Happy Birthday Renee (July 27) and Brian (July 29)!!
It's a Brian and Renee Weekend, well, extended weekend! :D
Barnaby Jack, a celebrated computer hacker who forced bank ATMs to spit out cash and sparked safety improvements in medical devices, died in San Francisco, a week before he was due to make a high-profile presentation at a hacking conference.
The New Zealand-born Jack, 35, was found dead on Thursday evening by "a loved one" at an apartment in San Francisco's Nob Hill neighborhood, according to a police spokesman. He would not say what caused Jack's death but said police had ruled out foul play.
The San Francisco Medical Examiner's Office said it was conducting an autopsy, although it could be a month before the cause of death is determined.
Bambi Note: Here's another article about this: Barnaby Jack, Prominent White Hat Hacker, Found Dead in Apartment at 35:
We've all fantasized at one point or another of standing in front of an ATM as it mistakenly shoots out cash, showering us in money. Famed computer hacker Barnaby Jack actually made it happen in 2010 during a demonstration at the Black Hat conference. Called "jackpotting," he demonstrated the vulnerability on two separate ATMs on stage, both spewing out cash at a rapid clip.
It's what he'll perhaps be best remembered for, though Jack's contributions went beyond helping ATM makers secure their money dispensing boxes. More recently, he discovered vulnerabilities in medical devices, such as pacemakers and insulin pumps, and was scheduled to give a presentation at Black Hat next week on how it's possible to deliver a lethal shock from 50 feet away from a hacked pacemaker.
He was only 35 years old, the cause of his death unknown at this time, though police have ruled out foul play.
Bambi Note: Here are a few notable Tweets about Barnaby Jack:
"My fondest memories of barnaby jack were all of them. he lived life the way it should be lived," Tweeted Ryan Naraine.
"Barns was simultaneously one of the kindest, smartest, most geniune, and most fun people I've ever met, anywhere. I can't believe this," Veracode’s Chris Eng Tweeted.
"Jack, who headed up embedded device research at IOActive, was remembered fondly by friends and peers. | http://ow.ly/nlZST #BarnabyJack," Tweeted by SC Mag.
Bambi Note: Many more quotes on #BarnabyJack hashtag on Twitter but be careful! There are a lot of phishing ones too! Barnaby Jack was highly revered by the hacker and research communities.
Black Hat officials said Friday morning that the conference will not replace Jack's talk with another. Instead, the session room will be left open so attendees can view photos of the researcher and share stories.
Jack was a fixture in the research speaking circuit, and was heavily focused on uncovering vulnerabilities in increasingly automated and network-connected embedded devices, including those found in cars and SCADA systems. Most recently, he shifted his focus to medical devices and had been working with the U.S. Food and Drug Administration on his most recent discovery.
In 2011, at the Hacker Halted show in Miami, Jack, then working at McAfee, demonstrated how implantable insulin pumps made by Medtronic could be compromised to deliver a fatal dose of the hormone to diabetics.
Bambi Note: The above was noted in the following article; Acclaimed researcher Barnaby Jack dies days before Black Hat talk - SC Mag
BLACK HAT ARSENAL
July 31-August 1, 2013 | 10:00-18:00 | Milano Ballroom
Returning bigger than ever, Black Hat is pleased to once again present Arsenal--a Tool/Demo area where independent researchers and the open source community will showcase some awesome weapons.
Click Here to See the Full Arsenal Content Lineup
DEF CON 21
August 1-4, 2013 | Rio Hotel, Las Vegas
Planning on attending DEF CON this year but don't want to head to the Rio and potentially miss out at Black Hat? As a registered Black Hat USA 2013 attendee you can now pre-purchase your DEF CON pass for $180.00. Black Hat USA is the only place that you can pre-register for DEF CON and you can pick up your badge onsite.
Learn more on pre-purchasing your DEF CON pass.
Bambi's Note: Learn more about the Black Hat USA 2013 here (July 27-Aug 1, 2013 | Las Vegas, Nevada), and about all the Black Hat happenings here.
Bambi Note: Just a few notables; see the entire article for more information.
