Amazon Prime members get a pretty decent bunch of benefits for their $99 a year subscription, and the list of goodies just got a bit longer. The online retail giant now offers its subscribers free access to Audible Channels , a collection of talk show-type streams and audiobooks that would normally cost $5 a month. Prime members can download the Audible app for iOS, Android and Windows 10 to access Channels, which will include ad-free programming and content from The Wall Street Journal , The New York Times , Charlie Rose , Harvard Business Review and The Onion , among others. It’ll also include 20 curated playlists around comedy, meditation and news, as well as a rotating selection of more than 50 audiobooks. In addition to free two-day shipping and now, free Audible content, a Prime subscription also gets you free access to Amazon’s video streaming service , a ton of ebooks, photo storage, early entry to certain deals and a somewhat limited selection of music. But the company could be boosting its library of songs , and that, together with the Audible offering, could really enhance the amount and quality of its content. Source: BusinessWire
New submitter Kinwolf writes: Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove. Called Umbreon, after a Pokemon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. [It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.] According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn’t need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system. The reports adds: “The rootkit uses a trick to hijack the standard C library (libc) functions without actually installing any kernel objects. Umbreon hijacks these functions and forces other Linux executables to use its own libc-like library. This puts the rootkit in a man-in-the-middle position, capable of modifying system calls made by other programs and altering their output. The rootkit also creates a hidden Linux account that can be accessed via any authentication method supported by Linux, including SSH (Secure Shell). This account does not appear in files like /etc/passwd because the rootkit can modify the output of such files when read, the Trend Micro researchers said in a blog post. Umbreon also has a backdoor component called Espereon, named after another Pokemon character, that can establish a reverse shell to an attacker’s machine when a TCP packet with special field values are received on the monitored Ethernet interface of an affected device.” Read more of this story at Slashdot.
An anonymous reader quotes The Verge: GoldenEye: Source received its first update in more than three years this week. It’s free to download and it features 25 recreated maps, 10 different multiplayer modes, and redesigned versions of the original game’s 28 weapons. It was created using Valve’s Source engine, the same set of tools used to create Counter Strike and Half-Life games. So it’s a massive step up in both visuals and performance for one of the more drastically dated gaming masterpieces of the last 20 years… GoldenEye 007, the beloved N64 first-person shooter, has been recreated in high-definition glory by a team of dedicated fans over the course of 10 years…the attention to detail and the amount of effort that went into GoldenEye: Source make it one of the most polished HD remakes of a N64 classic. With 8 million copies sold, Wikipedia calls it the third best-selling Nintendo 64 game of all-time (although this version doesn’t recreate its single-player campaigns). Anyone have fond memories of playing Goldeneye 007? Read more of this story at Slashdot.