North Korea attempts to purge online memory of executed leader

Kim Il Sung (left) is the founder of modern North Korea and the grandfather of current dictator Kim Jong Un. Tormod Sandtorv On Thursday, foreign policy watchers worldwide  were stunned when North Korea announced the execution of Jang Song Taek , a top government official. Jang was the uncle of Kim Jong Un, North Korea’s young dictator, and also served as vice chairman of the National Defense Commission of North Korea . However, beyond the whims of North Korea’s leader, the Hermit Kingdom appears to have now also taken the unusual step of attempting to remove all references to Jang Song Taek from state-controlled Internet outlets, primarily the Korean Central News Agency (KCNA). The KCNA website , which is hosted in Japan, appears to have suffered an outage briefly on Friday , and subsequently, past articles appeared scrubbed of mentions of Jang. Read 3 remaining paragraphs | Comments        

See the original article here:
North Korea attempts to purge online memory of executed leader

Everything you need to know to install SteamOS on your very own computer

SteamOS in all its blue glory. Lee Hutchinson True to its word, Valve has released a beta version of SteamOS, the Linux-based operating system that it will use to power its living room Steam Machine consoles. The release coincides with a lucky group of 300 public beta testers being selected to actually receive Steam Machines to test on—the rest of us can still use the OS, but we’ll have to bring our own hardware. Valve had previously recommended that users who aren’t “intrepid Linux hackers” should wait a few more months before trying out SteamOS, but that’s not going to stop Ars from barreling head first into the midst of things! We downloaded the OS as quickly as we could after it went live and spent some time getting it whipped into shape on fresh hardware. Contrary to Valve’s warning, the install wasn’t complex or scary at all—though if you’ve never installed Linux before, it might take you a bit out of your comfort zone. The hardware Specs at a glance:The Ars Technica Steam Machine CPU Intel Pentium G3220 (Haswell), dual-core, 3.0 GHz GPU Zotac Geforce GTX660 (2GB) RAM 8 GB DDR3-1600 Motherboard MSI H81I (mini-ITX) Storage Western Digital WD Blue 7200 rpm 500GB HD Sound Onboard Network Onboard (wired gigabit Ethernet) PSU Antec VP-450, 450W Case BitFenix Prodigy, arctic white We didn’t receive a Steam Machine to test, so we set out to build our own. Our goals were to stick to known-good SteamOS hardware, and to keep the price between $5-600. Andrew Cunningham, Kyle Orland, and I all stuck our heads together and came up with the configuration at right. All items were purchased from NewEgg, and the total prior to shipping was $562.93. Read 35 remaining paragraphs | Comments        

Read More:
Everything you need to know to install SteamOS on your very own computer

Valve: First version of SteamOS to be released to the masses on Friday

Valve PC gamers who are champing at the bit to build their very own ” Steam Machines ” won’t have to wait long to start tinkering, as Valve has revealed that its recently announced SteamOS will be available this Friday. The announcement comes alongside word from Valve that its prototype Steam Machines , along with the companion Steam Controller , will be shipped out to 300 randomly selected US beta testers on Friday. Valve plans to notify the lucky testers via e-mail at 2 pm Pacific today, and beta participants will get a special badge on their Steam accounts so journalists and fellow players can start bugging them for their impressions incessantly. If you’re not part of that lucky group of 300, though, you’re probably more interested in the fact that “SteamOS will be made available when the prototype hardware ships… downloadable by individual users and commercial OEMs.” More information about that release is coming soon, the company says, but Valve is already warning that “unless you’re an intrepid Linux hacker already, we’re going to recommend that you wait until later in 2014 to try it out.” Read 2 remaining paragraphs | Comments        

Original post:
Valve: First version of SteamOS to be released to the masses on Friday

The first smartring has an LED screen, tells time, and accepts calls

Forget smartwatches —smartrings are the new thing now. An Indiegogo campaign for a product called the “Smarty Ring” has hit its funding goal. Smarty Ring is a 13mm-wide stainless steel ring with an LED screen, Bluetooth 4.0, and an accompanying smartphone app. The ring pairs with a smartphone and acts as a remote control and notification receiver. The ring can display the time, accept or reject calls, control music, trigger the smartphone’s camera, and initiate speed-dial calls. It will also alert the wearer with light-up icons for texts, e-mails, Facebook, Twitter, Google Hangouts, and Skype. It supports dual time zones and comes with a countdown timer, a stopwatch, and an alarm. It can work as a tracker for your phone, too—if your smartphone is more than 30 feet away from the ring, Smarty Ring will trigger an alarm. The ring supports Android and iOS—as long as your device has Bluetooth 4.0, it should be compatible. The creators are promising 24 hours of battery life from the whopping 22 mAh battery, and charging happens via a wireless induction pad. Read 1 remaining paragraphs | Comments        

Read More:
The first smartring has an LED screen, tells time, and accepts calls

French agency caught minting SSL certificates impersonating Google

sharyn morrow Rekindling concerns about the system millions of websites use to encrypt and authenticate sensitive data, Google caught a French governmental agency spoofing digital certificates for several Google domains. The secure sockets layer (SSL) credentials were digitally signed by a valid certificate authority, an imprimatur that caused most mainstream browsers to place an HTTPS in front of the addresses and display other logos certifying that the connection was the one authorized by Google. In fact, the certificates were unauthorized duplicates that were issued in violation of rules established by browser manufacturers and certificate authority services. The certificates were issued by an intermediate certificate authority linked to the Agence nationale de la sécurité des systèmes d’information, the French cyberdefense agency better known as ANSSI. After Google brought the certificates to the attention of agency officials, the officials said the intermediate certificate was used in a commercial device on a private network to inspect encrypted traffic with the knowledge of end users, Google security engineer Adam Langley wrote in a blog post published over the weekend . Google updated its Chrome browser to reject all certificates signed by the intermediate authority and asked other browser makers to do the same. Firefox developer Mozilla and Microsoft, developer of Internet Explorer have followed suit . ANSSI later blamed the mistake on human error . It said it had no security consequences for the French administration or the general public, but the agency has revoked the certificate anyway. Read 5 remaining paragraphs | Comments        

Originally posted here:
French agency caught minting SSL certificates impersonating Google

Report: Spotify will introduce free mobile streaming next week

Spotify will soon allow its ad-supported users to stream music for free on their mobile devices, according to reports from the Wall Street Journal and TechCrunch . The company is reportedly holding an event next week to announce the service tweak, which takes a bit of the incentive away from subscribing. The Journal reports that Spotify has been negotiating for nearly a year to get mobile streaming rights, and it finally has the blessing of Sony Music Entertainment, Universal Music Group, and Warner Music Group. The rights holders and Spotify not only had to agree on rates but on how the music could be used. Read 2 remaining paragraphs | Comments        

Originally posted here:
Report: Spotify will introduce free mobile streaming next week

Kingpin behind large chunk of world’s malware exploits led lavish life

A screenshot showing BlackHole statistics. Group-IB An online crime kingpin arrested in October and charged with creating and distributing the Blackhole exploit kit may have had his hand in as much as 40 percent of the world’s malware infections, according to information released by the security firm that helped track him down. The 27-year-old Russian, identified only as Paunch, allegedly earned about $50,000 per month selling BlackHole subscriptions for as much as $500 per month, according to a report published Friday by security firm Group-IB. He is also alleged to be behind the much more expensive Cool Exploit Kit and a “Crypt” service used to obfuscate malware to go undetected by antivirus programs. With more than 1,000 customers, he was able to lead a lavish lifestyle that included driving a white Porsche Cayenne, Group-IB said. A man Group-IB identifies as “Paunch” standing in front of a Porsche Cayenne. Group-IB Exploit kits are the do-it-yourself tools used to embed crimeware into hacked or malicious websites so they target a host of vulnerabilities found on end-user computers. People who visit the websites are exposed to “drive-by” attacks that are often able to install highly malicious software on the computers with no sign that anything is amiss. Group-IB estimated that Paunch may have supplied the code used in as much as 40 percent of the PC crimeware infections worldwide. Researchers arrived at that guess by gauging sales of BlackHole and Cool, which they said accounted for about 40 percent of world revenue for exploit kits. Even assuming that some crimeware is installed independent of exploit kits, it’s hard to overstate the role these two kits played in seeding the Web with exploit code that installed malware used in bank fraud and other forms of online crime. Read 3 remaining paragraphs | Comments        

See the original article here:
Kingpin behind large chunk of world’s malware exploits led lavish life

Charged with theft, man arrested for plugging car into school’s outlet

Nissan A man in an Atlanta suburb was confronted by a police officer for plugging his electric car into an outside outlet at a school. Ten days later, he was arrested at home and charged with theft for taking about 5 cents worth of electricity “without consent.” Kaveh Kamooneh plugged an extension cable from his Nissan Leaf into a 110-volt external outlet at Chamblee Middle School while his son was practicing tennis. A short time later, he noticed someone in his car and went to investigate—and found that the man was a Chamblee police officer. “He informed me he was about to arrest me, or at least charge me, for electrical theft,” Kamooneh told Atlanta’s Channel 11 News . Kamooneh said that the car, when plugged into a 110-volt outlet, draws a kilowatt an hour. “Over an hour, that’s maybe eight or nine cents” worth of electricity, he said, depending on the rates. He was plugged in for less than 20 minutes, so he estimated the amount of power he drew from the school at less than 5 cents. Read 2 remaining paragraphs | Comments        

Read this article:
Charged with theft, man arrested for plugging car into school’s outlet

Found: hacker server storing two million pilfered paswords

Spider Labs Researchers have unearthed a server storing more than two million pilfered login credentials for a variety of user accounts, including those on Facebook, Yahoo, Google, Twitter, and a handful of other websites. More than 1.5 million of the user names and passwords are for website accounts, including 318,121 for Facebook, 59,549 for Yahoo, 54,437 for Google, and 21,708 for Twitter, according to a blog post published Tuesday by researchers from security firm Trustwave’s Spider Labs. The cache also included credentials for e-mail addresses, FTP accounts, remote desktops, and secure shells. More than 1.8 million of the passwords, or 97 percent of the total, appeared to come from computers located in the Netherlands, followed by Thailand, Germany, Singapore, and Indonesia. US accounts comprised 0.1 percent, with 1,943 compromised passwords. In all, the data may have come from as many as 102 countries. Read 5 remaining paragraphs | Comments        

Link:
Found: hacker server storing two million pilfered paswords

Scientist-developed malware covertly jumps air gaps using inaudible sound

Topology of a covert mesh network that connects air-gapped computers to the Internet. Hanspach and Goetz Computer scientists have developed malware that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could prove especially adept in penetrating highly sensitive environments that routinely place an “air gap” between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals. The researchers, from Germany’s Fraunhofer Institute for Communication, Information Processing, and Ergonomics , recently disclosed their findings in a paper published in the Journal of Communications . It came a few weeks after a security researcher said his computers were infected with a mysterious piece of malware that used high-frequency transmissions to jump air gaps . The new research neither confirms nor disproves Dragos Ruiu’s claims of the so-called badBIOS infections, but it does show that high-frequency networking is easily within the grasp of today’s malware. Read 6 remaining paragraphs | Comments        

More:
Scientist-developed malware covertly jumps air gaps using inaudible sound