Lone modder’s Half-Life 2: Update brings modern graphics to a classic

As amazing as Half-Life 2 was when it was first released in 2004, time has not been kind to the original release’s graphics, which can look a bit flat and dated compared to modern PC games. Enter Romanian modder Filip Victor , who’s ready to release the final version of a massive, Source engine-powered graphical update for the game on Steam for free tomorrow. As shown in a slick comparison trailer  and detailed in a PDF brochure , Half-Life 2: Update offers graphical improvements like high dynamic range lighting, improved fog and particle effects, world reflections, more detailed water rendering, improved background models, and other effects that just weren’t feasible back in 2004. The update also fixes a number of animation and cut-scene-activation bugs that have persisted in the original release and adds optional fan commentary from a number of high-profile YouTube personalities. Despite all the graphical changes, the update leaves the original gameplay, level design, character models, textures, and animations intact. “The goal of Half-Life 2: Update is to fix up, polish, and visually enhance Half-Life 2 , without ever changing the 2004 original’s core gameplay, or time-tested style,” Victor wrote in the update’s brochure. “I wanted to ensure that the update was something that would be enduring, and worth the time it takes to play it. I hope that both newcomers and veterans of the Half-Life series will enjoy seeing the work that went into its creation.” Read 2 remaining paragraphs | Comments

Read More:
Lone modder’s Half-Life 2: Update brings modern graphics to a classic

Big solar plants produced 5% of California’s electricity last year

Today, the US Energy Information Agency announced that California had passed a key milestone, becoming the first state to produce five percent of its annual electricity using utility-scale solar power. This represents more than a doubling from the 2013 level, when 1.9 percent of the state’s power came from utility-scale solar, and means that California produces more electricity from this approach than all of the remaining states combined. The growth in California was largely fueled by the opening of two 550MW capacity photovoltaic plants, along with two large solar-thermal plants. In total, the state added nearly two GigaWatts of capacity last year alone. The growth is driven in part by a renewable energy standard that will see the state generate 33 percent of its electricity from non-hydro renewables by 2020; it was at 22 percent in 2014. Other states with renewable standards—Nevada, Arizona, New Jersey, and North Carolina—rounded out the top five. Both Nevada and Arizona obtained 2.8 percent of their electricity from solar; all other states were at one percent or less. Read 2 remaining paragraphs | Comments

View article:
Big solar plants produced 5% of California’s electricity last year

New DNA construct can set off a “mutagenic chain reaction”

A technique for editing genes while they reside in intact chromosomes has been a real breakthrough. Literally . In 2013, Science magazine named it the runner-up for breakthrough-of-the-year, and its developers won the 2015 Breakthrough Prize . The system being honored is called CRISPR/Cas9, and it evolved as a way for bacteria to destroy viruses using RNA that matched the virus’ DNA sequence. But it’s turned out to be remarkably flexible, and the technique can be retargeted to any gene simply by modifying the RNA. Researchers are still figuring out new uses for the system, which means there are papers coming out nearly every week, many of them difficult to distinguish. That may be precisely why the significance of a paper published last week wasn’t immediately obvious. In it, the authors described a way of ensuring that if one copy of a gene was modified by CRISPR/Cas9, the second copy would be—useful, but not revolutionary. What may have been missed was that this process doesn’t stop once those two copies are modified. Instead, it happens in the next generation as well, and then the generation after that. In fact, the modified genes could spread throughout an entire species in a chain reaction, a fact that has raised ethical and safety concerns about the work. Read 14 remaining paragraphs | Comments

Continue Reading:
New DNA construct can set off a “mutagenic chain reaction”

Islamic State doxes US soldiers, airmen, calls on supporters to kill them

Middle East terrorist organization Islamic State (ISIS) has called on its followers take the fight to 100 members of the United States military residing in the US. A group calling itself the “Islamic State Hacking Division” has posted names, addresses, and photographs of soldiers, sailors, and airmen online, asking its “brothers residing in America” to murder them, according to Reuters . Although the posting purports to come from the “Hacking Division,” US Department of Defense officials say that none of their systems appear to have been breached by the group. Instead, the personal data was almost certainly culled from publicly available sources, a DoD official told the  New York Times on the condition of anonymity. Those appearing on the list include crew members from the 2d Bomb Wing at Barksdale Air Force Base in Louisiana and the 5th Bomb Wing at Minot AFB in North Dakota, even though they have played no part in the US air campaign against ISIS. Other military members doxed have either been identified in media reports on the campaign or were cited by name in official DoD reports, officials told the  Times. Read 3 remaining paragraphs | Comments

See the original post:
Islamic State doxes US soldiers, airmen, calls on supporters to kill them

HTTPS-crippling FREAK exploit hits thousands of Android and iOS apps

While almost all the attention paid to the HTTPS-crippling FREAK vulnerability has focused on browsers, consider this: thousands of Android and iOS apps, many with finance, shopping, and medical uses, are also vulnerable to the same exploit that decrypts passwords, credit card details, and other sensitive data sent between handsets and Internet servers. Security researchers from FireEye recently examined the most popular apps on Google Play and the Apple App Store and found 1,999 titles that left users wide open to the encryption downgrade attack. Specifically, 1,228 Android apps with one million or more downloads were vulnerable, while 771 out of the top 14,079 iOS apps were susceptible. Vulnerable apps were those that used—or in the case of iOS, could use—an affected crypto library and connected to servers that offered weak, 512-bit encryption keys. The number of vulnerable apps would no doubt mushroom when analyzing slightly less popular titles. “As an example, an attacker can use a FREAK attack against a popular shopping app to steal a user’s login credentials and credit card information,” FireEye researchers Yulong Zhang, Zhaofeng Chen, Hui Xue, and Tao Wei wrote in a blog post scheduled to be published Tuesday afternoon. “Other sensitive apps include medical apps, productivity apps and finance apps.” The researchers provided the screenshots above and below, which reveal the plaintext data extracted from one of the vulnerable apps after it connected to its paired server. Read 3 remaining paragraphs | Comments

See original article:
HTTPS-crippling FREAK exploit hits thousands of Android and iOS apps

A $6 commute with Wi-Fi, USB ports, and coconut water

SAN FRANCISCO—In a city replete with not only local buses, and the famously-hated tech company buses that shuttle hundreds of workers daily 40 miles south, a new startup is set to debut a private luxury commuter bus line, charging $6 for a roughly three-mile ride. At its Wednesday launch, Leap will only operate four buses (with one more in reserve) during commuting hours, focusing on giving rides from the Marina neighborhood in the city’s north, going southeast to downtown in the morning, and the reverse in the evening. There’s no fixed schedule—the buses are just constantly rolling at 10 to 15 minute intervals, and passengers can check the iOS or Web apps to see when they will arrive. (Ars first profiled Leap in March 2014.) Leap is betting that riders are willing to pay nearly three times what a ride on a local Muni bus costs, and a fair bit less than what a taxi (or its newer cousins, Uber, Lyft, and Sidecar) would charge for a similar journey. What makes it worth that price? Free Wi-Fi, comfortable seats (limited to just 27, no standing passengers), USB ports, plus food and drinks. Read 24 remaining paragraphs | Comments

Read More:
A $6 commute with Wi-Fi, USB ports, and coconut water

Indian ISP’s routing hiccup briefly takes Google down worldwide

For a short time today, people all over the world trying to access Google services were cut off because of what Dyn Research Director of Internet Analysis Doug Madory identified as a “routing leak ” from an Indian broadband Internet provider. The leak is similar to a 2012 incident caused by an Indonesian ISP , which took Google offline for 30 minutes worldwide. Routing leaks occur when a network provider broadcasts all or part of its internal routing table to one or more peered networks via the Border Gateway Protocol, causing network traffic to be routed incorrectly. In this case, the Indian ISP Hathway’s boundary router incorrectly announced routing data for over 300 network prefixes belonging to Google to the Internet backbone via its provider Bharti Airtel. “Bharti in turn announced these routes to the rest of the world,” Madory wrote in a Dyn Research blog entry posted this morning, “and a number of ISPs accepted these routes.” In the US, Cogent and Level 3 accepted the routes; a number of overseas carriers, including Orange, were also affected. Read 1 remaining paragraphs | Comments

