Archive for 2011/03/18
In their presentation, entitled “Credit Card skimming and PIN harvesting in an EMV world” , four researchers describe how a flat circuit board inside the card slot can be used to intercept and manipulate the communication between terminal and chip in order to obtain a user’s PINPosted: 2011/03/18 in Cybercrime, Education / Awareness, Stats / reports, Tech Evolution
A circuit board is far more discrete than a wobbly, glued-on attachment
We are aware of a possible compromise of PHP.NET server(s) and a potential PHP source backdoor. “wiki.php.net” was taken offlinePosted: 2011/03/18 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection
This article critically engages with recent applications of the Marxist ‘labor theory of value’ to online prosumer practices, and offers an alternative framework to theorize value creation in such practicesPosted: 2011/03/18 in Education / Awareness, New Business Models, Stats / reports
We argue that the labor theory of value is difficult to apply to online prosumer practices for two reasons. First because value creation in such practices is poorly related to time. Second because the realization of the value accumulated by social media companies generally occurs on financial markets, rather than in direct commodity exchange.
In alternative we offer an understanding of value creation as based primarily on the capacity to initiate and sustain webs of affective relations, and value realization as linked to a reputation based financial economy. We argue that this model describes the process of value creation and appropriation in the context of online prosumer platforms better than an approach based on the marxian labor theory of value. We also suggest that our approach can be cast new light on value creation within informational capitalism in general
The Chrome Stable and Beta channels have been updated to 10.0.648.151 for Windows, Mac, Linux and Chrome Frame. This release blacklists a small number of HTTPS certificatesPosted: 2011/03/18 in Blocking, Education / Awareness, Google, Network Security, Privacy / Data Protection, Stats / reports
More than 200 million people use Twitter, firing off more than 140 million text messages of 140 characters or less daily
Taking Down Botnets: Microsoft and the Rustock Botnet. This botnet is estimated to have approximately a million infected computers operating under its control and has been known to be capable of sending billions of spam mails every day, including fake Microsoft lottery scams and offers for fake – and potentially dangerous – prescription drugsPosted: 2011/03/18 in Education / Awareness, Enforcement
Ericsson VP: This is the starting point of a voice quality revolution that will significantly enhance CDMA networks as we know them todayPosted: 2011/03/18 in Education / Awareness, Tech Evolution
Remember that awesome iPad app from Time Warner that streams 32 channels of live TV? Apparently it was too awesome, because the overwhelming usage caused their servers to crashPosted: 2011/03/18 in Bandwidth Management, Education / Awareness, New Business Models, Tech Evolution
The BBC reports that requests for television programmes via its popular broadband iPlayer catch-up TV service in the UK have grown by 81% since last year. Some 116.4 million requests were made for the service during February 2010 (68.7 million for TV programmes) and at an average of 1.4 million users per dayPosted: 2011/03/18 in Education / Awareness, New Business Models, Stats / reports
A production company founder and member of the Spanish Film Academy has been arrested on suspicion of leaking pre-release movies to file-sharing networksPosted: 2011/03/18 in Education / Awareness, Enforcement, Illegal File Sharing
If Remote DVRs Are Legal… What About Remote DVD Players? That’s exactly what the streaming movie service Zediva is testingPosted: 2011/03/18 in Education / Awareness, New Business Models
The company lets you stream movies online — including movies that the studios haven’t licensed for streaming. How? Because it’s literally renting the DVD you want, putting it in a networked DVD player, and letting you (and only you) stream the results
Translated, adding “more clarity to intellectual property law” means making it even more obscure than it is already, giving cartel lawyers even more ways to confuse the issues.
Corporate movie and music industries slowly but surely turn the Obama government in a cartel division.
Sweden is to delay the implementation of the controversial EU data retention directive for a year, risking a heavy fine of up to €68m, whereas Austria has decided to implement the directive after a European Court of Justice ruling in 2010Posted: 2011/03/18 in Education / Awareness, Jurisprudence, Public Policy
The US is experiencing a boom in demand for e-books. Sales were up almost 116 per cent during January when compared to the same month in 2010, hitting $69.9mPosted: 2011/03/18 in Education / Awareness, New Business Models, Stats / reports
Attackers breached the servers of RSA and stole information that could be used to compromise the security of two-factor authentication tokens used by 40 million employees to access sensitive corporate and government networksPosted: 2011/03/18 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection, Tech Evolution
‘Extremely sophisicated’ attack
Google’s contribution to the review of the intellectual property created to please Google was always going to be an important document. And here it is, typos and all; what a shame Google didn’t review it on the way out of the door – some parts are unreadable. “Copyright law oversteps its purpose, and harms innovation, when it enforces rigid constraints to stifle productive and reasonable new uses of copyright works,” Google writesPosted: 2011/03/18 in Education / Awareness, Google, Public Policy, Stats / reports
Echoing Prime Minister David Cameron echoing Google, we learn that: “If the UK and EU regime were to be reformed in order to better support innovation, some aspects of the US regime would be a good starting point for examination.”
Word-for-word, that’s exactly what the Prime Minister said when he launched the review, and gave Hargreaves his orders.
Google wants two major changes, we learn. It wants US-style Fair Use and Safe Harbour provisions imported into UK law. Google claims the success of Hollywood as vindication for the economic contribution of Fair Use.