Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

An anonymous reader writes: SafeBrowse, a Chrome extension with more than 140, 000 users, contains an embedded JavaScript library in the extension’s code that mines for the Monero cryptocurrency using users’ computers and without getting their consent. The additional code drives CPU usage through the roof, making users’ computers sluggish and hard to use. Looking at the SafeBrowse extension’s source code, anyone can easily spot the embedded Coinhive JavaScript Miner, an in-browser implementation of the CryptoNight mining algorithm used by CryptoNote-based currencies, such as Monero, Dashcoin, DarkNetCoin, and others. This is the same technology that The Pirate Bay experimented with as an alternative to showing ads on its site. The extension’s author claims he was “hacked” and the code added without his knowledge. Read more of this story at Slashdot.

View original post here:
Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

This Guy Is Digitizing the VHS History of Video Games

An anonymous reader shares a report: UK-based gaming journalist and blogger Chris Scullion is on a mission to preserve his collection — and maybe your collection, too — of these old video game VHS tapes. In the 80s and 90s, video game companies and trade magazines made these tapes to accompany popular titles or new issues with bonus material or promotional footage, giving a glimpse into how marketing for games was done in the industry’s early days. Scullion has 18 tapes to upload so far, and plans to provide accompanying commentary as well as the raw video as they go up on his YouTube channel. Scullion’s first upload is a promotional tape for Super Mario All-Stars, given away by Nintendo UK in 1993. It’s hosted by Craig Charles, who played Lister in the British sci-fi sitcom Red Dwarf. Digitizing his collection keeps that sweet nostalgia content safe from degradation of the magnetic tape, which starts to go downhill within 10 to 25 years. He’s capturing them in HD using a 1080p upscaler, at a full 50fps frame rate by converting to HDMI before grabbing — a higher frame rate than many standard commercial digitizing devices that capture at 30fps — so that no frames are missed. Some of the tapes he’s planning to digitize have already been converted and uploaded to YouTube by other people, he says, but most are either poor quality or captured with less-advanced grabbing devices. Read more of this story at Slashdot.

View article:
This Guy Is Digitizing the VHS History of Video Games

AI Just Made Guessing Your Password a Whole Lot Easier

sciencehabit shares a report from Science Magazine: The Equifax breach is reason for concern, of course, but if a hacker wants to access your online data by simply guessing your password, you’re probably toast in less than an hour. Now, there’s more bad news: Scientists have harnessed the power of artificial intelligence (AI) to create a program that, combined with existing tools, figured more than a quarter of the passwords from a set of more than 43 million LinkedIn profiles. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter. The Stevens team created a GAN it called PassGAN and compared it with two versions of hashCat and one version of John the Ripper. The scientists fed each tool tens of millions of leaked passwords from a gaming site called RockYou, and asked them to generate hundreds of millions of new passwords on their own. Then they counted how many of these new passwords matched a set of leaked passwords from LinkedIn, as a measure of how successful they’d be at cracking them. On its own, PassGAN generated 12% of the passwords in the LinkedIn set, whereas its three competitors generated between 6% and 23%. But the best performance came from combining PassGAN and hashCat. Together, they were able to crack 27% of passwords in the LinkedIn set, the researchers reported this month in a draft paper posted on arXiv. Even failed passwords from PassGAN seemed pretty realistic: saddracula, santazone, coolarse18. Read more of this story at Slashdot.

Read the article:
AI Just Made Guessing Your Password a Whole Lot Easier

Equifax Has Been Sending Consumers To a Fake Phishing Site for Almost Two Weeks

An anonymous reader shares a Gizmodo report (condensed for space): For nearly two weeks, the company’s official Twitter account has been directing users to a fake lookalike website. After announcing the breach, Equifax directed its customers to equifaxsecurity2017.com, a website where they can enroll in identity theft protection services and find updates about how Equifax is handing the “cybersecurity incident.” But the decision to create “equifaxsecurity2017” in the first place was monumentally stupid. The URL is long and it doesn’t look very official — that means it’s going to be very easy to emulate. To illustrate how idiotic Equifax’s decision was, developer Nick Sweeting created a fake website of his own: securityequifax2017.com. (He simply switched the words “security” and “equifax” around.) As if to demonstrate Sweeting’s point, Equifax appears to have been itself duped by the fake URL. The company has directed users to Sweeting’s fake site sporadically over the past two weeks. Gizmodo found eight tweets containing the fake URL dating back to September 9th. Read more of this story at Slashdot.

Continue Reading:
Equifax Has Been Sending Consumers To a Fake Phishing Site for Almost Two Weeks

Python’s Official Repository Included 10 ‘Malicious’ Typo-Squatting Modules

An anonymous reader quotes BleepingComputer: The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI — Python Package Index — the official third-party software repository for the Python programming language. NBU experts say attackers used a technique known as typosquatting to upload Python libraries with names similar to legitimate packages — e.g.: “urlib” instead of “urllib.” The PyPI repository does not perform any types of security checks or audits when developers upload new libraries to its index, so attackers had no difficulty in uploading the modules online. Developers who mistyped the package name loaded the malicious libraries in their software’s setup scripts. “These packages contain the exact same code as their upstream package thus their functionality is the same, but the installation script, setup.py, is modified to include a malicious (but relatively benign) code, ” NBU explained. Experts say the malicious code only collected information on infected hosts, such as name and version of the fake package, the username of the user who installed the package, and the user’s computer hostname. Collected data, which looked like “Y:urllib-1.21.1 admin testmachine”, was uploaded to a Chinese IP address. NBU officials contacted PyPI administrators last week who removed the packages before officials published a security advisory on Saturday.” The advisory lays some of the blame on Python’s ‘pip’ tool, which executes arbitrary code during installations without requiring a cryptographic signature. Ars Technica also reports that another team of researchers “was able to seed PyPI with more than 20 libraries that are part of the Python standard library, ” and that group now reports they’ve already received more than 7, 400 pingbacks. Read more of this story at Slashdot.

Read More:
Python’s Official Repository Included 10 ‘Malicious’ Typo-Squatting Modules

Equifax CEO Hired a Music Major as the Company’s Chief Security Officer

Susan Mauldin, the person in charge of the Equifax’s data security, has a bachelor’s degree and a master of fine arts degree in music composition from the University of Georgia, according to her LinkedIn profile. Mauldin’s LinkedIn profile lists no education related to technology or security. If that wasn’t enough, news outlet MarketWatch reported on Friday that Susan Mauldin’s LinkedIn page was made private and her last name was replaced with “M”, in a move that appears to keep her education background secret. Earlier this month Equifax, which is one of the three major consumer credit reporting agencies, said that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers. On Friday, the UK arm of the organisation said files containing information on “fewer than 400, 000” UK consumers was accessed in the breach. Read more of this story at Slashdot.

View the original here:
Equifax CEO Hired a Music Major as the Company’s Chief Security Officer

Mystery of Sonic Weapon Attacks At US Embassy In Cuba Deepens

An anonymous reader quotes a report from The Guardian: The blaring, grinding noise jolted the American diplomat from his bed in a Havana hotel. He moved just a few feet, and there was silence. He climbed back into bed. Inexplicably, the agonizing sound hit him again. It was as if he’d walked through some invisible wall cutting straight through his room. Soon came the hearing loss, and the speech problems, symptoms both similar and altogether different from others among at least 21 U.S. victims in an astonishing international mystery still unfolding in Cuba. The top U.S. diplomat has called them “health attacks.” New details learned by the Associated Press indicate at least some of the incidents were confined to specific rooms or even parts of rooms with laser-like specificity, baffling U.S. officials who say the facts and the physics don’t add up. Suspicion initially focused on a sonic weapon, and on the Cubans. Yet the diagnosis of mild brain injury, considered unlikely to result from sound, has confounded the FBI, the state department and U.S. intelligence agencies involved in the investigation. Some victims now have problems concentrating or recalling specific words, several officials said, the latest signs of more serious damage than the U.S. government initially realized. The United States first acknowledged the attacks in August — nine months after symptoms were first reported. Read more of this story at Slashdot.

Read the original:
Mystery of Sonic Weapon Attacks At US Embassy In Cuba Deepens

Every Major Advertising Group Is Blasting Apple for Blocking Cookies in the Safari Browser

The biggest advertising organizations say Apple will “sabotage” the current economic model of the internet with plans to integrate cookie-blocking technology into the new version of Safari. Marty Swant, reporting for AdWeek: Six trade groups — the Interactive Advertising Bureau, American Advertising Federation, the Association of National Advertisers, the 4A’s and two others — say they’re “deeply concerned” with Apple’s plans to release a version of the internet browser that overrides and replaces user cookie preferences with a set of Apple-controlled standards. The feature, which is called “Intelligent Tracking Prevention, ” limits how advertisers and websites can track users across the internet by putting in place a 24-hour limit on ad retargeting. In an open letter expected to be published this afternoon, the groups describe the new standards as “opaque and arbitrary, ” warning that the changes could affect the “infrastructure of the modern internet, ” which largely relies on consistent standards across websites. The groups say the feature also hurts user experience by making advertising more “generic and less timely and useful.” Read more of this story at Slashdot.

Read the original:
Every Major Advertising Group Is Blasting Apple for Blocking Cookies in the Safari Browser

Backdoor Found In WordPress Plugin With More Than 200,000 Installations

According to Bleeping Computer, a WordPress plug that goes by the name Display Widgets has been used to install a backdoor on WordPress sites across the internet for the past two and a half months. While the WordPress.org team removed the plugin from the official WordPress Plugins repository, the plugin managed to be installed on more than 200, 000 sites at the time of its removal. The good news is that the backdoor code was only found between Display Widgets version 2.6.1 (released June 30) and version 2.6.3 (released September 2), so it’s unlikely everyone who installed the plugin is affected. WordPress.org staff members reportedly removed the plugin three times before for similar violations. Bleeping Computer has compiled a history of events in its report, put together with data aggregated from three different investigations by David Law, White Fir Design, and Wordfence. The report adds: The original Display Widgets is a plugin that allowed WordPress site owners to control which, how, and when WordPress widgets appear on their sites. Stephanie Wells of Strategy11 developed the plugin, but after switching her focus to a premium version of the plugin, she decided to sell the open source version to a new developer who would have had the time to cater to its userbase. A month after buying the plugin in May, its new owner released a first new version — v2.6.0 — on June 21. Read more of this story at Slashdot.

See the original post:
Backdoor Found In WordPress Plugin With More Than 200,000 Installations

Chatbot Lets You Sue Equifax For Up To $25,000 Without a Lawyer

Shannon Liao reports via The Verge: If you’re one of the millions affected by the Equifax breach, a chatbot can now help you sue Equifax in small claims court, potentially letting you avoid hiring a lawyer for advice. Even if you want to be part of the class action lawsuit against Equifax, you can still sue Equifax for negligence in small claims court using the DoNotPay bot and demand maximum damages. Maximum damages range between $2, 500 in states like Rhode Island and Kentucky to $25, 000 in Tennessee. The bot, which launched in all 50 states in July, is mainly known for helping with parking tickets. But with this new update, its creator, Joshua Browder, who was one of the 143 million affected by the breach, is tackling a much bigger target, with larger aspirations to match. He says, “I hope that my product will replace lawyers, and, with enough success, bankrupt Equifax.” Not that the bot helps you do anything you can’t already do yourself, which is filling out a bunch of forms — you still have to serve them yourself. Unfortunately, the chatbot can’t show up in court a few weeks later to argue your case for you either. To add to the headache, small claims court rules differ from state to state. For instance, in California, a person needs to demand payment from Equifax or explain why they haven’t demanded payment before filing the form. Read more of this story at Slashdot.

Read the original:
Chatbot Lets You Sue Equifax For Up To $25,000 Without a Lawyer