Check out the brand new SourceForge HTML5 speed test! Test your internet connection now. Works on all devices. ×
Businesses

Cisco Seen As Trying To 'Slow Down Arista Anyway They Can' With Patent Lawsuits (crn.com) 120

An anonymous reader shares an article by CRN:Partners say Cisco's end game with its patent lawsuits against Arista Networks is simply to slow the fast-growing networking company and stunt any innovation efforts from competitors. "Cisco's goal is to try to slow down Arista and competitors any way they can," said Chris Becerra, president and CEO of Terrapin Systems, a Morgan Hill, Calif.-based Arista partner. "If they don't have the technology to beat them out there, they're going to try to slow them down any way possible." Last week, the San Jose, Calif.-based network giant won three of five patent infringement suits against Santa Clara, Calif.-based Arista dealing with its networking switches. The International Trade Commission recommended a ban on Arista product imports containing the infringing technology. Additionally, the ITC also ruled earlier this year that Arista infringed on several other Cisco patents pertaining to its private VLANS, system database and externally managing router configuration with a centralized database -- recommending a similar ban on Arista imports.For those unfamiliar, Cisco had filed its trade complaint in December 2014, in which it sought a ban on Arista's switches. Arista, which designs and sells multilayer network switches to deliver software-defined networking solutions, was formed by former Cisco employees.
Security

Citing Attack, GoToMyPC Resets All Passwords (krebsonsecurity.com) 41

Security reporter Brian Krebs writes:GoToMyPC, a service that helps people access and control their computers remotely over the Internet, is forcing all users to change their passwords, citing a spike in attacks that target people who re-use passwords across multiple sites. Owned by Santa Clara, Calif. based networking giant Citrix, GoToMyPC is a popular software-as-a-service product that lets users access and control their PC or Mac from anywhere in the world. On June 19, the company posted a status update and began notifying users that a system-wide password update was underway.
Communications

Facebook Now Lets Users Comment With a Video (techcrunch.com) 29

An anonymous reader writes: As internet users continue to consume more videos than ever before, Facebook has decided to further add to the trend and officially launch video comments. Users are watching so many videos that the Cisco Visual Networking Index forecasts internet video traffic will represent 82% of all consumer internet traffic by 2020. Facebook said via a blog post that the new feature was developed at Facebook's 50th Hackathon. The team that built the feature included: Bob Baldwin who lead the initiative with Hermes Pique and Sameer Madan working on iOS, Muhammed Ibrahim worked on the web, and Billy Ng worked on Android. Baldwin's past projects consisted of features that let Facebook users include photos or stickers in the comments. The new video comments feature may help Facebook catch up to Snapchat in terms of daily videos viewed on the social media platform.
Network

A Solution To the Security Guidelines Proposed By FCC For Home Routers (imgtec.com) 55

An anonymous reader writes: Back in March 2015, the United States Federal Communications Commission (FCC) issued a security document that included a series of provisions related to the use of wireless devices. In order to comply with these security guidelines, some manufacturers of home routers and other networking equipment decided to lock down the software powering these devices. This caused an outcry from the open source community who demanded that the FCC and manufacturers would not restrict the free use of the operating system and associated software running on their devices. Now Imagination Technologies is presenting a proof of concept demonstration that addresses the next-generation security requirements mandated by the FCC and other similar agencies. The demo makes use of a feature of MIPS Warrior CPUs called multi-domain, secure hardware virtualization. This technology allows developers to create system-wide, hardware-enforced trusted environments that are much secure compared to current solutions. The platform used for the demonstration runs three virtual machines (VMs) on a MIPS P-class CPU integrated in a router-type evaluation kit; this approach securely separates the OpenWrt operating system from the Wi-Fi driver, allowing them to co-exist in isolation and thus comply with the FCC guidelines.Ars Technica has more details.
The Internet

Qualcomm's Connected Car Reference Platform To Connect Smart Cars To Everything (networkworld.com) 110

An anonymous reader writes: Qualcomm wants to supply the next generation of autonomous and connected cars with networking to connect everything inside and outside of the cars. That means 5G, WiFi, Bluetooth, GNSS, DSRC, V2X, OABR, CAN, etc. ... [Networkworld reports: "Qualcomm today announced its Connected Car Reference Platform intended for the car industry to use to build prototypes of the next-generation connected car. Every category from economy to luxury car will be much smarter than the connected luxury car of today, creating a big opportunity for Qualcomm to supply semiconductors to automakers and suppliers. Qualcomm described the following features of the Connected Car Reference Platform in its release:

Scalability: Using a common framework that scales from a basic telematics control unit (TCU) up to a highly integrated wireless gateway, connecting multiple electronic control units (ECUs) within the car and supporting critical functions, such as over-the-air software upgrades and data collection and analytics.
Future-proofing: Allowing the vehicleâ(TM)s connectivity hardware and software to be upgraded through its life cycle, providing automakers with a migration path from Dedicated Short Range Communications (DSRC) to hybrid/cellular V2X and from 4G LTE to 5G.
Wireless coexistence: Managing concurrent operation of multiple wireless technologies using the same spectrum frequencies, such as Wi-Fi, Bluetooth and Bluetooth Low Energy.
OEM and third-party applications support: Providing a secure framework for the development and execution of custom applications."]

Networking

DistroWatch Finally Adds Support For IPv6 (distrowatch.com) 112

We've frequently linked to DistroWatch for their coverage of Linux package and release announcements. Now an anonymous reader writes: The DistroWatch website introduced IPv6 support on Friday and the new protocol has been getting a lot of attention. "Over 8% of our traffic this weekend came from IPv6 addresses," commented DistroWatch contributor Jesse Smith. "It was a pleasant surprise, we were not expecting that many people would be using IPv6 yet."

When asked why DistroWatch enabled IPv6 access to their server at this time, Smith answered: "Partly it was an experiment to see how much interest there was in IPv6. Partly it was because it is a little embarrassing (in 2016) to have a technology focused website that is not making use of IPv6."

Social Networks

Working at Facebook Sounds Like Joining a Cult (gizmodo.com) 173

Vanity Fair has run some excerpts from an upcoming book by a former employee that gives insight on how things work at the social network. The chapter, among other things, details Facebook CEO Mark Zuckerberg's actions when Google launched its own social networking service Google Plus. The extract finds Zuckerberg's behaviour so intense that it calls it "bordered on the psychopathic." It reads: [...] hit Facebook like a bomb. Google Plus was the great enemy's sally into our own hemisphere, and it gripped Zuck like nothing else. He declared "Lockdown," the first and only one during my time there. As was duly explained to the more recent employees, Lockdown was a state of war that dated to Facebook's earliest days, when no one could leave the building while the company confronted some threat, either competitive or technical.â [...] Rounding off another beaded string of platitudes, he changed gears and erupted with a burst of rhetoric referencing one of the ancient classics he had studied at Harvard and before. "You know, one of my favorite Roman orators ended every speech with the phrase Carthago delenda est. 'Carthage must be destroyed.' For some reason I think of that now."
Security

WordPress Sites Under Attack From New Zero-Day In WP Mobile Detector Plugin (softpedia.com) 50

An anonymous reader writes: A large number of websites have been infected with SEO spam thanks to a new zero-day in the WP Mobile Detector plugin that was installed on over 10,000 websites. The zero-day was used in real-world attacks since May 26, but only surfaced to light on May 29 when researchers notified the plugin's developer. Seeing that the developer was slow to react, security researchers informed Automattic, who had the plugin delisted from WordPress.org's Plugin Directory on May 31. In the meantime, security firm Sucuri says it detected numerous attacks with this zero-day, which was caused by a lack of input filtering in an image upload field that allowed attackers to upload PHP backdoors on the victim's servers with incredible ease and without any tricky workarounds. The backdoor's password is "dinamit," the Russian word for dynamite.
Network

