IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 20 July

07:39

Utimaco HSM protects digital wallets and cryptocurrencies Help Net Security

Utimaco partners with ThothTrust to protect digital wallets and their cryptocurrency assets with Utimaco HSMs and the CryptoScript Software Development Kit (SDK). The Customizable Secure Cryptography (CSC) product offers different security levels and customization options to create a secure environment corresponding to the customers requirements. In the case of digital wallets, a Wallet Security Module (WSM) ensures cryptocurrency asset security based on a Utimaco HSM as its hardware root of trust. The Utimaco HSM equipped More

The post Utimaco HSM protects digital wallets and cryptocurrencies appeared first on Help Net Security.

07:36

Okta acquires ScaleFT to bring Zero Trust to the enterprise Help Net Security

Okta announced it has acquired ScaleFT. Together, Okta and ScaleFT will bring Zero Trust to the enterprise by providing organizations with a framework to protect data, without compromising on experience. As the proliferation of applications and devices continues, the network perimeter is disappearing and organizations must rethink how they secure their extended enterprises employees, contractors and partners. Organizations of every size are realizing the criticality of moving to a Zero Trust framework by building More

The post Okta acquires ScaleFT to bring Zero Trust to the enterprise appeared first on Help Net Security.

03:31

Cisco plugs serious flaws in Policy Suite, SD-WAN, and Nexus switches Help Net Security

Cisco has issued another batch of fixes, plugging a number of critical and high severity holes in its Policy Suite, SD-WAN, and Nexus products. Cisco Policy Suite Users of the Cisco Policy Suite should upgrade to Release 18.2.0 as soon as possible, as it implements fixes for four critical vulnerabilities: A vulnerability (CVE-2018-0376) in the Policy Builder interface of the Suite that could be exploited by an unauthenticated, remote attacker to access the Policy Builder More

The post Cisco plugs serious flaws in Policy Suite, SD-WAN, and Nexus switches appeared first on Help Net Security.

02:01

Hackers on Planet Earth, Here We Come! Hackaday

This weekend is HOPE XIII. The Hackers on Planet Earth conference is a biennial event held in New York City.

Dating all the way back to 1994, HOPE is an excellent collection of people and ideas. I was lucky enough to attend two years ago (my first time) and had a fantastic time meeting Cory Doctorow after his rousing talk about DMCA 1201, I got to hear Richard Stallman discuss why all software must be free, the talent show was off the hook, and there were fun people to hang out with at every turn.

The Hackaday Crew is making the pilgrammage to this event and you still can too! Tickets are available at the door. Come find us at a table in the vendor area wed love to see some hardware projects so bring those along! If you cant make it to the event, you can still help guide our reporting. Check out the schedule for the weekend and help recommend what talks we should be at, just leave suggestions in the comments below.

...

01:35

Mafia Tactics in Team UPC and Battistellis Circle Techrights

Battistelli is probably vacationing in Corsica where he came from (and where his name is associated with the Mafia)

The EPO mafia
Image source

Summary: Mafia-like behaviour at the EPO and the team responsible for the Unified Patent Court (UPC); appointments of loyal friends and family members have become common (nepotism and exchange of favours), as have threats made towards critics, authorities, and the press

LAST night we explained yet again why UPC is dead (or dying). Team UPC will never admit this because it still believes in miracles or in corrupt officials, who are actually not a miracle but a fact of life.

Team UPC will never admit this because it still believes in miracles or in corrupt officials, who are actually not a miracle but a fact of life.An article by J A Kemp (a law firm) has just been published to deal with this subject. So was a paywalled article from IAMs network and another copy of the nonsense from Hogan Lovells. They keep paying to spread this. They wont want to say so publicly, but the UPC is going nowhere; they just waste their money reposting this crap, hoping perhaps that it can still occasionally attract some business (e.g. consultation about unitary patents). Hogan Lovells is working with Managing IP (UPC booster) on this self-serving promotional event right now. Pure marketing!

...

01:34

NetEase Refutes PUBGs Copyright Infringement Claims in Court TorrentFreak

When PlayerUnknowns Battlegrounds (PUBG) was first released last year, it became an instant hit.

This success earned the company hundreds of millions of dollars in revenue, but according to PUBG, this could have been much more if others hadnt copied their work.

The general theme of PUBG is now used by many games, which is a thorn in the side of the developer. To protect its financial interests, the company, therefore, decided to take the developer of two alleged spinoffs to court.

In April, PUBG filed a lawsuit against NetEase, the makers of Rules of Survival and Knives Out, accusing it of copyright infringement.

A 155-page complaint documented a long summary of elements that PUBG believes are infringing on its copyrighted works. This includes buildings, landscapes, vehicles, weapons, clothing, the pre-play area, the shrinking gameplay area, and even the iconic Winner Winner Chicken Dinner salute.

NetEase clearly disagrees with these accusations. In a new filing this week, the company asks the court to dismiss the entire case. It refutes PUBGs accusations and stresses that ideas and gameplay mechanics have no copyright protection.

This litigation is a shameless attempt by the PUBG Plaintiffs to monopolize the battle royale genre of video games and inhibit legitimate competition, NetEase writes.

Plaintiffs copyright claim is premised on alleged similarities in ideas, merger of ideas and expression, scenes a faire, and game rules and mechanics. Copyright does not protect any of these aspects of PUBGs game.

NetEase admits that its games fall into the same genre and share several similarities. However, the idea of displaying a health bar and other basic elements is not copyright infringement, the company argues.

The idea of a health status bar, as well as energy boosts, and the ability of human characters to stand, walk, run, take a prone position, crawl in a prone position or take a kneeling position in a combat situation, are all simply mechanics that flow from the idea of forcing players to kill each other, the company notes.

PUBG itself has admittedly copied several real-world objects such as guns. In order to argue that NetEase expressions of these are virtually identical, and thus infringing, these real-world similarities have to be filtered out. According to NetEase, theres no real claim left after that.

As shown, PUBGs gun has appropriated the design and configuration of the sight, barrel, grip, magazine, and numerous other features from a century-old g...

01:30

Finding Interesting Documents with grep

Title: 
Finding Interesting Documents with grep

01:28

Doing Good Data Science

There has been a lot of healthy discussion about data ethics lately. We want to be clear: that discussion is good, and necessary. But its also not the biggest problem we face. We already have good standards for data ethics. The ACMs code of ethics, which dates back to 1993, is clear, concise, and surprisingly forward-thinking; 25 years later, its a great start for anyone thinking about ethics.

01:15

Hackers automate the laundering of money via Clash of Clans Graham Cluley

Hackers automate the laundering of money via Clash of Clans

Popular smartphone games such as Clash of Clans are being used to launder hundreds of thousands of dollars on behalf of credit card thieves.

Read more in my article on the Tripwire State of Security blog.

01:02

Scientists Made the Fastest-Spinning Molecules Ever to Test the Limits of Physics Lifeboat News: The Blog

Scientists made molecules that spin around each other a billion times per second, the fastest mechanical rotation on record. They want to use these spinning molecules to study the very fabric of spacetime.

The two independent teams were studying how lights energy could make molecules move, and ended up generating incredible spin frequencies. But if the spins are fast enough, it could be a way to measure the friction that particles might feel against spacetime itself.

01:02

Mechanism Behind Drug Resistance in Some Cancers Clarified Lifeboat News: The Blog

Researchers have figured out details about how some specific type of cancers become drug-resistant.


Researchers at the Rockefeller University have clarified the mechanism by which certain types of breast cancer become immune to specific drugs designed to eliminate them. More specifically, they figured out how the loss of the protein 53BP1 due to BRCA1 mutation allows cancers to become insensitive to PARP inhibitors [1].

Study summary

01:00

Expanding the K40 Laser Cutter with Aluminum Extrusion Hackaday

The K40 laser cutter is an excellent option if you need to laze some plywood or acrylic. Its ubiquitous, its cheap, and theres a vast community out there that will help you support any issue you could have. Unfortunately, the K40 laser cutter is lacking. It has a small bed, and it doesnt have the latest technology like switches that turn off the laser when you open the door.

[frederik] recently upgraded his K40 to something great. Hes calling it the Layzor, and it has a huge 600400 mm bed area, a feed-through slot for even wider workpieces, and fancy technology [frederik] is calling an E-stop. Sounds expensive, doesnt it?

The build began by scavenging the K40 laser cutter for the electronics and laser tube, then building a new frame out of aluminum extrusion. A few parts had to be custom made, including a few stepper motor mounts and something to hold the laser tube. All of this was tied up in a box with acrylic panels, and went together as easily as any other CNC machine.

The finished project is great. Its a relatively powerful laser cutter capable of most hobby work, and it was cheap. The total cost for this build was under 500. Thats not including the scavenged K40, but thats still an amazing price for a very capable laser cutter.

A Fast-Food Problem: Where Have All the Teenagers Gone? SoylentNews

NY Times:

A quarter-century ago, there were 56 teenagers in the labor force for every "limited service" restaurant that is, the kind where you order at the counter.

Today, there are fewer than half as many, which is a reflection both of teenagers' decreasing work force participation and of the explosive growth in restaurants.

But in an industry where cheap labor is an essential component in providing inexpensive food, a shortage of workers is changing the equation upon which fast-food places have long relied. This can be seen in rising wages, in a growth of incentives, and in the sometimes odd situations that business owners find themselves in.

Too many restaurants, not enough teens to work in them.


Original Submission

Read more of this story at SoylentNews.

00:54

Augmented Reality Makes Robots Better Co-Workers IEEE Spectrum Recent Content full text

Robots that communicate what they're doing in AR are more efficient (and more pleasant) to work with

Most robots are designed to do work. As such, not a lot of time, effort, or money is spent on making them able to communicate with humans, because theyre usually just doing their own thing. This is starting to change a bit, though, as robots become versatile enough that its reasonable to have humans working with them more directly, and its becoming more important that those humans have some idea what the robot is up to.

Some robots manage this with sounds, or lights, or screens with faces on them, but there are many systems for which hardware modifications like that arent a good option. In one of best papers from all of HRI 2018 (seriously, they won a best paper award), roboticists from the University of Colorado Boulder explore how using augmented reality to help robots communicate with humans can make the bots feel safer, more efficient, and more part of a collaborative team.

When watching a drone (or many other kinds of robots), its not at all obvious what theyre going to do next. Its frequently not at all obvious what theyre doing in the moment, either. If theyre not moving, for example, is that because theyre planning motion? Or because they want to move but somethings in their way? Or maybe theyre just waiting around on purpose? Who knows! But if you want to walk around them, or do other tasks in the same area, you really need to understand what the robot is going to do.

For humans, this happens almost without thinking, because were inherently good at communicating with other humans. Its not just that we talk to each other, but we can predict with quite good accuracy what other people are likely to do. We cant do this naturally with robots, but we can cheat a little bit, by taking advantage of alternate interfaces to see what a robot will do next. This has been done before with screens, but the CU Boulder researchers are testing whether augmented reality (via semi-transparent projections overlayed on a users vision with a Microsoft Hololens) could be much both more intuitive and more effective.

The primary goal of the AR in these contexts is conveying motion intent by displaying what the robot is going to do in the near future. The researchers experimented with several different ways of communicating this:

NavPoints: Displays the robots planned flight p...

00:49

Florida police force motorists out of their vehicles at gunpoint for minor traffic violations MassPrivateI

image credit: CNN

An article in WUFT.org revealed that Florida police are forcing motorists out of their vehicles at gunpoint for minor traffic violations.

"When Keyon Young was asked during a traffic stop one morning last month to step back to a deputys vehicle, he remained in his car out of confusion."

"Young, 18, called his mother when Alachua County Sheriffs Deputy Thomas Thueson pulled him over, telling her he had no idea why Thueson was asking him to get out of his car. His mother, Chanae Jackson-Baker, advised him to remain in his car with his hands on the steering wheel until she could find out what was going on from dispatch."

"His unfamiliarity with the policy led him to ignore the deputys commands until he was pulled from the drivers seat of his car while staring down a Taser and being put in handcuffs."

There is no way of knowing which Florida police officer will force a motorist out of their vehicle.

Because each police department handles minor traffic violations differently!

"Nearly every law enforcement agency that conducts traffic stops in this part of the state has a policy that differs from its neighboring agencies. This means drivers can have different experiences depending on where they are pulled over and which agency makes the stop."

What offenses can motorists be forced out of their vehicles for?

According to the Florida DMV, police will force motorists out of their vehicles for driving 15 MPH over the speed limit or for improperly changing lanes and much more.

Serious offenses include:
...

00:42

Security updates for Thursday LWN.net

Security updates have been issued by Debian (ant, gpac, linux-4.9, linux-latest-4.9, taglib, vlc, and znc), Fedora (ceph), Red Hat (fluentd and qemu-kvm-rhev), Slackware (httpd), and SUSE (e2fsprogs, glibc, libgcrypt, mercurial, openssh, perl, rubygem-sprockets, shadow, and wireshark).

00:40

ZGlue Aims to Make It Cheap and Easy to Produce Wearables and Other IoT Hardware IEEE Spectrum Recent Content full text

Startup says its ZiP chip hits the sweet spotsmaller than a printed circuit board, cheaper than a system-on-chip

Have you taken a look at Kickstarter recently? Earlier this week, entrepreneurs were trying to fund more than 1,400 projects to build some kind of wearable device, and another 200 to build an IoT gadget.

Moving from an idea on Kickstarter to a prototype and then to mass manufacture is challenging, however. Many of these 1,600 developers have yet to find that out; other entrepreneurs have an idea but dont have the time or cash to create a prototype they can display on Kickstarter.

Today, manufacturing a wearable requires either assembling components onto a printed circuit boardan approach that can be counterproductive when you are trying to make a gadget as small and light as possibleor developing a multichip module (MCM) or system-in-package (SIP), custom-built on an organic or ceramic substrate with copper wires connecting chips.

Developing these devices isnt cheap or easy, says Greg Taylor, an advisor to a startup called zGlue thats based in Mountain View, Calif. Its OK if youre part of a big company. If not, though, you may be out of luck. He says zGlue estimates that getting to a prototype SIP could cost a small company more than $200,000.

ZGlue has created what it says is the key to a whole new world of wearable and IoT gadgets: the ZiP chip. (ZiP stands for zGlue Integration Platform) A ZiP chip uses the same off-the-shelf minimally packaged chips as a multichip module, but zGlue says design and manufacturing, using its technology, is vastly simpler, faster, and cheaper.

ZGlues secret sauce is its use of a silicon substrate, with a grid of fine wires for reprogrammable connections between the chips, and some resistors, capacitors, and gates for built-in power management, system management, and memory.

ZGlues cloud-based tools allow designers to position off-the-shelf components on a ZiP chips programmable interconnects Image: ZGlue ZGlues cloud-based tools allow designers to position off-the-shelf components on a ZiP chips programmable interconnects.

To build a ZiP chip, an engineer starts with a cloud-based representation of the grid, and uses drag-and-drop design tools to select from a library of off-the-shelf components. After arranging the various components, the engineer then can use zGlues software to specify the various connection paths, and generate a list of the components and the connections along with a software development kit for the product.

But heres the part that zGlue thinks will really keep the c...

00:24

Australia Says No to Software Patents Techrights

Australian flag

Summary: Rokt is now fighting the Australian patent office over its decision to reject software patents; Shelston IP, an Australian patent law firm (originally from Melbourne), already meddles a great deal in such policies/decisions, hoping to overturn them

LEAVING aside the EPO and USPTO, two of the worlds largest English-speaking patent offices, there has been some news from Australia, where IP Australia (the Australian patent office) told stakeholders that software isnt really patent-eligible anymore. Weve seen several articles about this lately (we mentioned some a week ago) and Lawyerly is the latest to spread the news and shed light on it. Rokts software innovative but not patentable, IP Australia tells court is the headline. Heres the key part: An invention that simply puts a business method or scheme into a computer is not patentable, the Commissioner of Patents told a court Wednesday on the first day of a highly anticipated trial over a rejected software patent application by marketing tech startup Rokt.

This was achieved in the face of great pressure and constant lobbying from law firms.Fantastic! Well done, Australia!

This was achieved in the face of great pressure and constant lobbying from law firms. We wrote about it dozens of times over the years and named some of the culprits. In Australia weve seen Shelston IP quite a lot recently, attacking the policy and smearing officials for doing the right thing. Shelston IP went further than this and attempted the same thing in New Zealand, where software patents have never been allowed.

Earlier this week we saw Shelston IP rearing its ugly head again...

00:22

New study puts a figure on sea-level rise following Antarctic ice shelves collapse Lifeboat News: The Blog

An international team of scientists has shown how much sea level would rise if Larsen C and George VI, two Antarctic ice shelves at risk of collapse, were to break up. While Larsen C has received much attention due to the break-away of a trillion-tonne iceberg from it last summer, its collapse would contribute only a few millimetres to sea-level rise. The break-up of the smaller George VI Ice Shelf would have a much larger impact. The research is published today in the European Geosciences Union journal The Cryosphere.

Recent, rapid warming in the Antarctic Peninsula is a threat to ice shelves in the region, with Larsen C and George VI considered to have the highest risk of . Because these large ice platforms hold back inland glaciers, the ice carried by these glaciers can flow faster into the sea when the ice shelves collapse, which contributes to . The new study shows that a collapse of Larsen C would result in inland ice discharging about 4 mm to sea level, while the response of glaciers to George VI collapse could contribute over five times more to , around 22 mm.

These numbers, while not enormous in themselves, are only one part of a larger sea-level budget including loss from other glaciers around the world and from the Greenland, East and West Antarctic ice sheets. Taken together with these other sources, the impacts could be significant to island nations and coastal populations, explains study-author Nicholas Barrand, a glaciologist at the University of Birmingham in the UK. He adds: The Antarctic Peninsula may be seen as a bellwether for changes in the much larger East and West Antarctic ice sheets as climate warming extends south.

00:01

Delta Clipper: A 1990s Reusable Single-Stage To Orbit Spaceship Prototype Hackaday

With all the talk of SpaceX and Blue Origin sending rockets to orbit and vertically landing part or all of them back on Earth for reuse youd think that they were the first to try it. Nothing can be further from the truth. Back in the 1990s, a small team backed by McDonnell Douglas and the US government vertically launched and landed made versions of a rocket called the Delta Clipper. It didnt go to orbit but it did perform some extraordinary feats.

Origin Of The Delta Clipper

DC-XAThe Delta Clipper was an unmanned demonstrator launch vehicle flown from 1993 to 1996 for testing vertical takeoff and landing (VTOL) single-stage to orbit (SSTO) technology. For anyone who watched SpaceX testing VTOL with its Grasshopper vehicle in 2012/13, the Delta Clippers maneuvers would look very familiar.

Initially, it was funded by the Strategic Defence Initiative Organization (SDIO). Many may remember SDI as Star Wars, the proposed defence system against ballistic missiles which had political traction during the 1980s up to the end of the Cold War.

Ultimately, the SDIO wanted a suborbital recoverable rocket capable of carrying a 3,000 lb payload to an altitude of 284 miles (457 km), which is around the altitude of the International Space Station. It also had to return with a soft landing to a precise location and be able to fly again in three to seven days. Part of the goal was to have a means of...

00:00

Machine Learning: A Micro Primer with a Lawyers Perspective

Title: 
Machine Learning: A Micro Primer with a Lawyers Perspective

00:00

Change Healthcare gives payers and providers the keys to cloud security Help Net Security

Change Healthcare is providing healthcare leaders the keys to cloud security with Change Healthcare Security Management, which includes a Bring Your Own Key (BYOK) service now offered as part of the companys cloud-based HealthQx value-based care analytics suite. Hospitals, payers, and providers are under constant attack from a global network of cybercriminals using advanced and evasive techniques to penetrate networks, steal data, extort healthcare organizations, and capitalize on the personal health information of patients, said More

The post Change Healthcare gives payers and providers the keys to cloud security appeared first on Help Net Security.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 19 July

23:57

Aporeto simplifies service mesh security operations with Istio integration Help Net Security

Aporeto announced its integration with Istio, the open source service mesh platform that connects, manages and secures microservices at scale. Istios service mesh is an open-source effort led by Google, IBM and Lyft that is designed to address the operational needs observability, load-balancing and canary deployments of deploying microservices at scale. Istio introduces security potential into containerized environments that are expensive and complex to develop from scratch, with the promise of enabling encryption More

The post Aporeto simplifies service mesh security operations with Istio integration appeared first on Help Net Security.

23:56

Pivot3 announces surveillance solution to support video deployments Help Net Security

Pivot3 announced the release of its surveillance solution. Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments. With this solution, Pivot3 is streamlining large scale video, security management and storage environments by hosting video management software, security applications and storage on a modular, scalable appliance. The solution can deliver more than 6PB of storage More

The post Pivot3 announces surveillance solution to support video deployments appeared first on Help Net Security.

23:43

Team creates high-fidelity images of Suns atmosphere Lifeboat News: The Blog

In 1610, Galileo redesigned the telescope and discovered Jupiters four largest moons. Nearly 400 years later, NASAs Hubble Space Telescope used its powerful optics to look deep into spaceenabling scientists to pin down the age of the universe.

Suffice it to say that getting a better look at things produces major scientific advances.

In a paper published on July 18 in The Astrophysical Journal, a team of scientists led by Craig DeForestsolar physicist at Southwest Research Institutes branch in Boulder, Coloradodemonstrate that this historical trend still holds. Using advanced algorithms and data-cleaning techniques, the team discovered never-before-detected, fine-grained structures in the outer the Suns million-degree atmosphereby analyzing taken by NASAs STEREO spacecraft. The new results also provide foreshadowing of what might be seen by NASAs Parker Solar Probe, which after its launch in the summer 2018 will orbit directly through that region.

23:42

Time for the Meghalayan: A new geological age has officially been declared Lifeboat News: The Blog

After years of debate, the International Chronostratigraphic Chart has officially been revised. What does that mean, exactly? Our current point in Earths geological timeline has been updated so that were now living in the Meghalayan age, which kicked off 4,200 years ago with a catastrophic two-century drought that destroyed several civilizations.

23:37

GCC 8.2 Release Candidate Arrives For Compiler Testing Phoronix

GCC 8.2 as the first point release to the stable GCC 8 compiler is tentatively set to debut next Thursday, 26 July, but available now for testing is the release candidate...

23:33

Star Citizen Court Documents Reveal the Messy Reality of Crowdfunding a $200 Million Game SoylentNews

Motherboard:

Back in 2012, developer Roberts Space Industries (RSI) launched a Kickstarter asking for money to fund Star Citizenan ambitious space game in the mold of Wing Commander. It's 2018, and while parts of the game are playable in various forms, it's far from achieving what it set out to accomplish. So far, it's collected more than $200 million in funding from fans eager to play it.

Ken Lord was one of those fans, and an early backer of Star Citizen. He's got a Golden Ticket, a mark on his account that singles him out as an early member of the community. In April of 2013, Lord pledged $4,496 to the project. Five years later, the game still isn't out, and Lord wants his money back. RSI wouldn't refund it, so Lord took the developer to small-claims court in California.

It's a simple case of an investor who's upset he didn't get his money back, isn't it?


Original Submission

Read more of this story at SoylentNews.

23:26

Comcast drops out of bidding war with Disney over Fox The Hill: Technology Policy

Comcast has dropped its efforts to buy much of 21st Century Fox, ending a bidding war with The Walt Disney Company over the companys entertainment assets.In a statement on Thursday, Comcast said it would instead focus on acquiring Sky, a...

23:22

Worlds oldest baby snake found preserved in amber Lifeboat News: The Blog

100-million-year-old fossil may provide clues to the habitat and evolution of ancient serpents.

23:22

The public doesnt trust GMOs. Will it trust CRISPR? Lifeboat News: The Blog

Theres a huge opportunity to improve agriculture with gene editing. But we need to give CRISPR a chance.

23:22

Cyber Security Training Courses CISA, CISM, CISSP Certifications The Hacker News

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cybersecurity experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cybersecurity field have gone up 80% over the past three years than

23:22

Martian atmosphere behaves as one Lifeboat News: The Blog

New research using a decade of data from ESAs Mars Express has found clear signs of the complex Martian atmosphere acting as a single, interconnected system, with processes occurring at low and mid levels significantly affecting those seen higher up.

Understanding the Martian is a key topic in planetary science, from its current status to its past history. Mars atmosphere continuously leaks out to space, and is a crucial factor in the planets past, present, and future habitability or lack of it. The planet has lost the majority of its once much denser and wetter atmosphere, causing it to evolve into the dry, arid world we see today.

However, the tenuous atmosphere Mars has retained remains complex, and scientists are working to understand if and how the processes within it are connected over space and time.

23:03

Glowing bacteria on deep-sea fish shed light on evolution, third type of symbiosis Lifeboat News: The Blog

You may recognize the anglerfish from its dramatic appearance in the hit animated film Finding Nemo, as it was very nearly the demise of clownfish Marlin and blue-tang fish Dory. It lives most of its life in total darkness more than 1,000 meters below the ocean surface. Female anglerfish sport a glowing lure on top of their foreheads, basically a pole with a light bulb on its end, where bioluminescent bacteria live. The light-emitting lure attracts both prey and potential mates to the fish.

Despite its recent fame, little is known about anglerfish and their symbiotic relationship with these brilliant , because the fish are difficult to acquire and study.

For the first time, scientists have sequenced and analyzed the genomes of bacteria that live in anglerfish bulbs. The bacteria were taken from fish specimens collected in the Gulf of Mexico.

23:03

Billion-year-old lake deposit yields clues to Earths ancient biosphere Lifeboat News: The Blog

A sample of ancient oxygen, teased out of a 1.4 billion-year-old evaporative lake deposit in Ontario, provides fresh evidence of what the Earths atmosphere and biosphere were like during the interval leading up to the emergence of animal life.

The findings, published in the journal Nature, represent the oldest measurement of atmospheric oxygen isotopes by nearly a billion years. The results support previous research suggesting that oxygen levels in the air during this time in Earth history were a tiny fraction of what they are today due to a much less productive biosphere.

It has been suggested for many decades now that the composition of the atmosphere has significantly varied through time, says Peter Crockford, who led the study as a Ph.D. student at McGill University. We provide unambiguous evidence that it was indeed much different 1.4 billion years ago.

23:02

Links 19/7/2018: Krita 4.1.1, Qt Creator 4.7.0, and Microsoft-Led Lobby Against Android in EU Techrights

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Changes [Pop!_OS]

      For the last 12 years, my main development machine has been a Mac. As of last week, its a Dell XPS 13 running Pop!_OS 18.04.

      [...]

      Take note: this is the first operating system Ive used that is simpler, more elegant, and does certain things better than macOS.

    • System76 Opens Manufacturing Facility to Build Linux Laptops

      As it turns out, System76 is making the transition from a Linux-based computer seller, into a complete Linux-based computer manufacturer. The Twitter photos are from their new manufacturing facility. This means that System76 will no longer be slapping their logo on other companys laptops and shipping them out, but making their own in-house laptops for consumers.

    • Extension adding Windows Timeline support to third-party browsers should have raised more privacy questions

      Windows Timeline is a unified activity history explorer that received a prominent placement next to the Start menu button in Windows 10 earlier this year. You can see all your activities including your web browser history and app activity across all your Windows devices in one place; and pickup and resume activities you were doing on other devices. This is a useful and cool feature, but its also a privacy nightmare.

      You may have read about a cool new browser extension that adds your web browsing history from third-party web browsers including Firefox, Google Chrome, Vivaldi, and others to Windows Timeline. The extension attracted some media attention from outlets like MSPoweruser, Neowin, The Verge, and Windows Central.

    • How to add Linux to your Chromebook

      Its long been possible to run Linux on a Chromebook. Thats no surprise. After...

22:50

U.S. Special Forces: 133 Countries Down, 17 to Go? cryptogon.com

Via: Tom Dispatch: None of this should be surprising, since in Africa and across the rest of the planet Americas Special Operations forces (SOF) are regularly engaged in a wide-ranging set of missions including special reconnaissance and small-scale offensive actions, unconventional warfare, counterterrorism, hostage rescue, and security force assistance (that is, organizing, training, equipping, and []

22:50

Top 10 vulnerable airports where your device can be hacked HackRead

By Waqas

The aviation industry is growing, thanks to millions of passengers

This is a post from HackRead.com Read the original post: Top 10 vulnerable airports where your device can be hacked

22:42

Dont Squish the Jellyfish. Capture It With a Folding Robotic Claw Lifeboat News: The Blog

A new invention could help marine scientists study sea creatures in their natural habitat more effectively without harming them in the process.

22:42

Not classing aging as a disease is not a major problem Lifeboat News: The Blog

A common concern in the community is that the FDA, the EMA, and other bodies, such as WHO, do not classify aging as a disease and that this poses a problem for developing therapies that target aging. However, this is not really as serious an issue as some people would suggest; today, we will have a look at why that is.

Why this will not stop progress

Aging is a variety of distinct processes, damages, and errors; therefore, simply treating aging in clinical terms is not a viable endpoint. For a clinical trial to be conducted, it requires a verifiable indication, and aging is too general for the FDA and EMA to classify it as a disease.

22:33

Putin Claimed Associates of Financier William F. Browder Funneled $400 Million to Clinton Campaign [???] cryptogon.com

Via: NPR: For instance, we can bring up Mr. Browder in this particular case. Business associates of Mr. Browder have earned over one and a half billion dollars in Russia. They never paid any taxes, neither in Russia nor in the United States and yet the money escaped the country, they were transferred to the []

22:33

How to See What's Going on With Your Linux System Right Now

Is that service still running? What application is using that TCP port? These questions and more can be answered easily by sysadmins who know simple Linux commands.

If you're a system administrator responsible for Linux servers, it's essential that you master the Bash shell, especially the commands that show what software is running. That's necessary for troubleshooting, obviously, but it is always a good idea to know what's happening on a server for other reasonsnot the least of which is security awareness.

22:30

How hackers exploit critical infrastructure Help Net Security

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking activity would be increasingly targeted in this direction. It also stands to reason that the salient aspects of hacking namely, remote access, More

The post How hackers exploit critical infrastructure appeared first on Help Net Security.

22:20

Samsung Galaxy S Support With The Linux 4.19 Kernel Phoronix

Just in case you have your hands still on the Samsung Galaxy S or Galaxy S 4G that were released back in 2010 as once high-end Android smartphones, they have DeviceTree support with the upcoming Linux 4.19 kernel cycle...

22:15

BEC scams and real estate deals: How to protect yourself? Help Net Security

Despite constant warnings by law enforcement and industry organizations, BEC scammers continue to fleece companies. They target small, medium, and large business and personal transactions, but have, in the last few years, shown a notable predilection for targeting companies in the real estate sector. What are BEC scams? Business E-mail Compromise (BEC)/E-mail Account Compromise (EAC) is a type of scam targeting both businesses and individuals performing wire transfer payments, and often starts with the attackers More

The post BEC scams and real estate deals: How to protect yourself? appeared first on Help Net Security.

22:03

Rapid7 integrates with Microsoft Azure to provide visibility, analytics, and automation for cloud security Help Net Security

Rapid7 announced integration between Rapid7s Insight platform and Microsoft Azure. This integration provides vulnerability management, analytics-driven incident detection for hybrid environments, and agent deployment within the Azure infrastructure. Rapid7 customers utilizing Azure have, through InsightVM and InsightIDR, increased visibility into security vulnerability and attacks within their cloud and hybrid environments. Todays security teams must work across IT and DevOps to maintain secure environments through orchestrated and automated processes that reduce risk while also limiting impact More

The post Rapid7 integrates with Microsoft Azure to provide visibility, analytics, and automation for cloud security appeared first on Help Net Security.

22:00

Retail data breaches continue to reach new highs Help Net Security

Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to 52% last year, exceeding the global average. U.S retail is also more inclined to store sensitive data in the cloud as widespread digital transformation is underway, yet only 26% report implementing encryption trailing the global average. Year-over-year breach rate takes a turn for the More

The post Retail data breaches continue to reach new highs appeared first on Help Net Security.

21:59

Official: the Shape of the Smartphone Is Changing Forever SoylentNews

El Reg:

The shape of the smartphone is changing as a fad turns into a long-term trend, a business analyst has noted.

Analyst outfit IHS Markit said it expected wide aspect ratios either 18:9 or 18+:9 to make up two-thirds of new device sales in Q3 of this year. At the start of 2017, the "traditional" 16:9 ratio display was seen on over 95 per cent of phones sold.

The taller, narrower shape is no longer a flagship feature, the company noted.

"Smartphone makers are now aggressively applying 18:9 aspect ratio of TFT LCD to their 2018 models even for mid-end and entry-level smartphones, instead of using high-priced flexible AMOLED panels," said IHS Markit's Hiroshi Hayase.

Still no slide-out keyboards. Lame.


Original Submission

Read more of this story at SoylentNews.

21:57

Pentagon Sees Quantum Computing as Key Weapon for War in Space cryptogon.com

Disclosure: I am long Quantum Resistant Ledger (QRL). I had not heard of quantum technologies being applied to inertial navigation systems before. Check out this 2014 piece from New Scientist: IN 2016 a British submarine will slip its moorings and set sail under the guidance of the quantum world. The navigation system it will []

21:45

Inside look at lifecycle of stolen credentials and extent of data breach damage Help Net Security

Shape Security released its Credential Spill Report, shedding light on the extent to which the consumer banking, retail, airline and hospitality industries are impacted by credential stuffing attacks and account takeover. The report analyzes attacks that took place in 2017 and reveals 2.3 billion account credentials were compromised as a result of 51 independent credential spill incidents. Credential stuffing collectively costs U.S. businesses over $5 billion a year. When usernames and passwords are exposed, or More

The post Inside look at lifecycle of stolen credentials and extent of data breach damage appeared first on Help Net Security.

21:30

Attention all passengers: Airport networks are putting you at risk! Help Net Security

Coronet released a report identifying San Diego International Airport, John Wayne Airport-Orange County (CA) International Airport and Houstons William P. Hobby International Airport as Americas most cyber insecure airports. The purpose of the report is to inform business travelers of how insecure airport Wi-Fi can inadvertently put the integrity and confidentiality of their essential cloud-based work apps (G-Suite, Dropbox, Office 365, etc.) at risk, and to educate all other flyers on the dangers of connecting More

The post Attention all passengers: Airport networks are putting you at risk! appeared first on Help Net Security.

21:21

Baking Soda for Inflammation cryptogon.com

Via: Lew Rockwell: Researchers at the Medical College of Georgia have discovered a nerve center in a cell layer in the spleen that controls the immune response and therefore inflammation throughout the body. Given that virtually all chronic age-related disease involves inflammation (called inflammaging), this discovery is of monumental significance and has widespread application for []

21:15

Video: Network Criticals SmartNA-PortPlus Network Packet Broker Help Net Security

Network Criticals innovative SmartNA-PortPlus Network Packet Broker bridges the gap between todays ultra high speed networks and existing management, monitoring and security tools. The SmartNA-PortPlus provides up to 48 ports of 10/25Gbps plus 6 ports of 40/100Gbps in a non-blocking single RU chassis, enabling users to interconnect different network protection and monitoring tools quickly and easily. Beyond server ready high speed connectivity for security and monitoring tools, the SmartNA-PortPlus is also a feature rich traffic More

The post Video: Network Criticals SmartNA-PortPlus Network Packet Broker appeared first on Help Net Security.

21:13

The United States of Arms cryptogon.com

Via: Will Geary: The United States of Arms from Will Geary on Vimeo. U.S. weapons exports from 1950 to 2017. Data from the Stockholm International Peace Research Institute's Arms Transfers Database. Units are expressed in trend indicator values (TIV). Each dot on the map = one TIV. Visualization by Will Geary.

21:00

Whats Inside A Scientology E-Meter? Hackaday

This is something weve been waiting a very long time for. The Church of Scientology uses devices called E-Meters to measure Thetans in the body. Were not going to discuss this further, because we dont want to be murdered. In reality, the E-Meter is simply a device that costs five thousand dollars and only measures the resistance of the human body. It does this by having the subject hold two copper cylinders and a simple Wheatstone bridge. Why does the E-Meter cost five thousand dollars? As [Play With Junk] found out, its an exquisitely engineered piece of hardware.

[Play With Junk] acquired this E-Meter from eBay for something around $100, and from a system-level analysis, its really not anything special. Theres a fancy analog meter, yes, but most of this wouldnt be out of place in any 90s-era piece of test equipment. Theres an 8051 microcontroller reading what are probably some fancy ADCs, and theres an LCD driver on board. Slap it in a fancy injection-molded case, and you have an E-Meter.

Whats most impressive is the quality of the components that go into a machine that effectively only measures the resistance of the human body. The trim pot is a Vishay wire-wound precision potentiometer that costs somewhere between $20 and $60. The power switch is an over-specced switch that probably costs $5. The control pots look and feel great, and the wiring is wrapped around chokes.

This is an exceptionally well-engineered device, and it shows. Theres an incredible amount of work that went into the electronics, and a massive amount of money that went into the fancy injection molded enclosure. If youre looking for an example of a well-engineered tool, price be damned, you need only look at an E-Meter.

Check out the video below of the entire teardown.

20:52

Can You Name a Country? cryptogon.com

Via: YouTube Jimmy Kimmel Live:

20:42

Creating Genetically Modified Babies Is Morally Permissible, Says Ethics Committee Lifeboat News: The Blog

https://paper.li/e-1437691924#/


In a newly released report, an influential UK ethics council concludes that editing human embryos is morally permissible.

20:30

Russia: Remains of the Murdered Romanovs 'Authentic' SoylentNews

DW:

New DNA tests on bones of Russia's last czar, Nicholas II, and his family confirm they are authentic. Researchers exhumed Nicholas's father Alexander III himself assassinated in 1881  to prove "they are father and son."

The test results could lead to the Russian Orthodox Church recognizing the remains for a full burial. It said it would consider the findings and commended the progress of the investigation.

Nicholas II, his German-born wife and their five children were shot by Bolsheviks as a consequence of the October Revolution of 1917. The bodies of the last members of the Romanov dynasty were thrown into a mineshaft, before being burned and hurriedly buried by the killers. They were first tracked down by amateur historians in 1979, although the discovery was only revealed in 1991. The Russian Orthodox Church had recognized the ex-tsar as a martyred saint in 1981.

[Ed. note: Anastasia's supposed escape and possible survival was one of the most popular historical mysteries of the 20th century, False reports of survival]


Original Submission

Read more of this story at SoylentNews.

20:27

Microsoft offers up to $100,000 to identity bug finders Graham Cluley

Microsoft offers up to $100,000 to identity bug finders

Want to earn $100,000? You could win as much as that if you manage to uncover a serious vulnerability in Microsofts various identity services.

Read more in my article on the Hot for Security blog.

20:08

g2k18 Hackathon Report: Klemens Nanni on improvements to route(8), pfctl(8), and mount(2) OpenBSD Journal

The next g2k18 report comes from Klemens Nanni (kn@), who writes:

With no clear goal in mind, I mainly set out to g2k18 for meeting new faces, discovering the city and to wander off through various places in our tree

Read more

20:00

San Francisco: Non-Citizens Legally Register to Vote in San Francisco School Elections cryptogon.com

Via: Sacramento Bee: San Francisco began registering non-citizens, including undocumented immigrants, to register to vote Monday in the November election for the city school board, reported The San Francisco Chronicle. The move follows passage of a 2016 ballot measure by San Francisco voters opening school elections to non-citizens who are over the age of 18, []

20:00

Media figures lament toxic Twitter The Hill: Technology Policy

High-profile journalists are saying they might leave Twitter after tweets attacking them and family members.The latest controversy is underscoring how the popular social media platform has become toxic in the current political climate.CNN reporter...

