A Detailed Guide to Cell Phone Insurance in the US

Phone insurance isn’t an exciting topic. But it is a topic a lot of people have questions about, particularly when it comes to two things: who’s the best, and is phone insurance actually a good investment? As you’ll see, those questions don’t really have an easy answer. But I’m going to break down a few of the US’s most popular insurers, alternatives (like your homeowners policy), and explore whether phone insurance is even actually a good idea given your individual needs. Read more…        

Read this article:
A Detailed Guide to Cell Phone Insurance in the US

How to Set Up the Ultimate Personal Google Maps

Google Maps is constantly getting updated with new features, but the use of those features isn’t always obvious. If you find yourself using Google Maps just to get from address to address, you’re missing out on a ton of the ways Google makes it easier to get around. Here’s how to really use those personalization options to your advantage. Read more…        

View post:
How to Set Up the Ultimate Personal Google Maps

Single Developer Responsible For Over 47k Apps In BlackBerry World

hypnosec writes “If you are a BlackBerry owner, navigate to BlackBerry World (or just visit the website) and you will find that developer S4BB has developed over 47k apps for the BB platform. Unsurprisingly, most of them are just spammy apps that don’t add any value. Apps like ‘Restart Me Free, ‘ ‘Daily Quote, ‘ ‘Lock for SMS, ‘ ‘Search for Amazon, ‘ ‘Silent Foto Free’ are just a few among the thousands of apps on BlackBerry World that actually have no utility whatsoever. BlackBerry announced back in May that developers were increasingly interested in making apps for the platform, and that BlackBerry World had more than 120, 000 apps. This raises questions about the authenticity of the claims, and about the approval process that’s been accepting these apps. S4BB may have a few useful apps for the platform, but that doesn’t mean all of their apps are of ‘A’ quality. A statement from BlackBerry said, ‘Developers in all app stores employ a number of different monetization tactics. BlackBerry World is an open market for developers and we let market forces dictate the success or failure of these tactics.'” Read more of this story at Slashdot.

Original post:
Single Developer Responsible For Over 47k Apps In BlackBerry World

Kickass Torrents’ KAT.ph Domain Seized By Philippine Authorities

hypnosec writes “Kickass Torrents hasn’t been accessible since sometime yesterday, and now it has been confirmed that the domain name of the torrent website has been seized by Philippine authorities. Local record labels and the Philippine Association of the Recording Industry said that the torrent site was doing ‘irreparable damages’ to the music industry and following a formal complaint the authorities resorted to seizure of the main domain name. The site hasn’t given up, and is operating as usual under a new domain name. The government of the Philippines has confirmed that the domain name has been seized based on formal complaints and copyright grounds.” Read more of this story at Slashdot.

Continue reading here:
Kickass Torrents’ KAT.ph Domain Seized By Philippine Authorities

AMI Firmware Source Code, Private Key Leaked

Trailrunner7 writes “Source code and a private signing key for firmware manufactured by a popular PC hardware maker American Megatrends Inc. (AMI) have been found on an open FTP server hosted in Taiwan. Researcher Brandan Wilson found the company’s data hosted on an unnamed vendor’s FTP server. Among the vendor’s internal emails, system images, high-resolution PCB images and private Excel spreadsheets was the source code for different versions of AMI firmware, code that was current as of February 2012, along with the private signing key for the Ivy Bridge firmware architecture. AMI builds the AMIBIOS BIOS firmware based on the UEFI specification for PC and server motherboards built by AMI and other manufacturers. The company started out as a motherboard maker, and also built storage controllers and remote management cards found in many Dell and HP computers. ‘The worst case is the creation of a persistent, Trojanized update that would allow remote access to the system at the lowest possible level,’ researcher Adam Caudill said. ‘Another possibility would be the creation of an update that would render the system unbootable, requiring replacement of the mainboard.'” Read more of this story at Slashdot.

