Google Accidentally Transmits Self-Destruct Code to Army of Chrome Browsers

This may be a first. Bad webpage coding can often cause a browser to crash, but yesterday’s crash looks like something different: widespread crashing kicked off by a web service designed to help drive your browser.

via Google Accidentally Transmits Self-Destruct Code to Army of Chrome Browsers | Wired Enterprise | Wired.com.

Samba – opening windows to a wider world

As the culmination of ten years’ work, the Samba Team has created the first compatible Free Software implementation of Microsoft’s Active Directory protocols. Familiar to all network administrators, the Active Directory protocols are the heart of modern directory service implementations.

via Samba – opening windows to a wider world.

Suitable for low-power and embedded applications, yet scaling to large clusters, Samba 4.0 is efficient and flexible. Its Python programming interface and administration toolkit help in enterprise deployments.

The Imgur API – General Information

Imgur’s API exposes the entire Imgur infrastructure via a standardized programmatic interface. Using Imgur’s API, you can do just about anything you can do on imgur.com, while using your programming language of choice.

The Imgur API is a RESTful API based on HTTP requests and XML or JSON responses. If you’re familiar with the APIs of Twitter, Amazon’s S3, del.icio.us, or a host of other web services, you’ll feel right at home.

This version of the API, version 3, uses OAuth 2.0. This means that all requests will need to be encrypted and sent via SSL/TSL to https://. It also means that you need to register your application, even if you aren’t allowing users to login.

via The Imgur API – General Information.

FTC’s Second Kids’ App Report Finds Little Progress in Addressing Privacy Concerns Surrounding Mobile Applications for Children

Staff examined hundreds of apps for children and looked at disclosures and links on each app’s promotion page in the app store, on the app developer’s website, and within the app. According to the report, “most apps failed to provide any information about the data collected through the app, let alone the type of data collected, the purpose of the collection, and who would obtain access to the data. Even more troubling, the results showed that many of the apps shared certain information with third parties – such as device ID, geolocation, or phone number – without disclosing that fact to parents. Further, a number of apps contained interactive features – such as advertising, the ability to make in-app purchases, and links to social media – without disclosing these features to parents prior to download.”

via FTC’s Second Kids’ App Report Finds Little Progress in Addressing Privacy Concerns Surrounding Mobile Applications for Children.

Alcatel-Lucent Has a Top-Secret SDN Startup!

Overlay networks as proposed by companies such as Nicira Networks Inc. , now owned by VMware Inc. (NYSE: VMW), are “an important step, but what if you had a data center that had to serve 10,000 customers, and every customer had a complex topology? That’s the real world, and that’s not easy,” Alwan says.

via Alcatel-Lucent Has a Top-Secret SDN Startup! – IP & Convergence – Telecom News Analysis – Light Reading Service Provider IT.

Researchers find crippling flaws in global GPS

A 45-second crafted GPS message could bring down up to 30 percent of the global GPS Continuously Operating Reference Stations (CORS), while other attacks could take down 20 percent of NTRIP networks, security boffins from Carnegie Mellon University and firm Coherent Navigation wrote in a paper. (pdf)

via Researchers find crippling flaws in global GPS – Networks – SC Magazine Australia – Secure Business Intelligence.

The GPS data level attacks caused more damage than previous spoofing attacks and were able to trigger a remote crash of high-end professional receivers.

Syrian rebels debut homemade fighting vehicle

The Sham II is also outfitted with five cameras — three in the front, one mounted on or near the machine gun, and one in the back — all of which are seemingly controlled by — a Sony PlayStation remote control. It should be noted that, apparently on the side of caution, Syrian rebels have even outfitted the Sham II with an operable headlight.

via Syrian rebels debut homemade fighting vehicle – Threat Matrix.

Tor network used to command Skynet botnet

Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It’s likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing firm Rapid7.

via Tor network used to command Skynet botnet – online safety, security, Rapid7, encryption, spyware, malware, privacy, bitdefender, kaspersky lab – Computerworld.

“One countermeasure that companies or ISPs could eventually enforce in their firewall is to drop all packets that originate from known TOR nodes, in order to minimize the amount of potentially malicious traffic they receive,” Botezatu said. “Of course, they might also end up blacklisting a number of legit Tor users looking for anonymity.”

Authoritarian regimes push for larger ITU role in DNS system

The new proposal specifies that “member states have the right to manage all naming, numbering, addressing and identification resources used for international telecommunications/ICT services within their territories.” This seems to be a challenge to the authority of ICANN and IANA, the quasi-private organizations that currently oversee the allocation of domain names and IP addresses.

via Authoritarian regimes push for larger ITU role in DNS system | Ars Technica.