Chicago startup Doggyloot raises $2.5M in funding

Doggyloot, which offers deals on pet products for members and sells other items on a subscription basis, grew out of Dashmob, a now-defunct Sandbox company focused on highlighting real-time, location-based deals at nearby merchants.

via Chicago startup Doggyloot raises $2.5M in funding – chicagotribune.com.

Interesting how this article hardly gets into specifics as to what Doggyloot actually does.

What is XaaS (anything as a service)?

XaaS is a collective term said to stand for a number of things including “X as a service,” “anything as a service” or “everything as a service.” The acronym refers to an increasing number of services that are delivered over the Internet rather than provided locally or on-site. XaaS is the essence of cloud computing.

via What is XaaS (anything as a service)? – Definition from WhatIs.com.

Using Metadata to find Paul Revere

Rest assured that we only collected metadata on these people, and no actual conversations were recorded or meetings transcribed. All I know is whether someone was a member of an organization or not. Surely this is but a small encroachment on the freedom of the Crown’s subjects. I have been asked, on the basis of this poor information, to present some names for our field agents in the Colonies to work with. It seems an unlikely task.

If you want to follow along yourself, there is a secret repository containing the data and the appropriate commands for your portable analytical engine.

via Using Metadata to find Paul Revere – Kieran Healy.

Groklaw – Forced Exposure ~pj

Harvard’s Berkman Center had an online class on cybersecurity and internet privacy some years ago, and the resources of the class are still online. It was about how to enhance privacy in an online world, speaking of quaint, with titles of articles like, “Is Big Brother Listening?”

And how.

You’ll find all the laws in the US related to privacy and surveillance there. Not that anyone seems to follow any laws that get in their way these days. Or if they find they need a law to make conduct lawful, they just write a new law or reinterpret an old one and keep on going. That’s not the rule of law as I understood the term.

via Groklaw – Forced Exposure ~pj.

The last days of Unix

Errol Rasit, research director at Gartner, concurs that the primary cause of Unix weakness over the past decade is migration from the RISC platform to x86-processor based alternatives, which can run many Unix workloads, usually at attractive price/performance ratios. Today, x86 technology attracts most new deployments and innovation, such as cloud computing and fabric-based computing, which further validates the technology as a preferred platform.

via The last days of Unix – Network World.

ZMap · The Internet Scanner

ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet.

ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet.

via ZMap · The Internet Scanner.

Instagram “likes” worth more than stolen credit cards

In the latest twist, a computer virus widely used to steal credit card data, known as Zeus, has been modified to create bogus Instagram “likes” that can be used to generate buzz for a company or individual, according to cyber experts at RSA, the security division of EMC.

These fake “likes” are sold in batches of 1,000 on hacker forums, where cybercriminals also flog credit card numbers and other information stolen from PCs. According to RSA, 1,000 Instagram “followers” can be bought for $15 and 1,000 Instagram “likes” go for $30, whereas 1,000 credit card numbers cost as little as $6.

via Instagram “likes” worth more than stolen credit cards | News | PC Pro.

The Increasing Failure Of Malware Sandboxing

The sandboxing appliances popularly deployed today are performing well against your average”0-day” malware threat, but capabilities decline dramatically the more targeted an adversary becomes. As such, organizations are much better at stopping the generic non-targeted “Internet threats”, but becoming more vulnerable to marginally tuned malware. For example, any piece of malware that requires the user to perform an action at a specific time (before it acts maliciously) is sufficient to evade detection in most cases.

via The Increasing Failure Of Malware Sandboxing — Dark Reading.

How Do You Hijack a Popular Streaming Movie Site? With Ease, Apparently

“You don’t have to have access to any emails, passwords, or any other credentials. You simply grab the information from the WHOIS, write a letter with an attached photo-shopped ID with the same name, send it from a random email address, and the domain will be handed to you fairly quickly.”

via How Do You Hijack a Popular Streaming Movie Site? With Ease, Apparently | TorrentFreak.