North Korean defector to airdrop DVD, USB copies of The Interview

A well-known North Korean defector has announced that he will launch 100,000 DVDs and USB sticks with copies of The Interview as part of his regularly scheduled balloon launches into the Hermit Kingdom. Sony Pictures pulled the theatrical release of the film in the wake of hacks against its corporate networks . In an interview with the Associated Press on Wednesday, Park Sang-hak said that his next launch is planned for late January and will be in partnership with the Human Rights Foundation, which did not immediately respond to Ars’ request for comment. “North Korea’s absolute leadership will crumble if the idolization of leader Kim breaks down,” Park told the AP, which noted that the dispatched versions will have Korean subtitles. Read 6 remaining paragraphs | Comments

Read the original:
North Korean defector to airdrop DVD, USB copies of The Interview

Comcast just upped its cable modem rental fee from $8 to $10 per month

Comcast users in various parts of the country have already gotten (or may soon get) a lovely holiday present from their ISP—a seemingly inexplicable increase in the cable modem rental fee, from $8 to $10 per month. Eric Studley, of Boston, who posts on reddit as Slayer0606, first pointed out the increase on Tuesday. After reading Studley’s post, Ars encouraged readers who rent Comcast modems to check their bills and found that the increases seem to have taken place as far back as October 2014, while others took effect as of December 20, 2014 and January 1, 2015. The company did not immediately respond to Ars’ request for comment. Read 18 remaining paragraphs | Comments

View article:
Comcast just upped its cable modem rental fee from $8 to $10 per month

HP sells Palm trademarks; brand could be resurrected with new smartphones

Palm, the legendary smartphone and PDA company, might seem dead and gone, but it’s now looking like the name “Palm” will rise again as a zombie brand. For a quick refresher:  HP bought Palm for $1.2 billion in 2010. HP killed the Palm brand after about a year of ownership and stopped making WebOS devices entirely about a year-and-a-half after the acquisition. Since then, Palm has been pretty dead. Lately, though, the brand has started to stir. The diehards over at WebOS Nation have been keeping a close eye on  Palm.com , which recently stopped redirecting nostalgic visitors to hpwebos.com  and started sending people to mynewpalm.com . The page shows a looping video of a Palm logo along with the text “Coming Soon” and “Smart Move.” No one was sure who was behind the site resuscitation until this document was found, which shows the transfer of the Palm trademark from Palm, Inc (still a subsidiary of HP) to a company called Wide Progress Global Limited. Wide Progress Global Limited doesn’t seem to be a company with any kind of real purpose—it’s just a shell meant to hide the true buyer. The person signing the paperwork for Wide Progress Global Limited is Nicolas Zibell, who also  just happens to hold the title “President Americas and Pacific” at Alcatel One Touch. Couple that with the fact that the “Smart Move”—the text that appears on the new Palm site—is Alcatel One Touch’s slogan, and it’s pretty clear that Alcatel One Touch bought the Palm brand. Read 3 remaining paragraphs | Comments

Visit site:
HP sells Palm trademarks; brand could be resurrected with new smartphones

Apple automatically patches Macs to fix severe NTP security flaw

Most OS X security updates are issued alongside other fixes via the Software Update mechanism, and these require some kind of user interaction to install—you’ve either got to approve them manually or tell your Mac to install them automatically. Apple does have the ability to quietly and automatically patch systems if it needs to, however, and it has exercised that ability for the first time to patch a critical flaw in the Network Time Protocol (NTP) used to keep the system clock in sync. This security hole became public knowledge late last week . When exploited, the NTP flaw can cause buffer overflows that allow remote attackers to execute code on your system. If you allow your system to “install system data files and security updates” automatically (checked by default), you’ve probably already gotten the update and seen the notification above. If not, Mountain Lion, Mavericks, and Yosemite users should use Software Update to download and install the update as soon as possible. The flaw may exist in Lion, Snow Leopard, and older OS X versions, but they’re old enough that Apple isn’t providing security updates for them anymore. While this was the first time this particular auto-update function has been used, Apple also automatically updates a small database of malware definitions on all Macs that keeps users from installing known-bad software. That feature, dubbed “XProtect,” was introduced in Snow Leopard in response to the Mac Defender malware and has since expanded to include several dozen items . Read on Ars Technica | Comments

Read More:
Apple automatically patches Macs to fix severe NTP security flaw

Computer intrusion inflicts massive damage on German steel factory

A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by IDG News. The attackers took control of the factory’s production network through a spear phishing campaign, IDG said, citing a report published Wednesday by the German government’s Federal Office for Information Security. Once the attackers compromised the network, individual components or possibly entire systems failed. IDG reporter Loek Essers wrote: Due to these failures, one of the plant’s blast furnaces could not be shut down in a controlled manner, which resulted in “massive damage to plant,” the BSI said, describing the technical skills of the attacker as “very advanced.” The attack involved the compromise of a variety of different internal systems and industrial components, BSI said, noting that not only was there evidence of a strong knowledge of IT security but also extended know-how of the industrial control and production process. The incident is notable because it’s one of the few computer intrusions to cause physical damage. The Stuxnet worm that targeted Iran’s uranium enrichment program has been dubbed the world’s first digital weapon, destroying an estimated 1,000 centrifuges. Last week, Bloomberg News reported that a fiery blast in 2008 that hit a Turkish oil pipeline was the result of hacking , although it’s not clear if the attackers relied on physical access to computerized controllers to pull it off. The suspected sabotage of a Siberian pipeline in 1982 is believed to have used a logic bomb. Critics have long argued that much of the world’s factories and critical infrastructure aren’t properly protected against hackers. Read on Ars Technica | Comments

