Drug Enforcement Agency Seizes First Bitcoins From Silk Road Dealer

The Drug Enforcement Agency has seized 11.02 Bitcoins —about $800—from a drug dealer in South Carolina who had been using Silk Road. It’s the first (known) time the government has taken control of the virtual currency like it were property or real-world cash. Read more…        

Read More:
Drug Enforcement Agency Seizes First Bitcoins From Silk Road Dealer

Sony posts PS3 4.46 firmware update, instructions to fix consoles busted by 4.45

After the 4.45 firmware update knocked some PlayStation 3s out of commission last week, Sony has fulfilled its promise of a fixed version. 4.46 is now available to download, while a series of steps has been posted to the support site to walk users through updating any consoles that installed 4.45 and then failed to reboot . Additionally, for users that successfully installed 4.45 and later complained of NAT and “IP fragment issues,” a post on the support forum confirms that has been fixed as well. Owners of frozen consoles will need a USB memory stick with at least 168MB of space, although certain older models can also use SD, Memory Stick or Compact Flash cards. There’s still no word on exactly what went wrong, but for instructions on how to configure the flash storage and reboot into safe mode so you can start gaming again, just hit the source link below. Filed under: Gaming , HD , Sony Comments Via: @PlayStation (Twitter) Source: PlayStation Support

Link:
Sony posts PS3 4.46 firmware update, instructions to fix consoles busted by 4.45

Attackers sign malware using crypto certificate stolen from Opera Software

Alan Cleaver Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker. The attack was uncovered, halted, and contained on June 19, according to a short advisory  that Opera published Wednesday morning. While administrators have cleaned the system and have yet to find any evidence of any user data being compromised, the breach still had some troubling consequences. “The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware,” Wednesday’s advisory stated. “This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software or appears to be the Opera browser. It is possible that a few thousand Windows users, who were using Opera between June 19 from 1.00 and 1.36 UTC , may automatically have received and installed the malicious software.” Read 3 remaining paragraphs | Comments

Original post:
Attackers sign malware using crypto certificate stolen from Opera Software