I have serious doubts about your statement, considering how contested Franken's election victory was, and for how long, not to mention how close.
OK, I get your point, but what about the money ATT, Verizon, Comcast, etc. will be pumping into his opponent?
Guess who won't be receiving much, if any campaign contributions for the next election from ATT? (Or Verizon, or Comcast).
Been watching the firehose submissions as a kind of hobby for the last few hours while monitoring machine processes and I can assure you, this was not part of anything submitted. Perhaps on a slow news day, but... this post just seems so lame to begin with.
You assume every small business owner is technology savvy enough to monitor Google Maps, along with every similar web service for such malicious acts, on a regular basis. Seriously, you must be able to see you will always have a given percentage of businesses that fail to do such a task, and do it well.
Yesterday, when I read this article, I checked out a location which I'm not willing to share here. On it was exactly this type of 'theft' of location, and street-view manipulation as explained in this article. In fact I had noticed the hack before in this location, but not realized it as such.
Yesterday, when I looked and saw the display via the new GMAPs interface, I was amazed at the *quality* of the hack. A dirty, mouse-infested hotel down the street 'occupied' a very desirable corner location and cafe. Using street-view, it appeared as if the cafe was the hotel's bar. Plus they had purchased an ad to book the hotel when you clicked the PIN, and the result looked IMHO better than a professional web-page for such a purpose (because of the new GMAPs interface and presentation). The final result was a stuning, quality, hack I thought, and everyone I showed it to agreed. But I give more credit to dumb luck plus the new GMAPs interface then cleverness by the thieving hotel owner.
I used the 'suggest an edit' tool to report the manipulation to Google, and also input new, accurate information for the cafe on the corner, and other neighborhood features.
Weird thing is, today when I look via various machines inthe office, I see various displays. Some showing the old GMAPs interface, some new. Some with the dirty hotel competely removed from the map, and the cafe added. Like DNS, it seems it takes a while for GMAPs to get updated, and probably the more people that offer input the better.
Here's the legal argument for not talking to the police: https://www.youtube.com/watch?...
Now I want this interesting new gmail feature for my own personal use too! Call it beta if you want, go ahead, it seems to be working well enough already.
Who should I address my own Feature Request to at the GOOG? Maybe Fat Chance?
According to RSA, the malware is being delivered via email. In Brazil, when banking customers access their online banking site for the first time, they are often asked to install a security plugin. When the customer does so, a protection service is created and starts running on the PC. In addition, some shared libraries are also installed on the system and are loaded by the browser in order to help provide protection for customers during online banking operations, RSA noted.
However, the Boleto malware the company detected searches for specific versions of client side security plug-ins detects their shared libraries and patches them in real-time to dodge security. In one case, RSA analysts noticed that the malware accessed the plugin's memory area and modified a conditional JMP to a regular JMP operation, thereby thwarting the plugin's capabilities.
What platforms does this malware operate on exactly? The TFA doesn't say.
I can tell you for a fact, a free Class 1 StartSSL certificate can achieve an A+ rating from ssllabs.com when/if the technical server configuration is correct, because I saw it happen just this week on a server somewhere. StartSSL seems to make a profit by allowing newbies a free, documented (but otherwise 'supported' to what extent I didn't test at all...) learning process and having to pay higher than normal revocation fees to get everything functional and correctly setup. I made this mistake once myself, and then realized it was simply cheaper to pay about $15 for a new Class 2 certificate from Dreamhost SSL than to pay StartSSL to revoke my free, erroneous-URL certificate from them. StartSSL looks like a really good operation, but you really need to know what you are doing to really save money.
Here's a really good article to help newbie NGINX admins secure their servers using free StartSSL Class 1 certificates: https://konklone.com/post/swit...
What I've learned lately in my own research in this area is there's further differentiation of certificate values, such as the green Class 3 certificates which I semi-understand require more documentation to be filed (like passport scans?) and higher fees.
Work is the crab grass in the lawn of life. -- Schulz