Verizon technician sold calling, location data for thousands of dollars

Enlarge (credit: Bloomberg via Getty Images) An Alabama man who worked as a Verizon Wireless technician has agreed to plead guilty to a federal hacking charge in connection to his illegal use of the company’s computers to acquire customer calling and location data. The man, Daniel Eugene Traeger, faces a maximum five years in prison next month. He admitted Thursday that he sold customer data—from 2009 to 2014—to a private investigator whom the authorities have not named. According to the man’s signed plea deal  (PDF): At some point in 2009, the Defendant met a private investigator (“the PI”) who wanted to buy Verizon customer information from the Defendant. The Defendant accepted the PI’s offer. The defendant used Verizon computer systems and facilities to access customer call records and customer location data that he knew he was not authorized to access, and provided that information to the PI even though the Defendant knew that he was not authorized to provide it to a third party. The Defendant accessed customer call records by logging into Verizon’s MARS system. The Defendant then compiled the data in spreadsheets, which the Defendant provided to the PI, including by e-mail. The Defendant accessed customer location data using a Verizon system called Real Time Tool. Using RTT, the Defendant “pinged” cellular telephones on Verizon’s network and provided location data for those telephones to the PI. The plea agreement said that Traeger began making $50 monthly in 2009, when he sold two records a month. By mid-2013, he was earning $750 each month by selling 10 to 15 records. In all, the plea deal says he made more than $10,000 over a five-year period. Read 2 remaining paragraphs | Comments

View the original here:
Verizon technician sold calling, location data for thousands of dollars

Hubble finds additional evidence of water vapor plumes on Europa

Enlarge / Scenario for getting water to Europa’s surface. Artist’s conception of ridges and fractures on Europa. (credit: Caltech/NASA) In the seminal science fiction series Space Odyssey , novelist Arthur C. Clarke called attention to the Jovian moon Europa’s special place in the Solar System. At the end of the series’ second novel, 2010: Odyssey Two , a spaceship sent to the Jupiter system receives a message from aliens: “All these worlds are yours except Europa. Attempt no landing there.” In data released publicly Monday NASA didn’t get quite such a declarative message from the intriguing moon, but the new information is nonetheless thrilling. Astronomers using NASA’s Hubble Space Telescope have imaged what are likely water vapor plumes erupting off the surface of Jupiter’s moon Europa. If the plumes do, in fact, emerge and rain down on the surface, it will be significantly easier for scientists to study the moon’s interior ocean. “E uropa is a world of great interest,”  Paul Hertz, director of the Astrophysics Division at NASA Headquarters in Washington, said during a news conference Monday. Monday’s news is significant because it comes as NASA is taking formative steps toward launching a pair missions to Europa in the 2020s—an orbiter to scout the moon, and a lander that will follow a couple of years later. The same engineers at the Jet Propulsion Laboratory in California who masterminded Curiosity’s landing on Mars have turned their attention toward how best to land a probe on Europa’s icy surface. And it is no easy feat. The moon creaks as Jupiter’s gravitation bulk rends its frozen surface in deep crevasses, pushing and pulling the ice upward and downward by tens of meters every few days. And with only a very tenuous atmosphere, it is cold: -210 degrees Celsius. The radiation from nearby Jupiter would kill a human in a matter of hours or days. Read 7 remaining paragraphs | Comments

