Apple unveils redesigned 9.7” iPad Air, available November 1

The big iPad just got a little smaller. Apple has just announced the fifth-generation version of its 9.7-inch flagship tablet, and as expected the tablet has gotten its first major design overhaul since the iPad 2 came out in early 2011. It’s now the “iPad Air.” The device will be available on November 1, and the entry level 16GB price will start at $499 for Wi-Fi only, and $629 with cellular data capabilities. The large iPad will be getting a tidy performance boost from Apple’s new 64-bit A7 SoC, which made its debut in the iPhone 5S. Apple is promising an 8x improvement in CPU performance and a 72x improvement in GPU performance over the original iPad. The device also gets its Wi-Fi upgraded to MIMO technology, gaining multiple multiple antennas provide to transfer data at up to 300Mbps over 802.11n. Read 2 remaining paragraphs | Comments        

See more here:
Apple unveils redesigned 9.7” iPad Air, available November 1

How Apple’s Address Book app could allow the NSA to harvest your contacts

Ashkan Soltani Overlooked in last week’s revelation that the National Security Agency is harvesting hundreds of millions of e-mail address books around the world was this surprising factoid: Apple makes this mass collection easier because the Address Book app that by default manages Mac contacts doesn’t use HTTPS encryption when syncing with Gmail accounts. As a result, addresses that automatically travel between Macs and Google servers are sent as plain text , independent privacy researcher Ashkan Soltani wrote in The Washington Post last Monday. He provided the above screenshot demonstrating that Address Book contents appear in the clear to anyone who has the ability to monitor traffic over a Wi-Fi network or other connection. His observation came 15 months after another Mac user also warned that the Mac app offered no way to enable HTTPS when syncing e-mail address lists with Gmail . “It appears that it’s an Apple issue,” Soltani told Ars, referring to the inability to enable HTTPS when Apple’s Address Book is updated to a user’s Gmail account. “Their other products support Gmail over via HTTPS, so I suspect it would be a three-line fix in the contacts to alleviate this problem.” Read 7 remaining paragraphs | Comments        

View article:
How Apple’s Address Book app could allow the NSA to harvest your contacts

Soylent gets a $1.5 million infusion of venture capital

EVERYBODY SOYLENT. Lee Hutchinson TechCrunch is reporting that Rob Rhinehart’s Soylent, the nutritionally complete meal replacement shake/drink mix, has just closed out a $1.5 million seed funding round from a wide mix of investors led by Andreessen Horowitz and Lerer Ventures. This is on top of the $1.5 million in pre-orders the company already amassed as part of its crazy-successful crowdfunding run earlier this year. The project has been a poster child for crowdfunding success—in fact, the sheer volume of orders has caused its own set of delays in scaling Soylent from a hand-mixed product for a few dozen testers to a mass-produced meal replacement for hundreds of thousands of customers. Rhinehart and company have discussed the ongoing growing pains on the official Soylent blog . The round of funding should give the Soylent crew some breathing room. TechCrunch reports that the company has finalized the 1.0 formulation of the product and will be moving some amount of manufacturing in-house. The company is also moving offices from San Francisco to Los Angeles, and Soylent will bring in a “culinary director” to help evolve the product’s flavor and (currently extremely chalky) mouthfeel. Read 2 remaining paragraphs | Comments        

Visit link:
Soylent gets a $1.5 million infusion of venture capital

Obama administration launches “tech surge” to improve Healthcare.gov

The Department of Health and Human Services announced on October 20 that the agency has launched a “tech surge” to make improvements to the troubled Affordable Care Act (ACA) health insurance exchange website , HealthCare.gov. The move comes as President Barack Obama reportedly prepares to speak about the site’s issues at an event today highlighting the ACA, frequently referred to as “Obamacare.” Secretary of Health and Human Services Kathleen Sebelius had previously blamed most of the problems experienced by citizens visiting the site on unexpected demand. But as problems have continued, the White House has grown increasingly frustrated with the site’s performance. An administration official told the Washington Post that the president and others in the administration “find [the problems with HealthCare.gov] unacceptable.” While HealthCare.gov is being operated almost entirely by a team of contractors, HHS is now stepping in to take an active role in resolving the site’s problems. In a blog post , an unidentified agency spokesperson wrote “Our team is bringing in some of the best and brightest from both inside and outside government to scrub in with the team and help improve HealthCare.gov.” Read 2 remaining paragraphs | Comments        

Original post:
Obama administration launches “tech surge” to improve Healthcare.gov

Windows 8.1: What a difference a year makes

Windows 8 was an ambitious operating system. Microsoft’s goal was, and still is, to have a single operating system that can span the traditional PC, the tablet, and everything in between . To do this, the company introduced a new kind of application —the “Modern” or “Metro” style application. It created a new style of interaction—an edge-based UI for touch users, a hot-corner based one for mouse users. And it developed a new application launcher—the Start screen. Microsoft retained the familiar Windows desktop for running traditional mouse and keyboard driven Windows software. Windows 8 worked. It was a viable operating system, and in broad strokes, it fulfilled Microsoft’s dream of one operating system for tablets and PCs. But Windows 8 was far from perfect. Its problems were in three main areas. Read 91 remaining paragraphs | Comments        

