Researchers Find Same RSA Encryption Key Used 28,000 Times

itwbennett writes In the course of trying to find out how many servers and devices are still vulnerable to the Web security flaw known as FREAK, researchers at Royal Holloway of the University of London found something else of interest: Many hosts (either servers or other Internet-connected devices) share the same 512-bit public key. In one egregious example, 28, 394 routers running a SSL VPN module all use the same 512-bit public RSA key. Read more of this story at Slashdot.

See the original post:
Researchers Find Same RSA Encryption Key Used 28,000 Times

A look at Android 5.1: speed, security, tweaks

Four months after the first release of Android 5.0 Lollipop , Google has followed up with a second version: Android 5.1. The speedy turnaround time compared to Android 5.0 (which appeared a year after 4.4) means that there aren’t many large-scale changes to look at—but the release does feature numerous little improvements and tweaks. It’s faster! (on the Nexus 6, at least) Ron Amadeo 5.1 brings much faster random read and write speeds to the Nexus 6, and the Nexus 5 improves a little, too. 3 more images in gallery 5.1 seems to have eliminated many of the performance issues with the Nexus 6. When we initially reviewed the device, the Nexus 6 was slower at loading apps and switching tasks than the older Nexus 5 had been. With 5.1, the newer phone feels much snappier; with non-game apps, it can now keep pace with the Nexus 5. On benchmarks, we’re seeing much higher random read and write scores on the Nexus 6 with 5.1; random read gets a 2x speed boost, while random write is a whopping 9x faster. The same dramatic speed boosts aren’t present on the Nexus 5, and we suspect the difference is that the Nexus 6 is encrypted while the Nexus 5 is not. According to Francisco Franco , a longtime third-party Android kernel developer, Google is now using NEON instructions on the Nexus 6 to speed up encryption performance. Performance could be further improved by enabling hardware-accelerated encryption, which the Nexus 6 still doesn’t use, but Google has been experimenting with the feature in the Android Open Source Project. Read 7 remaining paragraphs | Comments

Read More:
A look at Android 5.1: speed, security, tweaks

How to Maximize Your Free Storage Space on Every Cloud Service

Between Dropbox, Google Drive, OneDrive and a half dozen other services, the sky’s the limit on how much cloud storage you can get. Here are some of the best ways to get extra free space on each service. Read more…

Read this article:
How to Maximize Your Free Storage Space on Every Cloud Service

Yik Yak Raises Controversy On College Campuses

HughPickens.com writes Jonathan Mahler writes in the NYT that just as Facebook swept through the dorm rooms of America’s college students a decade ago, the social app Yik Yak, which shows anonymous messages from users within a 1.5-mile radius is now taking college campuses by storm. “Think of it as a virtual community bulletin board — or maybe a virtual bathroom wall at the student union, ” writes Mahler. “It has become the go-to social feed for college students across the country to commiserate about finals, to find a party or to crack a joke about a rival school.” While much of the chatter is harmless, some of it is not. “Yik Yak is the Wild West of anonymous social apps, ” says Danielle Keats Citron. “It is being increasingly used by young people in a really intimidating and destructive way.” Since the app’s introduction a little more than a year ago, Yik Yak has been used to issue threats of mass violence on more than a dozen college campuses, including the University of North Carolina, Michigan State University and Penn State. Racist, homophobic and misogynist “yaks” have generated controversy at many more, among them Clemson, Emory, Colgate and the University of Texas. At Kenyon College, a “yakker” proposed a gang rape at the school’s women’s center. Colleges are largely powerless to deal with the havoc Yik Yak is wreaking. The app’s privacy policy prevents schools from identifying users without a subpoena, court order or search warrant, or an emergency request from a law-enforcement official with a compelling claim of imminent harm. Esha Bhandari, a staff attorney at the American Civil Liberties Union, argues that “banning Yik Yak on campuses might be unconstitutional, ” especially at public universities or private colleges in California where the so-called Leonard Law protects free speech. She said it would be like banning all bulletin boards in a school just because someone posted a racist comment on one of the boards. In one sense, the problem with Yik Yak is a familiar one. Anyone who has browsed the comments of an Internet post is familiar with the sorts of intolerant, impulsive rhetoric that the cover of anonymity tends to invite. But Yik Yak’s particular design can produce especially harmful consequences, its critics say. “It’s a problem with the Internet culture in general, but when you add this hyper-local dimension to it, it takes on a more disturbing dimension, ” says Elias Aboujaoude.” “You don’t know where the aggression is coming from, but you know it’s very close to you.” Read more of this story at Slashdot.

