Cyber Entrepreneurs, Privacy Matters Pt. 2, Encryption Woes and the Controversy of Annonymity – Video


Cyber Entrepreneurs, Privacy Matters Pt. 2, Encryption Woes and the Controversy of Annonymity
This week on Cyber Frontiers we talk cyber innovation, privacy, and the encrypted era of financial and informational systems with special guest Mark Goldstein, Vice President of Business Developmen...

By: Jim Collison

The rest is here:
Cyber Entrepreneurs, Privacy Matters Pt. 2, Encryption Woes and the Controversy of Annonymity - Video

Will full encryption sideline Google’s targeted ads?

News

By Zach Miners

June 18, 2014 08:39 AM ET

IDG News Service - Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source?

Google released an early version of a new tool recently that will provide full "end-to-end" encryption for email. It's a super-strong cloaking technology that scrambles messages before they leave their browser and keeps them that way until they're decoded by the recipient.

The technology makes use of a private key-string that only the user has access to, meaning even the email provider can't read the contents of messages. Google says anyone will be able to use the tool with their existing web-based email service.

It was hailed as a big step forward in privacy, but the increased use of strong encryption also threatens the ability of online firms to sell targeted ads, altering the calculus that makes it worthwhile for them to offer online services for free. Google, after all, scans emails to deliver keyword-based advertising, and for other purposes like blocking spam and malware. Yahoo also scans email, though Microsoft says it does not.

"This tool is in direct conflict with their business model," said Tyler Cohen Wood, an online security expert and cyber branch chief for the Defense Intelligence Agency within the U.S. Department of Defense. For Google to offer it, she said, is strange.

Google said the tool is intended for a subset of users who want additional security beyond what the company already provides. "We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection," Google said in its announcement.

But its goal is to eventually make a more polished version available for download in its Chrome Web Store. And as users become more insistent about privacy, other online firms may offer similar capabilities.

Go here to see the original:
Will full encryption sideline Google's targeted ads?

Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014 – Video


Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014
Link: https://www.youtube.com/watch?v=P5TrWC1V7fg Bitcoin,Litecoin mining rig any coin cryptocurrency 2500W system, 6x 280x ASUS Beast Link: https://www.yout...

By: somethint

Read more from the original source:
Bitcoin,Litecoin mining rig cryptocurrency 2500W system, 6x 280x ASUS Beast 2014 - Video

Hacker mines $620K in cryptocurrency under victims’ noses

Computerworld - A German hacker generated more than $620,000 in cryptocurrency after hijacking an unknown number of network storage devices and turning them into digital slaves to mine Dogecoin, researchers said today.

"This wasn't unique, we've seen other malware install [cryptocurrency] miners, but we haven't seen anything this big before," said Pat Litke, a researcher at Dell SecureWorks' Counter Threat Unit (CTU). "That was mostly due to the infection vector. He could just walk in the door."

Litke and David Shear, a network security analyst also with SecureWorks, were referring to vulnerabilities in network-attached storage (NAS) systems manufactured by Taiwan-based Synology that the hacker exploited before planting a customized cryptocurrency miner on the devices.

Synology had issued patches for the vulnerabilities shortly after the flaws were made public last September; the hacked NAS systems had not been updated with the fixes.

Unpatched NAS devices were found and exploited, and then their computing and graphical horsepower -- the boxes were computers in all but name -- were set to work generating Dogecoins, an alternative to the better known Bitcoin. Within months, the hacker's network of compromised devices mined over 500 Million Doge, or just over $620,000, Litke said.

Hackers have long targeted cryptocurrency with specialized malware, but almost all of their efforts have targeted existing digital money, primarily Bitcoins, stored in virtual "wallets." In February, Litke and Joe Stewart, director of SecureWorks' malware research, presented their findings on the rapid increase in cryptocurrency-stealing malware at the RSA Conference.

Planting malware to actually create digital funds, however, is a relatively new development, said Litke, and the evidence they collected on the Synology NAS-hijacking showed how lucrative the practice can be. That bodes ill.

"It will become fairly commonplace, even as an afterthought, for [cyber criminals] to add malware miners [to their payloads]," said Shear, who expects other cyber criminals to quickly adopt the strategy. "We're kind of already there. With a big enough botnet, and we're talking big, they could out-hash anyone."

SecureWorks also dug up some other interesting elements of the NAS hijack, including the native language of the hacker (or hackers), and the fact that the mining of Dogecoins couldn't have been exclusively from the compromised storage devices.

The username the firm's researchers found in the malware's configuration file led them to other digital bits, including a Github account, while multiple hacker forums showed that the hacker communicated exclusively in German.

Go here to see the original:
Hacker mines $620K in cryptocurrency under victims' noses

Chelsea Manning Accuses US of Lying About Iraq | Military.com

Chelsea Manning accused the U.S. of consistently lying about the war in Iraq and slammed the process of embedding journalists in military units in the New York Times on Sunday.

Manning, who has been mostly silent since being convicted and sentenced to 35 years in prison for releasing classified materials to WikiLeaks, said that in light of the recent surge of violence in Iraq it is time to question "how the United States military controlled the media coverage of its long involvement there and in Afghanistan."

"I believe that the current limits on press freedom and excessive government secrecy make it impossible for Americans to grasp fully what is happening in the wars we finance," she wrote in the op-ed, titled "The Fog Machine of War."

Manning cited failures in press freedom when reports described the 2010 Iraq elections as a success -- a milestone that signified the creation a free and democratic system. Contrary to these reports, Manning wrote that at the time, military and diplomatic reports said political dissidents of Prime Minister Nouri Kamal al-Maliki were detained, tortured and killed by the federal police.

The fact that this was never reported by western media, Manning said, shows a lack of press freedom regarding military operations. During her deployment she says she never saw more than 12 embedded journalists in Iraq because the military controls the process.

The process of limiting press access to a conflict begins when a reporter applies for embed status. All reporters are carefully vetted by military public affairs officials. This system is far from unbiased. Unsurprisingly, reporters who have established relationships with the military are more likely to be granted access.

Less well known is that journalists whom military contractors rate as likely to produce 'favorable' coverage, based on their past reporting, also get preference. This outsourced 'favorability' rating assigned to each applicant is used to screen out those judged likely to produce critical coverage.

Manning said military public affairs officers could strip a journalist of embed status if they report something the military does not like.

Freedom of the press in the U.S. did see a significant decline in 2013. Reporters Without Borders released a report in February that showed the U.S. had dropped from the 32nd to the 46th spot in a list of countries ranked by press freedom. Manning's conviction contributed to the drop in ranking.

"Opinion polls indicate that Americans' confidence in their elected representatives is at a record low. Improving media access to this crucial aspect of our national life -- where America has committed the men and women of its armed services -- would be a powerful step toward re-establishing trust between voters and officials," Manning concluded.

See the rest here:
Chelsea Manning Accuses US of Lying About Iraq | Military.com