U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

An anonymous reader quotes a report from NPR: The U.S. Department of Justice has indicted seven Iranians with intelligence links over a series of crippling cyberattacks against 46 U.S. financial institutions between 2011 and 2013. The indictment, which was unsealed Thursday, also accuses one of the Iranians of remotely accessing the control system of a small dam in Rye, N.Y, during the same period. Attorney General Loretta Lynch said the indictment is meant to send a message: “That we will not allow any individual, group, or nation to sabotage American financial institutions or undermine the integrity of fair competition in the operation of the free market.” According to the indictment, the seven men worked for two Iran-based computer security companies that have done work for the Iranian government, including the powerful Islamic Revolutionary Guard Corps. The men allegedly carried out large-scale distributed denial of service (DDoS) attacks, which overwhelm a server with communications in order to disable it. Read more of this story at Slashdot.

More:
U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

Angola’s Wikipedia Pirates Are Exposing Loopholes in Zero Rating

Reader Jason Koebler quotes a Motherboard article: Wikimedia and Facebook have given Angolans free access to their respective websites, but not to the rest of the internet. So, naturally, Angolans have taken to hiding pirated movies and music in Wikipedia articles and are also sharing links to these files on Facebook, creating a totally free and clandestine file sharing network in a country where mobile internet data is extremely expensive. It’s undeniably a creative use of two services that were designed to give people in the developing world some access to the internet. But now that Angolans are causing headaches for Wikipedia editors and the Wikimedia Foundation, no one is sure what to do about it. Read more of this story at Slashdot.

Read More:
Angola’s Wikipedia Pirates Are Exposing Loopholes in Zero Rating

NVIDIA Announces New Quadro M6000 With 24GB Memory Buffer For Heavy Workloads

Reader MojoKid writes: Some might say there’s no such thing as a one-size-fits-all solution when it comes to computing, and that’s especially true for workstation graphics professionals who need varying levels of performance and memory space. For that reason, NVIDIA is now offering a version of its Quadro M6000 graphics card with 24GB of GDDR5 memory, twice as much memory as much as the original model. According to NVIDIA, customers rendering datasets larger than 12GB can experience up to 5X faster performance compared to the previous Quadro M6000. Like the 12GB version, the new 24GB Quadro M6000 is based on NVIDIA’s Maxwell architecture. It has 3, 072 CUDA cores, a 384-bit memory bus, four DisplayPort 1.2 connectors, a single DVI-I connectors, and a maximum power consumption rating of 250W. In addition to the doubling the memory buffer, NVIDIA added a few other features, including more GPU clock options, greater software temperature control to keep the GPU temp below the point where throttling occurs, and a new under-power boot message if the card is ever under powered. Read more of this story at Slashdot.

Read More:
NVIDIA Announces New Quadro M6000 With 24GB Memory Buffer For Heavy Workloads

Radio Attack Lets Hackers Steal 24 Different Car Models

An anonymous reader writes from a Wired article: A group of German vehicle security researchers has released new findings about the extent of a wireless key hack, and their work ought to convince hundreds of thousands of drivers to keep their car keys next to their Pudding Pops. The Munich-based automobile club ADAC recently made public a study it had performed on dozens of cars to test a radio ‘amplification attack’ that silently extends the range of unwitting drivers’ wireless key fobs to open cars and even start their ignitions (in German). The ADAC researchers say that 24 different vehicles from 19 different manufacturers were all vulnerable, allowing them to not only reliably unlock the target vehicles but also immediately drive them away. “This clear vulnerability in [wireless] keys facilitates the work of thieves immensely, ” reads the post. “The radio connection between keys and car can easily be extended over several hundred meters, regardless of whether the original key is, for example, at home or in the pocket of the owner.” Here’s the full list of vulnerable vehicles from their findings, which focused on European models: the Audi A3, A4 and A6, BMW’s 730d, Citroen’s DS4 CrossBack, Ford’s Galaxy and Eco-Sport, Honda’s HR-V, Hyundai’s Santa Fe CRDi, KIA’s Optima, Lexus’s RX 450h, Mazda’s CX-5, MINI’s Clubman, Mitsubishi’s Outlander, Nissan’s Qashqai and Leaf, Opel’s Ampera, Range Rover’s Evoque, Renault’s Traffic, Ssangyong’s Tivoli XDi, Subaru’s Levorg, Toyota’s RAV4, and Volkswagen’s Golf GTD and Touran 5T. Read more of this story at Slashdot.

See the original article here:
Radio Attack Lets Hackers Steal 24 Different Car Models

Millions of Android Devices Vulnerable To New Stagefright Exploit

An anonymous reader writes: Security researchers have found yet another flaw in Android’s Stagefright. The researchers were able to remotely hack an Android phone by exploiting the bugs. According to their estimation, the flaw exposes devices running Android software version between 5.0-5.1, or 36% of 1.4 billion, to security attacks. “I would be surprised if multiple professional hacking groups do not have working Stagefright exploits by now. Many devices out there are still vulnerable, so Zimperium has not published the second exploit in order to protect the ecosystem, ” Zuk Avraham, chairman of Zimperium, the firm which found the first Stagefright exploit told Wired. Read more of this story at Slashdot.

