WikiLeaks Reveals CIA Tool For Hacking Webcams, Microphones Slashdotby BeauHD on security at January 1, 1970, 1:00 am (cached at August 3, 2017, 11:34 pm)

An anonymous reader quotes a report from The Stack: WikiLeaks has released a new set of documents in the CIA Vault 7 leak, outlining the "Dumbo" hacking tool which allows control of webcams and microphones. The release explains that the tool is capable of completely suspending processes on webcams and corrupting video recordings. Dumbo's is tasked specifically with gaining and exploiting physical access to target computers used in CIA field operations, the release notes. According to WikiLeaks, the tool allows for the identification, control and manipulation of monitoring and detection systems, such as webcams and microphones, running the Microsoft Windows operating system. The technology first identifies all installed devices, whether they are connected locally, wirelessly, or across wired networks. Once Dumbo has detected all of these devices, it identifies all the related processes, which may include recording, monitoring or detection of video, audio and network streams. These operations can then be suspended by the operator. "By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation," the release added. Dumbo does require direct access to the target computer and is run from a USB stick. The release states that it supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. However, 64bit Windows XP and Windows versions prior to XP are not supported.

Read more of this story at Slashdot.

Neymar signs PSG deal to complete world record transfer AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 11:30 pm)

The forward joins Paris Saint-Germain from Barcelona for a mind-boggling $263m and reputed weekly salary of $653,000.
'Robert Mueller impanels grand jury' for Russia probe AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 11:30 pm)

Move could mean Robert Mueller's investigation into alleged Russian interference in 2016 election is gaining steam.
Trump spoke bluntly with leaders of Mexico, Australia AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 11:30 pm)

Leaked transcripts of January phone calls reveal rare insights into the US president's style of diplomacy.
Apple's Adoption Of HEVC Will Drive A Massive Increase In Encoding Costs Requiring C Slashdotby msmash on cloud at January 1, 1970, 1:00 am (cached at August 3, 2017, 11:04 pm)

An anonymous reader shares a report: For the last 10 years, H.264/AVC has been the dominant video codec used for streaming but with Apple adopting H.265/HEVC in iOS 11 and Google heavily supporting VP9 in Android, a change is on the horizon. Next year the Alliance for Open Media will release their AV1 codec which will again improve video compression efficiency even further. But the end result is that the codec market is about to get very fragmented, with content owners soon having to decide if they need to support three codecs (H.264, H.265, and VP9) instead of just H.264 and with AV1 expected to be released in 2019. As a result of what's take place in the codec market, and with better quality video being demanded by consumers, content owners, broadcasters and OTT providers are starting to see a massive increase in encoding costs. New codecs like H.265 and VP9 need 5x the servers costs because of their complexity. Currently, AV1 needs over 20x the server costs. The mix of SD, HD and UHD continues to move to better quality: e.g. HDR, 10-bit and higher frame rates. Server encoding cost to move from 1080p SDR to 4K HDR is 5x. 360 and Facebook's 6DoF video are also growing in consumption by consumers which again increases encoding costs by at least 4x. If you add up all these variables, it's not hard to do the math and see that for some, encoding costs could increase by 500x over the next few years as new codecs, higher quality video, 360 video and general demand increases.

Read more of this story at Slashdot.

UK Security Researcher 'Hero' Accused of Creating Bank Malware (SecurityWeek) SANS ISC SecNewsFeed(cached at August 3, 2017, 11:00 pm)

Bill Proposes Bolstering Medical Device Cybersecurity (InfoRiskToday) SANS ISC SecNewsFeed(cached at August 3, 2017, 11:00 pm)

WannaCry-slayer Marcus Hutchins cuffed over claims he wrote Kronos banking Trojan (T SANS ISC SecNewsFeed(cached at August 3, 2017, 10:30 pm)

Slashdot Asks: Have Smartphones Destroyed a Generation? Slashdotby msmash on science at January 1, 1970, 1:00 am (cached at August 3, 2017, 10:04 pm)

Teens today are more likely to be lonely, depressed and immature than any previous generation, according to analysis published in The Atlantic. According to the professor of psychology who did the analysis, who also has been researching generational differences for 25 years, the culprit is the smartphone. From the article: The advent of the smartphone and its cousin the tablet was followed quickly by hand-wringing about the deleterious effects of "screen time." But the impact of these devices has not been fully appreciated, and goes far beyond the usual concerns about curtailed attention spans. The arrival of the smartphone has radically changed every aspect of teenagers' lives, from the nature of their social interactions to their mental health. These changes have affected young people in every corner of the nation and in every type of household. The trends appear among teens poor and rich; of every ethnic background; in cities, suburbs, and small towns. Where there are cell towers, there are teens living their lives on their smartphone. What do you folks think?

Read more of this story at Slashdot.

List-MoreUtils-XS-0.420_002 search.cpan.orgby Jens Rehsack at January 1, 1970, 1:00 am (cached at August 3, 2017, 10:03 pm)

Provide the stuff missing in List::Util in XS
Could Kenya's disputed presidential vote stir unrest? AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 10:00 pm)

Murder of election chief casts shadow over next week's elections as many Kenyans take to streets to demand justice.
Why one cybersecurity startup uses real malware and real attacks to test your compan SANS ISC SecNewsFeed(cached at August 3, 2017, 10:00 pm)

For 20 Years, This Man Has Survived Entirely By Hacking Online Games Slashdotby msmash on business at January 1, 1970, 1:00 am (cached at August 3, 2017, 9:34 pm)

An anonymous reader writes: A hacker says he turned finding and exploiting flaws in popular MMO video games into a lucrative, full-time job. Manfred's character is standing still in the virtual world of the 2014 sci-fi online multiplayer game WildStar Online. Manfred, the real life person behind the character, is typing commands into a debugger. In a few seconds of what seems to be an extremely easy hack, Manfred's virtual currency skyrockets up to more than 18,000,000,000,000,000,000, or 18 quintillion. I'm watching this hack in a demo video recorded by Manfred as I stand next to him in a Las Vegas bar on Thursday. Manfred, who asked me not to reveal his real name, says he has been hacking several video games for 20 years, making a real-life living by using hacks like the one I just witnessed. His modus operandi has changed slightly from game to game, but, in essence, it consisted of tricking games into giving him items or currency he doesn't have a right to have. He would then sell those items and currency to other players (for real money) or wholesales them to online gray markets, such as the Internet Game Exchange, that then would sell those goods to individual players. At the current exchange rate, Manfred estimates he has $397 trillion worth of WildStar gold. This is obviously an outlandish number, but, essentially, his income was only limited by the real-life market for the in-game currency. When I spoke to Manfred ahead of his talk at the Def Con hacking conference, he said he wanted to go in, give his demo, and go out "as a ghost," never to be seen or heard from again. He said he wanted to be "invisible," just like he's been for the past two decades. He said he's found more than 100 publicly unknown vulnerabilities in more than 20 online video games, making hacking and trading virtual goods into his full time job.

Read more of this story at Slashdot.

Casualties reported in attack on convoy in Kabul AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 9:30 pm)

Convoy of foreign forces targeted in Afghanistan's capital in the latest attack to strike the country.
UN: Yazidi genocide in Iraq still ongoing, unaddressed AL JAZEERA ENGLISH (AJE)(cached at August 3, 2017, 9:30 pm)

Three years after ISIL's attack on Iraq's Yazidis, UN says world powers have not done enough to address the genocide.