A Chaotic Whodunnit Follows the DNC’s Trump Research Hack
June 16, 2016 3:30
Finding the perpetrator of a sophisticated hacker intrusion can be messy. Getting to the bottom of a vicious data breach at the center of a no-holds-barred presidential campaign is a full-on trainwreck.
On Wednesday, Gawker and the Smoking Gun published the Democratic National Committee’s opposition research files on Republican presumptive presidential nominee Donald Trump, which the DNC admitted earlier in the week had been stolen by hackers. And a hacker using the name Guccifer 2.0 posted a sample of the files to WordPress, along with a taunting note. “Guccifer may have been the first one who penetrated Hillary Clinton’s and other Democrats’ mail servers. But he certainly wasn’t the last,” the hacker wrote, referring to earlier claims by a well-known Romanian hacker known as Guccifer, who has said he penetrated Clinton’s unofficial email servers during her time as secretary of state before being arrested and extradited to the US earlier this year. “No wonder […] any other hacker could easily get access to the DNC’s servers.”
The leaked documents, more than 200 pages of Trump’s record of offensive statements, dishonest remarks, and questionable business moves, call him a “misogynist-in-chief” with “no core.” On his WordPress site, Guccifer 2.0 separately posted a sample of donor information stolen from the DNC’s servers, apparently contradicting the DNC’s earlier claims that no financial information was lost in its breach. The hacker also claimed to have given “thousands of files and mails” to WikiLeaks.
But just as lurid as the leaked data has been the fingerpointing that came after. Earlier in the week, the security firm Crowdstrike, which the DNC brought in to remediate the breach, published a blog post claiming that a pair of hacker groups based in Russia and associated with the government’s intelligence apparatus carried out the intrusion. The post pointed to the specific malware and tactics linked with the Russian groups known as Cozy Bear and Fancy Bear. Both have a history of hacking high-value international intelligence targets.
But Guccifer 2.0’s statement mocked that conclusion. The hacker said he or she was working alone, that the hack wasn’t actually “sophisticated” at all. “I’m very pleased the company appreciated my skills so highly,” he or she wrote. “But in fact, it was easy, very easy…I guess CrowdStrike customers should think twice about company’s competence.”
Security analysts following the release pointed to Guccifer 2.0’s leak as evidence that Crowdstrike had misidentified the DNC hacker or hackers and badly overestimated their skills and resources. But Crowdstrike, in a statement, stood by its initial analysis. “Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents’ authenticity and origin,” a spokesperson wrote in a statement to WIRED.
Another statement from the DNC went further: “Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that today’s release and the claims around it may be a part of a disinformation campaign by the Russians.” Some small signs do point to Russian involvement: The PDFs posted by Gawker and the Smoking Gun contain error messages on several URLs that include Cyrillic characters and translate from Russian to “error, invalid hyperlinks.”

Some telltale Cyrillic characters appeared in the files leaked by the hacker Guccifer 2.0.WIRED
Trump, not one to stay silent during a scandal, offered the wildest theory of all: that the DNC had faked the breach as an excuse to publish negative information about him. “We believe it was the DNC itself that did the ‘hacking’ as a way to distract from the many issues facing their deeply flawed candidate and failed party leader,” he wrote in a press statement, adding that the research file had been “out there for years,” and claiming that much of it was inaccurate.
That doesn’t make much sense. Guccifer’s data appears to include sensitive financial documents as well as the Trump-focused research files. But that doesn’t clear up whether the hackers were state-sponsored intelligence agents or a single amateur—or both, a real possibility given that Crowdstrike has said the DNC servers had been repeatedly penetrated for close to a year. If those intruders were aiming to inject more chaos into the most chaotic political campaign in recent memory, they’ve already succeeded.
Source link
Aprendendo Android com Xamarin e Visual Studio 2012. Para Iniciantes- Volume 1
June 16, 2016 3:28
Compre agora!
R$ 78,53
O leitor vai se deparar com uma introdução simples, as principais técnicas de desenvolvimento de aplicativos para a plataforma Android, usando a ferramenta Xamarin juntamente com o Visual Studio 2012.
