How Citigroup hackers broke in 'through the front door'
They simply logged on to the part of the group's site reserved for credit card customers - and substituted their account numbers which appeared in the browser's address bar with other numbers.
It allowed them to leapfrog into the accounts of other customers - with an automatic computer programme letting them repeat the trick tens of thousands of times.
Chrome extension allows users to hop WSJ's paywall
"Read WSJ" is the latest vulnerability in the armor of the paywall as a concept in the newspaper business. Work-arounds for the New York Times' paywall were being announced before it even went live, and the paper asked Twitter to shut down a feed that also attempted to circumvent the wall.
CNET reached Sara Blask, a spokesperson for DowJones--the Wall Street Journal's parent company, which itself is owned by Rupert Murdoch's News Corp.--on Sunday, who confirmed that the company is working with Google to have the extension taken down, but it has already proliferated to be available for download on other app markets and websites.
China unrest: 25 arrested after clashes with police
Police in southern China say they have arrested 25 people after clashes between residents and security forces near the city of Guangzhou.
The arrests follow a separate incident further north, in Lichuan city in Hubei province, where hundreds of people laid siege to local government offices following the death in custody of a respected local official.
There is widespread anger in China over corruption and the practice of seizing land and clearing out the residents to develop it for a profit.
A cloud hangs over the sysadmin
Cloud computing will not result in job losses, not least because whatever promise such models may hold in principle, they will take years to enact in practice.
Cloud computing may not be about to put us all out of work, but it may change how some things are done.
The answer depends on whether we are talking about private or public cloud. In the first, an organisation both manages and exploits the cloud infrastructure; in the second the organisation exploits somebody else's infrastructure.
Chips for dinner: Edible RFID tags describe your food
A student at the Royal College of Art in London, Hannes Harms, has come up with a design for an edible RFID chip, part of a system he calls NutriSmart.
The idea is that it could send nutritional data and ingredients for people who have allergies, or calorie-counting for those on diets, or maybe even telling your fridge when the food has gone off. It could even be used to market organic food, with a chip holding data about the origin of that tuna steak you just bought.
Citigroup latest bank to disclose hack: 200k accounts compromised
The system breached was Citi Account Online, which contains names, addresses, account numbers, and similar information. Citi claimed that more sensitive data-such as dates of birth, social security numbers, and the CVV card security codes-was held elsewhere, and has not been compromised.
The company said that the hacking was detected in early May by routine account monitoring, but offered no information on how the information was taken or by whom it might have been taken. Nor did Citi state whether the information had been used to perform fraudulent transactions.
While Sony Sues Modders, Samsung Sends Them Devices
We've talked plenty of times about Sony's long history of trying to block tinkerers and modders, culminating in the company's absolutely ridiculous lawsuit against Geohot (George Hotz) for jailbreaking the PS3. It appears that Samsung is taking an extremely different approach. Rather than trying to restrict or hinder modders, the company just sent a bunch of free smartphones to some of the top modders.
Is Apple planning to kill off Mac OS X?
Over the past couple of months, there have been continual rumours that Apple is testing the iPad's A5 processor in its MacBook range, suggesting Apple believes iOS could stretch further than smartphones and tablets.
Why would Jobs want to keep giving software companies a free ride on Mac OS X, when it could migrate MacBooks to iOS, mandate software purchases via the App Store only, and take a 30% cut of the revenue?
Senator Schumer Says Bitcoin Is Money Laundering
Last week, Gawker wrote a story about Silk Road, the online drug marketplace that users can only access via TOR and where the only currency accepted is Bitcoin.
enator Chuck Schumer, who can grandstand with the best of them, apparently got handed that article and saw an opportunity to publicly demand that something must be done about Silk Road.
You know what else is a form of currency that is used to disguise the source of money? Cash. And, last I checked, it's still legal tender. Blaming the semi-anonymous nature of Bitcoin is severely misplaced.
Witnesses said they were forced to hide video after shooting
On Thursday, The Miami Herald spoke to the couple that saw the end of the 4 a.m. police chase on Collins Avenue, then watched and filmed from just a few feet away as a dozen officers fired their guns repeatedly into Raymond Herisse's blue Hyundai.
Shortly after the gunfire ends, an officer points at Benoit and police can be heard yelling for him to turn off the camera.
He raises his camera and an officer is seen appearing on the driver's side with his gun drawn, pointed at them.
"They put guns to our heads and threw us on the ground," Davis said.
Benoit said a Miami Beach officer grabbed his cell phone, said "You want to be [expletive] Paparazzi?" and stomped on his phone before placing him in handcuffs and shoving the crunched phone in Benoit's back pocket.
Benoit said the officers eventually uncuffed him after gunshots rang out elsewhere and he discreetly removed the SIM card and placed it in his mouth.