Bitcoin security guarantee shattered by anonymous miner with 51% network power

Cornering the Bitcoin market may be easier than cornering orange juice futures. Paramount Pictures / Aurich Lawson For the first time in Bitcoin’s five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time. It’s an event that, if it persists, signals the end of crypto currency’s decentralized structure. Researchers from Cornell University say that on multiple occasions, a single mining pool repeatedly contributed more than 51 percent of Bitcoin’s total cryptographic hashing output for spans as long as 12 hours. The contributor was GHash , which bills itself as the “#1 Crypto & Bitcoin Mining Pool.” During these periods, the GHash operators had unprecedented powers that circumvented the decentralization that is often held up as a salient advantage Bitcoin has over traditional currencies. So-called 51 percenters, for instance, have the ability to spend the same coins twice, reject competing miners’ transactions, or extort higher fees from people with large holdings. Even worse, a malicious player with a majority holding could wage a denial-of-service attack against the entire Bitcoin network. Like tremblers before a major earthquake, most of GHash’s 51-percent spans were relatively short. Few people paid much attention, since shortly after a miner loses the majority position, it also loses its extraordinary control. Then, on June 12, GHash produced a majority of the power for 12 hours straight, a sustained status that enables precisely the type of doomsday scenario some researchers have warned was possible. Read 8 remaining paragraphs | Comments

Read the original:
Bitcoin security guarantee shattered by anonymous miner with 51% network power

Local cops in 15 US states confirmed to use cell tracking devices

ACLU A new map released  Thursday by the American Civil Liberties Union shows that fake cell towers, also known as stingrays, are used by state and local law enforcement in 15 states. Police departments in Baltimore, Chicago, Houston, Tucson, Los Angeles, and even Anchorage, among others, have been confirmed to use the devices. Beyond those states, 12 federal law enforcement agencies, ranging from the FBI to the National Security Agency, also employ them. Relatively little is known about precisely how police decide when and where to deploy them, but stingrays are used to track targeted phones and can also be used to intercept calls and text messages. However, privacy advocates worry that while the devices go after specific targets, they also often capture data of nearby unrelated people. Read 4 remaining paragraphs | Comments

Read More:
Local cops in 15 US states confirmed to use cell tracking devices

RadioShack continues death march, loses $98.3 million in a quarter

On Tuesday, electronics retailer RadioShack reported its quarterly earnings , and the results were not good. The company lost $98.3 million in its first fiscal quarter of 2014, a figure that’s more than triple the loss it sustained in the same quarter last year. Ars put RadioShack on our 2014 “Deathwatch” earlier in January, and not without reason. The retailer has relied on mobile phone sales to buoy it through the hard times and has tried to rebrand itself as the place to shop for Do-It-Yourselfers, stocking its shelves with various Arduino projects. But customers can find the handsets they need in carriers’ shops, and they often choose to buy DIY electronics goods online or in hardware stores. In a press release , the company attributed the quarter results to ” an industry-wide decline in consumer electronics and a soft mobility market which impacted traffic trends throughout the quarter.” Read 3 remaining paragraphs | Comments

Originally posted here:
RadioShack continues death march, loses $98.3 million in a quarter

GitHub for Windows given a shiny new look for version 2

Two years ago, GitHub released GitHub for Windows , a Metro-styled graphical interface for managing git version control. Today, the company released GitHub for Windows version 2. Version 2 introduces an all-new look. It’s still a minimalist, Metro-style interface, but it’s even more pared down than it was before; where the old interface used shading, the new one depends even more heavily on whitespace and positioning. The concept behind the redesign is to give a more focused, concentrated view on the things that developers care about. The old application had developers jumping between a range of different screens to perform different operations; this is much reduced in the new version. For example, to commit changes to a repository, the old application switched to a dedicated “commit” view. The new one performs the commit from within the main view. Read 2 remaining paragraphs | Comments

View article:
GitHub for Windows given a shiny new look for version 2

We “will be paying no ransom,” vows town hit by Cryptowall ransom malware

Cisco Systems The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted. “Make no mistake, the Town of Durham will be paying no ransom,” Town Manager Todd Selig was quoted as saying by CBS Boston news. Police department computers for the town of almost 15,000 residents were reportedly infected Thursday after an officer opened what appeared to be a legitimate file attachment to an e-mail. By Friday morning, widespread “issues” were hitting the department computer network . It was shut down by noon that day to prevent the infection from spreading to other systems. The game may be RIGged The department was reportedly hit by Cryptowall, a newer form of crypto malware that rivals the better known CryptoLocker . According to a blog post published Thursday by researchers from Cisco Systems, Cryptowall has been gaining ground since April, when it was folded into the RIG exploit kit, which is software sold in underground forums that automates computer scams and malware attacks for less technically knowledgeable criminals. Cisco’s Cloud Web Security service has been blocking requests tied to more than 90 infected Internet domains pushing Cryptowall scams to more than 17 percent of service customers. Read 6 remaining paragraphs | Comments

Excerpt from:
We “will be paying no ransom,” vows town hit by Cryptowall ransom malware

“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

Eset Security researchers have documented another first in the annals of Android malware: a trojan that encrypts photos, videos, and documents stored on a device and demands a ransom for them to be restored. The crudeness of Android/Simplocker, as the malicious app has been dubbed, suggests it’s still in the proof-of-concept phase, Robert Lipovsky, a malware researcher for antivirus provider Eset, said in a recent blog post . The malware also addresses users in Russian and demands that payments be made in Ukrainian hryvnias, an indication that it targets only people in Eastern Europe. Still, the trojan—with its combination of social engineering, strong encryption, and robust Internet architecture—could be a harbinger of more serious and widespread threats to come. After all, the first Android trojans to make hefty SMS charges also debuted in the same region. Once installed on a device, the app delivers the following message: Read 3 remaining paragraphs | Comments

More:
“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

California top court says red light camera photos are evidence

A red light camera at the intersection of Sylvan and Coffee in Modesto, California. Cyrus Farivar On Thursday, the California Supreme Court upheld the admissibility of images taken from red light cameras as evidence of traffic violations in the Golden State. The unanimous decision in the case, known as The People of California v. Goldsmith , marks the end of a five-year-old legal odyssey. Fines issued as the result of a red light camera in California are by far the highest nationwide ($436 in this case)—typically they’re in the $100 range in the rest of the country. The decision  (PDF) comes amid a flurry of challenges to the red light cameras before other state high courts: the Louisiana Supreme Court recently declined to hear such a case, letting stand a lower court ruling that challenged cameras in New Orleans. The Illinois Supreme Court heard oral arguments against  such cameras in Chicago in May 2014. A decision in a similar case currently before the Ohio Supreme Court is expected before the end of the year. Read 11 remaining paragraphs | Comments

See more here:
California top court says red light camera photos are evidence

Microsoft: Software update unlocks more GPU bandwidth on Xbox One

The system update does not turn the system white… only the employee models do that. The June system update rolling out to Xbox One system worldwide this week includes surface-level features like external hard drive support, as we mentioned this morning . But Microsoft says the new firmware will also help developers extract more power from the system’s Graphical Processing Unit (GPU), even though the base hardware in the system is obviously staying the same. Microsoft didn’t trumpet this news in a press release or blog post, but threw it out there in a tweet from Microsoft’s new executive in charge of Xbox, Phil Spencer: “June #XboxOne software dev kit gives devs access to more GPU bandwidth. More performance, new tools and flexibility to make games better.” As far back as last October, Microsoft was publicly acknowledging how Kinect and system processing took “a conservative 10 percent time-sliced reservation… for the GPGPU processing for Kinect and for the rendering of concurrent system content such as snap mode.” Back then, the company promised it would be opening up that slice of processing time to game developers in the future in a way that didn’t impact the system’s background performance. That appears to be what has come to pass with the system’s latest software update. Read 6 remaining paragraphs | Comments

Taken from:
Microsoft: Software update unlocks more GPU bandwidth on Xbox One

Comcast charged $2,000 for alarm system that didn’t work—for 7 years

Houston resident Lisa Leeson says she paid Comcast nearly $2,000 over seven years for an alarm system, only to find out that it never worked. Comcast, it turns out, installed the alarm system improperly. Even though the alarm made a sound indicating that it was active when Leeson and her family set it each day, “It was unable… to actually call the police and/or Comcast once it was activated,” Leeson told KPRC Local 2 Houston . What did Comcast do after the problem was finally discovered? At first, the company offered only a $20 credit, before eventually agreeing to refund all of the money. “When Davis called Comcast’s corporate office, a spokesman apologized, but not before he pointed to a line in Leeson’s alarm agreement where she agreed to ‘test her system’ on ‘a regular basis,'” the news station reported. “Chances are your alarm company requires the same, putting the onus back on you to make sure your system is functioning properly.” Read 5 remaining paragraphs | Comments

Continue Reading:
Comcast charged $2,000 for alarm system that didn’t work—for 7 years

TrueCrypt security audit presses on, despite developers jumping ship

ZEISS Microscopy TrueCrypt, the whole-disk encryption tool endorsed by National Security Agency leaker Edward Snowden and used by millions of privacy and security enthusiasts around the world, will receive a second round of safety audits despite being declared unsafe and abruptly abandoned by its anonymous developers two days ago. Phase II of the security audit was already scheduled to commence when Wednesday’s bombshell advisory dropped on the TrueCrypt SourceForge page. After 24 hours to reflect on the unexpected move, an organizer with the Open Crypto Audit Project said he saw no reason to scrub those plans. Online fundraisers to bankroll the project have raised about $70,000, well past the $25,000 organizers had initially aimed for . “We have conferred and we are firmly going forward on schedule with the audit regardless of yesterday’s circumstances,” Kenn White, a North Carolina-based computer scientist and audit organizer told Ars Thursday. “We don’t want there to remain all sorts of questions or scenarios or what ifs in people’s minds. TrueCrypt has been around for 10 years and it’s never received a proper formal security analysis. People are going to continue to use it for better or worse, and we feel like we owe the community the proper analysis.” Read 5 remaining paragraphs | Comments

More:
TrueCrypt security audit presses on, despite developers jumping ship