19:59

Optimized Clear Linux Kernel Now Available for Fedora 28 and Fedora Rawhide

A recent devel list discussion for popular Linux distro Fedora mentioned Clear Linux optimizations, which may be relevant to Fedora developers in the future. It was mentioned that Intels Clear Linux show noticeable performance gains over Xubuntu, as based on graphs by Phoronix.

A Fedora user then decided to release a Clear Linux optimized Fedora kernel for Fedora 28 and Fedora Rawhide, with the following notes:

19:10

Smashing Security #087: How Russia hacked the US election Graham Cluley

Smashing Security #087: How Russia hacked the US election

Regardless of whether Donald Trump believes Russia hacked the Democrats in the run-up to the US Presidential election or not, we explain how they did it. And Carole explores some of the creepier things being done in the name of surveillance.

All this and much more is discussed in the latest edition of the award-winning Smashing Security podcast by computer security veterans Graham Cluley and Carole Theriault.

19:09

U.S. to Make More Drugs Easily Available, Cutting Role Docs Play SoylentNews

Bloomberg:

Americans may soon be able to get cholesterol-lowering medications and other widely used prescription drugs without seeing a doctor, a first step in what could amount to sweeping changes to how patients access treatments for chronic conditions.

The Food and Drug Administration in a draft guideline on Tuesday outlined how such a status, which the agency said could help lower health-care costs, would work. Patients could answer questions on a mobile-phone app to help determine whether they should be able to access a medication without a prescription.

"Our hope is that the steps we're taking to advance this new, more modern framework will contribute to lower costs for our health care system overall and provide greater efficiency and empowerment for consumers by increasing the availability of certain products that would otherwise be available only by prescription," FDA Commissioner Scott Gottlieb said in a statement.

Order your drugs from a smartphone app.


Original Submission

Read more of this story at SoylentNews.

19:07

[slackware-security] httpd (SSA:2018-199-01) Bugtraq

Posted by Slackware Security Team on Jul 19

[slackware-security] httpd (SSA:2018-199-01)

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.34-i586-1_slack14.2.txz: Upgraded.
This update fixes two denial of service issues:
mod_md: DoS via Coredumps on specially crafted requests
mod_http2: DoS for HTTP/2 connections by...

19:02

[SECURITY] [DSA 4252-1] znc security update Bugtraq

Posted by Moritz Muehlenhoff on Jul 19

-------------------------------------------------------------------------
Debian Security Advisory DSA-4252-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 18, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : znc
CVE ID : CVE-2018-14055 CVE-2018-14056

Jeriko...

19:02

Barack Obama suggests cash handouts be considered to address workforce challenges Lifeboat News: The Blog

But even though money is necessary, its not sufficient to provide human beings a sense of satisfaction, Obama cautioned. As more and more tasks and services become automated with the rise of artificial intelligence, thats going to make the job of giving everybody work that is meaningful tougher, and were going to have to be more imaginative, and the pace of change is going to require us to do more fundamental re-imagining of our social and political arrangements, to protect the economic security and the dignity that comes with a job.


The former president says were going to have to consider new ways of thinking as technology threatens current labor markets.

18:59

Raven Ridge APUs Get Minor Performance Boost With Latest RADV Vulkan Driver Phoronix

The Raven Ridge Linux support continues to maturing. The latest on these Zen+Vega APUs using the open-source AMD Radeon Linux graphics driver stack should be slightly better performance when using the RADV Vulkan driver...

18:59

GhostMail - (filename to link) POST Inject Web Vulnerability Bugtraq

Posted by Vulnerability Lab on Jul 19

Document Title:
===============
GhostMail - (filename to link) POST Inject Web Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1471

Release Date:
=============
2018-06-26

Vulnerability Laboratory ID (VL-ID):
====================================
1471

Common Vulnerability Scoring System:
====================================
4.2

Vulnerability Class:
====================
Cross Site...

18:50

[SECURITY] [DSA 4251-1] vlc security update Bugtraq

Posted by Moritz Muehlenhoff on Jul 19

-------------------------------------------------------------------------
Debian Security Advisory DSA-4251-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 18, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : vlc
CVE ID : CVE-2018-11529

A use-after-free was...

18:45

Binance v1.5.0 - Insecure File Permission Vulnerability Bugtraq

Posted by Vulnerability Lab on Jul 19

Document Title:
===============
Binance v1.5.0 - Insecure File Permission Vulnerability

References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2135

Release Date:
=============
2018-07-17

Vulnerability Laboratory ID (VL-ID):
====================================
2135

Common Vulnerability Scoring System:
====================================
2.5

Vulnerability Class:
====================
Access Permission...

18:45

GhostMail - (Status Message) Persistent Web Vulnerability Bugtraq

Posted by Vulnerability Lab on Jul 19

Document Title:
===============
GhostMail - (Status Message) Persistent Web Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1470

Release Date:
=============
2018-06-27

Vulnerability Laboratory ID (VL-ID):
====================================
1470

Common Vulnerability Scoring System:
====================================
4

Vulnerability Class:
====================
Script Code...

18:43

Barracuda Cloud Control v3.020 - CS Cross Site Vulnerability Bugtraq

Posted by Vulnerability Lab on Jul 19

Document Title:
===============
Barracuda Cloud Control v3.020 - CS Cross Site Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=662

Release Date:
=============
2018-07-18

Vulnerability Laboratory ID (VL-ID):
====================================
662

Common Vulnerability Scoring System:
====================================
3.3

Vulnerability Class:
====================
Cross Site...

18:36

Defense in depth -- the Microsoft way (part 56): 10+ year old security update installers are susceptiblle to 20+ year old vulnerability Bugtraq

Posted by Stefan Kanthak on Jul 19

Hi @ll,

Microsoft released <https://support.microsoft.com/en-us/help/4336919>
"Description of the security update for the remote code execution
vulnerability in Visual Studio 2010 Service Pack 1: July 10, 2018"
some days ago.

The executable installer VS10SP1-KB4336919-x86.exe offered for
download from <https://aka.ms/vs/10/release/4336919> alias
<...

18:22

Mid-week Cancer Study and Emergency Drill Fill Station Schedule Lifeboat News: The Blog

Cancer and rodent studies were on the crews timeline today to help doctors and scientists improve the health of humans in space and on Earth. The crew also conducted an emergency drill aboard the International Space Station.

Flight Engineer Serena Aun-Chancellor examined endothelial cells through a microscope for the AngieX Cancer Therapy study. The new cancer research seeks to test a safer, more effective treatment that targets tumor cells and blood vessels. Commander Drew Feustel partnered with astronaut Alexander Gerst and checked on mice being observed for the Rodent Research-7 (RR-7) experiment. RR-7 is exploring how microgravity impacts microbes living inside organisms.

Astronaut Ricky Arnold and Gerst collected and stowed their blood samples for a pair of ongoing human research studies. Arnold went on to work a series of student investigations dubbed NanoRacks Module-9 exploring a variety of topics including botany, biology and physics.

18:01

A Farewell to Printrbot Hackaday

Its with a heavy heart that we must report Printrbot has announced they are ceasing operations. Founded in 2011 after a wildly successful Kickstarter campaign, the company set out to make 3D printing cheaper and easier. Their first printer was an amalgamation of printed parts and wood that at the time offered an incredible deal; when the Makerbot CupCake was selling for $750 and took 20+ hours to assemble, the Printrbot kit would only run you $500 and could be built in under an hour.

Brook Drumm, Founder of Printrbot

Printrbot got their foot in the door early, but the competition wasnt far behind. The dream of Star Trek style replicators fueled massive investment, and for a while it seemed like everyone was getting into the 3D printing game. Kit built machines gave way to turn-key printers, and the prices starting coming down. Printrbots products evolved as well, dropping wood in favor of folded steel and pioneering impressive features like automatic bed leveling....

17:37

Premier League Obtains Piracy Blocking Order For 2018/19 Season TorrentFreak

Top tier football broadcast licensing in the UK is handled by the Premier League but like all content owners, it faces a threat from unauthorized providers.

Instead of paying significant monthly subscriptions to broadcasters such as Sky and BT Sport, large numbers of fans are turning to piracy-enabled set-top boxes for their fix. While not as sleek as their official counterparts, they can provide a cheap alternative for those on a budget.

Often Kodi-powered, these devices are augmented with third-party addons that facilitate access to streams freely available online or the more select offerings of organized IPTV providers. They also allow fans to access games during the 3pm blackout period when no official broadcaster is allowed to transmit live football.

In an effort to reduce this threat, March last year the Premier League obtained a blocking injunction from the High Court which compelled ISPs including BT, Sky, TalkTalk and Virgin Media to block unauthorized streams in real-time.

Granted under Section 97a of the Copyright, Designs and Patents Act, the order gave the Premier League the ability to target the suppliers of illegal streams to IPTV boxes, and the internet, in a proportionate and precise manner.

Figures subsequently released by the football organization revealed that under the injunction it was able to block 5,000 server IP addresses that were streaming its content illegally. That success encouraged the league to apply for a fresh injunction for the 2017-18 season.

A second order was handed down by the High Court in July 2017 and quickly began producing results for the Premier League.

It ran from August 12, 2017 to May 13, 2018 but contained a clause which gave the Premier League the right to apply for an extension for a further season. That application was made a little while ago and has now been granted by the High Court.

The extended order affects BT, EE, Plusnet, Sky, TalkTalk and Virgin Media, meaning that all customers of these ISPs attempting to watch live pirate Premier League football via the Internet could be suddenly subjected to a block. There are no consequences for users caught up in the blocking efforts, other than to have their big game enjoyment curtailed.

The extended order, which was signed by Mr. Justice Arnold after being considered on paper&#8217...

17:33

'Netflix Effect' Poses Challenge to British TV SoylentNews

BBC:

Video streaming services such as Netflix and Amazon Prime now have more subscribers than traditional pay TV services in the UK, new data from Ofcom has revealed.

The media regulator says British TV will have to change the way it operates if it wants to compete with the internet giants.

Sharon White, Ofcom's chief executive, says: "We'd love to see broadcasters such as the BBC work collaboratively with ITV, Channel 4 and Channel 5 so that they have got that scale to compete globally, making shows together, co-producing great shows that all of us can watch.

"I think it would be great to see a British Netflix."

BrexitFlix?


Original Submission

Read more of this story at SoylentNews.

17:30

Fedora 29 Aims To Better Support FPGAs Phoronix

A rather late self-contained feature proposal for the in-development Fedora 29 is to better support FPGAs...

17:00

Cisco fixes critical and high severity flaws in Policy Suite and SD-WAN products Security Affairs

Cisco has found over a dozen critical and high severity vulnerabilities in its Policy Suite, SD-WAN, WebEx and Nexus products.

The tech giant has reported customers four critical vulnerabilities affecting the Policy Suite.

The flaws tracked as CVE-2018-0374CVE-2018-0375CVE-2018-0376, and CVE-2018-0377 have been discovered during internal testing.

Two of these flaws could be exploited by a remote unauthenticated attacker to access the Policy Builder interface and the Open Systems Gateway initiative (OSGi) interface.

The access to the Policy Builder interface could allow an attacker to change to existing repositories and create new ones, while the access to the OSGi interface could allow an attacker to access or change any file accessible by the OSGi process.

An unauthenticated attacker could also allow an attacker to modify any data contained in the Policy Builder database.

A vulnerability in the Policy Builder database of Cisco Policy Suite could allow an unauthenticated, remote attacker to connect directly to the Policy Builder database. reads the security advisory published by Cisco.

The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by connecting directly to the Policy Builder database. A successful exploit could allow the attacker to access and change any data in the Policy Builder database.

CISCO Policy Suite

Cisco also warned of the presence of the Cluster Manager in Policy Suite of a root account with default and static credent...

17:00

Arctic Ice Thickness has Recovered 44% since 2012 Terra Forming Terra

 

We now have a real perspective.  the Ice collapse maxed in 2012 as i predicted back in 2007.  The heat bulge produced by the 1998 El Nino was used up and the normal chill reasserted itself and we now have an uptrend that is taking us back to the original pre 1998 stat channel.

Once again it all appears to be normal variation and with the additional decline taking place in solar output the down side may well be deep this time around. 

The present balance of probabilities are all pointing down with little upside drivers available.

The rest of the world should catch on in a decade or so. 

 

Truth In Labeling At The New York Times : NOT REAL NEWS

...

CDC vaccine science hides giant conflict of interest Terra Forming Terra






The whole vaccine industry is proving up to be a long standing criminal conspiracy launched during the first War and plausibly bringing about the huge flue pandemic in 1918.  The cover up was the Flue pandemic story.  That was then used to peddle a whole range of suspect vaccines since then. 

I cannot prove that this is actually true.  But it happens to be plausible, not least because we have been peddled a steady stream of vaccines for nonexistent pandemics and to protect against a wide range of problems that never were obviously infectious.

We have shut down most of our real pandemic problems through improving public health.  It is almost impossible to receive an excessive dose of any particular bug.  Thus our own immune systems can actually do the whole job and has been even going back to the days of polio.

It is reasonable that certain specific endemic diseases have been resolved through vaccination.  Not easily though and we all can name them and identify them. The rest do not fit the description of endemic except flu which is naturally pernicious in changing its characteristics.

From the increasing literature on this topic, i suggest that the real fight is on and a major scientific inquiry is mandated along with forensic investigations of the history of what may turn out to be a pure criminal racket that has killed and damaged millions....

.

CDC vaccine science hides giant conflict of interest

Posted by Jon Rappoport

http://www.dcclothesline.com/2018/07/08/cdc-vaccine-science-hides-giant-conflict-of-interest/

If you wanted to buy a product

And the main safety-researcher of the product was the company selling it to you

Would you automatically assume the product was safe and effective?

But you see, thats the just the beginning of the problem. Suppose the companys research was cited thousands of times in the press, as the authoritative standard of proofand anyone who disputed that research was labeled a conspiracy theorist and a quack and a danger to the community and an anti-science lunatic.

Would you begin to suspect the company had awesome media connections? Would you suspect some very powerful people were backing the company?
...

17:00

Victoria Nuland's Rage on Upcoming Trump Summits Terra Forming Terra

 


The whole Neocon enterprise was something only the military industrial complex could love and their rationals have steadily become more outrageous.

That Cheney moved seamlessly from high office to Halliburton high office was always disturbing.  Under Reagan we essentially had no wars because he choked them off.  With HW Bush we have never let up.  Even Saddam felt that he had been set up and the interesting question is just how much.

All the same names are still out there and Trump has been piece by piece dismantling the whole rubbish heap.  So we now hear their rage as they know full well that their whole Russian meme has been contrived and that Trump and Putin know.

This is one reason i am seriously optimistic about Helsinki.  Putin has plenty to share with Trump and the reverse is true.  The bigger plan is an United States of Europe built out of the EU and Russia et al with a prospective Russian president who can work with trump to implement a pan western political hegemony.  Such a system will see an elected president following the American model to a large degree simply because of the living experience

This approach can be enhanced by ending poverty but that is not necessary to get it all going....

.



Victoria Nuland's Rage on Upcoming Trump Summits 

Written by Stephen Lendman  
Date: 07-08-2018 

Victoria Nuland's Rage on Upcoming Trump Summits

by Stephen Lendman (stephenlendman.org - Home - Stephen Lendm...

17:00

Mueller Probe ending with no Russian Collusion Terra Forming Terra



You may not have noticed, but those Russian indictments were legitimate enough as a housekeeping action that you do to close the file.  Rosenstein specifically stated that no collusion had been found when they put those indictments out.  We are about to soon receive a final report from Mueller and Rosenstein was using the key phrases in his statement.  It is over.  The Russian indictments have been sent on to die a natural death.


Listen to Rush here.  He gets it.











16:19

Expert discovered RoboCent AWS S3 bucket containing US voters records exposed online Security Affairs

A security researcher has discovered that the US political robocall firm RoboCent exposed personal details of hundreds of thousands of US voters.

The US political robocall firm RoboCent exposed personal details of hundreds of thousands of US voters.

The researcher Bob Diachenko from Kromtech Security discovered the company database exposed online. The expert was using the online service GrayhatWarfare that could be used to search publicly exposed Amazon Web Services data storage buckets.

The company offers for sale voter records for a price of 3/record, the same data that left exposed online.

Querying the system for the term voters he found the AWS bucket used by RoboCent.

The bucked discovered by the expert contained 2,584 files, exposed voters data includes:

  • Full Name, suffix, prefix
  • Phone numbers (cell and landlines)
  • Address with house, street, city, state, zip, precinct
  • Political affiliation provided by state, or inferred based on voting trends/history
  • Age and birth year
  • Gender
  • Jurisdiction breakdown based on district, zip code, precinct, county, state
  • Demographics based on ethnicity, language, education

RoboCent exposed data

The server also contained audio files with prerecorded political messages used for the robo-calling service.

Just when I thought the days of misconfigured AWS S3 buckets are over, I discovered a massive US voter data online, apparently being part of Robocent, Virginia Beach-based political autodial firms cloud storage. wrote Diachenko.

Many of the files did not originate at Robocent, but are instead the aggregate of outside data firms such as NationalBuilder.

Diachenko responsibly disclosed the discovery to the company that quickly secured the bucket, below the message sent by a developer...

16:02

No More Zigzags: Scientists Uncover Mechanism That Stabilizes Fusion Plasmas SoylentNews

Phys.org:

Sawtooth swingsup-and-down ripples found in everything from stock prices on Wall Street to ocean wavesoccur periodically in the temperature and density of the plasma that fuels fusion reactions in doughnut-shaped facilities called tokamaks. These swings can sometimes combine with other instabilities in the plasma to produce a perfect storm that halts the reactions. However, some plasmas are free of sawtooth gyrations thanks to a mechanism that has long puzzled physicists.

Researchers at the U.S. Department of Energy's (DOE) Princeton Plasma Physics Laboratory (PPPL) have recently produced complex simulations of the process that may show the physics behind this mechanism, which is called "magnetic flux pumping." Unraveling the process could advance the development of fusion energy.

[...] In the PPPL simulations, magnetic flux pumping develops in "hybrid scenarios" that exist between standard regimeswhich include high-confinement (H-mode) and low-confinement (L-mode) plasmasand advanced scenarios in which the plasma operates in a steady state. In hybrid scenarios, the current remains flat in the core of the plasma while the pressure of the plasma stays sufficiently high.

This combination creates what is called "a quasi-interchange mode" that acts like a mixer that stirs up the plasma while deforming the magnetic field. The mixer produces a powerful effect that maintains the flatness of the current and prevents the sawtooth instability from forming. A similar process maintains the magnetic field that protects the Earth from cosmic rays, with the molten liquid in the iron core of the planet serving as mixer.

Will it bottle the lightning?


Original Submission

Read more of this story at SoylentNews.

15:18

Nouveau Changes Queue Ahead Of Linux 4.19 Phoronix

Linux 4.19 is going to be another exciting kernel on the Direct Rendering Manager (DRM) front with a lot of good stuff included while hours ago we finally got a look at what's in store for the open-source NVIDIA "Nouveau" driver...

15:02

NASAs Sending a Satellite to the Sun Lifeboat News: The Blog

Mankind is about to get closer to the sun than ever before.

15:00

Twitch Stream Turned Infinity Mirror Hackaday

Making use of that webcam in 2018.

While you might think youve already seen every possible variation of this classic visual trick, [Matt Nishi-Broach] recently wrote in to tell us about an infinity mirror effect hes created using the popular streaming platform Twitch. The public is even invited to fiddle with the visuals through a set of commands that can be used in the chat window.

It works about how youd expect: the stream is captured, manipulated through various filte...

14:43

12 New Moons Were Found Orbiting Jupiter Lifeboat News: The Blog

Jupiter already had the most moons in the solar system but they just found another dozen.

14:33

Open MongoDB Database Exposes Mobile Games Money Laundering Operation SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

The US Department of Justice, Apple, and game maker Supercell, have been warned of a money laundering ring that uses fake Apple accounts and gaming profiles to make transactions with stolen credit/debit cards and then sells these game premiums on online sites for the group's profit.

This operation came to light in mid-June when security researchers from Kromtech Security came across a MongoDB database that had been left exposed online without authentication.

"As we examined the database we rapidly became aware that this was not your ordinary corporate database," said Kromtech researcher Bob Diachenko.

"This database appeared to belong to credit card thieves (commonly known as carders) and that it was relatively new, only a few months old," he added.

Source: Open MongoDB Database Exposes Mobile Games Money Laundering Operation


Original Submission

Read more of this story at SoylentNews.

14:31

NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 19 Jul, 2018 4:31:33 UTC

The new edition of Off The Hook from 18/07/2018 has been archived and is now available online.

14:05

Freedreno Gallium3D Now Exposes Adreno A5xx Performance Counters Phoronix

It's been a while since last having any news to report on Freedrenon, the open-source, community-driven Gallium3D driver for providing accelerated 3D support for Qualcomm Adreno graphics hardware. But ahead of the upcoming Mesa 18.2 feature freeze, Freedreno founder Rob Clark has been landing a number of improvements...

13:22

Blue Origin successful rocket launch Lifeboat News: The Blog

This Blue Origin rocket went higher than any previous rocket launched by Jeff Bezoss company.

13:07

Red Hat Ansible Engine 2.6 enables cloud, network, and Windows automation Help Net Security

Red Hat announced the availability of Red Hat Ansible Engine 2.6, the latest release of its agentless open source IT automation solution. Red Hat Ansible Engine 2.6 adds new content for automating across hybrid and multicloud environments, along with simplified connections to network APIs and updates for Ansible deployments overseeing Windows environments. When Red Hat Ansible Engine 2.6 combines with Red Hat Ansible Tower, Red Hats centralized control plane for managing and optimizing automated systems More

The post Red Hat Ansible Engine 2.6 enables cloud, network, and Windows automation appeared first on Help Net Security.

13:06

Fugue announces Phillip Merrick as CEO Help Net Security

Fugue announced it has hired Phillip Merrick as CEO. Merrick will drive strategy and lead the companys operations across product, marketing and sales. Drawing on more than 20 years of experience growing enterprise software and SaaS companies, he will also lead Fugues efforts to educate the market about technology that changes the way enterprises address issues such as policy compliance and configuration drift in the cloud. As founder and CEO, Merrick took webMethods public in More

The post Fugue announces Phillip Merrick as CEO appeared first on Help Net Security.

13:05

ThreatConnect enhances threat intelligence, analytics and orchestration capabilities Help Net Security

ThreatConnect announces new Playbooks enablements to optimize the ability to make faster security decisions, automate processes, and improve reaction and response capacity. Our vision is a Platform that transforms the way that security professionals do their jobs, CEO Adam Vincent said. Ive said this beforethe only way to augment humans is to act like them. Humans use data to produce knowledge that becomes wisdom. That wisdom is the equivalent of our Intelligence and is what More

The post ThreatConnect enhances threat intelligence, analytics and orchestration capabilities appeared first on Help Net Security.

13:04

ManageEngine extends its SIEM solution log management capabilities to the cloud Help Net Security

ManageEngine announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud. Log360 Cloud allows IT administrators to store and manage log data collected from on-premises environments on Zohos secure cloud platform, giving enterprises insight on aspects of their network without having to worry about storage infrastructure. According to Gartner, cloud-based SIEM deployments are expected to reach $512.1 million in 2019. Small and midsize More

The post ManageEngine extends its SIEM solution log management capabilities to the cloud appeared first on Help Net Security.

13:04

Nehemiah Security upgrades Exploit Quantifier platform Help Net Security

Nehemiah Security announced upgrades to the EQ (Exploit Quantifier) platform. EQ tests the effectiveness of an organizations endpoint configuration against malware and other attacks by leveraging cyberwarfare tools to characterize, model and predict attack outcomes in a customized, virtual environment. This configurable framework establishes scalable and repeatable testing to generate high-fidelity cyberattack intelligence. Security teams leverage this automated functionality to perform what-if scenarios, train security personnel, and strengthen their defensive posture. Security leaders must understand More

The post Nehemiah Security upgrades Exploit Quantifier platform appeared first on Help Net Security.

13:02

Mark Woodward joins Armor as CEO Help Net Security

Armor announced that Mark Woodward has joined Armors leadership team as Chief Executive Officer (CEO). Armor founder and former CEO Chris Drake is stepping into the Chief Technology Officer (CTO) role as product strategist and evangelist and will continue as a member of the Board. Armor is in a unique position to be the definitive leader of cloud security, and I am very excited that Mark is joining Armor to help realize that vision, said More

The post Mark Woodward joins Armor as CEO appeared first on Help Net Security.

13:00

Do Religious People Really Have a Problem with Evolution? - Issue 62: Systems Nautilus


My Evolution: Living Along the Spectrum of Science & Religion is of SRES and Jordan Collver, 2018.

The comic was created by Jordan Collver as part of a media fellowship run by The Centre for Science, Knowledge and Belief in Society in 2017, and features research from the Science and Religion: Exploring the Spectrum project. The project was funded by the Templeton Religion Trust and involved researchers from Newman University, the University of Kent, York University (Canada), Kent State University, and the British Library.

For more information about the research go to www.sciencereligionspectrum.org or find the project on Twitter @scirelspec


Read More

Blood Spatter Will Tell - Issue 62: Systems Nautilus


By the time Donald Johnson got the call to come to the crime scene, the victim had been dead for hours. A first responder opened the apartment door to find a woman lying on the edge of her bed, nude from the waist down, bound and gagged with duct tape. She had been bludgeoned to death. The homicide detectives needed an expert to gather the evidence. That was where Johnson came in.

Then a senior criminalist for the Los Angeles County Sheriffs Department, Johnson surveyed the apartment. Shards of ceramic lay on the kitchen floor, remnants from a broken jar that once held flour. Johnson noticed two sets of footprints in the flour, ignaling to him that there were two assailants. Clothes spilled from a chest against the wall across from the bed. From the mangled lock, Johnson could tell the chest had been forcibly opened, perhaps with a crowbar. There was also blood on the lock, with a trail of drops on the floor leading to the sink where the assailant had washed his hands.

It was more than enough blood evidence for Johnson to get a complete DNA profile.

This ghastly crime happened 28 years ago, but a
Read More

Why Our Intuition About Sea-Level Rise Is Wrong - Issue 62: Systems Nautilus


Jerry Mitrovica has been overturning accepted wisdom for decades. A solid Earth geophysicist at Harvard, he studies the internal structure and processes of the Earth, which has implications for fields from climatology to the timing of human migration and even to the search for life on other planets. Early in his career he and colleagues showed that Earths tectonic plates not only move from side to side, creating continental drift, but also up and down. By refocusing attention from the horizontal of modern Earth science to the vertical, he helped to found what he has nicknamed postmodern geophysics. Recently Mitrovica has revived and reinvigorated longstanding insights into factors that cause huge geographic variation in sea level, with important implications for the study of climate change today on glaciers and ice sheets.

We caught up with Mitrovica in his airy office next to Harvards renowned mineral collection. Though a practiced public speaker and recipient of numerous awards, in person he speaks softly and deflects plaudits. He refers frequently to the colleagues, graduate students, and mentors who have inspired him and contributed to his work.

Global melting: Though it may seem counterintuitive, melting glaciers in one area may cause local sea levels
Read More

Hackers Breach Network of LabCorp, US' Biggest Blood Testing Laboratories SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

LabCorp, the US' biggest blood testing laboratories network, announced on Monday that hackers breached its IT network over the weekend.

"At this time, there is no evidence of unauthorized transfer or misuse of data," the company said. "LabCorp has notified the relevant authorities of the suspicious activity and will cooperate in any investigation."

[...] "LabCorp made the wise decision to shut down their entire network while determining the extent of the breach," Kothari added, suggesting that the hacker(s) could have very easily propagated through this interconnected network to reach other organizations.

Healthcare organizations are often the targets of hackers mainly due to the highly sensitive data they work with, which is worth more when crooks sell it online, rather than classic username-email-password combos.

Source: Hackers Breach Network of LabCorp, US' Biggest Blood Testing Laboratories


Original Submission

Read more of this story at SoylentNews.

12:02

Faster, Lighter, Smarter: Small Autonomous Systems Get a Tech Boost Lifeboat News: The Blog

Our Fast Lightweight Autonomy program recently completed Phase 2 flight tests, demonstrating advanced algorithms designed to turn small air and ground systems into team members that can autonomously perform tasks dangerous for humans such as pre-mission reconnaissance in a hostile urban setting or searching damaged structures for survivors following an earthquake.

12:00

Understanding Math vs Understanding Math Hackaday

One of the things hard about engineering electrical engineering, in particular is that you cant really visualize whats important. Sure, you can see a resistor and an LED in your hands, but the real stuff that we care about electron flow, space charge, and all that is totally abstract. If you just tinker, you might avoid a lot of the inherent math (or maths for our UK friends), but if you decide to get serious, youll quickly find yourself in a numerical quicksand. The problem is, theres mechanically understanding math, and intuitively understanding math. We recently came across a simple site that tries to help with the latter that deserves a look.

If you dont know what we mean by that, consider a simple example. You can teach a kid that 53 is 15. But, hopefully, a teacher at some point in your academic career pointed out to you what the meaning of it was. That if you had five packages of three items, you have 15 items total. Or that if you have a room that is five feet on one side and three feet on the other, the square footage is 15 square feet.

Thats an easy example. But as you get higher into math it is more common to just use a result and not really understand the why of it.  For example, youve probably heard of convolution and you know it has applications in digital signal processing among other areas. But could you explain it to a 9th grader? Using a combination of animations and graphics, the author takes you through not only what convolution does, but how you arrived at it and some applications. There arent many topics on the site, but the detail on each that is there is great. There are topics on algebra, calculus, complex numbers, and a great pair of articles on the Fourier transform. There is even an article on a different way to think about multiplication that lets you factor things graphically!

We love sites that make math more understandable. We enjoyed solving equations with colors, for example. And we couldnt stop watching the visual representation of the creation of square waves with harmonically-related sine waves which effectively demonstrates the Fourier transform.

11:11

SIM Hijacking as a Second Factor SoylentNews

A lot of companies, some quite big and prominent, fool people into thinking that a phone is a second authentication factor. Due to the transferability of the phone number associated with a random SIM card and the ease with which social engineering and even conspirators inside the carrier itself can be used to gain control of that number, it is not and can never be "something you have". That does not stop companies from pretending nor marks from playing along. Motherboard has an article about how the weaknesses around the SIM cards are becoming all the more frequently exploited to perpetrate massive fraud.

First, criminals call a cell phone carrier's tech support number pretending to be their target. They explain to the company's employee that they "lost" their SIM card, requesting their phone number be transferred, or ported, to a new SIM card that the hackers themselves already own. With a bit of social engineeringperhaps by providing the victim's Social Security Number or home address (which is often available from one of the many data breaches that have happened in the last few years)the criminals convince the employee that they really are who they claim to be, at which point the employee ports the phone number to the new SIM card.

From Motherboard : The SIM Hijackers


Original Submission

Read more of this story at SoylentNews.

11:10

Sway 1.0 Alpha 4 Released With Real-Time Video Capture, Atomic Layout Updates Phoronix

The Sway Wayland compositor continues maturing like a fine wine and as it nears the big 1.0 milestone new features continue to be introduced...

10:38

Zuckerberg: I absolutely didn't intend to defend Holocaust deniers The Hill: Technology Policy

Facebook CEO Mark Zuckerberg on Wednesday said he did not "intend to defend Holocaust deniers" after facing pushback for comments he made on a Recode podcast posted on Tuesday. "I personally find Holocaust denial deeply offensive, and I...

10:17

[$] LWN.net Weekly Edition for July 19, 2018 LWN.net

The LWN.net Weekly Edition for July 19, 2018 is available.

10:00

HPR2599: Fitting a 3.5mm adapter to a bluetooth receiver. Hacker Public Radio

There was a time when the perfect lightweight podcast listening station was a sansa clip running Rockbox connected to a set of SHE3600/97 Philips In-Ear Headphones. Alas Philips stopped producing the SHE3600/97. SanDisk reduced the specs of the clips, so Rockbox is no longer supported. We're left without a flexible option to listening to podcasts. On the other hand the price of Android phones have fallen to sub 50 range, and blue tooth headsets can be had for 25, there is a possibility to have the portability while keeping the cost low. I set out to convert the bluetooth headset to a accept generic 3.5mm sockets. A new ear bud set with crappy in ear buds, and the hacked set. Plays fine with large over ear headphones. Also with small in ear buds, complete with Patent Pending ear identifier Something to read Motherload

09:39

IAM is Pushing SEPs/FRAND Agenda for Patent Trolls and Monopolists That Fund IAM Techrights

Sponsored by Microsoft-connected patent trolls such as Finjan, who also just happen to be speakers at this upcoming event

Finjan speaker

Summary: The front group of patent trolls, IAM, sets up an echo chamber-type event, preceded by all the usual pro-FRAND propaganda

PATENTS are OK as long as they dont obstruct access to a market. It should be possible to work around them one way or another, otherwise the USPTO becomes merely a monopoly protector or protectionism agency. If patents are about innovation, one must keep this in mind.

Rokts software patent to take centre stage in high-stakes hearing, said this new headline. Motorola Solutions Wins Patent Infringement Lawsuit Against Hytera Mobilfunk GmbH Resulting in Injunction and Recall, said another. In one case we see software patents and in the latter an embargo. Is the public well served by these? Probably not. How about this (almost) week-old report stating that a federal appeals court on Thursday declined to reconsider a recent decision reinstating a patent infringement lawsuit against Apple Inc.

The patent in question is very questionable. So are many of IBMs patents, which are simply software patents asserted in bulk (to make legal challenges a lot more expensive). We wrote about that yesterday and earlier today Richard Lloyd from the patent trolls lobby fired the headline IBMs infringement suit against Groupon shows its still a licensing heavyweight (celebrating extortion). This malicious lobby, only about a month after corrupt Battis...

09:33

BC Human Rights Tribunal Rules Wi-Fi Isn't Dangerous SoylentNews

CBC News reports that the BC Human Rights Tribunal has ruled against parents who insisted that their child needed special protection against radio waves. The parents believed that their son had a condition called electromagnetic hypersensitivity (EHS), a bundle of non-specific symptoms that they attribute to EMF exposure, and that "...Wi-Fi, cellphones and other electronics ... caused the boy's migraines, nausea, insomnia and night terrors. "

Claims that Wi-Fi causes health problems are not unusual on the West Coast of Canada, but these parents added new twists to the story. His mother believes that the condition was caused by living near a cell phone tower during pregnancy, and that severe headaches and episodes of vomiting were caused by the amplification system his teachers used to help students with hearing impairments.

T's family complained he developed a headache one day after staying inside for recess. In an appeal to the school board, his family said it happened because, "as you know, the RF [radio frequency] does penetrate the room he is in when the children are moving around the school with their cellphones on at recess and lunch."

The student has since moved to a private school specializing in, among other things, working with autistic children. He is now able to develop social skills by joining other students on regular field trips to a local (presumably Wi-Fi and cell free) farm.


Original Submission

Read more of this story at SoylentNews.

09:30

Linux 4.19 To Feature Support For HDMI CEC With DP/USB-C To HDMI Adapters Phoronix

Adding to the big batch of feature additions and improvements queuing in DRM-Next for the upcoming Linux 4.19 kernel merge window is another round of drm-misc-next improvements...

09:25

LPGA's facial recognition "hospitality program" to be used to convince fans that everyone is a potential terrorist MassPrivateI


Golf fans will be happy to know that the Ladies Professional Golf Association ( LPGA) considers every fan a potential terrorist.

Last week an article in Sport Techie revealed that the LPGA is using NECs biometric NeoFace facial recognition technology to identify every fan.

Why would the LPGA use facial recognition to spy on fans?

If you guessed public safety, give yourself a gold star.

I think people want to be safe, said Lisa Johnson, who works a key business development role at NEC and assists stadium and arena operators with facial recognition solutions.

Officially the LPGA announced they were partnering with NEC seven months ago, but the truth is they have been using facial biometrics to spy on fans since at least last year.

LPGA's facial biometrics to predict acts of terror
image credit: Rights and Dissent

The LPGA  joins Amazon and law enforcement in using facial biom...

09:05

GNOME Shell & Mutter Updated Ahead Of GNOME 3.29.4 Phoronix

GNOME 3.29.4 is coming out this week as the latest development release building up to GNOME 3.30 this September. GNOME Shell and Mutter have put out their latest releases for this development milestone...

09:02

Trade Secrets Litigation Rising in the Wake of TC Heartland, Alice, Oil States and Other Patent-Minimising Decisions Techrights

The Justices have collectively made patent litigation less attractive a tactic

Drawing
Back to the drawing board

Summary: Litigation strategies are evolving in the wake of top-level decisions that rule out software patents, restrict venue shifting, and facilitate invalidation of patents even outside the courtroom

THE USPTO deals with two laws: patents and trademarks. Copyrights are managed by a separate office, suitably named the U.S. Copyright Office, and Trade Secrets (we put that in quotes and capitalised intentionally) are being dealt with by courts (this law was revised some years ago in Defend Trade Secrets Act (DTSA)). Those things arent the same; theyre inherently very different and calling them all IP is part of the propaganda peddled by law firms.

Trade Secret/s litigation is up whereas patent litigation is down very sharply because the latter is simply too risky to the plaintiff. "Trade Secret" 'damages' can, moreover, be much higher, vastly exceeding patent calculations. Here are some numbers from a new blog post:

The basics: Federal Trade Secret litigation is up about 30% following enactment of the Defend Trade Secrets Act (DTSA) in 2016. (1134 cases filed in 2017). The DTSA created a federal cause of action for trade secret litigation and resulting original jurisdiction in federal court for the federal claims. Prior to the DTSA, state-law trade secret claims found their way into federal court either via supplemental jurisdiction (typically linked to an a federal IP claim) or via diversity jurisdiction (parties from different states).

The trade secrets dilemma is IP Kats latest title of a blog post ...

09:00

Harley-Hardened Wire Helps High-Gain Antenna Hack Hackaday

What does a Harley-Davidson motorcycle have to do with building antennas? Absolutely nothing, unless you happen to have one and need to work-harden copper wire to build a collinear antenna for LoRa.

Well explain. Never being one to settle, [Andreas Spiess] needed a better antenna for his LoRa experiments. Looking for high gain and an omnidirectional pattern, he bought a commercial colinear antenna, which is a wire with precisely spaced loops that acts like a stack of dipoles. Sadly, in a head-to-head test [Andreas] found that the commercial antenna was no better than lower gain antennas in terms of range, and so he decided to roll his own.

Copper wire is a great material for antennas since it can be easily formed without special tools and it solders like a champ. But the stuff you get at the home center is nowhere near stiff enough for a free-standing vertical whip. This is where the Harley came in: [Andreas] used his Hog to stretch out the 1.75-mm diameter (a little bigger than #14 AWG) copper wire. Not only did the work-hardening stiffen the wire, it reduced its diameter to the 1.4 mm needed for the antenna design. His vector network analyzer told him that ground-plane elements and a little fiddling with the loop diameter were needed to get the antenna to resonate at 868 MHz, but in the end it looks like the antenna is on track to deliver 5-dBi of gain.

Of course there are plenty of other ways to stretch out a wire you could just stretch it out with hanging weights, or even with a go-kart motor-powered winch if youre ambitious. But if youve got a bike like that, why not flaunt it?

08:47

Hillicon Valley: EU hits Google with record $5B fine | Trump tries to clarify Russia remarks | Sinclair changing deal to win over FCC | Election security bill gets traction | Robocall firm exposed voter data The Hill: Technology Policy

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Morgan Chalfant (@mchalfant16),...

08:35

FCC votes to refer Sinclair merger to judge, possibly dooming it The Hill: Technology Policy

The Federal Communications Commission (FCC) on Wednesday voted unanimously to send the merger between Sinclair Broadcast Group and Tribune Media before an administrative law judge, a process that could doom the $3.9 billion deal.FCC Chairman Ajit...

08:29

Concert Diary: Rockefeller Random Thoughts

Dear concert diary.

Today I went to a Slowdive concert, mostly because Lost Girls were the opening act.

They were great, and so were Slowdive, but the experience was somewhat marred by the odour of the venue.

Rockefeller is the foundational concert venue in Oslo.

ts always been somewhat whiffy: If you dont stand in the middle of the floor, youll experience the olfactory delights of a beer-drenched carped thats never been cleaned the last few decades (see picture above for why this happens: The venue shovels all empty beer glasses from the hardwood floor in front of the stage onto the carpeted wings before collecting the glasses).

But, dear diary, today was a brand new experience.

Its been a few very warm weeks in Oslo, no doubt due to random weather fluctuations and not climate change at all.  But the stench that met us when we entered the venue was of a different kind than any weve experienced before.

Instead of the normal yeasty bouquet were used to, the non-hardwood parts of the Rockefeller venue smelled like a well-aged mixture of stale ale and diseased piss.

The urinal overtones of the venue were so overpowering that I almost tossed my cookies.  I wa...

08:21

The EPO Like the Unified Patent Court (UPC) and Unitary Patent System is an Untenable Mess Techrights

When a President associates with people like eljko Topi, whom many Croats want to see in prison (but EPO gives him immunity like some World Cop) just like his former boss, Prime Minister of Croatia Ivo Sanader

Antnio Campinos and eljko Topi

Summary: The Antnio Campinos-led EPO, nearly three weeks under his leadership, still fails to commit to justice (court rulings not obeyed), undo union-busting efforts and assure independence of judges; this, among other factors, is why the Office/Organisation and the UPC it wants to manage appear more or less doomed

Be one of the thousands of learners who access our learning centre on a regular basis to learn about patents and much more, the EPO wrote some hours ago, shortly after someone had said: The EPO is not able to find the answers for their own Examinations? Good news.

The UPC isnt getting off the ground any time soon; it probably wont ever take off, even after they try to modify, rename and reframe it.The Office is a mess. Nothing is really changing, just as many people expected (with only cautious optimism). Antnio Campinos now approaches the end of his third week in Office and nothing has really improved. Never did we see the USPTO dealing with a mess remotely like this.

Theres an apt parallel here; recall the latest spin from Team UPC, bypassing/disguising...

08:01

Formula E Ends Its Seasonand an Erain Brooklyn, New York SoylentNews

Ars Technica:

Racing cars came to Red Hook this past weekend as Formula E held its season four finale, the NYC ePrix. Although the event is only in its second year, the Big Apple is fast feeling like home for these all-electric race cars, and once again we saw championship-deciding races play out against the Manhattan skyline.

But this event also marked a different sort of finalethe end of Formula E's first chapter as the series prepares to retire the cars its been using for these last four seasons. When season five gets underway in Saudi Arabia this December, Formula E will have a new vehicle in the spotlight: one with more power, wild looks, and enough battery to make mid-race vehicle swaps a thing of the past.

The roar of the engines was heard all the way in Park Slope, Brooklyn (the next neighborhood over)...er, no, it wasn't. Does that take all the fun out of it?


Original Submission

Read more of this story at SoylentNews.

07:20

[$] Deep learning and free software LWN.net

Deep-learning applications typically rely on a trained neural net to accomplish their goal (e.g. photo recognition, automatic translation, or playing go). That neural net uses what is essentially a large collection of weighting numbers that have been empirically determined as part of its training (which generally uses a huge set of training data). A free-software application could use those weights, but there are a number of barriers for users who might want to tweak them for various reasons. A discussion on the debian-devel mailing list recently looked at whether these deep-learning applications can ever truly be considered "free" (as in freedom) because of these pre-computed weightsand the difficulties inherent in changing them.

07:07

Fed chief casts doubt on benefits, safety of cryptocurrencies The Hill: Technology Policy

Federal Reserve Chairman Jerome Powell on Wednesday expressed doubts about the usefulness of cryptocurrency for anything other than obscuring illegal activity.Powell told a House panel that virtual currencies such as bitcoin are too volatile to hold...

07:02

Transhumanism is Under Siege from Socialism Lifeboat News: The Blog

Friends, Im super excited to announce Im launching a new #transhumanism column at The Maven, a new site out that features leaders in their field writing about their lives and activities. My column (or channel as The Maven editors call them) is titled: Transhumanist Wager. And Ill be posting every day on it, often with original stories. Heres my first one, just out! Give it a read!


Transhumanismthe social movement of merging people with machines & synthetic partsis turning dangerously hard left.

07:02

3 Myths About The Future of Work (And Why They Re Not True) Lifeboat News: The Blog

Will machines replace humans? This question is on the mind of anyone with a job to lose. Daniel Susskind confronts this question and three misconceptions we have about our automated future, suggesting we ask something else: How will we distribute wealth in a world when there will be less or even no work?

07:02

DNA designer bodies could soon become mainstream Lifeboat News: The Blog

So what would your dream body look like and do?


Entrepreneur Juan Enriquez has outlined a future in which well be able to survive extreme environments and even hack our own memories, thanks to DNA manipulation.

06:24

Wearable Hybrids Prove the Bloated Smartwatch Is One of Silly Valley's Biggest Mistakes SoylentNews

El Reg:

Five years ago, a collective mania overtook the industry. Nobody could think of a clear reason why consumers needed an expensive "smart" watch when they already had a smartphone in their hand, pocket or bag. What value could it deliver? Even Google didn't seem sure: in its now notorious launch video, a punter used a watch simply to replicate features on their phone. But the industry convinced itself that wearables were another platform, and nobody wanted to be a sad second in this race. So the giants entered the market. Not because they wanted to, but as a hedge. Someone else might take a lead.

As we predicted in 2014, this was a solution looking for a problem. And an expensive one, at that.

Are wearable devices whose OS wakes up only when needed for smart features the answer?


Original Submission

Read more of this story at SoylentNews.

06:23

Secular countries can expect future economic growth, confirms new study Lifeboat News: The Blog

New research measuring the importance of religion in 109 countries spanning the entire 20th century has reignited an age-old debate around the link between secularisation and economic growth. The study, published in Science Advances, has shown that a decline in religion influences a countrys future

06:22

New Super-Crisp Images of Neptune Show How Far Our Telescopes Have Come Lifeboat News: The Blog

This is a new picture of Neptune taken from the Earth. Its nothing short of amazing.

Youve probably seen better pictures of Neptune from when Voyager 2 flew by in 1989. But there isnt currently a spacecraft orbiting Neptune, so if scientists want pictures, they need to take them from 2.9 billion miles away. An upgrade on the Very Large Telescope at the European Southern Observatory in Chile has now allowed the ground-based telescope to take images as crisp as those taken by Hubble, a telescope that orbits Earth.

The Very Large Telescope consists of four telescopes with 8.2-meter (27-foot) mirrors in northern Chiles Atacama Desert. Today, scientists at the observatory have released the first observations taken with laser tomography, the new adaptive optics mode on its GALACSI unit, which works alongside a spectrograph instrument called MUSE on one of the telescopes.

06:01

3D Printed Gun Saga: Court Case Over CAD Files Settled Hackaday

Can you create 3D printed designs and distribute them freely and without restriction? Maybe, and its likely to become easier in the future. A settlement has been reached in the saga of the US Department of State versus Cody Wilson, and beginning August 1st the Defense Distributed library of gun designs will once again become available.

Cody is well known for creating the first 3D printed gun. He went on to found Defense Distributed, a company that published designs and technical files for 3D printing firearms before being pulled into litigation that sought to curb the distribution of such plans by subjecting them to International Traffic in Arms Regulations (ITAR) restrictions. Read that carefully, its the (international) distribution of CAD files at question here, and not the act of 3D printing, and Defense Distributed has been granted an ITAR exemption. Will other arms-related design files be similarly exempted? The settlement mentions upcoming rule changes seeking to make this type of exemption the standard.

As members of the Hackaday community, were the people to whom our friends and family turn for perspective when new technology makes it into their news feeds. Those with little or no exposure to 3D printing may easily fall to doom and gloom reports. But is this a story of doom and gloom? Absolutely not, guns are still guns and 3D printers are still 3D printers. Lets take a look.

Same Old Argument, Different Day

Theres really nothing new to say on this topic. Yes, you could conceivably print a firearm on a 3D printer if you were really motivated. It might fire once or twice, or it might explode in your face. The age of clicking a button and pulling out a gun that is safe to fire and effective to use is still very very far in the future. As we all know, 3D printing is not to be feared.

Even the best 3D printing gurus arent able to print objects that will repeatedly contain a controlled explosion. A 3D printed gun is in nearly every way inferior to the one you could make by going to a gunsmiths. On the other hand, there are remarkable, elaborate mechanisms and useful devices that are 3D printable. Its unfortunate that it takes talk of a 3D printed gun for the general public to become aware of these incredible rapid prototyping tools, but it has happened and the best service we can do is help correct expectations of what the state of the art can accomplish. Its much more interesting to talk about objects that are reasonable to 3D print.

Should You Be Able to Print a Latch for Your Dishwasher?

Whats really interesting to me about this case is the argument that these designs are free speech. If true, this means in the United States CAD designs should fall under protections af...

05:22

From picking to pollinating, agribots are pushing farming into the future Lifeboat News: The Blog

The Robots are Coming!


Agricultural scientists are turning to emerging technologies, such as robotics and AI, to help deal with the challenges associated with modern-day farming. Here are some of the tech being harvested today.

05:02

More Energy Storage Looming For Wind Power Lifeboat News: The Blog

It wasnt that long ago that solar power and wind power were labeled as marginal, green electricity, but in the last five years or so they have become much more affordable and economically more feasible than conventional sources like coal and nuclear.

What supported solar along the way partly was the emergence of energy storage in the form of battery systems. Electricity can now be made by solar power systems and the excess can be stored for usage at night or on less sunny days. At least, solar power has been paired successfully with energy storage, and it is catching up with solar power. The cost of this newish technology is dropping, The overall estimated cost fell 32% in 2015 and 2016, according to the 2017 GTM Reseach utility-scale storage report. That will slow over the next five years, GTM reported. But battery storage is in certain places and applications on its way to cost-competitiveness.

According to Lazard, it could drop another 36% between 2018 and 2022. The UC-Berkeley research study, Energy Storage Deployment and Innovation for the Clean Energy Transition, predicted lithium-ion batteries could hit the $100 per kilowatt-hour mark in 2018.

04:47

Celebrating the Twentieth Anniversary of Open Source SoylentNews

Tuesday at OSCON, the Open Source Initiative (OSI) has continued the celebration of 20 years of open source. A blog post at the OSI reflects on how Open Source fits in with pre-existing intitiatives.

Open source did not emerge from a void. It was consciously a marketing programme for the already-15-year-old idea of free software and arose in the context of both the GNU Project and the BSD community and their history (stretching back to the late 70s). We chose to reflect this in the agenda for our celebration track at OSCON.

But that doesn't mean its inception is irrelevant. The consensus to define open source at the VA Linux meeting and the subsequent formation of OSI and acceptance of the Open Source Definition changed the phrase from descriptive to a term of art accepted globally. It created a movement and a market and consequently spread software freedom far beyond anyone's expectations. That has to be worth celebrating.

Wikipedia's entry on Open Source provides a great deal of information on its origin and application in multiple fields besides just software.


Original Submission

Read more of this story at SoylentNews.

04:30

Dual Brushed Motor Controller Doesnt Care How It Receives Commands Hackaday

The simple DC brushed motor is at the heart of many a robotics project. For making little toy bots that zip around the house, you cant beat the price and simplicity of a pair of brushed motors. Theyre also easy to control; you could roll your own H-bridge out of discrete transistors, or pick up one of the commonly used ICs like the L298N or L9110S.

But what if you want an all-in-one solution? Something that will deliver enough current for most applications, drive dual motors, and deal with a wide range of input voltages. Most importantly, something that will talk to any kind of input source.  For his Hackaday prize entry, [Praveen Kumar] is creating a dual brushed motor controller which can handle a multitude of input types. Whether youre using an IR remote, a Pi communicating over I2C, an analog output or Bluetooth receiver, this driver can handle them all and will automatically select the correct input source.

The board has an ATmega328p brain, so Arduino compatibility is there for easy reprogramming if needed. The mounting holes and header locations are also positioned to allow easy stacking with a Pi, and theres a status LED too. Its a great module that could easily find a place in a lot of builds.

If you need even more control over your brushed motor, you can soup up its capabilities by adding a PID loop...

