Sunday, May 1, 2016

Google search will soon show live TV listings

Google will soon become a modern-day TV guide with live listings in search results. Once the feature rolls out, searching for show titles will bring up a list of air times and channels at the top of the Google search results page. Users will also be able to specify a TV provider for precise local results. Last year, Google dipped its toes in this territory by listing streaming sources when users looked up a particular movie or TV show. Those results will soon appear below the live TV listings. It’s unclear, however, if the listings will cover all TV providers, or just a subset of participants. With streaming video sources, Google is requiring providers to register their interest and markup their webpages so that show information is visible to Google’s search engine. Google hasn’t said anything about bringing these listings and search results to its TV devices. Live TV listings could be pretty useful for Google’s Android TV platform, for instance, if it allowed users to jump to the appropriate channel or set a reminder on the television. Why this matters: Today, finding out TV showtimes can be a hassle without heading to your cable box, as TV networks tend to bury their schedules behind layers of menus on their often-clunky websites. It’s a natural problem for Google to solve as continues to expand its search offerings beyond the basic list of links.

Cisco fixes serious denial-of-service flaws in wireless LAN controllers, other products

Cisco Systems has released patches to fix serious denial-of-service flaws in its Wireless LAN Controller (WLC) software, Cisco Adaptive Security Appliance (ASA) software and the Secure Real-Time Transport Protocol (SRTP) library that's used in many products. The Cisco WLC software contains two denial-of-service vulnerabilities, one of which is rated critical and could be exploited by an unauthenticated attacker through specially crafted HTTP requests sent to the device. This can cause a buffer overflow condition that, in addition to a device reload, might also allow for execution of arbitrary code on the device. The second vulnerability, rated high, stems from how the Cisco WLC software handles Bonjour traffic and can be exploited in a similar manner as the HTTP one to cause a device reload. A third DoS vulnerability was patched in the Cisco AireOS software that also runs on some of the company's Wireless LAN Controller devices. It can be exploited by an unauthenticated hacker by attempting to access a URL that is not generally accessible from and supported by the device's management interface. The software, used in the Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers and the Cisco Adaptive Security Virtual Appliance (ASAv), has a flaw stemming from an insufficient validation of DHCPv6 packets. The vulnerability only affects the Cisco ASA Software if it's configured with the DHCPv6 relay feature and can only be triggered by IPv6 traffic, Cisco said in an advisory. Finally, a DoS vulnerability in libSRTP that could be exploited through specially crafted SRTP packets, was fixed through software updates for multiple products that use the library for some features. The list of affected products is long but includes Cisco WebEx Meetings Server, Cisco Jabber, Cisco Adaptive Security Appliance (ASA) Software, Cisco IOS XE Software and many Cisco voice and unified communications devices