Zordak writes "According to Law 360, H.R. 845, the 'Saving High-Tech Innovators from Egregious Legal Disputes' (SHIELD) Act of 2013 would require non-practicing entities that lose in patent litigation to pay the full legal costs of accused infringers. The new bill (PDF) would define a 'non-practicing entity' as a plaintiff that is neither the original inventor or assignee of a patent, and that has not made its own 'substantial investment in exploiting the patent.' The bill is designed to particularly have a chilling effect on 'shotgun' litigation tactics by NPEs, in which they sue numerous defendants on a patent with only a vague case for infringement. Notably, once a party is deemed to be an NPE early in the litigation, they will be required to post a bond to cover the defendants' litigation costs before going forward."
Dystopian Rebel writes "A Stanford comp-sci student has found a serious bug in Chromium, Safari, Opera, and MSIE. Feross Aboukhadijeh has demonstrated that these browsers allow unbounded local storage. 'The HTML5 Web Storage standard was developed to allow sites to store larger amounts of data (like 5-10 MB) than was previously allowed by cookies (like 4KB). ... The current limits are: 2.5 MB per origin in Google Chrome, 5 MB per origin in Mozilla Firefox and Opera, 10 MB per origin in Internet Explorer. However, what if we get clever and make lots of subdomains like 1.filldisk.com, 2.filldisk.com, 3.filldisk.com, and so on? Should each subdomain get 5MB of space? The standard says no. ... However, Chrome, Safari, and IE currently do not implement any such "affiliated site" storage limit.' Aboukhadijeh has logged the bug with Chromium and Apple, but couldn't do so for MSIE because 'the page is broken" (see http://connect.microsoft.com/IE). Oops. Firefox's implementation of HTML5 local storage is not vulnerable to this exploit."
An anonymous reader sends this news from the CBC: "In a dogfight of defense contractors, the hunter can quickly become the hunted. It's happening now to the F-35. The world's largest defense contractor, Lockheed Martin, is trying to convince wavering U.S. allies — including Canada — to stick with its high-tech, high-priced and unproven F-35 stealth fighter. But the F-35 is way behind schedule, way over budget and, now, it's grounded by a mysterious crack in a turbine fan. After years of technical problems, it's a tempting target for Lockheed Martin's rivals. It's no surprise, then, that the No. 2 defense contractor, Boeing, smells blood... The Super Hornet, it says, is a proven fighter while the F-35 is just a concept — and an expensive one at that. ... The Super Hornet currently sells for about $55 million U.S. apiece; the Pentagon expects the F-35 to cost twice as much — about $110 million."
mask.of.sanity writes "The passwords of thousands of Australian businesses are being stored in clear readable text by the country's tax office. Storing passwords in readable text is a bad idea for a lot of reasons: they could be read by staff with ill intent, or, in the event of a data breach, could be tested against other web service accounts to further compromise users. In the case of the tax office, the clear text passwords accessed a subsection of the site. But many users would have reused them to access the main tax submission services. If attackers gained access to those areas, they would have access to the personal, financial and taxpayer information of almost every working Australian. Admins should use a strong hash like bcrypt to minimize or prevent password exposure. Users should never reuse passwords for important accounts."
An anonymous reader writes "Officials at the Chinese Defense Ministry say hackers from the U.S. have been attacking Chinese military websites. 'The sites were subject to about 144,000 hacking attacks each month last year, two thirds of which came from the U.S., according to China's defense ministry. The issue of cyber hacking has strained relations between the two countries.' This follows recent hacks from people in China on high-profile U.S. sites, as well as a report accusing the Chinese government of supporting a hacking group. '[Defense Ministry spokesman Geng Yansheng] called on U.S. officials to "explain and clarify" what he said were recent U.S. media reports that Washington would carry out "pre-emptive" cyber attacks and expand its online warfare capabilities. Such efforts are "not conducive to the joint efforts of the international community to enhance network security," he said.'"
Freshly Exhumed writes "Chris Welch at The Verge tells us: 'Speaking at the Morgan Stanley Technology Conference moments ago, Time Warner Cable's Chief Financial Officer Irene Esteves seemed dismissive of the impact Google Fiber is having on consumers. "We're in the business of delivering what consumers want, and to stay a little ahead of what we think they will want," she said when asked about the breakneck internet speeds delivered by Google's young Kansas City network. "We just don't see the need of delivering that to consumers."' The article goes on to quote her: '...residential customers have thus far shown little interest in TWC's top internet tiers. "A very small fraction of our customer base" ultimately choose those options.'"
An anonymous reader writes "An article at Wired shows just how close we are to a 3-D printed car. Jim Kor's 'Urbee 2' design is a lightweight teardrop shape with three wheels. The engine, chassis, and wheels aren't printed, of course, but much of the car is formed layer-by-layer out of ABS plastic. It takes about 2,500 hours of printer time to create the whole thing. Assembly is easier, though, since many different parts can be consolidated into just a few. 'To negotiate the inevitable obstacles presented by a potentially incredulous NHSTA and DOT, the answer is easy. "In many states and many countries, Urbee will be technically registered as a motorcycle," Kor says. It makes sense. With three wheels and a curb weight of less than 1,200 pounds, it's more motorcycle than passenger car. No matter what, the bumpers will be just as strong as their sheet-metal equivalents. "We're planning on making a matrix that will be stronger than FDM," says Kor. He admits that yes, "There is a danger in breaking one piece and have to recreate the whole thing." The safety decisions that'll determine the car's construction lie ahead. Kor and his team have been tweaking the safety by using crash simulation software, but the full spectrum of testing will have to wait for an influx of investment cash.'"
MojoKid writes "Aside from the terrible nickname (it sounds like a term for the spoiled offspring of fabulous people), phablets are somewhat controversial because they seem to be the epitome of inflated phone sizes. A lot of people wanted bigger, and this is 'bigger' to the extreme. A larger screen on a smartphone is attractive for obvious reasons, but surely there's a limit. So how big is too big? If you're not into parsing out the particulars of form factors and use cases, here's a really easy way to figure out if your phone or phablet is too big: Can you hold the device in one hand and 1) unlock the phone, 2) type out a text message with your thumb, and 3) adjust the volume with the rocker without using your other hand? If not, you might need a smaller phone."
An anonymous reader writes "Indie Kickstarter-funded short HENRi stars a sci-fi legend in a role very much like HAL-9000 — with a twist. Wired writes: 'If it sounds a little bit like 2001: The Later Years, then here's the real twist: HENRi, the ship/body, is voiced [by] Dr. Dave Bowman himself, Keir Dullea.' In a making-of video for the film, Dullea says, 'I guess you could say the character of HENRi was a sane version of HAL.' The film itself utilizes a mixture of the old and the new — combining live-action sequences with puppetry, quarter-scale miniatures, and modern CGI. The official trailer has just been released."
The new Copyright Alert System, a.k.a. the 'Six Strikes' policy, went into effect on Monday. Comcast and Verizon activated it today. Ars Technica asked them and other participating ISPs to see the copyright alerts that will be sent to customers who have been identified as infringing. Comcast was the only one to grant their request, saying that a "small number" of the alerts have already been sent out. The alerts will be served to users in the form of in-browser popups. They explain what triggered the alert and ask the user to sign in and confirm they received the alert. (Not admitting guilt, but at least closing off the legal defense of "I didn't know.") The article points out that the alerts also reference an email sent to the Comcast email address associated with the account, something many users not be aware of. The first two notices are just notices. Alert #5 indicates a "Mitigation Measure" is about to be applied, and that users will be required to call Comcast's Security Assurance group and to be lectured on copyright infringement. The article outlines some of the CAS's failings, such as being unable to detect infringement through a VPN, and disregarding fair use. Comcast said, "We will never use account termination as a mitigation measure under the CAS. We have designed the pop-up browser alerts not to interfere with any essential services obtained over the Internet." Comcast also assures subscribers that their privacy is being protected, but obvious that's only to a point. According to TorrentFreak, "Comcast can be asked to hand over IP-addresses of persistent infringers, and the ISP acknowledges that copyright holders can then obtain a subpoena to reveal the personal details of the account holder for legal action."
An anonymous reader writes "While speaking at the TED Conference in California earlier today, Sergey Brin seemingly tried to set the stage for a world where using Google Glass is as normal as using a smartphone. What's more, Brin went so far as to say that using smartphones is 'emasculating.' Brin said that smartphone users often seclude themselves in their own private virtual worlds. 'Is this the way you're meant to interact with other people,' Brin asked. Are people in the future destined to communicate via just walking around, looking down, and 'rubbing a featureless piece of glass,' Brin asked rhetorically. 'It's kind of emasculating. Is this what you're meant to do with your body?' Is wearing futuristic glasses any better?" Another reader sends in an article that also muses on our psychological connection to our devices. Or, as he puts it, the "increasingly weird and perhaps overly intimate relationship we have with our gadgets; the fist we touch when awake, the last at night. Our minds have become bookended by glass."
An anonymous reader writes "MIT has posted a letter to campus newspaper The Tech providing a timeline of last weekend's 'gunman' hoax. On Saturday morning, Cambridge, MA police were contacted via Internet relay by a tipster who claimed that a someone wearing armor and carrying a 'really big gun' was in Building 7 at MIT (the Massachusetts Ave. entrance to the Infinite Corridor) and was heading towards the office of MIT President Rafael Reif. The call continued for 18 minutes, with the caller eventually claiming that the gunman was seeking to avenge the suicide of Aaron Swartz, who was being prosecuting for alleged illegal downloads of millions of journal articles using MIT's computer network. The caller also identified the gunman as an MIT staff member, who has since been questioned by police and cleared. MIT has been criticized for waiting 1.5 hours before sending a campus-wide alert after the call was received."
Last Thursday, we discussed news that millionaire Dennis Tito was planning a private mission to Mars in 2018, but details were sparse. Now, reader RocketAcademy writes that Tito has provided more information about the tip, and that he intends the mission to be manned: "Dennis Tito, the first citizen space explorer to visit the International Space Station, has created the Inspiration Mars Foundation to raise funds for an even more dramatic mission: a human flyby of the planet Mars. Tito, a former JPL rocket scientist who later founded the investment firm Wilshire Associates, proposes to send two Americans — a man and a woman — on a 501-day roundtrip mission which would launch on January 5, 2018. Technical details of the mission can be found in a feasibility analysis (PDF), which Tito is scheduled to present at the IEEE Aerospace Conference in March. Former NASA flight surgeon Dr. Jonathon Clark, who is developing innovative ways of dealing with radiation exposure during the mission, called the flight 'an Apollo 8 moment for the next generation.'"
An anonymous reader writes "Develop reports on comments from Blake Jorgensen, Electronic Arts' Chief Financial Officer, speaking at the Morgan Stanley Technology, Media, and Telecom Conference. As you may have guessed from the name of the conference, the business aspect of EA was the topic. Jorgensen said, 'The next and much bigger piece [of the business] is microtransactions within games. ... We're building into all of our games the ability to pay for things along the way, either to get to a higher level to buy a new character, to buy a truck, a gun, whatever it might be, and consumers are enjoying and embracing that way of the business.' This is particularly distressing given EA's recent implementation of microtransations in Dead Space 3, where you can spend money to improve your weaponry."
puddingebola writes "The Guardian reports that hackers have been targeting officials from over 20 European governments with a new piece of malware called 'MiniDuke.' 'The cybersecurity firm Kaspersky Lab, which discovered MiniDuke, said the attackers had servers based in Panama and Turkey – but an examination of the code revealed no further clues about its origin (PDF). Goverments targeted include those of Ireland, Romania, Portugal, Belgium and the Czech Republic. The malware also compromised the computers of a prominent research foundation in Hungary, two thinktanks, and an unnamed healthcare provider in the US.' Eugene Kaspersky says it's an unusual piece of malware because it's reminiscent of attacks from two decades ago. 'I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyber world.' The computers were corrupted through an Adobe PDF attachment to an email."