Diberdayakan oleh Blogger.

Popular Posts Today

'Mystique-like' malware killed off

Written By Unknown on Minggu, 12 April 2015 | 23.22

Actress Jennifer Lawrence who plays Mystique standing in front of an X-Men film poster
Like the Beebone malware, X-Men's Mystique - played by Jennifer Lawrence - morphs to take on other identities

Shapeshifting malware that changes its identity up to 19 times a day to avoid detection has been deactivated by Europe's Cybercrime Centre and the FBI.

At its height in September 2014 the malware, called Beebone, was controlling 100,000 computers a day.

Criminals used it to help steal passwords and download other programs to the infected computers.

Around 12,000 victims are being asked to use new online clean-up tools to remove it.

'Mystique-like' morphing

A hand grabs the word password written on a screen of ones and noughts
Beebone downloaded other malware which could steal passwords and banking details

Once on a victim's computer, Beebone operates like a downloader application that can be controlled by the suspected criminal gangs behind the program.

It was used to force victims' PCs to fetch other malware from the internet including password stealers, ransomware, rootkits, and programs designed to take down legitimate websites.

Computer security firm Intel Security, which helped law enforcement agencies to stop the malware, said it had seen Beebone change its identity up to 19 times per day to avoid more traditional "signature detection" anti-virus methods.

Intel Security's chief technology officer Raj Samani told the BBC: "Beebone is highly sophisticated. It regularly changes its unique identifier, downloading a new version of itself, and can detect when it is being isolated, studied, or attacked.

"It can successfully block attempts to kill it."

Operation Beebone

Operation Beebone was carried out by the Joint Cybercrime Action Taskforce set up by the European Union to tackle cross-border internet crime. The team finally managed to tackle the malware by stopping it from connecting to servers on the net used to control and send it instructions.

Nearly 100 .com, .net, and .org domains have been "sinkholed" - the process by which traffic meant for specific IP addresses is redirected from suspected criminal-controlled sites to the investigating authorities. This allows detectives to "see" how the application behaves and to intercept requests for further instructions by the malicious software.

The FBI assisted in redirecting traffic from most of the sites being used by the gangs because they were operated from the United States and are under US jurisdiction.

The operation also involved private security firms Intel Security, Kaspersky Labs and Shadowserver. The taskforce now believes it has isolated the morphing malware so criminals can no longer make use of it.

Sustained threat

Head of operations at the European Cybercrime Centre, Paul Gillen told the BBC the agency would now look at whether those behind the attacks could be identified and brought to justice. He admitted the solution the taskforce had found was not a permanent one: "We can't sinkhole these domains forever. We need those infected to clean up their computers as soon as possible."

Several security vendors have created a free tool to remove the Beebone malware including F-Secure, TrendMicro, Symantec and Intel Security.

Symantec representative signs an agreement of understanding with Europol
Symantec is one of several private security firms signed up to help EC3

But victims need to first realise they have the malware on their systems before they can download the removal tool.

Raj Samani said those who have the malware "will be notified by their internet service provider".

ISPs in each affected country will be handed a list of suspected victims to contact by the taskforce.

Dangerous threat

The Beebone malware was described by the Europol taskforce as "very sophisticated". Some security experts believe the consequences of the attack could have been much worse.

Portcullis Security in the UK advises various British government departments on cybersecurity issues. Its director, Paul Docherty, told the BBC:

"The fact that it [the malware] is complicated suggests that it could be used for more targeted attacks. If those responsible were able to harness similar difficult-to-detect code they could potentially move the point of attack from home users to corporate users or other entities which typically hold large amounts of sensitive, valuable data."

Mr Docherty said computer users should have anti-virus software installed and that it was essential that they kept it up-to-date. He warned against members of the public underestimating how valuable their computer might be to criminal hackers.

"There is still a general consensus that, It won't happen to me, I have nothing anyone could want. However, when you discuss with people what they actually use their technology for this changes very quickly."

Future challenge

The total number of computers infected by Beebone is relatively modest compared with some recent malware take-downs like GameOver Zeus. Security experts believe this is because the malware was not spread by mass emailing potential victims with poisoned internet links, an approach known as spearphishing. Intel Security said Beebone was more commonly spread through hardware like USB drives, or data discs.

Now remaining victims are being asked to clean up their computers as soon as possible.

Mr Samani said it is likely those who have Beebone on their computers "were likely to have a lot of other malware too because of the nature of Beebone as a malware downloader itself".

But there is another good reason why victims will want to move on quickly, says Mr Docherty: "Clean-up after infection could be complicated, as this [criminal] campaign has used a constantly changing (polymorphic) dropper to implant malware, it is possible that it has also installed code of a similar nature to re-enable access to the systems following clean-up."


23.22 | 0 komentar | Read More

France TV5Monde passwords seen on TV

Screenshot, via EVN, of France 2 interview with TV5 journalist David Delos with passwords and other sensitive information on the wall behind him blurred out
David Delos was filmed with passwords and other sensitive information, blurred out by the BBC, behind him

Staff at France's TV5Monde have been filmed with passwords visible a day after the TV network suffered a huge cyber-attack.

Login details for social media accounts could be seen behind a journalist interviewed on France 2.

It comes after hackers claiming to represent jihadist group Islamic State (IS) took TV5Monde off air.

The Paris-based channel told the BBC the visible data was a one-off mistake and was not linked to the attack.

Its TV station, website and social media accounts were all hit on Wednesday night.

Prime Minister Manuel Valls condemned what he called an "unacceptable attack on freedom of information".

A Google+ page hacked by individuals claiming to belong to IS
Several of the organisations social media accounts were hit

Journalist David Delos was speaking on camera of the "frustration" felt in the newsroom on Thursday when passwords for accounts on Twitter and Instagram could be seen on a dividing screen in the background.

Most were too blurry to be distinguished with the naked eye, but social media users claimed to have been able to decipher YouTube login details.

Footage broadcast on BFMTV also appeared to show a password written on yellow post-it notes and stuck on computer monitors.

A spokeswoman for TV5Monde said passwords were not normally left around in such a way, and the error made in the interview was an isolated case.

Prosecutors have opened an investigation into the cyber-attack, which French Interior Minister Bernard Cazeneuve said was likely to have been a "terrorist act".

A message posted by the hackers on TV5Monde's Facebook site read: "The CyberCaliphate continues its cyberjihad against the enemies of Islamic State."

They replaced TV5Monde's social media profile pictures with a masked Islamist fighter.

Mr Cazeneuve promised the government would do "everything to catch those who tried to attack the heart of the French Republic".

The head of TV5, Yves Bigot, said on Thursday it was not clear whether the hackers had targeted the channel specifically, or used it as a messenger.

"Obviously what they were doing is threatening the French government, the French military and the French policy in the Middle East."

France is part of the US-led coalition carrying out air strikes against IS in Iraq and Syria.

The channel has not commented on the latest apparent security breach.

TV5Monde regained control over most of its sites about two hours after the attack began on Wednesday and full services were restored by Thursday evening.


23.22 | 0 komentar | Read More

Real money trade starts in Warcraft

World of Warcraft screenshot
The game tokens can be paid for with real cash or bought with in-game gold

The introduction of a way to use real money to buy virtual cash for World of Warcraft has prompted a big change in the value of the game's gold.

The exchange rate for dollars fell by almost a third on the first day that Blizzard let people swap real cash for game gold.

At launch, players could spend $20 (£13) to get 30,000 gold coins to spend on gear in the fantasy game world.

But 24 hours later the same amount of cash netted players about 20,000.

Before now the only way that World of Warcraft players could artificially boost the fortunes of their characters was by visiting a grey-market site and surreptitiously buying gold from unlicensed vendors.