Internet, Web Enjoy One Final Day As Proper Nouns (go.com) 211

An anonymous reader writes: The Internet and Web will be downgraded to "internet" and "web" tomorrow with the new edition of the AP Stylebook. Therefore, today marks their last day as proper nouns. The AP Stylebook is a manual that many journalists follow, offering a comprehensive guide to the usage of words, style, spelling and punctuation. "The argument for lowercasing Internet is that is has become wholly generic, like electricity and the telephone. It never was trademarked and is not based on any proper noun," writes Tom Kent, AP Standards Editor. "The best reason for capitalizing it in the past may have been that the term was new. At one point, we understand, 'Phonograph' was capitalized." The two names will join the likes of website (formerly Web site) and email (formerly e-mail).
Cloud

How The IoT Will Change The Chip (techcrunch.com) 70

"Get ready for some big changes in the 'silicon' of Silicon Valley," writes tech CEO Narbeh Derhacobian who argues that the need to build tens of billions of connected sensor devices will change the way computers get built. "Just like smartphone owners like to pick and choose which apps they want, IoT manufacturers may want to shop for components individually without being locked into a single fab." An anonymous reader summarizes his article on TechCrunch: Thousands of different hardware devices, each selling around one million units, "would suggest the need for a much greater diversity of chip configurations than we've seen to date." Currently smartphones are engineered using a "System on a Chip" design where all the components are "locked into a single manufacturing process," but Derhacobian predicts chip manufacturers will continue a trend of moving towards a "System in a Package" approach -- "packing components closely together, without the complete, end-to-end integration... In a smart, connected world, sensor requirements could vary greatly from factory to factory, not to mention between industries as varied as agriculture, urban planning and automotive."

"In some ways, the great trends of the PC and smartphone eras were toward standardization of devices. Apple's great vision was understanding that people prefer a beautiful, integrated package, and don't need many choices in hardware. But in software it's generally the opposite. People have different needs, and want to select the apps and programs that work best for them."

Facebook

Too Fat For Facebook: Photo Banned For Depicting Body In 'Undesirable Manner' (theguardian.com) 485

An anonymous reader shares a report on The Guardian: Facebook has apologized for banning a photo of a plus-sized model and telling the feminist group that posted the image that it depicts "body parts in an undesirable manner". Cherchez la Femme, an Australian group that hosts popular culture talkshows with "an unapologetically feminist angle", said Facebook rejected an advert featuring Tess Holliday, a plus-sized model wearing a bikini, telling the group it violated the company's "ad guidelines". After the group appealed against the rejection, Facebook's ad team initially defended the decision, writing that the photo failed to comply with the social networking site's "health and fitness policy". "Ads may not depict a state of health or body weight as being perfect or extremely undesirable," Facebook wrote. "Ads like these are not allowed since they make viewers feel bad about themselves. Instead, we recommend using an image of a relevant activity, such as running or riding a bike." In a statement on Monday, Facebook apologized for its original stance and said it had determined that the photo does comply with its guidelines.Facebook said that its team scans millions of ad images every week, and sometimes understandably misses out on a few.
Network

Americans Used Nearly 10 Trillion Megabytes of Mobile Data Last Year (washingtonpost.com) 91

An anonymous reader writes: A report from CTIA released Monday found that consumers have nearly doubled their consumption of mobile data last year. It found that last month, consumers chugged down 804 billion megabytes of data, which adds up to a total of 9.65 billion gigabytes. The numbers are especially significant when compared to previous years. "From December 2013 to December 2014, U.S. data consumption grew by about 26 percent. But over the following year, it grew by 137 percent," writes Washington Post. YouTube and Netflix account for over half of North American internet traffic at peak hours, according to the networking equipment firm Sandvine. That figure spikes to 70 percent when streaming audio is part of the mix. The wireless industry as a result raked in nearly $200 billion last year alone, which is a 70 percent jump compared to a decade ago. The numbers are likely to rise as more and more devices become connected to the internet. With news of films from Disney, Marvel, Lucasfilm and Pixar coming to Netflix this September, we're likely to see mobile data use increase even more this year.
Security

Foul-Mouthed Worm Takes Control Of Wireless ISPs Around the Globe (arstechnica.com) 36

Dan Goodin, reporting for Ars Technica (edited and condensed): ISPs around the world are being attacked by self-replicating malware that can take complete control of widely used wireless networking equipment, according to reports from customers. San Jose, California-based Ubiquiti Networks confirmed recently that attackers are actively targeting a flaw in AirOS, the Linux-based firmware that runs the wireless routers, access points, and other gear sold by the company. The vulnerability, which allows attackers to gain access to the devices over HTTP and HTTPS connections without authenticating themselves, was patched last July, but the fix wasn't widely installed. Many customers claimed they never received notification of the threat.ISPs in Argentina, Spain, Brazil have been attacked by the worm, said Nico Waisman, a research at security firm Immunity, adding that it's likely that ISPs in the U.S. and other places have also been attacked by the same malware. From the report, "Once successful, the exploit he examined replaces the password files of an infected device and then scans the network it's on for other vulnerable gear. After a certain amount of time, the worm resets infected devices to their factory default configurations, with the exception of leaving behind a backdoor account, and then disappears."
Communications

PornHub's 'Bangfit' Program Uses Sexy Exercise To Build Muscle (mashable.com) 83

An anonymous reader quotes a report from Mashable: A new program created by PornHub called "BangFit" features 'sexercises' that allow players to build and tone muscle. Instead of forcing people to go the gym, Bangfit users simply practice sexual exercises, otherwise known as actual sex. Finally, you can gyrate and hump your way to the body of your dreams. BangFit users follow along with videos as they execute positions like the "squat and thrust" and "missionary press." Players can sync their phones to the workout in order to track their progress and measure the amount of calories burned. While the concept sounds simply gimmicky, BangFit says they designed the app using real science and professionals in the field. PornHub is also retailing an adjustable band that keeps your smartphone closer to to your body, making it easier for the gyroscope to track your movements (judge your performance?). Anytime you complete a level, PornHub congratulates you on your success with a phrase like, "You're the gymanastiest," which is simultaneously rewarding and disgusting. You can watch the retro NSFW introduction video here.
Network

Linksys WRT Routers Won't Block Open Source Firmware, Despite FCC Rules (arstechnica.com) 113

The FCC requires all manufacturers to prevent users from having any direct ability to change RF parameters (frequency limits, output power, country codes, etc). The easiest way for a router manufacturer to comply with FCC's guideline is to block the open source router firmware -- which is what TP-Link has been doing. But thankfully, at least one router manufacturer doesn't think blocking the firmware is the right way to go about it. Ars Technica reports: Linksys has been collaborating with chipmaker Marvell and the makers of OpenWrt to make sure its latest WRT routers can comply with the new rules without blocking open source firmware, company officials told Ars. Linksys' effort stands in contrast with TP-Link, which said it would entirely prevent loading of open source firmware on its routers to satisfy the new Federal Communications Commission requirements. "They're named WRT... it's almost our responsibility to the open source community," Linksys router product manager Vince La Duca told Ars. Cybersecurity experts have urged the router manufacturers to not block open source firmware.
Google

Google News Will Now Highlight Local News Sources For Major Stories (theverge.com) 18

An anonymous reader quotes a report from The Verge: Google's News section will now highlight the importance of local news sources. "When a local story is picked up by national publishers, it can be difficult for local sources to be heard even after they've done the legwork and research to break a story," admits James Morehead, Google News product manager. Google is helping with a new change today that will see a "Local Source" tag applied to all Google News instances. Google is tagging local news based on where a publisher has written about previously and matching it to a story location. Tagged articles will be available on the web and in Google's iOS and Android apps, and will serve as a way to highlight a local source on a national story.
Network

