Business, Technology Security

Iran tightens online censorship

In the midst of a troubled [since the presidential election, ed.] Iran, the police have begun to physically remove and destroy satellite receivers within residential homes. This is done in a massive effort to prevent people from obtaining  news with foreign TV-stations, which are outside the Iranian regime’s control. That is the report of a German human rights organization, saying that Iranian citizens now only have the Internet as an impartial source of information – and that this media is also subject to very strict censorship. Every internet provider in Iran has been linked to the rest of the world through a central hub inside

Read More...

Business, Technology Security

EyeSpy247 launches affordable on-line home protection

If you want to protect your property, regardless of being your own home or business, you had to hire an on-site security agency. Now with EyeSpy247, you can keep track of your property everywhere you go. Since the dawn of IP cameras, different security companies started to offer on-site protection without a physical presence – and that was all nice and dandy, since you had a security officer or two overlooking hundreds of locations. As you can imagine, that system isn’t exactly bullet-proof. In order to address the issue of affordability of such services, British-based EyeSpy247 launched it s own service – this time around,

Read More...

Cloud Computing, Enterprise, Technology Security

Microsoft, Oracle – this is NOT how to sell a secure service

The Black Hat conference is always a source of fun. After all it is a time when the big names get their little secrets exposed. This time around Apple was pretty much embarrassed as several flaws in hardware and software were exposed. The same thing can be said with issues over on Microsoft?s side of the house. Of course Microsoft has never publicly advertised that they are not vulnerable to attacks and viruses but that is another story. No, what I found funny this time was a small talk about Oracle. What makes it funny for me was that this was sent to me after

Read More...

Business, Technology Security

Facebook in trouble in Canada

An investigation of Facebook began due to complaints by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) at the University of Ottawa. Thursday, Canada?s privacy commissioner, Jennifer Stoddart, announced: "We found serious privacy gaps in the way the site operates." The flack relates to Facebook not deleting personal information of people who have closed their accounts. The social networking application?s account settings lets users deactivate their accounts, but doesn?t show how to delete them, which would remove personal information from the site. Facebook defended itself saying that customers who deactivated their accounts often reactivated them, according to Reuters. The investigation looked at 11 different

Read More...

Software Programs, Technology Security

Update – Are we our own worst enemy in the war against Cyber Crime?

Have you seen Die Hard 4.0? Well after the attacks on US and South Korean sites over the holiday weekend I am beginning to think that the "bad guys" involved in these attack did. It seems to be an interesting parallel that the attacks started on the same day as in the movie. Granted this was no "fire sale" but still these attacks were high-level DDoS attacks on major governmental and consumer sites. Is this merely a test of our response to the threats or was this a real attack intended to prevent access. Despite humorous images of the "I’m a Mac" guy and Bruce

Read More...

Cloud Computing, Technology Security

Chrome OS, puts you in the clouds but can it keep you secure?

We told you about Chrome OS and how after a couple of years of denying its existence Google finally owned up to trying to enter the OS market. But is Chrome Really going to be the MS Windows Killer that some sites are reporting? After all the initial release of Chrome as a Browser did not sweep Internet Explorer from the market and has not made much of a dent in FireFox, Opera or Safari when you really get down to it. This is despite it being hailed as the second coming from many technical sites. After the first few days of marveling at its

Read More...

Business, Software Programs, Technology Security

Goldman Sachs code stolen ? a key to manipulating stocks

On July 3rd, Sergey Aleynikov, a Russian immigrant living in New Jersey was arrested and charged with stealing top secret computer code. He was charged with stealing and sending secret computer code overseas which his former firm uses to automatically trade stocks and commodities. The rumors are swirling because Aleynikov was a $400,000 a year employee at Goldman Sachs who lead development of a distributed real-time co-located high-frequency trading (HFT) platform. The main objective of the platform was a very low latency (microseconds) event-driven market data processing, strategy, and order submission engine. The platform was obtaining multicast market data from NASDAQ, NYSE, CME and running

Read More...

