Guatemala Judge Orders McAfee Released

An anonymous reader points out an AP report which says a judge in Guatemala has ordered the release of John McAfee from a detention center. “Lawyer Telesforo Guerra said the judge notified him verbally of the ruling, but added that it may take a day for formal written notification to win McAfee’s release, possibly as soon as Wednesday.” McAfee, on the run from Belizean police, was arrested in Guatemala several days ago after making himself known to authorities. He did so because a pair of reporters who were interviewing him posted a photo which included metadata on the photo’s location. In a live broadcast on Sunday, McAfee expressed a desire to return to the U.S. “I simply would like to live comfortably day by day, fish, swim, enjoy my declining years. My long-term plan was simply to get away from Belize, think, and decide what to do.” Read more of this story at Slashdot.

Read More:
Guatemala Judge Orders McAfee Released

Google App Verification Service Detects Only 15% of Infected Apps

ShipLives writes “Researchers have tested Google’s app verification service (included in Android 4.2 last month), and found that it performed very poorly at identifying malware in apps. Specifically, the app verification service identified only ~15% of known malware in testing — whereas existing third-party security apps identified between 51% and 100% of known malware in testing.” Read more of this story at Slashdot.

See more here:
Google App Verification Service Detects Only 15% of Infected Apps

Flying malware: the Virus Copter

At the latest San Francisco Drone Olympics (now called DroneGames, thanks, no doubt, to awful bullying from the organized crime syndicate known as the International Olympic Committee), there were many fascinating entries, but the champion was James “substack” Halliday’s Virus-Copter (github), which made wireless contact with its competitors, infected them with viruses that put them under its control, sent them off to infect the rest of the cohort, and then caused them to “run amok.” Many people have written to point out that Virus-Copter shares some DNA with one of the plot elements in my novel Pirate Cinema , but I assure you the resemblance is entirely coincidental. Drones, after all, are stranger than technothrillers. Here’s the $300 drone the competitors were flying. The payload virus.tar includes: node cross-compiled for the ARM chips running on the drones * felixge’s ar-drone module * some iwconfig/iwlist wrappers in lib/iw.js * open wireless networks in nodes.json (gathered by the deployment computer) Report from the DroneGames (formerly Drone Olympics ;-))

Visit link:
Flying malware: the Virus Copter

Sophisticated botnet steals more than $47M by infecting PCs and phones

Behold—the Eurograbber, visualized. Aurich Lawson / Thinkstock A new version of the Zeus trojan—a longtime favorite of criminals conducting online financial fraud—has been used in attacks on over 30,000 electronic banking customers in Europe, infecting both their personal computers and smartphones. The sophisticated attack is designed to circumvent banks’ use of two-factor authentication for transactions by intercepting messages sent by the bank to victims’ mobile phones. The malware and botnet system, dubbed “Eurograbber” by security researchers from Check Point Software and Versafe, was first detected in Italy earlier this year. It has since spread throughout Europe. Eurograbber is responsible for more than $47 million in fraudulent transfers from victims’ bank accounts, stealing amounts from individual victims that range from 500 Euros (about $650) to 25,000 Euros (about $32,000), according to a report published Wednesday (PDF) . The malware attack begins when a victim clicks on a malicious link, possibly sent as part of a phishing attack. Clicking on the link directs them to a site that attempts to download one or more trojans: customized versions of Zeus and its SpyEye and CarBerp variants that allow attackers to record Web visits and then inject HTML and JavaScript into the victim’s browser. The next time the victim visits their bank website, the trojans capture their credentials and launch a JavaScript that spoofs a request for a “security upgrade” from the site, offering to protect their mobile device from attack. The JavaScript captures their phone number and their mobile operating system information—which are used in the second level of Eurograbber’s attack. Read 3 remaining paragraphs | Comments

Visit site:
Sophisticated botnet steals more than $47M by infecting PCs and phones

Wiki Weapon Project Test-Fires a (Partly) 3D-Printed Rifle

MrSeb writes “In its continuing mission to build a ‘Wiki Weapon,’ Defense Distributed has 3D printed the lower receiver of an AR-15 and tested it to failure. The printed part only survives the firing of six shots, but for a first attempt that’s quite impressive. And hey, it’s a plastic gun. Slashdot first covered 3D-printed guns back in July. The Defense Distributed group sprung up soon after, with the purpose of creating an open-source gun — a Wiki Weapon — that can be downloaded from the internet and printed out. The Defense Distributed manifesto mainly quotes a bunch of historical figures who supported the right to bear arms. DefDist (its nickname) is seeking a gun manufacturing license from the ATF, but so far the feds haven’t responded. Unperturbed, DefDist started down the road by renting an advanced 3D printing machine from Stratasys — but when the company found out what its machine was being used for, it was repossessed. DefDist has now obtained a 3D printer from Objet, which seemingly has a more libertarian mindset. The group then downloaded HaveBlue’s original AR-15 lower receiver from Thingiverse, printed it out on the Objet printer using ABS-like Digital Material, screwed it into an AR-57 upper receiver, loaded up some FN 5.7x28mm ammo, and headed to the range. The DefDist team will now make various modifications to HaveBlue’s design, such as making it more rugged and improving the trigger guard, and then upload the new design to Thingiverse.” Sensible ammo choice; 5.7x28mm produces less recoil than the AR-15’s conventional 5.56mm. I wonder how many of the upper’s components, too, can one day be readily replaced with home-printable parts — for AR-15 style rifles, the upper assembly is where the gun’s barrel lives, while the lower assembly (the part printed and tested here) is the legally controlled part of the firearm. Read more of this story at Slashdot.

View the original here:
Wiki Weapon Project Test-Fires a (Partly) 3D-Printed Rifle

Auto-threading Compiler Could Restore Moore’s Law Gains

New submitter Nemo the Magnificent writes “Develop in the Cloud has news about what might be a breakthrough out of Microsoft Research. A team there wrote a paper (PDF), now accepted for publication at OOPSLA, that describes how to teach a compiler to auto-thread a program that was written single-threaded in a conventional language like C#. This is the holy grail to take advantage of multiple cores — to get Moore’s Law improvements back on track, after they essentially ran aground in the last decade. (Functional programming, the other great white hope, just isn’t happening.) About 2004 was when Intel et al. ran into a wall and started packing multiple cores into chips instead of cranking the clock speed. The Microsoft team modified a C# compiler to use the new technique, and claim a ‘large project at Microsoft’ have written ‘several million lines of code’ testing out the resulting ‘safe parallelism.'” The paper is a good read if you’re into compilers and functional programming. The key to operation is adding permissions to reference types allowing you to declare normal references, read-only references to mutable objects, references to globally immutable objects, and references to isolated clusters of objects. With that information, the compiler is able to prove that chunks of code can safely be run in parallel. Unlike many other approaches, it doesn’t require that your program be purely functional either. Read more of this story at Slashdot.

Read More:
Auto-threading Compiler Could Restore Moore’s Law Gains

DOE Wants 5X Improvement In Batteries In 5 Years

dcblogs writes “The U.S. Dept. of Energy has set a goal to develop battery and energy storage technologies that are five times more powerful and five times cheaper within five years. DOE is creating a new center at Argonne National Laboratory, at a cost of $120 million over five years, that’s intended to reproduce development environments that were successfully used by Bell Laboratories and World War II’s Manhattan Project. ‘When you had to deliver the goods very, very quickly, you needed to put the best scientists next to the best engineers across disciplines to get very focused,’ said U.S. Energy Secretary Stephen Chu, on Friday. The Joint Center for Energy Storage Research isn’t designed to seek incremental improvements in existing technologies. This technology hub, according to DOE’s solicitation (PDF), ‘should foster new energy storage designs that begin with a “clean sheet of paper” — overcoming current manufacturing limitations through innovation to reduce complexity and cost.’ Other research labs, universities and private companies are participating in the effort.” Read more of this story at Slashdot.

See the article here:
DOE Wants 5X Improvement In Batteries In 5 Years

Google, Microsoft, PayPal, other Romanian sites hijacked by DNS hackers

For a brief time, people trying to visit google.ro on Wednesday were connected to this page instead. Kaspersky Labs Romanian websites for Google, Microsoft, Yahoo, PayPal, and other operators were briefly redirected to a rogue server on Wednesday. The redirect is most likely a result of a decade-old hacking technique that underscores the fragility of the Internet’s routing system. For a span of one to several hours on Wednesday morning, people typing Google.ro , Yahoo.ro , and Romanian-specific addresses for other sites connected to a website that was purportedly run by an Algerian hacker, according to numerous security blog posts, including this one from Kaspersky Lab. Researchers said the most likely explanation for the redirection is a technique known as DNS poisoning, in which domain name system routing tables are tampered with, causing domain names to resolve to incorrect IP addresses. DNS poisoning first came to light in the mid-1990s when researchers discovered that attackers could inject spoofed IP addresses into the DNS resolvers belonging to Internet service providers and large organizations. The servers would store the incorrect information for hours or days at a time, allowing the attack to send large numbers of end users to websites that install malware or masquerade as banks or other trusted destinations. Over the years, DNS server software has been updated to make it more resistant to the hack, most recently in 2008, when numerous providers introduced fixes to patch a DNS cache poisoning vulnerability discovered by researcher Dan Kaminsky. Read 3 remaining paragraphs | Comments

Continue reading here:
Google, Microsoft, PayPal, other Romanian sites hijacked by DNS hackers

Red Light Cameras Raise Crash Risk, Cost

concealment writes with news of dissatisfaction with a pilot program for stoplight-monitoring cameras. The program ran for several years in New Jersey, and according to a new report, the number of car crashes actually increased while the cameras were present. “[The program] appears to be changing drivers’ behavior, state officials said Monday, noting an overall decline in traffic citations and right-angle crashes. The Department of Transportation also said, however, that rear-end crashes have risen by 20 percent and total crashes are up by 0.9 percent at intersections where cameras have operated for at least a year. The agency recommended the program stay in place, calling for ‘continued data collection and monitoring’ of camera-monitored intersections. The department’s report drew immediate criticism from Assemblyman Declan O’Scanlon, R-Monmouth, who wants the cameras removed. He called the program ‘a dismal failure,’ saying DOT statistics show the net costs of accidents had climbed by more than $1 million at intersections with cameras.” Other cities are considering dumping the monitoring tech as well, citing similar cost and efficacy issues. Read more of this story at Slashdot.

More:
Red Light Cameras Raise Crash Risk, Cost