Target's data breach: Yes, it gets worse
There appears to be no end in sight for just how bad the unprecedented hack attack at Target was last holiday season.
Now Reuters is reporting that cyberintelligence firm IntelCrawler has unearthed evidence pointing toward at least six ongoing schemes at U.S. merchants with credit card processing systems plagued by the same type of malicious software.
According to IntelCrawler's sources, the malware has been tested out and infected point-of-sale hardware across Australia and Canada as well as the United States.
President Obama Surpasses Exceptionally Low Expectations On NSA Reforms, But Reforms Are Still Very Weak
Similar to the original task force report, for which the White House first leaked claims that the recommended changes would be "cosmetic"... and then presented something a little more powerful, to try to win people over by beating low expectations.
Bulk data collection will still continue in some form, despite the fact that it appears that bulk data collection is rarely useful, compared to targeted surveillance. There will be slightly more oversight, despite the fact that oversight in the past has failed. There will be no effort to stop trying to compromise the technology of American (and foreign) companies leading to serious questions about our tech industry's ability to do business overseas (and at home).
Man Jailed For Refusing To Reveal USB Password
A man has received an extra four months in jail after he failed to reveal the password for a USB stick the police and GCHQ were unable to crack.
He received additional time inside for not providing assistance on the US password, which he eventually revealed as “$ur4ht4ub4h8″, which related to a chapter in the Koran.
Patent Troll Sues The FTC, Saying It Has A First Amendment Right To Shake Down Companies Using A Scanner
MPHJ had become one of the poster children for extreme patent trolls abusing the system, and various states had begun suing the company for threatening local businesses. In fact, just today, NY apparently settled with MPHJ -- and revealed that MPHJ acquired its five patents for... $1.
MPHJ argues that it has a first amendment right to shake down companies for money. It's going to have a very difficult time supporting that argument. It seems unlikely that MPHJ's case will get very far.
Windows 9 Needs to Be Free: 10 Reasons Why
According to WinSuperSite's Paul Thurrott, the operating system, currently code-named "Threshold," predictably will be called Windows 9.
If it launches on time, Microsoft should make a very un-Microsoft move that will shock some, excite others and potentially cause panic among its investors: turn Windows free. The time has come for Microsoft to stop licensing the software to OEMs and finally offer it at no charge to its PC partners and consumers.
Do NSA's Bulk Surveillance Programs Stop Terrorists?
An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal.
The controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases.
Girl wants a dragon, so scientists make one
Young Sophie Lester wrote a letter to CSIRO scientists in hopes of getting a dragon of her very own, and in the process charmed them with her request.
Their apology to Sophie went viral and ended up on so many blogs that CSIRO decided to take its appreciation of the little girl's letter a step further, by making her a dragon with the aid of a 3D printer.
Toothless is currently on her way to Sophie Lester's home, now proving that scientists can truly create anything -- even dragons for little girls.
Flaws Plague Leading Mobile Banking Apps
An alarming percentage of mobile banking applications for iOS fail to implement basic protections that would safeguard against man-in-the-middle attacks, session hijacking, memory corruption, and credential theft.
Sanchez said 90 percent of the applications he looked at sent users to a number of links that were not encrypted with SSL, while close to half of the apps did not validate the SSL certificates presented, putting customers at risk to man-in-the-middle attacks where an attacker could inject malicious javascript or HTML code as part of a phishing scam, for example.
High-end CNC machines can't be moved without manufacturers' permission
The person who started the thread owns the machine outright, but has discovered that if he moves it at all, a GPS and gyro sensor package in the machine automatically shuts it down and will not allow it to restart until they receive a manufacturer's unlock code.
Security Experts Call For Boycott of RSA Conference In NSA Protest
Last month, it was revealed that RSA had accepted $10 million from the NSA to use a flawed default cipher in one of its encryption tools.
Jeffrey Carr, a security industry veteran who works in analyzing espionage and cyber warfare tactics, took his cancellation a step further calling for a boycott of the conference, saying that RSA had violated the trust of its customers.