Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 16 Issue 47

eZine's profile picture
Published in 
Atari Online News Etc
 · 22 Aug 2019

  

Volume 16, Issue 47 Atari Online News, Etc. November 21, 2014


Published and Copyright (c) 1999 - 2014
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1647 11/21/14

~ Landfill Games Sell! ~ People Are Talking! ~ Google Gets Fined!
~ Search for Every Tweet ~ Call of Duty: Heroes! ~ Sexism Game Ratings?
~ Atari Chips Available! ~ Google, Rockstar Suit! ~ Detect Gov't Spyware!
~ AT&T Kills Permacookie ~ "Far Cry" New Heights! ~ Yahoo Over Google!

-* NSA Warns of China Attacks! *-
-* State Dept. Network Breach Shutdown *-
-* New U.S. Web Rules Must Withstand Lawsuits *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



There's so much to talk about this week! Record snowfall in the
Buffalo area - have you seen the pictures?!? How about the arrogance
of our president taking "executive action" and making a major decision
regarding immigration - 5 million undocumented immigrants to basically
get amnesty!? You know what, I'm not going to focus in on those news
items this week. regardless of the significance.

What I am going to quickly focus on this week is next week's holiday,
Thanksgiving. As I've been saying for many, many years now, this is one
of my favorite holidays. It's a time to be with family, and enjoy a
wonderful feast. As usual, we typically have a small celebration at
home - my wife and I, and our 4-legged "children". This year, we'll be
missing one of those "children" - we had to put one of them down earlier
this week. But, she'll be with us in spirit - that's how much of an
impact she had in our lives.

So, one suggestion I can put out there this year - enjoy these types of
holiday celebrations to their fullest, with family and friends. Because,
if you think about it, you may not have the same opportunity next year.

Happy Thanksgiving!

Until next time...



=~=~=~=



New Atari Chips Available


Hello,

I will enter a small quantity of  MC68060RC50 rev.6 (71E41J) mask able to
run at 95-100 MHz.

Maybe more with RC60 : I never get and tested RC60 with this mask...so
maybe we will have a good surprise (running higher freq).

The rev.6  060 are now very rare and difficult to find (sure there are
many 10.000 is stock of big distributors but à 400-500$ !!).
And there are many fake on the market (re-printed dummy mask on the CPU !)

My price is 120€ + shipping = 5€ for Europe and 10€ for rest of world.

If you want one, please send money now on my paypal account (my email).
Please counterbalance the pp fees that I will not get (around 3%).
This give you a PP price of  124€.

You can pay by Western Union or cash by secured postal letter.
Just inform me.

Regards
--
Rodolphe Czuba
 
http://rodolphe.czuba.free.fr/
www.powerphenix.com
www.yonnesolaire.fr
4, che du gué des Archers
Fontaines
89150 St Valérien
FRANCE
 


=~=~=~=



->In This Week's Gaming Section - Call of Duty: Heroes!
""""""""""""""""""""""""""""" 'Far Cry' Aims for New Height!
Sexism Ratings for Games
And much more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Call of Duty: Heroes Is Clash of Clans with Guns


If the blockbuster action and Kevin Spacey-ness of Call of Duty: Advanced
Warfare isn't enough to scratch your militaristic itch, there's now yet
another way to take your Call of Duty addiction on the go. Taking some
major design cues from hit mobile strategy game Clash of Clans, Call of
Duty: Heroes has you attack and defend military bases using characters
and weapons from Activision's popular first-person shooter franchise.
The free-to-play game is available now in iOS and Windows devices, with
an Android version on the way.

As with Clash of Clans, Call of Duty: Heroes' core gameplay cycle
consists of using resources to fortify your base, training fighters for
battle and attacking enemy strongholds. Whether you're invading a base or
defending your own, combat is as simple as tapping the screen to deploy
your soldiers and watching the action unfold. The game lets you take on
other players in PVP mode as well as defending against
increasingly-difficult waves of enemies in survival mode.

Heroes sets itself apart with some action-oriented mechanics lifted from
the Call of Duty console games, such as the ability to rain down fire
from above with a helicopter turret. The game's Heroes - leader
characters with special abilities - are also lifted from the core series,
with the option to take control of characters like Captain Price from
Modern Warfare and Mike Harper from Black Ops 2. 

Heroes is far from the first Call of Duty mobile game; previous
installments like Call of Duty: Strike Team and Call of Duty: Black Ops
Zombies emulate the first-person shooting gameplay of their console
counterparts, whereas Activision's new Heroes game aims to capitalize on
the ever-growing mobile strategy genre. 

I had a good time deploying troops and ordering chopper strikes during my
brief time with Heroes, and the game seems like a perfect fit for those
who don't mind a Call of Duty skin over Clash of Clans' signature
gameplay. As with most free-to-play games, you'll likely have to either
spend real money or lots of time in order to build the ultimate base, but
the title is enjoyable enough in small bursts.



'Far Cry' Video Game Aims for New Height - The Himalayas


Ubisoft is out to build on the success of its "Far Cry" video game
franchise with a new installment promising players more choices and
smarter enemies in an expansive world.

The action-adventure game set for release on Tuesday will be the fourth
edition in the series, which has sold a reported 20 million copies since
the first version was released in early 2004.

About half of those sales have been credited to "Far Cry 3," which won
legions of fans after it hit the market at the end of 2012.

"Far Cry is a sleeper in some ways, but it is building momentum," analyst
Scott Steinberg of high-tech consulting firm TechSavvy told AFP.

"It has become a popular franchise but still has plenty of room to grow."

"Far Cry 4" due out on Tuesday was billed as the most expansive and
immersive version yet of the open-world, first-person shooter game.

While its predecessor played out on a tropical island, the story in "Far
Cry 4" is set in a fictional region of the Himalayas serving as a
stronghold for a self-appointed despot.

"The first idea for Far Cry was not to put it in the mountains; it was
that someone on the team wanted to ride an elephant," game executive
director Dan Hay told AFP while providing an early glimpse at the new
version.

"Maybe we took a hard road, but we asked what we wanted to do as game
players."

The Montreal Ubisoft studio behind the game set out to imbue "Far Cry 4"
with features people loved in its predecessor and unexpected new twists.

For example, players can indeed ride elephants while attacking mountain
fortresses that Hay described as "outposts on crack that can fight back."

Artificial intelligence built into the game has resulted in virtual
enemies even surprising its creators with reactions to situations.

Even the fictional villain in the game, a character named Pagan Min, is
billed as deviously insightful.

"Everyone has that friend in the past who was bad for them," Hay said
while describing Pagan Min.

"They are a blast to hang out with; but if you hang out with them you are
going to wind up dead or in jail. This is that guy."

Along the way, the new version of Far Cry calls on players to choose
between tradition and seizing new opportunities in the Himalayan realm.

"Far Cry asks you to take a digital year of your life and meet credible
characters who will challenge your assumptions," Hay promised.

"After finishing school we start with the idea that we are going to get it
right; better than our friends or parents - Far Cry gives you the choice."

Versions of the game for play on current and previous generation Xbox or
PlayStation consoles, as well as on computers powered by Windows
software, will launch at a price of $60, according to France-based
Ubisoft.



Spectacular ‘Dragon Age: Inquisition’ Burns Bright


The most useful item I used while playing Dragon Age: Inquisition?
A bottle of eyedrops.

I probably should have used a few bottles, actually, because I don’t think
I blinked more than a handful of times during the dozens of hours I spent
saving the land of Thedas from demonic hordes in the latest role-playing
masterpiece from genre kingpin Bioware. Marrying the best bits from the
first two Dragon Age games, it’s a must-have for gamers with plenty of
time on their hands.?

It’s a daunting proposition for those new to the franchise, though.
Inquisition is the third Dragon Age game, and while Bioware wisely tossed
together a handy website that lets you quickly whip through the biggest
decision points in the first two games to set up a “World State” for the
new one, you’re probably best off playing through at least one prior
Dragon Age before diving in.

It’s not required, however, as Inquisition features a standalone story
and casts you in the role of a brand-new character. You’re the Herald of
Andraste, the unlikely survivor of a calamitous explosion that tore a
hole in the sky and killed off a collection of world leaders. That hole
was just one of many, and through these breaches pours a steady stream
of toothy unpleasantness. So off you go, gallivanting across the land as
a member of the fact-finding, world-saving Inquisition in an effort to
heal old wounds, unite warring factions, plug up the sky holes, and
find out who — or what — is behind the apocalyptic mess.

It’s classic Dungeons and Dragons-esque stuff, letting players build a
dwarf, elf, human, or bull-like Qunari hero using a shockingly powerful
character creator. But where plenty of fantasy games let you cast spells
and swing swords, Dragon Age: Inquisition lets you do these things on a
scale not seen since the incredible The Elder Scrolls V: Skyrim.

It’s not an open world, however; each of the game’s many explorable
regions is zoned off from the rest, though they’re all expansive and
filled with enough sidequests, lore, and random encounters to easily blow
up a few weekends. The frustrating linearity of Dragon Age II’s smallish
areas have been ditched in favor of big, unique playgrounds in which to
roam freely. The developers even saw fit to add a jump button,
encouraging you to leap off a ledge and scour the wilderness for
goodies. It’s a bit too clean compared to the glorious messiness of
Skyrim, but it’s easily the best world-building we’ve seen yet in Dragon
Age.

You’ll spend the bulk of your time in the trenches, running missions,
working through conversation trees, wooing possible mates, and fighting,
fighting, fighting. The combat blends the fussy, pause-the-action
strategy of the first game with the button-mashy action of the sequel,
and it hums along nicely. Swapping between your four active party members
(pulled from a much larger stable) is quick and easy, though most of the
time you can just focus on your character and let the A.I. handle your
companions.

While you don’t need to micromanage this stuff, you certainly can (and
likely will). I torched hours tweaking the gear, abilities, and even
artificial intelligence of my party. Learning the ins and outs of each
mage, warrior, and rogue is super helpful when you get into the bigger,
nastier fights. That dragon isn’t going to just let you whack it on the
foot for an hour, you know.

There’s plenty to manage in Dragon Age: Inquisition. A war table lets you
marshal spies, diplomats, and armies around Thedas to gather resources
and open up new areas to explore. As the Inquisition’s influence spreads,
you’ll gain permanent boosts and new dialogue options. Every ounce of
energy you put into this game gives you something in return, and while
it’s a little intimidating at first, soon enough you’ll find yourself
joyfully flopping around in its myriad game systems like a kid in a ball
pit.

Veering off the main story is so easy, in fact, that it speaks to
Bioware’s trouble keeping the plot focused and sharp. While the game’s
huge cast of characters shines, Thedas’ complicated sociopolitical
landscape occasionally drags the narrative into the weeds. Some of the
game’s brightest moments — and most essential missions — lie off the
beaten path.

Dragon Age: Inquisition’s sheer size also proves problematic, though I
experienced relatively few glitches playing the Xbox One version of the
game (PS4 players have reportedly had a rougher go). An interface
stallout here or there required me to backtrack to an earlier save. The
old “Save early, save often” refrain definitely applies here.

While it occasionally hiccups, Dragon Age: Inquisition is, at times,
flat-out gorgeous. The creature design is terrific, recalling enemies
from past games but dialing up the look and feel. The first time you
encounter a dragon — in this case, a big, irritated one flying around,
coughing up fireballs — you’ll marvel at its fluid movements and
intimidating presence. Then you’ll die, because it’s a dragon, and
you’re probably not ready for that yet.

You’re also probably not ready to dive into the game’s multiplayer.
Separated entirely from the solo campaign, it’s a story-free cooperative
dungeon-crawling sort of affair in which you kill enemies and gain loot
and gold. It’s not bad, but it’s not enticing either. It’s a wisp of
weird icing on a 15-layer cake.

Besides, you’ve got a land to save, a rogue to flirt with, a hole to fix,
and a dragon to slay. Big, meaty, and unequivocally fun, Dragon Age:
Inquisition improves upon the first two games in just about every way.
Grab some Visine and give it a stab.



Swedish Trade Group Proposes Sexism Ratings for Games


Sweden-based industry trade group Dataspelsbranchen is researching a new
content rating system for video games based on promotion of gender
equality.

The proposed ratings system, inspired by the Bechdel test, will examine
how in-game female characters are portrayed with regard to equality and
diversity. The group recently received a 272,000 kronor (nearly $37,000)
grant from Sweden's government-funded Vinnova agency to further its
research.

