Share from #CoolBlindTec, read how you can use the Amazon Connect and make phone calls with the use of your Home phone number.
Each week, the Top Tech Tidbits newsletter is published.
As a faithful follower, I found the below items that I wanted to share.
Skype, the program used for so many years for communications around the world is changing.
Microsoft, the owner of Skype has rolled out now Skype UWP.
Doug Lee, an individual who has written scripts for JAWS and NVDA has written an in depth article detailing all that you should know.
Spectre and Meltdown: Details you need on those big chip flaws
Design flaws in processors from leading chipmakers could let attackers access sensitive information. How did this happen, and what’s the fix?
Processors are vital to running all our computerized devices, even if we hardly ever think about them. That’s why it’s a big deal that they have major vulnerabilities, such as Spectre and Meltdown, that leave them open to hacking attacks.
As they run all the essential processes on your computer, these silicon chips handle extremely sensitive data. That includes passwords and encryption keys, the fundamental tools for keeping your computer secure.
The Spectre and Meltdown vulnerabilities, revealed Wednesday, could let attackers capture information they shouldn’t be able to access, like those passwords and keys. As a result, an attack on a computer chip can turn into a serious security concern.
What are the vulnerabilities?
Researchers found two major weaknesses in processors that could let attackers read sensitive information that should never leave the CPU, or central processing unit. In both cases, attackers could see data that the processor temporarily makes available outside of the chip.
Here’s why that happens: To make computer processes run faster, a chip will essentially guess what information the computer needs to perform its next function. That’s called speculative execution. As the chip guesses, that sensitive information is momentarily easier to access.
MORE ON MELTDOWN AND SPECTRE
One flaw, Spectre, would let attackers trick the processor into starting the speculative execution process. Then attackers could read the secret data the chip makes available as it tries to guess what function the computer will carry out next.
The other flaw, Meltdown, lets attackers access the secret information through a computer’s operating system, such as Microsoft Windows or Apple’s High Sierra.
Security experts refer to these sorts of incursions as side-channel attacks, because they access information as it’s being used by a legitimate process on the computer.
What are tech companies saying and doing about this?
Intel CEO Brian Krzanich says the problems are well on their way to being fixed, at least in the case of Intel-powered PCs and servers. Intel said Thursday that 90 percent of chips released in the last five years will have fixes available by the end of next week and that for chips up to 10 years old, fixes will be released in the coming weeks.
Microsoft on Wednesday released patches for the Windows operating system and its Internet Explorer and Edge browsers, but warned that your antivirus software needs to be updated to support those patches.
Apple said that it has released mitigations for the Meltdown flaw for the operating systems on its Mac computers, Apple TVs, iPhones and iPads, and that neither Meltdown nor Spectre affects the Apple Watch. Apple also said Thursday that it will release patches "in the coming days" for the Safari browser to help defend against Spectre exploits and that it will continue to release patches in future updates of its iOS, MacOS and TVOS software.
Which chips are affected?
A number of chip designs from Intel, Arm and AMD are susceptible to one or more variants of the attacks. The issue is so widespread because those chips, used in devices made by Apple, Google, Microsoft, Amazon and others, all share a similar structure.
What’s more, the flaws don’t just affect personal computers — Meltdown also affects servers, the backbone of all major cloud services. So yes, Amazon Web Services and Google Cloud are susceptible to the problem, too. Google said it has secured all its affected products, and Amazon said it would finish securing all affected products on Wednesday.
How long has this been a problem?
Researchers at Google’s Project Zero, as well as a separate team of academic researchers, discovered the problems in 2017, but the issue has existed on chips for a long time — perhaps more than 20 years.
That’s because the issue doesn’t result from a badly written computer code. Instead, the problem comes down to the way the chips are intentionally designed.
Processors are supposed to make the secret information easier to access as they gear up to run the next process on a computer. As the programming quip goes, this is a feature, not a bug.
Has anyone been hacked via these flaws?
