Rolling in it: Comcast profited $1.9 billion in first 3 months of 2014

Alyson Hurt Earlier this month, Comcast told the Federal Communications Commission that it needs the green light to purchase Time Warner Cable as a way to stay competitive with Google, Netflix, and others. Nevertheless, in its latest quarterly earnings report published on Tuesday, Comcast reported that it made $1.9 billion in profits in the first quarter of 2014—an 18 percent increase year-over-year. “Our operating momentum is continuing as we enter 2014 and is highlighted by our second consecutive quarter of video customer growth, as well as strength in high-speed Internet and business services,” Comcast CEO Brian L. Roberts said in a statement. Read 4 remaining paragraphs | Comments

Continue Reading:
Rolling in it: Comcast profited $1.9 billion in first 3 months of 2014

“Russian Facebook” founder flees country after being forced out as CEO

Pavel Durov, founder and former CEO of Vkontakte. Pavel Durov/VK Pavel Durov, the founder of Vkontakte (VK)—the largest social network in Russia—said on Tuesday that he fled the country one day after being forced out of the company, claiming that he felt threatened by Kremlin officials. In a  post on his profile page on Monday, Durov explained that he was fired from his position as CEO of VK and that the so-called “Russian Facebook” is now “under the complete control” of two oligarchs close to President Vladimir Putin. Durov explained that after seven years of relative social media freedom in Russia, his refusal to share user data with Russian law enforcement has set him at odds with the Kremlin, which has recently been trying to tighten its grip on the Internet, according to The Moscow Times . Read 7 remaining paragraphs | Comments

Excerpt from:
“Russian Facebook” founder flees country after being forced out as CEO

Next-gen Thunderbolt doubles speeds but changes the connector

The leaked slide that purports to out the next-generation Thunderbolt controller. VR-Zone Thunderbolt 2 just started showing up in devices late last year, but a new slide leaked by VR-Zone is giving us our first glimpse at what the next version is going to look like. Dubbed “Alpine Ridge,” the new Thunderbolt controllers will double Thunderbolt 2’s bandwidth from 20Gbps to 40Gbps, will reportedly support PCI Express 3.0, and will reduce power usage by 50 percent compared to current controllers. The downside is that the new version will require the use of a new connector—it supports charging for devices that use up to 100W of power and it’s 3 mm shorter than current connectors, but adapters will be required to maintain compatibility with older Thunderbolt accessories. Doubling the available bandwidth will enable next-generation Thunderbolt controllers to drive two 4K displays simultaneously, where current controllers can only drive one. The new controllers will allegedly be compatible with a variety of other protocols as well, including DisplayPort 1.2, USB 3.0, and HDMI 2.0. Intel will offer two different versions of the controller—a version that uses four PCI Express lanes to drive two Thunderbolt ports and an “LP” (presumably “Low Power”) version that uses two PCI Express lanes to drive one port. This is consistent with the current controllers. High-end devices like the Mac Pro and Retina MacBook Pro use two-port controllers, while lower-end, lower-power devices like the Mac Mini and MacBook Air use the one-port version. Thunderbolt 2 gave the specification a performance boost but didn’t change all that much about the protocol. It combined the original Thunderbolt’s two 10Gbps channels to allow for higher maximum speeds, but it didn’t increase the total amount of bandwidth available or introduce any new protocols. The upside is that it maintained full compatibility with all of the original Thunderbolt cables and accessories, something that this next-generation Thunderbolt controller won’t be able to do without adapters (though to be fair, USB 3.1 and the new Type-C USB connector have the same problem). Read 2 remaining paragraphs | Comments

View original post here:
Next-gen Thunderbolt doubles speeds but changes the connector

Using bugs—aphids, specifically—to spy on plants’ electrical communications

I’m catching some signals, fellow aphid. Are you? benimoto Internal communications in plants share striking similarities with those in animals, new research reveals . With the help of tiny insects, scientists were able to tap into this communication system. Their results reveal the importance of these communications in enabling plants to protect themselves from attack by insect pests. Like any organism, plants need to transport essential nutrients from one part to another. This is achieved by two parts of the plant: the xylem and the phloem. Xylem, which is largely made of dead cells, transports water and dissolved nutrients obtained by roots up to the aerial tissues of the plants. By contrast, the phloem is made up of living cells—active tubes that transport a syrupy sap, rich in sugars made by photosynthesis in the leaves. In the 1980s, scientists discovered that phloem cells also function as a communication system through which electrical signals travel, similar to the electrical signals transmitted through the neurons in your nervous system. Read 14 remaining paragraphs | Comments

More:
Using bugs—aphids, specifically—to spy on plants’ electrical communications

Active malware campaign steals Apple passwords from jailbroken iPhones

Sophos Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads. News of the malware, dubbed “unflod” based on the name of a library that’s installed on infected devices, first surfaced late last week on a pair of reddit threads here and here . In the posts, readers reported their jailbroken iOS devices recently started experiencing repeated crashes, often after installing jailbroken-specific customizations known as tweaks that were not a part of the official Cydia market , which acts as an alternative to Apple’s App Store. Since then, security researcher Stefan Esser has performed what’s called a static analysis on the binary code that the reddit users isolated on compromised devices. In a blog post reporting the results , he said unflod hooks into the SSLWrite function of an infected device’s security framework. It then scans it for strings accompanying the Apple ID and password that’s transmitted to Apple servers. When the credentials are found, they’re transmitted to attacker-controlled servers. Read 6 remaining paragraphs | Comments

