Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
MetalliQaZ writes Verizon Wireless was scheduled to begin throttling certain LTE users today as part of an expanded "network optimization" program, but has decided not to follow through with the controversial plan after criticism from Federal Communications Commission Chairman Tom Wheeler. All major carriers throttle certain users when cell sites get too congested, but Wheeler and consumer advocates objected to how carriers choose which customers to throttle. The fact that Verizon was throttling only unlimited data users showed that it was trying to boost its profits rather than implementing a reasonable network management strategy, Wheeler said.
17 comments | 3 hours ago
First time accepted submitter Kexel writes Security researchers have claimed to discover the first Apple iOS Trojan attack in a move to thwart the communications of pro-democracy Hong Kong activists. From the article: "The malicious software, known as Xsser, is capable of stealing text messages, photos, call logs, passwords and other data from Apple mobile devices, researchers with Lacoon Mobile Security said on Tuesday. They uncovered the spyware while investigating similar malware for Google Inc's Android operating system last week that also targeted Hong Kong protesters. Anonymous attackers spread the Android spyware via WhatsApp, sending malicious links to download the program, according to Lacoon. It is unclear how iOS devices get infected with Xsser, which is not disguised as an app."
60 comments | 7 hours ago
nbauman writes: Doctors with one medical records system can't exchange information with systems made by other vendors, including those at their own hospitals, according to the New York Times. One ophthalmologist spent half a million dollars on a system, but still needs to send faxes to get the information where it needs to go. The largest vendor is Epic Systems, Madison, WI, which holds almost half the medical records in the U.S. A report from RAND described Epic as a "closed" platform that made it "challenging and costly" for hospitals to interconnect.
The situation is bad for patients and costly for medical works: if doctors can't exchange records, they'll face a 1% Medicare penalty, and UC Davis alone has a staff of 22 dedicated to communication. On top of that, Epic charges a fee to send data to some non-Epic systems. Congress has held hearings on the matter, and Epic has hired a lobbyist. Epic's founder, billionaire computer science major Judith Faulkner, said that Epic was one of the first to establish code and standards for secure interchange, which included user authentication provisions and a legally binding contract. She said the federal government, which gave $24 billion in incentive payments to doctors for computerization, should have done that. The Office of the National Coordinator for Health Information Technology said that it was a "top priority" and just recently wrote a 10-year vision statement and agenda for it.
215 comments | 9 hours ago
sandbagger writes: " ...it is often the case that one can be led astray by relying on the generic or commonly understood definition of a particular word." That quote apparently applies to words offering constitutional protections against unreasonable search and seizure. TechDirt looks at the redefinition of the term "collection" as redefined by Executive Order 12333 to allow basically every information dragnet, provided no-one looks at it. "Collection" is now defined as "collection plus action." According to this document, it still isn't collected, even if it has been gathered, packaged and sent to a "supervisory authority." No collection happens until examination. It's Schrodinger's data, neither collected nor uncollected until the "box" has been opened. This leads to the question of aging off collected data/communications: if certain (non) collections haven't been examined at the end of the 5-year storage limit, are they allowed to be retained simply because they haven't officially been collected yet? Does the timer start when the "box" is opened or when the "box" is filled?
113 comments | yesterday
Today the Federal Communications Commission eliminated its sport blackout rules, which prevented cable and satellite television providers from showing sporting events that were blacked out on a local station. It's common practice in the NFL to black out football games locally if the stadium didn't sell enough tickets. The ruling now removes government protections for the NFL's policies (the NFL can continue to black out local broadcasts). The FCC's decision is based on "significant changes" to the industry over the 40 years since the rules were adopted. Television has replaced ticket sales as the primary source of revenue, and the NFL is incredibly popular. They also don't think there's any chance the NFL will move its games to pay-per-view.
131 comments | yesterday
An anonymous reader sends this excerpt from MIT's Technology Review: A new feature being added to the LTE protocol that smartphones use to communicate with cellular towers will make it possible to bypass those towers altogether. Phones will be able to "talk" directly to other mobile devices and to beacons located in shops and other businesses. Known as LTE Direct, the wireless technology has a range of up to 500 meters, far more than either Wi-Fi or Bluetooth. It is included in update to the LTE standard slated for approval this year, and devices capable of LTE Direct could appear as soon as late 2015. ... Researchers are, for example, testing LTE Direct as a way to allow smartphones to automatically discover nearby people, businesses, and other information.
150 comments | 2 days ago
An anonymous reader writes: U.S. authorities have arrested and indicted the CEO of a mobile software company for selling spyware that enables "stalkers and domestic abusers." The U.S. Department of Justice accuses the man of promoting and selling software that can "monitor calls, texts, videos and other communications on mobile phones without detection." The agency pointed out this is the first criminal case based on mobile spyware, and promised to aggressively pursue makers of similar software in the future. Here's the legal filing (PDF). The FBI, with approval from a District Court, has disabled the website hosting the software.
"The indictment alleges that StealthGenie's capabilities included the following: it recorded all incoming/outgoing voice calls; it intercepted calls on the phone to be monitored while they take place; it allowed the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius; and it allowed the purchaser to monitor the user's incoming and outgoing e-mail messages and SMS messages, incoming voicemail messages, address book, calendar, photographs, and videos. All of these functions were enabled without the knowledge of the user of the phone."
194 comments | 2 days ago
CowboyRobot writes: HTTPS has evolved into the de facto standard for secure Web browsing. Through the certificate-based authentication protocol, Web services and Internet users first authenticate one another ("shake hands") using a TLS/SSL certificate, encrypt Web communications end-to-end, and show a padlock in the browser to signal that a communication is secure. In recent years, HTTPS has become an essential technology to protect social, political, and economic activities online. At the same time, widely reported security incidents (such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed) have exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations (notably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale) have driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology.
185 comments | 5 days ago
An anonymous reader writes Back in 2012, Google had made it mandatory for new Gmail users to simultaneously create Google+ (G+) accounts. This is no longer so. Following the departure of G+ founder Vic Gundotra in April 2014, Google has been quietly decoupling its social media site from its other services. First, YouTube was freed, then Google+ Photos. Now, anyone who wants to create a new Gmail account unencumbered with a G+ profile can also do so.
137 comments | about a week ago
wabrandsma writes with this excerpt from Wired: John Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata—the "to" and "from" headers and IP addresses spy agencies use to identify and track communications—long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he'd made Ricochet's code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.
Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists's sources and others.
49 comments | about two weeks ago
504 comments | about two weeks ago
HughPickens.com writes The Intercept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden's revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden's leaks about the NSA's surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF)." In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.
Earlier this month former NSA head Michael Hayden stated, "The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups", while Matthew Olsen of the National Counterterrorism Center would add "Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance." Snowden's critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia's invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."
183 comments | about two weeks ago
itwbennett writes The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks.
13 comments | about two weeks ago
concertina226 writes Scientists from three international universities have succeeded in twisting radio beams in order to transfer data at the speed of 32 gigabits per second, which is 30 times faster than 4G LTE wireless technology in use today. The researchers, led by Alan Willner, an electrical engineering professor with the University of Southern California Viterbi School of Engineering, successfully demonstrated data transmission rates of 32 gigabits per second across 2.5m of free space in a basement laboratory.
122 comments | about two weeks ago
Apple CEO Tim Cook insists that Apple doesn't read -- in fact, says Cook, cannot read -- user's emails, and that the company's iCloud service wasn't hacked. ZDNet presents highlights from Cook's lengthy, two-part interview with Charlie Rose. One selection of particular interest: Apple previously said that even it can't access iMessage and FaceTime communications, stating that such messages and calls are not held in an "identifiable form." [Cook] claimed if the government "laid a subpoena," then Apple "can't provide it." He said, bluntly: "We don't have a key... the door is closed." He reiterated previous comments, whereby Apple has said it is not in the business of collecting people's data. He said: "When we design a new service, we try not to collect data. We're not reading your email." Cook went on to talk about PRISM in more detail, following the lead from every other technology company implicated by those now-infamous PowerPoint slides.
191 comments | about two weeks ago
Rambo Tribble (1273454) writes "Programmers at Fast Company are developing the Cosmos browser to allow text browsing from Android phones when networks are buckling under the load of local disasters. A common phenomenon when disaster strikes is the overloading of cell and data networks by massively increased traffic. The Cosmos browser is intended to facilitate using SMS text messages, which often still get through in such circumstances. To quote one developer, "We want this to be a way for people to get information when they're in dire need of it." Sort of a Lynx comes to Android affair. The Smithsonian contemplates the possibilities, here."
40 comments | about two weeks ago
stephendavion writes A 16-year-old from India has designed a device that converts breath into speech. High-school student Arsh Shah Dilbagi invented TALK as a portable and affordable way to aid people suffering from ALS, locked-in syndrome, and anyone else speech-impaired or paralyzed. Prototyped using a basic $25 Arduino microcontroller, Dilbagi's invention costs only $80, or about a hundred times less than the sort of Augmentative and Alternative Communication device used by Stephen Hawking. TALK works by translating breath into electric signals using a MEMS Microphone, an advanced form of listening tech that uses a diaphragm etched directly onto a silicon microchip. The user is expected to be able to give two distinguishable exhales, varying in intensity or time, so that they can spell words out using Morse code.
67 comments | about two weeks ago
blottsie writes After months of heated debate, viral campaigns, deliberate "slowdowns" and record-breaking public responses, the Federal Communications Commission is finally set to decide how "net neutrality"—the principle that all data must be treated equally by Internet service providers (ISPs)—should look in the U.S., or if it should exist at all. Today, Sept. 15, the FCC officially closes its public comment period on its latest net neutrality proposal. The plan enables ISPs to discriminate against certain types of data, in certain circumstances, by charging extra for broadband “fast lanes” between content providers—like Netflix or YouTube—and users.
131 comments | about two weeks ago
dcblogs writes "In Boyers, Pa., a recently opened 2,000-sq.-ft. data center has been purpose-built to protect against an electromagnetic pulse (EMP), either generated by a solar storm or a nuclear event. The company that built the facility isn't disclosing exactly how the data center was constructed or what materials were used. But broadly, it did say that the structure has an inner skin and an outer skin that use a combination of thicknesses and metals to provide EMP protection. Betting against an EMP event is a gamble. In 1859, the so-called Carrington solar storm lit the night skies and disrupted the only telegraph communications. William Murtagh, program coordinator at U.S. Space Weather Prediction Center, said there is ongoing concern that the earth may see an solar storm that could impact electronics on the ground. "We're concerned that can happen," A 2012 solar storm, that missed the earth, "was very powerful, and some have suggested it would have been on par with a Carrington-level event." One researcher put the odds of a catastrophic solar storm by 2020 as one in eight.
59 comments | about two weeks ago
An anonymous reader writes The Chinese city of Chongqing has created a smartphone sidewalk lane, offering a path for those too caught up in messaging and tweeting to watch where they're going. "There are lots of elderly people and children in our street, and walking with your cell phone may cause unnecessary collisions here," said Nong Cheng, a spokeswoman for the district's property management company. However, she clarified that the initiative was meant to be a satirical way to highlight the dangers of texting and walking.
46 comments | about two weeks ago