AT&T throttles unlimited data plans at 5GB, no congestion required

It’s no secret that AT&T throttles its users unlimited data connections. The company has been rather open about the policy. However, the carrier insisted that the practice is used to reign in the biggest bandwidth consumers, only necessary to keep network congestion at a minimum. Well, that doesn’t seem to be the case. Big Blue’s info page for “customers with legacy unlimited data plans” explains that when folks hit the 5GB threshold, they’re gonna experience reduced speeds until the billing cycle is up. The reduction to compensate for congestion bit only applies to phones with unlimited data between the 3GB and 5GB mark. Of course, the FCC claims AT&T hasn’t been clear about such practices, including just how slow the connection can get, despite the carrier claiming throttled customers get a text message when speeds are cut. In fact, an Ars Technica report found those figures to dip to half a megabit per second. At any rate, if you’re a big data user, you can expect slower speeds above 5GB, even when the network’s traffic is manageable. [Photo credit: Andrew Harrer/Bloomberg via Getty Images] Filed under: Cellphones , Wireless , Mobile , AT&T Comments Via: Ars Technica Source: AT&T

View original post here:
AT&T throttles unlimited data plans at 5GB, no congestion required

Hacked hearing aids produce stellar ambient tunes from WiFi signals

What if we could hear the numerous invisible data frequencies that swirl around us every day? That’s exactly what a project from hearing-impaired writer Frank Swain and artist Daniel Jones aims to do. Phantom Terrains is the proper name of the effort, and by hacking Swain’s Bluetooth-enabled hearing aids , the duo has transformed WiFi signals into ambient sounds . So instead of seeing the device as a prosthetic, it’s used as a sort of super power. The modification allows him to stroll around and listen to the range of tones electromagnetic signals provide — like the pattern of a network’s security parameters. And of course, no one else nearby can pick them up. “The project challenges the notion of assistive hearing technology as a prosthetic, re-imagining it as an enhancement that can surpass the ability of normal human hearing, ” the pair’s website explains. “By using an audio interface to communicate data feeds rather than a visual one, Phantom Terrains explores hearing as a platform for augmented reality that can immerse us in continuous, dynamic streams of data.” With plenty of invisible signals floating around, there’s no end to the amount of data that’s ripe for this sort of transformation. And thanks to designer Stefanie Posavec, detailed maps of signal data along the way make for quite the interesting visual compliment. Filed under: Misc , Alt Comments Via: Wired Source: Phantom Terrains

See the original post:
Hacked hearing aids produce stellar ambient tunes from WiFi signals

New tech uses ultrasound to create haptics you can ‘see’ and touch

We’ve seen haptic feedback in mid-air before , but not quite like this. The folks from Bristol University are using focused ultrasound in a way that creates a 3D shape out of air that you can see and feel. We know what you’re probably thinking: How do you see something made of air? By directing the apparatus generating it at oil. As you do. According to the school, the tech could see use in letting surgeons feel a tumor while exploring a CT scan. Or, on the consumer side of things, to create virtual knobs you could turn to adjust your car’s infotainment system without taking your eyes off the road. The tech can also apparently be added to 3D displays to make something that’s both visible and touchable. If you’re curious about what it looks like in action, we’ve embedded a video just below. Filed under: Science , Alt Comments Source: University of Bristol

Read More:
New tech uses ultrasound to create haptics you can ‘see’ and touch

Play ‘Breakout’ on your Nintendo 3DS by drumming the Mario theme

Ready to use the browser in your new Nintendo 3DS more than you likely ever have so far? As spotted by the Verge , Japanese user Guiro@Sumaburu found an Easter egg that lets you play a gloriously silly version of Breakout . All you need to do is open the browser, tap on it to the rhythm of the Mario theme song (yep), and then click on your favorite site of choice. That’ll let you smash its link into smithereens in a way that Breakout inventor Steve Wozniak likely never imagined back in 1975 . Filed under: Gaming Comments Via: The Verge Source: Guiro@Sumaburu (Vine)

See original article:
Play ‘Breakout’ on your Nintendo 3DS by drumming the Mario theme

Operation Cleaver report ties Iranian hackers to attacks on major companies

Back in 2013, US officials accused Iranian hackers of breaking into the Navy’s computers. Now, US cyber security firm Cylance says it has evidence to prove that the same team has infiltrated not just the Navy, but also various top companies across the globe within the past two years. An 86-page report published by the firm says the state-sponsored group has hacked more than 50 aerospace companies, airlines, petrol and energy firms, universities and hospitals, among other entities. Among them, ten are reportedly based in the US, while others are based in China, England, France, Germany, India, Israel, Mexico and South Korea. The report didn’t name any of them, but a Reuters source listed these corporations in particular: California power company Calpine Corp, Saudi Arabia’s petroleum and gas company Aramco, Mexican-state-owned Petroleos Mexicanos or Pemex, Qatar Airlines and Korean Air. According to Cylance, the campaign it’s dubbed as Operation Cleaver has concentrated mostly on gathering data from these various agencies. But the firm admits it’s uncovered but a small portion of the breaches thus far, so the campaign could be much larger in scope. Iranian spokesperson Hamid Babaei, however, has denounced Cylance’s report as a “baseless and unfounded allegation fabricated to tarnish the Iranian government image, particularly aimed at hampering current nuclear talks.” If you’re wondering what Iran’s motives are exactly for doing something like this, Cylance suspects it’s revenge. It could be part of the country’s efforts to get back at the US and Israel for (reportedly) developing the Stuxnet worm that infected Iran’s nuclear program years ago. Whatever the real reason is, the firm’s researchers are worried that the stolen data could be used to compromise people’s — say, airline passengers — safety. Hence, they’ve chosen to reveal what they’ve learned to “minimize additional real-world impact and prevent further victimization.” [Image credit: scyther5/Getty] Filed under: Misc Comments Via: Recode Source: Cylance

Read More:
Operation Cleaver report ties Iranian hackers to attacks on major companies

New Bluetooth devices will connect directly to the internet

For all the talk of an Internet of Things , many Bluetooth devices aren’t very internet-savvy; they usually have to rely on WiFi (or another gadget entirely) to hop online. That’s going to change very shortly with the advent of Bluetooth’s new 4.2 spec . If a sensor, smart light bulb or other low-power device supports the new technology, it can connect directly to the internet (through a router or other access point, at least) without needing a go-between. That’s potentially huge for home automation — you could control all your appliances and light fixture from anywhere in the world without requiring special hubs. There’s a lot more going on besides this, of course. Privacy is now much more important; Bluetooth 4.2 makes it harder to track a device without your permission, so a store with iBeacons (as an example) can’t follow you around unless you’ve installed an app. The new wireless tech is also up to 2.5 times faster, and it should be both more power-efficient and reliable. The gotcha with all these updates? You’ll have to wait. The Bluetooth 4.2 standard is ready now (internet access is due within a month), but device makers will still have to implement it before you can see any benefit. You probably won’t get to use 4.2-capable devices until sometime in 2015 as a result, but there are enough heavy-hitting features that your patience may pay off. Filed under: Household , Peripherals , Networking , Internet , Mobile Comments Source: Bluetooth SIG

Read More:
New Bluetooth devices will connect directly to the internet

Stephen Hawking now uses SwiftKey suggestions to communicate faster

Stephen Hawking created some of the most revolutionary ideas in science, but he’s very conservative with his communication tech — right down to the ” copyrighted ” electronic American accent. He has worked with Intel since 1997 on the assistive computer system he relies on to speak and create documents, since motor neuron disease took his real voice decades ago. Hawking isn’t interested in new tech like eye-tracking, but he and Intel recently decided to bring his current text and voice system up-to-date. They ended up getting an assist from a company more familiar to smartphone users — SwiftKey . Intel’s goal was to “retain the familiar user experience, but make that experience more intuitive and powerful.” As a result, it recoded the system from scratch, with a key contribution coming from predictive keyboard maker SwiftKey. Based on its smartphone SDK, the software autocompletes words and remembers Hawking’s style, helping reduce the number of steps he needs to type. Intel also refined his workflow by creating contextual menus for documents or emails to improve ease-of-use. Hawking has been testing it for a few months, and when it’s done, Intel plans to make it available to the open source community. It’s hoping that others will improve the platform further to help folks with similar disabilities, while giving the assistive tech industry a push at the same time. Filed under: Science , Alt , Intel Comments Source: Intel