Researchers, chipmakers and computer companies all say there are no known examples of hackers using these weaknesses to attack a computer. However, now that the details of the design flaws and how to exploit them are publicly available, the chances of hackers using them are much higher.
The good news is that hackers would first need to install malicious software on your computer in order to take advantage of these flaws. That means they need to select their targets and hack each one of them before running a sophisticated attack to steal a computer’s sensitive information.
What can I do to protect myself?
As chipmakers and computer companies roll out software updates, be sure to install them. Beyond that, since hackers would have to install malware on your computer, do your best to make that harder for them.
That means you should keep all your other software updated, including your web browsers and Flash (if you’re still using it). Also, run security software to make sure you don’t have any malicious software on your computer right now.
Finally, look out for phishing emails. Emails that trick you into clicking on a link and downloading malicious software are still the number one way for hackers to get a foothold on your computer.
January 4th each year is gloriously celebrated as World Braille Day. It marks the birthday of Louis Braille (1809-1852), the French inventor of the reading and writing code for the blind. In Louis Braille’s time, the code was only used at the Parisian school for the blind where he studied and later taught. Today, there are Braille codes for virtually every written language in the world, so that blind people everywhere can become literate and acquire the opportunities that literacy brings.
Guerra Access Technology Training LLC (GATT) is proud to celebrate the wonderful tool of Braille. For nearly 45 years, I have used braille and still do each day. At the same time, it is sobering to remember that the number of blind children being taught this crucial reading and writing tool in the United States is at an all-time low. The most recent available statistics from the American Printing House for the Blind suggest that only about 8 percent of blind K-12 students in the United States are Braille readers.
Considering the Braille literacy crisis, it is important that we continue to make the case for Braille. Braille is the only method that allows blind people both to read and write independently. While other tools, such as recorded or text-to-speech audio, are useful to blind people, only Braille provides us with true literacy.
A correlation has been demonstrated between knowing how to read and write Braille and better educational and employment outcomes. Yet because of the false perceptions that Braille is hard to learn or that modern technologies can replace it, Braille instruction continues to decline. The irony is that technology, such as Braille notetakers and displays that can connect to computers and smartphones, has made Braille more available than ever before.
Every day, thousands of blind people use Braille for everything from shopping lists to labels for canned goods, from reading novels to solving math and scientific equations, from learning a piece of music to composing one. The increasing availability of Braille signs makes it easier for blind people to get around hotels, office buildings, government facilities, university campuses, and more. Braille is as flexible as print, can be learned in roughly the same amount of time, and can be read just as fluidly.
There is much that needs to be done to combat the decline of Braille literacy, but one way that each of us can help is to create awareness of how Braille makes it possible for blind people to transform our dreams into reality. On World Braille Day, let’s commit ourselves to showing more blind people and more members of the sighted public how this versatile code helps us live the lives we want.
Don’t fear! You still might have an opportunity to upgrade those Windows 7 or 8.1 machines to Windows 10 operating system.
Follow the below link and you can complete the upgrade online but take note of the system specifications.
If you are using Assistive/Access Technology and did not upgrade your Windows 7/8.1 operating system, never fear, the page to complete the process is still available.
Take the opportunity and complete the upgrade as its unclear how long this offer will remain.
During the Consumer electronic Show in Las Vegas during the week of January 7-12, 2018, many new things are being revealed and the days prior are full of teasers and rumors.
If you would like to know the dates and times for the 2018 CES, then Follow this link:
Is Samsung going to introduce a product for the vision impaired to capture reality around them?
Interested in making your Microsoft Word Documents be completely accessible?
Making an accessible .pdf?
Complete all the training modules offered by the State of Minnesota Information Technology Group and you can make all your documents universally accessible.
Guerra Access Technology Training is a full service Assistive/Access Technology training corporation. Providing training services to the blind and deaf currently in the state of Minnesota.
For more information or to obtain a quote, please contact GATT!
Guerra Access Technology Training LLC