Pokemon Go Becomes Biggest Mobile Game In US History

An anonymous reader writes: Pokemon Go is now the biggest mobile game of all time in the U.S. Not only has it surpassed Twitter’s daily users, but it is seeing people spend more time in its app than in Facebook. An earlier report from SimilarWeb says Pokemon Go has surpassed Tinder in terms of installations — the app surpassed Tinder on July 7th. Today, the tracking firm says Pokemon Go has managed to surpass Twitter in terms of daily active users on Monday. It says almost 6% of the entire U.S. Android population is engaging with the app on a daily basis. A new report from SurveyMonkey intelligence indicated that Pokemon Go has claimed the title “biggest mobile game in U.S. history.” The game saw just under 21 million daily active users in the U.S. on Monday. It’s reportedly closing in on Snapchat on Android, and could surpass Google Maps on Android as well. According to app store intelligence firm SensorTower, the average iPhone user on iOS spent 33 minutes catching Pokemon, which is more than any other apps it analyzed, including Facebook, Snapchat, Twitter, Instagram, and Slither.io. The app with the second-most average usage at 22 minutes, 8 seconds, was Facebook. SurveyMonkey did note that Pokemon Go still falls short of other games when it comes to time spent in games. Game of War sees nearly 2 hours of total daily usage for the average user, while Candy Crush Saga sees daily usage of about 43 minutes. In just two days, Pokemon Go brought Nintendo’s market value to $7.5 billion. It’s worth noting that it remains to be seen whether or not the game will continue to break records or turn into a ghost town like Nintendo’s first mobile game, Miitomo. Read more of this story at Slashdot.

View article:
Pokemon Go Becomes Biggest Mobile Game In US History

Sega Saturn’s DRM Cracked Almost 23 Years After Launch

An anonymous reader writes from a report via Gamasutra: The Sega Saturn’s DRM has finally been cracked after it hit store shelves nearly 23 years ago in November 1994. Engineer James Laird-Wah first set forth to break through the console’s copy protection in an attempt to harness its chiptune capabilities. Laird-Wah has, however, developed a way to run games and other software from a USB stick in the process. Since disc drive failure is a common fault with the game console, his method circumvents the disc drive altogether, instead reworking the Video CD Slot so it can take games stored on a USB stick and run them directly through the Saturn’s CD Block. “This is now at the point where, not only can it boot and run games, I’ve finished just recently putting in audio support, so it can play audio tracks, ” explained Laird-Wah, speaking to YouTuber debuglive. “For the time being, I possess the only Saturn in the world that’s capable of writing files to a USB stick. There’s actually, for developers of home-brew, the ability to read and write files on the USB stick that’s attached to the device. Read more of this story at Slashdot.

Link:
Sega Saturn’s DRM Cracked Almost 23 Years After Launch

Amazon’s Chinese Counterfeit Problem Is Getting Worse

A report on CNBC, citing sellers, says that counterfeit problem on the platform has gotten worse after it made it easier for Chinese manufacturers to sell goods to U.S. consumers. The report gives an example of a seller Jamie Whaley who started a bedding business on Amazon that reached $700, 000 in annual sales within three years. Her patented product called BedBand consists of a set of shock cords, clamps and locks designed to keep fitted bed sheets in place. Whaley found quite an audience, selling up to 200 units a day for $13.99 a set. BedBand climbed into the top 200 selling products in the home and kitchen category. That was 2013. By mid-2015, the business was in a tailspin. Revenue plummeted by half and Whaley was forced to lay off eight employees. Her sheet fastener had been copied by a legion of mostly Chinese knockoffs that undercut BedBand on price and jumped the seller ranks by obtaining scores of reviews that watchdog site Fakespot.com determined were inauthentic and “harmful for real consumers.” The report adds:Spend any time surveying Amazon sellers and Whaley’s narrative will start sounding like the norm. In Amazon’s quest to be the low-cost provider of everything on the planet, the website has morphed into the world’s largest flea market — a chaotic, somewhat lawless, bazaar with unlimited inventory. Always a problem, the counterfeiting issue has exploded this year, sellers say, following Amazon’s effort to openly court Chinese manufacturers, weaving them intimately into the company’s expansive logistics operation. Merchants are perpetually unsure of who or what may kill their sales on any given day and how much time they’ll have to spend hunting down fakers. Read more of this story at Slashdot.

Original post:
Amazon’s Chinese Counterfeit Problem Is Getting Worse

George Takei Opposes Gay Sulu In ‘Star Trek Beyond’

HughPickens.com writes: Seth Abramovitch reports in the Hollywood Reporter that actor and LGBT activist George Takei says Paramount’s plans to have Sulu’s character in the upcoming ‘Star Trek Beyond’ the first LGBTQ lead character in Star Trek history is out of step with what creator Gene Roddenberry would have wanted. [Roddenberry] “was a strong supporter of LGBT equality, ” says Takei, now 79. “But he said he has been pushing the envelope and walking a very tight rope — and if he pushed too hard, the show would not be on the air.” Takei says he’d much prefer that Sulu stay straight. “I’m delighted that there’s a gay character, ” says Takei. “Unfortunately, it’s a twisting of Gene’s creation, to which he put in so much thought. I think it’s really unfortunate.” The timeline logic of the new revelation is enough to befuddle even the most diehard of Trek enthusiasts, as the rebooted trilogy takes place before the action of the original series. In other words, assuming canon orthodoxy, this storyline suggest Sulu would have had to have first been gay and married, only to then go into the closet years later. Simon Pegg, who has co-written the latest Star Trek movie, as well as starring as Scotty, has responded to criticism by the actor George Takei at the film-makers’ decision to make the character he used to play openly gay. “He’s right, it is unfortunate, it’s unfortunate that the screen version of the most inclusive, tolerant universe in science fiction hasn’t featured an LGBT character until now. We could have introduced a new gay character, but he or she would have been primarily defined by their sexuality, seen as the ‘gay character, ‘ rather than simply for who they are, and isn’t that tokenism?” says Pegg. “Our Trek is an alternate timeline with alternate details. Whatever magic ingredient determines our sexuality was different for Sulu in our timeline. I like this idea because it suggests that in a hypothetical multiverse, across an infinite matrix of alternate realities, we are all LGBT somewhere.” Read more of this story at Slashdot.

