AT&T expands gigabit fiber to 23 cities starting at $70 (or $110)

AT&T’s updated GigaPower coverage map. (credit: AT&T ) AT&T yesterday announced expansions of its gigabit fiber Internet service into parts of 23 cities and towns. The new markets are mostly in the suburbs of big cities where AT&T already offered its fastest broadband. For example, AT&T previously brought its “U-verse with GigaPower” service to Atlanta, Chicago, Houston, Miami, Nashville, and Orlando. The expansion this week brings the service into a bunch of cities and towns within the larger metro areas. Pricing for the Internet-only 1Gbps package is either $70 a month or $110 a month, depending on where you live. As we’ve reported previously, AT&T tends to match Google Fiber’s $70 pricing , but not in areas where Google isn’t offering service. Besides that, AT&T’s lowest price in each city requires customers to opt into “Internet Preferences ,” which gives the company permission to examine each customer’s Web traffic in order to serve personalized ads. Read 4 remaining paragraphs | Comments

Continue reading here:
AT&T expands gigabit fiber to 23 cities starting at $70 (or $110)

Microsoft considers blocking SHA-1 certificates after cost of collisions slashed

Microsoft may phase out support for TLS certificates that use the SHA-1 hashing algorithm as early as June 2016 . The decision comes in the wake of recent calculations that suggest generating collisions is quicker and cheaper than previously anticipated. SHA-1 is a hash algorithm, used to derive a 128-bit value from an arbitrary input. Its intent is for collisions—different inputs that hash to the same 128-bit value—to be hard to generate. As compute power has steadily grown over the years, it becomes quicker and cheaper to generate collisions. It was previously projected by Bruce Schneier , based on the observed growth of compute power, that creating SHA-1 collisions would be within reach of criminals by 2018 at a cost of about $173,000. On this basis, Microsoft intended to cease supporting the use of new SSL/TLS certificates using SHA-1 on January 1, 2016 and all SHA-1 SSL/TLS certificates on January 1, 2017. The new cost and performance estimates, however, suggest that the cost is both drastically lower—$75,000 to $120,000—and that the compute resources are immediately available through cloud services such as Amazon EC2. This has given browser vendors little option but to reconsider the previous 2017 timetable for retiring support of SHA-1. Read 2 remaining paragraphs | Comments

Visit link:
Microsoft considers blocking SHA-1 certificates after cost of collisions slashed

First-of-its-kind gene-edited cells treat baby’s leukemia

(credit: Sharon Lees/Great Ormond Street Hospital ) With genetic tweaks and snips, researchers created cancer-busting immune cells that, so far, seem to have wiped out a life-threatening form of leukemia in a one-year-old girl. The new cells are one-size-fits-all, beating out earlier cell-based cancer therapies that required custom engineering of each patient’s own immune cells. If proven effective in more trials, the new, generic cells could offer an easy, off-the-shelf treatment for life-threatening forms of leukemia. “It is something we’ve been waiting for,”  said Stephan Grupp, a professor of pediatrics at the University of Pennsylvania, who was not involved with the research. Previous methods requiring engineering cells, specifically T cells, from every single patient could be slow, costly, and impossible in some patients with low T cell counts. “The innovation here is gene-editing T cells so that one person’s T cells could be given to another even if they are not a donor match,” he said in a statement. Read 5 remaining paragraphs | Comments

Continued here:
First-of-its-kind gene-edited cells treat baby’s leukemia

MPAA shuts down major torrent sites, including Popcorn Time

The site that provides much of the content for illegal movies shown on the “Popcorn Time” app,  PopcornTime.io, has been shut down after the Motion Picture Association of America won court orders in Canada and New Zealand. “Popcorn Time and YTS are illegal platforms that exist for one clear reason: to distribute stolen copies of the latest motion pictures and television shows without compensating the people who worked so hard to make them,” said MPAA Chairman Sen. Chris Dodd in a statement (PDF) . According to the piracy news site TorrentFreak, YTS stopped functioning  in mid-October. Now the MPAA has taken credit for that and the PopcornTime.io shutdown. MPAA sued three “key Canadian operators” of PopcornTime.io on October 9 in Federal Court in Canada. PopcornTime.io was said by its operators to be the “official” PopcornTime fork. On October 16, the MPAA’s member studios obtained an injunction ordering the site to shut down. Read 3 remaining paragraphs | Comments

Originally posted here:
MPAA shuts down major torrent sites, including Popcorn Time

vBulletin password hack fuels fears of serious Internet-wide 0-day attacks

Enlarge (credit: Coldzer0) Developers of the vBulletin software package for website forums released a security patch Monday night, just hours after reports surfaced that a hack on the developers’ site leaked password data and other sensitive information belonging to almost 480,000 subscribers. vBulletin officials have put in place a mandatory password reset for all users after discovering it was subjected to a hack attack. They went on to warn that the attacker “may have accessed customer IDs and encrypted passwords on our system.” A separate post on the vBulletin site makes reference to a security patch for versions 5.1.4 through 5.1.9 of the vBulletin Connect software package. Noticeably missing from either link is an explicit warning that there is a critical vulnerability in vBulletin that has already been actively exploited and puts thousands of sites at risk until they install the patch. Ars asked vBulletin officials to clarify the reports and to confirm or disconfirm the speculation they have generated, but so far the request has gone unanswered. This post contains inferences and information from alternative sources that has yet to be explicitly confirmed. Read 4 remaining paragraphs | Comments

Read more here:
vBulletin password hack fuels fears of serious Internet-wide 0-day attacks

