Ian Lamont writes "LendInk, a community for people interesting in using the lending features of the Kindle and Nook, has been shut down after some authors mistakenly thought the site was hosting pirated ebooks. The site brought together people who wanted to loan or borrow specific titles that are eligible for lending, and then sent them to Amazon or BarnesAndNoble.com to make the loans. Authors and publishers who were unaware of this feature of the Kindle and Nook, and/or mistakenly assumed the site was handing out pirated copies, were infuriated. LendInk's hosting company received hundreds of complaints and shut the site down. LendInk's owner says: 'The hosting company has offered to reinstate Lendink.com on the condition that I personally respond to all of the complaints individually. I have to say, I really do not know if it is worth the effort at this point. I have read the comments many of these people have posted and I don't think any form of communication will resolve the issues in their eyes. Most are only interested in getting money from me and others are only in it for the kill. They have no intentions of talking to me or working this out. So much for trying to start a business and live the American Dream.'"
Make a difference in your data center. Sign up for SlashDataCenter Update newsletter now.
chill writes "People have been discussing the raid on the Dotcom mansion for months, but now more details and video footage of that morning have begun to emerge from the trial. From the article: 'At 6.46am on January 20, the raid was underway. The helicopter carrying members of the elite special tactics group flew into the Coatesville home of Dotcom. "Ground units, Gates are open," someone says into the radio. Dotcom's pregnant wife their three children, some guests and about a dozen staff were also there. All is quiet below. Within seconds four armed members of the special tactics group ran towards the main door. The helicopter immediately took off. The main justification for using it at all was that Dotcom's security staff could have stopped police vehicles at the gates. But as the chopper flew out, ground forces were already arriving just seconds behind.'"
An anonymous reader writes "A U.S. government report released on Tuesday says the Federal Communications Commission needs to update its guidelines for limiting cell phone radio-frequency exposure. The limit was set in 1996 to an exposure rate of 1.6 watts per kilogram, and has not been updated since. The report does not advocate in favor of any particular research, and actually points out that the limit could possibly be raised, but says the FCC's rules have not kept pace with recent studies on the subject one way or the other. An executive for The Wireless Association said, 'The FCC has been vigilant in its oversight in this area and has set safety standards to make sure that radio frequency fields from wireless phones remain at what it has determined are safe levels. The FCC's safety standards include a 50-fold safety factor and, as the FCC has noted, are the most conservative in the world.'"
david.emery writes "In a document from the ongoing Samsung/Apple trial, provided in both English translation and Korean original, Samsung engineers provided a detailed comparison of user interface features in their phone against the iPhone. In almost all cases, the recommendation was to adopt the iPhone's approach. Among other observations, this shows how much work goes into defining the Apple iPhone user experience." Ars has an article on the evidence offered by Apple so far.
Billly Gates writes "Microsoft has confirmed that Internet Explorer 10 will have Do-Not-Track settings enabled by default. IE 10 comes with Windows 8, and will go release candidate for Windows 7 very soon, according to Anne Kohn in a comment in IE's blog. During Windows 8 setup, users who choose the 'Express' option will have DNT on by default, while using the 'Custom' option will give them the chance to change the setting, if they want. IE 10 already has a score of 319 in html5test.com, while MS is trying to position IE as a great browser again. Will this pressure other browsers such as Firefox and Opera to do the same?" When Microsoft began talking about this in May, it touched off quite a debate at W3C about whether browsers should have DNT turned on by default or not.
Lucas123 writes "Over the past three years, about 21 million patients have had their unencrypted medical records exposed in data security breaches that were big enough to require they be reported to the federal government. Each of the 477 breaches that were reported to the Office for Civil Rights (OCR) involved 500 or more patients, which the government posts on what the industry calls 'The Wall of Shame.' About 55,000 other breach reports involving fewer than 500 records where also reported to the OCR. Among the largest breaches reported was TRICARE Management Activity, the Department of Defense's health care program, which reported 4.9 million records lost when backup tapes went missing. Another five breaches involved 1 million or more records each. Yet, only two of the organizations involved in the breaches have been fined by the federal government."
New submitter rkhalloran writes "The remnants of the failed litigation engine that was the SCO Group has finally filed for liquidation under Chapter 7 of the bankruptcy code. 'There is no reasonable chance of "rehabilitation."' Groklaw describes the recent filing (PDF) thus: 'I will try my best to translate the legalese for you: the money is almost all gone, so it's not fun any more. SCO can't afford Chapter 11. We want to shut the costs down, because we'll never get paid. But it'd look stupid to admit the whole thing was ridiculous and SCO never had a chance to reorganize through its fantasy litigation hustle. Besides, Ralph Yarro and the other shareholders might sue. So they want the litigation to continue to swing in the breeze, just in case. But SCO has no money coming in and no other prospects, so they want to proceed in a cheaper way and shut this down in respects to everything else.' I guess that means the lawyers will suck the marrow from the carcass and leave the bones to bleach out in the sun."
Wired has an article about a ruling from the 9th U.S. Circuit Court of Appeals saying the government can't be sued over intercepting phone calls without a warrant. The decision (PDF) vacated an earlier ruling which allowed a case to be brought against the government. The plaintiffs in the case argued that the government had implicitly waived sovereign immunity, but today's ruling points out that it can only be waived explicitly. Judge McKeown wrote, "This case effectively brings to an end the plaintiffs’ ongoing attempts to hold the Executive Branch responsible for intercepting telephone conversations without judicial authorization." The ruling does, however, take time to knock down the government's claim that the case was brought frivolously: "In light of the complex, ever-evolving nature of this litigation, and considering the significant infringement on individual liberties that would occur if the Executive Branch were to disregard congressionally-mandated procedures for obtaining judicial authorization of international wiretaps, the charge of 'game-playing' lobbed by the government is as careless as it is inaccurate. Throughout, the plaintiffs have proposed ways of advancing their lawsuit without jeopardizing national security, ultimately going so far as to disclaim any reliance whatsoever on the Sealed Document. That their suit has ultimately failed does not in any way call into question the integrity with which they pursued it."
jfruh writes "One of the odder moments during the Oracle v. Google trial over Java patents came when patent blogger Florian Mueller disclosed that he had a 'consulting relationship' with Oracle. Now it looks like we're going to find out which other tech bloggers and journalists were on the payroll of one of the two sides in this epic fight. Judge William Alsup has ordered (PDF) that both parties disclose 'all authors, journalists, commentators or bloggers who have reported or commented on any issues in this case and who have received money (other than normal subscription fees) from the party or its counsel during the pendency of this action.'"
An anonymous reader writes "In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some of the people that are using such fake followers including the recent example of U.S. presidential candidate Mitt Romney's Twitter account. Between Facebook's 10-Q filing stating that 83 million of its accounts are fake, to Mitt Romney's Twitter account recently falling under scrutiny for suspicious followings, fake social network profiles are a hot topic at the moment. And these fake profiles are at the center of a very vibrant and growing underground economy. This underground economy consists of dealers who create and sell the use of thousands of fake social accounts, and abusers who buy follows or likes from these fake accounts to boost their perceived popularity, sell advertising based on their now large social audience or conduct other malicious activity."
Nerval's Lobster writes "Between 4:52 and 5:12 on August 3, attackers used Wired writer Mat Honan's Apple ID to wipe his MacBook, before seizing control of his Gmail and other online identities ('My accounts were daisy-chained together,' he wrote in an Aug. 6 postmortem on Wired), and posting a message on Twitter for all to see: 'Clan Vv3 and Phobia hacked this twitter.' In the wake of Honan's high-profile hack, there are some key takeaways. Even if a typical user can't prevent a social-engineering attack on the company hosting their cloud account, they can armor their online life in ways that make attacks more difficult. First, two-factor authentication can prevent an attacker from seizing control of those vital 'hub' accounts (such as Gmail) where users tend to store much of their most vital information. Google offers two-step verification for signing in, as does Facebook. The truly security-conscious can also uncouple their cloud accounts; for example, making sure that iCloud and iTunes use two different sets of credentials. That might rob daily life in the cloud of some of its convenience, but it could also make you a harder target." Update: 08/08 01:17 GMT by S : This high-profile security breach has had an impact already: Apple has suspended password resets through customer support, and Amazon no longer lets users call in to change account settings.
An anonymous reader writes "The story behind the hacking of Mat Honan's multiple accounts has been revealed and points to massive failures in how Amazon and Apple handle password recovery. Accounts for both sites can be easily accessed with simple to find publicly available information. If you ask me, both companies should be liable for violating privacy laws."
hypnosec writes "After a prolonged outage that lasted for nearly a week Demonoid has reportedly been audited and closed down by the Ukrainian law enforcement agency. According to reports the Ukrainian anti-cybercrime police division carried out an investigation of ColoCall – the hosting service provider for Demonoid. Servers were sealed after all the data on the servers was copied. According to ColoCall the servers haven't been seized but, they are not operational any more. The hosting service provider is going to end the agreement with Demonoid. 'Investigators have copied all the information from the Demonoid servers and sealed them.' a manager from ColoCall, wishing to stay anonymous, said."
twoheadedboy writes "Three employees of Baidu, China's most popular search engine, have been arrested under suspicion of taking bribes. It is alleged that the employees accepted money in exchange for removing negative feedback left on Baidu's forum service. The company had already fired four people for misconduct before three of them were arrested. This so-called 'post-deleting' business is believed to be big in China, even though it is illegal."
derekmead writes "NASA's livestream coverage of the Curiosity rover's landing on Mars was practically as flawless as the landing itself. But NASA couldn't prepare for everything. An hour or so after Curiosity's 1.31 a.m. EST landing in Gale Crater,the space agency's main YouTube channel had posted a 13-minute excerpt of the stream. Ten minutes later, the video was gone, replaced with the message: 'This video contains content from Scripps Local News, who has blocked it on copyright grounds. Sorry about that.' That is to say, a NASA-made video posted on NASA's official YouTube channel, documenting the landing of a $2.5 billion Mars rover mission paid for with public taxpayer money, was blocked by YouTube because of a copyright claim by a private news service."