NSA’s automated hacking engine offers hands-free pwning of the world

Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald in The Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale. Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream. Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked. Read 13 remaining paragraphs | Comments

View original post here:
NSA’s automated hacking engine offers hands-free pwning of the world

Popcorn Time reinvents the seedy process of torrenting

We are used to illegal activities looking and feeling far more illegal than this. A new BitTorrent-powered video app has been released that beautifies the torrenting process to the point that TorrentFreak describes it as “Netflix for pirates.” The app, which is available for OS X, Windows, and Linux, shows a catalog of movies and loads them up on a computer in an interface as seamless as that of most legit streaming services, but using means that are generally less than legal. Typically, torrenting a movie (illegally, if it’s copyrighted property) involves seeking out a sketchy torrent website littered with porn ads to download a .torrent file that users hope will actually result in a movie and not, say, a virus. The process’s pitfalls and risks are many, not to mention the potential for getting called out by one’s ISP and, in rare instances, being fined or sued. Popcorn Time eliminates the seedier aspects of torrent location in a slick app that doesn’t involve dealing with files, download speeds, or seeding—at least on the front end. The app began as a Github project that now has over 50 contributors. It is free, open-source, and has no ads or other money-making schemes. The app works by using an API provided by torrent service YTS to stream the file, which is then shared from the user’s computer after the download is completed. Read 1 remaining paragraphs | Comments

Follow this link:
Popcorn Time reinvents the seedy process of torrenting

Intel’s 800Gbps cables headed to cloud data centers and supercomputers

Intel’s pitch for Silicon Photonics. Intel and several of its partners said they will make 800Gbps cables available in the second half of this year, bringing big speed increases to supercomputers and data centers. The new cables are based on Intel’s Silicon Photonics technology that pushes 25Gbps across each fiber. Last year, Intel demonstrated speeds of 100Gbps in each direction, using eight fibers. A new connector that goes by the name “MXC” holds up to 64 fibers (32 for transmitting and 32 for receiving), enabling a jump to 800Gbps in one direction and 800Gbps in the other, or an aggregate of “1.6Tbps” as Intel prefers to call it. (In case you’re wondering, MXC is not an acronym for anything.) That’s a huge increase over the 10Gbps cables commonly used to connect switches and other equipment in data centers today. The fiber technology also maintains its maximum speed over much greater distances than copper, sending 800Gbps at lengths up to 300 meters, Intel photonics technology lab director Mario Paniccia told Ars. Eventually, the industry could boost the per-line rate from 25Gbps to 50Gbps, doubling the overall throughput without adding fibers, he said. Read 13 remaining paragraphs | Comments

Continue reading here:
Intel’s 800Gbps cables headed to cloud data centers and supercomputers

iOS 7.1 released, improves iPhone 5S stability, iPhone 4 speed, and more

After months of testing, iOS 7.1 is finally here. Andrew Cunningham Apple has just released iOS 7.1, the first major update to iOS 7 . The new update provides a variety of security and stability fixes, some speed improvements, and UI tweaks that refine the new design introduced back in December. The update is available for all devices that can run iOS 7: the iPhone 4, 4S, 5, 5C, and 5S; the iPad 2, both Retina iPads, both iPad minis, and the iPad Air; and the fifth-generation iPod touch. The update brings a whole pile of fixes. It addresses a crashing bug with the iPhone 5S, improves speed on the iPhone 4, introduces the new CarPlay feature, adds new accessibility options, and makes a handful of other refinements to the UI. The first iOS 7.1 beta was released to developers back in mid-November, and four additional betas have been issued since then. Throughout the beta cycle, Apple has continuously adjusted the operating system’s user interface, polishing it and making it more consistent. We’ve been playing with the iOS 7.1 betas for a few months now, and we’ll be publishing a full review of the software after we’ve spent a little more time with the final release. We’ll also be revisiting our original article about performance on the iPhone 4 later today. Read on Ars Technica | Comments

Continued here:
iOS 7.1 released, improves iPhone 5S stability, iPhone 4 speed, and more

First OS X 10.9.3 beta improves support for 4K displays

An OS X 10.9.3 beta running in Retina mode on what appears to be a 39-inch Seiki 4K display. 9to5Mac OS X 10.9.2  was just released last week, but Apple has already begun testing for version 10.9.3, and the update will apparently come with some goodies for users of 4K displays. According to a report by 9to5Mac , the new update enables HiDPI “Retina” scaling on 4K displays that didn’t offer the option in previous OS X versions. It’s possible to enable HiDPI display modes on any monitor in OS X with some tweaking, but Apple is apparently interested in supporting Retina-style output on high-resolution monitors by default. Apple made a big 4K push with its new Mac Pro, which can support up to three 4K displays at once thanks to its twin GPUs and six Thunderbolt 2.0 ports. However, the company doesn’t yet make its own 4K Thunderbolt Display—current Mac Pro buyers can add $3,600 32-inch Sharp 4K displays  to their orders, or they can bring their own monitors. 9to5Mac’s testing was conducted with what appears to be a 39-inch Seiki Digital display , which as of this writing can be had on Amazon for $500 (though it doesn’t support a 60Hz refresh rate at 4K). According to others who have installed the new beta , 10.9.3 also apparently enables 60Hz 4K output on the 2013 Retina MacBook Pros. The Intel and Nvidia GPUs that power these MacBooks were previously capable of 60Hz 4K output when running Windows, but were limited to lower refresh rates in OS X. Higher refresh rates make for a smoother, more pleasant viewing experience, and are especially useful when editing movies, playing games, or in any other activities where response time is important. Those with older Macs likely won’t see 60Hz 4K support even after installing the update—the 2013 Retina MacBook Pros and 2013 Mac Pro are the only systems that support the requisite DisplayPort 1.2 spec. iMacs, MacBook Airs, and the Mac Mini will need to wait for a Thunderbolt 2 upgrade before they can drive high-resolution displays at the higher refresh rate. Read 1 remaining paragraphs | Comments

Read the original:
First OS X 10.9.3 beta improves support for 4K displays

Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

A. Strakey Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library. The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers. The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates . The coding error, which may have been present in the code since 2005 , causes critical verification checks to be terminated, drawing ironic parallels to the extremely critical “goto fail” flaw that for months put users of Apple’s iOS and OS X operating systems at risk of surreptitious eavesdropping attacks. Apple developers have since patched the bug . Read 7 remaining paragraphs | Comments

Link:
Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

Snow Leopard updates are probably done—here are your OS X upgrade options

End of the line, Snowy. Apple Apple offers no end-of-life roadmaps for its operating systems, and it doesn’t officially comment on whether support has dried up for this or that version of OS X. The best you can do is look at historical data. Since switching to a yearly release cadence with Lion back in 2011, Apple seems to be willing to support whatever the latest version is plus the two preceding versions. When OS X 10.9.2 was released earlier this week, it was accompanied by security updates for OS X 10.8 and 10.7 but not for 2009’s OS X 10.6.  It’s the first major security update that Snow Leopard has missed—the OS is still getting iTunes updates, but its last major security patch happened back in September. This has prompted a flurry of posts from various outlets. All point out the same Net Applications data that says 10.6 still powers around 19 percent of Macs. Most compare the OS X support cycle to the much-longer Windows cycle. Some make  a bigger deal about it than others. None really tell anyone in that 19 percent what to do next. You’ll need to know the exact kind of Mac you’re using before proceeding—typing your serial number into this Service and Support page should give you the information you need if you’re not sure. Launching the System Profiler application from the Utilities folder will show you your serial number and your Mac’s specific model identifier (something like MacBook4,1 or iMac11,2), the latter of which can be used with this EveryMac lookup page to find what you’re looking for. Read 17 remaining paragraphs | Comments

Read the article:
Snow Leopard updates are probably done—here are your OS X upgrade options

Two new Windows 8.1 SKUs coming: Standalone Enterprise and low-cost Bing edition

Microsoft is expected to expand the lineup of Windows 8.1 versions with at least one, and probably two, new editions of the operating system. The first is a straightforward affair. At the moment, Windows Enterprise is only available to organizations buying Software Assurance agreements. Microsoft has confirmed to ZDNet that from March 1, Windows Enterprise will be sold to any company with an Open, Select, or Select Plus plan. This will enable companies that don’t want to pay for Software Assurance’s features such as the automatic upgrade entitlements and extras such as the Microsoft Desktop Optimization Pack to have a way to get their hands on the Enterprise edition. Microsoft is also making changes to the interactions between Software Assurance and Windows Pro; you can read the full, complicated story at Directions on Microsoft , written by perhaps the only people on earth with a solid understanding of how Microsoft’s licensing works. Read 3 remaining paragraphs | Comments

See more here:
Two new Windows 8.1 SKUs coming: Standalone Enterprise and low-cost Bing edition

Black holes cheat on the Eddington limit to export extra energy

The shocked gasses of the micro quasar are structured in the same way as those of this actual quasar. NASA, ESA, S. Baum and C. O’Dea (RIT), R. Perley and W. Cotton (NRAO/AUI/NSF), and the Hubble Heritage Team (STScI/AURA) Black holes got their name because they have such intense gravity that, once inside their event horizons, not even light can escape. Somewhat ironically, they’re also some of the brightest objects in the Universe. That’s entirely because of things that happen outside of the event horizon. There, the hole’s intense gravity draws matter into a disk and raises it to very high energies. The disk emits lots of light on its own and sends out jets of high energy particles that emit even more as they interact with the surrounding interstellar material. But this process has a limit—literally called the Eddington limit. At some point, the radiation emitted by the black hole starts driving off the surrounding matter, effectively cutting off its own food supply. You can view the Eddington limit as the point where matter intake is optimal; below it, the hole can swallow more than the environment’s feeding it, while above, matter is being driven off before it can be eaten. Now, thanks to new observations of a black hole in the Southern Pinwheel galaxy (Messier 83), researchers have found that the Eddington limit isn’t an absolute cap on the amount of energy a black hole can emit out into its surroundings. Their observations suggest that this particular black hole sends out almost as much energy in the form of accelerated particles. Read 7 remaining paragraphs | Comments

Read More:
Black holes cheat on the Eddington limit to export extra energy

Twitter restores $50,000 @N username to its owner

In January, Naoki Hiroshima lost his Twitter handle, @N, to the hands of a hacker who used social engineering and extortion to wrest the username from Hiroshima’s hands. But today Twitter restored it to him after more than a month of the username being suspended. After @N was stolen, Hiroshima wrote a post explaining how the theft happened. Ars published the story (which originally appeared on Medium ), as well as an account of a man whose more valuable @jb handle was almost hijacked using the same methods. In Hiroshima’s case, a hacker was able to obtain some credit card information from his PayPal account and used that to reset the login credentials on his GoDaddy account. Then, the thief modified several details pertaining to Hiroshima’s domain so that he was unable to access his own site’s information. When the thief couldn’t reset the password for @N, he turned to extortion, contacting Hiroshima and demanding he reset the password to his Twitter account or suffer the destruction of his website’s domains. Read 3 remaining paragraphs | Comments

Originally posted here:
Twitter restores $50,000 @N username to its owner