background preloader


Facebook Twitter

Lawyers: How can we scrutinize surveillance records that remain sealed? OAKLAND, Calif.

Lawyers: How can we scrutinize surveillance records that remain sealed?

—A federal judge appeared generally skeptical to two legal scholars’ efforts to get the court to unseal years' worth of sealed surveillance records held in a Northern California court. However, US Magistrate Judge Kandis Westmore left open the possibility for the petitioners to narrow their request and work with representatives from the Department of Justice to come up with a workable solution. “That the court can figure out a way to comply with, we are certainly open to that,” Judge Westmore said toward the end of a Thursday hearing. Source Code for CIA’s Tool to Track Whistleblowers Leaked by Wikileaks. Wikileaks has just published a new batch of the Vault 7 leak, exposing the documentation and source code for a CIA project known as "Scribbles.

Source Code for CIA’s Tool to Track Whistleblowers Leaked by Wikileaks

" Scribbles, a.k.a. the "Snowden Stopper," is a piece of software allegedly designed to embed 'web beacon' tags into confidential documents, allowing the spying agency to track whistleblowers and foreign spies. Since March, as part of its "Vault 7" series, the Whistleblowing website has published thousands of documents and other confidential information that the whistleblower group claims came from the US Central Intelligence Agency (CIA). The CIA itself described Scribbles as a "batch processing tool for pre-generating watermarks and inserting those watermarks into documents that are apparently being stolen by FIO (foreign intelligence officers) actors.

" Here's How Scribbles Tool Works: A chat with Ron Howard after watching his Einstein series premiere. AUSTIN, Texas—Writer, director, and actor Ron Howard is very careful when considering his place in the geek-media universe. Over 20 years ago, his film Apollo 13 kicked off a trajectory of major science-and-heart storytelling, which recently crystallized as an ongoing series-development deal with National Geographic's TV channel. This Tuesday's premiere of TV mini-series Genius, which sees Geoffrey Rush playing the role of Albert Einstein, won't be the last of that deal, either—and Howard laughs at how that fact might look to people in his past.

FBI allays some critics with first use of new mass-hacking warrant. Mass hacking seems to be all the rage currently.

FBI allays some critics with first use of new mass-hacking warrant

A vigilante hacker apparently slipped secure code into vulnerable cameras and other insecure networked objects in the "Internet of Things" so that bad guys can't corral those devices into an army of zombie computers, like what happened with the record-breaking Mirai denial-of-service botnet. The Homeland Security Department issued alerts with instructions for fending off similar “Brickerbot malware,” so-named because it bricks IoT devices.

And perhaps most unusual, the FBI recently obtained a single warrant in Alaska to hack the computers of thousands of victims in a bid to free them from the global botnet, Kelihos. Intel Optane Memory: How to make revolutionary technology totally boring. 3D XPoint (pronounced "crosspoint," not "ex-point") is a promising form of non-volatile memory jointly developed by Intel and Micron.

Intel Optane Memory: How to make revolutionary technology totally boring

Intel claims that the memory, which it's branding Optane for commercial products, provides a compelling mix of properties putting it somewhere between DRAM and NAND flash. The first Optane products are almost here. For certain enterprise workloads, there's the Intel Optane SSD DC P4800X, a 375GB PCIe card that offers substantially lower latency than comparable flash drives and can boast high numbers of I/O operations per second (IOPS) over a much wider range of workloads than flash. Intel isn't letting reviewers actually use the P4800X, however; the first testing of the hardware, published earlier this week, was performed remotely using hardware on Intel's premises.

For the consumer, there's Intel Optane Memory. To keep EpiPen sales up, Mylan threatened states, sued making bogus claims. Pharmaceutical company Mylan sued West Virginia in 2015 to keep its EpiPens on the state’s “preferred drug list,” which, if successful, would mean that the state’s Medicaid programs would have to automatically pay for the pricey epinephrine auto-injectors.

To keep EpiPen sales up, Mylan threatened states, sued making bogus claims

The bold and unusual move by Mylan—which ultimately failed—is yet another example of the aggressive marketing and legal tactics the company used to boost profits from EpiPens, which halt life-threatening allergic reactions. Since Mylan acquired rights to EpiPen in 2007, the company raised its price by more than 400 percent.

“Radioactive Boy Scout” regularly visited by FBI for a decade, father says. David Charles Hahn, who was nicknamed the “Radioactive Boy Scout,” received regular visits from the FBI for nearly a decade from 2005 through 2015, Ars has learned. Hahn, who was profiled by Harper’s Magazine in 1998 for his attempts to build a homemade breeder nuclear reactor in his mother’s backyard shed, passed away late last year in Michigan at the age of 39. Last month, Ars reported that Hahn did not die as a result of radiation poisoning. Upon his death, we filed numerous Freedom of Information Act requests with various federal agencies, including the FBI.

Amongst the documents we received were three FBI reports dating between 2007 and 2010. New IoT Botnet Rises Feeding on Vulnerable Security Cameras. 2016's Most Popular Exploit Was the Vulnerability Used for the Stuxnet Attacks. One of the vulnerabilities used to spread the Stuxnet virus was 2016's most popular exploit, according to telemetry data gathered by Russia cyber-security firm Kaspersky Labs.

2016's Most Popular Exploit Was the Vulnerability Used for the Stuxnet Attacks

Identified as CVE-2010-2568, this is a security bug found in older versions of the Windows Shell (CplLnk) that affects Microsoft's Windows 7, Vista, XP, Server 2008 and Server 2003 operating systems. Discovered and patched in 2010, the vulnerability was one of the four zero-days used in the cyber-attacks against Iran's nuclear program, part of the Olympic Games Operation, the official code name for the Stuxnet program. CVE-2010-2568 was 2015 and 2016 most popular exploit Once the attacks were known, CVE-2010-2568 was exposed, dissected, and broken down by various security firms, which helped other threat actors, from state-sponsored groups to mundane spammers leverage and embed it into their operations. Webroot 'mistakenly' flags Windows as Malware and Facebook as Phishing site. Popular antivirus service Webroot mistakenly flagged core Windows system files as malicious and even started temporarily removing some of the legit files, trashing user computers around the world.

Webroot 'mistakenly' flags Windows as Malware and Facebook as Phishing site

The havoc caused after the company released a bad update on April 24, which was pulled after approximately 15 minutes. But that still hasn't stopped some PCs from receiving it, causing serious issues for not just individuals, but also companies and organizations relying on the software. Atlassian's HipChat hacked, user data and private messages compromised. Atlassian's group chat platform HipChat is notifying its users of a data breach after some unknown hacker or group of hackers broke into one of its servers over the weekend and stole a significant amount of data, including group chat logs.

Atlassian's HipChat hacked, user data and private messages compromised

What Happened? According to a security notice published on the company's website today, a vulnerability in a "popular third-party" software library used by its service allowed hackers to break into its server and access customer account information. However, HipChat did not say exactly which programming blunder the hackers exploited to get into the HipChat cloud server. Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs. Script kiddies and online criminals around the world have reportedly started exploiting NSA hacking tools leaked last weekend to compromise hundreds of thousands of vulnerable Windows computers exposed on the Internet.

Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs

Last week, the mysterious hacking group known as Shadow Brokers leaked a set of Windows hacking tools targeting Windows XP, Windows Server 2003, Windows 7 and 8, and Windows 2012, allegedly belonged to the NSA's Equation Group. What's Worse? Microsoft quickly downplayed the security risks by releasing patches for all exploited vulnerabilities, but there are still risks in the wild with unsupported systems as well as with those who haven't yet installed the patches. Multiple security researchers have performed mass Internet scans over the past few days and found tens of thousands of Windows computers worldwide infected with DoublePulsar, a suspected NSA spying implant, as a result of a free tool released on GitHub for anyone to use.

Federal Government to reverse community legal funding cuts in May budget. Updated The Federal Government will restore funding to the community legal sector in the May budget, abandoning cuts outlined in previous budgets after a backlash from the legal sector.

Federal Government to reverse community legal funding cuts in May budget

Key points: The sector had been preparing for a 30 per cent funding cut commencing July 1The National Partnership Agreement currently provides around $42m to the community legal sector each yearSenator Brandis sought to blame the expected funding shortfall on cuts outlined by the previous ALP government The sector has been preparing itself for a 30 per cent funding cut from July 1 with some services warning their ability to assist vulnerable Australians would be immediately impacted. Federal Labor, peak legal bodies, the community legal sector and every state attorney-general have called for cuts to the sector to be overturned in recent years.

Lawyers Fight to Block Terrible NYPD Body Cam Policies. Microsoft Removing Standalone Office Features to Force Users Towards Office 365. Microsoft announced last week that starting October 13, 2020, customers who purchased a copy of a standalone Office product — such as Office 2010, Office 2013, and Office 2016 — will have their access revoked to Skype for Business and OneDrive for Business accounts. Access to these accounts came with the perpetual license customers bought for the standalone Office copy. Microsoft says that when mainstream support ends for Office 2016, on October 13, 2020, so does this access, but that customers can regain it by ditching standalone Office suites and moving to a cloud-based Office 365 ProPlus account. "We’re providing more than three years’ notice to give IT time to plan and budget for this change," Microsoft said in a statement. "Until this new requirement goes into effect in 2020, Office 2010, Office 2013 and Office 2016 perpetual clients will still be able to connect to Office 365 services [Skype and OneDrive for Business].

" Over 36,000 Computers Infected with NSA's DoublePulsar Malware. DOUBLEPULSAR, one of the NSA hacking tools leaked last Friday by the Shadow Brokers, has been used in the wild by ordinary hackers, who infected over 36,000 computers across the world. The Shadow Brokers leak from last Friday contained a trove of Windows hacking tools. Among these, there was FUZZBUNCH, a platform for delivering exploits against a selected target, similar to the Metasploit framework used by security researchers and pen-testers around the world. The Shadow Brokers also leaked over 20 exploit packages that could be used together with FUZZBUNCH. These exploits attack a Windows computer through vulnerable services and open a connection that the NSA/hackers could exploit to plant malware on targeted computers. WikiLeaks Publishes Vault 7, Collection of Alleged CIA Hacking Tools. Killing flu viruses with help from a frog. Frog mucus is loaded with molecules that kill bacteria and viruses, and researchers are beginning to investigate it as a potential source for new anti-microbial drugs.

One of these "host defense peptides," courtesy of a colorful tennis-ball-sized frog species (Hydrophylax bahuvistara) from southern India, can destroy many strains of human flu and protect mice against flu infection, researchers report April 18 in the journal Immunity. This peptide is far from becoming an anti-flu drug, but this is the first evidence of its flu-killing ability. It seems to work by binding to a protein that is identical across many influenza strains, and in lab experiments, it was able to neutralize dozens of flu strains, from the 1934 archival viruses up to modern ones. The researchers named the newly identified peptide "urumin," after the urumi, a sword with a flexible blade that snaps and bends like a whip, which comes from the same Indian province, Kerala, as the frog. China takes a key step toward building a large space station. New hybrid plant combines batteries with gas turbine to cut pollution 60%

Original StarCraft is finally free-as-in-beer after delayed patch. Princeton researchers discover why AI become racist and sexist. Hello Tatooine! An unpowered device can harvest water vapor in a desert. Classic Mac OS and dozens of apps can now be run in a browser window. Appeals court revives Apple’s patented “rubber banding” tech because of one small tweak. Chrome 58 Released for Windows, Mac and Linux. Lawsuit Claims Headphones Maker Bose Is Secretly Collecting User Data. Firefox 53, Released Today, Drops Support for Windows XP and Vista. You Can Activate Windows 10 Creators Update with Old Windows License Keys. New Open Source RAT Uses Telegram Protocol to Steal Data from Victims.

Email Tracking Pixels Used for Pre-Hack Info Gathering. Malware Reaches Play Store as Google Wages War Against BankBot Trojan. Hackers Steal Payment Card Data From Over 1,150 InterContinental Hotels. To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does. This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera. Mysterious Microsoft patch killed 0-days released by NSA-leaking Shadow Brokers. Want to make land use sustainable? It’s a wicked problem. Forgotten audio formats: The flexi disc. Survey says: Political polarization isn't the internet's fault. Unlock YouTube's hidden Dark Mode to save your eyes. This experimental e-book gets edited every time it changes hands.

Tesla’s electric semi will be revealed in September, CEO says. Tabs could be coming not only to Explorer, but everywhere. Why one Republican voted to kill privacy rules: “Nobody has to use the Internet” Latest Hacking Tools Leak Indicates NSA Was Targeting SWIFT Banking Network. Microsoft Removing Standalone Office Features to Force Users Towards Office 365. DMCA “safe harbor” up in the air for online sites that use moderators. On Venus, tectonics without the plates. Scientists have found a second, unexpected great spot on Jupiter. Startup says it can make compressed-air energy storage scheme dirt cheap. Mimicking an impact on Earth’s early atmosphere yields all 4 RNA bases. Staff, projects shed as Ubuntu maker Canonical tries to lure investors. Ubuntu creator takes CEO role again after layoffs and death of Unity. Longhorn Cyber-Espionage Group Is Actually the CIA. Firefox Will Add a Settings Section That Lets You Control "Performance" Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors.

Prison Inmates Built PCs from e-Waste and Connected Online Using Prison Network. HTTPS Certificate Issuance Becomes More Secure Thanks to New CAA Standard. Suspected Kelihos Botnet Operator Arrested in Spain. New formula makes liquid flow batteries organic. Washington state’s new 8 megawatt-hour flow battery is the largest of its kind. Extremely sensitive experiment shows no hint of a key radioactive decay. Google and Apple Issue Security Updates for Critical Broadcom WiFi Vulnerabilities. Android Overtakes Windows as Most Used Operating System. Largest Survey Ever Reveals World's Favorite Programming Language.

IoT Vendor Bricks Customer Product Following Negative Reviews. Microsoft Reveals for the First Time the Data It Collects in Windows 10. Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air. Judge steams as Uber exec withholds documents and pleads the 5th. At last, a new movie that’s as beautiful and insane as The Fifth Element. USB Canary Sends an SMS When Someone Tinkers with Your USB Ports. Filming mosquitoes reveals a completely new approach to flight. Flatbed Scanners Used as Relay Point for Controlling Malware in Air-Gapped Systems. Gigabyte Firmware Flaws Allow the Installation of UEFI Ransomware. Verizon to pre-install a 'Spyware' app on its Android phones to collect user data. Over 85% Of Smart TVs Can Be Hacked Remotely Using Broadcasting Signals.