McAfee will break iPhone crypto for FBI in 3 weeks or eat shoe on live TV

Enlarge / John McAfee and Ars Technica deep cover operative Sean Gallagher at an unnamed location that looks suspiciously like Las Vegas. (credit: Sean Gallagher) In an op-ed for Business Insider titled ” I’ll decrypt the San Bernardino phone free of charge so Apple doesn’t need to place a back door on its product ,” libertarian presidential candidate and former antivirus developer John McAfee waded into the ongoing battle of words between Apple and the FBI with some choice words of his own. Never one to bring a knife to a verbal gunfight, McAfee unleashes a howitzer of invective, blasting the United States government for undermining the country’s “already ancient cybersecurity and cyberdefense systems.” It takes only four short paragraphs for McAfee to start talking about Nazis and Hitler. Two paragraphs later—not counting blockquotes—McAfee proclaims that by pressing Apple to “back door” (his words) the iPhone and bypass or defeat the mechanisms keeping its data secure, the government is seeking to bring about the end of the world (as we know it). This is heavy stuff. Read 8 remaining paragraphs | Comments

Read More:
McAfee will break iPhone crypto for FBI in 3 weeks or eat shoe on live TV

Chrome OS distro for regular PCs can now dual-boot with Windows

Enlarge / Dell’s old Latitude E6410 becomes a modern Chromebook. (credit: Andrew Cunningham) A few months ago, we wrote about CloudReady , a version of the open source Chromium OS from Neverware that can transform older Windows PCs into what are essentially Chromebooks (give or take a couple of media codecs and other features). Neverware takes the Chromium OS code provided by Google and does all the hard work of testing and maintaining driver compatibility and providing updates, the same things that Google handles for actual Chromebooks. The OS is aimed at schools that either want to move to Chromebooks but can’t afford the cost of all-new hardware or schools that have already begun a transition to Chromebooks but want to repurpose old hardware they already have. Today, Neverware announced a new version of CloudReady aimed at schools and individuals who want to try the software on their PCs without losing the capability to run Windows. CloudReady version 45.3 can be installed on any system with an existing UEFI-mode installation of Windows 7, 8, or 10 and 32GB of free disk space. You can find detailed installation directions on Neverware’s site. The UEFI requirement means that the list of PCs that support dual-booting is much shorter than the normal CloudReady support list, so this won’t be of much use to people with older BIOS-based PCs and Windows installations. But if you happen to have a device on the list, and you want to give the software a spin, you can download the free version from Neverware’s site. The fully featured version that supports Google’s Chrome OS management console costs $59 per machine for an unlimited license or $25 for a one-year license. Read on Ars Technica | Comments

View article:
Chrome OS distro for regular PCs can now dual-boot with Windows

Massive US-planned cyberattack against Iran went well beyond Stuxnet

(credit: Aurich Lawson) The Stuxnet computer worm that destroyed centrifuges inside Iran’s Natanz uranium enrichment site was only one element of a much larger US-prepared cyberattack plan that targeted Iran’s air defenses, communications systems, and key parts of its power grid, according to articles published Tuesday. The contingency plan, known internally as Nitro Zeus, was intended to be carried out in the event that diplomatic efforts to curb Iran’s nuclear development program failed and the US was pulled into a war between Iran and Israel, according to an article published by The New York Times . At its height, planning for the program involved thousands of US military and intelligence personnel, tens of millions of dollars in expenditures, and the placing of electronic implants in Iranian computer networks to ensure the operation targeting critical infrastructure would work at a moment’s notice. Another piece of the plan involved using a computer worm to destroy computer systems at the Fordo nuclear enrichment site, which was built deep inside a mountain near the Iranian city of Qom. It had long been considered one of the hardest Iranian targets to disable and was intended to be a follow-up to “Olympic Games,” the code name of the plan Stuxnet fell under. Read 5 remaining paragraphs | Comments

More here:
Massive US-planned cyberattack against Iran went well beyond Stuxnet

The fall… and rise and rise and rise of chat networks

At the end of October 2014, something very important came to an end. After 15 years of changing the way people communicated forever, Microsoft closed down its MSN Windows Live service. Originally named MSN Messenger, its demise was not an overnight failure. Microsoft’s acquisition of Skype for £5.1 billion in 2012 meant it was only a matter of time before it was finally closed. China was the last territory to migrate the service to Skype; other countries did so 12 months earlier. At its height, MSN Messenger had more than 330 million users after originally being launched to rival the emerging chat networks of AOL’s AIM service and ICQ, followed by the entry of Yahoo Messenger. It was the social network of its day and as influential and dominant as Facebook is today. Read 47 remaining paragraphs | Comments

See more here:
The fall… and rise and rise and rise of chat networks

Warning: Bug in Adobe Creative Cloud deletes Mac user data without warning

Enlarge (credit: Backblaze) Adobe Systems has stopped distributing a recently issued update to its Creative Cloud graphics service amid reports a Mac version can delete important user data without warning or permission. The deletions happen whenever Mac users log in to the Adobe service after the update has been installed, according to officials from Backblaze , a data backup service whose users are being disproportionately inconvenienced by the bug. Upon sign in, a script activated by Creative Cloud deletes the contents in the alphabetically first folder in a Mac’s root directory. Backblaze users are being especially hit by the bug because the backup service relies on data stored in a hidden root folder called .bzvol. Because the folder is the alphabetically top-most hidden folder at the root of so many users’ drives, they are affected more than users of many other software packages. “This caused a lot of our customers to freak out,” Backblaze Marketing Manager Yev Pusin wrote in an e-mail. “The reason we saw a huge uptick from our customers is because Backblaze’s .bzvol is higher up the alphabet. We tested it again by creating a hidden file with an ‘.a’ name, and the files inside were removed as well.” Read 5 remaining paragraphs | Comments

