Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Businesses

Pinterest Acquires Instapaper (theverge.com) 9

An anonymous reader quotes a report from The Verge: Instapaper, a pioneering app for saving articles to read later, has been acquired -- again. The app, which was created by developer Marco Arment and sold to Betaworks in 2013, has found a new home at Pinterest. The goal is "to accelerate discovering and saving articles on Pinterest," the company said in a statement. It will continue to operate as a standalone app, and the Instapaper team will work on both that app and on Pinterest generally. Terms of the deal were not disclosed. As a visual search engine, Pinterest isn't often thought of as a place to bookmark written content. But in 2013 the company introduced article pins, a format that creates rich bookmarks complete with a photo and a preview of the text. The acquisition of Instapaper suggests the company believes there is more to be done there -- although it's not certain how valuable that will be for Pinterest. Instapaper can be used for free or in a $30-a-year premium version; the company has never said how many subscribers it has.
PlayStation (Games)

Sony Tries To Remove News Articles About PlayStation 4 Slim Leak From The Internet (techdirt.com) 29

Sony is expected to announce two new PlayStation 4 consoles at a scheduled event on September 7th in New York City, but as that date nears more leaks of the consoles have emerged. The most recent leak appears to show the upcoming PlayStation 4 Slim, which Sony is trying to remove from the internet by taking down news articles from social media accounts about the leak. Erik Kain via @erikkain on Twitter tweeted (Tweet no longer exists): "Sony issued a takedown and had this post removed from my Facebook page: https://t.co/fIjP0buTdY (Warning: may be paywalled)." Techdirt reports: "[The Forbes post] references the work Eurogamer did in visiting the leaker of the image to confirm the console is for real (it is), as well as generating its own image and even video of the console working for its story on the leak. But if you go today to the Eurogamer post about the leak, the video has been replaced by the following update. UPDATE, 7.30pm: Upon taking legal advice, we have removed the video previously referenced in this article. Left unsaid is whether or not any contact had been made by Sony with Eurogamer, thus prompting this 'legal advice,' but one can imagine that being the case, particularly given Sony's threats to social media users sharing images and reporting of Sony leaks and, more to the point, threats against any media that might report on those leaks."
Google

Google Search Removes 'Mobile-Friendly' Label, Will Tackle Interstitials Next (venturebeat.com) 34

An anonymous reader quotes a report from VentureBeat: Google today announced two updates to mobile search results: an aesthetic one rolling out now and an algorithmic one coming next year. The former consists of removing the "mobile-friendly" label in search results and the latter will punish mobile sites that use interstitials. The goal is to "make finding content easier for users," though as always, the company didn't share exactly how much of an impact users and webmasters can expect. The report adds: "If your site is in the 15 percent group, here's a quick recap. A webpage is considered 'mobile friendly' if it meets the following criteria, as detected in real time by Googlebot: Avoids software that is not common on mobile devices, like Flash; Uses text that is readable without zooming; Sizes content to the screen so users don't have to scroll horizontally or zoom; Places links far enough apart so that the correct one can be easily tapped. The company now wants to tackle 'intrusive interstitials' as they 'provide a poorer experience to users than other pages where content is immediately accessible.' After January 10, 2017, pages where content is not easily accessible when coming from mobile search results 'may not rank as highly.' Interstitials that Google doesn't like include showing a popup that covers the main content (immediately or delayed), displaying a standalone interstitial that the user has to dismiss before accessing the main content, and using a layout where the above-the-fold portion is similar to a standalone interstitial but the original content is inlined underneath. Interstitials that Google deems OK include legal obligations (cookie usage or for age verification), login dialogs on sites where content is not publicly indexable, and banners that use a reasonable amount of screen space and are easily dismissible."
Canada

Ashley Madison Security Protocols Violated Canada, Austrialia Privacy Laws (www.cbc.ca) 18

The Office of the Privacy Commissioner of Canada said Tuesday that the Canada-based online dating and social networking service Ashely Madison used inadequate privacy and security technology while marketing itself as a discreet and secure way for consenting adults to have affairs. CBC.ca reports: "In a report Tuesday, the privacy watchdog says the Toronto-based company violated numerous privacy laws in Canada and abroad in the era before a massive data breach exposed confidential information from their clients to hackers. The hack stole correspondence, identifying details and even credit card information from millions of the site's users. The resulting scandal cost the company about a quarter of its annual revenues from irate customers who demanded refunds and cancelled their accounts. Working with a similar agency in Australia, the privacy group says the company knew that its security protocols were lacking but didn't do enough to guard against being hacked. The company even adorned its website with the logo of a 'trusted security award' -- a claim the company admits it fabricated." The report found that "poor habits such as inadequate authentication processes and sub-par key and password management practices were rampant at the company" and that "much of the company's efforts to monitor its own security were 'focused on detecting system performance issues and unusual employee requests for decryption of sensitive user data.'" What's more is that Ashley Madison continued to store personal information of its users even after some of which had deleted or deactivated their account(s). These people then had their information included in databases published online after the hack.
PlayStation (Games)

PlayStation 3 Games Are Coming To PC (cnet.com) 80

PlayStation 3 games are coming to Windows. Sony said Tuesday that it is bringing its PlayStation Now game-streaming program to Windows PCs. The service broadcasts PlayStation 3 games over the internet similar to the way Netflix beams movies to devices like Roku. CNET reports: This fall, you'll be able to play previously exclusive games like Uncharted 3 and Shadow of the Colossus on a Windows laptop. The catch: you'll be playing those games over the internet with Sony's streaming game service, PlayStation Now. Think Netflix. PlayStation Now has already been around for a couple of years on the PS4, PS3, PS Vita handheld, plus a handful of Blu-ray players and smart TVs. For $20 a month or $45 for three, the service gives players unlimited access to a long list of over 400 PlayStation 3 games. Like Netflix or any other streaming service, the quality can vary wildly depending on your internet connection -- Sony requires a solid 5Mbps connection at all times, and that doesn't change today. What changes is the size of Sony's audience. With a Windows laptop or tablet, you aren't tethered to a big-screen TV. You could theoretically take these PlayStation games anywhere -- and wherever you go, your save games stream with you.
The Internet

Internaut Day Might Not Be the Web Anniversary You're Looking For (fortune.com) 68

David Meyer, reporting for Fortune: The web arguably went public before August 23, 1991. Social media users are enthusiastically celebrating "Internaut Day" on Tuesday. They're thanking Tim Berners-Lee, the creator of the World Wide Web, for first providing public access to it on this day in 1991, precisely a quarter of a century back. The only problem is that the supposed importance of Internaut Day doesn't seem to be supported by much evidence. Berners-Lee submitted his seminal proposal for a new information management system to CERN on March 12, 1989, a date which Berners-Lee celebrates as the birthday of the web. The building blocks were specified and written up by October 1990, and the first webpage went live in December that year. So when somebody celebrates the "Internaut Day" today, it really doesn't seem like the right occasion. The report adds: According to Wikipedia, that's when "new users could [first] access" the web -- and that's what a gazillion news stories on Tuesday are supposedly celebrating. But it doesn't square with what the Web Foundation and CERN say.
Electronic Frontier Foundation

US Customs and Border Protection Wants To Know Who You Are On Twitter (eff.org) 310

An anonymous reader quotes a report from Electronic Frontier Foundation: U.S. border control agents want to gather Facebook and Twitter identities from visitors from around the world. But this flawed plan would violate travelers' privacy, and would have a wide-ranging impact on freedom of expression -- all while doing little or nothing to protect Americans from terrorism. A proposal has been issued by U.S. Customs and Border Protection to collect social media handles from visitors to the United States from visa waiver countries. The Electronic Frontier Foundation opposes the proposal and has commented on it individually and as part of a larger coalition. "CBP specifically seeks 'information associated with your online presence -- Provider/Platform -- Social media identifier' in order to provider DHS 'greater clarity and visibility to possible nefarious activity and connections' for 'vetting purposes,'" reports EFF. "In our comments, we argue that would-be terrorists are unlikely to disclose social media identifiers that reveal publicly available posts expressing support for terrorism." They say this plan "would unfairly violate the privacy of innocent travelers," would cause "innocent travelers" to "engage in self-censorship, cutting back on their online activity out of fear of being wrongly judged by the U.S. government," and would lead to a "slippery slope, where CBP would require U.S. citizens and residents returning home to disclose their social media handles, or subject both foreign visitors and U.S. persons to invasive device searches at ports of entry with the intent of easily accessing any and all cloud data."
Television

North Korea Unveils Netflix-Like Streaming Service Called 'Manbang' (bbc.com) 151

North Korea has unveiled a set-top box that offers video-on demand services similar to Netflix. The service is called Manbang, which translates to "everywhere" in Korean, and allows consumers to stream documentaries about Kim Jong Un and other "educational" programs, as well as five live TV channels. "If a viewer wants to watch, for instance, an animal movie and sends a request to the equipment, it will show the relevant video to the viewer [...] this is two-way communications," according to NK News. It reportedly works by plugging the set-top box into an internet modem, then connecting an HDMI cable from the cable box to the TV. A very small number of North Koreans will actually be able to use the device as "only a few thousand [...] have access to the state-sanctioned internet, in a nation of 25 million people," reports New York Daily News.
Security

BHU's 'Tiger Will Power' Wi-Fi Router May Be The Most Insecure Router Ever Made (softpedia.com) 57

An anonymous reader writes from a report via Softpedia: A Wi-Fi router manufactured and sold only in China can easily run for the title of "most insecure router ever made." The BHU router, whose name translates to "Tiger Will Power," has a long list of security problems that include: four authentication bypass flaws (one of which is just hilarious); a built-in backdoor root account that gets created on every boot-up sequence; the fact that it opens the SSH port for external connections after every boot (somebody has to use that root backdoor account right?); a built-in proxy server that re-routes all traffic; an ad injection system that adds adverts to all the sites you visit; and a backup JS file embedded in the router firmware if the ad script fails to load from its server. For techies, there's a long technical write-up, which gets funnier and scarier at the same time as you read through it. "An attacker authenticating on the router can use a hardcoded session ID (SID) value of 700000000000000 to gain admin privileges," reports Softpedia. "If he misspells the SID and drops a zero, that's no problem. The BHU router will accept any value and still grant the user admin rights."
Piracy

Cox Denies Liability for Pirating Subscribers, Appeals $25 Million Verdict (torrentfreak.com) 94

Cox Communications insists that it is not responsible for copyright infringements carried out by its subscribers, challenging the ruling by a Virginia federal jury late last year. The court had found Cox Communications guilty and had asked it to pay music publisher BMG Rights Management a sum of $25 in damages. TorrentFreak reports: The verdict was a massive victory for the music company and a disaster for Cox, but the case is not closed yet. After a failed motion for judgment as a matter of law earlier this month, the ISP has now informed the court that it will take the case to the U.S. Court of Appeals for the Fourth Circuit. Cox denies any wrongdoing and hopes to get a judgment in its favor at the appeals court. Considering the gravity of the case, Cox's move is not surprising. The liability verdict has come as a shock to the Internet provider industry, as it suggests that providers have to actively disconnect repeat infringers. At the moment, many ISPs don't have a solid policy in place where repeat copyright infringers lose their subscription. In fact, the law doesn't prescribe when and based on what evidence an ISP has to terminate an account.
AT&T

AT&T Says LTE Can Still Offer Speeds Up To 1 Gbps (dslreports.com) 49

An anonymous reader writes from a report via DSL Reports: ATT CTO Andre Fuetsch said at a telecom conference last week that the company's existing LTE network should be able to reach speeds of 1 Gbps before the standard ultimately gets overshadowed by faster 5G tech. The new 5G technology isn't expected to arrive until 2020 at the earliest, so LTE has a lot of time left as the predominant wireless connectivity. "There's a lot of focus on 5G -- but don't discount LTE," Fuetsch said. "LTE is still here. And LTE will be around for a long time. And LTE has also enormous potential in that, you'll be capable of supporting 1 gigabit speeds as well." 5G will help move past 1 Gbps speeds, while also providing significantly lower latency. "You'll see us sharing more about the trial activity we're doing," said Fuetsch. "Everything that's being [tested] right now is not standard, it's all sort of proprietary. But this is an important process to go through because this is how you learn and how it helps define standards."
Communications

Comcast Says There's 6 Million Unhappy DSL Users Left To Target (dslreports.com) 138

Karl Bode, writing for DSLReports: As we noted last week, cable is effectively demolishing phone companies when it comes to new broadband subscriber additions, and Comcast still says the company has plenty of room to grow. Comcast and Charter alone added 500,000 net broadband subscribers last quarter, while the nation's biggest telcos collectively lost 360,783 broadband users during the same period. With AT&T and Verizon backing away from unwanted DSL users, and Windstream Frontier and CenturyLink only eyeing piecemeal upgrades, the bloodshed is far from over. Speaking this week at the Nomura 2016 Media, Telecom & Internet Conference, Comcast VP Marcien Jenckes stated that the company has plenty of unhappy DSL customers left to nab. In fact, Comcast says the company still has around 6 million DSL subscribers in its territory, many of which are likely frustrated by outdated speeds.
Operating Systems

Linux Turns 25, Is Bigger and More Professional Than Ever (arstechnica.com) 271

The Linux operating system kernel is 25 years old this month, ArsTechnica writes. It was August 25, 1991 when Linus Torvalds posted his famous message announcing the project, claiming that Linux was "just a hobby, won't be big and professional like gnu." From the article: But now, Linux is far bigger and more professional than Torvalds could have imagined. Linux powers huge portions of the Internet's infrastructure, corporate data centers, websites, stock exchanges, the world's most widely used smartphone operating system, and nearly all of the world's fastest supercomputers. The successes easily outweigh Linux's failure to unseat Microsoft and Apple on PCs, but Linux has still managed to get on tens of millions of desktops and laptops and Linux software even runs on Windows.Do you use any Linux-based operating system? Share your experience with it. What changes would you want to see in it in the next five years?
Mozilla

Mozilla Is Changing Its Look -- and Asking the Internet For Feedback (arstechnica.com) 223

Megan Geuss, writing for ArsTechnica: Mozilla is trying a rebranding. Back in June, the browser developer announced that it would freshen up its logo and enlist the Internet's help in reaching a final decision. The company hired British design company Johnson Banks to come up with seven new "concepts" to illustrate the company's work. The logos rely on vibrant colors, and several of them recall '80s and '90s style. In pure, nearly-unintelligible marketing speak, Mozilla writes that each new design reflects a story about the company. "From paying homage to our paleotechnic origins to rendering us as part of an ever-expanding digital ecosystem, from highlighting our global community ethos to giving us a lift from the quotidian elevator open button, the concepts express ideas about Mozilla in clever and unexpected ways," Mozilla's Creative Director Tim Murray writes in a blog post. Mozilla is soliciting comment and criticism on the seven new designs for the next two weeks, but this is no Boaty McBoatface situation. Mozilla is clear that it's not crowdsourcing a design, asking anyone to work on spec, or holding a vote over which logo the Internet prefers. It's just asking for comments.
Government

Group Wants To Shut Down Tor For a Day On September 1 (softpedia.com) 219

An anonymous reader writes: An internal group at the Tor Project is calling for a full 24-hour shutdown of the Tor network to protest the way the Tor Project dealt with the Jake Applebaum sexual misconduct accusations, and because of recent rumors it might be letting former government agents in its ranks. Two Tor members, also node operators, have shut down their servers as well, because of the same reason. They explained their motivations here and here.
"The protesters have made 16 demands," according to the article, six related to related to supposed infiltration of Tor by government agents, and 10 regarding the Appelbaum ruling and investigation -- including "asking all Tor employees that participated in this investigation to leave" and "the persons behind the JacobAppelbaum.net and the @JakeMustDie and @VictimsOfJake Twitter accounts to come forward and their identities made public."
Microsoft

Ask Slashdot: How Will You Handle Microsoft's New 'Cumulative' Windows Updates? (slashdot.org) 392

Microsoft's announced they'll discontinue "individual patches" for Windows 7 and 8.1 (as well as Windows Server 2008 R2, 2012, and 2012 R2). Instead they'll have monthly "cumulative" rollups of each month's patches, and while there will be a separate "security-only" bundle each month, "individual patches will no longer be available." This has one anonymous Slashdot reader asking what's the alternative: We've read about the changes coming to Windows Update in October 2016... But what happens when it's time to wipe and reload the OS? Or what about installing Windows on different hardware? Admittedly, there are useful non-security updates worth having, but plenty to avoid (e.g. telemetry).

How does one handle this challenge? Set up a personal WSUS box before October to sync all desired updates through October 2016? System images can work if you don't change primary hardware, but what if you do? Or should one just bend the knee to Microsoft...?

Should they use AutoPatcher? Switch to Linux? Or just disconnect their Windows boxes from the internet... Leave your answers in the comments. How do you plan to handle Microsoft's new 'cumulative' Windows Updates?
Government

Will Internet Voting Endanger The Secret Ballot? 214

MIT recently identified the states "at the greatest risk of having their voting process hacked". but added this week that "Maintaining the secrecy of ballots returned via the Internet is 'technologically impossible'..." Long-time Slashdot reader Presto Vivace quotes their article: That's according to a new report from Verified Voting, a group that advocates for transparency and accuracy in elections. A cornerstone of democracy, the secret ballot guards against voter coercion. But "because of current technical challenges and the unique challenge of running public elections, it is impossible to maintain the separation of voters' identities from their votes when Internet voting is used," concludes the report, which was written in collaboration with the Electronic Privacy Information Center and the anticorruption advocacy group Common Cause.
32 states are already offering some form of online voting, apparently prompting the creation of Verified Voting's new site, SecretBallotAtRisk.org.
Piracy

India Threatens 3-Year Jail Sentences For Viewing Blocked Torrents (intoday.in) 95

"It is official now. The punishment for rape is actually less..." writes an anonymous Slashdot reader, who adds that "Some users think that this is all the fault of Bollywood/Hollywood movie studios. They are abusing power, court and money..." India Today reports: The Indian government, with the help of internet service providers, and presumably under directives of court, has banned thousands of websites and URLs in the last five odd years. But until now if you somehow visited these "blocked URLs" all was fine. However, now if you try to visit such URLs and view the information, you may get a three-year jail sentence as well as invite a fine...

This is just for viewing a torrent file, or downloading a file from a host that may have been banned in India, or even for viewing an image on a file host like Imagebam. You don't have to download a torrent file, and then the actual videos or other files, which might have copyright. Just accessing information under a blocked URL will land you in jail and leave your bank account poorer.

While it's not clear how this will be enforced, visiting a blocked URL in India now leads to a warning that "Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of up to Rs. 3,00,000..."
Encryption

How SSL/TLS Encryption Hides Malware (cso.com.au) 87

Around 65% of the internet's one zettabyte of global traffic uses SSL/TLS encryption -- but Slashdot reader River Tam shares an article recalling last August when 910 million web browsers were potentially exposed to malware hidden in a Yahoo ad that was hidden from firewalls by SSL/TLS encryption: When victims don't have the right protection measures in place, attackers can cipher command and control communications and malicious code to evade intrusion prevention systems and anti-malware inspection systems. In effect, the SSL/TLS encryption serves as a tunnel to hide malware as it can pass through firewalls and into organizations' networks undetected if the right safeguards aren't in place. As SSL/TLS usage grows, the appeal of this threat vector for hackers too increases.

Companies can stop SSL/TLS attacks, however most don't have their existing security features properly enabled to do so. Legacy network security solutions typically don't have the features needed to inspect SSL/TLS-encrypted traffic. The ones that do, often suffer from such extreme performance issues when inspecting traffic, that most companies with legacy solutions abandon SSL/TLS inspection.

Crime

Want To Hunt Bank Robbers? There's an App For That, Says The FBI (networkworld.com) 67

Long-time Slashdot reader coondoggie quotes an article from Network World: The FBI today said it released a new application making it easier for the public -- as well as financial institutions, law enforcement agencies, and others -- to view photos and information about bank robberies in different geographic areas of the country.
The FBI's new "Bank Robbers" application runs on both Android and iOS, according to the article, "and lets users sort bank robberies by the date they occurred, the category they fall under (i.e., armed serial bank robber), the FBI field office working the case, or the state where the robbery occurred." The app ties into BankRobbers.fbi.gov, which overlays FBI information about bank robberies onto Google Maps.

The app's users "can also select push notifications to be informed when a bank robbery has taken place near their location," according to the FBI's site, which adds innocently that "If the location services on your device are enabled, you can view a map that shows the relevant bank robberies that took place in your geographic area..."

Slashdot Top Deals