Someone beat the Vikings into the North Atlantic by 500 years

The rugged coast of the Faroe islands don’t lend themselves to easy colonization. Flickr user Stig Nygaard The Faroe Islands, a remote archipelago between Scotland and Iceland, could have been inhabited 500 years earlier than was previously thought, according to a startling archaeological discovery. The islands were thought to have been colonized by the Vikings in the 9th century AD. However, dating of peat ash and barley grains has revealed that humans had actually settled there somewhere between the 4th and 6th centuries AD. The Faroes were the first stepping stone beyond the Shetland Islands for the dispersal of European people across the North Atlantic. The findings therefore allow speculation as to whether Iceland, Greenland, and even North America were reached earlier than previously thought. The Faroes are in the North Atlantic, roughly equidistant between Iceland, Norway, and the UK. Mike Church from the University of Durham said he and his research partner, Símun V. Arge from the National Museum of the Faroe Islands, had not expected to find such evidence. “Símun and myself sampled the site in 2006 to take scientific samples for environmental archaeological analysis from the medieval Viking settlement, “ he said. Read 12 remaining paragraphs | Comments        

Visit site:
Someone beat the Vikings into the North Atlantic by 500 years

Get 4K video from your phone’s USB port with the new MHL 3.0 spec

Simultaneous charging is one of MHL’s advantages over Slimport and Miracast. MHL Consortium The Mobile High-Definition Link (MHL) standard already lets you connect certain phones, tablets, and other devices to your TV using adapters that connect to the devices’ micro-USB ports. But the consortium has just announced that an upgrade is coming: the new MHL 3.0 standard adds support for 4K displays. This will allow mobile devices that support the standard to output 3840×2160 (also known as 2160p) video at up to 30 frames per second, an upgrade from MHL 2.0’s 1080p. The updated standard can transmit data and video simultaneously, and a device connected via MHL can draw up to 10 watts of power to charge your device. Backward compatibility with MHL versions 1.x and 2.x, HDCP 2.2 DRM support, and 7.1 channel surround sound support are also part of the standard. The MHL standard competes with a few standards (as well as Apple’s proprietary AirPlay), all of which are designed to put your phone or tablet’s display up on your TV. There’s SlimPort (used most prominently in Google’s Nexus 4 and 2013 Nexus 7), a DisplayPort-compatible spec which like MHL uses the micro USB port to connect over HDMI. There’s also Miracast, an Airplay-like standard that uses a Wi-Fi-equipped receiver to beam video to your TV without the use of cables (Miracast support was baked into Android beginning in version 4.2 , but it’s also included in a smattering of other devices). Neither standard supports 4K video at this point, making MHL 3.0 slightly more appealing for those on the bleeding edge of TV technology. Read 1 remaining paragraphs | Comments        

Taken from:
Get 4K video from your phone’s USB port with the new MHL 3.0 spec

Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist

William Ward Google developers have confirmed a cryptographic vulnerability in the Android operating system that researchers say could generate serious security glitches on hundreds of thousands of end user apps, many of them used to make Bitcoin transactions. This weakness in Android’s Java Cryptography Architecture is the root cause of a Bitcoin transaction that reportedly was exploited to pilfer about $5, 720 worth of bitcoins out of a digital wallet  last week. The disclosure, included in a blog post published Wednesday by Google security engineer Alex Klyubin, was the first official confirmation of the Android vulnerability since Ars and others  reported the incident  last weekend. Klyubin warned that other apps might also be compromised unless developers change the way they access so-called PRNGs, short for pseudo random number generators. “We have now determined that applications which use the Java Cryptography Architecture (JCA) for key generation, signing, or random number generation may not receive cryptographically strong values on Android devices due to improper initialization of the underlying PRNG, ” he wrote. “Applications that directly invoke the system-provided OpenSSL PRNG without explicit initialization on Android are also affected.” Apps that establish encrypted connections using the HttpClient and java.net classes aren’t vulnerable. Read 5 remaining paragraphs | Comments        

Read this article:
Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist

Hyperloop—a theoretical, 760 mph transit system made of sun, air, and magnets

Concept sketches of the Hyperloop passenger capsules; note the air intake noses. Tesla Motors The proposed design for the “Hyperloop, ” an ultra-fast transit system that would run between San Francisco and Los Angeles, was revealed today on Elon Musk’s Tesla Motors website. Musk, the founder of SpaceX and Tesla Motors, describes a system that moves pods under low pressure through a tube between the two cities following the I-5 freeway, all within a 56-page PDF document . The Hyperloop would consist of aluminum pods inside a set of two steel tubes, one for each direction of travel. These are connected at each terminus. The tubes would be positioned on top of pylons spaced 100 feet apart holding the tube 20 feet in the air, and the tube would be covered by solar arrays to generate its own power. Inside the tubes, the pods would carry people up to 760 miles per hour. The pods would each carry 28 passengers, departing every two minutes from either location (or every 30 seconds at peak times). So each pod would have about 23 miles between each other while traversing the tube. The transport capacity would therefore be about 840 passengers per hour. Read 15 remaining paragraphs | Comments        

View post:
Hyperloop—a theoretical, 760 mph transit system made of sun, air, and magnets

“Hand of Thief” banking trojan doesn’t do Windows—but it does Linux

The administration panel for Hand of Thief. RSA Signaling criminals’ growing interest in attacking non-Windows computers, researchers have discovered banking fraud malware that targets people using the open-source Linux operating system. Hand of Thief, as researchers from security firm RSA have dubbed it , sells for about $2, 000 in underground Internet forums and boasts its own support and sales agents. Its functionality—consisting of form grabbers and backdoor capabilities—is rudimentary compared to Windows banking trojans spawned from the Citadel or Blackhole exploit kits, but that’s likely to change. RSA researcher Limor Kessem said she expects Hand of Thief to become a full-blown banking trojan that includes more advanced features such as the ability to inject attacker-controlled content into trusted bank webpages. “Although Hand of Thief comes to the underground at a time when commercial trojans are high in demand, writing malware for the Linux OS is uncommon, and for good reason, ” Kessem wrote. “In comparison to Windows, Linux’s user base is smaller, considerably reducing the number of potential victims and thereby the potential fraud gains.” Read 5 remaining paragraphs | Comments        

Read More:
“Hand of Thief” banking trojan doesn’t do Windows—but it does Linux

Mobile startup offers unprecedented plan: 500MB of data, free incoming calls

On Tuesday, the American mobile phone market took one step closer to looking a bit more like the European or Asian markets: free incoming calls, inexpensive outgoing calls, and a focus on data. A Canadian startup, TextNow , just launched a new mobile service in the United States. For $18.99 per month, you get 500MB of data, 750 rollover minutes, and unlimited texting and incoming calls. In the US, it’s the norm for both the sending and receiving parties to be charged for a call. But nearly everywhere else in the world, only the person who originated the call actually pays. “Incoming calls don’t really cost us that much, ” Derek Ting, the company’s CEO, told Ars. “Carriers charge you anyway because they can get away with it.” Read 5 remaining paragraphs | Comments        

Read this article:
Mobile startup offers unprecedented plan: 500MB of data, free incoming calls

Update: Researchers say Tor-targeted malware phoned home to NSA

A search reveals the address used in an attack on Tor users’ privacy referenced an IP address belonging to the NSA, routed through SAIC. Malware planted on the servers of Freedom Hosting — the “hidden service” hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA). This revelation comes from analysis done collaboratively by Baneki Privacy Labs , a collective of Internet security researchers, and VPN provider Cryptocloud . When the IP address was uncovered in the JavaScript exploit —which specifically targets Firefox Long-Term Support version 17, the version included in Tor Browser Bundle—a source at Baneki told Ars that he and others reached out to the malware and security community to help identify the source. The exploit attacked a vulnerability in the Windows version of the Firefox Extended Support Release  17 browser —the one used previously in the Tor Project’s Tor Browser Bundle (TBB).  That vulnerability had been patched by Mozilla in June, and the updated browser is now part of TBB. But the TBB configuration of Firefox doesn’t include automatic security updates, so users of the bundle would not have been protected if they had not recently upgraded. Read 6 remaining paragraphs | Comments        

View post:
Update: Researchers say Tor-targeted malware phoned home to NSA

Raspberry Pi and Arduino to get cellular access with SIM card add-on

SparqEE A new Kickstarter project aims to give Raspberry Pi and Arduino boards Internet access throughout the world with an add-on that allows integration with a SIM card. SparqEE Cellv1.0 would need to raise $70, 000 to get the technology to backers, with donors pledging at least $69 to get the device. SparqEE CEO Christopher Higgins, an engineer, said he plans to take the Kickstarter page live on August 20. For now, it’s viewable in a draft form so that people can provide feedback. Cellv1.0 consists of a board with a cellular chip, a power supply, and a SIM holder, as well as a “jumper board” that “includes level shifters for whatever voltage levels you’re using (ex. 3.3V, 5V, or other).” Read 5 remaining paragraphs | Comments        

Continue Reading:
Raspberry Pi and Arduino to get cellular access with SIM card add-on

Trusting iPhones plugged into bogus chargers get a dose of malware

The Mactans charger uses a BeagleBoard for its computational power. Billy Lau, Yeongjin Jang, and Chengyu Song Plugging your phone into a charger should be pretty safe to do. It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they’ve named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones. Their bogus chargers—which do, incidentally, charge the phone—contain small computers instead of mere transformers. The iPhone treats these computers just as it does any other computer; instead of just charging, it responds to USB commands. It turns out that the iPhone is very trusting of USB-attached computers; as long as the iPhone is unlocked (if only for a split second) while attached to a USB host, then the host has considerable control over the iPhone. The researchers used their USB host to install an app package onto any iPhone that gets plugged in. iOS guards against installation of arbitrary applications with a strict sandboxing system, a feature that has led to the widespread practice of jailbreaking. This attack doesn’t need to jailbreak, however. Read 6 remaining paragraphs | Comments        

Link:
Trusting iPhones plugged into bogus chargers get a dose of malware

Rideshare drivers given citizen arrest by SF International Airport officials

Hopefully none of these cars at SFO are in for a citizen arrest. dreamagicjp Officials at the San Francisco International Airport (SFO) say they have been making citizen arrests of rideshare drivers throughout July. Airport spokesperson Doug Yakel told Ars on Tuesday that airport officials have made 12 such arrests since July 10. Rideshare companies like Uber, Lyft, and Sidecar use mobile apps to help city dwellers find rides in areas where cabs are scarce or expensive. But taxi service is heavily regulated in big cities nationwide, and rideshare companies have ruffled feathers by operating outside of traditional restraints placed on taxi drivers. Cities like New York and Chicago have made it difficult for rideshare companies to operate, and the California Public Utilities Commission (CPUC) slapped Uber, Lyft, and Sidecar with $20, 000 fines in November 2012 (although the commission later rescinded the fines ). In December of last year, the CPUC issued a proposal for examining the legality of the rideshare services, and the commission is expected to revisit the issue sometime this week. Read 7 remaining paragraphs | Comments        

See more here:
Rideshare drivers given citizen arrest by SF International Airport officials