The UK Government Is Already Censoring The Global Internet

There is one group of people that can stop this madness before it’s too late – the domain name registrars themselves. In the middle of October, Mark Jeftovic, CEO of the Canadian hosting company EasyDNS, vocally refused to comply with a request from PIPCU. Has he suffered the wrath of the British authorities? Nope. Was EasyDNS’s accreditation revoked? No. Is the company still in business? Oh yes.

via The UK Government Is Already Censoring The Global Internet.

Bitcoin Thefts Surge, DDoS Hackers Take Millions

Bitcoin users have echoed that suggestion. “One note of warning: don’t trust any online wallet,” read a comment on a recent Guardian feature. “The two biggest ones have already been robbed. Use your own wallet on your own computer and back it up on a USB stick.”

“Remember, you don’t have to keep your Bitcoins online with someone else: you can store your Bitcoins yourself, encrypted and offline,” said Ducklin at Sophos.

via Bitcoin Thefts Surge, DDoS Hackers Take Millions – InformationWeek.

NSA infected 50,000 computer networks with malicious software

A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.

via NSA infected 50,000 computer networks with malicious software – nrc.nl.

This article is a bit short on details.  It doesn’t say what OSs or exactly how they got malware onto victim machines.  The only way to infect a network would be to perhaps get control of its firewall or main router.  Since most people use cheap SOHO routers that might not be very difficult to swap out firmware on them that can do all kinds of things unbeknownst to its owner.   The article implies that the victim machines are PCs according to this:

One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service – GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.

How Does the Tesla Model S Fire Risk Compare to Gasoline Cars?

Since the Model S went into production last year, there have been more than a quarter million gasoline car fires in the United States alone, resulting in over 400 deaths and approximately 1,200 serious injuries (extrapolating 2012 NFPA data). However, the three Model S fires, which only occurred after very high-speed collisions and caused no serious injuries or deaths, received more national headlines than all 250,000+ gasoline fires combined. The media coverage of Model S fires vs. gasoline car fires is disproportionate by several orders of magnitude, despite the latter actually being far more deadly.

Reading the headlines, it is therefore easy to assume that the Tesla Model S and perhaps electric cars in general have a greater propensity to catch fire than gasoline cars when nothing could be further from the truth.

via The Mission of Tesla | Blog | Tesla Motors.

Trio of young coders build health-care website in days

“We were surprised to see that it was actually fairly difficult to use HealthCare.gov to find and understand our options,” he told CNN. “Given that the data was publicly available, we thought that it made a lot of sense to take the data that was on there and just make it easy to search through and view available plans.”

The result is a bare-bones site that lets users enter their zip code, plus details about their family and income, to find suggested plans in their area.

via Trio of young coders build health-care website in days – CNN.com.

The site is here at www.thehealthsherpa.com and it seems pretty damn good!

Hackers Take Limo Service Firm for a Ride

It’s understandable why the company would decline to comment: Inside the plain text archive apparently stolen from the firm are more than 850,000 credit card numbers, expiry dates and associated names and addresses. More than one-quarter (241,000) of all compromised card numbers were high- or no-limit American Express accounts, card numbers that have very high resale value in the cybercrime underground.

via Hackers Take Limo Service Firm for a Ride — Krebs on Security.

First new gTLDs added to the root

The four new gTLDs all use non-Latin scripts: شبكة (Arabic “web “), онлайн (“online” in Cyrillic), сайт (“sale” in Cyrillic) and 游戏 (“game” in Chinese). In total, the gTLD process will result in expansion of top-level domains from 22 to up to 1400.

More domains will be added to the root progressively. “ICANN’s New gTLD Program was designed to facilitate a measured rollout of new domains so as not to disrupt the Domain Name System,” ICANN said in a statement.

via First new gTLDs added to the root – gTLD, top-level domains – Computerworld.

Russian Topol missile test spotted from ISS

This matches. The missile has three stages (like the old Saturn V rockets that took humans to the Moon), and what the astronauts saw may have been a fuel dump from the second stage or the last of the fuel leaking away after the booster phase was complete. In space, the cloud would expand more or less freely, moving rapidly as it traveled along with the booster in its path. In the photo, you can see a slight streaking to the cloud, most likely due to motion.

via Russian Topol missile test spotted from ISS..

iss_russianmissile2.jpg.CROP.original-original
Original tweet from astronaut Mike Hopkins here.