Lyft: Uber scheduled, canceled 5,000 rides to hassle us

The Uber smartphone app. Uber CNN reports that people associated with car-on-demand service Uber have been attempting to sabotage an Uber competitor, Lyft, by ordering and canceling as many as 5,000 rides since October 2013. Lyft drivers have also complained that Uber employees will call them to take “short, low-profit rides largely devoted to luring them to work for Uber.” Uber reportedly used the ride request-and-cancellation tactic earlier this year on another competitor, Gett, to the tune of around 100 rides. Those ride calls were placed by employees as high in the company as Uber’s New York general manager, Josh Mohrer. The calls serve a number of purposes: frustrating drivers, wasting their time and gas approaching a fare that won’t come through, and occupying them to artificially limit driver availability, if only temporarily. Lyft claims to have sussed out the fake requests using phone numbers used by “known Uber recruiters.” Lyft claims that one Uber recruiter requested and canceled 300 rides from May 26 to June 10, and it said that recruiter’s phone number was associated with 21 more accounts with 1,524 canceled rides between them. However, in this instance, there’s no evidence that the cancellations were suggested by Uber corporate, according to CNN. Read 2 remaining paragraphs | Comments

View article:
Lyft: Uber scheduled, canceled 5,000 rides to hassle us

Meet WordHound, the tool that puts a personal touch on password cracking

Dan Goodin, Ars Technica In the vexing pursuit of passwords that are both easy to remember and hard to crack, many people embed clues into their login credentials, choosing for instance, “playstationplaystationdec2014” to safeguard a recently created gaming account or “L0an@ w0rk!” for an IT administrative account at a financial services company. Now, a whitehat hacker is capitalizing on the habit with a tool that automates the process of launching highly targeted cracking attacks. Dubbed WordHound, the freely available tool scours press releases, white papers, and Twitter accounts belonging to companies or sites that have recently suffered security breaches. The software then generates a list of commonly found words or phrases that attackers can use when trying to convert cryptographic hashes from compromised password databases into the corresponding plaintext passcodes. The tool, devised by security consultant Matthew Marx, was unveiled Wednesday at Passwords 14 conference in Las Vegas. “People are influenced greatly by their environment when choosing a password,” Marx, who works for consultancy MWR Info Security , told Ars. “It could be a work environment, their personal life, or the sport teams they like. I wanted to create a tool that leveraged this human vulnerability.” Read 8 remaining paragraphs | Comments

See the article here:
Meet WordHound, the tool that puts a personal touch on password cracking

J. Michael Straczynski wants to reboot Babylon 5 as a big-budget movie

Warner Bros. According to a report from TV Wise , Babylon 5 showrunner J. Michael Straczynski will shortly begin work on a rebooted big-screen version of his 1990s sci-fi TV series. Straczynski made the announcement at San Diego Comic-Con last week. Babylon 5’s pilot episode originally aired in 1993, with the series beginning its regular run almost a year later as a foundational component of the now-defunct Prime Time Entertainment Network . The show lacked the production budget of its contemporary rival Star Trek: Deep Space 9 (which allegedly lifted some or all of its core concepts directly from Straczynski’s original—and rejected— Babylon 5 pitch meeting with Paramount). Still, it attracted enough of an audience to accomplish a noteworthy feat: Babylon 5 became the only non- Star Trek science fiction show on American television to reach its series completion without being cancelled. Not until 2004’s Battlestar Galactica reboot would another non- Star Trek show earn the same distinction. After Babylon 5 ended in 1998, Straczynski (usually referred to simply by his initials, “JMS”) tried multiple times to bring a B5 movie to theaters. The most recent attempt in 2004 came the closest, with a completed script and some preproduction work underway, but without financial backing from Warner Bros. the project had to be abandoned . Read 4 remaining paragraphs | Comments

See original article:
J. Michael Straczynski wants to reboot Babylon 5 as a big-budget movie

In major shift, Google boosts search rankings of HTTPS-protected sites

In a shift aimed at fostering wider use of encryption on the Web, Google is tweaking its search engine to favor sites that use HTTPS to protect end users’ privacy and security. Sites that properly implement the transport layer security (TLS) protocol may be ranked higher in search results than those that transmit in plaintext, company officials said in a blog post published Wednesday . The move is designed to motivate sites to use HTTPS protections across a wider swath of pages rather than only on login pages or not at all. Sites that continue to deliver pages over unprotected HTTP could see their search ranking usurped by competitors that offer HTTPS. Facebook is also getting more serious about encryption, with plans to acquire PrivateCore , a company that develops encryption software to protect and validate data stored on servers. In Wednesday’s post, Google Webmaster Trends Analysts Zineb Ait Bahajji and Gary Illyes noted that Google was among the first sites to offer end-to-end HTTPS protection by default across virtually all of its properties. It has also offered a variety of tools to help sites detect and recover from security breaches. They went on to write: Read 2 remaining paragraphs | Comments

Link:
In major shift, Google boosts search rankings of HTTPS-protected sites

Internet Explorer to start blocking old Java plugins

This month’s Patch Tuesday update for Internet Explorer will include a new feature: it will block out-of-date ActiveX controls. More specifically, it will block out-of-date versions of the Java plugin. Although Microsoft is describing the feature as an ActiveX block, the list of prohibited plugins is currently Java-centric. Stale versions of Flash and Silverlight will be able to stick around, at least for now, though Microsoft says that other out-of-date ActiveX controls will be added to the block list later. Old, buggy versions of the Java plugin have long been used as an exploit vector, with Microsoft’s own security report fingering Java in 84.6 to 98.5 percent of detected exploit kits (bundles of malware sold commercially). Blocking obsolete Java plugins should therefore go a long way toward securing end-user systems. Read 1 remaining paragraphs | Comments

See more here:
Internet Explorer to start blocking old Java plugins

After 10 years, Rosetta probe catches up with its comet destination

Today, the European Space Agency announced that its Rosetta mission successfully arrived at comet 67P/Churyumov-Gerasimenko after a 10-year journey. As the probe approached over the past several weeks, it provided greater detail on the oddly shaped comet, which was venting water as its orbit drew it closer to the Sun. Now, at just 100km from the comet’s surface, Rosetta is providing detailed images of a truly otherworldly landscape. 67P/Churyumov-Gerasimenko occupies an elliptical orbit that takes it from areas beyond Jupiter to somewhere in between Earth and Mars (currently, it’s midway between Jupiter and Mars). That presents a significant challenge, since any probe intended to track the comet must roughly match its orbit before approaching—or it would need a prohibitive volume of propellant to slow down. This explains Rosetta’s 10-year journey, which included four orbital flybys of Earth and Mars to put it in place for a gradual approach. Earlier this year, Rosetta successfully woke from hibernation , and it’s been imaging the comet during its approach. Early images indicated that 67P/Churyumov-Gerasimenko has a two-lobed structure that some have compared to a rubber duck, albeit one with an unusually large head. The second lobe, corresponding to the duck’s body, is broader and more oblong. Read 3 remaining paragraphs | Comments

See original article:
After 10 years, Rosetta probe catches up with its comet destination

What you should expect from Apple’s “iPhone 6”

It hardly seems like it’s been a year since the iPhone 5S was released, but word on the street is that Apple is planning to reveal its next-generation iPhone on September 9. That’s just over a month from now, and the rumor mill has been in full swing all summer, churning out speculation about what Apple will introduce. Since 2008’s iPhone 3G, iPhones released in even numbered years get a new design while phones in odd numbered years are just and sped up and tweaked. Since this is a redesign year, people are especially interested in seeing how Apple moves the platform forward. This close to a new iPhone’s launch, rumors firm up a little and begin to agree on specific aspects of the new hardware. Apple has a big supply chain and sells tens of millions of phones a quarter—given the sheer scale of the operation, it’s inevitable that details will leak. We knew most of the particulars about the iPhone 5S and 5C well before they were officially announced, and there’s no reason to believe that this year will be any different. Now that we have a probable date for the announcement, we’ve rounded up the most credible and plausible rumors (combined with a few educated guesses) to make a rough sketch of what the next-generation iPhone will probably look like. We tried to stick to sources that have been relatively reliable in the past—some of the better reporting from rumor sites and prominent Apple watchers, assertions from major publications like the Wall Street Journal and Bloomberg , and clear, not-obviously-faked pictures of individual components form the basis of our information here. In aggregate, everything we’ve heard so far gives us a pretty good idea of what we can expect next month. Read 26 remaining paragraphs | Comments

See the article here:
What you should expect from Apple’s “iPhone 6”

Whitehats recover, release keys to CryptoLocker ransomware

It must be one of these… Joseph No Whitehat hackers have struck back at the operators of the pernicious CryptoLocker ransom trojan that has held hundreds of thousands of hard drives hostage. Through a partnership that included researchers from FOX-IT and FireEye, researchers managed to recover the private encryption keys that CryptoLocker uses to lock victims’ personal computer files until they pay a $300 ransom. They also reverse engineered the binary code at the heart of the malicious program. The result: a website that allows victims to recover the key for their individual content. To use the free service, victims must upload one of the files encrypted by CryptoLocker along with the e-mail address where they want the secret key delivered. Both FOX-IT and FireEye are reputable security companies, but readers are nonetheless advised to upload only non-sensitive files that contain no personal information. Read 3 remaining paragraphs | Comments

Read the original post:
Whitehats recover, release keys to CryptoLocker ransomware

For months, 911 callers got automated message that said “hang up and dial 911”

No one suffering from an emergency expects to be greeted by a recording when they dial 911. Yet 911 callers in Caddo County, Oklahoma were unable to reach a human operator for months in 2013. Instead, they were routed to an automated message that “instructed callers to ‘hang up and dial 911’ if their call is an emergency,” the Federal Communications Commission said yesterday . The FCC issued a proposed fine of $100,000 to the Hinton Telephone Company, saying the telco “betrayed its customers.” Read 11 remaining paragraphs | Comments

See the original article here:
For months, 911 callers got automated message that said “hang up and dial 911”

Re/code: Apple’s next iPhone event happens on September 9

This iPhone 5S is likely to be superseded in September. Andrew Cunningham After a summer full of rumors and part leaks, Re/code reports that Apple is planning to hold its next iPhone event on Tuesday, September 9. Re/code co-founder Walt Mossberg has a long history with Apple and his prior publication AllThingsD correctly predicted the dates Apple’s iPhone and iPad events last year, so there’s a good chance this is the real thing. This year Apple is widely expected to release a redesigned “iPhone 6” with a larger screen. Reports have varied, but anonymous sources have told multiple publications that the company is planning a 4.7-inch phone to rival “normal” handsets from competitors, as well as a 5.5-inch version intended to compete with so-called “phablet” phones like Samsung’s Galaxy Note series. Last year’s top-end iPhone 5S and midrange iPhone 5C were both refinements of the iPhone 5 design introduced in 2012 . Apple also uses its iPhone events to announce final release dates for new iOS versions, which have for the past two years have come out on the second Wednesday after the iPhone unveiling. This means a final release of iOS 8 is likely on or near September 17, assuming Apple doesn’t change its plans. iOS 8 will refine the new design introduced in iOS 7 , allow iOS devices to work more closely with Macs running OS X Yosemite, and introduce a number of under-the-hood improvements including Extensions. Third-generation Apple TVs will receive an updated UI, as well. Read 1 remaining paragraphs | Comments

Excerpt from:
Re/code: Apple’s next iPhone event happens on September 9