“Tumblr has confirmed it is in talks with the UK government as part of attempts to improve online safety. The blogging site was criticised recently at the inquest into the death of 15-year-old Tallulah Wilson, who took her own life after posting self-harm photos on the site. Tumblr says it “draws lines” at harmful content like self-harm blogs.”
“Angwin says that among other things she bought “a $230 service that encrypted my data in the Internet cloud; a $35 privacy filter to shield my laptop screen from coffee-shop voyeurs; and a $420 subscription to a portable Internet service to bypass untrusted connections,” among other things. While this may seem excessive, Angwin says that it’s worth it to avoid attacks from hackers and to avoid having everything she does online tracked by major tech companies. What this really boils down to is how much you’re willing to let Google, Facebook and other tech firms stalk you.”
“It is well known that America’s military dominates both the air and the sea. What’s less celebrated is that the US has also dominated the spectrum, a feat that is just as critical to the success of operations. Communications, navigation, battlefield logistics, precision munitions—all of these depend on complete and unfettered access to the spectrum, territory that must be vigilantly defended from enemy combatants. Having command of electromagnetic waves allows US forces to operate drones from a hemisphere away, guide cruise missiles inland from the sea, and alert patrols to danger on the road ahead. Just as important, blocking enemies from using the spectrum is critical to hindering their ability to cause mayhem, from detonating roadside bombs to organizing ambushes. As tablet computers and semiautonomous robots proliferate on battlefields in the years to come, spectrum dominance will only become more critical. Without clear and reliable access to the electromagnetic realm, many of America’s most effective weapons simply won’t work.”
“The previous day, Ukrtelecom said, “unknown people seized several telecom nodes in the Crimea” and damaged its fiber backbone cable: “As a result, there are almost no services of fixed telephony, internet access, and mobile communications TriMob [Ukrtelecom mobile arm] provided in the territory of the Crimea.””
“The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.”
“Because [Aereo’s] system transmits the same underlying performances to numerous subscribers, the system is clearly infringing," he wrote.
However, he said that line of reasoning doesn’t extend to other cloud-based services, what you’d commonly associate with Amazon storage lockers or Dropbox. "That conclusion, however, should not call into question the legitimacy of businesses that use the Internet to provide new ways for consumers to store, hear, and view their own lawfully acquired copies of copyrighted works.”
“Police “did not want to obtain a search warrant because they did not want to reveal information about the technology they used to track the cell phone signal,” the District Court of Appeal ruling said. “The prosecutor told the court that a law enforcement officer ‘would tell you that there is a nondisclosure agreement that they’ve agreed with the company.’””
“By evaluating a heap of existing recipes and looking at what flavor-imparting molecules their ingredients contain, the computer can come up with radical combinations. One of the IBM food truck’s current recipes, the “Swiss-Thai Asparagus Quiche,” brings together Swiss gruyère, Greek feta, and Thai curry spices. If IBM keeps churning out combos like that, it’ll give fusion cuisine a run for its money.”
“"Ten years ago this would’ve been science fiction," he said. Arguably the most famous example of government-sourced malware is the Stuxnet worm, which targeted a specific kind of software that controls nuclear facilities. The United States and Israel have been implicated in the creation and distribution of Stuxnet.
Uroburos is a rootkit made of two files, "a driver and an encrypted virtual file system," that can "take control of an infected computer, execute arbitrary commands, and hide system activities." The malware is highly dangerous, MN alleges, because its structure is "modular" and "flexible," meaning that new malicious functions can be added to it easily.
"Uroburos’ driver part is extremely complex and is designed to be very discrete and very difficult to identify," MN said. In the Uroburos sample discussed by G Data, the malware is designed to steal files and monitor network traffic.
The malware name is a variant spelling for Ouroboros, the ancient Greek symbol of a snake or dragon eating its own tail.”