Charter/Time Warner Cable merger nearing FCC approval

Charter’s footprint after the proposed merger. (credit: Charter ) Federal Communications Commission Chairman Tom Wheeler is likely to support Charter’s proposed acquisition of Time Warner Cable (TWC) and may circulate a proposal to approve the merger with conditions “as soon as this week,”  The Wall Street Journal reported last night, citing “people familiar with the matter.” Wheeler would be circulating a draft order to fellow commissioners, a preliminary step to approving the deal. “The order would impose a number of conditions on the transaction, many of them aimed at boosting online video as a competitor to cable,” the Journal reported. “One condition would bar Charter from including clauses in its pay-TV contracts that restrict a content company’s ability to offer its programming online or to new entrants, the people said. FCC officials worry those clauses, which are thought to be widespread in the pay-TV marketplace, could be impeding the growth of online video.” Read 8 remaining paragraphs | Comments

Read more here:
Charter/Time Warner Cable merger nearing FCC approval

Encrypted WhatsApp messages frustrate new court-ordered wiretap

(credit: Hernán Piñera ) The US Department of Justice has opened another legal front in the ongoing war over easy-to-use strong encryption. According to a Saturday report in  The New York Times , prosecutors have gone head-to-head with WhatsApp, the messaging app owned by Facebook. Citing anonymous sources, the  Times  reported that “as recently as this past week,” federal officials have been “discussing how to proceed in a continuing criminal investigation in which a federal judge had approved a wiretap, but investigators were stymied by WhatsApp’s encryption.” The case, which apparently does not involve terrorism, remains under seal. Read 7 remaining paragraphs | Comments

See the original post:
Encrypted WhatsApp messages frustrate new court-ordered wiretap

TP-Link blocks open source router firmware to comply with new FCC rule

A TP-Link router. (credit: TP-Link. ) Networking hardware vendor TP-Link says it will prevent the loading of open source firmware on routers it sells in the United States in order to comply with new Federal Communications Commission requirements. The FCC wants  to limit interference with other devices by preventing user modifications that cause radios to operate outside their licensed RF (radio frequency) parameters. The FCC says it doesn’t intend to ban the use of third-party firmware such as DD-WRT and OpenWRT; in theory, router makers can still allow loading of open source firmware as long as they also deploy controls that prevent devices from operating outside their allowed frequencies, types of modulation, power levels, and so on. But open source users feared that hardware makers would lock third-party firmware out entirely, since that would be the easiest way to comply with the FCC requirements. The decision by TP-Link—described by the company in this FAQ —shows that those fears were justified. (Thanks to Electronic Frontier Foundation Staff Attorney Nate Cardozo for bringing it to our attention.) Read 11 remaining paragraphs | Comments

See the original article here:
TP-Link blocks open source router firmware to comply with new FCC rule

Man hacks Tesla firmware, finds new model, has car remotely downgraded

The image that hacker Jason Hughes found hidden in Tesla’s latest Model S firmware. (credit: Jason Hughes) It seems Tesla is set to bump the battery capacity of its Model S sedan up to a hefty 100kWh some time in the near future. We know this thanks to the work of a white-hat hacker and Tesla P85D owner named Jason Hughes. Hughes—who previously turned the battery pack from a wrecked Tesla into a storage array for his solar panels—was poking around in the latest firmware of his Model S (version 2.13.77) and discovered an image of the new car’s badge, the P100D. Hughes let the world know via a cryptic tweet: @elonmusk @teslamotors #tesla I know your secret. SHA256 of best part: 5fc38436ec295b0049f186651ebba5fd55e8d7b81eb61cbd00d3f1bf18dd9c81 — Jason Hughes (@wk057) March 4, 2016 That message was soon decrypted by enthusiasts on the Tesla Motors Club forum, at which time Hughes posted a copy of the picture: Read 3 remaining paragraphs | Comments

Link:
Man hacks Tesla firmware, finds new model, has car remotely downgraded

Stretchable, glowing capacitors used to make a touch-sensitive robot

(credit: Larson, et. al., Science) For many of us, the term “robot” still evokes an image of R2D2 or a terminator-style collection of metal parts. But there’s no reason to limit our construction materials to hard parts. A number of labs are working on soft-bodied robots, and have shown they can do some rather interesting things, like squeezing through narrow spaces . A team of researchers from Cornell and the Istituto Italiano di Tecnologia have taken a soft-bodied robot and made it glow. Their method of producing the light, however, has some interesting side effects: it allows the robot to determine how much it has flexed, and it makes the robot responsive to touch. These days, “glow” is usually synonymous with “LED.” But the authors used a very different technique, relying on what’s called an electroluminescent phosphor—basically, something that glows when it’s place in an alternating electric field. The phosphors (zinc sulfide, in this case) can be embedded in a silicone gel, making them stretchable and bendable. Different dopants in the phosphor will cause it to glow in different colors. Read 8 remaining paragraphs | Comments

See the original article here:
Stretchable, glowing capacitors used to make a touch-sensitive robot

