Greece debt crisis: Eurozone 'sceptical' of reform pledge

Found on BBC News on Saturday, 11 July 2015
Browse Politics

Several ministers arrived for their crunch meeting in Brussels expressing scepticism that Athens would implement the austerity measures it has proposed.

One unnamed European official, quoted by the Associated Press, said there was a general feeling in the room that the Greek proposals are "too little, too late" and as such "more specific and binding commitments" are needed from the government in Athens.

Sceptical is a mild way to put it. In the past 5 years, Greece should have grown to an impressive economical power if all those plans would have worked. Fact is that today Greece has bigger problems than ever. Promised were made and broken, deadlines were ignored. It's not really easy to believe that suddenly everything will change, especially since the referendum favored exactly the opposite of what Tsipras is now suggesting. It should return to its Drachma; that does not mean it has to leave the EU at all. It would give Greece the air it needs to breathe again, and the EU can still help by providing food and medical support in the beginning instead of just flooding the banks with more money that will only be used to pay back existing debts.

The Massive OPM Hack Actually Hit 21 Million People

Found on Wired on Friday, 10 July 2015
Browse Internet

“The team has now concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases,” OPM wrote in the statement.

In June, after the hack was first publicly acknowledged, the government said the breach exposed the personal information of approximately four million people—and the information stolen only included data such as Social Security numbers, birth dates and addresses of current and former federal workers.

By now it should be pretty obvious that any sensitive data never should be on an Internet-facing system. If it needs to be stored electronically, use at least air-gapped systems.

Hacking Team: Oh great, good job, guys ... now the TERRORISTS have our zero-day exploits

Found on The Register on Thursday, 09 July 2015
Browse Internet

"It is now apparent that a major threat exists because of the posting by cyber criminals of Hacking Team proprietary software on the internet the night of July 6," reads a statement on the Hacking Team website.

"Before the attack, Hacking Team could control who had access to the technology which was sold exclusively to governments and government agencies. Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so. We believe this is an extremely dangerous situation."

Correction: the exploits went from one criminal to others. If HT would have really been so concerned about security, they would have reported the bugs. Instead they decided to use it for their own project which they sold to countries like Saudi Arabia, Sudan and Russia which are not exactly prime examples for freedom. They don't have the slightest moral high ground.

Catastrophic Chinese floods triggered by air pollution

Found on AAAS on Wednesday, 08 July 2015
Browse Nature

The worst flooding to hit China in 50 years was happening in Sichuan province, in the same place that had been devastated by a massive earthquake just 5 years earlier. Over the course of 5 days, 73 centimeters of rain pounded the mountains, peaking at 29 centimeters in a single day.

Geography and pollution combined to make the floods intensely severe, Fan says. And she suspects the combination is not unique. Catastrophic floods in Pakistan only a month later, she says, may have involved the same factors: heavy industry plus a mountain backdrop.

Nobody in charge there will care though. As long as the floods don't cause too much damange, they are accepted.

Hacking Team-derived Flash exploit is now in the wild hijacking PCs

Found on The Register on Wednesday, 08 July 2015
Browse Internet

It's the worst-case scenario of the Hacking Team hack: the as-yet-unpatched Flash vulnerability revealed in the trove of source code leaked from the surveillance-ware company is being exploited in the wild

Malwarebytes, which had already warned the exploit would be weaponised quickly, notes: “This is one of the fastest documented case of an immediate weaponisation in the wild, possibly thanks to the detailed instructions left by Hacking Team.”

This makes one wonder if there is any legal way to hold the Hacking Team responsible for damages caused by the exploit which they did not report to upstream to get it fixed.

ownCloud Launches Encryption 2.0 Platform

Found on eWEEK on Tuesday, 07 July 2015
Browse Software

Encryption 2.0 features a new set of encryption capabilities for EFSS security, making it possible for organizations tasked with protecting sensitive information to collaborate and share files.

The platform allows users to adopt their desired encryption standard, and even write a server app to meet their unique encryption requirements; plus, it can be delivered as an app for integration into customers' existing infrastructure.

Unless you already are an encryption specialist with an impressive mathematical background, deploying your own "encryption standard" is probably the dumbest thing you could do.

The FBI Spent $775K on Hacking Team’s Spy Tools Since 2011

Found on Wired on Monday, 06 July 2015
Browse Internet

The FBI is one of the clients who bought hacking software from the private Italian spying agency Hacking Team, which was itself the victim of a recent hack.

The FBI is not in good company here. According to several spreadsheets within the hacked archive, which contain a list of Hacking Team’s customers, many of the other governments who bought the same software are repressive regimes, such as Sudan and Bahrain.

It's in the company of those countries for an obvious reason.

Apple Music has an iCloud problem

Found on The Verge on Sunday, 05 July 2015
Browse Software

There's one fundamental problem with Apple Music that's crippling its potential for me and keeping it from becoming my one and only music destination — exactly the thing Apple wants it to be.

iTunes Match has been one of Apple's more flawed cloud services for a few years now. Ever since it rolled out, users have complained about several key things.

A troubling report today from Kirk McElhearn claims that Apple is applying DRM to every track contained in iCloud Music Library — even your own songs. So if you upload regular old MP3s to iCloud, delete them from your PC or Mac and then redownload, they'll be DRMed files.

Just don't use it. Simple as that.

FBI Wants Pirate Bay Logs to Expose Copyright Trolls

Found on TorrentFreak on Saturday, 04 July 2015
Browse Legal-Issues

The crucial evidence to back up this allegation came from The Pirate Bay, who shared upload logs with TorrentFreak that tied a user account and uploads to Prenda and its boss John Steele.

In any case, today’s revelations show that Prenda is in serious trouble. The same copyright trolls who abused The Pirate Bay to trap pirates, may also face their demise thanks to the very same site.

Wasn't there the claim that TPB does not log anything concerning its users?

MasterCard will approve purchases by scanning your face

Found on CNN on Friday, 03 July 2015
Browse Various

"The new generation, which is into selfies ... I think they'll find it cool. They'll embrace it," said Ajay Bhalla, who's in charge of coming up with innovative solutions for MasterCard's security challenges.

If you go with facial recognition, you stare at the phone -- blink once -- and you're done. MasterCard's security researchers decided blinking is the best way to prevent a thief from just holding up a picture of you and fooling the system.

So you hold up a picture, with the eyes cut out and move a skin-colored paper with the eyes glued onto it behind it. Pretty close to blinking. Just because it is "cool" it is not a good idea. Especially not for financial transactions.