Netflix takes up 9.5% of upstream traffic on the North American Internet

Netflix We’ve written a lot about how Netflix takes up a gigantic share of Internet traffic. During peak viewing hours, Netflix accounts for about a third of all bits sent to Internet users in North America on “fixed” connections—that is, cable, DSL, fiber, or satellite, but not cellular. But Netflix users also send a ton of data upstream, so much so that Sandvine’s latest Internet Phenomena Report puts Netflix at 9.48 percent of all peak upstream traffic on North American fixed Internet services, second only to BitTorrent’s 25.49 percent. Sandvine, a maker of equipment that helps consumer broadband providers manage network congestion, defines “peak” hours as those when network usage is within 95 percent of its daily maximum, typically from 7 to 11 p.m. It isn’t new that Netflix is both an upload and download monster. But for some reason, its share of uploads went up substantially in the latest measurement while downloads remained level. The twice-annual report had Netflix accounting for 6.44 of peak upstream traffic and 34.21 percent of downstream traffic in the first half of this year , while the newest report has Netflix at 9.48 percent of upstream and 34.89 percent of downstream: Read 17 remaining paragraphs | Comments

More:
Netflix takes up 9.5% of upstream traffic on the North American Internet

Samsung decides 56 smartphones a year is too many, will cut lineup by 30%

Samsung’s 2014 product lineup. GSM Arena Samsung has been in a pretty tough spot lately. After several quarters of record profits in 2012 and 2013, the company has crashed back down to Earth. The low point for Samsung came last quarter, when it reported a 49 percent drop in profits. At the high end of the market, the company currently has to fight off Apple, which just released a phablet of its own. At the low end, it’s going up against a flood of cheaper Chinese OEMs, led by Xiaomi  and Huawei. To try to get out of this slump, Samsung is taking a “less is more” approach. According to  The Wall Street Journal ,  the company said it would cut its 2015 smartphone lineup by 25-30 percent. The company will work on the internals, too, saying during its last earnings call that it will “increase the number of components shared across mid- to low-end models, so that we can further leverage economies of scale.” The belt-tightening might seem like a big change for Samsung, but the company has so fully flooded the market with smartphone models that a 30 percent cut will barely put a dent in its lineup. And thanks to GSM Arena’s phone database , we can get a pretty good estimate of just how big Samsung’s product lineup is in order to compare it to the competition. Read 5 remaining paragraphs | Comments

More here:
Samsung decides 56 smartphones a year is too many, will cut lineup by 30%

High-res Rosetta pics catch little Philae lander bouncing across comet

The European Space Agency’s decade-old Rosetta mission managed to do what no mission has done before—successfully rendezvous a probe with a comet and then land on it . Even if things didn’t go entirely as planned with the landing, the lion’s share of the mission’s science was always slated to be carried out by the Rosetta probe itself rather than by the Philae lander, so plenty of experiments will still be carried out over the next year. A mosaic assembled by ESA scientists showing Philae’s first bounce across Comet 67P. ESA In fact, one of the Rosetta probe’s instruments managed to capture some remarkable imagery last week during Philae’s landing. In a blog post that went live this morning, the  ESA posted pictures from the spacecraft’s OSIRIS imager (that’s Optical, Spectroscopic, and Infrared Remote Imaging System) showing Philae’s initial approach and first “bounce” off of Comet 67P/Churyumov–Gerasimenko on November 12. Philae was supposed to have anchored itself to Comet 67P with a pair of harpoons, but those harpoons didn’t fire on touchdown. Philae actually rebounded away from the comet (67P has a small but appreciable amount of gravity, although its escape velocity is only 0.5 meters per second). It was during the first of two “bounces” that Rosetta’s OSIRIS imager captured a series of frames showing the lander’s parabolic journey across the comet’s face. The exact location of Philae’s final resting place remains as yet undetermined. Read 1 remaining paragraphs | Comments

Read More:
High-res Rosetta pics catch little Philae lander bouncing across comet

One of world’s largest landslide deposits discovered in Utah

The Markagrunt gravity slide in Utah includes most of the area between Beaver, Cedar City, and Panguitch. Google Earth Some things can be too big to notice, as our flat-Earth-believing ancestors can attest, having failed to work out that the surface of the Earth curves around a sphere. Or, as the saying goes, you can focus on the details of some fascinating trees and miss interesting facts about the forest as a whole. In southwest Utah, geologists had noticed some pretty cool “trees.” The area had been volcanically active between 21 and 31 million years ago, building up a host of steep, volcanic peaks. A number of huge blocks of rock from these peaks, up to 2.5 square kilometers in area and 200 meters thick, are obviously out of place—they’ve been interpreted by geologists as the result of many landslides around the volcanoes. In a recent paper in Geology , David Hacker , Robert Biek , and Peter Rowley show that rather than being the result of many individual landslides, these are actually all part of one jaw-droppingly large event. The deposit, called the Markagunt gravity slide, covers an area about 90 kilometers long and 40 kilometers wide and is hundreds of meters thick. During the event, all of this slid 30 kilometers or more. The scale puts run-of-the-mill landslides—as terrifying and deadly as they can be—to shame. Read 7 remaining paragraphs | Comments

Read More:
One of world’s largest landslide deposits discovered in Utah

Feds gather phone data from the sky with aircraft-mimicking cell towers

Aleksander Markin On Thursday afternoon, the Wall Street Journal published a report saying that the US Marshals Service (USMS) was using small, fixed-wing Cessnas equipped with so-called “dirtboxes”—receivers that act like cellphone towers—to gather data from citizens’ phones below. The purpose of such collection is to target and spy on criminal suspects, but the data from any citizen’s phone is collected by such devices. Sources told the WSJ that USMS operated these planes from five major airports in the US and that the program had a flying range “covering most of the US population.” The devices on the planes can capture unique identifying information from “tens of thousands” of cellphones on the ground. Using that information, federal authorities can pinpoint a cellphone user’s location from “within three meters or within a specific room in a building,” the WSJ said. Individuals with knowledge of the matter told the news outlet that the plane flyovers were targeted at “fugitives and criminals” and that non-target phone data is “let go” as it is gathered. The dirtboxes are described as higher-grade Stingrays, which police use  on the ground to collect International Mobile Subscriber Numbers (IMSI). Read 8 remaining paragraphs | Comments

Continued here:
Feds gather phone data from the sky with aircraft-mimicking cell towers

Android 5.0 Lollipop, thoroughly reviewed

Android updates don’t matter anymore—or at least that’s what many people think. Back-to-back-to-back Jelly Bean releases and a KitKat release  seemed to only polish what already existed. When Google took the wraps off of “Android L” at Google I/O, though, it was clear that this release was different. Android 5.0, Lollipop is at least the biggest update since Android 4.0, and it’s probably the biggest Android release ever. The update brings a complete visual overhaul of every app, with a beautiful new design language called “Material Design.” Animations are everywhere, and you’d be hard-pressed to find a single pixel from 4.4 that was carried over into 5.0—Google even revamped the fonts. 5.0 also brings a ton of new features. Notifications are finally on the lockscreen, the functionality of Recent Apps has been revamped to make multitasking a lot easier, and the voice recognition works everywhere—even when the screen is off. The under-the-hood renovations are just as extensive, including a completely new camera API with support for RAW images, a system-wide focus on battery life, and a new runtime—ART—that replaces the aging Dalvik virtual machine. Read 171 remaining paragraphs | Comments

View article:
Android 5.0 Lollipop, thoroughly reviewed

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

All US Postal Service employees’ personal data exposed by hackers

Barbara Krawcowicz All United States Postal Service (USPS) employees’ personal data—including names, addresses, social security numbers—has been exposed as the result of a hack believed to have originated from China. According to its own tally, USPS employs over 600,000 people. “We began investigating this incident as soon as we learned of it, and we are cooperating with the investigation, which is ongoing,” David Partenheimer, a USPS spokesman, wrote in a statement (PDF) on Monday. “The investigation is being led by the Federal Bureau of Investigation and joined by other federal and postal investigatory agencies. The intrusion is limited in scope and all operations of the Postal Service are functioning normally.” The USPS does not believe that in-store customer data was exposed, but customers who contacted the agency via e-mail or phone between January 1 and August 16, 2014 may have been. Read 4 remaining paragraphs | Comments

Continue reading here:
All US Postal Service employees’ personal data exposed by hackers

WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

Dyn Research Domestic Internet traffic traveling inside the borders of Russia has repeatedly been rerouted outside of the country under an unexplained series of events that degrades performance and could compromise the security of Russian communications. The finding, reported Thursday in a blog post published by Internet monitoring service Renesys , underscores the fragility of the border gateway protocol (BGP), which forms the underpinning of the Internet’s global routing system. In this case, domestic Russian traffic was repeatedly routed to routers operated by China Telecom, a firm with close ties to that county’s government. When huge amounts of traffic are diverted to far-away regions before ultimately reaching their final destination, it increases the chances hackers with the ability to monitor the connections have monitored or even altered some of the communications. A similar concern emerged last year, when Renesys found big chunks of traffic belonging to US banks, government agencies, and network service providers had been improperly routed through Belarusian or Icelandic service providers . The hijacking of Russian traffic is linked to last year’s peering agreement between Russian mobile provider Vimpelcom and China Telecom. The pact allowed the firms to save money by having some of their traffic carried over the other’s network rather than through a more expensive transit operator. On multiple occasions since then, according to Renesys, communications destined for Russia has followed extremely round-about routes that take the traffic into China before sending it on to its final stop. Doug Madory, director of internet analysis in Renesys research arm Dyn wrote: Read 2 remaining paragraphs | Comments

Follow this link:
WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

NYPD officers charged after video catches teen getting pistol whipped

“The video speaks for itself, doesn’t it?” Brooklyn District Attorney Kenneth Thompson said Wednesday about a brief video recording that led to two New York Police Department cops being charged in connection to the pistol-whipping assault of a 16-year-old Brooklyn boy. The boy, who was arrested for marijuana possession, ended up with broken teeth and bruises. The officers charged in Brooklyn Supreme Court on Wednesday are David Afanador, 33, and Tyrane Isaac, 36, both nine-year veterans. The 82-second video of the teen’s August 29 beating—widely available on the Internet—was captured by a local Crown Heights business. The tape shows the boy running before eventually stopping and raising his hands, after which he is pummeled and taken to the ground. Read 6 remaining paragraphs | Comments

Originally posted here:
NYPD officers charged after video catches teen getting pistol whipped