Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Governor Cuomo Bans Airbnb From Listing Short-Term Rentals In New York ( 157

An anonymous reader quotes a report from New York Post: Gov. Cuomo on Friday bowed to pressure from the hotel industry and signed into law one of the nation's toughest restrictions on Airbnb -- including hefty fines of up to $7,500 for people who rent out space in their apartments. Backers of the punitive measure -- which applies to rentals of less than 30 days when the owner or tenant is not present -- say many property owners use Airbnb and similar sites to offer residential apartments as short-term rentals to visitors, hurting the hotel business while taking residential units off the Big Apple's high-priced housing market. Enforcement, however, will be a huge challenge, as thousands of short-term apartment rentals are listed in the city despite a 2010 law that prohibits rentals of less than 30 days when the owner or tenant is not present. Violators could be turned in by neighbors or landlords opposed to the practice, or the state could monitor the site to look for potential violations. But beyond that how the law would be enforced was not immediately clear. The new law won't apply to rentals in single-family homes, row houses or apartment spare rooms if the resident is present. But will apply to co-ops and condos. Airbnb mounted a last-ditch effort to kill the measure, proposing alternative regulations that the company argued would address concerns about short-term rentals without big fines. Tenants who violate current state law and list their apartments for rentals of less than 30 days would face fines of $1,000 for the first offense, $5,000 for the second and $7,500 for a third. An investigation of Airbnb rentals from 2010 to 2014 by the state attorney general's office found that 72 percent of the units in New York City were illegal, with commercial operators constituting 6 percent of the hosts and supplying 36 percent of the rentals. As of August, Airbnb had 45,000 city listings and another 13,000 across the state.

Facebook Employees Tried To Remove Trump Posts As Hate Speech ( 235

An anonymous reader quotes a report from USA Today: Facebook employees pushed to remove some of Republican presidential candidate Donald Trump's Facebook posts -- such as one proposing the ban of Muslims from entering the U.S. -- from the service as hate speech that violated the giant social network's policies, the Wall Street Journal reported Friday. The decision not to remove the Trump posts was made by Facebook CEO Mark Zuckerberg, the newspaper reported. Employees complained that Facebook was changing the rules for Trump and some who review content on Facebook threatened to quit. "When we review reports of content that may violate our policies, we take context into consideration. That context can include the value of political discourse," Facebook said in an emailed statement. "Many people are voicing opinions about this particular content and it has become an important part of the conversation around who the next U.S. president will be. For those reasons, we are carefully reviewing each report and surrounding context relating to this content on a case by case basis." Senior members of Facebook's policy team posted more details on its policy on Friday: "In the weeks ahead, we're going to begin allowing more items that people find newsworthy, significant, or important to the public interest -- even if they might otherwise violate our standards."

Prosecutors Say NSA Contractor Could Flee To Foreign Power ( 44

An anonymous reader quotes a report from ABC News: The NSA contractor accused of stealing a gargantuan amount of sensitive and classified data from the U.S. government was studying Russian before he was arrested and would be a "prime target" for foreign spies should he be released on bail, prosecutors argued ahead of a court hearing for Harold Martin, III, today. The government said it is "readily apparent to every foreign counterintelligence professional and nongovernmental actor that the Defendant has access to highly classified information, whether in his head, in still-hidden physical locations, or stored in cyberspace -- and he has demonstrated absolutely no interest in protecting it. This makes the Defendant a prime target, and his release would seriously endanger the safety of the country and potentially even the Defendant himself." Prosecutors noted that Martin purportedly communicated online "with others in languages other than English, including in Russian" and that he had downloaded information on the Russian language just a couple months before he was arrested in August. Martin's attorneys, however, said in their own court filing Thursday that there is still no evidence he "intended to betray his country" and argued that he was not a flight risk. All the talk of foreign spies and potential getaway plans, the defense said, were "fantastical scenarios." Martin's defense team said in part: "The government concocts fantastical scenarios in which Mr. Martin -- who, by the government's own admission, does not possess a valid passport -- would attempt to flee the country. Mr. Martin's wife is here in Maryland. His home is here in Maryland. He hash served this country honorably as a lieutenant in the United States Navy, and he has devoted his entire career to serving his country. There is no evidence he intended to betray his country. The government simply does not meet its burden of showing that no conditions of release would reasonably assure Mr. Martin's future appearance in court. For these reasons, and additional reasons to be discussed at the detention hearing, Mr. Martin should be released on conditions pending trial."

