10 tech things we didn't know a week ago

10 tech things we didn't know a week ago

Summary: Behind on the news and hungry for more? Here's what we learned this week — including the 'easter eggs' in early Microsoft code, and how the U.S. will treat Bitcoin.

SHARE:
TOPICS: Tech Industry
4

 |  Image 9 of 10

  • Thumbnail 1
  • Thumbnail 2
  • Thumbnail 3
  • Thumbnail 4
  • Thumbnail 5
  • Thumbnail 6
  • Thumbnail 7
  • Thumbnail 8
  • Thumbnail 9
  • Thumbnail 10
  • 8. Government data requests to Google have more than doubled in 4 years

    Google's latest transparency report shows that requests by governments have gone up by 120 percent since 2009. The search, cloud, and mobile giant has been pushing back against the U.S. Justice Dept. for months in efforts to try to release more information about the data requests made by the U.S. in the wake of the National Security Agency surveillance leaks.

    Image: ZDNet/Google

  • 9. Stolen Twitter accounts can be 'more valuable' than credit cards

    A Twitter account can be more valuable to a hacker than someone's credit card, latest research shows. Credit card data once stood at $20-$135 per account, but that dropped to about 75 cents per record. Nowadays, social media accounts can be more valuable, ranging in at as much as $325 per account, depending on the reach of the profile.

    Image: Juniper Networks

  • 10. Tech companies can be sued for having 'illegible' privacy policies

    And last but not least, soon may see the end of those lengthy, complicated, and "illegible" privacy policies, after a French consumer group filed a lawsuit against Google, Facebook, and Twitter, arguing these texts are too complex for most to understand. The group wants a French judge to remove or modify "the vast number of contentious clauses these companies impose." 

    Image: Facebook via CNET

Topic: Tech Industry

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

Talkback

4 comments
Log in or register to join the discussion
  • 95% of ATMs run WindowsXP embedded, which is supported until 2016

    and accessing the USB port requires physically breaking into the ATM and then requires the ATM to have a number of other security flaws to work.

    I like this article series, but leaving out important details (or just getting them wrong) really devalues the service you are trying to provide.
    Emacho
  • Image #7 is in Assembler language

    MS DOS was written in Assembler?
    And Zack just learned that not all variable names are fit to print?

    I guess numbers #7-9 are here just to bring the total number to the respectable 10 :-(
    ForeverSPb
  • ATMs run on Windows XP

    NOT

    If they run on XP, they run on the Pro version, not anything else, and definitely NOT the embedded version. STOP spreading FUD!!!

    And the machines don't have any USB ports.
    bart001fr
  • Let me just plug this USB device into the ATM, and... bingo!

    Seriously, you're still repeating that rubbish about ATMs? Pretty much any IT environment can be broken into if you have physical access to the right input ports. Strangely, I don't remember ever seeing an ATM with clearly accessible USB ports.

    In other words, you need the kind of access to the ATM that would already permit you to steal all the money. And then get busted because the banks know exactly who has that access. If you have decided to steal from an ATM, you would be better off grabbing the whole machine. Or standing in line and pointing a gun at the guy who just withdrew $500.

    This is yet another scare from a company that thinks it can drum up business by scaring bank customers (no point scaring the bank, they already know how moronic the idea is).

    Banks do not make their ATMs accessible to the Internet. You can't just browse to one and hack in. There is absolutely no compelling argument for upgrading ATMS from a stable Windows XP installation - regardless of it not receiving patches that it doesn't need to address security issues to which it is not exposed.
    Postulator