YouTube Claims 1.5 Billion Monthly Users

An anonymous reader shares a report: Google’s YouTube unit says it now reaches 1.5 billion viewers every month — and its users watch more than an hour of mobile videos per day — as it expands its video programming to sell more digital ads. YouTube CEO Susan Wojcicki also wrote that YouTube Red, the company’s foray into original videos, has launched 37 series that have generated “nearly a quarter billion views.” YouTube Red has 12 new projects in the works, she said. Read more of this story at Slashdot.

Visit link:
YouTube Claims 1.5 Billion Monthly Users

32TB of Windows 10 Internal Builds, Core Source Code Leak Online

According to an exclusive report via The Register, “a massive trove of Microsoft’s internal Windows operating system builds and chunks of its core source code have leaked online.” From the report: The data — some 32TB of installation images and software blueprints that compress down to 8TB — were uploaded to betaarchive.com, the latest load of files provided just earlier this week. It is believed the data has been exfiltrated from Microsoft’s in-house systems since around March. The leaked code is Microsoft’s Shared Source Kit: according to people who have seen its contents, it includes the source to the base Windows 10 hardware drivers plus Redmond’s PnP code, its USB and Wi-Fi stacks, its storage drivers, and ARM-specific OneCore kernel code. Anyone who has this information can scour it for security vulnerabilities, which could be exploited to hack Windows systems worldwide. The code runs at the heart of the operating system, at some of its most trusted levels. In addition to this, hundreds of top-secret builds of Windows 10 and Windows Server 2016, none of which have been released to the public, have been leaked along with copies of officially released versions. Read more of this story at Slashdot.

View the original here:
32TB of Windows 10 Internal Builds, Core Source Code Leak Online

Former Epix exec pleads guilty over $7 million fraud

In 2009, Viacom, Lionsgate and MGM joined forces to launch a premium movie channel called Epix, with Emil Rensing as its Chief Digital Officer. Turns out hiring Rensing was a bad move: according to the Justice Department , he has just pleaded guilty to defrauding the network $7 million over his five-year employment with the company. The former exec apparently used his position to forge contracts between the network and vendor companies he himself owned and controlled. He then used the names of business associates and acquaintances as vendor personnel, setting up fake email accounts for each one of them to make them look legit. Rensing would apparently use those dummy accounts to pose as the people whose identities he stole in order to communicate with the network about payment. The vendors never performed the services they promised, though, and the real people behind the names had no idea what the exec was doing. Acting US Attorney Joon H. Kim said in a statement: “Emil Rensing, an executive at a premium cable network, defrauded his employer out of more than $7 million by causing the network to pay companies Rensing controlled for services that were never rendered. To conceal his role in the payments, Rensing used false and stolen identities and dummy email accounts. I want to thank the FBI for their work to hold Rensing accountable for his crimes.” A few months ago, Rensing pleaded not guilty to embezzling $8.5 million — people familiar with the matter said part of that amount is likely made up of legitimate expenses. He has changed his plea now that the amount is down to $7 million, admitting guilt to one count of wire fraud, which could lead to a maximum sentence of 20 years in prison and three years of supervised release. It was probably the best course of action for him, since his deal with prosecutors didn’t require him to plead guilty to aggravated identity theft, as well. According to Variety , Rensing is far from the only entertainment executive who got tempted by all the millions thrown around in the industry. The publication says the industry is “ripe for thievery” since media companies have grown so big in recent years, overwhelming their financial departments. As a result, questionable transactions take years to discover, if they’re even discovered at all. Source: Reuters , US Department of Justice

