If you're anything like us, you've already made millions of dollars on Bitcoin. But how to keep it safe from loved ones, co-workers and other people we don't trust? Sound Wallet promises to keep your private access keys secure as encrypted audio,...
Ingrid Lunden / TechCrunch:LinkedIn Is Quietly Retiring Network Visualization Tool InMaps — A little autumn cleaning underway at LinkedIn. The company is quietly retiring InMaps, a tool that let you map out how your LinkedIn network looks. A notice on the InMaps homepage notes that today, September 1 …
There are few things that scream class more loudly than coating a piece of consumer electronics in gold. Except, perhaps, for doing the same thing, but with Swarovski crystals. That's the truth-bomb that LG has just deposited into our laps, having...
An anonymous reader writes: A few days ago we talked over some of the difficulties faced by makers of autonomous car software, like dealing with weather, construction, and parking garages. Today, the NY Times has a similar article about delivery drones, examining the safety and regulatory problems that must be solved in addition to getting the basic technology ready. "[R]researchers at NASA are working on ways to manage that menagerie of low-flying aircraft. At NASA's Moffett Field, about four miles from Google's headquarters in Mountain View, Calif., the agency has been developing a drone traffic management program that would in effect be a separate air traffic control system for things that fly low to the ground — around 400 to 500 feet for most drones. Much like the air traffic control system for conventional aircraft, the program would monitor the skies for weather and traffic. Wind is a particular hazard, because drones weigh so little compared with regular planes." Beyond that, the sheer scale of infrastructure necessary to get drone delivery up and running in cities across the U.S. is staggering. Commercial drones aren't going to have much range, particularly when carrying something heavy. They'll be noisy, and the products they're transporting will still need to be relatively close by. What other issues do Amazon, DHL, Google, and other need to solve? Read more of this story at Slashdot.
Apple lists top 10 reasons apps are rejected, with missing information and bugs the two most common causes (Apple)(2 hours ago)
Apple:Apple lists top 10 reasons apps are rejected, with missing information and bugs the two most common causes — Common App Rejections — Before you develop your app, it's important to become familiar with the technical, content, and design criteria that we use to review all apps.
Google has started showing old versions of its search page to people using out-of-date versions of web browsers.
Iranian President Hassan Rouhani urges Iran's clerics to be more tolerant of the internet and new technologies after recent criticism from hardliners.
A leading independent school is making dozens of its courses available free online, so lessons can be downloaded by pupils or teachers at other schools.
Ecuador says it will introduce the world's first digital currency issued by a central bank and it will go into circulation in December.
A teenager tells how a bionic pancreas transformed his summer.
BBC News talks to Ian Lowe, a blacksmith who teaches other people an ancient art he believes to be future-proof.
The FBI are investigating after many famous women have had their nude photographs posted online anonymously after being hacked.
Max started writing code when he was six. He told BBC News why he thought more children being taught how to program in schools was a good idea.
LJ Rich looks at how one artist is using computer code to turn internet radio from across the globe into a unique piece of music.
Could chip and pin technology be open to a new type of "skimming" fraud which is being used to steal people's cash?
Would you take your kids to a geek festival?
Readers share their experiences of replacing their operating system
Researchers worry new cars could be vulnerable to hackers
The challenge of introducing England's new coding curriculum
The quest to find the perfect party anthem.
Apparently, the world needs another smart lightbulb, and Elgato's going to sell it to you. Called Avea, the $50 bulb connects to your iDevice directly using Bluetooth (no external hub needed), and lets you set the mood in any room with an appropriate...
NASA working on automated traffic control system for drones, first commercial drones expected 2015 in agriculture (Conor Dougherty/New York Times)(3 hours ago)
Conor Dougherty / New York Times:NASA working on automated traffic control system for drones, first commercial drones expected 2015 in agriculture — Drone Developers Consider Obstacles That Cannot Be Flown Around — SAN FRANCISCO — The tech industry's enthusiasm for building small delivery drones may be getting ahead of figuring out what to do with them.
The hackers who claimed to have harvested photos of celebs likely used a relatively simple attack that everyday Internet users are also vulnerable to.
An anonymous reader writes "Back in August, groups of Russian hackers assembled the biggest list of compromised login credentials ever seen: 1.2 billion accounts. Now, domain registrar Namecheap reports the hackers have begun using the list to try and access accounts. "Overnight, our intrusion detection systems alerted us to a much higher than normal load against our login systems. ... The group behind this is using the stored usernames and passwords to simulate a web browser login through fake browser software. This software simulates the actual login process a user would use if they are using Firefox/Safari/Chrome to access their Namecheap account. The hackers are going through their username/password list and trying each and every one to try and get into Namecheap user accounts." They report that most login attempts are failing, but some are succeeding. Now is a good time to check that none of your important accounts share passwords." Read more of this story at Slashdot.
It's time. This week NFL football is back (and so are the Engadget HD Podcast fantasy leagues), and the season kicks off Thursday night as the Packers face the defending Super Bowl Champion Seahawks on NBC. Boardwalk Empire on HBO starts its final...
The hashtag #IfMyPhoneGotHacked picked up steam since the photos were leaked online.
Miraisens says its "3-D Haptics" technology allows users to “experience the presence of objects as if their entity existed there physically.”
An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down." Read more of this story at Slashdot.
blottsie writes In a move out of the anti-SOPA campaign playbook, Fight for the Future and other net neutrality activist groups have set up the Battle for the Net coalition, which plans to launch an "Internet slowdown day" later this month. No actual traffic will be slowed down. Instead, participating sites will display embeddable modules that include a spinning "loading" symbol and information about contacting the Federal Communications Commission (FCC), the White House, and members of Congress. Read more of this story at Slashdot.
Zack Whittaker / ZDNet:Microsoft refuses to comply after judge revives overseas data search warrant — Summary: A US judge has lifted a stay on a ruling, forcing Microsoft to hand over data it stores overseas. But the software giant said it will not comply, pending an appeal. — Follow @zackwhittaker Follow @lseltzer
The computer giant says it takes privacy "very seriously" and the feds are "addressing the matter."
A funny thing happened on the Internet Sunday as a cache of nude photos of Kate Upton, Jennifer Lawrence, and other big-name stars made their way onto 4chan, as BuzzFeed notes. Reports indicate that this leak may have been the result of a hacker (or hackers) taking advantage of a flaw in Apple's iCloud service.
An anonymous reader writes Scientists from the U.S. Geological Survey (USGS) have used a program named Ash 3D to predict the impact of a Yellowstone volcano eruption, and found that cities within 300 miles from Yellowstone National Park may get covered by up to three feet of ash. From the article: "Ash3D helped the researchers understand how the previous eruptions created a widespread distribution of ash in places in the park's periphery. Aside from probing ash-distribution patterns, the Ash3D can also be used to identify potential hazards that volcanoes in Alaska may bring." Read more of this story at Slashdot.
Apple is such an opaque company that even app developers can be left, out in the cold, wondering why their app was rejected from the app store. Thankfully, the company does have some sympathy for those dejected coders, which is why it's published a...
The apparent hack of several iCloud accounts resulted in revealing photos of prominent Hollywood actresses being posted over the Web.
Arik Hesseldahl / Re/code:Apple Says It is “Actively Investigating” Celeb Photo Hack — Apple said it was “actively investigating” the violation of several of its iCloud accounts, in which revealing photos and videos of prominent Hollywood actresses were taken and posted all over the Web.
Not everyone is interested in paying for premium handsets, and Google knows that in many parts of the world, shelling out five or six hundred dollars for a One, G3 or Galaxy S5 simply isn't an option. The Android One initiative is how Google plans to...
Cities scramble to upgrade "stingray" cellphone tracking devices as end of 2G network looms (Cyrus Farivar/Ars Technica)(8 hours ago)
Cyrus Farivar / Ars Technica:Cities scramble to upgrade “stingray” cellphone tracking devices as end of 2G network looms — Cities scramble to upgrade ‘stingray’ tracking as end of 2G network looms — OAKLAND, CA—Documents released last week by the City of Oakland reveal that it is one of a handful …
ashshy writes Unlike the obvious battery needs for smartphones or electric cars, many consumers are unaware of the exploding need for enormous battery banks as modern power grids are bringing a whole new set of requirements. From the article : "'Our electricity grid was built a certain way, and that way is to have on-demand production,' Argonne National Laboratory battery researcher Jeff Chamberlain explained. 'So as I flip my light switch on at home, there's some little knob somewhere that turns the power up. There is no buffer. It's a very interesting production cycle compared to other consumer goods. It was built a certain way, and the grid is currently changing in two different ways. One is, first our demand is increasing. But another is, around the world human beings are trying to get off fossil fuels and that means using solar and wind. Well, we cannot turn up the sun or wind, or turn down the sun or wind according to our energy needs. So the more those technologies penetrate the grid, the more you need energy storage. You need a buffer. And that is a very difficult challenge that's similar to transportation because it's cost-driven,' Chamberlain said. 'But it's also different from transportation because we're not limited by volume or mass like we are in vehicles. We're working on energy storage systems that are stationary.'" Read more of this story at Slashdot.
Charles Arthur / Guardian:Naked celebrity hack: security experts focus on iCloud backup theory — After intensive examination of file data leaked by one or more hackers, suspicion grows that iCloud backups were source of pictures - though precise method of attack still unclear — iCloud backups appear to be the source …
When it comes to choosing which new TV shows to make, British broadcaster UKTV is taking a leaf out of Amazon and the BBC's playbook. The company behind Dave, Really and Watch will produce pilot episodes of shows, asking users of its UKTV Play...
An anonymous reader writes 28 years after the Chernobyl accident, tests have found that more than one in three Saxony boars give off such high levels of radiation that they are unfit for consumption. In 2009 almost €425,000 ($555,000) was paid out to hunters in compensation for wild boar meat that was too contaminated to be sold. "It doesn't cover the loss from game sales, but at least it covers the cost of disposal," says Steffen Richter, the head of the Saxon State Hunters Association. Read more of this story at Slashdot.
Xapo CEO explains their heavily guarded offline Bitcoin vaults & the future of cryptocurrency (Ben Popper/The Verge)(9 hours ago)
Ben Popper / The Verge:Xapo CEO explains their heavily guarded offline Bitcoin vaults & the future of cryptocurrency — Meet the man building the Fort Knox of bitcoin — Can security fit for a super villian's hideout help make bitcoin mainstream? — In July, a bitcoin startup named Xapo announced …
A remotely controlled quadcopter gives a bird's-eye view of the progress of construction on Apple’s new Campus 2 in Cupertino, California.
NASA's ironman Mars rover Opportunity, like your five-year-old PC, is about to get reformatted. Problems have been causing the aging vehicle to reboot and scientists suspect that worn-out cells in the flash memory are to blame. Opportunity's been...
First time accepted submitter Adam Oxford writes Nigeria's National Identity Management System — which aims to bring together citizen information databases as diverse as driving licenses and tax returns — was introduced last week and includes a prepay MasterCard wallet. Civil liberties groups are naturally wary about the project, but proponents see it as a way to get financial services to the masses. From the article: "The director general of the commission which will implement NIMS, Chris 'E Onyemenam, said at the launch that the card will eventually be used for border control as well. 'There are many use cases for the card, including the potential to use it as an international travel document,' Onyemenam said. 'NIMC is focused on inclusive citizenship, more effective governance, and the creation of a cashless economy, all of which will stimulate economic growth, investment and trade.'" Read more of this story at Slashdot.
Florin T. / PhoneArena:Asus ZenWatch will feature voice commands, sub-$200 price confirmed by CEO — While LG and Samsung already unveiled the new smartwatches that they're going to bring to IFA 2014 next week (the G Watch R and Gear S, respectively), Asus prefers to wait until September 3 before fully revealing its first smartwatch.
Tom Brewster / Guardian:Europol launches taskforce to fight worlds top cybercriminals — Joint Cybercrime Action Taskforce to coordinate investigations into hacking, malware and other online crimes — Cybercrime experts from police forces around the world are coming together to form a new body …
Chinese antitrust regulators today ordered Microsoft to explain compatibility and bundling issues with its software and gave the U.S. company 20 days to comply.