Warner Bros Issues Takedown For Own Website

An anonymous reader writes: In a case of sloppy automation run amok, Warner Bros’ copyright enforcement contractor — Vobile — issued takedown notices for legitimate distributors and Warner Bros’ own website, according to the BBC. It also asked the search giant to remove links to legitimate movie streaming websites run by Amazon and Sky, as well as Amazon-owned film database IMDB. Fortunately for them, Google chose to cut them a break and ignore those requests. Read more of this story at Slashdot.

Continued here:
Warner Bros Issues Takedown For Own Website

Brazzers Porn Site’s Forum Hacked, Exposes Data Of 800,000 Users

Forum of porn website Brazzers has been hacked, exposing the data of as many as 800, 000 users, reports Motherboard. Though the data originated from the company’s separate forum, the report adds, Brazzers users who never signed up to the forum may also find their details included in the dump. From the report: Motherboard was provided the dataset by breach monitoring site Vigilante.pw for verification purposes. The data contains 790, 724 unique email addresses, and also includes usernames and plaintext passwords. (The set has 928, 072 entries in all, but many are duplicates.) Troy Hunt, a security researcher and creator of the website Have I Been Pwned? helped verify the dataset by contacting subscribers to his site, who confirmed a number of their details from the data. Read more of this story at Slashdot.

Read more here:
Brazzers Porn Site’s Forum Hacked, Exposes Data Of 800,000 Users

New Carbon Nanotube Chip Outperforms Silicon Semiconductors

“Researchers at the University of Wisconsin-Madison are the first to have fabricated carbon nanotube transistors (CNTs) that outperform the current-density of conventional semiconductors like silicon and gallium arsenide, ” reports NanotechWeb. Slashdot reader wasteoid shares the site’s interview with one of the researchers: “When the transistors are turned on to the conductive state (meaning that current is able to pass through the CNT channel) the amount of current traveling through each CNT in the array approaches the fundamental quantum limit, ” he tells nanotechweb.org. “Since the CNTs conduct in parallel, and the packing density and conductance per tube are very high, the overall current density is very high too — at nearly twice that of silicon’s. The result is that these CNT array FETs have a conductance that is seven times higher than any previous reported CNT array field-effect transistor.” The research was funded in part by the U.S. Army and Air Force, as well as the National Science Foundation. “The implication here is that by replacing silicon with a CNT channel, it should be possible for us to make either a higher performing device or one that works at lower power.” In other news, Fujitsu announced this week that it’s joining an effort to release a 256-megabyte 55-nanometer carbon nanotube-based NRAM by 2018. Read more of this story at Slashdot.

Read More:
New Carbon Nanotube Chip Outperforms Silicon Semiconductors

Fancy Burning Man Camp Ransacked by Vandals

The White Ocean camp at Burning Man says that it’s made up of “dreamers that blur the lines between reality and the impossible.” Unfortunately for White Ocean, however, “reality” recently meant getting its shit fucked up by a bunch of vandals. Read more…

Read More:
Fancy Burning Man Camp Ransacked by Vandals

Police Seize Two ‘Perfect Privacy’ VPN Servers

An anonymous reader writes from a report via TorrentFreak: VPN provider Perfect Privacy has informed its customers that two of its servers had been seized by the police in Rotterdam, Netherlands. Torrent Freak reports: “The authorities went directly to the hosting company I3D and the VPN provider itself wasn’t contacted by law enforcement. ‘Currently we have no further information since the responsible law enforcement agency did not get in touch with us directly, we were merely informed by our hoster, ‘ Perfect Privacy says. Despite losing control over two servers, Perfect Privacy assures its customers that no personally identifiable data is present on the seized hardware. Like many other VPNs, the company maintains a strict no-logging policy. ‘Since we are not logging any data there is currently no reason to believe that any user data was compromised, ‘ the VPN provider says. ‘When the Dutch police contact us with a subpoena, we work with them in a professional manner and ensure their request and our responses are in compliance with the Dutch law, ‘ I3D informs us. ‘We think with the affected customer as well, for example by making temporary capacity available so the customer does not suffer extended downtime during the investigation.'” Read more of this story at Slashdot.

Follow this link:
Police Seize Two ‘Perfect Privacy’ VPN Servers

400,000 GitHub Repositories, 1 Billion Files, 14TB of Code: Spaces or Tabs?

Here’s a debate that refuses to die: given a choice, would you rather use spaces or tabs? An episode of Silicon Valley last season had a bit on this. Now we have more data to analyze people’s behavior. A Google developer has looked into 400, 000 GitHub repositories — 1 billion files, 14 terabytes to find that programmers with interest in specific languages do seem to prefer either tabs or spaces. Spoiler alert: space wins, like all the time. Read more of this story at Slashdot.

