Forgot your password?
typodupeerror

+ - Source Code Leaked for Tinba Banking Trojan->

Submitted by msm1267
msm1267 (2804139) writes "The source code for Tinba, known as the smallest banker Trojan in circulation, has been posted on an underground forum. Researchers say that the files turned out to be the source code for version one of Tinba, which was identified in 2012, and is the original, privately sold version of the crimeware kit.

Tinba performs many of the same malicious functions as other banker Trojans, injecting itself into running processes on an infected machine, including the browser and explorer.exe. The malware is designed to steal financial information, including banking credentials and credit-card data and also makes each infected computer part of a botnet. Compromised machines communicate with command-and-control servers over encrypted channels. Tinba got its name from an abbreviation of “tiny banker”, and researchers say that it’s only about 20 KB in size."

Link to Original Source

+ - Biohackers Are Engineering Yeast to Make THC 1

Submitted by meghan elizabeth
meghan elizabeth (3689911) writes "How do you get weed without the weed? By genetically engineering yeast to produce THC, of course.
Once theorized in a stoner magazine column more than a decade ago, a biotech startup working in Ireland is actively trying to transplant the genetic information that codes for both THC and another cannabinoid called CBD into yeast so that "marijuana" can be grown in a lab—no plants necessary."

+ - How Google Map Hackers Can Destroy a Business at Will->

Submitted by Anonymous Coward
An anonymous reader writes "Wired reports, "Beneath its slick interface and crystal clear GPS-enabled vision of the world, Google Maps roils with local rivalries, score-settling, and deception. Maps are dotted with thousands of spam business listings for nonexistent locksmiths and plumbers. Legitimate businesses sometimes see their listings hijacked by competitors or cloned into a duplicate with a different phone number or website. In January, someone bulk-modified the Google Maps presence of thousands of hotels around the country, changing the website URLs to a commercial third-party booking site ... Small businesses are the usual targets. .... These attacks happen because Google Maps is, at its heart, a massive crowdsourcing project, a shared conception of the world that skilled practitioners can bend and reshape in small ways using tools like Google’s Mapmaker or Google Places for Business. .... Google has gotten much better at policing malicious edits, to the point where they’re rare today. ... The system has loopholes though, and troves of money-hungry spammers looking for weaknesses. In February, an SEO consultant-turned-whistleblower named Bryan Seely demonstrated the risk dramatically when he set up doppelganger Google Maps listings for the offices of the FBI and Secret Service. Seely channeled the incoming phone calls through to the real agencies while recording them. The stunt got a lot of attention. The Secret Service told Seely he was “a hero” for showing them the vulnerability.""
Link to Original Source

+ - DARPA social media research stirs a murky, controversial pot->

Submitted by coondoggie
coondoggie (973519) writes "DARPA’s two-year old program to better understand and perhaps ultimately influence social media has begun to bear fruit but some of that harvest is raising a stink. DARPA said when rolling out its Social Media in Strategic Communication (SMISC) program was to develop a social networks science that will develop automated and semiautomated operator support tools and techniques for the systematic and methodical use of social media at data scale and in a timely fashion. But in building that science the agency says it has funded myriad social media/Twitter research (including a study that looked at Lady Gaga’s Twitter following—a model of social media popularity, DARPA stated) as well as a look into Facebook, Twitter, Pinterest, Reddit and Kickstarter."
Link to Original Source

+ - Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies."
Link to Original Source

+ - Superior Yuytu rover can go conquer Mars->

Submitted by pesttest
pesttest (2090272) writes "Chief designer of the first in the history of space exploration rover Chinese Yuytu Yan Jia (Jia Yang) shared with the publication of his vision Xinhua further development of the national space program. Scientist expressed hope that soon modified version of his brainchild to conquer Mars. “I very much hope that the Chinese will explore...."
Link to Original Source

+ - Can dogs sniff out computer memory like drugs?-> 1

Submitted by FriendlySolipsist
FriendlySolipsist (129062) writes "A dog can be trained to detect computer memory, say the Rhode Island State Police in taking delivery of the second such dog in the nation from the Connecticut State Police. Being able to find hidden computer flash memory cards hidden in drawers and over ceiling tiles will aid their fight against child porn, the police say.

But is there any scientific evidence that such a thing is even possible? Computer parts are made from plastic and metal like almost everything else in a home or office, and computer parts unlike organic plants give off no odor. Without any plausible scientific explanation for how a dog can detect computer parts, is this all just a legal sham to bypass Fourth Amendment probable cause warrant requirements, allowing the human handler to signal the dog based on exactly the kind of "police intuition" that violates constitutional rights?"

Link to Original Source

Comment: Re:So how is that going to work (Score 1) 188

> I throw people out of the theatre all day long for using
> their cell phones... There are places it should be legal
> and my business or home is one of them.

Try covering the walls of the theatre room with aluminum foil or tin foil. It's not exactly a new idea http://en.wikipedia.org/wiki/F...
> In 1836, Michael Faraday observed that the excess charge on a charged conductor
> resided only on its exterior and had no influence on anything enclosed within it.
> To demonstrate this fact, he built a room coated with metal foil and allowed
> high-voltage discharges from an electrostatic generator to strike the outside of
> the room. He used an electroscope to show that there was no electric charge
> present on the inside of the room's walls.

Comment: People have short memories (Score 1) 231

I'm a fan of pre-Beatles oldies rock music. Every so often, somebody comes up with a "Greatest Hits Of All Time" list, and it usually seems to go back no further than 10 or 15 years before the list was published. Similar for history. Many such lists are better described as "the most influential people of recent times".The most influential people are founders of major movements religions (Jesus, Mohammed, etc) and political ideologies such (Karl Marx, etc)

And then there are leaders of states/empires, who led their empires to triumph/defeat. Too numerous to mention, going back to Biblical times through today

It is clear that the individual who persecutes a man, his brother, because he is not of the same opinion, is a monster. - Voltaire

Working...