Sleeping spacecraft Rosetta nearly ready to wake up for comet landing

ESA The Rosetta spacecraft is due to wake up on the morning of January 20 after an 18-month hibernation in deep space. For the past ten years, the three-ton spacecraft has been on a one-way trip to a 4 km-wide comet. When it arrives, it will set about performing a maneuver that has never been done before: landing on a comet’s surface. The spacecraft has already achieved some success on its long journey through the solar system. It has passed by two asteroids—Steins in 2008 and Lutetia in 2010—and it tried out some of its instruments on them. Because Rosetta’s journey is so protracted, however, preserving energy has been of the utmost importance, which is why it was put into hibernation in June 2011. The journey has taken so long because the spacecraft needed to be “gravity-assisted” by many planets in order to reach the necessary velocity to match the comet’s orbit. Rosetta’s path through the inner Solar System. When it wakes up, Rosetta is expected to take a few hours to establish contact with Earth, 673 million km (396 million mi) away. The scientists involved will wait with bated breath. Dan Andrews, part of a team at the Open University who built one of Rosetta’s on-board instruments, said, “If there isn’t sufficient power, Rosetta will go back to sleep and try again later. The wake-up process is driven by software commands already on the spacecraft. It will wake itself up autonomously and spend some time warming up and orienting its antenna toward Earth to ‘phone home.’” Read 10 remaining paragraphs | Comments

View original post here:
Sleeping spacecraft Rosetta nearly ready to wake up for comet landing

Creator of PGP e-mail encryption making secure Android “Blackphone”

Blackphone Phil Zimmerman, creator of PGP e-mail encryption , is leading a team of security industry executives building an Android phone with a variety of built-in privacy tools. “I’ve been interested in secure telephony for longer than I’ve been interested in secure e-mail,” Zimmerman said in a video on so-called Blackphone ‘s website. “I had to wait for the rest of the technology infrastructure to catch up to make it possible to do secure telephony. PGP was kind of a detour for me while waiting for the rest of the technology to catch up to make really good secure telephony possible.” The narrator of the Blackphone video ominously says, “Technology was supposed to make our lives better. Instead we have lost our privacy—we have become enslaved.” The Blackphone website says the phone will use “PrivatOS,” an Android-based operating system, while letting users “make and receive secure phone calls; exchange secure texts; exchange and store secure files; have secure video chat; browse privately; and anonymize your activity through a VPN.” Read 4 remaining paragraphs | Comments

See more here:
Creator of PGP e-mail encryption making secure Android “Blackphone”

Critical Microsoft, Adobe, and Oracle updates: Like dental floss for your PC

drueckert.com I was still wiping the sleep from my eyes this morning when the nagging voice kicked in: before trawling the Internet for news, you better install yesterday’s security updates. It wasn’t a pleasant thought, given the raft of patches released yesterday by Microsoft, Adobe, and Oracle for a variety of products. But as someone who has covered computer security for eight years, I’ve come to make updating a top priority. And for good reason. A large percentage of the booby-trapped websites that surreptitiously install malware on visitors’ machines exploit vulnerabilities that have already been patched. The recent hack on Yahoo’s ad network , for instance, targeted two security flaws in the Java software framework that Oracle had fixed 17 and 24 months ago, Trend Micro reported in a blog post . Those who visited compromised Yahoo servers with up-to-date systems were immune to those attacks. By contrast, people using unpatched software were exposed to malicious payloads that installed the Dorkbot and Gamarue trojans, as well as malware that turned visitors’ machines into Bitcoin miners. Read 5 remaining paragraphs | Comments

See the original post:
Critical Microsoft, Adobe, and Oracle updates: Like dental floss for your PC