UPDATE 10/21/16: Slashdot reader chromaexursion writes: "Harold Martin was denied bail. The judge agreed the the prosecution in his decision."

43 Million Weebly and 22 Million Foursquare Accounts Stolen ( 15

LeakedSource is reporting that the web design platform Weebly was hacked in February, affecting more than 43 million accounts. They have also reported a smaller hack involving 22.5 million Foursquare accounts, which were compromised in December 2013. TechCrunch: "We do not believe that any customer website has been improperly accessed," Weebly said in the notice to users. The company also said that it does not store credit card information, making fraudulent charges unlikely. LeakedSource said it received the Weebly database from an anonymous source and notified Weebly of the breach. In addition to the customer notification emails, LeakedSource claims that password resets are being issued -- but, if you're a Weebly user and you don't receive a password reset, you probably want to change your password anyway. Meanwhile, LeakedSource also identified data from Foursquare, claiming that 22.5 million accounts were compromised in December 2013. The social media company disputes the findings, claiming that email addresses were simply cross-referenced with publicly available data from Foursquare. The data includes emails, usernames and Facebook and Twitter IDs, which could have been scraped from Foursquare's API or search.

Facebook Bans Animated Breast Cancer Awareness Video Showing Circle-Shaped Breasts ( 98

Last month, Facebook deleted a historic Vietnam war photo of a naked girl fleeing a napalm attack, claiming it violated Facebook's restrictions on nudity. Now it appears that the company has removed a video on breast cancer awareness posted in Sweden after deeming the images offensive, the Swedish Cancer Society said on Thursday. The Guardian reports: The video, displaying animated figures of women with circle-shaped breasts, was aimed at explaining to women how to check for suspicious lumps. Sweden's Cancerfonden said it had tried in vain to contact Facebook, and had decided to appeal against the decision to remove the video. "We find it incomprehensible and strange how one can perceive medical information as offensive," Cancerfoden communications director Lena Biornstad told Agence France-Presse. "This is information that saves lives, which is important for us," she said. "This prevents us from doing so." The Guardian went on to report in a separate article that the the Swedish Cancer Society decided to make the round breasts square to evade Facebook's censorship of female anatomy. The group issued an open letter to Facebook featuring the pair of pair of breasts constructed of pink squares as opposed to pink circles. Facebook did apologize for banning the video, saying in a statement to the Guardian: "We're very sorry, our team processes millions of advertising images each week, and in some instances we incorrectly prohibit ads. This image does not violate our ad policies. We apologize for the error and have let the advertiser know we are approving their ads."

Nurses In Australia Face Punishment For Promoting Anti-Vaccination Messages Via Social Media ( 633 writes: Medical Express reports that nurses and midwives promoting anti-vaccination messages in Australia could face punishment including being slapped with a caution and having their ability to practice medicine restricted. Serious cases could be referred to an industry tribunal, where practitioners could face harsher penalties such as having their registration suspended or cancelled. The Nursing and Midwifery Board of Australia released the vaccination standards in response to what it described as a small number of nurses and midwives promoting anti-vaccination via social media. The statement also urges members of the public to report nurses or midwives promoting anti-vaccination. Promoting false, misleading or deceptive information is an offense under national law and is prosecutable by the Australian Health Practitioner Regulation Agency. "The board will consider whether the nurse or midwife has breached their professional obligations and will treat these matters seriously," the statement said. However Dr. Hannah Dahlen, a professor of midwifery at the University of Western Sydney and the spokeswoman for the Australian College of Midwives, worries the crackdown may push people with anti-vaccination views further underground. "The worry is the confirmation bias that can occur, because people might say: 'There you go, this is proof that you can't even have an alternative opinion.' It might in fact just give people more fuel for their belief systems."

KickassTorrents Lawyer: 'Torrent Sites Do Not Violate Criminal Copyright Laws' ( 80

An anonymous reader quotes a report from Ars Technica: Lawyers representing Artem Vaulin have filed their formal legal response to prosecutors' allegations of conspiracy to commit criminal copyright infringement, among other charges. Vaulin is the alleged head of KickassTorrents (KAT). KAT was the world's largest BitTorrent distribution site before it was shuttered by authorities earlier this year. Vaulin was arrested in Poland, where he now awaits extradition to the United States. "Vaulin is charged with running today's most visited illegal file-sharing website, responsible for unlawfully distributing well over $1 billion of copyrighted materials," Assistant Attorney General Leslie Caldwell said in a July 2016 statement. The defense's new 22-page court filing largely relies on the argument that there is no such thing as secondary criminal copyright infringement. While secondary copyright infringement as a matter of civil liability was upheld by the Supreme Court in MGM v. Grokster in 2005, Vaulin and his associates have been charged criminally. "The fundamental flaw in the government's untenable theory of prosecution is that there is no copyright protection for such torrent file instructions and addresses," [the brief's author, Ira Rothken,] argued in his Monday motion to dismiss the charges against Vaulin. "Therefore, given the lack of direct willful copyright infringement, torrent sites do not violate criminal copyright laws." "The extradition procedures have formally been started by the US in Poland," Rothken told Ars. "We are in a submissions or briefing period, and our Polish team is opposing extradition." Rothken also said that he has yet to be allowed to meet or speak directly with his client. For now, Rothken has been required to communicate via his Polish counterpart, Alek Kowzan. "Maybe they are afraid that Artem's extradition defense will be enhanced if American lawyers can assist in defending against the US extradition," Rothken added. No hearings before US District Judge John Z. Lee have been set.

Hotspot Vigilantes Are Trying to Beam the Internet To Julian Assange ( 241

Ecuadorian government said earlier this week that it did cut off Julian Assange's internet connection. They noted that Assange's continued interference in the U.S. election campaign was the reason why they decided to disconnect Assange from the internet. But it appears some people are going to great lengths to beam internet connectivity to Mr. Assange. This week 4chan urged people to head to the embassy to set up mobile Wi-Fi hotspots, and many are doing just that. From a Motherboard report:"We are now calling all BRITS to get their ass down to the embassy and stand around in mass, taking shifts with wifi-hotspots on hand!" reads the post. "Give Assange constant network and morale support all while streaming it live for the world to see." Are people actually going to try this? Motherboard UK visited the Ecuadorian embassy in London, where WikiLeaks founder Julian Assange has claimed political asylum since August 2012, today to find out. Admittedly, on a late October afternoon, things were rather quiet on the street outside the embassy. Nevertheless, I found my guy. "Marco" was loitering outside the embassy, turning on and off his mobile hotspot. I approached him, and while tentative at first, Marco finally started explaining how he was hoping to aid Assange.
The Military

US Army 'Will Have More Robot Soldiers Than Humans' By 2025, Says Former British Spy ( 113

John Bassett, a British spy who worked for the agency GCHQ for nearly two decades, has told Daily Express that the U.S. was considering plans to employ thousands of robots by 2025. At a meeting with police and counter-terrorism officials in London, he said: "At some point around 2025 or thereabouts the U.S. army will actually have more combat robots than it will have human soldiers. Many of those combat robots are trucks that can drive themselves, and they will get better at not falling off cliffs. But some of them are rather more exciting than trucks. So we will see in the West combat robots outnumber human soldiers." Daily Express reports: Robotic military equipment is already being used by the U.S Navy and Air Force, in the shape of drones and autonomous ships. In April robotic warfare took a major leap forward after the U.S. Navy launched its very first self-piloting ship designed to hunt enemy submarines. Drones have been a feature of U.S. operations in the Middle East to disrupt terrorist groups. However, those aircrafts are still controlled by humans operating from bases in the U.S. Mr. Bassett also said artificial intelligence and robots technology would combine to create powerful fighting machines. The cyber security expert said: "Artificial intelligence, robotics in general, those will begin to mesh together."

How Hackers Broke Into John Podesta and Colin Powell's Gmail Accounts ( 116

An anonymous reader quotes a report from Motherboard: On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google. The email, however, didn't come from the internet giant. It was actually an attempt to hack into his personal account. In fact, the message came from a group of hackers that security researchers, as well as the U.S. government, believe are spies working for the Russian government. At the time, however, Podesta didn't know any of this, and he clicked on the malicious link contained in the email, giving hackers access to his account. The data linking a group of Russian hackers -- known as Fancy Bear, APT28, or Sofacy -- to the hack on Podesta is also yet another piece in a growing heap of evidence pointing toward the Kremlin. And it also shows a clear thread between apparently separate and independent leaks that have appeared on a website called DC Leaks, such as that of Colin Powell's emails; and the Podesta leak, which was publicized on WikiLeaks. All these hacks were done using the same tool: malicious short URLs hidden in fake Gmail messages. And those URLs, according to a security firm that's tracked them for a year, were created with Bitly account linked to a domain under the control of Fancy Bear. The phishing email that Podesta received on March 19 contained a URL, created with the popular Bitly shortening service, pointing to a longer URL that, to an untrained eye, looked like a Google link. Inside that long URL, there's a 30-character string that looks like gibberish but is actually the encoded Gmail address of John Podesta. According to Bitly's own statistics, that link, which has never been published, was clicked two times in March. That's the link that opened Podesta's account to the hackers, a source close to the investigation into the hack confirmed to Motherboard. That link is only one of almost 9,000 links Fancy Bear used to target almost 4,000 individuals from October 2015 to May 2016. Each one of these URLs contained the email and name of the actual target. The hackers created them with with two Bitly accounts in their control, but forgot to set those accounts to private, according to SecureWorks, a security firm that's been tracking Fancy Bear for the last year. Bitly allowed "third parties to see their entire campaign including all their targets -- something you'd want to keep secret," Tom Finney, a researcher at SecureWorks, told Motherboard. Thomas Rid, a professor at King's College who studied the case extensively, wrote a new piece about it in Esquire.
United States

Prosecutors Say Contractor Stole 50 Terabytes of NSA Data ( 90

An NSA contractor siphoned off dozens of hard drives' worth of data from government computers over two decades, prosecutors will allege on Friday. From a ZDNet report: The contractor, Harold T. Martin III, is also accused of stealing thousands of highly classified documents, computers, and other storage devices during his tenure at the agency. It's not known exactly what Martin allegedly stole, but a report from The New York Times on Wednesday suggests that the recently-leaked hacking tools used by the agency to conduct surveillance were among the stolen cache of files. Prosecutors will on Friday charge Martin with violating the Espionage Act. If convicted, he could face ten years in prison on each count. The charges, news of which was first reported by The Washington Post, outline a far deeper case than first thought, compared to the felony theft and a lesser misdemeanor charge of removal and retention of classified information revealed in an unsealed indictment last month.

Yahoo Wants To Know If FBI Ordered Yahoo To Scan Emails ( 89

Reader Trailrunner7 writes: In an odd twist to an already odd story, Yahoo officials have asked the Director of National Intelligence to confirm whether the federal government ordered the company to scan users' emails for specific terms last year and if so, to declassify the order. The letter is the result of news reports earlier this month that detailed an order that the FBI allegedly served on Yahoo in 2015 in an apparent effort to find messages with a specific set of terms. The stories allege that Yahoo complied with the order and installed custom software to accomplish the task. Yahoo officials said at the time the Reuters story came out that there is no such scanning system on its network, but did not say that the scanning software never existed on the network at all. "Yahoo was mentioned specifically in these reports and we find ourselves unable to respond in detail. Your office, however, is well positioned to clarify this matter of public interest. Accordingly, we urge your office to consider the following actions to provide clarity on the matter: (i) confirm whether an order, as described in these media reports, was issued; (ii) declassify in whole or in part such order, if it exists; and (iii) make a sufficiently detailed public and contextual comment to clarify the alleged facts and circumstances," the letter says.
Operating Systems

Researchers Bypass ASLR Protection On Intel Haswell CPUs ( 72

An anonymous reader writes: "A team of scientists from two U.S. universities has devised a method of bypassing ASLR (Address Space Layout Randomization) protection by taking advantage of the BTB (Branch Target Buffer), a component included in many modern CPU architectures, including Intel Haswell CPUs, the processor they used for tests in their research," reports Softpedia. The researchers discovered that by blasting the BTB with random data, they could run a successful collision attack that reveals the memory locations where apps execute code in the computer's memory -- the very thing that ASLR protection was meant to hide. While during their tests they used a Linux PC with a Intel Haswell CPU, researchers said the attack can be ported to other CPU architectures and operating systems where ASLR is deployed, such as Android, iOS, macOS, and Windows. From start to finish, the collision attack only takes 60 milliseconds, meaning it can be embedded with malware or any other digital forensics tool and run without needing hours of intense CPU processing. You can read the research paper, titled "Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR," here.

Czechs Arrest Russian Hacker Wanted By FBI ( 55

Bookworm09 quotes a report from New York Times (paywalled, alternate source): A man identified as a Russian hacker suspected of pursuing targets in the United States has been arrested in the Czech Republic, the police announced Tuesday evening. The suspect was captured in a raid at a hotel in central Prague on Oct. 5, about 12 hours after the authorities heard that he was in the country, where he drove around in a luxury car with his girlfriend, according to the police. The man did not resist arrest, but he had medical problems and was briefly hospitalized, the police said in a statement. The FBI said in a statement that the man was "suspected of conducting criminal activities targeting U.S. interests. As cybercrime can originate anywhere in the world, international cooperation is crucial to successfully defeat cyber adversaries." ABC News reports: "Prague's Municipal Court will now have to decide on his extradition to the United States, with Justice Minister Robert Pelikan having the final say. Russian officials, however, are demanding that the suspect be handed over to them. Spokeswoman Marketa Puci said the court ruled on Oct. 12 that the man will remain in detention until the extradition hearing. No date has yet been set. U.S. authorities have two months to deliver to their Czech counterparts all of the documents necessary for the Czech authorities to decide on the extradition request."

Your Dynamic IP Address Is Now Protected Personal Data Under EU Law ( 37

Europe's top court has ruled that dynamic IP addresses can constitute "personal data," just like static IP addresses, affording them some protection under EU law against being collected and stored by websites. ArsTechnica UK adds: But the Court of Justice of the European Union (CJEU) also said in its judgment on Wednesday that one legitimate reason for a site operator to store them is "to protect itself against cyberattacks." The case was referred to the CJEU by the German Federal Court of Justice, after an action brought by German Pirate Party politician Patrick Breyer. He asked the courts to grant an injunction to prevent websites that he consults, run by federal German bodies, from collecting and storing his dynamic IP addresses. Breyer's fear is that doing so would allow the German authorities to build up a picture of his interests. Site operators argue that they need to store the data in order to prevent "cybernetic attacks and make it possible to bring criminal proceedings" against those responsible, the CJEU said.

Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say ( 56

Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University of California Irvine shows that an attacker, who has not compromised a target's PC, can record the acoustic emanations of a victim's keystrokes and later reconstruct the text of what he typed, simply by listening over a VoIP connection.

The researchers found that when connected to a target user on a Skype call, they could record the audio of the user's keystrokes. With a small amount of knowledge about the victim's typing style and the keyboard he's using, the researchers could accurately get 91.7 percent of keystrokes. The attack does not require any malware on the victim's machine and simply takes advantage of the way that VoIP software acquires acoustic emanations from the machine it's on.


Spanish Police Arrest Their First Ever eBook Pirate ( 48

An anonymous reader writes: Spain's Ministry of the Interior has announced the first ever arrest of an eBook pirate. The suspect is said to have uploaded more than 11,000 literary works online, many on the same day as their official release. More than 400 subsequent sites are said to have utilized his releases. The investigation began in 2015 following a complaint from the Spanish Reproduction Rights Centre (CEDRO), a non-profit association of authors and publishers of books, magazines, newspapers and sheet music. According to the Ministry, CEDRO had been tracking the suspect but were only able to identify him by an online pseudonym. However, following investigations carried out by the police, his real identity was discovered.

DNA Testing For Jobs May Be On Its Way, Warns Gartner ( 228

Reader dcblogs writes: It is illegal today to use DNA testing for employment, but as science advances its understanding of genes that correlate to certain desirable traits -- such as leadership and intelligence -- business may want this information. People seeking leadership roles in business, or even those in search of funding for a start-up, may volunteer their DNA test results to demonstrate that they have the right aptitude, leadership capabilities and intelligence for the job. This may sound farfetched, but it's possible based on the direction of the science, according to Gartner analysts David Furlonger and Stephen Smith, who presented their research Wednesday at the firm's Symposium IT/xpo in Orlando. This research is called 'maverick' in Gartner parlance, meaning it has a somewhat low probability and is still years out, but its potential is nonetheless worrisome to the authors. It isn't as radical as it seems. Job selection on the basis of certain desirable genetic characteristics is already common in the military and sports. Even without testing, businesses, governments and others may use this understanding about how some characteristics are genetically determined to develop new interview methodologies and testing to help identify candidates predisposed to the traits they desire.
The Internet

Ecuador Acknowledges Limiting Julian Assange's Web Access ( 412

Alexandra Valencia, reporting for Reuters: Ecuador's government acknowledged on Tuesday it had partly restricted internet access for Julian Assange, the founder of anti-secrecy group WikiLeaks who has lived in the South American country's London embassy since mid-2012. WikiLeaks said Assange lost connectivity on Sunday, sparking speculation Ecuador might have been pressured by the United States due to the group's publication of hacked material linked to U.S. Democratic presidential candidate Hillary Clinton. In a statement, Ecuador's leftist government said WikiLeaks' decision to publish documents impacting the U.S. election campaign was entirely its own responsibility, and the South American country did not cede to pressure from other nations. "In that respect, Ecuador, exercising its sovereign right, has temporarily restricted access to part of its communications systems in its UK Embassy," it added in a statement. "The Ecuador government respects the principle of non-intervention in other countries' affairs, it does not meddle in election processes underway, nor does it support any candidate specially."

CIA-Backed Surveillance Tool 'Geofeedia' Was Marketed To Public Schools ( 41

An anonymous reader quotes a report from The Daily Dot: An online surveillance tool that enabled hundreds of U.S. law enforcement agencies to track and collect information on social media users was also marketed for use in American public schools, the Daily Dot has learned. Geofeedia sold surveillance software typically bought by police to a high school in a northern Chicago suburb, less than 50 miles from where the company was founded in 2011. An Illinois school official confirmed the purchase of the software by phone on Monday. In the fall of 2014, the Lincolnshire-Prairie School District paid Geofeedia $10,000 to monitor the social media posts of children at Adlai E. Stevenson High School. "We did have for one year a contract with Geofeedia," said Jim Conrey, a spokesperson for Lincolnshire-Prairie School District. "We were mostly interested in the possibility of trying to prevent any kind of harm, either that students would do to themselves or to other students." Conrey said the district simply wanted to keep its students safe. "It was really just about student safety; if we could try to head off any potential dangerous situations, we thought it might be worth it," he said. Ultimately, the school found little use for the platform, which was operated by police liaison stationed on school grounds, and chose not to renew its subscription after the first year, citing cost and a lack of actionable information. "A lot of kids that were posting stuff that we most wanted, they weren't doing the geo-tagging or making it public," Conrey said. "We weren't really seeing a lot there." The school's experience, added Conrey, was that more often than not students would approach school administrators with sensitive issues, as opposed to the school unearthing problems affecting students using Geofeedia. "Quite frankly, we found that it wasn't worth the money," Conrey said.

Slashdot Top Deals