Visit link:
Computer intrusion inflicts massive damage on German steel factory

T-Mobile gives up fight over cramming fees, will pay $90M back to customers

T-Mobile US has given up its fight against a lawsuit filed by the US government, agreeing  today to refund $90 million or more to customers who were charged premium text message fees without their consent. The Federal Trade Commission alleged that T-Mobile made hundreds of millions of dollars off the practice of passing along third-party charges to customers without their authorization and taking a commission on each charge. T-Mobile could end up paying much more than $90 million. “The settlement requires that they provide full refunds to consumers, with a total of ‘at least’ $90 million,” an FTC spokesperson explained. “The $90 million is a floor. If they receive refund requests of more than that, they have to provide them.” In addition to everything it pays back customers, T-Mobile will pay $18 million in fines and penalties to state attorneys general and $4.5 million to the Federal Communications Commission. If T-Mobile receives less than $90 million worth of refund requests, the extra fines can be counted toward the minimum payment of $90 million. If the payment is still under $90 million, “the balance must be remitted to the FTC for additional consumer redress, consumer education, or other uses,” the FTC said. Read 5 remaining paragraphs | Comments

Original post:
T-Mobile gives up fight over cramming fees, will pay $90M back to customers

FBI claims North Korean involvement in Sony Pictures attack

The Federal Bureau of Investigation’s Washington press office has issued an update on the investigation into the cyber attack on Sony Pictures Entertainment, including the conclusion that North Korea was behind it. “As a result of our investigation, and in close collaboration with other US government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions,” the office said in a statement. However, the information cited by the FBI’s update may not be as conclusive as many would like. Other hints at the attribution were provided to news organizations off-the-record, but the FBI’s public statements are far from definitive. Read 9 remaining paragraphs | Comments

View original post here:
FBI claims North Korean involvement in Sony Pictures attack

AnandTech snapped up by parent company of Tom’s Hardware and LaptopMag

Purch, Inc. announced  on Wednesday that it had purchased AnandTech.com, ending the site’s 17-year run as an independent publication. Purch also owns a number of other long-running technology sites, including LaptopMag (founded as Laptop Magazine in 1991), Tom’s Hardware (founded 1996), and a handful of other offshoot tech publications. Purch says the acquisition will help it “dominate the tech expert and enthusiast market.” Anand Shimpi, founder and original editor-in-chief of the site, left his post for Apple in late August. Shimpi says he is “happy to see [AnandTech] end up with a partner committed to taking good care of the brand and its readers.” Current Editor-In-Chief Ryan Smith says the site has “grown by leaps and bounds over the past several years” but that it was “nearing what’s possible as an independent company.” Smith goes on to say that Purch values AnandTech’s exhaustive hardware testing and reviews, and that Purch would enable the site to grow “without compromising the quality that made us who we are today.” Under Smith, AnandTech has continued to run reviews of individual PC components and, less frequently, complete consumer products like laptops, phones, and operating systems. While the site misses Shimpi’s voice and expertise (and that of former mobile editor Brian Klug, who also left for Apple this year), its coverage and testing procedures continue to be deep and thorough, and they will hopefully remain that way post-acquisition. Read 1 remaining paragraphs | Comments

Read More:
AnandTech snapped up by parent company of Tom’s Hardware and LaptopMag

Cops illegally nailed webcam to utility pole for 6 weeks to spy on house

A federal judge on Monday tossed evidence that was gathered by a webcam—turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer’s rural Washington state house. The Justice Department contended that the webcam, with pan-and-zoom capabilities that were operated from afar—was no different from a police officer’s observation from the public right-of-way. The government argued  (PDF): Read 6 remaining paragraphs | Comments

Continued here:
Cops illegally nailed webcam to utility pole for 6 weeks to spy on house

Feds used Adobe Flash to identify Tor users visiting child porn sites

A little more than 16 months ago, word emerged that the FBI exploited a recently patched Firefox vulnerability to unmask Tor users visiting a notorious child pornography site. It turns out that the feds had waged an even broader uncloaking campaign a year earlier by using a long-abandoned part of the open source Metasploit exploit framework to identify Tor-using suspects. According to Wired , “Operation Torpedo,” as the FBI sting operation was dubbed, targeted users of three darknet child porn sites. It came to light only after Omaha defense attorney Joseph Gross challenged the accuracy of evidence it uncovered against a Rochester, New York-based IT worker who claims he was falsely implicated in the campaign. Operation Torpedo used the Metasploit Decloaking Engine to identify careless suspects who were hiding behind Tor, a free service used by good and bad guys alike to shield their point of entry to the Internet. The Decloaking Engine went live in 2006 and used five separate methods to break anonymization systems. One method was an Adobe Flash application that initiated a direct connection with the end user, bypassing Tor protections and giving up the user’s IP address. Tor Project officials have long been aware of the vulnerability and strenuously advise against installing Flash. According to Wired: Read 1 remaining paragraphs | Comments

View article:
Feds used Adobe Flash to identify Tor users visiting child porn sites