Archive

Archive for December 24, 2014

Apps to Ring In the New Year, and for the Resolutions After by KIT EATON

December 24, 2014 Leave a comment


By KIT EATON

Apps offer ways to track the arrival of the new year, as well as methods for making and sticking to new year’s resolutions.

Published: December 24, 2014 at 06:00PM

from NYT Technology http://ift.tt/1CCYMiY
via IFTTT

Categories: Internet Tags: ,

Trying to Update an Overloaded iPhone by J.D. BIERSDORFER

December 24, 2014 Leave a comment


By J.D. BIERSDORFER

Also, how to force-quit apps on Windows 8.1.

Published: December 24, 2014 at 06:00PM

from NYT Technology http://ift.tt/1vp8PAL
via IFTTT

Categories: Internet Tags: ,

Ways to Avoid Email Tracking by KATE MURPHY

December 24, 2014 Leave a comment


By KATE MURPHY

Opening emails can transmit a plethora of data to marketers and scammers, but there are solutions.

Published: December 24, 2014 at 06:00PM

from NYT Technology http://ift.tt/1ri46Eu
via IFTTT

Categories: Internet Tags: ,

El FBI utiliza Metasploit para identificar a usuarios de TOR

December 24, 2014 Leave a comment

logo de Metasploit y del FBI
Metasploit es una herramienta de código abierto que ofrece a sus usuarios de un kit de exploits para explotar vulnerabilidades del software que quieren atacar para obtener privilegios o conseguir ciertos ataques comprometiendo los sistemas. Pues al parecer, el FBI la está utilizando para conseguir identificar a los usuarios de la red TOR.

Esto no es extraño, ya que el FBI no solo es un usuario de Metasploit, también colabora en su desarrollo. Al parecer el FBI ha modificado el código de un antiguo exploit empleado para Adobe Flash con lo que consigue identificar a los usuarios de la red TOR y ponerlos a la vista.

El ataque consigue que el personal del FBI pueda conseguir ver la IP real en vez de la IP modificada por TOR. Así pueden saber quien está detrás realmente. Todo empezó con la “operación torpedo” que desde 2012 viene identificando webs del llamado Deep Web, sobre todo de pornografía infantil y otras redes criminales.

Siempre que se haga esto para descubrir redes criminales y ciberdelincuentes está bien, pero no olvidemos que TOR es empleado por muchos para mantener su privacidad y son inocentes o por aquellos activistas que emplean la red para realizar protestas contra el abuso de ciertas organizaciones o gobiernos. Aunque seguramente éstos se anden con más cuidado y no comentan ciertos errores…

El artículo El FBI utiliza Metasploit para identificar a usuarios de TOR ha sido originalmente publicado en Linux Adictos.



from Linux Adictos http://ift.tt/1CEQYxn
via IFTTT

Categories: Internet, Linux Tags: , ,

Wearable Devices for Women: Still Pretty and Still Dumb by MOLLY WOOD

December 24, 2014 Leave a comment


By MOLLY WOOD

Wearables have a style problem, especially when it comes to women. But as tech companies and designers come together to make wearables for women, do they risk making gadgets that look good but do less?

Published: December 23, 2014 at 06:00PM

from NYT Technology http://ift.tt/1B5e0Jm
via IFTTT

Categories: Internet Tags: ,

New Study Adds to Skepticism Among Security Experts That North Korea Was Behind Sony Hack by NICOLE PERLROTH

December 24, 2014 Leave a comment


By NICOLE PERLROTH

Security researchers are increasingly voicing doubts about the United States government assertions that North Korea was behind the attack on Sony’s computer network. A new linguistic study is likely to fuel the debate.

Published: December 23, 2014 at 06:00PM

from NYT Technology http://ift.tt/1A6bGE4
via IFTTT

Categories: Internet Tags: ,

Retina 5K iMac: Powerful Proof of the PC Renaissance by FARHAD MANJOO

December 24, 2014 Leave a comment


By FARHAD MANJOO

Defying predictions of their demise, personal computers are making a comeback, enticing a niche audience of professional users with power and beauty, and an Apple machine stands out.

Published: December 24, 2014 at 06:00PM

from NYT Technology http://ift.tt/1tdsnww
via IFTTT

Categories: Internet Tags: ,