Cerulean Studios Releases Trillian IM Protocol Specifications

Runefox writes “Cerulean Studios, the company behind the long-lived Trillian instant messaging client, has released preliminary specifications to their proprietary “Astra” protocol, now named IMPP (Instant Messaging and Presence Protocol), which provides continuous client functionality as well as mandatory TLS encryption for clients. According to their blog, Cerulean Studios’ motivation for the release is to … Continue reading

Supreme Court Decides Your Silence May Be Used Against You

crackspackle writes “The Supreme Court ruled in favor of the State of Texas earlier today in a murder trial where the defendant, prior to be taken into custody, had been questioned by the police and chose to remain silent on key questions. This fact was bought up at trial and used to convict him. Most … Continue reading

State Photo-ID Databases Mined By Police

Rick Zeman writes “Showing once again that once a privacy door is opened every law enforcement agency will run through it, The Washington Post details how state drivers license photo databases are being mined by various LEOs in their states–and out. From the article: ‘[L]aw enforcement use of such facial searches is blurring the traditional … Continue reading

A Database of Brains

aarondubrow writes “Researchers recently created OpenfMRI, a web-based, supercomputer-powered tool that makes it easier for researchers to process, share, compare and rapidly analyze fMRI brain scans from many different studies. Applying supercomputing to the fMRI analysis allows researchers to conduct larger studies, test more hypotheses, and accommodate the growing spatial and time resolution of brain … Continue reading

Prosecutors Push For Anti-Phone-Theft Kill Switches

New submitter EdPbllips writes “Law enforcement officials nationwide are demanding the creation of a ‘kill switch’ that would render smartphones inoperable after they are stolen, New York’s top prosecutor said Thursday in a clear warning to the world’s smartphone manufacturers. Citing statistics showing that 1 in 3 robberies nationwide involve the theft of a mobile … Continue reading

MtGox Phishing Campaign Hits Bing, Yahoo!

An active phishing campaign targeting account holders at popular Bitcoin exchange MtGox.com has hijacked the top search results at Bing and Yahoo.com, redirecting unwary clickers to mtpox.com, a look-alike domain and Web site that was registered on June 12, 2013, less than 24 hours ago. Check out the video I recorded of this phish in … Continue reading

The Value of a Hacked Email Account

One of the most-viewed stories on this site is a blog post+graphic that I put together last year to illustrate the ways that bad guys can monetize hacked computers. But just as folks who don’t bank online or store sensitive data on their PCs often have trouble understanding why someone would want to hack into … Continue reading

Vrublevsky Arrested for Witness Intimidation

Pavel Vrublevsky, the owner of Russian payments firm ChronoPay and the subject of an upcoming book by this author, was arrested today in Moscow for witness intimidation in his ongoing trial for allegedly hiring hackers to attack against Assist, a top ChronoPay competitor. Pavel Vrublevsky’s Facebook profile photo. Vrublevsky is on trial for allegedly hiring two brothers … Continue reading

FDIC: 2011 FIS Breach Worse Than Reported

A 2011 hacker break-in at banking industry behemoth Fidelity National Information Services (FIS) was far more extensive and serious than the company disclosed in public reports, banking regulators warned FIS customers last month. The disclosure highlights a shocking lack of basic security protections throughout one of the nation’s largest financial services providers. Jacksonville, Fla. based FIS … Continue reading

What Can You Find Out From Metadata?

cervesaebraciator writes “In the wake of recent revelations from Edward Snowden, apologists for the state security apparatus are predictably hitting the airwaves. Some are even ‘glad’ the NSA has been doing this. A major point they emphasize is that the content of calls have remained private and it is only the metadata that they’re interested … Continue reading