Read the original:
Warning: Bug in Adobe Creative Cloud deletes Mac user data without warning

IRS website attack nets e-filing credentials for 101,000 taxpayers

The US Internal Revenue Service was the target of a malware attack that netted electronic tax-return credentials for 101,000 social security numbers, the agency disclosed Tuesday. Identity thieves made the haul by using taxpayers’ personal data that was stolen from a source outside the IRS, according to a statement . The attackers then used an automated bot against an application on the IRS website that provides personal identification numbers for the electronic filing of tax returns. In all, the hackers made unauthorized queries against 464,000 social security numbers but succeeded against only 101,000 of them. No personal information was obtained from the IRS systems. Agency officials are flagging the accounts of all affected taxpayers and plan to notify them by mail of the incident. The IRS is also working with other government agencies and industry partners to investigate the hack or stem its effects. The hack occurred last month. Read 3 remaining paragraphs | Comments

Read More:
IRS website attack nets e-filing credentials for 101,000 taxpayers

Teen sues TV station for $1M over unauthorized broadcast of his genitals

(credit: NURV.com ) A South Carolina teenager has sued a Colorado television station over allegations the station broadcasted a picture of his erect penis taken from a cell phone video uploaded to YouTube. The case, known as Holden v. KOAA , asks for $1 million in damages and accuses the station, its reporter, its parent companies (NBC and Comcast), and other defendants of violating federal child pornography laws, invasion of privacy and negligence, and other allegations. According to the lawsuit , the teen was 14 years old and living in Colorado at the time of the incident. (The incident occurred two years ago, but Ars will not name the individual as he is still a minor.) The cell phone video had been taken of the teen and put online as a way to blackmail him. His father’s girlfriend, Heather Richardson, soon contacted the KOAA TV station to let them know about the situation. KOAA sent a local reporter, Matthew Prichard, to the family’s home in Pueblo, Colorado, where Prichard interviewed the boy and filmed the offending material. The suit claims that the boy’s father specifically told Prichard to keep his son’s name out of the report. Read 7 remaining paragraphs | Comments

Read the original post:
Teen sues TV station for $1M over unauthorized broadcast of his genitals

Israel’s electric grid hit by “severe” hack attack

Israel experienced a serious hack attack on its electrical grid that officials are still working to repel, the head of the country’s energy minister said Tuesday. “The virus was already identified and the right software was already prepared to neutralize it,” Israeli Energy Minister Yuval Steinitz told attendees of a computer security conference in Tel Aviv, according to this article published Tuesday by The Times of Israel . “We had to paralyze many of the computers of the Israeli Electricity Authority. We are handling the situation and I hope that soon, this very serious event will be over … but as of now, computer systems are still not working as they should.” The “severe” attack was detected on Monday as temperatures in Jerusalem dipped to below freezing, creating two days of record-breaking electricity consumption, according to The Jerusalem Post . Steinitz said it was one of the biggest computer-based attacks Israel’s power infrastructure has experienced, and that it was responded to by members of his ministry and the country’s National Cyber Bureau. The energy minister didn’t identify any suspects behind the attack or provide details about how it was carried out. Read 2 remaining paragraphs | Comments

Read More:
Israel’s electric grid hit by “severe” hack attack

Why the calorie is broken

(credit: Getty Images) Calories consumed minus calories burned—it’s the simple formula for weight loss or gain, but dieters often find that it doesn’t work. Cynthia Graber and Nicola Twilley of Gastropod investigate for Mosaic science , where this story first appeared . It’s republished here under a Creative Commons license. “For me, a calorie is a unit of measurement that’s a real pain in the rear.” Bo Nash is 38. He lives in Arlington, Texas, where he’s a technology director for a textbook publisher. He has a wife and child. And he’s 5’10” and 245 lbs—which means he is classed as obese. Read 44 remaining paragraphs | Comments

Follow this link:
Why the calorie is broken

After FBI briefly ran Tor-hidden child-porn site, investigations went global

(credit: Andrew ) In 2015, the FBI seized a Tor-hidden child-porn website known as Playpen and allowed it to run for 13 days so that the FBI could deploy malware in order to identify and prosecute the website’s users. That malware, known in FBI-speak as a “network investigative technique,” was authorized by a federal court in Virginia in February 2015. In a new revelation, Vice Motherboard has now determined that this operation had much wider berth. The FBI’s Playpen operation was effectively transformed into a global one, reaching Turkey, Colombia, and Greece, among others. Motherboard’s Joseph Cox wrote on Twitter on Friday that he was able to find a document describing this infiltration as something called “Operation Pacifier” by using creative “Google-fu.” Read 11 remaining paragraphs | Comments

Read the article:
After FBI briefly ran Tor-hidden child-porn site, investigations went global