See more here:
Hubble finds additional evidence of water vapor plumes on Europa

NASA changed all the astrological signs and I’m a crab now

Enlarge / The new sign, “Ophiuchus,” means “Snake Bearer.” And who’s got two thumbs and loves snakes? THIS GUY RIGHT HERE. (credit: Wikimedia Commons ) According to a post on NASASpacePlace , everything we thought we knew about the influence the heavens have over our Earthly lives has been thrown into chaos. NASA has announced that the celestial sphere above us contains not twelve canonical zodiacal constellations, but 13. The heretofore overlooked constellation, Ophiuchus, is purported to guide and command events surrounding humans born between November 29 and December 17—so, if you used to be a Sagittarius, then congratulations: you’ve got a new sign, baby! The addition of Ophiuchus—the snake bearer , in case you were wondering—has obvious and far-reaching implications for the entire western Babylonian-derived zodiac calendar. For one thing, squeezing it in means changing the effective dates of all the other signs. According to Yahoo News , the new 13-sign calendar plays out like this: Capricorn:  January 20-February 16 Aquarius:  February 16-March 11 Pisces:  March 11-April 18 Aries:  April 18-May 13 Taurus:  May 13-June 21 Gemini:  June 21-July 20 Cancer:  July 20-August 10 Leo:  August 10-September 16 Virgo:  September 16-October 30 Libra:  October 30-November 23 Scorpio:  November 23-November 29 Ophiuchus:  November 29-December 17 Sagittarius:  December 17-January 20 The changes are as sweeping as they are staggering. For example, I woke up this morning firmly believing that I was an outgoing, courageous, independent, generous Leo. However, now I have to come to grips with the fact that I am in fact a stupid, sulky, inconsiderate, pessimistic Cancer. I have gone from lion to crab, and it weighs heavily upon me. Read 20 remaining paragraphs | Comments

View article:
NASA changed all the astrological signs and I’m a crab now

After 23 years, the Apple II gets another OS update

Hello, old friend Yesterday, software developer John Brooks released what is clearly a work of pure love: the first update to an operating system for the Apple II computer family since 1993. ProDOS 2.4, released on the 30 th anniversary of the introduction of the Apple II GS, brings the enhanced operating system to even older Apple II systems, including the original Apple ][ and ][+. Which is pretty remarkable, considering the Apple ][ and ][+ don’t even support lower-case characters. You can test-drive ProDOS 2.4 in a Web-based emulator set up by computer historian Jason Scott on the Internet Archive. The release includes Bitsy Bye, a menu-driven program launcher that allows for navigation through files on multiple floppy (or hacked USB) drives. Bitsy Bye is an example of highly efficient code: it runs in less than 1 kilobyte of RAM. There’s also a boot utility that is under 400 bytes—taking up a single block of storage on a disk. Read 2 remaining paragraphs | Comments

More:
After 23 years, the Apple II gets another OS update

5,300 Wells Fargo employees fired after 2 million fake accounts discovered

(credit: Mike Mozart ) Since at least 2011, Wells Fargo employees have been creating fake accounts using customers’ identities to boost their sales numbers, federal regulators said on Thursday. The Consumer Financial Protection Bureau (CFPB) fined the bank $100 million after a third-party consulting firm found that 2 million fake deposit and credit card accounts had been made without the consent of the person whose name was on the account. According to CNN Money, the bank fired 5,300 employees for taking part in the scheme, which constitutes about 1 percent of the bank’s payroll. In order to boost their sales numbers, employees opened 1.5 million deposit accounts and 565,000 credit card accounts on customers’ behalf but without authorization from those customers. “Employees then transferred funds from consumers’ authorized accounts to temporarily fund the new, unauthorized accounts,” the CFPB wrote. “This widespread practice gave the employees credit for opening the new accounts, allowing them to earn additional compensation and to meet the bank’s sales goals.” Read 7 remaining paragraphs | Comments

Read More:
5,300 Wells Fargo employees fired after 2 million fake accounts discovered

Supreme Court blocks Senate Backpage sex ad subpoena

US Supreme Court building. (credit: MitchellShapiroPhotography ) The US Supreme Court is giving Backpage.com a victory over the US Senate, at least in the short term. Chief Justice John Roberts says the online classified ad portal, at least for now, does not have to comply with a Senate subpoena investigating how Backpage conducts its business. The investigation demands documents about the ins and outs of the site’s editorial practices. The Permanent Subcommittee on Investigations contends that the site is littered with ads that amount to offering sex services by women and children forced into prostitution, and it wants to know how it screens ads posted to its site by third parties. The chief justice’s decision Tuesday comes days after a federal appeals court upheld a ruling by a lower court judge and said  (PDF) Backpage must comply with the subpoena. The Senate and Backpage have been deadlocked in a legal battle for more than a year. Backpage said the First Amendment shields it from having to comply with the subpoena , (PDF) while the Senate maintains that the First Amendment implications are secondary  (PDF) to cutting down on sex trafficking ads on the site. Read 4 remaining paragraphs | Comments

Read More:
Supreme Court blocks Senate Backpage sex ad subpoena

Android 7.0 Nougat review—Do more on your gigantic smartphone

The unveiling of the Nougat statue. After a lengthy Developer Preview program starting in March, the final version of Android 7.0 (codenamed “Nougat”) is finally launching today. The OS update will slowly begin to rollout to devices over the next few weeks. This year, Google is adding even more form factors to the world’s most popular operating system. After tackling watches, phones, tablets, TVs, and cars, Nougat brings platform improvements aimed at virtual reality headsets and—with some help from Chrome OS—also targets laptops and desktops. For Android’s primary platform (still phones and tablets), there’s a myriad of improvements. Nougat brings a new multitasking split screen mode, a redesigned notification panel, an adjustable UI scale, and fresh emoji. Nougat also sports numerous under-the-hood improvements, like changes to the Android Runtime, updates to the battery saving “Doze” mode, and developer goodies like Vulkan and Java 8 support. As usual, we’ll be covering Google’s Android package as a whole without worrying about what technically counts as part of the “OS” versus an app in the Play Store. Android is a platform not just for third-parties, but for Google as well, so we’re diving into everything that typically ships on a new Android smartphone. Read 154 remaining paragraphs | Comments

Read this article:
Android 7.0 Nougat review—Do more on your gigantic smartphone

Group claims to hack NSA-tied hackers, posts exploits as proof

(credit: Shadow Brokers ) In what security experts say is either a one-of-a-kind breach or an elaborate hoax, an anonymous group has published what it claims are sophisticated software tools belonging to an elite team of hackers tied to the US National Security Agency. In a recently published blog post, the group calling itself Shadow Brokers claims the leaked set of exploits were obtained after members hacked Equation Group (the post has since been removed from Tumblr). Last year, Kaspersky Lab researchers described Equation Group as one of the world’s most advanced hacking groups , with ties to both the Stuxnet and Flame espionage malware platforms. The compressed data accompanying the Shadow Broker post is slightly bigger than 256 megabytes and purports to contain a series of hacking tools dating back to 2010. While it wasn’t immediately possible for outsiders to prove the posted data—mostly batch scripts and poorly coded python scripts—belonged to Equation Group, there was little doubt the data have origins with some advanced hacking group. Not fully fake “These files are not fully fake for sure,” Bencsáth Boldizsár, a researcher with Hungary-based CrySyS who is widely credited with discovering Flame, told Ars in an e-mail. “Most likely they are part of the NSA toolset, judging just by the volume and peeps into the samples. At first glance it is sound that these are important attack related files, and yes, the first guess would be Equation Group.” Read 6 remaining paragraphs | Comments

Read More:
Group claims to hack NSA-tied hackers, posts exploits as proof

20 hotels suffer hack costing tens of thousands their credit card information

(credit: HEI Hotels & Resorts) The chain that owns Starwood, Marriott, Hyatt, and Intercontinental hotels—HEI Hotels & Resorts— said this weekend that the payment systems for 20 of its locations had been infected with malware that may have been able to steal tens of thousands of credit card numbers and corresponding customer names, expiration dates, and verification codes. HEI claims that it did not lose control of any customer PINs, as they are not collected by the company’s systems. Still, HEI noted on its website that it doesn’t store credit card details either. “We believe that the malware may have accessed payment card information in real-time as it was being inputted into our systems,” the company said. The breach appears to have hit 20 HEI Hotels, and in most cases, the malware appears to have been active from December 2, 2015 to June 21, 2016. In a few cases, hotels may have been affected as early as March 1, 2015. According to a statement on HEI’s website, the malware affected point-of-sale (POS) terminals at the affected properties, but online booking and other online transactions were not affected. Read 4 remaining paragraphs | Comments

Read More:
20 hotels suffer hack costing tens of thousands their credit card information