Fell sharply

The practice was fraught with peril because it was technically a violation of the WoW terms and conditions. Anyone caught buying gold this way could have their account closed down.

Late last year Blizzard announced plans to introduce a $20 "game time token" that could be converted into WoW's internal currency. Currently only North American players of WoW can buy the token.

The tokens can be traded on the game's internal auction house for gold - effectively giving people a way to turn real money into virtual cash. Those with lots of WoW gold can buy the token and use it to pay for their subscription to the online game.

The token trading system went live on 8 April and initially the exchange rate for each one climbed past the 30,000 starting point. But within hours the dollar exchange rates fell sharply and are now hovering around 22,000 for $20.

Some speculated that the dollar exchange rate would fall further to reach those seen on grey-market sources of WoW gold, which currently offer 10,000 to 15,000 coins for $20.

'Lot of fluctuation'

Before the launch Blizzard said the exchange rate for tokens would be set by internal game metrics.

Alec Meer, of the game news site Rock, Paper, Shotgun, told the BBC that there had been some initial "overreaction" to the drop in value of each token.

"It doesn't spell doom," he said. "Blizzard is trialling something new. They went in high to see what would happen, and there's going to be a whole lot of fluctuation as a game with a population of several million adapts to it.

"I'm sure the long-term plan is simply to bring more transactions within Blizzard's purview, and in doing so potentially reduce the influence of gold farmers and keep people playing for longer," he added.


23.22 | 0 komentar | Read More

Austria court ponders Facebook case

Max Schrems at court in Vienna on 9 April 2015
Max Schrems accused Facebook of mass surveillance of its users

A court in Austria will rule in the next few weeks whether it has the jurisdiction to hear a class action lawsuit brought against Facebook.

Some 25,000 users - led by Austrian law graduate Max Schrems - accuse Facebook of violating European privacy laws in the way it collects and forwards data.

The case has been brought against Facebook's European HQ in Dublin, which handles accounts outside US and Canada.

Facebook's lawyers have argued for the case to be dismissed.

They presented a list of procedural objections at a court hearing in Vienna on Thursday.

Mr Schrems - a campaigner for data protection - said he brought the claim to stop what he calls mass surveillance by the social networking site.

The legal action claims privacy laws are breached in the way Facebook monitors users when they activate the site's "like" buttons.

It also alleges Facebook co-operated with Prism, a surveillance system launched in 2007 by the US National Security Agency.

The case - which involves more than 900 UK-based users of Facebook - includes a compensation claim of about €500 ($539; £362) per person.

The court will issue a written decision in the next few weeks on whether it can handle the case, the BBC's Bethany Bell reports from Vienna.


23.22 | 0 komentar | Read More

LinkedIn buys learning firm for $1.5bn

LinkedIn site on a Mac laptop
LinkedIn has about 300 million members who use the site's business networking tools

LinkedIn has bought US online learning business Lynda for $1.5bn (£1.1bn), making it the professional networking site's biggest acquisition to date.

LinkedIn is trying to boost the business content it offers to its 300 million users.

Lynda, based in California, has made hundreds of videos that teach subscribers everything from coding to business skills.

Subscribers pay $375 per year to access the tutorials.

Although the company was founded nearly 20 years ago, it has expanded rapidly in the past two years, adding several languages to its video offerings and increasing outside investment.

"The mission of LinkedIn and the mission of lynda.com are highly aligned," said LinkedIn chief executive Jeff Weiner in a statement.

"Both companies seek to help professionals be better at what they do."

Shares in LinkedIn rose more than 1.5% on the New York Stock Exchange after news of the acquisition was released.


23.22 | 0 komentar | Read More

Jawbone to start UP3 deliveries

Jawbone tracker on wrist
Jawbone's UP3 tracker had been delayed after the firm struggled to make the band waterproof

Jawbone has said that it will begin deliveries of its top-end UP3 fitness tracker from 20 April, four months later than originally promised.

The US firm added that the device would not be fully waterproof as first advertised, just "splash-proof".

Many people who had pre-ordered the wristband had complained on social media about the firm's failure to explain the delay fully until now.

The delay has lost the firm sales to rivals such as Fitbit and Misfit.

"When we announced UP3 late last year we were confident we would start mass production of the device and begin shipping within a few weeks of the announcement," the company said on its blog.

"However, as we began to scale our manufacturing process it became clear that, while most units passed our high quality bar, a proportion did not.

"Specifically, we were not achieving the level of water resistance we had passed in the design and initial production stages.

"We would like to apologise to customers who may have pre-ordered UP3 on the basis that it would be suitable for swimming. Customers who wish to cancel their pre-order will, of course, be able to do so with no charge."

'Perilous'

Until now, the only explanation the firm had given for the delay was in an interview chief executive Hosain Rahman gave Fortune magazine in January, in which he blamed a "sealing" problem.

The same article had noted that Jawbone's manufacturing partner Flextronics had recently sued it for breach of contract, describing the fitness firm's financial position as "perilous".

The case was ultimately settled out of court.

A subsequent report in February by the Financial Times suggested Jawbone's finances were "deteriorating" as it sought out new investors, causing some to question if the UP3 would ever be released.

But the firm has said the device is now in "mass production" and that it would start deliveries to customers who had pre-ordered on 20 April.

Customers should receive the bands no later than mid-May, Jawbone added.

UP3 tracker band close-up
The UP3 is now "splash-proof" rather than fully waterproof

Posts to the firm's own community forum and Facebook page, however, suggest that a significant number of users had already cancelled their bookings.

"I have lost all faith in Jawbone and their communications," wrote one.

This is not the first time that Jawbone has run into manufacturing difficulties.

In 2011, it pulled the original UP wristband from sale after the initial batch of bands stopped holding their charge.

Posts to its forums also suggest that many owners of its more recent UP24 bands have complained that the devices stop working after several months of use - something the firm has handled by offering replacements.

Bioimpedance

The UP3 attracted much interest when it was first announced in November because of its use of a technique called "bioimpedance" to track its owner's pulse.

This involves passing an imperceptible electrical current through the body to measure its resistance to the signal.

The process is already used by several specialist medical devices to measure heart rate, body fat, fluid levels and other body composition readings.

But Jawbone was the first to use it in a mass-market wristband.

Its biggest rival Fitbit tracks users' heart rates by shining LED lights into their arms to detect changes in blood volume beneath the skin.

This kind of technology can sometimes have problems obtaining accurate readings from users with darker pigmented skin, however.

Jawbone previously suggested that another advantage of bioimpedance was that it was less battery intensive.


23.22 | 0 komentar | Read More

Samsung S6 Edge supply shortage

Two Samsung S6 Edge phones showing the wrap around curved screen
The Samsung S6 Edge curved screen is more difficult to mass produce than flat screens

Samsung's new flagship mobile phones go on sale today but the company says it may struggle to meet demand for its S6 Edge model.

Although Samsung predicts greater interest in its more conventionally designed S6 model, it is worried about the time it takes to manufacturer components for the distinctive wrap-around touch screen on the S6 Edge.

Experts say it could lead to consumers having to order and then wait for the model, and delay any fall in its price.

Samsung faces strong competition from Apple at the high-end of the market while much cheaper smart phones made in China challenge its position at lower price points.

Mobile analyst, Thomas Husson at Forrester told the BBC: "They [Samsung] will have a serious issue if the shortage is due to the difficulty of producing the curved screen.

"Samsung must succeed in the launch of these new flagship phones to regain leadership in the high-end segment. They have a window of opportunity until the new iPhone comes out. The product and design is great - but [it] lacks service differentiation."

