Apple releases OS X 10.10.3 with new Photos app, emoji, and more

Apple has just released the final version of OS X 10.10.3, the latest major update for OS X Yosemite. The update was first available to the public as a beta build back in early March , and it follows a little over three months after OS X 10.10.2 . You can view the full release notes on Apple’s site here . The star of this update is the new Photos app, an OS X version of the photo viewing and editing app included with iOS. It primarily functions as a replacement for iPhoto, the basic photo app included with the iLife suite for years before becoming available for free for all new Macs. It also replaces Aperture, Apple’s pro photo editing app—though it doesn’t actually attempt to replicate Aperture’s functionality. Neither iPhoto nor Aperture will receive further updates from Apple after today. Photos will be installed automatically when you update to 10.10.3; it appears to be a core part of OS X rather than an optional Mac App Store download. We looked at an early Photos beta back in February and came away mostly impressed by its features and speed, at least relative to iPhoto. Those of you with existing iPhoto and Aperture libraries will be able to import them into Photos after you install OS X 10.10.3. Read 5 remaining paragraphs | Comments

Original post:
Apple releases OS X 10.10.3 with new Photos app, emoji, and more

Price of WoW gold plummets in first day of “official” trading

Just over a day after Blizzard introduced the first official method for converting dollars into World of Warcraft gold, the real-world price for the in-game currency has already plummeted 27 percent from the initial position set by Blizzard. For most of World of Warcraft ‘s history, the only way to buy in-game gold with real currency was to go through one of many gray market third-party services (which technically goes against Blizzard’s terms of service for the game). That was true until yesterday, when Blizzard introduced a $20 game time token that can be sold for gold at the in-game auction house on North American servers (European servers will get the feature at a later date). While the real world price of those tokens is fixed at $20, the gold price is “determined dynamically based on supply and demand,” as Blizzard puts it. To start the market off, Blizzard set the price of a $20 token at 30,000 gold. That gold price increased incrementally for a few hours before plummeting precipitously starting yesterday evening in the US. As of this writing, just over 24 hours after the markets opened, that initial price has fallen over 27 percent to 21,739 gold, according to an API-based tracking site . Read 5 remaining paragraphs | Comments

More:
Price of WoW gold plummets in first day of “official” trading

Next Windows Server offer new even smaller “Nano Server” footprint

Microsoft is adding even more features to Windows Server to diversify and strengthen its support for virtualization and containerization on its platform. The next Windows Server will include an even more stripped down, lightweight install mode called Nano Server. Windows Server already has a shrunk install option, Server Core, that omits various features to reduce the memory and disk footprint, and to shrink its exposure to security flaws. Nano Server strips back the operating system further still, dropping things like the GUI stack, 32-bit Win32 support, local logins, and remote desktop support. Nano Server is designed for two kinds of workload; cloud apps built on runtimes such as .NET, Java, Node.js, or Python, and cloud infrastructure, such as hosting Hyper-V virtual machines. Compared to the full Server install, Microsoft claims that Nano Server shrinks the disk footprint by 93 percent, the number of critical security bulletins by 92 percent, and the number of reboots by 80 percent. Read 4 remaining paragraphs | Comments

View post:
Next Windows Server offer new even smaller “Nano Server” footprint

Server shutdown disables single-player saves in NBA2K14

Anyone that plays online games has to accept the fact that the servers for those games will probably eventually be shut down by the centralized publisher that operates them (games with player-controlled server support notwithstanding). What most players probably don’t expect is for their single-player game saves to become permanently unusable because an online server somewhere goes down. That’s what has been happening to players of NBA2K14 this past week, though. As Polygon reports , since a planned online server shutdown for the game on March 31, previously created save files in the MyCareer and MyGM modes can no longer pass a built-in server check on the PS4 and Xbox One versions of the game. That means those files are simply unusable, and all that single player progress has effectively been lost. “This means that if you had created a MyCareer or a MyGM online save file that was once connected to our servers it too sadly has retired and is no longer available for use and it would be necessary to re-create these files as offline saves,” 2K Support writes in a message to affected users, obtained by Polygon. “Sadly this may come as an inconvenience to some of you and if so we truly do understand and can feel for how upsetting this may seem as there always is a special bond that occurs between a player and their MyCareer save but all good things must come to an end and rest assured your MyCareer or MyGM went out while on top!” Read 7 remaining paragraphs | Comments

Continue Reading:
Server shutdown disables single-player saves in NBA2K14

Dell support software gets flagged by antivirus program

Diagnostic software preinstalled on many Dell computers is now being flagged as a potentially unwanted program by antivirus program Malwarebytes following the discovery of a vulnerability that allows attackers to remotely execute malicious code on older versions. The application known as Dell System Detect failed to validate code before downloading and running it, according to a report published last month by researcher Tom Forbes. Because the program starts itself automatically, a malicious hacker could use it to infect vulnerable machines by luring users to a booby-trapped website. According to researchers with AV provider F-Secure , the malicious website need only have contained the string “dell” somewhere in its domain name to exploit the weakness. www.notreallydell.com was just one example of a site that would have worked. Dell released an update in response to Forbes’s report, but even then, users remained vulnerable. That’s because the updated program still accepted downloads from malicious sites that had a subdomain with “dell” in it, for instance, a.dell.fakesite.ownedbythebadguys.com. Read 2 remaining paragraphs | Comments

Read More:
Dell support software gets flagged by antivirus program

New York woman can send divorce papers via Facebook

A New York County Supreme Court judge ruled that 26-year-old nurse Ellanora Baidoo can serve divorce papers  (PDF) to her soon-to-be ex-husband, Victor Sena Blood-Dzraku, via Facebook. The ruling is one of the first of its kind, and it comes at a time when even standard e-mail is still not “statutorily authorized” as a primary means of service, the judge wrote. A number of courts have allowed plaintiffs to use Facebook as supplemental means of service since at least 2013, but Baidoo has requested that the social media service be the primary and only means of telling Blood-Dzraku that she wants a divorce. The circumstances for the decision are unique, however. As the New York Daily News reported , Baidoo and Blood-Dzraku, both Ghanaian, were married in a civil service in 2009, but when Blood-Dzraku refused to marry in a traditional Ghanaian wedding ceremony, the relationship ended. The two never lived together, and Blood-Dzraku only kept in touch with Baidoo via phone and Facebook. Read 5 remaining paragraphs | Comments

Excerpt from:
New York woman can send divorce papers via Facebook

TrueCrypt security audit is good news, so why all the glum faces?

The ongoing audit of the TrueCrypt whole-disk encryption tool used by millions of privacy and security enthusiasts has reached an important milestone—a detailed review of its cryptographic underpinnings that found no backdoors or fatal flaws. The 21-page Open Cryptographic review published Thursday uncovered four vulnerabilities, the most serious of which involved the use of a Windows programming interface to generate random numbers used by cryptographic keys. While that’s a flaw that cryptographers say should be fixed, there’s no immediate indication that the bug undermines the core security promise of TrueCrypt. To exploit it and the other bugs, attackers would most likely have to compromise the computer running the crypto program. None of the vulnerabilities appear to allow the leaking of plaintext or secret key material or allow attackers to use malformed inputs to subvert TrueCrypt. The report was produced by researchers from information security consultancy NCC Group . “The TL;DR is that based on this audit, TrueCrypt appears to be a relatively well-designed piece of crypto software,” Matt Green, a Johns Hopkins University professor specializing in cryptography and an audit organizer, wrote in a blog post accompanying Thursday’s report . “The NCC audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.” Read 7 remaining paragraphs | Comments

Visit site:
TrueCrypt security audit is good news, so why all the glum faces?

Google Chrome will banish Chinese certificate authority for breach of trust

Google’s Chrome browser will stop trusting all digital certificates issued by the China Internet Network Information Center following a major trust breach last week that led to the issuance of unauthorized credentials for Gmail and several other Google domains . The move could have major consequences for huge numbers of Internet users as Chrome, the world’s most widely used browser, stops recognizing all website certificates issued by CNNIC. To give affected website operators time to obtain new credentials from a different certificate authority, Google will wait an unspecified period of time before implementing the change. Once that grace period ends, Google engineers will blacklist both CNNIC’s root and extended-validation certificates in Chrome and all other Google software. The unauthorized certificates were issued by Egypt-based MCS Holdings , an intermediate certificate authority that operated under the authority of CNNIC. MCS used the certificates in a man-in-the-middle proxy, a device that intercepts secure connections by masquerading as the intended destination. Such devices are sometimes used by companies to monitor employees’ encrypted traffic for legal or human resources reasons. Read 2 remaining paragraphs | Comments

Visit link:
Google Chrome will banish Chinese certificate authority for breach of trust

“Unquestionable greed,” the startup CEO who stole $765k from his friends

SAN FRANCISCO—Dressed in matching yellow scrubs from the nearby Alameda County Jail, Jon Mills looked resigned to his fate. After taking a plea deal on two felony counts of wire fraud, the young former startup CEO appeared in federal court Tuesday afternoon for sentencing. Mills had moved to California five years ago with a dream to hit it big in Silicon Valley. The company he founded, Motionloft , uses small sensors to perform analytics on in-store foot traffic. Everything worked. The company continues to succeed, and celebrity venture capitalist Mark Cuban remains its sole investor. But that success wasn’t enough. In early 2013, Mills told at least five people that if they gave him relatively small amounts of money, they would own stakes in the company. He claimed that a Cisco acquisition worth hundreds of millions of dollars was supposedly imminent, so Mills and all Motionloft shareholders others would stand to make a tidy profit. In reality, Mills knew the deal didn’t exist. Read 52 remaining paragraphs | Comments

See the original post:
“Unquestionable greed,” the startup CEO who stole $765k from his friends

Google kills 200 ad-injecting Chrome extensions, says many are malware

Google is cracking down on ad-injecting extensions for its Chrome browser after finding that almost 200 of them exposed millions of users to deceptive practices or malicious software. More than a third of Chrome extensions that inject ads were recently classified as malware in a study Google researchers carried out with colleagues from the University of California at Berkeley. The Researchers uncovered 192 deceptive Chrome extensions that affected 14 million users. Google officials have since killed those extensions and incorporated new techniques to catch any new or updated extensions that carry out similar abuses. The study also found widespread use of ad injectors for multiple browsers on both Windows and OS X computers. More than five percent of people visiting Google sites have at least one ad injector installed Within that group, half have at least two injectors installed, and nearly one-third have at least four installed. Google officials don’t bar such ad injectors outright, but they do place restrictions on them. Terms of service for Chrome extensions , for instance, require that the ad-injecting behavior be clearly disclosed. Customers of DoubleClick and other Google-operated ads services must also comply with policies barring unwanted software . Read 2 remaining paragraphs | Comments

Read More:
Google kills 200 ad-injecting Chrome extensions, says many are malware