Social Networks

Girls Catfish ISIS On Social Media For Travel Money 157 157

MarkWhittington writes: Yahoo Travel reported that three women in Chechnya took ISIS for $3,300 before getting caught. They are now under investigation for Internet fraud, which seems to be illegal even when committed against the most fearsome terrorist army in modern times. The scam seems to be a combination of the Nigerian Prince con, in which a mark is fooled into giving the con artist large sums of money and catfishing, in which the mark strikes up an online romance with someone he thinks is an attractive woman (or man depending on the gender and preference of the mark.)
Windows

Windows 10 Upgrade Strategies, Pitfalls and Fixes As MSFT Servers Are Hit Hard 180 180

MojoKid writes: The upgrade cycle begins, with Microsoft's latest operating system--the highly anticipated Windows 10--rolling out over Windows Update for free, for users of Windows 7, 8 and 8.1. For those that are ready to take the plunge over the weekend, there are some things to note. So far, Microsoft has been rolling out the upgrade in waves and stages. If you are not one of the 'lucky' ones to be in the first wave, you can take matters into your own hands and begin the upgrade process manually. While the process is mostly simple, it won't be for everyone. This guide steps through a few of the strategies and pitfalls. There are two main methods to upgrade, either through Windows Update or through the Media Creation Tool. In either case, you will need to have opted-in for the Windows 10 Free Upgrade program to reserve your license. Currently, the Windows Update method is hit or miss due to the requirement for additional updates needing to be installed first and Microsoft's servers being hit hard, leading to some rather humorous error messages like the oh-so helpful description, "Something Happened." Currently, it would be best to avoid the Windows Update upgrade, at least for the time being. Numerous issues with licensing have been reported, requiring manual activation either through the dreaded phone call, or by running slmgr.vbs /ato at the command prompt to force license registration.
Piracy

Interviews: Kim Dotcom Answers Your Questions 89 89

Kim Dotcom was the founder of Megaupload, its successor Mega, and New Zealand's Internet Party. A while ago you had a chance to ask him about those things as well as the U.S. government charging him with criminal copyright violation and racketeering. Below you'll find his answers to your questions.
Businesses

Symantec: Hacking Group Black Vine Behind Anthem Breach 18 18

itwbennett writes: Symantec said in a report that the hacking group Black Vine, which has been active since 2012 and has gone after other businesses that deal with sensitive and critical data, including organizations in the aerospace, technology and finance industries, is behind the hack against Anthem. The Black Vine malware Mivast was used in the Anthem breach, according to Symantec.
Android

Maliciously Crafted MKV Video Files Can Be Used To Crash Android Phones 92 92

itwbennett writes: Just days after publication of a flaw in Android's Stagefright, which could allow attackers to compromise devices with a simple MMS message, researchers have found another Android media processing flaw. The latest vulnerability is located in Android's mediaserver component, more specifically in how the service handles files that use the Matroska video container (MKV), Trend Micro researchers said. "When the process opens a malformed MKV file, the service may crash (and with it, the rest of the operating system). The vulnerability is caused by an integer overflow when the mediaserver service parses an MKV file. It reads memory out of buffer or writes data to NULL address when parsing audio data."
United Kingdom

UK Campaign Wants 18-Year-Olds To Be Able To Delete Embarrassing Online Past 316 316

An anonymous reader writes: People should be allowed to delete embarrassing social media posts when they reach adulthood, UK internet rights campaigners are urging. The iRights coalition has set out five rights which young people should expect online, including being able to easily edit or delete content they have created, and to know who is holding or profiting from their information. Highlighting how campaigners believe adults should not have to bear the shame of past immaturity, iRights also wants children to be protected from illegal or distressing pages; to be digitally literate; and be able to make informed and conscious choices.
Businesses

DHI Group Inc. Announces Plans to Sell Slashdot Media 550 550

An anonymous reader writes: DHI Group Inc. (formerly known as Dice Holdings Inc.) announced plans to sell Slashdot Media (slashdot.org & sourceforge.net) in their Q2 financial report. This is being reported by multiple sources. Editor's note: Yep, looks like we're being sold again. We'll keep you folks updated, but for now I don't have any more information than is contained in the press release. Business as usual until we find a buyer (and hopefully after). The company prepared a statement for our blog as well — feel free to discuss the news here, there, or in both places.
China

The Factory of the World - Documentary On Manufacturing In Shenzhen 34 34

szczys writes: This Hackaday documentary (video) looks at the changing ecosystem of manufacturing in the Pearl River Delta (Shenzhen, China) through interviews with product engineers involved with the MIT Media Lab manufacturing program, Finance professionals in Hong Kong, and notables in the Maker Industry. Worth checking out for anyone thinking of a hardware startup or just interested in how hardware gets made.
Android

'Stagefright' Flaw: Compromise Android With Just a Text 202 202

An anonymous reader writes: Up to 950 million Android phones may be vulnerable to a new exploit involving the Stagefright component of Android, which lets attackers compromise a device through a simple multimedia text — even before the recipient sees it. Researchers from Zimperium zLabs reported the related bugs to Google in April. Google quickly accepted a patch and distributed it to manufacturers, but the researchers say they don't think the manufacturers have yet passed it on to most consumers.

