Teen claims you can get free T-Mobile data through a proxy


One teen may have just achieved the dream of every cost-conscious wireless user: free, no-strings-attached mobile data. High school student Jacob Ajit claims to have discovered a trick that gets you all the T-Mobile data you want by using a proxy server. If you use the proxy to make it look like every site link has that text, you can surf to your heart's content at no charge beyond what it cost to get the SIM. Before you ask: sorry, folks, Ajit's proxy is down. We've asked T-Mobile about the workaround, and we'll let you know if it can verify its authenticity and say what it's doing in response.

Queen Elizabeth's Mother Was Baptized As A Mormon

International Business Times

Queen Elizabeth's mother has been baptized as a Mormon. The Queen Mother didn't practice the religion when she was alive: she was a faithful member of the Church of England. But Helen Radkey, a former Mormon herself, discovered the "proxy baptism" of the royal after analyzing the church's public genealogical database, called Family Search. She also found that at least 20 Holocaust victims have been baptized in the past five years in defiance of church rules.

Ransomware: Now crooks are stealing bitcoin ransom payments intended for rivals


Ransomware distributors expecting an easy payday are having their illicit earnings stolen before they're even received by other cyber criminals who are hijacking the ransom payments and redirecting them into their own bitcoin wallets. But not only are the attacks giving criminals a taste of their own medicine in becoming victims of cyber theft, it's also preventing ransomware victims from unlocking their encrypted files -- because as far as those distributing the malware are concerned, they never received their money. Uncovered by researchers at Proofpoint, it's believed to be the first scheme of its kind, with cyber criminals using a Tor proxy browser to carry out man-in-the-middle attacks to steal the . The attacks take advantage of how ransomware distributors request victims to use Tor to buy cryptocurrency to make payments. While many ransomware notes provide instructions on how to download and run the Tor browser, others provide links to a Tor proxy - regular websites that translate Tor traffic into normal web traffic - so the process of paying is as simple as possible for the victim.

Could Yahoo be in trouble with the SEC?

Washington Post - Technology News

Yahoo said it learned of its recent massive breach, which affected more than 500 million user accounts, in August. Yet on Sept. 9 -- after it started its investigation -- the company said in a regulatory filing that it was not aware of "any incidents of, or third party claims alleging" security breaches, "unauthorized access or use" of its information technology systems or misuse of personal information that could significantly impact its business. This apparent conflict between when it learned about the breach and what it filed with the Securities and Exchange Commission about its proposed sale to Verizon has raised questions about what the tech company knew and when. Companies are required to tell the SEC about events that any "reasonable investor would consider important in an investment decision," according to the agency. Independent security experts who looked at the proxy filing say the company could be on shaky ground if it comes to light that it in any way understood the seriousness of the breach when it had made that statement.

Google Thought I Was a Man - Issue 52: The Hive


Back in 2012, Google thought I was a man. In January of that year, the search giant released a new privacy policy that, for the first time, sought to aggregate your usage data from across its array of products--including Google Search, Gmail, Google Calendar, YouTube, and others--into a single profile. This change caused quite a stir, both inside and outside of tech circles, and as a result, users flocked to the "ad preferences" section of their profiles, where Google had listed the categories that a user seemed to be interested in, as inferred from their web usage patterns--like "Computers & Electronics," or "Parenting." But in addition to those categories, Google listed the age range and gender it thought you were. It thought I was a man, and somewhere between 35 and 44.