Censorship

As Elections Approach, Iran Uses "Far More Advanced" Internet Censorship (dailydot.com) 31

Patrick O'Neill writes: Election time in Iran means increased censorship for the country's tens of millions of Internet users. But this months parliamentary election, experts say, comes with a new level of aggressive censorship from a government notorious for authoritarianism in cyberspace. "What's happening [right now] is far more advanced than anything we've seen before," said Karl Kathuria, CEO of Psiphon Inc., the company behind the widely popular encryption and circumvention tool Psiphon. "It's a lot more concentrated attempt to stop these services from working."
Security

Cisco ASA Firewall Has a Wormable Problem — And a Million Installs (csoonline.com) 47

itwbennett writes: Cisco has published an advisory for a vulnerability with a CVSS (Common Vulnerability Scoring System) score of 10 that was discovered by researchers from Exodus Intelligence. According to the advisory, 'a vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.' As CSO's Dave Lewis points out, 'the part of this that is most pressing is that Cisco claims that there are over a million of these deployed.'
And attackers have not been sitting on their thumbs.
Networking

Facebook Developing Radio Wave Mesh To Connect Offline Areas (thestack.com) 44

An anonymous reader writes: As part of its wider Internet.org initiative to deliver connectivity to poor and rural communities, Facebook is actively developing a new network technology which uses millimetre wave bands to transmit data. Facebook engineer Sanjai Kohli filed two patents which outlined a 'next generation' data system, which would make use of millimetre wave technology deployed as mesh networks. Kohli's patents detailed a type of centralised, cloud-based routing system which 'dynamically adjusts route and frequency channel assignments, transmit power, modulation, coding, and symbol rate to maximize network capacity and probability of packet delivery, rather than trying to maximize the capacity of any one link.'
Government

Putin's Internet Czar Wants To Ban Windows On Government PCs 287

SmartAboutThings writes: The Russian government is allegedly looking to ban Microsoft's Windows operating system, increase taxes on foreign technology companies, develop its homegrown OS and encourage local tech companies to grow. All these proposals comes from German Klimenko, Vladimir Putin's new 'internet czar, as Bloomberg describes him. In a 90-minute interview, Klimenko said forcing Google and Apple to pay more taxes and banning Microsoft Windows from government computers are necessary measures, as he is trying to raise taxes on U.S. companies, thus helping local Russian competitors such as Yandex and Mail.ru.
Twitter

Twitter Launches Trust and Safety Council To Help Put End To Trolling (thestack.com) 203

An anonymous reader writes: Twitter has announced a new trust and safety council to stamp out bullying and trolling on the microblogging site. The Twitter Trust & Safety Council will initially be formed of around 40 bodies, including the Cyber Civil Rights Initiative, ICT Watch, NetSafe, and Samaritans. These organisations, along with safety experts, academics and security researchers, will work to ensure a safe and secure platform for users to express themselves freely and safely. The Council's main focus will be to protect minors, encourage 'greater compassion and empathy on the internet,' and promote efforts in media literacy and digital citizenship. Community groups will also participate to help prevent online 'abuse, harassment, and bullying,' as well as mental health problems and suicide.
Security

President Obama Unveils $19 Billion Plan To Overhaul U.S. Cybersecurity 185

erier2003 writes: President Obama on Tuesday unveiled an expansive plan to bolster government and private-sector cybersecurity by establishing a federal coordinator for cyber efforts, proposing a commission to study future work, and asking Congress for funds to overhaul dangerously obsolete computer systems. His newly signed executive orders contain initiatives to better prepare college students for cybersecurity careers, streamline federal computer networks, and certify Internet-connected devices as secure. The Cybersecurity National Action Plan also establishes a Federal Privacy Council (to review how the government stores Americans' personal information), creates the post of Chief Information Security Officer, and establishes a Commission on Enhancing National Cybersecurity.
Bug

The Internet of Broken Things (hackaday.com) 87

szczys writes: The Internet of Things is all the hype these days. On one side we have companies clamoring to sell you Internet-Connected-everything to replace all of the stuff you already have that is now considered "dumb." On the other side are security researchers screaming that we're installing remote access with little thought about securing it properly. The truth is a little of both is happening, and that this isn't a new thing. It's been around for years in industry, the new part is that it's much wider spread and much closer to your life. Al Williams walks through some real examples of the unintended consequences of IoT, including his experiences building and deploying devices, and some recent IoT gaffs like the NEST firmware upgrade that had some users waking up to an icy-cold home.
Piracy

Anti-Piracy Group BREIN Demands Torrents Time Cease and Desist 91

An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."
The Internet

India Blocks Facebook's Free Basics Internet Service (thestack.com) 133

An anonymous reader writes: India's leading telecom regulator, TRAI (Telecom Regulatory Authority of India), has today voted against differential pricing, ruling with immediate effect that all data prices must be equal, and that companies cannot offer cheaper rates than others for certain content. The call is a significant blow to Facebook's Free Basics (previously Internet.org) initiative and Airtel Zero – projects which work to make internet access more accessible by providing a free range of "basic" services. The watchdog confirmed that providers would no longer be able to charge for data based on discriminatory tariffs but instead that pricing must be "content agnostic." It added that fines of Rs. 50,000 – 50 Lakh would be enforced should the regulations be violated.
Programming

Drag-and-Drop "CS" Tutorials: the Emperor's New Code? 158

theodp writes: Teaching kids computer science is a great movement," writes HS senior David Yue, "however, to overly dilute the magnitude of the difficulty in regards to the subject area of coding and to create the illusion of mastering a 'superpower' (Code.org) is a huge mistake. There are many videos and articles on the Internet these days that have demonstrated positive support towards computer science education. Below these articles, one can find many comments, left mostly by parents and supporters. These people usually express how proud they are that their children have an opportunity to learn computer science or how proud they are that computer science is being integrated at a more substantial level into the education system." But Drag and Drop Doesn't = Coding, argues Yue. "Parents and teachers today who aren't technical need to be aware that the drag and drop code or the candy-coated learning process does not effectively teach children programming but eventually causes a huge amount of shock once they are immersed in real code." Yue's Emperor's-New-Code warning comes days before President Obama — a graduate of Code.org's drag-and-drop Disney Princess coding tutorial — asks Congress for $4-billion-and-change in the upcoming budget to fund his "Computer Science for All" K-12 initiative.
Desktops (Apple)

Scareware Signed With Apple Cert Targets OS X Machines (threatpost.com) 39

msm1267 writes: A unique scareware campaign targeting Mac OS X machines has been discovered, and it's likely the developer behind the malware has been at it a while since the installer that drops the scareware is signed with a legitimate Apple developer certificate.

"Sadly, this particular developer certificate (assigned to a Maksim Noskov) has been used for probably two years in similar attacks," said Johannes Ullrich, dean of research of the SANS Institute's Internet Storm Center, which on Thursday publicly disclosed the campaign. "So far, it apparently hasn't been revoked by Apple."

Communications

Grandma's Phone, DSL, and the Copper They Share (hackaday.com) 177

szczys writes: DSL is high-speed Internet that uses the same twisted pair of copper wire that still works with your Grandmother's wall-mounted telephone. How is that possible? The short answer is that the telephone company is cheating. But the long answer delves into the work of Claude Shannon, who figured out how much data could be reliably transferred using a given medium. His work, combined with that of Harry Nyquist and Ralph Hartley (pioneers of channel capacity and the role noise plays in these systems), brings the Internet Age to many homes on an infrastructure that has been in use for more than a hundred years.
DRM

In Japan, a Battle Brewing Over the Right To Record 4k and 8k Broadcasts (itmedia.co.jp) 105

AmiMoJo writes: Japanese broadcasters have indicated that 4k and 8k broadcasts may have recording disabled via a 'do not copy' flag [via Google Translate], which receivers would be expected to obey. Now the Internet Users Association (MIAU) and Shufuren (Housewives Federation) have submitted documentation opposing the ban. The document points out that the ban will only inconvenience the majority of the general audience, while inevitably failing to prevent unauthorized copying by anyone determined to circumvent the protection.
Security

MIT Reveals "Hack-Proof" RFID Chip (thestack.com) 53

JustAnotherOldGuy writes: A group of researchers at MIT and Texas Instruments claim that they have developed a new radio frequency identification chip that may be impossible to hack. Traditional RFID chips are vulnerable to side-channel attacks, whereby a hacker can extract a cryptographic key from the chip. The new RFID chip runs a random-number generator that creates a new secret key after each transaction. The key can then be verified with a server to ensure that it is correct. The group at MIT also incorporated protection against a power-glitch attack, an attack that would normally leave a chip vulnerable to an interruption of the power source that would in turn halt the creation of a new secret key. Texas Instruments CTO Ahmad Bahai stated, "We believe this research is an important step toward the goal of a robust, lo-cost, low-power authentication protocol for the industrial internet." The question is, how long will it be before this "hack proof" chip is hacked?
Piracy

All 12 Member Countries Sign Off On the TPP (freezenet.ca) 186

Dangerous_Minds writes: News is surfacing that the TPP has officially been signed by all 12 member countries. This marks the beginning of the final step towards ratification. Freezenet has a quick rundown of what copyright provisions are contained in the agreement, including traffic shaping, site blocking, enforcement of copyright when infringement is "imminent," and a government mandate for ISPs to install backdoors for the purpose of tracking copyright infringement on the Internet.
The Internet

Cisco To Acquire IoT Company Jasper For $1.4 Billion (thestack.com) 25

An anonymous reader writes: Cisco has announced its intention to spend $1.4 billion purchasing startup Jasper Technologies, Inc. which specialises in IoT connectivity. It's the most significant acquisition the tech multinational has made since its purchase of Wi-Fi manufacturer Meraki in 2012. In 2015 Cisco also acquired OpenDNS for $635 million, and with the Jasper acquisition seems committed to securing a major foothold in IoT infrastructure over the next five years.
Businesses

Senators Blast Comcast, Other Cable Firms For "Unfair Billing Practices" (arstechnica.com) 176

An anonymous reader writes: Six Democratic US senators [Wednesday] criticized Comcast and other TV and broadband providers for charging erroneous fees, such as cable modem rental fees billed to customers who bought their own modems. The senators have written a letter to Federal Communications Commission Chairman Tom Wheeler asking the commission to 'stop unfair billing practices.'.....Last year, more than 30 percent of complaints to the FCC about Internet service and 38 percent of complaints about TV service were about billing...
Open Source

Link Rot Rx: 'Amber' Add-on For WordPress and Drupal 17

David Rothman writes: If you run a WordPress or Drupal site, you can now fight link rot with Amber, a new open source add-on from Harvard's Berkman Center. If links are dead, visitors can still summon up the pages as stored on your server or, if you prefer, outside ones such as the Internet Archive. TeleRead has the details, and the Amber site is here, with download information.
Communications

Receiving Real-Time Imagery From Russia's Meteor-M N2 Satellite 26

An anonymous reader writes: The Meteor-M N2 is a low orbit Russian weather satellite which broadcasts live weather satellite images, similar to the APT images produced by the NOAA satellites. But Meteor digital images are however much better as they are transmitted as a digital signal with an image resolution 12x greater than the aging analog NOAA APT signals. Radio enthusiasts are receiving images with hacked cheap digital TV dongles. There is even the AMIGOS project which stands for Amateur Meteor Images Global Observation System: users around the world can contribute Meteor images through the internet to create worldwide real-time coverage.
China

Duplicate Login Details Enabled Hack of More Than 20 Million Chinese Consumers (thestack.com) 14

An anonymous reader writes: According to various Chinese sources including Techweb (Chinese language), police in Zhejiang held a conference on Monday announcing that 20.59 million users of the 'Chinese eBay', taobao.com, had their login details stolen by proxy, when hackers ran user/pass combos from a stolen database of 99 million other users and found that more than 20% were using the same login credentials across different ecommerce sites.

Slashdot Top Deals