Chrome to end support for Windows XP, Vista, and OS X 10.8 on April 2016

If you’re on an older operating system, your Chrome could stop getting updates in just a few months. Google’s official Chrome Blog announced it will be ending support for Windows XP, Windows Vista, and Mac OS X 10.6, 10.7, and 10.8 in April 2016. Browsers on those operating systems will continue to work, but they will stop getting updates from Google. For Windows XP, this is yet another stay of execution from Google, mirroring Microsoft’s continually extended support for the OS that just won’t die. Chrome support for XP was originally stated to end along with Microsoft’s in April 2014. Google then extended that to ” at least April 2015 ,” then all of 2015 , and now it’s going to hang around for the next five months. On the Mac side of things, Apple usually supports its three newest operating systems. So official support for 10.8 ended when 10.11 El Capitan was released, and 10.6 and 10.7 have long been put to rest by Apple. Read 2 remaining paragraphs | Comments

See the original article here:
Chrome to end support for Windows XP, Vista, and OS X 10.8 on April 2016

AT&T expands gigabit fiber to 23 cities starting at $70 (or $110)

AT&T’s updated GigaPower coverage map. (credit: AT&T ) AT&T yesterday announced expansions of its gigabit fiber Internet service into parts of 23 cities and towns. The new markets are mostly in the suburbs of big cities where AT&T already offered its fastest broadband. For example, AT&T previously brought its “U-verse with GigaPower” service to Atlanta, Chicago, Houston, Miami, Nashville, and Orlando. The expansion this week brings the service into a bunch of cities and towns within the larger metro areas. Pricing for the Internet-only 1Gbps package is either $70 a month or $110 a month, depending on where you live. As we’ve reported previously, AT&T tends to match Google Fiber’s $70 pricing , but not in areas where Google isn’t offering service. Besides that, AT&T’s lowest price in each city requires customers to opt into “Internet Preferences ,” which gives the company permission to examine each customer’s Web traffic in order to serve personalized ads. Read 4 remaining paragraphs | Comments

Continue reading here:
AT&T expands gigabit fiber to 23 cities starting at $70 (or $110)

First-of-its-kind gene-edited cells treat baby’s leukemia

(credit: Sharon Lees/Great Ormond Street Hospital ) With genetic tweaks and snips, researchers created cancer-busting immune cells that, so far, seem to have wiped out a life-threatening form of leukemia in a one-year-old girl. The new cells are one-size-fits-all, beating out earlier cell-based cancer therapies that required custom engineering of each patient’s own immune cells. If proven effective in more trials, the new, generic cells could offer an easy, off-the-shelf treatment for life-threatening forms of leukemia. “It is something we’ve been waiting for,”  said Stephan Grupp, a professor of pediatrics at the University of Pennsylvania, who was not involved with the research. Previous methods requiring engineering cells, specifically T cells, from every single patient could be slow, costly, and impossible in some patients with low T cell counts. “The innovation here is gene-editing T cells so that one person’s T cells could be given to another even if they are not a donor match,” he said in a statement. Read 5 remaining paragraphs | Comments

Continued here:
First-of-its-kind gene-edited cells treat baby’s leukemia

Vast, uncharted viral world discovered on human skin

A transmission electron microscopy image of a bunch of bacteriophages. (credit: ZEISS Microscopy/Flickr ) In the microbial metropolises that thrive in and on the human body, underground networks of viruses loom large. A closer look at human skin has found that it’s teeming with viruses, most of which don’t target us but infect the microbes that live there. Almost 95 percent of those skin-dwelling virus communities are unclassified, researchers report in mBio . Those unknown viruses may prune, manipulate, and hide out in the skin’s bacterial communities, which in turn can make the difference between human health and disease. The finding highlights how much scientists still have to learn about the microscopic affairs that steer human welfare. Past attempts to unmask the viruses on the human body have been hindered by technical difficulties. Viral genomes are much smaller than those of bacteria, making them hard to identify and sift from contamination. In the new study, researchers at the University of Pennsylvania used an advanced method to specifically isolate the DNA of virus-like particles from skin swabs. The researchers also screened viral DNA found on swabs that never touched human skin, allowing them to quickly identify and toss contaminating viruses from their analysis. Read 5 remaining paragraphs | Comments

Read More:
Vast, uncharted viral world discovered on human skin

How to use Tor Messenger, the most secure chat program around

(credit: Samuel Huron ) On Thursday, the Tor Project released its first public beta of Tor Messenger , an easy-to-use, unified chat app that has security and cryptography baked in. If you care about digital security, you should ditch whatever chat program you’re using and switch to it right now. The app is specifically designed to protect location and routing information ( by using Tor ) and chat data in transit (by using the open source Off-The-Record, or OTR, protocol ). For anyone who has used a similar app (like Pidgin or Adium), Tor Messenger’s interface will be fairly self-explanatory, but there are two notable quirks. First, by default, it will not allow you to send messages to someone who doesn’t support OTR—but there is an option to disable that feature. (We’ll get to that in a minute.) Second, unlike Pidgin or Adium, Tor Messenger cannot log chats, which is handy if you’re privacy-minded. Read 17 remaining paragraphs | Comments

Read the article:
How to use Tor Messenger, the most secure chat program around

Report: iPad Pro, Smart Keyboard, and Apple Pencil go on sale November 11

Enlarge / The iPad Pro and its Smart Keyboard. (credit: Andrew Cunningham) According to a report by the usually reliable 9to5Mac, Apple’s new iPad Pro is slated to go on sale on Wednesday, November 11. The tablet (as well as its Smart Keyboard and Apple Pencil accessories) will supposedly be available both on Apple’s online store and in retail stores, so this appears to be the actual launch day and not just a pre-order date. The new iPad looks a lot like an iPad Air 2, but it has a larger 12.9-inch 2732×2048 screen, a new Apple A9X SoC, and 4GB of RAM . Between the better specs, the larger screen, and the accessories, Apple obviously intends the iPad Pro to be a more Mac-like iPad, in much the same way that the Retina MacBook is a more iPad-ish Mac. The iPad Pro starts at $799 for a 32GB Wi-Fi version, or you can pay $949 for a 128GB Wi-Fi version. Adding LTE to the 128GB version raises the cost to $1,079. The Smart Keyboard is an additional $169, and the Apple Pencil is $99. Read 1 remaining paragraphs | Comments

Read More:
Report: iPad Pro, Smart Keyboard, and Apple Pencil go on sale November 11

Windows 10 will be made an automatic “recommended” update early next year

The Windows 10 free upgrade program has so far concentrated on those Windows 7 and 8 users who reserved their copy in the weeks leading up to the operating system’s release. Over the coming months, Microsoft will start to spread the operating system to a wider audience . The Windows 10 upgrade will soon be posted as an “Optional Update” in Windows Update, advertising it to anyone who examines that list of updates. Then, early next year, it will be categorized as a “Recommended Update.” This is significant, because it means that systems that are configured to download and install recommended updates—which for most people is the safest option—will automatically fetch the upgrade and start its installer. The installer will still require human intervention to actually complete—you won’t wake up to find your PC with a different operating system—but Windows users will no longer need to actively seek the upgrade. This mirrors an accidental change that Microsoft did earlier this month. The Windows 10 upgrade was showing up for some people as a recommended update and the installer started automatically. Read 3 remaining paragraphs | Comments

View post:
Windows 10 will be made an automatic “recommended” update early next year

Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations

Enlarge (credit: Shaik, et al. ) Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks , a feat that shatters widely held perceptions that it’s immune to the types of attacks that targeted earlier specifications. The attacks target the LTE specification , which is expected to have a user base of about 1.37 billion people by the end of the year. They require about $1,400 worth of hardware that run freely available open-source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that’s almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting. The researchers have devised a separate class of attacks that causes phones to lose connections to LTE networks, a scenario that could be exploited to silently downgrade devices to the less secure 2G and 3G mobile specifications. The 2G, or GSM, protocol has long been known to be susceptible to man-in-the-middle attacks using a form of fake base station known as an IMSI catcher  (like the Stingray). 2G networks are also vulnerable to attacks that reveal a phone’s location within about 0.6 square mile . 3G phones suffer from a similar tracking flaw . The new attacks, described in a research paper published Monday, are believed to be the first to target LTE networks, which have been widely viewed as more secure than their predecessors. Read 12 remaining paragraphs | Comments

See original article:
Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations

US regulators grant DMCA exemption legalizing vehicle software tinkering

(credit: Jerk Alert Productions ) Every three years, the Librarian of Congress issues new rules on Digital Millennium Copyright Act exemptions. Acting Librarian David Mao, in an order (PDF) released Thursday, authorized the public to tinker with software in vehicles for “good faith security research” and for “lawful modification.” The decision comes in the wake of the Volkswagen scandal, in which the German automaker baked bogus code into its software that enabled the automaker’s diesel vehicles to reduce pollutants below acceptable levels during emissions tests. “I am glad they granted these exemptions,” Sherwin Siy, said vice president for legal affairs for Public Knowledge in Washington, DC. “I am not glad it was necessary for them to do so in the first place.” Read 2 remaining paragraphs | Comments

Read More:
US regulators grant DMCA exemption legalizing vehicle software tinkering

Joomla bug puts millions of websites at risk of remote takeover hacks

Enlarge / Here’s the control panel hackers can access by exploiting a just-patched Joomla vulnerability. (credit: Spiderlabs) Millions of websites used in e-commerce and other sensitive industries are vulnerable to remote take-over hacks made possible by a critical vulnerability that has affected the Joomla content management system for almost two years. The SQL-injection vulnerability was patched by Joomla on Thursday with the release of version 3.4.5 . The vulnerability, which allows attackers to execute malicious code on servers running Joomla, was first introduced in version 3.2 released in early November 2013. Joomla is used by an estimated 2.8 million websites. “Because the vulnerability is found in a core module that doesn’t require any extensions, all websites that use Joomla versions 3.2 and above are vulnerable,” Asaf Orpani, a researcher inside Trustwave’s Spiderlabs, wrote in a blog post  (the post appears to be offline at the moment, but it was working through most of Friday morning). The vulnerability, and two closely related security flaws, have been cataloged as CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858. Read 4 remaining paragraphs | Comments

Original post:
Joomla bug puts millions of websites at risk of remote takeover hacks