Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

Dow Jones has issued a press release this morning announcing that as of March 19, there will be a change to the list of companies that make up the Dow Jones Industrial Average: AT&T is out, and Apple is in. According to the press release, the change is due in part to Visa’s upcoming 4:1 stock split, which will effectively lower Visa’s stock price and its effect on the index. To balance this reduction in Visa’s price—which the press release says can have “a material impact on sector representation”—Apple is being added to the index. The DJIA membership is fixed at thirty stocks , and so in order to add a company to it, one must be removed. The Dow has chosen to drop AT&T, leaving telecommunications to be represented on the index by AT&T’s rival Verizon—which, the release explains, is very similar to AT&T but has a higher market capitalization. The last time any membership changes were made to the DJIA was in September 2013, when Goldman Sachs, Nike, and Visa were added. AT&T has been a member of the DJIA since November 1999. Read 2 remaining paragraphs | Comments

Follow this link:
Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

DNS enhancement catches malware sites by understanding sneaky domain names

A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O’Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank , it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness. The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via “phishing” links in e-mails and social media have gone past the well-worn “typo-squatting” approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered “Carbanak” attacks on banks that allowed criminals to gain access to financial institutions’ networks starting in January 2013 and steal over $1 billion over the next two years. Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks. Read 4 remaining paragraphs | Comments

More here:
DNS enhancement catches malware sites by understanding sneaky domain names

Tech support scammer threatened to kill man when scam call backfired

Tech support scammers should probably just hang up the phone when a scam call goes wrong. But one scammer took things to a new level by threatening to kill a man who pointed out that the scammer was trying to steal money. As we’ve reported numerous times , scammers pretending to work for Microsoft tech support call potential victims, tell them their computers are infected, convince them to provide remote access, and then charge them hundreds of dollars to fix imaginary problems. Read 6 remaining paragraphs | Comments

View the original here:
Tech support scammer threatened to kill man when scam call backfired

In major goof, Uber stored sensitive database key on public GitHub page

Uber is trying to force GitHub to disclose the IP address of every person that accessed a webpage connected to a database intrusion that exposed sensitive personal data for 50,000 drivers. The court action revealed that a security key unlocking the database was stored on a publicly accessible place, the online equivalent of stashing a house key under a doormat. Uber officials have yet to say precisely what information was contained in the two now-unavailable GitHub gists . But in a lawsuit filed Friday against the unknown John Doe intruders, Uber lawyers said the URLs contained a security key that allowed unauthorized access to the names and driver’s license numbers of about 50,000 Uber drivers . The ride-sharing service disclosed the breach on Friday, more than two months after it was discovered. “The contents of these internal database files are closely guarded by Uber,” the complaint stated. “Accessing them from Uber’s protected computers requires a unique security key that is not intended to be available to anyone other than certain Uber employees, and no one outside of Uber is authorized to access the files. On or around May 12, 2014, from an IP address not associated with an Uber employee and otherwise unknown to Uber, John Doe I used the unique security key to download Uber database files containing confidential and proprietary information from Uber’s protected computers.” Read 3 remaining paragraphs | Comments

More:
In major goof, Uber stored sensitive database key on public GitHub page

Intel unveils its next mobile maneuver: Atom x3, x5, and x7

BARCELONA, Spain—At Mobile World Congress 2015, Intel has unveiled its latest in a very long line of attempts at securing a beachhead in the mobile market: the Atom x3, Atom x5, and Atom x7 SoCs. As the naming implies, the Atom x3 is a low-end part that is probably destined for developing markets in countries such as India and China. The Atom x5 and x7, however, are quad-core 14nm Cherry Trail chips with Broadwell-class Intel HD graphics. Performance-wise, the x5 and x7 chips should be pretty good—but right now we only have Intel’s own benchmarks to go on. There’s also no word from Intel on the power consumption of the new chips, which is rarely a good sign when you’re trying to break into a highly competitive, entrenched market. Let’s start at the bottom. Atom x3 is essentially rebranded SoFIA, but now along with a 3G version there is a new chip (the x3-C3440) with an integrated LTE modem. Rather unusual despite its use of the Atom brand name, the x3 is a 28nm chip that isn’t being built at Intel’s own fabs. Instead, Intel is using a foundry (most likely TSMC or Rockchip), primarily because it isn’t cost effective for Intel to build chips with integrated modems on its own bleeding-edge 14nm node. The top-end Atom x3, the x3-C3440, has a quad-core CPU and Mali 720 MP2 GPU (yes, that’s a GPU designed by ARM Holdings). We probably won’t see the Atom x3 in Western markets; it will be cheaply fabricated in Asia, and it will be used in very cheap phones and tablets. We have asked Intel what CPU core is being used by Atom x3, but the company hasn’t yet responded. Read 2 remaining paragraphs | Comments

See original article:
Intel unveils its next mobile maneuver: Atom x3, x5, and x7

Hands-on with the fastest LTE network in Europe: 400Mbps down, 45Mbps up

LONDON—Today, I got to play around with Europe’s (and probably the world’s) fastest LTE network: when I opened up Speedtest.net, depending on how many people were standing in the room, my download speed was between 350 and 400Mbps, my upload speed was around 45Mbps, and my ping latency was just 20ms. Funny enough, beyond Speedtest.net, it is actually quite hard to use 400Mbps of bandwidth. When I loaded up a 4K video from YouTube, I only used around 40Mbps, or 10 percent, of my wireless uber-pipe. Ars Technica certainly loaded very quickly indeed. As it stands today, there are very few websites or services that will let you pull data down at 400Mbps, or where being able to download at 400Mbps even makes much sense. If we’ve learned anything from the last few decades of telecoms and networking, however, it’s that Internet usage will always expand until every last inch of available bandwidth is consumed. So while 400Mbps might seem a little bit over the top today, in five years you’ll probably wonder how you ever survived with anything less. For some background, I had a 400Mbps LTE connection at my disposal because I had been invited to Wembley Stadium in London to try out the first deployment of Category 9 LTE in the UK. It was a “live” deployment in that it used commercially available hardware, but it was still very much a tech demo—the Cat 9 base station only covered a small portion of the stadium, and there were only a handful of devices in the world configured to connect to this specific LTE network. The LTE network was operated by EE (one of the UK’s big four wireless carriers), the LTE base station was made by Huawei, and the mobile device that I used was a smartphone powered by the Qualcomm Snapdragon 810 SoC . Read 4 remaining paragraphs | Comments

Read More:
Hands-on with the fastest LTE network in Europe: 400Mbps down, 45Mbps up

Remote valet mode and revolutionized parking: Ford’s Smart Mobility

Ford has a plan to help cut car emissions, and this time it doesn’t have anything to do with batteries, hybrid powertrains, or clever engine technology. Instead, the company is focusing on improving the parking experience, and its answer involves a crowdsourced real-time database of occupied and empty parking spots across the country, and remote control vehicles enabled by off-the-shelf commercial 4G LTE. At first glance that might not sound like it has much to do with reducing vehicle CO 2 emissions, but according to Ford, their data shows that hunting for parking spaces in urban environments can account for between 20 and 30 percent of a vehicle’s emissions. To find out more about what Ford has been working on, we spoke with Mike Tinskey, director of vehicle electrification and infrastructure at Ford. He told Ars about a pair of research projects that the car maker has been working on as part of a larger program called Smart Mobility. Smart Mobility involves 25 different experiments and pilot studies around the world, but these two have both been developed in conjunction with a team at Georgia Tech here in the US; Ford has had a long-running relationship with the group, which Tinskey describes as being analogous to the company’s research and advanced modeling arm for sustainability. According to Tinskey, Smart Mobility exists at the intersection of mobility and sustainability, with the overall goal of finding novel ways to reduce CO 2 . “When you look for places to do that, you start looking at antiquated things like parking, where people waste a lot of time, and a lot of CO 2 ,” he said. Read 10 remaining paragraphs | Comments

Read More:
Remote valet mode and revolutionized parking: Ford’s Smart Mobility

Intel forges ahead to 10nm, will move away from silicon at 7nm

This week at the 2015 International Solid-State Circuits Conference (ISSCC), Intel will provide an update on its new 10nm manufacturing process and new research on how it’s maintaining the march of Moore’s law to 7nm and beyond. The first chips based on Intel’s new 10nm process are expected in late 2016/early 2017, and the company says it’s hoping to avoid the delays that haunted the belabored release of 14nm Broadwell. To hit 7nm, Intel says new materials will be required—as in, it looks like 10nm will finally be the end of the road for silicon. The most likely replacement for silicon is a III-V semiconductor such as indium gallium arsenide (InGaAs), though Intel hasn’t provided any specific details yet. ISSCC 2015, being held in San Francisco this week, is where all the big players in silicon (Intel, Samsung, TSMC, IBM, etc.) meet to talk about their latest manufacturing processes and how they might go about overcoming the current barriers to smaller, faster, and denser computer chips. It’s not unusual for Intel to have one of the largest presences at the conference, and this year is no different: it will be presenting three papers on its 14nm technology, hosting sessions on a variety of topics, and Mark Bohr—one of Intel’s most esteemed researchers—will be sitting on a panel that discusses Moore’s law beyond 10nm. The steady march of new CMOS processes driving ever smaller transistors. Intel Read 4 remaining paragraphs | Comments

Taken from:
Intel forges ahead to 10nm, will move away from silicon at 7nm

If you skipped Windows 8, here’s some new stuff you get with Windows 10

It’s a shame that Windows 8’s interface was so divisive. The UI dominated the conversation around the OS to the extent that its other, subtler changes got buried. People who stuck with Windows 7 never saw these updates at all. Windows 10, as we’ve covered, is Microsoft’s effort to repackage Windows 8’s improvements in a way that will be more appealing to Windows 7 loyalists. As if to drive that point home, Microsoft is giving current Windows 7 users a whole year after launch to hop on the Windows 10 train at no charge . Microsoft has made a bunch of changes to Windows in the last two years that have nothing to do with the new user interface. This list doesn’t have anything new on it, but if you’re still running Windows 7 and you decide to upgrade to Windows 10, it’ll be new to you, and you’ll get to use it all without having to figure out how to live life without a Start menu. (If you’re interested in seeing some of the UI stuff that you’ll be sidestepping, ZDNet’s Ed Bott recently published this piece about Windows 8 features that got cut from Windows 10). Read 27 remaining paragraphs | Comments

Read the article:
If you skipped Windows 8, here’s some new stuff you get with Windows 10

Windows Defender now removes Superfish malware… if you’re lucky

First the good news. Microsoft today released a signature update for Windows Defender, the anti-malware software that’s built in to Windows, to enable it to both detect and remove the Superfish malware that Lenovo installed on some systems . Defender’s removal process seems to be quite robust, both uninstalling the software and removing the dangerous certificate that Superfish installs. However, it doesn’t appear to clean any contaminated installs of Firefox or Thunderbird; for that, you’ll want to check out our manual removal instructions . Uh oh… 2 more images in gallery Now the bad news. While Windows Defender is supplied as part of Windows and works well enough, Microsoft gave it some rather strange behavior  as a concession to third-party anti-malware vendors . If a third-party anti-malware product is installed, Windows Defender will automatically disable itself. Many Lenovo systems include trial versions of anti-malware software; during the duration of these trials, Windows Defender will be inactive. Read 2 remaining paragraphs | Comments

View article:
Windows Defender now removes Superfish malware… if you’re lucky