AT&T/DirecTV merger likely to be approved

Despite Comcast abandoning  its Time Warner Cable (TWC) purchase in the face of government opposition, mergers of Internet and TV providers are still on the table. AT&T’s proposed $48.5 billion acquisition of DirecTV is likely to win approval from the Federal Communications Commission,  The Wall Street Journal reported . And TWC could still be acquired, but by Charter Communications instead of Comcast. The FCC hasn’t publicly revealed its position on AT&T’s attempt to buy the satellite TV provider. But despite opposing Comcast/TWC, the commission “sees the AT&T deal as helping competition and aiding the spread of broadband into rural areas that lack service, people familiar with the matter said,” according to the Journal report. FCC officials haven’t yet finalized concessions that AT&T would make in exchange for approval, “but the commission’s staff is inclined to recommend the approval of the deal.” Read 6 remaining paragraphs | Comments

Excerpt from:
AT&T/DirecTV merger likely to be approved

Verizon’s new “Custom TV” is small step toward a la carte pricing

The dreaded pay-TV bundles that result in US homes watching only about 10 percent of the channels they pay for aren’t going away any time soon, but Verizon’s FiOS TV service is taking a small step in the right direction. Starting Sunday, new and existing FiOS customers will be able to choose from new “Custom TV” bundles that offer more flexibility and could (depending on one’s interests) save subscribers a bit of money. Verizon’s new Custom TV pricing, available beginning Sunday. 6 more images in gallery “It’s a simple way for customers to choose the types of channels they want without paying for those they don’t,” Verizon said in a description of the new pricing system that was e-mailed to reporters. Read 9 remaining paragraphs | Comments

Read this article:
Verizon’s new “Custom TV” is small step toward a la carte pricing

AMD abandons the microserver market, takes $75 million hit

As part of its 1Q 2015 earnings release, AMD has announced that it is leaving the high density microserver market, effective immediately. AMD bought SeaMicro in 2012 for $334 million to get a foothold into the microserver business. At the time, SeaMicro built systems containing dozens of Intel Atom and Xeon processors connected to a shared storage and network fabric. Since the acquisition, AMD has only released a single new SeaMicro system, the SM15000. This could use either AMD Opteron systems (using the Piledriver core) or Intel Xeons (using the Ivy Bridge core). With today’s announcement, it’s clear that system will also be the last new SeaMicro system to be released. Read 3 remaining paragraphs | Comments

View post:
AMD abandons the microserver market, takes $75 million hit

Universal backdoor for e-commerce platform lets hackers shop for victims

As people become more aware of the threat of targeted “phishing” attacks via e-mail and social media, malware-armed attackers are turning to new ways to target specific victims where they least expect it—by exploiting the legitimate websites they frequent and assume to be secure. Last week, Swiss security firm Hi-Tech Bridge disclosed that the Web store of a corporate customer had been used to deliver a targeted attack against a specific site visitor. The attackers were also able to retrieve the store’s customer database, which they may have used to search for desirable targets. The attack exploited a current and patched version of osCommerce Online Merchant (version 2.3.4, released last June), a common Web store content management system used by a number of high-profile companies—including Canonical’s Ubuntu Shop . The attacker inserted malicious PHP script that provided a backdoor into the site and could be configured to check users’ IP addresses and login credentials as they visit the site for specific targets. Once a desired target is detected, the script attempts to download malware to the victim from another site. The attacker can then remotely delete the backdoor and altered PHP files and replace them with the original by connecting to the script with a “?del” parameter added to its URL. The backdoor script is labeled as “osCommerce 2.x.x universal pwner by Piht0z,” and it’s just that: a generic PHP-based backdoor for osCommerce sites. According to Ilia Kolochenko, High-Tech Bridge’s CEO, there have been similar cases of targeted attacks on users of e-commerce sites before, but “it’s the first time we see a universal backdoor for a large e-commerce platform,” he said in a blog post about the discovery. “This means that hackers started using this vector on a regular basis to achieve their goals.” Read on Ars Technica | Comments

View post:
Universal backdoor for e-commerce platform lets hackers shop for victims

Sound waves separate rare cancer cells from blood

Circulating tumor cells (CTCs) are a rare type of cancer cell that are found in the blood stream of patients with localized tumors. Successful separation of CTCs from blood could serve as a liquid biopsy to help diagnose cancer and monitor treatment progress. A deeper understanding of CTCs could also lead to a better understanding of the most deadly cancer process: metastasis, where cancer cells leave established tumors and migrate to other locations in the body. Currently, CTC separation methods rely on features that distinguish CTCs from other cells—antibodies that stick to them, cell size, deformability, or even electrical properties. Scientists have also explored using sound waves to separate CTCs. Acoustic-based separation provides excellent biocompatibility and safety; it preserves the viability, function, phenotype, and genotype of cells. It also allow cells to be separated without modification. As a result, sound-based separation methods enable CTCs to be maintained in their native state throughout the separation process while avoiding invasive biopsies. Unfortunately, previous sound-based separations technologies haven’t managed to separate CTCs from clinical samples due to insufficient throughput and long-term operational instability. Recently, a team of scientists has developed an acoustic-based microfluidic device that separates CTCs from peripheral blood samples of cancer patients in a high-throughput manner. This method relies on something called tilted-angle standing surface sound waves. These standing waves contain points that “stand still,” called nodes, around which the wave oscillates. Read 7 remaining paragraphs | Comments

See more here:
Sound waves separate rare cancer cells from blood

Botnet that enslaved 770,000 PCs worldwide comes crashing down

Law enforcement groups and private security companies around the world said they have taken down a botnet that enslaved more than 770,000 computers in 190 countries, stealing owners’ banking credentials and establishing a backdoor to install still more malware. Simda, as the botnet was known, infected an additional 128,000 new computers each month over the past half year, a testament to the stealth of the underlying backdoor trojan and the organization of its creators. The backdoor morphed into a new, undetectable form every few hours, allowing it to stay one step ahead of many antivirus programs. Botnet operators used a variety of methods to infect targets, including exploiting known vulnerabilities in software such as Oracle Java , Adobe Flash , and  Microsoft Silverlight . The exploits were stitched into websites by exploiting SQL injection vulnerabilities and exploit kits such as Blackhole and Styx. Other methods included sending spam and other forms of social engineering. Countries most affected by Simda included the US, with 22 percent of the infections, followed by the UK, Turkey with five percent, and Canada and Russia with four percent. The malware modified the HOSTS file Microsoft Windows machines use to map specific domain names to specific IP addresses. As a result, infected computers that attempted to visit addresses such as connect.facebook.net or google-analytics.com were surreptitiously diverted to servers under the control of the attackers. Often the booby-trapped HOSTS file remains even after the Simda backdoor has been removed. Security researchers advised anyone who may have been infected to inspect their HOSTS file, which is typically located in the directory %SYSTEM32%driversetchosts. People who want to discover if they have been infected by Simda can check this page provided by AV provider Kaspersky Lab. The page is effective as long as a person’s IP address hasn’t changed from when the infection was detected. Read 2 remaining paragraphs | Comments

View post:
Botnet that enslaved 770,000 PCs worldwide comes crashing down

Google Fiber plans expansion, then TWC makes speeds six times faster

With Google Fiber preparing an expansion into Charlotte, North Carolina, incumbent cable operator Time Warner Cable is trying to hold onto customers by dramatically increasing Internet speeds at no extra charge. “The Internet transformation will begin this summer and will include speed increases on TWC residential Internet plans at no additional cost, with customers experiencing increases up to six times faster, depending on their current level of Internet service,” Time Warner Cable announced last week . “For example, customers who subscribe to Standard, formerly up to 15Mbps, will now receive up to 50Mbps, customers who subscribe to Extreme, formerly up to 30Mbps, will now receive up to 200Mbps; and customers who subscribe to Ultimate, formerly up to 50Mbps, will receive up to 300Mbps, at no extra charge.” Google announced plans to enter Charlotte and a few other metro areas in January and is working with local officials to finalize the network design so that construction can begin. Read 5 remaining paragraphs | Comments

View post:
Google Fiber plans expansion, then TWC makes speeds six times faster

Hacked French network exposed its own passwords during TV interview

While French authorities continued investigating how the TV5Monde network had 11 of its stations’ signals interrupted the night before, one of its staffers proved just how likely a basic password theft might have led to the incident. In an interview with French news program 13 Heures , TV5Monde reporter David Delos unwittingly revealed at least one password for the station’s social media presence. That’s because he was filmed in front of a staffer’s desk—which was smothered in sticky notes and taped index cards that were covered in account usernames and passwords. Delos’s segment revealed the usernames and passwords for TV5Monde’s Twitter and Instagram accounts, but they were too difficult to read in an archived video of the broadcast . That wasn’t the case for the YouTube information, however;  Twitter user pent0thal confirmed that account’s displayed password was “lemotdepassedeyoutube,” which translates in English to “the password of YouTube.” Read 2 remaining paragraphs | Comments

Continue Reading:
Hacked French network exposed its own passwords during TV interview

Descent Underground Kickstarter crosses $600,000 finish line

It’s no doubt been a long day for Eric “Wingman” Peterson and the other folks at Descendent Studios , but their crowdfunded reboot of the six-degrees-of-freedom shooter Descent is now over the $600,000 mark and will receive its funding, which will allow Peterson and team to buckle down and get to work on the title—once the post-Kickstarter partying is over, of course. Though the funding campaign got off to a good start, pledges slowed over the last week of the campaign. However, backers donated more than $200,000 of the $600,000 goal in the past four days, with $70,000 of donations coming in today, on the campaign’s final day. With about two hours left on the clock, the donation mark stands at just a bit over $602,000. Descent Underground engine demo running on an Oculus Rift DK2. Our stomachs lurch in anticipation! Peterson and his team (which includes several former members of the Austin branch of Cloud Imperium, which is currently focusing on building Star Citizen’s persistent universe) have set their sights on resurrecting the Decent series of games, which reached the height of their popularity in the late 1990s and cast players as the pilot of a fast, maneuverable spaceship blasting killer robots in underground mines. The game’s hook was that unlike other FPS titles, Descent allowed full movement along all axes—you could move up, down, left right, forward, backward, and rotate in any direction. Read 3 remaining paragraphs | Comments

Read More:
Descent Underground Kickstarter crosses $600,000 finish line

Apple releases OS X 10.10.3 with new Photos app, emoji, and more

Apple has just released the final version of OS X 10.10.3, the latest major update for OS X Yosemite. The update was first available to the public as a beta build back in early March , and it follows a little over three months after OS X 10.10.2 . You can view the full release notes on Apple’s site here . The star of this update is the new Photos app, an OS X version of the photo viewing and editing app included with iOS. It primarily functions as a replacement for iPhoto, the basic photo app included with the iLife suite for years before becoming available for free for all new Macs. It also replaces Aperture, Apple’s pro photo editing app—though it doesn’t actually attempt to replicate Aperture’s functionality. Neither iPhoto nor Aperture will receive further updates from Apple after today. Photos will be installed automatically when you update to 10.10.3; it appears to be a core part of OS X rather than an optional Mac App Store download. We looked at an early Photos beta back in February and came away mostly impressed by its features and speed, at least relative to iPhoto. Those of you with existing iPhoto and Aperture libraries will be able to import them into Photos after you install OS X 10.10.3. Read 5 remaining paragraphs | Comments

Original post:
Apple releases OS X 10.10.3 with new Photos app, emoji, and more