Amazon Prime launches free same-day delivery in 14 cities

Amazon Prime’s list of benefits grew one bigger on Thursday, as the $99/year subscription service now includes free same-day shipping—and same-day delivery—for certain parts of the United States. Should an Amazon Prime member live in one of 14 qualifying metropolitan areas—including the company’s home base of Seattle, along with the Bay area, New York City, Washington, DC, Atlanta, Baltimore, and Boston—they can get free same-day delivery on orders of $35 and up. Be advised: you’ll want to check at Amazon’s zip code search site  for your own eligibility if you live in a sprawling region; our test of addresses in the Seattle and Dallas/Fort Worth regions proved scattershot. Prime members in these 14 metropolitan areas should double-check the linked zip code search tool before attempting to place a same-day delivery order. Qualifying same-day orders that cost less than $35 will be charged an additional $5.99 for same-day speed, as Prime customers had already paid up until today. Meanwhile, should an order be placed too late in the day, Prime customers will still enjoy free one-day shipping. Read 2 remaining paragraphs | Comments

Read this article:
Amazon Prime launches free same-day delivery in 14 cities

SourceForge grabs GIMP for Windows’ account, wraps installer in bundle-pushing adware [Updated]

SourceForge, the code repository site owned by Slashdot Media, has apparently seized control of the account hosting GIMP for Windows on the service, according to e-mails and discussions amongst members of the GIMP community—locking out GIMP’s lead Windows developer. And now anyone downloading the Windows version of the open source image editing tool from SourceForge gets the software wrapped in an installer replete with advertisements. Update: In a blog post issued shortly after this story posted, an unidentified member of SourceForge’s community team wrote that, in fact, “this project was actually abandoned over 18 months ago, and SourceForge has stepped-in to keep this project current.” That runs counter to claims by members of the GIMP development community. The GIMP project is not officially distributed through SourceForge—approved releases are only posted on the GIMP project’s own Web page. But Jernej Simončič, the developer who has been responsible for building Windows versions of GIMP for some time, has maintained an account on SourceForge to act as a distribution mirror. That is, he had until today, when he discovered he was locked out of the Gimp-Win account , and the project’s ownership “byline” had been changed to “sf-editor1″—a SourceForge staff account. Additionally, the site now provided Gimp in an executable installer that has in-installer advertising enabled. Ars tested the downloader and found that it offered during the installation to bundle Norton anti-virus and myPCBackup.com remote backup services with GIMP—before downloading the installer authored by Simončič (his name still appears on the installer’s splash screen). Read 8 remaining paragraphs | Comments

See more here:
SourceForge grabs GIMP for Windows’ account, wraps installer in bundle-pushing adware [Updated]

Water droplets bounce off these new self-cleaning surfaces

Every day, we interact with a myriad of surfaces ranging from soft fabrics to hard metals. Inevitably, this means we have to spend our time cleaning them. A class of self-cleaning materials would certainly make our lives easier. Previous attempts to create these materials have focused on developing surfaces that are rough and waxy; these cause water droplets to roll along the surface, picking up dirt and dust due as it goes. These materials have been relatively successful, but they have many limitations. For example, they’re easily worn away and easily contaminated by oils like those found on our skin. Luckily, scientists have now developed a waterproof, self cleaning coating that can be applied to materials that are as soft as cotton and as hard as glass. This coating is composed of titanium dioxide (TiO2) nanoparticles with two size distributions, delivered as a suspension in ethanol containing the chemical perfluorooctyltriethoxysilane. After application, the ethanol is allowed to evaporate for 180 seconds before the coating is ready for use. This coating can be sprayed, dipped, or painted onto a surface, and it maintains its performance after several types of damage. Read 6 remaining paragraphs | Comments

Read the original:
Water droplets bounce off these new self-cleaning surfaces

DNS enhancement catches malware sites by understanding sneaky domain names

A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O’Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank , it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness. The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via “phishing” links in e-mails and social media have gone past the well-worn “typo-squatting” approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered “Carbanak” attacks on banks that allowed criminals to gain access to financial institutions’ networks starting in January 2013 and steal over $1 billion over the next two years. Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks. Read 4 remaining paragraphs | Comments

More here:
DNS enhancement catches malware sites by understanding sneaky domain names

Now you can easily send (free!) encrypted messages between Android, iOS

On Monday, Open Whisper Systems announced the release of Signal 2.0 , the second version of its app for iOS. What makes this latest release special is that it allows users to send end-to-end encrypted messages, for free, to users of Redphone and TextSecure, Android apps supported by Open Whisper Systems that encrypt calling and text messages, respectively. Previously, this kind of cross-platform secure messaging cost money in the form of a monthly subscription fee that both the sender and the receiver of the message had to pay. (Or, encrypting messages cost considerable time and effort to implement without a dedicated app.) Signal and its Android counterpart TextSecure are unique in that they use forward encryption, which generates temporary keys for each message, but still allow asynchronous messaging through the use of push notifications and “prekeys.” Ars reported on the implementation details in 2013 . Open Whisper Systems has pulled ahead of other privacy apps by making its interface easy for a person who doesn’t know too much about encryption to use. It’s also open source, so it can be vetted by experts, and its open encryption protocol can be adopted by other messaging apps. In fact, last November, messaging platform Whatsapp deployed Open Whisper Systems’ protocol for its 500 million Android users . Still, until now communicating with iOS users from an Android phone has been much more challenging. Read 4 remaining paragraphs | Comments

See the original article here:
Now you can easily send (free!) encrypted messages between Android, iOS

Remote valet mode and revolutionized parking: Ford’s Smart Mobility

Ford has a plan to help cut car emissions, and this time it doesn’t have anything to do with batteries, hybrid powertrains, or clever engine technology. Instead, the company is focusing on improving the parking experience, and its answer involves a crowdsourced real-time database of occupied and empty parking spots across the country, and remote control vehicles enabled by off-the-shelf commercial 4G LTE. At first glance that might not sound like it has much to do with reducing vehicle CO 2 emissions, but according to Ford, their data shows that hunting for parking spaces in urban environments can account for between 20 and 30 percent of a vehicle’s emissions. To find out more about what Ford has been working on, we spoke with Mike Tinskey, director of vehicle electrification and infrastructure at Ford. He told Ars about a pair of research projects that the car maker has been working on as part of a larger program called Smart Mobility. Smart Mobility involves 25 different experiments and pilot studies around the world, but these two have both been developed in conjunction with a team at Georgia Tech here in the US; Ford has had a long-running relationship with the group, which Tinskey describes as being analogous to the company’s research and advanced modeling arm for sustainability. According to Tinskey, Smart Mobility exists at the intersection of mobility and sustainability, with the overall goal of finding novel ways to reduce CO 2 . “When you look for places to do that, you start looking at antiquated things like parking, where people waste a lot of time, and a lot of CO 2 ,” he said. Read 10 remaining paragraphs | Comments

Read More:
Remote valet mode and revolutionized parking: Ford’s Smart Mobility

Report: iOS 9 will focus mainly on stability and performance

Longtime Apple users speak fondly of the Snow Leopard (10.6) release of OS X. Even though it came with ” no new features ,” it won users over by reducing the footprint of the OS and focusing mostly on refinement. A report from 9to5Mac’s well-sourced Mark Gurman claims that Apple is taking a similar approach with iOS 9, focusing on fixing bugs and optimizing performance rather than adding another big stack of new features to the pile. The report isn’t specific about what Apple will be doing to accomplish those goals, but in any case it’s a departure from the release-first-fix-later approach Apple normally takes with iOS. iOS 7’s biggest problems were addressed by iOS 7.1 six-or-so months later, and so far we’ve seen six minor updates for iOS 8 that have attempted to address everything from bugs to performance  and the amount of free space required for update installation. Though stability will be “a tentpole component” of iOS 9, Gurman says that the new operating system will still come with other improvements. Don’t expect a repeat of the “no new features” reveal, in other words. Read 1 remaining paragraphs | Comments

View article:
Report: iOS 9 will focus mainly on stability and performance

Somalia is no safe refuge for torrent site

In the world of online piracy , it seems like it’s one in, one out at the moment. While The Pirate Bay returned  last week, Kickass Torrents has now been taken down via a domain name seizure. The site, which was already blocked from direct UK access as a result of high court blocking orders, now turns up an error message when users attempt to access its Somali .so domain. A look at its Whois record  shows the site listed as banned. The Somali registry was seen as a safe haven for the site, away from copyright holders and their lawyers, but it appears the takedown was a result of a claim. Several other sites with a .so domain, including the unaffiliated scam site kickasstorrents.so, have also been taken down, which indicates a far-reaching block on any URL with “kickass” in it that is based in the country. Read 4 remaining paragraphs | Comments

Continued here:
Somalia is no safe refuge for torrent site

Understanding M.2, the interface that will speed up your next SSD

Most solid-state drives released within the last year or so have been too fast for the bus they’re connected to. The 6Gbps SATA III spec was finalized in the days when rotational hard drives still ruled and SSDs were rare, ludicrously expensive, and relatively unreliable. There are a couple of different standards that have been created to solve this problem, and they both solve it in the same basic way. One, SATA Express , uses the same physical connector as older SATA drives but uses PCI Express lanes rather than the SATA bus to boost storage speeds. The other, which will be more common in space-constrained mini-desktops, all-in-ones, and Ultrabooks, is called M.2 (previously NGFF, for “Next-Generation Form Factor”). M.2 is interesting not just because it can speed up storage with PCI Express lanes, but because it can use a whole bunch of different buses too; it stands to replace both mSATA and mini PCI Express, two older standards that have been used for SSDs and Wi-Fi cards in laptops for a while now. Intel’s new Broadwell CPUs and their chipsets include native support for M.2 and PCI Express boot drivers—neither PCIe-connected storage ( hi Apple ) nor the M.2 connector itself are new, but beginning with Broadwell systems each of those two things will become much more common. Read 11 remaining paragraphs | Comments

Continue Reading:
Understanding M.2, the interface that will speed up your next SSD

Malicious Google Play apps (may have) hosed millions of Android handsets

Security researchers have once again found Google Play offering malicious apps that have been downloaded by millions of Android users. According to a blog post published Tuesday by antivirus provider Avast, the apps include the Durak card game app and at least two other titles. Combined, those apps have been installed as many as 15 million times. Researcher Filip Chytry wrote: When you install Durak, it seems to be a completely normal and well working gaming app. This was the same for the other apps, which included an IQ test and a history app . This impression remains until you reboot your device and wait for a couple of days. After a week, you might start to feel there is something wrong with your device. Some of the apps wait up to 30 days until they show their true colors. After 30 days, I guess not many people would know which app is causing abnormal behavior on their phone, right? Each time you unlock your device an ad is presented to you, warning you about a problem, e.g. that your device is infected, out of date or full of porn. This, of course, is a complete lie. You are then asked to take action, however, if you approve you get re-directed to harmful threats on fake pages, like dubious app stores and apps that attempt to send premium SMS behind your back or to apps that simply collect too much of your data for comfort while offering you no additional value. It’s not the first time Google’s official Android app bazaar has been found to host malicious apps. In the past, it has offered titles laced with surreptitious remote access trojans , Bitcoin miners , and rogue advertising networks . Three years ago, Google introduced a cloud-based scanner that scours Play for malicious apps , but attackers have been known to bypass it . Google officials regularly remove apps from Play when they are found to be malicious. At the time this post was being prepared, all three flagged by Avast remained available for download. Read 1 remaining paragraphs | Comments

Continue Reading:
Malicious Google Play apps (may have) hosed millions of Android handsets