Over 100 Hours of Video Uploaded To YouTube Every Minute

jones_supa writes “Google’s YouTube is celebrating its 8-year birthday, and at the same time they reveal some interesting numbers. ‘Today, more than 100 hours of video are uploaded to YouTube every minute. That’s more than four days of video uploaded each minute! Every month, more than 1 billion people come to YouTube to access news, answer questions and have a little fun. That’s almost one out of every two people on the Internet. Millions of partners are creating content for YouTube and more than 1,000 companies worldwide have mandated a one-hour mid-day break to watch nothing but funny YouTube videos. Well, we made that last stat up, but that would be cool (the other stats are true).'” Read more of this story at Slashdot.

View article:
Over 100 Hours of Video Uploaded To YouTube Every Minute

Run Terminal Commands on Your Home PC with a Text Message

If you have an always-on computer at home, like a home server , you probably run the occasional command on it to start a process, troubleshoot something, or otherwise control it through a terminal. DIYer Steve figured out how to run commands on his Raspberry Pi just by sending a text message. Read more…        

Read More:
Run Terminal Commands on Your Home PC with a Text Message

Fed. Appeals Court Says Police Need Warrant to Search Phone

An anonymous reader writes “In a decision that’s almost certainly going to result in this issue heading up to the Supreme Court, the Federal 1st Circuit Court of Appeals [Friday] ruled that police can’t search your phone when they arrest you without a warrant. That’s contrary to most courts’ previous findings in these kinds of cases where judges have allowed warrantless searches through cell phones.” (But in line with the recently mentioned decision in Florida, and seemingly with common sense.) Read more of this story at Slashdot.

More:
Fed. Appeals Court Says Police Need Warrant to Search Phone

Critical Linux vulnerability imperils users, even after “silent” fix

Wikipedia For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered “root” access over machines, including servers running in shared Web hosting facilities and other sensitive environments. Surprisingly, most users remain wide open even now, more than a month after maintainers of the open-source OS quietly released an update that patched the gaping hole. The severity of the bug, which resides in the Linux kernel’s “perf,” or performance counters subsystem, didn’t become clear until Tuesday, when attack code exploiting the vulnerability became publicly available (note: some content on this site is not considered appropriate in many work environments). The new script can be used to take control of servers operated by many shared Web hosting providers, where dozens or hundreds of people have unprivileged accounts on the same machine. Hackers who already have limited control over a Linux machine—for instance, by exploiting a vulnerability in a desktop browser or a Web application—can also use the bug to escalate their privileges to root. The flaw affects versions of the Linux kernel from 2.6.37 to 3.8.8 that have been compiled with the CONFIG_PERF_EVENTS kernel configuration option. “Because there’s a public exploit already available, an attacker would simply need to download and run this exploit on a target machine,” Dan Rosenberg, a senior security researcher at Azimuth Security , told Ars in an e-mail. “The exploit may not work out-of-the-box on every affected machine, in which case it would require some fairly straightforward tweaks (for someone with exploit development experience) to work properly.” Read 4 remaining paragraphs | Comments

Link:
Critical Linux vulnerability imperils users, even after “silent” fix

Firefox 21 Arrives

An anonymous reader writes “Mozilla on Tuesday officially launched Firefox 21 for Windows, Mac, Linux, and Android. Improvements include the addition of multiple social providers on the desktop as well as open source fonts on Android. In the changelog, the company included an interesting point that’s worth elaborating on: ‘Preliminary implementation of Firefox Health Report.’ Mozilla has revealed that FHR so far logs ‘basic health information’ about Firefox: time to start up, total running time, and number of crashes. Mozilla says the initial report is pretty simple but will grow ‘in the coming months.’ You can get it now from Mozilla.” Read more of this story at Slashdot.

Read More:
Firefox 21 Arrives

World Press Photo Winner Accused of Photoshopping

vikingpower writes “The winner of this year’s World Press Photo award, Paul l Hanssen, is under fire for allegedly having photoshopped the winning picture. The Hacker Factor is detailing the reasons and technicalities for the accusations. ExtremeTech also runs an item about the possible faking. Upon questions by Australian news site news.com.au, Hanssen answers his photo is not a fake. The whole story, however, is based upon somewhat thin proof: three different times in the file’s Adobe XMP block; this does not necessarily mean that more than one file was used in order to obtain a composite image.” Read more of this story at Slashdot.

See the article here:
World Press Photo Winner Accused of Photoshopping

US Government Monitoring Associated Press Phone Records

Picass0 writes with distressing news from the AP wire, about the AP: “The Justice Department secretly obtained two months of telephone records of reporters and editors for The Associated Press in what the news cooperative’s top executive called a ‘massive and unprecedented intrusion’ into how news organizations gather the news.” They obtained call records from a number of desk phones, and the personal phones of many news editors. The DOJ has not commented, but it may be related to the possibility that the CIA director leaked information on a foiled terror plot in Yemen last year. Read more of this story at Slashdot.

Original post:
US Government Monitoring Associated Press Phone Records

UK’s 4G Network Selling Subscriber Tracking Data To Police, Private Parties

Sockatume writes “The Sunday Times has revealed that analytics firm Ipsos MORI and 4G network EE attempted to sell detailed information on 27m subscribers’ activities to various parties including the UK’s police forces. The data encompasses the gender, postcode and age of subscribers, the sites they visit and times they are visited, and the places and times of calls and text messages. Ipsos MORI were reportedly ‘bragging that the data can be used to track people and their location in real time to within 100 meters’ in negotiations. Ipsos MORI has rushed to contradict this in an effort to save face, stating that the users are anonymized and data is aggregated into groups of 50 or more, while location is only precise to 700m. Despite their prior enthusiasm, the police have indicated that they will no longer go ahead with the deal. It is not clear whether the other sales will go ahead.” Read more of this story at Slashdot.

Excerpt from:
UK’s 4G Network Selling Subscriber Tracking Data To Police, Private Parties

How an Aussie University Creates the World’s Best Hackers

bennyboy64 writes “An Australian university appears to be excelling at cultivating some of Australia’s best computer hackers. Following the University of NSW’s students recently placing first, second and third in a hacking war game (the first place winners also won first place last year), The Sydney Morning Herald reports on what exactly about the NSW institution is breeding some of Australia’s best hackers. It finds that a lecturer and mentor to the students with controversial views on responsible disclosure appears to the be the reason for their success.” Read more of this story at Slashdot.

Continued here:
How an Aussie University Creates the World’s Best Hackers

Bloomberg Reporters Caught Spying On Terminal Users

theodp writes “Big Bloomberg is watching you. CNN reports that was the unsettling realization Goldman Sachs execs came to a few weeks ago when a Bloomberg reporter inadvertently revealed that reporters from the news and financial data provider had surveillance capabilities over users of Bloomberg terminals. ‘Limited customer relationship data has long been available to our journalists,’ acknowledged a Bloomberg spokesman. ‘In light of [Goldman’s] concern as well as a general heightened sensitivity to data access, we decided to disable journalist access to this customer relationship information for all clients.’ Business Insider is now reporting on allegations that Bloomberg reporters used terminals to spy on JPMorgan during the ‘London Whale’ disaster; Bloomberg bragged about its leadership on this story.” Read more of this story at Slashdot.

Link:
Bloomberg Reporters Caught Spying On Terminal Users