Oh my. Peak Apple. Someone is queuing in Sydney before THEY HAVE EVEN ANNOUNCED ANYTHING!!!pic.twitter.com/G16X0ze8eN
— Seamus Byrne (@seamus)September 8, 2015"I have one consistency, which is being against the totalitarian – on the left and on the right. The totalitarian is the enemy." Christopher Hitchens's last interview »
Ars
Technica
August 23, 2015
August 23, 2015
Imagine
it’s 1995, and you’re about to put your company’s office on the Internet. Your security has been solid in the past—you’ve banned
people from bringing floppies to work with games, you’ve installed virus
scanners, and you run file server backups every night. So, you set up
the Internet router and give everyone TCP/IP addresses.
Kay Bell, Tax fraud gangsters celebrate their crimes in song. IRS has made ID-theft fraud so easy, even a street gang can do it.
Over a ten-plus year period Mr. Brinkley had fraudulently obtained over $1.2 Million from the Better Business Bureau. Mr. Brinkley was President and CEO of the organization; he created phony invoices and used the money for personal expenses and to support his gambling habit. He also admitted to not reporting $148,390 in income on his 2013 tax return.
Elected officials don’t lose their human failings when they become elected officials. In fact, public office may attract people with certain kinds of failings.
Ars
Technica
August 27, 2015
August 27, 2015
The
maintainers of the open BitTorrent protocol for file sharing have fixed a
vulnerability that allowed lone attackers with only modest resources to take
down large sites using a new form of denial-of-service attack. The technique
was disclosed two weeks ago in a research paper submitted to the 9th Usenix
Workshop on Offensive Technologies.
The Dark
Web’s biggest marketplace for drugs seems to have learned a lesson from the
downfall of the Silk Road: When cracks start to appear in your anonymity’s
armor, it’s time to quit while you’re ahead—or, at least, retreat and regroup.
Agora, the reigning marketplace in the Dark Web’s bustling, bitcoin-based
narcotics economy, announced Tuesday evening that it will go offline at least
temporarily to shore up defenses against potential attacks that it believes
might be used to identify the site’s servers and operators.
There's no
question that software bugs are common. Typically, programs ship with at least
one or two that researchers later find – or the public is surprised by. So, for
a bug connoisseur such as Scott Craver, truly extraordinary vulnerabilities are
things to be prized. Since 2005, Dr. Craver has been running Underhanded C, a
competition in which entrants attempt to camouflage the best-hidden, most
devious vulnerabilities into the most elegant looking source code in the
programming language known as "C." This year’s challenge went live
last weekend.