An anonymous reader quotes a report from Reuters: Social media website Reddit, known for its commitment to free speech, will crack down on online harassment by banning or suspending users who target others, starting with those who have directed abuse at Chief Executive Steve Huffman. Huffman said in an interview with Reuters that Reddit's content policy prohibits harassment, but that it had not been adequately enforced. "Personal message harassment is the most cut and dry," he said. "Right now we are in an interesting position where my inbox is full of them, it's easy to start with me." As well as combing through Huffman's inbox, Reddit will monitor user reports, add greater filtering capacity, and take a more proactive role in policing its platform rather than relying on community moderators. Reddit said it had identified hundreds of the "most toxic users" and will warn, ban or suspend them. It also plans to increase staff on its "trust and safety" team. On Reddit, a channel supporting the U.S. Republican party's presidential candidate Donald Trump, called r/The_Donald, featured racist and misogynistic comments, fake news and conspiracy theories about his Democratic challenger Hillary Clinton, along with more mainstream expressions of support for Trump. Many of those supporting Trump were very active, voting up the r/The_Donald conversations so that they became prominent across Reddit, which is the 7th-most-visited U.S. internet site, according to web data firm Alexa. Last week, Reddit banned Pizzagate, a community devoted to a conspiracy theory, with no evidence to back it up, that links Clinton to a pedophile ring at a Washington, D.C. pizza parlor, after it posted personal information in violation of Reddit policy. Huffman then used his administrative privileges to redirect abuse he was receiving on a thread on r/The_Donald to the community's moderators -- making it look as if it was intended for them. Huffman said it was a prank, and that many Reddit users, including some Trump supporters, told him they thought it was funny, but it inflamed the situation.
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Copyright holders asked Google to remove more than 1,000,000,000 allegedly infringing links from its search engine over the past twelve months, TorrentFreak reports. According to stats provided in Google's Transparency Report for the past one year, Google was asked to remove over one billion links -- or 1,007,741,143 links. From the article: More than 90 percent of the links, 908,237,861 were in fact removed. The rest of the reported links were rejected because they were invalid, not infringing, or duplicates of earlier requests. In total, Google has now processed just over two billion allegedly infringing URLs from 945,000 different domains. That the second billion took only a year, compared to several years for the first, shows how rapidly the volume of takedown requests is expanding. At the current rate, another billion will be added by the end of next summer. Most requests, over 50 million, were sent in for the website 4shared.com. However, according to the site's operators many of the reported URLs point to the same files, inflating the actual volume of infringing content.
Two Swedish developers have created a site offering a way to wipe your entire existence off the internet in a few clicks. schwit1 quotes The Next Web: When logging into the website with a Google account it scans for apps and services you've created an account for, and creates a list of them with easy delete links. Every account it finds gets paired with an easy delete link pointing to the unsubscribe page for that service. In a few clicks you're freed from it, and depending on how long you need to work through the entire list, you can be account-less within the hour.
I'm a little uncomfortable giving a stranger's web site access to my personal information - even if it is for the purpose of deleting it altogether. But the original submission ends with an interesting question. "Can we get this for government databases too?"
I'm a little uncomfortable giving a stranger's web site access to my personal information - even if it is for the purpose of deleting it altogether. But the original submission ends with an interesting question. "Can we get this for government databases too?"
An anonymous reader writes:Apple has released the open source Darwin code for macOS 10.12 Sierra. The code, located on Apple's open source website, can be accessed via direct link now, although it doesn't yet appear on the site's home page. The release builds on a long-standing library of open source code that dates all the way back to OS X 10.0. There, you'll also find the Open Source Reference Library, developer tools, along with iOS and OS X Server resources. The lowest layers of macOS, including the kernel, BSD portions, and drivers are based mainly on open source technologies, collectively called Darwin. As such, Apple provides download links to the latest versions of these technologies for the open source community to learn and to use.
An anonymous reader quotes a report from Reuters: South Korean prosecutors raided the offices of Samsung Group on Wednesday, a prosecution official said, after media reports of alleged links with a confidante of President Park Geun-hye who has been indicted in an influence-peddling scandal. Prosecutors also raided South Korea's largest pension fund, the National Pension Service (NPS), an NPS spokeswoman said. The Yonhap news agency reported that investigators were probing NPS's decision to approve the $8 billion merger of Samsung CT Corp and Cheil Industries last year. The raids signaled that prosecutors are expanding their investigation into allegations of influence-peddling in the corruption scandal that has rocked Park's presidency over the relationship between the government and big businesses. NPS, the world's third-largest pension fund, has come under scrutiny by the media and civic groups over its approval as a major shareholder of the merger between two affiliates of Samsung Group, South Korea's largest family-run conglomerate. Its backing was seen as crucial to the success of the merger and some South Korean media reports said its approval came under mysterious circumstances. Prosecutors raided four locations -- the NPS headquarters, NPS Investment Management office headquarters, Samsung Group offices and the office of a former NPS investment management official -- said a prosecution official who was not authorized to speak to the media and declined to be identified. Park and her confidante, Choi Soon-sil, are under investigation for allegedly improperly pressuring major conglomerates, including the Samsung Group, to raise funds for foundations that backed Park's policy of promoting the cultural and sports communities.
According to a new study reported by The Wall Street Journal, Google's search results tend to lean liberal. "An analysis by online-search marketer CanIRank.com found that 50 recent searches for political terms on Google surfaced more liberal-leaning webpages than conservative ones, as rated by a panel of four people." The Denver Channel reports: "Minimum wage" tended to yield more liberal results, while "does gun control reduce crime" resulted in more conservative ones. Searches for "financial regulation" and "federal reserve" found mostly nonpartisan links. CanIRank used the opinions of four people to determine how liberal or conservative each website was. For 16 percent of the political search terms studied, no right-leaning results showed up at all on the first page of results. CanIRank noted this could be a problem for democracy. A different study found most people click on one of the first five search results. Users rarely move on to the second page. A Google spokesperson said in an email to the WSJ: "From the beginning, our approach to search has been to provide the most relevant answers and results to our users, and it would undermine people's trust in our results, and our company, if we were to change course." According to Google, their results are "determined by algorithms using hundreds of factors" and "reflect the content and information that is available on the internet."
An anonymous reader quotes a report from Motherboard: Israeli hacker Amihai Neiderman needed three days to hack into Tel Aviv's free public Wi-Fi. He only worked during the evenings, after he came home from his full-time job as a security researcher. The 26-year-old said the difficulty level was "a solid 5" on a scale from 1 to 10. The hack, performed in 2014 and recently explained in detail during the DefCamp conference in Bucharest, Romania, shows how vulnerable public networks can be and why we should encrypt our web traffic while accessing them. He hacked his city out of curiosity. One day, he was driving home from work and he noticed the "FREE_TLV" displayed on his smartphone. He had no idea what it was, but got intrigued. It turned out to be Tel Aviv's free municipal Wi-Fi network. The hacker connected to it and checked what his IP was, using http://whatismyip.com. This way, you usually find the address of the router that links you to the internet. To hack Tel Aviv, he needed to take control over this device. Neiderman got home and found out that the router had one port open. He tried it. This step allowed him to determine the manufacturer of the router. It turned out to be Peplink, a company he had never heard of. It made the mistake of having the administration interfaces online. At this point, he still didn't know what device he was connecting to. He compared different products displayed on the company's website and looked for additional clues in the messages sent to him by the unidentified device. He finally found out it was a high-end load balancing router. All he needed was a vulnerability to exploit. But breaking the firmware of the router seemed time consuming, as files were encrypted, so the hacker took a different approach. He found a less protected version of the firmware, used for a different device, and found a vulnerability there. To his luck, the same glitch was present in the version installed on the very devices that made up "FREE_TLV." He tested the hack at home, emulating the city's network, and it worked. A real-life test would had been illegal.
Instagram Stories will soon be receiving several big new features that will help users build "deeper connections" and "tell a richer story." An update rolling out Thursday will bring mentions, links and Boomerang support to Stories. Mashable reports: With the update, users can tag accounts within their Stories just like they'd tag accounts in a photo or video post. When an account is tagged in a Story, tapping their username will link to their account page. Interestingly, unlike photo tagging, being tagged in a Story will notify you within a direct message with the person who tagged you (if a friend tags you in a normal photo post, the notification will appear in your main activity feed.) Tags aren't the only new way you can interact with Stories. Instagram is also adding the ability to link to web pages within Story posts -- for verified account holders. (Instagram says this feature is for verified accounts only for now since it's still a test but that could change at some point in the future.) Finally, the app is integrating Boomerang -- Instagram's app for one-second videos -- directly into Stories. What's more, Instagram's built-in version of Boomerang will have a couple of features not part of the main app, like the ability to switch between the front and rear-facing camera and the ability to capture a shorter clip.
Hours after Donald Trump won the Presidential Election, a group of hackers that is widely believed to be Russian and was involved in the breach of the Democratic National Committee launched a wave of attacks against dozens of people working at universities, think tanks, NGOs, and even inside the US government. From a report on Motherboard:Around 9 a.m. ET on Wednesday, the hackers sent a series of phishing emails trying to trick dozens of victims into opening booby-trapped attachments containing malware, and clicking on malicious links, according to security firm Volexity, which observed and reported the five attack waves. The targets work for organizations such as Radio Free Europe / Radio Liberty, the Atlantic Council, the RAND Corporation, and the State Department, among others. One of the phishing emails included a forwarded message appearing to be from the Clinton Foundation, apparently sent by a professor at Harvard. The email used the professor's real address, and according to Volexity's founder Steven Adair, it's likely that the professor got hacked and the attackers then used his account to send out the phishing emails. (The professor did not respond to a request for comment.) One of the targets, who shared the email she received with Motherboard, said she "almost fell for it."
Reader Trailrunner7 writes: After years of encouraging site owners to transition to HTTPS by default, Google officials say that the effort has begun to pay off. The company's data now shows that more than half of all pages loaded by Chrome on desktop platforms are served over HTTPS. Google has been among the louder advocates for the increased use of encryption across the web in the last few years. The company has made significant changes to its own infrastructure, encrypting the links between its data center, and also has made HTTPS the default connection option on many of its main services, including Gmail and search. And Google also has been encouraging owners of sites of all shapes and sizes to move to secure connections to protect their users from eavesdropping and data theft. That effort has begun to bear fruit in a big way. New data released by Google shows that at the end of October, 68 percent of pages loaded by the Chrome browser on Chrome OS machines were over HTTPS. That's a significant increase in just the last 10 months. At the end of 2015, just 50 percent of pages loaded by Chrome on Chrome OS were HTTPS. The numbers for the other desktop operating systems are on the rise as well, with macOS at 60 percent, Linux at 54 percent, and Windows at 53 percent.
sciencehabit writes from a report via Science Magazine: Since at least the 1960s, the shrinkage of the ice cap over the Arctic Ocean has advanced in lockstep with the amount of greenhouse gases humans have sent into the atmosphere, according to a study published this week in Science. Every additional metric ton of carbon dioxide (CO2) puffed into the atmosphere appears to cost the Arctic another 3 square meters of summer sea ice -- a simple and direct observational link that has been sitting under scientists' noses. If current emission trends hold, the study suggests the Arctic will be ice free by 2045 -- far sooner than some climate models predict. The study suggests that those models are underestimating how warm the Arctic has already become and how fast that melting will proceed. And it gives the public and policymakers a concrete illustration of the consequences of burning fossil fuels. For instance, a U.S. family of four would claim nearly 200 square meters of sea ice, based on U.S. emissions in 2013. Over 3 decades, that family would be responsible for destroying more than an American football field's worth of ice.
An anonymous reader quotes a report from Ars Technica: Basketball players that were grimly reminded of their own inevitable demise before playing took more shots and scored more points in a study published in an upcoming issue of Journal of Sport and Exercise Psychology. The researchers behind the experiments hypothesize that the pep-talk tactic fits with the established "terror management theory," which proposes that humans are motivated to seek self-esteem, meaning, and symbolic immortality -- in this case becoming a famous athlete -- in order to manage their fear of death. For the study, Helm and colleagues first recruited basketball players to play two back-to-back, one-on-one games with lead researcher Colin Zestcott, another psychologist at the University of Arizona. (The players didn't know that Zestcott was a researcher; they thought he was another study participant.) After the first game, half of the participants were randomly assigned to take a questionnaire on how they felt about basketball. The other half took one about their thoughts on their own death. Those that took the spooky survey saw a 40-percent boost in their individual performance during the second game as compared with their first. Those that took the non-macabre survey saw no change. In a second experiment, participants were given a basket-shooting challenge, which a researcher described to them in a 30-second tutorial. Based on a coin-toss, half the participants got the tutorial while the researcher was wearing a plain jacket. The other half saw the researcher in a T-shirt with a skull-shaped word-cloud made entirely of the word 'death.' The participants' performance on the shooting challenge was then scored by another researcher who didn't know which players saw the death shirt. In the end, players who did see the shirt took more shots, and outperformed by 30 percent, those that just saw the jacket. "We've known from many studies that reminders of death arouse a need for terror management and therefore increase self-esteem striving through performance on relatively simple laboratory tasks," Peter Helm, a study co-author and psychologist at the University of Arizona, said in a news release. "However, these experiments are the first to show that activating this motivation can influence performance on complex, real-world behaviors."
Back in the early days of the internet, users would post links to pirated content on dedicated file-sharing sites. But that trend has died down significantly over the past several years in favor of social media and sites like Reddit. Facebook is one of the sites that has been under pressure from the entertainment industry about taking action against piracy, and they are complying. According to anti-piracy outfit BREIN, the company responded by deleting nine "pirate" groups complained about by the entertainment industry. TorrentFreak reports: "Links to infringing files hosted on cloud services were indexed on the pages. Knowingly posting links to infringing files is itself a violation," BREIN says. After being contacted by BREIN, Facebook responded by deleting all nine 'pirate' groups. However, this wasn't the first time the social network has taken this kind of action. BREIN says that earlier this year Facebook removed a number of similar groups following complaints of infringement. But while shutting down 'pirate' groups will have some short-term effect, the people that were participating in them are likely to regroup and set up elsewhere. Of course, BREIN can follow them to their new homes but it's also aware of the value of targeting individuals. "The posters of the infringing links are also often the illegal uploader of unauthorized files [on cyberlocker sites]," BREIN says, adding that in some circumstances it will seek to hold those people responsible for their actions.
Opera has long advertised its free VPN service Opera Max to customers. But it looks like, the company isn't pleased with users keeping its servers at work at all times. Over the last few days, according to a report on AndroidPolice, Opera Max has introduced ads on its apps, as well as links to sponsored apps. But the company is not done yet. It now requires a user to go back to the app and "add time" to the free VPN service every 12 hours if they wish to continue the service. Adding time doesn't cost anything, but it will subject users to an ad on each occasion.
The hacker (or a group of hackers) who call themselves The Shadow Brokers today published more files. From an article on Motherboard: This latest release comes while Hal Martin, an NSA contractor and, according to The Washington Post , the prime suspect in The Shadow Brokers case sits in detention after being arrested for allegedly stealing swaths of classified material. "TheShadowBrokers is having special trick or treat for Amerikanskis tonight," a message from the hackers posted to Medium reads. The message is signed with the same PGP key used to sign several previous posts, including the group's original announcement that came with links to a slew of NSA exploits. As for the files, The Shadow Brokers claim they reveal IP addresses linked to the Equation Group, a hacking unit widely believed to be tied to the NSA. "This is being equation group pitchimpair (redirector) keys, many missions into your network is/was coming from these ip addresses," The Shadow Brokers' post continues.The report adds that the dump contains 300 folders of files -- all corresponding to different domains and IP addresses. Security researcher who goes by the alias Hacker Fantastic the dump contains 306 domains and 352 IP addresses relating to 49 countries in total. "If accurate, victims of the Equation Group may be able to use these files to determine if they were potentially targeted by the NSA-linked unit."
More than one million formerly broken links in the English Wikipedia have been updated to archived versions from the Wayback Machine, thanks to a partnership between the Internet Archive, and volunteers from the Wikipedia community, and the Wikimedia Foundation. From a blog post: The Internet Archive, the Wikimedia Foundation, and volunteers from the Wikipedia community have now fixed more than one million broken outbound web links on English Wikipedia. This has been done by the Internet Archive's monitoring for all new, and edited, outbound links from English Wikipedia for three years and archiving them soon after changes are made to articles. This combined with the other web archiving projects, means that as pages on the Web become inaccessible, links to archived versions in the Internet Archive's Wayback Machine can take their place. This has now been done for the English Wikipedia and more than one million links are now pointing to preserved copies of missing web content. What do you do when good web links go bad? If you are a volunteer editor on Wikipedia, you start by writing software to examine every outbound link in English Wikipedia to make sure it is still available via the "live web." If, for whatever reason, it is no longer good (e.g. if it returns a "404" error code or "Page Not Found") you check to see if an archived copy of the page is available via the Internet Archive's Wayback Machine. If it is, you instruct your software to edit the Wikipedia page to point to the archived version, taking care to let users of the link know they will be visiting a version via the Wayback Machine.
An anonymous reader quotes a report from Motherboard: On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google. The email, however, didn't come from the internet giant. It was actually an attempt to hack into his personal account. In fact, the message came from a group of hackers that security researchers, as well as the U.S. government, believe are spies working for the Russian government. At the time, however, Podesta didn't know any of this, and he clicked on the malicious link contained in the email, giving hackers access to his account. The data linking a group of Russian hackers -- known as Fancy Bear, APT28, or Sofacy -- to the hack on Podesta is also yet another piece in a growing heap of evidence pointing toward the Kremlin. And it also shows a clear thread between apparently separate and independent leaks that have appeared on a website called DC Leaks, such as that of Colin Powell's emails; and the Podesta leak, which was publicized on WikiLeaks. All these hacks were done using the same tool: malicious short URLs hidden in fake Gmail messages. And those URLs, according to a security firm that's tracked them for a year, were created with Bitly account linked to a domain under the control of Fancy Bear. The phishing email that Podesta received on March 19 contained a URL, created with the popular Bitly shortening service, pointing to a longer URL that, to an untrained eye, looked like a Google link. Inside that long URL, there's a 30-character string that looks like gibberish but is actually the encoded Gmail address of John Podesta. According to Bitly's own statistics, that link, which has never been published, was clicked two times in March. That's the link that opened Podesta's account to the hackers, a source close to the investigation into the hack confirmed to Motherboard. That link is only one of almost 9,000 links Fancy Bear used to target almost 4,000 individuals from October 2015 to May 2016. Each one of these URLs contained the email and name of the actual target. The hackers created them with with two Bitly accounts in their control, but forgot to set those accounts to private, according to SecureWorks, a security firm that's been tracking Fancy Bear for the last year. Bitly allowed "third parties to see their entire campaign including all their targets -- something you'd want to keep secret," Tom Finney, a researcher at SecureWorks, told Motherboard. Thomas Rid, a professor at King's College who studied the case extensively, wrote a new piece about it in Esquire.
An anonymous reader quotes a report from Business Insider: Matt Furie, the creator of the widely known "Pepe the Frog" meme, is joining forces with the Anti-Defamation League to reclaim the symbol from the alt-right and make it a "force for good," according to a press release. Furie and the ADL plan to start a social-media campaign by creating "a series of positive Pepe memes and messages" and promoting them with the hashtag #SavePepe, according to the release. The ADL declared "Pepe the Frog" to be a hate symbol in late September. "It's completely insane that Pepe has been labeled a symbol of hate, and that racists and anti-Semites are using a once peaceful frog-dude from my comic book as an icon of hate," Furie said in a column for Time magazine. While fiercely condemning the "racist and fringe groups" that use Pepe to propagate divisive views, Furie said Pepe was meant to "celebrate peace, togetherness, and fun." The meme, which originated from a 2005 cartoon, has been hijacked by the alt-right movement in the past several months. Members of the movement have used the meme to convey often racist and anti-Semitic messages. The messages prompted the ADL to add Pepe to its "Hate on Display" database, which documents anti-Semitic hate symbols. According to the ADL's press release on the #SavePepe campaign, Furie will speak at its "Never Is Now" summit against anti-Semitism on November 17 in New York City. The panel will focus specifically on online hate campaigns. Furie published a new Pepe cartoon on Monday detailing his "alt-right election nightmare," which depicts a sad Pepe morphing into a frog that resembles Donald Trump and then a monster. Pepe appears trapped in the mouth of the monster. The next panel depicts a nuclear explosion. Pepe then awakes and hides under his mattress.
As the Trump campaign refuses to point blame at Russia for the DNC hacks, top democrats on four House committees are questioning possible connections between Donald Trump's presidential campaign and Russia. They have formally asked the FBI to investigate the matter, citing new comments from a Trump confidant. Politico reports: "Troubling new evidence appears to show that the Trump campaign not only was aware of cyber attacks against Secretary [Hillary] Clinton's campaign chairman, but was openly bragging about it as far back as August," said Reps. Elijah Cummings from Government Affairs, John Conyers from Judiciary, Eliot Engel from Foreign Affairs and Bennie Thompson from Homeland Security. "For months, we have been asking the FBI to examine links between the Trump campaign and illegal Russian efforts to affect our election, including interviewing Trump advisor Roger Stone," they said. "In light of this new evidence -- and these exceptional circumstances -- we call on the FBI to fully investigate and explain to the American people what steps it is taking to disrupt this ongoing criminal activity." Earlier this week Stone said that "I do have a back-channel communication with Assange," referring to WikiLeaks founder Julian Assange, whose organization has been dropping documents online from Hillary Clinton campaign chairman John Podesta, and has been unloading documents from other Democrats as well. U.S. intelligence agencies last week declared that a connection exists between Russia and allegedly hacked documents leaked by WikiLeaks and others.
An anonymous reader quotes a report from The Next Web: Google today introduced a new feature that will tag and help find "fact checking in large news stories." Tagged articles will show up in the new story box on news.google.com, as well as in the Google News and Weather app for iOS and Android in the US and UK. There's a two-pronged approach to detecting fact checking. First Google looks for actual markup in the site's source code. Then Google looks for pages "that follow the commonly accepted criteria for fact checks." You can learn more about the process here. To be clear, the tags show up in small grey text above the article links -- Google itself isn't passing judgement, nor does it tell you the source article's conclusion in search results. It's merely a sign that says "hey, read me to find out the truth." Still, it's a nice way to make sure readers are at least forming opinions based on fact rather than fiction.