A Samsung UK spokesperson told the BBC the company was "working hard" to fulfil pre-orders and sales "as soon as possible".


23.22 | 0 komentar | Read More

Intel hit by supercomputer chip ban

Tianhe-2 supercomputer
The Tianhe-2 supercomputer manages 33.86 petaflop/s

The US government has refused to let Intel help China update the world's biggest supercomputer.

Intel applied for a licence to export tens of thousands of chips to update the Tianhe-2 computer.

The Department of Commerce refused, saying it was concerned about nuclear research being done with the machine.

Separately, Intel has signed a $200m (£136m) deal with the US government to build a massive supercomputer at one of its national laboratories.

The Tianhe-2 uses 80,000 Intel Xeon chips to generate a computational capacity of more than 33 petaflops. A petaflop is equal to about one quadrillion calculations per second.

According to the Top 500, an organisation that monitors supercomputers, the Tianhe-2 has been the world's most powerful machine for the past 18 months.

This year the Chinese machine was due to undergo a series of upgrades to boost its number-crunching abilities past 110 petaflops. The upgrades would depend largely on new Intel Xeon chips. The chipmaker informed US authorities of its involvement with the upgrade programme and was told to apply for an export licence.

In a notice published online the US Department of Commerce said it refused Intel's application to export the chips for Tianhe-2 and three other Chinese supercomputers because the machines were being used for "nuclear explosive activities". The relevant section of US export regulations reveals that this covers technologies used in the "design, development or fabrication" of nuclear weapons.

The notice added that the four institutions where the supercomputers would be located were deemed to be "acting contrary to the national security or foreign policy interests of the United States".

In a statement given to the IDG news wire, the chipmaker said: "Intel complied with the notification and applied for the licence, which was denied. We are in compliance with the US law."

China is now believed to be accelerating its own home-grown chipmaking efforts to boost the power of the four supercomputers and complete the upgrade programme.

Although Intel has been denied the chance to sell its Xeon chips to China, the company has signed a large deal to build the Aurora supercomputer at the Argonne National Laboratory in Illinois. When finished that machine is expected to have a peak performance of 180 petaflops.


23.22 | 0 komentar | Read More

UK surveillance challenged in Europe

GCHQ
The human rights groups claim Britons' human rights have been broken by GCHQ's surveillance

Rights groups have asked the European Court of Human Rights to rule on the legality of the UK's large-scale surveillance regime.

Amnesty International, Liberty and Privacy International filed a legal complaint with the court today.

The scale of the surveillance carried out by GCHQ has been revealed by US whistleblower Edward Snowden.

A similar legal challenge mounted in the UK last year saw judges rule that the spying did not breach human rights.

"The UK government's surveillance practices have been allowed to continue unabated and on an unprecedented scale, with major consequences for people's privacy and freedom of expression," said Nick Williams, legal counsel for Amnesty in a statement.

The three organisations claim that the surveillance carried out by GCHQ breaches the European Convention on Human Rights that enshrines certain freedoms in law.

The surveillance carried out by GCHQ has been subject to a series of legal challenges since National Security Agency documents provided by Edward Snowden started to appear in the media.

In December, the Investigatory Powers Tribunal that oversees the work of the intelligence services ruled that GCHQ's spying did not violate Britons' human rights and was a legitimate way to gather intelligence.

In February, a separate ruling by the IPT found that the spy agency's surveillance programme was unlawful because the processes governing how GCHQ gathered and shared information were not public enough.

Amnesty acknowledged these rulings in its statement but said the "secretive" nature of IPT hearings meant there was little transparency about the way GCHQ was being policed. This, it said, undermined the faith people had in official oversight of the agency.

Information that had come to light in the last 12 months showed, said Amnesty, that there were flaws in the oversight system. One revelation concerned arrangements GCHQ has with its US counterparts to get at data it would be difficult for the UK agency to get permission to acquire.

There were also loopholes in UK laws governing surveillance being exploited by GCHQ to expand its spying abilities, it said.


23.22 | 0 komentar | Read More

Amazon sues four paid review sites

Amazon warehouse
Amazon alleges that paid reviews undermine the trust people have in its site

Amazon has sued four firms that pay people to produce reviews that then appear on the online retailer's site.

The company alleges that the paid opinions "undermine" its review system which customers believe come from unbiased sources.

Amazon is seeking damages from the four sites and wants them to stop producing the reviews.

The four companies named in the legal complaint have not yet responded to Amazon's allegations.

"While small in number, these reviews threaten to undermine the trust that customers, and the vast majority of sellers and manufacturers, place in Amazon, thereby tarnishing Amazon's brand," said the retailer in documents filed to the court in Washington.

As well as subverting the review process, Amazon accused the sites of trademark infringement, and violations of local consumer protection statutes and cybersquatting laws that govern who can own a domain name.

It alleged that the paid reviews were being placed on its site at a slow rate designed to outwit the detection system it ran to spot such content. In its legal papers, Amazon said it verified its allegations by surreptitiously paying one of the services to write reports about products. This resulted in them getting "glowing" reviews, it said.

The legal papers name four review producers that operate via sites called buyazonreviews.com, buyamazonreviews.com, bayreviews.net and buyreviewsnow.com.

Since the legal action was filed two of the sites named have gone offline. Those still operating have yet to respond to the BBC's request for comments.

Mark Collins, who runs the Buy Amazon Reviews site, defended his business in an interview with The Seattle Times. He said the site did not provide "fake" reviews but provided "unbiased and honest" opinions about products.

The sites pay between $19-$22 (£13-£15) for each review which typically result in products getting a four or five star rating. Higher star ratings can often translate into higher sales.


23.22 | 0 komentar | Read More

Social media teacher abuse 'rising'

Written By Unknown on Minggu, 05 April 2015 | 23.22

Looking at the screen
Teachers have long complained of cyber-bullying

More teachers are facing abuse on social media, warns a teachers' union.

Sexist, racist and homophobic remarks were being used by pupils against school staff, as well as offensive comments about appearance, the NASUWT said.

There were also examples of parents being abusive on social media, it added.

About 60% of 1,500 teachers questioned in a poll said they had faced abuse, compared with 21% last year.

In one case, a photograph of a teacher was posted online with an insulting word underneath.

In another, pupils used the name of a heavily pregnant school worker to post insults, the teachers' union said.

Insulting comments

Of those who had been subjected to insults, nearly half (48%) said these remarks were posted by pupils, 40% said they were put up by parents, and 12% said both parents and pupils were responsible.

Almost two-thirds (62%) said pupils had posted insulting comments, while just over a third (34%) said students had taken photos or videos without consent.

A third (33%) received remarks about their performance as a teacher, 9% had faced allegations from pupils about inappropriate behaviour and 8% had been subjected to threatening behaviour.

More than half (57%) of pupils responsible were aged between 14 and 16, and 38% were 11 to 14, the teachers' poll found, with a fifth aged 16 to 19 and 5% were seven to 11.

Among the examples published by NASUWT was the case of a student uploading a teacher's photo and then, along with classmates, writing insults underneath.

Cancer jibe

One teacher had been harassed for nine months by students who sent sexually explicit messages and set up a fake social media account in the teacher's name.

The union said it had been told of a teacher receiving the comment "I hope she gets cancer", while the heavily pregnant worker had faced abusive remarks.

Another school worker faced comments from a pupil's family member about how they looked and that they were ugly.

Chris Keates, the union's general secretary, said: "It is deeply worrying to see that the abuse of teachers has risen by such a huge margin this year.

"Equally concerning is that it appears that more parents are the perpetrators of the abuse.

"The vile, insulting and personal comments are taking their toll on teachers' health and well-being, and undermining their confidence to do their job."


