Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 17 Issue 31

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 17, Issue 31 Atari Online News, Etc. August 21, 2015


Published and Copyright (c) 1999 - 2015
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1731 08/21/15

~ Firebee Update News! ~ People Are Talking! ~ Pac-Man 256!
~ China Cleaning the Web ~ Amazon Bans Flash Ads! ~ Hotspot Disabler Fined
~ Farewell to Xbox 360? ~ Atari Coldfire Project ~ Facebook Tops Pack!
~ Stop Using Ad-blockers ~ ~ US Delays ICANN Plan

-* Cheating Site Includes Pols! *-
-* ‘Facebook Spreader’ Hacker Pleads! *-
-* Meet The World’s Most Dangerous Geeks! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Well, I have this week’s issue out at a reasonable time, but we’re still running into “problems” doing
a few things with the magazine. As I mentioned last week, I had some problems with my PC. Turns out
that the problem is the motherboard is shot. So, I’m looking to replace the PC. I’ve been trying to
produce the magazine using Mac software, but I haven’t been as successful as I’d like. Using the PC
for a number of years, I’ve been accustomed with various PC tools to get everything done, and done
efficiently and well! So, until I work things out using the Mac, or replace the PC (and software),
the magazine may not look exactly as it has in the past. And, I haven’t been able to fine-tune the
web versions, so those will not be available for awhile!

Until next time…



=~=~=~=



Firebee Update News


Not a whole lot to report in this installment.  Last submission I discussed my failed CF Card, what I went through to finally getting that resolved to be up and running in MiNT.  Since then I have just been exploring the software that comes in the FireBee MiNT setup.  I have also been testing out my favorite Atari software that I used years ago on my TT on the FireBee.  Lastly I have been trying out newer Atari software that I have been coming across and trying that out too.

Here is some feedback on my limited use of the FireBee up to this point.

Things I like :

Speed – The FireBee feels fast to me with the software I am running on it so far.
Networking – With any computer I am using now having TCP/IP and Ethernet is a must.  Currently the only network activity I have been doing is surfing the Web with the included NetSurf browser and HighWire browser.  I have not setup an email client yet or tried to connect to any computers on my network.

USB – Though I haven't tried a thumb drive yet being able to use many USB keyboards and mice is nice.  Just think of if you spill something on your keyboard or it just quits.  You can use just about any USB keyboard and get it cheaply.  Plus if you don't like the feel of the keyboard you can easily swap it out with one you like.

Video Modes -  To me the Atari line of computers always had strange video resolutions.  I understand that there was the 32K limitation on the ST and the TT and Falcon had more capability but still on my TT 640x480x16 colors was not ideal for me.  Once I acquired an Atari  TTM195 1280x960x2 color monitor I mostly used that because of the higher resolution.  With the FireBee the limitation I am facing is the monitor and not the FireBee.  Currently I am using a 15 inch LCD that can do 1024x768.  Yes I would like to run a higher resolution but I do not have any larger spare monitors laying around right now.

Computer Case – I like the looks of this case.  Someone put a lot of effort in the design of the case.  All the ports are clearly marked.

Support : As you have read I did run into some initial problems with the Firebee.  Some of it was my own doing and some of it was not.  I got great support from the user community.  Initially via email directly from the ACP web site and now mostly through http://www.atari-forum.com/ forums.  User community support has been great with the questions I have asked.

Complaints :

Video - Really the only one complaint I have with the FireBee is the screen scrolling.  It is not as smooth as it is on other computers I am using.  Depending on how much I have on the screen it can get jerky when scrolling.  I am running 1024x768x32bit.  I have read a couple of threads on this.  I don't have them book marked or can find them right now so I can't share them in this submission.  In simple terms it has to deal with the optimization of the video routines.   Once someone gets this resolved a simple Firmware update to existing FireBees will fix this.

Lastly as already posted in the news section of AONE on August 15, 2015 was the relaunch of the much improved FireBee.org Website.  The site now has much more and better formatted information on the FireBee.  More exciting is that after over a year of no FireBee's being available for purchase pre-orders on the 2nd Series FireBee is going on right now.  If you had an interest in purchasing a FireBee but couldn't get one now is the time to pre-order one.  For more information on on the FireBee or to pre-order please go to http://firebee.org/



The Atari Coldfire Project


The Atari Coldfire Project proudly presents:

http://firebee.org



=~=~=~=



->In This Week's Gaming Section - Retail Video Game Industry Bidding Farewell to Xbox 360, PS3
""""""""""""""""""""""""""""" Chomp Forever in Addictive ‘Pac-Man 256’!





=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Retail Video Game Industry Begins Bidding Farewell to Xbox 360, PS3


The end of an era is upon us.

Microsoft's Xbox 360 and Sony's PlayStation 3 video game consoles are on their way out and the game industry appears ready to move on.

That's according to the data in the latest report from industry tracker NPD Group.

After more than a year and a half of fluctuations and uncertainty with the arrival of new hardware from Microsoft and Sony, the US retail game industry grew in July - its second consecutive month of growth, according to NPD. Overall sales of game hardware, software and accessories grew 6 percent while hardware sales rose 2 percent, despite a steep 56 percent dropoff in sales of the older Xbox 360 and PS3.

Such a dropoff has in previous months dragged hardware sales down into double-digit declines on a percentage basis. But sales of the newer Xbox One and PlayStation 4 consoles are starting to offset those declines.

The end of the Xbox 360 and PS3 has been a long time coming, with Microsoft publicly stating that support for its console will end next year, while Sony has hinted that it will follow suit. Meanwhile, many game makers have publicly dropped support for older consoles. For instance, Electronic Arts' upcoming Star Wars Battlefront space shooter with be available only for the Xbox One, PS4 and PC. The sharp dropoffs in older hardware sales reflect the lack of consumer enthusiasm for the near-decade-old devices.

Since the introduction of new game hardware from Microsoft and Sony in November 2013, the retail game industry has been struggling to stabilize itself as it transitions away from old hardware, released almost 10 years ago, to new devices released in the past two years. Sales of these upgraded consoles have been strong, but software sales have fluctuated. On the whole, game sales have tended to fall from year-ago comparisons as the industry waited for a larger number of consumers to upgrade to new hardware, which has been dependent on game makers offering compelling reasons to upgrade.

That appears to be changing now, as both newer hardware and software sales for those devices begin taking up a larger chunk of the overall market. Last month, sales of software for the Xbox One and PS4 grew 63 percent year over year, NPD said.

Software sales of games on discs on the whole remained flat at $184.4 million due to a lack of new games in the middle of the summer season. The best-selling retail game of the month was Warner Bros.' toy-film hybrid Lego: Jurassic World, followed by Warner Bros.' other big summer hit, the comic-inspired Batman: Arkham Knight in second. Microsoft's pixel-building game Minecraft came in third.

Although overall game console sales rose only 2 percent in July to $202.1 million from this time a year ago, sales of newer hardware like the Xbox One grew 9 percent. "After 21 months, combined Xbox One and PS4 hardware unit sales are close to 50 percent higher than the combined sales of Xbox 360 and PS3 after 21 months on the market," NPD analyst Liam Callahan wrote.

Sony was pleased with the results in July thanks mostly to a special bundled version of its PlayStation 4 along with Batman: Arkham Knight. The PlayStation 4 was yet again the top seller last month, the company said in a statement.

Sony expects the momentum to continue into the fall as it preps yet another hardware bundle with Activision Blizzard's space shooter Destiny, which releases a large update in September.

Microsoft said sales of its Xbox One console were up 44 percent year over year in July, yet it still fell behind Sony, which has brokered deals with big-name game makers to get exclusive hardware bundles like Destiny and Batman. Microsoft, however, is gearing up for a hardware boost of its own with the release of the next installment in its acclaimed sci-fi shooter franchise Halo in October.

As has been the case in previous months, sales of games over the Internet are an even brighter spot for the industry. SuperData Research, which tracks sales and deliveries over the Internet of games and game add-ons, said the market grew 12 percent in July to $1.03 billion year over year.

"The biggest growth drivers in July were mobile and PC, which combined accounted for about 60 percent of the total digital games market," wrote SuperData CEO Joost van Dreunen.



Chomp Forever in Addictive ‘Pac-Man 256’


You’ve played Pac-Man. You’ve played Ms. Pac-Man. You might have even played the ridiculous Baby Pac-Man, or the incredible Pac-Man Championship Edition DX, or the atrocious Pac-Man Party, which made your terrible bar mitzvah party look like the awesome one from Weird Science.

But if you’re hungry for a few more Power Pellets, then by all means, go download Pac-Man 256 (free for iOS, Android, and Amazon devices) immediately. Because it’s unlike any Pac-Man game you’ve ever played.

For starters, the game’s maze never ends. Pac-Man 256 is essentially an endless runner (or, rather, eater), which means you keep playing until you die. In this case, that means waka-waka-waka-ing through a gigantic, dot-filled hallway stretching out to infinity while staying one chomp ahead of an ever-encroaching wave of glitches.

That, incidentally, is a homage to the original Pac-Man’s infamous level 256, also known as the game’s “kill screen.” Upon reaching this level (a feat in itself), a line of garbled code mars half the screen and renders the game unplayable. In this case, it serves to propel you forward.

What makes this not a total snoozefest is some brilliant design choices by developer Hipster Whale, best known as the company behind the similarly structured megahit Crossy Road.

You’ll be chased by ghosts, naturally, but they behave strangely. Occasionally they’ll appear in a line or emerge from a glitch cloud. Classic Pac-Man fruits like cherries and peaches are now score multipliers. Power Pellets still turn the ghosts blue, but even handier are random power-ups like a wicked laser beam and a freeze bomb. Forget trying to gobble every last dot: Pac-Man 256 is about surviving as long as possible in order to rack up a high score and show up your friends on the leaderboard.

Perhaps what I like best is that the free game’s in-app purchase model doesn’t get in the way. You get play credits every 10 minutes, but even if you run out, you can still play, just without using power-ups. Or you can fork over some cash to either buy new credits or get rid of the credits system entirely. I wouldn’t bother with that, though. You’ll get plenty of play out of this game without spending a dime.

Of course, I say that now. In two months I might be a few hundred quarters deep into this clever, addictive take on Pac-Man. Heaven knows it wouldn’t be the first time I spent too much money on the yellow blob.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Meet The World’s Most Dangerous Geeks


Jeff Moss was desperately hunting for a back door. But this time, the DEF CON founder wasn’t trying to hack his way into a network — he was seeking an actual back door, a way to avoid the masses at the Las Vegas hacker fair he launched 23 years ago.

This year, attendance would top 20,000 — and all of them seemed to be crammed into the hallways of the Paris hotel, inching their way toward massive conference rooms to learn how things like Android phones and connected cars can be attacked and pwned.

Moss tried to dart through a gift shop in the Champagne Ballroom that was selling DEF CON paraphernalia. The doors were blocked. He looked for a rear exit in the Versailles Ballroom next door. No dice. Rerouting, he attempted to swing wide around an information kiosk in the center of the walkway but ran smack into a wall of humanity.

Moss finally had to wedge his way into the thousands heading in the opposite direction, as DEF CON veterans greeted him with fist bumps and cries of, “Hey DT!” (His hacker handle is Dark Tangent.) At 40, Moss doesn’t look all that different from the teenager who was blown away by the film WarGames and decided to create a conference for like-minded souls. As he tried to hack his way through the crowd, he was verbally debugging the process that had turned his gathering of geeks into the crowd scene from The Day of the Locust.

Jeff Moss, aka Dark Tangent, holding the Uber badge given away at DEF CON 23. (Photo: Dan Tynan/Yahoo Tech)

“This is the first break of the first day in a new hotel — that’s why this is so screwed up,” he muttered. “We’ve got to create lanes flowing in each direction and make sure each track breaks at different times.”

It was yet another sign that hacker culture — even at an enter-at-your-own-peril event like DEF CON — has gone bigtime.

DEF CON started in 1993 as a farewell party in Las Vegas for one of Moss’s hacking friends, who was leaving the country. Moss turned it into a conference/party for roughly 100 fellow hackers he had met via electronic bulletin boards. DEF CON 1 (it got its name from WarGames) debuted with a handful of talks with titles such as “To Hack or Not to Hack” and “Future of the Computer Underground.”

The next year, Moss decided to hold the conference in Vegas again. Attendance doubled. The year after, attendance grew again. By 1997, DEF CON had become so popular among security professionals that Moss created a second conference just for them, called Black Hat. (That name is ironic: In the hacking universe, “black hats” are the bad guys, the ones who launch cyberattacks for personal gain or simply to be destructive.)

In its 23rd year, DEF CON is now recognized as the ultimate meetup for hackers and hacker wannabes. This year’s conference featured more than 100 presentations on a huge range of topics, the public demonstration of several headline-making exploits, and elaborate warnings designed to keep naive newbies at a safe distance.

“It’s wise to consider the public network at DEF CON profoundly hostile,” conference organizers warned in an email, offering a long list of other precautions:

• Do not bring a phone. If you must bring one, make it a disposable “burner” with no personal data on it. If you must bring a smartphone, leave it in airplane mode. Do not attempt to connect it to any networks.
• Do not plug your computer into any randomly placed network cable or your phone into someone else’s charger — they could be rigged to steal your information.
• Do not attempt to log on to the conference Wi-Fi network; you could find your name projected onto the Wall of Sheep, where hackers post unencrypted logins and passwords.
• Bring cash. If you bring a credit card, put it inside a radio-blocking pouch; otherwise, a hacker could use a scanner to read the numbers off its RFID chip. The same goes for your hotel room key.

A security-savvy colleague of mine went even further, warning me that hackers could target me in my own hotel — a solid half-mile from the conference.
“Leave your laptop in your hotel room unplugged and turned off,” he said. “Sleep mode isn’t good enough; it needs to be powered down.”

My DEF CON survival kit: a disposable phone, a credit card shield, my press badge/record, the show guide, and a vanilla laptop containing no personal information of any kind.

For these and other reasons, DEF CON will never be confused with more corporate security conferences. Everything at DEF CON has its own perverse twist, even down to the badges worn by attendees. This year’s model was a 7-inch vinyl record, color-coded to indicate status: red for conference official, blue for speaker, yellow for media, white for everyone else.

Dozens of attendees showed up with turntables to play the badge. (You can listen to the recordings here.) On one side was a voice-altered recitation from the Hacker’s Manifesto followed by a long series of numbers and touchtones. On the flip side, Dual Core’s rap tribute to hacking, “All the Things.”

“This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.”

DEF CON is best known for some occasionally dramatic presentations on security vulnerabilities. This year’s talks included “Scared Poopless — LTE and Your Laptop,” “Confessions of a Professional Cyber Stalker,” and “I Will Kill You” (how to hack public records to indicate someone has died).

Beyond that, DEF CON offers a series of “villages,” where attendees can learn how to pick locks, unseal and reseal tamperproof packaging, hack into smart appliances, talk their way out of interrogation rooms, and more. It’s like a Renaissance faire for uber-geeks.

True to its WarGames heritage, the conference is also filled with games and contests — like Capture the Flag, where 15 teams spend 72 hours attempting to commandeer a network server and then defend it against other attackers, or Hacker Jeopardy, where contestants answer nerdy questions while drinking copious amounts of beer and being assaulted with silly string before an audience of 2,000.

Winners of the most difficult contests at DEF CON 23 receive a custom glow-in-the-dark Uber badge, allegedly containing trace elements of uranium 238 and trinitite left over from the first nuclear tests at Los Alamos. They also earn a free pass to all subsequent DEF CONs for the rest of their lives.

Show DEF CON attendees a lock, and they will pick it. Give them an encrypted password, and they will crack it. Present them with an allegedly secure network, and they will prove that it’s a lot more porous than you think. Whether they’re white hats, black hats, or somewhere in between, DEF CON attendees gleefully embrace their own outlaw image. That has led to a complicated relationship with both government and big business.

In 2001, the FBI arrested Russian hacker Dmitry Sklyarov at DEF CON shortly after he demonstrated how to circumvent the encryption built into Adobe’s e-book reader. In 2005, Cisco attempted to prevent security researcher Michael Lynn from presenting a talk on vulnerabilities inside the company’s network routers. Three years later, the Massachusetts Bay Transit Authority sued three MIT students to keep them from revealing how they managed to hack Boston’s transit system to ride for free.

Some corporations — but not all — have realized it’s better to have these people as friends than as potential enemies, and now reward researchers for identifying security bugs inside their products.

In October 2014, after security researchers Charlie Miller and Chris Valasek successfully gained control of a 2014 Jeep Cherokee via the Internet, they privately broke the news to executives from Fiat Chrysler Automobiles (FCA). Months later, after FCA had done nothing to address the problem, the pair shared their findings with Wired journalist Andy Greenberg. Within a week of the Wired story appearing, FCA issued a recall for the 1.4 million cars affected by the vulnerability. Miller and Valasek presented their findings at both DEF CON 23 and its more buttoned-down sibling, Black Hat.

At last year’s DEF CON, the duo revealed a list of 16 Chrysler and GM cars that could be vulnerable to attack; the Jeep was the most promising candidate.  

“If Chrysler had attended DEF CON a few years ago, they could have saved themselves a boatload of money [from the recall],” says Winn Schwartau, a security consultant and author who says he’s attended every DEF CON since the first in 1993.

After the Tesla Model S was hacked, the company worked with researchers to patch the holes they found.

By contrast, when Marc Rogers and Kevin Mahaffey demonstrated how to hack the internal network of a Tesla Model S, the electric carmaker proved far more welcoming. The company loaned a Model S to this year’s Car Hacking Village, and Chief Technical Officer JB Straubel shared a celebratory shot of whiskey on stage with the researchers — a DEF CON ritual normally reserved for first-time speakers.

The show’s relationship with the federal government is even more complex. After years of encouraging the game “Spot the Fed,” where attendees would identify government employees quietly lurking in their midst, the show became fertile recruiting territory for three-letter federal agencies seeking to boost their cyber-IQ. In 2012, former National Security Agency Director Gen. Keith Alexander even delivered a keynote address. A year later, after Edward Snowden revealed that the agency spied on millions of American citizens, Moss politely requested that the feds refrain from attending.

Lately, Uncle Sam’s wary relationship with hackers appears ready to thaw, at least at some agencies. This year, the Federal Trade Commission presented a talk titled “How to Hack Government: Technologists as Policy Makers.” For the past two years, the agency also asked DEF CON attendees to help them develop apps to monitor and trace robocalls.

“Technologists can and should play a vital role in shaping tech policy,” says FTC Commissioner Terrell McSweeny. “A lot of people who attend DEF CON and are in the security research community connect with the FTC’s mission to protect consumers. So we made a pitch to them to either join us (literally, apply for a job) or help us (come tell us about their research).”

During his keynote, Moss asked a packed room how many were there for the first time. Roughly a third of us raised our hands. In fact, attendance was 25 percent higher than last year, according to show organizers.

The fact is, hacking has gone mainstream — at least in pop culture. But the image of hackers that comes out of Hollywood is, Moss says, highly romanticized.

“In the early days, any time a movie or TV show had a hacking reference we all got really excited about it — ‘Oh my gosh, somebody knows what we’re doing,’” he says. “Now there’s a token hacker in every show who’s just there to tap on a keyboard and move the plot along.”

In Mr. Robot, actor Rami Malek plays Elliot Alderson, a socially awkward security engineer turned hacker vigilante.

(The exception, says Moss: USA Network’s Mr. Robot, which features a vigilante hacker who makes up in social conscience what he lacks in social skills. That, Moss says, is probably the closest the entertainment industry has come to getting it right.)

And while the network at DEF CON may be “profoundly hostile,” the attendees are not. It’s still a relatively small tribe, but it’s growing, with membership open to anyone with intense curiosity and a high tolerance for geekiness.

“The world needs to quit being so scared of these guys,” says Schwartau. “The perception that this group is the one doing the breaches at Home Depot or Sony or Target is just wrong, wrong, wrong. The people who go to DEF CON are the cyberpriests, trying to keep things honest.”

In short, hackers deserve respect. And if they’re not careful, one day they may even get it.




Hacker Pleads Guilty to 'Facebook Spreader' Scam


A New Yorker who infiltrated thousands of computers in order to run a lucrative spam bot pleaded guilty in U.S. District Court.

Eric Crocker, of Binghamton, N.Y., was one of a dozen people charged over the summer for his participation in a computer hacking forum known as Darkode.

Operating under the pseudonym "Phastman," the 29-year-old pleaded guilty on Monday to one count of violating the CAN-SPAM Act. He used a hacking tool called Facebook Spreader, which infected Facebook-connected PCs and turned them into bots. Crocker then sold access to his bot, which scammers used to send out massive amounts of spam.

According to a Reddit post submitted a year ago, the virus sends a Facebook message to the affected users' friends, with an attached malware file that runs as soon as it's clicked. Cybercriminals then bought, sold, traded, and shared information and tools on the password-protected Darkode forum.

Crocker and other hackers made about $200 to $300 for every 10,000 computer infections, according to Reuters, a scheme that likely earned Crocker upwards of $21 million.

He now faces up to three years in prison or a fine of $250,000, possibly both, the FBI said. Sentencing is scheduled for Nov. 23.

"This operation is a great example of what international law enforcement can accomplish when we work closely together to neutralize a global cybercrime marketplace," Assistant Attorney General Leslie Caldwell said in July.



Cheating Website Subscribers Included WH, Congress Workers


Hundreds of U.S. government employees — including some with sensitive jobs in the White House, Congress and law enforcement agencies — used Internet connections in their federal offices to access and pay membership fees to the cheating website Ashley Madison, The Associated Press has learned.

The AP traced many of the accounts exposed by hackers back to federal workers. They included at least two assistant U.S. attorneys; an information technology administrator in the Executive Office of the President; a division chief, an investigator and a trial attorney in the Justice Department; a government hacker at the Homeland Security Department and another DHS employee who indicated he worked on a U.S. counterterrorism response team.

Few actually paid for their services with their government email accounts. But AP traced their government Internet connections — logged by the website over five years — and reviewed their credit-card transactions to identify them. They included workers at more than two dozen Obama administration agencies, including the departments of State, Defense, Justice, Energy, Treasury, Transportation and Homeland Security. Others came from House or Senate computer networks.

The AP is not naming the government subscribers it found because they are not elected officials or accused of a crime.

Hackers this week released detailed records on millions of people registered with the website one month after the break-in at Ashley Madison's parent company, Toronto-based Avid Life Media Inc. The website — whose slogan is, "Life is short. Have an affair" — is marketed to facilitate extramarital affairs.

Many federal customers appeared to use non-government email addresses with handles such as "sexlessmarriage," ''soontobesingle" or "latinlovers." Some Justice Department employees appeared to use pre-paid credit cards to help preserve their anonymity but connected to the service from their office computers.

"I was doing some things I shouldn't have been doing," a Justice Department investigator told the AP. Asked about the threat of blackmail, the investigator said if prompted he would reveal his actions to his family and employer to prevent it. "I've worked too hard all my life to be a victim of blackmail. That wouldn't happen," he said. He spoke on condition of anonymity because he was deeply embarrassed and not authorized by the government to speak to reporters using his name.

The AP's analysis also found hundreds of transactions associated with Department of Defense networks, either at the Pentagon or from armed services connections elsewhere.
Defense Secretary Ash Carter confirmed the Pentagon was looking into the list of people who used military email addresses. Adultery can be a criminal offense under the Uniform Code of Military Justice.

"I'm aware it," Carter said. "Of course it's an issue because conduct is very important. And we expect good conduct on the part of our people. ... The services are looking into it and as well they should be. Absolutely."

The AP's review was the first to reveal that federal workers used their office systems to access the site, based on their Internet Protocol addresses associated with credit card transactions. It focused on searching for government employees in especially sensitive positions who could perhaps become blackmail targets. The government hacker at the Homeland Security Department, who did not respond to phone or email messages, included photographs of his wife and infant son on his Facebook page.

One assistant U.S. attorney declined through a spokesman to speak to the AP, and another did not return phone or email messages.

A White House spokesman said Thursday he could not immediately comment on the matter. The IT administrator in the White House did not return email messages.

Federal policies vary for employees by agency as to whether they would be permitted during work hours to use websites like Ashley Madison, which could fall under the same category as dating websites. But it raises questions about what personal business is acceptable — and what websites are OK to visit — for government workers on taxpayer time, especially employees who could face blackmail.

The Homeland Security Department rules for use of work computers say the devices should be used for only for official purposes, though "limited personal use is authorized as long as this use does not interfere with official duties or cause degradation of network services." Employees are barred from using government computers to access "inappropriate sites" including those that are "obscene, hateful, harmful, malicious, hostile, threatening, abusive, vulgar, defamatory, profane, or racially, sexually, or ethnically objectionable."

The hackers who took credit for the break-in had accused the website's owners of deceit and incompetence, and said the company refused to bow to their demands to close the site. Avid Life released a statement calling the hackers criminals. It added that law enforcement in both the U.S. and Canada is investigating and declined comment beyond its statement Tuesday that it was investigating the hackers' claims.



China Vows To “Clean The Internet" in Cybercrime Crackdown, 15,000 Arrested


The Ministry of Public Security in China said this week that 15,000 people have been arrested since the launch of a major anti-cybercrime operation called "cleaning the internet."

So far, the six-month operation, launched in July, has produced investigations of over 7400 cases of cybercrime and 66,000 websites.

In an announcement on its website, the ministry said the arrests were for crimes that "jeopardized internet security," and described in detail a handful of cases, ranging from network attacks and website intrusions to sophisticated frauds.

Two of the investigations cited involved hacking websites to display advertising for gambling sites: the compromised websites included a pharmaceutical company and more than 40 "important news sites."

The ministry also described one case where hackers used phony ads on Baidu, China's largest search engine, to scam people who thought they were calling an airline customer service line.

Another case involved hackers sending mass SMS messages containing malicious links to take control of mobile devices.

That case sounds a lot like one we reported on Naked Security in August 2014, where a Chinese teenager was arrested for spreading a mobile SMS virus that infected 100,000 mobile devices.

The ministry said another investigation resulted in the arrests of six members of a gang responsible for sending massive amounts of SMS spam from Wi-Fi base stations.

In a similar case last year, Chinese authorities arrested over 1500 SMS spammers who used mobile base stations to blast mobile phones in range with text messages.

According to a report from Reuters, the current crackdown also targets websites providing "illegal and harmful information" as well as ads for pornography, firearms and explosives.
Although the ministry said the campaign is focused on crushing organized cybergangs in the country, some analysts suspect China's broad cybercrime law could sweep up activists and dissidents along with the crooks.

While China's strict internet censorship rules prohibit Chinese citizens from accessing many foreign websites - a policy enforced by the "Great Firewall" - speech is also censored in the Chinese media and on Chinese social networks.

China's internet censorship laws allow the police to shut down websites that spread "false rumors" or "incite panic."

According to Al Jazeera, the Cyberspace Administration of China shut down or suspended dozens of news websites for spreading false information about the recent chemical explosions in the port city of Tinjian that left more than 100 people dead.

In what seems like an attempt at transparency, Chinese police launched an "internet inspection" branch in June of this year, consisting of police in 50 cities using public accounts on social networks such as WeChat and Weibo.

These officers will "deter and prevent cybercrimes and improper words and deeds online," while also accepting crime tips and warning those involved in "minor offenses," according to the government-run news agency Xinhua.

In 2015 alone, Chinese authorities have deleted 758,000 pieces of "illegal and criminous information" from Chinese websites, and have investigated over 70,000 cases of cybercrime, Xinhua reported.



Amazon Bans Flash Ads - But Not for the Reason You May Have Hoped!


Websites with cool interactive content like games used to go for Java.

By embedding a special sort of Java program called an applet in your website, you could add a bit more pizazz than your competitors could manage with plain old HTML.

Then came Adobe Flash, using a programming language called ActionScript instead of Java, but with the same ultimate idea: multi-platform, cross-browser, web-based, real-time, on-line multimedia coolness.

There were downsides to Java and Flash from the start, of course, namely that:
• They were "someone else's" standards, rather than web ones.
• They required you to install and manage additional plugins in your browser.
• They inevitably opened up additional security holes.
• Cybercrooks fell in love with Java and Flash security holes because they often worked in every browser, leading to true "cross-platform" attacks.

Eventually, browser makers and web standards-setters agreed on an alternative approach, called HTML5, that would (or at least could) make both Java and Flash redundant by giving web programmers a way to do cool multimedia stuff right inside the browser.

As a result, these days you can just use JavaScript in your interactive web pages, instead of using Java or ActionScript.

→ Java and JavaScript are completely different. As a recent Naked Security commentator pointed out, "Java" and "JavaScript" are no more strongly related than "Car" and "Carpet." They simply start with the same letters.

Sure, HTML5 increases the so-called "attack surface area" of your browser because there are now more tricks you can pull off with JavaScript, and there is more code in the background to go wrong.

But every modern browser supports JavaScript and HTML5 anyway; HTML5 can do the job of Java and Flash; and many if not most websites support HTML5, even if they also support Java or Flash.

Simply put, almost all of us can live without Java or Flash in our browsers, almost all of the time.

Indeed, most of us do live without Java in our browsers these days, because Oracle, which owns Java, no longer enables the Java applet web browser plugin by default when you install the Java product.

Java is mainly used for applications, full-blown software programs that you install locally, so support for in-browser applets is rarely necessary these days.

But Flash has proved harder to eject from the world's browsers, with lots of people keeping it installed and turned on, and often insisting that they need it, even when they don't.

Apple was the first big brand name to take against Flash in a big way, by the simple expedient of banning it altogether on iPads and iPhones.

If you have an iDevice, you don't have Flash, and that's that: it's all done with HTML5 instead.

Facebook jumped into the anti-Flash wars recently, too, with its newly-appointed CSO coming out swinging on Twitter.

Alex Stamos publicly demanded that Adobe should act to kill off Flash, and to set a date by which all browsers would refuse to support it.

Of course, that was just a Twitter rant.

Facebook doesn't yet seem to share its CSO's strident views, because the company didn't back him up, and still makes use of Flash in your browser if you have it installed.

That's annoying for those who want to convince the world that Flash is largely superfluous, and thus an unnecessary security risk.

Sites that use Flash "because they can", instead of just moving to HTML5 for everything, tend to reinforce users who still think they need Flash, even when turning it off would make no visible difference.

So Flash naysayers will welcome Amazon's recent announcement:

Beginning September 1, 2015, Amazon no longer accepts Flash ads on Amazon.com, AAP, and various IAB standard placements across owned and operated domains.

This is driven by recent browser setting updates from Google Chrome, and existing browser settings from Mozilla Firefox and Apple Safari, that limits Flash content displayed on web pages. This change ensures customers continue to have a positive, consistent experience across Amazon and its affiliates, and that ads displayed across the site function properly for optimal performance.

Interestingly that Amazon hasn't gone all out by banning Flash because of its security risk - the "added attack surface area" it brings to your browser.

Amazon is blaming, if that's the right word, three of the world's Big Four browsers instead, because they no longer play Flash ads automatically by default.

Indeed, Amazon's explicit reason for ditching Flash seems to be that it will improve the consistency of your ad-viewing experience, meaning that your browser's "click-to-play" Flash option will no longer act as a sort-of implicit ad blocker.

Ironically, even though Amazon's announcement means that some users will start seeing ads that didn't appear before, it may actually help to distance Amazon from Adobe's recent (and rather unpopular) suggestion that ad blockers are a Bad Thing and could cost our economy $22,000,000,000 this year.

Nevertheless, Amazon has banned Flash ads, and that's that!



FCC Fines Company $750,000 for Disabling Conference Hotspots


The US Federal Communications Commission (FCC) has fined a telecommunications company a whopping $750,000 (nearly £500,000) for blocking consumers' Wi-Fi "personal hotspots" at convention centers around the country.

The FCC announced the fine on Tuesday, saying that Smart City Networks had been blocking personal hotspots being used by convention visitors and exhibitors who used their own data plans rather than paying Smart City "substantial fees" to use its Wi-Fi service.

Most modern mobile phones have a connection-sharing option (personal hotspot on iOS, portable hotspot on Android and internet sharing on Windows Phone) that lets you hook up one or more devices to the phone via Wi-Fi, and then connect onwards to the internet via the phone's 3G or LTE data connection.

The FCC's release quotes Travis LeBlanc, Chief of its Enforcement Bureau:

It is unacceptable for any company to charge consumers exorbitant fees to access the Internet while at the same time blocking them from using their own personal Wi-Fi hotspots to access the Internet.

All companies who seek to use technologies that block FCC-approved Wi-Fi connections are on notice that such practices are patently unlawful.

The company's response: "We didn't know that!"

Smart City said in a release that it hadn't known that it was against FCC rules to use standard, out-of-the-box technology in order to prevent wireless devices from disrupting the operations of neighboring exhibitors on convention floors, having received no prior notice before the FCC contacted it in October 2014.

That's also when the FCC slapped Marriott with a $600,000 fine (nearly £400,000) for blocking Wi-Fi access at its Gaylord Opryland Resort and Convention Center in Nashville, Tennessee.

Marriott didn't go down without a fight: it banded together with the American Hotel and Lodging Association to try to talk the FCC into changing the rules and allowing it to keep blocking personal hotspots.

Marriott gave in and stopped blocking hotspots in January 2015, although it said at the time that it was going to keep on trying to get the FCC's blessings on blocking.

The hotel chain maintained that it hadn't intended to block personal hotspots in guests' rooms or in lobbies, but that it was asking the FCC to allow the practice in conference rooms or other meeting spaces.

"It's all about Wi-Fi security," Marriott said: specifically, ensuring that guests using its Wi-Fi were protected from rogue wireless hotspots that it said could degrade service, from "insidious cyber-attacks", and from identity theft.

"Riiiiight," skeptics said, "it's about security, not about what the FCC said was a charge of $250 to $1,000 per device to get onto the internet at a Marriott property."

For its part, Smart City said that blocking hotspots resulted in "significantly less" than 1% of all devices being deauthenticated and that these same technologies are "widely used by major convention centers across the globe as well as many federal agencies."

While Smart City thinks it has legal standing to fight the fine, its president, Mark Haley, said in the company's release that the battle would be too costly and too much of a distraction.

But even if Smart City thinks it might have had a chance to fight, given that its case goes back to 2014, there's no way to say "I didn't know that" any more.

Back in January 2015, the FCC published DA 15-113A1, its first Enforcement Advisory of the year.

Let's just say that this notice didn't exactly mince its words:



Sites Try Polite Approach in Asking Readers To Stop Using Ad-blockers


Ad-blocking has become one of the main scourges of the online publishing and advertising industries.

Software tools that can detect web advertisements and then block them from users’ view have become increasingly popular as consumers fret about things like data collection or the glut of advertising slowing down Web pages.

But ad-blockers have become a major problem for publishers because most of the free content distributed online is supported by advertising revenue. One recent report suggested the issue would lead to $22bn in lost revenue this year as one out of three internet users now employed some software to block ads.

As ad-blocking spreads across the internet, publishers have tried different strategies to deal with the problem, everything from completely disallowing ad-blocking users from viewing content on their sites to paying anti-ad-blocking firms to block the blockers.

Some publishers, however, have taken a softer approach: appealing directly to readers.

For instance, Wired in recent months has tested various versions of diplomacy, asking readers to "please do us a solid and disable your ad-blocker". The message appears on the Web page where an ad normally would.

"We figured the best place to start with that is just to ask," said Mark McClusky, head of operations at Wired, which is owned by Condé Nast. Mr McClusky said it was important to be straightforward with Wired’s "very tech-savvy audience".

"It’s too early to tell if the appeals are working, and Wired is still testing how best to communicate with its readers about ad-blocking," Mr McClusky said.

The Guardian also makes its case to readers directly with a message that reads: "We notice you’ve got an ad-blocker switched on. Perhaps you’d like to support the Guardian in another way?" It directs visitors to a link to become a "supporter", or donor, to the Guardian.

"There’s no silver bullet to mitigate against ad-blocking, which is why we’re running tests to encourage users of ad-blockers to fund high-quality journalism in other ways," Guardian US CEO Eamonn Store said in an e-mailed statement.

Others sound a more dire tone, like free gaming network GameBanana.com. "Without ads, we will not survive," its appeal says.

Tom Pittlik, founder of the site, said that 30% of page views in April were loaded by browsers with ad-blocking enabled.

Mr Pittlik said he was limited creatively when it came to the appeals, since they were background images over which an ad should appear. That presented a challenge when it came to making the message more dynamic than just text.

"Young audiences definitely forget how media sites work and support themselves," Mr Pittlik said. "Though advertisers are equally to blame for a history of irrelevancy, intrusiveness, browser-crashing ads and malware."

Given that the use of ad-blockers comes down more to fairness than legality, the question is whether begging for mercy actually works.

Sean Blanchfield, CEO of ad-blocking measurement service PageFair, said it did not.
In a blog post last year, PageFair said it ran 576 different appeals on 220 websites, but found that only 0.33% of ad-blockers that saw an appeal added sites to their approved site list. And a third of those people eventually removed the exemption.

Mr Blanchfield said the results were "not encouraging" and, on the whole, appeals could not "counter the organic growth rate of ad-blocking."

Getting ad-blockers to change their default behaviour was difficult, Mr Blanchfield said.



U.S. Delays Plans To Cede Oversight of Internet Administrator to 2016


The U.S. Department of Commerce on Monday said it would delay plans to give up oversight of a non-profit agency that manages the Internet's infrastructure until September 2016.

The government body said it plans to renew its contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one year.

Since 1998, the United States has contracted out, through the Commerce Department, the management of the master database for top-level domain names like .com and .net and their corresponding numeric addresses to ICANN.

The Commerce Department has long expected to phase out its oversight and initially planned to do it at the end of the current ICANN contract in September.

Assistant Secretary for Communications and Information Lawrence Strickling wrote in a blog post that the Commerce Department reached its decision after the groups developing the transition documents said they would need at least until September 2016 to complete required processes and implement their proposals. (http://1.usa.gov/1NBL9D1)

He said the department on Friday notified Congress that it plans to extend the contract with ICANN until Sept. 30, 2016.

"It has become increasingly apparent over the last few months that the community needs time to complete its work, have the plan reviewed by the U.S. government and then implement it if it is approved," Strickling wrote.

Strickling also said there were options to extend the contract by up to three more years, if needed.

Some Republican lawmakers have raised concerns about the plan to hand over the stewardship of the ICANN to a global multi-stakeholder body, as they fear it may allow foreign governments that do not adhere to principles of free speech to influence the body.



Facebook Tops Social Pack in US, Twitter Lags


Facebook remains the dominant social network for US Internet users, while Twitter has failed to keep apace with rivals like Instagram and Pinterest, a study showed Wednesday.

The Pew Research Center report found 72 percent of Americans who are online currently use Facebook, a modest uptick of one percentage point from a year ago and five points higher than in 2012.

Because the vast majority of Americans use the Internet, the figures suggest 62 percent of all US adults are on Facebook, according to Pew.

The study showed Pinterest, the bulletin-board style network, was used by 31 percent of those surveyed while Facebook-owned photo-sharing network Instagram grabbed 28 percent, with both showing significant growth.

Twitter's share remained stuck at 23 percent, the same level as last year, although it rose from 16 percent in 2012.

Facebook has an added advantage over its rivals because its users are "highly engaged," according to the survey, which found 70 percent of Facebook users saying they log on daily, including 43 percent who do so several times a day.

That compared with daily engagement of 59 percent for Instagram users, 38 percent of those on Twitter and 27 percent of Pinterest users.

LinkedIn, a social network oriented toward career enhancement, saw its user base decline to 25 percent of online adults, from 28 percent in 2014. But those who use the platform daily rose to 22 percent from 13 percent a year earlier.

Some 10 percent of online adults said they used Tumblr, the blogging platform acquired two years ago by Yahoo. That compared with six percent the last time Pew asked in December 2012.

Tumblr is popular among younger adults with 20 percent of those between the ages of 18 and 29 reporting they use it, Pew found.

The survey mirrored the global picture for the major social networks. Facebook last month said its monthly active user based grew to 1.49 billion. Twitter's user base increased only marginally to 316 million.

Twitter's share of US Internet users remained stuck at 23 percent, the same level as last year, although it rose from 16 percent in 2012.

Pew found that Facebook was notably popular among women, garnering 77 percent of those who are online, and the 18-29 age group, where 82 percent use the social network.

The Pew survey also showed considerable interest in messaging applications which allow smartphone users to bypass carrier networks.

Some 36 percent of smartphone owners said they used messaging apps such as WhatsApp, Kik or iMessage.

These apps are especially popular among young adults, and were used by 49 percent of smartphone owners between the ages of 18 and 29, Pew found.

"The emergence of messaging apps is noteworthy as these communication tools serve different social needs than traditional online social networks," said lead author Maeve Duggan, a researcher at Pew.

"The data also show how swiftly an already complex terrain of interaction is becoming more varied."

The survey found 17 percent of adult smartphone owners used apps which automatically delete messages to protect privacy such as Snapchat or Wickr. Among young adults, the percentage was even higher at 41 percent.

The Pew report is based on telephone interviews conducted from March 17 to April 12 among a national sample of 1,907 adults, including 1,612 Internet users, with a margin of error between 2.6 and 4.6 percentage points, depending on the subgroup.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT