Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Found on Net Security on Wednesday, 22 October 2014
Browse Software

The vulnerability is currently being exploited via PowerPoint files. These specially crafted files contain a malicious OLE (Object Linking and Embedding) object.

Microsoft is still investigating the matter and deciding whether they will issue an out-of-band patch or wait for the next Patch Tuesday to plug the hole.

It's 2014 and people are still using Powerpoint?

EU pesticide bans 'could hit UK crops'

Found on BBC on Tuesday, 21 October 2014
Browse Nature

The EU's decision to ban the use of some pesticides could threaten UK crops, increase food prices and hit farmers' profits, a report has claimed.

It said this could lead to a surge in pests, affecting production of apples, carrots and peas, among other crops.

The ongoing use of pesticides kills e.g. bees, what in turn lowers production too and has a much bigger impact on nature in general.

Debian's Systemd Adoption Inspires Threat of Fork

Found on Slashdot on Monday, 20 October 2014
Browse Software

They claim that "systemd betrays the UNIX philosophy"; it makes things more complex, thus breaking the "do one thing and do it well" principle.

"We contemplate adopting more recent alternatives to sysvinit, but not those undermining the basic design principles of "do one thing and do it well" with a complex collection of dozens of tightly coupled binaries and opaque logs."

Systemd is the worst that can happen to Linux; coming from "developers" who are well known for ignoring bugs in their code and calling on others to fix it on their side instead. If Lennart and Kay want systemd, they can just fork a distro, implement it and see who wants to use that mess. Unfortunately, thanks to their ties to Redhat, they can instead shove their horrendous bloatware down the throats of everybody.

Whisper chief: 'We're not infallible but strive to do right by our anonymous users'

Found on The Register on Sunday, 19 October 2014
Browse Internet

Whisper is not a place for illegal activity. If we receive a valid legal request, or we learn that you tried to use Whisper to post content that exposes imminent danger to yourself or others, we will share the limited information we have, including IP address, with the appropriate authorities.

To cite another example, if a user claims to be a health care professional concerned about Ebola, we may review their recent posts to help assess the authenticity of the Whisper before featuring it.

"Strive to do it right"? Not at all. Whisper is a tool every dictator would be proud of. There is no anonymity because they have your location (and it wouldn't be surprising if they can just get all the details like your phone number too). Even worse, they read your messages, so there is no security involved either; they even outsource the screening and actively snoop through your history. Whisper essentially is a new Stasi.

Revealed: how Whisper app tracks ‘anonymous’ users

Found on The Guardian on Saturday, 18 October 2014
Browse Internet

The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed.

But on Monday – four days after learning the Guardian intended to publish this story – Whisper rewrote its terms of service; they now explicitly permit the company to establish the broad location of people who have disabled the app’s geolocation feature.

User data, including Whisper postings that users believe they have deleted, is collated in a searchable database.

Whisper has an offshore base in the Philippines, where more than 100 employees screen messages 24 hours a day.

So much for that project. If you use it, delete it. There's not even end to end encryption of your messages. It's more a threat to your privacy, than a tool to protect it.

FBI Director Ignores 4th Amendment in Call for Encryption 'Back Doors'

Found on eWEEK on Friday, 17 October 2014
Browse Various

FBI Director James Comey upped the ante on Oct. 16 by proposing that Congress change the law it passed about 20 years ago, titled the Communications Assistance for Law Enforcement Act, which gives law enforcement access to electronic communications.

The FBI wants to change all that by requiring companies such as Apple and Google to provide back doors so that law enforcement can read whatever is on your smartphone at its convenience.

Swedish Company Uses Corporate Sovereignty Clause To Demand 4.7 Billion Euros From German Public

Found on Techdirt on Thursday, 16 October 2014
Browse Legal-Issues

The rumored figure we mentioned then was the already-generous €3.7 billion; but it has just been revealed that Vattenfall is actually demanding even more -- €4.7 billion, to be precise.

Two other energy companies, RWE and E.on, are unable to sue in the same way as Vattenfall, because they are German companies, and the ISDS option is only available to foreign investors.

RWE and E.on are also trying to sue in Germany's national courts in order to obtain compensation, as Vattenfall is doing with the ISDS tribunals

Remember how the politicians tried to ignore complains about ISDS clause in TTIP/CETA, calling it a "pro forma" clause with no real value. Right now, they have the right to sue, so let's see the results. If they win the case, they can have those 4.7 billion, along with a really long train full of atomic waste so they can look for a permanent storage site. In the end, that might actually be the cheapest solution.

Amazon: Monopoly or capitalist success story?

Found on BBC News on Wednesday, 15 October 2014
Browse Various

After the company tried to level the pricing of e-books across the board to $9.99 (£6.28), Hachette, backed up by authors such as JK Rowling, Malcolm Gladwell and James Patterson, objected.

Amazon squeezed the publisher by delaying delivery of its books - sometimes by weeks.

"In its pursuit of bigness, Amazon has left a trail of destruction - competitors undercut, suppliers squeezed - some of it necessary, and some of it highly worrisome," he writes.

It's easy to point at Amazon and say that it is too big and abuses its market position. it is too big for a reason: customers use it. So when you complain about Amazon, ask yourself first how much you are buying there.

Linksys wants to make network switches “cool” and more expensive

Found on Ars Technica on Tuesday, 14 October 2014
Browse Hardware

"It Looks so Cool!" Linksys's public relations squad informed us in an e-mail, which also said the switch saves space by stacking beneath the $250 WRT1900AC router.

“This 8-Port Switch was designed and developed for our loyal WRT router fans," Linksys VP Mike Chen said in the company's announcement.

Seriously, who looks at a switch all day long, or places it in a spot where design is a requirement? Switches vanish under desks or behind boxes and catch dust while doing the job unnoticed.

ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online

Found on Techdirt on Monday, 13 October 2014
Browse Internet

The filing comes from VPN company Golden Frog and discusses "two recent examples that show that users are not receiving the open, neutral, and uninterrupted service to which the Commission says they are entitled."

This broadband provider is overwriting the content of users’ communications and actively blocking STARTTLS encryption. This is a man-in-the-middle attack that prevents customers from using the applications of their choosing and directly prevents users from protecting their privacy.

So if you use this provider and your e-mail account gets hacked because someone sniffed your password and sends out tons of spam, can you sue the provider for blocking you from using a security feature? An ISP should only provide access, without any limitations or regulations. If they suffer from problems because of over-advertising what they are able to provide, well, tough luck.