Judge Says IP Address Doesn’t Prove Anything in Piracy Case

What do you do if you get busted for pirating a terrible Adam Sandler movie? Deny it. That seems to be the lesson of a recently dismissed federal case, which raises the burden of proof that copyright owner must meet in order to hold you accountable for infringement. Read more…

Excerpt from:
Judge Says IP Address Doesn’t Prove Anything in Piracy Case

Austin Is Conducting Sting Operations Against Ride-Sharing Drivers

Since the Uber and Lyft ride-sharing apps stopped service in Austin, drunk driving has increased, riders are hunting for alternatives, and the police are conducting undercover sting operations against unauthorized ride-sharing drivers. With Chicago also considering new restrictions on ride-sharing apps, Slashdot reader MarkWhittington shares this report from Austin: With thousands of drivers and tens of thousands of riders who once depended on ride-sharing services in a lurch, a group called Arcade City has tried to fill the void with a person-to-person site to link up drivers and riders who then negotiate a fare. Of course, according to a story on KVUE, the Austin city government, and the police are on the case. The Austin Police Department has diverted detectives and resources to conduct sting operations on ride-sharing drivers who attempt to operate without official sanction. Undercover operatives will arrange for a ride with an Arcade City driver and then bust them, impounding their vehicle and imposing a fine. “The first Friday and Saturday after Uber was gone, we were joking that it was like the zombie apocalypse of drunk people, ” one former ride-sharing driver told Vocative.com. Earlier this month the site compared this year’s drunk driving arrests to last years — and discovered that in the three weeks since Uber and Lyft left Austin, 7.5% more people have been arrested for drunk driving. Read more of this story at Slashdot.

Read More:
Austin Is Conducting Sting Operations Against Ride-Sharing Drivers

One Million IP Addresses Used In Brute-Force Attack On A Bank

Cisco says in just one week in February they detected 1, 127, 818 different IP addresses being used to launch 744, 361, 093 login attempts on 220, 758, 340 different email addresses — and that 93% of those attacks were directed at two financial institutions in a massive Account Takeover (ATO) campaign. An anonymous reader writes: Crooks used 993, 547 distinct IPs to check login credentials for 427, 444, 261 accounts. For most of these attacks, the crooks used proxy servers, but also two botnets, one of compromised Arris cable modems, and one of ZyXel routers/modems. Most of these credentials have been acquired from public breaches or underground hacking forums. This happened before the recent huge data breaches such as MySpace, LinkedIn, Tumblr, and VK.com. It’s apparently similar to the stolen-credentials-from-other-sites attack that was launched against GitHub earlier this week. Read more of this story at Slashdot.

Excerpt from:
One Million IP Addresses Used In Brute-Force Attack On A Bank

How Militarized Cops Are Zapping Rights With Stingray

“Police nationwide are secretly exploiting intrusive technologies with the feds’ complicity, ” argues a new article on Alternet — calling out Stingray, which mimics a cellphone tower to identify every cellphone nearby. “It gathers information not only about a specific suspect, but any bystanders in the area as well… Some Stingrays are capable of collecting not only cell phone ID numbers but also numbers those phones have dialed and even phone conversations.” The ACLU says requests for more information have been meeting heavy resistance from police departments since 2011, with many departments citing nondisclosure agreements with Stingray’s manufacturer and with the FBI, and “often, the police get a judge’s sign-off for surveillance without even bothering to mention that they will be using a Stingray…claiming that they simply can’t violate those FBI nondisclosure agreements. “More often than not, police use Stingrays without bothering to get a warrant, instead seeking a court order on a more permissive legal standard. This is part of the charm of a new technology for the authorities: nothing is settled on how to use it.” Stingray is more than a 1960s TV series with puppets. Several state judges estimate there have been hundreds of instances where police have used the Stingray tool without a warrant or telling a judge. Slashdot reader Presto Vivace writes: This is why it matters who wins the mayor and city council races. Localities do not have to accept this technology. Read more of this story at Slashdot.

View the original here:
How Militarized Cops Are Zapping Rights With Stingray

Hidden FBI Microphones Exposed In California

An anonymous reader writes: “Federal agents are planting microphones to secretly record conversations, ” reports CBS Local, noting that for 10 months starting in 2010, FBI agents hid microphones inside light fixtures, and also at a bus stop outside the Oakland Courthouse, to record conversations without a warrant. “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment, ” a security analyst and former FBI special agent told CBS Local. “I mean, there’s microphones that are planted in places that people don’t think about, because thats the intent!” Federal authorities are currently investigating fraud and bid-rigging charges against a group of real estate investors, and the secret recordings came to light when they were submitted as evidence. “Private communication in a public place qualifies as a protected ‘oral communication’…” says one of the investor’s lawyers, “and therefore may not be intercepted without judicial authorization.” Read more of this story at Slashdot.

Read More:
Hidden FBI Microphones Exposed In California

Hacker Guccifer Claims He Easily and Repeatedly Broke Into Hillary Clinton’s Email Server

An anonymous reader quotes a report from Fox News: The infamous Romanian hacker known as “Guccifer, ” speaking exclusively with Fox News, claimed he easily — and repeatedly — breached former Secretary of State Hillary Clinton’s personal email server in early 2013. In the process of mining data from the Blumenthal account, Lazar said he came across evidence that others were on the Clinton server. “As far as I remember, yes, there were up to 10, like, IPs from other parts of the world, ” he said. From the report: “‘For me, it was easy … easy for me, for everybody, ‘ Marcel Lehel Lazar, who goes by the moniker ‘Guccifer, ‘ told Fox News from a Virginia jail where he is being held. Fox News could not independently confirm Lazar’s claims. The 44-year-old Lazar said he first compromised Clinton confidant Sidney Blumenthal’s AOL account, in March 2013, and used that as a stepping stone to the Clinton server. He said he accessed Clintonâ(TM)s server ‘like twice, ‘ though he described the contents as ‘not interest[ing]’ to him at the time.” Guccifer was sent to prison last month, which is when his potential role in the Clinton email investigation became apparent. Read more of this story at Slashdot.

Continued here:
Hacker Guccifer Claims He Easily and Repeatedly Broke Into Hillary Clinton’s Email Server

Samsung Smart Home Flaws Let Hackers Pick Connected Doors From Anywhere In the World

Researchers have discovered flaws in Samsung’s Smart Home automation system, which if exploited, allows them to carry a range of remote attacks. These attacks include digitally picking connected door locks from anywhere in the world. The flaws have been documented by researchers from the University of Michigan ahead of the 2016 IEEE Symposium on Security and Privacy. “All of the above attacks expose a household to significant harm — break-ins, theft, misinformation, and vandalism, ” the researchers wrote in a paper. “The attack vectors are not specific to a particular device and are broadly applicable.” Dan Goodin, reports for Ars Technica: Other attacks included a malicious app that was able to obtain the PIN code to a smart lock and send it in a text message to attackers, disable a preprogrammed vacation mode setting, and issue a fake fire alarm. The one posing the biggest threat was the remote lock-picking attack, which the researchers referred to as a “backdoor pin code injection attack.” It exploited vulnerabilities in an existing app in the SmartThings app store that gives an attacker sustained and largely surreptitious access to users’ homes. The attack worked by obtaining the OAuth token that the app and SmartThings platform relied on to authenticate legitimate users. The only interaction it required was for targeted users to click on an attacker-supplied HTTPS link that looked much like this one that led to the authentic SmartThings login page. The user would then enter the username and password. A flaw in the app allowed the link to redirect the credentials away from the SmartThings page to an attacker-controlled address. From then on, the attackers had the same remote access over the lock that users had. Read more of this story at Slashdot.

Visit link:
Samsung Smart Home Flaws Let Hackers Pick Connected Doors From Anywhere In the World

Dutch Police Seize Encrypted Communication Network With 19,000 Users

An anonymous reader writes: Dutch police have seized and shut down Ennetcom, an encrypted communications network with 19, 000 users, according to Reuters. The network’s 36-year-old owner, Danny Manupassa, has also been arrested, and faces charges of money laundering and illegal weapons possession, while the information obtained in the seizure may also be used for other criminal prosecutions. “Police and prosecutors believe that they have captured the largest encrypted network used by organized crime in the Netherlands, ” prosecutors said in a statement. “Although using encrypted communications is legal, ” Reuters reports, “many of the network’s users are believed to have been engaged in ‘serious criminal activity, ‘ said spokesman Wim de Bruin of the national prosecutor’s office, which noted that the company’s modified phones have repeatedly turned up in cases involving drugs, criminal motorcycle gangs, and gangland killings. A spokesman for the National Prosecutor’s office “declined to comment on whether and how police would be able to decrypt information kept on the servers.” Read more of this story at Slashdot.

Link:
Dutch Police Seize Encrypted Communication Network With 19,000 Users

FBI Offers $25K Reward For Andy Warhol Campbell’s Soup Painting Heist

coondoggie quotes a report from Networkworld: The FBI today said it was offering a reward of up to $25, 000 for information leading to the recovery of seven Andy Warhol paintings stolen from the Springfield Art Museum in Springfield, Missouri. The collection, which has been owned by the Springfield Art Museum since 1985, is set number 31 of the Campbell’s Soup I collection and is valued at approximately $500, 000. Each painting in the screen print collection measures 37 inches high by 24.5 inches wide and framed in white frames, the FBI stated. The FBI says that seven of 10 Andy Warhol paintings Campbell’s Soup I collection, made in 1968, were taken. Since its inception, the FBI’s Art Crime Team has recovered more than 2, 650 items valued at over $150 million. Read more of this story at Slashdot.

View article:
FBI Offers $25K Reward For Andy Warhol Campbell’s Soup Painting Heist

Experts Crack Petya Ransomware, Enable Hard Drive Decryption For Free

Reader itwbennett writes: Petya appeared on researchers’ radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard drive’s master boot record (MBR), leaving infected computers unable to boot into the operating system. Now, security experts have devised a method that, while not exactly straightforward, allows users to recover data from computers infected with the ransomware without paying money to cyber criminals. Folks over at BleepingComputer have confirmed that the aforementioned technique works. Read more of this story at Slashdot.

Continue Reading:
Experts Crack Petya Ransomware, Enable Hard Drive Decryption For Free