How dynamic resolution scaling keeps Halo 5 running so smoothly

Digital Foundry’s analysis shows how occasional resolution drops keep Halo 5 running at 60fps. Over the years, gamers have gotten used to highly detailed games that drop frames and get distractingly choppy when the action gets too intense (a deep pain I’ve personally been suffering through since at least  Gradius III on the SNES ). Now it seems some developers are toying with the idea of dropping a few pixels of resolution in those cases in order to keep the frame rate silky smooth. The technique is called dynamic resolution scaling, and a recent analysis by Digital Foundry goes into some detail about how it works in Halo 5: Guardians . Basically, the developers at 343 have prioritized hitting 60fps consistently through the entire game, a big boon for a twitchy first-person shooter (and a first for the Halo series). The level of graphical detail in some game scenes, though, means that such a high frame rate can only be delivered at resolutions well below the Xbox One’s highest 1080p standard. Instead of just statically setting a low resolution ceiling for the entire game, though, Halo 5 dynamically changes the resolution based on the detail of the current in-game scene. This on-the-fly adjustment takes place on both the X and Y axes, with resolutions jumping from as low as 1152×810 to as high as 1536×1080 in Digital Foundry’s analysis. The apparent on-the-fly change in resolution wasn’t even noticeable to my eye during some recent testing. Read 5 remaining paragraphs | Comments

Original post:
How dynamic resolution scaling keeps Halo 5 running so smoothly

US regulators grant DMCA exemption legalizing vehicle software tinkering

(credit: Jerk Alert Productions ) Every three years, the Librarian of Congress issues new rules on Digital Millennium Copyright Act exemptions. Acting Librarian David Mao, in an order (PDF) released Thursday, authorized the public to tinker with software in vehicles for “good faith security research” and for “lawful modification.” The decision comes in the wake of the Volkswagen scandal, in which the German automaker baked bogus code into its software that enabled the automaker’s diesel vehicles to reduce pollutants below acceptable levels during emissions tests. “I am glad they granted these exemptions,” Sherwin Siy, said vice president for legal affairs for Public Knowledge in Washington, DC. “I am not glad it was necessary for them to do so in the first place.” Read 2 remaining paragraphs | Comments

Read More:
US regulators grant DMCA exemption legalizing vehicle software tinkering

First ever online-only NFL game draws over 15 million viewers

(credit: Jaguars.com ) Over the weekend, the NFL and Yahoo streamed the first ever online-only NFL game , a Bills/Jaguars matchup in London. The game was mostly seen as an experiment for the NFL to test the viability of online distribution for a football game. Yahoo seems happy with the turnout, trumpeting 15.2 million unique viewers and 33.6 million total views for the game. The site also claims 33 percent of the streams came from international users. As Deadspin notes, the numbers were seriously pumped up by Yahoo thanks to auto-playing streams on the Yahoo and Tumblr homepages. Anyone who visited either high-traffic homepage counted as a viewer for the game. Still, Yahoo notes that “460 million total minutes” of the game were streamed, which means that each of the 15.2 million viewers hung around for an average of 30 minutes. When the Yahoo/NFL deal was announced, a CNN Money report said that Yahoo paid “at least $10 million” for the rights to the game. The game was available for free online, supported only by advertising. Yahoo promised advertisers 3.5 million viewers in the United States, so things seem to have gone better than expected. Read 4 remaining paragraphs | Comments

See the original article here:
First ever online-only NFL game draws over 15 million viewers

Joomla bug puts millions of websites at risk of remote takeover hacks

Enlarge / Here’s the control panel hackers can access by exploiting a just-patched Joomla vulnerability. (credit: Spiderlabs) Millions of websites used in e-commerce and other sensitive industries are vulnerable to remote take-over hacks made possible by a critical vulnerability that has affected the Joomla content management system for almost two years. The SQL-injection vulnerability was patched by Joomla on Thursday with the release of version 3.4.5 . The vulnerability, which allows attackers to execute malicious code on servers running Joomla, was first introduced in version 3.2 released in early November 2013. Joomla is used by an estimated 2.8 million websites. “Because the vulnerability is found in a core module that doesn’t require any extensions, all websites that use Joomla versions 3.2 and above are vulnerable,” Asaf Orpani, a researcher inside Trustwave’s Spiderlabs, wrote in a blog post  (the post appears to be offline at the moment, but it was working through most of Friday morning). The vulnerability, and two closely related security flaws, have been cataloged as CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858. Read 4 remaining paragraphs | Comments

Original post:
Joomla bug puts millions of websites at risk of remote takeover hacks

Prison phone companies fight for right to charge inmates $14 a minute

(credit: Jason Farrar ) The Federal Communications Commission is about to face another lawsuit, this time over a vote to cap the prices prisoners pay for phone calls. Yesterday’s vote  came after complaints that inmate-calling companies are overcharging prisoners, their families, and attorneys. Saying the price of calls sometimes hits $14 per minute, the FCC has now capped rates at 11¢ per minute. “None of us would consider ever paying $500 a month for a voice-only service where calls are dropped for seemingly no reason, where fees and commissions could be as high at 60 percent per call and, if we are not careful, where a four-minute call could cost us a whopping $54,” FCC Commissioner Mignon Clyburn said before yesterday’s vote. Read 16 remaining paragraphs | Comments

Read More:
Prison phone companies fight for right to charge inmates $14 a minute

iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

The upcoming iPad Pro will require iOS 9.1 (credit: Andrew Cunningham) Apple has just released iOS 9.1, the first major update to iOS 9 and the third update overall since the OS came out in September. It’s available as an over-the-air download or through iTunes for everything that supports iOS 9: the iPhone 4S or newer, the iPad 2 or newer, all flavors of the iPad Mini, and the fifth- and sixth-generation iPod Touches. The change you’ll notice the most if you do a bunch of texting is that Apple has implemented a bunch of new emoji, mostly from the Unicode 7.0 and 8.0 specs but with a few from earlier specifications mixed in. Tacos, burritos, and extended middle fingers are just a few of the additions you’ll find to the emoji keyboard, which needs a decent search function now more than ever. iOS 9.1 also lays the groundwork for some other iOS devices that are launching soon. One is the new Apple TV, which ships with the iOS-based “tvOS.” The other is the iPad Pro, which brings with it support for the Apple Pencil and its Smart Keyboard cover. The Apple TV ships next week , while the iPad Pro is due sometime in November. Read 2 remaining paragraphs | Comments

Read the article:
iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

Support scams that plagued Windows users for years now target Mac customers

Enlarge (credit: Malwarebytes) For years, scammers claiming that they’re “calling from Windows” have dialed up Microsoft customers and done their best to trick them into parting with their money or installing malicious wares. Now, the swindlers are turning their sights on Mac users. Researchers at antivirus provider Malwarebytes spotted a Web-based campaign that attempts to trick OS X and iOS users into thinking there’s something wrong with their devices . The ruse starts with a pop-up window that’s designed to look like an official OS notification. “Critical Security Warning!” it says. “Your Device (iPad, iPod, iPhone) is infected with a malicious adward [sic] attack.” It goes on to provide a phone number people can call to receive tech support. The site ara-apple.com is designed to masquerade as https://ara.apple.com/ , Apple’s official remote technical support page. People who are experiencing problems with their Macs can go there to get an official Apple tech support provider to remotely access the person’s computer desktop. Ara-apple provides links to the remote programs the supposed technician will use to log in to targets’ Macs. Read 1 remaining paragraphs | Comments

Read this article:
Support scams that plagued Windows users for years now target Mac customers

Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys?

(credit: martinak15 ) The cost and time required to break 512-bit RSA encryption keys has plummeted to an all-time low of just $75 and four hours using a recently published recipe that even computing novices can follow. But despite the ease and low cost, reliance on the weak keys to secure e-mails, secure-shell transactions, and other sensitive communications remains alarmingly high. The technique, which uses Amazon’s EC2 cloud computing service , is described in a paper published last week titled Factoring as a Service . It’s the latest in a 16-year progression of attacks that have grown ever faster and cheaper. When 512-bit RSA keys were first factored in 1999, it took a supercomputer and hundreds of other computers seven months to carry out. Thanks to the edicts of Moore’s Law – which holds that computing power doubles every 18 months or so – the factorization attack required just seven hours and $100 in March, when “FREAK,” a then newly disclosed attack on HTTPS-protected websites with 512-bit keys , came to light. In the seven months since FREAK’s debut, websites have largely jettisoned the 1990s era cipher suite that made them susceptible to the factorization attack. And that was a good thing, since the factorization attack made it easy to obtain the secret key needed to cryptographically impersonate the webserver or to decipher encrypted traffic passing between the server and end users. But e-mail servers, by contrast, remain woefully less protected. According to the authors of last week’s paper, the RSA_EXPORT cipher suite is used by an estimated 30.8 percent of e-mail services using the SMTP protocol , 13 percent of POP3S servers . and 12.6 percent of IMAP-based e-mail services . Read 6 remaining paragraphs | Comments

See more here:
Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys?

Marijuana exposure in utero has lifelong consequences

A newborn mouse. (credit: Credit: Wikimedia Commons ) As marijuana is legalized in more states, questions about its safety and the health consequences of cannabis use are becoming mainstream. A new study published in PNAS finds that use of cannabis by pregnant women can have implications for the neural development of her child, and that some of the consequences continue into adulthood, So, like alcohol, another recreational drug that is legal in the US, marijuana is likely best avoided by pregnant women. The most prominent active ingredient in marijuana is a compound known as THC, which interacts with the naturally occurring cannabinoid receptors in the nervous system. Cannabinoid receptors are known to play an important role in the regulation of brain development, and this paper examines the influence of a prenatal THC exposure on the maturation of pathways regulated by these receptors. The study examined prenatal cannabis consumption in mice, with the aim of identifying the mechanisms responsible for cannabis-related changes in brain function. During the study, pregnant mice were exposed to daily injections of THC or injections of a control liquid. Then the offspring were run through a battery of behavioral tests. The animals’ brains were also examined closely using immunoflouresence and confocal microscopy. Embryonic brain tissue from some litters was also collected and checked for irregularities. Read 5 remaining paragraphs | Comments

View original post here:
Marijuana exposure in utero has lifelong consequences

Android 6.0 re-implements mandatory device encryption for new devices

(credit: Google) Shortly after the announcement of iOS 8 in 2014, Google made headlines by saying that it would make full-device encryption mandatory for new Android devices running version 5.0. It then made more headlines several months later when we discovered that the company backed down , “strongly recommending” that Android device makers enable encryption but stopping short of actually requiring it. Now Google has published an updated version of the Android Compatibility Definition Document ( PDF ) for Android 6.0, and it looks like mandatory encryption is back with a couple of exceptions. New devices that come with Marshmallow and have AES crypto performance above 50MiB-per-second need to support encryption of the private user data partition (/data) and the public data partition (/sdcard). The relevant portion of the document, emphasis ours: Read 2 remaining paragraphs | Comments

Originally posted here:
Android 6.0 re-implements mandatory device encryption for new devices