Is Chicago using cell tracking devices? One man tries to find out

David D’Agostino A local activist has filed a new lawsuit against the Chicago Police Department in an attempt to learn how the city uses fake cell tower devices, also known as stingrays. Relatively little is known about the devices, which are used to track targeted phones and can also be used to intercept calls and text messages. The American Civil Liberties Union recently began a campaign to learn more about how stingrays are used by filing public records requests in Florida, the home state of the Stingray’s manufacturer, Harris Corporation. (While “Stringray” is a trademarked name and particular product, it has entered the technical lexicon as a generic term, like Kleenex or Xerox.) In nearly every sales agreement , that firm has required law enforcement agencies to sign nondisclosure agreements forbidding them from discussing whether or not an agency even possesses such a device, much less describing its capabilities. Read 8 remaining paragraphs | Comments

More:
Is Chicago using cell tracking devices? One man tries to find out

RadioShack continues death march, loses $98.3 million in a quarter

On Tuesday, electronics retailer RadioShack reported its quarterly earnings , and the results were not good. The company lost $98.3 million in its first fiscal quarter of 2014, a figure that’s more than triple the loss it sustained in the same quarter last year. Ars put RadioShack on our 2014 “Deathwatch” earlier in January, and not without reason. The retailer has relied on mobile phone sales to buoy it through the hard times and has tried to rebrand itself as the place to shop for Do-It-Yourselfers, stocking its shelves with various Arduino projects. But customers can find the handsets they need in carriers’ shops, and they often choose to buy DIY electronics goods online or in hardware stores. In a press release , the company attributed the quarter results to ” an industry-wide decline in consumer electronics and a soft mobility market which impacted traffic trends throughout the quarter.” Read 3 remaining paragraphs | Comments

Originally posted here:
RadioShack continues death march, loses $98.3 million in a quarter

GitHub for Windows given a shiny new look for version 2

Two years ago, GitHub released GitHub for Windows , a Metro-styled graphical interface for managing git version control. Today, the company released GitHub for Windows version 2. Version 2 introduces an all-new look. It’s still a minimalist, Metro-style interface, but it’s even more pared down than it was before; where the old interface used shading, the new one depends even more heavily on whitespace and positioning. The concept behind the redesign is to give a more focused, concentrated view on the things that developers care about. The old application had developers jumping between a range of different screens to perform different operations; this is much reduced in the new version. For example, to commit changes to a repository, the old application switched to a dedicated “commit” view. The new one performs the commit from within the main view. Read 2 remaining paragraphs | Comments

View article:
GitHub for Windows given a shiny new look for version 2

Google will flag search results erased due to “right to be forgotten”

Wikipedia founder Jimmy Wales is a vocal critic of the new ruling. Jimmy Wales/ Wikipedia In the wake of a controversial European high court ruling last month that search providers like Google must remove “inadequate, irrelevant, or no longer relevant” materials from search results upon request by EU citizens, the US search giant has expressed a desire to alert users to when such results have been altered. Google’s plan to flag censored search results will likely be similar to how the company notifies users that links have been removed due to a copyright takedown request. The search giant aims to place such notifications at the bottom of pages that would have contained links that have been erased in order to alert users of the change, reports The Guardian. The company also plans to include statistics regarding “right to be forgotten” link removal requests in its biannual transparency report. Read 5 remaining paragraphs | Comments

Read the article:
Google will flag search results erased due to “right to be forgotten”

Amtrak wants 25Mbps per train

A familiar dialogue box for riders on the Northeast corridor. Amtrak is looking to build a trackside Wi-Fi network on its Northeast corridor that would bump its trains’ connections to broadband-level speeds. The increase is meant to accommodate busy trains with hundreds of customers crowding the Wi-Fi, a common scenario that results in slow or no connections for some customers. Amtrak has offered Wi-Fi on trains running between Boston and Washington, DC for several years now , but currently, the connection is 10Mbps shared among everyone on the train. In this reporter’s experience on crowded trains, this means you can only get on the Wi-Fi long enough to re-establish a connection through the network’s dialog boxes before the process resets. The company has requested proof-of-concept bids to bump the connection speed to 25Mbps per train “to meet growing customer data usage demands.” The bids will be used to see if it is “technically and financially feasible” to bring network improvements to the entire stretch of the Northeast corridor. Read 1 remaining paragraphs | Comments

Original post:
Amtrak wants 25Mbps per train

“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

Eset Security researchers have documented another first in the annals of Android malware: a trojan that encrypts photos, videos, and documents stored on a device and demands a ransom for them to be restored. The crudeness of Android/Simplocker, as the malicious app has been dubbed, suggests it’s still in the proof-of-concept phase, Robert Lipovsky, a malware researcher for antivirus provider Eset, said in a recent blog post . The malware also addresses users in Russian and demands that payments be made in Ukrainian hryvnias, an indication that it targets only people in Eastern Europe. Still, the trojan—with its combination of social engineering, strong encryption, and robust Internet architecture—could be a harbinger of more serious and widespread threats to come. After all, the first Android trojans to make hefty SMS charges also debuted in the same region. Once installed on a device, the app delivers the following message: Read 3 remaining paragraphs | Comments

More:
“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

Microsoft: Software update unlocks more GPU bandwidth on Xbox One

The system update does not turn the system white… only the employee models do that. The June system update rolling out to Xbox One system worldwide this week includes surface-level features like external hard drive support, as we mentioned this morning . But Microsoft says the new firmware will also help developers extract more power from the system’s Graphical Processing Unit (GPU), even though the base hardware in the system is obviously staying the same. Microsoft didn’t trumpet this news in a press release or blog post, but threw it out there in a tweet from Microsoft’s new executive in charge of Xbox, Phil Spencer: “June #XboxOne software dev kit gives devs access to more GPU bandwidth. More performance, new tools and flexibility to make games better.” As far back as last October, Microsoft was publicly acknowledging how Kinect and system processing took “a conservative 10 percent time-sliced reservation… for the GPGPU processing for Kinect and for the rendering of concurrent system content such as snap mode.” Back then, the company promised it would be opening up that slice of processing time to game developers in the future in a way that didn’t impact the system’s background performance. That appears to be what has come to pass with the system’s latest software update. Read 6 remaining paragraphs | Comments

Taken from:
Microsoft: Software update unlocks more GPU bandwidth on Xbox One

Comcast charged $2,000 for alarm system that didn’t work—for 7 years

Houston resident Lisa Leeson says she paid Comcast nearly $2,000 over seven years for an alarm system, only to find out that it never worked. Comcast, it turns out, installed the alarm system improperly. Even though the alarm made a sound indicating that it was active when Leeson and her family set it each day, “It was unable… to actually call the police and/or Comcast once it was activated,” Leeson told KPRC Local 2 Houston . What did Comcast do after the problem was finally discovered? At first, the company offered only a $20 credit, before eventually agreeing to refund all of the money. “When Davis called Comcast’s corporate office, a spokesman apologized, but not before he pointed to a line in Leeson’s alarm agreement where she agreed to ‘test her system’ on ‘a regular basis,'” the news station reported. “Chances are your alarm company requires the same, putting the onus back on you to make sure your system is functioning properly.” Read 5 remaining paragraphs | Comments

Continue Reading:
Comcast charged $2,000 for alarm system that didn’t work—for 7 years

Bugs in widely used WordPress plug-in leave sites vulnerable to hijacking

Security researchers have discovered vulnerabilities in a widely used WordPress extension that leaves sites susceptible to remote hijacking. WordPress-powered sites that use the All in One SEO Pack should promptly install an update that fixes the privilege escalation vulnerabilities, Marc-Alexandre Montpas, a researcher with security firm Sucuri wrote in a blog post published Saturday . Administrators can upgrade by logging in to the admin panel, selecting plug-ins, and choosing the All in One title. The just-released version that fixes the vulnerabilities is 2.1.6. The worst of the attacks made possible by the bugs can allow attackers to inject malicious code into the admin control panel, Montpas warned. Malicious hackers could then change an admin’s password or insert backdoor code into the underlying websites. People could also remotely tamper with a site’s search engine optimization settings. To exploit the bugs, attackers need only an unprivileged account on the site, such as one for posting reader comments. In some cases, the privilege escalation and cross-site scripting bugs in All in One SEO are combined with another vulnerability that Montpas didn’t elaborate on. Read 2 remaining paragraphs | Comments

View article:
Bugs in widely used WordPress plug-in leave sites vulnerable to hijacking

OS X Yosemite unveiled at WWDC, features big UI overhaul

Photo by DAVID ILIFF. License: CC-BY-SA 3.0 This morning at Apple’s 2014 Worldwide Developer’s Conference, Apple SVP Craig Federighi gave us our first official look at the upcoming version of the Macintosh desktop operating system. This is the tenth formal release of OS X (which is pronounced “oh ess ten,” never “oh ess ecks”); Apple’s naming convention uses “OS X” as the brand, separate from the version, and so the brand and version of this release is indeed “OS X 10.10″—”oh ess ten ten dot ten” (or “ten point ten,” if you insist). Starting with OS X 10.9, though, Apple has given the OS California-themed names—10.9 was “OS X Mavericks,” after a famous surfing location, and this new version is “OS X Yosemite,” named after California’s Yosemite National Park. Mavericks’ branding and banners were all wave-related, after the surf theme; Yosemite’s desktop features the famous slab-sided southwest face of Half Dome , one of the park’s most recognizable rock formations. (PC gamers who cut their teeth in the late 80s and 90s will also recognize Half Dome from its role as the logo of the legendary adventure gaming company Sierra On-Line .) Translucency and new Dock icons. “Translucency” is the name of the day, with trandlucent panels and sidebars popping up all in all windows. The icons in the Dock have also gotten a big overhaul, gaining a very iOS-like appearance across the board. “You wouldn’t believe how much time we spent crafting that trash can,” joked Federighi. The revised interface can also be shifted to a “dark” mode, where windows and menus shift to light text on a smoky background instead of the Mac’s more typical black-on-white. Read 6 remaining paragraphs | Comments

Read the original:
OS X Yosemite unveiled at WWDC, features big UI overhaul