An anonymous reader quotes a report from BGR: When designing the Model X, Tesla went more than a little bit overboard in trying to trick out its crossover SUV with as many bells and whistles as possible. Not only did Tesla's overly ambitious development delay the launch of the Model X, it has arguably resulted in a noticeably higher number of quality control issues than we're accustomed to seeing. Hardly a controversial point, even Tesla CEO Elon Musk has conceded that the company was far too zealous when developing the Model X. While some customers with frustrating Model X issues have noted that Tesla has been quick to fix any problems, one Model X owner from California has had enough. According to the Courthouse News Service, via Teslarati, Barrett Lyon recently filed a Lemon Law claim against Tesla, arguing that the car's problems are unfixable and that it's ultimately unsafe to drive. In addition to finding that the front door would often slam shut on his leg, Lyon's suit details a slew of other problems, including Auto Pilot problems, touch screen freezes and more. A Tesla Model S owner, on the other hand, reported that his vehicle went rogue causing an accident all by itself.
Leap Towards a Career in Ethical Hacking with 60+ Hours of Prep Toward CISM, CISA, & More Certification Exams at 95% off ×
mi quotes a report from The Intercept: A provision snuck into the still-secret text of the Senate's annual intelligence authorization would give the FBI the ability to demand individuals' email data and possibly web-surfing history from their service providers using those beloved 'National Security Letters' -- without a warrant and in complete secrecy. [The spy bill passed the Senate Intelligence Committee on Tuesday, with the provision in it. The lone no vote came from Sen. Ron Wyden, D-Ore., who wrote in a statement that one of the bill's provisions "would allow any FBI field office to demand email records without a court order, a major expansion of federal surveillance powers." If passed, the change would expand the reach of the FBI's already highly controversial national security letters. The FBI is currently allowed to get certain types of information with NSLs -- most commonly, information about the name, address, and call data associated with a phone number or details about a bank account. The FBI's power to issue NSLs is actually derived from the Electronic Communications Privacy Act -- a 1986 law that Congress is currently working to update to incorporate more protections for electronic communications -- not fewer. The House unanimously passed the Email Privacy Act in late April, while the Senate is due to vote on its version this week. "NSLs have a sordid history. They've been abused in a number of ways, including targeting of journalists and use to collect an essentially unbounded amount of information," Andrew Crocker, staff attorney for the Electronic Frontier Foundation, wrote. One thing that makes them particularly easy to abuse is that recipients of NSLs are subject to a gag order that forbids them from revealing the letters' existence to anyone, much less the public.]
ffkom writes: Reuters reports: "India has said Apple Inc must meet a rule obliging foreign retailers to sell at least 30 percent locally-sourced goods if it wishes to open stores in the country, a senior government official told Reuters. A change in legislation last year exempted foreign retailers selling high-tech goods from the rule, which states 30 percent of the value of goods sold in the store should be made in India. However, Apple's products were not considered to be in this category, said the official, who has direct knowledge of the matter." Now just imagine what Apple stores in the U.S. would look like if 30% of their offerings had to be made in the US... "They did ask for a waiver but didn't provide any material on record to justify it. The decision was taken only after a thorough examination of their application," the source said. Apple planned to open at least three stores in India by the end of 2017. Separate sources said Apple talked with the Indian government about a relaxation of the rule before it filed an application to open stores in the country in January. In a report from The Wall Street Journal (Warning: source may be paywalled), one of India's government officials said, "We are sticking to the old policy. We want local sourcing for job creation. You can't have a situation where people view India only as a market. Let them start doing some manufacturing here." Currently, Apple sells its products "through a network of Indian-owned distribution companies and retailers."
An anonymous reader writes: Earlier this year, patent troll VirnetX won a court battle with Apple to the tune of $625 million. Now, the company wants to increase the damages award by $190 million. Law360 reports: "At a post-trial hearing Wednesday, Texas technology company VirnetX argued that although an injunction blocking Apple's popular video chatting and messaging features, along with a virtual private network on demand feature, may seem like a harsh remedy, it is necessary because of the irreparable harm Apple's infringement caused the company. VirnetX also asked the court to increase the jury's damages award by at least $190 million, arguing that Apple has been the 'poster child' for unreasonable litigation tactics." VirnetX also wants the court to block FaceTime and iMessage entirely. "Meanwhile, Apple argued that in light of U.S. Patent and Trademark Office decisions rejecting the four patents-in-suit, an injunction would be inappropriate, as would any ongoing royalty based on FaceTime, iMessage and virtual private network on demand features. The tech giant also sought a mistrial based on a purportedly inappropriate argument to the jury and argued that the company is entitled to a judgment of non infringement, despite the jury verdict, based on VirnetX's allegedly insufficient evidence," reports Law360.
An anonymous reader writes: A smaller group of Anonymous, called Anonymous Analytics, reached the conclusion that DDoSing is stupid and never fixes anything, so they decided to use their hacking skills and stock market knowledge to make a difference in another way. For the past years, the group has been compiling market reports on U.S. and Chinese companies and publishing their results. Their reports have been noticed by the stock market, who recently started to react to their findings. The most obvious case was of Chinese lottery machine maker REXLot. The hackers discovered that REXLot inflated its revenue and the amount of cash on its balance sheet, based on the amount of interest earned. "The group published its findings on June 24, 2015, and REXLot stock price plummeted from 0.485 Hong Kong dollar per share to 0.12, before trading was suspended [for ten months]. REXLot rejoined the market on April 18, 2016, this year, but even after submitting a 53-page report, the company stock fell again by 50 percent," reports Softpedia. Anonymous Analytics then published two more reports on the company, urging the market to sell, and two days later, Reuters reported that REXLot did not have enough cash to make due bond payments, which meant the company had to sell assets to repay bonds. Other companies on which the group published market reports include Qihoo 360 and Western Union.
An anonymous reader quotes a report from The Daily Dot: Millennials stand apart from other Americans in preferring faster Internet access to safer Internet access, according to a new survey. When digital-authentication firm SecureAuth asked people from all age groups whether they would rather be safer online or browse faster online, 57 percent of Americans chose security and 43 percent chose speed. But among millennials, the results were almost reversed: 54 percent chose speed over security. Young people are also more willing than the overall population to share sensitive information over public Wi-Fi connections, which are notoriously insecure as they allow anyone on the network to analyze and intercept passing traffic. While a clear majority (57 percent) of Americans told SecureAuth that they transmitted such information over public Wi-Fi, nearly eight in 10 (78 percent) of millennials said they did so. A surprising 44 percent of millennials believe their data is generally safe from hackers, and millennials are more likely than members of other age groups to share account passwords with friends. Americans overall are paying more attention to some aspects of digital security. An October 2015 study by the wireless industry's trade group found that 61 percent of Americans use passwords on their smartphones and 58 percent use them on their tablets, compared to 50 percent and 48 percent, respectively, in 2012. The recent study lines up with a report published on May 24 that found that the elderly use more secure passwords than millennials.
infernalC writes: Ars Technica is reporting that the verdict is in, and that the jury decided that Google's duplication of several Java interfaces is fair use. Ars Technica writes that Google's Android OS does not infringe upon Oracle-owned copyrights because its re-implementation of 37 Java APIs is protected by "fair use." The jury unanimously answered "yes" in response to whether or not Google's use of Java APIs was a "fair use" under copyright law. The trial is now over, since Google won. "Google's win somewhat softens the blow to software developers who previously thought programming language APIs were free to use," Ars Technica writes. "It's still the case that APIs can be protected by copyright under the law of at least one appeals court. However, the first high-profile attempt to control APIs with copyright law has now been stymied by a "fair use" defense." The amount Oracle may have asked for in damages could have been as much as $9 billion.
From a BBC report: Norwegians have spent more than 30 hours reading out terms and conditions from smartphone apps in a campaign by the country's consumer agency. The average Norwegian has 33 apps, the Norwegian Consumer Council says, whose terms and conditions together run longer than the New Testament. To prove the "absurd" length, the council got Norwegians to read each of them out in real time on their website. The reading finished on Wednesday, clocking in at 31:49:11. Some of the world's most popular apps were chosen, including Netflix, YouTube, Facebook, Skype, Instagram and Angry Birds. Finn Myrstad from the Norwegian Consumer Council, said: "The current state of terms and conditions for digital services is bordering on the absurd."
There's no one stopping you from selling the CDs and DVDs that you buy, so why can't you do the same with e-books, music albums, movies, and other things you've downloaded? Ars Technica reports about a Dutch second-hand e-book platform called Tom Kabinet which has been "at a war" with Dutch Publishers Association (NUV) over this issue. This is seen as a threat to the entire book industry. German courts have suggested that the practice of reselling e-books should be stopped, whereas Dutch courts don't necessarily see it as an issue. What's your view on this?
Mark Harris, reporting for The Guardian: An investigation by the Guardian has found that despite Amazon marketing the Echo to families with young children, the device is likely to contravene the US Children's Online Privacy Protection Act (COPPA), set up to regulate the collection and use of personal information from anyone younger than 13. Along with Google, Apple and others promoting voice-activated artificial intelligence systems to young children, the company could now face multimillion-dollar fines. "This is part of the initial wave of marketing to children using the internet of things," says Jeff Chester, executive director of the Center for Digital Democracy, a privacy advocacy group that helped write the law. "It is exactly why the law was enacted in the first place, to protect young people from pervasive data collection."
An anonymous reader quotes a report from Softpedia: Tor developers have been working on the next iteration of the Tor network and its underbelly, the Onion routing protocol, in order to create a stronger, harder-to-crack anonymous communications system. To advance the project, the developer team schedules brainstorming and planning meetings at regular intervals. The most recent of these meetings took place last week, in Montreal, Canada. In this session, the team tested the next generation of the Tor network working on top of a revamped Onion protocol that uses a new algorithm for generating random numbers, never before seen on the Internet. The Tor Project says it created something it calls "a distributed RNG" (random number generator) that uses two or more computers to create random numbers and then blends their outputs together into a new random number. The end result is something that's almost impossible to crack without knowing which computers from a network contributed to the final random number, and which entropy each one used. Last week, two University of Texas academics have made a breakthrough in random number generation. The work is theoretical, but could lead to a number of advances in cryptography, scientific polling, and the study of various complex environments such as the climate.
wiredmikey writes from a report via SecurityWeek.Com: Microsoft is taking a step to better protect users by banning the use of weak and commonly-used passwords across its services. Microsoft has announced that it is dynamically banning common passwords from Microsoft Account and Azure Active Directory (AD) system. In addition to banning commonly used passwords to improve user account safety, Microsoft has implemented a feature called smart password lockout, meant to add an extra level of protection when an account is attacked. [Alex Weinert, Group Program Manager of Azure AD Identity Protection team explains in a blog post that] Microsoft is seeing more than 10 million accounts being attacked each day, and that this data is used to dynamically update the list of banned passwords. This list is then used to prevent people from choosing a common or similar password. Microsoft's new feature comes after last week's leak of 117 million LinkedIn credentials.
An anonymous reader quotes a report from Network World: Two years ago the FCC announced its intention to fine a Chinese electronics maker $34.9 million and a Florida man $48,000 for respectively selling and using illegal cell-phone jammers. Today the agency has issued press releases telling us that those fines have finally been made official, without either of the offending parties having bothered to mount a formal defense of their actions. From the press release announcing the fine against CTS. Technology: "[...] The company's website falsely claimed that some jammers had been approved by the FCC, and advertised that the company could ship signal jammers to consumers in the United States." The company did not respond to the FCC's allegations, although the agency does report that changes were made to its website that appear to be aimed at complying with U.S. law. Next up is Florida man, Jason R. Humphreys, who is alleged to have used a jammer on his commute: "Mr. Humphreys' illegal operation of the jammer continued for up to two years, caused interference to cellular service along Interstate 4, and disrupted police communications." Last Fall, a Chicagoan was arrested for using a cell-phone jammer to make his subway commute more tolerable.
An anonymous reader writes: Following a report that the Swedish Court would seize the domain names 'ThePirateBay.se' and 'PirateBay.se,' The Pirate Bay is now sailing back to where it started in 2003, ThePirateBay.org. CNET reports: "The site is currently redirecting all traffic from the above two domains back to its .org home." In 2012, The Pirate Bay moved to the .se domain. It then moved to more secure domains, such as .sx and .ac, eventually returning to .se in 2015. Every alternative domain the site was using has been seized. Since the registry that manages the top level .org domains is based in Virginia, it's likely we'll see some legal action from the U.S. in response to the move. Meanwhile, Pirate Bay co-founder Fredrik Neij plans to appeal the Swedish's court's decision to seize the .se domains.
An anonymous reader writes: CentOS team is pleased to announce the immediate availability of CentOS Linux 6.8 and install media for i386 and x86_64 Architectures. Release Notes for 6.8 are available here. Softpedia writes: "CentOS Linux 6.8 arrives today with major changes, among which we can mention the latest Linux 2.6.32 kernel release from upstream with support for storing up to 300TB of data on XFS filesystems. The VPN endpoint solution implemented in the NetworkManager network connection manager utility is now provided on the libreswan library instead of the Openswan IPsec implementation used in previous release of the OS, and it looks like the SSLv2 protocol has been disabled by default for the SSSD (System Security Services Daemon), which also comes with support for smart cards now." In addition, the new release comes with updated applications, including the LibreOffice 4.3.7 office suite and Squid 3.4 caching and forwarding web proxy, many of which are supporting the Transport Layer Security (TLS) 1.2 protocol, including Git, YUM, Postfix, OpenLDAP, stunnel, and vsftpd. The dmidecode open-source tool now supports SMBIOS 3.0.0, you can now pull kickstart files from HTTPS (Secure HTTP) sources, the NTDp (Network Time Protocol daemon) package has an alternative solution as chrony, SSLv3 has been disabled by default, and there's improved support for Hyper-V.
dcblogs writes this report from Computerworld: Former U.S. Secretary of State Hillary Clinton's decision to use a private email server ran afoul of the government's IT security and record retention requirements, according to a report by the department's inspector general released today. This use of a private email server did not go unnoticed within the Department of State's IT department. Two IT staff members who raised concerns about Clinton's use of a private server were told not to speak of it. Clinton was secretary of state from 2009 to 2013 and during that period she used a private email server in her New York home. This report by the Department of State's Inspector General about Clinton's use of a private server makes clear that rules and regulations were not followed. It says that Clinton would not have received approval for this server had she sought it. According to the current CIO, the report said, "Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs." However, the report notes, according to these officials, The Bureau of Diplomatic Security and IRM (Bureau of Information Resource Management) "did not -- and would not -- approve her exclusive reliance on a personal email account to conduct Department business, because of the restrictions in the FAM [Foreign Affairs Manual] and the security risks in doing so."
An anonymous reader writes from a report via CNBC: A new report reveals the U.S. Defense Department is still using 8-inch floppy disks in a computer system that coordinates the operational functions of the nation's nuclear forces. The Defense Department's 1970s-era IBM Series/1 Computer and long-outdated floppy disks handle functions related to intercontinental ballistic missiles, nuclear bombers and tanker support aircraft, according to the new Governmental Accountability Office report. The report shows how outdated IT systems are being used to handle important functions related to the nation's taxpayers, federal prisoners and military veterans, as well as to the America's nuclear umbrella. "Federal legacy IT systems are becoming increasingly obsolete: Many use outdated software languages and hardware parts that are unsupported," the report found. "Agencies reported using several systems that have components that are, in some cases, at least 50 years old." From the report: "GAO pointed out that aging systems include the Treasury Department's 'individual master file,' which is the authoritative data source for individual taxpayers. It's used to assess taxes and generates refunds. That file 'is written in assembly language code -- a low-level computer code that is difficult to write and maintain -- and operates on an IBM mainframe,' the report said." The report also mentioned that several other departments, such as the departments of Treasury, Commerce, Health and Human Services and the Veterans' Administration, "reported using 1980s and 1990s Microsoft operating systems that stopped being supported by the vendor more than a decade ago."
If you're a powerful Silicon Valley billionaire, and there's a media house which actively points out flaws in your investments, can you do something about it? If you're Peter Thiel, you certainly can. The New York Times and Forbes magazine have independently reported that Thiel has been funding a steady stream of lawsuits -- including three different ones filed by Hulk Hogan -- to destroy Gawker Media. Gawker reports: Gawker and Valleywag, Gawker Media's defunct tech gossip vertical, have often written critically of Thiel, a self-identified libertarian (and, it turns out, a California delegate for Donald Trump) and his investments, covering the failure of his hedge fund Clarium Capital, his right-wing politics, and his personal life. In just the last month, Gawker Media's tech site Gizmodo published a series of stories on Facebook's use of "news curators" to manipulate the site's "trending" module, sparking a congressional investigation into the social network's practices.Jay Rosen, media critic and a professor of journalism at New York University, said: Trying to kill a publication you don't like by funding lawsuits against them isn't very libertarian, is it?
An anonymous reader writes: Facebook is not just looking at user's personal information, interests, and online habits but also to your private conversations, revealed a new report. According to NBC report, this may be the case as Kelli Burns, a professor at University of South Florida states, "I don't think that people realize how much Facebook is tracking every move we're making online. Anything that you're doing on your phone, Facebook is watching." the professor said. Now how do you prove that? Professor Kelli tested out her theory by enabling the microphone feature, and talked about her desire to go on a safari, informing about the mode of transport she would take. "I'm really interested in going on an African safari. I think it'd be wonderful to ride in one of those jeeps," she said aloud, phone in hand. The results were shocking, as less than 60 seconds later, the first post on her Facebook feed was about a safari story out of nowhere, which was then revealed that the story had been posted three hours earlier. And, after mentioning a jeep, a car ad also appeared on her page. On a support page, Facebook explains how this feature works: "No, we don't record your conversations. If you choose to turn on this feature, we'll only use your microphone to identify the things you're listening to or watching based on the music and TV matches we're able to identify. If this feature is turned on, it's only active when you're writing a status update." I wonder how many people are actually aware of this.