Minecraft Is Getting Cross-Play On Multiple Platforms

With the upcoming release of the Better Together this summer, Mojang will unify the Nintendo Switch and Xbox One with mobile and Windows 10 PC versions of the game under the Bedrock Engine family. (excluding Java Minecraft which will continue to be supported as an independent version)
Continue reading Minecraft Is Getting Cross-Play On Multiple Platforms

Linux Malware Mines for Cryptocurrency Using Raspberry Pi Devices

A Linux trojan detected under the generic name of Linux.MulDrop.14 is infecting Raspberry Pi devices with the purpose of mining cryptocurrency.

According to Russian antivirus maker Dr.Web, the malware was first spotted online in the second half of May in the form of a script that contains a compressed and encrypted application.

Experts say the initial infection takes place when Raspberry Pi operators leave their devices’ SSH ports open to external connections.

Once a Raspberry Pi device is infected, the malware changes the password for the “pi” account to:

\$6\$U1Nu9qCp\$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1

Read the full article here

Computer printers have been quietly embedding tracking codes in documents for decades

In 2004, when color printers were still somewhat novel, PCWorld magazine published an article headlined: “Government Uses Color Laser Printer Technology to Track Documents.”

It was one of the first news reports on a quiet practice that had been going on for 20 years. It revealed that color printers embed in printed documents coded patterns that contain the printer’s serial number, and the date and time the documents were printed. The patterns are made up of dots, less than a millimeter in diameter and a shade of yellow that, when placed on a white background, cannot be detected by the naked eye.
Continue reading Computer printers have been quietly embedding tracking codes in documents for decades

New Internet-Privacy Bill to address Ad Tracking or Online-Data Collection

digital-ad industry says that if it passes it could mean ‘Facebook won’t be free’

Tennessee Congresswoman Martha Blackburn says she wants to give consumers control of their internet experience.

She’s introduced a bill — the “BROWSER Act” — that would require internet users to actively opt in to say yes to any sort of ad tracking or online-data collection.

“Facebook won’t be free,” said Scott Howe, CEO of the data company Acxiom. Acxiom collects consumer data on millions of Americans — where they live and the kinds of things they shop for — that marketers and media companies use to target consumers and deliver more-relevant ads. So it’s looking out for any legislation in this realm closely.
Continue reading New Internet-Privacy Bill to address Ad Tracking or Online-Data Collection

New Attack Method Delivers Malware Via Mouse Hover

Mouseover’ technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.

Researchers have found a new form of attack that abuses the action of hovering over hyperlinked text and images in a Microsoft PowerPoint presentation.

Trend Micro researchers discovered the “mouseover” technique, used by a Trojan downloader also found in a spam campaign hitting EMEA businesses in the manufacturing, education, pyrotechnics, logistics, and device fabrication industries. The downloader they analyzed delivers a version of the OTLARD banking Trojan, also known as GootKit.

“This is the first occurrence of malware using the ‘hover’ method to initiate a download that we know of,” says Mark Nunnikhoven, Trend Micro’s VP of cloud security.

“While GootKit is known malware, businesses should be more concerned about this latest technique as it shows none of the usual indicators of an infected document,” he explains. This is novel because it abuses the previously safe user practice of hovering over a link before clicking.
Continue reading New Attack Method Delivers Malware Via Mouse Hover

Netgear Router Security Update

Netgear noted that several of their routers have a command injection Vulnerability issue where an attacker can use a phishing method to gain control of your router.

Tip:
To find the model/version number, check the bottom or back panel of your NETGEAR device.

From the vulnerability Notes Database:

R6200, R6250, R6400, R6700, R6900, R7000, R7100LG, R7300, R7900, R8000, D6220, and D6400 contain an unauthenticated command injection vulnerability that may be executed directly or via cross-domain requests. Known affected firmware versions include Netgear R7000 version 1.0.7.2_1.1.93, R6400 version 1.0.1.12_1.0.11, and R8000 version 1.0.3.4_1.1.2. Earlier versions may also be affected. The command injection vulnerability has been assigned CVE-2016-6277.

By convincing a user to visit a specially crafted web site, a remote, unauthenticated attacker may execute arbitrary commands with root privileges on affected routers. An unauthenticated, LAN-based attacker may do the same by issuing a direct request, e.g. by visiting: http:///cgi-bin/;COMMAND

Continue reading Netgear Router Security Update

Linux Kernel Zero Day Vulnerability CVE-2016-0728

This vulnerability has existed since 2012 and it affects Android and Linux systems running Linux Kernel version 3.8+, and Linux server or desktop running kernel 3.8+ is vulnerable.

As of the date of disclosure, this vulnerability has implications for approximately tens of millions of Linux PCs and servers, and 66 percent of all Android devices (phones/tablets).

How do I fix this?

First some background on what the CVE-2016-0728 bug is. From the Perception Point Research Team

CVE-2016-0728 is caused by a reference leak in the keyrings facility. Before we dive into the details, let’s cover some background required to understand the bug. It can successfully escalates privileges from a local user to root.

Continue reading Linux Kernel Zero Day Vulnerability CVE-2016-0728

Microsoft’s supposed forcing upgrading to Windows 10

Was stumbling on the webs earlier and came across an article saying that Microsoft is forcing people to upgrade to Windows 10. I am not a huge MS fan but I had to see for myself and it’s garbage.  I installed Windows7 on my laptop and got the familiar icon to upgrade but when I clicked on it I did not get the forced upgrade but instead got this:

Windows10 Upgrade Options
Windows 10 Upgrade Options

Notice it doesn’t say what others like InfoWorld are saying, which would insinuate a forced upgrade, according to the article in the link, the screen I have above has the following two options only:

Upgrade now or Upgrade tonight

Not sure exactly what these publishers are gunning for but it’s a bad game to play if they are not verifying this and only blindly repeating what others are saying.

Now, I’m not saying people are not getting that window. I’m saying that I did not get it and that publishers need to verify for themselves instead of just blindly regurgitating what they heard.

iOS 9 is out in the wild

Apple released iOS 9 into the wild and it looks awesome. I don’t run an iDevice so I can’t comment on it as far as performance and overall satisfaction but I will be checking in with friends that do to get their feedback.

If you use an iDevice and want to know if you can install iOS 9, here is the list of compatible devices:

iPhone iPad iPod
  • iPhone 6s
  • iPhone 6s Plus
  • iPhone 6
  • iPhone 6 Plus
  • iPhone 5s
  • iPhone 5c
  • iPhone 5
  • iPhone 4s
  • iPad Pro
  • iPad Air 2
  • iPad Air
  • iPad 4th generation
  • iPad 3rd generation
  • iPad 2
  • iPad mini 4
  • iPad mini 3
  • iPad mini 2
  • iPad mini
  • iPod touch 6th generation
  • iPod touch 5th generation

Noteworthy features

Notes

  • The Notes app has always been great for jotting down your thoughts. And now it’s great for so much more.
  • Turn lists into checklists – Add bullets with a tap to create checklists. Make a grocery list, a wish list, or a to-do list — and check off items as you go.
  • Sketch your thoughts – Use the tip of your finger to draw right in your note. A selection of drawing tools lets you choose different brush styles and colors. And a handy ruler helps you keep things straight.
  • Note it with a photo – Now you can take a photo from within the Notes app. Or tap to access your photo library and add an existing photo or video to a note.
  • All your notes across all your devices – Notes works with iCloud so you can access your notes no matter which device you’re using.

Maps

  • Transit – Maps now features Transit view, bringing you public transit information with routes and directions.
  • Nearby – When you search in Maps, you’ll see a list of categories including Food, Drinks, Shopping, Fun, and more.

Multitasking

  • Slide Over – Now you can open a second app without leaving the one you’re in.
  • Split View – With Split View, you can go a step further and have two apps open and active at the same time.
  • Picture in Picture – While using FaceTime or watching a video, press the Home button and your video screen scales down to a corner of your display.

Even longer battery life.

Across the entire operating system, apps and key technologies have been made more efficient to trim battery usage wherever possible — so you get more battery life for the things you do every day.

Smaller, more convenient updates.

iOS 9 does even more to efficiently stream new updates to your device without having to first download and unpack them — which means you don’t need as much free space to update.

  • iOS 9 – 1.3GB
  • iOS 8 – 4.58GB

Faster and more responsive.

The apps in iOS 9 now take advantage of Metal, making more efficient use of the CPU and GPU to deliver faster scrolling, smoother animation, and better overall performance.

Improved security.

Keeping your devices and Apple ID secure is essential to protecting your personal information — like photos, documents, messages, email, and so much more.

Six-digit passcodes

The default for passcodes on your Touch ID–enabled iPhone and iPad is now six digits instead of four.

Two-factor authentication

A password alone is not always enough to keep your account secure. That’s why iOS 9 and OS X El Capitan have built-in support for two-factor authentication.

Windows 10 is almost here

Microsoft’s new baby is almost here and they are offering it as a free upgrade for qualifying hardware running genuine Windows 7, Windows 8.1, and Windows Phone 8.1 devices. You have until July 29 to reserve your upgrade via a Get Windows 10 app. If you don’t see a notification to get the app it means either:

  • Your device isn’t up-to-date with at least Windows 7 SP1 or Windows 8.1 Update.
  • Windows Update is turned off or is not set to received updates automatically.
  • You’ve blocked or uninstalled the necessary Windows Update functionality.
  • Your device is not running genuine Windows.

You only have until July 29, 2016 to take advantage of this offer. Once you upgrade, you have Windows 10 for free on that device.You have one year from the time Windows 10 is available to take advantage of this offer.

Between reservation and when your upgrade is ready, the files you need for the upgrade will be downloaded to your PC to make the final installation go more quickly. Then, when your upgrade is ready after July 29, 2015, you get a notification that lets you get started with your upgrade. Continue reading Windows 10 is almost here