MLPostFactor Installs Mountain Lion on Older Macs

Mac: When Mountain Lion was released last summer it dropped support for older generation Macs from 2006-2008. There were workaround to get it to work, but they were far from user-friendly. MLPostFactor is a utility that makes the process of getting Mountain Lion installed on an older Mac a bit simpler. More »

Read the original post:
MLPostFactor Installs Mountain Lion on Older Macs

Hackers Swipe Unreleased Game From Ubisoft

hypnosec writes with news that a group of Russian hackers has compromised the security of Ubisoft’s digital distribution platform, uPlay, finding a way for users of the service to download any of its games for free. What makes this particularly notable is that the hackers found a copy of Far Cry 3: Blood Dragon, an unreleased spin-off of Far Cry 3 that hasn’t even been officially announced (except as part of an April Fool’s joke. The hackers posted a half-hour of gameplay footage to YouTube, and Ubisoft took uPlay down to fix the security vulnerability. They say no user information was compromised. Read more of this story at Slashdot.

See the article here:
Hackers Swipe Unreleased Game From Ubisoft

The Search Engine More Dangerous Than Google

mallyn writes “This is an article about a search engine that is designed to look for devices on the net that are not really intended to be viewed and used by the general public. Devices include pool filters, skating rink cooling system, and other goodies. ‘Shodan runs 24/7 and collects information on about 500 million connected devices and services each month. It’s stunning what can be found with a simple search on Shodan. Countless traffic lights, security cameras, home automation devices and heating systems are connected to the Internet and easy to spot. Shodan searchers have found control systems for a water park, a gas station, a hotel wine cooler and a crematorium. Cybersecurity researchers have even located command and control systems for nuclear power plants and a particle-accelerating cyclotron by using Shodan. … A quick search for “default password” reveals countless printers, servers and system control devices that use “admin” as their user name and “1234” as their password. Many more connected systems require no credentials at all — all you need is a Web browser to connect to them.'” Read more of this story at Slashdot.

Taken from:
The Search Engine More Dangerous Than Google

Icefish Bleeds Clear Blood

The ocellated icefish you see above has a very unique blood: it’s totally transparent. Discovery News tells us: The reason, say experts at Tokyo Sea Life Park, is that the Ocellated Ice Fish has no hemoglobin, making it unique among vertebrates the world over. Hemoglobin is the protein found in every other animal with bones. It is what makes blood red and is the agent that carries oxygen around the body. Researchers believe the fish can live without hemoglobin because it has a large heart and uses blood plasma to circulate oxygen throughout its body. Link

Follow this link:
Icefish Bleeds Clear Blood

French Intelligence Agency Forces Removal of Wikipedia Entry

saibot834 writes “The French domestic intelligence agency DCRI has forced a Wikipedia administrator to delete an article about a local military base. The administrator, who is also the president of Wikimédia France, has been threatened by the agency with immediate reprisals after his initial refusal to comply. Following a discussion on the administrator’s noticeboard, the article (which is said to violate a law on the secrecy of the national defense) has been reinstated by a foreign user. Prior to pressuring the admin, DCRI contacted the Wikimedia Foundation (WMF), which refused to remove the article. WMF claimed the article only contained publicly available information, in accordance with Wikipedia’s verifiability policy. While the consequences for Wikimedia’s community remain unclear, one thing is certain: The military base article – now available in English – will get more public awareness than ever before.” Read more of this story at Slashdot.

Follow this link:
French Intelligence Agency Forces Removal of Wikipedia Entry

AMI Firmware Source Code, Private Key Leaked

Trailrunner7 writes “Source code and a private signing key for firmware manufactured by a popular PC hardware maker American Megatrends Inc. (AMI) have been found on an open FTP server hosted in Taiwan. Researcher Brandan Wilson found the company’s data hosted on an unnamed vendor’s FTP server. Among the vendor’s internal emails, system images, high-resolution PCB images and private Excel spreadsheets was the source code for different versions of AMI firmware, code that was current as of February 2012, along with the private signing key for the Ivy Bridge firmware architecture. AMI builds the AMIBIOS BIOS firmware based on the UEFI specification for PC and server motherboards built by AMI and other manufacturers. The company started out as a motherboard maker, and also built storage controllers and remote management cards found in many Dell and HP computers. ‘The worst case is the creation of a persistent, Trojanized update that would allow remote access to the system at the lowest possible level,’ researcher Adam Caudill said. ‘Another possibility would be the creation of an update that would render the system unbootable, requiring replacement of the mainboard.'” Read more of this story at Slashdot.

Read more here:
AMI Firmware Source Code, Private Key Leaked

Bank of America Is Adding Teller Video Chat to Its ATMs

If you regularly find yourself perplexed at ATMs, help is at hand. Bank of America has announced that it’s launching a new system that will allow you to hold a live video chat with bank staff to help guide you through your ineptitude. More »

Read More:
Bank of America Is Adding Teller Video Chat to Its ATMs

How Far Can North Korea’s Missiles Actually Reach?

Though we know in theoretical terms that North Korea has missiles that could hit Los Angeles , where else could North Korea’s missiles actually hit? With all the hub bub about North Korea and its redeployment of missiles on North Korea’s eastern coast, the Washington Post created a map showing the range of North Korea’s various missiles. More »

See original article:
How Far Can North Korea’s Missiles Actually Reach?

Facebook Home official, replaces your app icons with social info (video)

Today Facebook finally took the wraps off Home , a suite of apps and a home screen replacement for Android phones. It’s not just a new UI for launching apps however; it replaces the lockscreen with Cover Feed and prioritizes updates from people instead of apps. There is a standard paginated launcher, that is always just a swipe away. But the focus is on the full-screen images that are your new welcome screen. These are status updates from friends that you can easily flip through and double tap to like when someone posts something exciting. Plain text status updates are placed over a user’s cover photo, to keep the appearance consistent with photo-centric posts. Notifications are presented as small cards, which Facebook applies an algorithm to, in order determine the updates that are most important to you. Just like with the standard Android UI you simply swipe notifications off screen to dismiss them. But, if you want to remove all of them in one shot, you long press a single notification and the rest will be drawn to it and you’ll be able to dismiss the entire stack. Gallery: Facebook’s Android event: Facebook Home Filed under: Software , Mobile , Facebook Comments

Read More:
Facebook Home official, replaces your app icons with social info (video)