New DisplayPort 1.4 standard can drive 8K monitors over a USB Type-C cable

(credit: VESA) Today, most new computers with DisplayPort or USB Type-C connectors support the DisplayPort 1.2 standard, which provides enough bandwidth to drive a 4K display at 60Hz over a single cable. In late 2014, VESA published the DisplayPort 1.3 standard, which increased the available bandwidth enough to drive 60Hz 5K displays or 30Hz 8K displays over a single cable. And today, VESA has finalized and released the DisplayPort 1.4 spec , which can drive 60Hz 8K displays and supports HDR color modes at 5K and 8K. The physical interface used to carry DisplayPort data—High Bit Rate 3 (HBR3), which provides 8.1Gbps of bandwidth per lane—is still the same as it was in DisplayPort 1.3. The new standard drives higher-resolution displays with better color support using Display Stream Compression (DSC), a “visually lossless” form of compression that VESA says “enables up to [a] 3:1 compression ratio.” This data compression, among other things, allows DisplayPort 1.4 to drive 60Hz 8K displays and 120Hz 4K displays with HDR “deep color” over both DisplayPort and USB Type-C cables. USB Type-C cables can provide a USB 3.0 data connection, too. The standard includes a few other features, most of which are targeted at home theater buffs: Read 1 remaining paragraphs | Comments

Taken from:
New DisplayPort 1.4 standard can drive 8K monitors over a USB Type-C cable

Largely undetected Mac malware suggests disgraced HackingTeam has returned

Enlarge (credit: Patrick Wardle ) Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discovery that’s prompting speculation that the disgraced malware-as-a-service provider has reemerged since last July’s hack that spilled gigabytes worth of the group’s private e-mail and source code . The sample was uploaded on February 4 to the Google-owned VirusTotal scanning service , which at the time showed it wasn’t detected by any of the major antivirus programs. (Ahead of this report on Monday, it was detected by 10 of 56 AV services.) A technical analysis published Monday morning by SentinelOne security researcher Pedro Vilaça showed that the installer was last updated in October or November, and an embedded encryption key is dated October 16, three months after the HackingTeam compromise. The sample installs a copy of HackingTeam’s signature Remote Code Systems compromise platform, leading Vilaça to conclude that the outfit’s comeback mostly relies on old, largely unexceptional source code, despite the group vowing in July that it would return with new code. Read 4 remaining paragraphs | Comments

Read the original:
Largely undetected Mac malware suggests disgraced HackingTeam has returned

OS X blacklist accidentally disables Ethernet in OS X 10.11

Enlarge / An errant update may have disabled your Mac’s Ethernet port recently. (credit: Andrew Cunningham) If you’re having problems with your Mac’s Ethernet port this morning, the culprit may be an errant automatic update that Apple published over the weekend. Luckily, the damage isn’t permanent: an Apple support article posted yesterday will walk you through diagnosing and fixing the problem, which involves connecting to your network via Wi-Fi and running a software update command in the Terminal. If you’re reading this and your Ethernet port is working fine, odds are good that you’ve already installed the follow-up update released to fix the problem. The culprit is an update for the System Integrity Protection feature for OS X, the El Capitan feature that protects some system folders and keeps unsigned or incorrectly signed kernel extensions (or “kexts,” roughly analogous to drivers in a Windows or Linux machine) from loading. In this case, the kext used to enable the Ethernet port on Macs was blacklisted—if you restarted your Mac after applying this update but before your computer had a chance to download the quickly issued fix, you’ll find yourself without an Ethernet connection. This blacklist isn’t updated through the Mac App Store like purchased apps or OS X itself. Rather, it uses a seamless auto-update mechanism that executes in the background even if you haven’t enabled normal automatic updates. Apple uses a similar mechanism to update OS X’s anti-malware blacklist, a rudimentary security feature introduced in 2011 following the high-profile Mac Defender malware infection and occasionally used to push other critical software updates . Read 1 remaining paragraphs | Comments

See more here:
OS X blacklist accidentally disables Ethernet in OS X 10.11

Hackers actively exploit critical vulnerability in sites running Joomla

Enlarge / An payload that’s been modified so it can’t be misused. Malicious hackers are using it to perform an object injection attack that leads to a full remote command execution. (credit: Sucuri ) Attackers are actively exploiting a critical remote command-execution vulnerability that has plagued the Joomla content management system for almost eight years, security researchers said. A patch for the vulnerability, which affects versions 1.5 through 3.4.5, was released Monday morning . It was too late: the bug was already being exploited in the wild, researchers from security firm Sucuri warned in a blog post . The attacks started on Saturday from a handful of IP addresses and by Sunday included hundreds of exploit attempts to sites monitored by Sucuri. “Today (Dec 14th), the wave of attacks is even bigger, with basically every site and honeypot we have being attacked,” the blog post reported. “That means that probably every other Joomla site out there is being targeted as well.” Read 2 remaining paragraphs | Comments

See the article here:
Hackers actively exploit critical vulnerability in sites running Joomla

Copyright case over “Happy Birthday” is done, trial canceled

With less than a week to go before a trial, a class-action lawsuit over the copyright status of “Happy Birthday” has been resolved. Details of the settlement, including what kind of uses will be allowed going forward, are not clear. A short order (PDF) filed yesterday by US Chief District Court Judge George King says that all parties have agreed to a settlement, and it vacates a trial which was scheduled to start on December 15. The key turning point came in September , when King ruled that Warner/Chappell’s copyright transfer was invalid because there was no proof it was ever properly transferred from the Hill sisters, who claimed to have written the song. The trial would have addressed damages issues. Also looming was a late copyright claim by Association for Childhood Education International (ACEI), a children’s’ charity affiliated with the Hill sisters. ACEI came forward in November to say that if Warner/Chappell didn’t own the song, it did. The settlement revealed yesterday resolves all claims by the plaintiffs, Warner/Chappell, and ACEI. Read 4 remaining paragraphs | Comments

Read More:
Copyright case over “Happy Birthday” is done, trial canceled