Olympic Swimmers ‘Certain’ To Pick Up Virus From Three Teaspoons of Rio Water

An anonymous reader writes from a report via The Independent: The Associated Press has released a 16-month-long study that shows just days before the Olympic Games in Rio de Janeiro begin, the waterways in the city are teeming with dangerous viruses and bacteria. The report says both athletes and tourists are at risk of getting ill from the contaminated water. “The first results of the study published over a year ago showed viral levels at up to 1.7 million times what would be considered worrisome in the United States or Europe, ” reports The Independent. “At those concentrations, swimmers and athletes who ingest just three teaspoons of water are almost certain to be infected with viruses that can cause stomach and respiratory illnesses and, more rarely, heart and brain inflammation — although whether they actually fall ill depends on a series of factors including the strength of the individual’s immune system.” Many of the athletes have been taking antibiotics, bleaching oars and donning plastic suits and gloves to prevent illnesses, but antibiotics combat bacterial infections, not viruses. The AP investigation found that infectious adenovirus readings turned up at nearly 90 percent of the test sites over 16 months of testing. What’s more is that “the beaches often have levels of bacterial markers for sewage pollution that would be cause for concern abroad — and sometimes even exceed Rio state’s lax water safety standards, ” reports The Independent. Read more of this story at Slashdot.

Original post:
Olympic Swimmers ‘Certain’ To Pick Up Virus From Three Teaspoons of Rio Water

Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

An anonymous reader writes: Washington State has filed a lawsuit against Comcast to the sum of $100 million, accusing Comcast of “engaging in a pattern of deceptive practices.” It claims that Comcast’s documents reveal a pattern of illegally deceiving its own customers for profit. KOMO News reports: “The lawsuit (PDF) alleges more than 1.8 million individual violations of the Washington Consumer Protection Act. The Attorney General’s Office says 500, 000 Washington consumers were affected. The lawsuit also accuses Comcast of violating the Consumer Protection Act to all of its nearly 1.2 million Washington subscribers due to its deceptive ‘Comcast Guarantee, ‘ Ferguson said. The lawsuit accuses Comcast of misleading 500, 000 Washington consumers and deceiving them into paying at least $73 million in subscription fees over the last five years for what the attorney general says is a a near-worthless protection plan. Customers who sign up for Comcast’s Service Protection Plan pay a $4.99 monthly fee to avoid being charged if a Comcast technician visits their home. But the plan did not cover wiring inside a wall, the lawsuit says. The Attorney General Office says 75 percent of the time, customers who contacted Comcast were told the plan covered inside wiring. Customer service scripts, which the Attorney General’s Office said it obtained during its investigation, told Comcast representatives to say that the plan covers calls ‘related to inside wiring’ and ‘wiring inside your home.'” According to KOMO News, the lawsuit is seeking more than $73 million in restitution to pay back Service Protection Plan subscriber payments; full restitution for all service calls that applied an improper resolution code, estimated to be at least $1 million; removal of improper credit checks from the credit reports of more than 6, 000 customers; up to $2, 000 per violation of the Consumer Protection Act; and that Comcast clearly disclose the limitations of its Service Protection Plan in advertising and through its representatives, correct improper service codes that should not be chargeable and implement a compliance procedure for improper customer credit checks. Read more of this story at Slashdot.

Read More:
Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

Cyberattackers Hijack Screens at Two Vietnam Airports, Broadcast Political Messages

An anonymous reader quotes an article from the Washington Times: Hackers on Friday successfully pulled off cyberattacks against Vietnam’s two largest airports and the nation’s flag carrier, Vietnam Airlines. The attacks — attributed to a Chinese hacking group known as 1937CN — ultimately failed to cause any significant security issues or air traffic control problems, Vice Minister of Transport Nguyen Nhat told local media. Nonetheless, the individuals briefly hijacked flight information screens and sound systems inside Noi Bai and Tan Son Nhat airports in Hanoi and Ho Chi Minh City, respectively… Instead of departure and arrival details, the airports’ flight screens and speakers broadcast what local media described as anti-Vietnamese and Philippines slogans, in turn prompting authorities to shut down both systems… Vietnam Airlineâ(TM)s website, meanwhile, “was seized control and transferred to a malicious website abroad” and… passenger data pertaining to an undisclosed number of its frequent flyers was published online as well, the airline said in a statement. Local media on Friday said about 100 MB of data concerning roughly 40, 000 VMA passengers had been dumped online. Read more of this story at Slashdot.

Visit link:
Cyberattackers Hijack Screens at Two Vietnam Airports, Broadcast Political Messages

Cisco Finds $34 Million Ransomware Industry

Ransomware is “generating huge profits, ” says Cisco. Slashdot reader coondoggie shares this report from Network World: Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits — nearly $34 million annually, according to Cisco’s Mid-Year Cybersecurity Report out this week. Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target. Many of the victims were slow to patch their systems, according to the article. One study of Cisco devices running on fundamental infrastructure discovered that 23% had vulnerabilities dating back to 2011, and 16% even had vulnerabilities dating back to 2009. Popular attack vectors included vulnerabilities in JBoss and Adobe Flash, which was responsible for 80% of the successful attacks for one exploit kit. The article also reports that attackers are now hiding their activities better using HTTPS and TLS, with some even using a variant of Tor. Read more of this story at Slashdot.

View original post here:
Cisco Finds $34 Million Ransomware Industry

Android Stagefright Bug Required 115 Patches, Millions Still At Risk

eWeek reports that “hundreds of millions of users remain at risk” one year after Joshua Drake discovered the Stagefright Android flaw. Slashdot reader darthcamaro writes: A year ago, on July 27, 2015 news about the Android Stagefright flaw was first revealed with the initial reports claiming widespread impact with a billion users at risk. As it turns out, the impact of Stagefright has been more pervasive…over the last 12 months, Google has patched no less than 115 flaws in Stagefright and related Android media libraries. Joshua Drake, the researcher who first discovered the Stagefright flaw never expected it to go this far. “I expected shoring up the larger problem to take an extended and large effort, but I didn’t expect it to be ongoing a year later.” Drake believes targeted attacks use Stagefright vulnerabilities on unpatched systems, but adds that Android’s bug bounty program appears to be working, paying out $550, 000 in its first year. Read more of this story at Slashdot.

Follow this link:
Android Stagefright Bug Required 115 Patches, Millions Still At Risk

Malvertising Campaign Infected Thousands of Users Per Day For More Than a Year

An anonymous reader writes from a report via Softpedia: Since the summer of 2015, users that surfed 113 major, legitimate websites were subjected to one of the most advanced malvertising campaigns ever discovered, with signs that this might have actually been happening since 2013. Infecting a whopping 22 advertising platforms, the criminal gang behind this campaign used complicated traffic filtering systems to select users ripe for infection, usually with banking trojans. The campaign constantly pulled between 1 and 5 million users per day, infecting thousands, and netting the crooks millions each month. The malicious ads, according to this list, were shown on sites like The New York Times, Le Figaro, The Verge, PCMag, IBTimes, Ars Technica, Daily Mail, Telegraaf, La Gazetta dello Sport, CBS Sports, Top Gear, Urban Dictionary, Playboy, Answers.com, Sky.com, and more. Read more of this story at Slashdot.

More:
Malvertising Campaign Infected Thousands of Users Per Day For More Than a Year

Amazon CEO Jeff Bezos Becomes World’s Third Richest Person

An anonymous reader quotes a report from BBC: Strong earnings from Amazon and a boost to the company’s stock have made its founder, Jeff Bezos, the world’s third richest person, according to Forbes. Mr Bezos owns 18% of Amazon’s shares, which rose 2% in trading on Thursday. Forbes estimated his fortune to be $65.3 billion (49.5 billion British Pound). Amazon’s revenue beat analysts’ expectations, climbing 31% from last year to $30.4 billion in the second quarter. Profit for the e-commerce giant was $857 million, compared with $92 million in 2015. According to Forbes estimates, Mr Bezos’s fortune is only surpassed by Microsoft founder Bill Gates, worth $78 billion (59 billion British Pound), and the $73.1 billion (55 billion British Pound) fortune of Zara founder Amancio Ortega. Amazon had developed a reputation for announcing little or no profit each quarter, but appeared to hit a turning point last year and has seen improving earnings since. Amazon shares have spiked 50% since February. BBC’s report includes some bullet points about Bezos. He was born in Albuquerque, New Mexico, in 1964. He studied at Princeton University and worked on Wall Street. In 1994, he launched Amazon as an online book retailer. A lifelong Star Trek fan, Bezos launched Blue Origin spaceflight and aerospace firm in 2000, and more than a decade later, he purchased The Washington Post newspaper in 2013. Read more of this story at Slashdot.

See the original post:
Amazon CEO Jeff Bezos Becomes World’s Third Richest Person

Nintendo NX Is a Portable Console With Detachable Controllers, Says Report

An anonymous reader writes from a report via Eurogamer.net: We now have a good idea as to what the Nintendo NX will consist of thanks to a new report from Eurogamer. According to a number of sources, Nintendo’s upcoming NX will be a portable, handheld console with detachable controllers. Eurogamer.net reports: “On the move, NX will function as a high-powered handheld console with its own display. So far so normal — but here’s the twist: we’ve heard the screen is bookended by two controller sections on either side, which can be attached or detached as required. Then, when you get home, the system can connect to your TV for gaming on the big screen. A base unit, or dock station, is used to connect the brain of the NX — within the controller — to display on your TV. NX will use game cartridges as its choice of physical media, multiple sources have also told [Eurogamer]. Another source said the system would run on a new operating system from Nintendo. It won’t, contrary to some earlier rumors, simply run on Android. The system will harness Nvidia’s powerful mobile processor Tegra. Graphical comparisons with current consoles are difficult due to the vastly different nature of the device — but once again we’ve heard Nintendo is not chasing graphical parity. Quite the opposite, it is sacrificing power to ensure it can squeeze all of this technology into a handheld, something which also tallies with earlier reports. Finally, we’ve heard from one source that NX planning has recently moved up a gear within Nintendo ahead of the console’s unveiling, which is currently slated for September. After the confused PR fiasco of the Wii U launch, the company is already settling on a simple marketing message for NX — of being able to take your games with you on the go.” Read more of this story at Slashdot.

See original article:
Nintendo NX Is a Portable Console With Detachable Controllers, Says Report

Notorious Group OurMine Hacks TechCrunch

Prominent technology blog TechCrunch — which is often cited on Slashdot — has become the latest victim of the OurMine hacking group. The notorious group gained access to Seattle-based writer Devin Coldewey’s account, and posted the following message earlier today: “Hello Guys, don’t worry we are just testing techcrunch security, we didn’t change any passwords, please contact us.” The post was then promoted as a ticker, the top banner in red and as the main story on TechCrunch’s front page. BetaNews adds: The OurMine website says that the group offers “top notch vulnerability assessment”, so it’s possible that the hack was little more than a PR stunt touting for business. It did not take TechCrunch long to notice and remove the story (and presumably change a series of passwords…) but the site is yet to issue a statement about what has happened. Read more of this story at Slashdot.

More:
Notorious Group OurMine Hacks TechCrunch

Facebook Admits Blocking WikiLeaks’ DNC Email Links, But Won’t Say Why

An anonymous reader writes: Facebook has admitted it blocked links to WikiLeaks’ DNC email dump, but the company has yet to explain why. WikiLeaks has responded to the censorship via Twitter, writing: “For those facing censorship on Facebook etc when trying to post links directly to WikiLeaks #DNCLeak try using archive.is.” When SwiftOnSecurity tweeted, “Facebook has an automated system for detecting spam/malicious links, that sometimes have false positives. /cc, ” Facebook’s Chief Security Officer Alex Stamos replied with, “It’s been fixed.” As for why there was a problem in the first place, we don’t know. Nate Swanner from The Next Web writes, “It’s possible its algorithm incorrectly identified them as malicious, but it’s another negative mark on the company’s record nonetheless. WikiLeaks is a known entity, not some torrent dumping ground. The WikiLeaks link issue has reportedly been fixed, which is great — but also not really the point. The fact links to the archive was blocked at all suggests there’s a very tight reign on what’s allowed on Facebook across the board, and that’s a problem.” A Facebook representative provided a statement to Gizmodo: “Like other services, our anti-spam systems briefly flagged links to these documents as unsafe. We quickly corrected this error on Saturday evening.” Read more of this story at Slashdot.

Read More:
Facebook Admits Blocking WikiLeaks’ DNC Email Links, But Won’t Say Why