The Videogame Industry Is Fighting 'Right To Repair' Laws

An anonymous reader quotes Motherboard: The video game industry is lobbying against legislation that would make it easier for gamers to repair their consoles and for consumers to repair all electronics more generally. The Entertainment Software Association, a trade organization that includes Sony, Microsoft, Nintendo, as well as dozens of video game developers and publishers, is opposing a “right to repair” bill in Nebraska, which would give hardware manufacturers fewer rights to control the end-of-life of electronics that they have sold to their customers… Bills making their way through theRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Seven Film Studios Want 41 Web Sites Blocked By Australian ISPs

angry tapir writes: A group of film studios is undertaking what is set to be the most significant use so far of Australia’s anti-piracy laws, which allow rights holders to apply for court orders that can compel ISPs to block their customers from accessing certain piracy-linked sites. A pair of rights holders last year successfully obtained court orders forcing Australia’s most popular ISPs to block a handful of sites including The Pirate Bay. Now Village Roadshow wants to have 41 more sites blocked. Village Roadshow joined six other studios inRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

FAA Warns More Drones Are Flying Near Airports

Between February and September of 2016, there were 1,274 reports of drones near airports — versus just 874 for the same period in 2015, according to newly-released FAA research. “The report detailed more than 1,200 incidents of airplane pilots, law enforcement, air traffic controllers, and U.S. citizens reporting drones flying in places they shouldn’t,” writes Fortune. An anonymous reader quotes their report: One of takeaway of the report was that while the FAA has received several reports from pilots that drones may have hit their aircraft, the administration was unableRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Are Your Slack Conversations Really Private and Secure?

An anonymous reader writes: “Chats that seem to be more ephemeral than email are still being recorded on a server somewhere,” reports Fast Company, noting that Slack’s Data Request Policy says the company will turn over data from customers when “it is compelled by law to do so or is subject to a valid and binding order of a governmental or regulatory body…or in cases of emergency to avoid death or physical harm to individuals.” Slack will notify customers before disclosure “unless Slack is prohibited from doing so,” or ifRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Arizona Bill Would Make Students In Grades 4-12 Participate Once In An Hour of Code

theodp writes: Christopher Silavong of Cronkite News reports: “A bill, introduced by [Arizona State] Sen. John Kavanagh [R-Fountain Hills] would mandate that public and charter schools provide one hour of coding instruction once between grades 4 to 12. Kavanagh said it’s critical for students to learn the language — even if it’s only one session — so they can better compete for jobs in today’s world. However, some legislators don’t believe a state mandate is the right approach. Senate Bill 1136 has passed the Senate, and it’s headed to theRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place

Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected. Published by: Dell SonicWALL Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Omnichannel Authentication: Balancing Humanity and Technology

Learn how to make authentication processes less cumbersome for your customers with technology for secure, simple engagement. Published by: NICE Systems, Inc Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Expert Viewpoints on Access Management and Federation

Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Published by: IBM Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Seeking secure Wi-Fi

An issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending Published by: MicroScope Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Protect Your Critical Assets with Identity Governance and Intelligence

Learn how integrating policy and governance controls with identity management processes would help your organization undersand, control, and make better business decisions related to access and risk. Published by: IBM Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Appeals Court: You Have the Right To Film the Police

An anonymous reader quotes a report from Ars Technica: A divided federal appeals court is ruling for the First Amendment, saying the public has a right to film the police. But the 5th U.S. Circuit Court of Appeals, in upholding the bulk of a lower court’s decision against an activist who was conducting what he called a “First Amendment audit” outside a Texas police station, noted that this right is not absolute and is not applicable everywhere. The facts of the dispute are simple. Phillip Turner was 25 in SeptemberRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

ZeniMax Files Injunction To Stop Oculus From Selling VR Headsets

ZeniMax, the parent company of Fallout and Skyrim developer Bethesda, has filed for an injunction against virtual-reality company Oculus over the recent stolen technology case. The company had accused Oculus of stealing VR-related code, and was subsequently awarded $500 million by a Dallas court earlier this month. ZeniMax has now filed additional papers against Oculus, requesting that Oculus’ products using the stolen code be removed from sale. GameSpot reports: Specifically, ZeniMax is seeking to block sales of its mobile and PC developer kits, as well as technology allowing the integrationRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

World's Largest Spam Botnet Adds DDoS Feature

An anonymous reader writes from a report via BleepingComputer: Necurs, the world’s largest spam botnet with nearly five million infected bots, of which one million are active each day, has added a new module that can be used for launching DDoS attacks. The sheer size of the Necurs botnet, even in its worst days, dwarfs all of today’s IoT botnets. The largest IoT botnet ever observed was Mirai Botnet #14 that managed to rack up around 400,000 bots towards the end of 2016 (albeit the owner of that botnet hasRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

FCC To Halt Rule That Protects Your Private Data From Security Breaches

According to Ars Technica, “The Federal Communications Commission plans to halt implementation of a privacy rule that requires ISPs to protect the security of its customers’ personal information.” From the report: The data security rule is part of a broader privacy rulemaking implemented under former Chairman Tom Wheeler but opposed by the FCC’s new Republican majority. The privacy order’s data security obligations are scheduled to take effect on March 2, but Chairman Ajit Pai wants to prevent that from happening. The data security rule requires ISPs and phone companies toRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Fair Use as Consumer Protection

Talking about fair use often means talking about your right to re-use existing copyrighted works in the process of making something new  – to make remixes and documentaries, parodies, or even to build novel Internet search tools. But now that copyright-protected software is in almost everything (including our cars, our toasters, our pacemakers and our insulin pumps) fair use has a new critically important role: basic consumer protection. We entrust a lot of our lives to the devices we use on a daily basis – and to the software insideRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Copyright Law Versus Internet Culture

Throughout human history, culture has been made by people telling one another stories, building on what has come before, and making it their own. Every generation, every storyteller puts their own spin on old tales to reflect their own values and changing times. This creative remixing happens today and it happens in spite of the legal cloud cast by copyright law.  Many of our modern cultural icons are “owned” by a small number of content companies. We rework popular stories to critique them or assign new meanings to them, tellingRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Friday Squid Blogging: Squid Short Story

A short SF story in a tweet. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Source: schneier sec blog

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Researchers Uncover New Leads Behind Shamoon2

Researchers from Arbor Networks’ Security Engineering and Response Team (ASERT) say they have unearthed fresh leads on the tools and techniques used in the most recent wave of Shamoon attacks. Source: threatpost

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Security Lapse Exposed New York Airport's Critical Servers For a Year

An anonymous reader quotes a report from ZDNet: A security lapse at a New York international airport left its server backups exposed on the open internet for almost a year, ZDNet has found. The internet-connected storage drive contained several backup images of servers used by Stewart International Airport, but neither the backup drive nor the disk images were password protected, allowing anyone to access their contents. Since April last year, the airport had been inadvertently leaking its own highly-sensitive files as a result of the drive’s misconfiguration. Vickery, who alsoRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Cloudflare Leaked Web Customer Data For Months

Potential scope of issue evokes comparisons to Heartbleed. Source: dark reading attack

Spread the love
  •  
  •  
  •  
  •  
  •  
  •