Faulty red light cameras produced thousands of bogus traffic tickets

At least 13,000 Chicago motorists have been cited with undeserved tickets thanks to malfunctioning red-light cameras, according to a 10-month investigation published Friday by the Chicago Tribune . The report found that the $100 fines were a result of “faulty equipment, human tinkering or both.” According to the investigation: Cameras that for years generated just a few tickets daily suddenly caught dozens of drivers a day. One camera near the United Center rocketed from generating one ticket per day to 56 per day for a two-week period last summer before mysteriously dropping back to normal. Tickets for so-called rolling right turns on red shot up during some of the most dramatic spikes, suggesting an unannounced change in enforcement. One North Side camera generated only a dozen tickets for rolling rights out of 100 total tickets in the entire second half of 2011. Then, over a 12-day spike, it spewed 563 tickets—560 of them for rolling rights. Many of the spikes were marked by periods immediately before or after when no tickets were issued—downtimes suggesting human intervention that should have been documented. City officials said they cannot explain the absence of such records. City officials and Redflex Traffic Systems of Arizona, the report said, “acknowledged oversight failures and said the explosions of tickets should have been detected and resolved as they occurred. But they said that doesn’t mean the drivers weren’t breaking the law, and they defended the red light camera program overall as a safety success story. The program has generated nearly $500 million in revenue since it began in 2003.” Read 1 remaining paragraphs | Comments

View post:
Faulty red light cameras produced thousands of bogus traffic tickets

Fossils of strange Cambrian predator preserved with brains preserved

The new species, showing the eyes (upper and lower center) and a single clawed appendage (top left). Peiyun Cong The animals of the Cambrian are noted for being a collection of oddballs that are sometimes difficult to match up with anything currently living on Earth. But even among these oddities, Anomalocarids stand out (as their name implies). The creatures propelled themselves with a series of oar-like paddles arranged on their flanks, spotted prey with enormous compound eyes , and shoveled them into a disk-like mouth with large arms that resided at the very front of their bodies—although some of them ended up as filter feeders . We’ve identified a large number of anomalocarid species, many of which appear to have been the apex predators of their ecosystems. Yet for all our knowledge of them, there’s a key issue we haven’t clarified: how do they relate to any species that might exist today? New fossils from a Cambrian era deposit in China have revealed three samples of a new species that are so exquisitely preserved that their discoverers can trace the animals’ nerves. And the structure of the brain reveals affinities for two completely different types of organisms. The new species, Lyrarapax unguispinus , is a relatively small anomalocarid  at only about eight centimeters long. Like others of this group, it’s got a set of distinctive features, such as a neck, large compound eyes, and large frontal appendages, in this case shaped a bit like claws. Just past the neck, it’s got two large segments that look a bit like the fins on the sides of animals like dolphins. Read 6 remaining paragraphs | Comments

See the original post:
Fossils of strange Cambrian predator preserved with brains preserved

Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breach

Antana GHash.io announced that “it is not aiming to overcome 39.99 [percent] of the overall Bitcoin hashrate,” in a new statement published Wednesday . This marks a clear departure from the large Bitcoin pool’s recent flirtations with 51 percent . If that threshold is crossed for sustained periods of time, it concentrates power in ways that Bitcoin’s decentralized design normally does not allow. “If GHash.io approaches the respective border, it will be actively asking miners to take their hardware away from GHash.io and mine on other pools,” the statement continues. “GHash.io will encourage other mining pools to write similar voluntary statements from their sides.” Read 6 remaining paragraphs | Comments

Taken from:
Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breach

It may be “barely an operating system,” but DOS still matters (to some people)