Apple, Companies, Software Programs, Technology Security

The iPhone 3G S has been jailbroken!

iPhone 3G S owners rejoice! The 3G S has been freed of the tethers that Apple imposes on it as the jalbreakers [GeoHot] have finally broken the iPhone 3G S. This makes the third device to fall and get pwned by this talented team of people. The new jailbreak is called purplera1n and can be found at purplera1n.com after you grab this wonderful piece of software you will need to connect your phone to iTunes and run the app. But, before you get too excited there are some precautions. Make sure you are not running any version of 3.1. You will also need to use

Read More...

Business, Technology Security

Should spammers join their "clients" in death?

What should be an appropriate punishment for a spammer that wants to steal your money by representing a dead celebrity? When we designed BSN*, one of the decisions we made was to make an easy contact with the authors. We did that by putting a simple first name basis @brightsideofnews.com in almost all cases, but we knew that we were going to attract spammers. And yes, we are getting a lot of spam, and our filter is very successful at exterminating the vermin but earlier today, we received an e-mail from a person claiming to be the representative of the late Luciano Pavarrotti. Alleged Mr.

Read More...

Business, Technology Security

Montana city runs from their Facebook controversy

On Thursday, the lead story at the Bozeman, Montana Daily Chronicle newspaper read "City requires Facebook passwords from job applicants". The newspaper article read: “As part of routine background checks, the city was asking job applicants to provide their usernames and passwords for their social-networking sites. And it has been doing it for years, city officials said on Thursday.“ The story also aired on local TV station KBZK on Wednesday, and by Thursday both stories were part of an international incident on Facebook, Twitter, Slashdot, Reddit, Cnet, and several British tabloids. At the heart of the uproar was a requirement included on a waiver statement applicants had

Read More...

Business, Technology Security

Privacy Wars: Las Vegas newspaper gets subpoena to I.D. online readers

The Las Vegas Review-Journal [LVRJ] says it has been served a federal grand jury subpoena seeking information about 175 readers who posted comments on the paper’s Web site. LVRJ editor, Thomas Mitchell, said they planned to fight the request, which the newspaper received after reporting on a federal tax fraud case against business owner Robert Kahre.   Most of the reader’s comments were written under pseudonyms. Along with the real names of people who posted comments, the June 2 subpoena asks the newspaper for the writer’s gender, birth date, physical address, telephone number, Internet service provider, IP address, and credit card numbers.    The courts

Read More...

Business, Technology Security

Lockheed Martin works on the NextGen GPS satellites

GPS technology is all the rage in the world of consumer electronics. Regardless if we talking about cars, cellphones, notebook computers, we’re getting press releases and pictures of numerous products supporting the navigational technology. But the Global Positioning System of today is already approaching its limits, hence the need for the development of GPS III. Just like the current GPS service, GPSIII is being developed for U.S. Army and will enter both military and commercial service at the same time. Lockheed Martin Space Systems from Newtown [PA] is currently designing its first space craft e.g. satellite, and announced that the project entered Critical Design Review

Read More...

Business, Technology Security

T-mobile data hacked, claims nothing lost

This past weekend hackers posted a message on the Full Disclosure Vunerability Message Board and claimed they had stolen confidential documents, programs, and financial data from T-Mobile’s servers. The hackers posted this offer: “We already contacted with their competitors and they didn’t show interest in buying their data – probably because the mails got to the wrong people- so now we are offering them for the highest bidder.“ Today, T-Mobile USA, the fourth largest US mobile carrier, put out a statement that “the company is conducting a thorough investigation and at this time has found no evidence that customer information, or other company information, has

Read More...

Hardware, Technology Security

Transcend releases Anti-Virus USB drive with a fatal flaw

During the past couple of years, we saw USB drives coming with various features, from external to internal. A USB stick with encryption or backup software is no stranger and you can buy them for 20-30 USD. But often overlooked factor is anti-virus capability. What happens if you plug a USB stick into a virus/Trojan-infected computer and that USB stick doesn’t have a "Read Only" switch on it? After receiving multiple virus warnings coming from different sticks, I’ve embedded anti-virus software on my Voyager GT [unfortunately, comes without a read-only switch].  Transcend had the same idea and decided to team up with Trend Micro, releasing

Read More...

Business, Technology Security

SNAFU: MySpace bans 50K IP addresses – including Sony!

Gawker ran an interstin g story, claiming that Sony Picture Entertainment was banned from MySpace. It turns out there are 49,999 IP banned addresses to go. MySpace SNAFU or a case of something going seriously haywire? It’s no secret that MySpace became a Rupert Murdoch-owned unmanageable jungle, but the latest SNAFU looked to be in the "icing on a cake" category. At first, it looked that overly-eager system administrators at MySpace went on a coffee break while the list of "To ban" IP addresses was going on computer screens. End result was that MySpace banned 50,000 IP addresses from accessing their site… and the unfortunate

Read More...

Cloud Computing, Software Programs, Technology Security

Free Panda Cloud Antivirus

It was bound to happen – sooner or later, cloud computing needed AntiVirus functionality and Panda Security captured a pole position with the release o af public beta of Panda Cloud Antivirus. As the name states, this AntiVirus package is located in the "cloud" where detection and classification of new malware/virus etc. takes place "in real time". This online from-the-cloud system is in charge of detection, with the technology that searches for new malware programs is called Collective Intelligence. Panda’s concept calls for users downloading a client that takes about 50MB on disc space, eating around 17MB of system memory. The final version Panda’s cloudy

Read More...

Graphics, Software Programs, Technology Security

CUDA-enabled GPGPU app cracks PGP passwords 200x faster than a CPU

The ongoing battle between a CPU and a GPU for computing supremacy isn’t showing any signs of relief – in fact, real applications are only started to appear. We’ve been covering ElcomSoft for some time now, and it is impressive to see that intelligence and counter-intelligence agencies around the world rely on GPU technology. This is also the reason why Intel is spending three billion dollars on Larrabee. If the company continues to make CPUs only, stream applications such as password cracking will switch to GPU completely, and no more spending dozens of millions on CPU-focused servers. After Intelligence/Counter-Intelligence agencies move to more advanced code,

Read More...

Audio/Video, Technology Security

BSN* Business Journalist mugged at WinDays – watch your wallets!

We expected a stream of news from WinDays 9 conference in Croatia, such as Office 2010, Cloud platforms, DirectX 11 and all that is happening at this very interesting, yet hidden conference. Unfortunately during morning’s breakfast at Hotel Bristol, an unknown person stole a wallet with all the credit cards and documents. After reviewing the CCTV footage, we identified the perp. And this is where "fun on mediterranean way starts", e.g. same thing that will happen to you in Italy, south of France, Spain or Croatia – even though the event was filmed on CCTV, local Police department told us that that’s "not their jurisdiction" and

Read More...

Business, Technology Security

UPDATED: The Pirate Bay Press Conference Live

In just a couple of hours, judge will pass its first verdict in the case against The Pirate Bay. If you reside in Europe and want to spend your lunch break online, this is the place to be. Both parties said what they had to say in the Swedish Court of Law, now it is up to the judge to pass on the first verdict, which will be appealed in any case. In order to satisfy all the press interest and of course, several million members of The Pirate Bay and few million more unregistered members – TBP decided to host an online press conference.

Read More...

Business, Technology Security

Swedish ISP stands up against new anti-piracy laws

An ISP [Internet Service Provider] in Sweden has decided not to cooperate with the movie and record companies in their zealous crusade against file sharing. On April 1st, 2009, just before the trial against the Pirate Bay started Sweden enacted a law that is based off of the European Union’s IPRED [Intellectual Property Rights Enforcement Directive]. This law allows for courts to order ISPs to hand over details on suspected file sharers such as IP address. This law allows ISPs to retain this information for up to six months but does not require it. As such ISPs are allowed to destroy that information at their

Read More...