See the article here:
Indian ISP’s routing hiccup briefly takes Google down worldwide

AT&T still throttles unlimited data, and FCC isn’t promising to stop it

How long will AT&T continue to get away with throttling unlimited data plans? Even after the Federal Communications Commission’s recent net neutrality ruling banned throttling, the FCC isn’t saying whether it will put a stop to it. All major US cellular carriers impose some form of throttling on unlimited data plans, but AT&T’s throttling seems most likely to fall afoul of the FCC’s rules. The big carriers generally reserve the right to slow down data speeds for customers with unlimited data plans after they hit a certain usage threshold each month, but they only do the actual throttling when the user is connected to a congested tower. AT&T, on the other hand, slows its unlimited LTE users down for the rest of the month once they’ve hit a 5GB threshold, and the throttling happens at all hours of the day and in all locations regardless of whether the user is connected to a congested tower. More than any other throttling policy enforced by a major carrier, this one seems designed to push customers with grandfathered unlimited data plans onto newer, more expensive plans that charge automatic overage fees when customers go over their caps. Read 12 remaining paragraphs | Comments

See the article here:
AT&T still throttles unlimited data, and FCC isn’t promising to stop it

CryptoLocker look-alike searches for and encrypts PC game files

Crypto-based “ransomware” has become a lucrative business for cybercriminals. Since the arrival of CryptoLocker on the scene last year, a number of copycat malware packages have appeared to compete in the cyber-extortion market, encrypting victims’ photos and other personal files with a key that will be destroyed if they don’t contact the malware’s operators and pay up. Recently, a new variant has emerged that seeks to raise the stakes with a particular class of victim by specifically seeking out files related to a number of popular PC games, as well as Valve’s Steam gaming platform. The malware, which is a variant of the crypt-ransomware called TeslaCrypt, superficially looks like CryptoLocker. But according to a number of security researchers who have analyzed the malware, it shares little code with CryptoLocker or its more well-known successor CryptoWall. And while it will also will target photos and documents, as well as iTunes-related files, as Bromium security researcher Vadim Kotov noted in an analysis on Bromium Labs’ blog , TeslaCrypt also includes code that specifically looks for files related to more than 40 specific PC games, gaming platforms, and game developer tools. The games include both single player and multiplayer games, though it isn’t clear how targeting some of the multiplayer games would affect users other than requiring a re-install. The games targeted include a mix of older and newer titles— for example, Blizzard’s StarCraft II and WarCraft III real-time strategy games and its World of Warcraft online game are targeted. Also on TeslaCrypt’s hit list: Bioshock 2, Call of Duty, DayZ, Diablo, Fallout 3, League of Legends, F.E.A.R, S.T.A.L.K.E.R, Minecraft, Metro 2033, Half-Life 2, Dragon Age: Origins, Resident Evil 4, World of Tanks, Metin 2, and The Elder Scrolls (specifically, Skyrim-related files), as well as Star Wars: The Knights Of The Old Republic. There’s also code that searches for files associated with games from specific companies that affect a wide range of titles, including a variety of games from EA Sports, Valve, and Bethesda, and Valve’s Steam gaming platform. And the game development tools RPG Maker, Unity3D and Unreal Engine are targeted as well. Read 4 remaining paragraphs | Comments

See the original article here:
CryptoLocker look-alike searches for and encrypts PC game files

Internet providers ordered to stop hiding the true size of monthly bills

New rules for home Internet providers and wireless carriers require them to be truthful about how much their service actually costs. As part of the transparency requirements in the Federal Communications Commission’s net neutrality order , Internet providers have to clearly detail all charges, such as modem rental and installation fees, and disclose the full monthly price that will go into effect after any promotional pricing expires. The new disclosure rule is more specific than a previous one, the FCC said. Read 7 remaining paragraphs | Comments

Read More:
Internet providers ordered to stop hiding the true size of monthly bills