By MG Siegler
Techcrunch.com
Now that the WWDC keynote is over and I’ve had a little bit of time to reflect, I’ve been thinking about what excited me the most from today’s announcements. The list is long, no doubt. But I think I’m going to have to go with something that surprised me – while at the same time making me look smarter than perhaps I really am. (Again, just perhaps.) iMessages.
As one of the core new features highlighted today in iOS 5, iMessages has one purpose: to kill SMS. That is, traditional carrier-controlled text messages. iMessages will do this by replacing SMS with a service that Apple is in control of across all of their iOS devices. And here’s the real death blow: iMessages will be completely free.
Click here to read more.. »
By Ed Pilkington
Guardian.co.uk
The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.
Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as “carders” – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.
So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. “Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation,” Corley told the Guardian.
“It makes for very tense relationships,” said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. “There are dozens and dozens of hackers who have been shopped by people they thought they trusted.”
Click here to read more.. »
Posted on June 7th 2011 in
Technology,
Web Site
By Bianco Bosker
Huffingtonpost.com
Apple has revamped the software that powers its iPhone, iPad and iPod touch to include, for the first time ever, a major integration with a social network — but not the one you might think.
For the social media features in the new version of its iOS operating system, Apple, the world’s most valuable technology company, did not partner with Facebook, the world’s largest social networking site.
Instead, the Cupertino company opted to team up with Twitter, a micro-blogging service that has around half as many members as Facebook and remains far from attaining its mainstream status.
Twitter will be built in to iOS 5 and integrated across multiple Apple applications. By signing into Twitter just once, users will be able to instantly send tweets containing photos, videos, links and more.
Experts suggest the Facebook snub stemmed from Apple’s desire to maintain control over the user experience and preserve its direct relationship with its customers, aims that clashed with Facebook’s own ambitions.
Click here to read more.. »
Posted on June 7th 2011 in
Computers,
Macintosh,
Technology
By Troy Gill
zdnet.com
Cyber crooks are infecting popular mobile platforms through malicious applications and, unfortunately, no mobile platform is immune from the destruction it can cause. According to McAfee’s report, Symbian remains the most targeted mobile platform, though vulnerabilities in both the Android and Apple IOS should not be overlooked.
Android’s open source software is something that gives the platform great appeal, but it is also the basis of its vulnerability. Users may enjoy the freedom to acquire apps both inside and outside the Android Market, but it doesn’t come without risk. The Android Market allows developers to upload apps without first running through an established screening process like one that you might find at Apple’s App Store or when using RIM’s application for BlackBerry. As a result, Google detected more than 50 malicious apps within the Android Market, downloaded to approximately 260,000 Android mobile devices. (Google later remedied the infections remotely via an auto installed software update.)
Click here to read more.. »
Posted on May 26th 2011 in
Cell Phones,
Internet,
Security
By Kim Zetter
Wired.com
In an extraordinary intervention, the Justice Department has sought and won permission from a federal judge to seize control of a massive criminal botnet comprised of millions of private computers, and deliver a command to those computers to disable the malicious software.
The request, filed Tuesday under seal in the U.S. District Court in Connecticut, sought a temporary restraining order to allow the non-profit Internet Systems Consortium to swap out command-and-control servers that were communicating with machines infected with Coreflood — malicious software used by computer criminals to loot victims’ bank accounts.
According to the filing, ISC, under law enforcement supervision, planned to replace the servers with servers that it controlled, then collect the IP addresses of all infected machines communicating with the criminal servers, and send a remote “stop” command to infected machines to disable the Coreflood malware operating on them.
A Justice Department spokeswoman confirmed that the takeover occurred Tuesday evening, and the shutdown command was sent to infected computers based in the U.S.
“Under the authority granted by the court in the TRO, we have responded to requests from infected computers in the United States with a command that temporarily stops the malware from running on the infected computers,” wrote spokeswoman Laura Sweeney in an e-mail.
Click here to read more.. »
Posted on April 14th 2011 in
Hacks,
Security,
Technology
By David Kravets
wired.com
On March 7, Camelot Distribution Group, an obscure film company in Los Angeles, unveiled its latest and potentially most profitable release: a federal lawsuit against BitTorrent users who allegedly downloaded the company’s 2010 B-movie revenge flick Nude Nuns With Big Guns between January and March of this year. The single lawsuit targets 5,865 downloaders, making it theoretically worth as much as $879,750,000 — more money than the U.S. box-office gross for Avatar.
At the moment, the targets of the litigation are unknown, even to Camelot. The mass lawsuit lists the internet IP addresses of the downloaders (.pdf), and asks a federal judge to order ISPs around the country to dig into their records for each customer’s name.
Click here to read more.. »