Think intelligence is fixed? You’re more likely to overestimate your own

Overconfidence comes when people focus on doing all the easy parts of a task.

There are at least two distinct ways to think about intelligence. Some people believe that intelligence is a fixed characteristic, something you are born with, like your bone structure or hair color. Others believe that intelligence is more malleable and can be shaped throughout your life. Regardless of whether either of these is true, it seems that the belief itself can change our behavior.

A new study published in the Journal of Experimental Social Psychology found that believing that intelligence is fixed makes people more likely to overestimate their own intelligence and therefore less likely to develop their own intellectual capacity.

The study used a GRE-style test administered to participants, and it found that people who believe intelligence is fixed are more likely to spend time on easy test questions, but they avoided challenging ones. By contrast, people who have a growth mindset regarding intelligence—believing that intelligence can be developed and changed—are more likely to spend their time on the hardest questions. This develops their skills in answering the problems they find the most difficult.

Read 6 remaining paragraphs | Comments

Sicheres Linux Subgraph OS ausprobiert: Diese Alphaversion hat Potenzial

Mit Subgraph OS soll ein neues, sicheres Linux entstehen. Wir haben mit den Entwicklern gesprochen und das System ausprobiert – und sind trotz Alphastatus angetan. (Security, Server)

Mit Subgraph OS soll ein neues, sicheres Linux entstehen. Wir haben mit den Entwicklern gesprochen und das System ausprobiert - und sind trotz Alphastatus angetan. (Security, Server)

UI-Framework: Qt 5.6 erscheint mit drei Jahren Support

Monate später als geplant ist Qt 5.6 erschienen. Die neue Version des Frameworks wird mindestens drei Jahre gepflegt. Verbessert worden sind der Support für Windows 10 und sehr hohe Auflösungen. (Qt, API)

Monate später als geplant ist Qt 5.6 erschienen. Die neue Version des Frameworks wird mindestens drei Jahre gepflegt. Verbessert worden sind der Support für Windows 10 und sehr hohe Auflösungen. (Qt, API)

Telekom-Chef: “Datenverkehre in den Zügen explodieren”

Die Telekom klagt auf der Cebit über die stark wachsenden Datenmengen in der Deutschen Bahn durch die Fahrgäste. Bahnchef Grube kritisierte, dass 29.000 Kilometer Schiene noch gar nicht ausgeleuchtet seien. (Deutsche Bahn, WLAN)

Die Telekom klagt auf der Cebit über die stark wachsenden Datenmengen in der Deutschen Bahn durch die Fahrgäste. Bahnchef Grube kritisierte, dass 29.000 Kilometer Schiene noch gar nicht ausgeleuchtet seien. (Deutsche Bahn, WLAN)

Internet der Dinge: Intels digitaler Weinberg

In Hannover hat sich Intel einen kleinen Weinberg an seinen Stand gebaut. Das ist nicht nur Dekoration, sondern die Livedemo eines Systems, das mit WLAN, UMTS, Atom und Solarzellen Weinqualität und Ertrag in der Praxis erhöhen kann. (Cebit 2016, Intel)

In Hannover hat sich Intel einen kleinen Weinberg an seinen Stand gebaut. Das ist nicht nur Dekoration, sondern die Livedemo eines Systems, das mit WLAN, UMTS, Atom und Solarzellen Weinqualität und Ertrag in der Praxis erhöhen kann. (Cebit 2016, Intel)

Apple App Piracy Technique Used For Malware

A technique used for installing pirated iOS apps onto non-jailbroken Apple devices has now been deployed by criminals looking to compromise user accounts. A piece of malware known as ‘AceDeceiver’ carries out the same attack on Apple’s DRM system, enabling attackers to obtain login information and passwords.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

pirateappleEver since the launch of Apple’s app-enabled devices, users have sought ways to run software not sourced from the official App Store. It’s been a cat-and-mouse battle, with teams of security experts trying to break Apple’s security to enable a process known as ‘jailbreaking’.

A successfully jailbroken iPhone, for example, can not only run software from third party app stores such as Cydia, but can also run pirated iOS software. Needless to say, with this feature the popularity of jailbreaking has soared, prompting Apple to do everything it can to close security holes.

However, in 2013 something unexpected happened. A new technique known as the “FairPlay Man-In-The-Middle” (MITM) attack exploited flaws in Apple’s ‘Fairplay’ DRM system to allow both pirated and third-party software (unapproved by Apple) to run on iOS devices. Crucially, this could all take place without a jailbreak being deployed on the device.

Somewhat surprisingly people with the ability to carry out the third-party software exploit have been remarkably well behaved for the past three years but all good things come to an end. Rather than using the loophole for consumer-friendly activity, attackers are now using it for evil.

According to Palo Alto Networks researcher Claud Xiao, there now exists iOS malware that is able to deploy itself to non-jailbroken devices using the man-in-the-middle attack previously used by pirates.

Named “AceDeceiver” by the researcher, the malware targets the method of transferring App Store purchases from the iTunes software installed on users’ computers to their iOS devices.

“iOS devices will request an authorization code for each app installed to prove the app was actually purchased,” Xiao explains.

“In the FairPlay MITM attack, attackers purchase an app from App Store then intercept and save the authorization code. They then developed PC software that simulates the iTunes client behaviors, and tricks iOS devices to believe the app was purchased by victim. Therefore, the user can install apps they never actually paid for, and the creator of the software can install potentially malicious apps without the user’s knowledge.”

fairplay-mitm

But to do its dirty deeds AceDeceiver needs to find a way onto a user’s device in the first instance and that was achieved via Apple’s very own App Store.

Between July 2015 and February 2016 software claiming to be wallpaper apps successfully passed Apple’s vetting systems and were made available to Apple users. The way this was achieved was extremely cunning, with the App only going into malicious mode if it was run in a certain geographical area, in this case, China.

“The iOS apps of AceDeceiver mainly act as a third party app store if users access them from China. Note that some of the apps or games they provide in the store are also installed through a FairPlay MITM attack. In addition, these apps strongly suggest users input their Apple ID with password so that users could ‘directly install free apps from the App Store, execute in-app purchase, and login to Game Center’.”

That doesn’t sound like good news and indeed, the researchers found that claims that the software did not transfer login credentials were simply untrue.

“In fact, we discovered all versions of AceDeceiver will upload the Apple ID and password to [the attackers’ server],” Xiao adds.

All three apps were removed by Apple after the researchers reported them in February 2016 but their threat remains.

“The attack is still viable because the FairPlay MITM attack only requires these apps to have been available in the App Store once. As long as an attacker could get a copy of authorization from Apple, the attack doesn’t require current App Store availability to spread those apps,” Xiao explains.

“While the attack requires a user’s PC to be infected by malware first, after that, the infection of iOS devices is completed in the background without the user’s awareness. The only indication is that the new malicious app does appear as an icon in the user’s home screen, so the user may notice a new app he or she won’t recall downloading.”

The full disclosure from Claud Xiao can be found here, along with removal instructions for those concerned they may be infected by the malware.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Xbox und Windows Live: Der Masterplan von Microsoft

Gemeinsame E-Sport-Turniere mit der ESL, ein einheitlicher Store für die Xbox und Windows 10 sowie technische Verbesserungen: Microsoft hat einen Teil seiner Pläne für das Geschäft mit Games vorgestellt. (Xbox Live, Microsoft)

Gemeinsame E-Sport-Turniere mit der ESL, ein einheitlicher Store für die Xbox und Windows 10 sowie technische Verbesserungen: Microsoft hat einen Teil seiner Pläne für das Geschäft mit Games vorgestellt. (Xbox Live, Microsoft)

Intel Skull Canyon: Totenschädel-NUC mit Iris Pro, Skylake und Thunderbolt 3

Intels neue NUC hat es in sich: Unter dem Totenschädel stecken ein Skylake-Quadcore mit Iris Pro Graphics 580, DDR4-Speicher, zwei PCIe-SSDs und Thunderbolt für externe Grafikkarten. (Intel NUC, Intel)

Intels neue NUC hat es in sich: Unter dem Totenschädel stecken ein Skylake-Quadcore mit Iris Pro Graphics 580, DDR4-Speicher, zwei PCIe-SSDs und Thunderbolt für externe Grafikkarten. (Intel NUC, Intel)

Microsoft: Universal Windows Platform ausgepackt

Epic-Chef Tim Sweeney befürchtet durch die Universal Windows Platform ein Microsoft-Monopol – aber was ist diese “UWP” eigentlich? Ein Entwickler hat erklärt, was in den Software-Containern steckt. (Microsoft, Games)

Epic-Chef Tim Sweeney befürchtet durch die Universal Windows Platform ein Microsoft-Monopol - aber was ist diese "UWP" eigentlich? Ein Entwickler hat erklärt, was in den Software-Containern steckt. (Microsoft, Games)