For first time, US military says it would use offensive cyberweapons

For the first time ever, the Obama administration has publicly admitted to developing offensive cyberweapons that could be aimed at foreign nations during wartime. According to an article published Tuesday night by The New York Times , that admission came from General Keith Alexander, the chief of the military’s newly created Cyber Command. He said officials are establishing 13 teams of programmers and computer experts who would focus on offensive capabilities. Previously, Alexander publicly emphasized defensive strategies in electronic warfare to the almost complete exclusion of offense. “I would like to be clear that this team, this defend-the-nation team, is not a defensive team,” Alexander, who runs both the National Security Agency and the new Cyber Command, told the House Armed Services Committee on Tuesday. “This is an offensive team that the Defense Department would use to defend the nation if it were attacked in cyberspace. Thirteen of the teams that we’re creating are for that mission alone.” Read 3 remaining paragraphs | Comments

Excerpt from:
For first time, US military says it would use offensive cyberweapons

ID thieves “dox” Joe Biden, Jay-Z, Michelle Obama, and dozens more

The front page of exposed.su. Identity thieves have posted social security numbers, credit information, and other sensitive data belonging to more than a dozen politicians and celebrities. It’s a list that includes Vice President Joe Biden, FBI Director Robert Mueller, former Secretary of State Hillary Clinton, rapper Jay Z, and actor and director Mel Gibson. The website, exposed.su, surfaced on Monday with birth dates, telephone numbers, home addresses, and in some cases credit reports for a handful of politicians and celebrities. Throughout the past 24 hours the site has published details on additional individuals. Social security numbers for Mueller, Jay-Z, and Gibson appeared to be valid, the Associated Press reported . Los Angeles Police Chief Charlie Beck, whose information was also posted on the site, hasn’t challenged the accuracy, either. Still, other journalists wrote that phone numbers purportedly belonging to former California Governor Arnold Schwarzenegger and actor Ashton Kutcher reportedly went to a movie production company and a New York-based accounting firm respectively. The site included the image of a gaunt young woman with black circles around her eyes and an index finger in front of her lips. It was headed by a quote from the Showtime TV series Dexter , in which the title character says, “If you believe that God makes miracles, you have to wonder if Satan has a few up his sleeve.” The site included an embarrassing or humorous photo related to each individual whose information was disclosed. The act of publicly documenting the private details of people is known as “doxxing,” and it came into vogue a few years ago with the growing visibility of the Anonymous hacking collective. Read 2 remaining paragraphs | Comments

Read the original post:
ID thieves “dox” Joe Biden, Jay-Z, Michelle Obama, and dozens more

Meet the men who spy on women through their webcams

Aurich Lawson / Thinkstock “See! That shit keeps popping up on my fucking computer!” says a blond woman as she leans back on a couch, bottle-feeding a baby on her lap. The woman is visible from thousands of miles away on a hacker’s computer. The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman’s screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun. He enters a series of shock and pornographic websites and watches them appear on the woman’s computer. The woman is startled. “Did it scare you?” she asks someone off camera. A young man steps into the webcam frame. “Yes,” he says. Both stare at the computer in horrified fascination. A picture of old naked men appears in their Web browser, then vanishes as a McAfee security product blocks a “dangerous site.” Read 65 remaining paragraphs | Comments

More:
Meet the men who spy on women through their webcams

Microsoft comes to its senses, allows Office 2013 to move PCs

In a substantial regression from the terms offered for Office 2010, the original Office 2013 license died with your PC . You couldn’t install a retail copy of Office on a new PC, even if you removed it from the old one. But after much public outcry, Microsoft has relented . The Office 2013 terms and conditions are being updated so that transfers are allowed. You’ll be allowed one transfer every 90 days unless the transfers are due to hardware failures. (In that case they can be made immediately.) The change is effective immediately, but it will take some time before it trickles out to the activation servers. If you’re transferring Office 2013 to a different PC and activation fails, you’ll have to call customer support. Microsoft insists that the support people know the score and will be able to activate you manually. Read on Ars Technica | Comments

Visit site:
Microsoft comes to its senses, allows Office 2013 to move PCs

VMware will hate this: Amazon slashes cloud prices up to 28 percent

OH MY GOD, Amazon’s having a FIRE… sale . This is bad for business! 20th Century Fox Television Last week, VMware’s top executives displayed just how worried they are about the competitive threat posed by Amazon’s cloud computing service. With customers able to spin up virtual machines in Amazon data centers, VMware is concerned fewer people will buy its virtualization tools. According to CRN , VMware CEO Pat Gelsinger told service partners at the company’s Partner Exchange Conference that if “a workload goes to Amazon, you lose, and we have lost forever.” VMware COO Carl Eschenbach jumped on the Amazon theme, saying, “I look at this audience, and I look at VMware and the brand reputation we have in the enterprise, and I find it really hard to believe that we cannot collectively beat a company that sells books.” Given VMware’s view of Amazon, Gelsinger and Eschenbach won’t like the latest news from the “bookseller,” which also happens to be a large IT services provider. Amazon today announced price reductions of up to 27.7 percent for Elastic Compute Cloud Reserved Instances running Linux/UNIX, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server. Reserved instances requiring up-front payments already provide discounts over “on-demand instances,” which can be spun up and down at will. Using reserved instances requires a little more advance planning to make sure you get the most bang for your buck—although customers who buy more than they need can sell excess capacity on Amazon’s Reserved Instance Marketplace . Read 7 remaining paragraphs | Comments

Continue Reading:
VMware will hate this: Amazon slashes cloud prices up to 28 percent

Bitcoin reaches an all-time trading high of over $33

After rising steadily over the last several months, Bitcoin has reached an all-time high according to data on Bitcoin Charts . As of this writing, Mt. Gox , the most popular Bitcoin trading site (which announced on Wednesday that  its operations  would move to Silicon Valley), recorded a high price of $33.22 per Bitcoin. There’s no single explanation as to why Bitcoin has continued to rise, accelerating particularly over the last month. That said, it’s been clear that interest in the digital currency has been rapidly rising, as any regular reader of Ars knows. It’s likely that online gambling has played a part. As we’ve reported earlier this year, one Bitcoin-based site took in $500,000 in profit in just six months in 2012—and Bitcoin gambling is set to get even bigger . For now, gambling with the cryptocurrency, like using Bitcoins in general, remains in a legal grey area  (which may be part of the appeal as well). Read 3 remaining paragraphs | Comments

View article:
Bitcoin reaches an all-time trading high of over $33

Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

New Jersey Modern audio compression algorithms rely on observations about auditory perceptions. For instance, we know that a low-frequency tone can render a higher tone inaudible. This perception is used to save space by removing the tones we expect will be inaudible. But our expectations are complicated by the physics of waves and our models of how human audio perception works. This problem has been highlighted in a recent Physical Review Letter , in which researchers demonstrated the vast majority of humans can perceive certain aspects of sound far more accurately than allowed by a simple reading of the laws of physics. Given that many encoding algorithms start their compression with operations based on that simple physical understanding, the researchers believe it may be time to revisit audio compression. Time and frequency: Two sides of the same coin You’ll notice I didn’t say, “human hearing violates the laws of physics,” even though it was very tempting. The truth is that nothing violates the laws of physics, though many things violate the simplified models we use to approximate them. Read 10 remaining paragraphs | Comments

More:
Human hearing beats sound’s uncertainty limit, makes MP3s sound worse

Why a one-room West Virginia library runs a $20,000 Cisco router

Yes, this library has a Cisco 3945 router. Marmet, West Virginia is a town of 1,500 people living in a thin ribbon along the banks of the Kanawha River just below Charleston. The town’s public library is only open Thursdays, Fridays, and Saturdays. It’s housed in a small building the size of a trailer, which the state of West Virginia describes as an “extremely small facility with only one Internet connection.” Which is why it’s such a surprise to learn the Marmet Public Library runs this connection through a $15,000 to $20,000 Cisco 3945 router intended for “mid-size to large deployments,” according to Cisco. In an absolutely scathing report  (PDF) just released by the state’s Legislative Auditor, West Virginia officials are accused of overspending at least $5 million of federal money on such routers, installed indiscriminately in both large institutions and one-room libraries across the state. The routers were purchased without ever asking the state’s libraries, cops, and schools what they needed. And when distributed, the expensive routers were passed out without much apparent care. The small town of Clay received seven of them to serve a total population of 491 people… and all seven routers were installed within only .44 miles of each other at a total cost of more than $100,000. In total, $24 million was spent on the routers through a not-very-open bidding process under which non-Cisco router manufacturers such as Juniper and Alcatel-Lucent were not “given notice or any opportunity to bid.” As for Cisco, which helped put the massive package together, the Legislative Auditor concluded that the company “had a moral responsibility to propose a plan which reasonably complied with Cisco’s own engineering standards” but that instead “Cisco representatives showed a wanton indifference to the interests of the public in recommending using $24 million of public funds to purchase 1,164 Cisco model 3945 branch routers.” Read 20 remaining paragraphs | Comments

Original post:
Why a one-room West Virginia library runs a $20,000 Cisco router

Google shows the world its official Android 4.2.2 changelog

When Android 4.2.2 quietly debuted last week , most users were left guessing about what exactly had been included in the software update. Helpful community sites like AndroidPolice had put together a thorough listing of some of the new features in Android 4.2.2, but any official listing of updates had yet to be made. Today, Google published its official changelog for its Android 4.2.2 update, as well as everything else that comes as a part of the Jelly Bean package. Many of the bullet points marked as “new” actually identify features that have been included in Android 4.2 since its initial launch and have since been  thoroughly  discussed. However, the changelog does include some of the minor features not previously touched on, like networking changes that were made to improve Wi-Fi Direct support and faster captive portal detection. Updates also include minor features, like the fact that TalkBack can now be accessed right from the power menu. You can also view the entirety of the Google Cards updates that have been made in Android 4.2. If you’re curious, you can view the official changelog at Google’s official Android site, then try out some of the features you may not have known existed on your Android 4.2 device. Read on Ars Technica | Comments

See more here:
Google shows the world its official Android 4.2.2 changelog

Cellular data traffic keeps doubling every year

Florence Ion Worldwide mobile data traffic doubled over the past year and is expected to continue growing at a similar rate due to expanding smartphone sales and video traffic, telecom equipment maker Ericsson said in research released today. By the end of 2012, global data traffic on mobile networks (not including Wi-Fi) hit around 1,300 petabytes per month, twice as much as in the previous year, Ericsson said. Ericsson The chart shows an approximate doubling each year for the past few years. We’ve asked Ericsson for the raw data behind the report and will provide that if we get it. Ericsson’s measurements come from “a large base of commercial networks that together cover all regions of the world,” the report states. “They form a representative base for calculating world total traffic in mobile networks.” Read 10 remaining paragraphs | Comments

More here:
Cellular data traffic keeps doubling every year