Sony VAIO 3D laptop



Expected launch: 2011

Expected pricing: Unknown

Expected specs: 16-inch LCD display, active-shutter glasses required, 1920-by-1080 2D resolution

About: Little is known about Sony's first entrant in the 3D laptop category, but considering the popularity of VAIO devices, a 3D Sony laptop is intriguing. There's no word on whether this device will integrate with other Sony 3D products, what it will cost, how much storage it will have, or even what kind of processor it will carry. Expect to hear more about this device in January during CES.

Image: Concept art - Sarah Purewal



Expected launch: 2011

Expected pricing: Unknown

Expected specs: 16-inch LCD display, active-shutter glasses required, 1920-by-1080 2D resolution

About: Little is known about Sony's first entrant in the 3D laptop category, but considering the popularity of VAIO devices, a 3D Sony laptop is intriguing. There's no word on whether this device will integrate with other Sony 3D products, what it will cost, how much storage it will have, or even what kind of processor it will carry. Expect to hear more about this device in January during CES.

Image: Concept art - Sarah Purewal

USB External Drive – Freecom Offers World’s Slimmest Portable HDD


Hard Drives are just getting tinier and tinier and Freecom seems to be leading the pack on this miniaturization craze. Their latest offering, the Mobile Drive Mg, is only 10mm thick! That’s thin enough to forget it’s even in your pocket. But can something so small be worth the price?

Thin apparently doesn’t mean small anymore because the Mobile Drive Mg is available in two storage sizes starting at 320GB and going all the way up to 750GB. That’s pretty impressive in such a small package but how breakable is this thing? You don’t have to worry (unless you sit on it) to protect the delicates inside, the case is manufactured from magnesium.

With regard to output ports, you’ve got USB 3.0 capabilities with data transfer rates of up to 130MB per second. There’s also optional support for FireWire 800 in case your machine isn’t on the USB 3.0 bandwagon just yet.

So, where do you get your hands on one of these? Through Apple Premium Resellers only. It’s an on hiccup of the kind you don’t see too often in the retail world but there you have it.

Pricing is actually pretty respectable for the world’s thinnest hard drive. The 320GB model is retailing for just $70 while the 750GB will run you $110. There’s also a spiffy tricked out version of the 750GB that supports both USB 3.0 and FireWire 800 but you’re going to have to drop an additional 10 bucks for that one.

Hit up the Freecom website for all the specifications.


Hard Drives are just getting tinier and tinier and Freecom seems to be leading the pack on this miniaturization craze. Their latest offering, the Mobile Drive Mg, is only 10mm thick! That’s thin enough to forget it’s even in your pocket. But can something so small be worth the price?

Thin apparently doesn’t mean small anymore because the Mobile Drive Mg is available in two storage sizes starting at 320GB and going all the way up to 750GB. That’s pretty impressive in such a small package but how breakable is this thing? You don’t have to worry (unless you sit on it) to protect the delicates inside, the case is manufactured from magnesium.

With regard to output ports, you’ve got USB 3.0 capabilities with data transfer rates of up to 130MB per second. There’s also optional support for FireWire 800 in case your machine isn’t on the USB 3.0 bandwagon just yet.

So, where do you get your hands on one of these? Through Apple Premium Resellers only. It’s an on hiccup of the kind you don’t see too often in the retail world but there you have it.

Pricing is actually pretty respectable for the world’s thinnest hard drive. The 320GB model is retailing for just $70 while the 750GB will run you $110. There’s also a spiffy tricked out version of the 750GB that supports both USB 3.0 and FireWire 800 but you’re going to have to drop an additional 10 bucks for that one.

Hit up the Freecom website for all the specifications.

Samsung WiFi Enabled Refrigerator


We’ve seen treadmills with Android tablets built-in and portable Blu-Ray players designed for your cars but does technology really need to invade every aspect of modern life? Apparently Samsung thinks so. The company that’s famous (or infamous) for its cell phones is launching a new WiFi enabled refrigerator—yes, the kitchen fridge now gets the Internet—just in case your weren’t plugged in enough.

The new RF4289 features an 8 inch LCD touchscreen that lets users use apps like Pandora Internet radio, Twitter, and even Epicurious to enhance their kitchen experience. You can also download recipes right to the fridge and even leave notes for friends and family so you don’t have to worry about cluttering up your stainless steel unit with horribly adorable magnets and post-its.

As of yet, there’s no word on any sort of controls or food-related wizardry on the little screen (other than the recipes of course) but this machine is in production right now and scheduled to land in Canada sometime this spring.

Pricing is still up in the air though, but it sure does put those refers with the TV in the door to shame. Though I can foresee a future of greasy fingerprints all over that LCD.


We’ve seen treadmills with Android tablets built-in and portable Blu-Ray players designed for your cars but does technology really need to invade every aspect of modern life? Apparently Samsung thinks so. The company that’s famous (or infamous) for its cell phones is launching a new WiFi enabled refrigerator—yes, the kitchen fridge now gets the Internet—just in case your weren’t plugged in enough.

The new RF4289 features an 8 inch LCD touchscreen that lets users use apps like Pandora Internet radio, Twitter, and even Epicurious to enhance their kitchen experience. You can also download recipes right to the fridge and even leave notes for friends and family so you don’t have to worry about cluttering up your stainless steel unit with horribly adorable magnets and post-its.

As of yet, there’s no word on any sort of controls or food-related wizardry on the little screen (other than the recipes of course) but this machine is in production right now and scheduled to land in Canada sometime this spring.

Pricing is still up in the air though, but it sure does put those refers with the TV in the door to shame. Though I can foresee a future of greasy fingerprints all over that LCD.

Wireless Mouse for Computer – Logitech’s New M515 is Slick


This new wireless mouse from Logitech is really awesome for a simple reason—it has a sealed bottom. That means you never have to worry about your track ball getting clogged with gunk or your optical sensor having its view blocked by lint balls from outer space.

In addition, it’s got a built-in hand detection sensor that lets this thing shut itself off (technically go into sleep mode) when you’re not touching it. That means that a battery will last you up to two years because you won’t ever “forget” to shut it off.

It’s also got a pretty slick scroll wheel on top that’s billed as “hyper-fast” (whatever that means). The little horizontal grooves are pretty cool too and give you that little bit of extra control that all PC users crave. It functions on wireless USB technology and comes with its own cute little nub of a receiver so you don’t have to worry about Bluetooth connectivity.

This little rodent is going to hit the European market in April and make the jump across the pond sometime after that. There’s no official word on pricing stateside but it should be under $80.00.

Specs aren’t yet available on the official Logitech website but keep an eye out.


This new wireless mouse from Logitech is really awesome for a simple reason—it has a sealed bottom. That means you never have to worry about your track ball getting clogged with gunk or your optical sensor having its view blocked by lint balls from outer space.

In addition, it’s got a built-in hand detection sensor that lets this thing shut itself off (technically go into sleep mode) when you’re not touching it. That means that a battery will last you up to two years because you won’t ever “forget” to shut it off.

It’s also got a pretty slick scroll wheel on top that’s billed as “hyper-fast” (whatever that means). The little horizontal grooves are pretty cool too and give you that little bit of extra control that all PC users crave. It functions on wireless USB technology and comes with its own cute little nub of a receiver so you don’t have to worry about Bluetooth connectivity.

This little rodent is going to hit the European market in April and make the jump across the pond sometime after that. There’s no official word on pricing stateside but it should be under $80.00.

Specs aren’t yet available on the official Logitech website but keep an eye out.

Google's Video Play By dropping support for a common video format in Chrome, Google means to drive the Web toward one it owns.


Last week, Google stirred up controversy with a low-key announcement: in the near future, it would drop support for a widely used video format in its Chrome Web browser. Here's a primer on what Google is doing, why it's doing it, and how it will affect you.

What exactly did Google do?

Last Tuesday, the company announced on the blog for its Chrome Web browser that it plans to discontinue built-in support for the H.264 video format, which is used by many Web publishers. Google said that instead, it would adopt the free-to-use WebM, a multimedia format that Google has largely developed and funded itself.

How will this affect you?



It probably won't, unless you're one of the roughly one in 10 people who use the Chrome browser. Even then, you might not notice. What'll happen is that video clips embedded in Web pages using the new HTML

Today, most Web video is served not via a

Google has announced forthcoming WebM plug-ins for Microsoft's Internet Explorer and Apple's Safari. It's a given that Firefox will also play WebM videos. Several major chipmakers, including AMD, ARM, and Broadcom, have pledged to support the format, as has Adobe for its Flash player. But without WebM being available by default in Internet Explorer, one Microsoft evangelist likened Google's move to throwing its weight behind Esperanto. In response, Google has pledged to supply browser plug-ins for Internet Explorer and Safari that will enable them to automatically play WebM video.

Eventually, engineers could build downloadable add-ons for Chrome that would enable it to play H.264, circumventing Google's move altogether. So for now, Google's move won't have much of an effect. And importantly, if you have a Google-powered Android phone, nothing will change on your device.

Unlike Apple's refusal to support Flash players on its iPhones and iPads, Google's removal of H.264 support from Chrome will be much less high-profile. Google's massive YouTube site will still stream video in H.264 (except for users who click a button to opt to use WebM). "That Chrome has dropped H.264 is less important than YouTube [dropping it]," notes Informa analyst Andrew Ladbrook.

In that case, why is Google doing this?

The H.264 format is commercially licensed by an organization called MPEG LA. Companies that make video software and hardware pay license fees to MPEG LA in order to build H.264 support into their products.

Google's stated aim is to shift Web video away from H.264 and toward WebM, in order to drive the Internet toward a royalty-free standard over which Google would have a large influence.

Interestingly, MPEG LA's members include Microsoft and Apple, which are pushing for H.264 to be used as the standard format for the

There's already another royalty-free video format, Ogg Theora, supported by Mozilla's Firefox and other browser makers. But Microsoft and Apple have refused to build in support for it, and so far have not announced support for WebM. And Steve Jobs has written that he's concerned that Ogg Theora will invite patent lawsuits from other companies, which would undermine the point of using it.


Last week, Google stirred up controversy with a low-key announcement: in the near future, it would drop support for a widely used video format in its Chrome Web browser. Here's a primer on what Google is doing, why it's doing it, and how it will affect you.

What exactly did Google do?

Last Tuesday, the company announced on the blog for its Chrome Web browser that it plans to discontinue built-in support for the H.264 video format, which is used by many Web publishers. Google said that instead, it would adopt the free-to-use WebM, a multimedia format that Google has largely developed and funded itself.

How will this affect you?



It probably won't, unless you're one of the roughly one in 10 people who use the Chrome browser. Even then, you might not notice. What'll happen is that video clips embedded in Web pages using the new HTML

Today, most Web video is served not via a

Google has announced forthcoming WebM plug-ins for Microsoft's Internet Explorer and Apple's Safari. It's a given that Firefox will also play WebM videos. Several major chipmakers, including AMD, ARM, and Broadcom, have pledged to support the format, as has Adobe for its Flash player. But without WebM being available by default in Internet Explorer, one Microsoft evangelist likened Google's move to throwing its weight behind Esperanto. In response, Google has pledged to supply browser plug-ins for Internet Explorer and Safari that will enable them to automatically play WebM video.

Eventually, engineers could build downloadable add-ons for Chrome that would enable it to play H.264, circumventing Google's move altogether. So for now, Google's move won't have much of an effect. And importantly, if you have a Google-powered Android phone, nothing will change on your device.

Unlike Apple's refusal to support Flash players on its iPhones and iPads, Google's removal of H.264 support from Chrome will be much less high-profile. Google's massive YouTube site will still stream video in H.264 (except for users who click a button to opt to use WebM). "That Chrome has dropped H.264 is less important than YouTube [dropping it]," notes Informa analyst Andrew Ladbrook.

In that case, why is Google doing this?

The H.264 format is commercially licensed by an organization called MPEG LA. Companies that make video software and hardware pay license fees to MPEG LA in order to build H.264 support into their products.

Google's stated aim is to shift Web video away from H.264 and toward WebM, in order to drive the Internet toward a royalty-free standard over which Google would have a large influence.

Interestingly, MPEG LA's members include Microsoft and Apple, which are pushing for H.264 to be used as the standard format for the

There's already another royalty-free video format, Ogg Theora, supported by Mozilla's Firefox and other browser makers. But Microsoft and Apple have refused to build in support for it, and so far have not announced support for WebM. And Steve Jobs has written that he's concerned that Ogg Theora will invite patent lawsuits from other companies, which would undermine the point of using it.

Smart Phone Zombie Apocalypse A researcher creates a botnet for your pocket—a likely sign of things to come.


If you have a smart phone, online criminals may soon have your number. Smart phone malware is getting increasingly sophisticated, and now a security researcher has created software that turns a smart phone into a "zombie" that can be controlled remotely.

Georgia Weidman created the program, which controls an Android phone via short message service (SMS). She will demonstrate the software at the Shmoocon hacking conference in Washington, D.C., later this month.

Once only theoretical, real-world cell-phone viruses are becoming more common. Last August, a scam in Russia tricked users into installing malicious software on Android phones, and using the SMS functionality to send messages to a number that charged a premium fee. In late 2010, a Chinese virus for Android devices was used to steal personal data.

Botnets, or networks of computers that have been compromised by cybercriminals, have become a staple of Internet crime. They can be used to attack other systems, host attack tools, send spam, or just steal data. So far this kind of approach has been rare with mobile devices, but that seems to be changing.



"We have been taking down Internet botnets for years now, but there is not as much understanding [of telecom networking]," Weidman says. "I definitely see criminals going more and more toward using the telco's network."

Weidman's attack works like this: After infecting a phone with a low-level program known as a rootkit, she uses that phone to send spam text messages, participate in a denial-of-service, or degrade the communications of the phone—all without the user knowing. The techniques apply to any smart phone, Weidman says, but she will use three different Android phones for her demo.

Today's smart phones have multiple layers of defense. For one, they can block malicious applications. They also have managed channels, such as the Apple App Store and Google's Android Marketplace, for applications.

As a result, Weidman says, infecting them is no easy task. "The hurdle with any malware is infecting the phone," she says, noting that the methods used by cybercriminals usually do not work. "More of what you see of malware is people downloading applications for their phone that are infected," she says.

Weidman's program is one of the first known to turn smart phones into nodes of a botnet.

The problem of cybercriminals targeting consumers' phones will only get worse, says Kevin Mahaffey, chief technology officer of mobile-security startup Lookout. Because the control of phones is so easy to turn into cash via premium text messages, criminals will be drawn to attack the devices.

"I always tend to look at the economics of the problem to ask myself whether it will continue in the future," he says. "And because there is an incentive for attackers to compromise mobile phones, and the cost of compromising is not that high, that says it will become more prevalent in the future."

Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users. When the attacker does it using malicious software, the user has little chance of detecting it, says Weidman.

"When I infected a phone in my botnet—my lab botnet—with malware, the smart phone would receive a message through SMS and I would check to see if it has botnet instructions in it," she says. "If it does, it would perform the functionality requests, and then it would swallow the message, so the user does not know that there was a message at all."

While phones do not have the computing power of more traditional computers, they are hefty enough to handle many of the tasks that cybercriminals desire, she says. She adds that the sheer number of smart phones means that any botnet could be "a real threat."


If you have a smart phone, online criminals may soon have your number. Smart phone malware is getting increasingly sophisticated, and now a security researcher has created software that turns a smart phone into a "zombie" that can be controlled remotely.

Georgia Weidman created the program, which controls an Android phone via short message service (SMS). She will demonstrate the software at the Shmoocon hacking conference in Washington, D.C., later this month.

Once only theoretical, real-world cell-phone viruses are becoming more common. Last August, a scam in Russia tricked users into installing malicious software on Android phones, and using the SMS functionality to send messages to a number that charged a premium fee. In late 2010, a Chinese virus for Android devices was used to steal personal data.

Botnets, or networks of computers that have been compromised by cybercriminals, have become a staple of Internet crime. They can be used to attack other systems, host attack tools, send spam, or just steal data. So far this kind of approach has been rare with mobile devices, but that seems to be changing.



"We have been taking down Internet botnets for years now, but there is not as much understanding [of telecom networking]," Weidman says. "I definitely see criminals going more and more toward using the telco's network."

Weidman's attack works like this: After infecting a phone with a low-level program known as a rootkit, she uses that phone to send spam text messages, participate in a denial-of-service, or degrade the communications of the phone—all without the user knowing. The techniques apply to any smart phone, Weidman says, but she will use three different Android phones for her demo.

Today's smart phones have multiple layers of defense. For one, they can block malicious applications. They also have managed channels, such as the Apple App Store and Google's Android Marketplace, for applications.

As a result, Weidman says, infecting them is no easy task. "The hurdle with any malware is infecting the phone," she says, noting that the methods used by cybercriminals usually do not work. "More of what you see of malware is people downloading applications for their phone that are infected," she says.

Weidman's program is one of the first known to turn smart phones into nodes of a botnet.

The problem of cybercriminals targeting consumers' phones will only get worse, says Kevin Mahaffey, chief technology officer of mobile-security startup Lookout. Because the control of phones is so easy to turn into cash via premium text messages, criminals will be drawn to attack the devices.

"I always tend to look at the economics of the problem to ask myself whether it will continue in the future," he says. "And because there is an incentive for attackers to compromise mobile phones, and the cost of compromising is not that high, that says it will become more prevalent in the future."

Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users. When the attacker does it using malicious software, the user has little chance of detecting it, says Weidman.

"When I infected a phone in my botnet—my lab botnet—with malware, the smart phone would receive a message through SMS and I would check to see if it has botnet instructions in it," she says. "If it does, it would perform the functionality requests, and then it would swallow the message, so the user does not know that there was a message at all."

While phones do not have the computing power of more traditional computers, they are hefty enough to handle many of the tasks that cybercriminals desire, she says. She adds that the sheer number of smart phones means that any botnet could be "a real threat."

Facebook Wants to Supply Your Internet Driver's License And new security measures protect everyone's data.


Although it's not apparent to many, Facebook is in the process of transforming itself from the world's most popular social-media website into a critical part of the Internet's identity infrastructure. If it succeeds, Facebook and Facebook accounts will become an even bigger target for hackers.

As security professionals debate whether the Internet needs an "identity layer"—a uniform protocol for authenticating users' identities—a growing number of websites are voting with their code, adopting "Facebook Connect" as a way for anyone with a Facebook account to log into the site at the click of a button.

Facebook introduced Connect back in July 2008, offering third-party websites tools to coordinate with the user information that Facebook holds, including logins. Thus websites had the option of allowing Facebook users to identify themselves with their Facebook identities.

So, for instance, the Web statistics vendor Alexa gives new users the choice of creating an account by entering a username and a password or by simply clicking the "Connect with Facebook" button. Well-known websites that also use Connect include the Internet Movie Database, Ask.com, and ESPN. Others will almost certainly jump on the bandwagon in 2011.



Facebook's identity system might very well supply something that VeriSign, Microsoft, Yahoo, and Google have all struggled to offer: a single "driver's license" for the Internet. (This leaves aside the question of whether it's a good thing for one company to hold such a position of power.)

A unique combination of factors makes Facebook well suited to being the repository for people's identities on the Internet. Unlike many popular websites, it requires users to register and log in. And Facebook's terms of service require that "users provide their real names and information"—indeed, Facebook has terminated accounts that were created with seemingly fake names or for fictional characters. Since Facebook users invest their accounts with a tremendous amount of durable personal content—including photographs, contact information, and connections to their social network—they are likely to keep a long-term relationship with the site.

