Nachrichten-Vorlesen: Siri soll bald schweigen

Apple will die Siri-Sicherheitslücke mit einem Update schließen. Dann sollen Benachrichtigungen von Apps nicht mehr bei gesperrtem iPhone per Sprachassistent vorgelesen werden können. (Siri, Smartphone)

Apple will die Siri-Sicherheitslücke mit einem Update schließen. Dann sollen Benachrichtigungen von Apps nicht mehr bei gesperrtem iPhone per Sprachassistent vorgelesen werden können. (Siri, Smartphone)

Cambridge Analytica breach results in lawsuits filed by angry Facebook users

“Facebook lies within the penumbra of blame,” Maryland woman claims.

Enlarge (credit: Sergei Konkov / TASS / Getty Images)

In the wake of the ongoing Cambridge Analytica debacle, Facebook has now been sued in federal court in San Francisco and San Jose. These new cases claim violations of federal securities laws, unfair competition, and negligence, among other allegations.

The pair of cases stem from recent revelations that Cambridge Analytica, a British data firm that contracted with the Donald Trump presidential campaign, retained private data from 50 million Facebook users despite claiming to have deleted it. New reporting on Cambridge Analytica has spurred massive public outcry from users and politicians with CEO Mark Zuckerberg calling it a "breach of trust."

These two cases, which were filed on March 20, could be just the first among what could be a coming wave of similar lawsuits.

Read 9 remaining paragraphs | Comments

Vivaldi web browser lets you change default search provider for Private browsing

Most modern web browsers let you choose your own default search engine. But Vivaldi is going a step further by letting you set two different default search providers: one for normal browsing, and another for private browsing. The Vivaldi blog post anno…

Most modern web browsers let you choose your own default search engine. But Vivaldi is going a step further by letting you set two different default search providers: one for normal browsing, and another for private browsing. The Vivaldi blog post announcing the feature focuses on the fact that the latest version of Vivaldi sets […]

The post Vivaldi web browser lets you change default search provider for Private browsing appeared first on Liliputing.

Video suggests huge problems with Uber’s driverless car program

Video of the fatal driverless car crash in Tempe is damning for Uber.

Enlarge (credit: Aurich Lawson / Everything Is In Stock)

There's something very wrong with Uber's driverless car program.

On Wednesday night, police released footage of Sunday night's deadly car crash in Tempe, Arizona, where an Uber self-driving car crashed into 49-year-old Elaine Herzberg. The details it reveals are damning for Uber.

"The idea that she 'just stepped out' or 'came out in a flash' into the car path is clearly false," said Tara Goddard, an urban planning professor at Texas A&M University, after seeing the video. "It seems like the system should have responded."

Read 42 remaining paragraphs | Comments

Five new ancient genomes tell us about Neanderthal tribes

And narrow down the window of breeding between our species.

Enlarge / Inside of the Vindija Cave, Croatia. (credit: M. Hajdinjak)

Mezmaiskaya Cave offered shelter to Neanderthals for tens of thousands of years. The cave, located near Russia's border with Georgia, preserved Neanderthal remains so well that researchers have now been able to extract genetic information from two different individuals who lived approximately 20,000 years apart. And it's just one of the sites that's featured in a new collection of Neanderthal genomes: two from caves in Belgium, one from France, one from Croatia, and one from Mezmaiskaya.

As scientists publish more Neanderthal genomes, they’re able to start sketching more details of the long-ago drama and danger these people experienced. The new genomes are all from 39,000 to 47,000 years ago—late in the history of the population. The new data helps us piece together new details on Neanderthal population groups, their movements across Europe, and when they’re most likely to have bred with humans.

Replacement

The researchers, led by Mateja Hajdinjak at the Max Planck Institute for Evolutionary Anthropology, extracted tiny amounts of bone or tooth powder—sometimes as little as 9mg—and used a chemical process to remove modern genetic contamination. They also checked for the telltale signs of degradation found in ancient DNA.

Read 8 remaining paragraphs | Comments

Atlanta city government systems down due to ransomware attack

FBI called in as some city services are interrupted, employees told to turn off PCs.

Enlarge / The message posted to social media by the city of Atlanta in the wake of an apparent ransomware attack. (credit: City of Atlanta)

The city of Atlanta government has apparently become the victim of a ransomware attack. The city's official Twitter account announced that the city government "is currently experiencing outages on various customer facing applications, including some that customers may use to pay bills or access court-related information."

According to a report from Atlanta NBC affiliate WXIA, a city employee sent the station a screen shot of a ransomware message demanding a payment of $6,800 to unlock each computer or $51,000 to provide all the keys for affected systems. Employees received emails from the city's information technology department instructing them to unplug their computers if they noticed anything suspicious. An internal email shared with WXIA said that the internal systems affected include the city's payroll application.

In a statement sent to Ars, a city spokesperson said, "At this time, our Atlanta Information Management team is working diligently with support from Microsoft to resolve the issue. We are confident that our team of technology professionals will be able to restore applications soon." The city's primary website remains online, and the city government will continue to post updates there, the spokesperson added.

Read 2 remaining paragraphs | Comments

Release Windows of Digital Movie Downloads Are Shrinking

An often heard motivation for people to illegally download or stream content is the long gap between a movie’s theatrical release and its debut through other channels. New research shows that for digital downloads this gap is shrinking rapidly. But is that enough?

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

After a film first shows up in theaters, movie fans usually have to wait a few months before they can get a DVD or digital download, depending on the local release strategy.

This delay tactic, known as a release window, helps movie theaters to maximize their revenues. However, for many pirates, this is also a reason to turn to unauthorized sites and services.

Many of the most pirated movie titles are not yet available to buy or rent online, but they are on The Pirate Bay, Fmovies, and elsewhere. Perhaps only a fraction of these pirates would pay, if they could, but release windows are not helping.

This critique isn’t new and, according to a working paper published by Pepperdine University researchers, the tide is turning. Movie release windows are shrinking rapidly, for digital downloads at least.

In their paper titled: Popcorn or Snack? Empirical Analysis of Movie Release Windows, the researchers compared the release windows of DVDs to those of electronic sell-through movies (EST) on iTunes, Amazon, and YouTube. EST movies are also called “download to own” and have a comparable release date to rentals, in most cases.

The results show that between 2012 and 2017, the release windows for DVDs remained relatively stable at three to four months. However, for digital downloads there was a sharp decrease over the same period.

“Based on our results, the EST release date has been approaching the DVD release date at a steady and significant average rate of about 23 days per year,” the researchers write.

“Within only two years, we have seen the average EST release window shrink by more than half, from 255 days in the 2nd quarter of 2012 to 114 days in the 2nd quarter of 2014. The EST window has pretty much reached the average 113 day DVD window in our sample.”

Shrinking window

Since 2015, digital downloads actually have a slightly smaller release window than DVDs on average, making it the first release channel after movie theaters.

While this is good news for movie fans, it’s uncertain if this trend will continue. The current release windows appear to be carefully chosen to ensure that they don’t cannibalize box office revenues.

This is nicely illustrated in the figure below, which shows that 95% of all box office revenues are generated in the first two months, and 99% after four months. The optimal release window falls somewhere in the middle.

That would also explain why the DVD release window isn’t shrinking any further.

Cumulative box office revenue

The researchers see room for further improvement, however. Decreasing the video on demand release window can cost a few percents of box office revenue, at most, but it might result in a significant boost in online sales.

And with the piracy rates not showing any decline, movie studios might feel the need to experiment a little.

“Given that most of the theater revenues are captured within the first two months and given that movie piracy shows no signs of slowing down, there will be increasing pressure for studios to release movies earlier in secondary channels to increase revenues coming from these channels,” the researchers write.

The full paper, written by Dr. Nelson Granados and Dr. John Mooney, is available here.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

New lithium-air battery survives hundreds of cycles

Reaction with CO₂ give lithium a protective coat that holds up to oxygen.

Enlarge (credit: TSA)

Batteries supply electrons by undergoing reversible chemical reactions. That has meant that all the reactants have to be inside the battery, which adds to its weight and volume. Lithium-air batteries could potentially change that. At one electrode, they have pure lithium metal, rather than a lithium-containing chemical. At the other, the lithium reacts with oxygen in the air. When the battery is charged, this reaction is reversed, and the oxygen is returned to our atmosphere.

With far fewer chemicals permanently inside the battery, it's possible to achieve a much higher energy density—there have been demonstrations of lithium-air batteries with an energy density five times that of current lithium-ion tech. The only drawback? They have a lifespan of about a month, in part because both oxygen and metallic lithium are pretty reactive and in part because air offers a lot of things other than oxygen that can react.

Now, a team of researchers has figured out a way to protect against many of these reactions and showed that the resulting battery can survive hundreds of charge/discharge cycles in an air-like atmosphere. Which probably means the researchers are ready to figure out what goes wrong when this material meets actual air. The hope is that will be an easier issue to solve.

Read 8 remaining paragraphs | Comments

Dealmaster: Grab a new Logitech MX Master wireless mouse for $58

Plus up to 30% off Amazon Alexa devices, an Essential Phone discount, and more.

Greetings, Arsians! Courtesy of our friends at TechBargains, we have another round of deals to share. Every now and then, Amazon runs a collection of deals on Logitech accessories—today is one of those days. This haul isn't as far-reaching as some incarnations but still includes discounts on a few popular peripherals, including the Logitech MX Master, which is down to $58. That's about $15 off its usual going rate, and it's close to the lowest it has been on Amazon to date.

The MX Master is technically a generation behind the newer MX Master 2S, but it comes with a similarly sturdy, contoured, and wireless design and still works on most surfaces. The newer model does get you longer battery life (about 70 days instead of 40 days) and the ability to copy and paste between multiple computers, but it also costs $92 as of this writing.

If you want nothing to do with Logitech, though, we've also got discounts on Dell laptops, Amazon's entire line of Fire tablets, the Amazon Echo Spot, the Essential Phone, Nintendo's Switch Pro controller, and more. Take a look for yourself below.

Read 10 remaining paragraphs | Comments

Thousands of servers found leaking 750MB worth of passwords and keys

Leaky etcd servers could be a boon to data thieves and ransomware scammers.

Enlarge (credit: Mike Pratt)

Thousands of servers operated by businesses and other organizations are openly sharing credentials that may allow anyone on the Internet to log in and read or modify potentially sensitive data stored online.

In a blog post published late last week, researcher Giovanni Collazo said a quick query on the Shodan search engine returned almost 2,300 Internet-exposed servers running etcd, a type of database that computing clusters and other types of networks use to store and distribute passwords and configuration settings needed by various servers and applications. etcd comes with a programming interface that responds to simple queries that by default return administrative login credentials without first requiring authentication. The passwords, encryption keys, and other forms of credentials are used to access MySQL and PostgreSQL databases, content management systems, and other types of production servers.

Collazo said he wrote a simple script that ran through the 2,284 etcd servers found in his Shodan search. Using the query GET http://:2379/v2/keys/?recursive=true, the script was designed to return all credentials stored on the servers in a format that would be easy for hackers to use. Collazo stopped the script after it collected about 750 megabytes of data from almost 1,500 of the servers. The haul included:

Read 4 remaining paragraphs | Comments