Aug 10 2012

Google has to pay 22,5 milion dollars

by admin

Setting fines, the highest ever, which has been condemned by the U.S. Trade Commission, FTC, for violations of its orders and instructions. The sum imposed under a deal between Google and the FTC.

Google denies the crime, but the FTC refers to the U.S. Department of Justice, accusing Google of placing the cookies in the Safari users’ computers. Meanwhile, Google will be represented to users that the search giant did not intend to track their movements via cookies, or to provide users with targeted ads. Yet there was just that, according to the FTC. Google has previously been severely criticized for tracking cookies from Safari, which was unveiled early this year.

In addition to fines ordered now Google also to disable cookies in users’ computers, plates and smart phones. The fine is determined after a deal with Google, says the FTC.

– Record amount of this settlement sends a clear signal to all companies that have received an order from the FTC issued against him.

– No matter how big or small it is, so all companies need to follow the FTC’s instructions and keep their promises on privacy to customers. Otherwise, they are forced to pay several times what it had cost to follow our instructions from the beginning, says Jon Leibowitz, Chairman of the FTC, in a statement.

For Google is fine itself a trifle, but it also gives the company negative publicity. A spokeswoman for Google says that the FTC’s judgment, old content posted before Apple had changed its rules on the handling of cookies.

– Google has now amended the hand and taken steps to remove all advertising cookies, but did not collect any personal information from Apple’s Web browser, she said.

Aug 10 2012

Blizzard server hacked

by admin

Source: Mike Morhaime @ Blizzard

Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.

At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.

Some data was illegally accessed, including a list of email addresses for global users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to accounts.

We also know that cryptographically scrambled versions of passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.

In the coming days, we’ll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we’ll prompt mobile authenticator users to update their authenticator software. As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.

We take the security of your personal information very seriously, and we are truly sorry that this has happened.

May 4 2012

Who google’d you?

by admin

All over the world – your name is getting google’d with out your notice.

There is now a new swedish site where you can check it out.

Feb 24 2012

Microsoft attacked Google for going around the security of Internet Explorer

by Zylr

A major problem has broken out between Google on one side, and Apple and Microsoft on the other. The trouble is that Google is accused of breaking the settings in Apple’s Safari and Microsoft Internet Explorer to prevent users’ browsing habits. Google is said to pass the settings to target their advertising more precisely.

After the accusations turn back and now Google says that Microsoft’s security settings in Internet Explorer is outdated. Both Internet Explorer and Safari are preset to block third party cookies, cookies. Microsoft’s Internet Explorer do allow third party cookies if the site presents a policy, called P3P, which describes how the site will use them. According to Microsoft, Google trick the browser into thinking that such a policy has been presented.

– We have found that Google is passing P3P security settings in Internet Explorer. The result is similar to that Google does in Safari, writes Dean Hachamovitch, Microsoft’s director of Internet Explorer, in a blog post.

Google’s director of policy and communications, Rachel Whetstone, has now responded to the criticism in an email. Modern web features, such as Facebook’s like button would stop working if everyone followed Micrsofts policy.

Google, along with sites such as Facebook, have been openly critical of P3P, which is not supported by any major browsers more than Internet Explorer. Rachel Whetsone also referred to a statement from Facebook where they said that P3P standard is outdated and can not be used with today’s technologies. World Wide Web Consortium, which developed the standard, stopped working on it several years ago.

Feb 11 2012

Google counters Dropbox

by Zylr

Since some time now it has been rumored that Google plans to release a cloud service that lets users store their files in the cloud. According to the Wall Street Journal sees it now looks as if the plans will become reality.

The new service, which reportedly will be called Google Drive will be free for consumers up to a certain storage capacity. It is still unknown how much free space will be offered.

Google Drive will, according to the Wall Street Journal also be integrated with Google Apps for business customers.

Google already have several services that allow users to upload files to the company molntjänt. The existing service is tied to a specific type of files, and Google Drive will reportedly allow users to store the files they want, like Dropbox and similar services offer today.

There is no indication when Google plans to release the new service.

Feb 11 2012

Android for Linux

by Zylr

Google’s operating system for mobile phones and tablets, Android, is based on the Linux kernel, but is in the current situation is not compatible with the current version 3.2. Instead, Google has chosen to create its very own version of the Linux kernel for Android as they develop internally.

The dual versions of the Linux kernel creates extra work, not just for Google but also for the mobile manufacturers who do not have full transparency in the process. Nor is it possible to run Android on a standard Linux kernel as user programs in Android will not compile.

Greg Kroah-Hartman, a former employee of Suse, but now employed by the Linux Foundation lets the other hand, to announce that it will soon change all that.

Starting with version 3.3 of the Linux kernel that is part of the Android-specific code is implemented, which means it will be possible to compile Android for the standard Linux. Is it the case, that means you should be able to run applications for Android directly on Linux.

Androids special functions for power management is however not yet implemented, but they appear to be coming in version 3.4.

– Almost all the code is already there. Version 3.3 of the Linux kernel will allow you to boot into Android without any modiferingar but without good features for power conservation. Version 3.4 of the kernel will hopefully have the power saving features that Android needs along with some other minor parts that can not be in version 3.3.

Since version 3.3 of the Linux kernel is still under development, it looks like we’ll have to wait for autumn’s Linux distributions have come out before we can run Android applications on Linux right from the start. Curious who can not wait can however download and compile the Linux kernel when it is released and get Android on the way.

Feb 3 2012

Symantec central products hacked

by Zylr

According to Reuters Symantec now admits that hackers have broken into the corporate network and stolen the source code for a number of key programs. Previously, Symantec denied that its network had been hacked with some severe consequences, but the security giant, now admits that its network was hacked in 2006, with the theft of several flagship products as a result.

Two weeks ago, said Symantec spokesman Cris Paden that hackers had only managed to get hold of the source to the two old programs. The intrusion is in accordance with the foregoing matters have been Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2, two security products that are between five and six years old. Around the same time Symantec said that the theft was not serious.

Now Symantec reveals that the source code to a far wider and more central programs has been stolen, including Norton Antivirus Corporate Edition, Norton Internet Security, Norton Utilities, Norton Go Back and PC Anywhere. Both Norton Internet Security and Norton Utilities is one of Symantec’s most important consumer products.

The hacker Yama Tough, part of the group Lords of Dharmaraja, the previous release of information about the source was accessed through a server that is handled by the Indian authorities. Yama Tough threatened to drop more than a gigabyte of source code for including Norton Antivirus, but about which version that was intended. But the group has backed down and announced on Twitter that they did not intend to release the code to the public. On Monday, said Yama Tough that he had access to PC Anywhere. Symantec has confirmed Yama Toughs claims by telling Reuters that users of PC Anywhere are at increased risk as a result of hacking activities.

Feb 3 2012

Test Dropbox new photo feature – get 4.5 gigabytes of free

by Zylr

All you do is download a special beta version of the new software – then you only need to upload pictures and movies.

The new feature allows images and movies automatically recharged whenever you connect a digital camera, a phone or memory card to your computer.

For every 500 megabytes you upload, you get an additional 500 megabytes, up to 4.5 gigabytes.

However, warns Dropbox for this feature is still in beta stage and you should not rely entirely on that everything works as it should.

Do you want to test this new feature and get extra storage space, read more in the Dropbox forums, where you can also download the special beta version.

Link to download and to come to the Dropbox Forum

Feb 2 2012

Swedish Anti-Piracy Agency says it now plans to take action

by Zylr

Swedish Anti-Piracy Agency says it now plans to take action against nearly 150 illegal file-sharing services that have a Swedish connection.

– The Supreme Court has made clear to all involved for violations, including the one that delivers Internet connection, to be responsible, said Henrik Pontén, a lawyer at the Antipiracy Agency.

The news comes on the day of the Supreme Court decided not to include ruling of the Court of Appeal, where the defendants were sentenced to between four and ten months in prison and damages of 46 million.

“Legal action will be made ​​against all that contribute to crime in different ways,” says a statement from the APB, which primarily represents the Swedish film industry.

– Law Society has told her and this is a defining moment in the lengthy discussion of copyright on the Internet.