Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Image courtesy of TheTruthAbout. Image courtesy TheTruthAbout LinkedIn is suing a gang of hackers who used Amazon’s cloud computing service to circumvent security measures and copy data from hundreds of thousands of member profiles each day. “Since May 2013, unknown persons and/or entities employing various automated software programs (often referred to as ‘bots’) have registered thousands of fake LinkedIn member accounts and have extracted and copied data from many member profile pages,” company attorneys alleged in a complaint filed this week in US District Court in Northern California. “This practice, known as ‘scraping,’ is explicitly barred by LinkedIn’s User Agreement, which prohibits access to LinkedIn ‘through scraping, spidering, crawling, or other technology or software used to access data without the express written consent of LinkedIn or its Members.'” With more than 259 million members—many who are highly paid professionals in technology, finance, and medical industries—LinkedIn holds a wealth of personal data that can prove highly valuable to people conducting phishing attacks, identity theft, and similar scams. The allegations in the lawsuit highlight the unending tug-of-war between hackers who work to obtain that data and the defenders who use technical measures to prevent the data from falling into the wrong hands. Read 7 remaining paragraphs | Comments

See more here:
Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles

Researchers warn of new, meaner ransomware with unbreakable crypto

Security researchers have uncovered evidence of a new piece of malware that may be able to take gigabytes’ worth of data hostage unless end users pay a ransom. Discussions of the new malware, alternately dubbed PrisonLocker and PowerLocker, have been occurring on underground crime forums since November, according to a blog post published Friday by Malware Must Die, a group of researchers dedicated to fighting online crime. The malware appears to be inspired by CryptoLocker, the malicious software that wreaked havoc in October when it used uncrackable encryption to lock up victims’ computer files until they paid hundreds of dollars for the decryption key. PowerLocker could prove an even more potent threat because it would be sold in underground forums as a DIY malware kit to anyone who can afford the $100 for a license, Friday’s post warned. CryptoLocker, by contrast, was custom built for use by a single crime gang. What’s more, PowerLocker might also offer several advanced features, including the ability to disable the task manager, registry editor, and other administration functions built into the Windows operating system. Screen shots and online discussions also indicate the newer malware may contain protections that prevent it from being reverse engineered when run on virtual machines. Read 1 remaining paragraphs | Comments

View original post here:
Researchers warn of new, meaner ransomware with unbreakable crypto

Facebook sued for allegedly making private messages into public “likes”

With all the pieces of my master plan falling into place, Ars will soon be silly with Likes. Facebook is being sued by two users for intercepting the “content of the users’ communications,” including private messages, with the intent to “mine user data and profit from those data by sharing them with third parties—namely, advertisers, marketers, and other data aggregators.” The plaintiffs argue in a December 30 class action complaint that Facebook’s use of the word “private” in relation to its messaging system is misleading, given the way the company treats the info contained within those messages. Many of the allegations in this case are based on research done in 2012 by the Wall Street Journal  for a series of articles about digital privacy. Facebook is far from the first company to use private messages to mint money. Gmail continues to be dinged for creating text ads based off of the content of e-mails  ten years after the ads were first introduced. (And Gmail has been sued for that, too.) This is from 2010, but without the “with” that is no doubt just beyond the crop, it’s still relevant. MoneyBlogNewz Facebook goes to lengths to clearly distinguish its messaging feature as “private,” even calling it “unprecedented” in terms of the privacy controls, the filing alleges. “Facebook never intended to provide this level of confidentiality. Instead, Facebook mines any and all transmissions… in order to gather any and all morsels of information it can about its users.” Read 6 remaining paragraphs | Comments

Visit site:
Facebook sued for allegedly making private messages into public “likes”

Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash

Net Market Share In 2013, Internet Explorer reversed some of its historic losses, Google released of Chrome for Android, and Windows 8 surpassed OS X and Windows Vista to become the third most widely used desktop operating system. Net Market Share Net Market Share Compared to last month, Internet Explorer actually fell slightly, declining by 0.45 points. Firefox, Safari, and Opera also fell, down 0.19, 0.08, and 0.06 points, respectively. The month’s winner was Chrome, which picked up 0.78 points. Over the course of the entire year, Internet Explorer was up 3.14 points on 2012. Firefox was down 1.47 points. Chrome was also down by 1.82 points. Safari rose 0.58 points. Read 9 remaining paragraphs | Comments

Read this article:
Windows 8.x breaks 10 percent, Internet Explorer 11 makes a splash

GOG’s managing director: Gamer resistance to DRM is stronger than ever

GOG.com’s Guillaume Rambourg giving Jenga advice. Digital games distribution site GOG (Good Old Games) has spent the last five years offering classic videogame titles DRM-free to its customers. Earlier in 2013, the site launched an indie publishing platform which allowed independent developers to submit their games for sale through GOG—an alternative to Steam’s contentious Greenlight initiative . Wired.co.uk spoke to Guillaume Rambourg, managing director of GOG.com, to discuss DRM, anti-sales, and why exactly the site was offering the original Fallout games free of charge. Wired.co.uk: What was the story behind setting up the GOG.com website? Rambourg: It all began in the mid-90s, when friends Marcin Iwinski and Michal Kicinski started their business as retail distributors in Poland. Back then, Poland was a very highly pirated market, with most gamers using outdated hardware and not having too much money to spend on games. That’s a tough market to break into: one where people aren’t used to paying for games. Read 32 remaining paragraphs | Comments

Read the original:
GOG’s managing director: Gamer resistance to DRM is stronger than ever

Why NSA spied on inexplicably unencrypted Windows crash reports

The National Security Agency’s X-KEYSCORE program gives the spy agency access to a wide range of Internet traffic. Any information that isn’t encrypted is, naturally, visible to passive Internet wiretaps of the kind the NSA and other intelligence agencies use. This in turn will typically expose such things as e-mails, online chats, and general browsing behavior. And, according to slides published this weekend by Der Spiegel , this information also includes crash reports from Microsoft’s Windows Error Reporting facility built in to Windows. These reports will tell eavesdroppers what versions of what software someone is running, what operating system they use, and whenever that software has crashed. Windows also sends messages in the clear whenever a USB or PCI device is plugged in as part of its hunt for suitable drivers. Read 3 remaining paragraphs | Comments

Read the original:
Why NSA spied on inexplicably unencrypted Windows crash reports

Wii U gamepad hacked, reverse engineered to stream from a PC

Reverse engineering the Wii U gamepad was non-trivial. libdrc The Wii U’s tablet controller isn’t moving as many consoles as Nintendo might like, but the technology itself is still interesting enough to draw the attention of the hacker community. Engadget reports that the libdrc team gave a presentation at the Chaos Communication Congress explaining how it managed to hack the Wii U’s gamepad to communicate with and stream content from a standard Linux PC. The full talk is available in video form here . The 64-slide deck describes the many, many hoops the team had to jump through to get the gamepad working—dumping the gamepad’s firmware helped the team reverse-engineer the Wi-Fi encryption system, at which point the team also needed to reverse-engineer the protocols Nintendo is using to stream video, audio, and input data. The team included a screenshot of an emulated  Final Fantasy VII  in its deck to prove that the software works and was also able to get the GameCube version of The Legend of Zelda:  Wind Waker working live onstage. While the project is, at this point, “very buggy” and “not meant for end users,” the team thinks that the project is “a good prototype that can be improved on.” The team also wants to add the ability to pair other tablets with the Wii U, to port the project to Windows and to OS X, and to make it possible to stream things to the gamepad over the Internet. It may be some time before the layperson can take advantage of the libdrc team’s work, but even as an early alpha the project is an interesting proof-of-concept. Read on Ars Technica | Comments

View article:
Wii U gamepad hacked, reverse engineered to stream from a PC

Apple’s incremental 2013—and what to expect in 2014

The trouble with the Apple beat is that everyone wants it to be as exciting and newsworthy as it was in 2007 when Apple announced the iPhone, or in 2010 when the original iPad dropped. Among both the tech press and enthusiasts, Apple is a victim of its own success—every year that the company doesn’t redefine a product category, the pundits get a bit more bored. In 2013, almost every one of Apple’s new hardware and software releases refined something that came before. While that might seem boring to early adopters, Apple continues to be a master of iteration, improving its products in noticeable and useful ways every single year. Here, we’ll look back at everything Apple has put out this year—and what we might expect in 2014. The iPhone Apple put a whole lot of marketing muscle behind the iPhone 5C, which is essentially a year-old phone. Andrew Cunningham In the strictest sense, Apple actually delivered two new iPhones this year: the iPhone 5S and the  iPhone 5C . The 5S was the only truly new one, though—it delivered the expected improvements to the SoC and the camera while introducing a new hardware feature in the form of the TouchID fingerprint sensor. In contrast, the 5C is just an iPhone 5 with slightly upgraded cellular hardware and some colorful plastic. Read 21 remaining paragraphs | Comments

More:
Apple’s incremental 2013—and what to expect in 2014

Game of Thrones illegal downloads exceed TV viewers for second year

The most-torrented shows of 2013, according to Torrent Freak. Torrent Freak Game of Thrones again turned out to be the most-pirated TV show of 2013, according to a report from Torrent Freak. The show was downloaded an estimated 5.9 million times, besting its proportion of conventional television viewers, which clocks in at 5.5 million. That is a 37 percent increase from 2012, when Torrent Freak estimated Game of Thrones was downloaded 4.28 million times. As the New York Times points out , illegal downloads grew about 10 percent in 2013, with 327 million unique users navigating 13.9 billion webpages that handle pirated movies and TV. The shows Breaking Bad, The Walking Dead, The Big Bang Theory , and Dexter contributed another 14.3 million downloads between them. 2013 also saw plenty of industry leaders endorsing illegal downloading in one way or another. Game of Thrones director David Petrarca said the show thrives on “cultural buzz” in part generated by pirates; Time Warner CEO Jeff Bewkes said that Game of Thrones ’ status as the most pirated show was “ better than an Emmy ;” Netflix stated that it uses piracy statistics to determine what types of shows to produce or license; Breaking Bad creator Vince Gilligan said piracy ” helped… in terms of brand awareness .” The Walking Dead executive producer Gale Ann Hurd disagreed , calling the idea that piracy does good for content a “mistaken belief” and saying the activity is not something “we should encourage.” Read 1 remaining paragraphs | Comments

Read More:
Game of Thrones illegal downloads exceed TV viewers for second year

Efficient set-top boxes to save $1 billion on energy annually by 2017

Today, the US Department of Energy announced an agreement with a diverse group of NGOs that would see significant improvements to a poorly recognized energy sink: the set-top box that receives and controls TV programming. The agreement, while voluntary, commits service providers to using more efficient hardware through to 2017. Although the individual savings will be small, the cumulative impact is massive: a billion dollars in electricity saved by consumers and five million fewer metric tons of carbon dioxide emissions in the atmosphere. The agreement, brokered by the EPA, brings together a diverse coalition of groups. On the environmental side, we have the Natural Resources Defense Council and the Appliance Standards Awareness Project. Representing industry are the Consumer Electronics Association and the National Cable & Telecommunications Association. The American Council for an Energy-Efficient Economy, which gets its funding from a variety of sources (including utilities), was also at the party. The standards they’ve developed will cover all existing delivery methods: telecom, cable, and satellite. It won’t be written into legislation, but an independent third party will verify that hardware meets the agreement’s specifications each year between now and 2017. The exact details of the energy-saving changes aren’t specified in the announcement , but the electronics in the devices can get quite hot, and statements made by Senator Dianne Feinstein (D-CA) suggest that they often remain active even when the television is off. Read 1 remaining paragraphs | Comments        

See more here:
Efficient set-top boxes to save $1 billion on energy annually by 2017