Jump to content

Search the Community

Showing results for tags 'leak'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 36 results

  1. Intel's tiny desktop PC gets 10th-gen Core i3, Core i5, and Core i7 processor upgrades. If you're looking for a tiny/budget desktop PC you can't go far wrong by choosing to buy an Intel NUC. It's worth holding off on purchasing one right now, though, as the next generation of NUCs just leaked. As Liliputing reports, the new Intel Frost Canyon NUC models are expected to be officially announced soon, but promotional images for the new tiny PCs have leaked via Chinese website Kgula. As the images reveal, it's hard to make the NUC look much different from previous generations. The key change for Frost Lake on the exterior is a USB Type-C port appearing on the front of the case as a replacement for one of the Type-A ports. It's inside where the most important change has happened, though. Intel is set to offer the short and tall NUC models again, with the short restricted to an M.2 SSD slot for storage, while the tall version adds the option of a 2.5-inch drive, be that an SSD or hard drive. Three processors will be offered in the form of the 10th generation Core i3-10110U, Core i5-10210U, and Core i7-10710U. The Core i3 offers two cores and four threads running at 2.1GHz (boosting to 4.1GHz), the Core i5 offers four cores and eight threads running at 1.6GHz (boosting to 4.2GHz), and the Core i7 offers six cores and 12 threads running at 1.1GHz (boosting to 4.7GHz). All three chips rely on Intel UHD Graphics rather than Intel Iris GPUs, which is a shame. The good news is, all three chips can be configured at either a 15W or 25W TDP, with 25W allowing for better performance. FanlessTech confirmed that these NUCs will be configured at 25W, so they should offer a noticeable performance benefit over the previous generation NUC line-up, with the one exception being the Bean Canyon NUC which used a 28W 8th-gen Coffee Lake Core i7 complete with Iris Graphics 655. It's unlikely this leak shows the complete line-up of Intel's next-gen NUCs. Don't forget we're already expecting an eight core Xeon Quartz Canyon NUC at some point. Source: Intel Frost Canyon NUC Details Leak (via PCMag)
  2. Google has fired an employee for leaking and sharing names and personal details of staffers to the media. Additionally, it has placed two other employees on leave for violation of company policies. The move comes amidst rising tension between employees and management. Workers have been unhappy with the way the management has dealt with sexual harassment cases. Last year, Google employees worldwide staged a walkout in protest of this. The search giant is currently investigating the employees who were placed on leave. A Google spokeswoman said that one of the employees looked for and shared confidential documents that were beyond the scope of their job. These documents relate to a new Chrome tool that Google has made mandatory for workers to install on their computers. Many employees have raised concerns about this tool as they believe it is being used by the management to spy on them. The tool automatically reports employees that create calendar meetings with more than 100 people or 10 rooms. The Google spokesperson said that the tool was aimed at keeping calendar spam in check; she said that the person was put on leave for accessing a wide range of company documents and not for opening or accessing just one file. The second employee was put on leave for tracking individual calendars of the staff working in human resources, communications teams, and community platforms. As per the Google spokeswoman, this tracking made the staff in these departments feel unsafe. Both employees had taken part in activism activities against Google's management for poorly handling sexual harassment cases as well as for working on projects like a censored version of the search engine for China. The investigation against them has angered many employees inside the company as they believe Google is punishing them for protesting against the management. They now believe that the work culture of Google is no longer as open as it was before. Previously, Google employees could access any of the company's internal documents on any of the projects. However, in a bid to reduce leaks to the media, Google's management cut down access to documents to thousands of contractors and other employees. Instead, access is now provided to employees or a group on a "need-to-know" basis. Source: Google fires an employee for leaking personal staff details to media, puts two others on leave (via Neowin)
  3. Images of what appears to be packaging boxes of AMD's upcoming third-generation Threadripper processors have leaked, and it seems like the company is set to continue the tradition of fancy-looking packaging for Threadripper CPUs. The leak indicates that the launch of Threadripper 3000 series processors is nearly upon us and in fact, Videocardz alleges that these, alongside the accompanying TRX40 chipset motherboards, may be launching as early as tomorrow. A previous report had mentioned a possible November 5 announcement which has evidently been pushed back. As reported earlier, the Threadripper 3990X is reportedly launching later with only a teaser awaiting us at the alleged launch tomorrow. Information on the pricing of these HEDT parts has still managed to elude us but we could expect to see some competitive pricing judging by AMD's past practices. Source: 1. AMD's Threadripper 3000 packaging leaked, allegedly launching tomorrow (via Neowin) 2. AMD 3rd Gen Ryzen Threadripper packaging leaked (via VideoCardz)
  4. So small that it doesn’t require FAA approval An early retail listing on Newegg’s Canadian store has given us official images of DJI’s unannounced Mavic Mini, as well as listing its specs. DJI’s new drone is something of an open secret at this point. We saw an FCC listing for the drone back in August, and DroneDJ published hands on images just last week. But the retailer listing adds credence to those earlier leaks, and prices the diminutive drone at $646.15 Canadian dollars (around $494) when sold with DJI’s Fly More kit. One of the more important specs listed on Newegg’s page is the drone’s weight of just 249g. This means that any owners in the US (and soon the UK) won’t have to register this drone with the authorities in order to fly it. Previously, DJI’s lightest Mavic drone was the Mavic Air, which weighs 430g, far above the FAA registration cutoff of 8.8 ounces (250g). Both the retailer listing as well as images leaked earlier this month from DroneDJ show how it’s small enough to sit in the palm of your hand. DroneDJ notes that it has a similar width and height to a smartphone. Flight time is rated at 30 minutes according to the product listing (which corroborates with DroneDJ’s previous report), and recording resolution apparently tops out at 2.7K rather than 4K, which DroneDJ speculates is an attempt to stop the Mavic Mini from cannibalizing sales of DJI’s Mavic Air or Mavic Pro drones. You can find more pictures of the new drone over on WinFuture. The retailer listing doesn’t give any information about when the Mavic Mini might see a release, but with a DJI announcement set to take place at 9am ET on Wednesday, it sounds like we might not have long to wait. Update October 28th, 6:55AM ET: Updated with details of DJI event taking place on Wednesday. Source: DJI Mavic Mini images and specs leak in new retailer listing (via The Verge)