Read more here:
Windows 8.1: What a difference a year makes

Ubuntu 13.10 review: The Linux OS of the future remains a year away

After the customary six months of incubation, Ubuntu 13.10—codenamed Saucy Salamander—has hatched. The new version of the popular Linux distribution brings updated applications and several new features, including augmented search capabilities in the Unity desktop shell. Although Saucy Salamander offers some useful improvements, it’s a relatively thin update. XMir, the most noteworthy item on the 13.10 roadmap, was ultimately deferred for inclusion in a future release. Canonical’s efforts during the Saucy development cycle were largely focused on the company’s new display server and upcoming Unity overhaul, but neither is yet ready for the desktop. Due to the unusual nature of this Ubuntu update, this review is going to diverge a bit from the usual formula. The first half will include a hands-on look at the new Unity features. The second half will take a close look at the Ubuntu roadmap and some of the major changes that we can expect to see over the course of the next several releases. Read 46 remaining paragraphs | Comments        

Read this article:
Ubuntu 13.10 review: The Linux OS of the future remains a year away

To pay off webcam spies, Detroit kid pawns $100k in family jewels for $1,500

Yesterday, I gave a one-hour talk at the University of Michigan on remote administration tools (RATs) and the surprising ways they allow hackers, corporations, schools, and police to spy on computer users by activating microphones and webcams. The talk contains some pretty wild stories—but a woman approached me afterward to let me know that the craziest single RATing story she had ever heard just took place up the road in Detroit. And she was right. The actual RAT attack in question doesn’t sound particularly novel, except that in this case the target was not a young woman (the more typical victim, especially when it comes to voyeurism/sextortion) but a young man named Hector Hernandez. The 17-year old high school student’s computer was infected with a RAT, which the software’s owner used to spy on Hernandez and eventually record an “embarrassing” video of him. The RAT owner then approached Hernandez through his Facebook account and demanded money—$300, then $1,100—or the video would be released to the world. The blackmail demand sent to Hernandez’s Facebook account. Hernandez offers no clues to the content of the video—a long list of scenarios is not difficult to imagine—but in an on-camera interview with Detroit’s FOX affiliate , he makes clear that he simply couldn’t bring himself to tell his parents about the situation. The video was so shameful to Hernandez that instead of going to police or parents, he instead took an estimated $100,000 of family heirlooms and jewelry down the street to a pawn shop. He showed them his ID, which made clear he was only 17, but the pawn shop took the jewelry anyway—and gave Hernandez a mere $1,500 for the lot. Read 3 remaining paragraphs | Comments        

See more here:
To pay off webcam spies, Detroit kid pawns $100k in family jewels for $1,500

New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

For nearly a decade now, TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit. There’s just one problem, though. No one knows who created the software, and worse still, no one has ever conducted a full security audit on it—until now. Since last month, a handful of cryptographers have newly discussed problems and alternatives to the popular application, which lead on Monday to a public call to perform a full security audit on TrueCrypt. As of Tuesday afternoon, that fundraiser reached over $16,000, making a proper check more likely. Much of those funds came from a single $10,000 donation from an Atlanta-based security firm. “We’re now in a place where we have nearly—but not quite enough—to get a serious audit done,” wrote Matthew Green , a  well-known cryptography professor at Johns Hopkins University, on Twitter. Read 3 remaining paragraphs | Comments        

See original article:
New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

Facebook to rip search opt-out from under those who were using it

Here’s the dialog you’ll see if you were opted out of search, when Facebook gets around to opting you back in. Facebook If you checked that box saying you don’t want to appear in Facebook search results, get ready: soon, that choice is going away. Facebook announced in a blog post Thursday that it’s removing the ability to opt out of appearing in search results, both for friends and globally, for those who’ve had it enabled. Facebook actually removed the search opt-out for everyone who didn’t have it enabled early this year, around the time it introduced Graph Search . Now, ten months later, Facebook is giving the boot to anyone who actually cared enough to opt out, referring to the checkbox as an “old search setting.” Facebook claims that less than one percent of users were taking advantage of the feature. In simpler times, Facebook was smaller and easier to navigate, and everyone had a privacy setting asking “Who can look up your timeline by name?” Now that there are so many profiles that users become confused when they know they have a friend or know someone in a group, but try to find them by search and they don’t appear, says Facebook. Read 1 remaining paragraphs | Comments        

See the article here:
Facebook to rip search opt-out from under those who were using it

Meltdowns at NSA spy data center destroy equipment, delay opening

The NSA’s Utah Data Center. Swilsonmc A massive data center being built by the National Security Agency to aid its surveillance operations has been hit by “10 meltdowns in the past 13 months” that “destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, ” the  Wall Street Journal reported last night . The first of four facilities at the  Utah Data Center  was originally scheduled to become operational in October 2012, according to project documents described by the  Journal . But the electrical problems—described as arc fault failures or “a flash of lightning inside a 2-foot box”—led to explosions, failed circuits, and melted metal, the report states: The first arc fault failure at the Utah plant was on Aug. 9, 2012, according to project documents. Since then, the center has had nine more failures, most recently on Sept. 25. Each incident caused as much as $100, 000 in damage, according to a project official. It took six months for investigators to determine the causes of two of the failures. In the months that followed, the contractors employed more than 30 independent experts that conducted 160 tests over 50, 000 man-hours, according to project documents. The 1 million square foot data center is slated to cost $1.4 billion to construct. One project official told the  Journal that the NSA planned to start turning on some of the computers at the facility this week. “But without a reliable electrical system to run computers and keep them cool, the NSA’s global surveillance data systems can’t function, ” the newspaper wrote. Read 2 remaining paragraphs | Comments        

More:
Meltdowns at NSA spy data center destroy equipment, delay opening