23.22 | 0 komentar | Read More

China cracks down on explicit anime

Blood-C
Officials complained about Blood-C featuring a scene in which blood appeared to "spurt" into the lens

Some of China's biggest video streaming sites have been warned that they face punishment after failing to remove explicit Japanese cartoon video clips.

China's Ministry of Culture said the firms had hosted anime that glorified violence and terrorism, and contained "vulgar" erotic elements.

Net firms Baidu, Tencent and Youku were among those named as offenders.

The announcement coincides with the introduction of wider restrictions on the use of foreign online clips.

Press conference
China's Ministry of Culture announced plans to punish the firms, at a news conference

Streaming sites now require publication licences to be able to add other countries' TV series and movies, which will be judged by the State Administration of Press, Publication, Radio, Film and Television (SAPPRFT) on an individual basis. Unregistered clips must also be removed.

The official news agency Xinhua has noted that local TV stations rarely screen imported series because they are supposed to favour domestic productions.

Three specific examples of indecent anime cartoons are mentioned in a statement posted to the Ministry of Culture's website:

High School of the Dead
High School of the Dead was accused of being too sexually suggestive
  • Blood-C, a series about a sword-wielding teenage girl who fights monsters in her town. It is accused of containing a "particularly bloody" beheading scene that would cause "extreme discomfort"
  • Terror in Resonance, a series involving two teenagers who carry out a terrorist attack with a nuclear weapon. Officials said this glorified violence and criminal activities
  • High School of the Dead, a show about a group of students struggling to survive in a world overtaken by zombies. The programme, which was given a certificate 15 when released in the UK, is accused of being borderline-pornographic

The ministry noted that 12 offending clips on Todou alone had attracted more than one million hits.

The firms involved have been told they will learn what penalties they face at a later stage.

Officials also announced plans to issue a "blacklist" of banned content to help the firms meet their obligations.

The move was attacked by an editorial published on Shenzhen-based news site Qianzhan.com, which questioned why adult-themed content could not be restricted to the over-18s, as is the case in Hong Kong and Taiwan.

Beijing is engaged in wider efforts to restrict what foreign online content its citizens can access, via the use of a system known as the Great Firewall of China.

But one expert suggested the fact anime had been singled out for criticism, might feed into specific concerns about the spread of that genre.

"The sexualisation of child-like women may be a legitimate concern to the Chinese government," said Professor Leslie Young from the Cheung Kong Graduate School of Business.

Another academic, however, said it signalled that the government was becoming more restrictive.

"Most websites and publications have a pretty good idea of what they can get away with," said Prof Karl Gerth, who holds a chair in Chinese studies at the University California, San Diego.

"And, for the past few years, they have internalised the more restrictive preferences of the new Xi Jinping regime.

"For this to break out in the open suggests the leeway to publish online or in print 'controversial' material of all sorts continues to narrow."


23.22 | 0 komentar | Read More

VIDEO: Big leap in 4K video streaming tech

A new method of data compression could see ultra-high definition video - also known as 4K - being streamed to TVs and other devices using around 50% of the bandwidth currently needed.

V-Nova has gathered 20 large telecoms, broadcast and IT companies including Sky, Intel, and the European Broadcasting Union to back its new Perseus technology.

It could see the average home broadband speed in the UK - around 22 megabits per second (Mbps) - support three 4K streams simultaneously instead of just one.

The technique makes use of the multiple cores within processors found in today's mobile devices and smart TVs to process the picture more efficiently.

Movie streaming firm Netflix currently requests users of its 4K Ultra High Def service to have a steady 25Mbps broadband connection, with analysis of their video stream showing between 12 and 16Mbps is actually required.

V-Nova says it can deliver the same quality picture using just 7-8Mbps.

Media expert Ian Maude, from Enders Analysis, said: "This is cutting-edge technology that will be welcomed by pay TV companies, and TV manufacturers because it will help drive 4k sales.

"But there are still limiting factors to the take-up of 4K including whether networks are capable of meeting demand, having a device able to display an ultra-high definition picture, and the amount of content currently being shot in 4K.

"Ultra HD will still remain niche for some time but this technology will help."

The technology also allows HD video to be streamed to mobile phones by using a similar amount of bandwidth to that currently needed to play music.

It is hoped the new encoding technique will help social network users share video as easily as sending messages, and bring standard definition video to millions of devices in developing countries where cellular data rates make it too expensive to stream any quality of video.

The system will first be deployed in the US and several European countries this summer with UK content distributors and broadcasters introducing it before the end of this year.


23.22 | 0 komentar | Read More

Google drops Chinese net regulator

Google building in China
Google Chrome users will see a warning when visiting certain Chinese sites

A Chinese internet regulator has hit out at Google for no longer accepting its security certificates.

When browsing the internet, certificates are designed to ensure the communication between a computer and web server is secure.

Google said it would no longer accept certificates issued by the China Internet Network Information Center (CNNIC) following a security lapse.

The CNNIC said Google's decision was "unacceptable and unintelligible".

The CNNIC is responsible for providing certificates for websites with .cn domain names, as well as Chinese-language domains - including banks and government sites.

It means users of Google's Chrome browser will see a warning notice when trying to access sites with CNNIC certificates.

It will state that the website the user is attempting to access may be unsecure.

Vulnerable

Google discovered last month that unauthorised security certificates were issued to several of its own domains.

After an investigation, conducted with the help of the CNNIC, it became clear that there was a problem with MCS Holdings, a Cairo-based firm contracted by the CNNIC to provide certificates.

Padlock
Security certificates are supposed to ensure that communication between users and websites is safe

Google said domains with security certificates issued by MCS Holdings were vulnerable to man-in-the-middle attacks - a method of hacking that involves intercepting communications between, for example, a person's computer and a web server.

MCS Holdings has said the problem was an accident and was due to human error.

While Google welcomed the CNNIC's help with the investigation, it said the regulator had "delegated their substantial authority to an organisation that was not fit to hold it".

As a result, Google has decided to no longer trust domains with certificates issued by, or on behalf of, the CNNIC.

Grace period

Users will be presented with a warning screen before being asked if they want to proceed to the "unsecure" site.

However, there will be some exceptions.

Google has offered a grace period to some major CNNIC-approved sites - such as banks - so they can obtain certificates from a different issuing authority.

The search giant said the CNNIC was welcome to reapply for trusted status "once suitable technical and procedural controls are in place".

But in a statement posted on Thursday, the regulator expressed anger, saying: "The decision that Google has made is unacceptable and unintelligible.

"CNNIC sincerely urge that Google would take users' rights and interests into full consideration."


23.22 | 0 komentar | Read More

Tech sites lead on April Fools gags

Cern scientist Valerio Rossetti
Cern scientists have become adept users of The Force since its discovery

The Force - the mysterious energy field used by the Jedi in Star Wars - has been discovered by researchers at the Cern laboratory.

The European research centre announced its spoof discovery with pictures showing its scientists using The Force in everyday life.

It was one of many April Fools jokes seen on websites around the world.

Others included a selfie shoe, driverless pizza delivery and thought-powered web search.

"The Force is what gives a particle physicist his powers," said Cern scientist Ben Kenobi of the University of Mos Eisley, Tatooine in a press release.

Many scientists at the centre were already using The Force, said the release, to communicate over long distances, influence minds and for "lifting heavy things out of swamps".

Microsoft used the background image for its main Bing search page to tout its April Fools joke in which it claimed the search system could read palms and minds to ensure people got the results they really wanted.

Anyone could try thought-powered search by putting their right hand on a screen where the Bing homepage indicated.

"The innovative new search function intelligently analyses the electrical signals transmitted through the hand to calculate the relevant search term," said the software firm.

