Tiny, reversible USB Type-C connector finalized

The USB Type-C cable and its various connector designs. USB-IF The USB Promoter Group announced today that it has finalized the design of the USB Type-C plug , a new type of USB plug that’s designed to completely replace every size of all current USB connectors. Like Apple’s Lightning cables, the new connector is reversible so that it can be used in any orientation. According to the USB-IF’s press release ( PDF ), the new connector is “similar in size” to current micro USB 2.0 Type-B connectors (the ones you use for most non-Apple phones and tablets). It is designed to be “robust enough for laptops and tablets” and “slim enough for mobile phones.” The openings for the connector measure roughly 8.4mm by 2.6mm. As we’ve reported previously , cables and adapters for connecting Type-C devices into older Type-A and Type-B ports will be readily available—the prevalence of these older ports will make any industry-wide shift to USB Type-C an arduous, years-long process. Read 2 remaining paragraphs | Comments

See the original post:
Tiny, reversible USB Type-C connector finalized

Meet WordHound, the tool that puts a personal touch on password cracking

Dan Goodin, Ars Technica In the vexing pursuit of passwords that are both easy to remember and hard to crack, many people embed clues into their login credentials, choosing for instance, “playstationplaystationdec2014” to safeguard a recently created gaming account or “L0an@ w0rk!” for an IT administrative account at a financial services company. Now, a whitehat hacker is capitalizing on the habit with a tool that automates the process of launching highly targeted cracking attacks. Dubbed WordHound, the freely available tool scours press releases, white papers, and Twitter accounts belonging to companies or sites that have recently suffered security breaches. The software then generates a list of commonly found words or phrases that attackers can use when trying to convert cryptographic hashes from compromised password databases into the corresponding plaintext passcodes. The tool, devised by security consultant Matthew Marx, was unveiled Wednesday at Passwords 14 conference in Las Vegas. “People are influenced greatly by their environment when choosing a password,” Marx, who works for consultancy MWR Info Security , told Ars. “It could be a work environment, their personal life, or the sport teams they like. I wanted to create a tool that leveraged this human vulnerability.” Read 8 remaining paragraphs | Comments

See the article here:
Meet WordHound, the tool that puts a personal touch on password cracking

Researchers design flat sheet that can fold itself into a robot, walk away

Seth Kroll, Wyss Institute As if a brain-like processing chip weren’t bad enough news for us humans, this week’s edition of Science also describes a robot that, after being laid out as a flat sheet, can fold itself into the appropriate shape to take its on-board electronics for a walk. Why would we possibly want self-assembling, flat-packed electronics of this kind? The authors of the Science paper, who are part of a Harvard/MIT collaboration, offer two reasons. First, it’s much easier to assemble something as a planar surface. With the right layers in place, it’s simple to cut them into the appropriate shapes and then embed the electronics where they’re needed, since there’s no awkward internal spaces to deal with. The second reason is that it’s easy to transport things when they’re shaped like a sheet. Since the devices can assemble themselves, they can be shipped to any destination and used without any hassle or high-level technical knowledge. Of course, having a good idea and actually knowing how to create a self-assembling device are two different things. Fortunately, the ability to construct elaborate three-dimensional items from a flat sheet is a solved problem, thanks to origami. Software like  Origamizer  can even determine how to cut and fold a sheet in order to produce a specified three-dimensional structure. Read 8 remaining paragraphs | Comments

Visit link:
Researchers design flat sheet that can fold itself into a robot, walk away

J. Michael Straczynski wants to reboot Babylon 5 as a big-budget movie

Warner Bros. According to a report from TV Wise , Babylon 5 showrunner J. Michael Straczynski will shortly begin work on a rebooted big-screen version of his 1990s sci-fi TV series. Straczynski made the announcement at San Diego Comic-Con last week. Babylon 5’s pilot episode originally aired in 1993, with the series beginning its regular run almost a year later as a foundational component of the now-defunct Prime Time Entertainment Network . The show lacked the production budget of its contemporary rival Star Trek: Deep Space 9 (which allegedly lifted some or all of its core concepts directly from Straczynski’s original—and rejected— Babylon 5 pitch meeting with Paramount). Still, it attracted enough of an audience to accomplish a noteworthy feat: Babylon 5 became the only non- Star Trek science fiction show on American television to reach its series completion without being cancelled. Not until 2004’s Battlestar Galactica reboot would another non- Star Trek show earn the same distinction. After Babylon 5 ended in 1998, Straczynski (usually referred to simply by his initials, “JMS”) tried multiple times to bring a B5 movie to theaters. The most recent attempt in 2004 came the closest, with a completed script and some preproduction work underway, but without financial backing from Warner Bros. the project had to be abandoned . Read 4 remaining paragraphs | Comments

See original article:
J. Michael Straczynski wants to reboot Babylon 5 as a big-budget movie

Netflix surpasses HBO in subscriber revenue

Reed Hastings’ Facebook update boasting about Netflix’s (possibly temporary) victory over its unwilling adversary. Netflix has surpassed HBO in subscriber revenue, according to a status update from Netflix CEO Reed Hastings on Wednesday. The company is now pulling in $1.146 billion compared to HBO’s $1.141 billion, and it boasts  50.05 million subscribers , according to its second-quarter earnings reported in July. Netflix has long seen HBO as a competitor in terms of audience and, more recently, in produced content. While HBO has slowly started to come down from the ivory cable tower and be more flexible about how it offers its subscriptions, Netflix has been making gains. Hastings acknowledged that HBO still surpasses Netflix “in profits and Emmy’s [sic], but we are making progress.” Hastings has said many times before that he considers HBO to be a media company that is well-positioned in the changing distribution landscape, where power is shifting away from cable providers and toward Internet streaming. Read 2 remaining paragraphs | Comments