"I do not know of any other project in the world asking this question and
of course we want Sweden to be a beacon in this area," project manager
Anton Albiin told Swedish publication The Local. "Of course games can be
about fantasy but they can be so much more than this. They can also be a
form of cultural expression - reflecting society or the society we are
hoping for. Games can help us to create more diverse workplaces and can
even change the way we think about things."

The group's research follows up on recent concerns raised by Anita
Sarkeesian and other media critics, who highlight the one-dimensional
treatment women characters often receive in video games.



=~=~=~=



->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""



Atari Games Buried in Landfill Net $37,000 on eBay


What some have called the worst video game ever made has fetched
thousands of dollars for a New Mexico city.

An old "E.T. The Extra-Terrestrial" game cartridge drew the highest bid
among 100 Atari games auctioned on eBay by Alamogordo officials.

The games were part of a cache of some 800 Atari video games buried more
than 30 years ago in a landfill and dug up in April.

Joe Lewandowski, a consultant for the film companies that documented the
dig, says the online auction, which ended Thursday, generated $37,000.

"It's really gratifying to see that happening because again to everybody
it was a bunch of garbage in the landfill. You're kind of nutty to go dig
it up," Lewandowski told KRQE-TV.

The "E.T." game, still in its original box, sold for $1,537 to a buyer in
Canada. The interest in the games has gone global. According to
Lewandowski, online bidders from other countries including Germany and
Sweden snapped up items. Earlier this month, a museum in Rome opened an
exhibit on the dig that includes dirt from the landfill.

"I keep getting messages from people around the world asking me if there's
any more left, it's crazy," Lewandowski told the Alamogordo Daily News.
"The people that lost the bids are demanding more but I keep telling them
they have to keep checking."

Reports that truckloads of the game were buried in the landfill have been
urban legend since the early '80s. The "E.T." game's poor reception when
it came out in 1982 was seen as a factor in Atari's demise.

City documents show that Atari consoles and more than 1,300 games were
found, including "E.T. the Extra-Terrestrial." Some of the other
discovered titles include "Centipedes," ''Warlords" and "Asteroids."

After months of planning with state and local regulators, crews discovered
numerous game cartridges on April 26. The dig cost more than $50,000,
Lewandowski said.

LightBox Entertainment and Fuel Entertainment pursued the dig for a
documentary that is due to come out Thursday.

Alamogordo owns the cartridges because they came from the city's
landfill. The revenue will go to the city and the Tularosa Basin
Historical Society. Both groups will meet Dec. 1 to discuss how to spend
the money.

The remaining game cartridges will be sold on eBay over the next few
weeks.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



US State Department Network Shut After Cyber Breach


The US State Department said Monday it shut down its unclassified computer
network over the weekend after evidence emerged that it could have been
hacked.

Officials believe the incident "was linked" to one late last month when
hackers breached the White House's unclassified computer network, State
Department press office director Jeff Rathke told reporters.

The State Department had initially said in an email late Friday that the
shutdown came as scheduled routine maintenance to its main unclassified
network, and would impact email traffic and access to public websites.

But on Monday, Rathke said the department had recently detected "activity
of concern" in portions of the system handling non-classified emails, and
the weekend maintenance included security improvements responding to the
breach.

"We have no reason to believe classified information was compromised,"
Rathke told reporters.

He said the State Department's secure, internal communication system
within the building and linking US diplomatic posts worldwide were
operational, but that the Internet-connected systems remained down on
Monday.

"We are implementing carefully planned improvements to the security of
our main unclassified network, taking advantage of a scheduled outage,"
Rathke added. "No classified systems have been affected by this
incident."

Rathke said the origin of the cyber breach and who might be responsible
is "something that remains under investigation."

The State Department is the latest in a series of government agencies to
face cyber security breaches.

Last month, the White House reported an intrusion in its unclassified
computer network.

In the course of addressing the breach, some White House users were
temporarily disconnected from the network but the computers and systems
were not damaged, an official said.

The Washington Post quoted sources as saying hackers believed to be
working for the Russian government were believed to be responsible for
that breach.

Last week, the US Postal Service said hackers stole sensitive personal
information from its employees in a large data breach this year, and got
took some customer data as well.

A USPS spokesman said the breach affected as many as 800,000 people who
are paid by the agency, including employees and private contractors.



NSA Chief Warns Chinese Cyber Attacks Could Shut U.S. Infrastructure


China and "probably one or two" other countries have the ability to
invade and possibly shut down computer systems of U.S. power utilities,
aviation networks and financial companies, Admiral Mike Rogers, the
director of the U.S. National Security Agency, said on Thursday.

Testifying to the House of Representatives Intelligence Committee on
cyber threats, Rogers said digital attackers have been able to penetrate
such systems and perform "reconnaissance" missions to determine how the
networks are put together.

"What concerns us is that access, that capability can be used by
nation-states, groups or individuals to take down that capability," he
said.

Rogers said China was one of the countries with that capability, but that
there were others.

"There's probably one or two others," he said, declining to elaborate in
a public setting.

Rogers testified two days after a bill to overhaul the NSA's bulk
collection of telephone records failed in the Senate. Privacy advocates
will probably now have to start over to pass a law to reform U.S.
surveillance rules.

He said at the hearing that telephone companies are still providing those
records to the NSA, but under stricter rules than when the program was
exposed in 2013 by former contractor Edward Snowden.

Rogers said the agency, anticipating passage of a new law, would wait
before moving forward with technological changes. He said the agency, and
telephone companies, would rather wait and see what might be included in
any new law.



AT&T Kills The 'Permacookie,' Stops Tracking Customers' Internet Usage


In recent weeks, Verizon and AT&T have been caught up in a privacy
firestorm over their use of so-called "permacookies," a method of
tracking what their users do while browsing the Web with the intent of
sharing that data with advertisers. Verizon's permacookie program lives
on, but AT&T has ceased the practice, ProPublica reported on Friday.

At least for now.

AT&T tells ProPublica that its use of permacookies was "part of a test,"
which has since wrapped up, but the company says that it "may still
launch a program to sell data collected by its tracking number." For its
part, AT&T says that it will allow customers to opt out of the program
if—or when—it decides to use permacookies for advertising purposes.

The story behind the story: Permacookies aren't cookies in the
traditional sense: Instead, they're unique identifiers appended to
website addresses you type in on your device that let carriers see what
kinds of sites you visit.

Permacookies exist for the same reason traditional tracking cookies
exist—so advertisers can see what sorts of things you might be interested
and serve up related ads in the hopes that you'll click on them. But
unlike regular tracking cookies, which you can easily delete from your
browser or block entirely, there's no way of removing or blocking
permacookies since they're handled entirely by the carrier. 

Despite the outcry from consumers and activists, it's hard to shake the
feeling that permacookies aren't going away now that the proverbial cat
is out of the bag. Both Verizon and AT&T have said they allow (or will
allow) customers to opt out of the advertiser data sharing program, as
ProPublica notes (though Verizon won't let you opt out of the identifier
program), but you're still very much at the mercy of the carriers. 

If you're on Verizon and are concerned about the privacy implications,
our Ian Paul has a couple suggestions: First, use Wi-Fi instead of the
cellular network whenever possible so you bypass Verizon's network
entirely. If that's not practical, though, consider using a VPN to help
keep your Web browsing private.



Any New U.S. Internet Rules Must Withstand Lawsuits: FCC Chief


U.S. regulators expect Internet service providers to sue the government
over any changes in the way they are regulated and must reevaluate any
proposals to make sure they stand up in court, Federal Communications
Commission Chairman Tom Wheeler said at a meeting on Friday.

Last week U.S. President Barack Obama said Internet service providers
should be regulated more like public utilities to make sure they grant
equal access to all content providers. This touched off intense protests
from cable television and telecommunications companies and Republican
lawmakers.

"Let's make sure that we understand what is going on here. The big dogs
are going to sue regardless of what comes out," Wheeler said.

"We need to make sure that we have sustainable rules, and that starts with
making sure that we have addressed the multiplicity of issues that come
along and are likely to be raised," he added.

Wheeler did not explicitly address the reclassification of Internet
service providers and a spokesman said he is still evaluating multiple
options. Experts have said reclassification could be challenging to argue
in court. A decision is not expected before 2015.

On Nov. 12, AT&T Inc said it would stop investing in high-speed Internet
connections in 100 cities until the Web rules were settled.



Google Fined For Not Taking Down "Right To Be Forgotten" Links Worldwide


A French court has convicted Google of failing to comply with a right to
be forgotten case after it took down links on its French subsidiary but
failed to do so globally.

Dan Shefet, a lawyer practicing in France, first sued the subsidiary in
August 2013 over defamation lodged at him and his firm by a gossip site
that, among other things, falsely accused him of losing his licence to
practice law in France and Denmark.

The French court sided with Shefet and told Google to yank certain URLs
on a worldwide basis.

Google, however, only took down the sites from google.fr and, according
to Shefet, ignored subsequent demands based on the court order. 

Removing links from sites ending in ".fr" didn't help matters much,
Shefet said, given that his clients include those from other countries.

Now, the French child is paying for the sins of its US parent.

A judgment handed down in September by the Paris Tribunal de Grande
Instance means that Google France is facing fines of €1,000 ($1,252,
£799) a day, plus €1,500 to cover the plaintiff's costs.

According to Shefet's lawyer, this decision against how Google treats
takedown requests worldwide is a first not only in France but in Europe.

The French court isn't the first to order Google US to bury search
results, mind you. Canada got there before it.

In June, a Canadian court ruled that Google had to bury search results for
a Canadian company's competitor, not just in Canada but around the world.

A month later, the Court of Appeal of British Columbia had given the
go-ahead for Google to appeal the decision, but it refused to stay
enforcement of the injunction.

The French court's decision may now bolster other European courts in their
efforts to impose court orders on online companies beyond their own
borders.

The decision relies on the European right to be forgotten: a ruling by the
European Court of Justice (ECJ) that handed victory to a Spanish man who
wanted Google to remove links to an old article saying that his home was
being repossessed to pay off debts.

In the French case, Google's lawyers had tried to get the removal limited
to links on google.fr, but the judge, relying on the reasoning in the
ECJ's ruling, rejected the attempt, saying that Google and its French
subsidiary are inseparable.

From that ruling:

The activities of the operator of the search engine and those of its
establishment situated in the member state concerned are inextricably
linked.

Shefet predicts that the decision will give European courts a new tool in
forcing Google to forget things worldwide. It's not just about privacy or
defamation, he said, but rather could substantially alter the entire
range of business liabilities for multi-national corporations with local
subsidiaries.

The Guardian quotes him:

The real importance of those decisions is that now any individual in the
UK – or another member state – who suffers from Google’s [links to a
libelous article] may obtain an injunction against their local Google
subsidiary.

Until now a subsidiary could not be legally forced under the threat of
daily penalties to deliver a result which was beyond its control. The
complainant would therefore have to obtain judgment against Google in the
US because only Google Inc controls the search engine world wide.

Now a daily penalty can be inflicted upon Google UK by local courts until
Google Inc delivers the result by way of [removing links] world wide.

But while the European Union's power to drown links seems to have gotten
stronger, back in Google's home country, the opposite is happening, with
a San Francisco Superior Court judge last week upholding the already
widespread legal opinion in the US that search results constitute free
speech.

That means, the judge decided, that the owner of a website called
CoastNews had no right to sue Google for putting CoastNews too far down
in search results, while Bing and Yahoo were turning up CoastNews in the
number one spot.

In its latest transparency report, Google said that since it launched the
removal request process on 29 May 2014, it's received 169,668 takedown
requests.

It's complied with a minority - 41.7% - of those requests, removing links
pertaining to, for example, a German rape survivor who asked the company
to remove a link to a newspaper article about the crime when people
search on the individual's name.

It's refused to take down links to articles that are merely embarrassing
or which are related to business as opposed to private matters, such as
that from a British media professional who wanted to bury embarrassing
content he posted.

According to the Guardian, Google is considering its options regarding the
French decision, including a possible appeal. It says that it already
removes links to defamatory online articles, thereby fulfilling its legal
obligations to French citizens.

The Guardian quotes a Google spokesperson:

This was initially a defamation case and it began before the … ruling on
the right to be forgotten. We are reviewing the ruling and considering our
options. More broadly, the right to be forgotten raises some difficult
issues and so we’re seeking advice – both from data protection authorities
and via our Advisory Council – on the principles we should apply when
making these difficult decisions.



Google and Rockstar Wind Down Their Year-long Patent War


The high-profile patent lawsuit between Google and the "Rockstar
Consortium" is drawing to a close. Google has signed a "term sheet" with
Rockstar, which will be finalized as a settlement in the coming weeks.

The lawsuit has been closely watched, especially because Rockstar is owned
by some of Google's chief rivals in the smartphone industry: Apple,
Microsoft, Blackberry, Ericsson, and Sony. The Rockstar group was created
in 2011, and it bid $4.5 billion for the large patent portfolio of
Canada-based Nortel, which went bankrupt in 2009.

None of the terms of the Google-Rockstar settlement have been made public
so far. The news comes days after it became public that Cisco expects to
take a $188 million charge to settle its own patent dispute with Rockstar,
which sought royalties from at least a dozen Cisco customers.

Rockstar's lawsuit against Google was filed in October 2013. Motions filed
in the Texas case indicate it was moving through the discovery process,
even though earlier there had been a great deal of fighting over venue.

A court document (PDF) filed Monday revealed that Google and Rockstar had
settled, "in principle, all matters in controversy between the parties,"
and the two sides signed a term sheet. It isn't clear if the deal will
also resolve Rockstar's allegations of infringement against Google's
Android partners who got sued, including Samsung and HTC.

A Google spokesman declined to comment.



Free Tool Detects Government Spyware


Governments all around the world use malware and spyware to keep tabs on
people, from visitors to residents. But a security researcher's tool can
now determine if your computer is infected with spyware.

The Detekt tool was developed by Berlin-based security researcher Claudio
Guarnieri and supported by several human-rights groups. Detekt is checks
for malware that is often used against journalists, activists and other
people frequently targeted by governments. 

Available as a free download, Detekt is primarily a scanner; its primary
purpose is to warn users if they're being spied on, not to remove that
spyware. If Detekt does detect spyware, the researchers recommend users
disconnect that computer from the Internet and stop using it immediately.
Then, users should contact an expert via a computer they don't normally
use. 

Lists of experts who may be able to help, along with their PGP keys for
sending encrypted emails, are available from Detekt's website.

Detekt is currently compatible with Windows XP, Vista, 7, 8 and 8.1. It's
available in English, German, Italian, Spanish, Arabic and Amharic, the
national language of Ethiopia.

According to Amnesty International, one of Detekt's co-sponsors, an early
version of the tool was used to investigate surveillance practices in
several countries. Detekt discovered that several human-rights lawyers
and activists in Bahrain were being spied on with a commercial piece of
spyware called FinSpy.

Amnesty International warns that Detekt can't magically detect all
spyware; rather, it is designed to recognize some of the most commonly
used and encountered commercial spyware. The developers will continue to
update Detekt as the spyware it targets evolves and changes.

"The growing trend in indiscriminate mass surveillance on a global scale
was laid bare by the Edward Snowden disclosures," writes Amnesty
International in its post on Detekt. "Following the lead of the USA and
other industrialized countries, governments everywhere now justify the
use of such surveillance. This has a chilling effect on the rights to
freedom of expression and peaceful assembly in countries across the
world." 



Twitter Update Now Lets Users Search Every Public Tweet Ever Sent


It's now surprisingly easy to search your own embarrassing Twitter
history - or that of any user.

Twitter updated its search tool today to allow users to search through
the ever-growing list of a half trillion tweets that have been sent over
the past eight years.

"Our long-standing goal has been to let people search through every Tweet
ever published," Yi Zhuang, a search infrastructure engineer at Twitter,
said in a blog post.

The search functionality remains the same, however, users will notice that
Twitter now displays all relevant results. Previously, more current tweets
with the highest engagement dominated the results.

Zhuang said the improved search infrastructure is ideal for getting the
entire conversation, whether it's for a sports season, a conference or a
trending hashtag, such as #Ferguson.

Twitter gave users the option in 2012 to download their personal library
of tweets, however the new search capability is also ideal for quickly
finding anything from your tenure on Twitter.

Simply type in a person's username plus a keyword and marvel at how easy
it is to dig up the past.



Google Launches Service To Remove Ads from Websites


Sick and tired of all those ads? Google is testing a program called
Contributor that lets you subscribe to the Web.

Well, not to the whole Web — just to 10 Web publishers that are
participating in the Contributor experiment. Under it, people pay $1 to
$3 per month and see a thank-you note on websites instead of an
advertisement.

“When you visit a participating website, part of your contribution goes
to the creators of that site,” the Google Contributor site said. “The
more you contribute, the more you support the websites you visit.”

The thank-you note appears in place of an ad that Google otherwise would
have supplied, spokeswoman Andrea Faville said. The 10 publishers
participating in the experiment include photo-sharing site Imgur, news
satire site The Onion, tech news site Mashable and slang-explanation site
Urban Dictionary.

Google Contributor is an interesting idea for a company that’s funded by
ad revenue, but so far, it is only an experiment. Google offered a
waiting-list form to let people sign up.

Free, ad-supported content has proved a popular way to quickly launch
Internet-based services, and advertising is the financial lifeblood
behind services such as Facebook’s social networking, Twitter’s
information feed, and Google’s search.

But in some eyes, advertising has a dark side, too: Ads work better if
they’re targeted at people who are likely to find them interesting, and
that means those who operate websites have an incentive to track personal
information. The common expression of this complaint is that people’s
personal data becomes the product website operators sell to advertisers.

Google indicated that a Google Contributor subscription would, in effect,
mean that a person was paying for privacy as well as an ad-free
experience.

“Use of this service will not be used to target ads,” Faville said.

Advertisers are expected to spend $141 billion on online ads this year,
and that number should increase annually more than 15 percent in 2016,
according to eMarketer. Google is the top beneficiary by far this year,
receiving an estimated 32.4 percent of that total. Facebook is next at
8 percent, followed by Microsoft at 2.9 percent and Yahoo at 2.4 percent.

In the news media, sites like The Wall Street Journal, The New York Times
and The Financial Times keep some of their content behind subscription
paywalls, but that can significantly reduce readership compared to free,
advertising-supported content. Some critics, however, believe that
ad-driven news sites have too strong a financial incentive for producing
sensational articles that will mean lots of page views.

