Oct 8, 2013

HTC One Max with fingerprint sensor coming next week

The design of an HTC One, size of a Note 3, and fingerprint sensor of an iPhone. 
by Ron Amadeo



HTC is reportedly nearly ready to announce the giant version of its flagship HTC One smartphone, the HTC One Max. The Wall Street Journal reports that the Taiwanese company will reveal the One Max on October 15th. Surprisingly, it will come with a fingerprint sensor, the Journal says.
Rumors and leaked photos peg the One Max as nearly identical in design to the One, just with a larger screen. The Max screen should come in at 5.9 inches—slightly bigger than the Galaxy Note 3. The rest of the rumored specs are pretty standard for a high-end phone: a 1080p screen, Snapdragon 800 processor, and 2GB of RAM.
If the previously leaked photos of the One Max are accurate, the fingerprint sensor will be on the back of the phone, just below the camera. This is in contrast to the iPhone 5S, which has a fingerprint reader integrated into the home button.
The Verge corroborates this report, saying it has received invites for HTC events on October 15th in Hong Kong and Taipei. We know the One Max should be headed at least to Verizon, as there have been "blurrycam" shots of the One Max with the HTC logo replaced by Verizon's. We should know a lot more about this phone in just one short week.
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Higgs theorists—including Higgs himself—get Nobel Prize in physics

Confirmation of particle's existence leads to award for work published in 1964. 
by John Timmer



A collision in the LHC's CMS detector.

Last year, after decades of waiting, a handful of theorists had their work confirmed with the announcement that scientists had discovered an elusive particle called the Higgs boson. Now, just over a year later, two of those theoreticians are being awarded the Nobel Prize in physics.
The Higgs boson is a manifestation of the Higgs field, an invisible entity that pervades the Universe. Interactions between the Higgs field and particles help provide particles with mass, with particles that interact more strongly having larger masses. But despite its central role in the function of the Universe, the road to the papers that predicted the existence of the Higgs was bumpy, as was the process of discovering it.
The idea of the Higgs was a consequence of studies on the weak force, which controls the decay of radioactive elements. The weak force only operates at very short distances, which suggests that the particles that mediate it (the W and Z bosons) are likely to be massive. While it was possible to use existing models of physics to explain some of their properties, these predictions had an awkward feature: just like another force-carrying particle, the photon, the resulting W and Z bosons were massless.
Over time, theoreticians managed to craft models that included massive W and Z bosons, but they invariably came with a hitch: a massless partner, which would imply a longer-range force. In 1964, however, a series of papers was published in rapid succession that described a way to get rid of this problematic particle. If a certain symmetry in the models was broken, the massless partner would go away, leaving only a massive one. The first of these papers, by François Englert and Robert Brout, proposed the new model in terms of quantum field theory; the second, by Peter Higgs, noted that a single quantum of the field would be detectable as a particle.
Robert Brout died in 2011, so Englert (currently at the Free University of Brussels) was honored for his contributions, as was Higgs, who is at the University of Edinburgh. The third paper, by Gerald Guralnik, Carl Richard Hagen, and Tom Kibble, was not recognized by this award, possibly due to the prize's stipulation that only three people be recognized. (For the same reason, none of the people who spotted the Higgs at the LHC are recognized; as the Nobel documents point out, each of the two detectors credited with the discovery had a staff of over 3,000 researchers.)
But the third paper provided an independent validation of the general approach, as did a completely independent derivation by students in the Soviet Union. By 1967, Steve Weinberg had extended the Higgs mechanism to account for the mass of electrons and heavier leptons, and in 1971, Gerhard ‘t Hooft and Martinus Veltman figured out how to get rid of a few annoying infinities in some of the equations. By 1983, the W and Z bosons had had their masses determined, providing an experimental validation of some of the predictions made by the theoreticians.
But while the Higgs field managed to get a lot of things in the Standard Model to work properly, we still didn't have experimental validation of one of its predictions: the Higgs particle. Precision measurements of the masses of some of the heavier particles put an upper limit on the Higgs mass at about 150GeV, while experiments with the Large Electron-Positron collider (the LHC's predecessor, built in the same tunnel) eliminated everything under 115GeV. Meanwhile, years of running the Tevatron had produced a weak signal of around 120GeV, one that was just over two standard deviations above background noise.
That was where things stood when the LHC started up. Within a few years of operation, the new collider had generated enough data to detect a five-sigma signal at just above 125GeV, enough to announce discovery. On the day of the announcement, Englert and Higgs were in the audience at CERN. Now, they will have a chance to meet again with a different kind of audience—one with the King of Sweden.
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