Conheça as 25 companhias mais desejadas pela Geração Y
June 16, 2016 2:07
Onde a Geração Y quer trabalhar? A resposta, segundo um levantamento junto a 13 mil jovens norte-americanos, é 3M. No ano passado, o desejo dos Millennials era conseguir um emprego no Google, que caiu para a segunda posição no ranking esse ano.
A pesquisa anual Millennial Career Survey identifica abordagens que ajudam companhias na atração de talentos. O relatório tenta mapeia as ambições da juventude, suas preferências em termos de carreira e objetivos profissionais.
“O estudo ajuda organizações e empregadores a compreenderem os interesses que influenciam as novas gerações”, detalha Susan Thurman, diretora da NSHSS, organização responsável pela pesquisa. Na sua visão, o relatório oferece ao mercado dados relevantes para que organizações desenvolvam estratégias para engajar e reter talentos.
O universo de respondentes é composto por pessoas entre 15 e 32 anos, estudantes do ensino médio e universidade, além de profissionais nos primeiros anos de carreira e residentes nos Estados Unidos. A lista apresenta 200 companhias. As 25 melhor posicionadas esse ano foram:
1. 3M
2. Google
3. St. Jude Children’s Research Hospital
4. Walt Disney Company
5. Hospitais locais (resposta espontânea)
6. FBI
7. BuzzFeed
8. Apple
9. Central Intelligence Agency (CIA)
10. Amazon
11. Children’s Healthcare of Atlanta
12. Health Care Services Corporation
13. Mayo Clinic
14. Microsoft
15. Nike
16. U.S. State Department
17. Universal Studios
18. Netflix
19. DreamWorks Animation
20. The New York Times
21. Boeing
22. National Security Agency (NSA)
23. Abercrombie & Fitch
24. Blue Cross Blue Shield
25. Samsung
Outras empresas que aparecem no ranking são Intel (37ª posição), Adobe (38), Facebook (39), Dell (47), IBM (57), HP (74) e Cisco (75).
O que eles valorizam?
Os respondentes consideram horário flexível como o principal atrativo na hora de escolher um emprego. A opção foi selecionada por 70% dos jovens, seguida por benefícios (60%), salário base (46%) e bônus por performance (19%).
No quesito relacionamento, os Millennials valorizam companhias que estabelecem um relacionamento honesto com seus empregados, item citado por 73% dos entrevistados, seguido por responsabilidade social (47%), imagem de marca favorável (40%) e adicionar prestígio à carreira (31%).
Sobre qualidades específicas para um emprego, a grande maioria (90%) procura melhorar suas habilidades para avançar na carreira. Outro atributo valorizado é experiência internacional (citada por 48%), oportunidades por trabalhar em equipe (41%) e possibilidade de viajar pelos Estados Unidos (11%).
Quase metade (42%) dos jovens norte-americanos reconhece que políticas de diversidade e inclusão ajudam as organizações a gerarem novas ideias ou soluções criativas e 35% afirma que esses programas demonstram respeito individual. Outros benefícios da diversidade incluem processo de aprendizado contínuo e o estímulo a uma postura social mais responsável entre os trabalhadores. Apenas 2% dos entrevistados acredita que não há benefícios nessas posturas.
Fonte
New Mario Party Game Coming to 3DS This Year
June 15, 2016 23:29
Nintendo revealed a new Mario Party game on its Treehouse E3 livestream. Mario Party: Star Rush has a mode where up to four players control Toads, as they make their way across the board and recruit teammates like Mario, Yoshi, and Rosalina.
The new mode, called Toad Scramble, also lets players roll the die and move simultaneously. You team up with Mario characters to help you win events and take on the boss. Each world has a main baddie, and you’ll be able to compete or cooperate with other players in multiplayer to defeat them.
The last game in the series, Mario Party 10, received a score of 6 in GameSpot’s review, which said, “even with some fun minigames in tow and a good group of friends to enjoy it with, Mario Party 10 just doesn’t have the depth or the challenge to hold your attention for long.”
