Spam Hits Its Highest Level Since 2010

Long-time Slashdot reader coondoggie quotes Network World: Spam is back in a big way — levels that have not been seen since 2010 in fact. That’s according to a blog post from Cisco Talos that stated the main culprit of the increase is largely the handiwork of the Necurs botnet… “Many of the host IPs sending Necurs’ spam have been infected for more than two years. “To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions… This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again.” Before this year, the SpamCop Block List was under 200, 000 IP addresses, but surged to over 450, 000 addresses by the end of August. Interestingly, Proofpoint reported that between June and July, Donald Trump’s name appeared in 169 times more spam emails than Hillary Clinton’s. Read more of this story at Slashdot.

Read more here:
Spam Hits Its Highest Level Since 2010

Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

An anonymous reader quotes a report from Ars Technica: For the better part of a day, KrebsOnSecurity, arguably the world’s most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn’t like a recent series of exposes reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet. The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600, 000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here. On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4 pm, Akamai gave Krebs two hours’ notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it’s twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn’t rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease. The attackers used Internet-of-things devices since they’re always-connected and easy to “remotely commandeer by people who turn them into digital cannons that spray the internet with shrapnel.” “The biggest threats as far as I’m concerned in terms of censorship come from these ginormous weapons these guys are building, ” Krebs said. “The idea that tools that used to be exclusively in the hands of nation states are now in the hands of individual actors, it’s kind of like the specter of a James Bond movie.” While Krebs could retain a DDoS mitigation service, it would cost him between $100, 000 and $200, 000 per year for the type of protection he needs, which is more than he can afford. What’s especially troubling is that this attack can happen to many other websites, not just KrebsOnSecurity. Read more of this story at Slashdot.

Visit link:
Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

People Are Drilling Holes Into Their iPhone 7 To ‘Make a Headphone Jack’

TechRax — a popular YouTuber who destroys technology for fame and riches — has uploaded a video where he drills a hole into an iPhone 7, claiming it to be a “secret hack” to reinstall a headphone jack in the device. The only problem is that he didn’t tell people it was a joke, and of course, some people fell for it. Crave Online reports: The YouTube video has amassed over 7.5 million views since being posted online last week, with it attracting 81, 000 dislikes in the process. The comments section is currently torn between people who are in on the joke, people who criticize TechRax for damaging his iPhone 7, and most unfortunately, people who have tried the “hack” out for themselves. Although this is YouTube so you can never be quite sure of whether or not these folks are trolling, parsing the comments section reveals some pretty convincing complaints lobbed in TechRax’s direction. It’s also firmly believable that there are people dumb enough to attempt drilling a hole into their iPhone 7, which is unfortunate but that’s the way the world is in 2016. You can read the comments under the YouTube video for more “convincing complaints.” But as if the report didn’t make it clear enough already, the video is a joke. Apple removed the headphone jack and there’s no way to get it back, unless you use an adapter. Read more of this story at Slashdot.

More:
People Are Drilling Holes Into Their iPhone 7 To ‘Make a Headphone Jack’

Pluto’s Liquid Water Ocean Might Be Insanely Deep

In recent months, there’s been growing evidence that Pluto is hiding a liquid water ocean beneath its frozen surface. New models by researchers at Brown University support this hypothesis, and take it one mind-boggling step further: Pluto’s ocean may be more than 100 kilometers (62 miles) deep. Read more…

More:
Pluto’s Liquid Water Ocean Might Be Insanely Deep

Satellite Images Show the Extent of Puerto Rico’s Huge Blackout

Earlier this week, a fire at a power plant in Puerto Rico set off a series of failures across the island’s aging electrical grid. These before-and-after pics from space show what it looks like when 1.5 million customers suddenly lose power. Read more…

More:
Satellite Images Show the Extent of Puerto Rico’s Huge Blackout

Our Last Line of Defense Against Gonorrhea Is Failing

Health officials in the US have identified a cluster of gonorrhea infections that exhibited unusual resistance against the last two main antibiotics known to work against the dreaded sexually transmitted disease. Read more…

Read More:
Our Last Line of Defense Against Gonorrhea Is Failing

Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Kashmir Hill has a fascinating story today on what can go wrong when you solely rely on IP address in a crime investigation — also highlighting how often police resort to IP addresses. In the story she follows a crime investigation that led police to raid a couple’s house at 6am in the morning, because their IP address had been associated with the publication of child porn on notorious 4chan porn. The problem was, Hill writes: the couple — David Robinson and Jan Bultmann — weren’t the ones who had uploaded the child porn. All they did was voluntarily use one of their old laptops as a Tor exit relay, a software used by activists, dissidents, privacy enthusiasts as well as criminals, so that people who want to stay anonymous when surfing the web could do so. Hill writes: Robinson and Bultmann had specifically operated the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user’s activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann’s house. The couple wasn’t pleased to have helped someone post child porn to the internet, but that’s the thing about privacy-protective tools: They’re going to be used for good and bad purposes, and to support one, you might have to support the other.Robinson added that he was a little let down because police didn’t bother to look at the public list which details the IP addresses associated with Tor exit relays. Hill adds: The police asked Robinson to unlock one MacBook Air, and then seemed satisfied these weren’t the criminals they were looking for and left. But months later, the case remains open with Robinson and Bultmann’s names on police documents linking them to child pornography. “I haven’t run an exit relay since. The police told me they’d be back if it happened again, ” Robinson said; he’s still running a Tor node, just not the end point anymore. “I have to take the threat seriously because I don’t want my wife or I to wake up with guns in our faces.”Technologist Seth Schoen, and EFF Executive Director Cindy Cohn in a white paper aimed at courts and cops. “For many reasons, connecting an individual to a crime linked to an IP address, without any additional investigation, is irresponsible and threatens the civil liberties of innocent people.” Read more of this story at Slashdot.

See the original post:
Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Reddit Brings Down North Korea’s Entire Internet

After a North Korean system administrator misconfigured its nameserver allowing anyone to query it and get the list of the domains that exist for .kp, it was revealed that the secretive country only has 28 websites. That’s 28 websites for a country with nearly 25 million people. Naturally, the story was published all across the web, including on Reddit, which resulted in a high number of users visiting North Korea’s websites. Mirror.co.uk reports: When a list of North Korea’s available websites was posted on Reddit, the surge of visitors to the reclusive state’s online offering overloaded the servers. North Korea runs a completely locked-down version of the internet that consists of only 28 “websites” that the population is allowed to view. However, a technical slip-up allowed a GitHub user to work their way into the country’s computer network and view the websites from the outside. As the GitHub user puts it: “One of North Korea’s top level name servers was accidentally configured to allow global [Domain Name System] transfers. This allows anyone who performs [a zone transfer request] to the country’s ns2.kptc.kp name server to get a copy of the nation’s top level DNS data.” Pretty soon, links to all the websites were posted on Reddit, where thousands of visitors took the opportunity to see what the web looks like from Pyongyang. Reddit’s surge of traffic isn’t the first time North Korea’s internet has been knocked out. In 2014, the country suffered a distributed denial of service (DDoS) attack that was believed to have originated from the U.S. Redditor BaconBakin points out that while North Korea has 28 websites, GTA V has 83 websites. They added, “I think it’s safe to say that San Andreas is more technologically advanced than North Korea.” Read more of this story at Slashdot.

Read More:
Reddit Brings Down North Korea’s Entire Internet

Quantum Teleportation Achieved Over 7km of Cable

An anonymous reader quotes a report from ScienceAlert: Quantum teleportation just moved out of the lab and into the real world, with two independent teams of scientists successfully sending quantum information across several kilometers of optical fiber networks in Calgary, Canada, and Hefei, China. Quantum teleportation relies on a strange phenomenon called quantum entanglement. Basically, quantum entanglement means that two particles are inextricably linked, so that measuring the state of one immediately affects the state of the other, no matter how far apart the two are — which led Einstein to call entanglement “spooky action at a distance.” In the latest experiments, both published in Nature Photonics (here and here), the teams had slightly different set-ups and results. But what they both had in common is the fact that they teleported their information across existing optical fiber networks — which is important if we ever want to build useable quantum communication systems. To understand the experiments, Anil Ananthaswamy over at New Scientist nicely breaks it down like this: picture three people involved — Alice, Bob, and Charlie. Alice and Bob want to share cryptographic keys, and to do that, they need Charlie’s help. Alice sends a particle to Charlie, while Bob entangles two particles and sends just one of them to Charlie. Charlie then measures the two particles he’s received from each of them, so that they can no longer be differentiated — and that results in the quantum state of Alice’s particle being transferred to Bob’s entangled particle. So basically, the quantum state of Alice’s particle eventually ends up in Bob’s particle, via a way station in the form of Charlie. The Canadian experiment followed this same process, and was able to send quantum information over 6.2 km of Calgary’s fiber optic network that’s not regularly in use. Read more of this story at Slashdot.

See the article here:
Quantum Teleportation Achieved Over 7km of Cable

Samsung’s 960 Pro and 960 Evo SSDs Marry Crazy-Fast Speeds With Roomy Capacity

An anonymous reader writes: Samsung is following up its NVMe successes from 2015 with some fresh blazing-fast M.2 SSDs for storage geeks. The company just announced the Samsung 960 Pro and 960 Evo during this year’s Samsung SSD Global Summit. As with 2015’s 950 Pro NVMe SSDs, the new 960 series marries stacked V-NAND density with the Non-Volatile Memory express (NVMe) specification. They also use a 4-lane PCIe 3.0 interface, just like the 950 Pro. The 960 Evo and Pro will roll out in October with prices starting at $130 and $330, respectively. The 960 Evo will be available in 250GB, 500GB, and 1TB capacities, while the Pro offers 512GB, 1TB, and 2TB versions. The Evo utilizes cheaper and more tightly packed TLC (triple-level cell) NAND, while the Pro sports speedier MLC (multi-level cell) NAND. That 2TB maximum is double the top capacity Samsung offered with the 950 Pro in 2015, and in another age would’ve earned the moniker “jaw dropping” for packing that much storage into an M.2 SSD. But this is the age of the 1TB SDXC card, so maybe sheer capacity increases aren’t as impressive as they used to be. Seagate also announced a 2TB M.2 storage option for enterprises in July.BetaNews has more details. Read more of this story at Slashdot.

See more here:
Samsung’s 960 Pro and 960 Evo SSDs Marry Crazy-Fast Speeds With Roomy Capacity