HP’s Spectre x360 13 Promises Up To 16 Hours of Battery Life in a Faster, Cooler Design

From a report: The HP Spectre x360 13 is already one of the most popular 360-degree convertible laptops, and it’s about to get faster and cooler, thanks in part to Intel’s latest 8th-generation Core CPUs. Announced Wednesday, the refreshed Spectre x360 13 also offers greatly improved thermals and other nice tweaks. The Spectre x360 13 will ship on October 29 with a starting price of $1, 150, including a color-matched pen. Best Buy will begin taking pre-orders October 4. Multiple configurations will be available, but we’re listing below the specs we were given for the higher-end model ae013dx: CPU: Intel 8th-generation Core i7-8550U, a quad-core CPU with a 1.8GHz base clock and turbo boost up to 4GHz. Core i5 CPUs will also be available. RAM: 16GB LPDDR3 SDRAM. Storage: 512GB PCIe NVMe M.2 SSD. Read more of this story at Slashdot.

Visit site:
HP’s Spectre x360 13 Promises Up To 16 Hours of Battery Life in a Faster, Cooler Design

Google Scraps Controversial Policy That Gave Free Access To Paywalled Articles Through Search

For years, Google has provided a nifty trick to get around subscriptions for newspapers and magazines. But the company is now doing away with it. From a report: Google is ending its controversial First Click Free (FCF) policy that publishers loathed because it required them to allow Google search results access to news articles hidden behind a paywall. The company is replacing the decade-old FCF with Flexible Sampling, which allows publishers instead to decide how many (if any) articles they want to allow potential subscribers to access. Google says it’s also working on a suite of new tools to help publishers reach new audiences and grow revenue. Via FCF, users could access an article for free but would be prompted to log-in or subscribe if they clicked anywhere else on the page. Publishers were required to allow three free articles per day which Google indexed so that they appeared in searches for a particular topic or keyword. Opting out of the FCF feature was detrimental because it demoted a publisher’s ranking on Google Search and Google News. Read more of this story at Slashdot.

See the original article here:
Google Scraps Controversial Policy That Gave Free Access To Paywalled Articles Through Search

We’re Not Living in a Computer Simulation, New Research Shows

A reader shares a report: A team of theoretical physicists from Oxford University in the UK has shown that life and reality cannot be merely simulations generated by a massive extraterrestrial computer. The finding — an unexpectedly definite one — arose from the discovery of a novel link between gravitational anomalies and computational complexity. In a paper published in the journal Science Advances, Zohar Ringel and Dmitry Kovrizhi show that constructing a computer simulation of a particular quantum phenomenon that occurs in metals is impossible — not just practically, but in principle. The pair initially set out to see whether it was possible to use a technique known as quantum Monte Carlo to study the quantum Hall effect — a phenomenon in physical systems that exhibit strong magnetic fields and very low temperatures, and manifests as an energy current that runs across the temperature gradient. The phenomenon indicates an anomaly in the underlying space-time geometry. They discovered that the complexity of the simulation increased exponentially with the number of particles being simulated. If the complexity grew linearly with the number of particles being simulated, then doubling the number of partices would mean doubling the computing power required. If, however, the complexity grows on an exponential scale — where the amount of computing power has to double every time a single particle is added — then the task quickly becomes impossible. Read more of this story at Slashdot.

Read the original:
We’re Not Living in a Computer Simulation, New Research Shows

Russia Suspected In GPS-Spoofing Attacks On Ships

How did a 37-ton tanker suddenly vanish from GPS off the coast of Russia? AmiMoJo shares a report from Wired: The ship’s systems located it 25 to 30 miles away — at Gelendzhik airport… The Atria wasn’t the only ship affected by the problem… At the time, Atria’s AIS system showed around 20 to 25 large boats were also marooned at Gelendzhik airport. Worried about the situation, captain Le Meur radioed the ships. The responses all confirmed the same thing: something, or someone, was meddling with the their GPS… After trawling through AIS data from recent years, evidence of spoofing becomes clear. GPS data has placed ships at three different airports and there have been other interesting anomalies. “We would find very large oil tankers who could travel at the maximum speed at 15 knots, ” said a former director for Marine Transportation Systems at the U.S. Coast Guard. “Their AIS, which is powered by GPS, would be saying they had sped up to 60 to 65 knots for an hour and then suddenly stopped. They had done that several times”… “It looks like a sophisticated attack, by somebody who knew what they were doing and were just testing the system…” says Lukasz Bonenberg from the University of Nottingham’s Geospatial Institute. “You basically need to have atomic level clocks.” The U.S. Maritime Administration confirms 20 ships have been affected — all traveling in the Black Sea — though a U.S. Coast Guard representative “refused to comment on the incident, saying any GPS disruption that warranted further investigation would be passed onto the Department of Defence.” But the captain of the 37-ton tanker already has his own suspicions. “It looks like the Russians define an area where they don’t want the GPS to apply.” Read more of this story at Slashdot.

Continue reading here:
Russia Suspected In GPS-Spoofing Attacks On Ships

Laser Light Forges Graphene Into the Third Dimension

Big Hairy Ian quotes New Atlas: The wonder material graphene gets many of its handy quirks from the fact that it exists in two dimensions, as a sheet of carbon only one atom thick. But to actually make use of it in practical applications, it usually needs to be converted into a 3D form. Now, researchers have developed a new and relatively simple way to do just that, using lasers to ‘forge’ a three-dimensional pyramid out of graphene… By focusing a laser onto a fine point on a 2D graphene lattice, the graphene at that spot is irradiated and bulges outwards. A variety of three-dimensional shapes can be made by writing patterns with the laser spot, with the height of the shape controlled by adjusting the irradiation dose at each particular point. The team illustrated that technique by deforming a sheet of graphene into a 3D pyramid, standing 60 nm high. That sounds pretty tiny, but it’s 200 times taller than the graphene sheet itself. “The beauty of the technique is that it’s fast and easy to use, ” says one of the researchers. “It doesn’t require any additional chemicals or processing.” Read more of this story at Slashdot.