View post:
Millions of Android Devices Vulnerable To New Stagefright Exploit

YouTube Shows Adblock Plus Users an Error Message Instead of Ads

An anonymous reader writes: Do you use YouTube with Adblock Plus? Some users have been getting the following message instead of ads: “An error occurred. Please try again later.” The error message is only shown for the duration of the ad, meaning Adblock Plus is still technically getting the job done. But adblocking extensions typically block ads as well as remove them: For banner ads that means gaining back screen real estate on the webpage while for videos that means the content starts playing right away. Read more of this story at Slashdot.

Read More:
YouTube Shows Adblock Plus Users an Error Message Instead of Ads

Intel’s Optane SSD Compatible With NVMe; Could Boost MacBook Storage Speeds By 1000x

More details have emerged about Intel’s Optane, a new kind of memory and SSD that utilizes 3D Xpoint. The upcoming 3D Xpoint technology, which is supposedly 10 times denser than DRAM and 1, 000 times faster than flash storage, will be compatible with NVMe, a storage protocol that allows an SSD to make effective use of a high-speed PCIe. Several MacBook Pro models already support NVMe technology. Apple is often among the first companies to adopt emerging standards and technologies, which has led many to believe that the Cupertino-based company might leverage Intel’s Optane solid state drives for super fast performance speeds in its next batch of laptops. Apple is expected to announce the refreshed MacBook lineup sporting Intel Skylake processor later this year. Read more of this story at Slashdot.

Read More:
Intel’s Optane SSD Compatible With NVMe; Could Boost MacBook Storage Speeds By 1000x

Wi-Fi Hotspot Blocking Persists Despite FCC Crackdown

An anonymous reader writes: An examination of consumer complaints to the FCC over the past year and a half shows that the practice of Wi-Fi hotspot device blocking continues even though the agency has slapped organizations such as Marriott and Hilton more than $2 million in total for doing this. Venues argue they need to block hotspots for security reasons, but the FCC and consumers say the organizations are doing this to force people to pay for pricey Internet access. “Consumers who purchase cellular data plans should be able to use them without fear that their personal Internet connection will be blocked by their hotel or conference center, ” FCC Enforcement Bureau chief Travis LeBlanc said in a statement. “It is unacceptable for any hotel to intentionally disable personal hotspots while also charging consumers and small businesses high fees to use the hotel’s own Wi-Fi network. This practice puts consumers in the untenable position of either paying twice for the same service or forgoing Internet access altogether.” Consumers have filed many complaints about Wi-Fi hotspot blocking to the FCC. Read more of this story at Slashdot.

Read the original post:
Wi-Fi Hotspot Blocking Persists Despite FCC Crackdown

600,000 TFTP Servers Can Be Abused For Reflection DDoS Attacks

An anonymous reader writes: Researchers have discovered that improperly configured TFTP servers can be easily abused to carry out reflection DDoS attacks that can sometimes have an amplification factor of 60, one of the highest such values. There are currently around 600, 000 TFTP servers exposed online, presenting a huge attack surface for DDoS malware developers. Other protocols recently discovered as susceptible to reflection DDoS attacks include DNSSEC, NetBIOS, and some of the BitTorrent protocols. Read more of this story at Slashdot.

Read the article:
600,000 TFTP Servers Can Be Abused For Reflection DDoS Attacks

Skype Co-Founder Launches End-To-End Encrypted ‘Wire’ App

An anonymous reader writes: A group of former Skype technologists, backed by the co-founder of the messaging platform, has introduced a new version of its own messaging service that promises end-to-end encryption for all conversations, including by video. Wire, a 50-person start-up mostly made up of engineers, is stepping into a global political debate over encryption that pits privacy against security advocates, epitomized by the standoff between the U.S. government and Apple. Wire, which is headquartered in Switzerland and Germany, two of the most privacy-friendly countries in the world, relays communications through its network of cloud computers where user communications are stored, in encrypted form, on their own devices. It delivers privacy protections that are always on, even when callers use multiple devices, such as a phone or desktop PC simultaneously. For voice and video calls, Wire uses the same DTLS and SRTP encryption standards found in the peer-to-peer WebRTC protocol. Rivals such as Facebook’s Messenger and WhatsApp or Telegram offer encryption on only parts of a message’s journey or for a specific set of services, the company said. “Everything is end-to-end encrypted: That means voice and video calls, texts, pictures, graphics — all the content you can send, ” Wire Executive Chairman Janus Friis told Reuters. Read more of this story at Slashdot.

Read this article:
Skype Co-Founder Launches End-To-End Encrypted ‘Wire’ App