The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP

Setting up encryption on your wireless router is one of the most important things you can do for your network security , but your router probably offers various different options—WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) among the alphabet soup. How-To Geek explains which one to choose for a faster, more secure home network. Read more…

View original post here:
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP

A Domain Registrar Is Starting a Fiber ISP To Compete With Comcast

Jason Koebler writes: Tucows Inc., an internet company that’s been around since the early 90s — it’s generally known for being in the shareware business and for registering and selling premium domain names — announced that it’s becoming an internet service provider. Tucows will offer fiber internet to customers in Charlottesville, Virginia — which is served by Comcast and CenturyLink — in early 2015 and eventually wants to expand to other markets all over the country. “Everyone who has built a well-run gigabit network has had demand exceeding their expectations, ” Elliot Noss, Tucows’ CEO said. “We think there’s space in the market for businesses like us and smaller.” Read more of this story at Slashdot.

Continue reading here:
A Domain Registrar Is Starting a Fiber ISP To Compete With Comcast

The Pirate Bay Responds To Raid

An anonymous reader writes The Pirate Bay’s crew have remained awfully quiet on the recent raid in public, but today Mr 10100100000 breaks the silence in order to get a message out to the world. In a nutshell, he says that they couldn’t care less, are going to remain on hiatus, and a comeback is possible. In recent days mirrors of The Pirate Bay appeared online and many of these have now started to add new content as well. According to TPB this is a positive development, but people should be wary of scams. Mr 10100100000 says that they would open source the engine of the site, if the code “wouldn’t be so s****y”. In any case, they recommend people keeping the Kopimi spirit alive, as TPB is much more than some hardware stored in a dusty datacenter. Read more of this story at Slashdot.

More:
The Pirate Bay Responds To Raid

Telepresence Store Staffed Remotely Using Robots

Molly McHugh writes: What better way to sell telepresence technologies than having the store employees themselves appear via robot? At the Beam store in Palo Alto, Calif., no human salespeople physically appear, only robots. Users appear on the 17-inch display and control the robot via keyboard, mouse, or Xbox controller. Beam can roll as fast as two miles per hour. People behind the screen control the Beam through their computers, and two wide-angle cameras attached to the top of the bot lets them see everything happening around the store. It’s a bit eerie, watching floating heads tool around and talk to people in this video, and the customers’ react to the Beam with confusion and wonder. Read more of this story at Slashdot.

Read More:
Telepresence Store Staffed Remotely Using Robots

Report: The FBI Is Warning US Businesses About Iranian Hackers

On the heels of a research paper published about a global Iranian hacking operation , Operation Cleaver, the FBI is now warning critical US businesses that they might be targets of Iran’s team of hackers. Read more…

Read the original:
Report: The FBI Is Warning US Businesses About Iranian Hackers

IsoHunt Unofficially Resurrects the Pirate Bay

An anonymous reader writes: Torrent site isoHunt appears to have unofficially resurrected The Pirate Bay at oldpiratebay.org. At first glance, The Old Pirate Bay seems to be just a commemorative site for The Pirate Bay, which went down this week after police raided its data center in Sweden. Upon further inspection, however, it turns out the site is serving new content. This is much more than just a working archive of The Pirate Bay; it has a functioning search engine, all the old listings, and working magnet links. Read more of this story at Slashdot.

More:
IsoHunt Unofficially Resurrects the Pirate Bay

Study of Massive Preprint Archive Hints At the Geography of Plagiarism

sciencehabit writes with this excerpt from Science Insider: New analyses of the hundreds of thousands of technical manuscripts submitted to arXiv, the repository of digital preprint articles, are offering some intriguing insights into the consequences — and geography — of scientific plagiarism. It appears that copying text from other papers is more common in some nations than others, but the outcome is generally the same for authors who copy extensively: Their papers don’t get cited much. The system attempts to rule out certain kinds of innocent copying: “It’s a fairly sophisticated machine learning logistic classifier, ” says arXiv founder Paul Ginsparg, a physicist at Cornell University. “It has special ways of detecting block quotes, italicized text, text in quotation marks, as well statements of mathematical theorems, to avoid false positives.” Read more of this story at Slashdot.

Read the article:
Study of Massive Preprint Archive Hints At the Geography of Plagiarism

Fraud Bots Cost Advertisers $6 Billion

Rambo Tribble writes A new report claims that almost a quarter of the “clicks” registered by digital advertisements are, in fact, from robots created by cyber crime networks to siphon off advertising dollars. The scale and sophistication of the attacks which were discovered caught the investigators by surprise. As one said, “What no one was anticipating is that the bots are extremely effective of looking like a high value consumer.” Read more of this story at Slashdot.

Continue Reading:
Fraud Bots Cost Advertisers $6 Billion

New Destover Malware Signed By Stolen Sony Certificate

Trailrunner7 writes: Researchers have discovered a new version of the Destover malware that was used in the recent Sony Pictures Entertainment breaches, and in an ironic twist, the sample is signed by a legitimate certificate stolen from Sony. The new sample is essentially identical to an earlier version of Destover that was not signed. Destover has been used in a variety of attacks in recent years and it’s representative of the genre of malware that doesn’t just compromise machines and steal data, but can destroy information as well. The attackers who have claimed credit for the attack on Sony have spent the last couple of weeks gradually releasing large amounts of information stolen in the breach, including unreleased movies, personal data of Sony employees and sensitive security information such as digital certificates and passwords. The new, signed version of Destover appears to have been compiled in July and was signed on Dec. 5, the day after Kaspersky Lab published an analysis of the known samples of the malware. Read more of this story at Slashdot.

View article:
New Destover Malware Signed By Stolen Sony Certificate

Feds Plan For 35 Agencies To Collect, Share, Use Health Records of Americans

cold fjord writes: The Weekly Standard reports, “This week, the Department of Health and Human Services (HHS) announced the release of the Federal Health IT Strategic Plan 2015-2020, which details the efforts of some 35 departments and agencies of the federal government and their roles in the plan to ‘advance the collection, sharing, and use of electronic health information to improve health care, individual and community health, and research.’ … Now that HHS has publicly released the Federal Health IT Strategic Plan, the agency is seeking the input from the public before implementation. The plan is subject to two-month period of public comment before finalization. The comment period runs through February 6, 2015.” Among the many agencies that will be sharing records besides Health and Human Services are: Department of Agriculture, Department of Defense, Department of Education, Department of Justice and Bureau of Prison, Department of Labor, Federal Communications Commission, Federal Trade Commission, National Aeronautics and Space Administration, Office of Personnel Management, National Institute of Standards and Technology. Read more of this story at Slashdot.

Read this article:
Feds Plan For 35 Agencies To Collect, Share, Use Health Records of Americans