itwbennett writes: Blaming 'bureaucratic dysfunction,’ Oracle has sued Oregon for breach of contract, seeking more than $20 million in fees the state is withholding for its work on Cover Oregon, a troubled insurance exchange website developed as part of President Barack Obama's health care policy overhaul. The move is a preemptive strike by Oracle against Oregon, whose governor, John Kitzhaber, has advocated suing Oracle.
jfruh writes: Many security experts agree that our current authentication system, in which end users are forced to remember (or, more often, write down) a dizzying array of passwords is broken. DARPA, the U.S. Defense Department research arm that developed the Internet, is trying to work past the problem by eliminating passwords altogether, replacing them with biometric and other cues, using off-the-shelf technology available today.
jfruh writes: The Xbox one isn't just a game console: it's also a nifty media set-top box, and it interacts very well with your TV service — as long as you have cable. Cord-cutters will soon be able to attach their Xbox to an antenna — but only in Europe.
jfruh writes: Not everyone in tech has a job like Homer Simpson, who's been replaced at various times by a brick tied to a lever and a chicken named Queenie. But many IT workers have come up against mind-numbing, repetitive tasks that probably could be automated. So: what to do about it? Well, the answer depends on how much power you have in an organization and how much your bosses respect your opinion.
itwbennett writes: Google is taking Internet security into its own hands, punishing sites that don't use encryption by giving them lower search rankings. The use of https is now one of the signals, like whether a Web page has unique content, that Google uses to determine where a site will appear in search rankings, although it will be a 'lightweight' signal and applies to about 1 percent of search queries now, wrote Zineb Ait Bahajji and Gary Illyes, both Google webmaster trends analysts, in a blog post.
itwbennett writes: China is tightening control over mobile messaging services with new rules that limit their role in spreading news. Under the new regulations, only news agencies and other groups with official approval can publish whatever the government considers political news via public accounts. 'All other public accounts that have not been approved cannot release or reprint political news,' the regulations said. Users of the instant messaging services will also have to register with their official IDs, and agree to follow relevant laws.
itwbennett writes: Some security researchers on Wednesday said it's still unclear just how serious Hold Security's discovery of a massive database of stolen credentials really is. 'The only way we can know if this is a big deal is if we know what the information is and where it came from,' said Chester Wisniewski, a senior security advisor at Sophos. 'But I can't answer that because the people who disclosed this decided they want to make money off of this. There's no way for others to verify.' Wisniewski was referring to an offer by Hold Security to notify website operators if they were affected, but only if they sign up for its breach notification service, which starts at $120 per year.
jfruh writes: NetSuite faced a potentially ugly situation in which one of its own customers sued because they said they had been bamboozled by aggressive salesmen into buying "manifestly unusable" software. The lawsuit has been settled out of court, but the message that software companies should be anxious about, according to one analyst, is that "in some cases the only way you can get a vendor's attention is to bring in a lawyer."
jfruh writes: Most techies break out into hives at the sound of the word "marketing". But when looking for work, you need to market yourself — not just selling yourself, but letting potential employers know you exist, so they come to you.
itwbennett writes: Patrick Wardle and Colby Moore, both of whom work for security firm Synack, will show at Defcon how a Dropcam could turn into a Trojan horse. Here are the basics: Moore and Wardle plucked the private and public SSL certificates from the Dropcam they analyzed. With those in hand, it would be possible for them to view videos a person has stored or upload their own videos that would appear to have come from a specific Dropcam. 'It would allow an attacker to basically hijack or take over the video stream,' Wardle said. For its part, Nest, which acquired Dropcam in June, maintains that such an attack would require physical access to a Dropcam: 'The Synack folks were not able to remotely compromise any of our cameras — only ones they had physical access to,' wrote spokeswoman Kate Brinks. But it's not far fetched that an attacker could buy a Dropcam and give it as a gift to someone, essentially a Trojan horse attack that opens up their video to monitoring.
jfruh writes: The FTC has moved aggressively recently against companies that make it too easy for people — especially kids — to rack up huge charges on purchases within apps. But at a dicussion panel sponsored by free-market think tank, TechFreedom, critics pushed back. Joshua Wright, an FTC commissioner who dissented in a recent settlement with Apple, says a 15-minute open purchase window produced "obvious and intuitive consumer benefits" and that the FTC "simply substituted its own judgment for a private firm's decision as to how to design a product to satisfy as many users as possible."
jfruh writes: Investigators in a criminal case want to see some emails stored on Microsoft's servers in Ireland. Microsoft has resisted, on the grounds that U.S. law enforcement doesn't have jurisdiction there, but a New York judge ruled against them, responding to prosecutors' worries that web service providers could just move information around the world to avoid investigation. The case will be appealed.
jfruh writes: The rapid rise of Japan's high-tech sector in the 1970s and '80s prompted widespread surprise and more than a little anxiety in the West, with many American sci-fi writers and movie makers depicting a Japanese-dominated near future. The country's economy entered a seemingly permanent recession in the 1990s and it was soon eclipsed by China as the world's #2 economy and source of Western fears about Asian dominance. But Japanese tech companies and enginners keep on innovating in areas ranging from airplanes to tuna.