Many other firms and sites produced spoof announcements and products for 1 April.

Spoof search page
Microsoft's Bing can read nerve impulses to improve search results

Smartphone maker Samsung produced a spoof page for a Blade edge version of its Galaxy smartphone that, it claimed, was designed for cooks. The limited edition handset incorporates a diamond-edged blade so the phone can also be used to chop food when it is not being used for calls, texts, or browsing the web.

HTC joined in with fake product pages for the Re-Sok - the "world's first truly smart sock". The technology-enhanced footwear is engineered with GPS so pairs of socks can easily find each other and have an automatic hole warning system to alert owners when their intelligent footwear is running thin.

For its April Fools parody, Motorola went to the trouble of making a lavish video showing two craftsmen producing selfie-sticks out of wood and leather.

New York-based footwear maker Miz Mooz joined in and produced a pair of shoes that have smartphone docking ports in each toe so each one can be used to take selfies.

Other parodies included cab-calling firm Hailo introducing piggy-back rides around cities; Domino's pizza introducing a driverless pizza delivery system using autonomous scooters; BMW making the ultimate rugby mouth guard and Sony making a wearable add-on for the PlayStation so players can take part in games when they are swimming.


23.22 | 0 komentar | Read More

Google reveals computer-on-a-stick

Chromebits
Asus will begin sales of the Chromebit computer-on-a-stick later this year

Google has announced new Chrome-powered computers, which are set to target budget-conscious consumers and schools.

The range includes a new type of device called the Chromebit, which looks like an oversized memory stick, and turns monitors and TVs into computers when plugged into their HDMI ports.

The tech firm also revealed the cheapest Chromebook laptops to date, costing $149 (£101).

The move is likely to intensify competition with Microsoft.

The announcements came less than a day after Microsoft revealed plans to sell a new entry-level tablet-laptop hybrid of its own.

Its Surface 3 costs more -$499, and £419 in the UK for the basic model - but provides access to a wider range of software made for the Windows platform.

Haier and Hisense Chromebooks

"This is a booming sector of the market at the moment," commented Chris Green, a tech analyst at the Davies Murphy Group consultancy.

"With the falling cost of hardware, schools are looking to families to equip kids with their own computers - the idea of BYOD [bring your own device to class].

"This has prompted manufacturers to create low-cost entry-level laptops that parents then buy for their children as well as themselves."

Google has pledged not to display ads to children that use the education-related software it provides for its Chrome platform, and does not charge manufactures to use its operating system.

Microsoft Surface 3
Microsoft's Surface 3 costs more but can be used with a touchscreen pen and run Windows software

But one expert said the company still hoped to financially benefit in the long-term.

"The key goal here for both Google and Microsoft is to put their brand and services out there in front of kids to build loyalty at a very early age," said Ronan de Renesse, a consumer technology expert at the Ovum consultancy.

"It's also a good way to to see whether or not to extend these types of devices to emerging markets, where they could be used outside education by people with very low disposable incomes."

For now, Google says the new Chromebooks and Chromebits will be limited to the US.

"We hope to make these widely available in the future, however we have nothing more to announce at this time," said a spokeswoman.

Stick computers

Chrome OS runs web-based software via the firm's Chrome browser and recently gained the ability to run a limited number of Android apps . The platform is designed to store most of its users' files in the cloud.

More than five million Chromebooks and Chromebase desktops were sold across the world last year, according to market research firm Gartner.

It forecasts that figure will grow to close to eight million units this year, and 16 million in 2018.

The Chromebits will be made by the Taiwanese manufacturer Asus.

Google said they would cost "less than $100" and go on sale before the end of the year.

Intel Computer Stick
Intel announced its rival Compute Stick in January

The search firm has already had success with the Chromecast, a media streaming dongle with a similar form factor.

In recent months both Intel and Hannspree have launched Windows-powered "PC-on-a-sticks", albeit at a slightly higher cost.

Such devices require their owners to provide displays, keyboards and other peripherals, but the idea is that many people will already own them.

"People seem to love the idea of having a working computer on something no bigger than a dongle that lets them do web browsing, media streaming and other tasks on a big screen, but can be out of sight, out of mind when needed," said Mr Green.

Great expectations

The two new laptops have already gone on sale.

Asus Chromebook Flip
The Asus Chromebook Flip will also go on sale shortly

The Haier Chromebook 11 is exclusive to Amazon while the Hisense Chromebook is being sold via Walmart.com.

Both feature an 11.6in (29.5cm) screen and between 8.5 to 10 hours of battery life, but keep their costs low by restricting themselves to 16 gigabytes of storage and 2GB of RAM.

Google also announced a slightly higher priced model, the Asus Chromebook Flip, whose touchscreen can be turned around. It will cost $249 when it goes on sale.

"The [ultra low-cost] sector is still a relatively small part of the entire PC market, but is growing fast, so is important," commented Mr de Renesse.

"What's key is to offer some of the lowest prices. But that has to be balanced against the fact that the US is a market with very high consumer expectation, even within schools."


23.22 | 0 komentar | Read More

Airbnb adds Cuba to destination list

Home holiday rental site Airbnb has added Cuba to its list of destinations.

More than 1,000 properties in the Caribbean nation are already listed, but can only be booked by users in the US.

The San Francisco-based site is restricted from showing the listings elsewhere because of a US trade embargo against the island.

Nevertheless, Airbnb said Cuba could eventually become one of its biggest markets in Latin America.

"We are actually plugging into an existing culture of micro-enterprise in Cuba," said the firm's regional director Kay Kuehne.

"The hosts in Cuba have been [renting out rooms to travellers] for decades."

One expert, however, said the site faced major challenges.

Airbnb
More than 600 properties are already listed in Havana alone
Cuba
The US relaxed travel restrictions for its own citizens to Cuba in January

"While Airbnb is a valuable alternative for millions of travellers, in the context of Cuba, because of the high margins it takes from every transaction, it won't necessarily meet with great success," said travel writer Simon Calder.

"All the Cuban bed-and-breakfast providers I know would like to keep all the money rather than handing 15% or more to an American corporation," he added, referring to the total amount the firm deducts from both the host and the guest.

"The other thing is that anybody who has used the internet in Cuba will know that a prospective host is unlikely to be able to respond immediately given the shockingly slow internet there, which reminds me of what you used to find across the developing world in the early 1990s."

The initial listings range from £10 a night for a private room in Trinidad to £695 a night for the whole of a five-bedroom "chalet" in Havana.

Airbnb
Airbnb members based outside the US are told they cannot complete a booking

Airbnb visitors outside the US can view the listings, but can only add them to their wish lists, rather than book them. An on-screen alert states that the site is not licensed to provide booking services to others.

The US recently began allowing Americans to travel to the island if they obtained a special licence, which can be granted for activities including family visits, educational activities and public performances.

The White House said it would like tourism to be added to the list, and President Obama has urged Congress to begin work to drop the wider sanctions.

"We are ending a policy that was long past its expiration date," he said in his State of the Union address in January.

The move made it possible for online film-streaming site Netflix to be launched in Cuba the following month, which freedom of speech campaign group Freedom House said was more "symbolic" than anything else in the short-term because of the country's "exceptionally slow connectivity".

Kayak
A search for Havana hotels on Kayak offers rooms in Romania and Bulgaria, but not Cuba

Visitors across the globe can still find listings for Cuba-based rooms via other US services, including TripAdvisor, which allows users to contact hosts directly but does not take a cut of the bookings itself.

Simon Calder however, criticised the "absurdity" of the fact that several other US-based travel sites, including Kayak and Booking.com, continued to ignore the island's existence.

