Hacker Selling Data For 200 Million Yahoo Users On The Dark Web

An anonymous reader writes from a report via Softpedia: A listing was published today on TheRealDeal Dark Web marketplace claiming to be offering data on over 200 million Yahoo users, sold by the same hacker that was behind the LinkedIn, Tumblr, MySpace, and VK data dumps. In statements to Softpedia, Yahoo said it was investigating the breach, but based on the seller’s reputation, it is very likely the data is authentic. The data is up for sale for 3 Bitcoin (approximately ~$1, 800), and based on the sample the hacker provided, the data dump includes details such as usernames, MD5-hashed passwords, and dates of birth for all users. For some records, there is also a backup email address, country of origin, and ZIP code for U.S. users. The hacker, called Peace, has also told Softpedia that he previously made $50, 000 from the LinkedIn breach alone, and over $65, 000 in total from all breaches. Read more of this story at Slashdot.

See the original article here:
Hacker Selling Data For 200 Million Yahoo Users On The Dark Web

Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

An anonymous reader writes: Washington State has filed a lawsuit against Comcast to the sum of $100 million, accusing Comcast of “engaging in a pattern of deceptive practices.” It claims that Comcast’s documents reveal a pattern of illegally deceiving its own customers for profit. KOMO News reports: “The lawsuit (PDF) alleges more than 1.8 million individual violations of the Washington Consumer Protection Act. The Attorney General’s Office says 500, 000 Washington consumers were affected. The lawsuit also accuses Comcast of violating the Consumer Protection Act to all of its nearly 1.2 million Washington subscribers due to its deceptive ‘Comcast Guarantee, ‘ Ferguson said. The lawsuit accuses Comcast of misleading 500, 000 Washington consumers and deceiving them into paying at least $73 million in subscription fees over the last five years for what the attorney general says is a a near-worthless protection plan. Customers who sign up for Comcast’s Service Protection Plan pay a $4.99 monthly fee to avoid being charged if a Comcast technician visits their home. But the plan did not cover wiring inside a wall, the lawsuit says. The Attorney General Office says 75 percent of the time, customers who contacted Comcast were told the plan covered inside wiring. Customer service scripts, which the Attorney General’s Office said it obtained during its investigation, told Comcast representatives to say that the plan covers calls ‘related to inside wiring’ and ‘wiring inside your home.'” According to KOMO News, the lawsuit is seeking more than $73 million in restitution to pay back Service Protection Plan subscriber payments; full restitution for all service calls that applied an improper resolution code, estimated to be at least $1 million; removal of improper credit checks from the credit reports of more than 6, 000 customers; up to $2, 000 per violation of the Consumer Protection Act; and that Comcast clearly disclose the limitations of its Service Protection Plan in advertising and through its representatives, correct improper service codes that should not be chargeable and implement a compliance procedure for improper customer credit checks. Read more of this story at Slashdot.

Read More:
Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

Watch the Olympics in 4K Ultra HD on Comcast, DirecTV or Dish

The 2016 Summer Olympic Games are almost here, and despite the issues present in Rio, watching from home should be better than ever. If you’re in need of something else to display on your brand new Ultra HD television then we have good news — NBC will have 4K, HDR footage with Atmos surround sound available that’s actually downsampled from 8K (which you can see for yourself, if you live in Japan) . The only problem? Not every TV provider will be pushing it to viewers, and it will be on 24-hour tape delay. US viewers have four choices for Ultra HD broadcasts from the Olympics: DirecTV, Dish, Comcast and EPB. Chattanooga residents will have to contact EPB for details on how to get channel 803, while DirecTV is promising a linear broadcast on channel 106. Dish Network will not have the Opening Ceremony available initially, but promises a broadcast on channel 146 and video on-demand highlights that will be in 4K, but won’t feature HDR. For Comcast, you should be able to see all the clips, but it isn’t pushing any Ultra HD via its cable boxes at all. Instead, footage will only be available to people who have Samsung or LG Smart TVs with the Xfinity preview app built-in. Source: NBC

View the original here:
Watch the Olympics in 4K Ultra HD on Comcast, DirecTV or Dish

Vine’s Source Code Was Accidentally Made Public For Five Minutes

An anonymous reader writes from The Register: Vine, the six-second-video-loop app acquired by Twitter in 2012, had its source code made publicly available by a bounty-hunter for everyone to see. The Register reports: “According to this post by @avicoder (Vjex at GitHub), Vine’s source code was for a while available on what was supposed to be a private Docker registry. While docker.vineapp.com, hosted at Amazon, wasn’t meant to be available, @avicoder found he was able to download images with a simple pull request. After that it’s all too easy: the docker pull https://docker.vineapp.com:443/library/vinewww request loaded the code, and he could then open the Docker image and run it. ‘I was able to see the entire source code of Vine, its API keys and third party keys and secrets. Even running the image without any parameter, [it] was letting me host a replica of Vine locally.’ The code included ‘API keys, third party keys and secrets, ‘ he writes. Twitter’s bounty program paid out — $10, 080 — and the problem was fixed in March (within five minutes of him demonstrating the issue).” Read more of this story at Slashdot.

Visit link:
Vine’s Source Code Was Accidentally Made Public For Five Minutes

Malicious computers caught snooping on Tor-anonymized Dark Web sites

Enlarge / A map of hidden services directories detected as malicious. The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators’ identities. All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the “.onion” addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed “honions.” The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that’s well outside of Tor rules. “Such snooping allows [the malicious directories] to index the hidden services, also visit them, and attack them,” Guevara Noubir, a professor in Northeastern University’s College of Computer and Information Science, wrote in an e-mail. “Some of them tried to attack the hidden services (websites using hidden services) through a variety of means including SQL Injection , Cross-Site Scripting (XSS) , user enumeration, server load/performance, etc.” Read 7 remaining paragraphs | Comments

Visit link:
Malicious computers caught snooping on Tor-anonymized Dark Web sites

Pokemon Go Becomes Biggest Mobile Game In US History

An anonymous reader writes: Pokemon Go is now the biggest mobile game of all time in the U.S. Not only has it surpassed Twitter’s daily users, but it is seeing people spend more time in its app than in Facebook. An earlier report from SimilarWeb says Pokemon Go has surpassed Tinder in terms of installations — the app surpassed Tinder on July 7th. Today, the tracking firm says Pokemon Go has managed to surpass Twitter in terms of daily active users on Monday. It says almost 6% of the entire U.S. Android population is engaging with the app on a daily basis. A new report from SurveyMonkey intelligence indicated that Pokemon Go has claimed the title “biggest mobile game in U.S. history.” The game saw just under 21 million daily active users in the U.S. on Monday. It’s reportedly closing in on Snapchat on Android, and could surpass Google Maps on Android as well. According to app store intelligence firm SensorTower, the average iPhone user on iOS spent 33 minutes catching Pokemon, which is more than any other apps it analyzed, including Facebook, Snapchat, Twitter, Instagram, and Slither.io. The app with the second-most average usage at 22 minutes, 8 seconds, was Facebook. SurveyMonkey did note that Pokemon Go still falls short of other games when it comes to time spent in games. Game of War sees nearly 2 hours of total daily usage for the average user, while Candy Crush Saga sees daily usage of about 43 minutes. In just two days, Pokemon Go brought Nintendo’s market value to $7.5 billion. It’s worth noting that it remains to be seen whether or not the game will continue to break records or turn into a ghost town like Nintendo’s first mobile game, Miitomo. Read more of this story at Slashdot.

View article:
Pokemon Go Becomes Biggest Mobile Game In US History

Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

TP-LINK Loses Control of Two Device Configuration Domains

Reader Orome1 writes: Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and that this fact could be misused by malware peddlers. TP-LINK has confirmed that they no longer own the domain in question, and will not be trying to buy it from the unknown seller for now. Instead, they intend to change the domain in the manuals to a newer one that’s already in use.ComputerWorld has more details. Read more of this story at Slashdot.

See the original article here:
TP-LINK Loses Control of Two Device Configuration Domains

DMCA Notices Remove 8,268 Projects On Github In 2015

An anonymous reader writes: Github’s transparency report for 2015 shows that the site received many DMCA notices that removed more than 8, 200 projects. “In 2015, we received significantly more takedown notices, and took down significantly more content, than we did in 2014, ” Github reports. For comparison, the company received only 258 DMCA notices in 2014, 17 of which responded with a counter-notice or retraction. In 2015, they received 505 takedown notices, 62 of which were the subject of counters or withdrawals. TorrentFreak reports: “Copyright holders are not limited to reporting one URL or location per DMCA notice. In fact, each notice filed can target tens, hundreds, or even thousands of allegedly infringing locations.” September was a particularly active month as it took down nearly 5, 834 projects. “Usually, the DMCA reports we receive are from people or organizations reporting a single potentially infringing repository. However, every now and then we receive a single notice asking us to take down many repositories, ” Github explains. They are called ‘Mass Removals’ when more than 100 repositories are asked to be removed. “In all, fewer than twenty individual notice senders requested removal of over 90% of the content GitHub took down in 2015.” Read more of this story at Slashdot.

View the original here:
DMCA Notices Remove 8,268 Projects On Github In 2015