No, Your Phone Didn’t Ring. So Why Voice Mail From a Telemarketer?

Slashdot reader midwestsilentone tipped us off to a growing problem. Lifehacker reports: New technology allows telemarketers to leave ringless voicemail messages, and it’s a method that’s gaining traction. While there are laws to regulate businesses when they call consumers, some groups argue that ringless voicemail shouldn’t count. The New York Times reports, “ringless voicemail providers and pro-business groups…argue that these messages should not qualify as calls and, therefore, should be exempt from consumer protection laws that ban similar types of telephone marketing”… After receiving a petition from a ringless voicemail provider, the Federal Trade Commission has started to collect public comments on this issue. So what can you do about it? First, you can head here to leave your public comment and if you’re getting these voicemails, you can file a complaint with the FCC here. Presumably that only applies if you’re in the U.S. But I’d be curious to hear how many Slashdot readers have experienced this. Read more of this story at Slashdot.

Read More:
No, Your Phone Didn’t Ring. So Why Voice Mail From a Telemarketer?

Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

An anonymous reader writes: Microsoft’s security team has come across a malware family that uses Intel’s Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool. The problem with Intel AMT SOL is that it’s part of Intel’s ME, a separate chip inside Intel CPUs that runs its own OS and stays on even when the main CPU is off. Inside Intel’s ME, AMT SOL opens a virtual network interface which works even when the PC is turned off. Furthermore, because this virtual network interface runs inside ME, firewalls and security products installed on the main OS won’t detected malware using AMT SOL to exfiltrate data. The malware was created and used by a nation-state cyber-espionage unit codenamed PLATINUM, active since 2009, and which has targeted countries around the South China Sea. PLATINUM is by far one of the most sophisticated hacking groups ever discovered. Last year [PDF], the OS maker said the group was installing malware by abusing hotpatching — a mechanism that allows Microsoft to issue updates that tap into active processes and upgrade applications or the operating system without having to reboot the computer. Details about PLATINUM’s recent targets and attacks are available in a report [PDF] Microsoft released yesterday. Read more of this story at Slashdot.

View the original here:
Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

It’s Been So Windy in Europe That Electricity Prices Have Turned Negative

An anonymous reader writes: It’s been very windy across Europe this week. So much so, in fact, that the high wind load on onshore and offshore wind turbines across much of the continent has helped set new wind power records. For starters, renewables generated more than half of Britain’s energy demand on Wednesday — for the first time ever. In fact, with offshore wind supplying 10 percent of the total demand, energy prices were knocked into the negative for the longest period on record. The UK is home to the world’s biggest wind farm, and the largest wind turbines, so it’s no surprise that this was an important factor in the country’s energy mix. “Negative prices aren’t frequently observed, ” Joel Meggelaars, who works at renewable energy trade body WindEurope, told Motherboard over the phone. “It means a high supply and low demand.” Read more of this story at Slashdot.

Continued here:
It’s Been So Windy in Europe That Electricity Prices Have Turned Negative

Airbnb Announces Its Plan To House 100,000 People In Need

New submitter mirandakatz writes: Airbnb has just unveiled its Open Homes Platform, a home-sharing site for hosts motivated by goodwill instead of profits — and for guests motivated by need rather than wanderlust. Specifically, Airbnb is going to begin by connecting refugees with hosts in Canada, France, Greece, and the United States. Ultimately, refugees will be just one group that the site aims to help: Site visitors can also nominate other groups of people for temporary placements, and the platform will expand to include them eventually. At Backchannel, Jessi Hempel dives into the home-sharing platform’s latest effort, and places it in the context of the company’s broader business strategy. Read more of this story at Slashdot.

