Hotel charges couple’s credit card $156 for negative Trip Advisor review

A British hotel added $156 to a couple’s credit card bill for violating its terms of service that says guests can be dinged for leaving bad online reviews. The Broadway Hotel charged Tony and Jan Jenkinson’s credit card, CNN reported Wednesday, after they left a review on Trip Advisor decrying the Blackpool hotel as a ” filthy, dirty rotten stinking hovel .” The BBC described the hotel’s terms of service contained in a booking document as: Despite the fact that repeat customers and couples love our hotel, your friends and family may not. For every bad review left on any website, the group organiser will be charged a maximum £100 per review. (About $156) This isn’t the first time we’ve seen fines like this from a hotel. In August, the Union Street Guest House in Hudson, NY included a table-turning clause in its reservation policies: if you book an event at the hotel and a member of your party posts a negative review, the hotel will fine you $500 . Amid an Internet firestorm, that hotel changed its policy. Read 3 remaining paragraphs | Comments

See more here:
Hotel charges couple’s credit card $156 for negative Trip Advisor review

Netflix takes up 9.5% of upstream traffic on the North American Internet

Netflix We’ve written a lot about how Netflix takes up a gigantic share of Internet traffic. During peak viewing hours, Netflix accounts for about a third of all bits sent to Internet users in North America on “fixed” connections—that is, cable, DSL, fiber, or satellite, but not cellular. But Netflix users also send a ton of data upstream, so much so that Sandvine’s latest Internet Phenomena Report puts Netflix at 9.48 percent of all peak upstream traffic on North American fixed Internet services, second only to BitTorrent’s 25.49 percent. Sandvine, a maker of equipment that helps consumer broadband providers manage network congestion, defines “peak” hours as those when network usage is within 95 percent of its daily maximum, typically from 7 to 11 p.m. It isn’t new that Netflix is both an upload and download monster. But for some reason, its share of uploads went up substantially in the latest measurement while downloads remained level. The twice-annual report had Netflix accounting for 6.44 of peak upstream traffic and 34.21 percent of downstream traffic in the first half of this year , while the newest report has Netflix at 9.48 percent of upstream and 34.89 percent of downstream: Read 17 remaining paragraphs | Comments

More:
Netflix takes up 9.5% of upstream traffic on the North American Internet

Samsung decides 56 smartphones a year is too many, will cut lineup by 30%

Samsung’s 2014 product lineup. GSM Arena Samsung has been in a pretty tough spot lately. After several quarters of record profits in 2012 and 2013, the company has crashed back down to Earth. The low point for Samsung came last quarter, when it reported a 49 percent drop in profits. At the high end of the market, the company currently has to fight off Apple, which just released a phablet of its own. At the low end, it’s going up against a flood of cheaper Chinese OEMs, led by Xiaomi  and Huawei. To try to get out of this slump, Samsung is taking a “less is more” approach. According to  The Wall Street Journal ,  the company said it would cut its 2015 smartphone lineup by 25-30 percent. The company will work on the internals, too, saying during its last earnings call that it will “increase the number of components shared across mid- to low-end models, so that we can further leverage economies of scale.” The belt-tightening might seem like a big change for Samsung, but the company has so fully flooded the market with smartphone models that a 30 percent cut will barely put a dent in its lineup. And thanks to GSM Arena’s phone database , we can get a pretty good estimate of just how big Samsung’s product lineup is in order to compare it to the competition. Read 5 remaining paragraphs | Comments

More here:
Samsung decides 56 smartphones a year is too many, will cut lineup by 30%

Prosecutors drop key evidence at trial to avoid explaining “stingray” use

p | m In a Baltimore trial courtroom on Monday, a local judge threatened to hold a police detective in contempt of court for refusing to disclose how police located a 16-year-old robbery suspect’s phone. Once the Baltimore Police were able to locate Shemar Taylor’s phone, they then searched his house and found a gun as well. But rather than disclose the possible use of a stingray, also known as a cell site simulator, Detective John L. Haley cited a non-disclosure agreement, likely with the Harris Corporation, since the company is one of the dominant manufacturers of such devices. Stingrays can be used to determine a phone’s location, and they can also intercept calls and text messages. Baltimore Circuit Judge Barry G. Williams retorted, “You don’t have a nondisclosure agreement with the court,” according to the Baltimore Sun . Read 8 remaining paragraphs | Comments

See original article:
Prosecutors drop key evidence at trial to avoid explaining “stingray” use

One of world’s largest landslide deposits discovered in Utah

The Markagrunt gravity slide in Utah includes most of the area between Beaver, Cedar City, and Panguitch. Google Earth Some things can be too big to notice, as our flat-Earth-believing ancestors can attest, having failed to work out that the surface of the Earth curves around a sphere. Or, as the saying goes, you can focus on the details of some fascinating trees and miss interesting facts about the forest as a whole. In southwest Utah, geologists had noticed some pretty cool “trees.” The area had been volcanically active between 21 and 31 million years ago, building up a host of steep, volcanic peaks. A number of huge blocks of rock from these peaks, up to 2.5 square kilometers in area and 200 meters thick, are obviously out of place—they’ve been interpreted by geologists as the result of many landslides around the volcanoes. In a recent paper in Geology , David Hacker , Robert Biek , and Peter Rowley show that rather than being the result of many individual landslides, these are actually all part of one jaw-droppingly large event. The deposit, called the Markagunt gravity slide, covers an area about 90 kilometers long and 40 kilometers wide and is hundreds of meters thick. During the event, all of this slid 30 kilometers or more. The scale puts run-of-the-mill landslides—as terrifying and deadly as they can be—to shame. Read 7 remaining paragraphs | Comments

Read More:
One of world’s largest landslide deposits discovered in Utah

Lync rebranded as “Skype for Business” in 2015 release

Microsoft’s Lync communications server is to be rebranded. The next version, due to be released next year, will be named instead Skype for Business . It will retain Lync’s infrastructure—the ability to use on-premises servers, optional federation with external communications networks, and so on and so forth—but the branding and client design will closely match those of Microsoft’s consumer communication platform. The Skype and Lync development teams have been working together since shortly after Microsoft bought the popular Skype platform for $8.5 billion in 2011. Skype for Business will further improve interoperability with regular Skype. While voice and instant messaging are already interoperable between Lync and Skype, the next version will add video messaging and access to the Skype user directory. This will mean that, should administrators choose to enable it, the Skype for Business client software will serve as a fairly fully featured Skype client, too. Read 1 remaining paragraphs | Comments

See original article:
Lync rebranded as “Skype for Business” in 2015 release

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

Dyn Research Domestic Internet traffic traveling inside the borders of Russia has repeatedly been rerouted outside of the country under an unexplained series of events that degrades performance and could compromise the security of Russian communications. The finding, reported Thursday in a blog post published by Internet monitoring service Renesys , underscores the fragility of the border gateway protocol (BGP), which forms the underpinning of the Internet’s global routing system. In this case, domestic Russian traffic was repeatedly routed to routers operated by China Telecom, a firm with close ties to that county’s government. When huge amounts of traffic are diverted to far-away regions before ultimately reaching their final destination, it increases the chances hackers with the ability to monitor the connections have monitored or even altered some of the communications. A similar concern emerged last year, when Renesys found big chunks of traffic belonging to US banks, government agencies, and network service providers had been improperly routed through Belarusian or Icelandic service providers . The hijacking of Russian traffic is linked to last year’s peering agreement between Russian mobile provider Vimpelcom and China Telecom. The pact allowed the firms to save money by having some of their traffic carried over the other’s network rather than through a more expensive transit operator. On multiple occasions since then, according to Renesys, communications destined for Russia has followed extremely round-about routes that take the traffic into China before sending it on to its final stop. Doug Madory, director of internet analysis in Renesys research arm Dyn wrote: Read 2 remaining paragraphs | Comments

Follow this link:
WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

400 Tor-anonymized domains tracked down and seized in global crackdown

Thursday’s takedown of the Silk Road 2.0 drug website was part of a much bigger crackdown by police in a dozen countries that seized more than 400 darknet domains, it was widely reported Friday. Operation Onymous, as the coordinated international effort was dubbed, confiscated $1 million in bitcoins, $250,000 in cash, and a variety of drugs, gold, and silver, the Associated Press reported . In all, according to Wired , police seized 414 .onion domains, the Web addresses that use the Tor anonymity service to hide the physical location where they’re hosted. At least 17 people were arrested. Sites besides Silk Road 2.0 that were taken down included Hydra, Cloud Nine, Pandora, and Blue Sky. In all, some 55 different markets will be shut down once Operation Onymous is completed. Sites Agora and Evolution aren’t among them. The rise of underground bazaars selling illicit drugs and services has continued despite last year’s arrest of Ross William Ulbricht, the alleged mastermind of the original Silk Road who has pleaded not guilty and continues to fight the criminal charges in court. Read 1 remaining paragraphs | Comments

Link:
400 Tor-anonymized domains tracked down and seized in global crackdown

Ubisoft pulls upcoming holiday titles off Steam [Updated]

Update:  It seems all three games discussed below are now back up  on the US Steam store, though they are still unavailable in the UK. We’ll continue to monitor the situation and reach out for comment from Ubisoft and Valve. Original Story PC gamers who want to download upcoming Ubisoft titles like Far Cry 4 , The Crew , and Assassin’s Creed: Unity won’t be able to go through Valve’s Steam service, it seems. The Steam store pages for all three of those holiday titles have been taken down, being pulled in the UK early yesterday and disappearing in the US and other countries over last night and into this morning. Read 6 remaining paragraphs | Comments

Follow this link:
Ubisoft pulls upcoming holiday titles off Steam [Updated]