Privacy

Most IT Pros Have Seen Embarrassing Information About Their Colleagues 142

An anonymous reader writes: Often working in isolation, IT teams are still considered to be supporting players in many workplaces, yet the responsibility being placed on them is huge. In the event of a cyber attack, network outage or other major issue, they will typically drop everything to fix the problem at hand. Almost all the respondents (95%) to a new AlienVault survey said that they have fixed a user or executive's personal computer issue during their work hours. In addition, over three-quarters (77%) said that they had seen and kept secret potentially embarrassing information relating to their colleagues' or executives' use of company-owned IT resources.
Facebook

French Gov't Gives Facebook 3 Months To Stop Tracking Non-User Browsers 173

Reader iamthecheese writes RT reports that France's National Commission of Information and Freedoms found Facebook tracking of non-user browsers to be illegal. Facebook has three months to stop doing it. The ruling points to violations of members and non-members privacy in violation of an earlier ruling. The guidance, published last October, invalidates safe harbor provisions. If Facebook fails to comply the French authority will appoint someone to decide upon a sanction. Related: A copy of the TPP leaked last year no longer requires signing countries to have a safe harbor provision.
Crime

Hearthstone Cheats and Tools Spiked With Malware (csoonline.com) 41

itwbennett writes: Cheating at the online card game Hearthstone (which is based on Blizzard's World of Warcraft) can get you banned from the game, but now it also puts you at risk of 'financial losses and system ruin,' writes CSO's Steve Ragan. Symantec is warning Hearthstone players about add-on tools and cheat scripts that are spiked with malware. 'In one example, Hearth Buddy, a tool that allows bots to play the game instead of a human player (which is supposed to help with rank earnings and gold earning) compromises the entire system,' says Ragan. 'Another example, are the dust and gold hacking tools (Hearthstone Hack Tool), which install malware that targets Bitcoin wallets.'
Censorship

FBI Gripes "We Can't Read Everyone's Secrets" (reuters.com) 169

New submitter rdukb writes: FBI Director James Comey told the Senate Intelligence Committee that investigators still can't access the phone contents of one of the San Bernadino killers. He went on to argue that the phenomenon of communications "going dark" due to more sophisticated technology and wider use of encryption is "overwhelmingly affecting" law enforcement operations, including, not only the San Bernadino murders, but also investigations into other murders, car accidents, drug trafficking and the proliferation of child pornography. This might increase pressure on Apple to loosen the backdoor restrictions. Will the industry relent and allow Government access to data from these devices?
Security

President Obama Unveils $19 Billion Plan To Overhaul U.S. Cybersecurity 185

erier2003 writes: President Obama on Tuesday unveiled an expansive plan to bolster government and private-sector cybersecurity by establishing a federal coordinator for cyber efforts, proposing a commission to study future work, and asking Congress for funds to overhaul dangerously obsolete computer systems. His newly signed executive orders contain initiatives to better prepare college students for cybersecurity careers, streamline federal computer networks, and certify Internet-connected devices as secure. The Cybersecurity National Action Plan also establishes a Federal Privacy Council (to review how the government stores Americans' personal information), creates the post of Chief Information Security Officer, and establishes a Commission on Enhancing National Cybersecurity.
Advertising

Adblock Fast Returns To Google Play a Week After Being Pulled 52

An anonymous reader writes: A week ago, Google suddenly removed Adblock Fast from its Android app store. Today, the ad blocker has been reinstated, enabling Samsung users to download it once again from Google Play. Late last month, the browser preinstalled on Samsung's Android phones gained support for content-blocking plugins, and the first plugin to support the functionality was a free and open-source solution called Adblock Fast. Rocketship Apps, the maker of Adblock Fast, uploaded the Android plugin on January 29, but Google rejected an app update on February 1. The app hit Google Play's top spot for free, new productivity apps on February 2, and was pulled by Google on the same day.
Australia

Australia Cuts 110 Climate Scientist Jobs: "The Science is Settled." 551

An anonymous reader writes: With an ax rather than a scalpel, Australia's federal science agency last week chopped off its climate research arm in a decision that has stunned scientists and left employees dispirited. Why? Because the science is settled, there is no need for more basic research, the government says. No doubt many will experience a case of schadenfreude as they see those who have long claimed "the science is settled" face the inevitable and logical consequence of that stance.
Advertising

Wired To Block Ad-Blocking Users, Offer Subscription (wired.com) 654

AmiMoJo writes: In a blog post Wired has announced that it will begin to block users who block ads on its site: "On an average day, more than 20 percent of the traffic to WIRED.com comes from a reader who is blocking our ads. We know that you come to our site primarily to read our content, but it's important to be clear that advertising is how we keep WIRED going," wrote the editors. The post goes on to offer two options for users blocking ads: whitelist wired.com or subscribe for $1/week.
Crime

Hackers Leak List of FBI Employees (vice.com) 128

puddingebola writes: The hackers responsible for the leaking of DHS employees made good on their threat to reveal the names of 20,000 FBI employees. From the article: "The hacker provided Motherboard with a copy of the data on Sunday. The list includes names, email addresses (many of which are non-public) and job descriptions, such as task force deputy director, security specialist, special agent, and many more. The list also includes roughly 1,000 FBI employees in an intelligence analysis role."
Businesses

Sen. Blumenthal Demands Lifting of IT 'Gag' Order (computerworld.com) 219

dcblogs writes: U.S. Sen. Richard Blumenthal (D-Conn.) is asking the U.S. Department of Justice to investigate the layoff and replacement of IT workers by foreign workers at a state energy utility. But he is also demanding that the utility, Eversource Energy, drop a particularly restrictive non-disparagement clause that laid off employees had to sign to receive their severance. This clause bars discussion "that would tend to disparage or discredit" the utility. [emphasis added] He wants the employees, who had to train foreign replacements, to be able to state "honestly what happened to them."
Piracy

Anti-Piracy Group BREIN Demands Torrents Time Cease and Desist 91

An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."
GNU is Not Unix

Talos Secure Workstation Is Free-Software Centric — and $3100 [Updated] 117

jones_supa writes: These days, the motivation to use open source software for many people is to avoid backdoors placed by intelligence organizations and to avoid software that has hidden privacy-intruding characteristics. For the operating system and userspace software, open choices are already available. The last remaining island has been the firmware included in various ROM chips in a computer. Libreboot has introduced an open BIOS, but it is not available for newer systems featuring the Intel ME or AMD PSP management features. Talos' Secure Workstation fills this need, providing a modern system with 8-core POWER8 CPU, 132 GB RAM, and open firmware. The product is currently in a pre-release phase where Raptor Engineering is trying to understand if it's possible to do a production run of the machine. If you are interested, it's worth visiting the official website. Adds an anonymous reader about the new system, which rings in at a steep $3100: "While the engineers found solace in the POWER8 architecture with being more open than AMD/Intel CPUs, they still are searching for a graphics card that is open enough to receive the FSF Respect Your Freedom certification." Update: 02/08 18:44 GMT by T : See also Linux hacker and IBM employee Stewart Smith's talk from the just-completed linux.conf.au on, in which he walks through "all of the firmware components and what they do, including the boot sequence from power being applied up to booting an operating system." Update: 02/08 23:30 GMT by T :FSF Licensing & Compliance Manager Joshua Gay wrote to correct the headline originally appeared with this story, which said that the Talos workstation described was "FSF Certified"; that claim was an error I introduced. "The FSF has not certified this hardware," says Gay, "nor is it currently reviewing the hardware for FSF certification." Sorry for the confusion.
Crime

Metel Hackers Roll Back ATM Transactions, Steal Millions (threatpost.com) 72

msm1267 writes: Researchers from Kaspersky Lab's Global Research & Analysis Team today unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more than 100 financial companies. The heaviest hitter among the newly discovered gangs is an ongoing campaign, mostly confined to Russia, known as Metel. This gang targets machines that have access to money transactions, such as call center and support machines, and once they are compromised, the attackers use that access to automate the rollback of ATM transactions. As the attackers empty ATM after ATM—Metel was found inside 30 organizations—the balances on the stolen accounts remained untouched.
Security

Hackers Leak DHS Staff Directory, Claim FBI Is Next (csoonline.com) 81

itwbennett writes: On Sunday, the name, title, email address, and phone number of more than 9,000 DHS employees, with titles ranging from engineers, to security specialists, program analysts, InfoSec and IT, all the way up to director level was posted on Twitter. 'The account went on to claim that an additional data dump focused on 20,000 FBI employees was next,' writes CSO's Steve Ragan. The hacker told Motherboard that the data was obtained by "compromising the email account of a DoJ employee, although he would not elaborate on how that account was accessed in the first place."
The Internet

India Blocks Facebook's Free Basics Internet Service (thestack.com) 133

An anonymous reader writes: India's leading telecom regulator, TRAI (Telecom Regulatory Authority of India), has today voted against differential pricing, ruling with immediate effect that all data prices must be equal, and that companies cannot offer cheaper rates than others for certain content. The call is a significant blow to Facebook's Free Basics (previously Internet.org) initiative and Airtel Zero – projects which work to make internet access more accessible by providing a free range of "basic" services. The watchdog confirmed that providers would no longer be able to charge for data based on discriminatory tariffs but instead that pricing must be "content agnostic." It added that fines of Rs. 50,000 – 50 Lakh would be enforced should the regulations be violated.

Slashdot Top Deals