See the article here:
Yik Yak Raises Controversy On College Campuses

Intel Reveals Unlocked, Socketed Broadwell and Core i7 NUC With Iris Graphics

MojoKid writes Intel held an event at a location adjacent to GDC last night, where the company discussed some updates to its 5th Gen Core processor line-up, Intel graphics developments, the Intel Hardware SDK, and its various game developer tools. Chris Silva, Director of Marketing for Premium Notebook and Client Graphics teams disclosed a few details that a socketed, unlocked, 65W desktop processor based on Intel’s Broadwell architecture, featuring Iris graphics, is due to arrive sometime in mid-2015. It’s noteworthy because this will be Intel’s first desktop CPU with Iris Pro graphics and because it is multiplier unlocked. It will be interesting to see what Iris Pro can do with some overclocking. Intel then showed off a new NUC mini PC powered by a 28W, quad-core Core i7 Broadwell processor, which also featured Iris graphics. The device has a tiny .63 liter enclosure with support for high-performance M.2 solid state drives and features an array of built-in IO options, like USB3, BT4, and 802.11ac WiFi. Bryan Langley, Principal PM for Windows Graphics also talked a bit about DirectX 12, disclosing that the company would be ready with DX12 support when Windows 10 arrives and that there are optimizations in DX12 and their drivers that would deliver performance enhancements to current and future Intel graphics platforms. Read more of this story at Slashdot.

Visit link:
Intel Reveals Unlocked, Socketed Broadwell and Core i7 NUC With Iris Graphics

Inventors Revolutionize Beekeeping

wombatmobile writes For more than 5, 000 years, apiarists donned protective suits and lit bundles of grass to subdue swarms of angry bees while they robbed their hives of precious, golden honey. Now two Australian inventors have made harvesting honey as easy as turning a tap — literally. Cedar Anderson and his father Stuart have just been rewarded for a decades worth of inventing and refining with a $2 million overnight success on Indiegogo. Their Flow Hive coopts bees to produce honey in plastic cells that can be drained and restored by turning a handle, leaving the bees in situ and freeing apiarists from hours of smoke filled danger time every day. Read more of this story at Slashdot.

See the article here:
Inventors Revolutionize Beekeeping

Scotland’s Police Lose Data Because of Programmer’s Error

Anne Thwacks writes Assistant Chief Constable Wayne Mawson told the [Scottish Police Authority] committee that a total of 20, 086 records had been lost because a computer programmer pressed the wrong button between May and July last year. He added: “….they had been properly put on the system by the officers as a result of stopping and searching people, but we lost the outcome of it as a computer programming error. We have been working really hard to recover that data. I have personally overseen the sending out of several thousand emails to officers and follow-up audits. We have been working hard with HMICS to oversee everything that we do, to make sure it is done properly and I am pleased to say that the vast majority of that data, those results, are now back on the system.” Read more of this story at Slashdot.

See more here:
Scotland’s Police Lose Data Because of Programmer’s Error

Resistant Bacterial Infection Outbreak At California Hospital

puddingebola writes From the article: “A potentially deadly “superbug” resistant to antibiotics has infected seven patients, including two who died, and more than 160 others were exposed at Ronald Reagan UCLA Medical Center through contaminated medical instruments, the hospital revealed. The drug-resistant superbug known as CRE was likely transmitted to the Los Angeles patients by contaminated medical scopes during endoscopic procedures that took place between October 2014 and January 2015, a university statement said. ” UCLA says the infections occurred via contaminated endoscopes that were sterilized according to the manufacturer’s specifications. (Note: beware autoplaying video ad; adjust your volume accordingly.) Read more of this story at Slashdot.

More:
Resistant Bacterial Infection Outbreak At California Hospital

Breakthrough In Face Recognition Software

An anonymous reader writes: Face recognition software underwent a revolution in 2001 with the creation of the Viola-Jones algorithm. Now, the field looks set to dramatically improve once again: computer scientists from Stanford and Yahoo Labs have published a new, simple approach that can find faces turned at an angle and those that are partially blocked by something else. The researchers “capitalize on the advances made in recent years on a type of machine learning known as a deep convolutional neural network. The idea is to train a many-layered neural network using a vast database of annotated examples, in this case pictures of faces from many angles. To that end, Farfade and co created a database of 200, 000 images that included faces at various angles and orientations and a further 20 million images without faces. They then trained their neural net in batches of 128 images over 50, 000 iterations. … What’s more, their algorithm is significantly better at spotting faces when upside down, something other approaches haven’t perfected.” Read more of this story at Slashdot.

Read the original post:
Breakthrough In Face Recognition Software

VESA Embedded DisplayPort 1.4a Paves Way For 8K Displays, Longer Battery Life

MojoKid writes: The VESA standards organization has published the eDP v1.4a specification (Embedded DisplayPort) that has some important new features for device manufacturers as they bump up mobile device displays into the 4K category and start looking towards even higher resolutions. eDP v1.4a will be able to support 8K displays, thanks to a segmented panel architecture known as Multi-SST Operation (MSO). A display with this architecture is broken into two or four segments, each of which supports HBR3 link rates of 8.1 Gbps. The updated eDP spec also includes VESA’s Display Stream Compression (DSC) standard v1.1, which can improve battery life in mobile devices. In another effort to conserve battery power, VESA has tweaked its Panel Self Refresh (PSR) feature, which saves power by letting GPUs update portions of a display instead of the entire screen. Read more of this story at Slashdot.

View article:
VESA Embedded DisplayPort 1.4a Paves Way For 8K Displays, Longer Battery Life