Excerpt from:
Laser Light Forges Graphene Into the Third Dimension

Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

schwit1 was the first Slashdot reader to bring us the news. Newsweek reports: Archaeologists believe they have found the key to unlocking a mystery almost as old as the Great Pyramid itself: Who built the structure and how were they able to transport two-ton blocks of stone to the ancient wonder more than 4, 500 years ago…? Experts had long established that the stones from the pyramid’s chambers were transported from as far away as Luxor, more than 500 miles to the south of Giza, the location of the Great Pyramid, but had never agreed how they got there. However, the diary of an overseer, uncovered in the seaport of Wadi al-Jafr, appears to answer the age-old question, showing the ancient Egyptians harnessed the power of the Nile to transport the giant blocks of stone. According to a new British documentary Egypt’s Great Pyramid: The New Evidence, which aired on the U.K.’s Channel 4 on Sunday, the Great Pyramid, also known as the Pyramid of Khufu, was built using an intricate system of waterways which allowed thousands of workers to pull the massive stones, floated on boats, into place with ropes. Along with the papyrus diary of the overseer, known as Merer, the archaeologists uncovered a ceremonial boat and a system of waterworks. The ancient text described how Merer’s team dug huge canals to channel the water of the Nile to the pyramid. Read more of this story at Slashdot.

More:
Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

Critical EFI Code in Millions of Macs Isn’t Getting Apple’s Updates

Andy Greenberg, writing for Wired:At today’s Ekoparty security conference, security firm Duo plans to present research on how it delved into the guts of tens of thousands of computers to measure the real-world state of Apple’s so-called extensible firmware interface, or EFI. This is the firmware that runs before your PC’s operating system boots and has the potential to corrupt practically everything else that happens on your machine. Duo found that even Macs with perfectly updated operating systems often have much older EFI code, due to either Apple’s neglecting to push out EFI updates to those machines or failing to warn users when their firmware update hits a technical glitch and silently fails. For certain models of Apple laptops and desktop computers, close to a third or half of machines have EFI versions that haven’t kept pace with their operating system system updates. And for many models, Apple hasn’t released new firmware updates at all, leaving a subset of Apple machines vulnerable to known years-old EFI attacks that could gain deep and persistent control of a victim’s machine. Read more of this story at Slashdot.

Originally posted here:
Critical EFI Code in Millions of Macs Isn’t Getting Apple’s Updates

Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

An anonymous reader writes: SafeBrowse, a Chrome extension with more than 140, 000 users, contains an embedded JavaScript library in the extension’s code that mines for the Monero cryptocurrency using users’ computers and without getting their consent. The additional code drives CPU usage through the roof, making users’ computers sluggish and hard to use. Looking at the SafeBrowse extension’s source code, anyone can easily spot the embedded Coinhive JavaScript Miner, an in-browser implementation of the CryptoNight mining algorithm used by CryptoNote-based currencies, such as Monero, Dashcoin, DarkNetCoin, and others. This is the same technology that The Pirate Bay experimented with as an alternative to showing ads on its site. The extension’s author claims he was “hacked” and the code added without his knowledge. Read more of this story at Slashdot.

View original post here:
Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

Nestle Makes Billions Bottling Water It Pays Nearly Nothing For

Nestle, the world’s largest food and beverage company, has been bottling water since 1843 and has grown into the largest seller of bottled water. But a detailed report on Bloomberg uncovers the company’s operation in Michigan, revealing that Nestle has come to dominate in the industry in part by going into economically depressed areas with lax water laws. It makes billions selling a product for which it pays close to nothing. Find the Bloomberg Businessweek article here (it might be paywalled, here’s an alternative source). Read more of this story at Slashdot.

View post:
Nestle Makes Billions Bottling Water It Pays Nearly Nothing For

AI Just Made Guessing Your Password a Whole Lot Easier

sciencehabit shares a report from Science Magazine: The Equifax breach is reason for concern, of course, but if a hacker wants to access your online data by simply guessing your password, you’re probably toast in less than an hour. Now, there’s more bad news: Scientists have harnessed the power of artificial intelligence (AI) to create a program that, combined with existing tools, figured more than a quarter of the passwords from a set of more than 43 million LinkedIn profiles. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter. The Stevens team created a GAN it called PassGAN and compared it with two versions of hashCat and one version of John the Ripper. The scientists fed each tool tens of millions of leaked passwords from a gaming site called RockYou, and asked them to generate hundreds of millions of new passwords on their own. Then they counted how many of these new passwords matched a set of leaked passwords from LinkedIn, as a measure of how successful they’d be at cracking them. On its own, PassGAN generated 12% of the passwords in the LinkedIn set, whereas its three competitors generated between 6% and 23%. But the best performance came from combining PassGAN and hashCat. Together, they were able to crack 27% of passwords in the LinkedIn set, the researchers reported this month in a draft paper posted on arXiv. Even failed passwords from PassGAN seemed pretty realistic: saddracula, santazone, coolarse18. Read more of this story at Slashdot.

Read the article:
AI Just Made Guessing Your Password a Whole Lot Easier