Bitcoin crashes, losing nearly half of its value in six hours

On Wednesday afternoon, the Bitcoin bubble appears to have burst. As of this writing, its current value is around $160—down from a high of $260. (It fell as low as $130 today.) There is no obvious explanation for why the digital currency has fallen so far and so fast, although the market correcting after such a huge rise might be a good explanation. (Update 4:05pm CT: Bitcoin seems to have somewhat recovered and appears to be hovering around $200.)

via Bitcoin crashes, losing nearly half of its value in six hours | Ars Technica.

More info from Slashdot and Techcrunch.  From:  Bitcoin Suffers A Correction Amid Apparent DDOS Attacks On Some Exchanges

This also happened last week when Mt. Gox when Bitcoin reached $142 and hackers attacked the exchange. At that point, Mt. Gox said it had suffered ”its worst trading lag ever.”

European scientists propose world’s largest quantum network, between Earth and the ISS

In recent years, quantum physicists have successfully teleported entangled photons over a free-space distance of 143 kilometers (89 miles) using lasers, and 250 kilometers (155 miles) over optical fiber in the lab. In the past year we have also seen the first ground-to-air network, between a base station and an airplane flying 20 kilometers (12 miles) above. These were impressive feats, but to prove the possibility of a worldwide, satellite-based quantum network, larger distances are needed — something like the 400 kilometers (248 miles) to the ISS.

via European scientists propose world’s largest quantum network, between Earth and the ISS | ExtremeTech.

Facebook “Home” Is Next Step in Facebook’s Developing World Strategy

Projections from the Yankee Group, a Boston-based analytics firm, highlight the potential: the number of smartphones in use is projected to double from 1.5 billion in 2013 to nearly 3 billion in 2017. Most of those 1.5 billion new adoptions will be in the developing world, and the vast majority will be lower-end Android phones. Facebook also wants to capture the attention of those who haven’t yet gotten access to the Internet—and will likely first do so on a mobile device.

via Facebook “Home” Is Next Step in Facebook’s Developing World Strategy | MIT Technology Review.

Don’t Use Linksys Routers

Today I am publishing 5 Linksys router vulnerabilities so that consumers may be aware of the risks.
linksys vulns.txt

via Don’t Use Linksys Routers « Superevr.

I run a WRT54GL in my network but installed tomato on it because I never liked the linksys GUI and wanted to try out tomato.  Here’s his take on the WRT54GL:

1. Linksys WRT54GL Firmware Upload CSRF Vulnerability
I demonstrate Cross-Site File Upload in my BlackHat and AppSec USA talks. If you need more info on the vector itself, check out How to upload arbitrary file contents cross-domain by Kotowicz.

I suspect these kind of exploits exist in all consumer grade routers.

OpenDaylight SDN Group Breaks Cover

The OpenDaylight members plan to work on a standardized SDN controller and develop OpenDaylight APIs that sit between the controller platform and the network applications and user interfaces. The common, open source platforms will be developed using technology contributed by member companies and utilizing existing industry standards such as OpenFlow.

via Light Reading – OpenDaylight SDN Group Breaks Cover.

Closing the gap to improve the capacity of existing fiber optic networks

The research team, which included Professor Arthur Lowery and Dr Liang Du of the Monash Department of Electrical and Computer Systems Engineering and Jochen Schroeder, Joel Carpenter and Ben Eggleton from the University of Sydney, managed to transmit a signal of 10 terabits per second (Tb/s) more than 850 km (528 miles) using the new technology.

via Closing the gap to improve the capacity of existing fiber optic networks.

How a banner ad for H&R Block appeared on apple.com—without Apple’s OK

R66T, pronounced “Root 66” and intended as a play on the famous American highway Route 66, describes itself as “one of the nation’s leading publisher of targeted content, information and advertising to private Wi-Fi and High-Speed Internet Access (HSIA) networks, conducting tens of millions of individual user sessions—approaching one-billion user-minutes per month.” The company says that it supports Wi-Fi networks at places like airports, hotels, coffee shops, and malls, often providing free access in exchange for showing “hyperlocal” advertisements.

via How a banner ad for H&R Block appeared on apple.com—without Apple’s OK | Ars Technica.

This might be a good opportunity to mention that everyone should use AdBlock Plus, a plugin available for many web browsers, which will block these kind of advertisements.  Blocking ads is also a good PC security measure since ads provide a vector for a lot of malware to inject themselves.

iPad and file systems: failure of empathy

The easiest decision is no decision. Let’s have two user interfaces, two modes: The easy mode for my mother-in-law, and the pro mode for engineers, McKinsey consultants, and investment bankers. Such dual-mode systems haven’t been very popular so far, it’s been tried without success on PCs and Macs. (Re-reading this, I realise the Mac itself could be considered such a dual-mode machine: Fire up the Terminal app, and you have access to a certified Unix engine living inside)

via iPad and file systems: failure of empathy | Technology | guardian.co.uk.

Google Uses Reputation To Detect Malicious Downloads

Unlike Microsoft’s solution, CAMP attempts to detect locally whether any downloaded file is malicious, before passing characteristics of the file to its server-based analysis system. First, the system checks the binary against a blacklist–in this case, Google’s Safe Browsing API. If that check returns no positive result and, if the file has the potential to be malicious, CAMP will check a whitelist to see if the binary is a known good file.

via Google Uses Reputation To Detect Malicious Downloads – Dark Reading.

CAMP’s 99-percent success rate trounced four antivirus products, which individually only detected at most 25 percent of the malicious files and collectively detected about 40 percent, the researchers stated.

Linux Friendly Video Streaming?

For quite some time I just resigned myself to the fact that I’d have to boot into windows or use some other poor method to get my netflix on… then Erich Hoover arrived with a heroic flast to his eye, chin thrust forward and proclaimed, “Do not go gentle into that sudo shutdown -r now! Rage, rage against the needlessness of these cursed reboots!

Here is how to install the Netflix Desktop App on Ubuntu. Open a terminal and run these commands:
sudo apt-add-repository ppa:ehoover/compholio
sudo apt-get update
sudo apt-get install netflix-desktop

More info here: http://www.iheartubuntu.com/2012/11/ppa-for-netflix-desktop-app.html [iheartubuntu.com]

via Ask Slashdot: Linux Friendly Video Streaming? – Slashdot.