Read more here:
AMI Firmware Source Code, Private Key Leaked

Version 2.0 Released For Open Skype Alternative Jitsi

New submitter emilcho writes with news for anyone looking for a Free alternative to Skype “Among the most prominent new features people will find quality multi-party video conferences for XMPP, audio device hot-plugging, support for Outlook presence and calls, an overhauled user interface and support for the Opus and VP8 audio/video codec. Jitsi has lately shaped into one of the more viable open Skype Alternatives with features such as end-to-end ZRTP encryption for audio and video calls. The 2.0 version has been in the works for almost a year now, so this is an important step for the project” There are prebuilt packages from Debian, Ubuntu, Arch, Fedora, Windows, and OS X. Read more of this story at Slashdot.

See more here:
Version 2.0 Released For Open Skype Alternative Jitsi

BitTorrent Launches Dropbox Alternative

redletterdave writes “On Friday morning, BitTorrent launched the alpha test of a new, free public service called BitTorrent Sync, which allows users to securely back up and sync files over the Web using BitTorrent’s platform. Unlike competing services such as Box or Dropbox, BitTorrent Sync doesn’t store files on remote servers (which means that no third party has access to one’s files), and also has no storage limits other than what your devices can hold.” Read more of this story at Slashdot.

See more here:
BitTorrent Launches Dropbox Alternative

Israel To Get Massive Countrywide Optical Upgrade

A Google Fiberhood-style rollout in the U.S., says a Goldman-Sachs estimate, would cost in the neighborhood of $140 billion. Even for Israel, a country approximately the size of New Jersey, there’s a high pricetag (“billions of shekels”) for installing fiber optics dense enough to reach most of the population, but just a massive fiber-optic rollout is planned, with the project led by Swedish firm Viaeuropa. If the scheme succeeds, it will cover two thirds of the country over the next 10 years or so. Read more of this story at Slashdot.

Originally posted here:
Israel To Get Massive Countrywide Optical Upgrade

Skeleton Muscle Bot Brings I, Robot’s Future One Step Closer

Eerily reminiscent of the design of Sonny and the other NS-5s in I, Robot , Kenshiro is the University of Tokyo’s latest attempt to create a humanoid robot that accurately mimics human movement. And the researchers there believe the best way to build an artificial human is to simply copy our anatomy, particularly our muscular and skeletal systems. More »

Visit site:
Skeleton Muscle Bot Brings I, Robot’s Future One Step Closer

New 25-GPU Monster Devours Strong Passwords In Minutes

chicksdaddy writes “A presentation at the Passwords^12 Conference in Oslo, Norway (slides), has moved the goalposts on password cracking yet again. Speaking on Monday, researcher Jeremi Gosney (a.k.a epixoip) demonstrated a rig that leveraged the Open Computing Language (OpenCL) framework and a technology known as Virtual Open Cluster (VCL) to run the HashCat password cracking program across a cluster of five, 4U servers equipped with 25 AMD Radeon GPUs communicating at 10 Gbps and 20 Gbps over Infiniband switched fabric. Gosney’s system elevates password cracking to the next level, and effectively renders even the strongest passwords protected with weaker encryption algorithms, like Microsoft’s LM and NTLM, obsolete. In a test, the researcher’s system was able to generate 348 billion NTLM password hash checks per second. That renders even the most secure password vulnerable to compute-intensive brute force and wordlist (or dictionary) attacks. A 14 character Windows XP password hashed using LM for example, would fall in just six minutes, said Per Thorsheim, organizer of the Passwords^12 Conference. For some context: In June, Poul-Henning Kamp, creator of the md5crypt() function used by FreeBSD and other, Linux-based operating systems, was forced to acknowledge that the hashing function is no longer suitable for production use — a victim of GPU-powered systems that could perform ‘close to 1 million checks per second on COTS (commercial off the shelf) GPU hardware,’ he wrote. Gosney’s cluster cranks out more than 77 million brute force attempts per second against MD5crypt.” Read more of this story at Slashdot.

See original article:
New 25-GPU Monster Devours Strong Passwords In Minutes