Day: June 2, 2011

Facebook Strikes Back at Man Who Claims Half of Zuckerberg’s Shares

Posted on


Paul Ceglia

Facebook has filed a legal motion against Paul Ceglia, the man whoclaims he owns 50% of Mark Zuckerberg’s Facebook stake. The motion is filled with new evidence that implicates Ceglia as a fraud.

In its motion, Facebook requests for expedited discovery, where two parties exchange evidence for examination. Facebook wants to get its hands on the contract that Ceglia claims Zuckerberg signed.

The first section of the 27-page motion essentially lays out the facts of the case and claims that Ceglia has already changed his story. “During the remand proceedings, [Facebook] pointed out the incredible nature of Ceglia’s claims and declared that his lawsuit was a fraud based on a fabricated contract,” Facebook’s motion says. “In response, Ceglia did an about-face. He pulled back his original complaint, retained new lawyers, and filed a new complaint filled with new facts and new legal theories.”

Ceglia originally claimed he was entitled to 84% of Facebook when he filed his initial lawsuit in July 2010. Earlier this year, Ceglia refiled his lawsuit with the prominent law firm DLA Piper.

The rest of the motion is an all-out assault on Ceglia’s credibility and the documents he has provided. Facebook claims that Ceglia’s documents are forgeries. The company says Zuckerberg didn’t even come up with the idea for Facebook until December 2003 (Ceglia claims they signed a contract in April 2003).

Facebook then lays out evidence for why the contract “is an obvious cut-and-paste job,” noting inconsistencies in language, margins and terminology. Facebook even brought in linguistics expert Frank Romano, who concludes that the first two pages of the contract were written at different times. Facebook also tackles the email conversations Ceglia claims he had with Zuckerberg about Facebook, again claiming they were forgeries due to the language of the emails.

In the last section of the filing, Facebook attacks Ceglia’s credibility in no uncertain terms. “Ceglia is a professional con artist,” Facebook says. “A comprehensive background investigation conducted by the nationally renowned investigative firm Kroll Associates, Inc. established that Ceglia is a career criminal who has engaged in fraud, subterfuge and falsification of documents. From his 1997 felony conviction through his 2009 arrest for scamming New Yorkers, Ceglia has a long record of criminal and fraudulent behavior that spans decades.”

If Facebook’s allegations are correct, Ceglia could quickly find himself charged with fraud. In several private conversations we have had with Facebook, it’s been very clear that the company’s intention was to take Ceglia to the cleaners and hang him out to dry. Facebook believes that this lawsuit has gone on for long enough and won’t be giving Ceglia any mercy.

more on : http://mashable.com/2011/06/02/facebook-ceglia-motion/

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Facebook to Reach 700 Million Members

Posted on


Facebook to Reach 700 Million MembersFacebook is on pace to surpass 700 million members, as the site continues to expand worldwide to become the preferred social network across the globe.

According to Socialbakers, a Facebook statistics Web site, the Palo Alto, Calif.-based networking giant is nearing the 700 million member mark, thanks in large part to growth in countries like Brazil, Indonesia, Mexico and Argentina. The social network added nearly 200 million members since last summer when the company reached its 500 million member milestone.

Facebook’s biggest growth came from Brazil, where the social media company added nearly 2 million new members in May. The Philippines, Mexico and Argentina saw close-to or above one million new people join Facebook in May, and Indonesia bested those figures by adding 1.5 million Facebook friends during that same month.

What makes the milestone more notable is that Facebook has been able to break through in countries that already had established social media outlets. Orkut, a social network owned by Google, has dominated in countries like Brazil and India. Half of Orkut’s 100 million members come from Brazil with another 40 percent from India.

Orkut has dominated in these countries, but if trends continue, the service could have trouble competing with Facebook, which is looking to enhance its service by adding even more dimension and integrating additional services to its site.

Recently, Facebook has been in talks with Netflix, the popular online movie rental and streaming service about a possible integration between the two companies. Facebook could begin licensing videos from Netflix so users could watch movies and television shows together through the social network. For example, a person could see his or her friend watching an episode of “Lost,” click a link and watch the show right on Facebook in seconds.

Facebook’s 700 million mark proves its momentum and importance in daily life — so important that some would choose it over one of the five senses. A recent survey of 7,000 Facebook members ages 16 to 30 found that 53 percent would give up their sense of smell rather than their social networks.

