Google search redesign hews closer to competitor DuckDuckGo

Google’s makeover kicks the underlined URL to the curb, with a few other changes. Experiencing mild disorientation while using Google today? Google has quietly rolled out a subtle redesign for its search results that, among other things, removes the age-old hyperlink underline, bumps the font size two points, and evens out the line spacing. Google search results have gotten incremental changes over the years, and the search page certainly no longer looks like it did when the site first launched. Jon Wiley, the lead designer for Google search, took to Google+ Wednesday to say that the new look “improves readability and creates an overall cleaner look.” Having gone nearly a decade without underlined hyperlinks, we here at Ars wholeheartedly agree with the decision. The redesign moves Google up and away from competitors like Yahoo and Bing , which preserve the underline. However, it only catches Google up to the upstart DuckDuckGo, which does not use underlines and is cleaner still on its search results page, with truncated URLs for each result. Read 1 remaining paragraphs | Comments

See more here:
Google search redesign hews closer to competitor DuckDuckGo

Mozilla strives to take Web gaming to the next level with Unreal Engine 4

Around this time last year Mozilla and Epic Games showed off the Unreal 3 game engine running in the browser, using a combination of the WebGL 3D graphics API and asm.js , the high performance subset of JavaScript. Commercial games built using this technology were launched late in the year. With this apparently successful foray into using the browser as a rich gaming platform, Mozilla and Epic today demonstrated a preview of Epic’s next engine, Unreal Engine 4, again boasting near-native speeds. The Web version of UE4 uses Emscripten to compile regular C and C++ code into asm.js. Unreal Engine 4 running within Firefox. Over the past year, Mozilla has improved asm.js’s performance, to go from around 40 percent of native performance, to something like 67 percent of native. Our own testing largely supported the organization’s claims, though we noted certain limitations at the time, such as JavaScript’s lack of multithreading. Read 1 remaining paragraphs | Comments

View original post here:
Mozilla strives to take Web gaming to the next level with Unreal Engine 4

NSA’s automated hacking engine offers hands-free pwning of the world

Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald in The Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale. Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream. Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked. Read 13 remaining paragraphs | Comments

View original post here:
NSA’s automated hacking engine offers hands-free pwning of the world

How CIA snooped on Senate Intel Committee’s files

CIA Headquarters in Langley, Virginia. The CIA gave Senate Intelligence Committee staffers access to its data offsite—in a leased facility the CIA controlled. It sounds like something out of Homeland : at a secret location somewhere off the campus of the Central Intelligence Agency, the CIA leases a space and hires contractors to run a top-secret network, which it fills with millions of pages of documents dumped from the agency’s internal network. But that’s apparently exactly what the CIA did for more than three years as part of an agreement to share data with the staff of the Senate Select Committee on Intelligence on its controversial detention and interrogation program. And it’s also how the agency was able to gain access to the computers and shared network drive used by committee staffers in a search that Senator Diane Feinstein contended today  crossed multiple legal and constitutional boundaries. In a speech on the Senate floor this morning, Feinstein detailed the strange arrangement and accused the CIA of breaking its agreement with the committee on multiple occasions. She also accused the agency of reportedly filing a criminal report against committee staffers with the Justice Department in “a potential effort to intimidate this staff.” The details shared by Feinstein show the length to which the CIA went to try to control the scope of the data that was shared with Senate staffers—and still managed to give them more than some officials in the agency wanted to. Even with multiple levels of oversight, the CIA managed to hand over the data along with an internal review of that very data, which included the agency’s own damning assessment of the interrogation program. Read 18 remaining paragraphs | Comments

Read more here:
How CIA snooped on Senate Intel Committee’s files

Popcorn Time reinvents the seedy process of torrenting

We are used to illegal activities looking and feeling far more illegal than this. A new BitTorrent-powered video app has been released that beautifies the torrenting process to the point that TorrentFreak describes it as “Netflix for pirates.” The app, which is available for OS X, Windows, and Linux, shows a catalog of movies and loads them up on a computer in an interface as seamless as that of most legit streaming services, but using means that are generally less than legal. Typically, torrenting a movie (illegally, if it’s copyrighted property) involves seeking out a sketchy torrent website littered with porn ads to download a .torrent file that users hope will actually result in a movie and not, say, a virus. The process’s pitfalls and risks are many, not to mention the potential for getting called out by one’s ISP and, in rare instances, being fined or sued. Popcorn Time eliminates the seedier aspects of torrent location in a slick app that doesn’t involve dealing with files, download speeds, or seeding—at least on the front end. The app began as a Github project that now has over 50 contributors. It is free, open-source, and has no ads or other money-making schemes. The app works by using an API provided by torrent service YTS to stream the file, which is then shared from the user’s computer after the download is completed. Read 1 remaining paragraphs | Comments

Follow this link:
Popcorn Time reinvents the seedy process of torrenting

Teens get banned from an app after vicious attacks and threats

simon_bramwell The developers of Yik Yak , an app that works as an anonymous message board for up to 500 people in close proximity to one another, have selectively disabled the app’s use in Chicago following vicious sniping and rumor mongering by children using it at school. WLS-TV in Chicago reports that people in the city won’t be able to use Yik Yak until the developers figure out a way to get youth usage under control. Apps for sharing information anonymously like Wut and Secret have seen a recent surge in popularity. In the case of Wut and Secret, users are connected to people they actually know—Secret uses the mobile device’s contact list, and Wut’s (anonymous) contacts are powered by Facebook. Yik Yak, by contrast, connects a large swath of people—friends, enemies, and strangers—based entirely on their location. Among middle and high schoolers, this becomes many lockers’- and bathroom walls’-worth of pain and drama. WLS-TV reports students in Chicago have used it to spread rumors about rape, and in other locales, schools have been evacuated because of bomb threats on the service. Read 1 remaining paragraphs | Comments