Originally posted here:
Airbnb Announces Its Plan To House 100,000 People In Need

Electric Vehicles Have Another Record Year, Reaching 2 Million Cars In 2016

An anonymous reader shares a report from the International Energy Agency: The number of electric cars on the roads around the world rose to 2 million in 2016, following a year of strong growth in 2015, according to the latest edition of the International Energy Agency’s Global EV Outlook. China remained the largest market in 2016, accounting for more than 40% of the electric cars sold in the world. With more than 200 million electric two-wheelers and more than 300, 000 electric buses, China is by far the global leader in the electrification of transport. China, the US and Europe made up the three main markets, totaling over 90% of all EVs sold around the world. Electric car deployment in some markets is swift. In Norway, electric cars had a 29% market share last year, the highest globally, followed by the Netherlands with 6.4%, and Sweden with 3.4%. The electric car market is set to transition from early deployment to mass market adoption over the next decade or so. Between 9 and 20 million electric car could be deployed by 2020, and between 40 and 70 million by 2025, according to estimates based on recent statement from carmakers. Read more of this story at Slashdot.

Read More:
Electric Vehicles Have Another Record Year, Reaching 2 Million Cars In 2016

Apple To Phase Out 32-Bit Mac Apps Starting In January 2018

Apple will be phasing out 32-bit apps with iOS 11, and soon the company will make the same changes on its macOS operating system. During its Platform State of the Union keynote at the Worldwide Developers Conference, Apple told developers that macOS High Sierra will be the “last macOS release to support 32-bit apps without compromises.” MacRumors reports: Starting in January of 2018, all new apps submitted to the Mac App Store must be 64-bit, and all apps and app updates submitted must be 64-bit by June 2018. With the next version of macOS after High Sierra, Apple will begin “aggressively” warning users about 32-bit apps before eventually phasing them out all together. In iOS 11, 32-bit apps cannot be installed or launched. Attempting to open a non-supported 32-bit app gives a message notifying users that the app needs to be updated before it can run on iOS 11. Prior to phasing out 32-bit apps on iOS 11, Apple gave both end users and developers several warnings, and the company says it will follow the same path for the macOS operating system. Read more of this story at Slashdot.

Read the original post:
Apple To Phase Out 32-Bit Mac Apps Starting In January 2018

Police In Oklahoma Have Cracked Hundreds of People’s Cell Phones

An anonymous reader shares an excerpt from a report via Motherboard: Mobile phone forensic extraction devices have been a law enforcement tool for years now, and the number of agencies using them is only rising. As part of an ongoing investigation, we have finally been able to turn up some usage logs of this equipment, from Tulsa Police Department, and Tucson Police Department. While the logs do not list the cause of the crime or any other notes about why the phone was being searched, it does list the make of the phone, the date, and the type of extraction. First, let’s go over what extraction devices are being used here. Tucson PD opted for the brand that is arguably the worldwide leader in mobile device forensics, the Israeli company Cellebrite. Tulsa Police Department however opted for a few different models — they purchased two different password breakers from Teel Technologies in 2015, and in March 2016 gave about $1, 500 to Susteen for their SecureView extraction device (SecureView was the product Susteen created when the FBI requested they create a more advanced extraction device for them). It does its work instantly, and has an incredible reach into a phone’s data. They renewed this contract in 2017. In August 2016 they also purchased the Detective extraction device from Oxygen Forensics. Oxygen is much less common than Cellebrite, from what we have found. The kicker really is how often these are being used — it is simply really hard to believe that out of the 783 times Tulsa Police used their extraction devices, all were for crimes in which it was necessary to look at all of the phone’s data. Even for the 316 times Tucson PD used theirs in the last year, it is still a real stretch to think that some low-level non-violent offenders weren’t on the receiving end. There are some days where the devices were used multiple times — Tulsa used theirs eight times on February 28th of this year, eight again on April 3rd, and a whopping 14 times on May 10th 2016. That is a whole lot of data that Tulsa was able to tap into, and we aren’t even able to understand the why. Read more of this story at Slashdot.

View post:
Police In Oklahoma Have Cracked Hundreds of People’s Cell Phones

Chinese ‘Fireball’ Malware Infects Nearly 250 Million Computers Worldwide

Check Point researchers have discovered a massive malware campaign, dubbed Fireball, that has already infected more than 250 million computers across the world, including Windows and Mac OS. The Fireball malware “is an adware package that takes complete control of victim’s web browsers and turns them into zombies, potentially allowing attackers to spy on victim’s web traffic and potentially steal their data, ” reports The Hacker News. From the report: Check Point researchers, who discovered this massive malware campaign, linked the operation to Rafotech, a Chinese company which claims to offer digital marketing and game apps to 300 million customers. While the company is currently using Fireball for generating revenue by injecting advertisements onto the browsers, the malware can be quickly turned into a massive destroyer to cause a significant cyber security incident worldwide. Fireball comes bundled with other free software programs that you download off of the Internet. Once installed, the malware installs browser plugins to manipulate the victim’s web browser configurations to replace their default search engines and home pages with fake search engines (trotux.com). “It’s important to remember that when a user installs freeware, additional malware isn’t necessarily dropped at the same time, ” researchers said. “Furthermore, it is likely that Rafotech is using additional distribution methods, such as spreading freeware under fake names, spam, or even buying installs from threat actors.” Read more of this story at Slashdot.

View article:
Chinese ‘Fireball’ Malware Infects Nearly 250 Million Computers Worldwide

Hollywood Sees Illegal Streaming Devices as ‘Piracy 3.0’

After hunting down torrent sites for more than a decade, Hollywood now has a more complex piracy threat to deal with. From a report: Piracy remains a major threat for the movie industry, MPA Stan McCoy said yesterday during a panel session at the St. Petersburg International Economic Forum. Much like Hollywood, copyright infringers are innovators who constantly change their “business models” and means of obtaining content. Where torrents were dominant a few years ago, illegal streaming devices are now the main threat, with McCoy describing their rise as Piracy 3.0. “Piracy is not a static challenge. The pirates are great innovators in their own right. So even as we innovate in trying to pursue these issues, and pursue novel ways of fighting piracy, the pirates are out there coming up with new business models of their own, ” McCoy said. “If you think of old-fashioned peer-to-peer piracy as 1.0, and then online illegal streaming websites as 2.0, in the audio-visual sector, in particular, we now face challenge number 3.0, which is what I’ll call the challenge of illegal streaming devices.” Read more of this story at Slashdot.

View article:
Hollywood Sees Illegal Streaming Devices as ‘Piracy 3.0’

Wikipedia’s Switch To HTTPS Has Successfully Fought Government Censorship

Determining how to prevent acts of censorship has long been a priority for the non-profit Wikimedia Foundation, and thanks to new research from the Harvard Center for Internet and Society, the foundation seems to have found a solution: encryption. From a report: HTTPS prevents governments and others from seeing the specific page users are visiting. For example, a government could tell that a user is browsing Wikipedia, but couldn’t tell that the user is specifically reading the page about Tiananmen Square. Up until 2015, Wikipedia offered its service using both HTTP and HTTPS, which meant that when countries like Pakistan or Iran blocked the certain articles on the HTTP version of Wikipedia, the full version would still be available using HTTPS. But in June 2015, Wikipedia decided to axe HTTP access and only offer access to its site with HTTPS. The Harvard researchers began by deploying an algorithm which detected unusual changes in Wikipedia’s global server traffic for a year beginning in May 2015. This data was then combined with a historical analysis of the daily request histories for some 1.7 million articles in 286 different languages from 2011 to 2016 in order to determine possible censorship events. After a painstakingly long process of manual analysis of potential censorship events, the researchers found that, globally, Wikipedia’s switch to HTTPS had a positive effect on the number censorship events by comparing server traffic from before and after the switch in June of 2015. Read more of this story at Slashdot.

See more here:
Wikipedia’s Switch To HTTPS Has Successfully Fought Government Censorship