  5. Oops Microsoft has accidentally released an internal-only version of Windows 10 to testers, revealing a new Start menu design. The software giant has distributed Windows 10 build 18947, meant for internal Xbox development, to Windows Insider testers using 32-bit devices. It’s an internal-only build from the company’s canary branch, and yet Microsoft has published it to all Windows 10 testers whether they’re in release preview, fast ring, or even slow ring testing. Thankfully, it’s only released to 32-bit systems, which aren’t widely used, but it’s an embarrassing mistake for Microsoft’s Windows 10 testing efforts. This internal build appears to include a new Start menu design, that’s very early in testing, without Microsoft’s Live Tiles. It’s something Microsoft is testing internally, but it’s not clear whether Windows 10 will fully drop Live Tiles in the Start menu anytime soon. This new build also includes a GIF search tool within the emoji picker for Windows 10. This isn’t the first time Microsoft has made this mistake. Back in 2017 the company released internal versions of Windows 10 for PC and mobile, and caused some devices to enter a reboot loop. Microsoft quickly spotted the mistake, and helped affected Windows 10 users with a device recovery tool. Microsoft’s Windows Insider chief, Dona Sarkar, says the company is “looking into” this latest issue. We’ve also reached out to Microsoft for further comment, and we’ll update you accordingly. Source
  6. Pirated Promo Screeners of ‘American Gods’ and Other TV-Shows Leak Online Unreleased episodes of several high-profile TV-shows including American Gods, The 100, Bless This Mess, and Knightfall have leaked online. The leaks appear to come from promotional screeners, some of which carry revealing watermarks. The pirate releases are sponsored by a Russian gambling site. Roughly a decade ago, new episodes of TV-series regularly found their way onto the Internet, before appearing on TV. These leaks were often linked to promotional screeners, which are generally sent out to reviewers and critics at the start of a new season. In recent years these TV-screener leaks have become rarer, but a series of pirated releases that have appeared over the past several days is one of the largest breaches ever. While the source is unconfirmed, all signs suggest that a serious security hole has been exploited. It all started when a new episode of The CW’s hit series “The 100” leaked online, weeks before the sixth season officially premieres. Soon after, a pattern started to emerge when three unreleased episodes of “American Gods” came out too. The leaked American Gods episodes show the typical hallmarks of a promotional screener. There is a clearly visible “For Screening Purposes Only” message popping up, for example, and the name “Jessica Silvester” is visible as a permanent watermark throughout the episodes. From one of the leaked episodes The name in question could point to the reviewer who received the screeners, or was supposed to at least. While the source of the leak has not yet been confirmed, the name matches that of a New York Magazine editor. Whether that’s the same “Jessica Silvester” is presently unknown. What we do know is that the leaks didn’t stop there. Advance screener leaks of other shows including “Bless This Mess,” “The Bold Type,” “The Act,” “The Code,” “Knightfall,” and “The Chi” followed (full overview below). In the case of the “The Bold Type,” which airs on Freeform, it’s clear that the review copies are for the press. This leak includes the first three episodes of season two, which starts this June. The Bold Type There are also two full and unreleased seasons of Starz’ “The Spanish Princess” and Hulu’s “Ramy” among the leaked files. Both series have yet to premiere. The leaks are from various production companies, distributors, and TV networks. The only clear pattern we see is that they all appear to be promo screeners. These are obviously not intended to show up at pirate sites, which the leak of the aptly named show “Bless This Mess” nicely illustrates. “For Review Only. Not for Downloading, Recording, File Sharing, Sale or Public Performance,” an embedded message reads. Bless This Mess Aside from the screener watermarks, there are other messages visible as well, pointing to the ‘Russian’ gambling site 1XBET. This name has popped up regularly in recent months as a “sponsor” of pirate releases. 1XBET promo in the leaked video Andrey Busargin, Director of Brand Protection at international cybersecurity outfit Group-IB, previously told us that casinos are increasingly teaming up with pirates to increase their revenues. “This scheme allows online casinos to generate leads, wherever a user watches a pirated copy and whatever ads are displayed on a website with pirated copies,” Busargin said. The name of the site is per manently visible throughout the various episodes, and there’s a promo code for a deposit bonus, in case any pirates want to take a gamble. The leaks are a major setback for the rightsholders as it will draw people to pirate sites. Whether author Neil Gaiman, whose novel American Gods is based on, will complain has yet to be seen. In 2011 he admitted that in some instances piracy had boosted his book sales by 300%. The big question that remains is the source of the leak, and whether the breach is a one-off or something more structural. — Here’s overview of the leaked screeners that have come out thus far: The 100, Season 6, Episode 1 and 2 American Gods, Season 2, Episode 5, 6 and 7 In The Dark, Season 1, Episode 1, 2 and 3 The Code, Season 1, Episode 1 The Bold Type, Season 3, Episode 1, 2 and 3 Bless This Mess, Season 1, Episode 1 Knightfall, Season 2, Episode 3 and 4 The Chi, Season 2, Episode 2, 3, 4 and 5 The Act, Season 1, Episode, 5, 6, 7 and 8 The Spanish Princess, Full Season Ramy, Full Season Source
  7. NASA and its Russian counterparts identified a tiny pressure leak on the International Space Station Wednesday, which may have been caused by a micrometeorite strike. The International Space Station is seen in this view from the space shuttle Discovery after the undocking of the two spacecraft. NASA and its Russian counterparts identified a tiny pressure leak on the International Space Station Wednesday, which may have been caused by a micrometeorite strike. Dmitry Rogozin, head of Russian space agency Roscosmos told state news agency TASS that a “micro-fracture” was found in a side compartment of the Soyuz MS-09 spacecraft currently docked with the space station. The fracture, he said, may be external damage and is believed to be the result of a micro-meteorite. The fracture caused a drop in pressure and an air leak on the station, according to Rogozin, who said that the problem has been resolved. NASA said that flight controllers in Houston and Moscow spotted “a minute pressure leak” around 7 p.m. EDT Wednesday. The space station crew is conducting troubleshooting and repair work on the leak, NASA explained in a blog post Thursday morning. "The leak has been isolated to a hole about two millimeters in diameter in the orbital compartment, or upper section, of the Soyuz MS-09 spacecraft attached to the Rassvet module of the Russian segment," the space agency explained. "This is a section of the Soyuz that does not return to Earth." Once the hole was identified, crewmembers applied Kapton tape, which slowed the leak. "Flight controllers are working with the crew to develop a more comprehensive long-term repair," NASA added. "Once the patching is complete, additional leak checks will be performed. All station systems are stable, and the crew is in no danger as the work to develop a long-term repair continues." NASA and the Russian space agency Roscosmos operate the orbiting space lab along with the European Space Agency, Japan’s JAXA and the Canadian Space Agency. Six crew members are on the ISS, led by station Commander and NASA astronaut Drew Feustel. NASA Flight Engineers Ricky Arnold and Serena Auñón-Chancellor are also on the space station, along with Alexander Gerst of ESA and Oleg Artemyev and Sergey Prokopyev of Roscosmos. The six crew members gathered in the Russian segment of the station after they were notified of the leak, NASA said. The space station, which has been continuously occupied since November 2000, has an internal pressurized volume equal that of a Boeing 747, according to NASA. Source
