North Korea attempts to purge online memory of executed leader

Kim Il Sung (left) is the founder of modern North Korea and the grandfather of current dictator Kim Jong Un. Tormod Sandtorv On Thursday, foreign policy watchers worldwide  were stunned when North Korea announced the execution of Jang Song Taek , a top government official. Jang was the uncle of Kim Jong Un, North Korea’s young dictator, and also served as vice chairman of the National Defense Commission of North Korea . However, beyond the whims of North Korea’s leader, the Hermit Kingdom appears to have now also taken the unusual step of attempting to remove all references to Jang Song Taek from state-controlled Internet outlets, primarily the Korean Central News Agency (KCNA). The KCNA website , which is hosted in Japan, appears to have suffered an outage briefly on Friday , and subsequently, past articles appeared scrubbed of mentions of Jang. Read 3 remaining paragraphs | Comments        

See the original article here:
North Korea attempts to purge online memory of executed leader

British Library sticks 1 million pics on Flickr, asks for help making them useful

In 2008, the British Library, in partnership with Microsoft, embarked on a project to digitize thousands of out-of-copyright books from the 17 th , 18 th , and 19 th centuries. Included within those books were maps, diagrams, illustrations, photographs, and more. The Library has uploaded more than a million of them onto Flickr and released them into the public domain. It’s now asking for help. Though the library knows which book each image is taken from, its knowledge largely ends there. While some images have useful titles, many do not, so the majority of the million picture collection is uncatalogued, its subject matter unknown. Next year, it plans to launch a crowdsourced application to fill the gap, to enable humans to describe the images. This information will then be used to train an automated classifier that will be run against the entire corpus. Read 1 remaining paragraphs | Comments        

See more here:
British Library sticks 1 million pics on Flickr, asks for help making them useful

Everything you need to know to install SteamOS on your very own computer

SteamOS in all its blue glory. Lee Hutchinson True to its word, Valve has released a beta version of SteamOS, the Linux-based operating system that it will use to power its living room Steam Machine consoles. The release coincides with a lucky group of 300 public beta testers being selected to actually receive Steam Machines to test on—the rest of us can still use the OS, but we’ll have to bring our own hardware. Valve had previously recommended that users who aren’t “intrepid Linux hackers” should wait a few more months before trying out SteamOS, but that’s not going to stop Ars from barreling head first into the midst of things! We downloaded the OS as quickly as we could after it went live and spent some time getting it whipped into shape on fresh hardware. Contrary to Valve’s warning, the install wasn’t complex or scary at all—though if you’ve never installed Linux before, it might take you a bit out of your comfort zone. The hardware Specs at a glance:The Ars Technica Steam Machine CPU Intel Pentium G3220 (Haswell), dual-core, 3.0 GHz GPU Zotac Geforce GTX660 (2GB) RAM 8 GB DDR3-1600 Motherboard MSI H81I (mini-ITX) Storage Western Digital WD Blue 7200 rpm 500GB HD Sound Onboard Network Onboard (wired gigabit Ethernet) PSU Antec VP-450, 450W Case BitFenix Prodigy, arctic white We didn’t receive a Steam Machine to test, so we set out to build our own. Our goals were to stick to known-good SteamOS hardware, and to keep the price between $5-600. Andrew Cunningham, Kyle Orland, and I all stuck our heads together and came up with the configuration at right. All items were purchased from NewEgg, and the total prior to shipping was $562.93. Read 35 remaining paragraphs | Comments        

Read More:
Everything you need to know to install SteamOS on your very own computer

Valve: First version of SteamOS to be released to the masses on Friday

Valve PC gamers who are champing at the bit to build their very own ” Steam Machines ” won’t have to wait long to start tinkering, as Valve has revealed that its recently announced SteamOS will be available this Friday. The announcement comes alongside word from Valve that its prototype Steam Machines , along with the companion Steam Controller , will be shipped out to 300 randomly selected US beta testers on Friday. Valve plans to notify the lucky testers via e-mail at 2 pm Pacific today, and beta participants will get a special badge on their Steam accounts so journalists and fellow players can start bugging them for their impressions incessantly. If you’re not part of that lucky group of 300, though, you’re probably more interested in the fact that “SteamOS will be made available when the prototype hardware ships… downloadable by individual users and commercial OEMs.” More information about that release is coming soon, the company says, but Valve is already warning that “unless you’re an intrepid Linux hacker already, we’re going to recommend that you wait until later in 2014 to try it out.” Read 2 remaining paragraphs | Comments        

Original post:
Valve: First version of SteamOS to be released to the masses on Friday

The first smartring has an LED screen, tells time, and accepts calls

Forget smartwatches —smartrings are the new thing now. An Indiegogo campaign for a product called the “Smarty Ring” has hit its funding goal. Smarty Ring is a 13mm-wide stainless steel ring with an LED screen, Bluetooth 4.0, and an accompanying smartphone app. The ring pairs with a smartphone and acts as a remote control and notification receiver. The ring can display the time, accept or reject calls, control music, trigger the smartphone’s camera, and initiate speed-dial calls. It will also alert the wearer with light-up icons for texts, e-mails, Facebook, Twitter, Google Hangouts, and Skype. It supports dual time zones and comes with a countdown timer, a stopwatch, and an alarm. It can work as a tracker for your phone, too—if your smartphone is more than 30 feet away from the ring, Smarty Ring will trigger an alarm. The ring supports Android and iOS—as long as your device has Bluetooth 4.0, it should be compatible. The creators are promising 24 hours of battery life from the whopping 22 mAh battery, and charging happens via a wireless induction pad. Read 1 remaining paragraphs | Comments        

Read More:
The first smartring has an LED screen, tells time, and accepts calls

French agency caught minting SSL certificates impersonating Google

sharyn morrow Rekindling concerns about the system millions of websites use to encrypt and authenticate sensitive data, Google caught a French governmental agency spoofing digital certificates for several Google domains. The secure sockets layer (SSL) credentials were digitally signed by a valid certificate authority, an imprimatur that caused most mainstream browsers to place an HTTPS in front of the addresses and display other logos certifying that the connection was the one authorized by Google. In fact, the certificates were unauthorized duplicates that were issued in violation of rules established by browser manufacturers and certificate authority services. The certificates were issued by an intermediate certificate authority linked to the Agence nationale de la sécurité des systèmes d’information, the French cyberdefense agency better known as ANSSI. After Google brought the certificates to the attention of agency officials, the officials said the intermediate certificate was used in a commercial device on a private network to inspect encrypted traffic with the knowledge of end users, Google security engineer Adam Langley wrote in a blog post published over the weekend . Google updated its Chrome browser to reject all certificates signed by the intermediate authority and asked other browser makers to do the same. Firefox developer Mozilla and Microsoft, developer of Internet Explorer have followed suit . ANSSI later blamed the mistake on human error . It said it had no security consequences for the French administration or the general public, but the agency has revoked the certificate anyway. Read 5 remaining paragraphs | Comments        

Originally posted here:
French agency caught minting SSL certificates impersonating Google

New US spy satellite features world-devouring octopus

United Launch Alliance via ODNI President Obama is out to put the public’s mind at ease about new revelations on intelligence-gathering, but the Office for the Director of National Intelligence can’t quite seem to get with the program of calming everyone down. Over the weekend, the ODNI was pumping up the launch of a new surveillance satellite launched by the National Reconnaissance Office. The satellite was launched late Thursday night, and ODNI’s Twitter feed posted photos and video of the launch over the following days. Read 4 remaining paragraphs | Comments        

Continue reading here:
New US spy satellite features world-devouring octopus

Mozilla making progress with Firefox’s long journey to multiprocess

Multiple Firefox processes. Gill Penney Internet Explorer and Chrome both use a multiprocess architecture to enhance stability and security. They separate the task of parsing and rendering Web pages from the job of drawing the browser on-screen, saving downloaded files, creating network connections, and so on. This allows them to run the dangerous parts—the parts exposed to malicious scripts and exploitative HTML—in a sandbox with reduced permissions, making it harder for browser flaws to be turned into system compromises. It also means that they’re much more tolerant of crash bugs; a bug will bring down an individual tab, but shouldn’t, in general, bring down the browser as a whole. In 2009, Mozilla announced the Electrolysis project , which was to bring this kind of multiprocess design to Firefox. Read 10 remaining paragraphs | Comments        

Read the article:
Mozilla making progress with Firefox’s long journey to multiprocess

Hack on JPMorgan website exposes data for 465,000 card holders

JPMorgan Chase has warned 465,000 holders of prepaid cash cards that their personal information may have been obtained by hackers who breached the bank’s network security in July, according to a report published Thursday. JPMorgan issued the cards on behalf of corporations and government agencies, which in turn used them to pay employees and issue tax refunds, unemployment compensation, and other benefits, Reuters reported . In September, bank officials discovered an attack on Web servers used by its www.ucard.chase.com site and reported it to law enforcement authorities. In the months since, bank officials have investigated exactly which accounts were involved and what pieces of information were exposed. Wednesday’s warning came after investigators were unable to rule out the possibility that some card holders’ personal data may have been accessed. The bank usually keeps customers’ personal information encrypted, but during the course of the breach, data belonging to notified customers temporarily appeared in plaintext in log files, Reuters said. The notified card holders account for about two percent of the roughly 25 million UCard users. Read 1 remaining paragraphs | Comments        

See the original post:
Hack on JPMorgan website exposes data for 465,000 card holders

Found: hacker server storing two million pilfered paswords

Spider Labs Researchers have unearthed a server storing more than two million pilfered login credentials for a variety of user accounts, including those on Facebook, Yahoo, Google, Twitter, and a handful of other websites. More than 1.5 million of the user names and passwords are for website accounts, including 318,121 for Facebook, 59,549 for Yahoo, 54,437 for Google, and 21,708 for Twitter, according to a blog post published Tuesday by researchers from security firm Trustwave’s Spider Labs. The cache also included credentials for e-mail addresses, FTP accounts, remote desktops, and secure shells. More than 1.8 million of the passwords, or 97 percent of the total, appeared to come from computers located in the Netherlands, followed by Thailand, Germany, Singapore, and Indonesia. US accounts comprised 0.1 percent, with 1,943 compromised passwords. In all, the data may have come from as many as 102 countries. Read 5 remaining paragraphs | Comments        

Link:
Found: hacker server storing two million pilfered paswords