Our latest edition of WIG is filled with news link goodness covering topics such as Windows on ARM tablets might sell for only $199, Facebook is testing an increase of ads in users’ news feeds, companies are turning to GitHub to find tech talent, and more.
Weekly News Links
- Firefox Metro Coming In September
Following the recent RTM release of the Windows 8, Mozilla has announced that they too will be publishing the preview build of the Firefox Modern (formerly known as Metro) web browser sometime in September.
- Firefox OS Runs Fine On The Raspberry Pi
Raspberry Pi, a single board computer for only $25, has been making some waves in the tech community. Now, Oleg Romashin, Nokia’s principal engineer, has released a video, which shows the Firefox OS runtime running on such a system. The blog post has the video embedded.
- Mozilla: “Firefox OS is a huge and scary step”
Interview: Dave Mason of Mozilla talks about a possible replacement to “Gecko” and what makes Firefox better than other browsers.
- Is there any way claims of a $199 Microsoft Surface RT makes sense?
There are now two reports claiming Microsoft plans to price its Windows-on-ARM tablet for $199. Would subsidies, subscriptions and/or separately priced add-ons make this low-ball price plausible?
- Microsoft’s Windows 8: Will it breathe new life into older PCs?
With Microsoft starting to roll out the final Windows 8 bits this week, users ponder whether it’s worth installing them on older, non-touch hardware.
- Microsoft’s Office 2013 ODF 1.2 support could be true catalyst for OpenOffice adoption
Microsoft insists that it has built robust support for ODF 1.2 and PDF in Office 2013. It has offered support for ODF 1.1 in the last rev of Office but 1.2 support is said to offer better support for spreadsheet formulas. The next version of Office is due to launch later this year. How will OpenOffice backers respond with Microsoft Open XML support?
- SkyDrive.com Gets New UI, Windows and Mac OS Apps Updated
Following the recent update brought to its personal email service, which has become Outlook.com, Microsoft also performed a major interface change to SkyDrive.com, bringing it in line with the UI approach in Windows 8.
- Next Windows Only a Minor Release, Not Windows 9
With Windows 8 already out in the hands of manufacturers and now available for download for MSDN and TechNet subscribers, Microsoft is said to be focusing on the development of the next version of Windows, recently said to be codenamed Windows Blue.
- Unity 2D dropped from Ubuntu 12.10 “Quantal Quetzal”
The 2D variant of Canonical’s Unity desktop user interface – introduced in Ubuntu 11.10 for systems without 3D/OpenGL hardware acceleration – will not be included in future versions of Ubuntu.
- Qt’s Move Gives FOSS the Jitters
TThere’s been much ado about Linux desktops in recent months, but few would dispute KDE’s prominence among them. That, indeed, is one of the many reasons there’s been so much concern over Nokia’s impending sale of the Qt toolkit, upon which KDE is based.
- Google’s purchase of QuickOffice a strike at Surface RT
When Google bought QuickOffice, a full office suite that runs on mobile platforms, it was thought to be a strike against Microsoft Office in the cloud. The real target may be the Surface RT tablet from Redmond.
- Google+ launches vanity URLs, catching up to Facebook, Twitter
The tech giant starts rolling out custom URLs for certain brands and users, like +britneyspears and +toyota. Now, memorizing those long strings of numbers could be a thing of the past.
- Three years later, deleting your photos on Facebook now actually works
After years of photo hoarding, Facebook now deletes user photos within 30 days.
- Facebook looks to amp up ads in users’ news feeds
The social network is testing a new way for advertisers to reach users that involves placing unsolicited ads into users’ news feeds regardless of any connection to the brand or product.
- Twitter ups restrictions on developers, seeks greater control
The company finally unveils the stricter API guidelines developers have been worried about and they were right to be concerned — Twitter will now have more control over how many users an app can have.
- Forget LinkedIn: Companies turn to GitHub to find tech talent
Because engineers and designers can post their work for all to see, more and more companies are realizing they can see what people can actually do, not just say they can do.
- Acer eyeing lackluster consumer response to Windows 8 devices
The company’s outspoken chairman doesn’t expect Windows 8 devices to trigger much enthusiasm among consumers or huge initial growth for the industry.
