Steam Box’s biggest threat isn’t consoles, it’s Apple

That’s Valve’s goal for the Steam Box, its own Linux-based gaming hardware which will bring Steam’s Big Picture mode to living room televisions at an affordable price point. Valve is also teaming up with several hardware manufacturers, who are also trying to put together the most attractive hardware at the most attractive price, in order to make the PC platform’s jump to the living room as painless as possible.

via Gabe Newell: Steam Box’s biggest threat isn’t consoles, it’s Apple | Polygon.

I’d like to see more numbers.  Having Apple at the high end and Linux at the low end seems like an OK solution and everyone makes money.

How Lytro is Shifting Our Perspective on Photography

What’s amazing is how quickly the technology is evolving. There’s no second-generation Lytro yet though it’s safe to assume the Mountain View, CA-based company is working on one. But because light field photography is mostly about computation, not optics or electronics, Lytro can make its existing camera more powerful simply by upgrading the software used to process light-field images.

via How Lytro is Shifting Our Perspective on Photography | Xconomy.

Supersized Wind Turbines Head Out to Sea

The new turbines generate six megawatts of power in good wind. Several companies are designing 10- and even 15-megawatt machines with 100-meter blades. These blades would reach two-thirds of the way to the roof of the Empire State Building. The push to supersize wind turbines is part of an effort to reduce installation and maintenance costs, which can be far higher than the cost of the turbines themselves. The pictures in this slideshow give a sense of just why installation is so costly.

via Supersized Wind Turbines Head Out to Sea | MIT Technology Review.

Got an iPhone? You probably pay over $100 on your monthly bill

When it comes to monthly bills for various smartphone platforms, iPhone users are paying the most, according to Consumer Intelligence Research Partners. In a recent analysis shared with AllThingsD, 59 percent of iPhone users are paying more than $100 per month for calls, texts, and data.

via Got an iPhone? You probably pay over $100 on your monthly bill | Ars Technica.

RSA, IBM Bet On Big Data Analytics To Boost Security

“So think of a host beaconing out to a C2 (command-and-control) site on a regularly scheduled basis,” he tells Dark Reading. “If an analyst can isolate the suspect host, they can eyeball a graph to see that they’re reaching out to this host regularly. But with a big data approach, you can create a rule that computes and analyzes the interval between sessions and determines whether we’re talking about normal human activity, or machine-generated — which is innocuous — or scheduled activity like malware might do.”

via RSA, IBM Bet On Big Data Analytics To Boost Security – Dark Reading.

I recently caught a piece of malware on a PC on my open wifi doing something similar.

Telefonica and Big Data

In addition, he notes there are a number of analytics experiments underway at different operating units, including Vivo in Brazil, which is pushing ahead with projects around location analysis, Web navigation analysis based on deep packet inspection (DPI) data, and call center message analysis.

via . Telefonica Battles Big Data Hype

I found the mention of DPI in their big data strategy rather interesting as well as location analysis.  The kind of location analysis a telecom operator can perform on vast populations is mind boggling.

Amazon.com website briefly offline, hackers claim credit

The group went on detail how it knocked the front door down (only Amazon.com’s front page was offline), with a large “botnet” or network of thousands of computers working together.

via Amazon.com website briefly offline, hackers claim credit | Fox News.

Interesting.  Looks like a distributed denial of service (DDOS) on the grand daddy of the data center and cloud computing industry.  Amazon was down for only 49 minutes.  It will be interesting to hear the inside baseball techie talk as to how this happened and how Amazon recovered.

Belkin WeMo remote shell and rapid state change exploit

Published on Jan 29, 2013

Belkin WeMo with latest firmware. Able to gain full root access and send commands including changing the state of connected device via flaw in UPnP implementation. Chose a small desk lamp and simple on/off sequence due to safety concerns. Real world this could be a fan or space heater and rapidly turn on/off without limitation. Updates with PoC soon to come.

via Belkin WeMo remote shell and rapid state change exploit – YouTube.

Stuff like this amaze me.  Again.  Just because you can put an IP stack on something doesn’t mean you should!  Below is a video showing how to break in to this device that simply controls an electric outlet.  He uses Backtrack 5 to break in.   Backtrack is a very useful set of security research tools.  The video inspires me to fire up my copy and break into something.  🙂

50 Million Potentially Vulnerable to UPnP Flaws

Between June 1 and Nov. 17, 2012, Rapid7 conducted weekly scans that sent simple service discovery protocUPnPol SSDP requests to each routable IPv4 address. In all, 2.2 percent of all public IPv4 addresses responded to the standard UPnP discovery requests. So, 81 million unique IP addresses responded and, upon deeper probing, researchers determined some 17 million further systems exposed the UPnP simple object access protocol SOAP. This level of exposure was far higher than researchers had expected, according to the report.

via 50 Million Potentially Vulnerable to UPnP Flaws | threatpost.

Yes, that PC cleanup app you saw on TV at 3am is a waste

To highlight just why you and your loved ones should never let these applications anywhere near your PC, we picked one that we have recently seen ads for: MyCleanPC. It’s the archetypal Windows cleanup app—and you probably shouldn’t install it.

via Yes, that PC cleanup app you saw on TV at 3am is a waste | Ars Technica.

There are some useful tips on cleaning your PC in this article.   Like the article advises, I also use Malwarebytes exclusively to scan every now and then if something seems to be running funny.  Being on a monitored wifi allows for my firewall, the gateway between the wifi and Internet, to alert me of any funny communication coming from my PC.  I have some other unconventional PC security advice that I may provide in a future post once I can put together all my thoughts into a coherent package.