Sony patent application measures load times to detect pirated games

Sony seems prepared to unleash a new tool in its never-ending battle against game pirates, using measured load times, of all things, to detect certain illegitimate copies of its games. Sony’s patent for “Benchmark measurement for legitimate duplication validation” was filed way back in August 2011, but it was only published by the US patent office late last week. The patent describes a method for a system that would measure load times for games loaded into a system against a previously measured threshold for what those load times ought to be on a standard, unmodified game and system: For example, if an authentic game title is distributed exclusively on [Blu-ray discs] having a total benchmark load time of 45 seconds on a game console BD drive, the acceptable range of load times could be from 40 to 50 seconds. Thus, a total measured title load time of four seconds would be outside of the acceptable range of total load times for a legitimate media type. Even if the pirated media results in similar overall load times to the original media (if a hacker added an intentional delay, for instance, or if a pirated game on a hard drive loaded similarly to an authentic game on a flash drive), the method described in the patent also measures load times for individual segments of the game code to detect fraudulent copies. Read 4 remaining paragraphs | Comments

Continued here:
Sony patent application measures load times to detect pirated games

Earthquakes’ booms big enough to be detected from orbit

Artist’s impression of GOCE satellite. European Space Agency Last year, we reported on some mysterious booms in a small Wisconsin town that turned out to be small earthquakes. While it was an unusual story, it’s actually not that uncommon of an occurrence. Early in the summer of 2001, folks in Spokane, Washington started reporting similar booms. The sounds continued, off and on, for about five months. The mystery didn’t last long, as the earthquakes responsible were picked up by seismometers in the area. (A particularly loud one that took place exactly one month after the September 11, 2001 terrorist attacks in New York did rattle some nerves, however.) In total, 105 earthquakes were detected, with a couple as large as magnitude 4.0. For most of them, there wasn’t good enough seismometer coverage to really pinpoint locations, but some temporary units deployed around the city in July located a number of events pretty precisely: the earthquakes were centered directly beneath the city itself. While a dangerously large earthquake is pretty unlikely in Wisconsin, the possibility can’t be ignored in Washington. The 2011 earthquake in Christchurch, New Zealand was only a magnitude 6.3, but the damage was extensive because the epicenter was so close to the city. In L’Aquila, Italy, a swarm of small earthquakes in 2009 was followed by a deadly magnitude 6.3. (The poor public communication of risk during that swarm netted six seismologists manslaughter convictions .) Read 10 remaining paragraphs | Comments

View article:
Earthquakes’ booms big enough to be detected from orbit

Server hack prompts call for cPanel customers to take “immediate action”

The providers of the cPanel website management application are warning some users to immediately change their systems’ root or administrative passwords after discovering one of its servers has been hacked. In an e-mail sent to customers who have filed a cPanel support request in the past six months, members of the company’s security team said they recently discovered the compromise of a server used to process support requests. “While we do not know if your machine is affected, you should change your root level password if you are not already using SSH keys,” they wrote, according to a copy of the e-mail posted to a community forum . “If you are using an unprivileged account with ‘sudo’ or ‘su’ for root logins, we recommend you change the account password. Even if you are using SSH keys we still recommend rotating keys on a regular basis.” Read 3 remaining paragraphs | Comments

View post:
Server hack prompts call for cPanel customers to take “immediate action”

Reports: Microsoft planning to unveil Xbox successor at April event

With Sony jump-starting the next-generation console hype train with its PlayStation 4 reveal this week , it seems Microsoft might not be willing to wait for June’s Electronic Entertainment Expo (E3) to unveil its follow-up to the Xbox. Computer & Video Games is reporting that Microsoft is planning a “one-off media event” to show off its new system in early April, based on information from unnamed sources inside and outside of Microsoft. VG247 has corroborated CVG’s information , saying it has “also received word of the April event,” and National Alliance Securities analyst Mike Hickey has previously said he expected Microsoft to announce its console successor in April. Internet sleuths on gaming forum NeoGAF have noted that the company that helped organize Microsoft’s E3 2012 media briefing registered the domain XboxEvent.com just yesterday , suggesting that, um, an Xbox event might be in the works. Practically the entire professional game industry will be gathered together in San Francisco at the end of March for the Game Developers Conference, which would also seem like a natural time for Microsoft to reveal its next-gen plans to an interested audience. Then again, Microsoft could use GDC as a sort of pre-tease tease, letting slip certain small, developer-centric details before a fuller April event. Read 1 remaining paragraphs | Comments

Original post:
Reports: Microsoft planning to unveil Xbox successor at April event

Qualcomm’s global LTE chip could help end iPhone fragmentation

Qualcomm yesterday unveiled a new series of chips designed to solve one of the nagging problems faced by smartphone manufacturers and smartphone users: a single phone isn’t capable of hopping on any cellular network. This difficulty caused Apple to release three versions of the iPhone 5, with support for different LTE networks. As a result, customers who frequently travel overseas had to think hard about which version of the iPhone they would buy, since different countries and carriers use different cellular bands. The iPhone uses Qualcomm chips . LTE has exacerbated this cellular fragmentation, Qualcomm said. “The wide range of radio frequencies used to implement 2G, 3G, and 4G LTE networks globally presents an ongoing challenge for mobile device designers,” Qualcomm Senior VP Alex Katouzian said in the company’s announcement . “Where 2G and 3G technologies each have been implemented on four to five different RF bands globally, the inclusion of LTE brings the total number of cellular bands to approximately 40.” Read 4 remaining paragraphs | Comments

Visit link:
Qualcomm’s global LTE chip could help end iPhone fragmentation

Google shows the world its official Android 4.2.2 changelog

When Android 4.2.2 quietly debuted last week , most users were left guessing about what exactly had been included in the software update. Helpful community sites like AndroidPolice had put together a thorough listing of some of the new features in Android 4.2.2, but any official listing of updates had yet to be made. Today, Google published its official changelog for its Android 4.2.2 update, as well as everything else that comes as a part of the Jelly Bean package. Many of the bullet points marked as “new” actually identify features that have been included in Android 4.2 since its initial launch and have since been  thoroughly  discussed. However, the changelog does include some of the minor features not previously touched on, like networking changes that were made to improve Wi-Fi Direct support and faster captive portal detection. Updates also include minor features, like the fact that TalkBack can now be accessed right from the power menu. You can also view the entirety of the Google Cards updates that have been made in Android 4.2. If you’re curious, you can view the official changelog at Google’s official Android site, then try out some of the features you may not have known existed on your Android 4.2 device. Read on Ars Technica | Comments

See more here:
Google shows the world its official Android 4.2.2 changelog

Cellular data traffic keeps doubling every year

Florence Ion Worldwide mobile data traffic doubled over the past year and is expected to continue growing at a similar rate due to expanding smartphone sales and video traffic, telecom equipment maker Ericsson said in research released today. By the end of 2012, global data traffic on mobile networks (not including Wi-Fi) hit around 1,300 petabytes per month, twice as much as in the previous year, Ericsson said. Ericsson The chart shows an approximate doubling each year for the past few years. We’ve asked Ericsson for the raw data behind the report and will provide that if we get it. Ericsson’s measurements come from “a large base of commercial networks that together cover all regions of the world,” the report states. “They form a representative base for calculating world total traffic in mobile networks.” Read 10 remaining paragraphs | Comments

More here:
Cellular data traffic keeps doubling every year

Thanks, Adobe. Protection for critical zero-day exploit not on by default

dimland.blogspot.com The recently discovered zero-day attacks targeting critical vulnerabilities in Adobe’s ubiquitous Reader application are able to bypass recently added security defenses unless end users manually make changes to default settings, company officials said. According to an advisory Adobe published Wednesday night , the “protected view” feature prevents the current attacks from working—but only if it’s manually enabled. To turn it on, access Preferences > Security (Enhanced) and then check the “Files from potentially unsafe locations,” or even the “All files” option. Then click OK. There’s also a way for administrators to enable protected view on Windows machines across their organization. The revelation is significant because it means users aren’t protected when using the default version of the widely used document reader. The limitation came to light following the discovery of in-the-wild attacks against current versions of Reader, which are being exploited to surreptitiously install malware on end-user computers. The exploit is also noteworthy because its intricate code base bypasses several additional protections added just four months ago with the goal thwarting malware attacks. Read 6 remaining paragraphs | Comments

Link:
Thanks, Adobe. Protection for critical zero-day exploit not on by default

Spanish police bust alleged “ransomware” ring that took in $1.34M annually

Spanish authorities announced Wednesday that they had arrested 10 people who were allegedly involved in a massive “ransomware” ring. The European Cybercrime Centre estimated that the criminal operation “affected tens of thousands of computers worldwide, bringing in profits in excess of €1 million euros ($1.34 million) per year.” The Spanish Ministry of the Interior described (Google Translate) the lead suspect as a “a 27-year-old citizen of Russian origin who was arrested in December in the United Arab Emirates,” and now awaits extradition to Spain. The newly arrested 10 were  linked to the financial cell of the ransomware operation, and include six Russians, two Ukrainians, and two Georgians. The Ministry added that the operation remains “open,” suggesting that more arrests could be forthcoming. (Spanish authorities posted a video (RAR) of the new arrests and raid.) Madrid dubbed  the ransomware used by the ring a “police virus” because it throws up a notice that appears to come from law enforcement. The malware requires the user to pay €100 ($134) as a “fine” from a false accusation of accessing child pornography or file-sharing websites. When the victims submit their payment details, European authorities added , the “criminals then go on to steal data and information from the victim’s computer.” Read 7 remaining paragraphs | Comments

Read the original:
Spanish police bust alleged “ransomware” ring that took in $1.34M annually

Zero-day attack exploits latest version of Adobe Reader

FireEye A previously undocumented flaw in the latest version of Adobe Systems’ ubiquitous Reader application is being exploited in online hacks that allow attackers to surreptitiously install malware on end-user computers, a security firm said. The attacks, according to researchers from security firm FireEye, work against Reader 11.0.1 and earlier versions and are actively being exploited in the wild. If true, the attacks are notable because they pierce security defenses Adobe engineers designed to make malware attacks harder to carry out. Adobe officials said they’re investigating the report . “Upon successful exploitation, it will drop two DLLs,” FireEye researchers Yichong Lin, Thoufique Haq, and James Bennett wrote of the online attacks they witnessed. “The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain.” DLL is the researchers’ shorthand for a file that works with the Microsoft Windows dynamic link library. Read 5 remaining paragraphs | Comments

Taken from:
Zero-day attack exploits latest version of Adobe Reader