New DoS attacks taking down game sites deliver crippling 100Gbps floods

Online gamers such as these ones often stream their play in real time. Twitch Recent denial-of-service attacks taking down League of Legends and other popular gaming services are doing more than just wielding a never-before-seen technique to vastly amplify the amount of junk traffic directed at targets. In at least some cases, their devastating effects can deprive celebrity game players of huge amounts of money. As Ars reported last week, the attacks are abusing the Internet’s Network Time Protocol (NTP), which is used to synchronize computers to within a few milliseconds of Coordinated Universal Time . A command of just 234 bytes is enough to cause some NTP servers to return a list of up to 600 machines that have previously used its time-syncing service. The dynamic creates an ideal condition for DoS attacks. Attackers send a modest-sized request to NTP servers and manipulate the commands to make them appear as if they came from one of the targeted gaming services. The NTP servers, which may be located in dozens or even hundreds of locations all over the world, in turn send the targets responses that could be tens or hundreds of times bigger than the spoofed request. The technique floods gaming servers with as much as 100Gbps, all but guaranteeing that they’ll be taken down unless operators take specific precautions ahead of time. Among the targets of this new type of attack are game servers used by celebrity players who broadcast live video streams of their gaming prowess that are viewed as many as 50,000 times. In some cases, the massive audiences translate into tens of thousands of dollars per month, as ads are displayed beside video feeds of the players blowing away opponents in Dota 2 and other games. Read 8 remaining paragraphs | Comments

Excerpt from:
New DoS attacks taking down game sites deliver crippling 100Gbps floods

Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Image courtesy of TheTruthAbout. Image courtesy TheTruthAbout LinkedIn is suing a gang of hackers who used Amazon’s cloud computing service to circumvent security measures and copy data from hundreds of thousands of member profiles each day. “Since May 2013, unknown persons and/or entities employing various automated software programs (often referred to as ‘bots’) have registered thousands of fake LinkedIn member accounts and have extracted and copied data from many member profile pages,” company attorneys alleged in a complaint filed this week in US District Court in Northern California. “This practice, known as ‘scraping,’ is explicitly barred by LinkedIn’s User Agreement, which prohibits access to LinkedIn ‘through scraping, spidering, crawling, or other technology or software used to access data without the express written consent of LinkedIn or its Members.'” With more than 259 million members—many who are highly paid professionals in technology, finance, and medical industries—LinkedIn holds a wealth of personal data that can prove highly valuable to people conducting phishing attacks, identity theft, and similar scams. The allegations in the lawsuit highlight the unending tug-of-war between hackers who work to obtain that data and the defenders who use technical measures to prevent the data from falling into the wrong hands. Read 7 remaining paragraphs | Comments

See more here:
Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Imagination Technologies boosts GPU speeds by 50 percent with Series 6XT

Imagination Technologies While most companies are withholding their big phone and tablet-related news until Mobile World Congress next month, this year’s CES is shaping up to be a busy one for mobile chip designers. Nvidia unveiled the latest version of its Tegra SoC last night, and this morning Imagination Technologies took the wraps off of some new graphics IP for mobile chips. There are two new designs being announced today, both relatives to the PowerVR Series 6 GPUs that are beginning to ship in phones and tablets today. At the top-end is the new PowerVR Series 6XT , which promises a 50 percent performance improvement and better power consumption compared to Series 6. These improvements come entirely from architectural optimizations, not more execution resources—the new GX6250, GX6450, and GX6460 parts use two, four, and six of Imagination’s “computer clusters,” the same number available in Series 6 GPUs. There’s also a GX6240 part, which uses two clusters but is “area-optimized” to take up less space in an SoC die. Like Series 6, Series 6XT supports DirectX 10, OpenGL ES 3.0 , and OpenCL 1.x on the API side. The Series 6XT GPU. The other GPU design being announced today is the Series 6XE series, which are being targeted to especially inexpensive or small SoCs. The G6050 and G6060 are both “half-cluster” parts—the two chips are identical aside from the G6060’s PVIRC2 lossless image compression support. The G6100 and G6110 are single cluster parts, again differentiated by PVIRC2 support in the G6110. The GPUs support only DirectX 9 shader model 3, a step down from the Series 6 and Series 6XT parts, but still support OpenGL ES 3.0 and OpenCL 1.x. Read 1 remaining paragraphs | Comments

Continue Reading:
Imagination Technologies boosts GPU speeds by 50 percent with Series 6XT

Researchers warn of new, meaner ransomware with unbreakable crypto

Security researchers have uncovered evidence of a new piece of malware that may be able to take gigabytes’ worth of data hostage unless end users pay a ransom. Discussions of the new malware, alternately dubbed PrisonLocker and PowerLocker, have been occurring on underground crime forums since November, according to a blog post published Friday by Malware Must Die, a group of researchers dedicated to fighting online crime. The malware appears to be inspired by CryptoLocker, the malicious software that wreaked havoc in October when it used uncrackable encryption to lock up victims’ computer files until they paid hundreds of dollars for the decryption key. PowerLocker could prove an even more potent threat because it would be sold in underground forums as a DIY malware kit to anyone who can afford the $100 for a license, Friday’s post warned. CryptoLocker, by contrast, was custom built for use by a single crime gang. What’s more, PowerLocker might also offer several advanced features, including the ability to disable the task manager, registry editor, and other administration functions built into the Windows operating system. Screen shots and online discussions also indicate the newer malware may contain protections that prevent it from being reverse engineered when run on virtual machines. Read 1 remaining paragraphs | Comments

View original post here:
Researchers warn of new, meaner ransomware with unbreakable crypto

Facebook sued for allegedly making private messages into public “likes”

With all the pieces of my master plan falling into place, Ars will soon be silly with Likes. Facebook is being sued by two users for intercepting the “content of the users’ communications,” including private messages, with the intent to “mine user data and profit from those data by sharing them with third parties—namely, advertisers, marketers, and other data aggregators.” The plaintiffs argue in a December 30 class action complaint that Facebook’s use of the word “private” in relation to its messaging system is misleading, given the way the company treats the info contained within those messages. Many of the allegations in this case are based on research done in 2012 by the Wall Street Journal  for a series of articles about digital privacy. Facebook is far from the first company to use private messages to mint money. Gmail continues to be dinged for creating text ads based off of the content of e-mails  ten years after the ads were first introduced. (And Gmail has been sued for that, too.) This is from 2010, but without the “with” that is no doubt just beyond the crop, it’s still relevant. MoneyBlogNewz Facebook goes to lengths to clearly distinguish its messaging feature as “private,” even calling it “unprecedented” in terms of the privacy controls, the filing alleges. “Facebook never intended to provide this level of confidentiality. Instead, Facebook mines any and all transmissions… in order to gather any and all morsels of information it can about its users.” Read 6 remaining paragraphs | Comments

Visit site:
Facebook sued for allegedly making private messages into public “likes”

Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash

Net Market Share In 2013, Internet Explorer reversed some of its historic losses, Google released of Chrome for Android, and Windows 8 surpassed OS X and Windows Vista to become the third most widely used desktop operating system. Net Market Share Net Market Share Compared to last month, Internet Explorer actually fell slightly, declining by 0.45 points. Firefox, Safari, and Opera also fell, down 0.19, 0.08, and 0.06 points, respectively. The month’s winner was Chrome, which picked up 0.78 points. Over the course of the entire year, Internet Explorer was up 3.14 points on 2012. Firefox was down 1.47 points. Chrome was also down by 1.82 points. Safari rose 0.58 points. Read 9 remaining paragraphs | Comments

Read this article:
Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash

Efficient set-top boxes to save $1 billion on energy annually by 2017

Today, the US Department of Energy announced an agreement with a diverse group of NGOs that would see significant improvements to a poorly recognized energy sink: the set-top box that receives and controls TV programming. The agreement, while voluntary, commits service providers to using more efficient hardware through to 2017. Although the individual savings will be small, the cumulative impact is massive: a billion dollars in electricity saved by consumers and five million fewer metric tons of carbon dioxide emissions in the atmosphere. The agreement, brokered by the EPA, brings together a diverse coalition of groups. On the environmental side, we have the Natural Resources Defense Council and the Appliance Standards Awareness Project. Representing industry are the Consumer Electronics Association and the National Cable & Telecommunications Association. The American Council for an Energy-Efficient Economy, which gets its funding from a variety of sources (including utilities), was also at the party. The standards they’ve developed will cover all existing delivery methods: telecom, cable, and satellite. It won’t be written into legislation, but an independent third party will verify that hardware meets the agreement’s specifications each year between now and 2017. The exact details of the energy-saving changes aren’t specified in the announcement , but the electronics in the devices can get quite hot, and statements made by Senator Dianne Feinstein (D-CA) suggest that they often remain active even when the television is off. Read 1 remaining paragraphs | Comments        

See more here:
Efficient set-top boxes to save $1 billion on energy annually by 2017

After sailing the domain name seas, Pirate Bay returns to Sweden

Aurich Lawson After nearly two weeks of bouncing its domain name around the globe, The Pirate Bay has returned to its home port. The notorious BitTorrent site originally went from .se to .sx (Sint Maarten), but it didn’t stop there—in recent days, it has shifted from .ac (Ascension Island) to .pe (Peru) to .gy (Guyana). Now, as of Thursday, it’s back to the comforts of .se (Sweden). Neither The Pirate Bay blog nor its Twitter feed offered any explanation. The move to .sx originally took place back in April 2013 when a Swedish prosecutor filed a motion to seize thepiratebay.se, piratebay.se, and thepiratebay.is. The registrar, the Internet Infrastructure Foundation, has said previously that it would only do so after being served by a Swedish court. “Our actions would largely be determined by the contents of the order and the issuing party,” the agency wrote in June 2012. “Accordingly, we will assess the situation on a case-by-case basis if such an order is issued.” Read 3 remaining paragraphs | Comments        

Visit link:
After sailing the domain name seas, Pirate Bay returns to Sweden

US report predicts CO2 emissions have peaked, energy independence near

Well-sited wind power is cheaper than coal, but the good sites aren’t evenly distributed throughout the US. NREL/DOE Although there are some reasonable questions about the value of making long-term projections about energy use, doing so is one of the duties of the US’ Energy Information Agency. On Monday, the EIA released an overview of a report in which it attempts to track the trends in the energy economy of the US out to 2040. The report contains some eye-popping predictions, including a huge (but brief) boom in domestic oil production, a near balance between energy imports and exports, and a peak in carbon emissions that’s already in our past. Energy predictions are fraught with uncertainty, but this report contains more than most, since it’s predicated on having the entire period out to 2040 covered by legislation and rules that are already on the books. At the moment, that would include the expiration of a tax credit that promotes the installation of renewable power facilities, something that Congress has already renewed several times. Perhaps more significantly, the EPA’s rules governing greenhouse gas emissions from existing facilities are still being formulated but are likely to be in effect for most of the period under consideration. This probably explains why the EIA predicts that the slice of domestic energy production that comes from renewables only increases from 11 to 12 percent over the next 30 years. Read 8 remaining paragraphs | Comments        

Read the original post:
US report predicts CO2 emissions have peaked, energy independence near

Everything you need to know to install SteamOS on your very own computer

SteamOS in all its blue glory. Lee Hutchinson True to its word, Valve has released a beta version of SteamOS, the Linux-based operating system that it will use to power its living room Steam Machine consoles. The release coincides with a lucky group of 300 public beta testers being selected to actually receive Steam Machines to test on—the rest of us can still use the OS, but we’ll have to bring our own hardware. Valve had previously recommended that users who aren’t “intrepid Linux hackers” should wait a few more months before trying out SteamOS, but that’s not going to stop Ars from barreling head first into the midst of things! We downloaded the OS as quickly as we could after it went live and spent some time getting it whipped into shape on fresh hardware. Contrary to Valve’s warning, the install wasn’t complex or scary at all—though if you’ve never installed Linux before, it might take you a bit out of your comfort zone. The hardware Specs at a glance:The Ars Technica Steam Machine CPU Intel Pentium G3220 (Haswell), dual-core, 3.0 GHz GPU Zotac Geforce GTX660 (2GB) RAM 8 GB DDR3-1600 Motherboard MSI H81I (mini-ITX) Storage Western Digital WD Blue 7200 rpm 500GB HD Sound Onboard Network Onboard (wired gigabit Ethernet) PSU Antec VP-450, 450W Case BitFenix Prodigy, arctic white We didn’t receive a Steam Machine to test, so we set out to build our own. Our goals were to stick to known-good SteamOS hardware, and to keep the price between $5-600. Andrew Cunningham, Kyle Orland, and I all stuck our heads together and came up with the configuration at right. All items were purchased from NewEgg, and the total prior to shipping was $562.93. Read 35 remaining paragraphs | Comments        

Read More:
Everything you need to know to install SteamOS on your very own computer