"Anybody trying to find a flight to Havana on a US airline website will be assured that the city does not exist," he said.


23.22 | 0 komentar | Read More

Android apps to run on Windows, Macs

Chrome netbook
Google has made it possible for Android apps to run on machines that can run its Chrome browser and OS

Google has released a tool that lets Android apps run on any machine that can run its Chrome browser.

Called Arc Welder, the tool acts as a wrapper around Android apps so they can run on Windows, OSX and Linux machines.

The software expands the places that Android apps can run and might make it easier for developers to get code working on different machines.

But one developer said it was better to write apps that run "natively" rather than via separate software.

Arc - the App Runtime for Chrome - was first released in late 2014 as a way for Android apps to run on machines running Google's Chrome operating system. The OS is used on many netbooks and other small machines made by Google and some of its hardware partners.

Now Google has produced a new tool, called Arc Welder, which converts Android apps into versions that can be used with the Chrome browser, not just the OS. With Welder it has also added support for many Google Play services so when apps are converted they do not lose access to payment systems, maps and other functions they expect.

In its developer documentation, Google said the underlying technology for Arc Welder meant converted apps should run almost as quickly as they did on a phone or tablet.

With Arc Welder Google, it is seeking a way to help developers get their creations onto as many machines as possible, but one developer was not sure it would accomplish that aim.

Google Play store
The software tool could see Android apps popping up on desktop machines

"The best way to make apps by far is to make them natively using the tools that they give us," said Sam Furr, director and co-founder of development studio The App Developers.

He said that moving away from those well-known development systems can mean losing some behaviours, such as touch combinations, that people expect. He also wondered if a converted app running via a browser sitting in a separate operating system would be as fast as one developed natively.

Running a phone app on a desktop would inevitably mean losing some functions, he said, because bigger computers lack some of the extras, such as accelerometers and GPS receivers, that are now standard on smartphones.

Mr Furr said the ability to reach lots of different operating systems with just one app was potentially attractive.

"When building an app you want to get it to as many people as possible but you have to ask how long it will take to get it on other platforms," he said.

"There's no shortage of cross-platform frameworks and some of them are very good," he said, "but in our experience you do not get the same end product as you would when you build it natively."


23.22 | 0 komentar | Read More

YouTube hack 'threatened' Bieber clips

Justin Bieber YouTube
Kamil Hismatullin joked that he had been tempted to wipe singer Justin Bieber's channel

A Russian coder has revealed how he discovered a way to delete any video on YouTube.

A demonstration of Kamil Hismatullin's technique, posted online, shows that once he had copied part of a video's web address he could use it to wipe the clip within half a minute.

Rather than exploit the hack, he instead reported it to parent company Google, which gave him a reward.

He joked, however, that he was tempted to wipe Justin Bieber's music videos.

"I spent six to seven hours [on] research, considering that [for a] couple of hours I've fought the urge to clean up Bieber's channel, haha," wrote Mr Hismatullin.

"Although it was an early Saturday's (sic) morning in San Francisco when I reported [the] issue, Google's security team replied very fast, since this vulnerability could create utter havoc in a matter of minutes in the bad hands.

"This vulnerability [might have been used] to extort people or simply disrupt YouTube by deleting massive amounts of videos in a very short period of time.

"It was fixed in several hours, Google rewarded me $5,000 and luckily no Bieber videos were harmed."

Mr Hismatullin wrote that he discovered the flaw while investigating YouTube Creator Studio, a service that lets video creators see analytics data about the clips they have uploaded via an app.

YouTube video deleted
Mr Hismatullin showed that his hack could be completed using easily-accessible tools

The facility allows any clip to be deleted if you type in both its event ID - which can be found in its web address - and a long string of letters and numbers known as an authentication token, which is supposed to act as a kind of password.

The problem the coder discovered was that the service was accepting any token for a takedown request, rather than requiring one that belonged to the account of the person who had uploaded the clip.

This meant Mr Hismatullin could simply copy a token from his own account and use it to delete others' videos.

The developer said that he had spent time searching for vulnerabilities in Google's products after previously having been given a $1,337 (£902) grant by the firm.

The search giant gives such payouts as part of a programme to encourage people who have previously reported flaws to hunt out more.

The scheme puts a cap on subsequent payments, limiting the bounty Mr Hismatullin received for his findings.

"To be honest I expected $15,000 to $20,000," he commented.

"I wanted to write a kind of 'complaint' to Google, but first I re-read [its] rules and understood that Google could not pay me more.

"Facebook has not got a boundary for maximum reward, so they can pay as much as they want."


23.22 | 0 komentar | Read More

OnLive gaming service to switch off

OnLive
OnLive had allowed TV and PC owners to play console video games for a subscription fee

Video game streaming pioneer OnLive is to shut down after selling several of its patents to Sony.

The California-based firm had allowed PC and tablet owners to play console titles, which were run on its computer servers but controlled and viewed in the gamer's home.

Sony is expected to use the 140 patents it has acquired to support its own PlayStation Now streaming service.

OnLive was once valued at $1.8bn (£1.2bn).

The terms of the deal have not been disclosed.

It brings to an end a troubled five years of service.

In 2012, many of OnLive's staff lost their jobs when the company was sold to a venture capital firm after running up about $40m in debt.

Several of the biggest publishers had refused to support it, although the business had proven that gaming was possible without too much delay between a user pressing a gamepad button and their character responding.

Interest was also limited by the fact users needed a relatively fast broadband connection.

In addition, many PC owners seemed to prefer buying games from Steam and other online marketplaces, rather than paying a monthly subscription fee for a Netflix-like "all-you-can-eat" experience.

In March 2014, the company announced a new direction with the launch of CloudLift, a facility that let gamers stream and play select titles they had bought from Steam on mobile devices, TVs and other computers.

CloudLift
The launch of CloudLift failed to make OnLine a viable standalone business

But things did not bode well when it cut the price from $14.99 to $7.95 just a month later.

"It is with great sadness that we must bring the OnLive Game Service to a close," a message posted to the company's site now says.

"Sony is acquiring important parts of OnLive, and their plans don't include a continuation of the game service in its current form.

"As the first-ever game streaming service of its kind, everyone who has ever played a game using OnLive has contributed to the technology and its evolution in some way.

"We're immensely proud of what's been achieved and extend our heartfelt gratitude to you for being a part of the OnLive Game Service."

The firm added that it would not be offering any refunds for related hardware purchases, unless they were made after 1 February.

Although OnLive will cease to exist, streamed video game services look set to thrive.

PlayStation Now
Sony began offering its PlayStation Now service to the UK last month

Sony offers PlayStation Now, which provides ongoing access to more than 100 PS3 games for a monthly fee as well as the ability to rent specific titles for limited amounts of time.

Until recently the service only worked with Sony's own video game consoles and TVs in the US and Canada. However, it has recently been extended to a select group of UK players as well.

The Japanese firm also plans to add Samsung's smart TVs to its list of supported devices later this year.

In addition, chipmaker Nvidia streams a library of PC games to its Android-powered Shield handhelds across the globe via a service called Grid. It has said it plans to extend this to a new living-room console in May.


23.22 | 0 komentar | Read More

Apple boss 'to donate $800m fortune'

Written By Unknown on Minggu, 29 Maret 2015 | 23.22

Apple CEO Tim Cook as he speaks to members of the media at an Apple press event in San Francisco, California 13 March 2015
Tim Cook, the latest billionaire to pledge give away his fortune to charity

The chief executive of Apple, Tim Cook, has announced he is donating most of his wealth to charity before he dies.

The head of the world's most profitable company is worth over $800m (£537m).

Mr Cook told Fortune Magazine that he would leave his wealth to philanthropic causes but not before paying for his 10-year-old nephew's college education.

He joins a growing number of the world's super-rich who are giving away their wealth, including Facebook founder Mark Zuckerberg.

Five years ago, billionaire investor Warren Buffett and Microsoft founder Bill Gates launched the campaign The Giving Pledge.

It aims to convince billionaires to give at least half of their fortunes to charity. Mr Zuckerberg and over 100 others have so far signed up to the "moral commitment".

Mr Cook's base salary went up by 43% in February 2014, rising to $9.2m (£6.2m) a year.

According to Fortune Magazine, he holds $120m (£81m) worth of Apple shares and a further $665m (£447m) of restricted stocks.

A US university education costs an estimated $30,000 (£20,000) a year on average. Some private universities cost more than $50,000 a year.

Harvard, one of the most prestigious colleges in the country, charges $43,938 per year in tuition alone for students not receiving financial aid. That rises to $58,607 with room and board, according to its website.


23.22 | 0 komentar | Read More

Safari users win right to sue

Google
Google faces legal action from Safari users

Google has lost a Court of Appeal bid to stop consumers having the right to sue in the UK over alleged misuse of privacy settings.

A group of users claim that Google bypassed security settings on the Safari browser to install tracking cookies on their computers in order to target them with advertising.

Google said it was "disappointed with the court's decision".

One of the claimants called it a "David and Goliath victory".

The case revolves around a so-called Safari workaround, which allegedly allowed Google to avoid the Safari web browser's default privacy setting to place cookies, that gathered data such as surfing habits, social class, race, ethnicity, without users' knowledge.

Safari is a browser used on Apple computers, iPads and other devices while cookies are small text files stored by browsers which can record information about online activity, and help some online services work.

Google had attempted to prevent the action, claiming there was no case to answer because consumers had suffered no financial harm.

In its judgement, the Court of Appeal said: "These claims raise serious issues which merit a trial.

"They concern what is alleged to have been the secret and blanket tracking and collation of information, often of an extremely private nature… about and associated with the claimants' internet use, and the subsequent use of that information for about nine months. The case relates to the anxiety and distress this intrusion upon autonomy has caused."

"The Court of Appeal has ensured Google cannot use its vast resources to evade English justice," said Judith Vidal-Hall, one of three claimants.

"Ordinary computer users like me will now have the right to hold this giant to account before the courts for its unacceptable, immoral and unjust actions."

The landmark case potentially opens the door to litigation from the millions of Britons who used Apple computers, iPhones, iPods and iPads during the relevant period, summer 2011 to spring 2012, said Jonathan Hawker who represents the Google Action Group, a not-for-profit company set up to manage claims against the internet giant for breach of privacy.

Dan Tench, a partner at law firm Olswang who is acting for the claimants, welcomed the decision.

"Google, a company that makes billions from advertising knowledge, claims that it was unaware that was secretly tracking Apple users for a period of nine months and had argued that no harm was done because the matter was trivial as consumers had not lost out financially.

"The Court of Appeal saw these arguments for what they are: a breach of consumers' civil rights and actionable before the English courts. We look forward to holding Google to account for its actions."

Google has already paid fines of over $40m related to this incident in the US. It was fined by the Federal Trade Commission (FTC) and separately by 38 US states.


23.22 | 0 komentar | Read More

Europol chief warns on encryption

Person using a computer keyboard
Encrypted communications are the biggest problem for police, says European police chief

A European police chief says the sophisticated online communications are the biggest problem for security agencies tackling terrorism.

Hidden areas of the internet and encrypted communications make it harder to monitor terror suspects, warns Europol's Rob Wainwright.

Tech firms should consider the impact sophisticated encryption software has on law enforcement, he said.

Mr Wainwright was talking to 5 Live Investigates.

There is a significant capability gap that has to change if we're serious about ensuring the internet isn't abused and effectively enhancing the terrorist threat.
Rob Wainwright, Director, Europol

A spokesman for TechUK, the UK's technology trade association, said: "With the right resources and cooperation between the security agencies and technology companies, alongside a clear legal framework for that cooperation, we can ensure both national security and economic security are upheld."

Mr Wainwright said that in most current investigations the use of encrypted communications was found to be central to the way terrorists operated.

"It's become perhaps the biggest problem for the police and the security service authorities in dealing with the threats from terrorism," he explained.

"It's changed the very nature of counter-terrorist work from one that has been traditionally reliant on having good monitoring capability of communications to one that essentially doesn't provide that anymore."

Mr Wainwright, whose organisation supports police forces in Europe, said terrorists were exploiting the "dark net", where users can go online anonymously, away from the gaze of police and security services.

Secret messaging

But he is also concerned at moves by companies such as Apple to allow customers to encrypt data on their smartphones.

And the development of heavily encrypted instant messaging apps is another cause for concern, he said.

GCHQ
Edward Snowden revealed that the UK's GCHQ was also involved in widespread surveillance of communications

This meant people could send text and voice messages which police found very difficult or impossible to access, he said.

"We are disappointed by the position taken by these tech firms and it only adds to our problems in getting to the communications of the most dangerous people that are abusing the internet.

"[Tech firms] are doing it, I suppose, because of a commercial imperative driven by what they perceive to be consumer demand for greater privacy of their communications."

Surveillance

Mr Wainwright acknowledged this was a result of the revelations by former National Security Agency contractor Edward Snowden, who exposed how security services were conducting widespread surveillance of emails and messages.

He said security agencies now had to work to rebuild trust between technology firms and the authorities.

The TechUK spokesman told the programme: "From huge volumes of financial transactions to personal details held on devices, the security of digital communications fundamentally underpins the UK economy.

"Encryption is an essential component of the modern world and ensures the UK retains its position as one of the world's leading economies.

"Tech companies take their security responsibilities incredibly seriously, and in the ongoing course of counter-terrorism and other investigations engage with law enforcement and security agencies."

The programme also found evidence that supporters of the Islamic State (IS) are using encrypted sites to radicalise or groom new recruits.

Rob Wainwright
Europol director Rob Wainwright says IS is believed to have up to 50,000 different twitter accounts

On one blogging website, a 17-year-old girl who wants to become a "jihadi bride" is told that if she needs to speak securely she should use an encrypted messaging app.

The family of 15-year-old Yusra Hussein from Bristol, who went to Syria last year, also believe she was groomed in this way.

Twitter terrorism

The extent of the challenge faced by security services is shown in the scale of social media use by IS.

Mr Wainwright revealed that IS is believed to have up to 50,000 different Twitter accounts tweeting up to 100,000 messages a day.

Europol is now setting up a European Internet Referral Unit to identify and remove sites being used by terrorist organisations.

Mr Wainwright also says current laws are "deficient" and should be reviewed to ensure security agencies are able to monitor all areas of the online world.

"There is a significant capability gap that has to change if we're serious about ensuring the internet isn't abused and effectively enhancing the terrorist threat.

"We have to make sure we reach the right balance by ensuring the fundamental principles of privacy are upheld so there's a lot of work for legislators and tech firms to do."

BBC Radio 5 live Investigates is on BBC 5live on Sunday 29 March at 11am or download the programme podcast.


23.22 | 0 komentar | Read More

Children on screens six hours a day

Boy on beach with tablet
Children are spending far more time watching a screen, even though traditional TV viewing has dropped

The amount of time children spend glued to a screen has risen dramatically in the last 20 years, a new report suggests.

Children aged five to 16 spend an average of six and a half hours a day in front of a screen compared with around three hours in 1995, according to market research firm Childwise.

Teenaged boys spend the longest, with an average of eight hours.

Eight-year-old girls spend the least - three-and-a-half hours, according to the study.

Screen time is made up of time spent watching TV, playing games consoles, using a mobile, computer or tablet.

Changing times

The Connected Kids report, compiled by market researcher Childwise, has collated data from 1995 to the present day to create a comprehensive picture of children's media habits.

Each year, its report, which is not available online, surveys around 2,000 children, aged five to 16.

It finds that teenaged girls now spend an average of seven-and-a-half- hours watching screens, compared with 3.5 hours of TV viewing in 1995.

Younger children fare slightly better - in 1995, five to 10-year-olds averaged around two-and-a-half-hours of TV.

Fast-forward to 2014 and screen time has risen to four-and-a-half hours.

Children are also now multi-screening - using more than one device at the same time, for example, watching TV while surfing the internet on a tablet or mobile so some of the screen time will be concurrent.

"The main difference from the 1990s is that then TV and magazines were the main ways for connecting kids to the media and now they have different devices from tablets, mobiles, games consoles and they have a much higher screen time," said research executive Matthew Nevard.

Children reading The Beano
Back in 1995 children's main interaction with the media was via TV or comics like The Beano

Children's TV viewing habits have changed dramatically, with the majority now watching television via catch-up services and YouTube rather than the traditional TV set, according to the report.

YouTube is the most popular on-demand service with more than half of respondents accessing TV and video via the site since 2013.

Paid-for on-demand services, such as Netflix, have also risen rapidly in recent years and are expected to continue to grow in popularity.

It is not great news for the terrestrial channels - BBC One has seen its audience of seven to 16-year-olds drop from over 80% in 1995 to just over 40% in 2014. ITV's audience follows a similar trajectory.

The transition to digital, coupled with dedicated children's channels, is another reason for the the drop in children's viewing of the main channels with children now watching more content on dedicated channels such as CBBC, CITV, Nickelodeon and Disney.

Demanding connectivity

Babies with tablet and phone
Children growing up now have never known a time without the internet

The study also looks at how the internet has changed the way children engage with information.

"The internet is pivotal to their lives and they are now able to access a wealth of content," said Mr Nevard.

The internet has given children more freedom to explore their own interests rather than being tied into the content offered to them from the TV schedules or magazines.

"They can find the content that they want," he said.

The study describes connectivity as "a fundamental need for young people now".

"Children now don't remember a time before the internet," said Mr Nevard.

Ubiquitous online access is also likely to influence the way children interact with their families and "their willingness to participate in family holidays and trips out", the report finds.

Image culture

Morpheus
Will all children own a virtual reality headset?

For the last 10 years, Childwise has charted the most popular websites for young people.

YouTube has remained in the top three since 2007 while Facebook has seen its appeal dip in recent years, as children turn to newer services such as Snapchat.

Children enjoy the privacy of WhatsApp and Snapchat, according to the survey, and the use of such services is also changing how they communicate.

"It reflects the image culture which has emerged, where pictures are utilised to give a better representation of current moods and or activities," the survey said.

Google is one of the few sites to remain popular across 10 years of data with sites.

Wearable tech

The report also attempts a bit of future-gazing and predicts that in the next 10 years, children growing up will have little understanding of a world without the internet.

The internet of things - where household objects communicate and share data - will be regarded as normal, it suggests.

"Having appliances which cannot be controlled using a smartphone or some kind of online dashboard may be seen as outdated, or at least increasingly rare," the report concludes.

It also thinks that most children will have some form of wearable technology, be it a smart watch, smart glasses or a virtual reality headset.


23.22 | 0 komentar | Read More

PayPal fined for illegal payments

PayPal headquarters
PayPal said it had voluntarily shared details about the payments

PayPal has agreed to pay $7.7m (£5.1m) to the US government following claims it allowed payments that violated sanctions against Iran, Cuba and Sudan.

The US Treasury Department said the payment firm had failed to adequately screen and prevent transactions.

They included a $7,000 transaction from someone listed by the US government as being involved in the proliferation of weapons of mass destruction.

PayPal said it had improved the real-time scanning of payments.

In a statement, it said it had "voluntarily" reported to the Treasury's Office of Foreign Assets Control (Ofac) certain payments it had processed between 2009 and 2013.

Delays in scanning had allowed some prohibited payments to be processed, PayPal said.

"Since then, we've taken additional steps to support compliance with Ofac regulations with the introduction of real-time scanning of payments and improved processes," a PayPal representative told the BBC.

One of the cases involved Kursad Zafer Cire, who was named by the US State Department in 2009 as a person linked to programmes involving weapons of mass destruction.

Between October 2009 and April 2013, PayPal reportedly processed 136 transactions to or from an account registered in his name.

Other payments involved goods and services going to and from Cuba, Sudan and Iran.

In total, according to the Treasury Department, nearly 500 PayPal transactions, worth almost $44,000, had potentially violated sanctions that ban US companies from doing business with individuals or organisations on a blacklist.

Under the settlement, PayPal did not admit or deny it had violated the sanctions.


23.22 | 0 komentar | Read More

Tinder prank 'tricked flirting men'

Tinder logo
An anonymous developer reportedly manipulated the app to allow him to match up men who both thought they were flirting with a woman

A prank played by a developer has exposed a "serious lapse of security" in the dating app Tinder, according to one expert.

The developer reportedly tricked men into flirting with each other, using fake profiles he created as bait.

Men who sought to contact one of the fake women were matched up with each other, rather than with her.

Security consultant Prof Alan Woodward said the episode "cannot help but knock one's confidence" in Tinder's security.

'Surprisingly easy'

The Verge reported on Wednesday that the anonymous developer had managed to manipulate Tinder's application program interface (API), which controls how apps and programs interact.

The developer reportedly created a program that could detect when men on Tinder expressed an interest in talking to the fictitious women portrayed in his bait profiles.

Tinder messages
The developer reportedly collected the messages and passed them to the Verge

Two men who did so were then put in touch with each other, rather than with the woman, with the messages relayed via the dummy account. The developer, named by the Verge as "Patrick", then collected the messages they sent each other.

The process had been, he said, "surprisingly easy".

'Security lapse'

Prof Woodward told the BBC: "Put simply, it shouldn't be possible for someone to do this, so the fact that Tinder was 'tweaked' in this way is a serious lapse in security.

"I am surprised that a company that is dealing with such sensitive interactions, which are billed as being truly private, has not seen this loophole in its own penetration testing."

He said that companies that dealt with sensitive data were "trusted by default" by their users, adding: "I would have hoped that such companies would exercise the most stringent efforts as part of their duty of care".

Patrick told the Verge that he was a Tinder user himself and had met his current girlfriend using the app.

He was motivated, he said, by a desire to draw attention to the sometimes harassing nature of the messages many women received from men on it.

"The original idea was to throw that back into the face of the people doing it to see how they would react," he said.

He said that the first matches had been made within minutes of the program's activation and that he had been overseeing 40 conversations between men within 12 hours.

Patrick told the website that he had intervened if a real-world meeting was imminent.

Of the people he pranked, he said: "They ignore all the signs, they ignore all the weird things. When someone is so quick to meet up without any detail or know anything about the person at all, maybe it's deserved."

Tinder
Users of the app can express an interest in each other - or not - by swiping right or left on their smartphone screens

While he sympathised with the developer's reasoning, Prof Woodward said: "There is no excuse for exploiting any such vulnerability and mounting this kind of interference.

"If someone is researching security, then most companies now have a bounty programme that pays them for reporting problems such as this."

It is not the first time Tinder has faced scrutiny over its security. In 2013, it was reported that some users could have been tracked to within 100ft (30m). That flaw was later patched.

The developer could not be reached for comment. A spokesman for Tinder did not respond to a request for comment.


23.22 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger