Level 3 claims six ISPs dropping packets every day over money disputes

Network operator Level 3, which has asked the FCC to protect it from ” arbitrary access charges ” that ISPs want in exchange for accepting Internet traffic, today claimed that six consumer broadband providers have allowed a state of “permanent congestion” by refusing to upgrade peering connections for the past year. Level 3 and Cogent, another network operator, have been involved in disputes with ISPs over whether they should pay for the right to send them traffic. ISPs have demanded payment in exchange for accepting streaming video and other data that is passed from the network providers to ISPs and eventually to consumers. When the interconnections aren’t upgraded, it can lead to congestion and dropped packets, as we wrote previously regarding a dispute between  Cogent and Verizon . In a blog post today , Level 3 VP Mark Taylor wrote: Read 4 remaining paragraphs | Comments

Read the article:
Level 3 claims six ISPs dropping packets every day over money disputes

Infecting DVRs with Bitcoin-mining malware even easier than you suspected

The dialog that appears when users want to manually change the default password on their EPCOM Hikvision S04 DVR. Sans Institute It took just one day for a low-end, Internet-connected digital video recorder to become infected with malware that surreptitiously mined Bitcoins on behalf of the quick-moving attackers. The feat, documented in a blog post published Monday by researchers at the security-training outfit Sans Institute, was all the more impressive because the DVR contained no interface for downloading software from the Internet. The lack of a Wget , ftp, or kermit application posed little challenge for the attackers. To work around the limitation, the miscreants used a series of Unix commands that effectively uploaded and executed a Wget package and then used it to retrieve the Bitcoin miner from an Internet-connected server. Monday’s observations from Sans CTO Johannes Ullrich are part of an ongoing series showing the increasing vulnerability of Internet-connected appliances to malware attacks. In this case, he bought an EPCOM Hikvision S04 DVR off eBay, put it into what he believes was its factory new condition, and connected it to a laboratory “honeypot” where it was susceptible to online attackers. In the first day, it was probed by 13 different IP addresses, six of which were able to log into it using the default username and password combination of “root” and “12345.” Read 4 remaining paragraphs | Comments

View article:
Infecting DVRs with Bitcoin-mining malware even easier than you suspected

Fitbit designer calls Project Ara the “IKEA chair” of smartphones

Magnets, how do they work? Google’s eventual, modular Project Ara smartphone will answer that question and more once its first “millions of units” ship in 2015’s first half. Project Ara To some extent, Gadi Amit, the tech-design guru who owns New Deal Design and helms the team behind devices like Fitbit, is letting go. His latest project forced him to. It’s called Project Ara , a smartphone concept that began as a Motorola product before Google bought the company. Project Ara strays from Amit’s string of simple, elegant, self-contained products. This phone is not like a fitness band or a more efficient camera; it doesn’t solve a single, immediate goal and then step out of the way. Rather, Project Ara demands experimentation and customization, forcing everyone outside of the Project Ara team to become the phone’s designers. In Amit’s eyes, especially in the modern phone era, that has become the point. The mission, even. Read 11 remaining paragraphs | Comments

Taken from:
Fitbit designer calls Project Ara the “IKEA chair” of smartphones

High School senior charged with hacking report-card system

A high school senior in Miami has been arrested on charges claiming he illegally accessed his school’s online report card system and changed grades for him and at least four other students, according to a published report. Jose Bautista, 18, appeared in court Friday, according to WFOR . He reportedly faces charges of intellectual property offense, modifying programs, and an offense against computer users. The student allegedly approached fellow students and asked if they wanted him to change their grades. The principal of Dr. Michael M. Krop Senior High School, the school Bautista attended, said the student gave a written confession detailing the hacking. Bautista’s bond was set at $20,000. He is under house arrest with a GPS monitor. It’s unclear if he will be allowed to graduate or if the other students involved will face any punishment. Read on Ars Technica | Comments

Read this article:
High School senior charged with hacking report-card system

Cox plans gigabit Internet for residential customers this year

Cox Communications President Pat Esser said the cable company will roll out gigabit broadband to residential customers this year. During an interview with Bloomberg yesterday , Esser said: Delivering gigabit speeds to business service customers has always been a high priority to us, and for years we’ve delivered gigabit broadband to commercial customers across the country. We’re working on our roadmap now around the residential side of the business to bring gigabit speeds to customers this year. I’m talking about plans over time for all of our customers in all of our markets having residential gigabit broadband speeds available to them, and we’re excited about it. Over the next two to three weeks we’ll be announcing which markets we’re starting in. Esser didn’t mention whether this would be a fiber-to-the-home service, but at another point he noted, “We have this very robust network, fiber very deep in the network.” Cox offers fiber-to-the-premises for business customers needing 1Gbps or 10Gbps throughput. Read 6 remaining paragraphs | Comments

View article:
Cox plans gigabit Internet for residential customers this year

Review: Gigabyte’s AMD Brix gives Intel’s mini PC a run for its money

Gigabyte’s AMD Brix (top) is, if anything, even smaller than Intel’s latest NUC (bottom). Andrew Cunningham When AMD sent us the Brix Gaming for review, it wasn’t alone in its box. We were also sent another, smaller Brix with an AMD processor, and it’s the antithesis of its big loud cousin. It’s basically the AMD take on the NUC : a small, quiet, unobtrusive little box that still tries to deliver the features and performance of a full-size entry-level desktop. We originally planned to review both in one shot, but there was so much to say about the Brix Gaming that the GB-BXA8-5545 (say that three times fast) got edged out. Rather than bury it, we’ve decided to give it its own evaluation. It’s the only AMD-powered desktop in the same size category as the NUC that doesn’t use a wimpy netbook-class processor. And as much as Intel’s integrated GPUs have improved in recent years, the name “AMD” still means something when it comes to graphics performance. Surprise, it’s a tiny cube! Like most other mini PCs, the Brix is a tiny box with a small external power supply. Andrew Cunningham Specs at a glance: Gigabyte Brix GB-BXA8-5545 OS Windows 8.1 x64 CPU 1.7GHz AMD A8-5545M, Turbo Boost up to 2.7GHz available with proper BIOS settings RAM 8GB 1333MHz DDR3 (supports up to 16GB) GPU AMD Radeon 8510G (integrated) HDD 128GB Crucial M500 mSATA SSD Networking 2.4GHz 802.11n Wi-Fi, Bluetooth 4.0, Gigabit Ethernet Ports 4x USB 3.0, 1x mini DisplayPort 1.2, 1x HDMI 1.4a, audio Size 4.24” x 4.5” x 1.18” (107.6 x 114.4 29.9 mm) Other perks Kensington lock, VESA mounting bracket Warranty 1 year Price $249.99 (barebones), $494.97 with listed components and software The other Brix boxes we’ve reviewed have been larger and more powerful machines, but the smaller Intel and AMD-based Brixes are a lot more like the original Intel NUC. This one’s a short, square little device that’s actually a little shorter than the NUC. It’s an understated all-black system with matte metal sides and a glossy plastic top, and while it has an external power brick it doesn’t add much to the total size of the package. With the adapters, it’s roughly the size you’d get with standard PC laptops and Ultrabooks, since the Brix uses low-voltage mobile parts rather than full-fledged desktop chips. Read 17 remaining paragraphs | Comments

View article:
Review: Gigabyte’s AMD Brix gives Intel’s mini PC a run for its money

Man uses Raspberry Pi to build actual working cell phone for $158

David Hunt Raspberry Pi-using tinkerer David Hunt—who previously built a bark-activated door opener for dogs—is at it again with a real, working cell phone powered by the tiny computer and a few other items. “PiPhone” cost Hunt $158 to build with these components, all held together with cable ties: Raspberry Pi Model B – $40 PiTFT Touchscreen 320×240 – $35 2500mAh LiPo battery – $15 SIM900 GSM/GPRS module – $48 DC-DC boost converter 3.3V – 5V 1A – $10 Cables, connectors, switch, etc. – $10 “As you can see from the cost of the components, you’d be FAR better off going into your local phone store and picking up a normal smartphone, but hey, where’s the fun in that?” Hunt wrote on his blog today . “I got a great kick out of the first phone call I made with this thing. And it won’t stay in one piece for long, I’ll be using those parts for other projects very soon!” Read 5 remaining paragraphs | Comments

Follow this link:
Man uses Raspberry Pi to build actual working cell phone for $158

“Russian Facebook” founder flees country after being forced out as CEO

Pavel Durov, founder and former CEO of Vkontakte. Pavel Durov/VK Pavel Durov, the founder of Vkontakte (VK)—the largest social network in Russia—said on Tuesday that he fled the country one day after being forced out of the company, claiming that he felt threatened by Kremlin officials. In a  post on his profile page on Monday, Durov explained that he was fired from his position as CEO of VK and that the so-called “Russian Facebook” is now “under the complete control” of two oligarchs close to President Vladimir Putin. Durov explained that after seven years of relative social media freedom in Russia, his refusal to share user data with Russian law enforcement has set him at odds with the Kremlin, which has recently been trying to tighten its grip on the Internet, according to The Moscow Times . Read 7 remaining paragraphs | Comments

Excerpt from:
“Russian Facebook” founder flees country after being forced out as CEO

75-year-old human cloned for the production of stem cells

sharyn morrow Several years ago, as the therapeutic potential of stem cells was first being recognized, the only way to create them was to harvest cells from an early embryo. That embryo could come from the large collection of those that weren’t used during in vitro fertilization work. But to get one that was genetically matched to the person who needed the therapy, researchers had to create an embryo that’s a genetic duplicate of that individual—meaning they had to clone them. With the development of induced stem cells, work on this approach largely fell by the wayside—induced cells were easier to create and came without the ethical baggage. But there are some lingering doubts that the induced cells are truly as flexible as the ones derived from an embryo, leading a number of labs to continue exploring cloning for therapeutic purposes. Now, a collaboration of US and Korean researchers have succeeded in creating early embryos from two adult humans and converted the embryos to embryonic stem cells. The method used is called somatic cell nuclear transplant. It involves taking an unfertilized egg and removing its nucleus, thereby deleting the DNA of the egg donor. At the same time, a nucleus from the cell of a donor is carefully removed and injected into the egg. After some time, during which the environment of the egg resets the developmental status of the donor’s DNA, cell division is activated. If the process is successful, the end result is a small cluster of cells that starts along the path of forming an embryo. Read 5 remaining paragraphs | Comments

Continued here:
75-year-old human cloned for the production of stem cells

All sent and and received e-mails in Gmail will be analyzed, says Google

Google  added a paragraph to its terms of service as of Monday to tell customers that, yes, it does scan e-mail content for advertising and customized search results, among other reasons. The change comes as Google undergoes a lawsuit over its e-mail scanning, with the plaintiffs complaining that Google violated their privacy. E-mail users brought the lawsuit against Google in 2013, alleging that the company was violating wiretapping laws by scanning the content of e-mails. The plaintiffs are varied in their complaints, but some of the cases include people who sent their e-mails to Gmail users from non-Gmail accounts and nonetheless had their content scanned. They argue that since they didn’t use Gmail, they didn’t consent to the scanning. US District Judge Lucy Koh refused Google’s motion to dismiss the case in September. Koh also denied the plaintiffs class-action status in March on the grounds that the ways that Google might have notified the various parties of its e-mail scanning are too varied, and she could not decide the case with a single judgment. Read 2 remaining paragraphs | Comments

Read More:
All sent and and received e-mails in Gmail will be analyzed, says Google