California poised to implement first electronic license plates

Advocates say that electronic license plates can be used to display messages, like EXPIRED. Compliance Innovations This week, the California State Senate approved a bill that would create the nation’s first electronic license plate. Having already passed the state’s assembly, the bill now goes to Gov. Jerry Brown (D) for his signature. The idea is that rather than have a static piece of printed metal adorned with stickers to display proper registration, the plate would be a screen that could wirelessly (likely over a mobile data network) receive updates from a central server to display that same information. In an example shown by a South Carolina vendor, messages such as “STOLEN, ” “EXPIRED, ” or something similar could also be displayed on a license plate. The bill’s language says that for now, the program would be limited to a “pilot program” set to be completed no later than January 1, 2017. Read 17 remaining paragraphs | Comments        

Read More:
California poised to implement first electronic license plates

Sudden spike of Tor users likely caused by one “massive” botnet

Tor Project Researchers have found a new theory to explain the sudden spike in computers using the Tor anonymity network: a massive botnet that was recently updated to use Tor to communicate with its mothership. Mevade.A, a network of infected computers dating back to at least 2009, has mainly used standard Web-based protocols to send and receive data to command and control (C&C) servers, according to researchers at security firm Fox-IT. Around the same time that Tor Project leaders began observing an unexplained doubling in Tor clients , Mevade overhauled its communication mechanism to use anonymized Tor addresses ending in .onion. In the week that has passed since Tor reported the uptick, the number of users has continued to mushroom. “The botnet appears to be massive in size as well as very widespread, ” a Fox-IT researcher wrote in a blog post published Thursday . “Even prior to the switch to Tor, it consisted of tens of thousands of confirmed infections within a limited amount of networks. When these numbers are extrapolated on a per country and global scale, these are definitely in the same ballpark as the Tor users increase.” Read 3 remaining paragraphs | Comments        

Originally posted here:
Sudden spike of Tor users likely caused by one “massive” botnet

Windows 8 more widely used than OS X, IE still on the rise

Net Market Share In July, Windows 8 passed Windows Vista in market share. In August, it passed every single version of Apple’s OS X, combined. Internet Explorer 10 grew sharply, too, with almost one in five Internet users now on the latest version of Microsoft’s browser. Net Market Share Windows 8 made substantial gains in August, picking up 2.01 points of share. This is 37 percent growth on July’s figure. Windows XP also fell substantially, losing 3.53 points. With luck, this might mean that Windows XP is finally on the way out. It has less than a year until it stops receiving free security patches from Microsoft; once this happens, it will essentially be in a state of permanent zero day exploits. Even this level of decline isn’t enough to see the operating system eradicated in time for its end of life. That’s good news for spammers, who’ll have plenty of zombie machines to recruit into botnets, but bad news for everyone else. Net Market Share Net Market Share Among desktop browsers, Internet Explorer was up 0.99 points, Firefox was up 0.59 points, and Safari was up 0.17 points. Chrome, however, was down significantly, losing 1.76 points. This means that yet again Chrome has closed in on Firefox, almost passing it, only to fall back. Read 5 remaining paragraphs | Comments        

Originally posted here:
Windows 8 more widely used than OS X, IE still on the rise

Balky carriers and slow OEMs step aside: Google is defragging Android

Ron Amadeo Android 4.3 was released to Nexus devices a little over a month ago, but, as is usual with Android updates, it’s taking much longer to roll out the general public. Right now, a little over six percent of Android users have the latest version. And if you pay attention to the various Android forums out there, you may have noticed something: no one cares. 4.3’s headline features are a new camera UI, restricted user profiles, and support for new versions of Bluetooth and OpenGL ES. Other than the camera, these are all extremely dull, low-level enhancements. It’s not that Google is out of ideas, or the Android team is slowing down. Google has purposefully made every effort to make Android OS updates as boring as possible. Why make boring updates? Because getting Samsung and the other OEMs to actually update their devices to the latest version of Android is extremely difficult. By the time the OEMs get the new version, port their skins over, ship a build to carriers, and the carriers finally push out the OTA update, many months pass. If the device isn’t popular enough, this process doesn’t happen at all. Updating a phone is a massive project involving several companies, none of which seem to be very committed to the process or in much of a hurry to get it done. Read 11 remaining paragraphs | Comments        

Continue reading here:
Balky carriers and slow OEMs step aside: Google is defragging Android

Feds plow $10 billion into “groundbreaking” crypto-cracking program

Wikimedia The federal government is pouring almost $11 billion per year into a 35, 000-employee program dedicated to “groundbreaking” methods to decode encrypted messages such as e-mails, according to an intelligence black budget published by The Washington Post. The 17-page document, leaked to the paper by former National Security Agency (NSA) contractor Edward Snowden, gives an unprecedented breakdown of the massive amount of tax-payer dollars—which reached $52 billion in fiscal 2013—that the government pours into surveillance and other intelligence-gathering programs. It also details the changing priorities of the government’s most elite spy agencies. Not surprisingly, in a world that’s increasingly driven by networks and electronics, they are spending less on the collection of some hard-copy media and satellite operations while increasing resources for sophisticated signals intelligence, a field of electronic spying feds frequently refer to as “SIGINT.” “We are bolstering our support for clandestine SIGINT capabilities to collect against high priority targets, including foreign leadership targets, ” James Clapper, director of national intelligence, wrote in a summary published by the WaPo . “Also, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic.” Read 3 remaining paragraphs | Comments        