Original post:
Teens get banned from an app after vicious attacks and threats

First OS X 10.9.3 beta improves support for 4K displays

An OS X 10.9.3 beta running in Retina mode on what appears to be a 39-inch Seiki 4K display. 9to5Mac OS X 10.9.2  was just released last week, but Apple has already begun testing for version 10.9.3, and the update will apparently come with some goodies for users of 4K displays. According to a report by 9to5Mac , the new update enables HiDPI “Retina” scaling on 4K displays that didn’t offer the option in previous OS X versions. It’s possible to enable HiDPI display modes on any monitor in OS X with some tweaking, but Apple is apparently interested in supporting Retina-style output on high-resolution monitors by default. Apple made a big 4K push with its new Mac Pro, which can support up to three 4K displays at once thanks to its twin GPUs and six Thunderbolt 2.0 ports. However, the company doesn’t yet make its own 4K Thunderbolt Display—current Mac Pro buyers can add $3,600 32-inch Sharp 4K displays  to their orders, or they can bring their own monitors. 9to5Mac’s testing was conducted with what appears to be a 39-inch Seiki Digital display , which as of this writing can be had on Amazon for $500 (though it doesn’t support a 60Hz refresh rate at 4K). According to others who have installed the new beta , 10.9.3 also apparently enables 60Hz 4K output on the 2013 Retina MacBook Pros. The Intel and Nvidia GPUs that power these MacBooks were previously capable of 60Hz 4K output when running Windows, but were limited to lower refresh rates in OS X. Higher refresh rates make for a smoother, more pleasant viewing experience, and are especially useful when editing movies, playing games, or in any other activities where response time is important. Those with older Macs likely won’t see 60Hz 4K support even after installing the update—the 2013 Retina MacBook Pros and 2013 Mac Pro are the only systems that support the requisite DisplayPort 1.2 spec. iMacs, MacBook Airs, and the Mac Mini will need to wait for a Thunderbolt 2 upgrade before they can drive high-resolution displays at the higher refresh rate. Read 1 remaining paragraphs | Comments

Read the original:
First OS X 10.9.3 beta improves support for 4K displays

Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

A. Strakey Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library. The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers. The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates . The coding error, which may have been present in the code since 2005 , causes critical verification checks to be terminated, drawing ironic parallels to the extremely critical “goto fail” flaw that for months put users of Apple’s iOS and OS X operating systems at risk of surreptitious eavesdropping attacks. Apple developers have since patched the bug . Read 7 remaining paragraphs | Comments

Link:
Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

MtGox code posted by hackers as company files for bankruptcy protection

Cross Office Shibuya Medio, the office building in Tokyo that is home to MtGox and Mark Karpeles’ other companies. Tokyo Apartments As MtGox CEO Mark Karpeles and his lawyers officially filed for court-supervised restructuring of the Bitcoin exchange, someone posted a chunk of code to Pastebin that would appear to lend credence to Karpeles’ contention that his company was hacked. The block of PHP code appears to be part of the backend for MtGox’s Bitcoin exchange site, and it includes references to IP addresses registered to Karpeles’ Web hosting and consulting company, Tibanne . In an update to the MtGox website late Monday, the company reasserted its claim that it had been hacked through an exploit of a weakness in its exchange website code. “Although the complete extent is not yet known, we found that approximately 750,000 bitcoins deposited by users and approximately 100,000 bitcoins belonging to us had disappeared,” the company’s spokesperson said in the latest update at the MtGox website. “We believe that there is a high probability that these bitcoins were stolen as a result of an abuse of this bug and we have asked an expert to look at the possibility of a criminal complaint and undertake proper procedures.” That loss was discovered on February 24. On the same day, the company found “large discrepancies between the amount of cash held in financial institutions and the amount deposited from our users. The amounts are still under investigation and may vary, but they approximate JPY 2.8 billion [$27 million US].” Read 2 remaining paragraphs | Comments

Originally posted here:
MtGox code posted by hackers as company files for bankruptcy protection

Snow Leopard updates are probably done—here are your OS X upgrade options

End of the line, Snowy. Apple Apple offers no end-of-life roadmaps for its operating systems, and it doesn’t officially comment on whether support has dried up for this or that version of OS X. The best you can do is look at historical data. Since switching to a yearly release cadence with Lion back in 2011, Apple seems to be willing to support whatever the latest version is plus the two preceding versions. When OS X 10.9.2 was released earlier this week, it was accompanied by security updates for OS X 10.8 and 10.7 but not for 2009’s OS X 10.6.  It’s the first major security update that Snow Leopard has missed—the OS is still getting iTunes updates, but its last major security patch happened back in September. This has prompted a flurry of posts from various outlets. All point out the same Net Applications data that says 10.6 still powers around 19 percent of Macs. Most compare the OS X support cycle to the much-longer Windows cycle. Some make  a bigger deal about it than others. None really tell anyone in that 19 percent what to do next. You’ll need to know the exact kind of Mac you’re using before proceeding—typing your serial number into this Service and Support page should give you the information you need if you’re not sure. Launching the System Profiler application from the Utilities folder will show you your serial number and your Mac’s specific model identifier (something like MacBook4,1 or iMac11,2), the latter of which can be used with this EveryMac lookup page to find what you’re looking for. Read 17 remaining paragraphs | Comments

Read the article:
Snow Leopard updates are probably done—here are your OS X upgrade options