It’s also not clear exactly how Google will split the subscription revenue
with the publishers — though that’s no change from the existing situation
showing Google ads. “The amount we keep is the same we charge advertisers
to show their ads,” Faville said.

The more a person pays, the more he’ll see ad-free sites, and websites
shouldn’t see a difference in revenue, Google said. “In terms of the
rates, the amount that goes to the publishers is essentially the market
rate for ad space on their site (in the ad auction). So the amounts going
to publishers wouldn’t really be affected, although the higher the amount
in a person’s Contributor account, the more times they would see the
thank-you messages versus ads,” Faville said.

The vast majority of Google’s revenue comes from advertising. In the third
quarter, Google raked in $16.52 billion. Of that, Google returned $3.35
billion to sites that carried its ads or that referred search traffic that
led to search ads.

Some of that revenue comes from search ads that show up next to search
results, but it also shows more graphic “display” ads on sites that choose
to use its DoubleClick service. DoubleClick is used for direct and
indirect advertising. For example, you may see a DoubleClick-supplied ad
on a Google property like YouTube, a privilege for which an advertiser,
of course, pays. But you can also see a DoubleClick-supplied ad on a
news site, in which case the advertiser’s payment is split between Google
and the news site publisher.



Yahoo Replaces Google as Firefox's Default Search


Yahoo will supplant Google's search engine on Firefox's Web browser in
the U.S., signaling Yahoo's resolve to regain some of the ground that it
has lost in the most lucrative part of the Internet's ad market.

The five-year alliance announced Wednesday will end a decade-old
partnership in the U.S. between Google Inc. and the Mozilla Foundation,
which oversees the Firefox browser. The tensions between Google and
Mozilla had been rising since Google's introduction of the Chrome
browser in 2008 began to undercut Firefox. Google's current contract
with Mozilla expires at the end of this month, opening an opportunity
for Yahoo to pounce.

Even though Chrome is now more widely used, Firefox still has a loyal
audience that makes more than 100 billion worldwide search requests
annually.

Yahoo is hoping to impress Firefox users as the Sunnyvale, California,
company sets out to prove that it's still adept at Internet search after
leaning on Microsoft's technology for most of the results on Yahoo's own
website for the past four years.

Financial details of Yahoo's Firefox contract weren't disclosed. In a blog
post, Mozilla CEO Chris Beard said the new deal offers "strong, improved
economic terms" while allowing Mozilla "to innovate and advance our
mission in ways that best serve our users and the Web."

Google accounted for 90 percent, or about $274 million, of Mozilla's
royalty revenue in 2012. Mozilla hasn't released its annual report for
last year.

Besides dropping Google in the U.S., Mozilla is also shifting Firefox to
Baidu's search engine in China and Yandex in Russia. Firefox users still
have the option to pull down a tab to pick Google and other search
engines as their preferred way for looking up information online.

Yahoo Inc. CEO Marissa Mayer, a former Google executive, hailed the
Firefox agreement as Yahoo's most significant partnership since forging
the Microsoft deal in 2009.

"We believe deeply in search — it's an area of investment and opportunity
for us," Mayer wrote in a Wednesday blog post.

Yahoo plans to unveil a "clean and modern" search engine on Firefox next
month and then roll out the new model on its own website early next year,
Mayer wrote.

The redesign will primarily affect how Yahoo's search engine's results are
displayed, and not the way that requests are processed. The search
technology will continue to be provided by Microsoft Corp. as part of a
10-year deal Yahoo signed in 2009, according to Mel Guymon, Yahoo's vice
president of search.

In various public remarks since becoming Yahoo's CEO two years ago, Mayer
has expressed disappointment with Microsoft's search technology. That has
spurred speculation that she might renegotiate or end the Microsoft
search partnership next year when Yahoo has an option to re-evaluate the
deal. Yahoo currently receives $88 of every $100 in revenue generated
from ads posted alongside the search results on its website.

Those payouts have helped Yahoo boost its revenue from search advertising
for 11 consecutive quarters, compared with the previous year. Despite
those gains, more searches have been shifting to Microsoft's Bing search
engine, causing Yahoo to slip further behind its rivals. Yahoo is
expected to end this year with a 5.6 percent share of U.S. search
advertising revenue, down from 6.6 percent in 2012, according to the
research firm eMarketer.

Yahoo's stock gained 52 cents to $51.10 in extended trading Wednesday.
The shares have been hovering around their highest levels in more than
14 years, largely because Yahoo owns a large stake in Alibaba Group
Holding Ltd., a rapidly growing e-commerce site in China.



Jolla Unveils Tablet, Funded in Less Than Three Hours


During an emotional speech delivered today at the Slush conference,
Jolla's Marc Dillon unveiled the company's next product: the Jolla
tablet, running Sailfish OS 2.0. He launched a crowdfunding campaign for
the tablet, with a goal of $380,000 - which was achieved in less than
three hours (this may be one of the fastest funding consumer electronics
devices ever). I got in early, and was one of the very first people to
back the tablet (just as I was one of the first to back the Jolla phone
a year ago). A second round has already been announced. Big news for
American readers: it'll be available in the US too.

The tablet itself is very similar in specifications to Nokia's N1 tablet,
with an 1.8GHz quad-core Intel processor, 2GB RAM, 2048x1536 330ppi 7.85"
IPS display, 32GB storage, and all the usual sensors and ports you have
come to expect. It's quite light and compact, and has its own design -
there's no way people are going to twist this one into an iPad copy.

The tablet is expected to be delivered to us early backers in May 2015,
and I can't wait. Also, Mr. Dillon, keep rocking that beard.



10 Top Security Threats of 2014 (So Far)


The top security threats of 2014 include equal parts old mistakes, new
adversaries, innocent human nature and the evil that men - and women, and
others - do. 

In 2013, Snowden changed a conversation (and created careers for believers
across a spectrum of dark and light). Some, but not all, survived security
nightmares credited to Blackhole, the SEA, and Cryptolocker. We said
goodbye to Silk Road, and popular consciousness said hello to the mega
retail breach with Target.

In contrast, 2014 turned the dial to 11 for infosec disasters and threats
- and the egos all around them.

It was the year of super mega retail breaches, China coming to the fore
in attacks, Facebook scams getting out of hand, Shellshock and Heartbleed
(who brought a pet POODLE), and application security became the weakest
link through a combination of its own faults and the time-honored
practice of the irresponsible — the blame game.

Let's countdown the top security threats of 2014...

10. Normal people

One email spiked with innocuous-looking malware to a vendor cost Target an
estimated 40 million credit cards and 70 million user accounts at the
crest of 2014, beginning a year which made our own employees, coworkers,
friends and family one of the biggest security threats of the year.

Target's December disaster came from a phishing attack sent to employees
at an HVAC firm it did business with. Phishing is an incredibly popular
attack - because it works. Non-technical people were 2014's favorite
targets for malicious hackers, from data dealing crime rings to
targeted corporate espionage attacks.

IT Security in the Snowden Era

The Edward Snowden revelations have rocked governments, global
businesses, and the technology world. Here is our perspective on the
still-unfolding implications along with IT security and risk management
best practices that technology leaders can put to good use.

F-Secure's Mobile Threat Report Q1 2014 was a bucket of cold water in
terms of just how pervasive attacks on typical users are, and how they
can spread through apps into businesses.

A March report from RAND Corporation "Markets for Cybercrime Tools and
Stolen Data" (commissioned by Juniper Networks) correctly predicted that
in addition to unpatched vulnerabilities, the human element will
continue to increase as the weak point for attacks.

At the end of 2014, 95 percent of IT managers believe that they're
struggling against the biggest threats in the form of mobile devices in
the hands of careless employees.

9. Cloud disasters

It's no surprise that despite the fact that enterprise is rushing to the
cloud, enterprise is terrified when it has to think about cloud security
and trust in the cloud hit an all time low in 2014.

2014 brought big news of serious cloud security breaches, such as the Xen
bug forcing Amazon to reboot its EC2 instances, and Xen making Rackspace
do the same this weekend.

Consumer fears were fanned, investors panicked and Apple stock slipped in
the aftermath of the "celebrity nudes iCloud hack". A well-reported
exploitation of a known problem with Apple's iCloud security saw the
private photos of A-list celebrities published; it was followed with an
attack on China's iCloud customers. Apple made cloud security's image
worse with a come-lately warning to consumers and after the fact
activation of 2FA.

A BT study in September covering 11 countries revealed that more than
three-quarters of IT decision makers are "extremely anxious" about
security using cloud-based services - yet 79 percent of U.S. enterprise
execs (70 percent globally) are adopting cloud storage and web
applications within their business.

8. Application security, aka blame the "other services"

Over seven million online service users had their privacy violated and
their personal information exposed in just two of 2014's big data thefts
- Dropbox and Snapchat - both of which used the blame game to evade
critical PR.

A group of malicious hackers got their hands on 6,937,081 Dropbox account
credentials and published 1,200 usernames and passwords before asking for
Bitcoin to publish even more.

Dropbox issued a statement saying that it had not been hacked, and "These
usernames and passwords were unfortunately stolen from other services and
used in attempts to log in to Dropbox accounts."

Dubbed "the Snappening" by users of the chat forum 4chan, in October a
database containing over 100,000 photos and videos sent across Snapchat
networks was leaked online. A third-party Snapchat client app was to
blame, which was able to steal images after malicious software
installation - exactly what the FCC fined Snapchat for lying about.
Snapchat said it was user's fault for the use of 3rd party apps, then
tried to not look like absolute jerks by saying they were going to ban
3rd party apps like super really hard with a strongly worded letter
from their PR department. In addition to this high-profile attack, the
company apologized after 4.6 million Snapchat usernames and matched
phone numbers were leaked at the beginning of the year.

7. Facebook scams

Check the news yourself: a new Facebook scam was reported roughly once a
week in 2014. Any news headline, scare, or new gadget gets turned into a
Facebook scam. 

A Facebook study by the security company Bitdefender released in late 2014
unearthed 850,000 Facebook scams running on the social network, dividing
into five distinct trends. 

Almost half of the scams pretended to allow users to track their profile
views, an offer the company said was popular among people wishing to see
if former lovers were keeping tabs on them. The problem, researchers
concluded, was that due to Facebook's UI (and possibly its design
intent), users can't tell what's real, and what's not.

The 2014 cost of these scams per year is estimated at "even higher" than
the $12.7 billion global loss to Nigerian scams.

6. The Drupal boogeyman

Drupal nearly won the prize in with a fairly horrible security blunder,
when the Drupal team disclosed a really, really bad SQL injection
vulnerability in Drupal 7 - and warned that unless you patched within
seven hours, you'd be hacked.

Drupal claims a million users on its project site drupal.org, and over
30,000 developers. Many prominent sites, including the whitehouse.gov, use
Drupal.

5. Apple's rot

After years of rubbing its secure operating system in everyone's faces,
Apple finally rode that reputation into the ground in 2014 with a series
of unforgiving security disasters. 

February's Goto Fail: A shockingly overlooked SSL encryption issue left
iPhone, iPad and Mac computer users open to a man-in-the-middle (MITM)
attack and was upsettingly patched in stages. A well-reported
exploitation of iCloud security to ruin the (little) privacy of A-list
celebrities and a too little, too late warning to consumers (as well as
after the fact activation of 2FA) made Apple stocks slide. The attack
on China's iCloud customers. Rootpipe. Patching 144 severe
vulnerabilities in one update. And much more.

Microsoft had a tough year, too. In the immortal phrasing of the Doge
meme - Microsoft: such 0day, many patches.

Microsoft fixed a severe 19-year-old Windows 0day bug found in pretty much
everything since Windows 95, issued a bazillion patches, and revealed a
vulnerability in most versions of Internet Explorer so bad that government
security response teams in the US, the UK, and Sweden urged Windows users
to consider Chrome or Firefox as their default browser until Microsoft
delivered a fix.

4. China

Hackers from - or working for - China took center stage in 2014 as the
role of China's hackers in everything from malware, IP theft and
state-sponsored attacks snowballed in headlines up to the end of the
year. 

In May 2014 the US DoJ indicted five Chinese hackers for committing
economic and cyber espionage against several American companies — hacking
by members of the Chinese military — and it represented the first-ever
charges against a state actor for this type of hacking. All five are
wanted by the FBI but three of them made the FBI's top ten most wanted
hackers list (Wen Xinyu, Huang Zhenyu, and Sun Kailiang).

In July, the CrowdStrike team went public saying that several national
security-based think tanks were compromised in the defense, finance,
legal and government arenas by the Chinese cyberattack group Deep
Panda, which the security researchers called "one of the most advanced
Chinese nation-state cyber intrusion groups." It was only one of
several Chinese hack attacks and groups CrowdStrike found in 2014.

The Chinese government has been accused of backing cyberattacks against
Apple's iCloud, initiated in order to steal user credentials. The finger
has also been pointed at China for the 2014 hacking of the US Postal
System (over 800,000 employees), NOAA, as well as the White House and
US State Department.

3. Shellshock

The Shellshock Unix/Linux Bash security hole emerged in September and
immediately was recognized widely as a serious problem: It was estimated
to potentially affect around half of the internet's websites. Shellshock
serves as a highway for worms and malware to attack Unix, Linux, and
Mac servers, as well as affecting mail servers. The bug had been in the
Bash shell for 20 years and was widely deployed in a configuration that
made it easy to exploit - and it was exploited in the wild within a day
of its public debut.

2. Mega Retail Breaches

2014 started on the tail end of Target's massive breach, then continued
with Home Depot, Kmart, Michael's, Dairy Queen, Staples, Goodwill, Nieman
Marcus, JP Morgan Chase, Verizon, EA Games and many more - heralding the
rise of POS malware. To give you an idea of scale, Home Depot said that
53 million email addresses were swiped in its recent data breach where
56 million credit card accounts were also compromised.

The Identity Theft Research Center's 2014 report summary of data breaches
paints a disturbing picture of 2014 to date - as of October, there have
been 621 known and reported major breaches and 77,890,487 records stolen.

The Banking, Credit and Financial sector saw 24 breaches for 2014, with
1,172,320 records compromised; Business is at a stunning 215 breaches
with 64,407,359 records stolen; Medical/Healthcare has also been hit
hard this year with 263 successful hacks and 7,464,611 records pilfered. 

Research from security analysts at BitSight found that in 2014, the
retail industry encountered an increase in infections in every threat
indicator it monitors. Malware distribution saw the largest increase,
followed by botnet infections. As for the prevalent malware strains,
BitSight says it detected an abundance of Maazben, ZeroAccess, Zeus,
Viknok, Conficker and Cutwail.

A report conducted by Ponemon Institute on behalf of RSA at the end of
2014 confirmed that in the wake of mega breaches, consumers are reaching
a point of "breach fatigue." 

1. 2014's threat theme: White-knuckle flaws in TLS/SSL protocols: Goto
Fail, Heartbleed, POODLE, WinShock

The Hollywood star of SSL's worst year ever was Heartbleed, the OpenSSL
vulnerability that showed up with its own logo and branding - and pissed
off companies when the headline-friendly bug was revealed before patches
could be delivered for it. Google, AWS, and Rackspace were affected by
Heartbleed OpenSSL flaw - but Azure escaped.

Heartbleed is an encryption flaw which can theoretically be used to view
apparently secure communication across HTTPS; the data at risk includes
everything from passwords and encryption keys to financial details and
personal identifiable information - allowing a hacker to dip in, swipe
data, and leave no trace of their existence.

The programmer responsible for code leading to Heartbleed said the flaw
was accidental.

But before Heartbleed, there was Apple's February's Goto Fail, a massive
oversight in SSL encryption that left iPhone, iPad and Mac users open to
MiTM attacks and - in poor form - was patched in stages.

Late in the year Google released 'nogotofail' (named in honor of the
'goto fail' bug that affected Mac and iOS systems in early 2014) a tool
which offers a way to confirm that internet-connected devices and
applications aren't vulnerable to transport layer security (TLS) and
secure sockets layer (SSL) encryption issues, such as known bugs or
misconfigurations.

It was no Heartbleed, but in late fall, Google's Security Team revealed
that the long obsolete, but still all too used, Secure Sockets Layer
(SSL) 3.0 cryptographic protocol has a major security flaw. In an
example attack called Padding Oracle On Downgraded Legacy Encryption
(POODLE), an attacker can steal "secure" HTTP cookies or other bearer
tokens such as HTTP Authorization header contents. According to the
team's Bodo Mller: "This vulnerability allows the plaintext of secure
connections to be calculated by a network attacker." The OpenSSL
Initiative issued a patch.

Microsoft got invited to the SSL-in-Hell party as 2014 came to a close.
November's Patch Tuesday for Microsoft disclosed vulnerability
CVE-2014-6321, named by the community "WinShock" - a severe 19-year-old
Windows 0day bug found in pretty much everything since Windows 95;
Microsoft reports that the SChannel security package is vulnerable on
both Windows servers and clients (SChannel is a Security Support
Provider (SSP) that implements SSL and TLS authentication protocols.)

2015: The year ahead

Lessons cyberdefense may be able to teach us about managing Ebola
Hacked: The six most common ways non-tech people fall victim
FBI Director: Mobile encryption could lead us to 'very dark place'
Average company now compromised every four days, with no end to the
cybercrime wave in sight

It's easy to see which of 2014's big bad threats will be confined to
2014, and which will continue if things don't improve in security
education for the ordinary user (especially BYOD attacks), application
security, blame games and accountability problems among startups, and
the security practices of retailers.

Other things not mentioned on this list are sure to see an increase -
such as the tanking state of Android security in 2014 and the
end-of-year realizations about Android malware (responsible for
70 percent of all mobile attacks in 2014).

Healthcare security will most certainly be in 2015's attack spotlight: A
late 2014 report from BitSight Technologies analyzed the cybersecurity
practices of companies on the S&P 500, with those in the healthcare
sector coming in at the bottom of a four-industry pack.

It's also easy to predict that 2015 will see attacks increase in trends
toward larger Internet of Things (IoT) attacks: A late 2014 report
shows 95 percent of enterprise are stressed about IoT security.

The end of 2014 saw the FTC shut a scam security company that duped
consumers out of $2.5 million by falsely detecting computer viruses
and selling bogus antivirus software: With hacking, surveillance and
retail breaches in every other headline, we can expect to see much
more of this in 2015.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top

  
of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT