Forgot your password?
typodupeerror

Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

Upgrades

Why the iPhone 6 Has the Same Base Memory As the iPhone 5 232

Posted by timothy
from the enough-is-enough-for-anybody dept.
Lucas123 writes When the iPhone 5 was launched two years ago, the base $199 (with wireless plan) model came with 16GB of flash memory. Fast forward to this week when the iPhone 6 was launched with the same capacity. Now consider that the cost of 16GB of NAND flash has dropped by more than 13% over the past two years. So why would Apple increase capacity on its $299 model iPhone 6 to 64GB (eliminating the 32GB model), but but keep the 16GB in the $199 model? The answer may lie in the fact that the 16GB iPhone is, and has been, by far the best selling model. IHS analyst Fang Zhang believes Apple is using that to push users to its iCloud storage service. Others believe restricting storage capacity allows Apple to afford the new features, like NFC and biometrics.
Communications

Scientists Twist Radio Beams To Send Data At 32 Gigabits Per Second 121

Posted by samzenpus
from the greased-lightning dept.
concertina226 writes Scientists from three international universities have succeeded in twisting radio beams in order to transfer data at the speed of 32 gigabits per second, which is 30 times faster than 4G LTE wireless technology in use today. The researchers, led by Alan Willner, an electrical engineering professor with the University of Southern California Viterbi School of Engineering, successfully demonstrated data transmission rates of 32 gigabits per second across 2.5m of free space in a basement laboratory.
Transportation

Technological Solution For Texting While Driving Struggles For Traction 326

Posted by Soulskill
from the no-behavioral-incentive-strong-enough dept.
An anonymous reader writes: While legislators and police try to tackle the epidemic of distracted driving through education, regulation, and enforcement, Scott Tibbitts is trying to solve it through engineering. He developed a small device which, when plugged into a vehicle, would determine which phone belonged to the driver and shut off its texting and voice call capabilities. "The telematics box sends a wireless message that the car is moving. The phone sends its own message about its location. Both sets of information — from the car and phone — are sent to Katasi's servers. Then, an algorithm weighs the incoming data with other information, like the location of the phones belonging to all the people who drive the car and the starting point of the trip; if the trip starts at Junior's high school, and mom and dad's phones are at work, the driver has been identified — Junior is driving."

The problem is that Tibbitts can't get anyone interested in setting up a system to make these devices ubiquitous. Consumers can't be sold on such a product: all evidence suggests people are increasingly unwilling to be cut off from constant communication. So, he tried working with carriers. Sprint partnered with Tibbitts long enough to test the device, but they were afraid of the legal risks involved. Now, Tibbitts is nursing the technology along, looking for a way to get it into cars and make people safer.
Iphone

iPhone 6 Sales Crush Means Late-Night Waits For Some Early Adopters 222

Posted by timothy
from the who'd-a-thunk-it dept.
Even after the months of hype and speculation, the behind-the-scenes development and manufacture, and then the announcement Tuesday, it seems Apple's servers weren't quite ready for the workout they got from would-be early adopters of its newest iPhone. Preorders through Verizon Wireless and AT&T largely started without a hitch at midnight, though some customers on Twitter have since complained about issues. Those problems were nothing compared to the issues experienced by Sprint and T-Mobile customers. The Sprint and T-Mobile sites were still down for many users nearly two hours after presales were slated to start. Access to Sprint's site faded in and out, while the T-Mobile site continued to display a form to register for a reminder for when the preorders began. Some people joked on Twitter that they "might as well wait for the iPhone 6S now." Apple's store itself was down for a few hours, too.
Wireless Networking

L.A. TV Stations Free Up Some Spectrum For Wireless Broadband 80

Posted by timothy
from the slightly-less-waste dept.
alphadogg (971356) writes An effort to free up some of the airwaves used by TV broadcasts and make them available for wireless broadband took a big step forward this week in the U.S. Two TV stations in Los Angeles, KLCS and KCET, have agreed to share a single frequency to deliver their programming freeing up a channel that can be auctioned off to wireless carriers next year. The change, which the Federal Communications Commission calls "repackaging," is possible because digital TV broadcasts don't need the full 6MHz of broadcast spectrum that was used for analog TV.
Networking

Device Boots Drones, Google Glass Off Wi-Fi 184

Posted by Soulskill
from the they-don't-want-your-kind-around-here dept.
An anonymous reader writes: Amid the backlash against spy-eye drones as well as wearable cameras like Google Glass, one company is building a device to fight back. The Cyborg Unplug actively scans for drones or Google Glass on a local wireless network and blocks their traffic. They're billing it as an "anti-surveillance system" and marketing it toward businesses, restaurants, and schools. They take pains to note that it's not a jammer, instead sending copies of a de-authentication packet usually sent by a router when it disconnects a device. The device can, however, force devices to disconnect from any network, which they warn may be illegal in some places.
Iphone

Apple Announces Smartwatch, Bigger iPhones, Mobile Payments 730

Posted by Soulskill
from the please-can-the-hype-stop-now dept.
Today at Apple's September press conference, they announced the new iPhone 6 models. There are two of them — the iPhone 6 is 4.7" at 1334x750, and the iPhone 6 Plus is 5.5" at 1920x1080. Both phones are thinner than earlier models: 5S: 7.6mm, 6: 6.9mm, 6 Plus: 7.1mm. The phones have a new-generation chip, the 64-bit A8. Apple says the new phones have a 25% faster CPU, 50% faster GPU, and they're 50% more energy efficient (though they were careful to say the phones have "equal or better" battery life to the 5S). Apple upgrade the phones' wireless capabilities, moving voice calls to LTE and also enabling voice calls over Wi-Fi. The phones ship on September 19th, preceded by the release of iOS 8 on September 17th.

Apple also announced its entry into the payments market with "Apple Pay." They're trying to replace traditional credit card payments with holding an iPhone up to a scanner instead. It uses NFC and the iPhone's TouchID fingerprint scanner. Users can take a picture of their credit cards, and Apple Pay will gather payment information, encrypt it, and store it. (Apple won't have any of the information about users' credit cards or their purchases, and users will be able to disable the payment option through Find My iPhone if they lose the device.) Apple Pay will work with Visa, Mastercard, and American Express cards to start. 220,000 stores that support contactless payment will accept Apple Pay, and many apps are building direct shopping support for it. It will launch in October as an update for iOS 8, and work only on the new phones.

Apple capped off the conference with the announcement of the long-anticipated "Apple Watch." Their approach to UI is different from most smartwatch makers: Apple has preserved the dial often found on the side of analog watches, using it as a button and an input wheel. This "digital crown" enables features like zoom without obscuring the small screen with fingers. The screen is touch-sensitive and pressure sensitive, so software can respond to a light tap differently than a hard tap. The watch runs on a new, custom-designed chip called the S1, it has sensors to detect your pulse, and it has a microphone to receive and respond to voice commands. It's powered by a connector that has no exposed contacts — it magnetically seals to watch and charges inductively. The Apple Watch requires an iPhone of the following models to work: 6, 6Plus, 5s, 5c, 5. It will be available in early 2015, and will cost $349 for a base model.
Advertising

Comcast Using JavaScript Injection To Serve Ads On Public Wi-Fi Hotspots 230

Posted by Soulskill
from the perfectly-in-character dept.
An anonymous reader writes: For some time now, Comcast has setting up public Wi-Fi hotspots, some of which are run on the routers of paying subscribers. The public hotspots are free, but not without cost: Comcast uses JavaScript to inject self-promotional ads into the pages served to users. "Security implications of the use of JavaScript can be debated endlessly, but it is capable of performing all manner of malicious actions, including controlling authentication cookies and redirecting where user data is submitted. ... Even if Comcast doesn't have any malicious intent, and even if hackers don't access the JavaScript, the interaction of the JavaScript with websites could "create" security vulnerabilities in websites, [EFF technologist Seth Schoen] said. "Their code, or the interaction of code with other things, could potentially create new security vulnerabilities in sites that didn't have them," Schoen said."
Software

Post-Microsoft Nokia Offering Mapping Services To Samsung 67

Posted by Soulskill
from the will-map-for-food dept.
jfruh writes: With Nokia's Windows Phone handset line sold off to Microsoft, one of the company's remaining businesses is its Here digital mapping service. No longer feeling loyalty to Microsoft or its OS, Nokia has inked a deal with Samsung to supply Here services to both Tizen and Android devices, including the upcoming Samsung smartwatch.
Wireless Networking

