Skip to main content

Home/ Indie Nation/ Group items tagged 2014

Rss Feed Group items tagged

John Lemke

Google launches the Android-based Open Automotive Alliance with Audi, Honda, GM, and mo... - 0 views

  • GM, Honda, Audi, Hyundai, and chipmaker Nvidia, and will focus on bringing the successful mobile operating system to in-car entertainment systems
  • planned for launch by the end of 2014.
  • Sync system found in Fords is based on Microsoft technology
  • ...1 more annotation...
  • Car companies don't appear to be choosing just one partner either — Honda is already involved in Apple's efforts, while, Chevrolet, a division of Google's newly announced partner GM, recently demonstrated an app store and in-car interface for its 2015 lineup.
John Lemke

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
John Lemke

Amazon said to be negotiating Prime streaming music service | The Verge - 0 views

  • Last year, we reported that Amazon was talking to the labels about an on-demand music service, and Recode has essentially confirmed that a dialog is ongoing.
  • At this point, the novelty of music streaming services has largely worn off, but Amazon's business approach could prove interesting. Just as it does with movies and TV shows, the company would likely include music streaming as part your Amazon Prime subscription. And while all of that content may seem like a lot when you factor in Prime's $79 fee, Amazon has recently said it's considering upping the annual cost by as much as $40. Having both music and video at your fingertips could help make a price hike easier to swallow.
John Lemke

NSA moves from bugging German Chancellor to bugging German ministers | Ars Technica - 0 views

  • Still, that moratorium on spying didn't extend beyond those world leaders, and Reuters, translating from the BamS source, writes that the source said, “We have had the order not to miss out on any information now that we are no longer able to monitor the chancellor's communication directly.” Specifically, Interior Minister Thomas de Maiziere, one of Merkel's confidants, was called out as being a target of the NSA's increased spying efforts.
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

Shellshock: Code injection vulnerability found in Bash | LIVE HACKING - 0 views

  • A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, then the vulnerability will allow remote code execution.
  • The problem is that Bash does not stop after processing the function definition; it continues to parse and execute any shell commands following the function definition
  • The vulnerability is deemed as critical because Bash is used widely on many types of UNIX-like operating systems including Linux, BSD, and Mac OS X.
  • ...1 more annotation...
  • The most prominent attack vector is via HTTP requests sent to CGI scripts executed by Bash. Also, if SSH has been configured to allow remote users to run a set of restricted commands, like rsync or git, this bug means that an attacker can use SSH to execute any command and not just the restricted command.
John Lemke

Colliding Atmospheres: Mars vs Comet Siding Spring - NASA Science - 0 views

  • "We hope to witness two atmospheres colliding," explains David Brain of the University of Colorado's Laboratory for Atmospheric and Space Physics (LASP).  "This is a once in a lifetime event!"
  • Everyone knows that planets have atmospheres.  Lesser known is that comets do, too.  The atmosphere of a comet, called its "coma," is made of gas and dust that spew out of the sun-warmed nucleus.  The atmosphere of a typical comet is wider than Jupiter.
  • The timing could scarcely be better.  Just last year, NASA launched a spacecraft named MAVEN to study the upper atmosphere of Mars, and it will be arriving in Sept. 2014 barely a month before the comet. MAVEN is on a mission to solve a longstanding mystery: What happened to the atmosphere of Mars?  Billions of years ago, Mars had a substantial atmosphere that blanketed the planet, keeping Mars warm and sustaining liquid water on its surface. Today, only a wispy shroud of CO2 remains, and the planet below is colder and dryer than any desert on Earth. Theories for this planetary catastrophe center on erosion of the atmosphere by solar wind.
  • ...1 more annotation...
  • the comet could spark Martian auroras.
John Lemke

Scientists May Have Decoded One of the Secrets to Superconductors | Science | WIRED - 0 views

  • “In the same way that a laser is a hell of a lot more powerful than a light bulb, room-temperature superconductivity would completely change how you transport electricity and enable new ways of using electricity,” said Louis Taillefer, a professor of physics at the University of Sherbrooke in Quebec.
  • ripples of electrons inside the superconductors that are called charge density waves. The fine-grained structure of the waves, reported in two new papers by independent groups of researchers, suggests that they may be driven by the same force as superconductivity. Davis and his colleagues directly visualized the waves in a study posted online in April, corroborating indirect evidence reported in February by a team led by Riccardo Comin, a postdoctoral fellow at the University of Toronto.
  • Taken together, the various findings are at last starting to build a comprehensive picture of the physics behind high-temperature superconductivity. “This is the first time I feel like we’re making real progress,” said Andrea Damascelli, a professor of physics at the University of British Columbia who led two recent studies on charge density waves. “A lot of different observations which have been made over decades did not make sense with each other, and now they do.”
  • ...4 more annotations...
  • The community remained divided until 2012, when two groups using a technique called resonant X-ray scattering managed to detect charge density waves deep inside cuprates, cementing the importance of the waves. As the groups published their findings in Science and Nature Physics, two new collaborations formed, one led by Damascelli and the other by Ali Yazdani of Princeton University, with plans to characterize the waves even more thoroughly. Finishing in a dead heat, the rival groups’ independent studies appeared together in Science in January 2014. They confirmed that charge density waves are a ubiquitous phenomenon in cuprates and that they strenuously oppose superconductivity, prevailing as the temperature rises.
  • y applying Sachdev’s algorithm to a new round of data, Davis and his group mapped out the structure of the charge density waves, showing that the d-wave distribution of electrons was, indeed, their source.
  • The waves’ structure is particularly suggestive, researchers say, because superconducting pairs of electrons also have a d-wave configuration. It’s as if both arrangements of electrons were cast from the same mold. “Until a few months ago my thought was, OK, you have charge density waves, who cares? What’s the relevance to the high-temperature superconductivity?” Damascelli said. “This tells me these phenomena feed off the same interaction.”
  • In short, antiferromagnetism could generate the d-wave patterns of both superconductivity and its rival, charge density waves.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Curiosity rover reaches long-term goal: a massive Martian mountain | The Verge - 0 views

  • NASA recently announced that the rover has arrived at the base of Mount Sharp, a 3.4-mile-high mountain that Curiosity has been heading towards since July of 2013.
  • Curiosity was designed to travel a maximum of 660 feet per day and navigate difficult terrain on its six wheels. The Spirit rover traveled only 4.8 miles over its lifespan, although the still-active Opportunity rover has logged about 25 miles since 2003. Curiosity's path was rerouted earlier this year after scientists found that sharp rocks were poking holes in its wheels.
John Lemke

Cops Seize Car When Told To Get A Warrant, Tell Owner That's What He Gets For 'Exercisi... - 0 views

  • Officer Hatch spent most of his time trying to talk Zullo into allowing him to search the vehicle without a warrant. Hatch seemed to be convinced that Zullo was involved with the heroin traffickers he was searching for. Hatch tried everything, including lying.
  • As the officers and Zullo waited for the tow truck, they continued to try to get his permission for a search. Zullo held firm, so the cops ditched him miles from home in 20-degree weather. Mr. Zullo asked Hatch if he could retrieve his money and cell phone from his car, because he did not know how he would get home without either item. Hatch refused, saying that getting home was “not my problem,” and warned Mr. Zullo that if he attempted to retrieve those items from the car he would be arrested. When Mr. Zullo walked towards his car, Hatch placed his hands on Mr. Zullo to restrain him from reaching the car. After the tow truck arrived and took Mr. Zullo’s car, Hatch and the second state trooper left the scene, leaving Mr. Zullo stranded on the side of Route 7.
    • John Lemke
       
      They stranded him.
  • ...2 more annotations...
  • After being seized, Zullo's car was searched by Officer Hatch using an actual drug dog and an actual warrant [pdf link]. Nothing illegal was uncovered.
    • John Lemke
       
      They found nothing other than a possible civil charge.
  • Both the drug angle and the registration sticker angle dead end into a search and seizure based on non-criminal actions. The state does have an out (one that will likely be deployed in its defense against Zully's lawsuit) that still allows law enforcement to search for marijuana, even if what's discovered isn't a criminal amount.
John Lemke

Google has poached an expert scientist to build a quantum computer | The Verge - 0 views

  • the next step in computing technology
  • But the technology took a hit earlier this year when tests on the world's first commercially available quantum computer — the D-Wave 2, priced at around $15 million — appeared to show that it was no faster than a standard computer.
John Lemke

Daft Punk wins Album of the Year at the Grammys | The Verge - 0 views

  •  
    Nice
John Lemke

Little red lawsuit: Prince sues 22 people for pirating his songs | The Verge - 0 views

  • The case, filed as Prince v. Chodera in the Northern District of California, reads, "The Defendants in this case engage in massive infringement and bootlegging of Prince's material." Only two defendants are named in the suit, however — the rest are listed as John Does, though eight do have the distinction of being regarded by their online handles. Nevertheless, Prince, based on "information and belief," alleges that each of the individuals worked together on Facebook and Blogger to conduct infringing activity, and lists extensively the mirror sites and blogs each used to distribute copies of his work. He has thus demanded $1 million with interest in damages from each of the defendants, along with a permanent injunction to prevent all of them from doing further harm.
John Lemke

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Ars Technica - 0 views

  • takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.
  • The botnet is designed to conduct distributed denial-of-service attacks on targets of the attackers' choice. Commands issued in the IRC channel allow the attackers to specify the IP address, port number, intensity, and duration of attacks.
1 - 20 of 115 Next › Last »
Showing 20 items per page