OS X 10.11.5 and iTunes 12.4 updates bring security and usability fixes

Enlarge / iTunes 12.4. (credit: Andrew Cunningham) Apple today released OS X 10.11.5, the fifth major update to OS X El Capitan since it was released last September. The company also released iTunes 12.4, a minor update that tweaks the user interface in an effort to simplify it. The El Capitan update doesn’t change much. There are quite a few security fixes  and a few tweaks related to enterprise usage , but little in the way of user-visible changes. iTunes 12.4 is more noticeable change. It doesn’t fix the core problem with iTunes—that having one program to handle local music, streamed music from Apple Music, TV and movie purchases, podcasts, and iOS device backups and administration makes for lots of clutter and confusion—but it does present a marginally more streamlined version of the app everyone loves to hate. The top navigation bar has had several buttons removed, and the app uses a persistent sidebar instead of multiple drop-down menus to let you view your media. iTunes versions of yore also made heavier use of sidebars for navigation—sometimes the old ways really are best. Finally, the back and forward buttons now let you “navigate between your Library, Apple Music, iTunes Store, and more.” Read 1 remaining paragraphs | Comments

Read the article:
OS X 10.11.5 and iTunes 12.4 updates bring security and usability fixes

Windows 10’s Wi-Fi credential sharing is going away in the Anniversary Update

Last night, a new Windows 10 Insider Preview unexpectedly made its way onto the Internet after Microsoft accidentally started releasing it to end users while sending it to Windows Update. The new build, 14342, takes some big steps forward in Edge’s extension support. Previously,  extensions in the Edge browser had to be manually downloaded and installed. Now they are installed and updated in the same way as Universal Windows Apps. The number of extensions available for Edge has also grown, with a couple of ad blockers now joining the fray. With this build, Microsoft is starting to bring back some of the more tablet-oriented features that were in Windows 8 but removed from Windows 10. Swipe navigation in the browser is now back, allowing you to navigate back and forward just by swiping the page left and right. The next Mobile build will also include this capability. Read 4 remaining paragraphs | Comments

Read More:
Windows 10’s Wi-Fi credential sharing is going away in the Anniversary Update

3,000-year-old female mummy was covered in hidden tattoos

On the 3,000-year-old mummy’s neck, you can see two seated baboons on either side of a wadjet eye (top row), which is a symbol of protection. 5 more images in gallery Covered in more than 30 tattoos of flowers, animals, and sacred symbols, this 3,000-year-old mummy is one of the most unusual that archaeologist Anne Austin has ever seen. Though other mummies have been found with abstract markings like dots tattooed on their skin, no one had ever seen figurative drawings like these. Austin and her colleagues were stunned. The mummy, found in a village called Deir el-Medina, was once a woman who proudly inked sacred wadjet eyes on her neck, shoulders, and back, lotus blossoms on her hips, and cows on her arm. Her village was home to artisans who worked in the nearby Valley of the Kings, where they would have carved elaborate sculptures and inscriptions for pharaohs and gods. It’s not clear what the tattoos meant nor why this particular woman had so many of them. But Austin speculates that they had religious significance, particularly the eyes and the cows, which may have been a reference to the goddess Hathor. “Any angle that you look at this woman, you see a pair of divine eyes looking back at you,” she told Nature  after presenting her work at the American Association of Physical Anthropologists. She first discovered the tattoos when she saw the eye and baboons clearly visible on the mummy’s neck. Suspecting there might be more, she used infrared imaging to see ink that had penetrated the woman’s skin but was no longer visible due to dark resins used for mummification. This is the same technique that scientists used to discover the tattoos on the body of Ötzi the Iceman , a 5,300-year-old body that was accidentally preserved in ice for thousands of years. Ötzi had more than 60 tattoos created with ash that were entirely abstract, mostly horizontal lines on parts of his body where joint swelling suggests that he would have been suffering pain. When Austin used infrared imaging, she was able to find many tattoos that were previously hidden. The tattoos on the woman’s back became visible, and Austin and her colleagues used image reconstruction software to correct distortions that were introduced when the mummy’s skin shrank over time. Once the tattoos were stretched, she could clearly see the two cows on the woman’s arm and many other images. Some of the tattoos, she says, were in places where it would have been extremely painful to be tattooed, especially because the process would have been very slow in ancient times. They were also clearly created by someone else, since many were on the woman’s back. These facts suggest the tattoos may have had deep cultural significance. There is also evidence that some of the tattoos were faded, so the woman was probably getting new ink for many years as older tattoos faded. Read 1 remaining paragraphs | Comments

View the original here:
3,000-year-old female mummy was covered in hidden tattoos

Piracy site for academic journals playing game of domain-name Whac-A-Mole

Alexandra Elbakyan won’t let her Sci-Hub pirate site of academic journals die— despite publisher Elsevier’s lawsuit. (credit: Courtesy of Alexandra Elbakyan) We reported a few weeks ago on a popular pirate site for science journals whose oversees admin was being sued by one of the world’s leading academic publishers, Elsevier. Elsevier is the same New York publisher that the late Aaron Swartz had noted in his ” Guerilla Open Access Manifesto ” that told academics and researchers they had a “duty” to free the knowledge they were privileged to read behind Elsevier’s paywall. Because of the lawsuit, which Sci-Hub founder Alexandra Elbakyan has refused to participate in, she’s been engaged in a game of domain-name Whac-A-Mole in response to Elsevier winning court orders demanding the shuttering of the popular site’s domain name. The site allows anybody, not just academics, to access tens of millions of scholastic research articles for free. When Ars interviewed Elbakyan and learned that she had a similar philosophy to Swartz, she had already altered the site’s domain from sci-hub.org to sci-hub.io and changed others because of a court order blocking the .org domain. Now that domain, registered with Chinese registrar Now.cn, has also been killed. That has forced the site to move to sci-hub.bz and sci-hub.cc. This cat-and-mouse domain game is reminiscent of the decade-long game the admins of The Pirate Bay have been playing. When one domain gets lost to a court order, the site springs up on another. Read 3 remaining paragraphs | Comments

Follow this link:
Piracy site for academic journals playing game of domain-name Whac-A-Mole

The Wheel of Time turns… into a “cutting-edge TV series”

Cover art for the first Wheel of Time novel. (credit: Tor Books) After a rough false start , it looks like Robert Jordan’s fantasy epic  The Wheel of Time will be coming to television after all. The news was delivered on the series’ Google+ page by Jordan’s widow, Harriet McDougal, who owns the copyright to the novels and has controlled the franchise’s direction since Jordan’s death in 2007. We have few details about the project at this point, aside from assurances that a “major studio” will have more to share soon: Wanted to share with you exciting news about The Wheel of Time . Legal issues have been resolved. The Wheel of Time will become a cutting edge TV series! I couldn’t be more pleased. Look for the official announcement coming soon from a major studio —Harriet Optioning  The Wheel of Time makes sense, given the appetite for TV adaptations of dense, sprawling fantasy series. HBO’s  Game of Thrones  and Starz’s  Outlander have both been successful, and  Wheel of Time  is a firmly established property that has the added benefit of actually being a finished story already. Read 1 remaining paragraphs | Comments

View article:
The Wheel of Time turns… into a “cutting-edge TV series”

From TV trailblazer to IP afterthought: TiVo bought for $1.1 billion

(credit: cncphotos ) Entertainment company Rovi announced that it has officially acquired DVR maker TiVo in a deal worth $1.1 billion. Rovi will pay for the deal mostly in stock at $10.70 per share, with approximately $277 million to be paid in cash at $2.75 per share. Rovi’s CEO Tom Carson will continue to run the company, although it will now assume the “iconic TiVo brand” as its name. The deal seems to be centered on patents. According to The New York Times , Rovi’s interactive TV program guides account for less than half of its $526 million revenue last year, while the rest is made up of its licensed intellectual property. TiVo made a name for itself with its DVR technology, but the patents that make its DVR hardware and software work are proving to be more valuable. Together, Rovi and TiVo have over 6,000 patents issued and pending in the digital entertainment space. “Rovi’s acquisition of TiVo, with its innovative products, talented team, and substantial intellectual property portfolio, strengthens Rovi’s position as a global leader in media discovery, metadata, analytics, and IP licensing,” Carson said in a statement . “It’s an exciting time as the media and entertainment landscape undergoes a significant evolution…. By working together, Rovi and TiVo will revolutionize how consumers experience media and entertainment and at the same time build value for our stockholders.” Read 1 remaining paragraphs | Comments

Read More:
From TV trailblazer to IP afterthought: TiVo bought for $1.1 billion

7 million unsalted MD5 passwords leaked by Minecraft community Lifeboat

(credit: Lifeboat ) As security breaches go, they don’t get more vexing than this: 7 million compromised accounts that protected passwords using woefully weak unsalted MD5 hashes, and the outfit responsible, still hadn’t disclosed the hack three months after it came to light. And as if that wasn’t enough, the service recommended the use of short passwords. That’s what Motherboard reported Tuesday about Lifeboat , a service that provides custom, multiplayer environments to gamers who use the Minecraft mobile app. The data circulating online included the e-mail addresses and hashed passwords for 7 million Lifeboat accounts. The mass compromise was discovered by Troy Hunt, the security researcher behind the Have I been pwned? breach notification site. Hunt said he had acquired the data from someone actively involved in trading hacked login credentials who has provided similar data in the past. Hunt reported that some of the plaintext passwords users had chosen were so weak that he was able to discover them simply by posting the corresponding MD5 hash into Google. As if many users’ approach to passwords were lackadaisical itself, Lifeboat’s own Getting started guide recommended “short, but difficult to guess passwords” because “This is not online banking.” Read 3 remaining paragraphs | Comments