New DoS attacks taking down game sites deliver crippling 100Gbps floods

Online gamers such as these ones often stream their play in real time. Twitch Recent denial-of-service attacks taking down League of Legends and other popular gaming services are doing more than just wielding a never-before-seen technique to vastly amplify the amount of junk traffic directed at targets. In at least some cases, their devastating effects can deprive celebrity game players of huge amounts of money. As Ars reported last week, the attacks are abusing the Internet’s Network Time Protocol (NTP), which is used to synchronize computers to within a few milliseconds of Coordinated Universal Time . A command of just 234 bytes is enough to cause some NTP servers to return a list of up to 600 machines that have previously used its time-syncing service. The dynamic creates an ideal condition for DoS attacks. Attackers send a modest-sized request to NTP servers and manipulate the commands to make them appear as if they came from one of the targeted gaming services. The NTP servers, which may be located in dozens or even hundreds of locations all over the world, in turn send the targets responses that could be tens or hundreds of times bigger than the spoofed request. The technique floods gaming servers with as much as 100Gbps, all but guaranteeing that they’ll be taken down unless operators take specific precautions ahead of time. Among the targets of this new type of attack are game servers used by celebrity players who broadcast live video streams of their gaming prowess that are viewed as many as 50,000 times. In some cases, the massive audiences translate into tens of thousands of dollars per month, as ads are displayed beside video feeds of the players blowing away opponents in Dota 2 and other games. Read 8 remaining paragraphs | Comments

Excerpt from:
New DoS attacks taking down game sites deliver crippling 100Gbps floods

Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Image courtesy of TheTruthAbout. Image courtesy TheTruthAbout LinkedIn is suing a gang of hackers who used Amazon’s cloud computing service to circumvent security measures and copy data from hundreds of thousands of member profiles each day. “Since May 2013, unknown persons and/or entities employing various automated software programs (often referred to as ‘bots’) have registered thousands of fake LinkedIn member accounts and have extracted and copied data from many member profile pages,” company attorneys alleged in a complaint filed this week in US District Court in Northern California. “This practice, known as ‘scraping,’ is explicitly barred by LinkedIn’s User Agreement, which prohibits access to LinkedIn ‘through scraping, spidering, crawling, or other technology or software used to access data without the express written consent of LinkedIn or its Members.'” With more than 259 million members—many who are highly paid professionals in technology, finance, and medical industries—LinkedIn holds a wealth of personal data that can prove highly valuable to people conducting phishing attacks, identity theft, and similar scams. The allegations in the lawsuit highlight the unending tug-of-war between hackers who work to obtain that data and the defenders who use technical measures to prevent the data from falling into the wrong hands. Read 7 remaining paragraphs | Comments

See more here:
Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Imagination Technologies boosts GPU speeds by 50 percent with Series 6XT

Imagination Technologies While most companies are withholding their big phone and tablet-related news until Mobile World Congress next month, this year’s CES is shaping up to be a busy one for mobile chip designers. Nvidia unveiled the latest version of its Tegra SoC last night, and this morning Imagination Technologies took the wraps off of some new graphics IP for mobile chips. There are two new designs being announced today, both relatives to the PowerVR Series 6 GPUs that are beginning to ship in phones and tablets today. At the top-end is the new PowerVR Series 6XT , which promises a 50 percent performance improvement and better power consumption compared to Series 6. These improvements come entirely from architectural optimizations, not more execution resources—the new GX6250, GX6450, and GX6460 parts use two, four, and six of Imagination’s “computer clusters,” the same number available in Series 6 GPUs. There’s also a GX6240 part, which uses two clusters but is “area-optimized” to take up less space in an SoC die. Like Series 6, Series 6XT supports DirectX 10, OpenGL ES 3.0 , and OpenCL 1.x on the API side. The Series 6XT GPU. The other GPU design being announced today is the Series 6XE series, which are being targeted to especially inexpensive or small SoCs. The G6050 and G6060 are both “half-cluster” parts—the two chips are identical aside from the G6060’s PVIRC2 lossless image compression support. The G6100 and G6110 are single cluster parts, again differentiated by PVIRC2 support in the G6110. The GPUs support only DirectX 9 shader model 3, a step down from the Series 6 and Series 6XT parts, but still support OpenGL ES 3.0 and OpenCL 1.x. Read 1 remaining paragraphs | Comments

Continue Reading:
Imagination Technologies boosts GPU speeds by 50 percent with Series 6XT

