Vulnerabilities in WhatsApp Web affect 200 million users globally

Found on Net Security on Tuesday, 08 September 2015
Browse Internet

Check Point security researcher Kasif Dekel found that to exploit the vulnerability, an attacker simply needs to send a WhatsApp user a seemingly innocent vCard contact card, containing malicious code. Once opened in WhatsApp Web, the executable file in the contact card can run, further compromising computers by distributing malware including ransomware, bots, remote access tools (RATs), and other types of malicious code.

Starting executables from unknown and random sources should have stopped a decade ago already.

Files on Seagate wireless disks can be poisoned, purloined – thanks to hidden login

Found on The Register on Monday, 07 September 2015
Browse Hardware

CERT.org has reported Seagate wireless hard drives include “undocumented Telnet services” accessible with a hard-coded password. This allows “unrestricted file download capability to anonymous attackers with wireless access to the device.”

The three flaws present in the device mean that anyone on your network – or who can reach it from the outside – armed with the default password of "root" and enough savvy to try the username “root” can download the entire contents of the Seagate devices, then upload malware into them.

That's why you want dumb devices. With all that zeroconf hardware that just "magically works" you add extra security issues to your network; and not all the issues are even known yet.

Authorities investigating if wanted son of “El Chapo” Guzmán, world’s most wanted drug lord, is in Costa Rica

Found on ICR News on Sunday, 06 September 2015
Browse Legal-Issues

Jesús Alfredo Guzmán Salazar, 29, who is also wanted by the US Drug Enforcement Administration (DEA), posted a tweet to the social networking site, Twitter on Monday that may have inadvertently revealed his presence in Costa Rica. The social networking app, when used from a smartphone, pins a user’s location to each tweet, unless the feature is turned off.

That's the problem with technology. If you grow up with it these days, everything is so normal and nobody really thinks about what is really going on in the background.

In a dark corner of the Trans-Pacific Partnership lurks some pretty nasty copyright law

Found on The Washington Post on Saturday, 05 September 2015
Browse Legal-Issues

Any provision of U.S. law that eliminated “pre-established damage” or “additional damages” for any class of works could be a violation of various TPP provisions requiring that such damages be made available, and it even appears that distribution of orphan works would have to subject the distributor to criminal copyright liability.

These (and other — poke around at the KEI site for more evidence) copyright provisions in the TPP are pretty dreadful and continue the disturbing trend of making copyright bigger, longer and stronger just when public policy demands the opposite.

The TPP itself is pretty nasty. Unless the full text is released to the public, you just have to assume that most of it will not make the average citizen happy. Otherwise there would be no reason whatsoever to hide it from the people. You don't sign a contract you have never read.

FTC gives FBI the finger over govt backdoor encryption demands

Found on The Register on Friday, 04 September 2015
Browse Various

Following a blog post last month by the regulator's CTO in which he outlined why he was glad to have strong firmware encryption after his laptop was stolen, today FTC Commissioner Terrell McSweeny has also outlined why encryption is a good thing – and carefully suggests that introducing a way to undermine it may not be such a great idea.

"Encryption and end-user protections can raise issues of access for law enforcement," McSweeney notes. "Some argue that data storage and communications systems should be designed with exceptional access – or 'back doors' – for law enforcement in order to avoid harming legitimate investigative capabilities. However, many technologists contend that exceptional access systems are likely to introduce security flaws and vulnerabilities, weakening the security of products."

Not that a legal requirement for backdoors would actually help much. Then the software just gets developed in countries where it is safe to work on secure encryption.

Hackers could use baby monitors to watch your kids too

Found on CNet News on Thursday, 03 September 2015
Browse Technology

Experts said the flaws are one more example of the lack of security in the realm of gadgets that can communicate with the Internet, a trend known as the "Internet of Things." Whether it's a smart thermostat or a connected refrigerator, the devices are landing on store shelves without standardized security controls, potentially putting customers at risk, experts say.

Maybe the companies should be held responsible if it turns out that they have neglected basic security measures. With the IoT growing, these issues will get more and more common.

Jimmy Kimmel says gamers want him to get AIDS and die

Found on CNet News on Wednesday, 02 September 2015
Browse Various

He described watching gamers game as being akin to going to a restaurant and having someone eat your food for you. This, however, was manna to the many, many sensitive gamers in the world.

A sightly perplexed Kimmel took to his show on Monday night to muse about this section of humanity. He offered a selection of messages he'd received.

The simple, to-the-nasty-point "Get cancer," for example. Another wished him brain cancer. Yet another said he hoped Kimmel would get AIDS.

Indeed, people who enjoy to watch others playing games are really very awkward and should be the center of public mockery and ridicule. For example, those who watch football, baseball, basketball or soccer. Why aren't they playing those games instead of just watching them?

Could diesel made from air help tackle climate change?

Found on BBC News on Tuesday, 01 September 2015
Browse Science

The chemistry to make fuel from CO2 isn't especially hard - split water into hydrogen and oxygen through electrolysis, add the hydrogen to CO2 to make carbon monoxide and water, then bung in more hydrogen to build up hydrocarbon chains.

But a lot depends on government policy. The actual price of the fuel can be as low as 30% of what we pay at the pump - the rest of the cost is made up of fuel duty, VAT, and the retailer's profit margin.

But it's the cost of electricity that could make or break e-diesel's commercial viability, because the process requires a lot of energy.

Even with just an efficiency of 13% it is useful. Currently storing excess electricty is still a problem, but diesel can be easily transported and stored for long times. So if you create the electricity where it most efficient, for example in a desert, those 13% can be quite profitable.

65 per cent of Europe’s electronic waste is stolen or mismanaged

Found on New Scientist on Monday, 31 August 2015
Browse Various

Something stinks about Europe’s trash. A two-year investigation into Europe’s electronic waste found that most of it is stolen, mismanaged, illegally traded, or just plain thrown away.

Criminals absconded out of Europe with 1.3 million tonnes of undocumented equipment, such as laptops, circuit boards, or refrigerators. The loss of functional components or the precious metals inside cost the European Union up to 1.7 billion euros each year, say the researchers.

Of they just don't want to control it correctly because the current disposal method is too convenient.

How Apache Spark Is Transforming Big Data Processing, Development

Found on eWEEK on Sunday, 30 August 2015
Browse Software

Apache Spark is an open source data processing engine built for speed, ease of use and sophisticated analytics. Spark is designed to perform both batch processing and new workloads like streaming, interactive queries, and machine learning.

“One of the things is it improved on what was out there in two dimensions at the same time," he said. “So it was both a lot faster—like 10 to 100 times faster—and a lot quicker to program with and easier to use. So you could write 10 times less code. It’s very uncommon that you have something that’s better in both dimensions," he said.

Sometimes it makes you wonder if all that hype about "big data" is just an indirect way to admit that too much data gets collected.