Cracking down on Amazon review profiteers, raking in the dough finding security flaws, the sad state of security, the US loses the keys to the Internet, and lots more as Dedi, Ben, Lyle, and Miles cover the week in geek news. Oh, and Lyle shot himself in the leg.
If you think Apple killed the headphone jack on the iPhone 7 a little prematurely, you’re not the only one – and now there’s a company that wants to bring it back.
Amazon […] will eliminate any incentivized reviews, except for those that emerge from within its own Amazon Vine program. This program allows Amazon – not the seller or vendor – to identify trusted reviewers, and has a number of controls in place in order to keep bias out of the review process.
Like a lot of people, we read Amazon reviews as part of our product research. Getting broad feedback on a product can be very useful when we’re looking for widespread issues or seeing how a company handles warranty claims. However, as time has gone by, we’ve begun to read user reviews with a far more critical eye.
A controversial broker of security exploits is offering $1.5 million (£1.2 million) for attacks that work against fully patched iPhones and iPads, a bounty that’s triple the size of its previous one.
At the Black Hat hacking conference, Apple announced a list of vulnerabilities that would command big bounties, including $25,000 for ways around Apple’s digital compartments and into its customers’ data, $50,000 for bugs that give hackers a way into iCloud data, and $200,000 to turn over critical vulnerabilities in Apple’s firmware — the software that lies closest to the bare metal of the machine.
The battleground state of Pennsylvania might as well have a target on its back as Election Day nears, the cybersecurity company Carbon Black warned in a new report released Thursday.
On Friday, the Rosetta mission came to a close. At 11:19 UTC, the radio signal received at Earth from the spacecraft was cut off when the orbiter became a lander, slowly impacting and coming to rest on the surface of a comet.
At that moment, it became more than it once was; it became a part of the comet it had been chasing since it was launched on March 2, 2004.
Randall Monroe uses his famous online comic to poke a little fun at the end of the Rosetta comet-encounter mission.
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.
Here’s a live map of infected nodes in the Mirai botnet.
Yahoo! Inc.’s accounts were hacked in 2014 by cybercriminals rather than a state-sponsored party as the web portal claimed, according to an official with InfoArmor, a security company.
The survey revealed that the majority of respondents understand that their digital behavior puts them at risk, but do not make efforts to change it.
With the 500 million accounts involved in the breach disclosed last week, the stolen passwords were encrypted. Yahoo concluded the risk of misuse was low so it notified users and encouraged them to reset their passwords themselves.
A judge in Texas has put the kibosh on a last-minute legal attempt to block the controversial decision for the US to give up control of one of the key systems that powers the internet.
One common complaint in the twenty-first century is that nothing is built to last. Even complex, expensive computers seem to have a relatively short shelf-life nowadays. One computer in a small auto repair shop in Gdansk, Poland, however, has survived for the last twenty-five years against all odds.
e41 s16