South Australia Refuses To Stop Using An Expired, MS-DOS-Based Health Software

jaa101 writes: The Australian state of South Australia is being sued for refusing to stop using CHIRON, an MS-DOS-based software from the ’90s that stores patient records. Their license expired in March of 2015, but they claim it would be risky to stop using it. CHIRON’s vendor, Working Systems, says SA Health has been the only user of CHIRON since 2008 when they declined to migrate to the successor product MasterCare ePAS. SA Health has 64 sites across South Australia — all of which are apparently still using the MS-DOS-based health software from the 1990s. Read more of this story at Slashdot.

Read this article:
South Australia Refuses To Stop Using An Expired, MS-DOS-Based Health Software

One Million IP Addresses Used In Brute-Force Attack On A Bank

Cisco says in just one week in February they detected 1, 127, 818 different IP addresses being used to launch 744, 361, 093 login attempts on 220, 758, 340 different email addresses — and that 93% of those attacks were directed at two financial institutions in a massive Account Takeover (ATO) campaign. An anonymous reader writes: Crooks used 993, 547 distinct IPs to check login credentials for 427, 444, 261 accounts. For most of these attacks, the crooks used proxy servers, but also two botnets, one of compromised Arris cable modems, and one of ZyXel routers/modems. Most of these credentials have been acquired from public breaches or underground hacking forums. This happened before the recent huge data breaches such as MySpace, LinkedIn, Tumblr, and VK.com. It’s apparently similar to the stolen-credentials-from-other-sites attack that was launched against GitHub earlier this week. Read more of this story at Slashdot.

Excerpt from:
One Million IP Addresses Used In Brute-Force Attack On A Bank

Businesses Lose $3.1 Billion to Email Scams, FBI Warns

Business have lost over $3 billion because of compromised e-mail accounts, the FBI reports, citing “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments.” 22, 143 business have been affected — 14, 302 within the U.S. — with a total dollar loss of $3, 086, 250, 090, representing an increase of 1, 300% since January of 2015. Using social engineering or “computer intrusion techniques, ” the attackers target employees responsible for wire transfers (or issuing checks) using five scenarios, which include bogus invoices or executive requests for a wire transfer of funds, with some attackers even impersonating a corporate law firm. “Victims report that IP addresses frequently trace back to free domain registrars, ” warns the FBI’s Internet Crime Complaint Center, which also urges businesses to avoid free web-based e-mail accounts. Read more of this story at Slashdot.

More:
Businesses Lose $3.1 Billion to Email Scams, FBI Warns

Olli is a 3D Printed, IBM Watson-Powered, Self-Driving Minibus

An anonymous reader writes from a report via Phys.Org: Arizona-based startup Local Motors unveiled Olli — a 3D-printed minibus capable of carrying 12 people. It’s powered by IBM’s supercomputer platform Watson and is designed as an on-demand transportation solution that passengers can summon with a mobile app. The company claims it can be “printed” to specification in “micro factories” in a matter of hours. They say it is ready to go as soon as regulations allow it to hit the streets. While Local Motors has developed the system to control the driving, IBM’s Watson system is used to provide the user interface so passengers can have “conversations” with Olli. “Watson is bringing an understanding to the vehicle, ” said IBM’s Bret Greenstein. “If you have someplace you need to be you can say that in your own words. A vehicle that understands human language, where you can walk in and say, ‘I’d like to get to work, ‘ that lets you as a passenger relax and enjoy your journey, ” he said. The vehicle relies on more than 30 sensors and streams of data from IBM’s cloud. Olli will be demonstrated in National Harbor, Maryland, over the next few months with additional trials expected in Las Vegas and Miami. Read more of this story at Slashdot.

Read More:
Olli is a 3D Printed, IBM Watson-Powered, Self-Driving Minibus

GitHub Presses Big Red Password Reset Button After Third-Party Breach

John Leyden, writing for The Register: GitHub has reset the passwords of users targeted in an attack this week that relied on using stolen credentials from a breach at a third-party site. The software repository itself has not suffered a breach. Hackers behind the assault were trying to break into the accounts of users who had inadvisedly used the same login credentials on an unnamed site that had suffered a breach, as a statement by GitHub explains. GitHub said it had reset the passwords on all affected accounts before beginning the process of notifying those affected. “We encourage all users to practise good password hygiene and enable two-factor authentication to protect your account, ” GitHub sensibly advised. Read more of this story at Slashdot.

Originally posted here:
GitHub Presses Big Red Password Reset Button After Third-Party Breach

Access To Thousands Of Compromised Government Servers Selling For $6 On Black Market

An anonymous reader writes: Researchers have uncovered an underground market selling information of over 70, 000 compromised servers. Russia-based Kaspersky Lab revealed that the online forum, named xDedic, seems to be operated by a Russian-speaking organisation and allows hackers to pay for undetectable access to a wide range of servers, including those owned by government, corporate and academic groups in more than 170 countries. Access to a compromised server can be bought for as little as $6. This kit comes with relevant tools to instruct on launching denial-of-service attacks and spam campaigns on the targeted network, as well as allowing criminals to illegally produce bitcoin and breach online systems, such as retail payment platforms. Read more of this story at Slashdot.

Original post:
Access To Thousands Of Compromised Government Servers Selling For $6 On Black Market

Twitter Invests $70 Million In Music Streaming Service SoundCloud

An anonymous reader writes: Recode reports that Twitter has decided to purchase a piece of the music streaming service SoundCloud. Roughly two years ago, Twitter thought about buying SoundCloud, but ultimately ended up walking away from the music service. Now, Twitter has invested around $70 million “as part of a round that should end up in the $100 million-range.” Recode reports: “The round is expected to value SoundCloud at about $700 million — the same value that investors placed on the company in 2014, when it raised $60 million; since then it has also raised a debt round.” Twitter CEO Jack Dorsey wouldn’t comment on the specifics, but did confirm Twitter’s stake in the company. “Earlier this year we made an investment in SoundCloud through Twitter Ventures to help support some of our efforts with creators, ” said Twitter CEO Jack Dorsey. “They’ve been great partners of ours over the years and their community-supported approach mirrors ours in many ways.” Twitter may try and integrate SoundCloud into its service to increase growth and engagement, while SoundCloud may try and use Twitter to promote its newly launched subscription service. Read more of this story at Slashdot.

See more here:
Twitter Invests $70 Million In Music Streaming Service SoundCloud

The Biggest Maker of Raspberry Pis Has Been Acquired For $871 Million

An anonymous reader writes from a report via The Verge: The biggest manufacturer of the Raspberry Pi minicomputer, Premier Farnell, has been acquired by Swiss industrial component supplier Daetwyler Holding AG for roughly $871 million. According to Bloomberg, the deal will reportedly help both companies compete better in the components market. “By combining forces, we significantly increase our competitiveness and extend our product range, ” Daetwyler Chairman Ulrich said in a statement, “facilitating a one-stop shopping experience for our wide range of customers from a multitude of industries.” Premier Farnell is one of the only companies with a license to design and distribute Raspberry Pis. The Wall Street Journal says the Raspberry Pi devices are a big part of the company’s business, as the division in charge of the Pi raked in 16 percent of the company’s total revenue last year. Read more of this story at Slashdot.

Read More:
The Biggest Maker of Raspberry Pis Has Been Acquired For $871 Million

Rhapsody Rebrands Itself As Napster

An anonymous reader writes: After completing its purchase of Napster in December 2011, Rhapsody has decided to rebrand itself as Napster. Rhapsody made the announcement on their blog, which states: “No changes to your playlists, favorites, albums, and artists. Same music. Same service. Same price. 100% the music you love. Stay tuned!” That’s it. The company didn’t elaborate as to why they decided to change their name now. Napster has made a name for itself as being a brand synonymous with illegal music downloads. It’ll be interesting to what kind of effect, if any, this has on Rhapsody. Read more of this story at Slashdot.

Follow this link:
Rhapsody Rebrands Itself As Napster

Hacker Puts 51 Million iMesh Accounts For Sale On Dark Web

An anonymous reader shares a ZDNet report: User accounts for iMesh, a now-defunct file sharing service, are for sale on the dark web. The New York-based music and video sharing company was a peer-to-peer service, which rose to fame in the file sharing era of the early-2000s, riding the waves of the aftermath of the “dotcom” boom. LeakedSource, a breach notification site that allows users to see if their details have been leaked, has obtained the database. The group’s analysis of the database shows it contains a little over 51 million accounts. The database, of which a portion was shared with ZDNet for verification, contains user information that dates back to late-2005 when the site launched, including email addresses, passwords (which were hashed and salted with MD5, an algorithm that nowadays is easy to crack), usernames, a user’s location and IP address, registration date, and other information — such as if the account is disabled, or if the account has inbox messages. Read more of this story at Slashdot.

View the original here:
Hacker Puts 51 Million iMesh Accounts For Sale On Dark Web