By your command. Sean Gallagher Earlier this month, I spent a day working in the throwback world of DOS. More specifically, it was FreeDOS version 1.1, the open source version of the long-defunct Microsoft MS-DOS operating system. It’s a platform that in the minds of many should’ve died a long time ago. But after 20 years, a few dozen core developers and a broader, much larger contributor community continue furthering the FreeDOS project by gradually adding utilities, accessories, compilers, and open-source applications. All this labor of love begs one question: why? What is it about a single-tasking command-line driven operating system—one that is barely up to the most basic of network-driven tasks—that has kept people’s talents engaged for two decades? Haven’t most developers abandoned it for Windows (or, tragically, for IBM OS/2 )? Who still uses DOS, and for what? To find out, Ars reached out to two members of the FreeDOS core development team to learn more about who was behind this seemingly quixotic quest. These devs choose to keep an open-source DOS alive rather than working on something similar but more modern—like Linux. So, needless to say, the answers we got weren’t necessarily expected. Read 22 remaining paragraphs | Comments

See the article here:
It may be “barely an operating system,” but DOS still matters (to some people)

Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords

Context In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices. The attack works against LIFX smart lightbulbs , which can be turned on and off and adjusted using iOS- and Android-based devices. Ars Senior Reviews Editor Lee Hutchinson gave a good overview here of the Philips Hue lights, which are programmable, controllable LED-powered bulbs that compete with LIFX. The bulbs are part of a growing trend in which manufacturers add computing and networking capabilities to appliances so people can manipulate them remotely using smartphones, computers, and other network-connected devices. A 2012 Kickstarter campaign raised more than $1.3 million for LIFX, more than 13 times the original goal of $100,000. According to a blog post published over the weekend , LIFX has updated the firmware used to control the bulbs after researchers discovered a weakness that allowed hackers within about 30 meters to obtain the passwords used to secure the connected Wi-Fi network. The credentials are passed from one networked bulb to another over a mesh network powered by 6LoWPAN , a wireless specification built on top of the IEEE 802.15.4 standard . While the bulbs used the Advanced Encryption Standard (AES) to encrypt the passwords, the underlying pre-shared key never changed, making it easy for the attacker to decipher the payload. Read 4 remaining paragraphs | Comments

More here:
Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords

$1,099 iMac review: lose 50% of your performance to save 18% of the money

Technically, this is the $1,299 iMac, not that you’d be able to tell the difference. Andrew Cunningham Apple’s new $1,099 iMac will undoubtedly be a popular computer. People in the know who want the most computing bang for their buck would be smarter to step up to a higher-end model, but there are plenty of people—casual users, schools, businesses—who just want an iMac that’s “fast enough,” not one that’s “as fast as it could possibly be.” For those people, we obtained one of the new entry-level iMacs so we could evaluate its performance. On paper, it sounds like a big step down—you’re going from a quad-core desktop processor and GPU to a dual-core Ultrabook processor and GPU. This new iMac and the base MacBook Air models in fact use the exact same processor, even though historically there’s been a big performance gap between MacBook Airs and iMacs. In practice, the story is more complicated. Let’s talk about what the new low-end iMac changes, and then we’ll spend some time looking at processor performance. Read 29 remaining paragraphs | Comments

Follow this link:
$1,099 iMac review: lose 50% of your performance to save 18% of the money

The Witcher coming to iOS, Android, WP8 as a free-to-play MOBA game

For a video game, the jump from “series” to “franchise” can have its seriously awkward moments. At what point does it make sense for a beloved game character to show up in different genres, like puzzle, sports, or kart-racing games? It’s a question worth posing to the folks at Polish design studio CD Projekt Red, who today publicly unveiled the first major spin-off for the company’s plot- and morals-loaded RPG series The Witcher . Thankfully, The Witcher: Battle Arena  seems more logical for the series than, say, Dr. Geralt of Rivia’s Mean Bean Machine , as the game will pit the series’ heroes and villains against each other in three-on-three “MOBA”-styled combat by the end of this year. The game’s unveiling didn’t come with a grand pronouncement of new twists on the genre; rather, CD Projekt Red appeared to justify the game’s existence on the fact that quality MOBA games simply don’t exist on smartphones and tablets. “I dare you to name three MOBA games on mobile devices,” Tadek Zielinski said in a Eurogamer report , adding, “We don’t want to fight with League of Legends or Dota . We are a humble company. It wouldn’t be wise to go against guys who are working on it for such a long time.” Read 3 remaining paragraphs | Comments

Follow this link:
The Witcher coming to iOS, Android, WP8 as a free-to-play MOBA game

Millions of dymanic DNS users suffer after Microsoft seizes No-IP domains

Microsoft Millions of legitimate servers that rely on dynamic domain name services from No-IP.com suffered outages on Monday after Microsoft seized 22 domain names it said were being abused in malware-related crimes against Windows users. Microsoft enforced a federal court order making the company the domain IP resolver for the No-IP domains. Microsoft said the objective of the seizure was to identify and reroute traffic associated with two malware families that abused No-IP services. Almost immediately, end-users, some of which were actively involved in Internet security, castigated the move as heavy handed, since there was no evidence No-IP officially sanctioned or actively facilitated the malware campaign, which went by the names Bladabindi (aka NJrat) and Jenxcus (aka NJw0rm). “By becoming the DNS authority for those free dynamic DNS domains, Microsoft is now effectively in a position of complete control and is now able to dictate their configuration,” Claudio Guarnieri, co-founder of Radically Open Security, wrote in an e-mail to Ars Technica. “Microsoft fundamentally swept away No-IP, which has seen parts of its own DNS infrastructure legally taken away.” Read 6 remaining paragraphs | Comments

Read the article:
Millions of dymanic DNS users suffer after Microsoft seizes No-IP domains

Serious Android crypto key theft vulnerability affects 10% of devices

Kevlangdo Researchers have warned of a vulnerability present on an estimated 10 percent of Android phones that may allow attackers to obtain highly sensitive credentials, including cryptographic keys for some banking services and virtual private networks, and PINs or patterns used to unlock vulnerable devices. The vulnerability resides in the Android KeyStore , a highly sensitive region of the Google-made operating system dedicated to storing cryptographic keys and similar credentials, according to an advisory published this week by IBM security researchers. By exploiting the bug, attackers can execute malicious code that leaks keys used by banking and other sensitive apps, virtual private network services, and the PIN or finger patterns used to unlock handsets. The advisory said Google has patched the stack-based buffer overflow only in version 4.4, aka KitKat, of Android. The remaining versions, which according to Google figures run 86.4 percent of devices , have no such fix. In an update, IBM said the vulnerability affected only version 4.3, which runs on about 10.3 percent of handsets. There are several technical hurdles an attacker must overcome to successfully exploit the vulnerability. Android is fortified with modern software protections, including data execution prevention and address space layout randomization, both of which are intended to make it much harder for hackers to execute code when they identify security bugs. Attackers would also have to have an app installed on a vulnerable handset. Still, the vulnerability is serious because it resides in KeyStore, arguably one of the most sensitive resources in the Android OS. In an e-mail, Dan Wallach , a professor specializing in Android security in the computer science department of Rice University, explained: Read 5 remaining paragraphs | Comments

See the original article here:
Serious Android crypto key theft vulnerability affects 10% of devices

Steam reaches highest-ever concurrent user count at over 8 million

Aurich Lawson Over the weekend, Steam’s annual summer video game sale posted its final list of bargains, gathering the two-week sale’s most popular discounts for one last hurrah. Steam sales veterans, heeding the usual advice of “wait until the last day,” responded in kind by storming the service during the sale’s final 24 hours. On Steam’s official statistics page, which logs the past 48 hours of activity, the service confirmed just how big that last hurrah was, counting over 8 million simultaneous live users on Sunday . That’s a new peak for the service, which had crossed the 7 million concurrent mark this past December. Valve Software, operators of the Steam store, announced during January’s Steam Dev Days that the service had reached 75 million active users, which comes shy of the 186 million accounts we measured in April . A NeoGAF thread talking about the Steam numbers showed that they compare well to Xbox Live’s 48 million members (both Gold and otherwise) as of May 2013 and PSN’s 110 million members as of July 2013. Read 1 remaining paragraphs | Comments

View post:
Steam reaches highest-ever concurrent user count at over 8 million