Network

Comcast Hit With FCC Complaint Over Net Neutrality Violations (streamingmedia.com) 25

An anonymous reader writes: Non-profit public interest group Public Knowledge has filed a complaint with the Federal Communications Commission regarding Comcast's Stream TV service. The complaint says that Comcast excludes Stream TV traffic from its own data cap, which is both a violation of its merger agreement and counter to the FCC's Open Internet rules. Stream TV is a $15 per month offering for Xfinity internet customers. It includes local channels, some basic cable, HBO, and the use of a cloud DVR. Most content is streamed over the home network. Public Knowledge's senior staff attorney, John Bergmayer says, "Comcast's actions could result in fewer online video choices for viewers nationwide, while increasing its dominance as a video gatekeeper. If its behavior persists, prices will go up, the number of choices will go down, creators will have a harder time reaching an audience, and viewers will have a harder time accessing diverse and independent programming."
Security

Transmission BitTorrent App Contained Malware (cnbc.com) 40

An anonymous reader writes: Apple users were targeted in the first known Mac ransomware campaign. Hackers targeted Transmission, which is one of the most popular Mac applications used to download software, videos, music, and other data from the BitTorrent peer-to-peer information sharing network. As per this forum post (English screenshot of warning), OS X detected malware called OSX.KeRanger.A. This is the first one in the wild that is functional as it encrypts your files and seeks a ransom. An Apple representative said the company had taken steps over the weekend to prevent attacks by revoking a digital certificate from a legitimate Apple developer that enabled the rogue software to install on Macs.
Encryption

MIT's New 5-Atom Quantum Computer Could Make Today's Encryption Obsolete (pcworld.com) 55

An anonymous reader writes: In traditional computing, numbers are represented by either 0s or 1s, but quantum computing relies on atomic-scale units, or "quibits," that can be simultaneously 0 and 1 -- a state known as a superposition that's far more efficient. It typically takes about 12 qubits to factor the number 15, but researchers at MIT and the University of Innsbruck in Austria have found a way to pare that down to five qubits, each represented by a single atom, they said this week. Using laser pulses to keep the quantum system stable by holding the atoms in an ion trap, the new system promises scalability as well, as more atoms and lasers can be added to build a bigger and faster quantum computer able to factor much larger numbers. That, in turn, presents new risks for factorization-based methods such as RSA, used for protecting credit cards, state secrets and other confidential data. "If you are a nation state, you probably don't want to publicly store your secrets using encryption that relies on factoring as a hard-to-invert problem," said Chuang. "Because when these quantum computers start coming out, [adversaries will] be able to go back and unencrypt all those old secrets."
Google

Eric Schmidt Gets A Job At The Pentagon (cnn.com) 37

An anonymous reader writes: Alphabet Chairman and former Google CEO Eric Schmidt is heading up a new effort to make the Pentagon more tech savvy. Secretary of Defense Ashton Carton on Wednesday appointed Schmidt the head of a new Defense Innovation Advisory Board, which will help the Pentagon keep up with the latest Silicon Valley ideas and apply them at the Department of Defense. The board will address problems in the way the Pentagon uses technology, and it will be tasked with offering "quick solutions." Schmidt's group will have no access to information about military operations strategy. Schmidt will oversee a group of up to 11 other board members, who also have led large private companies and public organizations.
Power

Scuba Diver Survives Being Sucked Into Nuclear Plant (nydailynews.com) 149

mdsolar writes: A man scuba diving in Florida somehow survived being sucked into a nuclear power plant in a terrifying log flume ride. Christopher Le Cun was boating off the coast of Hutchinson Island when he and his friend went under to check out three large shadows beneath the waves that looked like buildings. After diving down, he felt a current that quickly pulled him toward one of three intake pipes, got sucked in and was immersed in darkness for five minutes in the water being taken to cool the St. Lucie Nuclear Power Plant. Le Cun told WPTV that he thought he was going to be chopped into tiny bits when he hit a turbine at the end of the 16-foot-wide, quarter-mile tube. However, the turbine never came, and the pipe eventually spat him out into a reservoir at the plant holding water used to cool the nuclear reactor. After finding a passing worker, Le Cun was able to call wife Brittany, who thought her husband was dead after seeing the shocked face of his diving partner.
Privacy

