Internet Explorer 10 almost doubles its users thanks to Windows 7 release

Net Marketshare There were no big changes in the browser landscape in March. The top three held their positions, and Windows 8 continues to grow at a sluggish pace. The biggest change? Internet Explorer 10 almost doubled its market share, thanks to the late February release of its Windows 7 version. Net Marketshare Net Marketshare On the desktop, Internet Explorer saw no meaningful change, at 55.83 percent for the month compared to 55.82 last month. Firefox and Chrome both edged up a little, gaining 0.09 and 0.18 points for shares of 20.21 and 16.45 percent respectively. Safari and Opera both nudged downward, losing 0.11 and 0.08 points to drop to 5.31 and 1.74 percent respectively. Net Marketshare Net Marketshare In the mobile space, Safari bounced back, up 6.38 points to 61.79 percent. After a surprising high last month, Opera Mini fell 4.32 points to 8.4 percent. Symbian likewise dropped from an unusual high, losing about two thirds of its February usage. It fell 0.83 points to 0.54 percent. Android Browser was down, losing 0.96 points for a share of 21.86 percent. Read 6 remaining paragraphs | Comments

View article:
Internet Explorer 10 almost doubles its users thanks to Windows 7 release

Bitcoin value triples in a month to all-time high of more than $100

At the end of February, bitcoins hit an all-time trading high of just over $33 . That suddenly looks like chump change, with the value of bitcoins today moving past $100. You can see nearly real-time changes in the value of bitcoins at Coinlab  and track the currency’s steady rise over the past month at Blockchain . We’ve seen the value go up and down today, fluctuating between $99 and $105. The new high is remarkable given that bitcoins were only worth about $13.50 at the beginning of this year. The total value of the nearly 11 million bitcoins in circulation (its ” market cap “) has also soared past $1 billion, after being at less than $50 million one year ago: Read 1 remaining paragraphs | Comments

View post:
Bitcoin value triples in a month to all-time high of more than $100

Bullseye from 1,000 yards: Shooting the $17,000 Linux-powered rifle

1000 yards is a long, long way away. Steven Michael My photographer, Steve, squints through a computerized scope squatting atop a big hunting rifle. We’re outdoors at a range just north of Austin, Texas, and the wind is blowing like crazy—enough so that we’re having to dial in more and more wind adjustment on the rifle’s computer. The spotter and I monitor Steve’s sight through an iPad linked to the rifle via Wi-Fi, and we can see exactly what he’s seeing through the scope. Steve lines up on his target downrange—a gently swinging metal plate with a fluorescent orange circle painted at its center—and depresses a button to illuminate it with the rifle’s laser. “Good tag?” he asks, softly. “Good tag,” replies the spotter, watching on the iPad. He leaves the device in my hands and looks through a conventional high-powered spotting scope at the target Steve has selected. The wind stops momentarily. “Send it,” he calls out. Read 64 remaining paragraphs | Comments

Visit site:
Bullseye from 1,000 yards: Shooting the $17,000 Linux-powered rifle

A flood of prank iMessage texts shows the app can be crashed easily

Human can’t be blamed for thinking this show of affection comes off as a little clingy. Adam Bell/The Next Web On Friday, The Next Web reported that a group of iOS developers were experiencing rapid-fire texts over iMessage, causing bothersome and repetitious messages and notifications. While the prank wasn’t serious on the level of, say, a full-scale DDoS of a bank website , and concern over spam via iMessage is not new either, the unwanted messages were fresh proof of some problems with the iMessage app, specifically in the lack of good spam-detection in iMessage, and in the lack of a way for users to block a message sender. One of the recipients of the spam, an iOS jailbreak tool and app developer who goes by the moniker iH8sn0w , informed The Next Web of the prank when it happened. iH8sn0w told Ars over Twitter that he simply disabled the handle that was getting flooded. “It’s just a bunch of kids bored playing with AppleScript,” he said. Another app and extension developer for iOS devices, Grant Paul, reported on Twitter that he was getting spammed on iMessage with very large messages, causing his iMessage app to crash. “The iMessage spammer has now completely locked me out of my iOS Messages app, by sending long strings of Unicode chars. Definitely a DoS,” Paul wrote on his Twitter account . Ars reached out to Paul but has not yet heard back from him. Read 3 remaining paragraphs | Comments

Visit site:
A flood of prank iMessage texts shows the app can be crashed easily

Jeff Bezos’ new patent envisions tablets without processors, batteries

Bezos’ “remote display” patent envisions tablets and e-readers that are just screens—power and processing is provided wirelessly by a central system. US Patent & Trademark Office It seems like everyone is trying to jump on the cloud computing bandwagon, but Amazon Chairman and CEO Jeff Bezos wants to take it to a whole new level. GeekWire reports  that he and Gregory Hart have filed a patent for “remote displays” that would get data and power from a centrally located “primary station.” The tablets or e-readers would simply be screens, and the need for a large internal battery or significant local processing power would theoretically be obviated by the primary station. The patent sees processors and large internal batteries as the next major roadblocks in the pursuit of thinner and lighter devices. “The ability to continue to reduce the form factor of many of today’s devices is somewhat limited, however, as the devices typically include components such as processors and batteries that limit the minimum size and weight of the device. While the size of a battery is continuously getting smaller, the operational or functional time of these smaller batteries is often insufficient for many users.” The full patent is an interesting read, since it presents other potential use cases for these “remote displays” that wouldn’t necessarily need to wait on this theoretical fully wireless future-tablet to come to pass. For example: a camera or sensor could detect when a hand is passed over an e-reader display and respond by turning the page. A touch-sensitive casing could detect when a child is handling a display by measuring things like the length and width of their fingers and then disable purchasing of new content or the ability to access “inappropriate” content. Read 1 remaining paragraphs | Comments

Excerpt from:
Jeff Bezos’ new patent envisions tablets without processors, batteries

Nvidia plans to turn Ultrabooks into workstations with Grid VCA server

Nvidia CEO Jen-Hsun Huang directs a demo of the Grid Visual Computing Appliance (VCA) during his GTC 2013 keynote. Andrew Cunningham SAN JOSE, CA—One of the announcements embedded in Nvidia CEO Jen-Hsun Huang’s opening keynote for the company’s GPU Technology Conference Tuesday was a brand new server product, something that Nvidia is calling the Grid Visual Computing Appliance, or VCA. The VCA is a buttoned-down, business-focused cousin to the Nvidia Grid cloud gaming server that the company unveiled at CES in January. It’s a 4U rack-mountable box that uses Intel Xeon CPUs and Nvidia’s Grid graphics cards ( née VGX ), and like the Grid gaming server, it takes the GPU in your computer and puts it into a server room. The VCA serves up 64-bit Windows VMs to users, but unlike most traditional VMs, you’ve theoretically got the same amount of graphical processing power at your disposal as you would in a high-end workstation. However, while the two share a lot of underlying technology, both Grid servers have very different use cases and audiences. We met with Nvidia to learn more about just who this server is for and what it’s like to use and administer one. Read 19 remaining paragraphs | Comments

See the original post:
Nvidia plans to turn Ultrabooks into workstations with Grid VCA server

How whitehats stopped the DDoS attack that knocked Spamhaus offline

Unlike Unicast-based networks, Anycast systems use dozens of individual data centers to dilute the effects of distributed denial-of-service attacks. CloudFlare As an international organization that disrupts spam operators, the Spamhaus Project has made its share of enemies. Many of those enemies possess the Internet equivalent of millions of water cannons that can be turned on in an instant to flood targets with more traffic than they can possibly stand. On Tuesday, Spamhaus came under a torrential deluge—75 gigabits of junk data every second—making it impossible for anyone to access the group’s website (the real-time blacklists that ISPs use to filter billions of spam messages were never effected). Spamhaus quickly turned to CloudFlare, a company that secures websites and helps mitigate the effects of distributed denial-of-service attacks. This is a story about how the attackers were able to flood a single site with so much traffic, and the way CloudFlare blocked it using a routing methodology known as Anycast. Read 8 remaining paragraphs | Comments

View article:
How whitehats stopped the DDoS attack that knocked Spamhaus offline

Guerilla researcher created epic botnet to scan billions of IP addresses

Aurich Lawson (after Aliens) In one of the more audacious and ethically questionable research projects in recent memory, an anonymous hacker built a botnet of more than 420,000 Internet-connected devices and used it to perform one of the most comprehensive surveys ever to measure the insecurity of the global network. In all, the nine-month scanning project found 420 million IPv4 addresses that responded to probes and 36 million more addresses that had one or more ports open. A large percentage of the unsecured devices bore the hallmarks of broadband modems, network routers, and other devices with embedded operating systems that typically aren’t intended to be exposed to the outside world. The researcher found a total of 1.3 billion addresses in use, including 141 million that were behind a firewall and 729 million that returned reverse domain name system records. There were no signs of life from the remaining 2.3 billion IPv4 addresses. Continually scanning almost 4 billion addresses for nine months is a big job. In true guerilla research fashion, the unknown hacker developed a small scanning program that scoured the Internet for devices that could be logged into using no account credentials at all or the usernames and passwords of either “root” or “admin.” When the program encountered unsecured devices, it installed itself on them and used them to conduct additional scans. The viral growth of the botnet allowed it to infect about 100,000 devices within a day of the program’s release. The critical mass allowed the hacker to scan the Internet quickly and cheaply. With about 4,000 clients, it could scan one port on all 3.6 billion addresses in a single day. Because the project ran 1,000 unique probes on 742 separate ports, and possibly because the binary was uninstalled each time an infected device was restarted, the hacker commandeered a total of 420,000 devices to perform the survey. Read 16 remaining paragraphs | Comments

Read the original post:
Guerilla researcher created epic botnet to scan billions of IP addresses

Chameleon botnet steals millions from advertisers with fake mouseclicks

Security researchers have discovered a botnet that is stealing millions of dollars per month from advertisers. The botnet does so by simulating click-throughs on display ads hosted on at least 202 websites. Revealed and dubbed “Chameleon” by the Web analytics firm spider.io because of its ability to fool advertisers’ behavior-tracking algorithms, the botnet is the first found to use display advertisements to generate fraudulent income for its masters. In a blog post today, spider.io reported that the company had been tracking Chameleon since December of 2012. Simulating multiple concurrent browser sessions with websites, each bot is able to interact with Flash and JavaScript based ads. So far, more than 120,000 Windows PCs have been identified—95 percent of them with IP addresses associated with US residential Internet services. The company has issued a blacklist of the 5,000 worst-offending IP addresses for advertisers to use to protect themselves from fraud. While in many respects the botnet simulates human activity on webpages to fool countermeasures to clickfraud, it generates random mouse clicks and mouse pointer traces across pages. This makes it relatively easy for bot-infected systems to be identified over time. The bot is also unstable because of the heavy load it puts on the infected machine, and its frequent crashes can also be used as a signature to identify infected systems. Read 1 remaining paragraphs | Comments

See the original post:
Chameleon botnet steals millions from advertisers with fake mouseclicks

The 49ers’ plan to build the greatest stadium Wi-Fi network of all time

49ers CTO Kunal Malik (left) and Senior IT director Dan Williams (right) stand in front of Santa Clara Stadium. Jon Brodkin When the San Francisco 49ers’ new stadium opens for the 2014 NFL season, it is quite likely to have the best publicly accessible Wi-Fi network a sports facility in this country has ever known. The 49ers are defending NFC champions, so 68,500 fans will inevitably walk into the stadium for each game. And every single one of them will be able to connect to the wireless network, simultaneously , without any limits on uploads or downloads. Smartphones and tablets will run into the limits of their own hardware long before they hit the limits of the 49ers’ wireless network. A model of Santa Clara Stadium, with a wall painting visible in the background. Jon Brodkin Jon Brodkin Until now, stadium executives have said it’s pretty much impossible to build a network that lets every single fan connect at once. They’ve blamed this on limits in the amount of spectrum available to Wi-Fi, despite their big budgets and the extremely sophisticated networking equipment that largesse allows them to purchase. Even if you build the network perfectly, it would choke if every fan tried to get on at once—at least according to conventional wisdom. Read 69 remaining paragraphs | Comments

More here:
The 49ers’ plan to build the greatest stadium Wi-Fi network of all time