Black Hat USA 2013 (@blackhatevents) kicks off Saturday, running through next Wednesday – what a busy and exciting time for everyone in the cybersecurity industry and the news and PR machines. Everyone that watches the thunder – as the title suggests – has seen many, many news announcements wired and stories published in advance of the premier security event, some of the noteworthy I’ve seen have included:
(Tweet This: @BlackHatEvents News Storm Underway; @Cisco, Big Card Hacks Making Hay: http://www.infosecisland.com/ via @infosecisland by @joefranscella)
750 million phones vulnerable to spying: Hack SIM card via tainted text to get root. By Darlene Storm (@securityissexy) of Computerworld (@computerworld), the blog focuses on SIM card vulnerabilities, wrote Storm:For the last several years, cryptographer Karsten Nohl and his team at Security Research Labs in Berlin have tested about 1,000 SIM cards for vulnerabilities. Give this German cryptographer two minutes on a PC and he can send a send a secret text message that contains a “virus” to a mobile phone’s SIM card, and then basically get “root” and take over the phone. Thanks Darlene, Just when we thought the NSA was our main phone related worry. Read more at: http://blogs.computerworld.com/cybercrime-and-hacking/22520/750-million-phones-vulnerable-spying-hack-sim-card-tainted-text-get-root
Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (Video). Andy Greenberg (@a_greenberg) of Forbes (@ForbesTech), got behind the wheel with Charlie Miller and Chris Valasek, which was probably not the best idea. When you read Greenberg’s story and watch the video of his joyride in the compromised Prius, you’ll see what kind of afternoon he had. All in good taste, you can watch the hackers jerk the steering wheel while in motion, lock up the seatbelt, engage the horn and render the car’s brake useless. Full story:http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
Five Charged In Massive Hacking Ring That Bilked Millions. CRN’s (@CRN) Rob Westervelt (@rwestervelt) jumped on the United States government’s accusation of five men linked to the hacks of Nasdaq, J.C. Penney, 7-Eleven and JetBlue Airways (and more). The five men from Ukraine and Russia are apparently in the history books for what is now being called “the largest hacking scheme ever prosecuted in the U.S.” This story is far from over as only two of the accused hackers are in custody. Read more: http://www.crn.com/news/security/240158966/five-charged-in-massive-hacking-ring-that-bilked-millions.htm
Scientists are exploring a submerged forest of bald cypress trees off the coast of Alabama in the Gulf of Mexico. Hurricane Katrina is thought to have uncovered it. Earlier in 2013, they announced that the forest is much older than originally thought. An early speculation was that the submerged trees were between 8,000 and 12,000 years old. The newer estimate dates the submerged trees from about 50,000 to 80,000 years ago. The submerged forest provides evidence that coastal Alabama has risen between 60 and 120 feet (18 to 36 meters) in the last 50,000 years. Scientists are now hoping to sample the ancient forest to understand what climate conditions were like along the Gulf coast during that time in Earth’s history.
A local fisherman first noticed the unusual spot in the Gulf of Mexico a few years ago. He saw that fish were abundant in the area and speculated that some sort of structure must exist on the sea floor. Fish and other marine life tend to congregate around hard structures beneath the sea, such as coral reefs and sunken ships.
We still have plenty of time to monitor Tropical Storm Dorian before it hits any land areas. It is definitely a storm everyone should pay close attention to.
A strong area of low pressure emerged off the northwestern coast of Africa and quickly organized into Tropical Storm Dorian, the fourth named storm of the 2013 Atlantic Hurricane Season.
Currently, the storm has plenty of open water to traverse through before reaching any bodies of land. However, the general movement of the storm takes it near Puerto Rico, Dominican Republic, Haiti, and possibly into the Bahamas. The storm has been having trouble staying organized, as it fights wind shear and dry air. There is a high chance that this system will not hold together. Regardless, Dorian should still be watched.
U.S. federal authorities have indicted five men — four Russians and a Ukrainian – for allegedly perpetrating many of the biggest cybercrimes of the past decade, including the theft of more than 160 million credit card numbers from major U.S. retailers, banks and card processors.
The gang is thought to be responsible for the 2007 breach at credit card processor Heartland Payment Systems that exposed some 130 million card numbers, as well as the 2011 breach at Global Payments that involved nearly a million accounts and cost the company almost $100 million.
Federal prosecutors in New Jersey today called the case the largest hacking scheme ever prosecuted in the U.S. Justice Department officials said the men were part of a gang run byAlbert “Soupnazi” Gonzalez, a hacker arrested in 2008 who is currently serving a 20-year-prison sentence for his role in many of the breaches, including the theft of some 90 million credit cards from retailer TJX.
Security companies would do well to build their products around the physician’s code: “First, do no harm.” The corollary to that oath borrows from another medical mantra: “Security vendor, heal thyself. And don’t take forever to do it! ”
On Thursday, Symantec quietly released security updates to fix serious vulnerabilities in itsSymantec Web Gateway, a popular line of security appliances designed to help “protect organizations against multiple types of Web-borne malware.” Symantec issued the updates more than five months after receiving notice of the flaws from Vienna, Austria based SEC Consult Vulnerability Lab, which said attackers could chain together several of the flaws to completely compromise the appliances.
“An attacker can get unauthorized access to the appliance and plant backdoors or access configuration files containing credentials for other systems (eg. Active Directory/LDAP credentials) which can be used in further attacks,” SEC Consult warned in an advisory published in coordination with the patches from Symantec. “Since all web traffic passes through the appliance, interception of HTTP as well as the plain text form of HTTPS traffic (if SSL Deep Inspection feature in use), including sensitive information like passwords and session cookies is possible.”
Big Yellow almost certainly dodged a bullet with this coordinated disclosure, and it should be glad that the bugs weren’t found by a researcher at NATO, for example; Earlier this month, security vendor McAfee disclosed multiple vulnerabilities in its ePolicy Orchestrator, a centralized security management product. The researcher in that case said he would disclose his findings within 30 days of notifying the company, and McAfee turned around an advisory in less than a week.
The folks from the Sunlight Foundation have noticed that the Change.gov website, which was set up by the Obama transition team after the election in 2008 has suddenly been scrubbed of all of its original content. They noted that the front page had pointed to the White House website for a while, but you could still access a variety of old material and agendas. They were wondering why the administration would suddenly pull all that interesting archival information... and hit upon a clue. A little bit from the "ethics agenda":
Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.
Yeah. That statement seems a bit embarrassing at the very same time Obama's administration isthreatening trade sanctions against anyone who grants asylum to Ed Snowden. Also... at the same time that we get to see how whistleblower Bradley Manning's "full access to courts and due process" will turn out. So far, it's been anything but reasonable, considering that the UN has alreadycondemned Manning's treatment as "cruel and inhuman." And people wonder why Snowden left the country...
Don't be upset — this is an AMAZING moment. The giant bipartisan coalition that formed in opposition to the NSA's spying programs was given just two days to mobilize thousands of phone calls to Capitol Hill and get hundreds of members of Congress on the record against the NSA's unconstitutional overreach. And we did it: Nearly half of the House of Representatives — Republicans and Democrats — voted for Rep. Amash's amendment.
We now have some clear next steps: to shore up support among those who voted for Rep. Amash's amendment, to build more champions in the House and Senate and to get ready for the next vote. We already have nearly half the House with us; with more time and more pressure, we can build even more support.
Bambi Note: Tragically, this was not to be...July 24:
UPDATE: Rep. Justin Amash's amendment to the defense appropriations bill, which would have cut funding for the National Security Agency's phone-record-collection program, just lost by a vote of 205–217.
The numbers tell the story — in votes and dollars. On Wednesday, the House voted 217 to 205 not to rein in the NSA’s phone-spying dragnet. It turns out that those 217 “no” voters received twice as much campaign financing from the defense and intelligence industry as the 205 “yes” voters.
That’s the upshot of a new analysis by MapLight, a Berkeley-based non-profit that performed the inquiry at WIRED’s request. The investigation shows that defense cash was a better predictor of a member’s vote on the Amash amendment than party affiliation. House members who voted to continue the massive phone-call-metadata spy program, on average, raked in 122 percent more money from defense contractors than those who voted to dismantle it.
Overall, political action committees and employees from defense and intelligence firms such as Lockheed Martin, Boeing, United Technologies, Honeywell International, and others ponied up $12.97 million in donations for a two-year period ending December 31, 2012, according to the analysis, which MapLight performed with financing data from OpenSecrets. Lawmakers who voted to continue the NSA dragnet-surveillance program averaged $41,635 from the pot, whereas House members who voted to repeal authority averaged $18,765.
Of the top 10 money getters, only one House member — Rep. Jim Moran (D-Virginia) — voted to end the program.
Bambi Note: Way to go Jim Moran, D-Virginia! Much more in the article. A must read.
By now, you've probably heard all about the changes introduced with Google's Android 4.3 release. But those fresh features and bits of polish are only part of the story. One of Google's biggest changes to the Android platform is actually happening outside of the operating system -- and it's affecting almost every Android device in the world.
It's the widespread launch of a universal app-scanning system -- a system that watches your device for any new application, even one loaded directly onto the device ("sideloaded") from outside of the Google Play Store, and instantly checks the app for malicious or potentially harmful code.
That's huge. And while we've been busy focusing on new devices and fun features, Google's been busy making sure every Android user has that system on his phone -- whether he realizes it or not.
Beyond the Verify Apps expansion, Android 4.3 itself includes a number of OS-level security enhancements. Perhaps most significant is the addition of a security feature called SELinux -- or Security-Enhanced Linux -- which protects certain core aspects of the system's functionality.
Bambi Note: SELinux began as part of Redhat's Enterprise Linux.
Security-Enhanced Linux (SELinux) is a Linux feature that provides the mechanism for supporting access control security policies, including United States Department of Defense-style mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. It is not a Linux distribution, but rather a set of kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency.
It has been integrated into the mainline Linux kernel since version 2.6, on 8 August 2003.
SELinux is available with commercial support as part of Red Hat Enterprise Linux (RHEL) version 4 and all future releases. This presence is also reflected in corresponding versions of CentOS and Scientific Linux. The supported policy in RHEL4 is the targeted policy which aims for maximum ease of use and thus is not as restrictive as it might be. Future versions of RHEL are planned to have more targets in the targeted policy which will mean more restrictive policies.
In free community supported GNU/Linux distributions, Fedora was one of the earliest adopters, including support for it by default since Fedora Core 2. Other distributions include support for it such as Debian as of the etch release and Ubuntu as of 8.04 Hardy Heron. As of version 11.1, openSUSE contains SELinux “basic enablement”. SUSE Linux Enterprise 11 features SELinux as a “technology preview”.
The earliest work directed toward standardizing an approach toward provision of mandatory and discretionary access controls (MAC and DAC) within a UNIX (more precisely, POSIX) computing environment can be attributed to the National Security Agency's Trusted UNIX (TRUSIX) Working Group, which met from 1987 to 1991 and published one Rainbow Book (#020A) and produced a formal model and associated evaluation evidence prototype (#020B) that was ultimately unpublished. It was sponsored by Chet Coates and Mario Tinto of the NSA's National Computer Security Center, and managed by Dr. Charles Testa and Bruce Wilner of Infosystems Technology (Greenbelt, Maryland; later, Falls Church, Virginia), the crucial architects of the TRUSIX project, and members of its Modeling Subcommittee — Steve Bunch, Dr. Frank Knowles, Dr. J. Eric Roskos, Larry Wehr, and Bruce Wilner. Their efforts, particularly as critics of the less technically profound work of the TRUSIX Access Control List (ACL) Subcommittee, survive in the IEEE POSIX 1003.6 "security extensions for portable operating systems environments" specification.
Google’s Chromecast, a little gadget that plugs into an HDMI port on the back of your TV to let you watch Internet or browser-based video, just launched yesterday. We haven’t had time to fully process it for a review yet, but after spending a day with it, we do have some initial thoughts and answers.
- The main thing to understand is that this is not an Apple TV or TiVo like thing. It’s fundamentally different. Think of it like this: If there are things on the web that you would like to see on your television, this is an extremely easy, portable, and inexpensive way to do that. It will also run smartphone apps that use the Googlecast API, but for now there are only three Android apps that support that–Netflix, YouTube, and Google Play.
- Throughput matters. You’re going to need a solid Wi-Fi signal, and if you want to watch something that’s online, a good Internet connection. We tried to get the Chromecast running at Wired yesterday, but the only networks available from our test TVs had terrible Wi-Fi reception. That meant we failed miserably. The audio and video sputtered, then ultimately halted. It was frustrating.
- But with a solid connection, setup is a breeze. After failing to get it going at work, we took it home. Because we wanted an out-of-the-box experience, we started over from scratch. In about three minutes from the time we moved our TV in order to reach behind it and jack the thing in, we were watching an episode of Sesame Street from YouTube. It was equally easy again at work this morning using a 4G MiFi hotspot.
Update: The Los Angeles Times reports that Google is ending the Netflix promotion due to overwhelming demand. That’s hugely disappointing.
Bambi Note: Much more in the article!
The more details that emerge about Chromecast, Google's new streaming media dongle, the more it sounds like you get what you pay for – and let's face it, $35 isn't a lot. But don't be fooled. There's more to Chromecast than meets the eye.
When the hardware hackers at iFixit did their teardown of the device, their conclusion was that it was "essentially a luxury item with limited use." And in my ownreview of Chromecast on Thursday, I was able to stream audio and video from Google Play, Netflix, and YouTube, and little else. In short, it couldn't do much that my existing gear couldn't do already.
But that's today. What about tomorrow – or a year from tomorrow?
Google+ Local for iOS will soon be joining Google Reader and the other dearly departed services in the infamous Google Graveyard.
As reported by 9to5Mac, Google has announced, via an email to users, that it will be retiring Google+ Local on Aug. 7.
Launched in January 2011 as Google Places and rebranded as Google+ Local in July 2012, the app is a location-based restaurant and business search app akin to Yelp. But its continuation as such a service has apparently been deemed unnecessary by Google in light of the recent update to Google Maps for iOS.
Last week, Google Maps was updated with, most notably, native iPad support and a new Explore section.
As it turns out, the Google Maps app’s new Explore section has all of the key features of Google+ Local, as listed by Google in its email announcement:
- Search by categories of places, like “restaurants” or “coffee shops”
- Read place information, including written reviews, average price, address and Street View (where available)
- See what people in your Google+ circles have to say about their favorite places around the world
- Rate and review places you’ve been to
- Share places, locations and businesses you find
As a result, Google now recommends using the recently updated Google Maps in lieu of the soon-to-be-retired Google+ Local.
After Aug. 7, Google+ Local will no longer be available and operable on iOS. But the good news is that all of your reviews and ratings will be carried over to Google Maps via your existing Google+ profile.
Aside from Google+ Local, Google Latitude is also set to be terminated by Google. The location-sharing app is scheduled to be retired on Aug. 9, a couple of days after Google+ Local’s demise.
Scientists have developed a battery made from a sliver of wood coated with tin that shows promise for becoming an environmentally friendly energy source.
Taking inspiration from trees, scientists have developed a battery made from a sliver of wood coated with tin that shows promise for becoming a tiny, long-lasting, efficient and environmentally friendly energy source. Their report on the device — 1,000 times thinner than a sheet of paper — appears in the journal Nano Letters.
Liangbing Hu, Teng Li and colleagues point out that today’s batteries often use stiff, non-flexible substrates, which are too rigid to release the stress that occurs as ions flow through the battery. They knew that wood fibers from trees are supple and naturally designed to hold mineral-rich water, similar to the electrolyte in batteries. They decided to explore use of wood as the base of an experimental sodium-ion battery. Using sodium rather than lithium would make the device environmentally friendly.
You've probably tapped it at least a few times today without ever knowing exactly what it is or what it's called; I'm talking of course about the strange, swirly square emblazoned on the Command key. So just what exactly is it and who decided it would be the symbol for such an important modifier key?
The shape itself goes by several different names including the Gorgon loop and Saint John's Arms has come to symbolize many things over the past 2,600 years or so, but it didn't become an icon part of computing culture until 1984. The tale statesthat when Steve Jobs first viewed the keyboard command list for MacDrawhe was disgusted with the number of Apple logos - which at this point was the symbol used for the Command key - cluttering up the list. He demanded that his team find a suitable symbol to replace it.
Apple's bitmap artist, Susan Kare, immediately began browsing for a new icon and stumbled upon the Gorgon loop, which is used on signs in Scandinavia to highlight a point of interest. She presented the symbol to the team, they squealed with delight, and the Command key as we now know it was born.
Logic Pro X is the most advanced version of Logic ever. Sophisticated new tools for professional songwriting, editing, and mixing are built around a modern interface that’s designed to get creative results quickly and also deliver more power whenever it’s needed. Logic Pro X includes a massive collection of instruments, effects, and loops, providing a complete toolkit to create amazing-sounding music.
Powerful New Interface
• Consolidate and control multiple tracks or create rich, layered instruments with Track Stacks
• Smart Controls allow you to manipulate multiple plug-ins and parameters with a single move
• An enhanced Mixer lets you move, copy, and bypass channel inserts more efficiently
• Quickly re-order song sections and try new ideas using Arrangement Markers
• Autosave keeps your work safe and sound
• See and edit more of your performances in the Score editor with a new wrapped view
Professional Music Production
• Fix out-of-tune vocals and change the melodies of recorded audio with Flex Pitch
• Manipulate the timing and tempo of any recording with ease using Flex Time
• Record and seamlessly punch in and out of one or multiple tracks
• Keep takes organized with take folders and build comps quickly with Quick Swipe Comping
• Record automation for any channel strip or plug-in parameter on the fly
• Create and mix music from anywhere in the room using Logic Remote on iPad
• 64-bit architecture supports large projects containing hundreds of tracks and sampled instruments
• Create drum tracks that play with your song using Drummer, a virtual session player
• Choose among 15 distinct drummers that can take your direction and perform millions of unique grooves
• Build your own kit with Drum Kit Designer using a diverse collection of deeply sampled, professionally mixed snares, toms, kicks, hi-hats, and cymbals
• Produce electronic drum sequences with Ultrabeat
Keyboards and Synths
• Instantly turn a simple chord into a rich performance with the Arpeggiator
• Transform simple ideas into elaborate performances using nine MIDI plug-ins
• Create classic ’70s- and ’80s-style synthesizer tracks using Retro Synth
• Play faithful models of vintage keyboards with Vintage B3, Vintage Electric Piano, and Vintage Clav
• Get inspired by a collection of synths that provide analog, wavetable, FM, and physical modeling synthesis
• Play or create a wide variety of rich sampled instruments with the EXS24 Sampler
Guitar and Bass Gear
• Build your own guitar or bass rig with Amp Designer using vintage and modern amps, cabinets, and mics
• Design a custom Pedalboard from a collection of delay, distortion, and modulation stompboxes
• Access the Tuner with just a click to quickly get in tune
Creative and Production Effects
• Play your sounds through realistic acoustic spaces using Space Designer convolution reverb
• Use a range of multi-tap, vintage tape, and stereo delays
• Add movement to your tracks with a variety of modulation effects
• Get the perfect mix with a variety of EQs, dynamics, and other mixing tools
• Put the finishing touch on your project using a collection of mastering plug-ins
• Over 1500 instrument and effect Patches
• More than 800 sampled instruments
• 30 urban and electronic drum machine Patches
• 3600 Apple Loops in modern urban and electronic genres
• Expand your instrument and effects library with third-party Audio Units-compatible plug-ins
• Import and export XML to support Final Cut Pro X workflows
• Export and share your songs directly to SoundCloud
• Open projects from Logic 5 or later
Minimum System Requirements
4GB of RAM
Display with 1280-by-768 resolution or higher
OS X v10.8.4 or later
Requires 64-bit Audio Units plug-ins
Minimum 5GB of disk space. 35GB of optional content available via in-app download.
Bambi Note: Much more on the site and it's available in the Mac App Store. If you click the Buy Now button in the upper right corner, it goes to this page and shows that it is $199.99.
A Texas man ran a Ponzi scheme through the virtual online money system called Bitcoin, pocketing some of his investors' proceeds for his personal expenses and gambling, U.S. securities regulators charged on Tuesday, warning that the rise of such digital currencies could lead to more frauds.
Bitcoin, which is not managed by any one company or government, is a relatively new phenomenon that exists through an open-source software program. Users can buy Bitcoin through exchanges that convert real money into the virtual currency.
In its statement about the Shavers case, the SEC on Tuesday also said it issued an alert warning investors to be on the lookout for scams involving virtual currencies.
"We are concerned that the rising use of virtual currencies in the global marketplace may entice fraudsters to lure investors into Ponzi and other schemes," the SEC said.
Bambi Note: Yep, as if the stock market investments weren't enough of a virtual money scheme possibility. ;) Seriously, any currency, real or virtual opens the doors for this type of abuse.
As most of you probably know by now, Google Reader will be closed on July 1st. What does this mean for Reeder?
Unfortunately, it's still too early to have answers to all questions I got the last couple weeks. Probably most importantly, one thing that's clear:
Development of Reeder will continue after July 1st.
So what's the plan?
All three versions of Reeder will get major updates. Unfortunately, these won't be ready for July 1st. Sorry about that.
Reeder for iPhone
The current version of Reeder for iPhone will be free, starting today. Version 3.2 (already submitted) will support the following services as alternatives to Google Reader:
Now you might ask why the iPhone version will get a major update too. Actually, that wasn't planned at first. But I'm really happy with how the new iPad version turns out and want to bring this to the iPhone too.
Reeder for Mac and iPad
Unfortunately, it's not that easy to add other services to the current versions of these apps. It's probably best to use my time to work on the new versions, to get these out as soon as possible. This means that I'll remove the current versions of these apps from the App Store on July 1st, as they only work with Google Reader.
That's all for now. I'll try to keep this page up-to-date. Also, any news will be posted on Twitter.
Bambi Note: This was also noted by Gigaom on June 24th and Macworld on April 1 (but I am sure everyone was wondering if that was just an April Fool's joke at that point since it was not mentioned after that. However, thankfully, Reeder developer has stated Reeder in both iOS and Mac versions will continue but he needs to rework Reeder on the Mac and iPad entirely, but thankfully not the iPhone Reeder app that is already working as it should.