3D-Touch: Apple behebt Siri-Sicherheitslücke ohne iOS-Update

Apple hat die Sicherheitslücke im iPhone 6S und 6S Plus gestopft, die es Angreifern erlaubte, mit einem Trick auf Fotos und Kontakte zuzugreifen, obwohl das iPhone gesperrt ist. Ein Update von iOS ist nicht erforderlich. (Siri, Apple)

Apple hat die Sicherheitslücke im iPhone 6S und 6S Plus gestopft, die es Angreifern erlaubte, mit einem Trick auf Fotos und Kontakte zuzugreifen, obwohl das iPhone gesperrt ist. Ein Update von iOS ist nicht erforderlich. (Siri, Apple)

Vivaldi 1.0 im Test: Der gelungene Opera-Nachfolger

Vivaldi 1.0 ist fertig – Opera-Liebhaber haben diesem Moment entgegengefiebert. Die Macher haben ihr Ziel erreicht: Ihr Browser ist trotz einiger Mängel der würdige Nachfolger von Opera 12. (Vivaldi, Browser)

Vivaldi 1.0 ist fertig - Opera-Liebhaber haben diesem Moment entgegengefiebert. Die Macher haben ihr Ziel erreicht: Ihr Browser ist trotz einiger Mängel der würdige Nachfolger von Opera 12. (Vivaldi, Browser)

Vivaldi 1.0 web browser launches, targets power users

Vivaldi 1.0 web browser launches, targets power users

There’s a new web browser in town, and it’s packed with geeky features like a heavily customizable user interface, support for stacking browser tabs together in groups, and support for dozens of keyboard shortcuts, quick commands, and mouse gestures. The Vivaldi web browser first launched as a public preview in early 2015. Now version 1.0 is available […]

Vivaldi 1.0 web browser launches, targets power users is a post from: Liliputing

Vivaldi 1.0 web browser launches, targets power users

There’s a new web browser in town, and it’s packed with geeky features like a heavily customizable user interface, support for stacking browser tabs together in groups, and support for dozens of keyboard shortcuts, quick commands, and mouse gestures. The Vivaldi web browser first launched as a public preview in early 2015. Now version 1.0 is available […]

Vivaldi 1.0 web browser launches, targets power users is a post from: Liliputing

DDR4: Samsung produziert 8-GBit-Chips im 10-nm-Verfahren

Eine Strukturbreite kleiner als 20 nm: Samsung hat die Serienfertigung von DDR4-Arbeitsspeicher im sogenannten 10-nm-Class-Verfahren begonnen. Entsprechende Module fassen bis zu 128 GByte. (DDR4, GreenIT)

Eine Strukturbreite kleiner als 20 nm: Samsung hat die Serienfertigung von DDR4-Arbeitsspeicher im sogenannten 10-nm-Class-Verfahren begonnen. Entsprechende Module fassen bis zu 128 GByte. (DDR4, GreenIT)

Gawker begins appeal of $140M Hulk Hogan sex-tape verdict

Was it wrong for a jury to decide “what’s news?”

(credit: Garry Knight)

The online news and gossip site Gawker has begun the process of appealing the $140 million verdict a jury ordered it to pay last month for publishing a sex tape of Terry Bollea, better known as former pro wrestler Hulk Hogan.

The Gawker appeal is no surprise, as the company has said it will appeal since the verdict was delivered. In motions filed late Monday, the online media outlet has asked for the verdict to be thrown out or the damages "greatly reduced," according to a report in The Wall Street Journal.

Gawker lawyers argue the $25 million in punitive damages that was added on to the $110 million in compensatory damages would be "ruinous." The jury was told that Gawker Media was worth $83 million while its founder Nick Denton was worth $121 million.

Read 3 remaining paragraphs | Comments

Report: Amazon’s next Kindle may be super-thin, support a battery-charging case

Report: Amazon’s next Kindle may be super-thin, support a battery-charging case

Amazon CEO Jeff Bezos says a new “top of the line” Kindle is coming soon. Details won’t officially be announced until next week, but a series of leaks are starting to give us a picture of what to expect. A Wall Street Journal article says the next high-end eReader from Amazon will work with a protective case that […]

Report: Amazon’s next Kindle may be super-thin, support a battery-charging case is a post from: Liliputing

Report: Amazon’s next Kindle may be super-thin, support a battery-charging case

Amazon CEO Jeff Bezos says a new “top of the line” Kindle is coming soon. Details won’t officially be announced until next week, but a series of leaks are starting to give us a picture of what to expect. A Wall Street Journal article says the next high-end eReader from Amazon will work with a protective case that […]

Report: Amazon’s next Kindle may be super-thin, support a battery-charging case is a post from: Liliputing

Why Microsoft needed to make Windows run Linux software

And how it could leapfrog Apple as the dev platform of choice.

It's bash, it's Windows, it's not a virtual machine.

Perhaps the biggest surprise to come from Microsoft's Build developer conference last week was the Windows Subsystem for Linux (WSL).

The system will ship as part of this summer's Anniversary Update for Windows 10. WSL has two parts; there's the core subsystem, which is already included in Insider Preview builds of the operating system, and then a package of software that Canonical will provide. The core subsystem is what provides the Linux API on Windows, including the ability to natively load Linux executables and libraries. Canonical will provide bash and all the other command-line tools that are expected in a Linux environment.

Microsoft is positioning WSL strictly as a tool for developers, with a particular view to supporting Web developers and the open source software stacks that they depend on. Many developers are very familiar with the bash shell, with building software using make and gcc, and editing text in vi or emacs. WSL will give these developers versions of these tools that are equal in just about every regard to the ones you get on Linux, because they'll be the ones you get on Linux running unmodified on Windows.

Read 22 remaining paragraphs | Comments

Researchers keep pig heart beating in baboon belly for >2 years—a new record

The cross-species transplant is a step closer to using pig parts in humans.

(credit: Nick Saltmarsh)

While waiting for an organ donor, patients in need of a transplant may one day have the option of taking out a loaner organ—from a pig.

Researchers report Tuesday that they were able to keep pig hearts alive and beating in the abdomens of five baboons for record amounts of time—a median of 298 days and a max of 945 days. Previous benchmarks were set at a median of 180 and a max of 500 days, respectively.

Data from the prolonged ticker swap, published in Nature Communications, highlights scientists’ progress at breaking down the biological barriers of cross-species organ donation, inching closer to using animal organs in humans in desperate need of transplants. Currently in the US, 22 people die every day just waiting for organs, which are in constant short supply.

Read 7 remaining paragraphs | Comments

Cuckoldry is incredibly rare among humans

New study finds that only 1-2% of men unknowingly raise children who aren’t theirs

Science proves that there's only about a 1% chance that your wife is having Satan's baby instead of yours. (credit: Rosemary's Baby)

Reading the internet, or even perusing the scientific literature, you'd get the idea that people are constantly cheating on their spouses. Indeed, scientists have estimated that anywhere from 10-30 percent of men are unknowingly raising children who are not their own. This situation is referred to as cuckoldry, or scientifically as "extra-pair paternity." Now, however, it appears that our estimates of cuckoldry rates were way off.

A new survey published in Trends in Ecology and Evolution sums up a number of recent studies that show the actual rate of cuckolds in the general population, based on genetic testing and ancestor research, is 1-2 percent. This challenges evolutionary psychologists who have suggested that human women "routinely ‘shop around’ for good genes by engaging in extra-pair copulation to obtain genetic benefits." This idea came in part from studying socially monogamous songbirds, which mate for life but have roughly 1 in 10 babies as a result of "extra pair" matings.

Scientists were so unwilling to believe that human women were different from songbirds that some suggested the discrepancy between expected and actual rates of cuckoldry was a recent development caused by birth control. One study asserted that women who cheat may be getting pregnant less often than they would have historically. But that assumption turned out to be wrong as well. As the study authors write, human extra-pair paternity rates "have stayed near constant at around 1% across several human societies over the past several hundred years."

Read 3 remaining paragraphs | Comments

NoScript and other popular Firefox add-ons open millions to new attack

Unlike many browsers, Firefox doesn’t always isolate an add-on’s functions.

NoScript, Firebug, and other popular Firefox add-on extensions are opening millions of end users to a new type of attack that can surreptitiously execute malicious code and steal sensitive data, a team of researchers reported.

The attack is made possible by a lack of isolation in Firefox among various add-ons installed by an end user. The underlying weakness has been described as an extension reuse vulnerability because it allows an attacker-developed add-on to conceal its malicious behavior by invoking the capabilities of other add-ons. Instead of directly causing a computer to visit a booby-trapped website or download malicious files, the add-on exploits vulnerabilities in popular third-party add-ons that allow the same nefarious actions to be carried out. Nine of the top 10 most popular Firefox add-ons contain exploitable vulnerabilities. By piggybacking off the capabilities of trusted third-party add-ons, the malicious add-on faces much better odds of not being detected.

"These vulnerabilities allow a seemingly innocuous extension to reuse security-critical functionality provided by other legitimate, benign extensions to stealthily launch confused deputy-style attacks," the researchers wrote in a paper that was presented last week at the Black Hat security conference in Singapore. "Malicious extensions that utilize this technique would be significantly more difficult to detect by current static or dynamic analysis techniques, or extension vetting procedures."

Read 9 remaining paragraphs | Comments