Changing the Earth’s climate by covering the deserts with solar panels

Solar panels in Chile’s Atacama desert. (credit: OPIC.gov ) Currently, the Earth’s inhabitants are consuming about 17.5TeraWatts of power each year. It’s estimated that an aggressive rollout of solar panels could generate at least 400TW, and possibly much, much more. But that would involve paving over a lot of the Earth’s surface with solar panels, in many cases covering relatively reflective sand with dark black hardware. Could this have its own effects on the climate? The answer turns out to be remarkably complex. That’s in part because the panels don’t simply absorb the energy of the light—a fraction of it gets converted to electricity and shipped elsewhere. A team of US and Chinese scientists decided to account for all of this and found out that massive solar installations would cause changes in the climate, but the changes would be minor compared to what we’d see from continued greenhouse gas emissions. The authors created a number of scenarios to tease out the influence of the panels, and they used climate models to examine the changes they drove. The first method involved covering most of the Earth’s deserts and urban areas with solar panels (this would, of course, lead to a ridiculous overproduction of electricity). In a second, the power harvested by these panels was then sent to urban areas and dissipated as heat. Finally, for a somewhat more realistic view, they simply covered most of the deserts of Egypt with panels. Read 5 remaining paragraphs | Comments

Read the original post:
Changing the Earth’s climate by covering the deserts with solar panels

Vast, uncharted viral world discovered on human skin

A transmission electron microscopy image of a bunch of bacteriophages. (credit: ZEISS Microscopy/Flickr ) In the microbial metropolises that thrive in and on the human body, underground networks of viruses loom large. A closer look at human skin has found that it’s teeming with viruses, most of which don’t target us but infect the microbes that live there. Almost 95 percent of those skin-dwelling virus communities are unclassified, researchers report in mBio . Those unknown viruses may prune, manipulate, and hide out in the skin’s bacterial communities, which in turn can make the difference between human health and disease. The finding highlights how much scientists still have to learn about the microscopic affairs that steer human welfare. Past attempts to unmask the viruses on the human body have been hindered by technical difficulties. Viral genomes are much smaller than those of bacteria, making them hard to identify and sift from contamination. In the new study, researchers at the University of Pennsylvania used an advanced method to specifically isolate the DNA of virus-like particles from skin swabs. The researchers also screened viral DNA found on swabs that never touched human skin, allowing them to quickly identify and toss contaminating viruses from their analysis. Read 5 remaining paragraphs | Comments

Read More:
Vast, uncharted viral world discovered on human skin

OEMs to stop selling PCs with Windows 7 by October 31, 2016

In February last year , Microsoft said that it would give a one year warning of when systems with Windows 7 preinstalled would no longer be available from OEMs. That time has finally come to pass. As spotted by Ed Bott , there’s now a date after which Windows 7 OEM preinstalls will no longer be available: October 31, 2016. That same date will also apply to Windows 8.1. Windows 8 preinstalls will end a few months earlier than that, June 30, 2016. This means that after October 31 next year, the only version of Windows that will be available on a new system from a PC builder will be Windows 10. Right now, OEMs can still offer Windows 7 Professional (though not any of the other versions), Windows 8, Windows 8.1, and Windows 10. Windows 7 will remain supported until January 10, 2020. It left mainstream support earlier this year, so it’s no longer eligible to receive non-security fixes or extra features but still has many years of security updates. Read 2 remaining paragraphs | Comments

View the original here:
OEMs to stop selling PCs with Windows 7 by October 31, 2016

Windows 10 will be made an automatic “recommended” update early next year

The Windows 10 free upgrade program has so far concentrated on those Windows 7 and 8 users who reserved their copy in the weeks leading up to the operating system’s release. Over the coming months, Microsoft will start to spread the operating system to a wider audience . The Windows 10 upgrade will soon be posted as an “Optional Update” in Windows Update, advertising it to anyone who examines that list of updates. Then, early next year, it will be categorized as a “Recommended Update.” This is significant, because it means that systems that are configured to download and install recommended updates—which for most people is the safest option—will automatically fetch the upgrade and start its installer. The installer will still require human intervention to actually complete—you won’t wake up to find your PC with a different operating system—but Windows users will no longer need to actively seek the upgrade. This mirrors an accidental change that Microsoft did earlier this month. The Windows 10 upgrade was showing up for some people as a recommended update and the installer started automatically. Read 3 remaining paragraphs | Comments

View post:
Windows 10 will be made an automatic “recommended” update early next year

Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations

Enlarge (credit: Shaik, et al. ) Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks , a feat that shatters widely held perceptions that it’s immune to the types of attacks that targeted earlier specifications. The attacks target the LTE specification , which is expected to have a user base of about 1.37 billion people by the end of the year. They require about $1,400 worth of hardware that run freely available open-source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that’s almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting. The researchers have devised a separate class of attacks that causes phones to lose connections to LTE networks, a scenario that could be exploited to silently downgrade devices to the less secure 2G and 3G mobile specifications. The 2G, or GSM, protocol has long been known to be susceptible to man-in-the-middle attacks using a form of fake base station known as an IMSI catcher  (like the Stingray). 2G networks are also vulnerable to attacks that reveal a phone’s location within about 0.6 square mile . 3G phones suffer from a similar tracking flaw . The new attacks, described in a research paper published Monday, are believed to be the first to target LTE networks, which have been widely viewed as more secure than their predecessors. Read 12 remaining paragraphs | Comments

See original article:
Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations