Square drastically simplifies Internet cash transfers

The screen where users enter their debit card information. Financial startup Square launched a new arm of its business Tuesday that allows two parties to transfer cash between themselves using only their debit card numbers and e-mail. Square Cash may trump similar services like PayPal in ease of use in that it doesn’t require extra bank info, and transactions can happen directly via e-mail. Competitors like PayPal have been able to handle direct debit transactions for some time, though setup is a bit more of a hassle. Users have to enter their checking account numbers and routing numbers and then verify their accounts with two small deposits, so the process can take a few days. With Square Cash, the process begins in e-mail : users send an e-mail to the person they want to pay, cc cash@square.com, and enter the amount in the subject line. If it’s their first transaction, Square sends a second e-mail that leads the user to a screen where they enter their debit card number, expiration date, and ZIP code. Once the person on the other end gets the e-mail and fills out the same form, the transaction is completed in 1-2 days. Read 2 remaining paragraphs | Comments        

View original post here:
Square drastically simplifies Internet cash transfers

New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

For nearly a decade now, TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit. There’s just one problem, though. No one knows who created the software, and worse still, no one has ever conducted a full security audit on it—until now. Since last month, a handful of cryptographers have newly discussed problems and alternatives to the popular application, which lead on Monday to a public call to perform a full security audit on TrueCrypt. As of Tuesday afternoon, that fundraiser reached over $16,000, making a proper check more likely. Much of those funds came from a single $10,000 donation from an Atlanta-based security firm. “We’re now in a place where we have nearly—but not quite enough—to get a serious audit done,” wrote Matthew Green , a  well-known cryptography professor at Johns Hopkins University, on Twitter. Read 3 remaining paragraphs | Comments        

See original article:
New effort to fully audit TrueCrypt raises over $16,000 in a few short weeks

Facebook to rip search opt-out from under those who were using it

Here’s the dialog you’ll see if you were opted out of search, when Facebook gets around to opting you back in. Facebook If you checked that box saying you don’t want to appear in Facebook search results, get ready: soon, that choice is going away. Facebook announced in a blog post Thursday that it’s removing the ability to opt out of appearing in search results, both for friends and globally, for those who’ve had it enabled. Facebook actually removed the search opt-out for everyone who didn’t have it enabled early this year, around the time it introduced Graph Search . Now, ten months later, Facebook is giving the boot to anyone who actually cared enough to opt out, referring to the checkbox as an “old search setting.” Facebook claims that less than one percent of users were taking advantage of the feature. In simpler times, Facebook was smaller and easier to navigate, and everyone had a privacy setting asking “Who can look up your timeline by name?” Now that there are so many profiles that users become confused when they know they have a friend or know someone in a group, but try to find them by search and they don’t appear, says Facebook. Read 1 remaining paragraphs | Comments        

See the article here:
Facebook to rip search opt-out from under those who were using it

Meltdowns at NSA spy data center destroy equipment, delay opening

The NSA’s Utah Data Center. Swilsonmc A massive data center being built by the National Security Agency to aid its surveillance operations has been hit by “10 meltdowns in the past 13 months” that “destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, ” the  Wall Street Journal reported last night . The first of four facilities at the  Utah Data Center  was originally scheduled to become operational in October 2012, according to project documents described by the  Journal . But the electrical problems—described as arc fault failures or “a flash of lightning inside a 2-foot box”—led to explosions, failed circuits, and melted metal, the report states: The first arc fault failure at the Utah plant was on Aug. 9, 2012, according to project documents. Since then, the center has had nine more failures, most recently on Sept. 25. Each incident caused as much as $100, 000 in damage, according to a project official. It took six months for investigators to determine the causes of two of the failures. In the months that followed, the contractors employed more than 30 independent experts that conducted 160 tests over 50, 000 man-hours, according to project documents. The 1 million square foot data center is slated to cost $1.4 billion to construct. One project official told the  Journal that the NSA planned to start turning on some of the computers at the facility this week. “But without a reliable electrical system to run computers and keep them cool, the NSA’s global surveillance data systems can’t function, ” the newspaper wrote. Read 2 remaining paragraphs | Comments        

More:
Meltdowns at NSA spy data center destroy equipment, delay opening

Blackberry warns of near-$1 billion loss this quarter

Blackberry released a statement on Friday saying that it expects to report an operating loss of almost $1 billion in the coming days. According to The Wall Street Journal , Blackberry overestimated the number of new phones it would sell and is facing an “inventory charge of as much as $960 million and a restructuring charge of $72 million.” Specifically, the company said that it would likely report a loss of $950 million to $995 million for the second quarter. Earlier this week we reported that Blackberry was planning to lay off up to 40 percent of its employees, taking the company from 12, 700 full-time employees to about 7, 620 employees. The WSJ reported today that 4, 500 people will be laid off, lower than earlier estimates. (Is that a silver lining we see?) The Canadian company also reported today that it only sold 3.7 million smartphones in the last quarter, most of which were older phones. To stem the bleeding, Blackberry said that going forward, its “smartphone portfolio will transition from 6 devices to 4; focusing on enterprise and prosumer-centric devices, including 2 high-end devices and 2 entry-level devices.” As Quartz writer Christopher Mims wrote , it’s probably too late for Blackberry to turn around its share of the enterprise market given the latest moves made by Apple and Samsung to get their hardware into the hands of businesspeople. Read 1 remaining paragraphs | Comments        

See the original post:
Blackberry warns of near-$1 billion loss this quarter

Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)

Chad Miller Of all the new features of Apple’s new iPhone 5S , few have drawn more attention than the built-in fingerprint scanner known as Touch ID. Apple billed it as an “innovative way to simply and securely unlock your phone with just the touch of a finger.” More breathless accounts were calling it a potential ” death knell for passwords ” or using similarly overblown phrases . Until the new phones are in the hands of skilled hackers and security consultants, we won’t know for sure if Touch ID represents a step forward from the security and privacy offered by today’s iPhones. I spent several hours parsing the limited number of details provided by Apple and speaking to software and security engineers. I found evidence both supporting and undermining the case that the fingerprint readers are an improvement. The thoughts that follow aren’t intended to be a final verdict—the proof won’t be delivered until we see how the feature works in the real world. The pros I’ll start with the encouraging evidence. Apple said Touch ID is powered by a laser-cut sapphire crystal and a capacitive touch sensor that is able to take a high-resolution image based on the sub-epidermal layers of a user’s skin. While not definitive, this detail suggests Apple engineers may have designed a system that is not susceptible to casual attacks. If the scans probe deeply enough, for instance, Touch ID probably wouldn’t be tricked by the type of clones that are generated from smudges pulled off a door knob or computer monitor. In 2008, hackers demonstrated just how easy it was to create such clones when they published more than 4, 000 pieces of plastic film containing the fingerprint of a German politician who supported the mandatory collection of citizens’ unique physical characteristics. By slipping the foil over their own fingers, critics were able to mimic then-Interior Minister Wolfgang Schauble’s fingerprint when touching certain types of biometric readers. Read 15 remaining paragraphs | Comments        

Original post:
Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict (Updated)

Sudden spike of Tor users likely caused by one “massive” botnet

Tor Project Researchers have found a new theory to explain the sudden spike in computers using the Tor anonymity network: a massive botnet that was recently updated to use Tor to communicate with its mothership. Mevade.A, a network of infected computers dating back to at least 2009, has mainly used standard Web-based protocols to send and receive data to command and control (C&C) servers, according to researchers at security firm Fox-IT. Around the same time that Tor Project leaders began observing an unexplained doubling in Tor clients , Mevade overhauled its communication mechanism to use anonymized Tor addresses ending in .onion. In the week that has passed since Tor reported the uptick, the number of users has continued to mushroom. “The botnet appears to be massive in size as well as very widespread, ” a Fox-IT researcher wrote in a blog post published Thursday . “Even prior to the switch to Tor, it consisted of tens of thousands of confirmed infections within a limited amount of networks. When these numbers are extrapolated on a per country and global scale, these are definitely in the same ballpark as the Tor users increase.” Read 3 remaining paragraphs | Comments        

