In major shift, Google boosts search rankings of HTTPS-protected sites

In a shift aimed at fostering wider use of encryption on the Web, Google is tweaking its search engine to favor sites that use HTTPS to protect end users’ privacy and security. Sites that properly implement the transport layer security (TLS) protocol may be ranked higher in search results than those that transmit in plaintext, company officials said in a blog post published Wednesday . The move is designed to motivate sites to use HTTPS protections across a wider swath of pages rather than only on login pages or not at all. Sites that continue to deliver pages over unprotected HTTP could see their search ranking usurped by competitors that offer HTTPS. Facebook is also getting more serious about encryption, with plans to acquire PrivateCore , a company that develops encryption software to protect and validate data stored on servers. In Wednesday’s post, Google Webmaster Trends Analysts Zineb Ait Bahajji and Gary Illyes noted that Google was among the first sites to offer end-to-end HTTPS protection by default across virtually all of its properties. It has also offered a variety of tools to help sites detect and recover from security breaches. They went on to write: Read 2 remaining paragraphs | Comments

Link:
In major shift, Google boosts search rankings of HTTPS-protected sites

Internet Explorer to start blocking old Java plugins

This month’s Patch Tuesday update for Internet Explorer will include a new feature: it will block out-of-date ActiveX controls. More specifically, it will block out-of-date versions of the Java plugin. Although Microsoft is describing the feature as an ActiveX block, the list of prohibited plugins is currently Java-centric. Stale versions of Flash and Silverlight will be able to stick around, at least for now, though Microsoft says that other out-of-date ActiveX controls will be added to the block list later. Old, buggy versions of the Java plugin have long been used as an exploit vector, with Microsoft’s own security report fingering Java in 84.6 to 98.5 percent of detected exploit kits (bundles of malware sold commercially). Blocking obsolete Java plugins should therefore go a long way toward securing end-user systems. Read 1 remaining paragraphs | Comments

See more here:
Internet Explorer to start blocking old Java plugins

After 10 years, Rosetta probe catches up with its comet destination

Today, the European Space Agency announced that its Rosetta mission successfully arrived at comet 67P/Churyumov-Gerasimenko after a 10-year journey. As the probe approached over the past several weeks, it provided greater detail on the oddly shaped comet, which was venting water as its orbit drew it closer to the Sun. Now, at just 100km from the comet’s surface, Rosetta is providing detailed images of a truly otherworldly landscape. 67P/Churyumov-Gerasimenko occupies an elliptical orbit that takes it from areas beyond Jupiter to somewhere in between Earth and Mars (currently, it’s midway between Jupiter and Mars). That presents a significant challenge, since any probe intended to track the comet must roughly match its orbit before approaching—or it would need a prohibitive volume of propellant to slow down. This explains Rosetta’s 10-year journey, which included four orbital flybys of Earth and Mars to put it in place for a gradual approach. Earlier this year, Rosetta successfully woke from hibernation , and it’s been imaging the comet during its approach. Early images indicated that 67P/Churyumov-Gerasimenko has a two-lobed structure that some have compared to a rubber duck, albeit one with an unusually large head. The second lobe, corresponding to the duck’s body, is broader and more oblong. Read 3 remaining paragraphs | Comments

See original article:
After 10 years, Rosetta probe catches up with its comet destination

What you should expect from Apple’s “iPhone 6”

It hardly seems like it’s been a year since the iPhone 5S was released, but word on the street is that Apple is planning to reveal its next-generation iPhone on September 9. That’s just over a month from now, and the rumor mill has been in full swing all summer, churning out speculation about what Apple will introduce. Since 2008’s iPhone 3G, iPhones released in even numbered years get a new design while phones in odd numbered years are just and sped up and tweaked. Since this is a redesign year, people are especially interested in seeing how Apple moves the platform forward. This close to a new iPhone’s launch, rumors firm up a little and begin to agree on specific aspects of the new hardware. Apple has a big supply chain and sells tens of millions of phones a quarter—given the sheer scale of the operation, it’s inevitable that details will leak. We knew most of the particulars about the iPhone 5S and 5C well before they were officially announced, and there’s no reason to believe that this year will be any different. Now that we have a probable date for the announcement, we’ve rounded up the most credible and plausible rumors (combined with a few educated guesses) to make a rough sketch of what the next-generation iPhone will probably look like. We tried to stick to sources that have been relatively reliable in the past—some of the better reporting from rumor sites and prominent Apple watchers, assertions from major publications like the Wall Street Journal and Bloomberg , and clear, not-obviously-faked pictures of individual components form the basis of our information here. In aggregate, everything we’ve heard so far gives us a pretty good idea of what we can expect next month. Read 26 remaining paragraphs | Comments

See the article here:
What you should expect from Apple’s “iPhone 6”

Whitehats recover, release keys to CryptoLocker ransomware

It must be one of these… Joseph No Whitehat hackers have struck back at the operators of the pernicious CryptoLocker ransom trojan that has held hundreds of thousands of hard drives hostage. Through a partnership that included researchers from FOX-IT and FireEye, researchers managed to recover the private encryption keys that CryptoLocker uses to lock victims’ personal computer files until they pay a $300 ransom. They also reverse engineered the binary code at the heart of the malicious program. The result: a website that allows victims to recover the key for their individual content. To use the free service, victims must upload one of the files encrypted by CryptoLocker along with the e-mail address where they want the secret key delivered. Both FOX-IT and FireEye are reputable security companies, but readers are nonetheless advised to upload only non-sensitive files that contain no personal information. Read 3 remaining paragraphs | Comments

