Verizon's new extra-tough android phone excels in Hospitals
Verizon has answered the demand for a heavy-duty smartphone in the form of its latest and greatest Android design in the G’zOne Commando. This new addition to the Verizon family is built to cater to the everyday hospital worker who is constantly on the go, and is extremely hard on their cell phone on a daily basis.
This rugged MIL-STD-810G adheres to the military standard for durability, and was specifically designed for people at work in hospitals, construction, and other types of strenuous environments. Both temperature and drop-resistant, the Commando can withstand extreme temperatures ranging from 185 degrees to -13 degrees for up to 96 hours.
Healthcare experts are taking to their blogs about this recent Verizon development, citing the phone’s potential in the healthcare landscape specifically. Since smartphones already play such a pivotal role in telemedicine and rural healthcare, analysts are excited by the possibility of what this phone can do for those in the healthcare field.
“The Commando includes high-security features for email, wi-fi 802.11 b/g/n connectivity and customized access to high-use applications. Designed to withstand challenging conditions, including healthcare environments, the Commando can download images and files, access applications and capture signatures”, Verizon stated.
In terms of the phone’s physical capabilities, its endurance is quite impressive. Also tuned to handle rugged environmental conditions, this phone is equipped to handled dust, salt fog, solar radiation, shock, humidity, vibrations and liquid immersion as well.
In terms of operability, the phone’s security features seem to be unprecedented in the market today. Through Microsoft’s EAS (Exchange ActiveSync) users are able to encrypt data in transit, remotely wipe-off information, enable device inactivity timeout and set a very difficult scheme of password complexity. The phone can also be used to connect team members and share digital signatures.
This phone can also serve as a Wi-Fi hotspot for other mobile devices, and operates off of the Android 2.2 Froyo operating system. Including eight different operating modes, including Earth Compass, Walking Counter, and Trip Memory, the phone can share information on social networking sites as well as keep track of your activities for automatic commands for the future.
“The smartphone uses Android 2.2 and is shock-resistant, making it suitable for hospital use. The Commando can share 3G mobile hotspots with as many as five wi-fi-enabled devices”, according to Verizon, of Basking Ridge, N.J.
Peloton vulnerable to cyber attacks, McAfee research finds
Peloton, the popular exercise bikes, were found to be vulnerable to cyber attacks in the latest research from McAfee.
Peloton is a brand of electric bikes that combines high end exercise equipment with cutting-edge technology. Its products use wi fi to connect to a large tablet that interfaces with the components of the exercise device, and provides an easy way for physical activity enthusiasts to attend virtual workout classes over the internet several times a week.
Peloton has garnered attention recently around the privacy and security of its products. So McAfee decided to take a look for themselves and purchased a Peloton Bike+.
Researchers looked at the Android devices and uncovered a vulnerability that could allow an attacker with either physical access to the Bike+ or access during any point in the supply chain to gain to hack into the bike’s tablet, including the camera, microphone and personal data.
For the person using it there would be no indication the Bike+ has been tampered with, potentially putting Peloton’s 16.7 million users at risk.
The flaw was found in the Android Verified Boot (AVB) process. McAfee researchers were able to bypass the Android Verified Boot process, which normally verifies all code and data before booting. They were then able to get the device to boot bypassing this step.
This could potentially lead to the Android OS being compromised by an attacker who is physically present. Even worse, the attacker could boot up the Peloton with a modified credential to gain privileges, granting them access to the bike remotely.
As the attacker never has to unlock the device to boot it up, there would be no trace of their access on the device. This type of attack could also happen at any point from construction to warehouse to delivery, by installing a backdoor into the Android tablet without the user ever knowing.
Given the simplicity and criticality of the flaw, McAfee informed Peloton while auditing was ongoing. The vendor was sent full details, and shortly after, Peloton confirmed the issue and released a fix for it.
Further conversations between McAfee and Peloton confirmed that this vulnerability had also been present on the Peloton Tread exercise equipment.
Peloton’s Head of Global Information Security Adrian Stone, commented on the research: “This vulnerability reported by McAfee would require direct, physical access to a Peloton Bike+ or Tread. Like with any connected device in the home, if an attacker is able to gain physical access to it, additional physical controls and safeguards become increasingly important.
"To keep our members safe, we acted quickly and in coordination with McAfee. We pushed a mandatory update in early June and every device with the update installed is protected from this issue.”