Comcast Is Raising Its Data Caps From 300GB To 1TB (arstechnica.com) 145

An anonymous reader writes: Comcast has announced today it will be raising its monthly data cap of 300GB to 1TB beginning June 1st. They will however charge more to customers who want unlimited data. After June 1st, less people will need to buy unlimited data from the company. Previously, users were charged an extra $30 to $35 a month for unlimited data but now they will have to pay an additional $50 for unlimited data. "All of the data plans in our trial markets will move from a 300 gigabyte data plan to a terabyte by June 1st, regardless of the speed," Comcast's announcement today said. The reason for the change? Customers are exceeding the 300GB cap. In late 2013, Comcast said only 2 percent of its customers used more than 300GB of data a month. That number was up to 8 percent in late 2015.
Encryption

Millions Of Waze Users Can Have Their Movements Tracked By Hackers (fusion.net) 55

An anonymous reader quotes a report from Fusion: Researchers at the University of California-Santa Barbara recently discovered a Waze vulnerability that allowed them to create thousands of "ghost drivers" that can monitor the drivers around them -- an exploit that could be used to track Waze users in real-time. Here's how the exploit works. Waze's servers communicate with phones using an SSL encrypted connection, a security precaution meant to ensure that Waze's computers are really talking to a Waze app on someone's smartphone. Zhao and his graduate students discovered they could intercept that communication by getting the phone to accept their own computer as a go-between in the connection. Once in between the phone and the Waze servers, they could reverse-engineer the Waze protocol, learning the language that the Waze app uses to talk to Waze's back-end app servers. With that knowledge in hand, the team was able to write a program that issued commands directly to Waze servers, allowing the researchers to populate the Waze system with thousands of "ghost cars" -- cars that could cause a fake traffic jam or, because Waze is a social app where drivers broadcast their locations, monitor all the drivers around them. You can read the full paper detailing the researchers' findings here. Is there a solution to not being tracked? Yes. If you're a Waze user, you can set the app to invisible mode. However, Waze turns off invisible mode every time you restart the app so beware.
Facebook

Facebook Is Building A Standalone Camera App To Encourage Its 1.6 Billion Users To Share More (theverge.com) 57

An anonymous reader quotes a report from The Verge: According to a report in The Wall Street Journal, Facebook engineers in London are working on a standalone camera app with a big live-streaming component. Similar to Snapchat, the app would open straight into a camera to foster immediate capturing and posting of photos and videos, as well as letting users stream via Facebook Live. With billions of smartphones in the world and near-ubiquitous high-speed data connections, Facebook sees a huge opportunity to get its 1.6 billion users sharing more than ever before. A camera app may help the company do that, and better compete with Snapchat at the same time. Facebook has recently rolled out a major live video update allowing anyone to post live streams of themselves to their timeline. Previously, only celebrities and public figures were allowed to use the feature. With this new Facebook Live update and standalone camera app reportedly in the works, the only thing holding Mark Zuckerberg back with his plan to triple the size of his social network is affordable internet.
Security

Active Drive-By Exploits Critical Android Bugs, Care Of Hacking Team (arstechnica.com) 45

Dan Goodin, reporting for Ars Technica: An ongoing drive-by attack is forcing ransomware onto Android smartphones by exploiting critical vulnerabilities in older versions of Google's mobile operating system still in use by millions of people, according to research scheduled to be published Monday. The attack combines exploits for at least two critical vulnerabilities contained in Android versions 4.0 through 4.3, including an exploit known as Towelroot, which gives attackers unfettered "root" access to vulnerable phones. The exploit code appears to borrow heavily from, if not copy outright, some of these Android attack scripts, which leaked to the world following the embarrassing breach of Italy-based Hacking Team in July. Additional data indicates devices running Android 4.4 may also be infected, possibly by exploiting a different set of vulnerabilities.Blue Coat, a California-based provider of security and networking solutions writes: This is the first time, to my knowledge; an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim. During the attack, the device did not display the normal "application permissions" dialog box that typically precedes installation of an Android application. After consulting with analyst Joshua Drake of Zimperium, he was able to confirm that the Javascript used to initiate the attack contains an exploit against libxslt that was leaked during the Hacking Team breach. Drake also confirmed that the payload of that exploit, a Linux ELF executable named module.so, contains the code for the "futex" or "Towelroot" exploit that was first disclosed at the end of 2014.

Slashdot Top Deals