Jack Reviews Mirai's Password

Teaser medium

Cracking down on Amazon review profiteers, raking in the dough finding security flaws, the sad state of security, the US loses the keys to the Internet, and lots more as Dedi, Ben, Lyle, and Miles cover the week in geek news. Oh, and Lyle shot himself in the leg.

iPhone 7 is getting the headphone jack back, courtesy of Fuze

If you think Apple killed the headphone jack on the iPhone 7 a little prematurely, you’re not the only one – and now there’s a company that wants to bring it back.

Amazon bans incentivized reviews tied to free or discounted products

Amazon […] will eliminate any incentivized reviews, except for those that emerge from within its own Amazon Vine program. This program allows Amazon – not the seller or vendor – to identify trusted reviewers, and has a number of controls in place in order to keep bias out of the review process.

Let’s Talk About Amazon Reviews: How We Spot the Fakes | The Wirecutter

Like a lot of people, we read Amazon reviews as part of our product research. Getting broad feedback on a product can be very useful when we’re looking for widespread issues or seeing how a company handles warranty claims. However, as time has gone by, we’ve begun to read user reviews with a far more critical eye.

iPhone exploit bounty surges to an eye-popping $1.5 million | Ars Technica

A controversial broker of security exploits is offering $1.5 million (£1.2 million) for attacks that work against fully patched iPhones and iPads, a bounty that’s triple the size of its previous one.

Apple Will Pay a ‘Bug Bounty’ to Hackers Who Report Flaws - The New York Times

At the Black Hat hacking conference, Apple announced a list of vulnerabilities that would command big bounties, including $25,000 for ways around Apple’s digital compartments and into its customers’ data, $50,000 for bugs that give hackers a way into iCloud data, and $200,000 to turn over critical vulnerabilities in Apple’s firmware — the software that lies closest to the bare metal of the machine.

Cybersecurity expert: Pennsylvania most vulnerable to voting system hacks

The battleground state of Pennsylvania might as well have a target on its back as Election Day nears, the cybersecurity company Carbon Black warned in a new report released Thursday.

Goodnight Rosetta - Bad Astronomy

On Friday, the Rosetta mission came to a close. At 11:19 UTC, the radio signal received at Earth from the spacecraft was cut off when the orbiter became a lander, slowly impacting and coming to rest on the surface of a comet.
At that moment, it became more than it once was; it became a part of the comet it had been chasing since it was launched on March 2, 2004.

xkcd: Rosetta

Randall Monroe uses his famous online comic to poke a little fun at the end of the Rosetta comet-encounter mission.

Source Code for IoT Botnet ‘Mirai’ Released

The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

Here’s a Live Map of the Mirai Malware Infecting the World | Motherboard

Here’s a live map of infected nodes in the Mirai botnet.

Yahoo Hacked by Criminals, Not State Sponsor, Security Firm Says

Yahoo! Inc.’s accounts were hacked in 2014 by cybercriminals rather than a state-sponsored party as the web portal claimed, according to an official with InfoArmor, a security company.

The psychological reasons behind risky password practices - Help Net Security

The survey revealed that the majority of respondents understand that their digital behavior puts them at risk, but do not make efforts to change it.

Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say

With the 500 million accounts involved in the breach disclosed last week, the stolen passwords were encrypted. Yahoo concluded the risk of misuse was low so it notified users and encouraged them to reset their passwords themselves.

Management, Meetings and Time

Has the US just given away the internet?

A judge in Texas has put the kibosh on a last-minute legal attempt to block the controversial decision for the US to give up control of one of the key systems that powers the internet.

Battered But Not Beaten Commodore C64 Survives Over 25 Years Balancing Drive Shafts In Auto Repair Shop

One common complaint in the twenty-first century is that nothing is built to last. Even complex, expensive computers seem to have a relatively short shelf-life nowadays. One computer in a small auto repair shop in Gdansk, Poland, however, has survived for the last twenty-five years against all odds.

e41 s16