With many services today needing Silverlight to run web services and many people converting to Linux or refusing to use Windows or Macs it seems like you can’t enjoy those services. Here is a great feature for those of you that use Ubuntu and want to enjoy Netflix on your computer, once you set this up you will have the benefit for other services that require Silverlight.
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.
The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, including household names, and small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems.
Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic. Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information.
“Companies that rely on user names and passwords have to develop a sense of urgency about changing this,” said Avivah Litan, a security analyst at the research firm Gartner. “Until they do, criminals will just keep stockpiling people’s credentials.”
Websites inside Russia had been hacked, too, and Mr. Holden said he saw no connection between the hackers and the Russian government. He said he planned to alert law enforcement after making the research public, though the Russian government has not historically pursued accused hackers.
So far, the criminals have not sold many of the records online. Instead, they appear to be using the stolen information to send spam on social networks like Twitter at the behest of other groups, collecting fees for their work.
Mozilla recently decided to add DRM in Firefox even if Mozilla hates it. Almost all video streaming websites use some kind of DRM and as Microsoft, Apple and Google has already implemented DRM in their browsers, Mozilla thinks not adding the DRM in Firefox would make it useless as a product as the user will have to switch to other browser everytime a user visits a website with DRM.
I am not going to either defend Mozilla on the decision of adding DRM in Firefox or write against it, they did what they had to do. In the end its all business, Firefox is of no use to me if I cannot watch Netflix on it. So I can understand the awkward position Mozilla would be in when deciding on the DRM in Firefox, what I don’t understand is How can Mozilla completely ignore the security complications associated with this decision.
In a single line, DRM in Firefox is going to end our digital security as we know it and I’ll explain it how. I don’t care about other browsers as they have already given up on user liberty long ago but Firefox has long stood for our freedom on the web and I respect that, well used to.
For a moment, let’s say we don’t have any problem with the DRM in Firefox and we are actually happy as now we’ll be able to enjoy services like Netflix and others. The problem is that DRM module implemented in Firefox is being developed by Adobe ( Yes, Adobe ), an HTML 5 based DRM implemented in Firefox is being developed by Adobe.
Mozilla openly admits that there is nothing they can do instead of accepting DRM. Mozilla was one the biggest advocate of Open Source and Free Software on the web. With Mozilla’s recent actions, freedom invading industry practices and continuous enforcements of privacy violating laws, I can image what the future looks like.
Adobe has released an emergency update for Flash Player on Windows, Mac and Linux. Current versions have a vulnerability that could potentially allow an attacker to remotely take control of the affected system. According to Adobe, an exploit for the vulnerability (CVE-2014-0497) exists in the wild.
Windows and Mac users of versions 126.96.36.199 and earlier should update to version 188.8.131.52. Users of Flash Player 184.108.40.2065 and earlier versions for Linux should update to version 220.127.116.116. Adobe has also released a patched version 11.7.700.261 for Windows and Mac.
A Google Chrome update yesterday to version 32.0.1700.107 included the fixed Flash plugin bundled with that product. Microsoft has released an update for Windows 8.0 and 8.1 for the bundled Flash Player plugin in Internet Explorer 10 and 11.
Users may obtain the newest version of Adobe Flash Player from Adobe at get.adobe.com/flashplayer. Do not trust Flash Player installations or patches from any other source.
The vulnerability was reported to Adobe by Alexander Polyakov and Anton Ivanov of Kaspersky Lab.