Wi-Fi Router Attack Only Requires a Single PIN Guess 84

Posted by Soulskill
from the one-two-three-four dept.
An anonymous reader writes: New research shows that wireless routers are still quite vulnerable to attack if they don't use a good implementation of Wi-Fi Protected Setup. Bad implementations do a poor job of randomizing the key used to authenticate hardware PINs. Because of this, the new attack only requires a single guess at the hardware PIN to collect data necessary to break it. After a few hours to process the data, an attacker can access the router's WPS functionality. Two major router manufacturers are affected: Broadcom, and a manufacturer to be named once they get around to fixing it. "Because many router manufacturers use the reference software implementation as the basis for their customized router software, the problems affected the final products, Bongard said. Broadcom's reference implementation had poor randomization, while the second vendor used a special seed, or nonce, of zero, essentially eliminating any randomness."
Transportation

How the World's Fastest Electric Car Is Pushing Wireless Charging Tech 49

Posted by timothy
from the amping-up dept.
An anonymous reader writes With the first ever season of Formula E revving up in China next month, it's clear there's more to electric cars than Tesla. But the race cars hitting the track in Beijing don't have anything on the speed of Drayson Racing Technology's Lola B12 69/EV, which holds the record for the world's fastest lightweight electric car, and which uses the kind of power technologies that could one day have applications off the track too—like charging your phone wirelessly.
Transportation

It's Easy To Hack Traffic Lights 144

Posted by Soulskill
from the looking-forward-to-the-mobile-app dept.
An anonymous reader notes coverage of research from the University of Michigan into the ease with which attackers can hack traffic lights. From the article: As is typical in large urban areas, the traffic lights in the subject city are networked in a tree-type topology, allowing them to pass information to and receive instruction from a central management point. The network is IP-based, with all the nodes (intersections and management computers) on a single subnet. In order to save on installation costs and increase flexibility, the traffic light system uses wireless radios rather than dedicated physical networking links for its communication infrastructure—and that’s the hole the research team exploited. ... The 5.8GHz network has no password and uses no encryption; with a proper radio in hand, joining is trivial. ... The research team quickly discovered that the debug port was open on the live controllers and could directly "read and write arbitrary memory locations, kill tasks, and even reboot the device (PDF)." Debug access to the system also let the researchers look at how the controller communicates to its attached devices—the traffic lights and intersection cameras. They quickly discovered that the control system’s communication was totally non-obfuscated and easy to understand—and easy to subvert.
Networking

T-Mobile To Throttle Customers Who Use Unlimited LTE Data For Torrents/P2P 147

Posted by Soulskill
from the who-torrents-over-mobile-anyway dept.
New submitter User0x45 writes: Here's a nicely transparent announcement: "T-mobile has identified customers who are heavy data users and are engaged in peer-to-peer file sharing, and tethering outside of T-Mobile’s Terms and Conditions (T&C). This results in a negative data network experience for T-Mobile customers. Beginning August 17, T-Mobile will begin to address customers who are conducting activities outside of T-Mobile’s T&Cs." Obviously, it's not a good announcement for people with unlimited plans, but at least it's clear. T-mobile also pulled the backwards anti-net neutrality thing by happily announcing 'Free Streaming' from select music providers... which is, in effect, making non-select usage fee-based.
Security

Connected Collar Lets Your Cat Do the War-Driving 110

Posted by timothy
from the wifi-password-|"pl[\'as[cnp dept.
MojoKid (1002251) writes "Security researcher Gene Bransfield, with the help of his wife's grandmother's cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-Fi module, a GPS module, and a battery, Coco the cat helped Gene identify Wi-Fi networks around the neighborhood and then reported back. The goal here is obvious: Discover all of the unsecured, or at least poorly-secured, wireless access points around the neighborhood. During his journey, Coco identified dozens of Wi-Fi networks, with four of them using easily-broken WEP security, and another four that had no security at all. Gene has dubbed his collar the "WarKitteh", and it cost him less than $100 to make. He admits that such a collar isn't a security threat, but more of a goofy hack. Of course, it could be used for shadier purposes." (Here's Wired's article on the connected cat-collar.)
Communications

FCC Mandates Text-to-911 From All US Wireless Carriers 80

Posted by timothy
from the coming-from-inside-the-house dept.
An anonymous reader writes "On Friday, the Federal Communications Commission (FCC) voted to require all U.S. wireless carriers and popular messaging applications to support texting to emergency response units via 911. AT&T, Verizon, Sprint, and T-Mobile implemented this capability back in 2012; the FCC's vote will make it mandatory for all carriers that operate in the country as well as all messaging applications that interconnect with the SMS structure in the U.S. to follow suit. One technological hurdle this mandate faces is the difficulty of tracing "the exact physical origin of a text message, particularly in residences with multiple floors."" Somehow I doubt that cellphone calls are consistently traceable to that degree, either, and I've lived in houses with extensions spread over several floors, too.
Networking

Ask Slashdot: Life Beyond the WRT54G Series? 427

Posted by timothy
from the blue-pill-that-stacks-neatly dept.
First time accepted submitter jarmund (2752233) writes "I first got a WRT54GL in 2007. Now, 7 years later, it's still churning along, despite only having one of its antennae left after an encounter with a toddler. As it is simply not up to date to today's standards (802.11N for example), what is a worthy successor? I enjoyed the freedom to choose the firmware myself (I've run Tomato on it since 2008), in addition to its robustness. A replacement will be considered second-rate unless it catered for the same freedom as its predecessor." Is there a canonical best household router nowadays?
Wireless Networking

The Hidden Cost of Your New Xfinity Router 224

Posted by timothy
from the opt-out-options-obviate-opposition dept.
An anonymous reader writes "The battle over Comcast's public WiFi network that is hosted on your cable modem continues. Comcast responded to Speedify's earlier power measurements by rushing them a new Cisco cable modem. The new modem proved to be more power hungry than the last, and also introduced some tricky IPv6 problems that caused major headaches for the team."
Networking

Expensive Hotels Really Do Have Faster Wi-Fi 72

Posted by timothy
from the starbucks-is-my-airport-lounge dept.
OpenSignal, by means of mobile apps for iOS and Android, has been amassing data on Wi-Fi and cell-network signal strength. They released yesterday a few of their findings on the speed of Wi-Fi available at U.S. chain hotels (download speeds, specifically). Though it shouldn't be surprising that (as their data shows) more expensive hotels generally have faster speeds, I know it hasn't always matched my own experience. (Hotel chains also vary, even within brands, in whether the in-room Wi-Fi is free, cheap, or exorbitant.) If the in-room connection is flaky or expensive, though, from the same report it seems you'll do better by popping into a Google-networked Starbucks location than one fed by AT&T, and McDonalds beats Panera Bread by quite a bit.
Power

Harvesting Wi-Fi Backscatter To Power Internet of Things Sensors 138

Posted by Unknown Lamer
from the energy-everywhere dept.
vinces99 (2792707) writes "Imagine a world in which your wristwatch or other wearable device communicates directly with your online profiles, storing information about your daily activities where you can best access it – all without requiring batteries. Or, battery-free sensors embedded around your home that could track minute-by-minute temperature changes and send that information to your thermostat to help conserve energy. This not-so-distant 'Internet of Things' reality would extend connectivity to perhaps billions of devices. Sensors could be embedded in everyday objects to help monitor and track everything from the structural safety of bridges to the health of your heart. But having a way to cheaply power and connect these devices to the Internet has kept this from taking off. Now, University of Washington engineers have designed a new communication system that uses radio frequency signals as a power source and reuses existing Wi-Fi infrastructure to provide Internet connectivity to these devices. Called Wi-Fi backscatter, this technology is the first that can connect battery-free devices to Wi-Fi infrastructure. The researchers will publish their results at the Association for Computing Machinery's Special Interest Group on Data Communication's annual conference this month in Chicago. The team also plans to start a company based on the technology. The Pre-print research paper.
Transportation

Least Secure Cars Revealed At Black Hat 140

Posted by Unknown Lamer
from the why-bother-cutting-the-brake-lines dept.
Lucas123 (935744) writes Research by two security experts presenting at Black Hat this week has labeled the 2014 Jeep Cherokee, the 2015 Cadillac Escalade and the 2014 Toyota Prius as among the vehicles most vulnerable to hacking because of security holes that can be accessed through a car's Bluetooth, telematics, or on-board phone applications. The most secure cars include the Dodge Viper, the Audi A8, and the Honda Accord, according to Researchers Charlie Miller and Chris Valasek. Millar and Valasek will reveal the full report on Wednesday, but spoke to Dark Reading today with some preliminary data. The two security experts didn't physically test the vehicles in question, but instead used information about the vehicles' automated capabilities and internal network. "We can't say for sure we can hack the Jeep and not the Audi," Valasek told Dark Reading. "But... the radio can always talk to the brakes" because both are on the same network. According to the "Connected Car Cybersecurity" report from ABI Research, there have been "quite a few proof of concepts" demonstrating interception of wireless signals of tire pressure monitoring systems, impairing anti-theft systems, and taking control of self-driving and remote control features through a vehicle's internal bus, known as controller area network (CAN).

Nothing is more admirable than the fortitude with which millionaires tolerate the disadvantages of their wealth. -- Nero Wolfe

Working...