Such an app would not require special permissions, and thus would not be easily detected.

900 Million Androids Could Be Easy Prey for QuadRooter Exploits