Microsoft Certificate Was Used to Sign “Flame” Malware

Microsoft certification authority signing certificates added to the Untrusted Certificate StoreWhile these security issues are not Flame-specific, and could be used in other forms of unrelated malware, Microsoft was able to identify components of the Flame malware that had been signed with a certificate that ultimately chained up to the Microsoft Root Authority.

via Microsoft Certificate Was Used to Sign “Flame” Malware | SecurityWeek.Com.

Microsoft did not say what algorithm was exploited in order to generate the rogue certificates, though SecurityWeek did reach out to Microsoft for comment and we will update the story if a response is recieved.

ARM expects 20-nanometer processors by late next year

ARM doesn’t manufacture the chips itself. It licenses its designs to companies such as Qualcomm, Texas Instruments and Nvidia, who in turn outsource manufacture of the chips to foundry companies like Taiwan’s TSMC.

via ARM expects 20-nanometer processors by late next year – processors, Components, Arm Holdings, computex – CIO.

This year’s Computex should be a big event for ARM. Microsoft has developed the first version of its Windows PC OS that runs on ARM-based processors, called Windows RT, and vendors are expected to show the first ARM-based tablets running the new software.

Online Social Networks can be Tipped by as Little as 0.8% of their Population

The spreading of a trend or behavior in a social network is a very active area of research. One very important model of trend spreading is the “tipping” model. With tipping, an individual in a network adopts a trend if at least half (or some other proportion) of his or her friends have previously done so. An important problem in viral marketing is to find a “seed set” of individuals in the social network. If all members of a “seed set” in a social network initially adopt a certain trend, then a cascade initiates through the tipping model which results in the entire population adopting that trend. So, if a viral marketer wants to provide free samples of a product to certain individuals, a seed set is likely a good place to start.

via Online Social Networks can be Tipped by as Little as 0.8% of their Population | The Central Node.

Our work, “Large Social Networks can be Targeted for Viral Marketing with Small Seed Sets,” will be presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) as a full paper this August

A Brief History of Money

Kublai Khan was ahead of his time: He recognized that what matters about money is not what it looks like, or even what it’s backed by, but whether people believe in it enough to use it. Today, that concept is the foundation of all modern monetary systems, which are built on nothing more than governments’ support of and people’s faith in them. Money is, in other words, a complete abstraction—one that we are all intimately familiar with but whose growing complexity defies our comprehension.

via A Brief History of Money – IEEE Spectrum.

There is, to be sure, something a bit eerie about all this, and periods like the recent housing bubble, when banks made an extraordinary number of bad loans, should remind us of the dangers of runaway credit. But it’s a mistake to yearn for a more “solid” foundation for the monetary system. Money is a social creation, just like language. It’s a tool that can be used well or poorly, and it’s preferable that we have more freedom to use that tool than less.

US warns users of new Citadel ransomware hit

This variation, called Reveton, lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer, says the U.S. Internet Crime Complaint Center (IC3). Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law. The crimeware declares the user’s IP address was identified by the Computer Crime & Intellectual Property Section as visiting child pornography and other illegal content.

via US warns users of new Citadel ransomware hit.

Ocracoke Island Journal: Nookd

I was shocked. Almost immediately I found it hilarious…then outrageous…then both. It is definitely clever. But it raises many questions. E-books can be manipulated at will by the purveyors of the downloadable software. Here is a classic work of fiction some claim it is the greatest novel every written used for a sophomoric and/or commercial prank. What else might be changed in an e-book? Fears of manipulation for economic, political, religious, or other ideological ends come to mind. It makes one wary of the integrity of any digital version of not only War and Peace…but any e-book.

via Ocracoke Island Journal: Nookd.

The .epub format is just zipped html files.  Ebooks can be manipulated with any text editor or simple script.

Android Management | MobileIron

THE SOLUTION: MobileIron enables companies to deploy Android devices at scale by bridging the gap between the security IT needs and the experience end users demand. The MobileIron platform includes a server that is up and running in your corporate network in less than a day, plus a MobileIron Android app that is available for download on the Android Market.

via Android Management | MobileIron.

GNU IceCat

GNU IceCat, formerly known as GNU IceWeasel,[3] is a free software rebranding of the Mozilla Firefox web browser distributed by the GNU Project. It is compatible with both the GNU/Linux and Mac OS X 10.4 and 10.5 operating systems.The GNU Project keeps IceCat in synchronization with upstream development of Firefox while removing all trademarked artwork. It also maintains a large list of free software plugins and add-ons, and includes a few security features not found in the mainline Firefox browser.

via GNU IceCat – Wikipedia, the free encyclopedia.

Space Exploration Technologies Corporation

Timely access to space is an essential element of our commercial supply chain,” said Thierry Guillemin, Intelsat CTO. “As a global leader in the satellite sector, our support of successful new entrants to the commercial launch industry reduces risk in our business model. Intelsat has exacting technical standards and requirements for proven flight heritage for our satellite launches. We will work closely with SpaceX as the Falcon Heavy completes rigorous flight tests prior to our future launch requirements

via Space Exploration Technologies Corporation – Press.

Facebook Might Have a Smartphone in Its Future

This would be Facebook’s third effort at building a smartphone, said one person briefed on the plans and one who was recruited. In 2010, the blog TechCrunch reported that Facebook was working on a smartphone. The project crumbled after the company realized the difficulties involved, according to people who had worked on it. The Web site AllThingsD reported last year that Facebook and HTC had entered a partnership to create a smartphone, code-named “Buffy,” which is still in the works.

via Facebook Might Have a Smartphone in Its Future – NYTimes.com.