Twitter To Extend 140-Character Limit For Tweets

An anonymous reader writes: According to Re/code, Twitter is doing away with its 140-character limit for tweets. The company is currently planning on increasing the limit to 10, 000 characters, though the final number may change before they roll it out. “Twitter is currently testing a version of the product in which tweets appear the same way they do now, displaying just 140 characters, with some kind of call to action that there is more content you can’t see. Clicking on the tweets would then expand them to reveal more content. The point of this is to keep the same look and feel for your timeline, although this design is not necessarily final, sources say.” Read more of this story at Slashdot.

Link:
Twitter To Extend 140-Character Limit For Tweets

How an IRS Agent Stole $1M From Taxpayers

Trailrunner7 writes: Few, if any, companies or government agencies store more sensitive personal information than the IRS, and consumers have virtually no insight into how that data is used and secured. But, as the results of a recent Justice Department investigation show, when you start poking around in those dark corners, you sometimes find very ugly things. Beginning in 2008, a small group of people–including an IRS employee who worked in the Taxpayer Advocate Service section–worked a simple and effective scam that involved fake tax returns, phony refunds, dozens of pre-loaded debit cards, and a web of lies. The scheme relied upon one key ingredient for its success: access to taxpayers’ personal information. And it brought the alleged perpetrators more than $1 million. What sets this case apart is that the accused IRS employee, Nakeisha Hall, was tasked specifically with helping people who had been affected by some kind of tax-related identity theft or fraud. Read more of this story at Slashdot.

See more here:
How an IRS Agent Stole $1M From Taxpayers

AMD’s new graphics architecture is called Polaris

The rumours were true: AMD’s new graphics architecture is called Polaris (it previously went under the codename Arctic Islands), it’s based on a 14nm FinFET process, and it’ll ship in “mid-2016.” Given that AMD’s GPUs—and indeed Nvidia’s—have been stuck at the larger 28nm process node for several years, the move to 14nm should bring huge improvements in power consumption and performance per watt. Details are thin on the ground—AMD has promised to go into much greater detail at a later date—but for now the company has confirmed that Polaris is the fourth generation of its Graphics Core Next (GCN) architecture. The current GCN architecture, GCN 1.2, is used by the likes of the Radeon R9 285 and R9 Fury. Improvements to the command processor, geometry processor, L2 cache, memory controller, multimedia cores, and display engine are promised in fourth-gen GCN, as well as to the all important compute units at the heart of the GPU. Polaris will support hardware 4K h.265 encoding and decoding at 60 FPS, DisplayPort 1.3, and, at long last, HDMI 2.0a. The latter was missing from AMD’s recent Fury and 300-series of GPUs, which instead featured HDMI 1.4a that limited 4K signals to 30 FPS at 60Hz, making them less than ideal for use in the living room with 4K TVs. Read 4 remaining paragraphs | Comments

View article:
AMD’s new graphics architecture is called Polaris

State Dept. Releases 5,500 Hillary Clinton Emails, 275 Retroactively Classified

An anonymous reader sends this report from NBC News: The State Department on Thursday released 5, 500 more pages of Hillary Clinton’s emails, but fell short of meeting a court-ordered target of making 82 percent of the former secretary of state’s messages public by the end of 2015. The email dump is the latest release from the private server Clinton used during her time as America’s top diplomat. The State Department said it failed to meet the court’s goal because of “the large number of documents involved and the holiday schedule.” Portions of 275 documents in the batch were upgraded to classified, though they were not classified at the time they were sent to Clinton’s personal email, according to the State Department. In total, 1, 274 of her emails were retroactively classified by the government before their release. Read more of this story at Slashdot.

View article:
State Dept. Releases 5,500 Hillary Clinton Emails, 275 Retroactively Classified

List of Major Linux Desktop Problems Updated For 2016

An anonymous reader writes: Phoronix reports that Artem S. Tashkinov’s Major Linux Problems on the Desktop has been updated for 2016. It is a comprehensive list of various papercut issues and other inconveniences of Linux on the PC desktop. Among the issues cited for Linux not being ready for the desktop include graphics driver issues, audio problems, hardware compatibility problems, X11 troubles, a few issues with Wayland, and font problems. At the project management side, there is also cited a lack of cooperation among open source developers and fragmentation of desktops. Let’s discuss. Read more of this story at Slashdot.

Read More:
List of Major Linux Desktop Problems Updated For 2016

Using the new Apple TV to emulate classic game consoles

Enlarge / The Apple TV and the Horipad Ultimate MFI controller. (credit: Andrew Cunningham) For those of us fortunate enough to have the privilege, late December and early January bring two things: new toys and a bit of vacation time. That makes it a great time to tinker with little tech projects, things that are inessential and maybe a bit time-consuming but fun enough and useful enough to be worth doing. One of my projects was to experiment with classic console emulators on the new Apple TV . There aren’t many of them yet, and installation takes a little work (Apple doesn’t allow emulators in the App Store), but new capabilities introduced in iOS 9 and the iOS-based tvOS make it possible to install them. Emulation and the Apple TV Right now there are two notable emulation projects targeting tvOS. One is a distant relative of the MAME arcade emulator , though it doesn’t seem as though it’s being maintained. Another, Provenance , is the one we’ll be spending the most time with. It’s a multi-system emulator that supports most major 8- and 16-bit consoles, including the NES, SNES, Sega Master System, Sega Genesis, Sega CD, Game Boy, and Game Boy Advance. Read 17 remaining paragraphs | Comments

Continue reading here:
Using the new Apple TV to emulate classic game consoles

Giant Squid Filmed At Japanese Marina

overThruster writes: The Wall Street Journal reports: “The rare sight of a giant squid swimming inside a marina was captured on video on the coast of the Sea of Japan. According to a manager at the Mizuhashi Fisherina in Toyama prefecture, about 250 kilometers northwest of Tokyo, one fisherman found a 3.7-meter (12.1-foot) giant squid swimming beneath fishing boats docked at the marina on the morning of Dec. 24.” The extraordinary close up video taken by divers shows the giant squid’s natural coloration as well as the action of its siphon propelling it through the water. Additional footage here. Read more of this story at Slashdot.

View original post here:
Giant Squid Filmed At Japanese Marina

Google Joins Mozilla, Microsoft In Pushing For Early SHA-1 Crypto Cutoff

itwbennett writes: Due to recent research showing that SHA-1 is weaker than previously believed, Mozilla, Microsoft and now Google are all considering bringing the deadline forward by six months to July 1, 2016. Websites like Facebook and those protected by CloudFlare have implemented a SHA-1 fallback mechanism. Both companies have argued that there are millions of people in developing countries that still use browsers and operating systems that do not support SHA-2, the replacement function for SHA-1, and will therefore be cut off from encrypted websites that move to SHA-2 certificates. Read more of this story at Slashdot.

Read More:
Google Joins Mozilla, Microsoft In Pushing For Early SHA-1 Crypto Cutoff

Juniper’s Backdoor Password Disclosed, Likely Added In Late 2013

itwbennett writes: In a blog post on Rapid7’s community portal Sunday, HD Moore posted some notes on the Juniper ScreenOS incident, notably that his team discovered the backdoor password that enables the Telnet and SSH bypass. Quoting: “Although most folks are more familiar with x86 than ARM, the ARM binaries are significantly easier to compare due to minimal changes in the compiler output. … Once the binary is loaded, it helps to identify and tag common functions. Searching for the text “strcmp” finds a static string that is referenced in the sub_ED7D94 function. Looking at the strings output, we can see some interesting string references, including auth_admin_ssh_special and auth_admin_internal. … The argument to the strcmp call is

Continue Reading:
Juniper’s Backdoor Password Disclosed, Likely Added In Late 2013

Israeli Firm Creates a Device That Can Hack Any Nearby Phone

An anonymous reader writes: Israeli startup Rayzone created a device that can hack any smartphone that has its WiFi connection open. The device can steal passwords, files, contact lists, photos, and various others. Called InterApp, the device is dumb-proof (comes with a shiny admin panel), works on hundreds of devices at the same time, and leaves no forensics traces behind after the hack. The company says it will only sell it to law enforcement agency. Read more of this story at Slashdot.

View original post here:
Israeli Firm Creates a Device That Can Hack Any Nearby Phone