- Tech supporting BYOD ‘not quite there’
Lack of control over employees’ mobile devices and people’s propensity to weaken security when deployed by uninstalling programs means bring-your-own-device trend a liability.
- True confessions of a former iPhone developer
From David Gewirtz: “As of last Wednesday, I am officially no longer an iPhone developer — which frees me up to tell you about my sordid experiences as an iPhone developer.”
- NASA unveils tentative travel plans for Mars rover
The Curiosity Mars rover likely will spend the rest of the year near its landing site before striking out for Mount Sharp, where layered terrain is expected to hold clues to the planet’s evolution.
- Google warns of using Adobe Reader – particularly on Linux
On its August Patch Day, Adobe has fixed numerous critical memory-related bugs in Reader for Windows and Mac OS X – but has chosen to overlook Linux users. The researchers who discovered the holes now fear that potential attackers could find enough clues to build an exploit by comparing the current Windows version of Reader with the previous one. This would leave Linux users defenceless. On top of that, even the patched versions still contain a total of 16 open security holes.
- Hackers exploit critical security bugs in Adobe Flash, MS Office
Adobe Systems and Microsoft have patched separate critical vulnerabilities in widely used software after receiving reports that they’re being exploited “in the wild” by targeted attacks. Both companies advise users to install updates as soon as possible.
- Oracle releases unscheduled fix for critical vulnerability
At the recent Black Hat conference in Las Vegas, security expert David Litchfield revealed a zero day exploit in Oracle’s database server. Oracle has now plugged this vulnerability with an unscheduled patch. Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 126.96.36.199, 188.8.131.52 and 184.108.40.206 are all affected, though the July 2012 patch update contained a fix for the latter two.
- Flaw allowing SMS spoofing still present in latest iOS 6 beta
Thought you received a text from your beloved ex wanting to get back together? It could be one of your friends pranking you, at least if you use an iPhone. An iOS “hacker” going by pod2g is drawing fresh attention to a long-extant SMS spoofing flaw within iOS that allows a prankster to pose as someone else when sending an SMS to your device—a flaw that is still present in the latest beta of iOS 6.
- BKA trojan goes on an international holiday
The family of malware known as the BKA trojan has increasingly established an international presence. The trojan extorts money by telling victims that illegal pornography or material that violates copyright has been detected on their computer and that they must pay a fine to the local police authority or face prosecution.
- Mystery malware wreaks havoc on energy sector computer
Malware researchers have uncovered an attack targeting an organization in the energy industry that attempts to wreak havoc by permanently wiping data from an infected computer’s hard drive and rendering the machine unusable.
- Bogus anti-hacking tool targets Syrian activists
Syrian activists, journalists and opposition group members are reportedly under attack by malware claiming to be a security tool that will help protect them against hackers. The fake “AntiHacker” tool is being spread through targeted phishing emails and via sites such as Facebook, and claims to provide “Auto-Protect & Auto-Detect & Security & Quick scan and analysing” functionality.
- Reuters blog hacked again
The journalists’ blog from the Reuters news agency has been hacked again, for the second time in less than two weeks.
- Magento shops attacked through Zend vulnerability
A critical vulnerability in the Zend Framework can be exploited by remote attackers to access arbitrary files from online shops using the eBay-owned Magento eCommerce platform.
- Blizzard passwords could be theoretically reverse engineered
Data stolen from Blizzard may have given hackers enough information to theoretically reverse engineer weak passwords from user accounts.
- Font installed with Gauss trojan raises questions
It is still unknown how Gauss got onto the infected computers. It is however known that the trojan can be spread on USB sticks and deletes itself after thirty infections. On infected computers, a previously unknown font “Palida Narrow” was found.
- FTC accuses Facebook of misleading developers over security
An investigation by the FTC has suggested that the social networking site fell short in reviewing and verifying applications.
- World-class cryptos wanted: Researchers seek help decoding “encrypted warhead”
Researchers have renewed their call for help in cracking an “encrypted warhead” they believe was unleashed by a powerful nation-state and may be poised to search and destroy a high-profile target.
- Pwnium 2: Google pledges $2 million for Chrome exploits
As part of its second Pwnium contest, Google will offer up to $2 million in rewards to security researchers who can find and exploit vulnerabilities in its web browsers.
- Social engineering threat affects all
Responsibility of keeping data safe lies with both companies and users, as cybercriminals now target tech administrators and call center staff to gain access to customer details.
- Security mindset must change with cloud
Companies need to grasp implications of moving to cloud and develop roadmap to holistically secure IT systems instead of deploying security products for individual stacks.
- White hats publish DDoS hijacking manual, turn tables on attackers
Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet’s most popular denial-of-service tools.
- New algorithm tracks down the origins of internet attacks
Swiss researcher Pedro Pinto and his colleagues at Ecole Polytechnique Federale de Lausanne suggest using the Sparse Interference algorithm to make tracking down the origins of internet threats more efficient.
- Inside a ‘Reveton’ Ransomware Operation
The U.S Federal Bureau of Investigation is warning about an uptick in online extortion scams that impersonate the FBI and frighten people into paying fines to avoid prosecution for supposedly downloading child pornography and pirated content. This post offers an inside look at one malware gang responsible for orchestrating such scams.
Random TinyHacker Links
- Windows 8 vs. Windows 7: Benchmarks, lots of Benchmarks
Techspot spot-on with a comprehensive review of the performance differences of the two OS’s.
- How to Dual Boot Windows 8 with Windows 7
Seeking a very detailed, step by step, tutorial on dual booting? Look no further.
- Learn Outlook Keyboard Shortcuts
Here’s a list of the most useful keyboard shortcuts for Outlook’s desktop client. Check them out.
- Mint QuickView Makes Mint.com Simple
If you use Mint.com to manage your finances and are on a Mac, then this is a tool you’ll love.
- Napping is Beneficial!
An interesting infographic about naps, their benefits, historical figures who napped, and more.
How-To Geek Weekly Article Recap
- HTG Explains: How Scammers Forge Email Addresses and How You Can Tell
- Your Kindle Is More Than an eReader: 5 Hidden Kindle Features
- How to Create a Portable Version of Windows 8 Without Extra Software
- How to Secure SSH with Google Authenticator’s Two-Factor Authentication
- How to Route All Your Android Traffic Through a Secure Tunnel
- The Best Websites for Downloading Games and Playing Games Online
- HTG Explains: Why Does Windows 8 Want Me To “Trust This PC”?
- Desktop Fun: Gardens Wallpaper Collection Series 2
- How to Configure and Use Google Now on Android
- How to Encrypt Cloud Storage on Linux and Windows with EncFS
Geeky Goodness from the ETC Side
- Check Out the First High Resolution Offerings From the Curiosity Rover
- Turning a Keyboard into a Computer with Raspberry Pi
- The Frustrations and Agony of Printing [Humorous Chart]
- Teach Yourself to Program with the New Interactive Khan Academy Tutorials
- The Five Stages of Programming Grief [Humorous Comic]
- New Updated Version of Damn Small Linux is Available for Download
- An Honest Guide to Every Facebook Timeline Ever [Humorous Image]
- Earthrise [Wallpaper]
- DIY Monitor Stand Offers Triple Mount Goodness on the Cheap
- Scope Out The Red Planet with an Interactive Panorama Viewer
One Year Ago on How-To Geek
- Photography With How-To Geek: When Should I Use a Flash?
- How to Make Faux HDR Photos With Stylized Shadows and Details
- How To Fix the Dark Shadows that Ruin Great Photos
- My Photos Look Different on the Internet! How Can I Fix Them?
- How To Make Classic Red/Cyan 3D Photos Out of Any Image
How-To Geek Comics Weekly Roundup
- A Dubious Selling Point
- Not Geeky Enough for Them
- Long Term Tech Support Planning
- Blogging Irony
- Concrete Solutions
- An Unacceptable Mobile Payment Option
- Crowd-Sourcing Gone Wrong
How-To Geek Weekly Trivia Roundup
- MP3, The Ubiquitous File Type, Stands For What?
- Space Sickness Is Measured In What Units?
- Which Astronaut’s First Moonwalk Words Were Intended To Settle A Bet?
- In 1922, Phones Lines In The U.S. Were Silenced To Observe What?
- What Browser Was The Default For Mac OS In The Late 1990s?
- Which Scientist’s Notebooks Are Still Too Radioactive To Handle?
- In Computer Lingo, Small USB-Based Hardware Additions Are Called What?