Category: UNCATEGORIZED

13 May 2019

ServiceNow acquihires mobile analytics startup Appsee

In a carefully framed deal, ServiceNow announced this morning that it has acquired the intellectual property and key personnel of mobile analytics company, Appsee for an undisclosed price. Under the terms of the deal, the co-founders and R&D team will be joining ServiceNow after the deal closes.

It’s worth noting that ServiceNow did not acquire Appsee’s customers, and the company is expected to wind down its existing business over the next 12 months.

Appsee provides more than pure numerical analytics. As the name it implies, it lets developers see what the user is seeing by recording an interaction and seeing what went right or wrong as the person used the program.

Appsee session playback in action.

GIF courtesy of Appsee.

ServiceNow wants to take that functionality and incorporate it into its Now Platform, which enables customers to create customized service applications for their businesses, or use mobile applications it has created out of the box.

The company sees this as a way to improve the UI and build more usable apps. “We’ll be able to use Appsee for our mobile app and browser analytics. This can be used across all three of our workflows, and with this level of visibility our customers will be able to see how customers or employees are engaging [with the application]. With these analytics, ServiceNow will be able to provide insights on user behavior. In turn, this will help us provide an improved UI for customers,” a company spokesperson told TechCrunch.

Just last week at its Knowledge 19 customer conference in New York City, the company announced Now Mobile a new tool for performing tasks like ordering a new laptop or searching for the holiday calendar, and a mobile on-boarding tool for new employees. Both of these will be available in the company’s next release and could benefit from the Appsee functionality to improve the overall design of these products after it releases them to users.

Appsee has always been focused on capturing user activity. Over the years it has layered on more traditional analytics like DAUs (daily active users) and crash rates, the kind of metrics that can give companies insights into their user experience, but they combine that with the visual record to help see more detail about exactly what was happening, along with myriad of other features, all of which will be incorporated into the ServiceNow platform moving forward.

The deal is expected to close by the end of Q2 2019.

13 May 2019

Uber launches PIN feature to cut wait times at U.S. airports, starting in Portland

Uber is piloting a new PIN feature at the Portland International Airport that will give riders a one-time 6-digit numeric code in an effort to speed up pickup times and reduce traffic congestion.

The PIN, or personal identification number, feature kicks off Monday at the Portland Airport, which can average around 400 Uber rides an hour at peak time.

Uber initially developed the PIN-matching solution in 2016 to serve high-volume, high-density event venues — situations that require moving potentially thousands of people in a constrained area. It’s been used at more than 60 events globally since then, including the Kentucky Derby and a Formula 1 race in Australia, according to Uber.

Uber saw an opportunity to apply the feature at airports as traffic congestion and demand for app-based rides at these locations grew. The company’s Seattle-based airports team adapted the feature and tested it at the Bangalore airport in India. Portland is the first U.S. airport to participate in the pilot.

How it works

Once riders order their UberX, they make their way to the dedicated pickup zone. The app will briefly give riders information on how the PIN feature works. A 6-digit personal identification number is then assigned to the rider, who is instructed to provide it to the first available driver.

Meanwhile, the driver, who has received a pickup opportunity at the airport, heads to the pickup location and will get in a queue, waiting for the next available rider. (Drivers will be allowed to accept or snooze if they’re busy. Four minutes is the snooze duration time.)

The rider PIN is given to the driver, who types in the one-time numeric code into the app. The ride commences as normal, although Uber still recommends the rider go through the standard verification checks before setting off in the vehicle.

What’s next

The PIN feature will likely head to other airports, if the Portland pilot is successful.

“We’ve made quite a big investment in the space,” Sondra Batbold, an Uber product manager, told TechCrunch, referring to building out Uber’s airports team. “If we zoom out and think about how much unprecedented growth airports are experiencing all over the world, it’s an important strategic partnership for us to work really closely with airports.”

In other words, Uber sees a lot of potential at airports.

