Optical transistor switches states by trapping a single photon

NIST Optical connections are slowly replacing wires as a means of shuffling bits in between systems—there are already plans afoot to have different components within a single system communicate via an optical connection. But, so far at least, all the processing of those bits is taking place using electrons. Yesterday’s edition of Science includes a demonstration of an all-optical transistor that can be switched between its on and off states using a single photon. Although it’s an impressive demonstration of physics, the work also indicates that we’re likely to stick with electrons for a while, given that the transistor required two lasers and a cloud of a cold atomic gas. The work relied on a cold gas of cesium atoms. These atoms have an extremely convenient property: two closely separated ground states, each with a corresponding excited state. All of these states are separated by an energy that corresponds to a specific wavelength of light, so using a laser of that wavelength allows you to shift the system into a different state. Read 9 remaining paragraphs | Comments

Read More:
Optical transistor switches states by trapping a single photon

Windows 8.1 to go RTM in “late August”

During its Worldwide Partner Conference in a rainy and humid Houston today, Windows CFO Tami Reller announced that Windows 8.1, the free update to Windows 8, will be made available to OEMs by “late August, ” with devices reaching the market by the holiday season. Windows 8 was released to manufacturing on August 1, 2012. Microsoft is promoting a faster release cadence across its entire range of products, and Windows 8.1 is arguably the first mass-market consumer product from the company that will benefit from this new release schedule. Read on Ars Technica | Comments

Read More:
Windows 8.1 to go RTM in “late August”

Mass-login attack on Nintendo fan site hijacks 24,000 accounts

Almost 24, 000 user accounts on Nintendo’s main fan site have been hijacked in a sustained mass-login attack that began early last month, the company said. The wave of attacks on Club Nintendo exposed personal information associated with 23, 926 compromised accounts, including users’ real names, addresses, phone numbers and e-mail addresses, according to a press release Nintendo issued over the weekend. The campaign began on June 9 and attempted more than 15.5 million logins over the following month. Attackers likely relied on a list of login credentials taken from a site unrelated to Nintendo. Club Nintendo offers rewards to Nintendo customers in exchange for having them register their products, answer surveys, and provide personal data. The site operates internationally and has about four million users in Japan, the primary region of most affected users. Things came to a head on July 2, when the wave of logins crested. By Friday, July 5, Nintendo had reset passwords on the site. Read 2 remaining paragraphs | Comments

View the original here:
Mass-login attack on Nintendo fan site hijacks 24,000 accounts

Password complexity rules more annoying, less effective than lengthy ones

Few Internet frustrations are so familiar as the password restriction . After creating a few (dozen) logins for all our Web presences, the use of symbols, mixed cases, and numbers seems less like a security measure and more like a torture device when it comes to remembering a complex password on a little-used site. But at least that variety of characters keeps you safe, right? As it turns out, there is some contrary research that supports both how frustrating these restrictions are and suggests it’s possible that the positive effect of complexity rules on security may not be as great as long length requirements. Let’s preface this with a reminder: the conventional wisdom is that complexity trumps length every time, and this notion is overwhelmingly true. Every security expert will tell you that “Supercalifragilistic” is less secure than “gj7B!!!bhrdc.” Few password creation schemes will render any password uncrackable, but in general, length does less to guard against crackability than complexity. A password is not immune from cracking simply by virtue of being long—44,991 passwords recovered from a dump of LinkedIn hashes last year were 16 characters or more. The research we describe below refers specifically to the effects of restrictions placed by administrators on password construction on their crackability. By no means does it suggest that a long password is, by default, more secure than a complex one. Read 13 remaining paragraphs | Comments

Continue reading here:
Password complexity rules more annoying, less effective than lengthy ones

Attackers sign malware using crypto certificate stolen from Opera Software

Alan Cleaver Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker. The attack was uncovered, halted, and contained on June 19, according to a short advisory  that Opera published Wednesday morning. While administrators have cleaned the system and have yet to find any evidence of any user data being compromised, the breach still had some troubling consequences. “The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware,” Wednesday’s advisory stated. “This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software or appears to be the Opera browser. It is possible that a few thousand Windows users, who were using Opera between June 19 from 1.00 and 1.36 UTC , may automatically have received and installed the malicious software.” Read 3 remaining paragraphs | Comments

Original post:
Attackers sign malware using crypto certificate stolen from Opera Software

Kim Dotcom says Dutch firm deleted “at least 40 petabytes” of Megaupload data

Kim Dotcom (right) shares a lighthearted moment with colleague Finn Batato. Chris Keall A week ago, we reported that Kim Dotcom publicly accused LeaseWeb, a Dutch hosting company, of suddenly deleting all of Megaupload’s servers. The founder of Megaupload continues to fight legal battles worldwide concerning the shuttering of his file-sharing site. And he  wrote on Twitter that “all user data & crucial evidence for our defense [was] destroyed ‘without warning.’” LeaseWeb, for its part, defended its actions. On Wednesday, TorrentFreak published a new e-mail from Dotcom’s attorney to LeaseWeb, showing that Megaupload did request preservation of all of its data. “Megaupload continues to request that LeaseWeb preserve any and all information, documentation, and data related to Megaupload—as destruction by LeaseWeb would appear to be in violation of amongst other things the applicable civil litigation data preservation rules and would interfere with evidence in a criminal matter all of which may subject LeaseWeb to varying degrees of liability,” Ira Rothken, Dotcom’s counsel, wrote. The passage appeared in an e-mail to LeaseWeb’s lawyer, A.H. “Bram” de Haas van Dorsser, in March 2012. Read 10 remaining paragraphs | Comments

See original article:
Kim Dotcom says Dutch firm deleted “at least 40 petabytes” of Megaupload data

Hands-on with Windows 8.1 Preview: Windows 8 done right

Late last month, Microsoft announced a raft of interface changes that Windows 8.1 would introduce. We’ve been giving them a spin. As you might guess from the name, Windows 8.1 is an update to (and improvement on) Windows 8. The new user interface introduced in that operating system—the Start screen, touch-friendly “Modern” apps, the charms bar—is retained in Windows 8.1. What we see is a refinement and streamlining of these concepts. The new Start screen is a pleasing evolution of the old one. The differences are visible as soon as you log in. In 8.1, the Start screen offers a lot more flexibility over layout and tile sizing. By default, the Weather tile takes advantage of this, using a new double-height tile size to show the forecasts for both today and tomorrow, in addition to the current conditions. Read 22 remaining paragraphs | Comments

Visit site:
Hands-on with Windows 8.1 Preview: Windows 8 done right

OS X is holding back the 2013 MacBook Air’s 802.11ac Wi-Fi speeds

Apple’s 2013 MacBook Air and new Airport Extreme Base Station are the company’s first 802.11ac products, and there are some bugs that need to be worked out. Apple Apple’s 2013 MacBook Air doesn’t look like much of an upgrade from the outside, but the story is different on the inside. We’ve spent the better part of a week using the new Air and measuring just how Intel’s new Haswell processors , the PCI Express-based SSD , and the 802.11ac Wi-Fi adapter change the laptop compared to last year’s model. The new Wi-Fi chip was the change that I was the most eager to get my hands on. I’m always looking to boost my network speeds, but I’ve been waiting for hardware based on the new 802.11ac standard to become more widely available before upgrading everything on my network. Reviewing both the new Air and Apple’s new 802.11ac-capable Airport Express Base Station simultaneously would give me a chance to see just how close the lauded “Gigabit Wi-Fi” would come to fulfilling its promises. I was unpleasantly surprised by the results. Both the 2012 and 2013 MacBook Airs use four antennas to transmit data—two to send data and two to receive it. Each set of antennas can theoretically send and receive 150Mbps (or 18.75MBps) using 5GHz 802.11n for a total of 300Mbps (37.5MBps). Under 802.11ac, the size of each stream is increased to 433Mbps, making for a maximum theoretical link speed of 866Mbps (108.25MBps) in the 2013 MacBook Air. Actual network transfer speeds rarely (if ever) come within spitting distance of these theoretical maximums, but we would at least expect the actual 802.11ac transfer speeds to increase by a similar percentage compared to 802.11n. Read 8 remaining paragraphs | Comments

More:
OS X is holding back the 2013 MacBook Air’s 802.11ac Wi-Fi speeds

Stow it no more: FAA easing ban on electronics during takeoff, landing

The words “please stow all electronic devices” may soon disappear from the scripts of flight attendants. The Federal Aviation Administration (FAA) is poised to lift its ban on the use of electronic devices aboard airline flights at elevations under 10,000 feet. It would also allow the use of e-readers, iPods, tablets, and phones in “airplane” mode even during take-offs and landings. The Wall Street Journal reports that the FAA is circulating a draft set of recommendations from an advisory panel that recommends relaxing the bans. Cell phone calls during flight would still be banned. T he report acknowledges that technology has changed dramatically since the FAA originally placed the ban on electronic devices during takeoff and landing back in the 1960s, when there were valid concerns about interference to aircraft communications from personal radios and other electronics.  The panel also admitted that having airlines each evaluate the safety of individual electronic devices before allowing them to be left on at low altitude “has become untenable.” Passengers are widely ignoring the ban already, and the FAA advisory panel’s report cited research that showed a third of airline passengers had “accidentally” left a device turned on for entire flights at least once. An FAA spokeswoman sent a statement to the Wall Street Journal that said that the FAA “recognizes consumers are intensely interested in the use of personal electronics aboard aircraft. That is why we tasked a government-industry group to examine the safety issues and the feasibility of changing the current restrictions. At the group’s request, the FAA has granted the two-month extension to complete the additional work necessary for the safety assessment.” Read on Ars Technica | Comments

View article:
Stow it no more: FAA easing ban on electronics during takeoff, landing

How OS X “Mavericks” works its power-saving magic

Apple execs talk up the new features in OS X Mavericks. At yesterday’s Worldwide Developer Conference (WWDC) keynote, Apple made some bold claims about the future of battery life in its laptops. A new 13-inch Macbook Air, for instance, should now run a full 12 hours on a single charge , up from 7 in the previous model. Assuming that testing bears out Apple’s numbers, how did the company do it? The obvious part of the answer is “Haswell”—but that turns out to be only part of the story. The power efficiency gains found in Intel’s new Haswell CPUs should provide modest gains in battery life, and such gains were widely expected. Back in January, Intel claimed that the new Haswell CPUs featured the “largest generation-to-generation battery life increase in the history of Intel” and said that the chips were the first of its architectures designed “from the ground up” for Ultrabooks and tablets. The new chips run at lower clockspeeds and at lower wattages. Less expected was the announcement of OS X 10.9 “Mavericks” and its own focus on mobile power usage. While Apple made a few comments during the keynote about the new technologies meant to enable longer battery life, more information appeared later in the day with the separate release of a Core Technology Overview (PDF) document that offers a high-level look at some of the Mavericks internals. Read 11 remaining paragraphs | Comments

View original post here:
How OS X “Mavericks” works its power-saving magic