Twitter alerts users: Please change your passwords, we’ve seen them

Bug similar to one that hit GitHub recorded passwords to non-public log.

(credit: Twitter)

Today, Twitter issued an alert to users prompting them to change their passwords after the discovery that some users' passwords had been recorded in plain text in a log file accessible only by Twitter employees. In a message pushed to most Twitter users, the company stated:

We recently identified a bug that stored passwords unmasked in an internal log. We have fixed the bug, and our investigation shows no indication of breach or misuse by anyone. Out of an abundance of caution, we ask that you consider changing your password on all services where you've used this password.

In a blog post, Twitter Chief Technology Officer Parag Agrawal wrote that Twitter uses the bcrypt hashing function, based on Bruce Schneier's Blowfish encryption algorithm, to store mathematical representations of passwords. "This allows our systems to validate your account credentials without revealing your password," Agrawal noted. "This is an industry standard."

But because of a coding bug, Agrawal explained, "passwords were written to an internal log before completing the hashing process. We found this error ourselves, removed the passwords, and are implementing plans to prevent this bug from happening again."

Read 2 remaining paragraphs | Comments

Latest Windows 10 preview brings screenshot/snipping improvements

The Windows 10 April 2018 Update is scheduled for a wider rollout starting next week, but that’s for folks who like running stable software. If you’re a member of the Windows Insider Preview program, there’s a new build of version of the next version o…

The Windows 10 April 2018 Update is scheduled for a wider rollout starting next week, but that’s for folks who like running stable software. If you’re a member of the Windows Insider Preview program, there’s a new build of version of the next version of Windows available for testing. And if you’re not a Windows Insider, you […]

The post Latest Windows 10 preview brings screenshot/snipping improvements appeared first on Liliputing.

Google releases open source framework for building “enclaved” apps for cloud

Toolkit aims to make building “confidential computing” containerized apps easier.

Enlarge (credit: Google)

Today, Google is releasing an open source framework for the development of “confidential computing” cloud applications—a software development kit that will allow developers to build secure applications that run across multiple cloud architectures even in shared (and not necessarily trusted) environments. The framework, called Asylo, is currently experimental but could eventually make it possible for developers to address some of the most basic concerns about running applications in any multi-tenant environment.

Container systems like Docker and Kubernetes are designed largely to allow untrusted applications to run without exposing the underlying operating system to badness. Asylo (Greek for “safe place”) aims to solve the opposite problem—allowing absolutely trusted applications to run “Trusted Execution Environments” (TEEs), which are specialized execution environments that act as enclaves and protect applications from attacks on the underlying platform they run on.

"The threats people are concerned about are things like rootkits or bootkits, things that hit the lower rings of the operating system stack," said Rob Sadowski, Google's Trust and Security marketing lead, in an interview with Ars. "And also, when you get into cloud or any shared infrastructure—virtualization on premises or in the cloud—you could have administrators or third parties who have access at these layers. So there's always this tension where you have people asking, 'How do I make sure I'm the only person who has access to any of this stuff?'"

Read 6 remaining paragraphs | Comments

Dealmaster: Get a Dell laptop with a six-core Core i7 and GTX 1060 for $950

Plus deals on iPads, Roku TVs, wireless headphones, and more.

Greetings, Arsians! Courtesy of our friends at TechBargains, we have another round of deals to share. Today, the Dealmaster is kicking things off with a solid discount on Dell's new G7 gaming laptop, as a configuration with one of Intel's new six-core mobile chips is now down to $950 from its usual $1,080.

More specifically, this configuration comes with Intel's Core i7-8750H chip, a 15.6-inch 1080p display, 8GB of RAM, a 256GB solid-state drive, and Nvidia's GeForce GTX 1060 graphics card. This machine weighs about six pounds, so it's not the lightest thing around, and it's mostly composed of not-quite-premium-feeling plastic. Because it's a newer device, it hasn't gotten as much feedback around the Web as other laptops, either. But if you're comfortable taking the plunge with Dell, this looks like a good chunk of power for a laptop that's now under $1,000.

If you're not looking for a gaming laptop, though, we also have deals on Roku TVs, iPads, SSDs, 4K TVs, and other assorted gadgets. Check it out for yourself below.

Read 10 remaining paragraphs | Comments

BattleTech is a more tactical, punishing view of mech battling

Hard-hitting choices and loss management define a fantastic tactical experience.

Enlarge / The mechs crumple, explode, list, and flare with a surprising amount of detail. (credit: Harebrained Schemes)

BattleTech is out to get me. The turn-based tactics game from Harebrained Schemesthe studio that cut its teeth on resurrecting “Nineties Cool” franchises with Shadowrun Returns—has now revived the world of MechWarrior in absolutely savage fashion. The studio’s latest chosen universe blends grounded combat between ostensibly humanoid robots with medieval politics transplanted to the final frontier. It is, to put it mildly, entirely my jam.

Which is exactly why I’ve let BattleTech endlessly brutalize me for the past few weeks.

BattleTech is very difficult, although not in the ways you might expect. The game sets you up as a mercenary in the middle days of the same universe as MechWarrior, but instead of piloting multi-ton titans, the player now assumes the role of a mercenary leader. It’s through the uneven responsibilities of a small, violent business owner that BattleTech challenged me the most.

Read 22 remaining paragraphs | Comments

Facebook security analyst is fired for using private data to stalk women

A reminder that the only way to keep data private is to keep it off social media.

Enlarge (credit: Patrik Nygren)

Already under intense scrutiny for leaking sensitive data belonging to more than 87 million users, Facebook said it fired a security engineer accused of using his company position to stalk women.

The allegations surfaced Sunday in a series of tweets from Jackie Stokes, founder of a firm called Spyglass Security.