That doesn’t mean Uber will offer PIN matching at every airport, Batbold said. At some locations, it will be more efficient to retain existing pickup models due to capacity constraints and curb space availability.

13 May 2019

India’s Locus raises $22 million to expand its logistics management business

Locus, an Indian startup that uses AI to help businesses map out their logistics, has raised $22 million in Series B funding to expand its operations in international markets.

The financing round for the four-year-old startup was led by Falcon Edge Capital and Tiger Global Management . Existing investors Exfinity Venture Partners and Blume Ventures also participated in the round. The startup has raised $29 million to date, Nishith Rastogi, co-founder and CEO of Locus, told TechCrunch in an interview.

Locus works with companies that operate in FMCG, logistics, and e-commerce spaces. Some of its clients include Tata Group companies, Myntra, BigBasket, Lenskart, and Bluedart. It helps these clients automate their logistics workload — tasks such as planning, organizing, transporting and tracking of inventories, and finding the best path to reach a destination — that have traditionally required intensive human labor.

“Say a Lenskart representative is visiting a house or an office to offer an eye checkup, and suddenly two more people there are interested in getting their eyes checked. The representative could attend these two new potential clients, or wrap things up with the first client and take care of his or her next appointment,” said Rastogi.

Locus looks at a client’s past data, identifies patterns, and automates these kind of decisions on a large scale. In an example shared earlier with TechCrunch, Rastogi talked about how Locus had built a scanner for ecommerce companies for measuring products.

Rastogi said he will use the fresh capital to develop products and expand Locus in Southeast Asian and North American markets. The startup says half of its 110 people workforce is outside of India. Half of the IP it has built and the revenue it generates comes from its team outside of India.

He said the startup has spent the recent quarters studying these international markets, and has secured some anchor clients to expand the business. Locus is operationally profitable already and any additional capital goes into expanding its business, he added.

The logistics market in India has long been riddled with challenges. A growing number of startups, including BlackBuck — which raised $150 million last week — have emerged in recent years to tackle these problems.

The new funding also illustrates Tiger Global Management’s new strategy for the Indian market. The VC fund, which has invested in B2C businesses Flipkart and Ola in India, has made a number of investments in B2B startups in recent months. Last month, it invested $90 million in agri-tech supply chain startup Ninjacart, and weeks later, it gave cloud-based solutions provider Zenoti $50 million.

13 May 2019

Sweden reopens rape case against Julian Assange

Sweden’s prosecution authority has reopened a preliminary investigation into Wikileaks founder Julian Assange on an allegation of rape dating back to 2010.

It said today it will issue a European Arrest Warrant for Assange, and submit an application for a detention order to Uppsala District Court — as the suspected crime took place in Enköping municipality.

An earlier attempt by the Swedish prosecution authority to investigate the alleged sex crime was dropped after Assange fled to the Ecuadorian embassy in London, UK, in 2012.

A second sex crime allegation against Assange involving a separate Swedish woman cannot be reopened as the legal time-limit on pursuing a case has been exceeded.

The Wikileaks founder was arrested at the Ecuadorian embassy in London last month, after it withdrew diplomatic asylum. He was then quickly found guilty of breaching his 2012 bail conditions.

A judge at Southwark Crown Court then sentenced him to 50 weeks earlier this month. He is now serving that sentence in a UK prison.

Sweden’s deputy director of public prosecution, Eva-Marie Persson, said today that any conflict between the European Arrest Warrant and an existing US extradition request for Assange will be decided by UK authorities.

It would be up to UK courts — and potentially the home secretary, Sajid Javid — to make a final decision where to send Assange if there are conflicting extradition requests.

Once in UK police custody last month the Wikileaks founder was also almost immediately rearrested on behalf of the U.S. — which is seeking his extradition on a charge of conspiracy to hack into a classified computer relating to the leaking of military secrets to Wikileaks by whistleblower, Chelsea Manning.

