Canada

Strict New Anti-Spam Regulations In Canada 101

An anonymous reader writes "David Reese provides an interesting analysis of just how far Canada's new anti-spam legislation goes, and its implications for business. This may provide a valuable template for citizens of other countries, and may also encourage Canadians to prepare for the inevitable push-back from spammers. It is not clear from this analysis whether the legislation would affect telemarketing, but even if it does not it provides a useful precedent for future regulation in that area."
Google

How Not To Be a SEO Spammer 65

An anonymous reader writes "The head of Google's webspam team, Matt Cutts, has blogged about one of his colleagues receiving an email offering SEO services to help the web site www.google.com. The irony wasn't lost on Matt, who has blogged about these emails before. As this article points out, if ever there was evidence that the people who send many of these emails haven't done their homework, this is it."
Technology

Samsung Launches 3200x1800 Pixel ATIV Book 9 Plus Laptop 397

sfcrazy writes "As expected Samsung has updated its Ultrabook family giving direct competition to Apple's MacBook Pro and MacBook Air. When Apple launched its MacBook Air with 12 hours of battery life every one was looking at only one company to outdo Apple and that company was Samsung and the leading Android maker did not disappoint. With the launch of ATIV Book 9 Plus featuring:

* 256GB SSD (seems 128GB would be the base model)
* 3200x1800 resolution
* Touch Screen
* Haswell Processor
* 12 Hours battery life
* More 'standard' ports as compared to Apple's proprietary ports."
Privacy

Video Author Peter Wayner Talks About Autonomous Cars (Video) Screenshot-sm 50

Peter Wayner is no stranger to Slashdot. Not only that, he's written a bunch of books, plus articles for InfoWorld, PC World, the New York Times, and many other publications. Now he's working on a book about Autonomous Cars. Last year Peter wrote an article for Car & Driver about the privacy implications of vehicle recorders. Driverless cars will bring us a whole new set of problems, questions, and -- no doubt -- legislation. We're hoping to have more conversations on this topic (and others) with Peter in the future, so with any luck this video will be the first of a long series. With all that said, take it away, interviewer Timothy Lord... Update: 06/05 21:56 GMT by T : Peter's book is still in progress, but it's got a website, if you'd like an early glance.
Movies

Video WeVideo Helps You Edit Your Videos Online (Video) 48

This video is WeVideo CEO Jostein Svendsen talking about his company's service, not a demo of it, although we surely should do a demo/review of WeVideo before long. If you are involved in casual video production, this is something you need to check out. And if you want to try editing a video or two but have no idea if you're going to be good enough that it will be worth spending money on video editing software, plus the time to learn how to use it, WeVideo's free version (which puts a watermark on your finished video) might be a good way to try your hand at this necessary but unheralded part of the videomaking process.
Privacy

Why We Should Celebrate Snapchat and Encourage Ephemeral Communication 140

An anonymous reader writes "Within a few months of launching, Snapchat has made an enormous and lasting impact on the culture of communication on the Internet – and we should all be grateful. They have simplified a security process enough to the point that anybody can use it, while validating the market of the next generation of privacy-preserving ephemeral communication. Most importantly, we may finally get a break from the forced permanence of the Facebook and Google world, where everything you do and share is a data point to be monetized and re-sold to the highest bidder."
Microsoft

Microsoft Reads Your Skype Chat Messages 275

An anonymous reader writes "A Microsoft server accesses URLs sent in Skype chat messages, even if they are HTTPS URLs and contain account information. A reader of Heise publications notified Heise Security (link to German website, Google translation). They replicated the observation by sending links via Skype, including one to a private file storage account, and found that these URLs are shortly after accessed from a Microsoft IP address. When confronted, Microsoft claimed that this is part of an effort to detect and filter spam and phishing URLs."
Spam

Suspect Arrested In Spamhaus DDoS Attack 95

New submitter apenzott writes "According to the BBC, a Dutch citizen has been arrested by Spanish police who suspect he was behind the recent Spamhaus DDOS attack, one of the biggest such attacks ever. 'The man arrested is believed to be Sven Kamphuis, the owner and manager of Dutch hosting firm Cyberbunker that has been implicated in the attack.' According to a press release from the Dutch Public Prosecutor (Google translation of Dutch original), the 35-year-old man's computers and other devices have been seized as evidence. The man will be transferred from Spain to the Netherlands shortly. 'Spamhaus is delighted at the news that an individual has been arrested and is grateful to the Dutch police for the resources they have made available and the way they have worked with us,' said a Spamhaus spokesman."
Businesses

Two Changes To Quirky Could Change The World 103

"Quirky.com has generated a lot of buzz," writes frequent contributor Bennett Haselton, "but it's hard to see how it could ever be more than a novelty unless they change two key features of their process. Fortunately, they already have all the infrastructure in place for bringing inventions to fruition, so that with these two changes, Quirky really could deliver on their early promise to change the way products get invented." Read on for Bennett's thoughts — which seem more sensible than quirky.
Television

Amazon Debuts Mixed Bag of Original Comedy Pilots 67

itwbennett writes "Amazon sent out a press release over the weekend announcing that the pilots for their original shows 'held 8 spots on the list of 10 most streamed Amazon VOD episodes.' So blogger and entertainment junkie Peter Smith decided to spend a couple of hours seeing if they were worth watching. He managed to sit through 4 of the 8 comedy shows and found a mixed bag — one a clear miss, two meh, and one he'd like to see turned into a series. Have you watched any of the pilots? What did you think?" The quality of these the pilots is not the only way they're a mixed bag: for many Linux users, they're simply not watchable. Watch soon for unknown_lamer's screed on the fat lot of good(will) Amazon is generating by making it harder to legally get these shows.
Google

Google Reinstates Federated Jabber/XMPP Instant Messaging 32

jrepin writes "A few weeks ago the FSF reported that Google had started blocking invites sent from non-Google Jabber servers. This was done as a crude anti-spam measure. Google have since rolled out proper anti-spam filtering for its Jabber service, and has removed the invite block. This was announced a few days ago in a public mailing list post. This means that users of all Jabber servers will once again be able to fully communicate with Google users."
Social Networks

LinkedIn Invites Gone Wild: How To Keep Close With Exes and Strangers 164

sholto writes "An aggressive expansion strategy by LinkedIn has backfired spectacularly amid accusations of identity fraud. Users complained the social network sent unrequested invites from their accounts to contacts and complete strangers, often with embarrassing results. One man claimed LinkedIn sent an invite from his account to an ex-girlfriend he broke up with 12 years ago who had moved state, changed her surname and her email address. ... 'This ex-girlfriend's Linked in profile has exactly ONE contact, ME. My wife keeps getting messages asking 'would you like to link to (her)? You have 1 contact in common!,' wrote Michael Caputo, a literary agent from Massachussetts."
Twitter

Twitter Launches the World's Umpteenth Online Music Site 45

Nerval's Lobster writes "Twitter is plunging into the online music game. Twitter Music (or "Twitter #music," in the company's own rendering) uses Twitter activity such as Tweets and engagement "to detect and surface the most popular tracks and emerging artists," according to an April 18 posting on Twitter's official blog. Songs on the app derive from three sources: iTunes, Spotify, or Rdio. And yes, Twitter is big, but its victory is by no means assured: other IT giants have entered the same market only to watch highly-publicized projects wither away, doomed by some combination of audience apathy and implementation issues. Take Apple's Ping, for example: launched in September 2010 as part of an iTunes update, the ambitious social-networking and music-recommendation engine immediately ran into a number of problems, including a lack of Facebook integration (despite Steve Jobs' assurances to the contrary) and widespread reports of spam and fake accounts. Can Twitter's effort stand out, or will it just be lost in all the noise?"
Books

Book Review: The Death of the Internet 102

benrothke writes "When I first heard about the book The Death of the Internet, it had all the trappings of a second-rate book; a histrionic title and the fact that it had nearly 50 contributors. I have seen far too many books that are pasted together by myriad disparate authors, creating a jerry-rigged book with an ISBN, but little value or substance. The only negative thing about the book is the over the top title, which I think detracts from the important message that is pervasive in it. Other than that, the book is a fascinating read. Editor Markus Jakobsson (Principal Scientist for Consumer Security at PayPal) was able to take the collected wisdom from a large cross-section of expert researchers and engineers, from different countries and nationalities, academic and corporate environments, and create an invaluable and unique reference." Read below for the rest of Ben's review.
Spam

Maintaining a Publicly Available Blacklist - Mechanisms and Principles 89

badger.foo writes "When you publicly assert that somebody sent spam, you need to ensure that your data is accurate. Your process needs to be simple and verifiable, and to compensate for any errors, you want your process to be transparent to the public with clear points of contact and line of responsibility. Here are some pointers from the operator of the bsdly.net greytrap-based blacklist."
Security

Popular Wordpress Plug-in Caught Spamming Is Put On Probation 76

chicksdaddy writes "Social Media Widget, a free plug-in for the WordPress blogging platform with more than a million downloads, was restored to WordPress's official plugin directory on Thursday, days after it was found injecting WordPress websites with spam links to web sites offering Pay Day Loans. In a post on a support forum for Social Media Widget (SMW), Samuel Wood, a WordPress administrator, said that WordPress was willing to give SMW and its owner a second chance after he claimed to have been the victim of a contract developer gone rogue. 'Naturally we do take a very hard line on spam, and obviously an author putting malicious code into a plugin is enough grounds for us to bring down the ban hammer,' Wood wrote on Friday. 'But there are natural circumstances where an author may not be at fault.' SMW appears to be such a case. It is one of the 20 most popular WordPress add-ons and allows WordPress web site operators to include links to their other social media accounts. Brendan Sheehan, the owner of SMW, said, 'We trusted the wrong people with our plugin code and take full responsibility. We are a marketing company at heart and are not actually developers, so in order to provide major updates and improvements, we had to seek outside help. Some of these people deceived us and abused our trust and naivety...We will not make this mistake again.' Wood said the folks at Wordpress decided to accept that story — but that they're watching SMW closely. 'Basically, the current maintainer is not a professional programmer, and put his trust in the wrong freelancers to do the coding work for him...We'll be watching the plugin for changes,' he said. 'The plugin is back up for now, and as long as it stays clean, it's fine.'"
Spam

Is Eccentric Sven Olaf Kamphius To Blame For Spamhaus DDoS? 133

RougeFemme writes "Sven Olaf Kamphius, self-described 'Internet freedom fighter,' is reportedly at the center of the investigation into this week's alleged cyber-attack against Spamhaus, a group that fights Internet spam. Mr. Kamphius became incensed when Spamhaus blacklisted two companies that he runs, including Cyberbunker, a company that, earlier this week, claimed be under attack from Dutch swat teams. Though he initially solicited support for a DDoS against Spamhaus, he now disavows any direct role in the cyberattack, which threatened to slow some web traffic to a crawl."
Security

Did the Spamhaus DDoS Really Slow Down Global Internet Access? 70

CowboyRobot writes "Despite the headlines, the big denial of service attack may not have slowed the Internet after all. The argument against the original claim include the fact that reports of Internet users seeing slowdowns came not from service providers, but the DDoS mitigation service CloudFlare, which signed up Spamhaus as a customer last week. Also, multiple service providers and Internet watchers have now publicly stated that while the DDoS attacks against Spamhaus could theoretically have led to slowdowns, they've seen no evidence that this occurred for general Internet users. And while some users may have noticed a slowdown, the undersea cable cuts discovered by Egyptian sailors had more of an impact than the DDoS."
Networking

Misconfigured Open DNS Resolvers Key To Massive DDoS Attacks 179

msm1267 writes with an excerpt From Threat Post: "While the big traffic numbers and the spat between Spamhaus and illicit webhost Cyberbunker are grabbing big headlines, the underlying and percolating issue at play here has to do with the open DNS resolvers being used to DDoS the spam-fighters from Switzerland. Open resolvers do not authenticate a packet-sender's IP address before a DNS reply is sent back. Therefore, an attacker that is able to spoof a victim's IP address can have a DNS request bombard the victim with a 100-to-1 ratio of traffic coming back to them versus what was requested. DNS amplification attacks such as these have been used lately by hacktivists, extortionists and blacklisted webhosts to great success." Running an open DNS resolver isn't itself always a problem, but it looks like people are enabling neither source address verification nor rate limiting.

Slashdot Top Deals