AT&T still throttles unlimited data, and FCC isn’t promising to stop it

How long will AT&T continue to get away with throttling unlimited data plans? Even after the Federal Communications Commission’s recent net neutrality ruling banned throttling, the FCC isn’t saying whether it will put a stop to it. All major US cellular carriers impose some form of throttling on unlimited data plans, but AT&T’s throttling seems most likely to fall afoul of the FCC’s rules. The big carriers generally reserve the right to slow down data speeds for customers with unlimited data plans after they hit a certain usage threshold each month, but they only do the actual throttling when the user is connected to a congested tower. AT&T, on the other hand, slows its unlimited LTE users down for the rest of the month once they’ve hit a 5GB threshold, and the throttling happens at all hours of the day and in all locations regardless of whether the user is connected to a congested tower. More than any other throttling policy enforced by a major carrier, this one seems designed to push customers with grandfathered unlimited data plans onto newer, more expensive plans that charge automatic overage fees when customers go over their caps. Read 12 remaining paragraphs | Comments

See the article here:
AT&T still throttles unlimited data, and FCC isn’t promising to stop it

CryptoLocker look-alike searches for and encrypts PC game files

Crypto-based “ransomware” has become a lucrative business for cybercriminals. Since the arrival of CryptoLocker on the scene last year, a number of copycat malware packages have appeared to compete in the cyber-extortion market, encrypting victims’ photos and other personal files with a key that will be destroyed if they don’t contact the malware’s operators and pay up. Recently, a new variant has emerged that seeks to raise the stakes with a particular class of victim by specifically seeking out files related to a number of popular PC games, as well as Valve’s Steam gaming platform. The malware, which is a variant of the crypt-ransomware called TeslaCrypt, superficially looks like CryptoLocker. But according to a number of security researchers who have analyzed the malware, it shares little code with CryptoLocker or its more well-known successor CryptoWall. And while it will also will target photos and documents, as well as iTunes-related files, as Bromium security researcher Vadim Kotov noted in an analysis on Bromium Labs’ blog , TeslaCrypt also includes code that specifically looks for files related to more than 40 specific PC games, gaming platforms, and game developer tools. The games include both single player and multiplayer games, though it isn’t clear how targeting some of the multiplayer games would affect users other than requiring a re-install. The games targeted include a mix of older and newer titles— for example, Blizzard’s StarCraft II and WarCraft III real-time strategy games and its World of Warcraft online game are targeted. Also on TeslaCrypt’s hit list: Bioshock 2, Call of Duty, DayZ, Diablo, Fallout 3, League of Legends, F.E.A.R, S.T.A.L.K.E.R, Minecraft, Metro 2033, Half-Life 2, Dragon Age: Origins, Resident Evil 4, World of Tanks, Metin 2, and The Elder Scrolls (specifically, Skyrim-related files), as well as Star Wars: The Knights Of The Old Republic. There’s also code that searches for files associated with games from specific companies that affect a wide range of titles, including a variety of games from EA Sports, Valve, and Bethesda, and Valve’s Steam gaming platform. And the game development tools RPG Maker, Unity3D and Unreal Engine are targeted as well. Read 4 remaining paragraphs | Comments

See the original article here:
CryptoLocker look-alike searches for and encrypts PC game files

Internet providers ordered to stop hiding the true size of monthly bills

New rules for home Internet providers and wireless carriers require them to be truthful about how much their service actually costs. As part of the transparency requirements in the Federal Communications Commission’s net neutrality order , Internet providers have to clearly detail all charges, such as modem rental and installation fees, and disclose the full monthly price that will go into effect after any promotional pricing expires. The new disclosure rule is more specific than a previous one, the FCC said. Read 7 remaining paragraphs | Comments

Read More:
Internet providers ordered to stop hiding the true size of monthly bills

reddit CEO Ellen Pao: harassment complaints fell on deaf ears at Kleiner Perkins

SAN FRANCISCO—Interim reddit CEO Ellen Pao, a former junior partner at Silicon Valley venture capital firm Kleiner Perkins, finally took the stand today in the high-profile gender discrimination case that she brought against the firm three years ago. Pao maintained a firm tone throughout the day, even looking at the jury occasionally while answering questions from her lawyer about her early days at Kleiner. It’s the first opportunity that Pao has taken to elaborate on the gender discrimination claims she made in 2012. And the questioning started by going all the way back to the day Pao was hired at Kleiner Perkins. Pao, a Mandarin-speaking, Princeton-educated engineer with law and business degrees from Harvard, applied to Kleiner Perkins in 2005. At the time, the firm was looking to expand its investments in China. She seemed like a perfect fit, her lawyer Therese Lawless said. In addition to Pao’s language skills, she had years of experience working with 90’s startups like WebTV, Tell Me Networks, and Danger Research (whose team went on to join the team that created Android). She also spent time with bigger companies like Microsoft and BEA Systems. Read 35 remaining paragraphs | Comments

Taken from:
reddit CEO Ellen Pao: harassment complaints fell on deaf ears at Kleiner Perkins

DNS enhancement catches malware sites by understanding sneaky domain names

A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O’Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank , it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness. The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via “phishing” links in e-mails and social media have gone past the well-worn “typo-squatting” approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered “Carbanak” attacks on banks that allowed criminals to gain access to financial institutions’ networks starting in January 2013 and steal over $1 billion over the next two years. Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks. Read 4 remaining paragraphs | Comments

More here:
DNS enhancement catches malware sites by understanding sneaky domain names

In major goof, Uber stored sensitive database key on public GitHub page

Uber is trying to force GitHub to disclose the IP address of every person that accessed a webpage connected to a database intrusion that exposed sensitive personal data for 50,000 drivers. The court action revealed that a security key unlocking the database was stored on a publicly accessible place, the online equivalent of stashing a house key under a doormat. Uber officials have yet to say precisely what information was contained in the two now-unavailable GitHub gists . But in a lawsuit filed Friday against the unknown John Doe intruders, Uber lawyers said the URLs contained a security key that allowed unauthorized access to the names and driver’s license numbers of about 50,000 Uber drivers . The ride-sharing service disclosed the breach on Friday, more than two months after it was discovered. “The contents of these internal database files are closely guarded by Uber,” the complaint stated. “Accessing them from Uber’s protected computers requires a unique security key that is not intended to be available to anyone other than certain Uber employees, and no one outside of Uber is authorized to access the files. On or around May 12, 2014, from an IP address not associated with an Uber employee and otherwise unknown to Uber, John Doe I used the unique security key to download Uber database files containing confidential and proprietary information from Uber’s protected computers.” Read 3 remaining paragraphs | Comments

More:
In major goof, Uber stored sensitive database key on public GitHub page

Intel unveils its next mobile maneuver: Atom x3, x5, and x7

BARCELONA, Spain—At Mobile World Congress 2015, Intel has unveiled its latest in a very long line of attempts at securing a beachhead in the mobile market: the Atom x3, Atom x5, and Atom x7 SoCs. As the naming implies, the Atom x3 is a low-end part that is probably destined for developing markets in countries such as India and China. The Atom x5 and x7, however, are quad-core 14nm Cherry Trail chips with Broadwell-class Intel HD graphics. Performance-wise, the x5 and x7 chips should be pretty good—but right now we only have Intel’s own benchmarks to go on. There’s also no word from Intel on the power consumption of the new chips, which is rarely a good sign when you’re trying to break into a highly competitive, entrenched market. Let’s start at the bottom. Atom x3 is essentially rebranded SoFIA, but now along with a 3G version there is a new chip (the x3-C3440) with an integrated LTE modem. Rather unusual despite its use of the Atom brand name, the x3 is a 28nm chip that isn’t being built at Intel’s own fabs. Instead, Intel is using a foundry (most likely TSMC or Rockchip), primarily because it isn’t cost effective for Intel to build chips with integrated modems on its own bleeding-edge 14nm node. The top-end Atom x3, the x3-C3440, has a quad-core CPU and Mali 720 MP2 GPU (yes, that’s a GPU designed by ARM Holdings). We probably won’t see the Atom x3 in Western markets; it will be cheaply fabricated in Asia, and it will be used in very cheap phones and tablets. We have asked Intel what CPU core is being used by Atom x3, but the company hasn’t yet responded. Read 2 remaining paragraphs | Comments

See original article:
Intel unveils its next mobile maneuver: Atom x3, x5, and x7

Hands-on with the fastest LTE network in Europe: 400Mbps down, 45Mbps up

LONDON—Today, I got to play around with Europe’s (and probably the world’s) fastest LTE network: when I opened up Speedtest.net, depending on how many people were standing in the room, my download speed was between 350 and 400Mbps, my upload speed was around 45Mbps, and my ping latency was just 20ms. Funny enough, beyond Speedtest.net, it is actually quite hard to use 400Mbps of bandwidth. When I loaded up a 4K video from YouTube, I only used around 40Mbps, or 10 percent, of my wireless uber-pipe. Ars Technica certainly loaded very quickly indeed. As it stands today, there are very few websites or services that will let you pull data down at 400Mbps, or where being able to download at 400Mbps even makes much sense. If we’ve learned anything from the last few decades of telecoms and networking, however, it’s that Internet usage will always expand until every last inch of available bandwidth is consumed. So while 400Mbps might seem a little bit over the top today, in five years you’ll probably wonder how you ever survived with anything less. For some background, I had a 400Mbps LTE connection at my disposal because I had been invited to Wembley Stadium in London to try out the first deployment of Category 9 LTE in the UK. It was a “live” deployment in that it used commercially available hardware, but it was still very much a tech demo—the Cat 9 base station only covered a small portion of the stadium, and there were only a handful of devices in the world configured to connect to this specific LTE network. The LTE network was operated by EE (one of the UK’s big four wireless carriers), the LTE base station was made by Huawei, and the mobile device that I used was a smartphone powered by the Qualcomm Snapdragon 810 SoC . Read 4 remaining paragraphs | Comments

Read More:
Hands-on with the fastest LTE network in Europe: 400Mbps down, 45Mbps up

Verizon issues furious response to FCC, in Morse code, dated 1934

Verizon is just so mad at the Federal Communications Commission today that a normal press release wouldn’t do. After all, Verizon issues so many press releases denouncing the FCC for trying to regulate telecommunications that today’s vote on net neutrality required a special one to make sure it would be remembered. So Verizon wrote it in Morse code and set the date as “1934” to make the point that the FCC is taking us backward in time. Verizon sent out the press release in this e-mail: Read 6 remaining paragraphs | Comments

Link:
Verizon issues furious response to FCC, in Morse code, dated 1934

Remote valet mode and revolutionized parking: Ford’s Smart Mobility

Ford has a plan to help cut car emissions, and this time it doesn’t have anything to do with batteries, hybrid powertrains, or clever engine technology. Instead, the company is focusing on improving the parking experience, and its answer involves a crowdsourced real-time database of occupied and empty parking spots across the country, and remote control vehicles enabled by off-the-shelf commercial 4G LTE. At first glance that might not sound like it has much to do with reducing vehicle CO 2 emissions, but according to Ford, their data shows that hunting for parking spaces in urban environments can account for between 20 and 30 percent of a vehicle’s emissions. To find out more about what Ford has been working on, we spoke with Mike Tinskey, director of vehicle electrification and infrastructure at Ford. He told Ars about a pair of research projects that the car maker has been working on as part of a larger program called Smart Mobility. Smart Mobility involves 25 different experiments and pilot studies around the world, but these two have both been developed in conjunction with a team at Georgia Tech here in the US; Ford has had a long-running relationship with the group, which Tinskey describes as being analogous to the company’s research and advanced modeling arm for sustainability. According to Tinskey, Smart Mobility exists at the intersection of mobility and sustainability, with the overall goal of finding novel ways to reduce CO 2 . “When you look for places to do that, you start looking at antiquated things like parking, where people waste a lot of time, and a lot of CO 2 ,” he said. Read 10 remaining paragraphs | Comments

Read More:
Remote valet mode and revolutionized parking: Ford’s Smart Mobility