How Common Is Your PIN? (datagenetics.com) 67

phantomfive writes: We've seen password frequency lists, here is an analysis of PIN frequency with a nice heatmap towards the bottom. There is a line for numbers starting with 19*, which is the year of birth, a cluster around MM/DD for people's birthdays, and a hard diagonal line for the same digit repeated four times.
Databases

Crossword Database Analysis Spots What Looks Like Plagiarism 39

Seattle software developer Saul Pwanson has a hobby of developing crossword puzzles, but another related hobby, too: analyzing the way that existing puzzles have been constructed. He created a database that aggregates puzzles that have appeared in various publications, including, crucially, the New York Times and USA Today, and sorts them based on similarities. Puzzles that have a greater percentage of the same black squares, or the same letters in identical positions, are ranked as more similar. Crosswords often re-use answers; puzzle-solvers are used to encountering some of the usual glue words that connect parts of the grid. As 538 reports, though, Pwanson noticed something odd in the data: Many of the puzzles that appeared in USA Today and affiliated publications, listed under various creators' names but all published under Timothy Parker as editor, were highly similar to each other, differing in as little as four answer words. These Pwanson classifies as "shoddy" -- they seem to be about as different as test responses based on a passed-around answer sheet. These seem to shortchange readers expecting original works, but may represent no real copyright problem, since Universal Uclick holds the copyright to them all. Perhaps puzzle enthusiasts aren't surprised that a publishing syndicate economizes on crosswords with slight variations, or that horoscopes are sometimes recycled.

However, another tranche of puzzles Pwanson calls "shady": these are puzzles that bear such strong resemblance in their central clues and answers to puzzles that have appeared in the New York Times that it's very hard to accept Parker's claim that the overlap is coincidental. In one example given, for instance, the answers "Drive Up the Wall," "Get On One's Nerves," and "Rub the Wrong Way" appeared in the same order and the same position in a Parker-edited puzzle that appeared in USA Today in June 2010 as they had in a Will Shortz-edited puzzle published nine years before in the New York Times.
Privacy

No, Turning On Your Phone Is Not Consenting To Being Tracked By Police (theintercept.com) 59

An anonymous reader writes: The Maryland Court of Special Appeals on Wednesday upheld a historic decision by a state trial court that the warrantless use of cell-site simulators, or Stingrays, violates the Fourth Amendment. The trial had suppressed evidence obtained by the warrantless use of a Stingray -- the first time any court in the nation had done so. Last April, a Baltimore police detective testified that the department has used Stingrays 4,300 times since 2007, usually without notifying judges or defendants. Stingrays mimic cellphone towers, tricking nearby phones into connecting and revealing users' locations. Stingrays sweep up data on every phone nearby -- collecting information on dozens or potentially hundreds of people. The ruling has the potential to set a strong precedent about warrantless location tracking.
Cellphones

Samsung Galaxy S7's Moisture Warning Prevents Charging When Wet (hothardware.com) 58

MojoKid writes: The Samsung Galaxy S7 and S7 Edge don't officially launch for a few more days, but some carriers appear to have shipped pre-orders early and some phones are already in consumers' hands. One early Galaxy S7 Edge owner appears to have tested his phones' water-resistance already and uncovered another new feature in the process. The user submerged his Galaxy S7 Edge in water and snapped a photo, then about four hours later plugged the phone into its fast charger and a warning popped-up on screen that stated, "Moisture detected in charging port", and the phone wouldn't charge. The user dried the phone and let it sit for a while, and it eventually started to charge again, but it wouldn't quick charge any longer. Frustrated, the user RMA'd the phone and plans to send it back to T-Mobile. The Galaxy S7 is IP68 rated, which means it is sealed against dust and can handle continuous submersion in up to 1 meter of water. However, the water detection feature that's apparently built into the Galaxy S7 is a good idea. Though the devices are IP68 rated, a few drops of water in the charging port could easily cause a short when the phone is plugged in.
News

Former First Lady Nancy Reagan Dead At 94 (nbcnews.com) 160

An anonymous reader writes: Former first lady Nancy Reagan has died, according to a spokeswoman with the Reagan Library. She was 94. The cause of death was congestive heart failure, according to her rep Joanne Drake. "Mrs. Reagan will be buried at the Ronald Reagan Presidential Library in Simi Valley, California, next to her husband, Ronald Wilson Reagan, who died on June 5, 2004," Drake wrote in a statement. May she rest in peace.
OS X