Read the original post:
Whitehats recover, release keys to CryptoLocker ransomware

Groupon lost over $60 million in first half of 2014, stock tanks 15 percent

Groupon There was a reason that we wondered in early 2013 if Groupon would make it to 2014—the company is hemorrhaging cash, and the situation has just gotten a lot worse. According to the company’s latest earnings report published on Tuesday, the online deals site sustained a net loss of $22.8 million in the second quarter of 2014—approximately triple the level of losses the company had during the same period a year ago. During the first half of 2014, Groupon lost over $60.6 million, or over five times what it lost during the first half of 2013. From 2009 through 2013, Groupon has incurred total net losses of over $820 million . Unsurprisingly, the stock price took a hit today —as of this writing, Groupon has plummeted over 15 percent in after-hours trading, hovering just under $6 per share. By comparison, Groupon closed  at just over $26 per share after its first day as a publicly traded company back in November 2011. Read 2 remaining paragraphs | Comments

Visit site:
Groupon lost over $60 million in first half of 2014, stock tanks 15 percent

For months, 911 callers got automated message that said “hang up and dial 911”

No one suffering from an emergency expects to be greeted by a recording when they dial 911. Yet 911 callers in Caddo County, Oklahoma were unable to reach a human operator for months in 2013. Instead, they were routed to an automated message that “instructed callers to ‘hang up and dial 911’ if their call is an emergency,” the Federal Communications Commission said yesterday . The FCC issued a proposed fine of $100,000 to the Hinton Telephone Company, saying the telco “betrayed its customers.” Read 11 remaining paragraphs | Comments

See the original article here:
For months, 911 callers got automated message that said “hang up and dial 911”

LinkedIn paying shorted employees $6 million in unpaid wages, damages

Professional-networking site LinkedIn is agreeing to pay nearly $3.35 million in unpaid overtime to 359 workers, in addition to $2.5 million in damages under a deal announced Monday with the US Department of Labor. The accord covers current and former employees at LinkedIn offices in California, Illinois, Nebraska, and New York. “This company has shown a great deal of integrity by fully cooperating with investigators and stepping up to the plate without hesitation to help make workers whole,” David Weil, administrator of the Wage and Hour Division, said in a statement. Read 3 remaining paragraphs | Comments

See more here:
LinkedIn paying shorted employees $6 million in unpaid wages, damages

What we judge when we judge freemium, and the money we’ve spent on Hearthstone

BagoGames Few people know what to make of the Kim Kardashian: Hollywood mobile game. By reputation it’s boring, vapid, materialistic, and shallow—according to many serious gamers—and is deplorable not least because players can spend money to get ahead. The wails only grew louder when reports indicated that the game earned $1.6 million in its first five days and is on track to make $200 million in annual revenue , according to one analyst. While many gamers and gaming journalists struggled to figure out why anyone would spend money on a game made by and featuring a reality TV star, we aren’t totally in the dark. For one, casting shade on the subject matter is a value judgment of a certain set of interests and lifestyle. And on a meta level,  how people use their leisure time . Let he who has lived every moment deliberately immersed in deep consideration of the universe cast the first Angry Bird. Materialism in games probably does not cause materialism in the streets . For another, Kim K is actually pretty self-aware of its own materialism and glorification of social climbing and has a sense of irony about the world it gives players to try and thrive in. To wit, one of the things you can spend in-game money on is new body parts. Read 25 remaining paragraphs | Comments

See original article:
What we judge when we judge freemium, and the money we’ve spent on Hearthstone

Updated Qi 1.2 standard makes wireless charging more wireless

The Qi-compatible Nexus 5 on the Nexus Wireless Charger. New chargers will be able to increase the space between the device and the pad. Andrew Cunningham The Wireless Power Consortium’s Qi wireless charging standard is wireless in that the phone is not physically plugged into anything, but it still requires your device and the wireless charging pad to be touching each other to work. Today, the WPC announced ( PDF ) that version 1.2 of the Qi standard will add support for resonant charging, making it possible for your phone to be charged when near a Qi pad rather than directly on top of it. A small image showing Qi 1.2 in action. WPC It’s a minor enough change that current Qi 1.1 receivers will be able to take advantage of it with no extra hardware, but it opens up a few different possibilities for companies that want to build Qi support into their products. The WPC says that Qi chargers can now be embedded within tables and desks rather than placed on the surface, making them less obtrusive. “New low power transmitter designs” will make it easier to build Qi chargers into cars, and a single Qi 1.2 transmitter will be able to charge multiple Qi devices simultaneously.  Qi can also now supply up to 2,000 watts of power to household appliances (the release specifically mentions “kitchen applications”). Current Qi devices will be able to draw power from these new transmitters at distances of up to 30 mm (around 1.2 inches), while devices with purpose-build Qi 1.2 receivers increase the distance to 45 mm (about 1.8 inches). Engadget reports that the resonant version of Qi is roughly 70 to 80 percent efficient, while the old inductive version is around 85 percent efficient, and Qi 1.1 and 1.2 transmitters and receivers will be able to interoperate, so inductive charging pads like the Nexus Wireless Charger will still be able to charge Qi 1.2 phones. Just know that resonant charging will require a Qi 1.2 transmitter. Read 1 remaining paragraphs | Comments

More:
Updated Qi 1.2 standard makes wireless charging more wireless