This persistence of real identity puts Facebook in a position to solve one of the most pressing problems on the Internet today—the proliferation of user names and passwords.

Contrary to today's practice, there is no reason for most websites to force their users to create usernames and passwords. Most websites don't need or even want or need to manage the identities of their users—they simply want a way to reliably identify their users over time. Media websites, for instance, want to be able to attribute comments and limit spam. Personal-finance websites want to give users a way to monitor highly personal information securely—for example, a portfolio of stocks that the user might enter.

What's more, maintaining a user-identity infrastructure has its risks—as was made painfully clear last month when hackers broke into servers operated by Gawker Media and downloaded the user names and passwords for more than a million of Gawker's accounts. Even though the passwords were encrypted, many were easy to guess, so the accounts could be readily cracked, according to an analysis of the attack by security researchers at the University of Cambridge. Following the attack several unrelated websites, including LinkedIn and Woot, sent e-mail to their users warning them to change their passwords if these were the same ones as they used for Gawker.

Facebook Login lets any website on the planet use its identity infrastructure—and underlying security safeguards. It's easy to implement Facebook Login, simply by adding few lines of code to a web server. Once that change is made, the site's users will see a "Connect with Facebook" button. If they're already logged into Facebook (having recently visited the site), they can just click on it and they're in. If they haven't logged in recently, they are prompted for their Facebook user name and password.

An interesting side benefit for website operators is that Facebook Login provides the site with users' real names (in most cases) and optionallya variety of other information, such as the users' "friends" and "likes." Currently, Facebook doesn't charge websites to use its identity infrastructure or access this additional information, though Facebook certainly could in the future.

Facebook is already well acquainted with Internet security issues, simply because it holds personal data for more than 500 million people. The increased use of the Facebook platform for things beyond social media—a bank in New Zealand, for instance, announced in November that it would allow customers to access banking information on Facebook—obviously raises new concerns. And if the company extends its reach to offer a universal login on the Web, the challenges it's likely to face will become greater still.


Although it's not apparent to many, Facebook is in the process of transforming itself from the world's most popular social-media website into a critical part of the Internet's identity infrastructure. If it succeeds, Facebook and Facebook accounts will become an even bigger target for hackers.

As security professionals debate whether the Internet needs an "identity layer"—a uniform protocol for authenticating users' identities—a growing number of websites are voting with their code, adopting "Facebook Connect" as a way for anyone with a Facebook account to log into the site at the click of a button.

Facebook introduced Connect back in July 2008, offering third-party websites tools to coordinate with the user information that Facebook holds, including logins. Thus websites had the option of allowing Facebook users to identify themselves with their Facebook identities.

So, for instance, the Web statistics vendor Alexa gives new users the choice of creating an account by entering a username and a password or by simply clicking the "Connect with Facebook" button. Well-known websites that also use Connect include the Internet Movie Database, Ask.com, and ESPN. Others will almost certainly jump on the bandwagon in 2011.



Facebook's identity system might very well supply something that VeriSign, Microsoft, Yahoo, and Google have all struggled to offer: a single "driver's license" for the Internet. (This leaves aside the question of whether it's a good thing for one company to hold such a position of power.)

A unique combination of factors makes Facebook well suited to being the repository for people's identities on the Internet. Unlike many popular websites, it requires users to register and log in. And Facebook's terms of service require that "users provide their real names and information"—indeed, Facebook has terminated accounts that were created with seemingly fake names or for fictional characters. Since Facebook users invest their accounts with a tremendous amount of durable personal content—including photographs, contact information, and connections to their social network—they are likely to keep a long-term relationship with the site.

This persistence of real identity puts Facebook in a position to solve one of the most pressing problems on the Internet today—the proliferation of user names and passwords.

Contrary to today's practice, there is no reason for most websites to force their users to create usernames and passwords. Most websites don't need or even want or need to manage the identities of their users—they simply want a way to reliably identify their users over time. Media websites, for instance, want to be able to attribute comments and limit spam. Personal-finance websites want to give users a way to monitor highly personal information securely—for example, a portfolio of stocks that the user might enter.

What's more, maintaining a user-identity infrastructure has its risks—as was made painfully clear last month when hackers broke into servers operated by Gawker Media and downloaded the user names and passwords for more than a million of Gawker's accounts. Even though the passwords were encrypted, many were easy to guess, so the accounts could be readily cracked, according to an analysis of the attack by security researchers at the University of Cambridge. Following the attack several unrelated websites, including LinkedIn and Woot, sent e-mail to their users warning them to change their passwords if these were the same ones as they used for Gawker.

Facebook Login lets any website on the planet use its identity infrastructure—and underlying security safeguards. It's easy to implement Facebook Login, simply by adding few lines of code to a web server. Once that change is made, the site's users will see a "Connect with Facebook" button. If they're already logged into Facebook (having recently visited the site), they can just click on it and they're in. If they haven't logged in recently, they are prompted for their Facebook user name and password.

An interesting side benefit for website operators is that Facebook Login provides the site with users' real names (in most cases) and optionallya variety of other information, such as the users' "friends" and "likes." Currently, Facebook doesn't charge websites to use its identity infrastructure or access this additional information, though Facebook certainly could in the future.

Facebook is already well acquainted with Internet security issues, simply because it holds personal data for more than 500 million people. The increased use of the Facebook platform for things beyond social media—a bank in New Zealand, for instance, announced in November that it would allow customers to access banking information on Facebook—obviously raises new concerns. And if the company extends its reach to offer a universal login on the Web, the challenges it's likely to face will become greater still.

Car Theft by Antenna (Researchers beat automatic locking and ignition systems)


No key required: A researcher shows how an attacker could start a car using an antenna. A signal from the car is transmitted to a computerized key, which is tricked into enabling the engine ignition.
Credit: ETH Zurich









Car thieves of the future might be able to get into a car and drive away without forced entry and without needing a physical key, according to new research that will be presented at the Network and Distributed System Security Symposium next month in San Diego, California.

The researchers successfully attacked eight car manufacturers' passive keyless entry and start systems—wireless key fobs that open a car's doors and start the engine by proximity alone.

Srdjan Capkun, an assistant professor of computer science in the system security group at ETH Zurich in Switzerland, who led the work, says he was inspired to investigate the security of keyless entry and start systems after buying a car that had one. Capkun and Aurélien Francillon and Boris Danev, both researchers in the same institution, examined 10 car models from the eight manufacturers. They were able to access all 10 and drive them away by intercepting and relaying signals from the cars to their wireless keys. While they could relay the signals from the key back to the car as well, usually they did not need to because the key transmits its signals up to around 100 meters. The attack works no matter what cryptography and protocols the key and car use to communicate with each other.

Normally, when a wireless key is within a few meters of the right car, it detects a low-powered signal that causes it to issue a command that opens the car enable the ignition. The researchers used a pair of antennas to transmit these signals from the car to the key when the key was farther away, tricking the car into opening without the ordinary authorization. One antenna needs to be very close to the car, and one needs to be within eight meters of the key.


The researchers came up with two versions of the attack. In one, they ran a cable from near the car to near the key and used it to transmit the signals. They conducted the other wirelessly. Francillon says that the materials for the wired attack cost about $50, and those for the wireless attack cost between $100 and $1,000, depending on the electronic components used.

The researchers tested a few scenarios. An attacker could watch a parking lot and have an accomplice watch as car owners as entered a nearby store. The accomplice would only need to be within eight meters of the targeted owner's key fob, making it easy to avoid arousing suspicion. In another scenario, a car owner might leave a car key on a table near a window. An antenna placed outside the house was able to communicate with the key, allowing the researchers then to start the car parked out front and drive away.


No key required: A researcher shows how an attacker could start a car using an antenna. A signal from the car is transmitted to a computerized key, which is tricked into enabling the engine ignition.
Credit: ETH Zurich









Car thieves of the future might be able to get into a car and drive away without forced entry and without needing a physical key, according to new research that will be presented at the Network and Distributed System Security Symposium next month in San Diego, California.

The researchers successfully attacked eight car manufacturers' passive keyless entry and start systems—wireless key fobs that open a car's doors and start the engine by proximity alone.

Srdjan Capkun, an assistant professor of computer science in the system security group at ETH Zurich in Switzerland, who led the work, says he was inspired to investigate the security of keyless entry and start systems after buying a car that had one. Capkun and Aurélien Francillon and Boris Danev, both researchers in the same institution, examined 10 car models from the eight manufacturers. They were able to access all 10 and drive them away by intercepting and relaying signals from the cars to their wireless keys. While they could relay the signals from the key back to the car as well, usually they did not need to because the key transmits its signals up to around 100 meters. The attack works no matter what cryptography and protocols the key and car use to communicate with each other.

Normally, when a wireless key is within a few meters of the right car, it detects a low-powered signal that causes it to issue a command that opens the car enable the ignition. The researchers used a pair of antennas to transmit these signals from the car to the key when the key was farther away, tricking the car into opening without the ordinary authorization. One antenna needs to be very close to the car, and one needs to be within eight meters of the key.


The researchers came up with two versions of the attack. In one, they ran a cable from near the car to near the key and used it to transmit the signals. They conducted the other wirelessly. Francillon says that the materials for the wired attack cost about $50, and those for the wireless attack cost between $100 and $1,000, depending on the electronic components used.

The researchers tested a few scenarios. An attacker could watch a parking lot and have an accomplice watch as car owners as entered a nearby store. The accomplice would only need to be within eight meters of the targeted owner's key fob, making it easy to avoid arousing suspicion. In another scenario, a car owner might leave a car key on a table near a window. An antenna placed outside the house was able to communicate with the key, allowing the researchers then to start the car parked out front and drive away.

"SMS of Death" Could Crash Many Mobile Phones


The phones in many people's pockets today are miniature personal computers, and they are just as vulnerable as PCs to viruses, malware, and other security problems. But research presented at a conference in Germany last week shows that phones don't even have to be smart to be vulnerable to hackers.

Using only Short Message Service (SMS) communications—messages that can be sent between mobile phones—a pair of security researchers were able to force low-end phones to shut down abruptly and knock them off a cellular network. As well as text messages, the SMS protocol can be used to transmit small programs, called "binaries," that run on a phone. Network operators use these files to, for example, change the settings on a device remotely. The researchers used the same approach to attack phones. They performed their tricks on handsets made by Nokia, LG, Samsung, Motorola, Sony Ericsson, and Micromax, a popular Indian cell-phone manufacturer.

A number of largely theoretical attacks aimed at iPhones and Android devices have made headlines over the past few years. But smart phones make up only 16 percent of the devices in use. So-called feature phones—which can do more than make calls but run only software with limited functionality, enabling their users to do such things as send text messages and play games—account for the majority of around 5 billion mobile phones in use worldwide.

Feature phones are harder to attack than smart phones because of their limitations. Their processors are less powerful, and they have less memory capacity, so they must run simpler software, which often cannot be loaded unless the carrier gives permission. Feature phones also have more varied hardware and software idiosyncrasies than smart phones do.
The security researchers who presented their work at last week's conference, Collin Mulliner, a PhD student in the Security in Telecommunications department at the Technische Universitaet Berlin, and Nico Golde, an undergraduate student at the same institution, decided to attack feature phones over the air. They set up a miniature cellular network, using open-source software to create a base station with which to communicate with the phones. In order to broadcast malicious messages to them without putting other devices at risk, they shielded their communications by enclosing their network in a Faraday cage, which blocks radio signals.

Having a private cell network also helped Mulliner and Golde study the software running on low-end phones. By monitoring the way the phones communicated with their base station, they could discern important information about how the phones worked and how SMS messages could affect them.

The researchers were able to create malicious SMS messages for each type of phone they studied. The messages affect the phones without any response from the user. Because feature phones are so common, Mulliner says, such an attack "could take out a large percentage of mobile communications."


The phones in many people's pockets today are miniature personal computers, and they are just as vulnerable as PCs to viruses, malware, and other security problems. But research presented at a conference in Germany last week shows that phones don't even have to be smart to be vulnerable to hackers.

Using only Short Message Service (SMS) communications—messages that can be sent between mobile phones—a pair of security researchers were able to force low-end phones to shut down abruptly and knock them off a cellular network. As well as text messages, the SMS protocol can be used to transmit small programs, called "binaries," that run on a phone. Network operators use these files to, for example, change the settings on a device remotely. The researchers used the same approach to attack phones. They performed their tricks on handsets made by Nokia, LG, Samsung, Motorola, Sony Ericsson, and Micromax, a popular Indian cell-phone manufacturer.

A number of largely theoretical attacks aimed at iPhones and Android devices have made headlines over the past few years. But smart phones make up only 16 percent of the devices in use. So-called feature phones—which can do more than make calls but run only software with limited functionality, enabling their users to do such things as send text messages and play games—account for the majority of around 5 billion mobile phones in use worldwide.

Feature phones are harder to attack than smart phones because of their limitations. Their processors are less powerful, and they have less memory capacity, so they must run simpler software, which often cannot be loaded unless the carrier gives permission. Feature phones also have more varied hardware and software idiosyncrasies than smart phones do.
The security researchers who presented their work at last week's conference, Collin Mulliner, a PhD student in the Security in Telecommunications department at the Technische Universitaet Berlin, and Nico Golde, an undergraduate student at the same institution, decided to attack feature phones over the air. They set up a miniature cellular network, using open-source software to create a base station with which to communicate with the phones. In order to broadcast malicious messages to them without putting other devices at risk, they shielded their communications by enclosing their network in a Faraday cage, which blocks radio signals.

Having a private cell network also helped Mulliner and Golde study the software running on low-end phones. By monitoring the way the phones communicated with their base station, they could discern important information about how the phones worked and how SMS messages could affect them.

The researchers were able to create malicious SMS messages for each type of phone they studied. The messages affect the phones without any response from the user. Because feature phones are so common, Mulliner says, such an attack "could take out a large percentage of mobile communications."

Sony Ericsson does Xperia arc


Sony Ericsson decided that they will no longer release smartphones that are far behind in terms of OS updates compared to the rest of the mobile manufacturers, hence their latest addition to the Xperia family – the Xperia arc. This is one handset that will definitely stun you whenever you take a look at it, running on the Android 2.3 Gingerbread operating system. First unveiled at the recently concluded CES 2011, it is the first of a new generation of Xperia smartphones, so you can be sure that there will be more to come!


As we mentioned above, the design is what makes the new Xperia arc a looker, where it is super slim and hence, extremely light. Measuring a mere 8.7mm at its thinnest point, it will not sacrifice anything when it comes to performance, boasting an extra wide 4.2” multi-touch screen display. Sony Ericsson has certainly not gimped on material since they used premium materials to form its stunning arc body, so while you might think that this is going to break far more easily than a Hershey chocolate bar, it is still strong enough to fit nicely into your hand. One word of advice though – if you’re going to wear a really tight pair of jeans, we would suggest that you not put this in your rear pocket – you never know when it is in there and just jump onto a hard seat somewhere!

As for its innards, expect the best of Sony technology to be found, from its Reality Display with Mobile BRAVIA Engine for exceptional visual brilliance and a crystal clear image, to Sony’s award-winning Exmor R for mobile sensor (at 8.1-megapixels) with the f/2.4 lens that is capable of shooting high quality, bright pictures and HD videos even in low light conditions. Of course, all images shot can be viewed over a HDTV (preferably a Sony one) using the built in HDMI-connector. Needless to say, other specifications are pretty standard such as a 3.5mm audio jack, aGPS navigation, Bluetooth and DLNa connectivity, and Wi-Fi support among others. There is no word on pricing or availability though.
  • Xperia™ arc combines stunning design with Sony technology on Android™ platform version 2.3
  • Newest addition to the Xperia™ range delivers visual brilliance and the ultimate multimedia experience

January 5, 2011, Las Vegas, USA – Sony Ericsson today unveils the new Xperia™ arc smartphone with cutting edge Sony technology and an exceptional multimedia experience on the latest version of the Android™ platform - 2.3. Xperia™ arc is the first of a new generation of Xperia smartphones to be announced in 2011.

Bert Nordberg, President, Sony Ericsson said, “We’re starting strong in 2011 by introducing our most exciting Xperia™ product yet. Xperia™ arc combines state-of-the-art Sony technology with breathtaking design to entertain and wow consumers. All on the latest Android™ release.”

Xperia™ arc takes the stunning design language that Sony Ericsson has become known for to a new level. Super slim and light, Xperia™ arc is just 8.7mm at its thinnest part and has a extra wide 4.2” multi-touch screen. Created from premium materials and with a stunning arc body, this smartphone is sleek, strong and designed to fit perfectly in the user’s hand. The best of Sony technology is inside Xperia™ arc. The Reality Display with Mobile BRAVIA® Engine delivers exceptional visual brilliance and a crystal clear image which enhances the overall entertainment experience. Furthermore, Sony’s award-winning Exmor R™ for mobile sensor with the f/2.4 lens enables the capture of high quality, bright pictures and HD videos even in low light. All pictures and videos can be shared in HD on your living room TV via the built in HDMI-connector.

Xperia™ arc will launch on the latest version of the Android™ platform providing access to Google Mobile Services and the myriad of applications available on the Android market. Xperia™ smartphones add best in class entertainment on top of smartphone fundamentals such as apps, maps, email and fast Internet to create the most entertaining smartphone experience.

Sony Ericsson Xperia™ arc – Key features

  • Slim, lightweight and strong, with perfect ergonomics
  • Extra wide 4.2” multi-touch Reality Display with Mobile BRAVIA® Engine to ensure ultimate multimedia and viewing experiences
  • Sony Exmor R™ for mobile: for best-in-class low-light photography and video capture
  • 8.1 megapixel camera and HD video recording capability
  • Android Market™ – thousands of applications to keep you entertained

Sony Ericsson Xperia™ arc will be available globally in selected markets, including Japan, from Q1 in the colours Midnight Blue and Misty Silver.

Check out the Sony Ericsson Product Blog for more information:http://blogs.sonyericsson.com/products

Sony Ericsson Xperia™ arc at a glance

Camera

  • 8.1 megapixel camera
  • Up to 2.46x smart zoom
  • Aperture f/2.4
  • Auto focus
  • Face detection
  • Flash/LED
  • Geo tagging
  • Image stabilizer
  • Noise suppression
  • Send to web
  • Smile detection
  • Sony Exmor R™ for mobile CMOS sensor
  • Touch Focus
  • Touch capture
  • Video light
  • Video recording, HD 720p

Music

  • Album art
  • Bluetooth™ stereo (A2DP)
  • Media player
  • Music tones (MP3/AAC)
  • PlayNow™ service*
  • TrackID™ music recognition application
  • * This service may not be available in every market

Web

  • Bookmarks
  • Google™ search
  • NeoReader™ barcode scanner
  • Pan & zoom
  • Web browser (WebKit)

Communication

  • Call list
  • Conference calls
  • Facebook™ application*
  • Sony Ericsson Timescape™
  • Speakerphone
  • Vibrating alert
  • * This service may not be available in every market

Messaging

  • Conversations
  • Email
  • Microsoft® Exchange ActiveSync®
  • Instant messaging
  • Picture messaging (MMS)
  • Predictive text input
  • Sound recorder
  • Text messaging (SMS)

Design

  • Auto rotate
  • Keyboards (onscreen, QWERTY)
  • Picture wallpaper
  • Reality display
  • Sony Mobile BRAVIA® Engine
  • Touchscreen
  • Wallpaper animation

Entertainment
* This service may not be available in every market

  • 3D games
  • Media browser
  • Motion gaming
  • Radio (FM)
  • Video streaming
  • Video viewing
  • YouTube™ *

Organiser

  • Android™ OS
  • Alarm clock
  • Calculator
  • Calendar
  • Document readers
  • Flight mode
  • Infinite button
  • Phone book

Connectivity

  • 3.5 mm audio jack
  • aGPS
  • Bluetooth™ technology
  • Google Maps™
  • HDMI
  • Modem
  • DLNA
  • USB mass storage
  • USB support
  • Wi-Fi™
  • Wisepilot™ turn-by-turn navigation *
  • * This service may not be available in every market

Google™ services*
* These services may not be available in every market

  • Android Market™ Client
  • Gmail™
  • Google Calendar™
  • Google Gallery 3D™
  • Google Latitude™
  • Google Maps™ with Street View
  • Google Media Uploader
  • Google Music Player™
  • Google Phone-top Search
  • Google Search widget
  • Google Sync™
  • Google Talk™
  • Google Voice Search
  • Set-up Wizard
  • YouTube™

Screen

  • Sony Mobile Bravia Engine
  • 16,777,216 colour TFT
  • Capacitive multi-touch
  • 4.2 inches
  • 854 x 480 pixels (FWVGA)
  • Shatter proof sheet on scratch-resistant mineral glass

Accessories

  • In-Box:
  • Sony Ericsson Xperia™ arc
  • Battery (1500mAh)
  • Stereo portable handsfree
  • Micro USB cable for charging, synchronisation and file transfer
  • User documentation

Facts

  • Size: 125 x 63 x 8.7 mm
  • Weight: 117 grams
  • Phone memory: Up to 512 MB
  • Memory card support: up to 32 GB
  • Memory card included: microSD™ 8 GB
  • Operating system: Google™ Android 2.3
  • Processor: 1 GHz Qualcomm

Availability and versions

  • Networks
  • UMTS HSPA 900, 2100
  • GSM GPRS/EDGE 850, 900, 1800, 1900
  • UMTS HSPA 800, 850, 1900, 2100
  • GSM GPRS/EDGE 850, 900, 1800, 1900

Colour

  • Midnight Blue
  • Misty Silver

Legal
1) Facts and features may vary depending on local variant. 2) Operational times are affected by network
preferences, type of SIM card, connected accessories and various activities e.g. playing games. Kit contents and colour options may differ from market to market. The full range of accessories may not be available in every market.

© Sony Ericsson Mobile Communications AB, 2011

The Liquid Identity logo and Xperia are trademarks or registered trademarks of Sony Ericsson Mobile Communications AB. Sony is a trademark or registered trademark of Sony Corporation. Ericsson is the trademark or registered trademark of Telefonaktiebolaget LM Ericsson. Additional information regarding trademarks may be located on our website at:www.sonyericsson.com/cws/common/legal/disclaimer.

Other product and company names mentioned herein may be the trademarks of their respective owners. Any rights not expressly granted herein are reserved. All terms are subject to change without prior notice.
Sony Ericsson Mobile Communications AB, SE-221 88 Lund, Sweden.
Printed in January 2010, R1A

Sony Ericsson is a 50/50 joint venture by Sony and Ericsson established in October 2001, with global corporate functions located in London and operations in major markets around the world. Sony Ericsson’s strategy is to become the industry leader in mobile Communication Entertainment, through new styles of interaction across the internet and social media. Sony Ericsson offers exciting consumer experiences through innovative and feature rich phones, accessories, content and applications. For more information, please see: www.sonyericsson.com/press


Sony Ericsson decided that they will no longer release smartphones that are far behind in terms of OS updates compared to the rest of the mobile manufacturers, hence their latest addition to the Xperia family – the Xperia arc. This is one handset that will definitely stun you whenever you take a look at it, running on the Android 2.3 Gingerbread operating system. First unveiled at the recently concluded CES 2011, it is the first of a new generation of Xperia smartphones, so you can be sure that there will be more to come!


As we mentioned above, the design is what makes the new Xperia arc a looker, where it is super slim and hence, extremely light. Measuring a mere 8.7mm at its thinnest point, it will not sacrifice anything when it comes to performance, boasting an extra wide 4.2” multi-touch screen display. Sony Ericsson has certainly not gimped on material since they used premium materials to form its stunning arc body, so while you might think that this is going to break far more easily than a Hershey chocolate bar, it is still strong enough to fit nicely into your hand. One word of advice though – if you’re going to wear a really tight pair of jeans, we would suggest that you not put this in your rear pocket – you never know when it is in there and just jump onto a hard seat somewhere!

As for its innards, expect the best of Sony technology to be found, from its Reality Display with Mobile BRAVIA Engine for exceptional visual brilliance and a crystal clear image, to Sony’s award-winning Exmor R for mobile sensor (at 8.1-megapixels) with the f/2.4 lens that is capable of shooting high quality, bright pictures and HD videos even in low light conditions. Of course, all images shot can be viewed over a HDTV (preferably a Sony one) using the built in HDMI-connector. Needless to say, other specifications are pretty standard such as a 3.5mm audio jack, aGPS navigation, Bluetooth and DLNa connectivity, and Wi-Fi support among others. There is no word on pricing or availability though.

  • Xperia™ arc combines stunning design with Sony technology on Android™ platform version 2.3
  • Newest addition to the Xperia™ range delivers visual brilliance and the ultimate multimedia experience

January 5, 2011, Las Vegas, USA – Sony Ericsson today unveils the new Xperia™ arc smartphone with cutting edge Sony technology and an exceptional multimedia experience on the latest version of the Android™ platform - 2.3. Xperia™ arc is the first of a new generation of Xperia smartphones to be announced in 2011.

Bert Nordberg, President, Sony Ericsson said, “We’re starting strong in 2011 by introducing our most exciting Xperia™ product yet. Xperia™ arc combines state-of-the-art Sony technology with breathtaking design to entertain and wow consumers. All on the latest Android™ release.”

Xperia™ arc takes the stunning design language that Sony Ericsson has become known for to a new level. Super slim and light, Xperia™ arc is just 8.7mm at its thinnest part and has a extra wide 4.2” multi-touch screen. Created from premium materials and with a stunning arc body, this smartphone is sleek, strong and designed to fit perfectly in the user’s hand. The best of Sony technology is inside Xperia™ arc. The Reality Display with Mobile BRAVIA® Engine delivers exceptional visual brilliance and a crystal clear image which enhances the overall entertainment experience. Furthermore, Sony’s award-winning Exmor R™ for mobile sensor with the f/2.4 lens enables the capture of high quality, bright pictures and HD videos even in low light. All pictures and videos can be shared in HD on your living room TV via the built in HDMI-connector.

Xperia™ arc will launch on the latest version of the Android™ platform providing access to Google Mobile Services and the myriad of applications available on the Android market. Xperia™ smartphones add best in class entertainment on top of smartphone fundamentals such as apps, maps, email and fast Internet to create the most entertaining smartphone experience.

Sony Ericsson Xperia™ arc – Key features

  • Slim, lightweight and strong, with perfect ergonomics
  • Extra wide 4.2” multi-touch Reality Display with Mobile BRAVIA® Engine to ensure ultimate multimedia and viewing experiences
  • Sony Exmor R™ for mobile: for best-in-class low-light photography and video capture
  • 8.1 megapixel camera and HD video recording capability
  • Android Market™ – thousands of applications to keep you entertained

Sony Ericsson Xperia™ arc will be available globally in selected markets, including Japan, from Q1 in the colours Midnight Blue and Misty Silver.

Check out the Sony Ericsson Product Blog for more information:http://blogs.sonyericsson.com/products

Sony Ericsson Xperia™ arc at a glance

Camera

  • 8.1 megapixel camera
  • Up to 2.46x smart zoom
  • Aperture f/2.4
  • Auto focus
  • Face detection
  • Flash/LED
  • Geo tagging
  • Image stabilizer
  • Noise suppression
  • Send to web
  • Smile detection
  • Sony Exmor R™ for mobile CMOS sensor
  • Touch Focus
  • Touch capture
  • Video light
  • Video recording, HD 720p

Music

  • Album art
  • Bluetooth™ stereo (A2DP)
  • Media player
  • Music tones (MP3/AAC)
  • PlayNow™ service*
  • TrackID™ music recognition application
  • * This service may not be available in every market

Web

  • Bookmarks
  • Google™ search
  • NeoReader™ barcode scanner
  • Pan & zoom
  • Web browser (WebKit)

Communication

  • Call list
  • Conference calls
  • Facebook™ application*
  • Sony Ericsson Timescape™
  • Speakerphone
  • Vibrating alert
  • * This service may not be available in every market

Messaging

  • Conversations
  • Email
  • Microsoft® Exchange ActiveSync®
  • Instant messaging
  • Picture messaging (MMS)
  • Predictive text input
  • Sound recorder
  • Text messaging (SMS)

Design

  • Auto rotate
  • Keyboards (onscreen, QWERTY)
  • Picture wallpaper
  • Reality display
  • Sony Mobile BRAVIA® Engine
  • Touchscreen
  • Wallpaper animation

Entertainment
* This service may not be available in every market

  • 3D games
  • Media browser
  • Motion gaming
  • Radio (FM)
  • Video streaming
  • Video viewing
  • YouTube™ *

Organiser

  • Android™ OS
  • Alarm clock
  • Calculator
  • Calendar
  • Document readers
  • Flight mode
  • Infinite button
  • Phone book

Connectivity

  • 3.5 mm audio jack
  • aGPS
  • Bluetooth™ technology
  • Google Maps™
  • HDMI
  • Modem
  • DLNA
  • USB mass storage
  • USB support
  • Wi-Fi™
  • Wisepilot™ turn-by-turn navigation *
  • * This service may not be available in every market

Google™ services*
* These services may not be available in every market

  • Android Market™ Client
  • Gmail™
  • Google Calendar™
  • Google Gallery 3D™
  • Google Latitude™
  • Google Maps™ with Street View
  • Google Media Uploader
  • Google Music Player™
  • Google Phone-top Search
  • Google Search widget
  • Google Sync™
  • Google Talk™
  • Google Voice Search
  • Set-up Wizard
  • YouTube™

Screen

  • Sony Mobile Bravia Engine
  • 16,777,216 colour TFT
  • Capacitive multi-touch
  • 4.2 inches
  • 854 x 480 pixels (FWVGA)
  • Shatter proof sheet on scratch-resistant mineral glass

Accessories

  • In-Box:
  • Sony Ericsson Xperia™ arc
  • Battery (1500mAh)
  • Stereo portable handsfree
  • Micro USB cable for charging, synchronisation and file transfer
  • User documentation

Facts

  • Size: 125 x 63 x 8.7 mm
  • Weight: 117 grams
  • Phone memory: Up to 512 MB
  • Memory card support: up to 32 GB
  • Memory card included: microSD™ 8 GB
  • Operating system: Google™ Android 2.3
  • Processor: 1 GHz Qualcomm

Availability and versions

  • Networks
  • UMTS HSPA 900, 2100
  • GSM GPRS/EDGE 850, 900, 1800, 1900
  • UMTS HSPA 800, 850, 1900, 2100
  • GSM GPRS/EDGE 850, 900, 1800, 1900

Colour

  • Midnight Blue
  • Misty Silver

Legal
1) Facts and features may vary depending on local variant. 2) Operational times are affected by network
preferences, type of SIM card, connected accessories and various activities e.g. playing games. Kit contents and colour options may differ from market to market. The full range of accessories may not be available in every market.

© Sony Ericsson Mobile Communications AB, 2011

The Liquid Identity logo and Xperia are trademarks or registered trademarks of Sony Ericsson Mobile Communications AB. Sony is a trademark or registered trademark of Sony Corporation. Ericsson is the trademark or registered trademark of Telefonaktiebolaget LM Ericsson. Additional information regarding trademarks may be located on our website at:www.sonyericsson.com/cws/common/legal/disclaimer.

Other product and company names mentioned herein may be the trademarks of their respective owners. Any rights not expressly granted herein are reserved. All terms are subject to change without prior notice.
Sony Ericsson Mobile Communications AB, SE-221 88 Lund, Sweden.
Printed in January 2010, R1A

Sony Ericsson is a 50/50 joint venture by Sony and Ericsson established in October 2001, with global corporate functions located in London and operations in major markets around the world. Sony Ericsson’s strategy is to become the industry leader in mobile Communication Entertainment, through new styles of interaction across the internet and social media. Sony Ericsson offers exciting consumer experiences through innovative and feature rich phones, accessories, content and applications. For more information, please see: www.sonyericsson.com/press

Related Posts Plugin for WordPress, Blogger...

 
Powered by Blogger