Chrome 62 Released With OpenType Variable Fonts, HTTP Warnings In Incognito Mode

An anonymous reader writes: Earlier today, Google released version 62 of its Chrome browser that comes with quite a few new features but also fixes for 35 security issues. The most interesting new features are support for OpenType variable fonts, the Network Quality Estimator API, the ability to capture and stream DOM elements, and HTTP warnings for the browser’s Normal and Incognito mode. The most interesting of the new features is variable fonts. Until now, web developers had to load multiple font families whenever they wanted variations on a font family. For example, if a developer was using the Open Sans font family on a site, if he wanted a font variation such as Regular, Bold, Black, Normal, Condensed, Expanded, Highlight, Slab, Heavy, Dashed, or another, he’d have to load a different font file for each. OpenType variable fonts allow font makers to merge all these font family variations in one file that developers can use on their site and control via CSS. This results in fewer files loaded on a website, saving bandwidth and improving page load times. Two other features that will interest mostly developers are the Network Quality Estimator and the Media Capture from DOM Elements APIs. As the name hints, the first grants developers access to network speed and performance metrics, information that some websites may use to adapt video streams, audio quality, or deliver low-fi versions of their sites. Developers can use the second API — the Media Capture from DOM Elements — to record videos of how page sections behave during interaction and stream the content over WebRTC. This latter API could be useful for developers debugging a page, but also support teams that want to see what’s happening on the user’s side. Read more of this story at Slashdot.

Read the original:
Chrome 62 Released With OpenType Variable Fonts, HTTP Warnings In Incognito Mode

Ubuntu 17.10 Artful Aardvark Released

Canonical has made available the download links for Ubuntu 17.10 “Artful Aardvark”. It comes with a range of new features, changes, and improvements including GNOME as the default desktop, Wayland display server by default, Optional X.org server session, Mesa 17.2 or Mesa 17.3, Linux kernel 4.13 or kernel 4.14, new Subiquity server installer, improved hardware support, new Ubuntu Server installer, switch to libinput, an always visible dock using Dash to Dock GNOME Shell extension, and Bluetooth improvements with a new BlueZ among others. Read more of this story at Slashdot.

See more here:
Ubuntu 17.10 Artful Aardvark Released

Samsung To Let Proper Linux Distros Run on Galaxy Smartphones

An anonymous reader shares a report: Samsung has announced it will soon become possible to run actual proper Linux on its Note8, Galaxy S8 and S8+ smartphones — and even Linux desktops. Yeah, yeah, we know Android is built on Linux, but you know what we mean. Samsung said it’s working on an app called “Linux on Galaxy” that will let users “run their preferred Linux distribution on their smartphones utilizing the same Linux kernel that powers the Android OS.” “Whenever they need to use a function that is not available on the smartphone OS, users can simply switch to the app and run any program they need to in a Linux OS environment, ” Samsung says. The app also allows multiple OSes to run on a device. Linux desktops will become available if users plug their phones into the DeX Station, the device that lets a Galaxy 8 run a Samsung-created desktop-like environment when connected to the DeX and an external monitor. Read more of this story at Slashdot.

See the original article here:
Samsung To Let Proper Linux Distros Run on Galaxy Smartphones

Adobe’s ‘Cloak’ experiment is a content-aware eraser for video

Glamorous show-reels from shows like Game of Thrones get all the fame, but a lot of VFX work is mundane stuff like removing cars , power lines and people from shots. Adobe’s research team is working on making all of that easier for anyone, regardless of budget, thanks to a project called “Cloak.” It’s much the same as ” content-aware fill” for Photoshop, letting you select and then delete unwanted elements, with the software intelligently filling in the background. Cloak does the same thing to moving video, though, which is a significantly bigger challenge. Engadget got an early look at the tech, including a video demonstration and chance to talk with Adobe research engineer Geoffrey Oxholm and Victoria Nece, product manager for video graphics and VFX. At the moment, the technology is in the experimental stages, with no set plans to implement it. However, Adobe likes to give the public ” Sneaks ” at some of its projects as a way to generate interest and market features internally to teams. An example of that would be last year’s slightly alarming “VoCo” tech that lets you Photoshop voiceovers or podcasts. That has yet to make it into a product, but one that did is “Smartpic” which eventually became part of Adobe’s Experience Manager. The “Cloak” tech wouldn’t just benefit Hollywood — it could be useful to every video producer. You could make a freeway look empty by removing all the cars, cut out people to get a pristine nature shot, or delete, say, your drunk uncle from a wedding shot. Another fun example: When I worked as a compositer in another life , I had to replace the potato salad in a shot with macaroni, which was a highly tedious process. Object removal will also be indispensable for VR, AR, and other types of new video tech. “With 360 degree video, the removal of objects, the crew and the camera rig becomes virtually mandatory, ” Nece told Engadget. Content-aware fill on photos is no easy task in the first place, because the computer has to figure out what was behind the deleted object based on the pixels around it. Video increases the degree of difficulty, because you have to track any moving objects you want to erase. On top of that, the fill has to look the same from frame to frame or it will be a glitchy mess. “It’s a fascinating problem, ” Oxholm said. “Everything is moving, so even if you nail one frame, you have to be consistent.” Luckily, video does have one advantage over photos. “The saving grace is that we can see behind the thing we want to remove, ” says Oxholm. “If you’ve got a microphone to remove, you can see behind the microphone.” In other words, if you’re doing shot of a church with a pole in the way, there’s a good chance you have a different angle with a clean view of the church. With 360 degree video, the removal of objects, the crew and the camera rig becomes virtually mandatory. Another thing making content-aware fill for video much more feasible now is the fact that motion-tracking technology has become so good. “We can do really dense tracking, using parts of the scene as they become visible, ” said Oxholm. “That gives you something you can use to fill in.” The results so far, as shown in the video above, are quite promising. The system was able to erase cars from a freeway interchange, did a decent job of deleting a pole in front of a cathedral and even erased a hiking couple from a cave scene. The shots were done automatically in “one quick process, ” Oxholm said, after a mask was first drawn around the object to be removed — much as you do with Photoshop. It’s not totally perfect, however. Shadow traces are visible on the cave floor, and the cathedral is blurred in spots where the pole used to be. Even at this early stage, though, the tool could do much of the grunt-work, making it easier for a human user to do the final touch-ups. I’d love to see Adobe release it in preview as soon as possible, even if it’s not perfect, as it looks like it could be a major time saver — I sure could’ve used it for that macaroni.

Excerpt from:
Adobe’s ‘Cloak’ experiment is a content-aware eraser for video

Over 500 Million PCs Are Secretly Mining Cryptocurrency, Researchers Reveal

Ad blocking firm AdGuard has found that over 500 million people are inadvertently mining cryptocurrencies through their computers after visiting websites that are running background mining software. The company found 220 popular websites with an aggregated audience of half a billion people use so-called crypto-mining scripts when a user opens their main page. Newsweek reports: The mining tool works by hijacking a computer’s central processing unit (CPU), commonly referred to as “the brains” of a computer. Using part of a computer’s CPU to mine bitcoin effects the machine’s overall performance and will slow it down by using up processing power. The researchers found that bitcoin browser mining is mostly found on websites “with a shady reputation” due to the trouble such sites have with earning revenue through advertising. However, in the future it could become a legitimate and ethical way of making money if the website requests the permission of the visitor first. “220 sites may not seem like a lot, ” the researchers wrote in a blogpost detailing their discovery. “But CoinHive was launched less than one month ago on September 14. The growth has been extremely rapid: from nearly zero to 2.2 percent of Alexa’s top 100, 000 websites. “This analysis well illustrates the whole web, so it’s safe to say that one of every forty websites currently mines cryptocurrency (namely Monero) in the browsers their users employ.” Read more of this story at Slashdot.

Visit link:
Over 500 Million PCs Are Secretly Mining Cryptocurrency, Researchers Reveal

Hyatt Hotels Discovers Card Data Breach At 41 Properties Across 11 Countries

Hyatt Hotels has suffered a second card data breach in two years. In the first breach, hackers had gained access to credit card systems at 250 properties in 50 different countries. This time, the breach appears to have impacted 41 properties across 11 countries. Krebs on Security reports: Hyatt said its cyber security team discovered signs of unauthorized access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017. “Upon discovery, we launched a comprehensive investigation to understand what happened and how this occurred, which included engaging leading third-party experts, payment card networks and authorities, ” the company said in a statement. “Hyatt’s layers of defense and other cybersecurity measures helped to identify and resolve the issue. While this incident affects a small percentage of total payment cards used at the affected hotels during the at-risk dates.” The hotel chain said the incident affected payment card information — cardholder name, card number, expiration date and internal verification code — from cards manually entered or swiped at the front desk of certain Hyatt-managed locations. It added there is no indication that any other information was involved. Read more of this story at Slashdot.

Continue Reading:
Hyatt Hotels Discovers Card Data Breach At 41 Properties Across 11 Countries

Massive 70-Mile-Wide Butterfly Swarm Shows Up On Denver Radar System

dryriver shares a report from BBC: A colorful, shimmering spectacle detected by weather radar over the U.S. state of Colorado has been identified as swarms of migrating butterflies. Scientists at the National Weather Service (NWS) first mistook the orange radar blob for birds and had asked the public to help identifying the species. They later established that the 70-mile wide (110km) mass was a kaleidoscope of Painted Lady butterflies. Forecasters say it is uncommon for flying insects to be detected by radar. “We hadn’t seen a signature like that in a while, ” said NWS meteorologist Paul Schlatter, who first spotted the radar blip. “We detect migrating birds all the time, but they were flying north to south, ” he told CBS News, explaining that this direction of travel would be unusual for migratory birds for the time of year. So he put the question to Twitter, asking for help determining the bird species. Almost every response he received was the same: “Butterflies.” Namely the three-inch long Painted Lady butterfly, which has descended in clouds on the Denver area in recent weeks. The species, commonly mistaken for monarch butterflies, are found across the continental United States, and travel to northern Mexico and the U.S. southwest during colder months. They are known to follow wind patterns, and can glide hundreds of miles each day. Read more of this story at Slashdot.

Read more here:
Massive 70-Mile-Wide Butterfly Swarm Shows Up On Denver Radar System

Uber’s iOS App Had Secret Permissions That Allowed It to Copy Your Phone Screen, Researchers Say

To improve functionality between Uber’s app and the Apple Watch, Apple allowed Uber to use a powerful tool that could record a user’s iPhone screen, even if Uber’s app was only running in the background, security researchers told news outlet Gizmodo. From a report: After the researchers discovered the tool, Uber said it is no longer in use and will be removed from the app. The screen recording capability comes from what’s called an “entitlement” — a bit of code that app developers can use for anything from setting up push notifications to interacting with Apple systems like iCloud or Apple Pay. This particular entitlement, however, was intended to improve memory management for the Apple Watch. The entitlement isn’t common and would require Apple’s explicit permission to use, the researchers explained. Will Strafach, a security researcher and CEO of Sudo Security Group, said he couldn’t find any other apps with the entitlement live on the App Store. “It looks like no other third-party developer has been able to get Apple to grant them a private sensitive entitlement of this nature, ” Strafach said. “Considering Uber’s past privacy issues I am very curious how they convinced Apple to allow this.” Read more of this story at Slashdot.

Visit link:
Uber’s iOS App Had Secret Permissions That Allowed It to Copy Your Phone Screen, Researchers Say

Russian Hackers Exploited Kaspersky Antivirus To Steal NSA Data on US Cyber Defense: WSJ

An NSA contractor brought home highly classified documents that detailed how the U.S. penetrates foreign computer networks and defends against cyberattacks. The contractor used Kaspersky antivirus on his home computer, which hackers working for the Russian government exploited to steal the documents, the WSJ reported on Thursday (the link could be paywalled; alternative source), citing multiple people with knowledge of the matter. From the report: The hackers appear to have targeted the contractor after identifying the files through the contractor’s use of a popular antivirus software made by Russia-based Kaspersky Lab, these people said. The theft, which hasn’t been disclosed, is considered by experts to be one of the most significant security breaches in recent years. It offers a rare glimpse into how the intelligence community thinks Russian intelligence exploits a widely available commercial software product to spy on the U.S. The incident occurred in 2015 but wasn’t discovered until spring of last year, said the people familiar with the matter. Having such information could give the Russian government information on how to protect its own networks, making it more difficult for the NSA to conduct its work. It also could give the Russians methods to infiltrate the networks of the U.S. and other nations, these people said. Ahead of the publication of WSJ report, Kaspersky founder Eugene Kaspersky tweeted, “New conspiracy theory, anon sources media story coming. Note we make no apologies for being aggressive in the battle against cyberthreats.” Read more of this story at Slashdot.

More:
Russian Hackers Exploited Kaspersky Antivirus To Steal NSA Data on US Cyber Defense: WSJ

US Studying Ways To End Use of Social Security Numbers For ID

wiredmikey quotes a report from Security Week: U.S. officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for millions of Americans, Rob Joyce, the White House cybersecurity coordinator, said Tuesday. Joyce told a forum at the Washington Post that officials were studying ways to use “modern cryptographic identifiers” to replace social security numbers. “I feel very strongly that the social security number has outlived its usefulness, ” Joyce said. “It’s a flawed system.” For years, social security numbers have been used by Americans to open bank accounts or establish their identity when applying for credit. But stolen social security numbers can be used by criminals to open bogus accounts or for other types of identity theft. Joyce said the administration has asked officials from several agencies to come up with ideas for “a better system” which may involve cryptography. This may involve “a public and private key” including “something that could be revoked if it has been compromised, ” Joyce added. Read more of this story at Slashdot.

See the original post:
US Studying Ways To End Use of Social Security Numbers For ID