BorgBackup 1.0.0 Released (github.com) 47

An anonymous reader writes: After almost a year of development, bug fixing and cleanup, BorgBackup 1.0.0 has been released. BorgBackup is a fork of the Attic-Backup project — a deduplicating, compressing, encrypting and authenticating backup program for Linux, FreeBSD, Mac OS X and other unixoid operating systems (Windows may also work using CygWin, but that is rather experimental/unsupported). It works on 32bit as well as on 64bit platforms, x86/x64 and ARM CPUs (maybe as well on others, but these are the tested ones). For Linux, FreeBSD and Mac OS X, there are single-file binaries which can be just copied onto a system and contain everything needed (Python, libraries, BorgBackup itself). Of course, it can be also installed from source. BorgBackup is FOSS (BSD License) and implemented in Python 3 (91%), speed critical parts are in C or Cython (9%).
News

Oregon Set To Become First Coal-Free State (huffingtonpost.com) 99

New submitter daubney writes: Oregon lawmakers have approved legislation to eliminate coal from the state's electrical supply by 2035, the first U.S. state to do so. The bill, called the Clean Electricity and Coal Transition plan, commits the state to doubling its use of renewable energy, including solar and wind, to 50 percent by 2040. The bill, passed this week by both legislative branches, now heads to Gov. Kate Brown. Brown said in a statement that the legislation "equips Oregon with a bold and progressive path towards the energy resource mix of the future." Today, roughly one-third of Oregon's power is produced from coal, according to the Oregon Department of Energy. The measure makes Oregon the first state to eliminate coal by legislative action, The Associated Press reports. According to the National Conference of State Legislatures, Oregon is matched only by Hawaii, with a 100 requirement by 2045, Vermont, with a 75 percent target by 2032, and California and New York, with 50 percent goals by 2030.
Network

Email Inventor Ray Tomlinson Dies At 74 (techrepublic.com) 37

vikingpower writes: ARPAnet pioneer and networking legend Ray Tomlinson, who is best known for his contributions in developing email standards, has died at 74. Tomlinson was best known for choosing the @ symbol to indicate a message should be sent to a different computer on a network. He also led development of standards for the from, subject, and date fields found in every email message sent today. When Tomlinson first showed his invention to his colleague Jerry Burchfiel, Tomlinson said, "Don't tell anyone! This isn't what we're supposed to be working on." May Ray rest in peace in /dev/null.
The Military

It Turns Out the F-35 Can Dogfight (defensenews.com) 133

An anonymous reader writes: Writing for Defense News Lara Seligman reports, "For the first time since a controversial report detailing how the F-35 performs in a dogfight emerged last summer, an F-35 pilot gave an in-depth analysis of his experience flying the jet in a close-range battle scenario. Norwegian Air Force Maj. Morten 'Dolby' Hanche, the first Norwegian to fly the F-35, analyzed the jet's performance in a dogfight in a March 1 blog post published on Norway's Ministry of Defense website. Although Hanche never mentions the 2015 report, 'F-35A High Angle of Attack Operational Maneuvers' revealed last summer by blogger David Axe on WarisBoring.com, he counters many of the anonymous author's claims."
Android

Amazon Backpedals On Encryption, But Fire "Still Sucks" 58

Just a day after it made headlines for announcing that it would remove encryption from its line of FireOS devices, reports Ars Technica, the company has reverted the change, and says that encryption will again be a user-selectable option, with an update to come sometime this Spring. Judging from comments here on Slashdot, that ought to please a lot of people. However, encryption isn't the Fire's only problem; Ricki Jennings at ComputerWorld has collected some of the user reaction to the change, and says that anemic hardware means that even with this small course correction, the Fire tablets themselves "still suck." I'm not so sure; I bought one of the low-end Fire tablets and returned it, disappointed not in the hardware (seemed not bad at all for $50, with a decent screen, snappy video, and sound that was better than reviews had led me to expect) but rather by the intentional limitations of the OS itself.

Slashdot Top Deals