The British ‘Atlantis’ is mapped in detail

Dunwich Beach Sutterstock A professor of physical geography has put together the most detailed map yet of the sunken medieval town of Dunwich using underwater acoustic imagining. The port town, often referred to as “the British Atlantis,” was a hub of activity up until its collapse in the 1400s. This was brought about after a series of epic storms battered the coastline in the 1200s and 1300s, causing repeated flooding, submerging parts of the town, and flooding the harbor and river with silt. Today it stands as a small village, but up until its demise it was around the same size as medieval London. Despite still existing at depths of just three to 10 meters (or, 9.8 ft to 32.8 ft) below sea level, the murky conditions have made investigating what lies beneath particularly tricky. Since 2010, however, Southampton’s David Sear—along with the GeoData Institute, the National Oceanography Center, Wessex Archaeology, and local divers from North Sea Recovery and Learn Scuba—has been exploring the muddy depths using dual-frequency identification sonar (DIDSON) acoustic imaging. Read 8 remaining paragraphs | Comments

Read More:
The British ‘Atlantis’ is mapped in detail

How hackers allegedly stole “unlimited” amounts of cash from banks in just hours

Wikipedia Federal authorities have accused eight men of participating in 21st-Century Bank heists that netted a whopping $45 million by hacking into payment systems and eliminating withdrawal limits placed on prepaid debit cards. The eight men formed the New York-based cell of an international crime ring that organized and executed the hacks and then used fraudulent payment cards in dozens of countries to withdraw the loot from automated teller machines, federal prosecutors alleged in court papers unsealed Thursday. In a matter of hours on two separate occasions, the eight defendants and their confederates withdrew about $2.8 million from New York City ATMs alone. At the same times, “cashing crews” in cities in at least 26 countries withdrew more than $40 million in a similar fashion. Prosecutors have labeled this type of heist an “unlimited operation” because it systematically removes the withdrawal limits normally placed on debit card accounts. These restrictions work as a safety mechanism that caps the amount of loss that banks normally face when something goes wrong. The operation removed the limits by hacking into two companies that process online payments for prepaid MasterCard debit card accounts issued by two banks—the National Bank of Ras Al-Khaimah PSC in the United Arab Emirates and the Bank of Muscat in Oman—according to an indictment filed in federal court in the Eastern District of New York. Prosecutors didn’t identify the payment processors except to say one was in India and the other in the United States. Read 3 remaining paragraphs | Comments

Taken from:
How hackers allegedly stole “unlimited” amounts of cash from banks in just hours

Obama orders agencies to make data open, machine-readable by default

Alpha.data.gov, an experimental data portal created under the White House’s Open Data Initiative. Data.gov President Barack Obama issued an executive order today that aims to make “open and machine-readable” data formats a requirement for all new government IT systems. The order would also apply to existing systems that are being modernized or upgraded. If implemented, the mandate would bring new life to efforts started by the Obama administration with the launch of Data.gov four years ago. It would also expand an order issued in 2012 to open up government systems with public interfaces for commercial app developers. “The default state of new and modernized Government information resources shall be open and machine readable,” the president’s order reads. “Government information shall be managed as an asset throughout its life cycle to promote interoperability and openness, and, wherever possible and legally permissible, to ensure that data are released to the public in ways that make the data easy to find, accessible, and usable.” The order, however, also requires that this new “default state” protect personally identifiable information and other sensitive data on individual citizens, as well as classified information. Broadening the “open” mandate The president’s mandate was initially pushed forward by former Chief Information Officer of the United States Vivek Kundra. In May of 2009, Data.gov launched with an order that required agencies to provide at least three “high-value data sets” through the portal. Read 6 remaining paragraphs | Comments

Link:
Obama orders agencies to make data open, machine-readable by default

Senate passes Internet sales tax in final vote, 69-27

Flickr user: 401(K) 2012 The US Senate passed an online sales tax in a vote this afternoon after a heated final round of debate. A small group of anti-tax Republicans, as well as Democratic Senators from states without sales tax like Montana and Oregon, argued vociferously against the bill—but to no avail. The final vote was 69-27, not much different than the 74-20 procedural vote that took place two weeks ago. The proposal has hardly changed at all in two weeks. The Marketplace Fairness Act, S.743, would allow states and localities to make Internet retailers collect sales tax from their customers if they do more than $1 million per year in out-of-state online sales. “Today the senate is voting to take a few more inches off the little guy,” said Senator Ron Wyden (D-OR), who has fought the bill hard. “You saw ads taken out by some of the biggest businesses in the country. It’s easy to see why Mr. President. With this vote, what you have is big businesses being given the ability to force new regulations onto the start-ups, onto the small businesses.” Read 9 remaining paragraphs | Comments

Visit site:
Senate passes Internet sales tax in final vote, 69-27

German court convicts, sentences BitTorrent site operator to nearly 4 years

A German district court in the western city of Aachen has handed down one of the harshest sentences for abetting copyright infringement: three years and 10 months in prison. The 33-year-old alleged operator of the Russian-hosted torrent.to , who was named only as “Jens. R” in court documents, remains under investigation for fraudulent bankruptcy filings and embezzlement. Other than pleading not guilty, Jens R. did not offer a defense in the case and is expected to appeal. Like similar sites, such as the Pirate Bay, the defendant was accused of selling ads against links to torrent files. Read 5 remaining paragraphs | Comments

Read More:
German court convicts, sentences BitTorrent site operator to nearly 4 years

Defense contractor pwned for years by Chinese hackers

QinetiQ , a UK-based defense contractor, has its fingers all over some of the US Defense Department’s most sensitive systems. The company’s subsidiaries provide robots, diagnostic systems, intelligence systems for satellites, drones, and even “cyber-security” to the US Department of Defense. The parent company, which was created as a privatized spinoff of the British Defense Evaluation and Research Agency—what was the UK’s equivalent of the US Defense Advanced Research Projects Agency—is often cited as the inspiration for James Bond’s “Q.” But for at least three years, QinetiQ was apparently unintentionally supplying its expertise to another customer: China. In multiple operations, hackers tied to the People’s Liberation Army have had the run of QinetiQ’s networks, stealing sensitive data from them and even using them to launch attacks on the systems of government agencies and other defense contractors. E mails uncovered by the hack of security firm HBGary revealed that Chinese hackers had the run of the company’s networks starting in 2007. Bloomberg’s Michael Riley and Ben Elgin report that in one effort that lasted for over three years, “Comment Crew”—the group tied to the recent hacking of the New York Times and other news organizations, plus a host of attacks on other defense contractors and technology businesses—managed to gain access to “most if not all of the company’s research.” The company was notified on multiple occasions by government agencies of ongoing breaches, starting with a report from the Naval Criminal Investigative Service in December of 2007 that “a large quantity of sensitive information” was being stolen from two computers at the company’s US subsidiary, QinetiQ North America (QNA). A month later, NASA informed QNA that one of the company’s computers was being used in a cyberattack on its network. Read 1 remaining paragraphs | Comments

More:
Defense contractor pwned for years by Chinese hackers

AT&T opens trade-in program for old smartphones

AT&T is now accepting smartphone trade-ins as vouchers toward new phone purchases on its network, according to a press release from the company in Monday. Customers who bring in old smartphones can receive “at least $100” off of a new smartphone. Even better, the discounts are stackable, even off-contract. In the event that customers are looking to get a new phone that costs $99.99 or less, a traded-in smartphone will get them that phone for free. Trade-ins can be valued at more than $100 and can be applied immediately to an in-store purchase. Customers may also opt to trade their phone in online, though they will have to wait four weeks for approval and their “Promotion Card” to come in the mail with the credit. In the press release, AT&T does not explicitly state whether the credits apply only to phones that are purchased on a new two-year contract or whether the credits are able to be applied to off-contract purchases. Still, the language of the press release seems to favor that scenario and an AT&T spokesperson told Ars that the trade-in discounts do stack and do not require a new contract. So if you bust up your current phone but complete a scavenger hunt for five functioning old smartphones, you might save yourself a little money. Read 1 remaining paragraphs | Comments

View post:
AT&T opens trade-in program for old smartphones

AMD’s “heterogeneous Uniform Memory Access” coming this year in Kaveri

AMD AMD wants to talk about HSA, Heterogeneous Systems Architecture (HSA), its vision for the future of system architectures. To that end, it held a press conference last week to discuss what it’s calling “heterogeneous Uniform Memory Access” (hUMA). The company outlined what it was doing, and why, both confirming and reaffirming the things it has been saying for the last couple of years. The central HSA concept is that systems will have multiple different kinds of processor, connected together and operating as peers. The two main kinds of processor are conventional: versatile CPUs and the more specialized GPUs. Modern GPUs have enormous parallel arithmetic power, especially floating point arithmetic, but are poorly-suited to single-threaded code with lots of branches. Modern CPUs are well-suited to single-threaded code with lots of branches, but less well suited massively parallel number crunching. Splitting workloads between a CPU and a GPU, using each for the workloads it’s good at, has driven the development of general purpose GPU (GPGPU) software and development. Read 20 remaining paragraphs | Comments

More:
AMD’s “heterogeneous Uniform Memory Access” coming this year in Kaveri

OS X 10.9 said to focus on the “power user”

OS X 10.9 will reportedly focus on the “power user,” according to sources speaking to 9to5Mac . The release, code-named “Cabernet,” isn’t expected to significantly overhaul how the operating system functions, but will reportedly bring over more iOS features that could benefit OS X. What might those features be? According to 9to5Mac’s sources, Apple has been “testing a new multi-tasking system” that’s similar to the app-switcher within iOS. “The multitasking feature will be functional for applications in the background, according to this person. Additionally, Apple could use app-pausing technologies from iOS to pause background application processes in OS X,” the site wrote, though apparently it’s unclear whether this feature will make the official 10.9 release. The other “power user” features reportedly include modifications to the Finder that would bring a tabbed browsing mode, an updated version of Safari with “a redesigned backend for improved page loading, speed, and efficiency,” and the ability to keep different Spaces open on separate monitors. Read 1 remaining paragraphs | Comments

Continue Reading:
OS X 10.9 said to focus on the “power user”

Linux 3.9 brings SSD caching and drivers to support modern PCs

mtellin Linux creator Linus Torvalds last night announced the release of version 3.9 of the kernel. Available for download at kernel.org , Linux 3.9 brings a long list of improvements to storage, networking, file systems, drivers, virtualization, and power management. H-Online editor Thorsten Leemhuis has an excellent rundown of what’s new in Linux 3.9 . One new feature, listed as “experimental,” allows SSDs to act as caches for other storage devices. “This feature is able to speed up data writes, as it allows the faster SSD to first cache data and then, in a quiet moment, transfer it to the slower hard drive,” Leemhuis wrote. Linux maintainers have also done some driver work that might improve the sometimes questionable support for desktops and laptops. New drivers include support for Intel 802.11ac Wi-Fi components, as well as trackpads used in Samsung’s ARM-based Chromebook and the Dell XPS 13 Developer Edition Ultrabook . The Kernel’s driver for AMD Radeon graphics chips was updated to support Oland chips in the 8500 and 8600 Series Radeon video cards, in addition to AMD’s forthcoming Richland chips. The driver code for HD audio codecs is also now “leaner and more robust.” Read 3 remaining paragraphs | Comments

Read the original:
Linux 3.9 brings SSD caching and drivers to support modern PCs