Microsoft readies kill switch for Internet Explorer 8, 9, and 10

Microsoft has reminded Internet Explorer users that it will imminently end support for older versions of its browser from next week. The software giant plans to hit the kill switch on IE 8, 9, and 10 on January 12, and it has been advising users to upgrade to Internet Explorer 11, or its new Edge browser , to avoid being exposed to potential security risks after that date. From next Tuesday, Microsoft will end updates for the aged browsers and the nudge brigade from the Redmond camp is in full, sharp elbow mode to encourage users to swiftly upgrade to IE 11 or Edge. There will be one last patch on January 12 that will include an “End of Life” notification, asking users to upgrade. Read 3 remaining paragraphs | Comments

View original post here:
Microsoft readies kill switch for Internet Explorer 8, 9, and 10

Beating graphene to push supercapacitors closer to batteries

(credit: Oak Ridge National Lab ) Most people think of batteries when they consider energy storage, but capacitors are an alternative in some use cases. Capacitors are used in almost all electronic devices, often to supply temporary power when batteries are being changed to prevent loss of information. In addition to everyday devices, they are also used in more obscure technologies, including certain types of weapons. Understanding the supercapacitor Unlike batteries, capacitors use static electricity to store energy. In their simplest form, they contain two conducting metallic plates with an insulating material (dielectric) placed in between. A typical capacitor charges instantly but usually cannot hold a great deal of charge. Supercapacitors can at least partly overcome this shortcoming. They differ from the typical capacitor in that their “plates” provide significantly larger surface area and are much closer together. The surface area is increased by coating the metal plates with a porous substance. Instead of having a dielectric material between them, the plates of a supercapacitor are soaked in an electrolyte and separated by an extremely thin insulator. Read 11 remaining paragraphs | Comments

Excerpt from:
Beating graphene to push supercapacitors closer to batteries

ArcaBoard is a real hoverboard—but it’ll cost you $20,000

(credit: Arca Space Corporation ) After all the teased products that didn’t live up to their promises and the trouble caused by self-balancing scooters, ArcaBoard appears to be the closest we’ll get to an actual hoverboard in 2015. Designed by the US-based Arca Space Corporation, the mattress-shaped vehicle packs 272 horsepower and is propelled by 36 ducted fans spinning at 45,000rpm. Buying one will set you back about £13,500 ($19,900). Arca has begun taking pre-orders for ArcaBoard and promises to start shipping it to the customers in April 2016. The device’s speed is limited to 20km/h (12mph) and its flying height to 30cm (1ft). It’s powered by a set of Li-Po batteries that account for a significant part of its price: getting a new battery pack after the 1-year warranty has expired will cost you £4,600 ($6,840). There are two versions of the device: one for riders that weigh up to 80kg (176lbs), and another for riders up to 110kg (242lbs). The lighter option can hover for six minutes, the heavier just three minutes. The lighter rider can theoretically travel up to 2km (1.2mi) on one charge. Read 7 remaining paragraphs | Comments

View article:
ArcaBoard is a real hoverboard—but it’ll cost you $20,000

TSA may soon stop accepting drivers’ licenses from nine states

TSA screening passengers in Fort Lauderdale, Florida. (credit: danfinkelstein ) The citizens of several US states may soon find that they can’t use their drivers’ licenses to get into federal facilities or even board planes. Enforcement of a 2005 federal law that sets identification standards, known as “Real ID,” has been long-delayed. But now Department of Homeland Security officials say enforcement is imminent. The “Real ID” law requires states to implement certain security features before they issue IDs and verify the legal residency of anyone to whom they issue an ID card. The statute is in part a response to the suggestion of the 9/11 Commission, which noted that four of the 19 hijackers used state-issued ID cards  to board planes. Real ID also requires states to share their databases of driver information with other states. The information-sharing provisions are a big reason why some privacy groups   opposed the law , saying it would effectively be the equivalent of a national identification card. Read 10 remaining paragraphs | Comments

More here:
TSA may soon stop accepting drivers’ licenses from nine states

YouTube mad at T-Mobile for throttling video traffic

(credit: Aurich Lawson) T-Mobile USA’s recently instituted practice of downgrading video quality to 480p in order to reduce data usage now has a prominent critic: YouTube. “Reducing data charges can be good for users, but it doesn’t justify throttling all video services, especially without explicit user consent,” a YouTube spokesperson said, according to a  Wall Street Journal article today . T-Mobile’s “Binge On” program automatically reduces the quality of video while allowing many video services to stream without counting against customers’ high-speed data limits. Video services that cooperate with T-Mobile by meeting the company’s “technical criteria” have their videos exempted from customers’ data caps. Netflix, HBO, Hulu, and many others worked with T-Mobile to get the exemption. Read 10 remaining paragraphs | Comments

Read More:
YouTube mad at T-Mobile for throttling video traffic

Self-driving Ford Fusions are coming to California next year

Apart from the sensor bar on the roof, this Ford Fusion Hybrid looks just like a normal car. (credit: Jonathan Gitlin) Even more robots are coming to California’s roads next year. Yesterday, Ford announced that it will start testing its autonomous Fusion sedans in the state now that it is officially enrolled in the California Autonomous Vehicle Testing Program . The company opened a new R&D center in Palo Alto at the beginning of the year, which among other projects has been working on virtual simulations of autonomous driving as well as sensor fusion to improve the way its cars perceive the world around them. Ford is the 11th group to obtain a California driving license for its autonomous cars, joining other OEMs (BMW, Mercedes-Benz, Honda, Nissan, Tesla, and Volkswagen Group), tier one suppliers (Bosch and Delphi ), and tech companies (Cruise Automation and Google). A condition of the self-driving car regulations requires companies to provide California’s DMV with a report any time one of their cars is involved in a collision. Since the rules went into effect in September 2014, there have been a total of 10 incidents . The first, in October 2014, involved one of Delphi’s test vehicles, although it was being driven by a human at the time. The nine other incidents all involve Google’s cars, seven of which were being driven autonomously. Read 1 remaining paragraphs | Comments

Read the original:
Self-driving Ford Fusions are coming to California next year

OneDrive for Business to get unlimited storage for enterprise customers

Amid the brouhaha surrounding Microsoft’s decision to backtrack on its offer of unlimited OneDrive storage for home Office 365 subscribers , one issue remained unaddressed: what about the related OneDrive for Business storage that’s offered to enterprise Office 365 subscribers? The company has finally laid out its plans for these users, and unlimited storage is back for at least some. Enterprise and government customers on the E3, E4, and E5 plans, education customers, and OneDrive for Business Plan 2 and SharePoint Online Plan 2 customers will all see their storage allocation increased provided that the organization has at least five subscribers. This move to unlimited storage will be phased in two parts. The first part will be an automatic increase from the current 1TB to a new 5TB per user, expected to complete by the end of March 2016. Subsequently, customers will be able to request additional storage. Read 3 remaining paragraphs | Comments

View the original here:
OneDrive for Business to get unlimited storage for enterprise customers

Copyright case over “Happy Birthday” is done, trial canceled

With less than a week to go before a trial, a class-action lawsuit over the copyright status of “Happy Birthday” has been resolved. Details of the settlement, including what kind of uses will be allowed going forward, are not clear. A short order (PDF) filed yesterday by US Chief District Court Judge George King says that all parties have agreed to a settlement, and it vacates a trial which was scheduled to start on December 15. The key turning point came in September , when King ruled that Warner/Chappell’s copyright transfer was invalid because there was no proof it was ever properly transferred from the Hill sisters, who claimed to have written the song. The trial would have addressed damages issues. Also looming was a late copyright claim by Association for Childhood Education International (ACEI), a children’s’ charity affiliated with the Hill sisters. ACEI came forward in November to say that if Warner/Chappell didn’t own the song, it did. The settlement revealed yesterday resolves all claims by the plaintiffs, Warner/Chappell, and ACEI. Read 4 remaining paragraphs | Comments

Read More:
Copyright case over “Happy Birthday” is done, trial canceled

Getting a Linux box corralled into a DDoS botnet is easier than many think

Enlarge (credit: Aurich Lawson and Getty) Getting a Linux server hacked and made part of a botnet is easier than some people may think. As two unrelated blog posts published in the past week demonstrate, running a vulnerable piece of software is often all that’s required. Witness, for example, a critical vulnerability disclosed earlier this year in Elasticsearch , an open source server application for searching large amounts of data. In February, the company that maintains it warned it contained a vulnerability that allowed hackers to execute commands on the server running it. Within a month, a hacking forum catering to Chinese speakers provided all the source code and tutorials needed for people with only moderate technical skills to fully identify and exploit susceptible servers. A post published Tuesday by security firm Recorded Future deconstructs that hacker forum from last March. It showed how to scan search services such as Shodan and ZoomEye to find vulnerable machines. It includes an attack script written in Python that was used to exploit one of them and a separate Perl script used to make the newly compromised machine part of a botnet of other zombie servers. It also included screenshots showing the script being used against the server. The tutorial underscores the growing ease of hacking production servers and the risk of being complacent about patching. Read 5 remaining paragraphs | Comments

See the article here:
Getting a Linux box corralled into a DDoS botnet is easier than many think

“Nemesis” malware hijacks PC’s boot process to gain stealth, persistence

Malware targeting banks, payment card processors, and other financial services has found an effective way to remain largely undetected as it plucks sensitive card data out of computer memory. It hijacks the computer’s boot-up routine in a way that allows highly intrusive code to run even before the Windows operating system loads. The so-called bootkit has been in operation since early this year and is part of “Nemesis,” a suite of malware that includes programs for transferring files, capturing screens logging keystrokes, injecting processes, and carrying out other malicious actions on an infected computer. Its ability to modify the legitimate volume boot record makes it possible for the Nemesis components to load before Windows starts. That makes the malware hard to detect and remove using traditional security approaches. Because the infection lives in such a low-level portion of a hard drive, it can also survive when the operating system is completely reinstalled. “The use of malware that persists outside of the operating system requires a different approach to detection and eradication,” researchers from security firm FireEye’s Mandiant Consulting wrote in a blog post published Monday . “Malware with bootkit functionality can be installed and executed almost completely independent of the Windows operating system. As a result, incident responders will need tools that can access and search raw disks at scale for evidence of bootkits.” Read 5 remaining paragraphs | Comments

Follow this link:
“Nemesis” malware hijacks PC’s boot process to gain stealth, persistence