See the original post:
Former Epix exec pleads guilty over $7 million fraud

Cisco Subdomain Private Key Found in Embedded Executable

Earlier this month, a developer accidentally discovered the private key of a Cisco subdomain. An anonymous reader shares the post: Last weekend, in an attempt to get Sky’s NOW TV video player (for Mac) to work on my machine, I noticed that one of the Cisco executables contains a private key that is associated with the public key in a trusted certificate for a cisco.com sub domain. This certificate is used in a local WebSocket server, presumably to allow secure Sky/NOW TV origins to communicate with the video player on the users’ local machines. I read the Baseline Requirements document (version 1.4.5, section 4.9.1.1), but I wasn’t entirely sure whether this is considered a key compromise. I asked Hanno Bock on Twitter, and he advised me to post the matter to this mailing list. The executable containing the private key is named ‘CiscoVideoGuardMonitor’, and is shipped as part of the NOW TV video player. In case you are interested, the installer can be found here (SHA-256: 56feeef4c3d141562900f9f0339b120d4db07ae2777cc73a31e3b830022241e6). I would recommend to run this installer in a virtual machine, because it drops files all over the place, and installs a few launch items (agents/daemons). The executable ‘CiscoVideoGuardMonitor’ can be found at ‘$HOME/Library/Cisco/VideoGuardPlayer/VideoGuardMonitor/ VideoGuardMonitor.bundle/Contents/MacOS/CiscoVideoGuardMonitor’. Certificate details: Serial number: 66170CE2EC8B7D88B4E2EB732E738FE3A67CF672, DNS names: drmlocal.cisco.com, Issued by: HydrantID SSL ICA G2. The issuer HydrantID has since communicated with the certificate holder Cisco, and the certificate has been revoked. Read more of this story at Slashdot.

Link:
Cisco Subdomain Private Key Found in Embedded Executable

Hackers Can Spoof Phone Numbers, Track Users Via 4G VoLTE Mobile Technology

An anonymous reader writes: “A team of researchers from French company P1 Security has detailed a long list of issues with the 4G VoLTE telephony, a protocol that has become quite popular all over the world in recent years and is currently in use in the US, Asia, and most European countries, ” reports Bleeping Computer. Researchers say they identified several flaws in the VoLTE protocol (a mixture of LTE and VoIP) that allow an attacker to spoof anyone’s phone number and place phone calls under new identities, and extract IMSI and geo-location data from pre-call message exchanges. These issues can be exploited by both altering some VoLTE packets and actively interacting with targets, but also by passively listening to VoLTE traffic on an Android device. Some of these flaws don’t even need a full call/connection to be established between the victim and the target for the data harvesting operation to take place. Additionally, another flaw allows users to make calls and use mobile data without being billed. The team’s research paper, entitled “Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone” was presented last week at SSTIC (Symposium sur la Securite des Technologies de l’Information et des Communications), a security conference held each year in Rennes, France. Read more of this story at Slashdot.

More:
Hackers Can Spoof Phone Numbers, Track Users Via 4G VoLTE Mobile Technology

Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

An anonymous reader writes: Microsoft’s security team has come across a malware family that uses Intel’s Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool. The problem with Intel AMT SOL is that it’s part of Intel’s ME, a separate chip inside Intel CPUs that runs its own OS and stays on even when the main CPU is off. Inside Intel’s ME, AMT SOL opens a virtual network interface which works even when the PC is turned off. Furthermore, because this virtual network interface runs inside ME, firewalls and security products installed on the main OS won’t detected malware using AMT SOL to exfiltrate data. The malware was created and used by a nation-state cyber-espionage unit codenamed PLATINUM, active since 2009, and which has targeted countries around the South China Sea. PLATINUM is by far one of the most sophisticated hacking groups ever discovered. Last year [PDF], the OS maker said the group was installing malware by abusing hotpatching — a mechanism that allows Microsoft to issue updates that tap into active processes and upgrade applications or the operating system without having to reboot the computer. Details about PLATINUM’s recent targets and attacks are available in a report [PDF] Microsoft released yesterday. Read more of this story at Slashdot.

View the original here:
Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

iOS 11 users will never have to memorize a WiFi password again

Modern life with all of its technological conveniences can be an absolute wonder. Yet when you go to a friend’s house and they spend 30 minutes trying to dig out a WiFi password from under their rug, all of that wide-eyed wonder quickly turns to rage. Luckily then, it looks like Apple has found a way to counter this devastating first world problem with iOS 11 . According to 9to5 Mac , a new WiFi sharing feature will notify iOS 11 users when a visitor wants to join their network, automatically sharing their WiFi password with them if the host approves their request. This isn’t the first new feature that has been outed for Apple’s latest operating system. Other leaks and rumors have stated that the upcoming OS will bring with it expanded NFC capabilities as well as the handy-sounding offloading feature . While no exact release date has been set for the new software, iOS 11 is will be coming to iPods and iPads this fall . Via: The Verge Source: 9to5Mac

More here:
iOS 11 users will never have to memorize a WiFi password again

Microsoft Leak Reveals New Windows 10 Workstation Edition For Power Users

Upon close inspection of the Windows 10 build that Microsoft accidentally pushed to insiders last week, several users are reporting discovering the reference of a new Windows 10 SKU. From a report: In a leaked slide, Microsoft describes the edition as “Windows 10 Pro for Workstation” with four main capabilities: 1. Workstation mode: Microsoft plans to optimize the OS by identifying “typical compute and graphics intensive workloads” to provide peak performance and reliability when Workstation mode is enabled. 2. Resilient file system: Microsoft’s file system successor to NTFS, dubbed ReFS, is enabled in this new version, with support for fault-tolerance, optimized for large data volumes, and auto-correcting. 3. Faster file handling: As workstation machines are typically used for large data volumes across networks, Microsoft is including the SMBDirect protocol for file sharing and high throughput, low latency, and low CPU utilization when accessing network shares. 4. Expanded hardware support: Microsoft is also planning to allow Windows 10 Pro for Workstation on machines with up to 4 CPUs and a memory limit of 6TB. Windows 10 Pro currently only supports 2 CPUs. Read more of this story at Slashdot.

Read this article:
Microsoft Leak Reveals New Windows 10 Workstation Edition For Power Users

NASA Will Create Fake Red And Green Clouds Near Virginia

An anonymous reader quotes CNET: The early morning hours on the U.S. East Coast might be unusually colorful as NASA plans to produce artificial blue-green and red clouds that may be visible from New York to North Carolina… It’s a test of a new system that helps scientists study the auroras and ionosphere. A NASA sounding rocket (a small, sub-orbital rocket often used in research) will launch from Wallops Flight Facility off the coast of Virginia and release several soda-sized canisters of vapor tracers in the upper atmosphere that may appear as colorful clouds. The tracers use vapors made up of lithium, barium and tri-methyl aluminum that react with other elements in the atmosphere to glow, letting researchers visually track the flows of ionized and neutral particles. It’s a bit like being able to dye the wind or ocean currents to be able to get a visual picture. CNN adds that “If you’re near the eastern U.S. coast, look toward the eastern horizon beginning about 4:30 a.m. The farther you are from the launch location, the lower the clouds will appear on the horizon.” Basically, try to adjust your gaze towards Virginia’s eastern shore — and if you’re not on the east coast, NASA is livestreaming the launch and posting updates on Facebook and Twitter. Read more of this story at Slashdot.

Visit link:
NASA Will Create Fake Red And Green Clouds Near Virginia

Massive ransomware attack hits UK hospitals, Spanish banks

Enlarge (credit: Health Service Journal) A large number of hospitals, GPs, and walk-in clinics across England have been locked down by a ransomware attack, reports suggest. There are also some reports of a ransomware attack hitting institutions in Portugal and Spain, though it isn’t known if the incidents are connected. NHS England says it is aware of the issue, but hasn’t yet issued an official statement. At this point it isn’t clear whether a central NHS network has been knocked offline by the ransomware, or whether individual computers connected to the network are being locked out. In any case, some hospitals and clinics are reporting that their computer systems are inaccessible and some telephone services are down too. Read 7 remaining paragraphs | Comments

See the original post:
Massive ransomware attack hits UK hospitals, Spanish banks