Leader of BitTorrent piracy ring sentenced to five years in prison

The leader of the notorious IMAGiNE BitTorrent piracy ring, Jeramiah Perkins, was sentenced on Thursday to five years in prison, the largest sentence for the group’s five top administrators. In August 2012, Perkins pleaded guilty to one count of conspiracy to commit criminal copyright infringement. After being given the maximum sentence today, Perkins was also ordered to serve three years under “supervised release” and must pay $15,000 in restitution. As we reported in April, the group used infrared and FM receivers and camcorders to capture new releases in movie theaters. In a statement , the Department of Justice cited testimony from the Motion Picture Association of America, calling the group “the most prolific motion picture piracy release group operating on the Internet from September 2009 through September 2011.” Read 2 remaining paragraphs | Comments

More here:
Leader of BitTorrent piracy ring sentenced to five years in prison

Steam for Linux beta now open to the public

Good news for those who didn’t score an invite to the first round of Valve’s closed beta of Steam for Linux . The service is now available to anyone running Linux the latest build of Ubuntu (still no word on when the service is coming to other distros) (seems it runs on multiple different Linux builds now. Apologies). The new, wider release comes with a handy installer package , but those who are already in the closed beta can just upgrade to the latest version within Steam. Valve has also opened up a new Github repository to organize bug tracking for beta testers. That’s what you Linux people like to do, right? Find and catalog bugs? Since the closed beta launch in early November, Steam has expanded its selection of available Linux games from 24 to 39, a list still dominated by indie games. However, THQ president Jason Rubin recently tweeted that the struggling publisher was “evaluating cost/benefit” of Linux development, based on fan feedback in the wake of the company’s successful Humble Bundle experiment . Read on Ars Technica | Comments

Read this article:
Steam for Linux beta now open to the public

Anonymous sets sights on an old enemy—the Westboro Baptist Church

That link? It leads to a survey entitled, “Interactive Butthurt Report v. 2.0.” Nothing is beneath the Westboro Baptist Church, as evidenced by the group’s announcement to picket outside Sandy Hook Elementary School in wake of the recent tragedy. The group’s most recent, perhaps most deplorable decision has apparently irked one of its oldest enemies : infamous hacker collective Anonymous. In response to the WBC’s plans early today, Anonymous tweeted , “It’s so nice of #WBC to provide the internet with a list of their twitter handles…” Roughly one hour later, they revealed their plans for the WBC : “#WBC GodHatesFags Site Admin gets #DOX’d via: Anonymous.” DOX, of course, refers to the work Anonymous did to find and publish a list of WBC members complete with e-mails, phone numbers, and even home addresses—all for the adoring public to access. In addition to the DOXing, Anonymous has repeatedly promoted a whitehouse.org petition to have the WBC recognized legally as a hate-group . The petition was created on Friday and it has already doubled the required 25,000 signatures. Read 1 remaining paragraphs | Comments

Read More:
Anonymous sets sights on an old enemy—the Westboro Baptist Church

Using Windows 8’s “hidden” backup to clone and recover your whole PC

The blue screen of bringing your PC back to life. When it comes to backing up and restoring your PC, Windows 8 took a few steps forward and a few steps back. Your settings and apps in the new tablet-y interface (yeah, we’re still calling it Metro ) are automatically backed up if you use a Microsoft account. That means when you restore your PC, all of the Metro stuff comes back exactly the way you remember it. This has limitations—your desktop applications, anything that wasn’t downloaded from the Windows Store, are wiped when performing the most easily accessible type of restore in Windows 8. Beyond Metro, all you get is a file on your desktop listing the applications you’ve lost. There’s also a new backup tool on the desktop side of things, but this has its limits too. Called File History, it lets you automatically back up files to a network drive or cable-connected external hard drive every 10 minutes. As Peter Bright explained in an article last summer, File History’s arrival was paired with the exit of Shadow Copies. This was a useful tool that let users revert to previous versions of files without needing to connect an external drive, and now it’s gone. Read 20 remaining paragraphs | Comments

See original article:
Using Windows 8’s “hidden” backup to clone and recover your whole PC

How to bring down mission-critical GPS networks with $2,500

Enlarge / The phase-coherent signal synthesizer with its top cover removed. The $2,500 device can be used to severely disrupt mission-critical GPS equipment used by the military and private industry. Nighswander et al. Scientists have devised a series of novel and inexpensive attacks that can severely disrupt mission-critical global positioning systems relied on by the military and a variety of industrial players, including airlines, mining companies, and operators of hydroelectric plants and other critical infrastructure. Unlike previous GPS attacks, the one developed by a team of scientists from Carnegie Mellon University and a private navigation company exploits software bugs in the underlying receivers. That allows the attacks to be stealthier and more persistent than earlier exploits, which primarily relied on signal jamming and spoofing. Prototype hardware that cost only $2,500 to build is able to cause a wide variety of GPS devices within a 30 mile radius to malfunction. Because many of those devices are nodes on special networks that make GPS signals more precise, the attacks have the effect of disrupting larger systems used in aviation, military, and critical infrastructure. The PCSS, or phase-coherent signal synthesizer, that they developed simultaneously receives and transmits civil GPS signals. It carries out many of the same things done by spoofers used in earlier GPS attacks. But instead of merely providing false information designed to compromise the accuracy of the GPS readings, it includes data that exploits weaknesses in the firmware of nearby receivers, many of which use the Internet to share their readings with other machines. The success of the PCSS is the result of an almost complete lack of authentication in the devices that send and receive GPS signals. Read 11 remaining paragraphs | Comments

View article:
How to bring down mission-critical GPS networks with $2,500

FBI snares $850 million Butterfly botnet ring with help of Facebook

On Tuesday, the FBI announced that it had arrested ten people connected to a botnet that had spread through Facebook. Spread by a virus targeting Facebook users, the botnet caused over $850 million in losses to financial institutions, infected over 11 million computers, and stole credit card and bank account data. The botnet itself was shut down in October, according to an FBI statement. This is the second major outbreak of botnets based on the Butterfly (aka Mariposa) bot tool. The first incarnation, discovered in December 2008 and shut down a year later, infected over 12 million PCs worldwide and was spread primarily through file-sharing and instant messaging attacks. It also harvested financial information from over 800,000 victims. In the latest incarnation of Butterfly, the botnet spread itself using variants of Yahos, a virus that spreads itself by sending links via social networks and instant messaging. Victims clicked on the link, launching Yahos’ attack. The malware, which in some variants disguised itself as an NVIDIA video driver , then downloaded and installed the botnet controls and browser exploits that captured users’ credit card and bank account information. The spread of viruses like Yahos prompted Facebook to   partner with McAfee in 2010 to provide tools to users to clean infected systems. Read 1 remaining paragraphs | Comments

View article:
FBI snares $850 million Butterfly botnet ring with help of Facebook

FreedomPop launches free home wireless to compete with low-end DSL

FreedomPop’s new Hub Burst will begin shipping in January 2013. FreedomPop Just over three months after launching its free portable hotspot , FreedomPop now says its ready for the second phase of its expansion plan—a free home wireless connection. Like its portable device, which requires an $89 deposit to get 500MB of free mobile data over WiMAX, this new device (also with an $89 deposit) will offer 1GB of free data in nearly all of the 80 largest urban markets across the United States. “You’ll get speeds of 9 to 12Mbps when it’s fully optimized,” FreedomPop’s CEO Stephen Stokols told Ars, saying that it would be comparable to DSL. Read 13 remaining paragraphs | Comments

Read More:
FreedomPop launches free home wireless to compete with low-end DSL

Why Gmail went down: Google misconfigured load balancing servers

Portions of the Internet panicked yesterday when Gmail was hit by an outage that lasted for an agonizing 18 minutes . The outage coincided with reports of Google’s Chrome browser crashing. It turns out the culprit was a faulty load balancing change that affected products including Chrome’s sync service, which allows users to sync bookmarks and other browser settings across multiple computers and mobile devices. Ultimately, it was human error. Google engineer Tim Steele explained the problem’s origins in a developer forum : Chrome Sync Server relies on a backend infrastructure component to enforce quotas on per-datatype sync traffic. That quota service experienced traffic problems today due to a faulty load balancing configuration change. That change was to a core piece of infrastructure that many services at Google depend on. This means other services may have been affected at the same time, leading to the confounding original title of this bug [which referred to Gmail]. Because of the quota service failure, Chrome Sync Servers reacted too conservatively by telling clients to throttle “all” data types, without accounting for the fact that not all client versions support all data types. The crash is due to faulty logic responsible for handling “throttled” data types on the client when the data types are unrecognized. If the Chrome sync service had gone down entirely, the Chrome browser crashes would not have occurred, it turns out. “In fact this crash would *not* happen if the sync server itself was unreachable,” Steele wrote. “It’s due to a backend service that sync servers depend on becoming overwhelmed, and sync servers responding to that by telling all clients to throttle all data types (including data types that the client may not understand yet).” Read 4 remaining paragraphs | Comments

Read More:
Why Gmail went down: Google misconfigured load balancing servers

iTunes (temporarily) serves porn images to Russian users

iTunes users in Russia got an eyeful on Wednesday (hat tip to Wired ) when a newly released version of the app displayed graphic images of porn instead of the foreign films they were expecting. The bug, reported to be present in the iTunes Store shown to users in Russia, is most likely the result of images that were linked to xxx.xxx. Security experts speculate it was an oversight by Apple developers, who put the address in as a placeholder and then forgot to revise it. The site happens to be the official search directory for domains that carry the .xxx top level domain, which was created last year. As a result, the iTunes section briefly featured a smorgasbord of pornographic images. Apple quickly fixed the mishap, but has yet to explain how it happened. Read on Ars Technica | Comments

See the original post:
iTunes (temporarily) serves porn images to Russian users

SpaceX gets its first military contract

The iconic “blue marble” picture of Earth, taken during the Apollo missions, will be a regular feature of the DSCOVR hardware NASA SpaceX announced that it had won two big US Air Force launch contracts Wednesday. If successful, the two demonstrations would help them qualify to compete for Air Force business against launch provider ULA (United Launch Alliance), which currently has a stranglehold on the largest Air Force launches. The first launch, planned for a Falcon 9, will send up the long-awaited NASA DSCOVR satellite to a distant point between the Sun and the Earth, where it can look at the Earth with the Sun behind it. The second, a Falcon Heavy launch, will put up several satellites and a 5 metric ton ballast, in an effort to demonstrate the Falcon 9 Heavy for the Air Force. Both contracts fall under the Air Force’s OSP-3 (Orbital/Suborbital) program, an Air Force program specifically designed to bringing in new launch companies. “GoreSat” rises from storage DSCOVR, NASA’s Deep Space Climate Observatory , has been in deep storage since 2001, when it was imprisoned by the incoming Bush Administration. DSCOVR is designed to measure the Earth’s albedo by tracking sunlight reflected back from the Earth from a distant vantage point. Former Vice-President Al Gore suggested that a video camera be installed on the satellite, with the hope that the constant video feed of the distant Earth would provide the same kind of ” Blue Marble ” perspective that the first pictures from Apollo did. The original Blue Marble picture is probably the most-circulated picture in human history, and is widely credited with contributing to the start of the modern ecology movement. Read 9 remaining paragraphs | Comments

Read the original post:
SpaceX gets its first military contract