See original article:
Stephen Hawking now uses SwiftKey suggestions to communicate faster

FBI warns businesses over malware that can override hard drive data

A number of American security professionals must have quickly switched from lazy Thanksgiving mode to high alert on Monday after receiving a flash warning from the FBI. A five-page document was sent out to US businesses’ IT teams warning them against a highly destructive malware, which a group of hackers recently used to infiltrate several companies’ computers, reports Reuters . In order for the companies to take preventative measures, the report contained the lowdown on the malware’s technical details, such as its ability to override hard drives. The malicious code can apparently shut down and permanently disable computers, as well, making it impossible to retrieve files later on. The FBI issues “flash” warnings to businesses in order to update them about high-risk cyber threats. For this particular one, none of the malware’s victims were named, and the agency also wouldn’t confirm or deny when Reuters asked if Sony was one of them. If you recall, Sony Pictures was on the receiving end of a big cyber attack in late November that took down all its computers and led to the leak of several unreleased movies, including Annie and Brad Pitt’s Fury . Guardians of Peace (GOP), the group that launched the attack, threatened to unleash more internal data if their demands (which we still don’t know the details of) weren’t met. On Monday, we’ve received an email from someone who claims to be the GOP’s leader, linking to a public pastebin that contains download links to what he says is part of the data they stole. Since the FBI wouldn’t comment on Sony’s situation, it’s unclear if the company’s still investigating what happened, and whether North Korea was truly involved in the incident. [Image credit: Shutterstock / clarence s lewis] Filed under: Internet Comments Source: Reuters

Continue reading here:
FBI warns businesses over malware that can override hard drive data

Seller of StealthGenie spyware app gets fined $500,000

A US District Judge in Virginia has ordered the man responsible for selling and distributing StealthGenie , an application used to spy on people, to pay a $500, 000 fine and hand over the software’s source code to the authorities. Hammad Akbar, who is originally from Denmark, last week pleaded guilty to the charges of a “sale of an interception device and the advertising of a known interception device, ” in what the Department of Justice is calling the first-ever criminal conviction of its kind . Akbar admitted that StealthGenie could take on many spying tasks once installed on an iOS, Android or BlackBerry smartphone, such as providing access to email, text messages and pictures, as well as intercepting any incoming and outgoing phone calls. “Make no mistake: selling spyware is a federal crime, and the Criminal Division will make a federal case out if it. Today’s guilty plea by a creator of the StealthGenie spyware is another demonstration of our commitment to prosecuting those who would invade personal privacy, ” an Assistant Attorney General involved with the case stated. As expected, the FBI was deeply involved in the takedown of StealthGenie. “This illegal spyware provides individuals with an option to track a person’s every move without their knowledge, ” a spokesperson for the bureau added. “As technology evolves, the FBI will continue to evolve to protect consumers from those who sell illegal spyware.” The moral of the story, people, is don’t make apps to creep on others — unless you’re willing to deal with the Department of Justice, FBI and pay quite a hefty fine. Filed under: Internet , Software Comments Via: ZDNet Source: Department of Justice

See more here:
Seller of StealthGenie spyware app gets fined $500,000

DNA smeared on a rocket survives re-entry and tells of life’s origins

Well, would you look at that: scientists have discovered that DNA can make it through the hellish ordeal of atmospheric re-entry after all. German and Swiss researchers dotted a rocket’s grooves and screw heads with fragments of genetic blueprints to see how they’d fare in situations that could’ve led to the appearance of life on Earth. Scientific American notes that the 13-minute rocket trip might not perfectly represent how DNA might actually travel from one celestial body to the next (that’d be by meteor), but there is purpose here. What the experiment suggests is that even if the meteor’s been scorched, that the material can survive at higher temperatures than previously expected, and as such this paints a better picture of just how resilient DNA is. What’s next? Pushing the limits further and seeing exactly what it takes to kill the double helix — we’re pretty sure at least one rock band is itching to find out. [Image credit: Getty Images/OJO Images RF] Filed under: Science , Alt Comments Via: Scientific American Source: Plos One

More:
DNA smeared on a rocket survives re-entry and tells of life’s origins