Apple blames days-long Developer Center outage on “intruder”

Apple Since Thursday, registered Apple developers trying to download OS X 10.9, iOS 7, or any other Apple software from the company’s developer portal have been greeted with a notice that the site was down for “maintenance.” Today, the company issued a brief statement (above) blaming the extended outage on an “intruder, ” and that Apple “[has] not been able to rule out the possibility that some developers’ names, mailing addresses, and/or email addresses may have been accessed.” The notice says that “sensitive” information could not be accessed by the intruder because it was encrypted, and the company told MacWorld that the system in question is not used to store “customer information, ” application code, or data stored by applications. Anecdotal reports (including one from our own Jacqui Cheng ) point to a sudden spike in password reset requests for some Apple IDs, suggesting that email addresses have in fact been accessed and distributed but that passwords were not. In any case, we generally recommend that users change their passwords when any breach (or suspected breach) like this one occurs. “In order to prevent a security threat like this from happening again, we’re completely overhauling our developer systems, updating our server software, and rebuilding our entire database, ” the statement said. Apple has also given week-long extensions to any developers’ whose program subscriptions were scheduled to lapse during the outage, which will keep those developers’ applications from being delisted in Apple’s various App Stores. Read on Ars Technica | Comments        

View article:
Apple blames days-long Developer Center outage on “intruder”

The cops are tracking my car—and yours

Aurich Lawson OAKLAND, CA—The last time the Oakland Police Department (OPD) saw me was on May 6, 2013 at 6:38:25pm. My car was at the corner of Mandana Blvd. and Grand Ave. , just blocks away from the apartment that my wife and I moved out of about a month earlier. It’s an intersection I drive through fairly frequently even now, and the OPD’s own license plate reader (LPR) data bears that out. One of its LPRs—Unit 1825—captured my car passing through that intersection twice between late April 2013 and early May 2013. I have no criminal record, have committed no crime, and am not (as far as I know) under investigation by the OPD or any law enforcement agency. Since I first moved to Oakland in 2005, I’ve been pulled over by the OPD exactly once—for accidentally not making a complete stop while making a right-hand turn at a red light—four years ago. Nevertheless, the OPD’s LPR system captured my car 13 times between April 29, 2012 and May 6, 2013 at various points around the city, and it retained that data. My car is neither wanted nor stolen. The OPD has no warrant on me, no probable cause, and no reasonable suspicion of wrongdoing, yet it watches where I go. Is that a problem? Read 73 remaining paragraphs | Comments        

Read More:
The cops are tracking my car—and yours

UK gov’t approves autonomous cars on public roads before year’s end

The British government has announced that it will approve testing of driverless cars on public roads in the United Kingdom before the end of 2013. According to a new 80-page report published on Tuesday entitled “Action for Roads: A network for the 21st century, ” a team at Oxford University and Nissan have already begun work but have only been testing in private areas. The plan comes less than a year after Florida , California , and Nevada have approved similar testing. Michigan is not far behind, either. Read 3 remaining paragraphs | Comments        

Originally posted here:
UK gov’t approves autonomous cars on public roads before year’s end

Virtualization startup puts desktop apps seamlessly in the cloud

For software developers, cloud services solve all sorts of problems. They make it easy to ensure license compliance, they keep customers running up-to-date software, and they skip the need for downloads and installations. But cloud services also have their issues. It’s hard for cloud services to take advantage of local compute resources such as fast CPUs and powerful GPUs. A compute-intensive cloud service will need to buy a lot of computation. They also lack the vast array of rich, complex desktop applications that already exist. Starting today, a startup is aiming to create the best of both worlds with a cloud offering it’s describing as “Native as a service.” Numecent claims that it can take almost any desktop application and convert it into a cloud offering within a few hours. The software is delivered to end-user PCs using Numecent’s “cloudpaging” technology , which downloads applications on a piecemeal, as-needed basis. The downloaded portions of the application are retained client-side in an encrypted store. This enables Numecent to also enforce license conditions and prevent piracy. Read 4 remaining paragraphs | Comments        

Read the original:
Virtualization startup puts desktop apps seamlessly in the cloud

Female scammer who taunted US authorities online finally caught in Mexico

A Southern California woman who mocked American authorities via Twitter—after having fled the country—was finally arraigned on Monday in a San Diego courtroom. Wanda Lee Ann Podgurski, 60, was arrested in Rosarito, Mexico on July 4, 2013. This was a month after she tweeted “ Catch me if you can , ” seemingly directed at San Diego District Attorney Bonnie Dumanis , apparently the only person Podgurski followed on Twitter at the time. A superior court judge sentenced Podgurski in absentia on June 21, 2013 to 20 years and four months in state prison. She was  convicted (PDF) of 29 felony counts stemming from an insurance fraud scam. Podgurski worked as a clerk for Amtrak and held health insurance policies with six different companies, then she filed claims with all of them after she declared that she was disabled from supposed fall in her home in August 2006. Read 5 remaining paragraphs | Comments

See the article here:
Female scammer who taunted US authorities online finally caught in Mexico

Optical transistor switches states by trapping a single photon

NIST Optical connections are slowly replacing wires as a means of shuffling bits in between systems—there are already plans afoot to have different components within a single system communicate via an optical connection. But, so far at least, all the processing of those bits is taking place using electrons. Yesterday’s edition of Science includes a demonstration of an all-optical transistor that can be switched between its on and off states using a single photon. Although it’s an impressive demonstration of physics, the work also indicates that we’re likely to stick with electrons for a while, given that the transistor required two lasers and a cloud of a cold atomic gas. The work relied on a cold gas of cesium atoms. These atoms have an extremely convenient property: two closely separated ground states, each with a corresponding excited state. All of these states are separated by an energy that corresponds to a specific wavelength of light, so using a laser of that wavelength allows you to shift the system into a different state. Read 9 remaining paragraphs | Comments

Read More:
Optical transistor switches states by trapping a single photon

Windows 8 vaults past Vista, IE10 continues to surge

Net Market Share Windows 8 passed a milestone of sorts in June, passing Windows Vista’s market share to become the third-most used version of Windows on the Internet. Internet Explorer 10 continued to show strong growth too, fueled this time by automatic updating. Google Chrome put in a strong performance, offsetting losses made earlier in the year. Its growth was to the detriment of Mozilla’s Firefox, which fell significantly. Net Market Share Net Market Share Microsoft’s browser made a slight gain, up 0.16 points to 56.15 percent (a two year high). Firefox was down 1.48 points to 19.15 percent—the lowest share the open source browser has seen for more than two years. Chrome rose 1.43 points to a 17.17 percent share. Safari was more or less unchanged, up 0.09 points to 5.55 percent. Opera lost 0.19 points for a share of 1.58 percent, a level not seen since August last year. Read 8 remaining paragraphs | Comments

See original article:
Windows 8 vaults past Vista, IE10 continues to surge

Password complexity rules more annoying, less effective than lengthy ones

Few Internet frustrations are so familiar as the password restriction . After creating a few (dozen) logins for all our Web presences, the use of symbols, mixed cases, and numbers seems less like a security measure and more like a torture device when it comes to remembering a complex password on a little-used site. But at least that variety of characters keeps you safe, right? As it turns out, there is some contrary research that supports both how frustrating these restrictions are and suggests it’s possible that the positive effect of complexity rules on security may not be as great as long length requirements. Let’s preface this with a reminder: the conventional wisdom is that complexity trumps length every time, and this notion is overwhelmingly true. Every security expert will tell you that “Supercalifragilistic” is less secure than “gj7B!!!bhrdc.” Few password creation schemes will render any password uncrackable, but in general, length does less to guard against crackability than complexity. A password is not immune from cracking simply by virtue of being long—44,991 passwords recovered from a dump of LinkedIn hashes last year were 16 characters or more. The research we describe below refers specifically to the effects of restrictions placed by administrators on password construction on their crackability. By no means does it suggest that a long password is, by default, more secure than a complex one. Read 13 remaining paragraphs | Comments

Continue reading here:
Password complexity rules more annoying, less effective than lengthy ones

Attackers sign malware using crypto certificate stolen from Opera Software

Alan Cleaver Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker. The attack was uncovered, halted, and contained on June 19, according to a short advisory  that Opera published Wednesday morning. While administrators have cleaned the system and have yet to find any evidence of any user data being compromised, the breach still had some troubling consequences. “The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware,” Wednesday’s advisory stated. “This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software or appears to be the Opera browser. It is possible that a few thousand Windows users, who were using Opera between June 19 from 1.00 and 1.36 UTC , may automatically have received and installed the malicious software.” Read 3 remaining paragraphs | Comments

Original post:
Attackers sign malware using crypto certificate stolen from Opera Software