More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Wikimedia Hundreds of thousands of websites could be endangered by publicly available attack code exploiting a critical vulnerability in the Plesk control panel . This particular vulnerability gives hackers control of the server it runs on according to security researchers. The code-execution vulnerability affects default versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 of Plesk running on the Linux and FreeBSD operating systems, a configuration used by more than 360,000 websites . Plesk running on Windows and other types of Unix haven’t been tested to see if those configurations are vulnerable as well. The exploit code was released Wednesday on the Full-Disclosure mailing list by “kingcope,” a pseudonymous security researcher who has frequented the forum for years. He has a proven track record for developing reliable exploits. “This vulnerability has a high severity rating,” kingcope wrote in an e-mail to Ars. “An attacker can use this exploit to get a command line shell remotely with the privileges of the configured Apache user.” Read 7 remaining paragraphs | Comments

See more here:
More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Uh, This Dude Re-Invented the Wheel. And It’s Kind of Square.

David M. Patrick has accidentally re-invented the wheel. The California-based inventor was toying around with six short, curved lengths of cable that he had connected into a sort of helical loop–and then he accidentally dropped it. What he observed next was surprising: The loop began to roll… and roll… and roll. It was a self-balancing wheel. Even stranger was that no one expected it to roll; Patrick’s loop actually looks square when it is rolling. A lifelong skater, Patrick then prototyped a skateboard wheel based on his design, this one comprised of side-by-side helical coils. He call it the Shark Wheel : (more…)        

View original post here:
Uh, This Dude Re-Invented the Wheel. And It’s Kind of Square.

How Americans Speak Differently in Various Regions, Visualized

Depending on where you’re from and where you’ve lived in the United States, you probably say things a little differently than people from other parts of the country. You’ve experienced this, but you’ve never seen how the regional dialects of the United States break down quite so cleanly. Read more…        

More here:
How Americans Speak Differently in Various Regions, Visualized

China Criticizes US For Making Weapon Plans Steal-able, Alleges Attacks From US

Etherwalk writes “Huang Chengqing, China’s top internet security official, alleged that cyberattacks on China from people in the U.S. are as serious as those from China on the U.S. ‘We have mountains of data, if we wanted to accuse the U.S., but it’s not helpful in solving the problem.’ Huang, however, does not necessarily attribute them to the U.S. government just because they came from U.S. soil, and he thinks Washington should extend the same courtesy. ‘They advocated cases that they never let us know about. Some cases can be addressed if they had talked to us, why not let us know? It is not a constructive train of thought to solve problems.’ In response to the recent theft of U.S. military designs, he replied with an observation whose obviousness is worthy of Captain Hammer: ‘Even following the general principle of secret-keeping, it should not have been linked to the Internet.'” A few experts think China’s more cooperative attitude has come about precisely because the U.S. government has gone public with hacking allegations. Read more of this story at Slashdot.

See the article here:
China Criticizes US For Making Weapon Plans Steal-able, Alleges Attacks From US

European HbbTV Smart TV Holes Make Sets Hackable

mask.of.sanity writes “Vulnerabilities in Hybrid Broadcast Broadband TV television sets have been found that allow viewers’ home networks to be hacked, the programs they watched spied on, and even for TV sets to be turned into Bitcoin miners. The laboratory attacks took take advantage of the rich web features enabled in smart TVs running on the HbbTV network, a system loaded with online streaming content and apps which is used by more than 20 million viewers in Europe.” Read more of this story at Slashdot.

Link:
European HbbTV Smart TV Holes Make Sets Hackable

Pandora, one of our favorite streaming music services, unveiled a new browser-based interface for TV

Pandora, one of our favorite streaming music services , unveiled a new browser-based interface for TVs , starting with the Xbox 360 and the PlayStation 3. Both consoles will get semi-native apps with streaming, rating, and station search. You can get it for your console here . [via TechCrunch ] Read more…        

View the original here:
Pandora, one of our favorite streaming music services, unveiled a new browser-based interface for TV

U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

hansamurai writes with an update to a story we’ve been following for a while. Jeffrey Feldman is at the center of an ongoing case about whether or not crime suspects can be forced to decrypt their own hard drives. (Feldman is accused of having child pornography on his hard drives.) After initially having a federal judge say Feldman was protected by the Fifth Amendment, law enforcement officials were able to break the encyption on one of his many seized storage devices. The decrypted contents contained child pornography, so a different judge said the direct evidence of criminal activity meant Feldman was not protected anymore by the Fifth Amendment. Now, a third judge has granted the defense attorney’s emergency motion to rescind that decision, saying Feldman is once again (still?) protected by the Fifth Amendment. Feldman’s lawyer said, “I will move heaven and earth to make sure that the war on the infinitesimal amount of child pornography that recirculates on the Internet does not eradicate the Fifth Amendment the way the war on drugs has eviscerated the Fourth Amendment. This case is going to go many rounds. Regardless of who wins the next round, the other side will appeal, invariably landing in the lap of the Seventh Circuit Court of Appeals and quite possibly the U.S. Supreme Court. The grim reality facing our country today is one where we currently have a percentage of our population behind bars that surpasses even the heights of the gulags in Stalinist Russia. On too many days criminal lawyers lose all rounds. But for today: The Shellow Group: 1, Government: 0.” Read more of this story at Slashdot.

Read More:
U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

iPhone 4, iPad 2 Get US Import Ban

Bent Spoke writes “The U.S. trade agency has banned the import of older Apple iPhone and iPad models due to the violation of a patent held by Samsung (PDF). ‘The president can overturn the import ban on public-policy grounds, though that rarely happens. Apple can keep selling the devices during the 60-day review period. … Apple pledged to appeal the ITC decision. The underlying findings will be reviewed by a U.S. appeals court specializing in patent cases. … The decision could mean fewer choices for AT&T and T-Mobile customers who want to get an iPhone without paying the higher cost of the iPhone 5. Samsung told the commission that Cupertino, California-based Apple could drop the price of the iPhone 5 if it was worried about losing potential customers. All of the iPhones are made in Asia.’ It’s getting so complicated we need a scorecard to keep track of who’s winning these offensive patent battles in the smartphone coliseum.” Read more of this story at Slashdot.

Taken from:
iPhone 4, iPad 2 Get US Import Ban

Intel formalizes Thunderbolt 2, promises products this year

While Intel gave us the technical rundown on its next iteration of Thunderbolt two months earlier , it’s now announced that it will officially be known as the not-particularly-original Thunderbolt 2. Promising 20 Gbps throughput and support for 4K video, Intel is now vowing to bring the port to market sometime this year. For a reminder, we’ve added the company’s NAB demo after the break. Filed under: Peripherals , Intel Comments Source: Intel Thunderbolt Blog

More:
Intel formalizes Thunderbolt 2, promises products this year

Espionage malware infects raft of governments, industries around the world

Kaspersky Lab Security researchers have blown the whistle on a computer-espionage campaign that over the past eight years has successfully compromised more than 350 high-profile targets in 40 countries. “NetTraveler,” named after a string included in an early version of the malware, has targeted a number of industries and organizations, according to a blog post published Tuesday by researchers from antivirus provider Kaspersky Lab. Targets include oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies, military contractors and Tibetan/Uyghur activists. Most recently, the group behind NetTraveler has focused most of its efforts on obtaining data concerning space exploration, nanotechnology, energy production, nuclear power, lasers, medicine, and communications. “Based on collected intelligence, we estimate the group size to about 50 individuals, most of which speak Chinese natively and have working knowledge of the English language,” the researchers wrote. “NetTraveler is designed to steal sensitive data as well as log keystrokes, and retrieve file system listings and various Office of PDF documents.” Read 3 remaining paragraphs | Comments

See the article here:
Espionage malware infects raft of governments, industries around the world