Bitcoin security guarantee shattered by anonymous miner with 51% network power

Cornering the Bitcoin market may be easier than cornering orange juice futures. Paramount Pictures / Aurich Lawson For the first time in Bitcoin’s five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time. It’s an event that, if it persists, signals the end of crypto currency’s decentralized structure. Researchers from Cornell University say that on multiple occasions, a single mining pool repeatedly contributed more than 51 percent of Bitcoin’s total cryptographic hashing output for spans as long as 12 hours. The contributor was GHash , which bills itself as the “#1 Crypto & Bitcoin Mining Pool.” During these periods, the GHash operators had unprecedented powers that circumvented the decentralization that is often held up as a salient advantage Bitcoin has over traditional currencies. So-called 51 percenters, for instance, have the ability to spend the same coins twice, reject competing miners’ transactions, or extort higher fees from people with large holdings. Even worse, a malicious player with a majority holding could wage a denial-of-service attack against the entire Bitcoin network. Like tremblers before a major earthquake, most of GHash’s 51-percent spans were relatively short. Few people paid much attention, since shortly after a miner loses the majority position, it also loses its extraordinary control. Then, on June 12, GHash produced a majority of the power for 12 hours straight, a sustained status that enables precisely the type of doomsday scenario some researchers have warned was possible. Read 8 remaining paragraphs | Comments

Read the original:
Bitcoin security guarantee shattered by anonymous miner with 51% network power

Former Microsoft employee gets 3 months in jail for leaking Windows 8 secrets

Earlier this week, a man accused of stealing trade secrets from Microsoft and handing them to a French blogger was sentenced to three months in jail and a $100 fine in the Western District of Washington. Alex Kibkalo worked for Microsoft in the company’s Russia and Lebanon offices. According to an FBI complaint filed earlier this year, Kibkalo leaked pre-release updates for Windows RT and a Microsoft-internal Activation Server SDK to a French blogger in retaliation for a poor performance review. The blogger allegedly asked a third party to verify the stolen SDK, but that third party, who connected with the blogger via Hotmail, alerted Microsoft of the theft instead. At that point, Microsoft launched its own internal investigation and searched the Hotmail account to find the blogger and his source. The company’s investigation team was soon able to trace back to Kibkalo and then discovered that he had created a virtual machine on Microsoft’s corporate network from which he uploaded the stolen goods to SkyDrive. When confronted, Kibkalo admitted to handing over software, company memos, and other documents. He was fired and later arrested. Read 3 remaining paragraphs | Comments

Original post:
Former Microsoft employee gets 3 months in jail for leaking Windows 8 secrets

RadioShack continues death march, loses $98.3 million in a quarter

On Tuesday, electronics retailer RadioShack reported its quarterly earnings , and the results were not good. The company lost $98.3 million in its first fiscal quarter of 2014, a figure that’s more than triple the loss it sustained in the same quarter last year. Ars put RadioShack on our 2014 “Deathwatch” earlier in January, and not without reason. The retailer has relied on mobile phone sales to buoy it through the hard times and has tried to rebrand itself as the place to shop for Do-It-Yourselfers, stocking its shelves with various Arduino projects. But customers can find the handsets they need in carriers’ shops, and they often choose to buy DIY electronics goods online or in hardware stores. In a press release , the company attributed the quarter results to ” an industry-wide decline in consumer electronics and a soft mobility market which impacted traffic trends throughout the quarter.” Read 3 remaining paragraphs | Comments

Originally posted here:
RadioShack continues death march, loses $98.3 million in a quarter

California top court says red light camera photos are evidence

A red light camera at the intersection of Sylvan and Coffee in Modesto, California. Cyrus Farivar On Thursday, the California Supreme Court upheld the admissibility of images taken from red light cameras as evidence of traffic violations in the Golden State. The unanimous decision in the case, known as The People of California v. Goldsmith , marks the end of a five-year-old legal odyssey. Fines issued as the result of a red light camera in California are by far the highest nationwide ($436 in this case)—typically they’re in the $100 range in the rest of the country. The decision  (PDF) comes amid a flurry of challenges to the red light cameras before other state high courts: the Louisiana Supreme Court recently declined to hear such a case, letting stand a lower court ruling that challenged cameras in New Orleans. The Illinois Supreme Court heard oral arguments against  such cameras in Chicago in May 2014. A decision in a similar case currently before the Ohio Supreme Court is expected before the end of the year. Read 11 remaining paragraphs | Comments

See more here:
California top court says red light camera photos are evidence

Meet “Cupid,” the Heartbleed attack that spawns “evil” Wi-Fi networks

A packet capture showing Cupid attacking a wireless network. SysValue It just got easier to exploit the catastrophic Heartbleed vulnerability against wireless networks and the devices that connect to them thanks to the release last week of open source code that streamlines the process of plucking passwords, e-mail addresses, and other sensitive information from vulnerable routers and connected clients. Dubbed Cupid, the code comes in the form of two software extensions. The first gives wireless networks the ability to deploy “evil networks” that surreptitiously send malicious packets to connected devices. Client devices relying on vulnerable versions of the OpenSSL cryptography library can then be forced to transmit contents stored in memory. The second extension runs on client devices. When connecting to certain types of wireless networks popular in corporations and other large organizations, the devices send attack packets that similarly pilfer data from vulnerable routers. The release of Cupid comes eight weeks after the disclosure of Heartbleed , one of the most serious vulnerabilities to ever hit the Internet. The flaw, which existed for more than two years in OpenSSL, resides in “heartbeat” functions designed to keep a transport layer security (TLS) connection alive over an extended period of time. Read 5 remaining paragraphs | Comments

See more here:
Meet “Cupid,” the Heartbleed attack that spawns “evil” Wi-Fi networks

OS X Yosemite unveiled at WWDC, features big UI overhaul

Photo by DAVID ILIFF. License: CC-BY-SA 3.0 This morning at Apple’s 2014 Worldwide Developer’s Conference, Apple SVP Craig Federighi gave us our first official look at the upcoming version of the Macintosh desktop operating system. This is the tenth formal release of OS X (which is pronounced “oh ess ten,” never “oh ess ecks”); Apple’s naming convention uses “OS X” as the brand, separate from the version, and so the brand and version of this release is indeed “OS X 10.10″—”oh ess ten ten dot ten” (or “ten point ten,” if you insist). Starting with OS X 10.9, though, Apple has given the OS California-themed names—10.9 was “OS X Mavericks,” after a famous surfing location, and this new version is “OS X Yosemite,” named after California’s Yosemite National Park. Mavericks’ branding and banners were all wave-related, after the surf theme; Yosemite’s desktop features the famous slab-sided southwest face of Half Dome , one of the park’s most recognizable rock formations. (PC gamers who cut their teeth in the late 80s and 90s will also recognize Half Dome from its role as the logo of the legendary adventure gaming company Sierra On-Line .) Translucency and new Dock icons. “Translucency” is the name of the day, with trandlucent panels and sidebars popping up all in all windows. The icons in the Dock have also gotten a big overhaul, gaining a very iOS-like appearance across the board. “You wouldn’t believe how much time we spent crafting that trash can,” joked Federighi. The revised interface can also be shifted to a “dark” mode, where windows and menus shift to light text on a smoky background instead of the Mac’s more typical black-on-white. Read 6 remaining paragraphs | Comments

Read the original:
OS X Yosemite unveiled at WWDC, features big UI overhaul