  8. Hot on the heals of the news that Asus has announced its very own smartphone with a display notch ala the iPhone X with the arrival of the ZenFone 5, we also have news that another popular Android smartphone maker appears to be set to follow Apple’s lead in making a flagship phone that has a notch at the top of the display, allowing for an almost bezel-free phone while still having somewhere for all those important sensors and camera lenses to live. Photos of what appears to be a OnePlus 6 have started to pop up online, and they show what is becoming a bit of a trend among Android phone makers. While plenty of people, and indeed competitors, mocked Apple for its decision to include a notch at the top of the iPhone X’s display, it is becoming increasingly clear that this is one of the best ways of producing a smartphone today with almost no bezels while also being able to offer a front-facing camera as well as the proximity and light sensing hardware that a modern smartphone needs. While the iPhone X’s notch has been lauded as a way of Apple differentiating the iPhone X from the competition, as well as the tech it packed in there in the form of Face ID, it is important to remember that it is not something of which Apple is likely particularly proud. That notch is, however, a necessary evil in Apple’s quest to not only remove all physical buttons from the face of the iPhone but to also make the bezels around an iPhone’s screen as small as possible. Until Apple’s TrueDepth sensors and cameras can live beneath the display itself, a notch is something that is begrudgingly required, rather than sought after. That is something other smartphone makers are starting to come around to, even though they don’t necessarily have TrueDepth module of their own. Though I am sure that the likes of OnePlus and Asus are not too disappointed that their new smartphones are being mentioned in the same breath as Apple’s current flagship due to this. What I personally can’t get around though is the noticeably thick chin at the bottom. I mean, if you are putting a notch in the phone, at least make the screen on all the other three sides of the device go right to the edges. Also can be seen in the photos is the back of the device, with an iPhone X-like dual vertical camera configuration and glass back, likely meant for wireless charging. Redmondpie.com
  9. TESTS on USB connections have shown they are highly susceptible to information “leakage”, making them less secure than previously thought. Researchers from the University of Adelaide in South Australia tested more than 50 different computers and external USB hubs and found that more than 90 per cent of them leaked information to an external USB device. The results will be presented in Canada at the USENIX Security Symposium in Vancouver next week. Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science, said it had been thought that because USB-connected devices only sent information along a direct communication path to the computer, it was protected from potentially compromised devices. He said USB-connected devices were the most common interface used globally to connect external devices to computers and included keyboards, cardswipers and fingerprint readers, which often sent sensitive information. “But our research showed that if a malicious device or one that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured. That means keystrokes showing passwords or other private information can be easily stolen,” Dr Yarom said. Dr Yarom said this “channel-to-channel crosstalk leakage” was analogous with water leaking from pipes. “Electricity flows like water along pipes – and it can leak out,” he says. “In our project, we showed that voltage fluctuations of the USB port’s data lines could be monitored from the adjacent ports on the USB hub.” The leak was discovered by University of Adelaide Computer Science student Yang Su in collaboration with Dr Daniel Genkin (University of Pennsylvania and University of Maryland) and Dr Damith Ranasinghe (Auto-ID Lab, University of Adelaide). The tests were conducted in late 2016 and early this year. The team used a modified cheap novelty plug-in lamp with a USB connector to “read” every keystroke from the adjacent keyboard USB interface. The data was sent via Bluetooth to another computer. Dr Yarom said other research had shown that 75 per cent of USB sticks dropped on the ground were picked up and plugged into a computer. But they could have been tampered with to send a message via Bluetooth or SMS to a computer anywhere in the world. He said Bluetooth was a more secure way of transferring information. “We wanted to understand better what things are secure, what things are not and what risks people might be facing,” said Dr Yarom, who will attend the symposium in Vancouver from August 16-18. “The main take-home message is that people should not connect anything to USB unless they can fully trust it. “For users it usually means not to connect to other people devices. For organisations that require more security, the whole supply chain should be validated to ensure that the devices are secure.” Dr Yarom said the long-term solution was a redesign of USB connections to make them more secure. “The USB has been designed under the assumption that everything connected is under the control of the user and that everything is trusted – but we know that’s not the case,” he said. “The USB will never be secure unless the data is encrypted before it is sent.” South Australia’s capital Adelaide has three long-standing public universities, Flinders University, University of South Australia and the University of Adelaide, each of which are consistently rated highly in the international higher education rankings. Article source
  10. Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed. An Israeli technology company has exposed millions of Verizon customer records, ZDNet has learned. As many as 14 million records of subscribers who called the phone giant's customer services in the past six months were found on an unprotected Amazon S3 storage server controlled by an employee of Nice Systems, a Ra'anana, Israel-based company. The data was downloadable by anyone with the easy-to-guess web address. Nice, which counts 85 of the Fortune 100 as customers, plays in two main enterprise software markets: customer engagement and financial crime and compliance including tools that prevent fraud and money laundering. Nice's 2016 revenue was $1.01 billion, up from $926.9 million in the previous year. The financial services sector is Nice's biggest industry in terms of customers, with telecom companies such as Verizon a key vertical. The company has more than 25,000 customers in about 150 countries. Privacy watchdogs have linked the company to several government intelligence agencies, and it's known to work closely with surveillance and phone cracking firms Hacking Team and Cellebrite. In regulatory filings with the Securities and Exchange Commission, Nice noted that it can't control what customers do with its software. "Our products may also be intentionally misused or abused by clients who use our products," said Nice in its annual report. Chris Vickery, director of cyber risk research at security firm UpGuard, who found the data, privately told Verizon of the exposure shortly after it was discovered in late-June. It took over a week before the data was eventually secured. The customer records were contained in log files that were generated when Verizon residential customers in the last six months called customer service. These interactions are recorded, obtained, and analyzed by Nice, which says it can "realize intent, and extract and leverage insights to deliver impact in real time." Verizon uses that data to verify account holders and to improve customer service. Each record included a customer's name, cell phone number, and their account PIN -- which if obtained would grant anyone access to a subscriber's account, according to a Verizon call center representative, who spoke on the condition of anonymity as they were not authorized to speak to the press. Several security experts briefed on the exposure prior to publication warned of phone hijacking and account takeovers, which could allow hackers to break into a person's email and social media accounts protected even by two-factor authentication. Six folders for each month from January through to June contained several daily log files, apparently recording customer calls from different US regions, based on the location of the company's datacenters, including Florida and Sacramento. Each record also contained hundreds of fields of additional data, including a customer's home address, email addresses, what kind of additional Verizon services a subscriber has, the current balance of their account, and if a subscriber has a Verizon federal government account, to name a few. One field also appeared to record a customer's "frustration score," by detecting if certain keywords are spoken by a customer during a call. Although the logs referenced customer voice recordings, there were no audio files found on the server. Some of the records were "masked" in what appears to be a redaction effort to prevent an unauthorized disclosure of private information. But most of the customer records are in part or entirely visible. Ted Lieu, a Democratic congressman and computer science major, said the exposure was "highly troubling." "I'm going to be asking the Judiciary Committee to hold a hearing on this issue because Congress needs to find out the scale and scope of what happened and to make sure it doesn't happen again," he told ZDNet. Lieu, also a Verizon customer, said: "I would like to know if my data was breached." Verizon said it was investigating how its customer data was improperly stored on the Amazon Web Services (AWS) server as "part of an authorized and ongoing project" to improve its customer service. "Verizon provided the vendor with certain data to perform this work and authorized the vendor to set up AWS storage as part of this project," said a spokesperson. "Unfortunately, the vendor's employee incorrectly set their AWS storage to allow external access." One account from a senior Verizon employee with knowledge of the situation said that the company was unaware that the data was being exfiltrated or exported, and Verizon had no control over the server. The phone giant said that the "overwhelming majority of information in the data set has no external value." "There is some personal information in the data set," said the spokesperson, "but as indicated earlier, there is no indication that the information has been compromised." Verizon also would not say how it "masked" data, citing security concerns. Nice said it too was investigating the exposure. A spokesperson said that none of its systems or products were breached and "no other Nice customer data was involved." Vickery said, however, that there was evidence that data from Orange, a European telecoms provider was for a time also stored on the exposed server, according to Vickery, suggesting the data exposure may not be limited to Verizon. (Orange did not respond to a request for comment.) A Nice spokesperson later said that the data was "part of a demo system," and did not comment further. It remains unclear who else at Nice had access to the server, or if the data was downloaded by anyone else. Verizon said that it had requested information on who had access to the storage. A spokesperson said Monday that an investigation determined "no other external party accessed the data." When pressed, the company would not say how it came to that conclusion. Article source
  11. There's quite a buzz among movie pirates who have an eye for high-quality video. After the first Ultra HD Blu-Ray disc leaked last month, two more releases have now followed. While some have rumored that AACS 2 encryption may have been cracked, a bypass is just as likely. And with the leakers themselves staying quiet, the mystery remains. Up until a few weeks ago, full copies of UHD Blu-Ray Discs were impossible to find on pirate sites. Protected with strong AACS 2 encryption, it has long been one of the last bastions movie pirates had to breach. While the encryption may still be as strong as before, it’s clear that some pirates have found a way through. After the first pirated Ultra HD Blu-Ray Disc leaked early last month, two new ones have appeared in recent days. Following the historic “Smurfs 2” release, a full UHD copy of “Patriots Day” surfaced online little over a week ago, followed by a similar copy of “Inferno” this past weekend. The latter two were both released by the scene group TERMiNAL and leaked to various torrent sites. While the leaks all appear to be legitimate, it’s still a mystery how the Blu-Ray discs were ripped. While some have suggested that AACS 2 must have been cracked, there is no evidence supporting this yet. The TERMiNAL releases don’t mention anything that hints at a crack so the mystery remains intact. 4k capture (full) An alternative explanation would be that there is some kind of exploit allowing the pirates to bypass the encryption. Some have pointed to a private exploit of Intel’s SGX, which would make it possible to sniff out what PowerDVD has in memory. “If SGX has a loop, that will enable people to read PowerDVD’s memory. That will then allow them to copy the decrypted data from the UHD Blu-Ray drive 1:1,” a source informs TorrentFreak. Another option could be that there’s a private media player exploit, allowing the pirates to get full access to the data and read the encrypted disc. Our source has tried this extensively in the past and got close, but without success. Others may have had more luck. UHD leak specs If there’s indeed such an exploit or vulnerability, the pirates in question might want to keep that private to prevent it from being fixed, presuming it can be patched, that is. Theoretically, AACS 2 could be cracked of course, but this seems to be less likely, according to our source. The latest UHD Blu-Rays also have bus encryption. This means that there are two separate keys to break, which would be very hard. Cracked or not, pirates are excited about the UHD Blu-Ray copies that have started to populate through private and public torrent sites. Tracker advertising the third UHD leak While the download numbers are nowhere near those of regular HD releases, the UHD leaks are widely seen as a breakthrough. And with three releases in short succession, there are likely more to follow. Those who dare to pirate them have to make sure that they have enough bandwidth, time, and free space on their hard drives though. Ultra HD releases easily take up several dozens of gigabytes. TorrentFreak
  12. UPDATE: 9 p.m. EDT — In a statement to International Business Times regarding the hacking of some user accounts, Spotify said Tuesday evening: “We monitor Pastebin and other sites regularly. When we find Spotify credentials, we first verify that they are authentic, and if they are, we immediately notify affected users to change their passwords.” UPDATE: 7 a.m. EDT — According to some other hackers and people familiar with such matters, the Spotify hack is actually just a dump of resused passwords, and the lack of complex passwords in the list was mentioned as one of the proofs for the claim. If true, and your account details are in that list, it is all the more reason for you to change your password to a complex, secure one. And you should do that not only on Spotify, but for all your online accounts. Original story: Late Monday night, a hacking group revealed the login credentials of thousands of Spotify accounts. In its announcement on Twitter, the Leak Boat said it was 9,000 accounts, but the page that listed all the account details had information of fewer than 6,500 Spotify subscribers. The group, which has previously released hacked accounts from various websites, as well as private videos and photographs of several celebrities, posted the information on a publicly available website. To check the authenticity of the claim, the International Business Times tried a few randomly chosen username and password combinations, and they all gave access to the Spotify subscribers’ accounts. To know if your account was among the 6,410 that are listed on this public page, head over to it and check for your username. If you find your login information on the page, and don’t want it compromised any further, we recommend you change your password immediately. And if you use the same login credentials, especially the same password, on any other websites, we recommend you change those too. Otherwise, you run the risk of having your other online accounts being compromised as well. The Spotify users hacked Monday night are from all over the world. International Business Times has reached out to Spotify for comment, but the music streaming service has yet to respond. Following the Spotify leak, the Leak Boat also invoked recently ousted FBI Director James Comey, in a sarcastic bid to reassure anyone worried by its activities. Members of the Leak Boat seem to have been busy Monday night. They also released a few login credentials for wizard101.com, a website to play a wizard game. The group said it was for kids to enjoy. If you have an account on the website, you can check if you were compromised by checking for your login details on this page. If your account was hacked, you should consider changing your password not just on wizard101.com but on all other websites where you use the same password. Shortly before leaking the Spotify accounts, the group, whose Twitter handle is @SecTeamSix_, said it was considering starting a “Lulzcalypse” — a reference to starting an apocalyptic storm of leaks, only for laughs, at least as seen from its point of view. In later tweets, the group referred to it as a “Leakocalypse,” presumably not finding it all so funny any more. But the very next tweet after the “Lulzocalypse” one from the group said it would release 10 more private videos and/or photographs of celebrities, if it reached 600 followers on the social media platform. The group had 490 followers on Twitter at the time this story was written. Article source
  13. The simple line of code made it possible for attackers to view private Yahoo Mail images. Yahoo has decided to retire the use of the ImageMagick library following a researcher's disclosure of a simple way to break the system to cause email information leaks. Last week, security researcher Chris Evans demonstrated the exploit and released the details of the security flaw to the public. In a blog post, Evans said the so-called "Yahoobleed #1" (YB1) vulnerability is a way to slurp other users' private Yahoo! Mail image attachments from Yahoo servers. YBI utilizes a vulnerability found within the ImageMagick image processing software, an open-source image processor which provides the backbone for image handling used by many online services. Unlike previous out-of-bounds server side memory content leaks, such as Heartbleed and Cloudbleed, Evans says that Yahoobleed makes use of uninitialized memory. "An uninitialized image decode buffer is used as the basis for an image rendered back to the client," the researcher says. "This leaks server-side memory." "This type of vulnerability is fairly stealthy compared to an out-of-bounds read because the server will never crash," Evans added. "However, the leaked secrets will be limited to those present in freed heap chunks." In a proof-of-concept (PoC) demonstration, the researcher attached an 18-byte exploit file as an email attachment, emailed it to himself, and then click on the image to launch the image preview pane in order to show how it is possible to compromise a Yahoo email account. "The resulting JPEG image served to my browser is based on uninitialized, or previously freed, memory content," Evans said. The vulnerability lies in the obscure RLE (Utah Raster Toolkit Run Length Encoded) image format. An attacker could simply create a crafted RLE image, send it, and create a loop of empty protocol commands which prompts the information leak. Yahoo did not implement any form of whitelisting for ImageMagick decoders which allowed such malicious files to slip through the net. After submitting the one-line exploit to Yahoo, the tech giant decided that it was time to retire the open-source component altogether, rather than risk any other security flaws placing user emails at risk. The ImageMagick bug has been patched and Evans was awarded a bounty payment of $14,000. After declaring his resolve to give the cash -- a reward of $778 per byte -- to charity, Yahoo doubled the amount to $28,000. In March, four Russians were charged by the US Department of Justice (DoJ) with stealing the credentials of over 500 million user accounts from Yahoo. Article source
  14. Microsoft's not-yet-officially unveiled -- Windows 10 Cloud operating system is likely going to be unveiled on Microsoft's May 2, 2017 event in New York City. While we will have to wait another week to find out whether that is indeed the case or not, Windows 10 Cloud hardware specs and performance targets were leaked online recently on Windows Central. Windows 10 Cloud, according to rumors, is Microsoft's answer to Google's Chromebook. Designed specifically to compete with Google in education, rumors have it that it will be a low-cost device that will run well on hardware that regular versions of Windows 10 don't run that well on. Read: our first impression of Windows 10 Cloud Windows 10 Cloud hardware specs Microsoft's performance targets for Chromebook competitor highlight what the company wants manufacturers to deliver. It wants its Windows 10 Cloud devices to compete on an eye to eye level with Chromebook's battery life, and resume, and come close to the cold boot, first-sign in and consecutive sign-in times of devices powered by Google's Chrome OS. As far as minimum hardware specs are concerned, they hold some surprises considering that Microsoft needs to compete with Google in performance and price: Quad-core (Celeron or better) CPU. 4 Gigabytes of RAM. 32 Gigabytes of storage for 32-bit, 64 Gigabytes for 64-bit. Battery larger than 40 WHr (WattHour). Fast eMMC or SSD storage. Optional pen and touch support. How does this compare to regular versions of Windows 10? Processor with at least 1 GHz 1 Gigabyte of RAM for 32-bit, 2 Gigabytes for 64-bit. 16 Gigabytes of hard drive space for 32-bit, 32 Gigabytes for 64-bit versions of Windows 10. A DirectX 9 or higher compatible graphics card with WDDM 1.0 drivers. A 800x600 display. And Google's Chrome OS? Google does not list minimum requirements for its Chrome operating system. If you check out the devices that are available currently, you will notice the following minimum specs: Intel Celeron processor or comparable. 2 Gigabytes of RAM. 16 Gigabyte of SSD storage It is interesting to note that Microsoft's Windows 10 Cloud operating system requires better hardware than Windows 10 in some areas. Most notable RAM and storage. On the processor side, Windows 10 will run on ARM processors eventually as well which should boost battery life and reduce the cost of devices. Windows 10 Cloud may look an awful lot like Windows RT on first glance. Microsoft launched Windows RT alongside Windows 8, but has not really mentioned the operating system since the launch of Windows RT 8.1. The company's is still pushing out patches for Windows RT, but that is about it. One of the points of criticism in regards to Windows RT was that users could only use the apps that shipped with the operating system, Internet services and apps, and what was available in Windows Store at the time. This is similar to how Windows 10 Cloud operates, but with two notable differences. The Windows Store has matured a lot, and UWP applications deliver a better user experience on average. This includes options to run legacy Windows programs that were converted to run as Windows 10 apps. (hacks may circumvent that restriction) Windows 10 Cloud comes with an option to upgrade the operating system to a Windows 10 Home or Pro license. Closing Words Microsoft wants to establish a Chromebook competitor, especially in the US, a market where Google has been conquering the Education sector with its low-cost Chrome OS powered devices. It remains to be seen how well this is going to work out for Microsoft. While Windows 10 Cloud looks to be better in all aspects than Windows RT, price, battery life and functionality will determine whether the operating system will have a chance to break Google's domination in the niche. Article source
  15. NEW DELHI: A burger can cost you a lot. Personal data of more than 2.2 million users has leaked from McDonald's India app, McDelivery, cyber security firm Fallible said. The leaked data includes name, phone number, email addresses, home addresses, accurate home-coordinates and social profile links. Cyber security experts said hackers could use the information to access financial details of users, including credit/debit card information and e-wallet details. The compromised app and website of the US burger chain is operated by Westlife Development, which runs McDonald's operations in the south and west India. The official spokesperson of McDonald's India (west & south) said, "We would like to inform our users that our website and app does not store any sensitive financial data of users like credit card details, wallets passwords or bank account information. The website and app has always been safe to use, and we update security measure on regular basis. As a precautionary measure, we would also urge our users to update the McDelivery app on their devices. At McDonald's India, we are committed to our users' data privacy and protection." Amit Singh, co-founder of Yitsol, which provides cloud migration services, said, "Security is the last priority of many firms in India. I know of incidents in Hyderabad, where hackers stole user information from startups and demanded ransom in Bitcoins." With the country going digital and app usage on the rise companies could not afford to relax when it comes to cyber security, he said. Fallible said it contacted McDelivery about the data leak on February 7 and received an acknowledgement from a senior IT manager at the firm. "The McDonald's fix is incomplete and the endpoint is still leaking data," Fallible wrote on its blog on Saturday. Article source
  16. A faulty backup has inadvertently exposed the entire working database of notorious spam operator River City Media (RCM). In all, the database contains more than 1.37 billion email addresses, and for some records there are additional details such as names, real-world addresses, and IP addresses. It's a situation that's described as "a tangible threat to online privacy and security." Details about the leak come courtesy of Chris Vickery from macOS security firm MacKeeper who -- with a team of helpers -- has been investigating since January. River City Media's database ended up online thanks to incorrectly-configured Rsync backups. In the words of Vickery: "Chances are you, or at least someone you know, is affected." The leaked, and unprotected, database is what's behind the sending of over a billion spam emails every day -- helped, as Vickery points out, by "a lot of automation, years of research, and fair bit of illegal hacking techniques." But it's more than a database that has leaked -- it's River City Media's entire operation. Business plans, HipChat logs, accounts and much more. As with any big leak, there is the question of whether it is genuine. Vickery has shared his finding with numerous security sites as well as law enforcement agencies, and says: That was my initial reaction. I'm still struggling with the best software solution to handle such a voluminous collection, but I have looked up several people that I know and the entries are accurate. The only saving grace is that some are outdated by a few years and the subject no longer lives at the same location. In conjunction with security experts Salted Hash and spam experts Spamhaus, Vickery found that RCM had used illegal IP hijacking techniques during some of its spam campaigns. He says that since making this discovery, he has contacted the companies affected by the leak: Once we concluded that this was indeed related to a criminal operation, it was decided that we should approach law enforcement and the affected companies (like Microsoft and Yahoo) before making any attempts at contacting the spammers directly. The leaking servers went dark during the process of notifying law enforcement and the major companies. So, I did not directly contact the spammers themselves. It remains to be seen quite what impact this will have on River City Media's operations, and whether there will be an immediate reduction in the amount of spam flying to inboxes around the world. You can read more about Vickery's finding over on MacKeeper. Article source
  17. Chinese tech giant Tencent is facing massive backlash after footage of a lewd party game at one of its annual events was leaked online showing female employees simulating oral sex on stage. The event in question was reportedly an end of year celebration organized by the company’s instant messaging/microblogging service called Weibo. The footage shows two female employees on their knees attempting to remove a plastic cap from a bottle wedged between the thighs of two male coworkers. The video has been heavily criticized online, with many highlighting ongoing gender discrimination in corporate China. The company, which has subsidiaries in social media, gaming, online media, and entertainment, has recently launched a competitor to Apple’s AppStore called WeChat, but the negative PR from this incident will likely overshadow the online launch in the media. Article source
  18. A leaked copy of Expendables 3 was made available to 'pirate' release groups mid-July, TF has learned. Concerned at the nature of the leak, a release was shied away from, but a small public torrent uploaded by a fairly low profile Pirate Bay user changed all that. Last week saw the leak online of the brand new Expendables movie. Earmarked for an August 15 U.S. release, Expendables 3 leaked in near DVD quality a full two weeks ahead. The timing and quality combined to make the leak one of the most prominent in recent years. While the original sources of these leaks are nearly always shrouded in mystery, once made publicly available on sites like The Pirate Bay they are anyone’s for download. Originally it was believed that Pirate Bay releaser Drarbg uploaded the first public torrent, but that was not the case. Flying under the radar a hugely less popular torrent (still only with a handful of seeds) actually preceded it by almost 20 minutes. It’s certainly feasible that another release preceded even this one, but with torrents on sites other than Pirate Bay regularly deleted due to copyright complaints, it’s now too late for any certainty. It’s also impossible to say how many people were in the chain after the leak and before the first public torrent upload, but numerous public sources (including RARBG themselves) are now pointing to postings on 4chan as indicating the start of events. The thread is right here and obviously everything happened in public. The postings don’t specifically mention the title of the movie but a source close to the situation assures TF that the chat does indeed refer to The Expendables 3. Less than two hours after his initial posting on July 15, ‘Anonymous’ was back on 4chan with an update. “I am in contact with a release group that works with private trackers. They asked me for proof of what I had and I took pictures with a written timestamp of the disc in and out of the box,” he wrote. “I dumped them into some special submission link they had and they will get back to me. I’m just waiting in a secured IRC room for them to get back to me once the staff takes a look.” Precisely what happened after then is a mystery (as is the leaker’s apparent disregard for security by posting in public) but a source informs TF that whoever obtained the copy knew they had something hot – perhaps too hot. “We know that the leak was back then, around July 15, but everyone was scared to leak it. Most private groups had it for more than 10 days, but again they were scared to leak it,” TF was told. After the leaked copy was allegedly handed over July 15, the comments of ‘Anonymous’ as he returned to 4chan predicted the events of last Thursday. “Keep an eye out for the leak. No telling how long this will take, but I’m sure it will make its way to public trackers due to the demand for it,” he wrote. Interestingly, although initial demand for The Expendables 3 was brisk, downloads now sit at an estimated 500,000, and it’s currently less popular on file-sharing networks than “Divergent” which was released on the same day. Source: TorrentFreak
  19. Hackers from Cyber Berkut group are claiming to hack and leak personal emails belonging to Colonel V.M. Pushenko. of the Ukrainian Ministry of Defense. In an email one of the representative from Cyber Berkut claimed that the leaked emails contain confidential conversation between officials about ongoing conflict between Ukraine and Russia. The content of email conversation is available below: The claimed leaked emails are available here in Russian language. This is not the first time when hackers have a high profile leak. In February 13, 2014 Anonymous hackers claimed to hack and leak secret email conversations of Vitali Klitschko’s UDAR party. NOTE: We at HACKREAD are not responsible for the leaked data nor can we confirm if these emails are authentic or not. Source
  20. The Expendables 3, featuring every action hero known to man, was set for an August 15 debut but has appeared online in near DVD quality. In just 12 hours, more than 100,000 copies have been downloaded. It's worth bearing in mind, however, that production company Nu Image sued those who downloaded the original movie. You’d have to be enjoying a Mars residency not to know that all big (and most small) movies get leaked online. If it’s available in a cinema, someone, somewhere will have a copy in a matter of days and it’s just a question of when, not if, it appears on the Internet. As such, these events aren’t particularly big news but every now and again one comes along to make people sit up and listen. Several hours ago, July 24, 2014, marked one such notable leaking event. Featuring every action hero known to man, from Sylvester Stallone, Arnold Schwarzenegger, Wesley Snipes, Jason Statham and Jet Li, to UFC stars Randy Couture and Ronda Rousey, Expendables 3 was always going to be a hit. However, the plan was to have it become a hit on the big screen before breaking into the home market. That is not going to happen. Around twelve hours ago, a near perfect copy of The Expendables 3 appeared online and it’s already a smash hit with home audiences. Screenshot from the leak Figures gathered by TorrentFreak reveal that more than 100,000 200,000 (update) people have downloaded the presumed ‘DVD screener’ copy using BitTorrent alone, and at one point in excess of 65,000 users were engaged in transfers on a single torrent. These stats push the leak well ahead of the initial pre-release popularity of the infamous X-Men Origins: Wolverine leak back in 2009 and once the news begins to spread today, things are only going to get worse. Needless to say, the folks at distributor Lionsgate are going to be absolutely furious. While ‘cams’ are an annoyance, most movie-goers won’t want to destroy the movie experience by watching them. High-quality copies like this one are a different matter altogether and the soaring download numbers are a testament to that. No blurry cams here, high-quality all the way So who is behind the leak? At this stage it’s impossible to point the finger at the person who obtained the DVD copy. However, we can take a look at who brought the copy to the wider public Internet. When leaks come from a so-called ‘Scene’ source it’s possible to track the copy at least as far back as the group that placed it online but with so-called P2P releases, as is the case with Expendables 3, that’s not quite so easy. However, the initial and most popular copy appears to be attributable to an entity known as Drarbg. Drarbg has accounts on several major torrent sites, including The Pirate Bay, and is one of the most prolific BitTorrent releasers online today. Many presume that this is a single person, but Drarbg has previously indicated that it’s a group of individuals working together as a team. Drarbg, as the name suggests, has affiliations with RARBG, a popular public torrent site. It seems likely that this high-profile, high-quality leak will become a talking point in the hours, weeks and months to come and will probably be seized upon as a prime example of why piracy crackdowns are needed. However, there is also another angle to be aware of. Nu Image, the production company behind all three Expendables titles, sued previous downloaders of its titles. Will history repeat itself? Time will tell…. Update: Downloads climbing well over 200K copies now… Source: TorrentFreak
  21. Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding $5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec. Symantec and RSA published details on their blogs on Tuesday about iBanking, which is being used by two Eastern European cybercrime groups to intercept one-time SMS passcodes used for logging into bank accounts. IBanking is notable for its wide range of features and defensive measures that thwart analysis by security researchers. It can steal just about any information on an Android device, record calls or forward calls to another phone, Symantec wrote. The malware often appears in Android app marketplaces as a legitimate banking application. It appears victims who are targeted already have a separate type of malware installed on a desktop system, which prompts them to enter their phone number after navigating to their bank's website. Then, an SMS code with a link to iBanking is sent to their phone. It alternatively displays a QR code thatA also leads victims to the malware, Symantec wrote. Two gangs, which Symantec called the Neverquest crew and Zerafik, have used iBanking, with Zerafik targeting customers of the financial institution ING, Symantec wrote. In that case, iBanking was modified to appear to look like an official application from ING. RSA found that iBanking's code is scrambled in a way to make it harder for malware experts to study, using techniques that have been seen on desktop-based malicious software but not widely on mobile malware. IBanking sells for around $5,000 or for a cut of the proceeds from theft it facilitates, Symantec wrote. IBanking's source code was leaked in February after a hacker nicknamed "ReVOLVeR" found it while avenging a friend's loss of 65,000 bitcoins that were pilfered by the malware, Symantec wrote. In the course of that quest, ReVOLVeR, believed to be Russian, also came across FTP login credentials for a server belonging to the broadcaster BBC, which he tried to sell. IBanking's price should have dropped after its source code was released. But iBanking's developer, who is someone going by the nickname "GFF," has continued to develop it and provide support, which has sustained its marketability. "Despite the availability of a free version, our research suggests that most of the large cybercrime actors are continuing to opt for the paid-for version," Symantec wrote. "They appear to be willing to pay a premium for the updates and support provided by GFF." RSA wrote that its analysis of iBanking showed that it will shut itself down if it detects it is running in a virtual machine. Virtual machines are often used by malware analysts to study the behavior of an application. Trying to halt analysts and security professionals "has been a standard among PC malware developers for quite a while but is far from standard practice in the mobile malware field," RSA wrote. "The iBanking malware shows that mobile malware developers are becoming aware of the necessity to protect their bots against analysis and indicates a possible new trend in this new and evolving mobile malware space," the company wrote. Source
  22. All's fair in love and war, including online trolling. Self-styled Ukrainian hackers are bragging they dumped millions of stolen credit card numbers online – but the claims may simply be a political smear job amid tensions between Russia and the West. A group calling itself "Anonymous Ukraine" boasted this week that it is in possession of 800 million credit and debit card details. In a bid to substantiate the claim, the crew said it had uploaded about 7 million of the cards to file-sharing sites and linked to archives of the data from two Pastebin posts. These archives, 300MB in size, contained a mix of account details and magnetic-strip information for MasterCard, Visa, Discover and American Express cards, it was claimed. There's been some speculation that the data was sourced in part from hacked sales tills in Target stores across the US – some senior politicians blame hackers from Ukraine for infiltrating the retail chain's computers to swipe 40 million or so cards.Curiously, a large number of the leaked cards appear to have expired. "There is one interesting set of files called 'Dumps + Pins' which contains around 35,000 records which look to be a lot more recent, with expiry dates in the future," noted Brook Zimmatore, chief exec at Massive PR, a firm that specializes in protecting the reputation of banks and other corporations. Massive has been working with colleagues at IT security company Digital Shadows to assess the authenticity and source of the archives. Their preliminary findings suggest that the card dump has nothing to do with the hacktivists who formed the official, if we can use that word, Anonymous Ukraine clan. Anonymous Ukraine has a few social network accounts to promote itself: @UkraineAnon on Twitter, Anon.Ukraine on Facebook, and Ukrhack on vk.com. These have been active for some time, and have drawn attention to the upheavals in Crimea, and the ongoing confrontations between Russia and Ukraine. But none of these accounts have mentioned the credit-card leak, which was instead promoted using @Op_Ukraine. This Twitter profile has only posted messages about this card dump, and has only been active for three days. "We think it is someone trying to make it look like Anonymous Ukraine," Zimmatore told El Reg. "[The leak] was not announced from their official social media accounts, and they are usually proud to announce such 'accomplishments'. We have seen it being discussed almost exclusively on Russian forums." Before the DataLossDB news website published an article about the credit-card dump claims, word of the alleged mega-leak was confined to a Russian-language site and a Russian forum. All this points to mischief-makers who are more likely to be aligned to Moscow than Kiev. However, the source and veracity of the data dump, much less who was behind the uploading of it, remains unclear. "Nothing there that provides evidence of who it is, however I would suggest that it is not Anonymous Ukraine – or at least not someone who is part of an identifiable section of it," Zimmatore concluded. Source
  23. How to upgrade the system by installing MSU files autonomous update to version RTM Escrow 9600.17025.WINBLUE_GDR.140214-1706 will be painted separately us! remind everyone that it is still not the final RTM build! article is not completed, to be continued! both msu and images this time new names for images as well as keys possible msu leak depends on tests upd1 3 msu need to be installed upd2 msu can be added to server r2 2012 image upd3 looks like 4 msu need to be installed in case of 8.1 rtm Installation order for 8.1 RTM 1. KB2919442 restart2. KB2919442-1 restart3. KB2919355 restart4. KB2932046 restart5. 17025 :) https://cloclo1.datacloudmail.ru/weblink/get/a7f79217a3c5/MICROSOFT.WINDOWS.8.1.2014.UPDATE.X86.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT.zipORhttps://mega.co.nz/#!IsxgiJgZ!aIRKCW4RE8bm7OM3oF15fUkNzJ5nB_KZ3vvzM5ELQz8rar password: timster =================================================================================== MICROSOFT.WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT RELEASE DATE: 16/02/2014 BUILD: 6.3.9600.17025.WINBLUE_GDR.140214-1706 BUILD: 2014/02/05 FILE: Windows8.1-KB2919442-x64.msu SIZE: 10,708,582 byte SHA1: 0ed435964e1f99e4fdbb4a9bdf88a62c8120b420 MD5: 1d0d09f46d8bfe5537f0e91aa9164415 CRC: 7dced403 BUILD: 2014/02/11 FILE: Windows8.1-KB2919442-1-x64.msu SIZE: 10,667,904 byte SHA1: 27daa89bc820aa1c3cf2496e55605e433df0ceb1 MD5: 25c8fa7a8e93172958a37096dac7da5b CRC: 246b1466 BUILD: 9600.17019.WINBLUE_GDR.140205-2003 FILE: Windows8.1-KB2919355-x64.msu SIZE: 730,632,862 byte SHA1: 3a53663fb1999a1372c3810c52bb942b6bc97362 MD5: 0d879b22bad773d4689ff6df337df258 CRC: 9416df02 BUILD: 9600.17025.WINBLUE_GDR.140214-1706 FILE: Windows8.1-KB2932046-x64.msu SIZE: 88,684,437 byte SHA1: 83447d80559b21244c658fc9f943e7f1012858a9 MD5: cb02deeabdc172cde801e471957fdf6b CRC: 975ab494 NOTE: this is original M$ MSU files. WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.140214-1706-WZT Magnet Link: magnet:?xt=urn:btih:C0EAC578B76EA04CF9DF847EAD208D1C4C444D55Direct Download Link: https://cloclo1.datacloudmail.ru/weblink/get/820b29ef7329/MICROSOFT.WINDOWS.8.1.2014.UPDATE.X64.ONLY.MSU.9600.17025.WINBLUE_GDR.140214-1706-WZT.zipORhttps://mega.co.nz/#!IpBzGQTY!eCG4qnlkJo1P9vuSjgawMTYbll8E2azSKefgocF2o5Arar password: timster http://uploadinc.com/ivmsxekn4vsn.htmlhttp://hugefiles.net/rmxvofd0miv5http://www.jheberg.net/captcha/960017024winblue-gdr-s14sku-partner/ MICROSOFT.WINDOWS.8.1.UPDATE.2014.WITH.BING.X64.PRE-RELEASE.CORECONNECTED.ENGLISH.DVD-WZT PRE-RELEASE DATE: 15/02/2014PRE-RELEASE BUILD: 6.3.9600.17024.WINBLUE_GDR_S14SKU_PARTNER.140214-1700FILE: 9600.17024.WINBLUE_GDR_S14SKU_PARTNER.140214-1700_X64FRE_CLIENT_CORECONNECTED_EN-US-IR3_CCONA_X64FREO_EN-US_DV5.isoSIZE: 3,887,515,648 byteSHA-1: 4462ED0AAED34F39768D462CB0F4205C3CB4C118MD5: 68AC75195E2A23741FF923FAE1069DA0CRC: EB30C11BNOTE: this is original MS image.P.S: WZT does not take any responsibilities for any damage or loss of your PC associated with the installation of Windows 8.1 Update 2014 pre-release RTM! Magnet Download Link: magnet:?xt=urn:btih:DC3154BDF69ACD9649C0D518D51479CB02926E17Direct Download Links: http://uploadinc.com/bqn6a0xdqxe2.htmlhttp://hugefiles.net/7c6zz4uidp7ghttp://www.jheberg.net/captcha/960017024winblue-gdr-s14sku-partner-3/ Microsoft Windows 8.1 Update 2014 Coreconnected English DVD ISO Installation Keys *** Notice: Keys areonly for installation not for activation..! http://pastebin.com/JVpiNwsE
  24. Sun Feb 16, 2014 5:34am EST (Reuters) - Unusually high levels of radioactive particles were found at an underground nuclear waste site in New Mexico on Saturday in what a spokesman said looked like the first real alarm since the plant opened in 1999. U.S. officials were testing for radiation in air samples at the site where radioactive waste, such as plutonium used in defense research and nuclear weapon making, is dumped half a mile below ground in an ancient salt formation. "They (air monitors) have alarmed in the past as a false positive because of malfunctions, or because of fluctuations in levels of radon (a naturally occurring radioactive gas)," Department of Energy spokesman Roger Nelson said. "But I believe it's safe to say we've never seen a level like we are seeing. We just don't know if it's a real event, but it looks like one," he said. It was not yet clear what caused the air-monitoring system to indicate that radioactive particles were present at unsafe levels, Nelson said. No one was underground at the Department of Energy Waste Isolation Pilot Plant near Carlsbad, in New Mexico's south east, when the alarm went off at 11:30 p.m. MST on Friday, and none of the 139 employees working above ground at the facility was exposed to radioactive contaminants, he said. Workers were asked to shelter where they were until the end of their shifts and were allowed to leave the facility at 5 p.m. local time on Saturday, Nelson said. No air exchange with the surface was occurring after the ventilation system automatically switched to filtration, he said. Nelson said the facility may have accurate measurements as early as Sunday on the number of airborne alpha and beta particles, which can be harmful if inhaled or ingested. A team could be sent below ground before the end of the weekend and Nelson said the plant was "not in active operations. We're in a period we have normally reserved for shutting down the facility for maintenance". A different part of the site was evacuated this month after a truck used to haul salt caught fire. Several workers suffered smoke inhalation, an agency statement said. (Reporting by Laura Zuckerman; Additional reporting by Kevin Murphy; Editing by Louise Ireland and Chris Michaud) http://www.reuters.com/article/2014/02/16/us-radiation-leak-newmexico-idUSBREA1F06Y20140216
  • Create New...