Read More:
Feds plow $10 billion into “groundbreaking” crypto-cracking program

How “cell tower dumps” caught the High Country Bandits—and why it matters

Surveillance footage of one of the robbers. On February 18, 2010, the FBI field office in Denver issued a “wanted” notice for two men known as “the High Country Bandits”—a rather grandiose name for a pair of middle-aged white men who had been knocking down rural banks in the northern Arizona and Colorado, grabbing a few thousand dollars from a teller’s cash drawer, and sometimes escaping on a stolen all terrain vehicle (ATV). In each of their 16 robberies, the bandits had a method: “The unknown male identified as suspect number one often enters the banks in rural locations near closing time and brandishes a black semi-automatic handgun. Suspect number one then demands all the money from the teller drawers. He obtains an undisclosed amount of money, puts it in a bag, orders everyone on the ground, then exits the banks with a second suspect. They have been seen leaving the banks on a green or maroon four-wheel ATV with suspect number two driving.” Investigators had bank surveillance footage of the robberies, but the bandits wore jackets, ski masks, and gloves and proved hard to track down. It wasn’t for a lack of witnesses or police effort, either. At one 2009 robbery in Pinetop, Arizona, for instance, the bandits got away with $3, 827. Witnesses saw a man run from the bank and into a residential area, “looking around as if he were lost.” Witnesses later saw the man tear out of the area on an ATV driven by another man. Police followed their escape route and found the spot where the ATV left the road through a freshly-cut barbed wire fence. The cops followed the tracks 17 miles northwest of town before losing the trail completely. Read 21 remaining paragraphs | Comments        

View article:
How “cell tower dumps” caught the High Country Bandits—and why it matters

In historic vote, New Zealand bans software patents

A major new patent bill, passed in a 117-4 vote by New Zealand’s Parliament after five years of debate, has banned software patents. The relevant clause of the patent  bill actually states that a computer program is “not an invention.” Some have suggested that was a way to get around the wording of the TRIPS intellectual property treaty which requires patents to be “available for any inventions, whether products or processes, in all fields of technology.” Processes will still be patentable if the computer program is merely a way of implementing a patentable process. But patent claims that cover computer programs “as such” will not be allowed. Read 5 remaining paragraphs | Comments        

See the original post:
In historic vote, New Zealand bans software patents

Bethesda “pushing” against Xbox Live Gold fee for Elder Scrolls Online

So far, Bethesda Softworks (and parent company Zenimax Media) has bucked industry trends by planning a $15 per month subscription for its upcoming The Elder Scrolls Online , adding a bit of insult to injury by including a real-money shop for nonessential items . Now the company says it’s trying to get Microsoft to agree to waive the additional requirement of an Xbox Live Gold subscription for Xbox One players, though without much success so far. Microsoft currently requires a $60/year Xbox Live Gold account to play any and all online games on the system, even otherwise free-to-play titles like World of Tanks . Speaking to the UK’s official Xbox Magazine , though, Zenimax Online Creative Director Paul Sage says the company has “been in talks with Microsoft” about getting a waiver for The Elder Scrolls Online  since the game already has its own subscription fee. “[We’re] seeing whether or not there’s any room to change their minds about that, for folks who are only paying The Elder Scrolls Online and don’t want to pay for an Xbox Live Gold subscription, just to pay The Elder Scrolls Online , ” Sage said. So far Microsoft has been less than responsive to these concerns, reportedly answering, “that’s the way it works, ” but Sage promises that Bethesda will “keep on pushing” on the issue. Read 1 remaining paragraphs | Comments        

See the original article here:
Bethesda “pushing” against Xbox Live Gold fee for Elder Scrolls Online

In surveillance era, clever trick enhances secrecy of iPhone text messages

Creative Heroes A security researcher has developed a technique that could significantly improve the secrecy of text messages sent in near real time on iPhones. The technique, which will debut in September in an iOS app called TextSecure, will also be folded into a currently available Android app by the same name. The cryptographic property known as perfect forward secrecy has always been considered important by privacy advocates, but it has taken on new urgency following the recent revelations of widespread surveillance of Americans by the National Security Agency. Rather than use the same key to encrypt multiple messages—the way, say PGP- and S/MIME-protected e-mail programs do—applications that offer perfect forward secrecy generate ephemeral keys on the fly . In the case of some apps, including the OTR protocol for encrypting instant messages , each individual message within a session is encrypted with a different key. The use of multiple keys makes eavesdropping much harder. Even if the snoop manages to collect years worth of someone’s encrypted messages, he would have to crack hundreds or possibly hundreds of thousands of keys to transform the data into the “plaintext” that a human could make sense of. What’s more, even if the attacker obtains or otherwise compromises the computer that his target used to send the encrypted messages, it won’t be of much help if the target has deleted the messages. Since the keys used in perfect forward secrecy are ephemeral, they aren’t stored on the device. Read 7 remaining paragraphs | Comments        

See more here:
In surveillance era, clever trick enhances secrecy of iPhone text messages

Microsoft CEO Steve Ballmer to retire within 12 months

Substantial news out of Redmond this morning: Microsoft CEO Steve Ballmer is retiring within the next 12 months. Ballmer has been a prominent fixture at Microsoft since joining the company in 1980. Prior to becoming the CEO, Ballmer was active in a number of Microsoft divisions, with a particular focus on the sales side of the house. He took over chief executive duties when Bill Gates stepped down in January 2000. Though much pilloried in the tech press for Microsoft’s more recent missteps, including Windows RT and, most famously, Windows Vista, Ballmer’s tenure as CEO has been a positive one for Microsoft—at least from a revenue perspective. Under his leadership, Microsoft’s net income has increased to $23 billion, with annual revenue climbing from $25 billion to $70 billion, with an average annual profit growth of over 16 percent. Read 3 remaining paragraphs | Comments        

Read More:
Microsoft CEO Steve Ballmer to retire within 12 months