Pow! Bam! Original Batmobile sells for $4.6 million

Found on CNet News on Monday, 21 January 2013
Browse Various

The modified 1955 Lincoln Futura concept car commanded a whopping $4.62 million selling price, taking the crown as Barrett-Jackson's highest-selling car at the annual auction.

Barris first bought it from General Motors for $1 before turning it into the iconic crime-fighting vehicle we all know and love. The original budget to transform it into Adam West's ride was just $15,000. That's a pretty decent investment considering its auction value.

Not a cheap car; hopefully it comes at least with all the bat-gadgets.

What is actually in a value burger?

Found on BBC News on Sunday, 20 January 2013
Browse Various

Tesco have used full-page adverts in national newspapers to apologise for selling burgers in the UK that were found to contain 29% horsemeat.

Writing in the Times, food critic Giles Coren bemoaned the public's lack of knowledge about what is in their food. "What on earth did you think they put in them? Prime cuts of delicious free-range, organic, rare breed, heritage beef, grass-fed, Eton-educated, humanely slaughtered, dry-aged [beef], hand-ground by fairies...?"

"You get what you pay for," wrote Felicity Lawrence in the Guardian.

"Supermarkets are battling with each other to be the cheapest, and demanding better and better deals from their suppliers.

You get what you pay for indeed. If the consumer only cares about lower prices and wants to have the by far cheapest food, nobody should be surprised if those who produce it get creative. Besides, horse meat isn't that bad: it's not Soylent Green.

Kim DotCom's 'Mega' goes live

Found on CNet News on Saturday, 19 January 2013
Browse Filesharing

"Site is extremely busy. Currently thousands of user registrations PER MINUTE." And indeed, as of this writing the site was difficult to access at times, perhaps because of heavy traffic.

DotCom's earlier cyber storage locker, MegaUpload, was launched in 2005, only to be shuttered by U.S. federal agencies, which argued that it was a service pirates were using to facilitate copyright infringement.

"You have companies like Dropbox and Google with Drive with materially similar technologies," Rothken said. "and they are in business and they're thriving -- and Mega adds encryption."

One year passed, and the US has still not made a single successful accusation; only one embarrassing failure after another came to light, showing how much influence the entertainment industry seems to have on the US political and legal systems. They picked Kimble because of his past, assuming he would make a perfect target and serve as a prime example of a piracy mastermind. Turns out they were wrong.

Latest Java Update Broken; Two New Sandbox Bypass Flaws Found

Found on Threatpost on Friday, 18 January 2013
Browse Software

“We have successfully confirmed that a complete Java security sandbox bypass can be still gained under the recent version of Java 7 Update 11,” Java security researcher Adam Gowdiak of Security Explorations in Poland wrote a short while ago on the Full Disclosure mailing list.

Since then, calls to disable or abandon Java have gotten louder. Experts argue that few websites require the Java browser plug-in at the core of so many security issues, and that users would hardly lose any functionality online without running Java.

Never installed it on my systems. Never missed anything.

USB Storage Drive Loaded With Malware Shuts Down Power Plant

Found on eWEEK on Thursday, 17 January 2013
Browse Technology

The U.S. Computer Emergency Readiness Team reports that a U.S.-based power generating facility was shut down after a contract employee introduced malware into the turbine control systems and into engineering workstations. The contractor routinely used his USB drive to perform updates on control systems as well as workstations in the power plant.

The Monitor report described the incident, saying that when the USB memory drive began to exhibit performance issues, the contractor asked the facility IT staff to check it. The check revealed two different types of malware; one type was designed to perform identity theft, and the other a type of sophisticated type of malware that ICS-CERT did not identify.

There are times when you think that critical systems have a few extra layers of security. There are also times when your assumptions are completely wrong.

US gun debate: Obama unveils gun control proposals

Found on BBC News on Wednesday, 16 January 2013
Browse Politics

US President Obama has unveiled the most sweeping gun control proposals in two decades, setting up a showdown with firearms rights advocates.

The US has one of the highest rates of civilian gun ownership in the world. The second amendment of the US constitution states that "the right of the people to keep and bear arms shall not be infringed".

Gun control in America? Good luck; that will get really interesting.

Red October relied on Java exploit to infect PCs

Found on Ars Technica on Tuesday, 15 January 2013
Browse Software

Attackers behind a massive espionage malware campaign that went undetected for five years relied in part on a vulnerability in the widely deployed Java software framework to ensnare their victims, a security researcher said.

The website exploited a critical Java vulnerability identified as CVE-2011-3544, allowing the attackers to surreptitiously execute malicious code on visitors' computers.

Java again? Really now?

'Red October' malware spies on governments worldwide

Found on CNet News on Monday, 14 January 2013
Browse Internet

On par with the memorable Flame malware, Kaspersky and a number of Cyber Emergency Response Teams (CERTs) discovered the malware -- known as Rocra or Red October -- which mostly targets institutions based in Eastern Europe, former USSR members and countries in Central Asia.

Red October does not simply focus on standard machines, but is also able to infect and steal data from mobile devices, hijacking information from external storage drives, accessing FTP servers and thieving information from email databases.

At times like this you begin to wonder how many other networks are in operation and still undetected.

Is Apple's iPhone No Longer Cool To Teens?

Found on Forbes on Sunday, 13 January 2013
Browse Technology

They don’t want to same device as their mom, dentist, and coffee barista. They want the latest, greatest phone that speaks to their generation.

Also working against Apple’s iPhone is the popular parent tradition to give their teens the old model when they upgrade their devices. Samsung and Android devices are less expensive, which makes it more likely that parents are willing to buy a new one for the teens, versus handing them a new iPhone.

In other words, Apple products are too expensive. Sometimes greed comes back to haunt you.

Internet pioneer and information activist takes his own life

Found on Ars Technica on Saturday, 12 January 2013
Browse Various

Aaron Swartz was arrested in 2011 for scraping articles from the academic archive JSTOR. Facing hacking charges that could put him in prison for decades, Aaron took his own life on Friday.

He founded a group called Demand Progress, which became a key rallying point in the fight against SOPA. He and the team he assembled spent 2011 raising awareness about the problems with the legislation, building momentum for the January 18, 2012 protest that decisively killed it.

Aaron was also outraged about the high prices charged for access to scholarly publications. In a 2008 manifesto, he denounced the legacy system of academic publishing in which scholarly knowledge is locked up behind paywalls.

Big brother needs to make an example now and then. The charges and the looming 50+ years in prison were not about delivering justice, but to intimidate others who consider following his footsteps. Governments don't like people who stand up and question their actions; for those in charge the people should only want two things: panem et circenses.