Diberdayakan oleh Blogger.

Popular Posts Today

Snowden says 'mission accomplished'

Written By Unknown on Rabu, 25 Desember 2013 | 23.58

24 December 2013 Last updated at 11:34 ET
Edward Snowden

Please turn on JavaScript. Media requires JavaScript to play.

Edward Snowden will deliver a Christmas message on UK TV, as Simeon Paterson reports

Former National Security Agency (NSA) contractor Edward Snowden, who leaked details of US electronic surveillance programmes, says he achieved his aim.

"In terms of personal satisfaction, the mission's already accomplished," he told the Washington Post.

"I already won," said Mr Snowden, whose extensive leaks have caused a reassessment of US surveillance policy.

The 30-year-old was interviewed in Russia, where he was granted temporary asylum on 1 August.

Mr Snowden fled the US in late May, taking a huge cache of secret documents with him. He faces espionage charges in the US.

Continue reading the main story

How intelligence is gathered

  • Accessing internet company data
  • Tapping fibre optic cables
  • Eavesdropping on phones
  • Targeted spying

"As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn't want to change society. I wanted to give society a chance to determine if it should change itself," he told the newspaper.

"All I wanted was for the public to be able to have a say in how they are governed," Mr Snowden said.

Last week, a federal judge declared the mass collection of telephone data unconstitutional and a presidential advisory panel suggested reforms.

Both the judge and the panel said there was little evidence that any terrorist plot had been thwarted by the programme.

A few days later, in his end-of-year news conference, US President Barack Obama suggested there might be a review of surveillance by the NSA.

In light of "disclosures that have taken place" and public concerns about the programmes, there might be "another way of skinning the cat", he said.

However, he accused Mr Snowden of causing "unnecessary damage" by leaking documents.

President Obama said he would make a "definitive statement" in January about recommendations by the White House panel.

Continue reading the main story

"Start Quote

A child born today will... never know what it means to have a private moment to themselves, an unrecorded, unanalysed thought"

End Quote Edward Snowden
'Going in blind'

The NSA, accustomed to watching without being watched, faces scrutiny it has not endured since the 1970s, or perhaps ever, the Washington Post reports.

Mr Snowden told the newspaper he had no way of knowing whether the public would share his views.

"You recognise that you're going in blind... But when you weigh that against the alternative, which is not to act, you realise that some analysis is better than no analysis."

Later, the UK's Channel 4 revealed that Mr Snowden would deliver its "Alternative Christmas Message" on Wednesday - the broadcaster's answer to Queen Elizabeth II's message to the nation.

In his first TV interview since arriving in Moscow, Mr Snowden would talk about "why privacy matters", it said.

"A child born today will grow up with no conception of privacy at all. They'll never know what it means to have a private moment to themselves, an unrecorded, unanalysed thought," he was quoted as saying.

"The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it. Together we can find a better balance, end mass surveillance and remind the government that if it really wants to know how we feel, asking is always cheaper than spying."

More details of people and institutions targeted by UK and US surveillance were published last week by The Guardian, The New York Times and Der Spiegel.

The papers said the list of about 1,000 targets included an EU commissioner, humanitarian organisations and Israeli officials including a prime minister.

US technology giants including Google, Microsoft and Yahoo are taking steps to block the collection of data by their government.

In October, news that the NSA had monitored the phone of German Chancellor Angela Merkel triggered a diplomatic row between Berlin and Washington.

Brazil's President Dilma Rousseff was also angered by revelations that the NSA had hacked the computer network of Brazil's state-run oil company Petrobras to collect data on emails and telephone calls.


23.58 | 0 komentar | Read More

RSA denies 'secret deal' with NSA

23 December 2013 Last updated at 06:16 ET

Security firm RSA has strongly denied reports it signed a "secret contract" with the NSA spying agency.

On December 21, a Reuters report said the NSA paid RSA to use a random number generator now known to be flawed.

In a blogpost RSA "categorically" denied the allegation that this opened a backdoor into any product in which it was used.

In September 2013, RSA told users to avoid using the code when its flaws were confirmed.

Bad numbers

The Reuters report said the NSA paid RSA $10m (£6.1m) to use a random number generator that has since been discovered to open a backdoor into any software in which it was used.

Documents released by whistleblower Edward Snowden have confirmed the existence of backdoors in some technologies RSA, and other firms, used in their products.

The random number generator, known as the "Dual Elliptic Curve Deterministic Random Bit Generator" (Dual EC DRBG), became a standard part of some RSA products in 2004.

In 2007 academic research revealed that the number generator had serious weaknesses that, if exploited, could let eavesdroppers get at data it was supposed to help protect. In its blogpost, RSA explained that it continued to rely on the system in 2007 following advice from the US standards body that oversaw development of such systems.

It also followed the advice of this body when it told users to stop using the module earlier this year.

In addition, RSA added, the Dual EC DRBG was one of several different random number generators available and customers were "free to choose whichever one best suited their needs".

It concluded: "We also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA's products, or introducing potential 'backdoors' into our products for anyone's use."

In response, Reuters reporter Joseph Menn who broke the story said in a tweet: "We stand by our RSA story."


23.58 | 0 komentar | Read More

Google robot wins Pentagon contest

23 December 2013 Last updated at 08:26 ET
Robot climbing stairs

Please turn on JavaScript. Media requires JavaScript to play.

Schaft won this round of Darpa's competition by a wide margin

A robot developed by a Japanese start-up recently acquired by Google is the winner of a two-day competition hosted by the Pentagon's research unit Darpa.

Team Schaft's machine carried out all eight rescue-themed tasks to outscore its rivals by a wide margin.

Three of the other 15 teams that took part failed to secure any points at the event near Miami, Florida.

Schaft and seven of the other top-scorers can now apply for more Darpa funds to compete in 2014's finals.

Continue reading the main story

1. Schaft (27 points)

2. IHMC Robotics (20 points)

3. Tartan Rescue (18 points)

4. MIT (16 points)

5. Robosimian (14 points)

6. Traclabs / Wrecs (11 points)

8. Trooper (9 points)

9. Thor / Vigir / Kaist (8 points).

12. HKU / DRC-Hubo (3 points)

14. Chiron / Nasa-JSC / Mojavaton (0 points)

Darpa said it had been inspired to organise the challenge after it became clear robots were only capable of playing a very limited role in efforts to contain 2011's Fukushima nuclear reactor meltdown in Japan.

"What we realised was ... these robots couldn't do anything other than observe," said Gill Pratt, programme manager for the Darpa Robotics Challenge.

"What they needed was a robot to go into that reactor building and shut off the valves."

In order to spur on development of more adept robots the agency challenged contestants to complete a series of tasks, with a time-limit of 30 minutes for each:

  • Drive a utility vehicle along a course
  • Climb an 8ft-high (2.4m) ladder
  • Remove debris blocking a doorway
  • Pull open a lever-handled door
  • Cross a course that featured ramps, steps and unfastened blocks
  • Cut a triangular shape in a wall using a cordless drill
  • Close three air valves, each controlled by a different-sized wheel or lever
  • Unreel a hose and then screw its nozzle into a wall connector

More than 100 teams originally applied to take part, and the number was whittled down to 17 by Darpa ahead of Friday and Saturday's event.

Thor, a robot produced by Virginia Tech

Please turn on JavaScript. Media requires JavaScript to play.

Humanoid robots drove cars, climbed ladders - and often fell - in the competition sponsored by the US Department of Defense

Some entered their own machines, while others made use of Atlas - a robot manufactured by another Google-owned business, Boston Dynamics - controlling it with their own software.

One self-funded team from China - Intelligent Pioneer - dropped out at the last moment, bringing the number of contestants who took part at the Homestead-Miami Speedway racetrack to 16.

Continue reading the main story

Schaft's 1.48m (4ft 11in) tall, two-legged robot entered the contest the favourite and lived up to its reputation.

It makes use of a new high-voltage liquid-cooled motor technology that uses a capacitor, rather a battery, for power. Its engineers say this lets its arms move and pivot at higher speeds than would otherwise be possible, in effect giving it stronger "muscles".

The machine was developed by a spin-off from the University of Tokyo's Jouhou System Kougaku lab, which Google recently revealed it had acquired.

The team scored 27 points out of a possible 32, putting it seven points ahead of second-placed IHMC Robotics, which used Atlas.

Scores were based on a system that awarded three points for completing a task's primary objectives, and then a bonus point for doing so without any human intervention.

Schaft's robot behaved nearly perfectly, but lost points because "the wind blew a door out of their robot's hold and because their robotic creation was not able to climb out of a vehicle after it successfully navigated an obstacle course," reported the Japan Daily Press.

'Reality check'

Videos posted online by Darpa illustrate that the robots remain much slower than humans, often pausing for a minute or more between actions while they carried out the calculations needed to make each movement.

Several proved unsteady on their feet and were only saved from falls by attached harnesses.

Three of the teams which entered self-designed machines - including Nasa's Johnson Space Center and its robot Valkyrie - failed to complete any of the challenges.

The event was described as a "reality check" by Jyuji Hewitt, who attended on behalf of the US Army's Research, Development and Engineering Command.

But Darpa's Mr Pratt added that the competition, and the finals that will be held in December, would help bring forward a time the machines could be used in real-world situations.

"Today's modest progress will be a good next step to help save mankind from disasters," he said.

The top eight teams can now apply for up to $1m (£611,000) of Darpa investment before the finals to improve their robots' skills. The winner will get a $2m prize.

Lower scorers in last weekend's round can stay in the contest but will have to fund their own efforts,


23.58 | 0 komentar | Read More

Twitter's Dorsey to join Disney

24 December 2013 Last updated at 05:38 ET

Twitter founder, Jack Dorsey, has been nominated as an independent board director at Walt Disney.

Shareholders will be able to vote on his selection at the company's annual meeting on 18 March.

Aged 37, Mr Dorsey would become the youngest member of Disney's board, the majority of whom are in their 50s.

Over the last few years he has been running Square, a company which offers credit card payments service for small businesses.

"Jack Dorsey is a talented entrepreneur who has helped create groundbreaking new businesses in the social media and commerce spaces," said Robert Iger, Disney's chairman and chief executive.

"The perspective he brings to Disney and its board is extremely valuable."

Twitter sold shares on the stock market for the first time in November and Mr Dorsey's near 5% stake in Twitter is worth around $1bn.

He founded Twitter along with Ev Williams, Biz Stone and Noah Glass.

Mr Dorsey sent Twitter's first tweet in 2006: "just setting up my twttr".


23.58 | 0 komentar | Read More

Cash limits follow Target data theft

23 December 2013 Last updated at 11:28 ET

Debit card limits are being cut for two million Americans following a hack attack on US retailer Target.

Details of more than 40 million cards were stolen by thieves who compromised card swipe systems at Target's tills.

Bank JP Morgan Chase said it was reducing limits on all cards used at Target while thieves had been scooping up data.

Security researchers said the stolen card numbers had been seen on underground markets.

Card losses

The thieves managed to grab the key details for so many cards by getting malware onto the computer systems at the checkout desks in almost 1,800 Target stores in the US. It is still not clear how the thieves managed to get their malware onto the systems.

The thieves had access to card data read at the tills for almost three weeks, said Target in a statement released after it realised it had been under attack.

JP Morgan Chase said it had lowered daily spending limits to $300 (£183) and daily cash withdrawal limits to $100 on potentially vulnerable cards as a "precaution".

Reuters reported that other US banks are also believed to be putting stringent precautions in place that would help to spot if cards were being used fraudulently. In addition, Target said it would offer free credit monitoring for customers affected by fraud.

On 20 December, security researcher Brian Krebs said there was evidence that card numbers stolen in the Target attack had shown up on underground markets where such details are traded.

Writing on his blog, Mr Krebs said security investigators had first confirmed card details had been stolen from Target by buying a "dump" of credit card numbers and matching them to those known to have been used at stores during the breach.

A huge batch of numbers had shown up on one site that traded in good quality dumps, he said, adding that cards from non-US banks used at Target stores were now fetching premium prices.


23.58 | 0 komentar | Read More

German 'streamed porn' case reviewed

23 December 2013 Last updated at 07:29 ET

A German court that told an ISP to hand over details of users who had allegedly been illegally streaming porn online is reviewing its decision.

The names and addresses of those identified were used by a law firm to send letters asking for a one-off fee.

The firm, Urmann, acting on behalf of Swiss copyright company Archive, targeted users it said had viewed content on porn-streaming site Redtube.

More than 10,000 people are thought to have been affected.

It was one of the first cases to target people accused of streaming rather than downloading pornography.

Now, the court in Cologne says it has examined complaints from dozens of people who received the copyright infringement warning letters, which demanded a 250 euro (£210) payment.

'Victory for users'

In a statement the court said the complaints had raised "considerable" doubts about the legal procedure.

It also said the laws on "streaming" were not clear enough.

Urmann issued a strongly worded statement defending itself against claims it had issued a false affidavit to the court. The firm called on the court to withdraw the allegation.

A final decision on the case is not expected until January.

In a separate court in Hamburg, a temporary injunction has been issued against Urmann and Archive preventing them from sending warning letters to Redtube users alleging copyright infringement.

In a statement Redtube said that the allegations that its site broke copyright laws were "a thinly disguised attempt to extort money from its users".

Commenting on the injunction Alex Taylor, vice president of Redtube, said: "This ruling is a victory not just for Redtube users, but for anyone who accesses a streaming website.

"It sends a clear message that the exploitation of personal information and the violation of privacy for financial gain will not be tolerated," he said.

Redtube also stressed that it had not passed on users information to third parties.


23.58 | 0 komentar | Read More

Apple shares rise on Chinese deal

23 December 2013 Last updated at 11:00 ET

Shares in US technology giant Apple have jumped 3% after it signed a deal to supply its iPhone to China Mobile.

The Chinese firm is the world's largest carrier and was one of three networks to be awarded China's first 4G licences earlier this month.

Apple has been looking to boost its sales in China, the world's largest smartphone market, but has struggled amid growing competition from rivals.

The latest deal is expected to help it increase its market share.

Continue reading the main story

"China is an extremely important market for Apple," Tim Cook, Apple chief executive, said in a statement.

"Our partnership with China Mobile presents us the opportunity to bring iPhone to the customers of the world's largest network."

Earlier this year, Mr Cook said he expected China to replace North America as Apple's largest source of revenue. The iPhone is the firm's most important product in terms of earnings power.

China Mobile has more than 760 million subscribers.

The country's two other major phone carriers, China Unicom and China Telecom, already offer iPhones to their subscribers.

Cheaper rivals

China is the world's biggest smartphone-using country, with 1.2 billion users.

Continue reading the main story

Apple's "imminent" deal with China Mobile has been a long running soap opera. Back in September when a separate launch event for the iPhone 5C and 5S was held in Beijing, it was assumed that an agreement had already been reached.

But fixing terms between the world's biggest mobile operator and a company which has always played hardball when it comes to pricing, was never going to be simple.

Apple has long been a highly prized brand in China, with fake Apple stores springing up all over the country. But even with access to China Mobile's 700 million customers, don't expect it to grab a big share of the market.

Samsung is the biggest overseas brand - the Chinese market was quick to see the attractions of the oversized Galaxy Note "phablet" - and home-grown brands like Xiaomi are giving consumers the smartphone experience at a much keener price than Apple can offer.

Nevertheless, China has a big appetite for luxury brands - for Rolls Royce it vies with the USA as its biggest market.

Apple does not have to be number one in China to make huge amounts of money there, so don't expect the company to follow the advice of some analysts and launch cut price models. It will settle for being the Rolls Royce of the mobile market.

But Chinese sales of previous iPhone models have slumped recently, as consumers have turned to cheaper rival handsets from Samsung, and domestic Chinese developers.

China's three bestselling smartphone makers are Samsung, Lenovo and Coolpad, according to a recent report by the consultants IDC.

Apple's sales have also been impacted by the fact that unlike in developed markets, many phone carriers in emerging markets do not subsidise smartphones.

That means that subscribers have to pay the full amount for the phone upfront, making Apple's products relatively expensive for some buyers.

In an attempt to take on the low-cost rivals Apple unveiled a relatively cheaper version of the iPhone, the 5c, earlier this year.

Analysts said the firm was hoping that a cheaper handset combined with a deal with the biggest mobile carrier in the world may help it take on rivals.

However, Apple is yet to announce how much Chinese customers will have to pay for the iphone 5s and 5c models sold via China Mobile.

'Biggest partnership'

Nevertheless, analysts say the deal has huge potential. Cantor Fitzgerald Research estimates that Apple could sell 24 million iPhones next year to China Mobile customers alone.

