Facebook acknowledges news feeds are bad at news, vows to improve

Facebook’s News Feed pays attention to trending topics, right, but news feeds have lately seemed to be lacking in news. Following criticism of the lack of current events in Facebook news feeds, Facebook has announced tweaks to its algorithms meant to help surface timely content. The company plans to do this by giving more value to posts that get interactions, such as likes and comments, and pushing posts when that activity seems to be cresting. In the blog post announcing the changes, Facebook wrote that it often prioritizes posts about “trending” topics that appear in the chart of hashtags posted on the right side of users’ homepages. Facebook also places higher value on posts according to how many interactions (likes, comments, shares) they receive. But as things are, some users have noted that Facebook seems to miss news waves , or is late to them, as with the fatal shooting of Mike Brown and the related protests that played out over weeks in August. When Facebook’s curation methods didn’t acknowledge those events, users noticed the news vacuum in their news feeds. Read 1 remaining paragraphs | Comments

Visit site:
Facebook acknowledges news feeds are bad at news, vows to improve

Apple releases OS X 10.9.5 with fixes, new code signing requirements [updated]

Yesterday evening Apple released OS X 10.9.5 to the general public, the fifth major update for OS X Mavericks. As usual, the update comes with a handful of fixes for user-facing features as well as a small pile of security updates . Many of these security patches are also available for OS X 10.7.5 and 10.8.5 in separate updates. Like OS X 10.9.4 , the update focuses on smaller problems that affect a subset of Macs. The new features include Safari 7.0.6, improved “reliability for VPN connections that use USB smart cards for authentication,” and better reliability for connecting to file servers that use the SMB protocol. For businesses using OS X, the update fixes a problem that could keep system admins from “performing some administrative tasks successfully” on larger groups of Macs, and it also speeds up authentication “when roaming on 802.1x networks which use EAP-TLS.” Among the security updates are fixes for Bluetooth, CoreGraphics generally and the Intel graphics driver specifically, and OS X’s version of OpenSSL among many others. The latter problems were fixed by updating from OpenSSL version 0.9.8y to 0.9.8za. Read 6 remaining paragraphs | Comments

See original article:
Apple releases OS X 10.9.5 with fixes, new code signing requirements [updated]

Why T-Mobile needs Wi-Fi calling: its network can’t match AT&T and Verizon

T-Mobile’s “data strong network.” T-Mobile T-Mobile US’ latest “Un-carrier” move is just about the most amazing thing ever, CEO John Legere said last week. “This is like adding millions of towers to our network in a single day,” Legere boasted in a press release . “The difference between us and the traditional carriers is that they’ll do everything they can to make more money off you. We’ll do everything we can to solve your problems.” The innovation is actually something that T-Mobile has had since 2007: Wi-Fi calling. It makes sense for T-Mobile to promote Wi-Fi calling now, given that Apple is adding the capability to iPhones in iOS 8. The initiative has some nice benefits for customers—T-Mobile offered to upgrade all customers to phones that can make Wi-Fi calls and is giving out a free “Personal CellSpot,” a Wi-Fi router that prioritizes voice calls. Read 22 remaining paragraphs | Comments

Read this article:
Why T-Mobile needs Wi-Fi calling: its network can’t match AT&T and Verizon

Android Browser flaw a “privacy disaster” for half of Android users

Thanks to a bug in the Android Browser, your cookies aren’t safe. Surian Soosay A bug quietly reported on September 1 appears to have grave implications for Android users. Android Browser, the open source, WebKit-based browser that used to be part of the Android Open Source Platform (AOSP), has a flaw that enables malicious sites to inject JavaScript into other sites. Those malicious JavaScripts can in turn read cookies and password fields, submit forms, grab keyboard input, or do practically anything else. Browsers are generally designed to prevent a script from one site from being able to access content from another site. They do this by enforcing what is called the Same Origin Policy (SOP): scripts can only read or modify resources (such as the elements of a webpage) that come from the same origin as the script, where the origin is determined by the combination of scheme (which is to say, protocol, typically HTTP or HTTPS), domain, and port number. The SOP should then prevent a script loaded from http://malware.bad/ from being able to access content at https://paypal.com/. Read 9 remaining paragraphs | Comments

View post:
Android Browser flaw a “privacy disaster” for half of Android users

Boeing and SpaceX getting NASA money for manned space launches [Updated]

SpaceX’s Dragon V2. Megan Geuss Today, NASA administrator Charles Bolden announced that there were two winners in the campaign to become the first company to launch astronauts to low-Earth orbit: Boeing and SpaceX. The two will receive contracts that total $6.8 billion dollars to have hardware ready for a 2017 certification—a process that will include one crewed flight to the International Space Station (ISS). In announcing the plan, Bolden quoted President Obama in saying, “The greatest nation on earth should not be dependent on any other nation to get to space.” And he promoted the commercial crew program as a clear way of ending a reliance on Russian launch vehicles to get to the ISS. But Bolden and others at the press conference were also looking beyond that; several speakers, including Kennedy Space Center Director Bob Cabana and astronaut Mike Fincke, mentioned that the ultimate goal is Mars. To that end, Bolden emphasized that NASA is still doing its own vehicle and rocket development. The Orion crew capsule, intended to be suitable for missions deeper into the Solar System, recently underwent a splashdown test in the Pacific. Its first test flight aboard a Delta IV rocket is scheduled for this December. Work on the Space Launch System, a heavy lift vehicle that can transport the additional hardware needed for deep space missions, was also mentioned. Read 6 remaining paragraphs | Comments

Continue reading here:
Boeing and SpaceX getting NASA money for manned space launches [Updated]

Hacker exploits printer Web interface to install, run Doom

Doom on a printer’s menu screen! Personally, we can’t wait until someone makes Descent playable on a toaster. Context Internet Security On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface. After describing the device’s encryption as “doomed,” Context Information Security consultant Michael Jordon made his point by installing and running the first-person shooting classic  Doom on a stock Canon Pixma MG6450. Sure enough, the printer’s tiny menu screen can render  a choppy and discolored but playable version of id Software’s 1993 hit, the result of Jordon discovering that Pixma printers’ Web interfaces didn’t require any authentication to access. “You could print out hundreds of test pages and use up all the ink and paper, so what?” Jordon wrote at Context’s blog report about the discovery , but after a little more sniffing, he found that the devices could also easily be redirected to accept any code as legitimate firmware. A vulnerable Pixma printer’s Web interface allows users to change the Web proxy settings and the DNS server. From there, an enterprising hacker can crack the device’s encryption in eight steps, the final of which includes unsigned, plain-text firmware files. The hacking possibilities go far beyond enabling choppy, early ’90s gaming: “We can therefore create our own custom firmware and update anyone’s printer with a Trojan image which spies on the documents being printed or is used as a gateway into their network,” Jordon wrote. Read 4 remaining paragraphs | Comments

Read More:
Hacker exploits printer Web interface to install, run Doom

US gov’t threatened Yahoo with $250K daily fine if it didn’t use PRISM

Yahoo reports that it is on the verge of releasing 1,500 pages of documents related to a long court battle over its participation in the PRISM program, a National Security Agency program revealed last summer as part of the Snowden leaks. A leaked top-secret slide about PRISM shows that Yahoo was one of the first participants, having begun contributing to the database in March of 2008. It did so under severe duress. Company executives believed the government’s demand for data was “unconstitutional and overbroad” and fought it in court. “Our challenge, and a later appeal in the case, did not succeed,” explained Yahoo General Counsel Ron Bell in a blog post published today. “The Foreign Intelligence Surveillance Court (FISC)… ordered us to give the U.S. Government the user data it sought in the matter.” Read 5 remaining paragraphs | Comments

View post:
US gov’t threatened Yahoo with $250K daily fine if it didn’t use PRISM

[Update] iFixit cracks open the Moto 360, finds smaller battery than advertised

Hey that’s not 320 mAh. iFixit/Ron Amadeo iFixit  has gotten ahold of the Moto 360 and applied the usual spudgers and heat packs to rip open the little round smartwatch. There weren’t too many surprises (everything is round!) except for the battery: it’s smaller than advertised. In iFixit’s pictures, the 360’s battery is only labeled as 300 mAh, 20 mAh less than advertised . The 300 mAh battery has only 75 percent of the capacity of the 400 mAh battery found in the LG G Watch, and together with the OMAP 3 processor, it’s not a great combination for all-day battery life. We’ve asked Motorola for a comment about the smaller battery in iFixit’s 360, but the company hasn’t gotten back to us yet. We’ll update this post if we hear anything. The company’s response is below. As for the rest of the device, the round LCD looks pretty much the same as it does on the outside, and even the main PCB is round. iFixit managed to nail the processor down to an  OMAP3630 , which as we suspected is built on a 45nm process. Read 2 remaining paragraphs | Comments

More:
[Update] iFixit cracks open the Moto 360, finds smaller battery than advertised

Tasmanian depths may have been hiding unknown animal phylum

D. enigmata ron the right, with the three larger samples on the left representing D. discoides . PLoS one Over the past few years, studies of genomes have confused what we thought we knew about the origin of animal life. Instead of the simple sponges being the earliest branch off the animal tree, a group of relatively complex organisms, the ctenophores, seem to be the earliest branch . That finding has some serious implications as it suggests that a nervous system evolved twice . Now, some more traditional biology may upset the family tree even further. Old samples taken from the seabed near Tasmania contain examples of two different species that may belong to a phylum entirely unknown to us—one that split off near the base of the animal tree. The strange creatures also have features that suggest they may be related to remains from the Ediacaran, a period in which the first animal life appears in the fossil record. The samples actually date from a research cruise taken nearly 30 years ago, where a “sled” was dragged along the ocean floor and samples returned to the surface. The new species weren’t recognized as interesting when they were first found, so they were left mixed in with the rest of the collection, which was fixed with formaldehyde and then dumped in 80 percent ethanol. The samples suffered a bit of further abuse when one of the authors wanted to refresh the alcohol and was given 100 percent ethanol instead. (The paper actually notes, “Unfortunately absolute alcohol was provided without comment instead of the requested 80 percent ethanol.”) Read 10 remaining paragraphs | Comments

See original article:
Tasmanian depths may have been hiding unknown animal phylum

Meet the tech company performing ad injections for Big Cable

Front Porch ad. A Northern California company that bills itself as the “worldwide leader in Wi-Fi monetization” is the vendor behind Comcast’s and other US cable companies’ promotional advertising campaign performed through JavaScript injection, Comcast said Monday. Comcast spokesman Charlie Douglas confirmed the vendor’s name, Front Porch of Sonora, hours after Ars reported that Comcast recently started serving Comcast ads to devices connected to one of its 3.5 million publicly accessible Wi-Fi hotspots across the US. We wrote that Comcast’s decision to inject data into the net raises security concerns and cuts to the heart of the ongoing net neutrality debate . As it turns out, Front Porch also does business with Cox, Time Warner, Bright House, and Cablevision in the US, Front Porch CTO Carlos Vazquez said in a telephone interview. Read 8 remaining paragraphs | Comments

Read the original:
Meet the tech company performing ad injections for Big Cable