Twitter

Twitter Launches Trust and Safety Council To Help Put End To Trolling (thestack.com) 128

An anonymous reader writes: Twitter has announced a new trust and safety council to stamp out bullying and trolling on the microblogging site. The Twitter Trust & Safety Council will initially be formed of around 40 bodies, including the Cyber Civil Rights Initiative, ICT Watch, NetSafe, and Samaritans. These organisations, along with safety experts, academics and security researchers, will work to ensure a safe and secure platform for users to express themselves freely and safely. The Council's main focus will be to protect minors, encourage 'greater compassion and empathy on the internet,' and promote efforts in media literacy and digital citizenship. Community groups will also participate to help prevent online 'abuse, harassment, and bullying,' as well as mental health problems and suicide.
Security

President Obama Unveils $19 Billion Plan To Overhaul U.S. Cybersecurity 167

erier2003 writes: President Obama on Tuesday unveiled an expansive plan to bolster government and private-sector cybersecurity by establishing a federal coordinator for cyber efforts, proposing a commission to study future work, and asking Congress for funds to overhaul dangerously obsolete computer systems. His newly signed executive orders contain initiatives to better prepare college students for cybersecurity careers, streamline federal computer networks, and certify Internet-connected devices as secure. The Cybersecurity National Action Plan also establishes a Federal Privacy Council (to review how the government stores Americans' personal information), creates the post of Chief Information Security Officer, and establishes a Commission on Enhancing National Cybersecurity.
Bug

The Internet of Broken Things (hackaday.com) 79

szczys writes: The Internet of Things is all the hype these days. On one side we have companies clamoring to sell you Internet-Connected-everything to replace all of the stuff you already have that is now considered "dumb." On the other side are security researchers screaming that we're installing remote access with little thought about securing it properly. The truth is a little of both is happening, and that this isn't a new thing. It's been around for years in industry, the new part is that it's much wider spread and much closer to your life. Al Williams walks through some real examples of the unintended consequences of IoT, including his experiences building and deploying devices, and some recent IoT gaffs like the NEST firmware upgrade that had some users waking up to an icy-cold home.
Piracy

Anti-Piracy Group BREIN Demands Torrents Time Cease and Desist 90

An anonymous reader writes: Not even a week has gone by since Torrents Time appeared on the scene, and the site has already been served with a cease-and-desist letter. Anti-piracy group BREIN, based in the Netherlands, has deemed the streaming tool an "illegal application" and demands the administrators "cease and desist the distribution of Torrents Time immediately."
The Internet

India Blocks Facebook's Free Basics Internet Service (thestack.com) 130

An anonymous reader writes: India's leading telecom regulator, TRAI (Telecom Regulatory Authority of India), has today voted against differential pricing, ruling with immediate effect that all data prices must be equal, and that companies cannot offer cheaper rates than others for certain content. The call is a significant blow to Facebook's Free Basics (previously Internet.org) initiative and Airtel Zero – projects which work to make internet access more accessible by providing a free range of "basic" services. The watchdog confirmed that providers would no longer be able to charge for data based on discriminatory tariffs but instead that pricing must be "content agnostic." It added that fines of Rs. 50,000 – 50 Lakh would be enforced should the regulations be violated.
Programming

Drag-and-Drop "CS" Tutorials: the Emperor's New Code? 157

theodp writes: Teaching kids computer science is a great movement," writes HS senior David Yue, "however, to overly dilute the magnitude of the difficulty in regards to the subject area of coding and to create the illusion of mastering a 'superpower' (Code.org) is a huge mistake. There are many videos and articles on the Internet these days that have demonstrated positive support towards computer science education. Below these articles, one can find many comments, left mostly by parents and supporters. These people usually express how proud they are that their children have an opportunity to learn computer science or how proud they are that computer science is being integrated at a more substantial level into the education system." But Drag and Drop Doesn't = Coding, argues Yue. "Parents and teachers today who aren't technical need to be aware that the drag and drop code or the candy-coated learning process does not effectively teach children programming but eventually causes a huge amount of shock once they are immersed in real code." Yue's Emperor's-New-Code warning comes days before President Obama — a graduate of Code.org's drag-and-drop Disney Princess coding tutorial — asks Congress for $4-billion-and-change in the upcoming budget to fund his "Computer Science for All" K-12 initiative.
Desktops (Apple)

Scareware Signed With Apple Cert Targets OS X Machines (threatpost.com) 39

msm1267 writes: A unique scareware campaign targeting Mac OS X machines has been discovered, and it's likely the developer behind the malware has been at it a while since the installer that drops the scareware is signed with a legitimate Apple developer certificate.

"Sadly, this particular developer certificate (assigned to a Maksim Noskov) has been used for probably two years in similar attacks," said Johannes Ullrich, dean of research of the SANS Institute's Internet Storm Center, which on Thursday publicly disclosed the campaign. "So far, it apparently hasn't been revoked by Apple."

Communications

Grandma's Phone, DSL, and the Copper They Share (hackaday.com) 177

szczys writes: DSL is high-speed Internet that uses the same twisted pair of copper wire that still works with your Grandmother's wall-mounted telephone. How is that possible? The short answer is that the telephone company is cheating. But the long answer delves into the work of Claude Shannon, who figured out how much data could be reliably transferred using a given medium. His work, combined with that of Harry Nyquist and Ralph Hartley (pioneers of channel capacity and the role noise plays in these systems), brings the Internet Age to many homes on an infrastructure that has been in use for more than a hundred years.
DRM

In Japan, a Battle Brewing Over the Right To Record 4k and 8k Broadcasts (itmedia.co.jp) 105

AmiMoJo writes: Japanese broadcasters have indicated that 4k and 8k broadcasts may have recording disabled via a 'do not copy' flag [via Google Translate], which receivers would be expected to obey. Now the Internet Users Association (MIAU) and Shufuren (Housewives Federation) have submitted documentation opposing the ban. The document points out that the ban will only inconvenience the majority of the general audience, while inevitably failing to prevent unauthorized copying by anyone determined to circumvent the protection.
Security

MIT Reveals "Hack-Proof" RFID Chip (thestack.com) 53

JustAnotherOldGuy writes: A group of researchers at MIT and Texas Instruments claim that they have developed a new radio frequency identification chip that may be impossible to hack. Traditional RFID chips are vulnerable to side-channel attacks, whereby a hacker can extract a cryptographic key from the chip. The new RFID chip runs a random-number generator that creates a new secret key after each transaction. The key can then be verified with a server to ensure that it is correct. The group at MIT also incorporated protection against a power-glitch attack, an attack that would normally leave a chip vulnerable to an interruption of the power source that would in turn halt the creation of a new secret key. Texas Instruments CTO Ahmad Bahai stated, "We believe this research is an important step toward the goal of a robust, lo-cost, low-power authentication protocol for the industrial internet." The question is, how long will it be before this "hack proof" chip is hacked?
Piracy

All 12 Member Countries Sign Off On the TPP (freezenet.ca) 183

Dangerous_Minds writes: News is surfacing that the TPP has officially been signed by all 12 member countries. This marks the beginning of the final step towards ratification. Freezenet has a quick rundown of what copyright provisions are contained in the agreement, including traffic shaping, site blocking, enforcement of copyright when infringement is "imminent," and a government mandate for ISPs to install backdoors for the purpose of tracking copyright infringement on the Internet.
The Internet

Cisco To Acquire IoT Company Jasper For $1.4 Billion (thestack.com) 25

An anonymous reader writes: Cisco has announced its intention to spend $1.4 billion purchasing startup Jasper Technologies, Inc. which specialises in IoT connectivity. It's the most significant acquisition the tech multinational has made since its purchase of Wi-Fi manufacturer Meraki in 2012. In 2015 Cisco also acquired OpenDNS for $635 million, and with the Jasper acquisition seems committed to securing a major foothold in IoT infrastructure over the next five years.
Businesses

Senators Blast Comcast, Other Cable Firms For "Unfair Billing Practices" (arstechnica.com) 176

An anonymous reader writes: Six Democratic US senators [Wednesday] criticized Comcast and other TV and broadband providers for charging erroneous fees, such as cable modem rental fees billed to customers who bought their own modems. The senators have written a letter to Federal Communications Commission Chairman Tom Wheeler asking the commission to 'stop unfair billing practices.'.....Last year, more than 30 percent of complaints to the FCC about Internet service and 38 percent of complaints about TV service were about billing...
Open Source

Link Rot Rx: 'Amber' Add-on For WordPress and Drupal 17

David Rothman writes: If you run a WordPress or Drupal site, you can now fight link rot with Amber, a new open source add-on from Harvard's Berkman Center. If links are dead, visitors can still summon up the pages as stored on your server or, if you prefer, outside ones such as the Internet Archive. TeleRead has the details, and the Amber site is here, with download information.
Communications

Receiving Real-Time Imagery From Russia's Meteor-M N2 Satellite 26

An anonymous reader writes: The Meteor-M N2 is a low orbit Russian weather satellite which broadcasts live weather satellite images, similar to the APT images produced by the NOAA satellites. But Meteor digital images are however much better as they are transmitted as a digital signal with an image resolution 12x greater than the aging analog NOAA APT signals. Radio enthusiasts are receiving images with hacked cheap digital TV dongles. There is even the AMIGOS project which stands for Amateur Meteor Images Global Observation System: users around the world can contribute Meteor images through the internet to create worldwide real-time coverage.
China

Duplicate Login Details Enabled Hack of More Than 20 Million Chinese Consumers (thestack.com) 14

An anonymous reader writes: According to various Chinese sources including Techweb (Chinese language), police in Zhejiang held a conference on Monday announcing that 20.59 million users of the 'Chinese eBay', taobao.com, had their login details stolen by proxy, when hackers ran user/pass combos from a stolen database of 99 million other users and found that more than 20% were using the same login credentials across different ecommerce sites.
Security

Chromodo Browser Disables Key Web Security (thestack.com) 54

An anonymous reader writes: A Google Security Research update has claimed that Comodo's internet browser Chromodo, based on the open-source project Chromium, contains significant security failings and puts its users at risk. This week's Google alert suggested that the Chromodo browser – available as a standalone download, as well as part of the company's Security package – is less secure than it promises. According to analysis, the browser is disabling the Same Origin policy, hijacking DNS settings, and replacing shortcuts with Chromodo links, among other security violations.
It's funny.  Laugh.

John Cleese Warns Campus Political Correctness Leading Towards 1984 (washingtonexaminer.com) 667

An anonymous reader writes: Ashe Schow writes at the Washington Examiner that, "The Monty Python co-founder, in a video for Internet forum Big Think, railed against the current wave of hypersensitivity on college campuses, saying he has been warned against performing on campuses. "[Psychiatrist Robin Skynner] said: 'If people can't control their own emotions, then they have to start trying to control other people's behavior,'" Cleese said. "And when you're around super-sensitive people, you cannot relax and be spontaneous because you have no idea what's going to upset them next." Cleese said that it's one thing to be "mean" to "people who are not able to look after themselves very well," but it was another to take it to "the point where any kind of criticism of any individual or group could be labeled cruel." Cleese added that "comedy is critical," and if society starts telling people "we mustn't criticize or offend them," then humor goes out the window. "With humor goes a sense of proportion," Cleese said. "And then, as far as I'm concerned, you're living in 1984." Cleese is just the latest comedian to lecture college students about being so sensitive.
The Internet

How the Raspberry Pi Can Automatically Tweet Complaints About Your Slow Internet (ibtimes.co.uk) 154

An anonymous reader writes: Contacting your internet provider to complain about slow browsing speeds is a tiresome chore which none of us enjoy, but one man has found a solution. He has configured a Raspberry Pi computer to automatically tweet a complaint to Comcast when his internet falls below 50Mbps, well below the 150Mbps he pays for. Wouldn't it be nice if ISPs wrote a rebate check each month to reflect the percentage of their promised throughput that was actually available?
Communications

Big Satellite Systems, Simulated On Your Desktop (sf.net) 44

An anonymous reader writes: Big systems of hundreds of satellites are under development to provide wireless Internet globally, with Richard Branson's OneWeb and Thales' LeoSat aiming at consumers and business markets respectively. It's like reliving the late 1990s, when Bill Gates' Teledesic and Motorola's Celestri were trying to do the same thing before merging their efforts and then giving up. And now you can simulate OneWeb and LeoSat for yourself, and compare them to older systems, in the new release of the vintage SaVi satellite simulation package, which was created in the 1990s during the first time around. Bear in mind Karl Marx's dictum of history: the first time is tragedy, and the second time is farce. Do these new systems stand a chance?

Slashdot Top Deals