Don’t cry for the Google Play edition program; it was already dead

Earlier this week, the last of the Google Play edition Android phones in Google’s online storefront were listed as ” no longer available for sale .” When contacted for comment, Google had nothing to say, but it’s not hard to read between the lines here. The last new Google Play phone was introduced in the spring of 2014. Plans for a Galaxy S5 GPe phone made it far enough that official press photos leaked out into the wild , but the phone never materialized. The program hit its peak early last year, when a full half-dozen devices were listed all at once: the Galaxy S4 , the HTC Ones M7 and M8 , the first-generation Moto G , the Sony Z Ultra , and the LG G Pad 8.3 . Like doomed kids making their way through Willy Wonka’s factory, they silently dropped out one by one. Now they’re all gone, and it looks a whole lot like the program has wrapped up. If so, it’s a quiet, inconspicuous end to a quiet, inconspicuous program. Normally we’d say that fewer choices for Android shoppers would be a bad thing, but the changes Google has made to Android since the GPe program was introduced had already rendered it mostly irrelevant. Read 13 remaining paragraphs | Comments

Read the original:
Don’t cry for the Google Play edition program; it was already dead

PlayStation Now review: Sony finally proves streaming gaming is viable

When Sony launched its PlayStation Now service as a beta last year, the ridiculous per-game rental pricing structure stopped us from giving it any serious consideration almost immediately. Last week, though, the service graduated from beta with a more feasible all-you-can-play subscription plan . Suddenly this was an opportunity. Has the idea of running games on remote servers advanced at all since OnLive’s ahead-of-its-time launch back in 2010 ? We’ve been kicking the tires on the service for about a week now, and what we’ve found is a surprisingly compelling addition to the pay-per-game ownership model of retail discs and downloads. If you have the bandwidth and a yearning to sample some PS3 classics among the service’s somewhat limited initial selection on your PlayStation 4, PlayStation Now is well worth checking out. Performance When initially reviewing OnLive back in 2010 , running a game through the offering’s remote servers was a noticeably worse experience than running that same game locally. Even with a 20Mbps FiOS connection, our reviewer “could tell that the game was not running natively” thanks to “framerate bumps, sudden resolution drops, and gameplay blips.” Read 21 remaining paragraphs | Comments

Link:
PlayStation Now review: Sony finally proves streaming gaming is viable

Verizon nears “the end” of FiOS builds

It’s been nearly five years since Verizon decided to stop expanding its FiOS fiber network into new cities and towns, so this week’s news won’t come as a huge surprise: Verizon is nearing “the end” of its fiber construction and is reducing wireline capital expenditures while spending more on wireless. “I have been pretty consistent with this in the fact that we will spend more CapEx in the Wireless side and we will continue to curtail CapEx on the Wireline side. Some of that is because we are getting to the end of our committed build around FiOS, penetration is getting higher,” Verizon CFO Fran Shammo said yesterday in the Q4 2014  call with investors . Wireline capital spending totaled $1.6 billion in the most recent quarter and $5.8 billion for 2014, down 7.7 percent from 2013, Verizon said. Read 11 remaining paragraphs | Comments

Read the article:
Verizon nears “the end” of FiOS builds

Making ultra-thin materials with holes the size of water molecules

While visiting GE’s China Technology Center, we got to take a look at reverse osmosis membranes. Reverse osmosis is the most energy-efficient means of removing dissolved substances from water. It’s what’s used commercially for desalination, the process of producing drinking water from seawater. The term “membrane” is typically used to mean a thin sheet of some material (in fact, the word “sheet” appears in the definition of the term). But for some of the things GE is using it for, the membranes were thin yet robust tubes, each one capable of supporting the weight of a bowling ball. Despite that toughness, features on the tubes are so fine that they can allow water molecules to pass through but reject many things that are roughly the same size, such as the salt ions found in seawater. This all raises an obvious question: how do you actually produce anything like that? We decided to look into the process of making reverse osmosis membranes. Read 12 remaining paragraphs | Comments

Read More:
Making ultra-thin materials with holes the size of water molecules

Google drops three OS X 0days on Apple

Don’t look now, but Google’s Project Zero vulnerability research program may have dropped more zero-day vulnerabilities—this time on Apple’s OS X platform. In the past two days, Project Zero has disclosed OS X vulnerabilities here , here , and here . At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine. What’s more, the first vulnerability, the one involving the “networkd ‘effective_audit_token’ XPC,” may already have been mitigated in OS X Yosemite, but if so the Google advisory doesn’t make this explicit and Apple doesn’t publicly discuss security matters with reporters. Still, the exploits could be combined with a separate attack to elevate lower-level privileges and gain control over vulnerable Macs. And since the disclosures contain proof-of-concept exploit code, they provide enough technical detail for experienced hackers to write malicious attacks that target the previously unknown vulnerabilities. The security flaws were privately reported to Apple on October 20, October 21, and October 23, 2014. All three advisories appear to have been published after the expiration of the 90-day grace period Project Zero gives developers before making reports public. Read 1 remaining paragraphs | Comments

Visit link:
Google drops three OS X 0days on Apple

Attack for Flash 0day goes live in popular exploit kit

If you’ve been meaning to disable Adobe Flash, now might be a good time. Attacks exploiting a critical vulnerability in the latest version of the animation software have been added to a popular exploitation kit, researchers confirmed. Attackers often buy the kits to spare the hassle of writing their own weaponized exploits. Prolific exploit sleuth Kafeine uncovered the addition to Angler , an exploit kit available in underground forums. The zero-day vulnerability was confirmed by Malwarebytes . Malwarebytes researcher Jérôme Segura said one attack he observed used the new exploit to install a distribution botnet known as Bedep. Adobe officials say only that they’re investigating the reports. Until there’s a patch, it makes sense to minimize use of Flash when possible. AV software from Malwarebytes and others can also block Angler attacks. Read on Ars Technica | Comments

Read this article:
Attack for Flash 0day goes live in popular exploit kit

Liveblog: Windows 10 “The Next Chapter” event on January 21st

REDMOND—Microsoft is unveiling the next major beta of Windows 10, the Consumer Preview, with an event at the company’s home in Redmond, Washington. We’ll be on the scene to report on the news and get a first look at the new release. We’re expecting to see the new Continuum feature that adapts the Windows interface on 2-in-1 devices and a new browser that sheds the legacy (and name) of Internet Explorer. Representatives of the Xbox team will also be at the event, with Microsoft having news about Windows gaming—though precisely what that will be is currently a mystery. Read on Ars Technica | Comments

Taken from:
Liveblog: Windows 10 “The Next Chapter” event on January 21st

How installing League of Legends and Path of Exile left some with a RAT

Official releases for the League of Legends and Path of Exile online games were found laced with a nasty trojan after attackers compromised an Internet platform provider that distributed them to users in Asia. The compromise of consumer Internet platform Garena allowed the attackers to attach malicious software components to the official installation files for the two games, according to a blog post published Monday by antivirus provider Trend Micro. In addition to the legitimate game launcher, the compromised executable file also included a dropper that installed a remote access tool known as PlugX and a cleaner file that overwrote the infected file after it ran. According to Trend Micro, the attackers took care to conceal their malware campaign, an effort that may have made it hard for victims to know they were infected. The cleaner file most likely was included to remove evidence that would tip users off to a compromise or the origin of the attack. The cryptographic hash that was included with the tampered game files was valid, so even people who took care to verify the authenticity of the game installer would have no reason to think it was malicious, Trend Micro researchers said. The researchers linked to this December 31 post from Garena . Translated into English, one passage stated: “computers and patch servers were infected with trojans. As a result, all the installation files distributed for the games League of Legends and Path of Exile are infected.” Read 2 remaining paragraphs | Comments

See the article here:
How installing League of Legends and Path of Exile left some with a RAT

British spy agency captured 70,000 e-mails of journalists in 10 minutes

The Government Communications Headquarters (GCHQ), the British sister agency of the National Security Agency, captured 70,000 e-mails of journalists in 10 minutes during a November 2008 test. According to The Guardian , which on Monday cited some of its Snowden documents as its source (but did not publish them), the e-mails were scooped up as part of the intelligence agency’s direct fiber taps . Journalists from the BBC, Reuters, The Guardian, The New York Times, Le Monde, The Sun , NBC, and The Washington Post were apparently targeted. Read 2 remaining paragraphs | Comments

More here:
British spy agency captured 70,000 e-mails of journalists in 10 minutes

Marriott tentatively backs off Wi-Fi blocking plans

In a brief statement on Wednesday evening , hotel chain Marriott International said that it would not block any personal Wi-Fi devices belonging to its customers. Marriott International listens to its customers, and we will not block guests from using their personal Wi-Fi devices at any of our managed hotels. Marriott remains committed to protecting the security of Wi-Fi access in meeting and conference areas at our hotels. We will continue to look to the FCC to clarify appropriate security measures network operators can take to protect customer data, and will continue to work with the industry and others to find appropriate market solutions that do not involve the blocking of Wi-Fi devices. Despite that pledge, Re/Code reports that the company is not rescinding a request for rulemaking that it submitted to the Federal Communications Commission late last year, in which it asked for the Commission’s blessing to block personal hotspots. In October, Marriott was fined $600,000 by the FCC following a complaint that one of its Nashville, Tennessee branches was interfering with and disabling personal Wi-Fi hotspots set up by its customers. Marriott agreed to pay the fine but remained defiant, asking the FCC to allow it to resume its practice. Read 1 remaining paragraphs | Comments

Read More:
Marriott tentatively backs off Wi-Fi blocking plans