Apple increases the maximum size of iOS app binaries for the first time ever

For the first time since the introduction of the App Store in 2008 , Apple is increasing the maximum size of the app binaries that developers can upload to iTunes Connect. The company announced today that the cap would increase from 2GB to 4GB , though this doesn’t affect the 100MB limit imposed on apps downloaded on cellular networks. iOS app binaries contain both the executable file and all of the images, sounds, and other assets that the app needs—everything from icons to splash screens to UI is all included in one big file. Because of how they’re packaged, these binaries can get rather large. Binaries include all the assets for all the devices they support. If you’re shipping a universal app that supports all iOS 8 devices, for example, you’ve got Retina iPhone assets, Retina and non-Retina iPad assets, and special “3x” assets specifically for the iPhone 6 Plus (Apple’s got a table here ). Universal apps include all of those assets, and the binary you download from the App Store is the same whether you’ve got an old iPhone 4S or a brand-new iPad Air 2. If you’re running on an iPhone, for example, a universal binary will still contain assets for other iPhones and iPads, increasing the amount of space the app needs even though some of those extra assets aren’t needed for your device. Xcode 6 partially supports vector graphics to ease the developer burden of maintaining and generating all these assets, but they’re still stored as PNG files when the binary is built and uploaded. Read 1 remaining paragraphs | Comments

Read More:
Apple increases the maximum size of iOS app binaries for the first time ever

15-year-old bug allows malicious code execution in all versions of Windows

Microsoft just patched a 15-year-old bug that in some cases allows attackers to take complete control of PCs running all supported versions of Windows. The critical vulnerability will remain unpatched in Windows 2003, leaving that version wide open for the remaining five months Microsoft pledged to continue supporting it. The flaw, which took Microsoft more than 12 months to fix, affects all users who connect to business, corporate, or government networks using the Active Directory service. The database is built into Windows and acts as a combination traffic cop and security guard, granting specific privileges to authorized users and mapping where on a local network various resources are available. The bug—which Microsoft classifies as MS15-011 and the researcher who first reported it calls Jasbug—allows attackers who are in a position to monitor traffic passing between the user and the Active Directory network to launch a man-in-the-middle exploit that executes malicious code on vulnerable machines. “All computers and devices that are members of a corporate Active Directory may be at risk,” warned a blog post published Tuesday by JAS Global Advisors, the firm that reported the bug to Microsoft in January 2014. “The vulnerability is remotely exploitable and may grant the attacker administrator-level privileges on the target machine/device. Roaming machines—Active Directory member devices that connect to corporate networks via the public Internet (possibly over a Virtual Private Network (VPN))—are at heightened risk.” Read 4 remaining paragraphs | Comments

View post:
15-year-old bug allows malicious code execution in all versions of Windows

Google announces SPDY’s coming demise as HTTP/2 approaches

A little over five years ago, Google unveiled SPDY, a new protocol that it positioned as a more secure, better-performing replacement for hypertext transfer protocol (HTTP), the communication protocol on which the Web is built. Today the company announced that it would soon be removing SPDY support from Chrome. That’s because the Internet Engineering Task Force (IETF) has been working to update HTTP to produce HTTP/2, an updated revision of a protocol that has not seen any major changes since its introduction in the early 1990s. SPDY’s major goals were to reduce latency and improve security. To reduce latency, it included support for multiplexing—making multiple requests and responses over a single connection, with prioritization for different requests—and for security, it makes the use of TLS compulsory. Read 2 remaining paragraphs | Comments

Continued here:
Google announces SPDY’s coming demise as HTTP/2 approaches

Report: iOS 9 will focus mainly on stability and performance

Longtime Apple users speak fondly of the Snow Leopard (10.6) release of OS X. Even though it came with ” no new features ,” it won users over by reducing the footprint of the OS and focusing mostly on refinement. A report from 9to5Mac’s well-sourced Mark Gurman claims that Apple is taking a similar approach with iOS 9, focusing on fixing bugs and optimizing performance rather than adding another big stack of new features to the pile. The report isn’t specific about what Apple will be doing to accomplish those goals, but in any case it’s a departure from the release-first-fix-later approach Apple normally takes with iOS. iOS 7’s biggest problems were addressed by iOS 7.1 six-or-so months later, and so far we’ve seen six minor updates for iOS 8 that have attempted to address everything from bugs to performance  and the amount of free space required for update installation. Though stability will be “a tentpole component” of iOS 9, Gurman says that the new operating system will still come with other improvements. Don’t expect a repeat of the “no new features” reveal, in other words. Read 1 remaining paragraphs | Comments

View article:
Report: iOS 9 will focus mainly on stability and performance

Over 300 businesses now whitelisted on AdBlock Plus, 10% pay to play

Since 2011, AdBlock Plus, a popular browser plug-in that blocks online ads, has kept a “whitelist” of websites that are allowed to serve ads despite the presence of the AdBlock Plus plugin. In an e-mail to Ars, AdBlock Plus Communications Manager Ben Williams wrote that currently, the browser extension has granted a pass to “over 300 sites/entities” out of “over 1,500 applicants” to the company’s whitelist. That’s up from October 2013 , when AdBlock Plus allowed the ads of 78 sites or entities out of 777 applicants. To be placed on AdBlock Plus’ whitelist, advertisements must be transparent about being ads, must be appropriate to the site they’re being served on, and must not distort or disrupt the page content, among other criteria. AdBlock Plus goes into more detail about the whitelisting process here . But one important facet of the business plan is that if a company is big enough, AdBlock Plus’ parent company, German start-up Eyeo, asks for a fee in addition to adhering to the “Acceptable Ads” criteria before it allows a company to be whitelisted. Read 13 remaining paragraphs | Comments

Taken from:
Over 300 businesses now whitelisted on AdBlock Plus, 10% pay to play

Dish used “small business” discount to save $3 billion at taxpayer expense

Dish took advantage of discounts intended for small businesses to save $3.3 billion in an auction of public airwaves, making a “mockery” of the small business program, according to a member of the Federal Communications Commission. Dish used companies it owns in order to place $13.3 billion worth of winning bids in an auction of wireless airwaves that can be used for cellular networks. Results of the auction were announced last week . But Dish only has to pay $10 billion because it didn’t place the bids directly. FCC Commissioner Ajit Pai called upon FCC Chairman Tom Wheeler “to immediately launch an investigation into these multi-billion dollar subsidies.” “[T]wo companies in which Dish Network has an 85 percent ownership stake claimed over $3 billion in taxpayer-funded discounts when purchasing spectrum in the AWS-3 auction,” Pai said in his call for an investigation today . “Those discounts came through the FCC’s designed entity (DE) program, which is intended to make it easier for small businesses to purchase spectrum and compete with large corporations. Dish, however, has annual revenues of almost $14 billion, a market capitalization of over $32 billion, and over 14 million customers. Its participation makes a mockery of the DE program.” Read 9 remaining paragraphs | Comments

Continued here:
Dish used “small business” discount to save $3 billion at taxpayer expense

Lucasfilm heads to court to unmask Star Wars: The Force Awakens image leaker

Lucasfilm is demanding that popular photo-sharing site ImageShack cough up the identity of one of its users the studio says uploaded an infringing photograph connected to its upcoming Star Wars movie. ImageShack has already deleted the picture  from user “Darth-Simi” whose account was used to post a picture that was described as a villain from the upcoming Star Wars: The Force Awakens movie. The image included a glimpse of a red crossguard lightsaber like the one showed in a teaser trailer officially released in November. Lucasfilm’s parent company, Disney, is seeking a San Francisco federal court to order California-based ImageShack to turn over Darth-Simi’s personal information. The studio is making the demand  [PDF] to remove the picture “Star Wars Episode VII Costume Design and Photograph” under the Digital Millennium Copyright Act. Read 3 remaining paragraphs | Comments

More:
Lucasfilm heads to court to unmask Star Wars: The Force Awakens image leaker

CBS reporter’s “hack” caused by stuck backspace key, says US govt

According to a US Department of Justice Inspector General report released today, an investigation “was not able to substantiate the allegations that [Sharyl] Attkisson’s computers were subject to remote intrusion by the FBI, other government personnel, or otherwise.” The report was introduced into the Senate record at the confirmation hearing for Attorney General nominee Loretta Lynch. Attkisson, who has written a book about her experiences trying to cover the Obama White House which includes the allegation of hacking , has filed a lawsuit against the Department of Justice, outgoing Attorney General Eric Holder, and the Postmaster General for the alleged hacking of her home and work computers. Today, Attkisson testified at Lynch’s confirmation hearing. The report from the DoJ’s Office of the Inspector General casts a different light on Attkisson’s allegations: Read 5 remaining paragraphs | Comments

Read More:
CBS reporter’s “hack” caused by stuck backspace key, says US govt

Reddit got 55 user data requests in 2014, complied over half the time

Who knew that the “front page of the Internet” would be a source of information for law enforcement? According to a new transparency report released Thursday by reddit, the site has only received a few dozen requests for user data. As reddit wrote: Read 5 remaining paragraphs | Comments

Read the original:
Reddit got 55 user data requests in 2014, complied over half the time

iTunes Connect bug logs developers in to other developers’ accounts at random

This morning, a number of developers signed in to Apple’s iTunes Connect service only to be greeted by a list of apps that didn’t belong to them. TechCrunch has a good roundup of tweets from affected developers —it seems that whenever developers signed in with their credentials, they were being granted access to other developers’ accounts at random. As of about noon Eastern today, Apple took the service down to resolve the problem. It also looks like developers won’t be able to submit new apps or invite new testers to TestFlight while iTunes Connect is down. Affected developers can check Apple’s System Status page for developers for updates while they wait for the problems to be resolved (no other developer services appear to be affected by the outage). We don’t yet know whether the outage was caused by some error on Apple’s end or by a security breach like the one that brought all developer systems down  in the summer of 2013 . We’ve asked Apple when the service will be back and what caused the login problem in the first place, and we’ll update this article as we have new details. Read on Ars Technica | Comments

Read More:
iTunes Connect bug logs developers in to other developers’ accounts at random