More:
7 million unsalted MD5 passwords leaked by Minecraft community Lifeboat

4U Storage Pods offer 240TB of storage for 3.6¢/GB

That’s a lot of hard disks. (credit: Backblaze) For the last few years, we’ve looked at the hard disk reliability numbers from cloud backup and storage company Backblaze, but we’ve not looked at the systems it builds to hold its tens of thousands of hard disks. In common with some other cloud companies, Backblaze publishes the specs and designs of its Storage Pods, 4U systems packed with hard disks, and today it announced its sixth generation design , which bumps up the number of disks (from 45 to 60) while driving costs down even further. The first design, in 2009, packed 45 1.5TB disks into a 4U rackable box for a cost of about 12¢ per gigabyte. In the different iterations that have followed, Backblaze has used a number of different internal designs—sometimes using port multipliers to get all the SATA ports necessary, other times using PCIe cards packed with SATA controllers—but it has stuck with the same 45 disk-per-box formula. The new system marks the first break from that setup. It uses the same Ivy Bridge Xeon processor and 32GB RAM of the version 5, adding extra controllers and port multipliers to handle another 15 disks for 60 in total. The result is a little long—it overhangs the back of the rack by about four inches—but it’s packed full of storage. Read 2 remaining paragraphs | Comments

See the original article here:
4U Storage Pods offer 240TB of storage for 3.6¢/GB

“Nuclear” exploit kit service cashes in on demand from cryptoransomware rings

The web console for Nuclear, the customer-friendly malware-as-a-service platform. Some Nucleus infrastructure operating on DigitalOcean servers was recently disrupted. (credit: Check Point) Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an “exploit kit” Web service that deployed malware onto victims’ computers through malicious websites. While a significant percentage of Nuclear’s infrastructure has been recently disrupted, the exploit kit is still operating—and looks to be a major contributor to the current crypto-ransomware epidemic. Introduced in 2010, Nuclear has been used to target millions of victims worldwide, giving attackers the ability to tailor their attacks to specific locations and computer configurations. Though not as widely used as the well-known Angler exploit kit , it has been responsible for dropping Locky and other crypto-ransomware onto over 140,000 computers in over 200 countries, according to statistics collected by Check Point (PDF). The Locky campaign appeared to be placing the greatest demand on the Nuclear pay-to-exploit service. Much of Talos’ data on Nuclear comes from tracking down the source of its traffic—a cluster of “10 to 15” IP addresses that were responsible for “practically all” of the exploit infrastructure. Those addresses were being hosted by a single cloud hosting provider—DigitalOcean. The hosting company’s security team confirmed the findings to Talos and took down the servers—sharing what was on them with security researchers. Read 12 remaining paragraphs | Comments

Follow this link:
“Nuclear” exploit kit service cashes in on demand from cryptoransomware rings

Office up, Surface up, cloud booming in Microsoft’s $20.5 billion quarter

Microsoft posted revenue of $20.5 billion in the third quarter of its 2016 financial year, down 6 percent from the same quarter a year ago. Operating income was $5.3 billion, a 20 percent drop, net income was $3.8 billion, down 25 percent, and earnings per share were $0.47, a 23 percent decline. Over the past few quarters, Microsoft and other tech companies have reported significant impact from the high value of the US dollar, and have offered equivalent financial figures that show what their numbers would have been had the value of foreign earnings not been eroded by this conversion. This currency impact was estimated as reducing revenue by about $0.8 billion. The company also reports that there was a $1.5 billion impact from a combination of revenue deferrals due to Windows 10 upgrades and restructuring charges. Excluding this impact, and assuming constant currency values, the company says that its revenue was $22.1 billion (up 5 percent), operating income was $6.8 billion (up 10 percent), and net income was $5.0 billion (up 6 percent). The commercial cloud annualized revenue run rate—the forecast number that former Steve Ballmer dismissed as ” bullshit “—crept up to $10.0 billion; three months ago, it was estimated at $9.4 billion. Read 8 remaining paragraphs | Comments

Read More:
Office up, Surface up, cloud booming in Microsoft’s $20.5 billion quarter