Stokes included portions of a purported discussion between the unnamed Facebook employee and someone else over the Tinder dating app. In it, the employee said he was a "security analyst" whose role in trying to identify who hackers were in real life made him a "professional stalker." He then told the person, "so out of habit I have to say you are hard to find lol." Stokes later tweeted that the exchange was only a limited snippet of the overall conversation.

Read 4 remaining paragraphs | Comments

Pocket Casts podcast app acquired by NPR and a coalition of public radio organization

Take a look at any list of top podcasts, and you’ll almost always find at least a few titles from NPR or other public radio producers. Now four of them have banded together to buy one of the most popular podcast apps. NPR, WNYC, WBEZ, and This American…

Take a look at any list of top podcasts, and you’ll almost always find at least a few titles from NPR or other public radio producers. Now four of them have banded together to buy one of the most popular podcast apps. NPR, WNYC, WBEZ, and This American Life have acquired Pocket Casts, a mobile […]

The post Pocket Casts podcast app acquired by NPR and a coalition of public radio organization appeared first on Liliputing.

MPAA-Seized Popcorn Time Domain Now Redirects to Pirate Site

The domain name of a popular Popcorn Time fork, that was shut down by the MPAA a few years ago, is unexpectedly showing signs of life. While PopcornTime.io is still registered to Hollywood’s anti-piracy group, it now redirects to the pirate streaming site Stream.cr.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Four years ago Popcorn Time took the Internet by storm.

The software amassed millions of users by offering BitTorrent-powered streaming in an easy-to-use Netflix-style interface.

While the original developers shut down their project after a few months, following pressure from Hollywood, others forked the application and took over.

PopcornTime.io swiftly became the main Popcorn Time fork. The spin-off soon had millions of users and updates were pushed out on a regular basis. At the end of 2015, however, this fork also disappeared from the web.

The MPAA took credit for the fall announcing that it had filed a lawsuit against several people in Canada. In response to these legal threats, several key developers backed out.

Soon after, the MPAA also assumed control of the main domain name, ensuring that it could not fall into the wrong hands.

This worked well, initially, but this week we noticed that PopcornTime.io is active again. The domain now links to the pirate streaming site Stream.cr, which welcomes its new visitors with a special message.

Redirection landing page

“Notice: If you’re looking for Popcorn Time(App) for it’s P2P torrent streaming, it’s over at popcorntime.sh. Otherwise, if you’re looking for streaming. Welcome to StreamCR!” a message on the site reads.

This is odd, considering that the PopcornTime.io domain name is still registered to the MPAA.

Popcorntime.io Whois

Adding to the intrigue is the fact that the PopcornTime.io domain registrar is listed as MarkMonitor, which is a well-known brand protection company, often used to prevent domain troubles.

“Protect your critical assets by partnering with a corporate-only domain registrar who has a strong security culture and is committed to providing the most secure and reliable solution in the industry,” MarkMonitor writes

However, since PopcornTime.io now links to a pirate site, something clearly went wrong.

It’s hard to say with certainty what happened. A likely option is that the domain’s nameservers, which point to DNS Made Easy, were not configured properly and that the people behind Stream.cr used that oversight to redirect the domain to their own site.

TorrentFreak spoke to a source unrelated to this case who says he was previously able to redirect traffic from a domain that was seized by the MPAA, simply by adding it to his own DNS Made Easy account. That worked, until the nameservers were updated to MarkMonitor’s DNS servers.

Whether the fault, in this instance, lies with the MPAA, MarkMonitor, or another party is hard to say without further details.

In any case, the MPAA is not going to be happy with the end result, and neither is MarkMonitor. The Stream.cr operators, meanwhile, are probably celebrating and they can enjoy the free traffic while it lasts.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Researchers find a gene that lets bacteria kill all male flies

To increase infections, the bacteria get rid of the sex that can’t transmit it.

Enlarge (credit: Katja Schulz)

A number of bacteria that infect insects have a simple and brutal way of increasing their transmission: they kill off all the male progeny of the females that they infect. There's actually some evolutionary logic to this. The bacteria can get transmitted to the eggs of the females they infect but can't get carried along on the sperm. That makes the male offspring a problem: they can't spread the bacteria further, and they'll compete with the females for food. Better to kill them off, then, just to ensure that never becomes a problem.

But it's one thing to have something that's a good idea conceptually and another entirely to evolve an implementation that gets the job done. How, exactly, do you go about killing one sex while leaving the other untouched?

Thanks to a lucky accident, two Swiss researchers (Toshiyuki Harumoto and Bruno Lemaitre) have identified the gene that allows one species of bacteria to kill off males. Although we don't have all the details, it's clear that the system leverages something that male flies need to do to cope with the fact that they only have a single copy of the X chromosome.

Read 10 remaining paragraphs | Comments

Sprint announces highest profit ever after saying it needs T-Mobile merger

If Sprint were in worse shape, T-Mobile merger deal might not have happened.

Enlarge / Sprint retail location in Cleveland, Tennessee, on June 19, 2016. (credit: Getty Images | TennesseePhotographer)

Sprint yesterday announced "the best profitability in company history" thanks to growth in its customer base, just days after saying it needed to merge with T-Mobile USA in order to improve its network.

If Sprint was doing worse, the merger might not have happened. Sprint CEO Marcelo Claure said that the company's successful turnaround "positioned Sprint for strategic opportunities which led to our proposed merger with T-Mobile." Sprint's profitability and free cash flow was key in giving Sprint the chance to combine with T-Mobile, he said.

In the just-ended fiscal year, Sprint said it had "its highest annual retail phone net additions in five years and the best profitability in company history with its highest annual operating income at $2.7 billion and annual net income for the first time in 11 years, even when excluding the one-time favorable impact from tax reform."

Read 15 remaining paragraphs | Comments