Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

An anonymous reader writes: Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor. The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn’t do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner. “This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system, ” said Tiberius Axinte, Technical Leader, Bitdefender Antimalware Lab. “For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless.” The malware, dubbed Backdoor.MAC.Eleanor, sets up a hidden Tor service and PHP-capable web server on the infected computer, generating a .onion domain that the attacker can use to connect to the Mac and control it. Once installed, the malware grants full access to the file system and can run scripts given to it by its masters.A report on AppleInsider says that malware can also control the FaceTime camera on a victim’s computer. But thankfully, Apple’s Gatekeeper security prevents the unsigned app from being installed. Read more of this story at Slashdot.

See the article here:
EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

TP-LINK Loses Control of Two Device Configuration Domains

Reader Orome1 writes: Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and that this fact could be misused by malware peddlers. TP-LINK has confirmed that they no longer own the domain in question, and will not be trying to buy it from the unknown seller for now. Instead, they intend to change the domain in the manuals to a newer one that’s already in use.ComputerWorld has more details. Read more of this story at Slashdot.

See the original article here:
TP-LINK Loses Control of Two Device Configuration Domains

American Cities Are Installing DHS-Funded Audio Surveillance

“Audio surveillance is increasingly being used on parts of urban mass transit systems, ” reports the Christian Science Monitor. Slashdot reader itwbennett writes “It was first reported in April that New Jersey had been using audio surveillance on some of its light rail lines, raising questions of privacy. This week, New Jersey Transit ended the program following revelations that the agency ‘didn’t have policies governing storage and who had access to data.'” From the article: New Jersey isn’t the only state where you now have even more reason to want to ride in the quiet car. The Baltimore Sun reported in March that the Maryland Transit Administration has used audio recording on some of its mass transit vehicles since 2012. It is now used on 65 percent of buses, and 82 percent of subway trains have audio recording capability, but don’t use it yet, according to the Sun. And cities in New Hampshire, Connecticut, Michigan, Ohio, Nevada, Oregon and California have either installed systems or moved to procure them, in many cases with funding from the federal Department of Homeland Security. Read more of this story at Slashdot.

See original article:
American Cities Are Installing DHS-Funded Audio Surveillance

Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps

Slashdot reader Type44Q writes: The Linux Mint team announced the immediate availability of their latest release, Mint 18 “Sarah, ” in Cinnamon and MATE flavors. These follow on the heels of their respective beta versions, which have been out for nearly a month. “Linux Mint 18 is a long-term support release which will be supported until 2021, ” the team announces on MATE’s “new features” page, adding they’ve improved their update manager, included support for the Debian syntax of “apt”, and are working on the “X-Apps” project to “produce generic applications for traditional GTK desktop environments…to replace applications which no longer integrate properly outside of a particular environment.” Read more of this story at Slashdot.

Visit site:
Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps

Top 10 Places to Download or Stream Movies For Free, Legally

It’s easy to find movies to download or stream, but if you’re flying straight and narrow or want to support and watch films that are free, public domain, or whose creators want them free and openly shared, here are some great sites to bookmark—and visit when you want something new to watch. Read more…

Taken from:
Top 10 Places to Download or Stream Movies For Free, Legally

Women Interviewing For Tech Jobs Actually Did Worse When Their Voices Were Masked As Men’s

Kristen V. Brown, reporting for Fusion:It is well-trod territory at this point that biases against women’s technological abilities hold women in technology back. Study after study has shown bias persists at every point of the employment process. So the start-up interviewing.io decided to try and do something about it. It masked women’s voices to sound like men’s and vice versa during online interviews to see if interviewers would like them better. It was inspired to do the experiment because it was seeing some alarming data. Interviewing.io is a platform that allows people to practice technical interviewing anonymously and, hopefully, get a job in the process. After amassing data from thousands of technical interviews, the company noticed a troubling trend, writes founder Aline Lerner in a blog post: “Men were getting advanced to the next round 1.4 times more often than women. Interviewee technical score wasn’t faring that well either — men on the platform had an average technical score of 3 out of 4, as compared to a 2.5 out of 4 for women.” Read more of this story at Slashdot.

More:
Women Interviewing For Tech Jobs Actually Did Worse When Their Voices Were Masked As Men’s

DMCA Notices Remove 8,268 Projects On Github In 2015

An anonymous reader writes: Github’s transparency report for 2015 shows that the site received many DMCA notices that removed more than 8, 200 projects. “In 2015, we received significantly more takedown notices, and took down significantly more content, than we did in 2014, ” Github reports. For comparison, the company received only 258 DMCA notices in 2014, 17 of which responded with a counter-notice or retraction. In 2015, they received 505 takedown notices, 62 of which were the subject of counters or withdrawals. TorrentFreak reports: “Copyright holders are not limited to reporting one URL or location per DMCA notice. In fact, each notice filed can target tens, hundreds, or even thousands of allegedly infringing locations.” September was a particularly active month as it took down nearly 5, 834 projects. “Usually, the DMCA reports we receive are from people or organizations reporting a single potentially infringing repository. However, every now and then we receive a single notice asking us to take down many repositories, ” Github explains. They are called ‘Mass Removals’ when more than 100 repositories are asked to be removed. “In all, fewer than twenty individual notice senders requested removal of over 90% of the content GitHub took down in 2015.” Read more of this story at Slashdot.

View the original here:
DMCA Notices Remove 8,268 Projects On Github In 2015

Researchers Find Game-Changing Helium Reserve In Tanzania

An anonymous reader writes from a report via CNN: Helium is an incredibly important element that is used in everything from party balloons to MRI machines — it’s even used for nuclear power. For many years, there have been global shortages of the element. For example, Tokyo Disneyland once had to suspend sales of its helium balloons due to the shortages. The shortages are expected to come to an end now that researchers from Oxford and Durham universities have discovered a “world-class” helium gas field in Tanzania’s East African Rift Valley. They estimate that just one part of the reserve in Tanzania could be as large as 54 billion cubic feet (BCf), which is enough to fill more than 1.2 million medical MRI scanners. “To put this discovery into perspective, global consumption of helium is about 8 billion cubic feet (BCf) per year and the United States Federal Helium Reserve, which is the world’s largest supplier, has a current reserve of just 24.2 BCf, ” said University of Oxford’s Chris Ballentine, a professor with the Department of Earth Sciences. “Total known reserves in the USA are around 153 BCf. This is a game-changer for the future security of society’s helium needs and similar finds in the future may not be far away, ” Ballentine added. Read more of this story at Slashdot.

Continue reading here:
Researchers Find Game-Changing Helium Reserve In Tanzania