"It's utterly confounding," said Philip Reiner, a former senior director at the National Security Council, who was notified by the AP that he was targeted in 2015. "You've got to tell your people. You've got to protect your people." The FBI declined to answer most questions from AP about how it had responded to the spying campaign... A senior FBI official, who was not authorized to publicly discuss the hacking operation because of its sensitivity, declined to comment on timing but said that the bureau was overwhelmed by the sheer number of attempted hacks... A few more were contacted by the FBI after their emails were published in the torrent of leaks that coursed through last year's electoral contest. But to this day, some leak victims have not heard from the bureau at all.
Here's an interesting statistic from the AP's analysis. "Out of 312 U.S. military and government figures targeted by Fancy Bear, 131 clicked the links sent to them."
But it's 2017, and spam has clawed itself back from the grave. It shows up on social media and dating sites as bots hoping to lure you into downloading malware or clicking an affiliate link. It creeps onto your phone as text messages and robocalls that ring you five times a day about luxury cruises and fictitious tax bills. Networks associated with the buzzy new cryptocurrency system Ethereum have been plagued with spam. Facebook recently fought a six-month battle against a spam operation that was administering fake accounts in Bangladesh, Indonesia, Saudi Arabia, and other countries. Last year, a Chicago resident sued the Trump campaign for allegedly sending unsolicited text message spam; this past November, ZDNet reported that voters were being inundated with political text messages they never signed up for. Apps can be horrid spam vectors, too. Repeated mass data breaches that include contact information, such as the Yahoo breach in which 3 billion user accounts were exposed, surely haven't helped. Meanwhile, you, me, and everyone we know is being plagued by robocalls.
"As the situation between the DPRK and the US has become more tense, we've definitely seen an increase in number of probe attempts from cyber actors coming out of the DPRK," an official at an aerospace and defense firm told Security Ledger. The so-called "probes" were targeting the company's administrative network and included spear phishing attacks via email and other channels. The goal was to compromise computers on the corporate network... So far, the attacks have targeted "weakest links" within the firms, such as Human Resources personnel and general inquiry mailboxes, rather than targeting technical staff directly. However, experts who follow the DPRK's fast evolving cyber capabilities say that the country may have more up their sleeve.
CNBC also reports that America's congressional defense committees have authorized a last-minute request for $4 billion in extra spending for "urgent missile defeat and defense enhancements to counter the threat of North Korea."
Other countries newly interested in purchasing missile defense systems include Japan, Sweden, Poland, and Saudi Arabia.
It's the same group responsible for the Panama Papers, and the Guardian reports that in these 13.4 million new files, journalists have discovered:
- "How Twitter and Facebook received hundreds of millions of dollars in investments that can be traced back to Russian state financial institutions."
- "Aggressive tax avoidance by multinational corporations, including Nike and Apple."
- "Extensive offshore dealings by Donald Trump's cabinet members, advisers and donors, including substantial payments from a firm co-owned by Vladimir Putin's son-in-law to the shipping group of the US commerce secretary, Wilbur Ross."
- "The tax-avoiding Cayman Islands trust managed by the Canadian prime minister Justin Trudeau's chief moneyman."
"The publication of this investigation, for which more than 380 journalists have spent a year combing through data that stretches back 70 years, comes at a time of growing global income inequality," reports the Guardian. "Meanwhile, multinational companies are shifting a growing share of profits offshore -- €600 billion in the last year alone -- the leading economist Gabriel Zucman will reveal in a study to be published later this week. "Tax havens are one of the key engines of the rise in global inequality," he said."
The new research -- detailed this week in the journal Nature Communications -- suggests ash ejected into the atmosphere by erupting volcanoes can be deposited thousands of miles away. When it's deposited on ice sheets, the dark particles cause the ice to absorb more thermal energy and accelerate melting... Some scientists have even suggested melting encouraged by volcanic eruptions could trigger even more eruptions, a positive feedback loop. As glaciers and ice sheets melt, pressure is relieved from the planet's crust, allowing magma to rise to the surface.
The original submission has one caveat. If you keep reloading the page long enough, you'll eventually get a story by Jon Katz.
Similar to the Massachusetts legislation for automobiles, these digital-right-to-repair proposals would require manufacturers to provide access to service documentation, tools, firmware, and diagnostic programs. They also would require manufacturers to sell replacement parts to consumers and independent repair facilities at reasonable prices. The bills introduced this year in a dozen states have some variations. The ones in Kansas and Wyoming, for example, are limited to farm equipment. The one most likely to be adopted soon is in Massachusetts, which seeks to outlaw the monopoly on repair parts and information within the state. If it passes, electronics manufacturers will probably change their practices nationwide. Consumers would then have more choices when something breaks. The next time your smartphone screen cracks, your microwave oven gets busted, or your TV dies, you may be able to get it fixed quickly, affordably, and fairly. And you, not the manufacturer, would decide where your equipment is repaired: at home, with the manufacturer, or at a local repair shop that you trust.
Slashdot turned 20 this month, which is ancient in internet years. How far have we come?
Also, we've set up a page to coordinate user meet-ups around the world to celebrate. Read on for the full 20-year history of Slashdot.
Edge bested Chrome and Firefox by decisive margins. For instance, Chrome blocked 74% of all phishing attacks, and 88% of SEM attacks. Meanwhile, Firefox came in third in both tests, stopping just 61% of the phishing attacks and 70% of all SEM attempts... Both Chrome and Mozilla's Firefox rely on the Safe Browsing API (application programing interface), but historically, Mozilla's implementation has performed poorly compared to Google's. No shock: Google created the API. Edge also took top prize in blocking attacks from the get-go. In NSS's SEM attack testing, for example, the Microsoft browser stopped nearly every attempt from the first moments a new attack was detected. Chrome and Firefox, on the other hand, halted 75% and 54% of the brand-new attacks, respectively. Over a week's time, Chrome and Firefox improved their blocking scores, although neither reached Edge's impressive 99.8%.
The researchers spent three weeks continuously monitoring the browsers on Windows 10 computers. But in the real world, Edge runs on just 5% of all personal computers, while Firefox runs on 13% and Chrome on 60%.
The article embeds both videos -- and also links to the music videos they're parodying. And it includes links to SUSE's two previous annual music video parodies -- Uptime Funk (based on Bruno Mars' blockbuster hit "Uptown Funk"), and Can't Stop the SUSE, a parody of Justin Timberlake's "Can't Stop the Feeling".