Mario Party: Star Rush releases for 3DS on November 4.
You can see more of Nintendo’s announcements, including a new Legend of Zelda game, through the links below.
Head on over to GameSpot’s E3 hub for all the news and impressions from the event.
Source link
SugarCRM investe em IA e mostra Candace, a assistente digital inteligente
June 15, 2016 22:04
A SugarCRM está colocando Inteligência Artificial, aprendizado de máquina e data analytics no futuro sua sua plataforma de CRM, e mostrou um pedaço do que está por vir nesta quarta-feira, 15/06, na abertura do segundo dia da SugarCon 2016, em São Francisco, Califórnia.
Os recursos da nova plataforma, batizada de Sugar Intelligence Service™, foram demonstrados ao vivo pelo head de produtos (Chief Product Officer) da SugarCRM, Rich Green, usando protótipos do laboratório. O Sugar Intelligence Service™ vem sendo desenvolvido pela SugarCRM com uso de tecnologias das empresas Stitch e Contastic, duas companhias compradas recentemente pela Sugar.
O objetivo da linha Sugar Intelligence Service™ segundo Green, é tirar dos usuários a tarefa de inserir, adicionar, modificar e atualizar dados sobre clientes e agregar inteligência ao CRM. “Queremos que as pessoas se concentrem no que são boas: relacionar-se com outras pessoas”, diz Green.
Grenn mostrou como a empresa combinou Inteligência Artificial com tecnologia de agentes inteligentes para criar Candace, uma assistente digital que interage com o usuário do CRM e faz recomendações baseadas na análise de dados e informações disponíveis na plataforma.
Assistente inteligente
Candace é semelhante a assistentes digitais como a Siri, da Apple, a Cortana, da Microsoft, ou a Alexa, da Amazon. Ela vai interagir com os usuários da plataforma de CRM ajudando-os a planejar suas ações e estratégias de vendas, relacionamento com o consumidor e acompanhamento de clientes.
A assistente digital Candace no entanto é o pedaço da ponta final da equação de CRM inteligente da Sugar, que é composta, segundo Green, de três partes.
A primeira parte é um sistema de busca de dados que vai coletar informações em fontes externas da empresa, integrá-las e adicioná-las ao CRM da companhia automaticamente. “O usuário vai ter de prover apenas um nome e um email, por exemplo, e o sistema vai buscar na internet e em outras fontes os dados públicos disponíveis sobre essa pessoa”, diz Green.
Analytics e aprendizado de máquina
A segunda parte da equação nasce com a agregação de análise preditiva e recursos de aprendizado de máquina que vão analisar o grande volume de informação coletado pelo sistema e integrado no CRM fornecendo ao usuário insights e recomendações sobre a melhor forma de fazer uma venda, atender um cliente ou ampliar o relacionamento da marca com seus consumidores.
“Na medida em que as informações coletadas nos permitem entender melhor cada cliente, o sistema poderá dizer ao vendedor coisas como a melhor hora para fazer uma ligação para vender um produto ou coletar um input”, explica Green.
Na ponta final, a agente digital Candace será a interface de relacionamento do usuário com a plataforma de CRM inteligente, dando voz ao complexo sistema de aprendizado de máquina e analytics de Big Data que está sendo montado pela SugarCRM no seu roadmap de futuro. Os preços e datas de lançamento dos produtos ainda não foram revelados.
* A jornalista Silvia Bassi participa da SugarCon 2016 a convite da SugarCRM.
* Colaborou Katherine Noyes, do IDG News Service
Fonte
Desenvolvedor : 01 Delphi, 01 C# ASP Net e um Gerente.
June 15, 2016 19:29
Desenvolvedor : 01 Delphi, 01 C# ASP Net e um Gerente.
Descrição da Vaga
a- 01 vagas para Desenvolver DELPHI
CLT + UNIMED.
b – 01 vagas para Desenvolver C# ASP Net, MVC, TFS.
CLT,UNIMED e V.Studio 2013/2015
c – 01 Vaga para desenvolvedor e Líder de equipe.
Relacionado
Como aplicar
Enviar CV c/ pretensão salarial para rh@inforplus.com.br.
Relacionado
Job Categories: Destaque.
Job Types: Emprego.
Job Salaries: 00 – R$ 4.000.
Vaga expira em 5 days
Você deve fazer login ou criar uma conta, a fim de enviar uma vaga
Fonte
God of War 4: filho de Kratos é peça importante do game
June 15, 2016 19:27
Por enquanto temos que nos contentar em receber as informações como migalhas
Conforme o tempo passa e mais informações são reveladas sobre o novo God of War, mais o hype aumenta. Caso você não tenha visto – coisa que eu acho impossível a esse ponto – o vídeo do game, confira-o abaixo antes de continuar sua leitura:
Então, á respeito do filho de Kratos apresentado no trailer/gameplay, o mesmo será responsável por diversas interações ao longo do jogo, ajudando Kratos tanto em combate quanto fora deles (resolvendo puzzles por exemplo). De acordo com o diretor do game Cory Barlog, o filho de Kratos é o único que entende o idioma da região (Nórdico antigo) e ele será útil em diversas ocasiões, e inclusive existirão interações entre ambos fora de combate, aos quais o próprio jogador poderá ativar.
Barlog comentou também que a própria equipe ainda não está pronta para revelar o nome do filho de Kratos, mas que vão explorar a sua trajetória até o ponto em que foi mostrado o gameplay.
O novo God of War segue sem data de lançamento, mas continue ligado aqui no Combo Infinito para maiores detalhes nos próximos dias.
Veja também!
Novo God of War é revelado para Playstation 4. Veja gameplay!
Novo God Of War se passa anos depois do terceiro jogo e com Kratos
Kratos deverá controlar sua raiva em busca de redenção no novo God of War
Source link
An IT Worker at the Panama Papers Law Firm Has Been Arrested
June 15, 2016 19:25
When Edward Snowden went public as the NSA whistleblower in 2013, few were surprised that a system administrator was behind the spy agency’s leak. Inside administrators who hold the keys to an organization’s data kingdom are a much greater threat to security than outside hackers.
Now it appears another technical insider may be connected to a leak at Mossack Fonseca, the law firm at the heart of the massive Panama Papers scandal. A computer technician employed by Mossack Fonseca’s Geneva office was arrested this week on suspicion of removing “large amounts of data” from the law firm’s network, according to Swiss newspaper Le Temps. Le Temps reported that the worker was arrested after the law firm filed a complaint accusing him of unauthorized access and breach of trust, and of stealing a large amount of confidential data. Investigators also seized computers in the law firm’s Swiss office.
The paper did not name the suspect and was unable to confirm if the data theft involved the millions of records that have come to be known as the Panama Papers leak, considered to be the biggest leak in whistleblower history, or a different data theft.
Bastian Obermayer, one of the primary reporters behind publication of the Panama Papers stories, tweeted today that the person arrested is not the “John Doe” who leaked him the Panama Papers. “According to our information,” he wrote, “the #mossackfonseca IT person arrested in Geneva is not #panamapapers” source ‘John Doe’.”
According to our information the #mossackfonseca IT person arrested in Geneva is not #panamapapers” source “John Doe” @ICIJorg @f_obermaier
— Bastian Obermayer (@b_obermayer) June 15, 2016
That’s not to say, however, that the suspect arrested this week is not connected in some way with the leak. He may have assisted the “John Doe” who passed the documents to Obermayer. Or he may be responsible for a different earlier leak at the law firm, that preceded the massive Panama Papers leak.
The Backstory
On April 3, the International Consortium of Investigative Journalists and more than a hundred media partners around the world revealed that a whistleblower had gifted them with more than 11 million documents, including emails, databases and PDFs, exposing the offshore accounts of the Panamanian law firm’s customers. The accounts were designed to hide money belonging to celebrities, world leaders and corporate officials around the world.
ICIJ Director Gerard Ryle told WIRED that in late 2014 an unknown source contacted Obermayer, a reporter for the German newspaper Suddeutsche Zeitung, after the paper had published stories related to a different, smaller leak of Mossack Fonseca documents. Those documents had been given to German government regulators. The source contacted the paper via encrypted chat, offering “more [data] than you have ever seen” from the Panamanian law firm that would “make these crimes public.” The source indicated that his or her life was in danger and refused to meet in person with Obermayer.
Their communication methods over the following months indicated that the source was well-versed in operational security and took careful steps to protect his or her identity. Each time the source communicated with Obermayer, they deleted their correspondence. They also conducted an authentication check each time they resumed their communication.
“I’d say ‘is it sunny?’ You’d say ‘the moon is raining’ or whatever nonsense, and then both of us can verify it’s still the other person on the device,” Obermayer told WIRED.
The source leaked the documents piecemeal over time until the paper had amassed more than 11 million records stolen from Mossack Fonseca. Obermayer wouldn’t tell WIRED how the source transmitted what must have been hundreds of gigabytes of data at a time.
John Doe’s Motives
Obermayer’s “John Doe” revealed the motive for his leak in a lengthy statement published last month, stating that the secret offshore accounts weren’t just being used to evade taxes but to commit other more serious crimes.
“I decided to expose Mossack Fonseca because I thought its founders, employees and clients should have to answer for their roles in these crimes, only some of which have come to light thus far. It will take years, possibly decades, for the full extent of the firm’s sordid acts to become known,” he wrote.
He went on to implicate Mossack Fonseca’s IT staff in the firm’s crimes. “At the very least we already know that Mossack personally perjured himself before a federal court in Nevada, and we also know that his information technology staff attempted to cover up the underlying lies. They should all be prosecuted accordingly with no special treatment,” he wrote.
Now at least one IT staff members is under criminal investigation, though not for the alleged crimes referenced by John Doe.
Mossack Fonseca said in April that it suspected an insider was responsible for the Panama Papers leak but didn’t elaborate. But the company also reportedly had very bad digital security, which included systems riddled with vulnerabilities that would have made it susceptible to being hacked by outsiders.
Thierry Ulmann, a lawyer for Mossack Fonseca, didn’t respond to a request for comment from WIRED about the arrest this week, but he told Le Temps it remains to be seen yet if the suspect is John Doe. “All hypotheses are open,” he said. He said stolen data was taken out through the suspect’s computer in Geneva and that the worker had “full access privileges.”
An attorney for the arrested IT worker told Le Temps that their client is innocent. WIRED reached out to the attorney and the arresting Swiss authorities but has not heard back.
Source link
Equinix oferece backup off-site com armazenamento em nuvem no Brasil
June 15, 2016 18:04
A Equinix expandiu seu portfólio de serviços no Brasil com a oferta de backup off-site em cloud. A solução permite o espelhamento de informações para continuidade dos negócios e reforça estratégias de Disaster Recovery.
Nelson Mendonça, diretor de operações da companhia, observa que as empresa já enviam cópias de dados críticos para fora de seus data centers principais como medida de proteção. Porém, tradicionalmente, isso é feito por meio de fitas magnéticas.
“Nossa solução em cloud elimina a complexidade logística de transporte de mídias físicas e aumenta a resiliência e segurança dos dados, com menor probabilidade de falha”, acrescenta o executivo.
De acordo com a Equinix, a solução utiliza armazenamento em nuvem com conectividade privada, de alta largura de banda e baixa latência, o que impacta positivamente na performance do backup e recuperação de dados.
A fornecedora garante, ainda, que o custo é mais baixo em relação à conexão com a internet, que pode virar um gargalo para movimentar grandes massas de informações.
A funcionalidade de backup off-site é contratada por volume de dados e tempo de retenção e considera gerenciamento fim a fim e opções de infraestrutura dedicada ou multi-tenant.
Fonte