Social Networks

Twitter Eyes Signatures To Kill Fake Followers 52

mask.of.sanity writes "Researchers have developed a signature system being examined by Twitter that hold promise to cut down on the amount of fake accounts used to deliver spam and malware. The signatures were developed during a study into the semi-underground market of fake accounts and was subsequently used by Twitter to eliminate an impressive 95 percent of several million accounts identified in the research. It applied elements like account names, the timing of the account creation, and browser identifiers to identify fake accounts. The 10-month study found that the creation of fake accounts at its peak represented 60 percent of all new accounts. (Paper here.)"
Twitter

Researchers Buy Twitter Bots To Fight Twitter Spam 45

tsu doh nimh writes "The success of social networking community Twitter has given rise to an entire shadow economy that peddles dummy Twitter accounts by the thousands, primarily to spammers, scammers and malware purveyors. But new research on identifying bogus accounts has helped Twitter to drastically deplete the stockpile of existing accounts for sale, and holds the promise of driving up costs for both vendors of these shady services and their customers. Krebsonsecurity.com writes about a paper (PDF) being released today at the USENIX conference that details how researchers spent almost a year and $5,000 buying up accounts from 27 twitter account merchants, and then built templates to help Twitter detect accounts sold by these merchants — all with the aim of getting more of these bot accounts shut down before they can be used to spam legitimate Twitter users. The story goes into great detail on the lengths to which these account merchants will go to evade Twitter's anti-bot security measures."
Input Devices

Woz & Jobs 2.0: Leap Motion's Holtz & Buckwald 86

theodp writes "Over at Popular Science, Tom Foste takes a look at the $79 Leap Motion controller and inventors David Holz and Michael Buckwald, best friends since they were fifth graders in Florida. Potential applications for the device are many, as proof-of-concept demos ranging from controlling Windows 8 (video) to driving JPL's Athlete Rover (video) show. 'If we're successful and build something that is a fundamentally better way to interact with a computer, there are essentially an unlimited number of use cases,' Buckwald says. 'Eventually, anything that has a computer could be controlled with it—every laptop, every desktop, every smartphone, every tablet, every TV, every surgical station, every robot, potentially even a Leap in every car.' And even if 'it's got some growing pains to experience,' writes Ars Technica's Lee Hutchinson, 'it's cool-it's extremely cool. It's not yet a game-changing interface device, but it could be.'"
Bug

How Did My Stratosphere Ever Get Shipped? 238

Bennett Haselton writes "How did a $400-billion company ship millions of units of a phone with a calendar app that displays the wrong date, a texting app that can't reply to group texts, a screen capture function that doesn't work, and a phone app that won't let me use the keypad unless the speakerphone is on? The answer, perhaps, suggests deeper questions about why market forces fix certain problems but not others, and what to do about it." Read on for the rest of Bennett's thoughts.
Canada

Strict New Anti-Spam Regulations In Canada 101

An anonymous reader writes "David Reese provides an interesting analysis of just how far Canada's new anti-spam legislation goes, and its implications for business. This may provide a valuable template for citizens of other countries, and may also encourage Canadians to prepare for the inevitable push-back from spammers. It is not clear from this analysis whether the legislation would affect telemarketing, but even if it does not it provides a useful precedent for future regulation in that area."
Google

How Not To Be a SEO Spammer 65

An anonymous reader writes "The head of Google's webspam team, Matt Cutts, has blogged about one of his colleagues receiving an email offering SEO services to help the web site www.google.com. The irony wasn't lost on Matt, who has blogged about these emails before. As this article points out, if ever there was evidence that the people who send many of these emails haven't done their homework, this is it."
Technology

Samsung Launches 3200x1800 Pixel ATIV Book 9 Plus Laptop 397

sfcrazy writes "As expected Samsung has updated its Ultrabook family giving direct competition to Apple's MacBook Pro and MacBook Air. When Apple launched its MacBook Air with 12 hours of battery life every one was looking at only one company to outdo Apple and that company was Samsung and the leading Android maker did not disappoint. With the launch of ATIV Book 9 Plus featuring:

* 256GB SSD (seems 128GB would be the base model)
* 3200x1800 resolution
* Touch Screen
* Haswell Processor
* 12 Hours battery life
* More 'standard' ports as compared to Apple's proprietary ports."
Privacy

Video Author Peter Wayner Talks About Autonomous Cars (Video) Screenshot-sm 50

Peter Wayner is no stranger to Slashdot. Not only that, he's written a bunch of books, plus articles for InfoWorld, PC World, the New York Times, and many other publications. Now he's working on a book about Autonomous Cars. Last year Peter wrote an article for Car & Driver about the privacy implications of vehicle recorders. Driverless cars will bring us a whole new set of problems, questions, and -- no doubt -- legislation. We're hoping to have more conversations on this topic (and others) with Peter in the future, so with any luck this video will be the first of a long series. With all that said, take it away, interviewer Timothy Lord... Update: 06/05 21:56 GMT by T : Peter's book is still in progress, but it's got a website, if you'd like an early glance.
Movies

Video WeVideo Helps You Edit Your Videos Online (Video) 48

This video is WeVideo CEO Jostein Svendsen talking about his company's service, not a demo of it, although we surely should do a demo/review of WeVideo before long. If you are involved in casual video production, this is something you need to check out. And if you want to try editing a video or two but have no idea if you're going to be good enough that it will be worth spending money on video editing software, plus the time to learn how to use it, WeVideo's free version (which puts a watermark on your finished video) might be a good way to try your hand at this necessary but unheralded part of the videomaking process.
Privacy

Why We Should Celebrate Snapchat and Encourage Ephemeral Communication 140

An anonymous reader writes "Within a few months of launching, Snapchat has made an enormous and lasting impact on the culture of communication on the Internet – and we should all be grateful. They have simplified a security process enough to the point that anybody can use it, while validating the market of the next generation of privacy-preserving ephemeral communication. Most importantly, we may finally get a break from the forced permanence of the Facebook and Google world, where everything you do and share is a data point to be monetized and re-sold to the highest bidder."
Microsoft

Microsoft Reads Your Skype Chat Messages 275

An anonymous reader writes "A Microsoft server accesses URLs sent in Skype chat messages, even if they are HTTPS URLs and contain account information. A reader of Heise publications notified Heise Security (link to German website, Google translation). They replicated the observation by sending links via Skype, including one to a private file storage account, and found that these URLs are shortly after accessed from a Microsoft IP address. When confronted, Microsoft claimed that this is part of an effort to detect and filter spam and phishing URLs."
Spam

Suspect Arrested In Spamhaus DDoS Attack 95

New submitter apenzott writes "According to the BBC, a Dutch citizen has been arrested by Spanish police who suspect he was behind the recent Spamhaus DDOS attack, one of the biggest such attacks ever. 'The man arrested is believed to be Sven Kamphuis, the owner and manager of Dutch hosting firm Cyberbunker that has been implicated in the attack.' According to a press release from the Dutch Public Prosecutor (Google translation of Dutch original), the 35-year-old man's computers and other devices have been seized as evidence. The man will be transferred from Spain to the Netherlands shortly. 'Spamhaus is delighted at the news that an individual has been arrested and is grateful to the Dutch police for the resources they have made available and the way they have worked with us,' said a Spamhaus spokesman."
Businesses

Two Changes To Quirky Could Change The World 103

"Quirky.com has generated a lot of buzz," writes frequent contributor Bennett Haselton, "but it's hard to see how it could ever be more than a novelty unless they change two key features of their process. Fortunately, they already have all the infrastructure in place for bringing inventions to fruition, so that with these two changes, Quirky really could deliver on their early promise to change the way products get invented." Read on for Bennett's thoughts — which seem more sensible than quirky.
Television

Amazon Debuts Mixed Bag of Original Comedy Pilots 67

itwbennett writes "Amazon sent out a press release over the weekend announcing that the pilots for their original shows 'held 8 spots on the list of 10 most streamed Amazon VOD episodes.' So blogger and entertainment junkie Peter Smith decided to spend a couple of hours seeing if they were worth watching. He managed to sit through 4 of the 8 comedy shows and found a mixed bag — one a clear miss, two meh, and one he'd like to see turned into a series. Have you watched any of the pilots? What did you think?" The quality of these the pilots is not the only way they're a mixed bag: for many Linux users, they're simply not watchable. Watch soon for unknown_lamer's screed on the fat lot of good(will) Amazon is generating by making it harder to legally get these shows.
Google

Google Reinstates Federated Jabber/XMPP Instant Messaging 32

jrepin writes "A few weeks ago the FSF reported that Google had started blocking invites sent from non-Google Jabber servers. This was done as a crude anti-spam measure. Google have since rolled out proper anti-spam filtering for its Jabber service, and has removed the invite block. This was announced a few days ago in a public mailing list post. This means that users of all Jabber servers will once again be able to fully communicate with Google users."
Social Networks

LinkedIn Invites Gone Wild: How To Keep Close With Exes and Strangers 164

sholto writes "An aggressive expansion strategy by LinkedIn has backfired spectacularly amid accusations of identity fraud. Users complained the social network sent unrequested invites from their accounts to contacts and complete strangers, often with embarrassing results. One man claimed LinkedIn sent an invite from his account to an ex-girlfriend he broke up with 12 years ago who had moved state, changed her surname and her email address. ... 'This ex-girlfriend's Linked in profile has exactly ONE contact, ME. My wife keeps getting messages asking 'would you like to link to (her)? You have 1 contact in common!,' wrote Michael Caputo, a literary agent from Massachussetts."
Twitter

Twitter Launches the World's Umpteenth Online Music Site 45

Nerval's Lobster writes "Twitter is plunging into the online music game. Twitter Music (or "Twitter #music," in the company's own rendering) uses Twitter activity such as Tweets and engagement "to detect and surface the most popular tracks and emerging artists," according to an April 18 posting on Twitter's official blog. Songs on the app derive from three sources: iTunes, Spotify, or Rdio. And yes, Twitter is big, but its victory is by no means assured: other IT giants have entered the same market only to watch highly-publicized projects wither away, doomed by some combination of audience apathy and implementation issues. Take Apple's Ping, for example: launched in September 2010 as part of an iTunes update, the ambitious social-networking and music-recommendation engine immediately ran into a number of problems, including a lack of Facebook integration (despite Steve Jobs' assurances to the contrary) and widespread reports of spam and fake accounts. Can Twitter's effort stand out, or will it just be lost in all the noise?"
Books

Book Review: The Death of the Internet 102

benrothke writes "When I first heard about the book The Death of the Internet, it had all the trappings of a second-rate book; a histrionic title and the fact that it had nearly 50 contributors. I have seen far too many books that are pasted together by myriad disparate authors, creating a jerry-rigged book with an ISBN, but little value or substance. The only negative thing about the book is the over the top title, which I think detracts from the important message that is pervasive in it. Other than that, the book is a fascinating read. Editor Markus Jakobsson (Principal Scientist for Consumer Security at PayPal) was able to take the collected wisdom from a large cross-section of expert researchers and engineers, from different countries and nationalities, academic and corporate environments, and create an invaluable and unique reference." Read below for the rest of Ben's review.
Spam

Maintaining a Publicly Available Blacklist - Mechanisms and Principles 89

badger.foo writes "When you publicly assert that somebody sent spam, you need to ensure that your data is accurate. Your process needs to be simple and verifiable, and to compensate for any errors, you want your process to be transparent to the public with clear points of contact and line of responsibility. Here are some pointers from the operator of the bsdly.net greytrap-based blacklist."

Slashdot Top Deals