Originally posted here:
Sudden spike of Tor users likely caused by one “massive” botnet

Lenovo’s new Yoga 2 Pro has the same flexible hinge, 3200×1800 display

The new Yoga 2 Pro is a high-res follow-up to one of the better convertible laptop designs on the market. Lenovo The original IdeaPad Yoga  was one of our favorite early convertible laptops, not least because the “convertible” part didn’t ruin the “laptop” part. Its many contortions were also genuinely useful, even if the weight and exposed keyboard made it a bit too awkward to use as a dedicated tablet. We got a belated 11-inch version of the original Yoga a bit earlier this year, but today at IFA, Lenovo has formally announced a pair of true sequels that look to improve the design without radically altering its formula. From the folding hinge to the bright “clementine orange” color, the Yoga 2 Pro is very much a successor to the first Yoga. It loses some weight and some thickness, dropping to 0.61 inches thick and 3.06 pounds from the 0.68 inches and 3.4 pounds of the original. It also includes Intel’s new Haswell processors (and its new integrated GPUs—there’s no dedicated graphics option available), but the biggest upgrade is the 13.3-inch 3200×1800 touchscreen. At 276 PPI, this is a substantial upgrade over the 1600×900 display of the original, though the (included) Windows 8.1 Pro can have some issues with high-PPI displays . Like the older Yoga, the new one is indistinguishable from a regular laptop most of the time. Lenovo The other specs are a mixed bag—you’ve got 8GB of DDR3L, standard 128, 256, and 512GB SSDs, a backlit keyboard, and Bluetooth 4.0 (all good), but there’s only one USB 3.0 port (the other is USB 2.0) and a frustratingly low-end 2.4GHz-only 802.11n Wi-Fi adapter. We understand laptops that don’t ship with 802.11ac yet, since that’s still a new standard and many people won’t have upgraded to a compatible router just yet. But to ship a high-end laptop without dual-band 802.11n seems like a seriously missed opportunity. The laptop also promises around six hours of battery life, which would have been on the low end of average for an Ivy Bridge Ultrabook but is a bit disappointing for a Haswell model. Read 3 remaining paragraphs | Comments        

Read the original:
Lenovo’s new Yoga 2 Pro has the same flexible hinge, 3200×1800 display

Feds plow $10 billion into “groundbreaking” crypto-cracking program

Wikimedia The federal government is pouring almost $11 billion per year into a 35, 000-employee program dedicated to “groundbreaking” methods to decode encrypted messages such as e-mails, according to an intelligence black budget published by The Washington Post. The 17-page document, leaked to the paper by former National Security Agency (NSA) contractor Edward Snowden, gives an unprecedented breakdown of the massive amount of tax-payer dollars—which reached $52 billion in fiscal 2013—that the government pours into surveillance and other intelligence-gathering programs. It also details the changing priorities of the government’s most elite spy agencies. Not surprisingly, in a world that’s increasingly driven by networks and electronics, they are spending less on the collection of some hard-copy media and satellite operations while increasing resources for sophisticated signals intelligence, a field of electronic spying feds frequently refer to as “SIGINT.” “We are bolstering our support for clandestine SIGINT capabilities to collect against high priority targets, including foreign leadership targets, ” James Clapper, director of national intelligence, wrote in a summary published by the WaPo . “Also, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic.” Read 3 remaining paragraphs | Comments        

Read More:
Feds plow $10 billion into “groundbreaking” crypto-cracking program

In historic vote, New Zealand bans software patents

A major new patent bill, passed in a 117-4 vote by New Zealand’s Parliament after five years of debate, has banned software patents. The relevant clause of the patent  bill actually states that a computer program is “not an invention.” Some have suggested that was a way to get around the wording of the TRIPS intellectual property treaty which requires patents to be “available for any inventions, whether products or processes, in all fields of technology.” Processes will still be patentable if the computer program is merely a way of implementing a patentable process. But patent claims that cover computer programs “as such” will not be allowed. Read 5 remaining paragraphs | Comments        

See the original post:
In historic vote, New Zealand bans software patents