“I am well aware of the fact that an extradition process is ongoing in the UK and that he could be extradited to the US. In the event of a conflict between a European Arrest Warrant and a request for extradition from the US, UK authorities will decide on the order of priority. The outcome of this process is impossible to predict. However, in my view the Swedish case can proceed concurrently with the proceedings in the UK,” said Persson in a statement regarding potential extradition conflict.

In wider comments regarding reopening the case she said simply that circumstances have changed.

“On account of Julian Assange leaving the Ecuadorian embassy, the circumstances in this case have changed. I take the view that there exists the possibility to take the case forward.”

She also noted that UK authorities have told her office Assange must serve 25 weeks of his sentence before he can be released.

Reopening the investigation against Assange means “a number of investigative measures will take place”, she added, suggesting her office could seek to question Assange while he is detained in UK prison — while noting he would have to agree to co-operate with any interview.

“In my opinion a new interview with the suspect is required. It may be necessary, with the support of a European Investigation Order, to request an interview with [Assange] be held in the UK. Such an interview, however, requires [hi]s consent,” she said.

Wikileaks’ editor-in-chief, Kristinn Hrafnsson, has responded to Sweden reopening the rape allegation investigation with a statement in which he claims the country is doing so “under intense political pressure” and that the case “has been mishandled throughout”.

He also denies Assange ever sought to evade the investigation, despite fleeing to and remaining within the Ecuadorian Embassy for seven years, and suggests that a fresh investigation “will give Julian a chance to clear his name”.

In a statement in UK court ahead of his sentencing for breaching bail conditions Assange apologized “unreservedly to those who consider that I have disrespected them by the way I have pursued my case”, adding that he regretted his decision to flee.

“Assange was always willing to answer any questions from the Swedish authorities and repeatedly offered to do so, over six years. The widespread media assertion that Assange ‘evaded’ Swedish questioning is false,” Hrafnsson writes now, leaving little wiggle room should Assange decline to be interviewed by Swedish prosecutors while behind bars in the UK.

Last month a cross-party coalition of 70 UK MPs wrote to the home secretary calling for him to “champion action” to ensure Assange is extradited to Sweden should prosecutors request it, as they now have.

Their letter called for Javid to “stand with the victims of sexual violence and seek to ensure the case against Mr Assange can now be properly investigated”, to ensure “due process” is followed for the complainant.

Parliamentarians also pointed out that the legal expiry date in this case of alleged rape is August 2020, meaning there’s only a short window to take a case against Assange to court — arguing that the Swedish prosecutors should therefore be given priority in any extradition conflict with the US.

Assange is challenging the US extradition request — appearing at a court hearing May 2, via videolink, to say he did not consent to being sent to the US, per the Guardian, while the court heard that the extradition process would take “many months”.

12 May 2019

Equity Shot transcribed: Judging Uber’s less-than-grand opening day

Another day, another episode of Equity. This time it was an emergency episode, because Uber (finally) went public and a lot of financial folks were quite looking forward to how it would perform on opening day. Turns out it didn’t do so well.

Kate and Alex had a lot of questions about why? Was it the company’s fault? Was it simply the macro market? Was it something else altogether? And then there was the fact that it wasn’t a great week for the stock market or U.S.-China trade relations.

But don’t cry for Uber. As Kate Clark reported, the ride-hailing company still has $8.1 billion to play with to grow itself into a more profitable company.

And now we watch as Uber navigates the public markets.

Kate: Uber was a different story [than Lyft]. I think we expected a really similar pricing scheme, but we saw Uber set a price range of 44 to $50 per share. And they ultimately priced at $45 per share only to sink pretty significantly right off the bat. They began trading this morning at $42 a share and now they’re-

Alex: Shocking.

Kate: Yeah. Now they’re, what? Floating at around $41. So they’re dropping. I think everybody is a little bit surprised by that.

Alex: Yeah. So the reason why we thought they were going to raise their range was because it felt a bit conservative. The 44 to $50 per share IPO target range for Uber felt like almost a mulligan. Like, “We’ll put it out there. We’ll get 3X demanded at the top end. We’ll raise the range four or five bucks a share, price it towards the top into that, get the valuation where we want it.”

Alex: And to see them price it 45 is shocking.

For access to the full transcription, become a member of Extra Crunch. Learn more and try it for free. 

12 May 2019

From crypto winter to crypto weirder

Captain Kirk and neo-Dadaists. Repugnant markets and legendary cryptographers. “Digital couture” auctioned by CryptoKitties developers. Distributed autonomous art organizations. A keynote speech looking back from 2047 at the near-apocalypse of 2026, from which we were saved by a new, fully tokenized economy. Yes, that’s right: NYC Blockchain Week has begun.

Where to begin? I suppose with context. This week’s series of cryptocurrency conferences kicked off with “Ethereal,” hosted by Consensys, a company/incubator/studio mostly devoted to decentralized software and services built atop the Ethereum blockchain … although they also acquired an asteroid-mining company last year. Subsequently they laid off 13% of their staff, in the depths of the notorious “crypto winter” that followed the crypto bubble which ended abruptly last January.

You read it here first, though: we are now moving from crypto winter into crypto weirder.

In fairness, the Ethereum community has long been home to the starry-eyed idealists, utopians, and … let’s diplomatically call them “original thinkers” … of the blockchain world. Eyebrow-raising proposals are nothing new. At the same time, Ethereum’s programmability also attracts many hard-headed money people increasingly fascinated by the prospects and potential profits of “DeFi,” decentralized finance.

DeFi, to oversimplify, incorporates and transcends the ICO craze of 2017-18 (most of which were Ethereum tokens) into decentralized platforms for loans, currency stabilization, insurance, clearinghouses, even derivatives, and much more. Its current poster child is the MakerDAO, a “stablecoin” system, i.e. a token intended to maintain a constant dollar value, maintained not by direct fiat collateral but by a complex architecture of cryptocurrency loans orchestrated by smart contracts.

But if you ask DeFi’s true believers, MakerDAO is merely an initial proof-of-concept of the larger DeFi vision. Its long-term prospects are immense, spanning all of the many tentacles of Wall Street and the financial industry, and immensely valuable. Assuming regulators are willing to play ball, of course…

And so the attendees at Ethereal are a colorful mix of serious financial and legal types. In the first group: former hedge-fund billionaire Michael Novogratz, or Rocket Lawyer CEO Charley Moore, there to announce the beta launch of their “Rocket Wallet” offering “legal contract execution and payments on the Ethereum blockchain.” In the second category: the abovementioned starry-eyed dreamers, weirdos, and artists, with whom you might find yourself discussing the dangers of a generalized on-chain AI ArtDAO which might run amok and transform the planet (and humanity) not into paperclips but into a planet-scale work of art. I suppose there are worse ways to go.

Do I sound dismissive? Au contraire; I’m all about the dreamers and weirdos. (I mean, I am one, although I was probably the only attendee whose pet Ethereum project is explicitly designed to never have any monetary value. Even the dreamers generally still want to get rich.) The most interesting thing about the blockchain / cryptocurrency space is that it is full of people who do not hesitate to question some of the most basic underpinnings of our society, our social constructs so fundamental they are often mistaken for laws of nature.

The concept of money. The existence of financial intermediaries. The partitioning of the world into geographically defined nation-states. That sort of thing. What’s more, they question them with an eye towards improving or even replacing them, generally with (admittedly usually at-best-half-baked) iterations and solutions in mind. Such people are definitionally weird, and tend to view the status quo so skeptically that they believe it’s inevitably headed for some kind of apocalyptic demise … but their questions are valuable even if you don’t agree with their answers.