Researchers warn of new, meaner ransomware with unbreakable crypto

Security researchers have uncovered evidence of a new piece of malware that may be able to take gigabytes’ worth of data hostage unless end users pay a ransom. Discussions of the new malware, alternately dubbed PrisonLocker and PowerLocker, have been occurring on underground crime forums since November, according to a blog post published Friday by Malware Must Die, a group of researchers dedicated to fighting online crime. The malware appears to be inspired by CryptoLocker, the malicious software that wreaked havoc in October when it used uncrackable encryption to lock up victims’ computer files until they paid hundreds of dollars for the decryption key. PowerLocker could prove an even more potent threat because it would be sold in underground forums as a DIY malware kit to anyone who can afford the $100 for a license, Friday’s post warned. CryptoLocker, by contrast, was custom built for use by a single crime gang. What’s more, PowerLocker might also offer several advanced features, including the ability to disable the task manager, registry editor, and other administration functions built into the Windows operating system. Screen shots and online discussions also indicate the newer malware may contain protections that prevent it from being reverse engineered when run on virtual machines. Read 1 remaining paragraphs | Comments

View original post here:
Researchers warn of new, meaner ransomware with unbreakable crypto

AT&T turns data caps into profits with new fees for content providers

Aurich Lawson / Thinkstock AT&T today confirmed a long-rumored plan to monetize wireless data caps by charging content providers for the right to serve up video and other media without chewing up consumers’ monthly data limits. Sometimes called 1-800-DATA, AT&T billed the plan as “a new way for eligible 4G customers to enjoy mobile content and apps over AT&T’s wireless network without impacting their monthly wireless data plan.” Basically, the price of data is being charged to content providers instead of consumers. The rates for consumers and business will be similar. “We will offer AT&T Sponsored Data providers a wide range of options,” an AT&T spokesperson told Ars. “Customers will be billed according to usage, with costs varying by amounts of usage. Rates are comparable to consumer rates.” Read 15 remaining paragraphs | Comments

See the original post:
AT&T turns data caps into profits with new fees for content providers

Putting Windows and Android on the same PC doesn’t solve anyone’s problems

PC makers at CES may announce Windows PCs that run Android apps. But should you do something just because you can? Andrew Cunningham CES begins in just a few short days, but rumors about what we’ll be seeing there are already in full-swing. It’s a fair bet that the usual suspects will show up—phones, tablets, PCs, maybe even a Linux-powered gun or two—but the things that stick out usually end up being the Flavors of the Year. These are often technologies that are cool in theory but fail to light the world on fire in practice. Netbooks, 3D TVs, and the first run of Android tablets are all members of this illustrious group, and so far baubles like 4K TVs and smartwatches look like worthy heirs to the throne. One such upcoming flavor, according to a report from The Verge , is an Intel-backed initiative that combines Windows 8.1 and Android on the same device. Rather than combine an Android tablet with a Windows PC like Asus’ Transformer Book Trio , these computers will seamlessly run Android apps within a Windows environment, probably by way of a virtualization layer like Bluestacks . This idea is in no way new, though the report suggests that a larger push is imminent. The initiative makes some sense for Intel and the OEMs. For Intel, it’s a way to offer tablet makers something that they can’t get from ARM chips like those from Qualcomm or Nvidia: the ability to provide full Windows 8.1 app compatibility combined with Android app compatibility. For the OEMs, it’s (theoretically) a way to patch gaps in Windows 8.1’s improving-but-spotty app store by giving consumers Android tablet apps that they (theoretically) know and love. Read 7 remaining paragraphs | Comments

Follow this link:
Putting Windows and Android on the same PC doesn’t solve anyone’s problems

Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash

Net Market Share In 2013, Internet Explorer reversed some of its historic losses, Google released of Chrome for Android, and Windows 8 surpassed OS X and Windows Vista to become the third most widely used desktop operating system. Net Market Share Net Market Share Compared to last month, Internet Explorer actually fell slightly, declining by 0.45 points. Firefox, Safari, and Opera also fell, down 0.19, 0.08, and 0.06 points, respectively. The month’s winner was Chrome, which picked up 0.78 points. Over the course of the entire year, Internet Explorer was up 3.14 points on 2012. Firefox was down 1.47 points. Chrome was also down by 1.82 points. Safari rose 0.58 points. Read 9 remaining paragraphs | Comments

Read this article:
Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash