Open Source

Scientist Shrinks Arduino To Size Of An AA Battery (techcrunch.com) 47

An anonymous reader writes: Johan Kanflo has managed to make the already small Tiny328 Arduino clone into an even smaller computing platform about the size of a single AA battery. Not only will it fit in a typical AA battery holder, but it will actually draw power from the batteries beside it as it's wired in "backwards" (with the + and - poles reversed). The Arduino platform consists of open-source hardware, open-source software, and microcontroller-based kits, making it easy to (re)program the processors, and develop software for hardware applications using a java-clone and an easy-to-learn IDE. For those interested in the AAduino, Johan has made his creation available online on Github with instructions and schematics to build your own.
Botnet

Security Firm Discovers Secret Plan To Hack Numerous Websites and Forums (softpedia.com) 29

An anonymous reader writes: According to Softpedia, "Security researchers from SurfWatch Labs have shut down a secret plan to hack and infect hundreds or possibly thousands of forums and websites hosted on the infrastructure of Invision Power Services, makers of the IP.Board forum platform." The man behind this plan was a hacker known as AlphaLeon, maker of the Thanatos malware-as-a-service platform. AlphaLeon hacked IP.Board's customer hosting platform, and was planning to place an exploit kit that would infect the visitors to these websites with his Thanatos trojan, in order to grow his botnet. Some of the companies using IP.Board-hosted forums include Evernote, the NHL, the Warner Music Group, and Bethesda Softworks (Elder Scrolls, Fallout, Wolfenstein, Doom games).
Encryption

FBI Tells Congress It Needs Hackers To Keep Up With Tech Company Encryption (buzzfeed.com) 103

An anonymous reader quotes a report from BuzzFeed: A high ranking technology official with the FBI told members of Congress Tuesday that the agency is incapable of cracking locked phones and devices on its own, even with additional resources. Amy Hess, the agency's executive assistant director for science and technology told a panel of the House Energy and Commerce Committee that encrypted communications continue to pose a challenge to the American law enforcement, and to the safety of the American public. But when asked by lawmakers to provide a practical solution beyond the FBI's talking points, she said that the cooperation of technology companies would be necessary. According to the New York Times, "The FBI defended its hiring of a third-party company to break into an iPhone used by a gunman in last year's San Bernardino, Calif., mass shooting, telling some lawmakers on Tuesday that it needed to join with partners in the rarefied world of for-profit hackers as technology companies increasingly resist their demands for consumer information." They are stressing the importance of cooperation with tech companies and "third parties" to help fight terrorism, claiming they do not have the capabilities and resources available to crack encrypted devices. Congress is currently debating potential legislation on encryption.
Encryption

Viber Update Brings End-To-End Encryption and Hidden Chats (gsmarena.com) 39

An anonymous reader writes: The new hip thing to do if you're a developer of a messaging app is to encrypt everyone's messages -- everyone's doing it! WhatsApp announced earlier this month all messages being sent through the service will now be end-to-end encrypted. Today, Viber has announcd it is doing something similar. All messages being sent through the latest version of the app will be end-to-end encrypted. To confirm messages are being encrypted, a padlock icon will appear in the chat UI. The latest version of the app is already available in the iOS App Store and Android Google Play Store. Viber is one of the largest messaging platforms with over 700 million users. Hidden chats can also be found in the new update. Users can hide select chats with people and access/display them with a PIN or Touch ID.
Desktops (Apple)

Rogue Source Code Repos Can Compromise Mac Security Due To Old Git Version (softpedia.com) 184

An anonymous reader writes: Recent Mac versions come bundled with a very old version of Git (2.6.4) that is vulnerable to two security flaws that allow attackers to execute code on the device when the user forks a Git repo holding "malicious" code. The problem is that users can't upgrade this Git repo, they can't change its runtime permissions, nor can they remove it because Apple blocks even root users from twiddling with some system-level programs. "If you rely on machines like this, I am truly sorry. I feel for you," the researcher wrote on her blog. "I wrote this post in an attempt to goad them [Apple] into action because this is affecting lots of people who are important to me. They are basically screwed until Apple deigns to deliver a patched git unto them."
Android

Google's Android N OS Will Support Pressure-Sensitive Screens (theverge.com) 68

An anonymous reader writes: In the latest Developer Preview 2 of Android N, Google introduced new "Launcher shortcuts" to the beta OS. It allows developers to "define shortcuts which users can expose in the launcher to help them perform actions quicker." It's reminiscent of Apple's "3D Touch" feature found in the iPhone 6s and iPhone 6s Plus, which can allow for specific parts of an app to be displayed in a pop-up menu when users forcefully press on an icon or other miscellaneous piece of information developed with the feature.

As mentioned in Phandroid's report testing the "setDynamicShortcuts(List)" feature, Google offered four different scenarios where Launcher Shortcuts make sense: Navigating users to a particular location in a mapping app, sending messages to a friend in a communication app, playing the next episode of a TV show in a media app, or loading the last save point in a gaming app.

"Google says that the manufacturers who build Android devices wanted this use case addressed by the OS itself," according to The Verge, so that developers "can code for all Android devices instead of reinventing the pressure-sensitive wheel for each OEM."
Communications

New Full Duplex Radio Chip Transmits and Receives Wireless Signals At Once (ieee.org) 33

Wave723 writes: A new chip by Columbia University researchers uses a circulator made of silicon transistors to reroute signals and avoid interference from a transmitter and receiver that share the same antenna. This technology instantly doubles data capacity and could eventually be built into smartphones and tablets. The chip enables them to work around the principle of Lorentz Reciprocity, in which electromagnetic waves are thought to always travel along the same path both forward and backward. Traditionally, electronic devices required two antennas -- a transmitter and receiver -- that took turns or operated on different frequencies in order to exchange signals.
Bug

MIT Bug Finder Uncovers Flaws In Web Apps In 64 Seconds (csoonline.com) 24

itwbennett quotes a report from CSO: A new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones, writes Katherine Noyes. In tests on 50 popular web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took no more than 64 seconds to analyze any given program. Ruby on Rails is distinguished from other frameworks because it defines even its most basic operations in libraries. MIT's researchers took advantage of that fact by rewriting those libraries so that the operations defined in them describe their own behavior in a logical language.
Cloud

Ubuntu Linux Continues To Dominate OpenStack and Other Clouds (zdnet.com) 23

An anonymous reader quotes a report from ZDNet: One reason Ubuntu is increasing its lead is that Jujo, Canonical's application modeling and deployment DevOps tool, has been gaining in popularity. In the latest OpenStack user survey, we see that OpenStack is finally gaining real momentum in private clouds. We also see that Ubuntu Linux is continuing to dominate OpenStack. As Canonical cloud marketing manager Bill Bauman said, "Ubuntu OpenStack continues to dominate the majority of deployments with 55 percent of production OpenStack clouds. The previous survey showed Ubuntu OpenStack at 33 percent of production clouds. Ubuntu has seen almost 67 percent growth in an area where Ubuntu was already the market leader. These numbers are a huge testament to the community support Ubuntu OpenStack receives every day." The Cloud Market's latest analysis of operating systems on the Amazon Elastic Compute Cloud (EC2) shows Ubuntu with just over 215,000 instances. Ubuntu is followed by Amazon's own Amazon Linux Amazon Machine Image (AMI), with 86,000 instances. Further back, you'll find Windows with 26,000 instances. In fourth and fifth place, respectively, you'll find Red Hat Enterprise Linux (RHEL) with 16,500 instances and then CentOS with 12,500 instances.
Android

Google Launches Customizable 'Live Cases' For Nexus Devices (techcrunch.com) 44

An anonymous reader quotes a report from TechCrunch: Google is launching a new service today that allows you to create $35 custom cases for its Nexus 5X, 6 and 6P phones. There are two variations of the Live Cases: one that allows you to pick any photo and print it onto your case, and one that lets you design and print a stylized map with the help of Google Maps. Both variations allow you to select a couple of filters and other styling options to personalize your case even more. Google says there is a programmable shortcut button on the back of the case that will allow you to launch your favorite app with a single click using NFC. Once you've created and ordered your case, Google will also let you download a wallpaper with the same design.
Media

GoPro Announces Third-Party Developer Program With Over 100 Partners (zdnet.com) 15

An anonymous reader quotes a report from ZDNet: GoPro quietly announced its Developer Program on Thursday as it looks to incorporate its action sports cameras into third-party products. The GoPro Developer Program provides toolkits, technical information and support to enable companies to add GoPro camera connectivity into their products. There is a camera toolkit for iOS and Android apps to control a GoPro camera and manage media, along with a mechanical toolkit to attach GoPro cameras to third-party products. It announced there are more than 100 companies partnering with GoPro, including brands from BMW, Fisher-Price, and Polar. GoPro showed off potential third-party integration ideas in a video showing a gesture-based camera control system.
Chrome

Chrome 50 Updates Push Notifications, Drops Support For Old Windows and OS X Versions (venturebeat.com) 168

An anonymous reader quotes a report from VentureBeat: Google today launched Chrome 50 for Windows, Mac, and Linux, adding the usual slew of developer features. You can update to the latest version now using the browser's built-in silent updater, or download it directly from google.com/chrome. As announced in November 2015, Chrome now no longer supports Windows XP, Windows Vista, OS X 10.6 Snow Leopard, OS X 10.7 Lion, nor OS X 10.8 Mountain Lion. Chrome 50 allows sites to include notification data payloads with their push messages. This eliminates the final server check -- the initial version relied on service workers to proactively fetch the information for a notification from the server, leading to problems when there were multiple messages in flight or when the device was on a poor network connection. Push notification payloads must be encrypted. Sites can now detect when a notification is closed by the user, resulting in better analytics and allowing for cross-device notification dismissal. The look of notifications can now be customized with timestamps and icons. Chrome 50 also brings support for declarative preload.
Medicine

'Neural Bypass' Links Brain To Hand To Get Around Paralysis (ieee.org) 37

An anonymous reader writes: People who are paralyzed from a spinal cord injury still generate movement commands in their brains, but those commands can't travel down their spinal cords and peripheral nerves to reach their muscles. So biomedical engineers came up with a "neural bypass" to route brain signals around the roadblock. The system has just been demonstrated by a human patient for the first time. The patient has a brain implant to record signals from his motor cortex which are sent to a computer, where a decoder algorithm figures out which signals correspond to which specific imagined movements. It then sends a command to a sleeve of electrodes the patient wears on his forearm, which stimulates his muscles in precise patterns to produce the desired hand movement. The patient has already poured from a bottle, stirred with a swizzle stick, swiped a credit card, and played Guitar Hero.
AI

Google Calendar Celebrates 10th Birthday With New Goals Feature (venturebeat.com) 19

An anonymous reader writes: Google Calendar is now 10 years old. What better way to celebrate than by adding a new goals feature to the service? The new feature lets you set a personal goal in Google Calendar, which will then find time in your schedule so you can achieve your goal. The feature is available for mobile-only users in all countries and languages where Google Calendar works. The goal is dependent on two main questions: "how often?" and "best time?" [Once you answer those questions], it will then find the best time slot in your schedule to pencil in your new goal. Goals will automatically adjust their timing throughout the week. Google Calendar will automatically reschedule if you add another event that's a direct conflict with a given goal. You can even defer a goal at any time, in which case Google Calendar will make time for it later. Using machine learning algorithms, Google Calendar gets better at scheduling the more you use it.
Facebook

Facebook's Account Kit Login System Works Via Phone Numbers, No Passwords Needed (softpedia.com) 116

An anonymous reader writes: At this year's F8 developer conference, Facebook announced a new tool called Account Kit, which can be used by app developers to support phone number-based login systems. Every time the user wants to login, they have to enter their phone number. Facebook will then send them a verification code via SMS, which they have to enter on the site. The system was already tested live, and Facebook expects it to be widely adopted, allowing sites to offer users accounts that don't require them to memorize a new password. Each developer has a 100,000 free confirmation SMS messages per month quota. Facebook claims to support SMS login operations for over 230 countries and regions, and in 40 different languages.
Encryption

Jigsaw Ransomware Deletes Your Files If You Don't Pay Or When You Reboot Your PC (bleepingcomputer.com) 108

An anonymous reader writes: Researchers found a new ransomware yesterday called Jigsaw which will first lock your files and ask for a 0.4 Bitcoin ($150 USD) payment. If users don't pay, every hour the ransomware deletes your files. If the user restarts their PC, the ransomware also deletes 1,000 more files. The good news is there's a free Decrypter available to unlock the ransomware. The Decrypter was built by Michael Gillespie, who announced yesterday on Softpedia the ID Ransomware service, which tells infected victims what kind of ransomware infection they have by allowing them to upload an encrypted file and the ransom note.
Microsoft

Badlock Vulnerability Falls Flat Against Hype (threatpost.com) 21

msm1267 quotes a report from Threatpost: Weeks of anxiety and concern over the Badlock vulnerability ended today with an anticlimactic thud. Badlock was the security boogeyman since the appearance three weeks ago of a website and logo branding the bug as something serious in Samba, an open source implementation of the server message block (SMB) protocol that provides file and print services for Windows clients. As it turns out, Badlock was hardly the remote code execution monster many anticipated. Instead, it's a man-in-the-middle and denial-of-service bug, allowing an attacker to elevate privileges or crash a Windows machine running Samba services. SerNet, a German consultancy behind the discovery of Badlock, fueled the hype at the outset with a number of since-deleted tweets that said any marketing boost as a result of its branding and private disclosure of the bug to Microsoft was a bonus for its business. For its part, Microsoft refused to join the hype machine and today in MS16-047 issued a security update it rated 'Important' for the Windows Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD). The bulletin patches one vulnerability (CVE-2016-0128), an elevation of privilege bug in both SAM and LSAD that could be exploited in a man-in-the-middle attack, forcing a downgrade of the authentication level of both channels, Microsoft said. An attacker could then impersonate an authenticated user.
Programming

Slashdot Asks: What Are Some Insults No Developer Wants To Hear? (infoworld.com) 523

snydeq writes: Flame wars in the bug tracker might be exactly the right (harsh) feedback your code needs, writes Peter Wayner in his run-down of the insults no programmer wants to hear about their code or coding skills. "The technology world is a bit different than the pretty, coiffed world of suits and salesdroids where everyone is polite, even when they hate your guts and think you're an idiot. Suit-clad managers may smile and hide their real message by the way they say you're doing "great, real great pal," but programmers often speak their minds, and when that mind has something unpleasant to say, look-out, feelings." Instead of posting this story in a click-bait fashion as presented from InfoWorld, we thought we'd ask the developers of Slashdot: What are some insults no developer wants to hear? Some of the classic insults include: N00b, /dev/null, Eye Candy, Fanboi, and [Nothing]. Are there any insults you are familiar with that aren't mentioned in the list?
Microsoft

Microsoft's BSOD Is Getting More Descriptive With QR Codes (cio.com) 156

itwbennett writes: Reddit user javelinnl posted a picture last week showing a new dreaded Blue Screen of Death (BSOD) featuring a QR code and a link that may appear in a future version of Windows 10. "Right now, the code and the link take users to a webpage that discusses generic fixes for errors that might cause a crash," writes Blair Frank from CIO. "In the future, though, Microsoft could provide a QR code that leads to more specific information about what caused the computer freeze up." As of this writing, Microsoft had not responded to Frank's request for comment, but when he forced a Blue Screen of Death on his Surface Pro 3, he was unable to get a QR code to appear, though a link to the help page did. The QR code shown in the image simply points to a generic resource page for "troubleshooting blue screen errors."
Power

Tesla Recalls 2,700 Model X Cars, Highlighting Risk of Massive Model 3 Rollout (bgr.com) 157

An anonymous reader writes: Tesla has recalled 2,700 Model X cars due to a design flaw affecting the vehicle's third row of seats. Specifically, a faulty locking hinge on the last row of seats could potentially cause the seats to collapse forward during a crash. "Despite [15] prior successful tests and no reports of a third row seat slipping in any customer vehicles," Tesla said in an email to affected owners, "we have decided to conduct a voluntary recall as a precautionary measure and will be replacing all affected third row seat backs." Even though the Model X recall is small, it brings to mind the Model 3 and what possible manufacturing issues will pertain to it. BGR writes, "The current number of Model 3 reservations is absolutely staggering and Tesla will have no choice but to get as many Model 3s manufactured and out on the road as soon as humanly possible. So even in a best-case scenario where the rollout of the Model 3 goes swimmingly, Tesla will need to do all it can to ensure that the Model 3s rolling off the line in late 2018 and early 2019 are flawless." Recalling 2,700 vehicles is one thing, but a recall affecting the Model 3 could be a logistical and publicity nightmare.

Slashdot Top Deals