Hey, bounty hunters: Microsoft is paying $100k for Windows 8.1 Preview exploits

Calling all bounty hunters Microsoft paying up to $100k for Windows 81 Preview exploit techniques

Chalk up one more reason to check out Windows 8.1 Preview when it becomes available on June 26th. Today, Microsoft announced that it’ll pay up to $100,000 in cash to those who discover and report novel security exploits within its latest OS revision, along with up to $50,000 in bonus loot for defensive suggestions that relate to the attack. But wait… there’s more. Starting on June 26th and running through July 26th, the Redmond outfit will also pay up to $11,000 toward the discovery of critical vulnerabilities within Internet Explorer 11 Preview (Windows 8.1 Preview). Whether you’re motivated by your bank account or the good of humanity, you can start taking your best shots at Microsoft’s latest code just one week from now.

Filed under: ,

Comments

Via: TechCrunch

Source: Microsoft

Microsoft unveils bug bounty programs and rewards starting June 26

Microsoft has announced that it is kicking off three bounty programs this month to encourage hackers to find bugs and exploitations. Each bounty program has its own cash reward, with the highest one being $100,000, and the lowest being $11,000. All three bounty programs start on June 26, and with two of them having an

Read The Full Story

FBI confirms drone surveillance activity in the US

While it may not come as much of a surprise to some people, the FBI has confirmed and admitted that they perform surveillance with drones on US soil. FBI Director Robert Mueller told the Senate Judiciary Committee today that they use drones for surveillance in the US, but “in a very, very minimal way, and

Read The Full Story

Onion Pi Portable Proxy: Tastes Like Redacted

As the recent NSA leaks have proven, a lot – if not all – of what you do, say and store online can be examined and archived by other people and organizations without your knowledge or approval. That’s why Adafruit Industries put together a DIY kit for those looking to add an extra layer of anonymity and security to their online activities. It’s called the Onion Pi, a plug and play device that creates an anonymous access point.

onion pi raspberry pi tor proxy by adafruit

As you may have guessed, the device is based on the popular Raspberry Pi computer. When you connect it to the Internet via an Ethernet cable, it creates a Wi-Fi access point that is connected to the Tor network. In simple terms, the Tor network encrypts your connection and routes it through a random series of relays. This makes it harder – but not necessarily impossible – to identify your location as well as the data that you’re sending or receiving. You can listen to the folks at Adafruit talk about the Onion Pi at around 11:50 in the video below:

Stage a PRISM break and order the Onion Pi kit from Adafruit Industries. The kit with a small antenna is available for $90 (USD); there’s a kit that comes with a large antenna but it’s out of stock at the moment. Adafruit donates part of the proceeds from the sale of the Onion Pi to the Tor Foundation. Sadly the Onion Pi logo is not included in the kit.

[via OhGizmo!]

 

You Should Stop Using Your iOS-Generated Hotspot Password Right Now

You Should Stop Using Your iOS-Generated Hotspot Password Right Now

The ability to turn your iPhone into a Wi-Fi hotspot is a fantastically useful little tool in and of itself. But Apple, being the generous overlord that it is, goes so far as to automatically generate a network key, keeping even the most absent-minded of Wi-Fi-beggared safe and sound. Or so we thought. According to a new study, iOS-generated passwords use a very specific formula—one which the experienced hacker can crack in less than a minute.

Read more…

    

iOS Mobile Hotspot crackable in 50s if you stick to defaults

iPhone and iPad users who use their iOS device to share a 3G/4G connection are being advised to change the default Mobile Hotspot password, after researchers showed it was possible to crack them in under sixty seconds. Apple supplies mobile hotspot users with a preconfigured password when they enable the feature, but the default is

Read The Full Story

Microsoft Citadel botnet assault liberated 2 million PCs

On June 5, we reported on a take down of Citadel botnet networks by Microsoft‘s Digital Crime Unit and the FBI, among other unspecified “technology industry partners.” The assault had resulted in 1400 Citadel botnet networks being taken down, and now Microsoft has revealed the number of computers liberated as a result: at least 2

Read The Full Story

Google petitions for further transparency with national security requests

With the recent uproar with The National Security Agency and PRISM, many tech companies have come forward to deny any claims that they give the government user information without the users knowing, and to prove that, companies are now wanting to publicly post national security requests for full transparency. However, Google wants to take it

Read The Full Story

FBI deputy director claims intelligence programs foiled NYC subway and NYSE bombings, among others (update)

tktk

The United States government’s controversial data collection practices reportedly helped thwart plots to bomb the New York City subway system and New York Stock Exchange, Federal Bureau of Investigation deputy director Sean Joyce said during a House Intelligence Committee hearing this morning in Washington, DC. Information from the programs — one focused on phone networks and another on the internet — was also said to serve a role in stopping a separate bombing threat at Danish newspaper Jyllands-Posten in Denmark, which ran a cartoon depicting Islam’s Prophet Muhammad.

National Security Agency director Keith Alexander added that, “50 terror threats in 20 countries” were stopped as a result of the controversial information gathering practices. “I would much rather be here today debating this than explaining why we were unable to prevent another 9/11” attack,” he said. When asked if the NSA is technologically capable of “flipping a switch” and listening in on Americans (whether by phone or internet), Alexander flatly answered, “no.”

Update: According to a Wired report, the man named during today’s hearing in connection with the New York Stock Exchange bombing, Khalid Ouazzani, wasn’t convicted of anything regarding the NYSE. Rather, his plea cites various money laundering in connection with terrorists, and his lawyer said, “Khalid Ouazzani was hot involved in any plot to bomb the New York Stock Exchange.”

Filed under: ,

Comments

Source: Reuters

Outlook.com slated to eliminate linked accounts with aliases

On May 2, Microsoft completed its transition from Hotmail to Outlook.com, and a couple weeks later revealed that users can now chat with Gmail contacts from within their Outlook.com account. Now users are being faced with another change, one that isn’t being as well received by some users: the elimination of linked accounts in favor

Read The Full Story