Neurowissenschaft: Facebook erforscht Gedanken-Postings

Facebook forscht an einer Technologie, mit der Menschen ihre Gedanken ohne Umweg über eine Tastatur online bringen könnten. Dafür sollen Gehirnströme ausgewertet werden. Es gehe nicht darum, wahllos Gedanken zu lesen, versichert die zuständige Managerin. (Facebook, Soziales Netz)

Facebook forscht an einer Technologie, mit der Menschen ihre Gedanken ohne Umweg über eine Tastatur online bringen könnten. Dafür sollen Gehirnströme ausgewertet werden. Es gehe nicht darum, wahllos Gedanken zu lesen, versichert die zuständige Managerin. (Facebook, Soziales Netz)

Malware: Schadsoftware bei 1.200 Holiday-Inn- und Crown-Plaza-Hotels

Wer im vergangenen Jahr auf Geschäftsreise oder im Urlaub in den USA gewesen ist, sollte seine Kreditkartenabrechnungen prüfen: Zahlungsterminals zahlreicher Hotels von Crown Plaza und Holiday Inn waren mit Malware infiziert. (Security, Virus)

Wer im vergangenen Jahr auf Geschäftsreise oder im Urlaub in den USA gewesen ist, sollte seine Kreditkartenabrechnungen prüfen: Zahlungsterminals zahlreicher Hotels von Crown Plaza und Holiday Inn waren mit Malware infiziert. (Security, Virus)

Rohstoffe: Apple will nur noch recycelte Rohstoffe verwenden

Altes iPhone wird zu neuem iPhone: Apple will künftig nur noch Rohstoffe verwenden, die aus Altgeräten wiedergewonnen wurden. Das ist das Ziel. Wann und wie Apple es erreicht, ist fraglich. (Apple, Elektronikschrott)

Altes iPhone wird zu neuem iPhone: Apple will künftig nur noch Rohstoffe verwenden, die aus Altgeräten wiedergewonnen wurden. Das ist das Ziel. Wann und wie Apple es erreicht, ist fraglich. (Apple, Elektronikschrott)

Microsoft: To-Do ist eine digitale Checkliste der Wunderlist-Macher

Microsoft hat die kostenlose App To-Do vorgestellt. Das ist eine einfache App zum Erstellen von Aufgabenlisten. Hinter To-Do steht das Team des Vorgängers Wunderlist. Das Programm soll in Office 365 inklusive Cloud-Synchronisation eingebunden werden. (Microsoft, Office-Suite)

Microsoft hat die kostenlose App To-Do vorgestellt. Das ist eine einfache App zum Erstellen von Aufgabenlisten. Hinter To-Do steht das Team des Vorgängers Wunderlist. Das Programm soll in Office 365 inklusive Cloud-Synchronisation eingebunden werden. (Microsoft, Office-Suite)

Windows bug used to spread Stuxnet remains world’s most exploited

Code-execution flaw is triggered by plugging a booby-trapped USB into vulnerable PCs.

Enlarge (credit: Saurabh R. Patil)

One of the Microsoft Windows vulnerabilities used to spread the Stuxnet worm that targeted Iran remained the most widely exploited software bug in 2015 and 2016 even though the bug was patched years earlier, according to a report published by antivirus provider Kaspersky Lab.

The most widespread exploits of 2015

The most widespread exploits of 2015 (credit: Kaspersky Lab)

In 2015, 27 percent of Kaspersky users who encountered any sort of exploit were exposed to attacks targeting the critical Windows flaw indexed as CVE-2010-2568. In 2016, the figured dipped to 24.7 percent, but still ranked the highest. The code-execution vulnerability is triggered by plugging a booby-trapped USB drive into a vulnerable computer. The second-most widespread exploit was designed to gain root access rights to Android phones, with 11 percent in 2015 and 15.6 percent last year.

The most widespread exploits of 2016

The most widespread exploits of 2016 (credit: Kaspersky Lab)

The Windows vulnerability was first publicly disclosed in July 2010, a few days before security reporter Brian Krebs was the first to report on the Stuxnet outbreak. The bug resided in functions that process so-called .LNK files that Windows uses to display icons when a USB stick is connected to a PC. By hiding malicious code inside the .LNK files, a booby-trapped stick could automatically infect the connected computer even when its autorun feature was turned off. The self-replication and lack of any dependence on a network connection made the vulnerability ideal for infecting air-gapped machines. Microsoft patched the vulnerability in August, 2010.

Read 5 remaining paragraphs | Comments

Bose is wiretapping my headphones, argues customer in lawsuit

Illinois man: my headphones transmit audio metadata to data miner Segment.io.

Enlarge / The Bose QuietComfort 35 headphones in question. (credit: Bose)

An Illinois man has accused Bose, the audio equipment manufacturer, of illegally wiretapping him via his Bose headphones.