Link:
Active malware campaign steals Apple passwords from jailbroken iPhones

Comcast bills lowered $2.4 million by scammers who accessed billing system

Alyson Hurt Two men pleaded guilty to a scam that lowered the bills of 5,790 Comcast customers in Pennsylvania by a total of $2.4 million. They now face prison time and will have to pay their ill-gotten wealth back to Comcast. 30-year-old Richard Justin Spraggins of Philadelphia pleaded guilty in February and was “ordered to make $66,825 in restitution and serve an 11- to 23-month sentence,” the Times-Herald of Norristown wrote at the time. Scaggins was described as the second-in-command of the operation. The accused ringleader, 30-year-old Alston Buchanan, pleaded guilty last week . “Buchanan faces up to 57½ to 115 years in prison, although Buchanan will likely serve a lesser sentence than the maximum,” the newspaper wrote. Read 3 remaining paragraphs | Comments

Read the original post:
Comcast bills lowered $2.4 million by scammers who accessed billing system

Digital Public Library of America to add millions of records to its archive

Aquarium, Battery Park, New York City [Postcard], ca. 1931. This is just one of the many resources you can find online through the DPLA website or through apps using its API. New York Aquarium Postcards collection of the Wildlife Conservation Society Archives. Via Empire State Digital Network. Today marks the Digital Public Library of America’s  one-year anniversary. To celebrate the occasion, the non-profit library network announced six new partnerships with major archives, including the US Government Printing Office and the J. Paul Getty Trust. The DPLA is best described as a platform that connects the online archives of many libraries around the nation into a single network. You can search all of these archives through the digital library’s website, and developers can build apps around the DPLA’s metadata collection using the publicly available API. It’s easy to find historical documents, public domain works, and vintage photos online through a search on the DPLA’s website, although sometimes a library will merely offer the data about an item, and retain the actual resource at the library. Still, having that data accessible through a single public portal is more useful for a researcher than having to search for it library by library. Read 7 remaining paragraphs | Comments

Visit link:
Digital Public Library of America to add millions of records to its archive

75-year-old human cloned for the production of stem cells

sharyn morrow Several years ago, as the therapeutic potential of stem cells was first being recognized, the only way to create them was to harvest cells from an early embryo. That embryo could come from the large collection of those that weren’t used during in vitro fertilization work. But to get one that was genetically matched to the person who needed the therapy, researchers had to create an embryo that’s a genetic duplicate of that individual—meaning they had to clone them. With the development of induced stem cells, work on this approach largely fell by the wayside—induced cells were easier to create and came without the ethical baggage. But there are some lingering doubts that the induced cells are truly as flexible as the ones derived from an embryo, leading a number of labs to continue exploring cloning for therapeutic purposes. Now, a collaboration of US and Korean researchers have succeeded in creating early embryos from two adult humans and converted the embryos to embryonic stem cells. The method used is called somatic cell nuclear transplant. It involves taking an unfertilized egg and removing its nucleus, thereby deleting the DNA of the egg donor. At the same time, a nucleus from the cell of a donor is carefully removed and injected into the egg. After some time, during which the environment of the egg resets the developmental status of the donor’s DNA, cell division is activated. If the process is successful, the end result is a small cluster of cells that starts along the path of forming an embryo. Read 5 remaining paragraphs | Comments

Continued here:
75-year-old human cloned for the production of stem cells

All sent and and received e-mails in Gmail will be analyzed, says Google

Google  added a paragraph to its terms of service as of Monday to tell customers that, yes, it does scan e-mail content for advertising and customized search results, among other reasons. The change comes as Google undergoes a lawsuit over its e-mail scanning, with the plaintiffs complaining that Google violated their privacy. E-mail users brought the lawsuit against Google in 2013, alleging that the company was violating wiretapping laws by scanning the content of e-mails. The plaintiffs are varied in their complaints, but some of the cases include people who sent their e-mails to Gmail users from non-Gmail accounts and nonetheless had their content scanned. They argue that since they didn’t use Gmail, they didn’t consent to the scanning. US District Judge Lucy Koh refused Google’s motion to dismiss the case in September. Koh also denied the plaintiffs class-action status in March on the grounds that the ways that Google might have notified the various parties of its e-mail scanning are too varied, and she could not decide the case with a single judgment. Read 2 remaining paragraphs | Comments

Read More:
All sent and and received e-mails in Gmail will be analyzed, says Google

Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers

SRLabs The heavily marketed fingerprint sensor in Samsung’s new Galaxy 5 smartphone has been defeated by whitehat hackers who were able to gain unfettered access to a PayPal account linked to the handset. The hack, by researchers at Germany’s Security Research Labs , is the latest to show the drawbacks of using fingerprints, iris scans, and other physical characteristics to authenticate an owner’s identity to a computing device. While advocates promote biometrics as a safer and easier alternative to passwords, that information is leaked every time a person shops, rides a bus, or eats at a restaurant, giving attackers plenty of opportunity to steal and reuse it. This new exploit comes seven months after a separate team of whitehat hackers bypassed Apple’s Touch ID fingerprint scanner less than 48 hours after it first became available. “We expected we’d be able to spoof the S5’s Finger Scanner, but I hoped it would at least be a challenge,” Ben Schlabs, a researcher at SRLabs, wrote in an e-mail to Ars. “The S5 Finger Scanner feature offers nothing new except—because of the way it is implemented in this Android device—slightly higher risk than that already posed by previous devices.” Read 7 remaining paragraphs | Comments

More here:
Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers