An anonymous reader writes "While the celebs are already charging big money for their Tweets, an Aussie startup is ranking everyday people and turning them into product salespeople. After a successful start Down Under they have now hit Silicon Valley, but will Americans embrace selling to their friends?" From the article: "In a nutshell, individuals sign up to the Social Loot website and are assigned companies to promote to their circle of online friends. They are then paid on a sliding scale based on the amount of traffic their posts generate, and the quality of referrals and number of resulting sales. This is tracked by a code embedded in the links promoted by Social Loot’s spruikers."
SlashBI: Your dashboard for the latest in business-intelligence news and analysis.
jawtheshark writes "I'm building a house, and obviously I want a modest network built-in. Nothing fancy, two RJ-45 per room, four in the living room, and that's basically it. I already got myself a rack mountable Cisco Small Business switch and I have a self-built 4U server (low-power, won't make much heat) which can be rack mounted (505mm deep). Now, the construction company suggests a wall mounted rack (6U: 340mm x 600mm x 480mm — 6U definitely won't be enough, but a 12U model exists). It's not expensive, but I have never worked on a rack where the backside is unreachable. (For work, I get to work in a data center with huge racks that are accessible from both sides). Now obviously, I don't need a data center-grade rack, but these wall-mounted racks scream 'switch-only' racks to me. What are your experiences? Is it possible to put servers in racks like these, or should I find a 'both-side-accessible' rack instead?"
alphadogg writes "It's free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than Windows. So, why hasn't Linux on the desktop taken off? When it comes to desktop Linux, the cost savings turn out to be problematic, there are management issues, and compatibility remains an issue. 'We get a lot more questions about switching to Macs than switching to Linux at this point, even though Macs are more expensive,' one Gartner analyst says."
Trailrunner7 writes "A new project that was setup to monitor the quality and strength of the SSL implementations on top sites across the Internet found that 75 percent of them are vulnerable to the BEAST SSL attack and that just 10 percent of the sites surveyed should be considered secure. The SSL Pulse project, set up by the Trustworthy Internet Movement, looks at several components of each site's SSL implementation to determine how secure the site actually is. The project looks at how each site is configured, which versions of the TLS and SSL protocols the site supports, whether the site is vulnerable to the BEAST or insecure renegotiation attacks and other factors. The data that the SSL Pulse project has gathered thus far shows that the vast majority of the 200,000 sites the project is surveying need some serious help in fixing their SSL implementations."
itwbennett writes "The problem: Border Gateway Protocol (BGP) enables routers to communicate about the best path to other networks, but routers don't verify the route 'announcements.' When routing problems erupt, 'it's very difficult to tell if this is fat fingering on a router or malicious,' said Joe Gersch, chief operating officer for Secure64, a company that makes Domain Name System (DNS) server software. In a well-known incident, Pakistan Telecom made an error with BGP after Pakistan's government ordered in 2008 that ISPs block YouTube, which ended up knocking Google's service offline. A solution exists, but it's complex, and deployment has been slow. Now experts have found an easier way."
nonprofiteer writes "What has been left out of the CISPA debate thus far is the FBI's long time workaround for information sharing with private industry: 'In 1997, long-time FBI agent Dan Larkin helped set up a non-profit based in Pittsburgh that "functions as a conduit between private industry and law enforcement." Its industry members, which include banks, ISPs, telcos, credit card companies, pharmaceutical companies, and others can hand over cyberthreat information to the non-profit, called the National Cyber Forensics and Training Alliance (NCFTA), which has a legal agreement with the government that allows it to then hand over info to the FBI. Conveniently, the FBI has a unit, the Cyber Initiative and Resource Fusion Unit, stationed in the NCFTA's office. Companies can share information with the 501(c)6 non-profit that they would be wary of (or prohibited from) sharing directly with the FBI.'"
suraj.sun writes "Microsoft quietly fixed a flaw in Hotmail's password reset system that allowed anyone to reset the password of any Hotmail account last Friday. The company was notified of the flaw by researchers at Vulnerability Lab on April 20th and responded with a fix within hours — but not until after widespread attacks, with the bug apparently spreading 'like wild fire' in the hacking community. Hotmail's password reset system uses a token system to ensure that only the account holder can reset their password — a link with the token is sent to an account linked to the Hotmail account — and clicking the link lets the account owner reset their password. However, the validation of these tokens isn't handled properly by Hotmail, allowing attackers to reset passwords of any account. Initially hackers were offering to crack accounts for $20 a throw. However, the technique became publicly known and started to spread rapidly with Web and YouTube tutorials showing the technique popping up across the Arabic-speaking Internet."
First time accepted submitter a90Tj2P7 writes "Apple is building a 21,468 square foot private restaurant in Cupertino so employees can talk shop over lunch without being overheard. Apple's director of real estate facilities, Dan Wisenhunt, stated that: 'We like to provide a level of security so that people and employees can feel comfortable talking about their business, their research and whatever project they're engineering without fear of competition sort of overhearing their conversations.'"
Lucas123 writes "A newly published study by Britain's data protection regulatory agency found that more than one in 10 second-hand hard drives being sold online contain recoverable personal information from the original owner. "Many people will presume that pressing the delete button on a computer file means that it is gone forever. However this information can easily be recovered," Britain's Information Commissioner, Christopher Graham, said in a statement. In all, the research found 34,000 files containing personal or corporate information were recovered from the devices. Along with the study, a survey revealed that 65% of people hand down their old PC, laptop and cell phones to others. One in ten of those people who disposed of their old devices, left all their data on them. The British government also offered new guidelines for ensuring devices are properly wiped of data."
First time accepted submitter ian_po writes "The U.S. Attorney's office has filed indictments against 7 people, including two Transportation Security Administration Screeners and two former TSA employees, after federal agents set up several smuggling sting operations. The alleged smuggling scheme was revealed after a suspected drug courier went to Terminal 5, where his flight was departing, instead of going through the Terminal 6 checkpoint his written instructions directed him to. Court documents indicate the plan was to return to Terminal 5 through a secure tunnel after being allowed through security by the accused Screener. The courier was caught with 10 pounds of cocaine at the other checkpoint by a different TSA agent. If convicted, the four TSA employees face a minimum of 10 years in Federal prison." If ten pounds of anything can get onto a plane by the simple expedient of bribery, please explain again why adult travelers, but not children, must remove their shoes as they stand massed in an unsecured part of a typical U.S. airport.
First time accepted submitter Aguazul2 writes "In a familiar story relocated into the bizarre world of the Vatican, a whistle-blower who brought to light excessive overpayments on contracts to friendly suppliers was sent to the USA as punishment, and further sources of leaks are now being hunted down by a crack team headed by an 82-year old Opus Dei cardinal. It's just like Wikileaks, only with parchment and quills — probably."
An anonymous reader writes with this enthusiastic review of the latest from Canonical: "So how does Ubuntu Precise Pangolin (12.04) fare? I will say exceptionally well. Unity is not the same ugly duckling it was made out to be. In Ubuntu 12.04, it has transformed into a beautiful swan. As Ubuntu 12.04 is a long term release, the Ubuntu team has pulled all stops to make sure the user experience is positive. Ubuntu 12.04 aka Precise Pangolin is definitely worthy of running on your machine."
An anonymous reader writes "The Russians who put out fake versions of Angry Bird Space and Instagram for Android last week have competition. Biophilia, a musical experiment by Bjork into the world of apps, has been ported to Android as a Trojan." Maybe not totally surprising; as the submitter reader continues, "last year at the launch of the app, Bjork was quoted in an interview inviting pirates/hackers to attempt to port her code over from iPhone to other platforms."
Mojo66 writes "A recently reported flaw that allowed an attacker to drastically reduce the number of attempts needed to guess the WPS PIN of a wireless router isn't necessary for some Arcadyan based routers anymore. According to German computer publisher Heise, some 100,000 routers of type Speedport W921V, W504V and W723V are affected in Germany alone. (Google translation, original here.) What makes things worse is the fact that in order to exploit the backdoor, no button has to be pushed on the device itself and on some of the affected routers, the backdoor PIN ("12345670") is still working even after WPS has been disabled by the user. The only currently known remedy for those models is to disable Wi-Fi altogether. Since all Arcadyan routers share the same software platform, more models might be affected."
benfrog writes "A German court has ruled that clients, not banks, are responsible for losses in phishing scams. The German Federal Court of Justice (the country's highest civil court) ruled in the case of a German retiree who lost €5,000 ($6,608) in a bank transfer fraudulently sent to Greece. According to The Local, a German news site, the man entered 10 transaction codes into a site designed to look like his bank's web site and his bank is not liable as it specifically warned against such phishing attacks."