2014 NEW EXCELVAN Bluetooth Smartwatch Phone Watch HD Screen Unlocked Watch Cell Phone(GSM Bluetooth Java Camera SOS Function)for Samsung HTC Sony ZP600+ Open Hole 3D Sharp Android Phone (Black)
- The phone watch is a quad band GSM (850MHz, 900MHz, 1800MHz, 1900MHz) unlocked phone that can be used anywhere all over the world. Sticking in a SIM card and you gain an amazing communication device that works like a cell phone on your wrist. You can call directly by using the phone watch which has the built-in MIC and speaker. So you can use your sim card for this watch as a signal phone, and it can support all other Android 4.2(or other version below Android 4.3 ) phones by bluetooth, too!
- The most outstanding function is SOS function that will save you in emergency situation.
- Phone function: Work as a phone separately after inserting SIM card ; Camera: 1. Support camera; 2. Video Recording; 3. Photo taking
- SOS Function: 1.Preset emergency contact numbers(add 3 contacts ) under SOS setting; 2. The system will automatically call the preset numbers after pressing SOS Button for about 3 Seconds
- This phone watch is a full multimedia center that features a camera, video player/ recorder, and audio player/ recorder. You can easily capture photos, video and audio – all just with the click of a button. This exquisite phone watch also allows you to playback all your media files directly from the 1.54 inch LCD display or even transfer them to your computer for later viewing.Come on! Order one of the amazing phone watches right away! Great for yourself and as a gift for your friends! You won’t be disappointed!
Cellular Band GSM 850/900/1800/1900MHz
SIM Card One
Service Provide: Unlocked
Watchband Material: PC
Case Material: Silicone Rubber
Dimensions: 42 x 42 x 14.8mm
CPU MTK 6253
Processor ARM 7
ROM 128MB RAM 64MB
Display Size 1.54 Inch
Type: QVGA Ipod Nano 6 LCM/ Resisitive Touch Screen
Resolution: 240 x 240 pixels
Screen Color: 262K
Oracle was convinced to issue an update for its Java plugin two weeks early this month in order to squash a few critical bugs that resulted in a torrent of bad press. Everyone from security bloggers to the federal government had warned the general public against using Java after it was discovered that the exploit was being targeted in the wild. Apple blocked Java via OS X’s Xprotect, and Mozilla and Google both flipped the switch on their browsers to blacklist the plug-in.
According to security researcher Brian Krebs, the most critical fix in the most recent Java update addresses an issue in Oracle’s new trust mechanism. The initial change made it so that Java requested authorization from end users whenever unsigned, untrusted code was encountered. While it was an excellent step in the right direction in terms of improving the overall security of Java, it was also very easy to circumvent.
In total, the Java update takes care of 50 security flaws. Unsurprisingly, Oracle is recommending that all users update as soon as possible due to the severe risk posed by surfing with a vulnerable version.
If you’ve still got Java installed on your system, keep your eyes peeled for an update notification. If you’d rather not wait for Oracle’s updater to answer the call, just head over to the Java download page and grab the latest version. Mac users will be relieved to know that the new release matches Xprotect’s minimum version expectation — and that means no more terminal hacking is required just so you can play Minecraft.
One more thing: just make sure the update you’re installing is a legitimate one, not some craftily-designed malware.
More reading: How to disable Java on everything
At the end of August we were urging everyone to disable Java on their machines due to a zero-day exploit being used to install malware. There was no patch available due to the slow pace at which Oracle moves, so the only way to protect against it was to disable Java completely.
Oracle did eventually respond with the release of an emergency patch, but now it looks as though we might be telling you to disable Java again in the near future.
Security expert Brian Krebs has highlighted the fact another zero-day exploit has been discovered and is currently being offered for sale on the invite-only forum called Underweb. The seller wants a five-figure sum for the exploit, which he says takes advantage of a flaw in the Java component that handles audio input.
The exploit works on the most up-to-date version of the Java Runtime Environment (JRE 7 Update 9) and has been tested and works on Windows 7 using either Internet Explorer or Firefox.
The sale was being offered last week, meaning by now it may be owned by someone willing to use it. Alternatively, others could have discovered the exploit too, and are now taking advantage of it, or at least planning to.
With Oracle’s slow response to the last zero-day exploit we can probably expect more of the same this time around. Although, you’d hope the company’s Java security team would learn from that experience.
If you currently have Java installed on your machine, is there a reason why? If you can’t think of one then remove it and make your PC all the more safer. It’s easy to do, just follow our guide on How to disable Java on everything.
More at Krebs on Security