If the social networking juggernaut is able to incorporate Netflix and truly become a platform for media and communication, it will have taken another step to ensuring that its users really have no reason to ever leave the site.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Sony: “No Indication” It Was Hacked by LulzSec

Posted on


“We have been performing regular, thorough testing of the implemented security enhancements.  After investigating further, there is no indication that the claim by [LulzSec] is accurate at the moment,” said a Sony spokesperson in an emailed statement on June 02, 2011 12:41:13 AM ET, referring to claims by LulzSec on May 31 that it was successfully hacking Sony.

LulzSec (Lulz Security) is a hacker group who gained notoriety for hacking PBS and publishing a bogus story of Tupac being alive.  Previously, it also hacked Fox.com, the FOX15 Twitter account, and Sony’s music website in Japan.

A few days ago, LulzSec claimed to be successfully hacking Sony.  It posted the following on its Twitter account (@LulzSec):

“Hey @Sony, you know we’re making off with a bunch of your internal stuff right now and you haven’t even noticed? Slow and steady, guys.” – May 31 

more on : http://www.ibtimes.com/articles/156397/20110602/tupac-lulzsec-hacked-sony.htm

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Windows 8: 5 Questions About Microsoft’s New OS

Posted on


Windows 8: 5 Questions About Microsoft's New OS

This week, Microsoft revealed a little of what to expect from the next Windows operating system. With its Windows Phone look and touch – literally – and tiles everywhere, it will be a major refresh, but there’s a still a number of unanswered questions. Here are my top five:

Can Microsoft keep desktop users happy with Windows 8?

In demonstrations this week, Windows 8 is shown running legacy applications like Office side-by-side with the hip new OS. But the version of Windows 8 that runs on the ARM processor won’t have legacy support. That creates an OS quandary.

While Microsoft says Windows 8 is backward-compatible, if I want to take advantage of the most revolutionary features — namely touch and tablet functionality — I’ll need all new hardware and probably software, too. So where does that leave Windows users who want all the old desktop-oriented bells and whistles that shipped with Windows 7 with the new tablet-oriented Windows 8 OS?

 

Do we need Windows touchscreens everywhere?

So Windows wants a piece of the tablet pie, I get that. But I’ve rarely had any desire to reach over this keyboard and swipe at my screen, be it on a laptop or desktop or even a netbook. I especially don’t plan on running out to buy a new system just to have touch functionality.

So, Microsoft’s touch revolution is really about tablets, but the company’s existing touch-enabled OS, Windows Phone, has a tiny sliver of the market it operates in, which begs the question: Do many people really want to reach out and touch Windows or a touch-enabled version of Word or Excel?

 

Windows 8: 5 Questions About Microsoft's New OS

Will all ARM devices have enough power?

Windows 8 looked crisp and clean when running on a sampling of existing laptops and a few tablets, but inevitably some budget ARM-powered systems will emerge. Will they be able to handle all of Windows 8′s new functionality? Or will swift switching and rapid refreshing give way to lag, bog downs, and a Windows 8 blue screen of death?

Just how open will it be?

Microsoft is pushing the fact that Windows 8 is based on HTML5 and the other languages that underlie the Web. This means developers can hit the ground running on day one to develop Web apps for Windows 8. But this is a radical shift from Redmond’s typical modus operandi (software control freak) and I’m left wondering just how open the company is ready and willing to be. Developers will likely have the same suspicions and may hit the ground at more of a cautious meander than the running pace Microsoft needs to catch up to the coding free-for-all happening in places like the Android Market.

What about Windows Live?

Could this suite of apps, which Microsoft has been honing for years now, be one of the casualties of the move to an HTML5-centric OS? Of course, the company won’t kill Hotmail or Messenger, but will they undergo a radical change if the company moves away from .NET, Silverlight, and other Microsoft staples? Or is this RIP Windows Live Movie Maker?

It’s important to point out that Microsoft still has several months to answer these questions, and a lot could still change, especially with the release of Mac OS X Lion, due this summer, and Microsoft’s expected reaction. Whatever happens, it’s good to see Microsoft taking some big risks and steps forward. We shall see if it all pans out.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

“The Last True Hacker” Now Selling Signed Books

Posted on


The Free Software Foundation is has launched second editions of two landmark publications by Richard Stallman, a.k.a. rms, “the last true hacker.”

The volumes, Free as in Freedom 2.0 and Free Software, Free Society: Selected Essays of Richard M. Stallman, 2nd Edition are both now available from the FSF store as free downloadable PDFs and as signed copies. Signed hard copies cost $50 each.

And while you’re shopping, you can also pick up a stuffed baby gnu, the FSF mascot, for $25.

The free-software activist launched the GNU Project in 1983 to create a free Unix-like operating system. He also founded the Free Software Foundation in 1985. The Linux kernel was built on and still supports GNU Project components that came before it and laid the foundation for open-source operating systems.

Stallman is also the main author of several copyleft licenses, including the GNU General Public License, the most widely used free software license.

Stallman’s life work revolves around freedom, by which he means four things:

  1. The software should be freely accessible.
  2. The software should be free to modify.
  3. The software should be free to share with others.
  4. The software should be free to change and redistribute copies of the changed software.

These principles underlie and inform the free and open-source software movement, and they also are used in many of the arguments for Creative Commons licensing for art and music.

image courtesy of Flickr, jolieodell 

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

China Denies Involvement in Gmail Hacking Attack

Posted on


The Chinese government has denied any involvement in the recent Gmail phishing attack that Google says originated in China.

Google hasn’t openly accused the Chinese government of being involved in these hacking attacks; instead, it merely pointed out that the attacks originated from Jinan, China, and mentioned that some of them were pointed at Chinese political activists.

Still, even the implication hit the wrong note with Chinese authorities. “Allegations that the Chinese government supports hacking activities are completely unfounded and made with ulterior motives,” China’s Foreign Ministry spokesman Hong Lei told reporters Thursday.

 

SEE ALSO: Chinese Hackers Targeted U.S. Officials in Gmail Phishing Attack 

 

 

Chinese news agency Xinhua took it a step further, openly blasting Google for failing to provide proof that the recent attacks originated from China. “Just as its previous accusations, the world’s largest Internet search engine provided no solid proof to support its statement,” claims Xinhua.

The incident will further degrade Google’s relations with China. They’re already shaken since Google partiallyleft China in early 2010 because of censorship concerns and an attack on Gmail accounts of Chinese human rights activists.

[via AP]

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

YouTube Adds Creative Commons Content to Video Editor

Posted on


If you’re in need of B-roll for your next YouTube opus, you’re in luck. YouTube is adding tons of Creative Commons content to its video editor. The new feature goes live today at noon ET.

YouTube’s editor tool, which launched last year, has been steadily adding features to make the process of creating videos fuller, says YouTube Product Manager Jason Toff.

You can access more than 10,000 videos (from C-SPAN, PublicResource.org, Voice of America, Al Jazeera and others) via the CC tab on the editor. You can also tag your own content as Creative Commons, so that other users can incorporate it into their videos.

All content can be used and remixed at will (for commercial use as well), as long as it’s attributed. Links to the original CC videos will be listed underneath the video that they’re included in.

Toff believes that this addition will help YouTubers get even more creative with their content — in a manner that protects the rights of all content creators (obviously, you can only mark your own content as Creative Commons, and anyone who tries to circumvent that rule will be subject to YouTube’s copyright protectionservices).

 

 Photo courtesy of Flickr, Evelyn Proimos 

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

 

PlayStation Store Back, Sony Finally Returns to Normal

Posted on


The PlayStation Store is back, and with that, the coda to what may be the prologue to endless cyber-warfare comes to a close. Sony brought the PS Store back online last night to accolades on the official PlayStation blog, as many marveled at the sheer scope of the update (translation: it’s huge).

Where to begin? I won’t relist everything, which according to a quick Word Processor scrape and count adds up to nearly 5,000 words, but let’s hit the highlights, which include “prior offers” that were live when the PS Store went dark (here extended).

In “Full Game Trial,” we’ve got Tom Clancy’s Rainbow Six Vegas 2 and Dante’s Inferno. “Featured Games & DLC” add a freebie shotgun and a map for the SOCOM 4 crowd, plus a MAG Interdiction pack (free to PS Plus subscribers, $4.99 otherwise).

“Discounted Games & DLC” adds Ricochet HD and Interpol to the mix, plus a new MotorStorm Apocalypse “supercar” and a vehicle pack bundle. “Featured Themes & Avatars” gets new Resident Evil 5, MotorStorm Apocalypse, and Street Fighter 2 miscellany.

The missing May episode of Qore, Sony’s online magazine, is live.

You’ll find a bunch of price “updates” (read: “cuts”) to recent titles, including DC Universe Online, Assassin’s Creed II Deluxe Edition Digital, and Plants vs. Zombies. New “Downloadable” games include Alien Crush, Bonk’s Adventure, Wizardry: Labyrinth Of Lost Souls, Sega Rally Online Arcade, Back To The Future: The Game – Episode 3, and Dragon’s Lair II: Time Warp.

You’ll find new “Game Demos” for Red Faction Armageddon, The Fight: Lights Out, and MotorStorm Apocalypse, as well as a new “PSone Classic,” Missile Command. All the “Add-On Game Content” that hit during the outage appears to be here, including the Crysis 2 – Retaliation Pack, Dead Space 2 Outbreak Map, Dragon Age II: All-Class Item Pack, Tiger Woods PGA Tour 12 – Bethpage State Park, and You Don’t Know Jack Pack 3.

And so on. The list includes new “Bundles,” additional “Avatars,” free “Game Videos,” new “Music,” “PS3 Themes,” and “PS3 Wallpapers,” five new downloadable PSP games, a bunch of Final Fantasy Dissidia 012 add-on content, and seven new PSP minis.

If I’ve counted correctly we’re 43 days from the original shuttering of the PlayStation Network on April 20th, a day after the April 17 to April 19th intrusion period. That’s how long it took Sony to get the whole ball of wax back. While future attacks now seem inevitable, fingers crossed an outage of this magnitude never happens again.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

 

Google reveals Gmail hacking, says likely from China

Posted on


A security personnel walks past the logo of Google in front of its former headquarters in Beijing June 2, 2011. REUTERS/Jason Lee

(Reuters) – Suspected Chinese hackers tried to steal the passwords of hundreds of Google email account holders, including those of senior U.S. government officials, Chinese activists and journalists, the Internet company said.

The perpetrators appeared to originate from Jinan, the capital of China’s eastern Shandong province, Google said. Jinan is home to one of six technical reconnaissance bureaus belonging to the People’s Liberation Army and a technical college that U.S. investigators last year linked to a previous attack on Google.

Washington said it was investigating Google’s claims while the FBI said it was working with Google following the attacks — the latest computer-based invasions directed at multinational companies that have raised global alarm about Internet security.

The hackers recently tried to crack and monitor email accounts by stealing passwords, but Google detected and “disrupted” their campaign, the world’s largest Web search company said on its official blog.

The revelation comes more than a year after Google disclosed a cyberattack on its systems that it said it traced to China, and could further strain an already tense relationship between the Web giant and Beijing.

Google partially pulled out of China, the world’s largest Internet market by users, last year after a tussle with the government over censorship and a serious hacking episode.

“We recently uncovered a campaign to collect user passwords, likely through phishing,” Google said, referring to the practice where computer users are tricked into giving up sensitive information.

“The goal of this effort seems to have been to monitor the contents of these users’ emails.”

It “affected what seem to be the personal Gmail accounts of hundreds of users, including among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.”

Google did not say the Chinese government was behind the attacks or say what might have motivated them.

But cyberattacks originating in China have become common in recent years, said Bruce Schneier, chief security technology officer at telecommunications company BT.

“It’s not just the Chinese government. It’s independent actors within China who are working with the tacit approval of the government,” he said.

The United States has warned that a cyberattack — presumably if it is devastating enough — could result in real-world military retaliation, although analysts say it could be difficult to detect its origin with full accuracy.

Lockheed Martin Corp, the U.S. government’s top information technology provider, said last week it had thwarted “a significant and tenacious attack” on its information systems network, though the company and government officials have not yet said where they think the attack originated.

“We have no reason to believe that any official U.S. government email accounts were accessed,” said White House spokesman Tommy Vietor.

A spokesman at South Korea’s presidential office said the Blue House had not been affected, but added they did not use Gmail. South Korea’s Ministry of Strategy and Finance said it had warned all staff “not to use, send or receive any official information through private emails such as Gmail.”

ELECTRONIC EAVESDROPPING

Technical reconnaissance bureaus, including the one in Jinan, oversee China’s electronic eavesdropping, according to an October 2009 report by the U.S.-China Economic and Security Commission, a panel created by Congress to monitor potential national security issues related to U.S- China relations.

The bureaus “are likely focused on defense or exploitation of foreign networks,” the commission report states.

Last year, U.S. investigators said there was evidence suggesting a link between the Lanxiang Vocational School in Jinan and the hacking attacks on Google and over 20 other firms, the New York Times reported. The school denied the report.

China’s foreign ministry and its state council information office did not respond to faxed inquiries.

China has said repeatedly it does not condone hacking, which remains a popular hobby in the country, with numerous websites offering cheap courses to learn the basics.

Three Chinese dissidents told Reuters their accounts had been infiltrated, although eight others who were contacted said they had had no problems.

Google’s security team on Thursday sent an email to dissident Jiang Qisheng, who was a student negotiator jailed for years for his role in the June 4, 1989 pro-democracy protests in Beijing’s Tiananmen Square, that it “recently detected suspicious activity” on his account.

“The suspicious activity appears to have originated in China as an attempt to establish and maintain access to your account without your knowledge,” said the email, which was forwarded to Reuters.

Cui Weiping, a professor at the Beijing Film Academy who has called for ending the official silence about the Tiananmen crackdown, said she could not open her Gmail account this morning and believed it had been hacked into.

“My Gmail account is suddenly inaccessible, because my password has been changed by someone and then I can’t open it,” she said.

While Google said last year’s attack was aimed at its corporate infrastructure, the latest incident appears to have relied on tricking email users into revealing passwords, based on Google’s description in its blog post.

It said the perpetrators changed the victims’ email forwarding settings, presumably secretly sending the victims’ personal emails to other recipients.

“Yesterday, when I opened my inbox, there was a prompt telling me to enter my personal information for safety purposes and to change my password and to fill in a forwarding email address. I ignored it,” said a Chinese activist, who declined to be identified, in emailed comments.

The events leading to Google’s withdrawal from China exacerbated an often difficult relationship between Washington and Beijing, with disputes ranging from human rights to trade.

In January 2010, Google announced it was the target of a sophisticated cyberattack using malicious code dubbed “Aurora,” which compromised the Gmail accounts of human rights activists and succeeded in accessing Google source code repositories.

The company, and subsequent public reports, blamed the attack on the Chinese government.

“We’ll certainly see more of this in the future, as Chinese hackers — independent and otherwise — target Google because of its global popularity and its decision to defy the Chinese government on censorship, which some hackers will misconstrue as being anti-Chinese,” said Michael Clendenin, managing director of RedTech Advisors, a technology consulting firm.

Google has lost share to rival Baidu Inc in China’s Internet market, the world’s largest with more than 450 million users.

“Investors would like to see Google figure out a way to operate in China, and capitalize on the growth of the country,” said Cowen and Co analyst Jim Friedland.

“It’s been a tough relationship. And this highlights that it continues to be a tough relationship,” he said.

Google said it had notified the victims and relevant governments in the recent attacks.

“It’s important to stress that our internal systems have not been affected — these account hijackings were not the result of a security problem with Gmail itself,” Google said.

The company’s shares finished 0.7 percent lower at $525.60.

(Additional reporting by Alister Bull in Washington D.C, Jeremy Laurence in Seoul, Benjamin Kang Lim, Chris Buckley and Michael Martina in Beijing,; Editing by Andre Grenon, Phil Berlowitz andDean Yates)

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

North Korea training cyberwarriors at foreign colleges

Posted on


North Korea is trying to boost its cyberwar capability by its best sending programmers abroad for training in the latest hacking techniques, a defector from the country has told a security conference in Seoul.

According to Kim Heung-kwang, who left the bizarre and secretive Communist state in 2003, North Korea’s Reconnaissance General Bureau cyberwarfare unit has increased in size for 500 personnel to as many as 3,000, Reuters has reported him as saying.

“These prodigies are provided with the best environment, and if they graduate with top grades, their parents in the provinces are given the opportunity to live in Pyongyang,” Kim told delegates, speaking as the head of a defector network, North Korea Intellectuals Solidarity.

more on : http://news.techworld.com/security/3283469/north-korea-training-cyberwarriors-at-foreign-colleges/

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/