×
Network

Wi-Fi Alliance Begins Certification Process For Short-Range Wireless Standard WiGig (802.11ad) (cnet.com) 69

The stars have finally aligned for WiGig, an ultra-fast, short-range wireless network. The Wi-Fi Alliance has launched a certification process for WiGig products, which it claims, can go as fast as 8Gbps. The technology was first announced in 2009, and it is based on IEEE 802.11ad standard that is supported by many new products. CNET adds:That speed is good enough to replace network cables today. And tomorrow, WiGig should be good for beaming high-resolution video from your phone to your 4K TV or linking a lightweight virtual-reality headset to its control computer. VR and its cousin, augmented reality, work better when you don't have a thick cable tethering your head to a PC. New speed is especially helpful when conventional wireless networks clog up. We're all streaming video at higher resolutions, hooking up new devices like cars and security cameras to the network, and getting phones for our kids. Another complication: Phones using newer mobile data networks can barge in on the same radio airwaves that Wi-Fi uses. Saturation of regular Wi-Fi radio channels "will create a demand for new spectrum to carry this traffic," said Yaron Kahana, manager of Intel's WiGig product line. "In three years we expect WiGig to be highly utilized for data transfer." WiGig and Wi-Fi both use unlicensed radio spectrum available without government permission -- 2.4 gigahertz and 5GHz in the case of Wi-Fi. Unlicensed spectrum is great, but airwaves are already often crowded. WiGig, though, uses the 60GHz band that's unlicensed but not so busy. You will want to check for WiGig sticker in the next gear you purchase.
Books

Spanish Police Arrest Their First Ever eBook Pirate (torrentfreak.com) 48

An anonymous reader writes: Spain's Ministry of the Interior has announced the first ever arrest of an eBook pirate. The suspect is said to have uploaded more than 11,000 literary works online, many on the same day as their official release. More than 400 subsequent sites are said to have utilized his releases. The investigation began in 2015 following a complaint from the Spanish Reproduction Rights Centre (CEDRO), a non-profit association of authors and publishers of books, magazines, newspapers and sheet music. According to the Ministry, CEDRO had been tracking the suspect but were only able to identify him by an online pseudonym. However, following investigations carried out by the police, his real identity was discovered.
Television

Sharp Unveils 27-inch 8K 120Hz IGZO Monitor With HDR (monitornerds.com) 105

Sharp has unveiled a next-gen monitor that is an absolute mouthful. It measures in at 27-inches and features a 8K resolution (7,680 x 4,320), HDR (high dynamic range), and a 120Hz refresh rate. Monitornerds reports: Sharp says that the IGZO name is an acronym for the semiconductor materials used in the monitor's backplane. It is comprised of indium, gallium, zinc, and oxygen. This material can also be utilized with several types of panels such as IPS, TN, and even OLED. The IGZO technology has benefits compared to standard silicon semiconductors in which the electron mobility is 20 to 50 times higher which translates to higher frame rates. It also uses smaller transistors, which translates to higher pixel density as well as lower power consumption. The panel which is show at the Sharp exhibit is a 27-inch model with a very notable pixel density of 326ppi: double in comparison to the average 150ppi of 4K monitors. It has a stunning 33 million pixels under its belt as well as HDR technology which promises that this monitor can deliver stunning images with ease. Sharp didn't disclose a price for the television, nor did they say whether or not the unit will be mass produced. However, we can imagine the monitor will cost a pretty penny if it ever makes it to the market.
Security

Alleged Hacker Lauri Love To Be Extradited To US (bbc.com) 71

An anonymous reader quotes a report from BBC: An autistic man suspected of hacking into U.S. government computer systems is to be extradited from Britain to face trial, a court has ruled. Lauri Love, 31, who has Asperger's syndrome, is accused of hacking into the FBI, the U.S. central bank and the country's missile defense agency. Mr Love, from Stradishall, Suffolk, has previously said he feared he would die in a U.S. prison if he was extradited. Earlier, his lawyer said his alleged hacking had "embarrassed" U.S. authorities. Tor Ekeland said the U.S. government "had very, very bad security and these hacks utilized exploits that were publicly-known for months." Mr Love's lawyers said he could face up to 99 years in prison if convicted of the hacking offenses. Mr Love's defense team argues his depression and Asperger's syndrome mean he should not be sent abroad, but U.S. prosecutors say he is using his mental health issues as an excuse to escape justice.
Government

Where Does America's E-Waste End Up? GPS Tracker Tells All (pbs.org) 100

The United States produces more e-waste than any country in the world, reports PBS News Hour. But where does this e-waste go? The publication utilized the GPS coordinates in some of the e-waste to find out. Basel Action Network, a Seattle-based e-waste watchdog group partnered with MIT to put 200 geolocating tracking devices inside old computers, TVs and printers. They dropped them off nationwide at donation centers, recyclers and electronic take-back programs -- enterprises that advertise themselves as "green," "sustainable," "earth friendly" and "environmentally responsible." From the report: About a third of the tracked electronics went overseas -- some as far as 12,000 miles. That includes six of the 14 tracker-equipped electronics that e-waste watchdog group dropped off to be recycled in Washington and Oregon. The tracked electronics ended up in Mexico, Taiwan, China, Pakistan, Thailand, Dominican Republic, Canada and Kenya. Most often, they traveled across the Pacific to rural Hong Kong. You can read the report in its entirety here.
Open Source

11 Years After Git, BitKeeper Is Open-Sourced (phoronix.com) 197

An anonymous reader writes: Eleven years after Linus Torvalds developed Git after a falling out with BitKeeper for managing the Linux kernel source code, BitMover Inc has finally decided to open-source the BitKeeper VCS. The latest BitKeeper release has made the code open-source under the terms of the Apache 2.0 license. The community edition code is available from BitKeeper.org. Does BitKeeper now stand a chance against free software systems like Git and SVN?To offer some context, Larry McVoy, the CEO of BitMover -- the company that makes BitKeeper -- offered free BitKeeper licenses to various open source projects -- Linux kernel utilized it as well. However, later, Australian computer programmer Andrew Tridgell reverse engineered BitKeeper protocol in an attempt to make his own client. Torvalds didn't like this practice, and accused Tridgell of "playing dirty tricks with his proprietary source code tool of choice," and as a result, he wrote Git.
Communications

FBI Paid Professional Hackers One-Time Fee To Crack San Bernardino iPhone 149

There's another new wrinkle in the never-ending FBI vs Apple saga. The Washington Post is claiming that FBI did not require Cellebrite's assistance in hacking San Bernardino iPhone. Instead, the report claims, the government intelligence organization bought a previously unknown security bug from a group of professional hackers. According to the report, the hacker group provided FBI with at least one zero-day flaw in the iPhone 5c's security, which enabled FBI to circumvent the lockscreen and other security features. The bug hasn't been disclosed. FBI has previously noted that the technique it utilized in breaking into the iPhone 5c does not work with any new iPhone models (iPhone 5s or newer).
Earth

Behind the Scenes of NASA's Orbital ATK ISS Resupply Mission (hothardware.com) 25

Reader MojoKid sheds more light on NASA's unmanned cargo ship: The Orbital ATK CRS-6 mission that launched last week at NASA Cape Canaveral, Florida not only delivered supplies to the International Space Station (ISS), but also carried a number of research projects on NASA's Cygnus spacecraft. On board the CRS-6 were Gecko Grippers, which attempt to mimic the adhesion properties of gecko feet. Through the use of nanomaterials, Gecko Grippers can be repeatedly applied and removed from a surface without losing their adhesive properties via the use of van der Waals forces. They are also unaffected by temperature, pressure or radiation. Also in tow for the mission are supplies for the Saffire Experiment, which will be the largest man-made fire in space with data beamed back to earth so researchers can understand its properties and results. It's also impressive to see the NASA VAB (Vehicle Assembly Building), which is one of the biggest structures in the world covering 8 acres and measuring 525 ft tall, as well as the SLS Crawler, which is designed to move large spacecraft components supporting up to 18 million pounds and has been utilized for the Apollo and Space Shuttle programs.
Power

Miniature Fuel Cell To Keep Drones Aloft For Over An Hour (gizmag.com) 61

Zothecula writes: Drones are being utilized in everything from parcel delivery to search and rescue, but their limited flight times are restricting their ability to travel great distances or stay for extended periods of time in the field. Simply adding more batteries, however, affects flight characteristics and reduces the load the drone can carry. To help solve this problem, researchers at the Pohang University of Science and Technology (Postech) have created a miniature fuel cell they claim not only provides enough energy to keep a drone in the sky for over an hour, but may well find applications in powering everything from smartphones to cars in the not-too-distant future. Developed by Professor Gyeong Man Choi and his Ph.D. student Kun Joong Kim at Postech, the new solid oxide fuel cell is claimed by the researchers to be the first to use porous stainless steel in combination with thin-film electrolyte, all brought together using a technique known as tape casting-lamination-cofiring. Allied with electrodes of low heat capacity, this amalgamation not only results in increased performance, but also in higher long-term durability. The Postech device generates power by converting hydrogen (in this case, "Wet" H2 gas comprising 97 percent H2 and 3 percent H2O mixture) supplied as fuel gas to the anode to create electricity. It does this through the use of a solid oxide material acting as the electrolyte that allows the conduction of negative oxygen ions from the cathode to the anode. These ions diffuse through the solid oxide electrolyte to the anode where they oxidize the fuel. This reaction produces electrons, which then flow through an external circuit to provide power.
Transportation

Airbus Rolls Out Anti-Drone System (networkworld.com) 168

coondoggie writes: The Airbus anti-drone system employs infrared cameras, radar technology and sensors to spot and track drones over six miles away, the company says. If the incoming drone is considered suspicious, the system can use electronic signals to jam the drone's communications and more: “Based on an extensive threat library and real-time analysis of control signals, a jammer interrupts the link between drone and pilot and/or its navigation. Furthermore, the direction finder tracks the position of the pilot who subsequently can be dealt with by law enforcement. Due to the Smart Responsive Jamming Technology developed by Airbus Defence and Space, the jamming signals are blocking only the relevant frequencies used to operate the drone while other frequencies in the vicinity remain operational. Since the jamming technology contains versatile receiving and transmitting capabilities, more sophisticated measures like remote control classification and GPS spoofing can be utilized as well. This allows effective and specific jamming and, therefore, a takeover of the UAV,” the company stated.
Operating Systems

Hackers Get Linux Running On a PlayStation 4 (engadget.com) 108

An anonymous reader writes: Two years after the PlayStation 4 was released, and two weeks after it was jailbroken, a group of hackers has now successfully installed Linux on it. "...it appears that the fail0verflow team utilized a WebKit bug similar to the one recently documented by GitHub user CTurt and then took things up a notch. CTurt's workaround focuses on the PlayStation 4's Webkit browser, which is tricked into freeing processes from the core of the console's operating system by an improvised webpage. The PS4 is powered by Sony's Orbis OS, which is based on a Unix-like software called FreeBSD. With a route into the console's system, fail0verflow then identified weaknesses in the PlayStation 4's GPU. It specifically called out engineers from semiconductor company Marvell, accusing them of 'smoking some real good stuff' when they designed the PlayStation 4's southbridge chip."
Electronic Frontier Foundation

Google Calls Out EFF Over Claims That It Snoops On Students With Chromebooks (hothardware.com) 100

MojoKid writes: The Electronic Frontier Foundation (EFF) caused quite a stir this week when it alleged that Google is using its Chromebook platform, which has made a significant impact in education markets, to snoop on students. The charges were damning, with the EFF claiming that Google was violating its own corporate policies and using students' personally identifiable browsing data/habits to refine its services, in addition to sharing that data with partners. Obviously, Google would take such allegations seriously, and has thus responded to every claim brought forth by the EFF. "While we appreciate the EFF's focus on student data privacy, we are confident that our tools comply with both the law and our promises, including the Student Privacy Pledge..." said Jonathan Rochelle, the Director of Google Apps for Education. With respect to Google Apps for Education Core Services (GAFE), Rochelle asserts that all student data stored is "only used to provide the services themselves" and that student data isn't used for advertising purposes, nor are ads served to students. Rochelle also explains that personally identifiable data of students is removed, and only aggregated data of its millions of users is utilized to help improve its services.
Twitter

Twitter Shuts Down JSON API and Names New CEO 104

An anonymous reader writes: This month Twitter is closing down the JSON endpoint API which thousands of third-party software and plugin developers have depended upon for years. The alternative Rest API offers data which is aggregated or limited in other ways, whilst the full-featured share data offered by Gnip (purchased last year by Twitter) can cost developers thousands per month to access — in one case up to £20,000 a month. The general objective seems to be to either drive users back to the core Twitter interface where they can be monetized via the social network's advertising, or to regain lost advertising by converting open source data — currently utilized a lot in scientific research — into premium information, offering the possibility for well-funded organizations to gain reputations as Twitter barometers without ever needing to expose the expensive, accurate share figures. The company also announced today that co-founder Jack Dorsey would be the new CEO.
Google

The Difficulty In Getting a Machine To Forget Anything 79

An anonymous reader writes: When personal information ends up in the analytical whirlpool of big data, it almost inevitably becomes orphaned from any permissions framework that the discloser granted for its original use; machine learning systems, commercial and otherwise, end up deriving properties and models from the data until the replication, duplication and derivation of that data can never hoped to be controlled or 'called back' by the originator. But researchers now propose a revision which can be imposed upon existing machine-learning frameworks, interposing a 'summation' layer between user data and the learning system, effectively tokenising the information without anonymising it, and providing an auditable path whereby withdrawal of the user information would ripple through all iterations of systems which have utilized it — genuine 'cancellation' of data.
Electronic Frontier Foundation

ESA Rebukes EFF's Request To Exempt Abandoned Games From Some DMCA Rules 153

eldavojohn writes It's 2015 and the EFF is still submitting requests to alter or exempt certain applications of the draconian DMCA. One such request concerns abandoned games that utilized or required online servers for matchmaking or play (PDF warning) and the attempts taken to archive those games. A given example is Madden '09, which had its servers shut down a mere one and a half years after release. Another is Gamespy and the EA & Nintendo titles that were not migrated to other servers. I'm sure everyone can come up with a once cherished game that required online play that is now abandoned and lost to the ages. While the EFF is asking for exemptions for museums and archivists, the ESA appears to take the stance that it's hacking and all hacking is bad. In prior comments (PDF warning), the ESA has called reverse engineering a proprietary game protocol "a classic wolf in sheep's clothing" as if allowing this evil hacking will loose Sodom & Gomorrah upon the industry. Fellow gamers, these years now that feel like the golden age of online gaming will be the dark ages of games as historians of the future try to recreate what online play was like now for many titles.
Businesses

Google Nest Rumored To Be Moving Into Audio 37

CIStud writes Google's Nest, best known for its innovated smart Nest thermostats and Nest Protect smoke detectors, has posted several new job positions for "Nest Audio" including a leadership position to handle "acoustics, audio electronics, audio SW, audio test and validation for all Nest Products." From the TechCrunch article: "This is a new frontier for Nest. The company has so far utilized little audio in its products. Instead, Nest has so far recruited a couple of audio companies to join Nest’s world of Internet of Things through the 'Works With Nest' developer program. 'Google will help us fully realize our vision of the conscious home and allow us to change the world faster than we ever could if we continued to go it alone. We’ve had great momentum, but [Google] is a rocket ship,' said co-founder Tony Fadell when Google bought the company."
Windows

Microsoft Finally Allows Customers To Legally Download Windows 7 ISOs 132

MojoKid writes: It's long been a pet peeve of many end users that Microsoft has made it such a challenge to procure a legitimate ISO image of its various operating systems. It seems like the company should have no problem offering them in an easy-to-find spot on its website, because after all, it's not like they can be taken utilized without a legal key. Sometimes, people simply lose the disc or ISO they had, and so it shouldn't be such a challenge to get a replacement. Fortunately, with a new feature on the Microsoft site, you are now able to get that replacement Windows 7 ISO. However, it's behind a bit of protection. You'll need to provide your legal product code, and then the language, in order to go through to the download page. If you've somehow lost your key but are still using the OS that it's tied to, you can retrieve it through a few different third party tools. However, it does seem like not all valid keys work properly just yet, since some users are reporting valid keys throwing errors or not enabling a download for some reason.
Crime

As Prison Population Sinks, Jails Are a Steal 407

HughPickens.com writes After rising rapidly for decades, the number of people behind bars peaked at 1.62 Million in 2009, has been mostly falling ever since down, and many justice experts believe the incarceration rate will continue on a downward trajectory for many years. New York, for example, saw an 8.8% decline in federal and state inmates, and California, saw a 20.6% drop. Now the WSJ reports on an awkward byproduct of the declining U.S. inmate population: empty or under-utilized prisons and jails that must be cared for but can't be easily sold or repurposed. New York state has closed 17 prisons and juvenile-justice facilities since 2011, following the rollback of the 1970s-era Rockefeller drug laws, which mandated lengthy sentences for low-level offenders. So far, the state has found buyers for 10 of them, at prices that range from less than $250,000 to about $8 million for a facility in Staten Island, often a fraction of what they cost to build. "There's a prisoner shortage," says Mike Arismendez, city manager for Littlefield, Texas, home of an empty five-building complex that sleeps 383 inmates and comes with a gym, maintenence shed, armory, and parking lot . "Everybody finds it hard to believe."

The incarceration rate is declining largely because crime has fallen significantly in the past generation. In addition, many states have relaxed harsh sentencing laws passed during the tough-on-crime 1980s and 1990s, and have backed rehabilitation programs, resulting in fewer low-level offenders being locked up. States from Michigan to New Jersey have changed parole processes, leading more prisoners to leave earlier. On a federal level, the Justice Department under Attorney General Eric Holder has pushed to reduce sentences for nonviolent drug offenders. Before 2010, the U.S. prison population increased every year for 30 years, from 307,276 in 1978 to a high of 1,615,487 in 2009. "This is the beginning of the end of mass incarceration," says Natasha Frost. "People don't care so much about crime, and it's less of a political focus."
Security

Heartbleed Bug Exploited Over Extensible Authentication Protocol 44

wiredmikey (1824622) writes "While most organizations have patched the Heartbleed bug in their OpenSSL installations, a security expert has uncovered new vectors for exploiting the vulnerability, which can impact enterprise wireless networks, Android devices, and other connected devices. Dubbed 'Cupid,' the new attack method was recently presented by Portuguese security researcher Luis Grangeia, who debunked theories that Heartbleed could only be exploited over TCP connections, and after the TLS handshake. Unlike the initial Heartbleed attack, which took place on TLS connections over TCP, the Cupid attack happens on TLS connections over the Extensible Authentication Protocol (EAP), an authentication framework typically used in wireless networks and peer-to-peer connections.

The researcher has confirmed that default installations of wpa_supplicant, hostapd, and freeradius (RADIUS server implementation) can be exploited on Ubuntu if a vulnerable version of OpenSSL is utilized. Mobile devices running Android 4.1.0 and 4.1.1 also use wpa_supplicant to connect to wireless networks, so they're also affected. Everything that uses OpenSSL for EAP TLS is susceptible to Cupid attacks. While he hasn't been able to confirm it, the expert believes iPhones, iPads, OS X, other RADIUS servers besides freeradius, VoIP phones, printers, and various commercial managed wireless solutions could be affected."
Television

Eavesdropping With a Smart TV 93

An anonymous reader writes "A article on The Register titled talks about a demo that was given in London last month by NCC Group where they turned a modern TV into an audio bug. 'The devices contain microphones and cameras that can be utilized by applications — Skype and similar apps being good examples. The TV has a fairly large amount of storage, so would be able to hold more than 30 seconds of audio – we only captured short snippets for demonstrations purposes. A more sophisticated attack could store more audio locally and only upload it at certain times, or could even stream it directly to a server, bypassing the need to use any of the device’s storage.' Given the Snowden revelations and what we've seen previously about older tech being deprecated, how can we protect ourselves with the modern devices (other than not connecting them to the Internet)?"

Slashdot Top Deals