By EditorDavid from Slashdot's we-are-legion department
An anonymous Slashdot reader writes:
Softpedia is reporting that a member of the Anonymous collective "has been hijacking accounts for the most active ISIS supporters, the ones involved in online recruitment, and has been plastering their profiles with naked women and peaceful messages."
Anonymous is also using the hijacked accounts to monitor "protected" tweets from ISIS, and they're reporting hundreds of thousands of other ISIS profiles to Twitter.
But Anonymous is also defacing 161 of the hijacked accounts, saying they're "Adding our own images and basically showing them 'We are in control'... we are creating confusion and distrust..." There are a few things that the Islamic State fear. One is women and the second is Porn."Read Replies (0)
By EditorDavid from Slashdot's hit-the-road,-Jack department
An anonymous reader writes that Uber "has suffered double-losses in Europe, as both France and Germany continue to reject the company's validity in their regions." Meanwhile, a Boston Uber driver filed a federal lawsuit on Thursday accusing Uber of illegally classifying drivers as independent contractors to avoid providing full employee benefits. An Indianapolis driver has filed a similar suit, which also complains that Uber won't let them accept tips, and keeps any tips that customer's pay them through Uber's app. And remember when Uber and Lyft left Austin after losing a local election which would've required all their drivers to be fingerprinted? Now two lawsuits charge the companies were required to give 60 days notice to all their employees, and is demanding back pay and benefits.
But an anonymous reader quotes this column from the Los Angeles Times arguing that a federal judge's ultimate question is just "how sleazy" Uber really is.
We're familiar with the Uber that talked about responding to bad publicity by digging up dirt on reporters following the company. Also the Uber that allegedly stalked passengers using its service, following their travel routes for the amusement of its party-goers... What about the Uber that secretly investigated a lawyer representing an adversary in a lawsuit, and then lied about it? That's the Uber that Federal Judge Jed S. Rakoff of New York wants to hear a lot more about. On Thursday he ordered Uber to turn over to the other side a pile of documents related to the investigation.
Slashdot reader chasm22 points out that the high-powered investigator hired by Uber is apparently a retired senior CIA officer -- a former chief strategy officer, chief of cyberthreat analysis and chief of counterintelligence.Read Replies (0)
By manishs from Slashdot's act-surprised department
The FBI did turn to NSA when it was trying to hack into the San Bernardino shooter's iPhone, according to an NSA official. But to many's surprise, one of the world's most powerful intelligence agencies couldn't hack into that particular iPhone 5c model. "We don't do every phone, every variation of phone," said Richard Ledgett, the NSA's deputy director. "If we don't have a bad guy who's using it, we don't do that." According to Ledgett, apparently the agency has to prioritize its resources and thus it doesn't know how to get into every popular gadget. According to the report, the agency is now looking to exploit Internet of Things, including biomedical devices. The Intercept reports: Biomedical devices could be a new source of information for the NSA's data hoards -- "maybe a niche kind of thing ... a tool in the toolbox," he said, though he added that there are easier ways to keep track of overseas terrorists and foreign intelligence agents. When asked if the entire scope of the Internet of Things -- billions of interconnected devices -- would be "a security nightmare or a signals intelligence bonanza," he replied, "Both."Read Replies (0)
By EditorDavid from Slashdot's gullible-media? department
An anonymous reader writes: "We have investigated reports of Twitter usernames/passwords on the dark web, and we're confident that our systems have not been breached," posted the company's security office, Michael Coates. In a blog post, he wrote that Twitter use HTTPS "everywhere" and secures account credentials with bcrypt, while also watching for suspicious account activity based on location, device type, and login history. Responding to recent reports of 32 million compromised accounts, he blamed malware and also recycled passwords, which mean "a breach of passwords associated with website X could result in compromised accounts at unrelated website Y."
"When so many breaches are announced in a short window of time, it may be natural to assume that any mention of 'another breach' is true and valid. Nefarious individuals leverage this environment in order to either bundle old breached data or repackage accounts from a variety of breaches, and then claim they have login information and passwords for website Z."
A security expert gave the same explanation to InformationWeek. And Brian Krebs recently pointed out that a Tweet claiming 73 million compromised Dropbox accounts was actually just recycling credentials from a 2013 breach at Tumblr. A recent breach of Mark Zuckerberg's Twitter account was attributed to a low-security password.Read Replies (0)
By BeauHD from Slashdot's wealth-of-knowledge department
mi writes from a report via The Daily Beast: Unlike in cases of commercially-held data, where the Third Party doctrine allows police warrantless access, prescription drug monitoring databases are maintained by state-governments. The difference is lost to the Obama Administration, which argues that "since the records have already been submitted to a third party (a state's Prescription Drug Monitoring Program) that patients no longer enjoy an expectation of privacy." The DEA has claimed for years that under federal law it has the authority to access the states' prescription drug databases using only an "administrative subpoena." These are unilaterally issued orders that do not require a showing of probable cause before a court, like what's required to obtain a warrant. Some states, like Oregon, fight it; some, like Wisconsin, do not. "The federal government is eager to see all these databases linked," reports The Daily Beast. "The Department of Justice has developed a software platform to facilitate sharing among all state PDMPs. So far 32 states already share their PDMP data through a National Association of Boards of Pharmacy program. The Comprehensive Addiction and Recovery Act (CARA), which passed Congress in March, calls for expanding sharing of PDMP data."Read Replies (0)
By manishs from Slashdot's apple-vs-right-to-repair department
It's no secret that Apple makes a ton of money by charging 'astronomical' fee for replacing and fixing display and other components of iPhone and iPad (as well as Mac line). For instance, the company charges $599 for replacing the display on the iPad Pro tablet. Which sounds insane when you realize that you can almost certainly purchase a new iPad Pro under $700. And this is what most people do. A Huffington Post article notes that this behavior has contributed significantly in "generating heaps of e-waste." Citing many advocates, the publication claims that Apple has "opposed legislation that could help curb it." From the report: The Huffington Post spoke with politicians in two states who support such legislation, and confirmed through government filings that Apple has lobbied on the issue. Four states -- Minnesota, Nebraska, Massachusetts and New York -- have considered adopting "right to repair" amendments, which would update existing laws regarding the sale of electronic equipment. Amending these laws would make it easier to fix your devices and would help reduce "e-waste," a catch-all term for any electronic detritus. The New York State Senate and Assembly could approve one of these amendments next week. This would help unofficial repair shops get the information they need to fix your iPad, ideally driving down repair costs and encouraging you to squeeze more life out of your old devices -- thus cutting down on the e-waste generated by our voracious appetites for new gadgets. Apple asserts that it helps recycle millions of pounds of electronics equipment every year. But it won't support right to repair amendments.One would ask what is preventing a user from getting their device repaired by unofficial service person? In addition to the security implication, you also run a risk of getting your device bricked by Apple. To recall, the iPhone maker was found bricking the handsets that had been repaired by third-party vendors earlier this year.Read Replies (0)
By EditorDavid from Slashdot's ghost-of-browsers-past department