- What American Startups Can Learn From the Cutthroat Chinese Software Industry — It follows that the idea of “viral” or “organic” growth doesn’t exist in China. “User acquisition is all about media buys. Platform-to-platform in China is war, and it is fought viciously and bitterly. If you have a Gmail account and send an email to, for example, NetEase163.com, which is the local web dominant player, it will most likely go to spam or junk folders regardless of your settings. Just to get an email to go through to your inbox, the company sending the email needs to have a special partnership.” This entire article is a horror show.
- White House Hangout Maker Movement (Whitehouse) — During the Hangout, Tom Kalil will discuss the elements of an “all hands on deck” effort to promote Making, with participants including: Dale Dougherty, Founder and Publisher of MAKE; Tara Tiger Brown, Los Angeles Makerspace; Super Awesome Sylvia, Super Awesome Maker Show; Saul Griffith, Co-Founder, Otherlab; Venkatesh Prasad, Ford.
- Municipal Codes of DC Freed (BoingBoing) — more good work by Carl Malamud. He’s specifically providing data for apps.
- The Modern Malware Review (PDF) — 90% of fully undetected malware was delivered via web-browsing; It took antivirus vendors 4 times as long to detect malware from web-based applications as opposed to email (20 days for web, 5 days for email); FTP was observed to be exceptionally high-risk.
ENTRIES TAGGED "malware"
Chinese Lessons, White House Embraces Makers, DC Codes Freed, and Malware Numbers
Industrial malware has captured the imagination of the tech industry, but efforts by security researchers are promising.
Post-Capture Zoom, Load Gen, Inventive Malware, and Manufactured Normalcy
- SnapItHD — camera captures full 360-degree panorama and users select and zoom regions afterward. (via Idealog)
- Iago (GitHub) — Twitter’s load-generation tool.
- AutoCAD Worm Stealing Blueprints — lovely, malware that targets inventions. The worm, known as ACAD/Medre.A, is spreading through infected AutoCAD templates and is sending tens of thousands of stolen documents to email addresses in China. This one has soured, but give the field time … anything that can be stolen digitally, will be. (via Slashdot)
- Designing For and Against the Manufactured Normalcy Field (Greg Borenstein) — Tim said this was one of his favourite sessions at this year’s Foo Camp: breaking the artificial normality than we try to cast over new experiences so as to make them safe and comfortable.
Mac OS X Malware In the Wild, AntiBotnettery, Fabbing And Designers, Networked Products
- MS Office Exploit In The Wild, Targeting Mac OS X — This is one of the few times that we have seen a malicious Office file used to deliver Malware on Mac OS X. (via Hacker News)
- Please Do Not Take Down The Sality BotNet — best responsible disclosure ever.
- 3Difficult — I’m an industrial designer at heart, and I’m saddened by what’s happened to my craft. We were once the kings of things, but for a variety of reasons I think we’re in danger of being left behind. [...] Making became the talk of the town, and to some extent it still is. We’re in the first stumbling days of the Internet of Things, and are increasingly seeing the paper thin definition between digital and tangible falling away.
- Air Quotes Product (Matt Webb) — Recently I noted down some places in which traditional products have changed and he goes on to list some critical ways in which networked objects challenge our thinking. I love the little brain/big brain distinction–great to have words for these things at last!
Facebook looks to make mobile pay, Google Wallet's security problems, and shopping on subway walls.
Bango will run Facebook's mCommerce platform, Google Wallet hacked, and PayPal pilots shopping walls. (Commerce Weekly is produced as part of a partnership between O'Reilly and PayPal.)
Hadoop 1.0, Approximation Wiki, Printer Firmware Attacks, and Cotton Circuits
- Hadoop Hits 1.0 — open source distributed computation engine, heavily used in big data analysis, hits 1.0.
- Sparse and Low-Rank Approximation Wiki — interesting technique: instead of sampling at 2x the rate you need to discriminate then compressing to trade noise for space, use these sampling algorithms to (intelligently) noisily sample at the lower bit rate to begin with. Promises interesting applications particularly in for sensors (e.g., the Rice single pixel camera). (via siah)
- Rise of Printer Malware — firmware attacks embedded in printed documents. Another reminder that not only is it hard to write safe software, your mistakes can be epically bad. (via Cory Doctorow)
- Electric Circuits and Transistors Made From Cotton — To make it conductive, the researchers coated cotton threads in a variety of other materials. To make conductive “wires,” the team coated the threads with gold nanoparticles, and then a conductive polymer. To turn a cotton wire into a semiconductor, it was dipped in another polymer, and then a further glycol coating to make it waterproof. Neat materials hack that might lend a new twist to wearables.
- Tame.js — async programming library for use with node.js and other V8 projects. (via Hacker News)
- The Rise of PDF Malware (Symantec) — detailed whitepaper showing the incident rate, techniques, and evasion techniques of PDF malware. Despite the fact that the number of PDF CVEs [Common Vulnerability/Exposure] are close to Microsoft Office’s numbers, the amount of nonunique PDF attacks Symantec has seen have increased dramatically, which shows that the PDF file format is being targeted more often within the last two years.
- cocos-2d — iPhone 2d game framework. (via Chuck Toporek)
- Nature’s Biology Textbooks — Nature changing the textbook publishing model, trialling in California. 50+ authors write the ebook, filtered through a (hard-working, I’m guessing) editor. This beats Kindle textbook rentals hands down. Another article says of the Nature trial: each school will be testing a different licensing and access model, which I hope for some includes printing out because Princeton’s Kindle trial showed (PDF) that ebooks don’t measure up to print books for annotation and some other key uses. (via The Daily News)
Chinese Maps, Ops Standards, Android Malware, and Free Fonts
- Guangzhou City Map — Chinese city maps: they use orthographic projection (think SimCity) and not satellite images. A nice compromise for usability, information content, and invisible censorship. (via Hacker News)
- Broken Windows, Broken Code, Broken Systems — So, given that most of us live in the real world where some things are just left undone, where do we draw the line? What do we consider a bit of acceptable street litter, and what do we consider a broken window? When is it ok to just reboot the system, and when do you really need to figure out exactly what went wrong?
- Android Malware — black hat copied apps, added trojans, uploaded to Android Marketplace. Google were slow to respond to original developer’s claims of copying, quick to react to security guy’s report of malware. AppStores are not magic moneypumps in software form, no more than tagging, communities, or portals were. User contributions need editorial oversight.
- The League of Movable Type — a collection of open source fonts, ready for embedding in your web pages.
A research study released last week measures the proportion of web users running the most updated and secure browsers. With drive-by-downloads increasingly popular with malware distributors, web surfing with an older version of a browser is getting riskier. The study is based on data from Google's search and web application server logs over an 18 month period (Jan-07 to Jun-08),…
Most studies place China, Brazil, and Russia among the leading sources of conventional and web-based malware. Depending on the type of malware involved, there is a good chance that one of these three countries is among the leading suppliers. Malware from these countries reflect local Internet usage patterns. In Brazil, 75% of regular Internet users access online banking services so…