Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Music

Apple Outrages Users By Automatically Installing U2's Album On Their Devices 610

Zanadou writes "Apple may have succeeded at breaking two records at once with the free release of U2's latest album, titled Songs of Innocence, via iTunes. But now, it looks like it's also on track to become one of the worst music publicity stunts of all time. Users who have opted to download new purchases to their iPhones automatically have found the new U2 album sitting on their phones. But even if iTunes users hadn't chosen automatic downloads, Songs of Innocence will still be displayed as an "iTunes in the Cloud" purchase. That means it will still be shown as part of your music library, even if you delete all the tracks. The only way to make the U2 album go away is to go to your Mac or PC and hide all of your "iTunes in the Cloud" purchases, or to use iTunes to manually hide each track from your purchased items list. Other reactions include rapper Tyler, The Creator saying that having the new U2 album automatically downloaded on his iPhone was like waking up with an STD. Update: 09/16 15:06 GMT by T : Note: Apple has released a fix.

Comment Re:OK (Score 1) 203

Unless you've used the same password for gmail as for whichever site has been hacked, it shouldn't matter. I found my gmail address, but the password had never been used at Google. The problem is if you've reused the password on a bunch of sites where your email address can be used as login.

Same here. My email address, but a password I use for throwaway sites that I don't care about accessing.

Iphone

Mining iPhones and iCloud For Data With Forensic Tools 85

A reader points out an article that walks us through the process of using forensic tools to grab data from iPhones and iCloud using forensic tools thought to have been employed in the recent celebrity photo leak. There are a number of ways to break into these devices and services depending on what kind of weakness an attacker has found. For example, if the attacked has possession of a target's iPhone, a simple command-line toolkit from Elcomsoft uses a jailbreak to bypass the iPhone's security. A different tool can extract iCloud data with access to a computer that has a local backup of a phone's data, or access to a computer that simply has stored credentials.

The discusses also details a method for spoofing device identification to convince iCloud to restore data to a device mimicking the target's phone. The author concludes, "Apple could go a long way toward protecting customer privacy just by adding a second credential to encrypt stored iCloud data. An encryption password could be used to decrypt the backup when downloaded to iTunes or to the device, or it could be used to decrypt the data as it is read by iCloud to stream down to the device."
Microsoft

Microsoft Paid NFL $400 Million To Use Surface, But Announcers Call Them iPads 405

mpicpp sends this news from Business Insider: Prior to the season, Microsoft and the NFL struck a 5-year, $400 million deal with one of the major components being that the Microsoft Surface would become "the official tablet of the NFL," with coaches and players using the Surface on the sidelines during games. But Microsoft and the league ran into a problem during week one of the season when at least two television announcers mistakenly referred to the tablets as iPads, giving a huge rival some unexpected exposure. The biggest blunder for the league came during the nationally televised Monday Night Football game when ESPN's Trent Dilfer joked about how long it took Cardinals assistant head coach Tom Moore to "learn how to use the iPad to scroll through the pictures." In a separate incident, Drew Brees of the New Orleans Saints was spotted by Fox commentator John Lynch using a Surface on the sideline. Lynch remarked that Brees was "not watching movies on his iPad.
Iphone

Apple Announces Smartwatch, Bigger iPhones, Mobile Payments 730

Today at Apple's September press conference, they announced the new iPhone 6 models. There are two of them — the iPhone 6 is 4.7" at 1334x750, and the iPhone 6 Plus is 5.5" at 1920x1080. Both phones are thinner than earlier models: 5S: 7.6mm, 6: 6.9mm, 6 Plus: 7.1mm. The phones have a new-generation chip, the 64-bit A8. Apple says the new phones have a 25% faster CPU, 50% faster GPU, and they're 50% more energy efficient (though they were careful to say the phones have "equal or better" battery life to the 5S). Apple upgrade the phones' wireless capabilities, moving voice calls to LTE and also enabling voice calls over Wi-Fi. The phones ship on September 19th, preceded by the release of iOS 8 on September 17th.

Apple also announced its entry into the payments market with "Apple Pay." They're trying to replace traditional credit card payments with holding an iPhone up to a scanner instead. It uses NFC and the iPhone's TouchID fingerprint scanner. Users can take a picture of their credit cards, and Apple Pay will gather payment information, encrypt it, and store it. (Apple won't have any of the information about users' credit cards or their purchases, and users will be able to disable the payment option through Find My iPhone if they lose the device.) Apple Pay will work with Visa, Mastercard, and American Express cards to start. 220,000 stores that support contactless payment will accept Apple Pay, and many apps are building direct shopping support for it. It will launch in October as an update for iOS 8, and work only on the new phones.

Apple capped off the conference with the announcement of the long-anticipated "Apple Watch." Their approach to UI is different from most smartwatch makers: Apple has preserved the dial often found on the side of analog watches, using it as a button and an input wheel. This "digital crown" enables features like zoom without obscuring the small screen with fingers. The screen is touch-sensitive and pressure sensitive, so software can respond to a light tap differently than a hard tap. The watch runs on a new, custom-designed chip called the S1, it has sensors to detect your pulse, and it has a microphone to receive and respond to voice commands. It's powered by a connector that has no exposed contacts — it magnetically seals to watch and charges inductively. The Apple Watch requires an iPhone of the following models to work: 6, 6Plus, 5s, 5c, 5. It will be available in early 2015, and will cost $349 for a base model.
Science

How Scientific Consensus Has Gotten a Bad Reputation 770

nerdyalien writes From the article: "Fiction author Michael Crichton probably started the backlash against the idea of consensus in science. Crichton was rather notable for doubting the conclusions of climate scientists—he wrote an entire book in which they were the villains—so it's fair to say he wasn't thrilled when the field reached a consensus. Still, it's worth looking at what he said, if only because it's so painfully misguided: 'Let's be clear: the work of science has nothing whatever to do with consensus. Consensus is the business of politics. Science, on the contrary, requires only one investigator who happens to be right, which means that he or she has results that are verifiable by reference to the real world. In science consensus is irrelevant. What is relevant is reproducible results.'" As a STEM major, I am somewhat biased toward "strong" evidence side of the argument. However, the more I read literature from other, somewhat-related fields (i.e. psychology, economics and climate science), the more I felt they have little opportunity to repeat experiments, similar to counterparts in traditional hard science fields. Their accepted theories are based on limited historical occurrences and consensus among the scholars. Given the situation, it's important to understand what "consensus" really means.
Facebook

Facebook's Auto-Play Videos Chew Up Expensive Data Plans 108

Another good reason to be annoyed by autoplaying videos online: it eats up dataplan allowances, making for some rude surprises. I'm always nervous about data allowances, and sites should be cautious about what they shove at you; turning off the autoplay feature isn't hard (and it's explained in the second article linked above), but I sure wish it was the default setting, or at least caught and handled by a browser extension. (Perhaps this is a job for Social Fixer's next iteration.) Is Facebook the worst offender on this front?
Bug

Some Core I7 5960X + X99 Motherboards Mysteriously Burning Up 102

An anonymous reader writes "Intel's Haswell-E Eight-Core CPU and X99 motherboards just debuted but it looks like there may be some early adoption troubles leading to the new, ultra-expensive X99 motherboards and processors burning up. Phoronix first ran a story about their X99 motherboard having a small flame and smoke when powering up for the first time and then Legit Reviews also ran an article about their motherboard going up in smoke for reasons unknown. The RAM, X99 motherboards, and power supplies were different in these two cases. Manufacturers are now investigating and in at least the case of LR their Core i7-5960X also fried in the process."
ISS

Space Station's 'Cubesat Cannon' Has Gone Rogue 143

astroengine writes: Last night (Thursday), two more of Planet Lab's shoebox-sized Earth imaging satellites launched themselves from aboard the International Space Station, the latest in a series of technical mysteries involving a commercially owned CubeSat deployer located outside Japan's Kibo laboratory module. Station commander Steve Swanson was storing some blood samples in one of the station's freezers Friday morning when he noticed that the doors on NanoRack's cubesat deployer were open, said NASA mission commentator Pat Ryan. Flight controllers at the Johnson Space Center in Houston determined that two CubeSats had been inadvertently released. "No crew members or ground controllers saw the deployment. They reviewed all the camera footage and there was no views of it there either," Ryan said.
Android

Moto 360 Reviews Arrive 87

An anonymous reader writes: Reviews for the Moto 360 smartwatch have started to roll in. David Pierce at The Verge praises the design: the circular display is framed by an unadorned, stainless steel shell, and fastened to your wrist with a simple leather strap. At the same time, he criticized the battery life, saying the device averaged around 12 hours of use before it needed to be charged. Pierce adds, "The Moto 360's most impressive feature is that I stopped noticing it almost immediately. Whenever I wear the LG G Watch or the Samsung Gear Live, I'm constantly compelled to fidget with it; there's this unexplainable feeling of having something alien on my wrist that is there because I need to use it. The 360, on the other hand, just vanished into the spot left on my wrist by the Seiko watch that conveniently died this week." AnandTech takes a deeper dive into the device's hardware, noting that the TI OMAP 3 processor is built on a somewhat old 45nm process, which necessitates higher power consumption than newer, smaller processes. The Wall Street Journal says it's easy to get used to speaking into your watch for basic functions, but the software — and thus, the Moto 360 as a whole — still isn't quite ready for prime time. However, almost all the reviews agree that the smartwatch's time is coming.
Space

Welcome To Laniakea, Our New Cosmic Home 67

astroengine writes Using a new mapping technique that takes into account the motions — and not just the distances — of nearby galaxies, astronomers discovered that the Milky Way is located in the suburb of a massive, previously unknown super-cluster they named Laniakea, a term from Hawaiian words meaning "immeasurable heaven." Actually, Laniakea's girth is measurable, though difficult to conceptualize. The super-cluster spans 520 million light-years in diameter, more than five times larger than the cluster previously believed to be the Milky Way's cosmic home.
Cloud

Apple Denies Systems Breach In Photo Leak 311

Hamsterdan notes that Apple has posted an update to its investigation into the recently celebrity photo leak, which was attributed to a breach of iCloud. Apple says the leak was not due to any flaw in iCloud or Find My iPhone, but rather the result of "a targeted attack on user names, passwords and security questions." Despite this, Wired reports that hackers on an anonymous web board have been openly discussing a piece of software designed for use by law enforcement. Whether it was involved in the celebrity attacks or not, it's currently being used to impersonate a user's device in order to download iCloud backups.

"For Apple, the use of government forensic tools by criminal hackers raises questions about how cooperative it may be with Elcomsoft. The Russian company’s tool, as Zdziarski describes it, doesn't depend on any 'backdoor' agreement with Apple and instead required Elcomsoft to fully reverse engineer Apple’s protocol for communicating between iCloud and its iOS devices. But Zdziarski argues that Apple could still have done more to make that reverse engineering more difficult or impossible." Meanwhile, Nik Cubrilovic has waded into the data leak subculture that led to this incident and provides insight into the tech and the thinking behind it.

Why Phone Stores Should Stockpile Replacements 253

Bennett Haselton writes: I would be in favor of a regulation requiring cell phone stores to have replacement phones on hand, for any phone model covered by a customer's insurance policy. Then customers who have insurance protection on their phones could get the damaged phones replaced instantly, and the replacement phones that are normally mailed out by overnight mail to customers under their protection plan, could instead be mailed to the stores to replace the one they just gave out to the customer. Read on for the rest of Bennett's thoughts

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...