How the feds busted a top Silk Road seller

UK authorities also announce arrest of Silk Road sellers in Devon, Manchester. 
by Cyrus Farivar



900 suspected tablets of Alprazolam, aka Xanax, were sent to a suspected Silk Road seller in November 2012.

Authorities in the state of Washington arrested two people last week in connection with drug sales on the Silk Road, a clear indication of a crackdown on dealers using the notorious site. News of their arrest first broke late Monday evening.
According to a 16-page criminal complaint (PDF) dated October 2, 2013, the two suspects, Steven Lloyd Sadler and Jenna M. White, have been charged with conspiracy to distribute heroin, cocaine, and methamphetamine. Authorities believe that Sadler and White, arrested on October 2 and 3 respectively, are behind the “NOD” account on Silk Road, which was one of the “top sellers” on the site. (That account also had a thread under the Silk Road subreddit.)

From Pakistan to Seattle

The criminal complaint describes how authorities intercepted various packages from the United States Postal Service “mail stream,” using a combination of drug-sniffing dogs and parcel searches in September 2012. A postal inspector found one package that “contained similar handwriting, was of the same size, and bore the same type of postage stamp, compared to the first package that the inspector had opened without a warrant.”
Law enforcement agents did not find drugs in that second package, but they did find $3,200 in cash and a return address pointing authorities to an address at a UPS store, where one “Edward Harlow” had opened an account, as had one “Aaron Thompson.” UPS also revealed to authorities that “Thompson” had opened another box in Tukwila, Washington, another Seattle suburb.
By November 2012, the USPS intercepted another package sent from Pakistan addressed to Thompson's Tukwila UPS box. When it was searched by customs authorities, agents found “900 suspected tablets of Alprazolam.” Alprazolam is the generic name of Xanax, an anti-anxiety drug.
The following month, a postal employee at the Riverton Heights Post Office, in SeaTac, Washington, just south of Seattle, noticed that a “blond female” was purchasing stamps and dropping off packages with handwriting similar to the ones found on the previously inspected packages. That same employee noted that the blonde woman drove an Audi and wrote down its license plate number. From there, it appears that it was all downhill for the suspects.
Law enforcement ran the plate for the Audi, which turned up the name of Steven Sadler and a Bellevue, Washington address for his condominium, with other records searches confirming it was his residence. Based on "surveillance by law enforcement on multiple occasions," White appeared to also reside at the Bellevue condo.

DVD case as drug mule

With a photo of Sadler from the driver’s license database in hand, authorities checked with employees at the UPS store who confirmed that “Aaron Thompson” was indeed Steven Sadler. They also identified a blonde female “picking up and dropping off packages, and that she described herself as Thompson’s girlfriend.”
By February 2013, the UPS store had received a package for Aaron Thompson again. With a search warrant, authorities opened the package and found a “Sports Illustrated DVD,” which also contained “nine grams of a substance that field tested positive for methamphetamine.” In March 2013, authorities intercepted another package bound for Alaska, again with the same handwriting. In striking a deal with the recipient on reduced state felony charges, the Alaska man said that he had purchased the drugs from “NOD” on the Silk Road.
By May 2013, postal inspectors received warrants to put tracking devices on the Audi and another car associated with the suspects, a BMW. Not surprisingly, the suspects’ vehicles were seen consistently traveling to various post offices in the greater Seattle region. Authorities also conducted a controlled purchase via a confidential informant’s account in June 2013 from the NOD account.
Sadler was arrested on October 2, and White turned herself in the following day.
The suspects' next court hearings are set in for October 15 and 17, respectively.

