Apple ordered to pay up to €13bn after EU rules Ireland broke state aid laws

By | all, Mac Book

Apple has been ordered to pay a record figure of up to €13bn (£11bn) in back taxes to Ireland by the European commission. This video explains the ‘sweetheart deal’ that the commission has ruled amounts to illegal state aid

Apple ordered to pay up to €13bn after EU rules Ireland broke state aid laws

Tim Cook, Apple’s chief executive, said the commission was rewriting Apple’s record in Ireland, overriding Irish law and disrupting the international tax system. He said Apple chose the Irish city of Cork as its European base 30 years ago and had expanded from 60 workers to almost 6,000 in Ireland.

He said Apple would appeal and that he was confident of winning.

Cook said: “We never asked for, nor did we receive, any special deals. We now find ourselves in the unusual position of being ordered to retroactively pay additional taxes to a government that says we don’t owe them any more than we’ve already paid.”

The commission’s decision is a rebuff to US efforts to persuade it to drop the case after warnings of retaliation from Washington.

Apple, which changed its tax arrangements with Ireland in 2015, should easily be able to pay the huge tax bill because it has a cash mountain of more than $230bn (£176bn) of cash

Adobe Flash Advisory 

By | Mac Book

We are trying something new today. Riseup is sending this general security bulletin to all users in the hopes that it will keep all you amazing people safer. Although your Riseup service is not affected by these vulnerabilities, we feel it is important for you to take action in order to protect your devices and your data on other websites.

Contents:

* Adobe Flash Advisory
* Wi-Fi Advisory

Adobe Flash Advisory
====================================================

The problem
—————————————————-

Adobe Flash is a plugin for most web browsers that allows the browser to display interactive content such as games and videos. In a new vulnerability announced on Monday, Adobe Flash can be tricked by a website you visit or a document you open to allow a remote attacker to take control of your computer.

Who does this affect?
—————————————————-

The problem exists in all web browsers that have Adobe Flash, on all operating systems. It also affects Microsoft Office.

By combining this vulnerability with others, an attacker can take total control over your computer, read all your data, capture all your login accounts, spy on you through the webcam, and so on.

What can I do to protect myself?
—————————————————-

Disable Adobe Flash immediately. It is a constant source of security holes, and is being discontinued by Adobe.

Until recently, sites like YouTube relied heavily on Adobe Flash. Today, however, you don’t need Adobe Flash in order to use most sites with dynamic content or video. Because of this, you should disable or uninstall Flash entirely. If you have some burning reason you need Adobe Flash, you can also upgrade Flash to the new version without the vulnerability.

Disable Flash

* Chrome: Preferences: Settings > Show advanced settings > Content settings > Flash > uncheck “Allow sites to run Flash”.

* Firefox: Tools: Add-ons > Plugins > Flash > Never Activate.

Uninstall Flash

For instructions on how to uninstall Flash for every browser, see https://www.howtogeek.com/222275/how-to-uninstall-and-disable-flash-in-every-web-browser/

Upgrade Flash

See Adobe’s security advisory for instructions on how to get a patched release of Flash https://helpx.adobe.com/security/products/flash-player/apsb17-32.html

More information
—————————————————-

An attack using this vulnerability in Adobe Flash was observed on October 10 by Kaspersky Lab. The vulnerability was being used to infect the victim’s computer with the FinFisher malware. The group behind the attack is believed to be BlackOasis, aka NEODYMIUM, which historically focuses on targeted attacks against civil society actors in Turkey. BlackOasis is classified as an “advanced persistent threat” and is believed by many researchers to be a customer of the Gamma Group, a German and UK corporation with along history of surveillance and monitoring of activists.

For further reading, see:

http://www.securityweek.com/middle-east-group-uses-flash-zero-day-deliver-spyware

https://threatpost.com/adobe-patches-flash-zero-day-exploited-by-black-oasis-apt/128467/

https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/

https://en.wikipedia.org/wiki/Gamma_Group

Wi-Fi Advisory
===================================================

There is a new class of attacks against Wi-Fi networks. Most Wifi networks these days use a technology called WPA2 to protect the network from eavesdropping. Researchers found a way to break this.

These attacks allow an adversary within Wi-Fi range to read your network traffic and potentially to also send your device nefarious traffic, depending on what device you are using.

Who does this affect?
—————————————————

Nearly all Wi-Fi devices and operating systems are vulnerable, to varying degrees. This includes nearly all laptops, mobile phones, and Wi-Fi connected devices. In particular, most Android and Linux devices are highly vulnerable.

What is the danger?
—————————————————

There are many attacks that are made possible with this vulnerability. For example:

* An attacker could read your login username and password if not transmitted using HTTPS (encrypted browser connection). Riseup requires HTTPS on all servers — but many services do not.

* An attacker could downgrade your secure HTTPS web browser connection to an insecure HTTP connection, depending on the configuration of the server (Riseup servers are protected against this).

* If you click on a link to download a file, an attacker could attach a virus to that file while it was in transit to your device (in some cases).

What can I do to protect myself?
————————————————

If you have an Android device, you should disable Wi-Fi and use your telco’s data plan whenever possible. When possible, keep Wi-Fi disabled until an update becomes available for your device.

You should update your devices as soon as possible. Unfortunately, there are not fixes yet for most operating systems or Wi-Fi access points.

The use of HTTPS is always a good idea, particularly now. We recommend that everyone install the browser extension “HTTPS Everywhere” which will automatically switch your browser to use HTTPS when a website supports it. The new Wi-Fi attack makes it much easier for an attacker to try to downgrade your web browsing to use an insecure connection, and the HTTPS Everywhere extension will prevent this for most popular websites. See https://www.eff.org/https-everywhere to install this extension.

The use of a personal VPN is always a good idea, particularly now. A personal VPN encrypts your traffic to the entire internet, while a corporate VPN just encrypts your traffic to the corporate network. To read more about Riseup’s VPN service, see https://riseup.net/vpn

Current update status
————————————————

Android: There is no fix yet for Android. Devices with Android 6.0 or later are highly vulnerable.

iOS: No update is available yet.

macOS: No update is available yet.

Windows: Update is available.

Ubuntu and Debian Linux: Security patches are available. Run `sudo apt update; sudo apt upgrade`.

Red Hat Linux and Fedora: No fix yet released. See https://access.redhat.com/security/cve/cve-2017-13077 for latest status. You can keep trying to run `sudo yum update` until you see wpa_supplicant get updated.

Access points and home routers: check the website of the manufacturer.

More information
———————————————–

For an updated list of the state of security patches to client operating systems and AP firmware, see:

https://www.reddit.com/r/KRaCK/comments/76pjf8/krack_megathread_check_back_often_for_updated/

https://www.bleepingcomputer.com/news/security/list-of-firmware-and-driver-updates-for-krack-wpa2-vulnerability/

http://www.zdnet.com/article/here-is-every-patch-for-krack-wi-fi-attack-available-right-now/

For more information on the flaw in WPA2, see:

https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/


To unsubscribe: <mailto:newsletter-unsubscribe@lists.riseup.net>
List help: <https://riseup.net/lists>

Apple CEO Tim Cook to Meet French President Macron on Monday

Apple CEO Tim Cook to Meet French President Macron on Monday

By | Mac Book

Apple CEO Tim Cook will meet French president Emmanuel Macron on Monday, according to the Élysée Palace’s official published agenda. Cook has been invited to the head of state’s Paris residence for an afternoon meeting, but the reasons for the visit have not yet been made public.

Topics up for discussion could include Apple’s code-learning drive in schools, or perhaps more likely, the issue of corporate tax law in the country.

SSD how to choose

By | all, Mac Book

The Solid Stade Disks are so quite and fast but they cost much. My advice is to still use the ivo samsung discs.

get a small disc for your system and an extra external for your work. You can always change the dvd to an extra SSD for data but it might hit up your proassesore.

 

meer wetten? gebruik de contact form off zoek via xoek machine for ssd ivo big joule in de buurt

 

Dafna

[contact-form-7 404 "Not Found"]

Facebook spion achter je – en nu weet je ook wanneer en hoe

By | all, future of the Web

one more useful tool to install on your chrome navigator is

https://dataselfie.it/#/


Introductie van DATA selfie – een nieuwe plugin die het mogelijk maakt u een kijkje te nemen in de ‘backstage‘ van Facebook-activiteit, en presenteren aan u, nummers en kleuren, alle informatie die u tijdens het uitvoeren van analyses van uw accountontvangt en verzamelt social network

Heeft u zich ooit afgevraagd hoe Facebook verzamelt de informatie die u nodig hebt? Facebook is niet alleen het uitvoeren van een spionage activiteit die u uitvoert en weet waar je bent, wie je bent in, wat zijn uw voorkeuren met betrekking tot eten, winkelen, het kiezen van een partner en politieke standpunten. Met behulp van deze informatie kan de informatie die naar je toe komt, de commercials zij kiest en wat het werkelijk betekent heel veel alle informatie die je verbruikt direct.

Lees meer Globes ”

Waar zijn ze bang voor? Kritische hypotheek data banken verbergen van het publiek
Bnei Brak: New Horizon meest dichtbevolkte stad in Israël
De hoop en vrees van de werklozen appartement, aannemers en minister van Financiën Kahlon
Let op: Hoe sluit ik de Arava bij de nationale water?

Is ze ervoor kiest om de informatie op uw wereld dingen die je echt in contact met hen te verrijken leiden, of dat het gebruik van die informatie te planten hoe het is om in je geest. Dit is een kwestie op zich geweest.

Hoe dan ook, als spionnen achter je dus – dacht die achter DATA selfie app – zeer de moeite waard om naar de vijand te leren kennen. Gegevens Salafi additief gratis, open-source Chrome-browser die de gebruiker om uit te vinden hoe je kunstmatige intelligentie algoritmes en processors hebben van Facebook de activiteiten van de gebruiker en ontlenen informatie over de persoonlijkheid en gewoonten helpt.

De app analyseert en decodeert de gegevens met behulp van algoritmes op basis van kunstmatige intelligentie en toont alle verzamelde informatie in toegankelijke en intuïtief, zodat u precies weet wat er gebeurt en wat er achter u uw activiteit bijhouden gegenereerde informatie-netwerk.

Nu dat je weet wat je weet – je kunt ook bepalen hoeveel u wordt blootgesteld aan, wat je onthullen en aan wie.