According to a proposed class-action lawsuit filed in federal court in Chicago on Tuesday, Kyle Zak bought a $350 pair of Bose QuietComfort 35 wireless Bluetooth headphones in March 2017. Those headphones use an app, known as "Bose Connect," to skip, pause, and perform other controls on them.

The civil complaint alleges that Bose collects "the names of any music and audio tracks" played througthe headphones, along with the customer's personally identifiable serial number. It also says the information gets sent to third parties, including "data miner Segment.io."

Read 7 remaining paragraphs | Comments

Twitch: Superfan-Abos für bis zu 25 US-Dollar pro Monat

Wer einen Streamer auf Twitch besonders toll findet, kann künftig bis zu 25 US-Dollar im Monat für ihn per Abo ausgeben. Das Videoportal dürfte mit diesem Schritt andere Finanzierungsplattformen unter Druck setzen. (Film, Video-Community)

Wer einen Streamer auf Twitch besonders toll findet, kann künftig bis zu 25 US-Dollar im Monat für ihn per Abo ausgeben. Das Videoportal dürfte mit diesem Schritt andere Finanzierungsplattformen unter Druck setzen. (Film, Video-Community)

Auftragsfertiger: Samsungs 10LPP-Verfahren ist startbereit

10LPP (Low Power Plus) folgt auf 10LPE (Low Power Early): Samsungs verbesserter 10-nm-Prozess ist fertig. Hersteller wie Apple können also ihre Chips fertigen lassen. 10LPP ermöglicht höhere Taktraten bei geringer Leistungsaufnahme. (Samsung, Apple)

10LPP (Low Power Plus) folgt auf 10LPE (Low Power Early): Samsungs verbesserter 10-nm-Prozess ist fertig. Hersteller wie Apple können also ihre Chips fertigen lassen. 10LPP ermöglicht höhere Taktraten bei geringer Leistungsaufnahme. (Samsung, Apple)

Russia Plans To Ban VPNs & Proxies That Unblock Blocked Sites

The Russian government is preparing to scale-up its war on blocked sites by hitting services that provide workarounds. A new bill developed by the government requires VPNs and other anonymizing services to stop providing access to blocked domains. If they do not, they themselves will also be blocked. Search engines also face sanctions for linking to banned sites.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

When it comes to blocking websites, Russia is quickly emerging as a world leader. Tens of thousands of resources are now blocked in the country on copyright infringement and a wide range of other grounds.

Of course, Russian citizens are not always prepared to be constrained by their government, so large numbers of people regularly find ways to circumvent ISP blockades. The tools and methods deployed are largely the same as those used in the West, including VPNs, proxies, mirror sites and dedicated services such as Tor.

To counter this defiance, the Russian government has been considering legislation to tackle sites, tools and services that provide Internet users with ways to circumvent blockades. According to local news outlet Vedomosti, that has now resulted in a tough new bill.

Russia’s plan is to issue a nationwide ban on systems and software that allow Internet users to bypass website blockades previously approved by telecoms watchdog Roskomnadzor. This means that if a VPN, proxy or similar tool unblocks torrent site RuTracker, for example, it will be breaking the law. As a result, it too will find itself on Russia’s banned site list.

The publication says it has confirmed the bill’s existence with a federal official and several Internet service provider sources.

The technical aspects of the bill were reportedly formulated by lawyers working for the Media Communications Union (MCU), a trade group established by the largest media companies in the country. The MCU has a particular interest in ensuring that web users do not bypass pirate site blockades by using anonymous web-based CGI proxies.

The bill does give VPN and proxy providers some remove for maneuver. If they are configured to prevent access to all domains present in Russia’s banned resources list, it appears they can avoid legal issues. However, for VPN services which pride themselves on not monitoring user traffic, censoring certain sites could provoke a backlash and undermine credibility.

As previously reported, Russia also has search engines in its sights. It wants to prevent links to banned sites appearing in search results, claiming that these encourage people to access banned material.

The new bill reportedly lays out a new framework which will force search engines to remove such links. Failing to do so could result in fines of up to $12,400 per breach, clearly a significant issue for companies such as Google and local search giant Yandex.

“We believe that the laying of responsibilities on search engines is superfluous,” a Yandex spokesperson said.

“Even if the reference to a [banned] resource does appear in search results, it does not mean that by clicking on it the user will get access, if it was already blocked by ISPs or in any other ways.”

This morning, the bill was discussed at the Russian Internet Forum (RIF). While it’s aim of reducing copyright infringement was understood, there were concerns that the bill could affect negatively effect the rights of Internet users.

“Naturally, we are against the spread of illegal content, but the law does not violate the rights and freedoms of citizens to access information,” says Sergey Grebennikov, director of the Regional Public Center of Internet Technologies.

“Yes, there is a ‘gray zone’ used to carry out illegal activities and the distribution of illegal content using a CGI proxies, but it does not mean that legitimate users have to suffer. It is also important to note that the laws do not violate the rights of users who choose the safe use of the Internet, for example, by using a VPN connection,” Grebennikov concludes.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.