See the original post:
Netflix surpasses HBO in subscriber revenue

In major shift, Google boosts search rankings of HTTPS-protected sites

In a shift aimed at fostering wider use of encryption on the Web, Google is tweaking its search engine to favor sites that use HTTPS to protect end users’ privacy and security. Sites that properly implement the transport layer security (TLS) protocol may be ranked higher in search results than those that transmit in plaintext, company officials said in a blog post published Wednesday . The move is designed to motivate sites to use HTTPS protections across a wider swath of pages rather than only on login pages or not at all. Sites that continue to deliver pages over unprotected HTTP could see their search ranking usurped by competitors that offer HTTPS. Facebook is also getting more serious about encryption, with plans to acquire PrivateCore , a company that develops encryption software to protect and validate data stored on servers. In Wednesday’s post, Google Webmaster Trends Analysts Zineb Ait Bahajji and Gary Illyes noted that Google was among the first sites to offer end-to-end HTTPS protection by default across virtually all of its properties. It has also offered a variety of tools to help sites detect and recover from security breaches. They went on to write: Read 2 remaining paragraphs | Comments

Link:
In major shift, Google boosts search rankings of HTTPS-protected sites

Internet Explorer to start blocking old Java plugins

This month’s Patch Tuesday update for Internet Explorer will include a new feature: it will block out-of-date ActiveX controls. More specifically, it will block out-of-date versions of the Java plugin. Although Microsoft is describing the feature as an ActiveX block, the list of prohibited plugins is currently Java-centric. Stale versions of Flash and Silverlight will be able to stick around, at least for now, though Microsoft says that other out-of-date ActiveX controls will be added to the block list later. Old, buggy versions of the Java plugin have long been used as an exploit vector, with Microsoft’s own security report fingering Java in 84.6 to 98.5 percent of detected exploit kits (bundles of malware sold commercially). Blocking obsolete Java plugins should therefore go a long way toward securing end-user systems. Read 1 remaining paragraphs | Comments

See more here:
Internet Explorer to start blocking old Java plugins

What you should expect from Apple’s “iPhone 6”

It hardly seems like it’s been a year since the iPhone 5S was released, but word on the street is that Apple is planning to reveal its next-generation iPhone on September 9. That’s just over a month from now, and the rumor mill has been in full swing all summer, churning out speculation about what Apple will introduce. Since 2008’s iPhone 3G, iPhones released in even numbered years get a new design while phones in odd numbered years are just and sped up and tweaked. Since this is a redesign year, people are especially interested in seeing how Apple moves the platform forward. This close to a new iPhone’s launch, rumors firm up a little and begin to agree on specific aspects of the new hardware. Apple has a big supply chain and sells tens of millions of phones a quarter—given the sheer scale of the operation, it’s inevitable that details will leak. We knew most of the particulars about the iPhone 5S and 5C well before they were officially announced, and there’s no reason to believe that this year will be any different. Now that we have a probable date for the announcement, we’ve rounded up the most credible and plausible rumors (combined with a few educated guesses) to make a rough sketch of what the next-generation iPhone will probably look like. We tried to stick to sources that have been relatively reliable in the past—some of the better reporting from rumor sites and prominent Apple watchers, assertions from major publications like the Wall Street Journal and Bloomberg , and clear, not-obviously-faked pictures of individual components form the basis of our information here. In aggregate, everything we’ve heard so far gives us a pretty good idea of what we can expect next month. Read 26 remaining paragraphs | Comments

See the article here:
What you should expect from Apple’s “iPhone 6”

Whitehats recover, release keys to CryptoLocker ransomware

It must be one of these… Joseph No Whitehat hackers have struck back at the operators of the pernicious CryptoLocker ransom trojan that has held hundreds of thousands of hard drives hostage. Through a partnership that included researchers from FOX-IT and FireEye, researchers managed to recover the private encryption keys that CryptoLocker uses to lock victims’ personal computer files until they pay a $300 ransom. They also reverse engineered the binary code at the heart of the malicious program. The result: a website that allows victims to recover the key for their individual content. To use the free service, victims must upload one of the files encrypted by CryptoLocker along with the e-mail address where they want the secret key delivered. Both FOX-IT and FireEye are reputable security companies, but readers are nonetheless advised to upload only non-sensitive files that contain no personal information. Read 3 remaining paragraphs | Comments

Read the original post:
Whitehats recover, release keys to CryptoLocker ransomware

Groupon lost over $60 million in first half of 2014, stock tanks 15 percent

Groupon There was a reason that we wondered in early 2013 if Groupon would make it to 2014—the company is hemorrhaging cash, and the situation has just gotten a lot worse. According to the company’s latest earnings report published on Tuesday, the online deals site sustained a net loss of $22.8 million in the second quarter of 2014—approximately triple the level of losses the company had during the same period a year ago. During the first half of 2014, Groupon lost over $60.6 million, or over five times what it lost during the first half of 2013. From 2009 through 2013, Groupon has incurred total net losses of over $820 million . Unsurprisingly, the stock price took a hit today —as of this writing, Groupon has plummeted over 15 percent in after-hours trading, hovering just under $6 per share. By comparison, Groupon closed  at just over $26 per share after its first day as a publicly traded company back in November 2011. Read 2 remaining paragraphs | Comments

Visit site:
Groupon lost over $60 million in first half of 2014, stock tanks 15 percent