Not least when they highlight genuine problems with the way things currently work. Leah Callon-Butler of intimate.io spoke at Ethereal about “repugnant markets,” which are entirely legal but which face such social disapproval that ordinary business and transactions face substantial difficulties. In the US, of course, that generally means sex — and not even porn. Within the last few years, Chase Bank has refused to process payments for a condom company; Square rejected Early to Bed, a woman-owned sex toy store; and CES banned a sex toy after they gave it an award. One can’t help but think that there has to be a better way.

Similarly, sure, it’s amusing that, after announcing a partnership with Mattereum (who I’ve written about before) to track the provenance of collectible memorabilia, William Shatner got into a Twitter fight about the fine technical details of data storage on the Ethereum blockchain — and won by dint of being completely correct! — but it also highlights the fact that provenance is a really hard problem, and existing solutions are deeply imperfect at best.

So bring on the crypto weirder, says me. Speculation, trying to make money from the oft-inexplicable ups and downs of the “crypto casino,” is boring and breeds scams, hucksters, bad faith, fraud, and outright robbery. Actually trying to build distributed networks and platforms, which do old things in new disintermediated ways, or better yet entirely new things — now that’s interesting, even if/when 90+% of them fail. The crypto weirder means more of the latter and less of the former. It’s about time.

12 May 2019

CO2 in the atmosphere just exceeded 415 parts per million for the first time in human history

The human race has broken another record on its race to ecological collapse. Congratulations humanity!

For the first time in human history — not recorded history, but since humans have existed on Earth — carbon dioxide in the atmosphere has topped 415 parts per million, reaching 415.26 parts per million, according to sensors at the Mauna Loa Observatory, a research outpost of the National Oceanic and Atmospheric Agency.

CO2 emissions over time as recorded by measurements of Arctic ice and the Mauna Loa Observatory. Courtesy of the Scripps Institution of Oceanography.

The macabre milestone was noted on Twitter by the climate reporter Eric Holthaus, based on the data recorded and presented by the Scripps Institution of Oceanography at the University of California, San Diego.

If the threshold seems unremarkable (it shouldn’t), it’s yet another indication of the unprecedented territory humanity is now charting as it blazes new trails toward environmental catastrophe.

Just last week a report revealed that at least 1 million species were at risk of extinction thanks to human activity and the carbon emissions that are a byproduct of economic development.

That’s on top of news that climate change, which has been inextricably linked to carbon emissions, will cost the U.S. alone some $500 billion per year by 2090.

The increasing proportion of carbon dioxide in the atmosphere is important because of its heat absorbing properties. The land and seas on the planet absorb and emit heat and that heat is trapped in carbon dioxide molecules. The NOAA likens CO2 to leaving bricks in a fireplace, that still emit heat after a fire goes out.

Greenhouse gases contribute to the planet maintaining a temperature that can sustain life, but too much can impact the entire ecosystem that sustains us. That’s what’s happening now. As the NOAA notes, “increases in greenhouse gases have tipped the Earth’s energy budget out of balance, trapping additional heat and raising Earth’s average temperature.”

The properties of CO2 also mean that it adds to the greenhouse effect in a way that other emissions do not, thanks to its ability to absorb wavelengths of thermal energy that things like water vapor can’t. That’s why increase of atmospheric carbon dioxide are responsible for about two-thirds of the total energy imbalance causing Earth’s temperature to rise, according to the NOAA.

12 May 2019

Two years after WannaCry, a million computers remain at risk

Two years ago today, a powerful ransomware began spreading across the world.

WannaCry spread like wildfire, encrypting hundreds of thousands of computers in over 150 countries in a matter of hours. It was the first time that ransomware, a malware that encrypts a user’s files and demands cryptocurrency in ransom to unlock them, had spread across the world in what looked like a coordinated cyberattack.

Hospitals across the U.K. declared a “major incident” after they were knocked offline by the malware. Government systems, railway networks and private companies were also hit.

Security researchers quickly realized the malware was spreading like a computer worm, across computers and over the network, using the Windows SMB protocol. Suspicion soon fell on a batch of highly classified hacking tools developed by the National Security Agency, which weeks earlier had been been stolen and published online for anyone to use.

“It’s real,” said Kevin Beaumont, a U.K.-based security researcher at the time. “The shit is going to hit the fan big style.”

WannaCry relied on stolen NSA-developed exploits, DoublePulsar and EternalBlue, to hack into Windows PCs and spread through the network. (Image: file photo)

An unknown hacker group — later believed to be working for North Korea — had taken those published NSA cyberweapons and launched their attack — likely not realizing how far the spread would go. The hackers used the NSA’s backdoor, DoublePulsar, to create a persistent backdoor that was used to deliver the WannaCry ransomware. Using the EternalBlue exploit, the ransomware spread to every other unpatched computer on the network.

A single vulnerable and internet-exposed system was enough to wreak havoc.

Microsoft, already aware of the theft of hacking tools targeting its operating systems, had released patches. But consumers and companies alike moved slowly to patch their systems.

In just a few hours, the ransomware had caused billions of dollars in damages. Bitcoin wallets associated with the ransomware were filling up by victims to get their files back — more often than not in vain

Marcus Hutchins, a malware reverse engineer and security researcher, was on vacation when the attack hit. “I picked a hell of a fucking week to take off work,” he tweeted. Cutting his vacation short, he got to work. Using data from his malware tracking system had found what became WannaCry’s kill switch — a domain name embedded in the code, which he registered and immediately saw the number of infections grind to a halt. Hutchins, who pleaded guilty to unrelated computer crimes last month, was hailed a hero for stemming the spread of the attack. Many have called for leniency if not a full presidential pardon for his efforts.

Trust in the intelligence services collapsed overnight. Lawmakers demanded to know how the NSA planned to mop up the hurricane of damage it had caused. It also kicked off a heated debate about how the government hoards vulnerabilities to use as offensive weapons to conduct surveillance or espionage — or when it should disclose bugs to vendors in order to get them fixed.

A month later, the world braced itself for a second round of cyberattacks in what felt like what would soon become the norm.

NotPetya, another ransomware which researchers also found a kill switch for, used the same DoublePulsar and EternalBlue exploits to ravish shipping giants, supermarkets and advertising agencies, which were left reeling from the attacks.

Two years on, the threat posed by the leaked NSA tools remains a concern.

As many as 1.7 million internet-connected endpoints are still vulnerable to the exploits, according to the latest data. Data generated by Shodan, a search engine for exposed databases and devices, puts the figure at the million mark — with most of the vulnerable devices in the U.S. But that only accounts for devices directly connected to the internet and not the potentially millions more devices connected to those infected servers. The number of vulnerable devices is likely significantly higher.

More than 400,000 exposed systems in the U.S. alone can be exploited using NSA’s stolen hacking tools. (Image: Shodan)

WannaCry continues to spread and occasionally still infects its targets. Beaumont said in a tweet Sunday that the ransomware remains largely neutered, unable to unpack and begin encrypting data, for reasons that remain a mystery.

But the exposed NSA tools, which remain at large and able to infect vulnerable computers, continue to be used to deliver all sorts of malware — and new victims continue to appear.

Just weeks before city of Atlanta was hit by ransomware, cybersecurity expert Jake Williams found its networks had been infected by the NSA tools. More recently, the NSA tools have been repurposed to infect networks with cryptocurrency mining code to generate money from the vast pools of processing power. Others have used the exploits to covertly ensnare thousands of computers to harness their bandwidth to launch distributed denial-of-service attacks by pummeling other systems with massive amounts of internet traffic.

WannaCry caused panic. Systems were down, data was lost, and money had to be spent. It was a wakeup call that society needed to do better at basic cybersecurity.

But with a million-plus unpatched devices still at risk, there remains ample opportunity for further abuse. What we may not have forgotten two years on, clearly more can be done to learn from the failings of the past.

Read more:

12 May 2019

Two years after WannaCry, a million computers remain at risk

Two years ago today, a powerful ransomware began spreading across the world.

WannaCry spread like wildfire, encrypting hundreds of thousands of computers in over 150 countries in a matter of hours. It was the first time that ransomware, a malware that encrypts a user’s files and demands cryptocurrency in ransom to unlock them, had spread across the world in what looked like a coordinated cyberattack.

Hospitals across the U.K. declared a “major incident” after they were knocked offline by the malware. Government systems, railway networks and private companies were also hit.

Security researchers quickly realized the malware was spreading like a computer worm, across computers and over the network, using the Windows SMB protocol. Suspicion soon fell on a batch of highly classified hacking tools developed by the National Security Agency, which weeks earlier had been been stolen and published online for anyone to use.

“It’s real,” said Kevin Beaumont, a U.K.-based security researcher at the time. “The shit is going to hit the fan big style.”

WannaCry relied on stolen NSA-developed exploits, DoublePulsar and EternalBlue, to hack into Windows PCs and spread through the network. (Image: file photo)

An unknown hacker group — later believed to be working for North Korea — had taken those published NSA cyberweapons and launched their attack — likely not realizing how far the spread would go. The hackers used the NSA’s backdoor, DoublePulsar, to create a persistent backdoor that was used to deliver the WannaCry ransomware. Using the EternalBlue exploit, the ransomware spread to every other unpatched computer on the network.

A single vulnerable and internet-exposed system was enough to wreak havoc.

Microsoft, already aware of the theft of hacking tools targeting its operating systems, had released patches. But consumers and companies alike moved slowly to patch their systems.

In just a few hours, the ransomware had caused billions of dollars in damages. Bitcoin wallets associated with the ransomware were filling up by victims to get their files back — more often than not in vain

Marcus Hutchins, a malware reverse engineer and security researcher, was on vacation when the attack hit. “I picked a hell of a fucking week to take off work,” he tweeted. Cutting his vacation short, he got to work. Using data from his malware tracking system had found what became WannaCry’s kill switch — a domain name embedded in the code, which he registered and immediately saw the number of infections grind to a halt. Hutchins, who pleaded guilty to unrelated computer crimes last month, was hailed a hero for stemming the spread of the attack. Many have called for leniency if not a full presidential pardon for his efforts.

Trust in the intelligence services collapsed overnight. Lawmakers demanded to know how the NSA planned to mop up the hurricane of damage it had caused. It also kicked off a heated debate about how the government hoards vulnerabilities to use as offensive weapons to conduct surveillance or espionage — or when it should disclose bugs to vendors in order to get them fixed.

A month later, the world braced itself for a second round of cyberattacks in what felt like what would soon become the norm.

NotPetya, another ransomware which researchers also found a kill switch for, used the same DoublePulsar and EternalBlue exploits to ravish shipping giants, supermarkets and advertising agencies, which were left reeling from the attacks.

Two years on, the threat posed by the leaked NSA tools remains a concern.

As many as 1.7 million internet-connected endpoints are still vulnerable to the exploits, according to the latest data. Data generated by Shodan, a search engine for exposed databases and devices, puts the figure at the million mark — with most of the vulnerable devices in the U.S. But that only accounts for devices directly connected to the internet and not the potentially millions more devices connected to those infected servers. The number of vulnerable devices is likely significantly higher.

More than 400,000 exposed systems in the U.S. alone can be exploited using NSA’s stolen hacking tools. (Image: Shodan)

WannaCry continues to spread and occasionally still infects its targets. Beaumont said in a tweet Sunday that the ransomware remains largely neutered, unable to unpack and begin encrypting data, for reasons that remain a mystery.

But the exposed NSA tools, which remain at large and able to infect vulnerable computers, continue to be used to deliver all sorts of malware — and new victims continue to appear.

Just weeks before city of Atlanta was hit by ransomware, cybersecurity expert Jake Williams found its networks had been infected by the NSA tools. More recently, the NSA tools have been repurposed to infect networks with cryptocurrency mining code to generate money from the vast pools of processing power. Others have used the exploits to covertly ensnare thousands of computers to harness their bandwidth to launch distributed denial-of-service attacks by pummeling other systems with massive amounts of internet traffic.

WannaCry caused panic. Systems were down, data was lost, and money had to be spent. It was a wakeup call that society needed to do better at basic cybersecurity.

But with a million-plus unpatched devices still at risk, there remains ample opportunity for further abuse. What we may not have forgotten two years on, clearly more can be done to learn from the failings of the past.

Read more:

12 May 2019

Hotstar, Disney’s Indian streaming service, sets new global record for live viewership

India’s video streaming giant Hotstar, owned by Disney, today set a new global benchmark for the number of people an OTT service can draw to a live event.

Some 18.6 million users simultaneously tuned into Hotstar’s website and app to watch the deciding game of the 12th edition of the Indian Premier League (IPL) cricket tournament. The streaming giant, which competes with Netflix and Amazon in India, broke its own “global best” 10.3 million concurrent views milestone that it had set last year.

Hotstar topped the 10 million concurrent viewership mark a number of times during this year’s 51-day IPL season. More than 12.7 million viewers huddled to watch an earlier game in the tournament (between Royal Challengers Bangalore and Mumbai Indians), a spokesperson for the service said. In mid-April, Hotstar said that the cricket series had already garnered 267 million overall viewership, creating a new record for the streamer. (Last year’s IPL had clocked 202 million over viewership.)

Fans of Mumbai Indians celebrate their team’s victory against Chennai Super Kings in IPL cricket tournament in India.

These figures coming out of India, the fastest growing internet market, are astounding, to say the least. In comparison, a 2012 live-stream of skydiver Felix Baumgartner jumping from near-space to the Earth’s surface, remains the most concurrently viewed video on YouTube. It amassed about 8 million concurrent viewers. The live viewership of the royal wedding between Prince Harry and Meghan Markle was also a blip in comparison.

As Netflix and Amazon scramble to find the right content strategy to lure Indians, Hotstar and its local parent firm Star India have aggressively focused on securing broadcast and streaming rights to various cricket series. Cricket is almost followed like a religion in India.

In 2017, Star India, then owned by 21st Century Fox, secured rights to broadcast and stream IPL cricket tournaments for five years for a sum of roughly $2.5 billion. Facebook had also participated in the bidding, offering north of $600 million for streaming. (Star India was part of 21st Century Fox’s business that Disney acquired for $71.3 billion earlier this year.)

That bet has largely paid off. Hotstar said last month that its service has amassed 300 million monthly active users, up from 150 million it had reported last year. In comparison, both Netflix and Amazon Prime Video have less than 30 million subscribers in India, according to industry estimates.

In the last two years, Hotstar has expanded to three international markets — the U.S., Canada, and most recently, the UK — to chase new audiences. The streaming service is hoping to attract Indians living overseas and anyone else who is interested in Bollywood movies and cricket, Ipsita Dasgupta, president of Hotstar’s international operations, told TechCrunch in an interview.

The streaming service plans to enter Sri Lanka, Pakistan, Nepal, Middle East, Australia, and New Zealand in the next few quarters, Dasgupta said.

That’s not to say that Hotstar has a clear path ahead. According to several estimates, the streaming service typically sees a sharp decline in its user base after the conclusion of an IPL season. Despite the massive engagement it generates, it remains operationally unprofitable, people familiar with Hotstar’s finances said.

The ad-supported streaming service offers about 80 percent of its content catalog — which includes titles produced by Star India, and shows and movies syndicated from international partners HBO, ABC, and Showtime among others — for no cost to users. One of the most watched international shows on the platform, “Game of Thrones,” will be ending soon, too.

The upcoming World Cup cricket tournament, which Hotstar will stream in India, should help it avoid the major headache for sometime. In the meanwhile, the service is aggressively expanding its original shows slate in the nation. One of the shows is a remake of BBC/NBC’s popular “The Office.”