Across the pond

On Tuesday, British authorities announced that they had also arrested four men “hours after the FBI arrested the suspected creator of the Silk Road” last week. In partnership with US authorities, the National Crime Agency (NCA) arrested three men from Manchester and one from Devon who they believed were “significant users” of the Silk Road.
NCA Director General Keith Bristow said in a statement that his agency would remain vigilant in arresting and prosecuting more people involved in the notorious site, promising more arrests down the road. "These arrests send a clear message to criminals,” he said. “The hidden Internet isn't hidden and your anonymous activity isn't anonymous. We know where you are, what you are doing, and we will catch you.”
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Hands-on with the surprisingly nice $279 HP Chromebook 11

You actually get pretty decent build quality for the price. 
by Andrew Cunningham

Google's Caesar Sengupta introduces HP's Chromebook 11.
Andrew Cunningham

Until now, Chromebook buyers have had to make a choice. You could get either a cheap laptop with cheap components or the premium-but-ridiculously-expensive Chromebook Pixel. When Google says that HP's new $279 Chromebook 11 is "inspired" by the Pixel, it's not about components—the Chromebook 11 lacks the high-resolution touchscreen, the high-end Ivy Bridge CPU, and the solid aluminum construction—the Pixel's banner features. Rather, it's about making a laptop that makes enthusiasts happy without the Pixel's sticker shock.
That begins with the screen. It's an 11.6-inch 1366×768 non-touch affair (that's a non-remarkable resolution, though in a laptop this size it's more reasonable than it is in a 13-inch-or-larger system), but the most significant thing about it is that it's an IPS panel instead of the low-quality TN panel that has come with every cheap Chromebook to date. Nothing tanks an otherwise good laptop like a bad display, and the low contrast ratio and shallow viewing angles of the screens in the Samsung Chromebook or Acer's C7 Chromebook made those computers more difficult to recommend despite their low prices.
The panel in the Chromebook 11, on the other hand, is glossy with nice colors and deep blacks—not AMOLED deep, but great for the money. If you've ever wondered to yourself why a $199 tablet can offer a higher-quality display than a $600 laptop, the Chromebook 11 was made specifically for you.

More Here >>

https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA 

Nest redesigns a necessary household evil: the smoke detector

Put the broom down. They come in peace. 
by Casey Johnston

The Nest Protect: a speaker, a lighted ring, and a giant button.
Nest

The designers of the Nest "learning" thermostat plan to improve another chronically annoying household device: the smoke and carbon monoxide detector. The company's new “Nest Protect” can be controlled via a mobile app and, most importantly, features a giant, lighted  button that will immediately cancel any alarms.
According to Nest, the Protect has one sensor each for heat, light, carbon monoxide, and smoke; it can also sense movement and ultrasonic signals. In addition to an audible alarm, a lighted ring on the device will change color to alert users about household dangers. A set of Protects networked together can even help determine in which room a problem is occurring, and the lighted ring on the device is bright enough that it can light a dark room if it senses a person walking past.
Both the mobile app and the company's website can alert a Nest Protect owner when the battery in a Protect is low, a fact the device will also communicate several times via a spoken voice (i.e., no chirps).
Based on my own anecdotal experience, humanity spends far more time stalking the cryptic noises smoke detectors make or yanking the devices from the wall when they go off at the wrong times than it does being grateful to them for saving us from a fiery demise. Our relationship with these lifesavers is, at best, strained—but we maintain a strategic alliance.
The Nest Protect costs $129, about $100 more than a run-of-the-mill smoke detector. Preorders are open now, with shipments starting in early November.
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Samsung’s Galaxy Tab 3 7.0 arrives at Sprint for $49.99

Sprint joins AT&T in bringing LTE to Samsung's budget tablet. 
by Jason Inofuentes




The earliest tablets on offer from US carriers were sold without subsidies and with high plan costs. Sprint seems set to correct that mistake—somewhat. In an announcement yesterday, Sprint said that it would offer Samsung's Galaxy Tab 3 7.0 with LTE for just $49.99 to new and eligible subscribers, along with a two-year contract. The addition of the tablet will cost just $5 per month on top of a subscriber's monthly plan fees, and the device will be supported by Sprint's One Up annual upgrade program. The Tab 3 will be available in white on October 11, with a "Midnight Black" option to follow in time for the holidays.
For those who need a refresher, the 7" slate runs Samsung's flavor of Android 4.2 on Qualcomm silicon (a 1.6GHz Snapdragon 400) and pushes a 7" 1024×600 display. Not exactly top-shelf stuff. The Wi-Fi version is available for $199 from most major e-tailers, and AT&T earlier this year announced its plan to offer its own LTE variant.
Performance on the Tab 3 may not be groundbreaking, but if you've been looking to add some mobility to your tablet computing, it may be a solution for you.

https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA
 

Sharp 32-inch 4K touch display will be OS X compatible

Like those giant newsroom touchscreens, but less silly. 
by Jason Inofuentes

Sharp

If you have been itching for a 4K Thunderbolt Display from Apple, you may be waiting a little while longer. Sharp is prepared to scratch that itch, though, and intends to add full pen and touch compatibility with OS X later this year. The announcement comes from Mac Otakara (Japanese link) and comes after July's announcement of the PN-K322B 32-inch professional display.
Sharp's IGZO display technology drives these high resolutions without sacrificing power efficiency, and the company just announced a 15.6-inch model. The road to ultra high-definition (UHD) displays on every desk is a long one, though; this beauty is expected to cost upwards of $5,000 when it hits stateside. By then, visual professionals should expect to be able to whip their stylus across an array of 8 million pixels.
There's more display news from Sharp, too. At CEATEC Japan 2013 today, Sharp was the recipient of an award for its MEMS-IGZO exhibition that showcased a combination color e-paper MEMS and IGZO LCD display. The prototype display features always-on capability, similar to E Ink, and the color richness and pixel density that IGZO can bring while sipping less power than current technology. It will still be a while before we see the combo displays in handsets and tablets, but they may be worth the wait.
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Meltdowns at NSA spy data center destroy equipment, delay opening

NSA struggling to identify cause of explosions that delayed facility for a year. 
by Jon Brodkin

The NSA's Utah Data Center.

A massive data center being built by the National Security Agency to aid its surveillance operations has been hit by "10 meltdowns in the past 13 months" that "destroyed hundreds of thousands of dollars worth of machinery and delayed the center's opening for a year," the Wall Street Journalreported last night.
The first of four facilities at the Utah Data Center was originally scheduled to become operational in October 2012, according to project documents described by the Journal. But the electrical problems—described as arc fault failures or "a flash of lightning inside a 2-foot box"—led to explosions, failed circuits, and melted metal, the report states:
The first arc fault failure at the Utah plant was on Aug. 9, 2012, according to project documents. Since then, the center has had nine more failures, most recently on Sept. 25. Each incident caused as much as $100,000 in damage, according to a project official.
It took six months for investigators to determine the causes of two of the failures. In the months that followed, the contractors employed more than 30 independent experts that conducted 160 tests over 50,000 man-hours, according to project documents.
The 1 million square foot data center, filled with supercomputers and storage equipment to maintain surveillance information, is slated to cost $1.4 billion to construct. One project official told the Journalthat the NSA planned to start turning on some of the computers at the facility this week. "But without a reliable electrical system to run computers and keep them cool, the NSA's global surveillance data systems can't function," the newspaper wrote.
Project officials are still trying to determine the cause of the meltdowns, and they disagree about whether proposed fixes will work. Backup generators have failed repeated tests, cooling systems "remain untested," and "there are also disagreements among government officials and contractors over the adequacy of the electrical control systems."
The Army Corps of Engineers is overseeing construction and promised to make sure the data center is "completely reliable" before allowing it to go online.
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

How the Bible and YouTube are fueling the next frontier of password cracking

Crackers tap new sources to uncover "givemelibertyorgivemedeath" and other phrases. 
by Dan Goodin

Aurich Lawson

Early last year, password security researcher Kevin Young was hitting a brick wall. Over the previous few weeks, he made steady progress decoding cryptographically protected password data leaked from the then-recent hack of intelligence firm Stratfor. But with about 60 percent of the more than 860,000 password hashes cracked, his attempts to decipher the remaining 40 percent were failing.
The so-called dictionary attacks he mounted using lists of more than 20 million passwords culled from previous website hacks had worked well. Augmented with programming rules that substituted letters for numbers or combined two or more words in his lists, his attacks revealed Stratfor passwords such as "pinkyandthebrain", "pithecanthropus", and "moonlightshadow". Brute-force techniques trying every possible combination of letters, numbers, and special characters had also succeeded at cracking all passwords of eight or fewer characters. So the remaining 344,000 passwords, Young concluded, must be longer words or phrases few crackers had seen before.
"I was starting to run out of word lists," he recalled. "I was at a loss for words—literally."
He cracked the first 60 percent of the list using the freely available Hashcat and John the Ripper password-cracking programs, which ran the guesses through the same MD5 algorithm Stratfor and many other sites used to generate the one-way hashes. When the output of a guessed word matched one of the leaked Stratfor hashes, Young would have successfully cracked another password. (Security professionals call the technique an "offline" attack because guesses are never entered directly into a webpage.) Now, with his arsenal of dictionaries exhausted and the exponential increase in the time it would take to brute force passwords greater than eight characters, Young was at a dead end. In the passwords arms race, he was losing. Young knew he needed to compile new lists of words he never tried before. The question was where to find the words.
After cracking 60 percent of passwords leaked in the hack of Stratfor, Kevin Young mined the Internet for longer passphrases.
Kevin Young

A free cracking dictionary anyone can compile

Young joined forces with fellow security researcher Josh Dustin, and the cracking duo quickly settled on trying longer strings of words found online. They started small. They took a single article from USA Today, isolated select phrases, and inputted them into their password crackers. Within a few weeks, they expanded their sources to include the entire contents of Wikipedia and the first 15,000 works of Project Gutenberg, which bills itself as the largest single collection of free electronic books. Almost immediately, hashes from Stratfor and other leaks that remained uncracked for months fell. One such password was "crotalus atrox". That's the scientific name for the western diamondback rattlesnake, and it ended up in their word list courtesy of this Wikipedia article. The success was something of an epiphany for Young and Dustin.
"Rather than try a brute force that makes sense to a computer but not to people, let's use human beings because people typically make these long passwords based on things that humans use," Dustin remembered thinking. "I basically utilized the person who wrote the article on Wikipedia to put words together for us."
A crotalus atrox, aka western diamondback rattlesnake.
Almost immediately, a flood of once-stubborn passwords revealed themselves. They included: "Am i ever gonna see your face again?" (36 characters), "in the beginning was the word" (29 characters), "from genesis to revelations" (26), "I cant remember anything" (24), "thereisnofatebutwhatwemake" (26), "givemelibertyorgivemedeath" (26), and "eastofthesunwestofthemoon" (25).
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA


Powered by Blogger.

 

© 2013 Technology Update News!. All rights resevered. Designed by BDpython

Back To Top