By manishs from Slashdot's where-you-get-your-news department
More people in the United States are now turning to social media instead of traditional media for news. According to Pew Research Center, which surveyed over 4,500 people with various backgrounds, an increasingly number of Americans -- 62% to be exact -- are getting their news from social media platforms such as Facebook, and Instagram. Of the 62% people, 66% of them get their news from Facebook, 23% from Instagram, 21% from YouTube, and 19% from LinkedIn. From a Huffington Post article: It's easy to believe you're getting diverse perspectives when you see stories on Facebook. You're connected not just to many of your friends, but also to friends of friends, interesting celebrities and publications you "like." But Facebook shows you what it thinks you'll be interested in. The social network pays attention to what you interact with, what your friends share and comment on, and overall reactions to a piece of content, lumping all of these factors into an algorithm that serves you items you're likely to engage with. It's a simple matter of business: Facebook wants you coming back, so it wants to show you things you'll enjoy.Read Replies (0)
EFF Warns of Harsher CFAA
Posted by News Fetcher on May 28 '16 at 05:51 AM
By EditorDavid from Slashdot's 30-year-old-laws department
An anonymous reader writes: The Computer Fraud and Abuse Act is "vague, draconian, and notoriously out of touch with how we use computers today," warns the EFF. But instead of reforming it, two U.S. Senators "are on a mission to make things worse..." The senators' proposed Botnet Prevention Act of 2016 "could make criminals of paid researchers who test access in order to identify, disclose, and fix vulnerabilities," according to the EFF. And the bill would also make it a felony to damage "critical infrastructure," which may include software companies and ISPs (since they're apparently using the Department of Homeland Security's definition).
The harsher penalties would ultimately give prosecutors much more leverage for plea deals. But worst of all, the proposed bill even "empowers government officials to obtain court orders to force companies to hack computer users for a wide range of activity completely unrelated to botnets. What's worse is that the bill allows the government to do this without any requirement of notice to non-suspect or innocent customers or companies, including botnet victims... These changes would only increase -- not alleviate -- the CFAA's harshness, overbreadth, and confusion."
The CFAA was originally written in 1986, and was partly inspired by the 1983 movie "WarGames".Read Replies (0)
By BeauHD from Slashdot's lack-of-consensus department
An anonymous reader writes from a report via Reuters: After the San Bernardino terrorist attack, key U.S. lawmakers pledged to require technology companies to give law enforcement agencies a "back door" to encrypted communications and electronic devices. Now, the push for legislation is dead only months after the terrorist attack. In April, Senators Richard Burr and Dianne Feinstein released the official version of their anti-encryption bill with hopes for it to pass through Congress. But with the lack of White House support for the legislation as well as the high-profile court case between Apple and the Justice Department, the legislation will likely not be introduced this year, and even if it were, it would stand no chance of advancing, said sources familiar with the matter. "The short life of the push for legislation illustrates the intractable nature of the debate over digital surveillance and encryption, which has been raging in one form or another since the 1990s," reports Reuters. Technology companies believe security would be undermined if it were to create a "back door" for law enforcement, while law enforcement agencies believe they need to monitor phone calls, emails, text messages and encrypted data in general for security purposes.Read Replies (0)
By BeauHD from Slashdot's drivers-ed department
An anonymous reader quotes a report from BGR: When designing the Model X, Tesla went more than a little bit overboard in trying to trick out its crossover SUV with as many bells and whistles as possible. Not only did Tesla's overly ambitious development delay the launch of the Model X, it has arguably resulted in a noticeably higher number of quality control issues than we're accustomed to seeing. Hardly a controversial point, even Tesla CEO Elon Musk has conceded that the company was far too zealous when developing the Model X. While some customers with frustrating Model X issues have noted that Tesla has been quick to fix any problems, one Model X owner from California has had enough. According to the Courthouse News Service, via Teslarati, Barrett Lyon recently filed a Lemon Law claim against Tesla, arguing that the car's problems are unfixable and that it's ultimately unsafe to drive. In addition to finding that the front door would often slam shut on his leg, Lyon's suit details a slew of other problems, including Auto Pilot problems, touch screen freezes and more. A Tesla Model S owner, on the other hand, reported that his vehicle went rogue causing an accident all by itself.Read Replies (0)
By manishs from Slashdot's remember-Myspace? department
Lorenzo Franceschi-Bicchierai, reporting for Motherboard: There's an oft-repeated adage in the world of cybersecurity: There are two types of companies, those that have been hacked, and those that don't yet know they have been hacked. MySpace, the social media behemoth that was, is apparently in the second category. The same hacker who was selling the data of more than 164 million LinkedIn users last week now claims to have 360 million emails and passwords of MySpace users, which would be one of the largest leaks of passwords ever. And it looks like the data is being circulated in the underground by other hackers as well. It's unclear when the data was stolen from MySpace, but both the hacker, who's known as Peace, and one of the operators of LeakedSource, a paid hacked data search engine that also claims to have the credentials, said it's from a past, unreported, breach.Read Replies (0)
By manishs from Slashdot's security-woes department
North Korea could be behind the recent string of digital attacks on Asian banks, says Symantec. The cyber security firms notes that the attacks could be traced as far back as October 2015, two months prior to the earliest known incident. As you may recall, hackers stole around $80M from Bangladesh's central bank in March, and a similar attack was seen at a Vietnamese bank earlier this month. Symantec says that it has found evidence that distinctive malware that was used in both the hacks had strong commonalities with the 2014 Sony Picture breaches. Security firm FireEye also investigated the matter. From a Bloomberg report: Investigators are examining possible computer breaches at as many as 12 banks linked to Swift's global payments network that have irregularities similar to those in the theft of $81 million from the Bangladesh central bank, according to a person familiar with the probe. FireEye, the security firm hired by the Bangladesh bank, has been contacted by the other banks, most of which are in Southeast Asia, because of signs that hackers may have breached their networks, the person said. They include banks in the Philippines and New Zealand but not in Western Europe or the United States. There is no indication of whether money was taken.Read Replies (0)