See the article here:
George Takei Opposes Gay Sulu In ‘Star Trek Beyond’

Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

New submitter Miche67 writes: Two reports say Microsoft is working on an all-in-one (AIO) PC under the Surface brand. If that’s true, it would put it in competition with HP and Dell, which have their own AIO lines, as well as put it in competition with Apple’s iMac. Network World reports: “Both DigiTimes and Windows Central picked up on the story, each citing their own sources. DigiTimes, a Taiwan-based publication with connections to the PC industry over there (but also a very mixed record of accuracy) said the new devices would come in the third quarter of this year. Windows Central, which is a little better when it comes to rumors, said it did not have a solid release date.” Business Insider was able to find a patent filing by Microsoft for a desktop PC that supports the rumored AIO design. “The device is evidently targeting a ‘modern and elegant’ design and is meant to be something akin to a premium appliance or furniture, ” Windows Central wrote. Intel’s release date of the new Kaby Lake line of processors around Q3 of this year complicates things. While Kaby Lake is said to be more mobile-friendly with less power consumption and heat, they would make for a good choice for an AIO machine. However, it would be pushing it for Microsoft to release its AIO machines in the same quarter that Kaby Lake is due. On a semi-related note, a programmer at Building 88 recently confirmed that Microsoft will release Surface 5 devices next year powered by Kaby Lake processors. He posted pictures of four device holders marked “2017” on his Twitter account. Read more of this story at Slashdot.

See the original article here:
Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

An anonymous reader writes: Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor. The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn’t do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner. “This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system, ” said Tiberius Axinte, Technical Leader, Bitdefender Antimalware Lab. “For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless.” The malware, dubbed Backdoor.MAC.Eleanor, sets up a hidden Tor service and PHP-capable web server on the infected computer, generating a .onion domain that the attacker can use to connect to the Mac and control it. Once installed, the malware grants full access to the file system and can run scripts given to it by its masters.A report on AppleInsider says that malware can also control the FaceTime camera on a victim’s computer. But thankfully, Apple’s Gatekeeper security prevents the unsigned app from being installed. Read more of this story at Slashdot.

See the article here:
EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

TP-LINK Loses Control of Two Device Configuration Domains

Reader Orome1 writes: Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and that this fact could be misused by malware peddlers. TP-LINK has confirmed that they no longer own the domain in question, and will not be trying to buy it from the unknown seller for now. Instead, they intend to change the domain in the manuals to a newer one that’s already in use.ComputerWorld has more details. Read more of this story at Slashdot.

See the original article here:
TP-LINK Loses Control of Two Device Configuration Domains

Apple Is Suing A Man That Teaches People To Repair Their MacBooks

New submitter alzoron writes: After the failure of New York’s Fair Repair Act, independent third-party unauthorized Apple repair shops seem to be under attack. Louis Rossmann, owner of Rossman Repair Group, INC has uploaded a somewhat vague video alluding to his Youtube site, where he posts videos about repairing out of warranty repairs, possibly being shut down. Several sources (Reddit, Mac Kung Fu, 9to5Mac) have been speculating about this and whether or not Apple is behind this. Game Revolution reported on the video (Link is to cache version of the site since the report has since been removed), breaking down each section of the video. 6:52: Louis informs viewers that they can download YouTube videos. 7:41: Louis mentions that YouTube channels have a “finite lifespan, ” often because a large corporation has the power and money to shut them down. 8:42: Louis shares that he’s happy when he’s lived a difficult life so that he can be strong for the immense challenge that is ahead. 10:06: Louis shares that he is going to have to fight from his point onward. 11:22: Louis states that all his videos may soon be gone. 11:32: Louis mentions that his business may disappear. Given what Louis has mentioned, it’s apparent that Louis has been threatened by Apple likely for condemning its policies to a growing subscriber base, but also for showing users how to repair its hardware without going through Apple support. Read more of this story at Slashdot.

Read this article:
Apple Is Suing A Man That Teaches People To Repair Their MacBooks

You Can Now Browse Through 427 Millon Stolen MySpace Passwords

Stan Schroeder, writing for Mashable:An anonymous hacker managed to obtain an enormous number of user credentials in June 2013 from fallen social networking giant MySpace — some 427 million passwords, belonging to approx. 360 million users. In May 2016, a person started selling that database of passwords on the dark web. Now, the entire database is available online for free. Thomas White, security researcher also known by the moniker “Cthulhu, ” put the database up for download as a torrent file on his website, here. “The following contains the alleged data breach from Myspace dating back a few years. As always, I do not provide any guarantees with the file and I leave it down to you to use responsibly and for a productive purpose, ” he wrote. The file is 14.2 GB in size; downloading it might take some time. It is password-protected, but White made the password available on Twitter and his site. Read more of this story at Slashdot.

Read More:
You Can Now Browse Through 427 Millon Stolen MySpace Passwords