"The weaknesses reside in Stagefright, a media playback tool in Android. They are all "remote code execution" bugs, allowing malicious hackers to infiltrate devices and exfiltrate private data. All attackers would need to send out exploits would be mobile phone numbers, Drake noted. From there, they could send an exploit packaged in a Stagefright multimedia message (MMS), which would let them write code to the device and steal data from sections of the phone that can be reached with Stagefright's permissions. That would allow for recording of audio and video, and snooping on photos stored in SD cards. Bluetooth would also be hackable via Stagefright."
Google

Plan To Run Anti-Google Smear Campaign Revealed In MPAA Emails 256 256

vivaoporto writes: Techdirt reports on a plan to run an anti-Google smear campaign via the Today Show and the WSJ discovered in MPAA emails. Despite the resistance of the Hollywood studios to comply with the subpoenas obtained by Google concerning their relationship with Mississippi Attorney General Jim Hood (whose investigation of the company appeared to actually be run by the MPAA and the studios themselves) one of the few emails that Google have been able to get access to so far was revealed this Thursday in a filling. It's an email between the MPAA and two of Jim Hood's top lawyers in the Mississippi AG's office, discussing the big plan to "hurt" Google.

The lawyers from Hood's office flat out admit that they're expecting the MPAA and the major studios to have its media arms run a coordinated propaganda campaign of bogus anti-Google stories. One email reads: "Media: We want to make sure that the media is at the NAAG meeting. We propose working with MPAA (Vans), Comcast, and NewsCorp (Bill Guidera) to see about working with a PR firm to create an attack on Google (and others who are resisting AG efforts to address online piracy). This PR firm can be funded through a nonprofit dedicated to IP issues. The "live buys" should be available for the media to see, followed by a segment the next day on the Today Show (David green can help with this). After the Today Show segment, you want to have a large investor of Google (George can help us determine that) come forward and say that Google needs to change its behavior/demand reform. Next, you want NewsCorp to develop and place an editorial in the WSJ emphasizing that Google's stock will lose value in the face of a sustained attack by AGs and noting some of the possible causes of action we have developed."

As Google notes in its legal filing about this email, the "plan" states that if this effort fails, then the next step will be to file the subpoena (technically a CID or "civil investigatory demand") on Google, written by the MPAA but signed by Hood. This makes it pretty clear that the MPAA, studios and Hood were working hand in hand in all of this and that the subpoena had no legitimate purpose behind it, but rather was the final step in a coordinated media campaign to pressure Google to change the way its search engine works.
EU

EU May Become a Single Digital Market of 500 Million People 132 132

RockDoctor writes: The Guardian is reporting that the EU is becoming increasingly vociferous in its opposition to "geo-blocking" — the practice of making media services available in some areas but not in others: "European consumers want to watch the pay-TV channel of their choice regardless of where they live or travel in the EU." That adds up to a block of nearly 500 million first-world media consumers. They don't necessarily all speak the same language, but English is probably the most commonly understood single language. And the important thing for American media companies to remember is that they're not American in thought, taste or outlook.
Patents

HEVC Advance Announces H.265 Royalty Rates, Raises Some Hackles 184 184

An anonymous reader writes: The HEVC Advance patent pool has announced the royalty rates for their patent license for HEVC (aka H.265) video. HEVC users must pay these fees in addition to the license fees payable to the competing MPEG LA HEVC patent pool. With HEVC Advance's fees targeting 0.5% of content owner revenue which could translate to licensing costs of over $100M a year for companies like Facebook and Netflix, Dan Rayburn from Streaming Media advocates that "content owners band together and agree not to license from HEVC Advance" in the hope that "HEVC Advance will fail in the market and be forced to change strategy, or change their terms to be fair and reasonable." John Carmack, Oculus VR CTO, has cited the new patent license as a reason to end his efforts to encode VR video with H.265.
Data Storage

Ask Slashdot: How Do You Store a Half-Petabyte of Data? (And Back It Up?) 217 217

An anonymous reader writes: My workplace has recently had two internal groups step forward with a request for almost a half-petabyte of disk to store data. The first is a research project that will computationally analyze a quarter petabyte of data in 100-200MB blobs. The second is looking to archive an ever increasing amount of mixed media. Buying a SAN large enough for these tasks is easy, but how do you present it back to the clients? And how do you back it up? Both projects have expressed a preference for a single human-navigable directory tree. The solution should involve clustered servers providing the connectivity between storage and client so that there is no system downtime. Many SAN solutions have a maximum volume limit of only 16TB, which means some sort of volume concatenation or spanning would be required, but is that recommended? Is anyone out there managing gigantic storage needs like this? How did you do it? What worked, what failed, and what would you do differently?
Youtube

YouTube Is Adding VR Video Support To Streaming Videos 23 23

An anonymous reader writes: While YouTube's streaming platform currently supports 3D videos OR 360 degree videos, the combination of the two is essential for properly immersive virtual reality video. Fortunately, the company has announced that they'll soon enable support for 3D + 360 degree videos, bringing more immersive VR video capability to the platform. Currently, 360 degree YouTube videos can be viewed through desktop web browsers and on the YouTube Android and iOS apps, with the Android app being the only one of the bunch currently providing a side-by-side view for VR viewers like Google's Cardboard.
AT&T

FCC Approves AT&T's DirecTV Purchase 100 100

An anonymous reader writes: The U.S. Federal Communications Commission has granted approval to AT&T to purchase DirecTV for $48.5 billion. AT&T will become the largest provider of cable or satellite TV in the U.S., with 26.4 million subscribers. "Adding TV customers gives AT&T more power to negotiate with big media companies over prices for those channels. The deal also combines a nationwide satellite TV service, the country's largest, with the No. 2 nationwide wireless network as time spent on mobile devices increases." The FCC did put conditions on the deal: AT&T must make fiber internet service available to 12.5 million people, offer cheaper internet plans to low-income customers, and not mess with the internet traffic of online video competitors.
Transportation

Fiat Chrysler Recalls 1.4 Million Autos To Fix Remote Hack 157 157

swinferno writes: Fiat Chrysler announced today that it's recalling 1.4 million automobiles just days after researchers demonstrated a terrifying hack of a Jeep that was driving down the highway at 70 miles per hour. They are offering a software patch for some of their internet-connected vehicles. Cybersecurity experts Chris Valasek and Charlie Miller have publicly exposed a serious vulnerability that would allow hackers to take remote control of Fiat Chrysler Automobile (FCA) cars that run its Uconnect internet-accessing software for connected car features. Despite this, the researchers say automakers are being slow to address security concerns, and are often approaching security in the wrong way.

Video Job Hunting Tips For the IT Pro

Martha Heller, an IT executive recruiter, offers up career advice for IT professionals at the recent IT Roadmap in Boston. Should executives job jump or build tenure? How much social media should they do? Heller offers up her suggestions in this video.
Shark

Since Receiving Satellite Tags, Some Sharks Have Become Stars of Social Media 31 31

Lucas123 writes: A research project that tags the world's most dangerous sharks with four different tracking devices and then offers all the data to the public has taken off, garnering hundreds of thousands of users; one shark even has more then 80,000 followers on Twitter. OCEARCH, a non-profit shark tracking project, has tagged about 130 sharks, from great whites and tigers to hammerheads and makos, and open sourced the data in the hope that it will create citizen scientists who will follow the animals and care about what happens to them. To further personify the apex predators, the researchers at OCEARCH have also given the sharks names such as Katharine and Mary Lee, two sharks that are more than 14 feet long and weight more than a ton. OCEARCH's shark tracker has garnered 10 times the traffic it had last year, and it's expected to grow 20 times more by the end of this year. Along with data from satellite, acoustic and accelerometer tags, the project expects to begin using big data analytics to offer more granular data about the animals and their lives to scientists and the public at large.
Privacy

Affair Site Hackers Threaten Release of All User Data Unless It Closes 446 446

heretic108 writes: According to KrebsOnSecurity, the infamous Ashley Madison affairs hookup website has been hacked by a group calling itself The Impact Team. This group is demanding the immediate and permanent shutdown of Ashley Madison, as well as similar sites Cougar Life and Established Man, owned by the same company: Avid Life Media. If the sites aren't shut down, the hackers are threatening to publicly release personal data for 37 million users. ALM has confirmed that a hack took place, and the hackers posted snippets of account data, as well as bank and salary information from the company itself.