Continued here:
400,000 GitHub Repositories, 1 Billion Files, 14TB of Code: Spaces or Tabs?

Google Login Bug Allows Credential Theft

Trailrunner7 writes from a report via On the Wire: Attackers can add an arbitrary page to the end of a Google login flow that can steal users’ credentials, or alternatively, send users an arbitrary file any time a login form is submitted, due to a bug in the login process. A researcher in the UK identified the vulnerability recently and notified Google of it, but Google officials said they don’t consider it a security issue. The bug results from the fact that the Google login page will take a specific, weak GET parameter. Using this bug, an attacker could add an extra step to the end of the login flow that could steal a user’s credentials. For example, the page could mimic an incorrect password dialog and ask the user to re-enter the password. [Aidan Woods, the researcher who discovered the bug, ] said an attacker also could send an arbitrary file to the target’s browser any time the login form is submitted. In an email interview, Woods said exploiting the bug is a simple matter. “Attacker would not need to intercept traffic to exploit — they only need to get the user to click a link that they have crafted to exploit the bug in the continue parameter, ” Woods said. Google told Woods they don’t consider this a security issue. Read more of this story at Slashdot.

Continued here:
Google Login Bug Allows Credential Theft

US Appeals Court Dismisses AT&T Data Throttling Lawsuit

An anonymous reader quotes a report from Reuters: A federal appeals court in California on Monday dismissed a U.S. government lawsuit that accused ATT Inc of deception for reducing internet speeds for customers with unlimited mobile data plans once their use exceeded certain levels. The company, however, could still face a fine from the Federal Communications Commission regarding the slowdowns, also called “data throttling.” The U.S. Court of Appeals for the Ninth Circuit said it ordered a lower court to dismiss the data-throttling lawsuit, which was filed in 2014 by the Federal Trade Commission. The FTC sued ATT on the grounds that the No. 2 U.S. wireless carrier failed to inform consumers it would slow the speeds of heavy data users on unlimited plans. In some cases, data speeds were slowed by nearly 90 percent, the lawsuit said. The FTC said the practice was deceptive and, as a result, barred under the Federal Trade Commission Act. ATT argued that there was an exception for common carriers, and the appeals court agreed. Read more of this story at Slashdot.

See more here:
US Appeals Court Dismisses AT&T Data Throttling Lawsuit

Microsoft Lost a City Because They Used Wikipedia Data

“Microsoft can’t tell North from South on Bing Maps, ” joked The Register, reporting that Microsoft’s site had “misplaced Melbourne, the four-million-inhabitant capital of the Australian State of Victoria.” Long-time Slashdot reader RockDoctor writes: Though they’re trying to minimise it, the recent relocation of Melbourne Australia to the ocean east of Japan in Microsoft’s flagship mapping application is blamed on someone having flipped a sign in the latitude given for the city’s Wikipedia page. Which may or may not be true. But the simple stupidity of using a globally-editable data source for feeding a mapping and navigation system is … “awesome” is (for once) an appropriate word. Well, it’s Bing, so at least no-one was actually using it. “Bing’s not alone in finding Australia hard to navigate, ” reports The Register. “In 2012 police warned not to use Apple Maps as it directed those seeking the rural Victorian town of Mildura into the middle of a desert.” Read more of this story at Slashdot.

See the original post:
Microsoft Lost a City Because They Used Wikipedia Data

New Ransomware Poses As A Windows Update

Slashdot reader MojoKid quotes an article from Hot Hardware: A security researcher for AVG has discovered a new piece of ransomware called Fantom that masquerades as a critical Windows update. Victims who fall for the ruse will see a Windows screen acting like it’s installing the update, but what’s really happening is that the user’s documents and files are being encrypted in the background… The scam starts with a pop-up labeled as a critical update from Microsoft. Once a user decides to apply the fake update, it extracts files and executes an embedded program called WindowsUpdate.exe… As with other EDA2 ransomware, Fantom generates a random AES-128 key, encrypts it using RSA, and then uploads it to the culprit. From there, Fantom targets specific file extensions and encrypts those files using AES-128 encryption… Users affected by this are instructed to email the culprit for payment instructions. While the ransomware is busy encrypting your files, it displays Microsoft’s standard warning about not turning off the computer while the “update” is in progress. Pressing Ctrl+F4 closes that window, according to the article, “but that doesn’t stop the ransomware from encrypting files in the background.” Read more of this story at Slashdot.

Read More:
New Ransomware Poses As A Windows Update