Apple sold 102.4 million iPhones globally in the nine months to September this year.

Previously, China Mobile subscribers have not been able to use Apple's iPhone, because the firm's 3G technology was not compatible with Apple handsets.

However, its 4G network will work with the iPhone 5s and 5c.

Manufacturer Marketshare

Source: IDC

Samsung

18.3%

Lenovo

12.6%

Coolpad

11%

ZTE

8.8%

Huawei

8.7%

Others

41%

"This is one of the biggest partnership announcements Apple has made in the past several years," Manoj Menon, managing director of consulting firm Frost & Sullivan, told the BBC.

"It gives them access to more than 10% of the global mobile phone users. It is an incredible growth opportunity for Apple."

However, he added that in order to fully realise the potential of the deal, Apple may need to introduce even more affordable phone models.

The iPhone 5s and 5c will be available to China Mobile subscribers from 17 January.


23.58 | 0 komentar | Read More

Butterfly botnet 'mastermind' jailed

24 December 2013 Last updated at 06:25 ET

A hacker accused of masterminding one of the biggest ever botnets has been sentenced to just under 5 years in jail.

Matjaz Skorjanc was arrested in 2010 after a two-year investigation into malware that had hijacked about 12.7 million computers around the world.

The 27-year-old was found guilty of creating the Mariposa botnet software, assisting others in "wrongdoings" and money laundering.

His lawyer said he would appeal.

In addition to the 58-month jail term, Skorjanc was also ordered to pay a 4,000 euro ($4,100; £2,510) fine and give up a flat and car he was alleged to have bought with money he had received from a Spanish criminal syndicate.

The prosecutors in the case have said they also intended to challenge the Slovenian court's ruling because they had wanted a tougher jail sentence of seven-and-a-half-years.

The former medical student's ex-girlfriend Nusa Coh was also sentenced to eight months probation for money laundering.

Identity revealed

Mariposa is the Spanish for butterfly.

The botnet got its name because it was created with software called ButterFly Flooder that was alleged to have been written by Skorjanc and advertised on the net as a way to "stress test" computer networks and remotely control Windows and Linux PCs.

Computers in more than 190 countries were infected by Mariposa, which spread by a variety of methods including via instant messages, peer-to-peer file-sharing systems and removable storage devices.

Once installed its operators could command the compromised machines to carry out their instructions including sending back copies of data they stored.

The scale of the problem led the FBI to team up with European law enforcement agencies, the Georgia Tech Information Security Center and other security experts to track down the perpetrators.

This proved difficult to do because the hackers only connected to the net via a virtual private network (VPN), which hid their locations.

On 23 December 2009 the authorities managed to gain control of the botnet; which they believe rattled one of its operators, who went by the nickname Netkairo.

The operator subsequently managed to take back control of the infected computers and then used them to attack Defence Intelligence, a Canadian security firm helping the FBI.

However, in doing so Netkairo appeared to have revealed his identity by accidentally connecting to the botnet directly from his home computer rather than the VPN.

On 3 February 2010 the Spanish Civil Guard arrested Florencio Carro Ruiz, who they identified as Netkairo, and two other Spaniards.

Five months later the Slovenian police arrested Skorjanc, who they said had used the alias Iserdo and had written the code.

Officials said the botnet had been used to send spam emails, stage distributed denial of service (DDoS) attacks to overwhelm targets' servers with traffic, and harvest information including credit card details and log-ins.

"I think the sentence is significant and will be remembered as a milestone in the prosecution of cybercrimes," Keith Murphy, chief executive of Defence Intelligence told the BBC.

"It reflects that authorities have realised the damage that can be wrought by a piece of code, and are now starting to equate it to physical theft. The 'wild west' days of cybercrime are over, even in smaller countries."


23.58 | 0 komentar | Read More

Royal pardon for codebreaker Turing

24 December 2013 Last updated at 07:48 ET
Alan Turing

Please turn on JavaScript. Media requires JavaScript to play.

Computer pioneer and codebreaker Alan Turing has been given a posthumous royal pardon, as Danny Shaw reports

Computer pioneer and codebreaker Alan Turing has been given a posthumous royal pardon.

It addresses his 1952 conviction for homosexuality for which he was punished by being chemically castrated.

The conviction meant he lost his security clearance and had to stop the code-cracking work that had proved vital to the Allies in World War Two.

The pardon was granted under the Royal Prerogative of Mercy after a request by Justice Minister Chris Grayling.

'Appalling' treatment

"Dr Alan Turing was an exceptional man with a brilliant mind," said Mr Grayling.

He said the research Turing carried out during the war at Bletchley Park undoubtedly shortened the conflict and saved thousands of lives.

Continue reading the main story

Turing centenary

2012 saw a series of events that celebrated the life and work of Alan Turing. The events were held to mark the 100th anniversary of his birth

Turing's work helped accelerate Allied efforts to read German Naval messages enciphered with the Enigma machine. He also contributed some more fundamental work on codebreaking that was only released to public scrutiny in April 2012.

"His later life was overshadowed by his conviction for homosexual activity, a sentence we would now consider unjust and discriminatory and which has now been repealed," said Mr Grayling.

"Turing deserves to be remembered and recognised for his fantastic contribution to the war effort and his legacy to science. A pardon from the Queen is a fitting tribute to an exceptional man."

The pardon comes into effect on 24 December.

Turing died in June 1954 from cyanide poisoning and an inquest decided that he had committed suicide. However, biographers, friends and other students of his life dispute the finding and suggest his death was an accident.

Many people have campaigned for years to win a pardon for Turing.

Alan Turing

Please turn on JavaScript. Media requires JavaScript to play.

Dr Sue Black, a computer scientist, was one of the key figures in the campaign.

She told the BBC that she hoped all the men convicted under the anti-homosexuality law would now be pardoned.

"This is one small step on the way to making some real positive change happen to all the people that were convicted," she said.

"It's a disgrace that so many people were treated so disrespectfully."

Some have criticised the action for not going far enough and, 59 years after Turing's death, little more than a token gesture.

"I just think it's ridiculous, frankly," British home computing pioneer Sir Clive Sinclair told the BBC.

"He's been dead these many years so what's the point? It's a silly nonsense.

"He was such a fine, great man, and what was done was appalling of course. It makes no sense to me, because what's done is done."

'It's very wrong'

Lord Sharkey, a Liberal Democrat peer who wrote a private member's bill calling for a royal pardon in July 2012, said the decision was "wonderful news".

"This has demonstrated wisdom and compassion," he said. "It has recognised a very great British hero and made some amends for the cruelty and injustice with which Turing was treated."

Vint Cerf, the computer scientist known as one of the founding fathers of the internet, also welcomed the development.

"The royal pardon for Alan Turing rights a long-standing wrong and properly honours a man whose imagination and intellect made him legendary in our field," he told the BBC.

Technology entrepreneur Mike Lynch added: "Society didn't understand Alan Turing or his ideas on many levels but that was a reflection on us, not on him - and it has taken us 60 years to catch up."

Human rights campaigner Peter Tatchell said: "I pay tribute to the government for ensuring Alan Turing has a royal pardon at last but I do think it's very wrong that other men convicted of exactly the same offence are not even being given an apology, let alone a royal pardon.

"We're talking about at least 50,000 other men who were convicted of the same offence, of so-called gross indecency, which is simply a sexual act between men with consent."

Mr Tatchell said he would like to see Turing's death fully investigated.

"While I have no evidence that he was murdered, I do think we need to explore the possibility that he may have been killed by the security services. He was regarded as a high security risk," he said.

'Not entirely comfortable'

Glyn Hughes, the sculptor of the Alan Turing Memorial in Manchester, said it was "very gratifying" that he had finally been pardoned.

"When we set out to try and make him famous - get him recognised - it was really difficult to collect money," he said.

Continue reading the main story

Big screen

Turing's life is the subject of upcoming Hollywood movie The Imitation Game, which focuses on the cracking of the Enigma code. Starring Sherlock actor Benedict Cumberbatch as Turing, the film is due for release next year.

Channel 4's TV film Codebreaker, about the highs and lows of Turing's life, was aired in 2011.

And during the 2012 celebrations of the centenary of Turing's birth, a Welsh digital arts festival - the Abandon Normal Devices (AND) Festival - featured a laser image of Turing projected from Conwy Castle into the sky.

Although Turing was born in London, he had strong connections with north Wales.

The Italianate village of Portmeirion in Gwynedd was one of Turing's favourite places.

But it was in northern England where Turing spent the last six years of his life, working at Manchester University in various specialist fields including mathematical logic and philosophy.

"None of the big computer companies would stump up a penny for a memorial. They perhaps would now - we've come a very long way."

But he said he was "not entirely comfortable" that Turing had been pardoned while thousands of other gay men had not.

"The problem is, of course, if there was a general pardon for men who had been prosecuted for homosexuality, many of them are still alive and they could get compensation."

In December 2011, an e-petition was created on the Direct Gov site that asked for Turing to be pardoned. It received more than 34,000 signatures but its request was denied by the then justice secretary, Lord McNally, who said Turing was "properly convicted" for what was at the time a criminal offence.

Prior to that in August 2009, a petition was started to request a pardon. It won an official apology from the prime minister at the time, Gordon Brown, who said the way Turing was persecuted over his homosexuality was "appalling".


23.58 | 0 komentar | Read More

Cryptolocker 'infects 250,000 PCs'

24 December 2013 Last updated at 08:38 ET By Leo Kelion Technology reporter

A virulent form of ransomware has now infected about quarter of a million Windows computers, according to a report by security researchers.

Cryptolocker scrambles users' data and then demands a fee to unencrypt it alongside a countdown clock.

Dell Secureworks said that the US and UK had been worst affected.

It added that the cyber-criminals responsible were now targeting home internet users after initially focusing on professionals.

The firm has provided a list of net domains that it suspects have been used to spread the code, but warned that more are being generated every day.

Ransomware has existed since at least 1989, but this latest example is particularly problematic because of the way it makes files inaccessible.

"Instead of using a custom cryptographic implementation like many other malware families, Cryptolocker uses strong third-party certified cryptography offered by Microsoft's CryptoAPI," said the report.

"By using a sound implementation and following best practices, the malware authors have created a robust program that is difficult to circumvent."

Ransom dilemma

The first versions of Crytpolocker appear to have been posted to the net on 5 September.

Early examples were spread via spam emails that asked the user to click on a Zip-archived extension identified as being a customer complaint about the recipient's organisation.

Later it was distributed via malware attached to emails claiming there had been a problem clearing a cheque. Clicking the associated link downloaded a Trojan horse called Gameover Zeus, which in turn installed Cryptolocker onto the victim's PC.

By mid-December, Dell Secureworks said between 200,000 to 250,000 computers had been infected.

It said of those affected, "a minimum of 0.4%, and very likely many times that" had agreed to the ransom demand, which can currently only be paid in the virtual currencies Bitcoin and MoneyPak.

Top 10 infected countries Number of infected systems identified using test "sinkhole" servers between 9-16 December Percentage of total

Source: Dell SecureWorks

US

1,540

23.8%

Great Britain

1,228

19.0%

Australia

836

12.9%

France

372

5.8%

Brazil

309

4.8%

Italy

204

3.2%

Turkey

182

2.8%

Spain

145

2.2%

China

138

2.1%

Canada

135

2.1%

"Anecdotal reports from victims who elected to pay the ransom indicate that the Cryptolocker threat actors honour payments by instructing infected computers to decrypt files and uninstall the malware," added the security firm.

"According to reports from victims, payments may be accepted within minutes or may take several weeks to process."

However, Trend Micro, another security firm, has warned that giving into the blackmail request only encouraged the further spread of Cryptolocker and other copycat schemes, and said that there was no guarantee of getting the data back.

Safety steps

Dell suggested PCs be blocked from communicating with the hundreds of domains names it had flagged as being linked to the spread of Cryptolocker, and it suggested five further steps the public and businesses could take to protect themselves:

  • Install software that blocks executable fields and compressed archives before they reach email inboxes
  • Check permissions assigned to shared network drives to limit the number of people who can make modifications
  • Regularly back-up data to offline storage such as Blu-ray and DVD-Rom disks. Network-attached drives and cloud storage does not count as Cryptolocker can access and encrypt files stored there
  • Set each PC's software management tools to prevent Cryptolocker and other suspect programs from accessing certain critical directories
  • Set the computer's Group Policy Objects to restrict registry keys - databases containing settings - used by Cryptolocker so that the malware is unable to begin the encryption process

23.58 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger