AT&T to fix Internet congestion before it can be hit with complaint

With a month left before net neutrality complaints can be filed to the Federal Communications Commission, Internet service providers are continuing to sign agreements to prevent network congestion and a potential scolding from regulators. The latest agreement was announced today between AT&T and Level 3 , an Internet backbone operator that has accused broadband providers like AT&T of not upgrading interconnection points, allowing Internet performance for consumers to be degraded. A month ago, Level 3 told National Journal  that it was “evaluating our options” and “still experiencing interconnection point congestion as some large consumer ISPs continue to attempt to leverage control over access to their users to extract arbitrary tolls.” While the FCC’s net neutrality order  bans paid prioritization of traffic after it enters providers’ networks, it doesn’t ban payments for interconnection, which happens at the edges of the network. However, the FCC set up a complaint process so it can decide whether particular demands are unreasonable and prod companies into providing enough capacity to prevent Internet slowdowns. Complaints can be filed beginning June 12. Read 3 remaining paragraphs | Comments

Original post:
AT&T to fix Internet congestion before it can be hit with complaint

Boeing 787 Dreamliners contain a potentially catastrophic software bug

A software vulnerability in Boeing’s new 787 Dreamliner jet has the potential to cause pilots to lose control of the aircraft, possibly in mid-flight, Federal Aviation Administration officials warned airlines recently. The bug—which is either a classic integer overflow or one very much resembling it—resides in one of the electrical systems responsible for generating power, according to memo the FAA issued last week . The vulnerability, which Boeing reported to the FAA, is triggered when a generator has been running continuously for a little more than eight months. As a result, FAA officials have adopted a new airworthiness directive (AD) that airlines will be required to follow, at least until the underlying flaw is fixed. “This AD was prompted by the determination that a Model 787 airplane that has been powered continuously for 248 days can lose all alternating current (AC) electrical power due to the generator control units (GCUs) simultaneously going into failsafe mode,” the memo stated. “This condition is caused by a software counter internal to the GCUs that will overflow after 248 days of continuous power. We are issuing this AD to prevent loss of all AC electrical power, which could result in loss of control of the airplane.” Read 2 remaining paragraphs | Comments

Link:
Boeing 787 Dreamliners contain a potentially catastrophic software bug

Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Less than 24 hours after Google unveiled a Chrome extension that warns when user account passwords get phished , a security researcher has devised a drop-dead simple exploit that bypasses it. This benign proof-of-concept exploit looks almost identical to a Google login page, and is typical of a malicious phishing page that attempts to trick people into entering their user name and password. If Google’s freely available Password Alert extension was better designed, it would provide a warning as soon as someone tried to log into the page with their Google password. Instead, the warning is completely suppressed. (Note: although Ars fully trusts the researcher, readers are strongly advised not to enter passwords for Google accounts they use for anything other than testing purposes.) A video of the bypass exploit is here Bypassing Google’s Password Alert “Protection” “It beggars belief,” Paul Moore, an information security consultant at UK-based Urity Group who wrote the exploit, told Ars. “The suggestion that it offers any real level of protection is laughable.” He went on to say Google would do better devoting its resources to supporting the use of password managers, since most of them provide much more effective protections against phishing attacks. Read 3 remaining paragraphs | Comments

More:
Behold: the drop-dead simple exploit that nukes Google’s Password Alert

Raspberry Pi gets a remote Windows desktop client from Parallels

Parallels today is unveiling an RDP (remote desktop protocol) client for the Raspberry Pi, allowing the tiny computer to remotely access Windows desktops and applications. Although the Pi has appealed to hobbyists and developers, this product is for businesses, turning the Pi into a thin client for virtual desktop deployments. The pricing isn’t aimed at individuals. The Pi client works with the Parallels 2X Remote Application Server , which costs $75 per concurrent user, requiring a minimum of 15 users, making the minimum price $1,125. But there does seem to be an exception that allows free use for small groups and individuals. There’s a 30-day free trial that supports 50 concurrent users, and “After 30 days, you can continue using 2X Remote Application Server for three concurrent users with the FREE license key that you will receive via email after registration,” the 2X download page says . Read 6 remaining paragraphs | Comments

More:
Raspberry Pi gets a remote Windows desktop client from Parallels

Rogue Silk Road DEA agent arrested with “go bag,” 9mm pistol

SAN FRANCISCO—Federal prosecutors successfully argued Wednesday that Carl Mark Force, the former Drug Enforcement Administration agent who allegedly went rogue during the investigation of Silk Road founder Ross Ulbricht, should not be granted bail. “I am not prepared to release him today,” United States Magistrate Judge Elizabeth Laporte said during the Wednesday hearing. She heard 90 minutes of argument from government lawyers and from one of Force’s defense attorneys. After the hearing, Force was transferred from Santa Rita Jail in nearby Alameda County to San Francisco County Jail. Read 36 remaining paragraphs | Comments

Visit link:
Rogue Silk Road DEA agent arrested with “go bag,” 9mm pistol

Microsoft’s Office 365 “lockbox” gives customers last word on data access

One of the concerns that keeps many companies from adopting software-as-a-service for e-mail and other collaboration services has been the issue of who has control over the security of the content. Today at the RSA Conference, Microsoft is announcing changes to its Office 365 service that will allay some of those concerns, giving customers greater visibility into the security of their applications and control over what happens with them. At the same time, it will potentially be harder for government agencies and law enforcement to secretly subpoena the contents of an organization’s e-mail. In an interview with Ars, Microsoft’s general manager for Office 365 Julia White outlined the three new features, which are being announced in a blog post from Office 365 team Corporate Vice President Rajesh Jha today . Office 365 will now include a “Customer Lockbox” feature that puts customer organizations in control of when Microsoft employees can gain access to their data, requiring explicit permission from a customer before systems can be accessed to perform any sort of service on their Office 365 services. The capability will be turned on by the end of 2015 for e-mail and for SharePoint by the end of the first quarter of 2016. “We have automated everything we can to prevent the need for our people having to touch customer data,” White told Ars. “It’s almost zero—there are very rare instances when a Microsoft engineer has to log in to a customers’ services. Now we’re going to, in those rare instances, make customer approval mandatory to do so.” That would also apply to law enforcement requests for access, White acknowledged. “When the customer opts into the Lockbox, all requests would go into that process. So it’s a customer assurance of transparency. We want to systematically look at what kind of control and transparency customers want and provide it to them,” White said. Read 2 remaining paragraphs | Comments

Original post:
Microsoft’s Office 365 “lockbox” gives customers last word on data access

Verizon’s new “Custom TV” is small step toward a la carte pricing

The dreaded pay-TV bundles that result in US homes watching only about 10 percent of the channels they pay for aren’t going away any time soon, but Verizon’s FiOS TV service is taking a small step in the right direction. Starting Sunday, new and existing FiOS customers will be able to choose from new “Custom TV” bundles that offer more flexibility and could (depending on one’s interests) save subscribers a bit of money. Verizon’s new Custom TV pricing, available beginning Sunday. 6 more images in gallery “It’s a simple way for customers to choose the types of channels they want without paying for those they don’t,” Verizon said in a description of the new pricing system that was e-mailed to reporters. Read 9 remaining paragraphs | Comments

Read this article:
Verizon’s new “Custom TV” is small step toward a la carte pricing

Faked Flash-based ads on HuffPo, other sites downloaded extortionware

Google’s DoubleClick advertising network is the lifeblood of many websites driven by ad revenue—and it’s also a potential path of attack for criminals trying to spread extortionware and other malware. Some Huffington Post readers fell victim to malicious advertisements spread through Google’s DoubleClick network early this week, but another simultaneous attack may have reached an even bigger audience. Two ad network merchants became an unwitting accomplice to attackers with similar Flash-based ads, displaying them on multiple legitimate sites. The Huffington Post advertisement—a fraudulent Hugo Boss ad which also appeared on other major legitimate sites (including the real estate site Zillow.com)—was spread through DoubleClick via the ad network AdButler, according to Malwarebytes, which tracked the attack . That attack attempted to download Cryptowall ransomware to victims’ PCs. The second attack came to DoubleClick through Merchanta, an ad network that serves up 28 billion advertisement impressions a month in the US alone. There is no estimate of how many people were exposed to the attack, but it likely cast a worldwide net and could have infected thousands of PCs with malware. Malwarebytes did not collect the malware payload of the Merchanta attack, but Malwarebytes Lab’s Jérôme Segura wrote in a post on the attack  that the Flash exploit used in both attacks was identical, using the same Flash exploit kit. “It is worth noting that this malicious SWF (Flash file) had zero detection on VirusTotal when it was first submitted,” Segura said. Read 3 remaining paragraphs | Comments

Read this article:
Faked Flash-based ads on HuffPo, other sites downloaded extortionware

AMD abandons the microserver market, takes $75 million hit

As part of its 1Q 2015 earnings release, AMD has announced that it is leaving the high density microserver market, effective immediately. AMD bought SeaMicro in 2012 for $334 million to get a foothold into the microserver business. At the time, SeaMicro built systems containing dozens of Intel Atom and Xeon processors connected to a shared storage and network fabric. Since the acquisition, AMD has only released a single new SeaMicro system, the SM15000. This could use either AMD Opteron systems (using the Piledriver core) or Intel Xeons (using the Ivy Bridge core). With today’s announcement, it’s clear that system will also be the last new SeaMicro system to be released. Read 3 remaining paragraphs | Comments

View post:
AMD abandons the microserver market, takes $75 million hit

J.J. Abrams reveals new Force Awakens teaser, details

On Thursday, J.J. Abrams kicked off a weekend-long Star Wars convention by revealing the second teaser trailer for the upcoming Star Wars: The Force Awakens film, and it included the first reveal of Harrison Ford reprising his role as Han Solo. “Chewie, we’re home!” Ford says with Chewbacca standing behind him to close the teaser, which also included footage of a Millennium Falcon chase, a melted Darth Vader mask, a lightsaber hand-off, and Mark Hamill narrating a speech to an heir apparent (though unseen). Stormtroopers, X-Wings, TIE Fighters, new droids, and the sequel’s three new leads also feature prominently. As a lead-up to that teaser reveal, Entertainment Weekly columnist Anthony Breznican hosted a panel with Abrams and Lucasfilm president Kathleen Kennedy, where he asked questions about filming scenes in Abu Dhabi, designing new droids (including new droid “BB8,” whose impressive rolling ball design includes a head that swivels on its top), and casting the series’ three new lead actors. Read 8 remaining paragraphs | Comments

Read More:
J.J. Abrams reveals new Force Awakens teaser, details