04:10

DARPA Wants Your Insect-Scale Robots for a Micro-Olympics IEEE Spectrum Recent Content full text

SHRIMP is a new DARPA program to develop insect-scale robots for disaster recovery and high-risk environments

The DARPA Robotics Challenge was a showcase for how very large, very expensive robots could potentially be useful in disaster recovery and high-risk environments. Humanoids are particularly capable in some very specific situations, but the rest of the time, theyre probably overkill, and using smaller, cheaper, more specialized robots is much more efficient. This is especially true when youre concerned with data collection as opposed to manipulationfor the search part of search and rescue, for example, youre better off with lots of very small robots covering as much ground as possible.

Yesterday, DARPA announced a new program called SHRIMP: SHort-Range Independent Microrobotic Platforms. The goal is to develop and demonstrate multi-functional micro-to-milli robotic platforms for use in natural and critical disaster scenarios. To enable robots that are both tiny and useful, SHRIMP will support fundamental research in the component parts that are the most difficult to engineer, including actuators, mobility systems, and power storage.

From the DARPA program announcement:

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage. Partnering rescue personnel with robots to evaluate high-risk scenarios and environments can help increase the likelihood of successful search and recovery efforts, or other critical tasks while minimizing the threat to human teams.

Technological advances in microelectromechanical systems (MEMS), additive manufacturing, piezoelectric actuators, and low-power sensors have allowed researchers to expand into the realm of micro-to-milli robotics. However, due to the technical obstacles experienced as the technology shrinks, these platforms lack the power, navigation, and control to accomplish complex tasks proficiently.

To help overcome the challenges of creating extremely SWaP-constrained microrobotics, DARPA is launching a new program called SHort-Range Independent Microrobotic Platforms (SHRIMP). The goal of SHRIMP is to develop and demonstrate multi-functional micro-to-milli robotic platforms for use in natural and critical disaster scenarios. To achieve this...

04:02

Webroot announces integration with BrightGauge Help Net Security

This partnership will integrate Webroots real-time cybersecurity data into dashboards and reports through the BrightGauges business intelligence platform for MSPs for business insights. With dashboards leveraging Webroot data, BrightGauge customers will experience a real-time view of active threats to monitor and manage security operations. Security reports through BrightGauge help MSPs share Webroots in-depth data with customers to make business decisions. Webroot and BrightGauge have a shared understanding of the challenges todays MSPs face. With our More

The post Webroot announces integration with BrightGauge appeared first on Help Net Security.

03:59

CyberMDX raises $10 million Series A to expand medical cybersecurity to hospitals worldwide Help Net Security

CyberMDX announced the completion of a $10 million Series A financing. The round was led by Pitango Venture Capital, with participation from OurCrowd Qure. The number of connected medical devices such as MRIs, patient monitors and infusion pumps is growing, improving patient care as well as hospital operations. These devices are critical assets to a hospitals operations, connected to the heart of the IT network and its data centers. However, medical devices often lack basic More

The post CyberMDX raises $10 million Series A to expand medical cybersecurity to hospitals worldwide appeared first on Help Net Security.

03:36

Zuckerberg says he won't ban Holocaust deniers from Facebook if they're not 'intentionally getting it wrong' The Hill: Technology Policy

Facebook CEO Mark Zuckerberg said in a recent interview that Holocaust deniers should not be removed from his social platform if they are not intentionally getting it wrong.Lets take this a little closer to home, Zuckerberg said in an interview...

03:35

Saudi Arabia bans video games following suicide of two children TechWorm

47 games banned in Saudi Arabia after childrens death

Do you remember the deadly online suicide game, The Blue Whale Challenge also known as The Blue Whale, which caught attention of the world after a spate of teen suicides were said to be linked to the game.

For those unaware, The Blue Whale Challenge that became a social media phenomenon, plays out over a period of 50 days, where a player has to successfully complete 50 challenges. These tasks are given by the curator, who also asks for photos of the teenagers carrying out the tasks as proof for his approval. Once the 50 challenges are completed, the game directs the player to commit suicide, which is the ultimate task. This game allegedly spread quite quickly in countries like Bangladesh, China, India, and Iran, while it is not too prominent in the West.

Recently, two children, a 13-year-old girl and a 12-year-old boy, in Saudi Arabia killed themselves after participating in a challenge via an online game. Following these deaths, the Saudi General Commission for Audio-Visual Media has banned some of the popular video games citing unspecified violations of rules and regulations. According to the commission, it plans to ban 47 popular games that include The Witcher 3, Assassins Creed 2, and the most lucrative game of 2017, Grand Theft Auto v.

Given below is a complete list of games banned by the Saudi General Commission for Audio-Visual Media:

Agents of Mayhem
Assassins Creed 2
Attack on Titan 2
Bayonetta 2
Clash of the Titans
Dantes Inferno
Dead Rising 3 Apocalypse Edition
Deadpool
Deception IV: The Nightmare Process
Deus Ex Mankind Divided
Devils Third
DmC Definitive edition
Dragon Age: Inquisition
Dragons Dogma: Dark Arisen
Draw to Death
Final Fantasy Dissidia
Fist of the North Star: Kens Rage 2
God of War 1
God of War 2
God of War 3
Grand Theft Auto V
Heavy Rain
Hitman: Absolution (2012)
Life is Strange
Mafia 2
Mafia 3
Metro Redux
Okami
One Piece Burning Blood
Past Cure
Prison Architect
Resident Evil 5
Resident Evil 6
Saints Row IV
SplatterHouse
Street Fighter V
Street Fighter 30th Anniversary
The Order 1886
The Saboteur
The Witcher 3
The Nonary Game
Thief
Vampyr
Watch Dogs
Wolfenstein 2
Wolfenstein: The New Order
YO-KAI WATCH

W...

03:32

Microsoft offers bug bounties for holes in its identity services Help Net Security

Microsoft is asking security researchers to look for and report technical vulnerabilities affecting its identity services and OpenID standards implementations, and is offering bug bounties that can reach as high as $100,000. Microsoft has invested heavily in the security and privacy of both our consumer (Microsoft Account) and enterprise (Azure Active Directory) identity solutions. We have strongly invested in the creation, implementation, and improvement of identity-related specifications that foster strong authentication, secure sign-on, sessions, API More

The post Microsoft offers bug bounties for holes in its identity services appeared first on Help Net Security.

03:19

Former Pirate Bay Cyberlocker Bayfiles Makes a Comeback TorrentFreak

In 2011, Pirate Bay founders Fredrik Neij and Peter Sunde launched Bayfiles, a new file-sharing venture.

Instead of relying on torrents, which had previously made TPB a huge success, Bayfiles allowed users to upload and download large files directly.

With its no-nonsense sharing approach, the site swiftly accumulated a steady user base. However, that ended when the site was abruptly pulled offline, following a raid in 2014. Bayfiles probably wasnt the primary target, but the site never returned.

While most users had given up on Bayfiles, an anonymous group of privacy-oriented people played with the idea of relaunching it. They missed the old Bayfiles and thought that it would be great to have it make a comeback. This idea became reality this week.

The new Bayfiles team informs TorrentFreak that it bought the domains and logotype from TPB co-founder Fredrik Neij, aka TiAMO. The price was a symbolic fee, covering a few years of domain registrations and a couple of beers for good measure.

Fast forward a few weeks and Bayfiles is back in action. The team says that it noticed a decrease in simple one-click file hosts in recent years, and hopes that Bayfiles will fill this gap.

All the old data are gone so the site and its potential users will have to start from scratch. There is no requirement to register an account and with a lenient retention policy, no download throttling, and an upload limit of 10GB per file, there are few restrictions.

The site is free to use by anyone, but those who create an account can use it to keep track of their files. The accounts come with 1TB storage. This is free for the first 30 days and after that its between 3.5 and 5 euro per month, depending on the length of the subscription.

Registering an account is, of course, optional and only for you to keep track of your own files, and there are no download caps or speed limits for anonymous users, the new Bayfiles team tells us.

Ads tend to be annoying and that doesnt rhyme with our principles of having a clean site, so we will try our best to keep the service afloat through the subscription model.

The payments are all handled in cryptocurrencies. This is something the Bayfiles team learned from the past, as many payment processors have previously banned the site.

The goal is to make sharing as fast and easy as possible, and the built-in video and audio players certainly help with this. Most browsers are capable of...

03:17

How crooks conduct Money Laundering operations through mobile games Security Affairs

Experts uncovered a money laundering ring that leverages fake Apple accounts and gaming profiles to make transactions with stolen payment cards.

A money laundering ring leverages fake Apple accounts and gaming profiles to make transactions with stolen payment cards and then sells these game premiums on online forums and within gaming communities.

The money laundering operation was unveiled by the US Department of Justice, the investigation started in mid-June when the experts from Kromtech Security discovered a MongoDB database exposed online. The database was containing information related to carders activities, the database contained 150,833 unique cards records (card number, expiration date, and CCV)

Following our MongoDB investigations and honey pots deployments from the beginning of this year, we did another round of security audit of unprotected MongoDB instances. In June 2018 we have spotted a strange database publicly exposed to the public internet (no password/login required) along with a large number of credit card numbers and personal information inside. reads the blog post published by Kromtech Security.

As we examined the database we rapidly became aware that this was not your ordinary corporate database, this database appeared to belong to credit card thieves (commonly known as carders) and that it was relatively new, only a few months old. So we dug much deeper.

The activity of the criminal gang behind the operation is simple as effective. Crooks used a special tool to create iOS accounts using valid emails accounts, then they associated with the accounts the stolen payment cards. Most of the created accounts are specific to users located in Saudi Arabia, India, Indonesia, Kuwait, and Mauritania.

The group then made the jailbreaking of iOS devices to install various games, create in-game accounts, and use them to purchase game features or premiums.

The cash out was made later when crooks re-sold the game features or premiums online for real money.

Experts found credit cards belong to 19 different banks, they speculated they were probably bought on the specific carder markets where they were offered in groups of 10k, 20k, 30k.

The list of mobile games used by the cybercriminals includes popular apps such as Clash of Clans and Clash Royale developed by Supercell, and Marvel Contest of Champions developed by Kabam.

The three apps have a gaming community of over 250 million users and generate approximately $330 million USD a year in revenue.  Associated third-party markets are very active, websites like g2g.com to allow gamers to buy and sell resources and games, a great opport...

03:10

EU Fines Google $5 Billion for Android Antitrust Violations SoylentNews

Google confirms it will appeal $5 billion EU antitrust fine

Google has confirmed the expected, that it will indeed appeal the record $5 billion fine that it was handed today by European antitrust regulators for abusing the dominance of its Android operating system.

The European Commission announced that it is fining the U.S. firm for "three types of restrictions that [it] has imposed on Android device manufacturers and network operators to ensure that traffic on Android devices goes to the Google search engine." [...] In particular, the EC has decided that Google:

  • Has required manufacturers to pre-install the Google Search app and browser app (Chrome), as a condition for licensing Google's app store (the Play Store);
  • Made payments to certain large manufacturers and mobile network operators on condition that they exclusively pre-installed the Google Search app on their devices
  • And has prevented manufacturers wishing to pre-install Google apps from selling even a single smart mobile device running on alternative versions of Android that were not approved by Google (so-called "Android forks").

The decision also concludes that Google is dominant in the markets for general internet search service, licensable smart mobile operating systems, and app stores for the Android mobile operating system.

In a more detailed blog post, Google doubled down on its position to argue that Android has helped bring choice to the market by enabling 1,300 different companies to develop 24,000 smartphones, and bringing over one million apps to users.

Previously: Report: Feds Investigating if Google's Android Violates Antitrust Rules
EU vs. Google: Android Antitrust
EU's Leaked Plan to Punish Google for Antitrust Violations
Google's Next EU Fine Could be Even Bigger for Android Violations


Original Submission

Read more of this story at SoylentNews.

03:02

Passenger drone taxi cleared for take-off in US trials Lifeboat News: The Blog

This is fascinating!


The EHang 184 drone, which carries a single passenger on short journeys, will be tested in Nevada.

03:01

ERRF 18: The Start of Something Great Hackaday

For years, the undisputed king of desktop 3D printing conferences has been the Midwest RepRap Festival (MRRF). Hosted in the tropical paradise that is Goshen, Indiana, MRRF has been running largely unopposed for the top spot since its inception. There are other conferences focused on the industrial and professional end of the 3D printing spectrum, and of course youd find a Prusa or two popping up at more or less any hacker con; but MRRF is focused on exploring what the individual is capable of once they can manifest physical objects from molten plastic.

But on June 23rd, 2018, MRRF finally got some proper competition. As the name might indicate, the East Coast RepRap Festival (ERRF) is an event very much inspired by its Hoosier State predecessor. Held in Bel Air, Maryland, hackers on the right side of the United States for the first time had the opportunity to attended a true 3D printing festival without having to get on a plane. Not to say it was a neighborhood block party; people from all over the country, and indeed the globe, descended on the APG Federal Credit Union Arena for the two-day celebration of everything plastic.

This inaugural ERRF was, to put it mildly, a massive success. A couple of Hackaday Field Agents were in attendance, and we definitely came away impressed with the event considering it was the first attempt. We saw evidence that...

02:57

Woman charged for hacking & leaking private pictures of Selena Gomez HackRead

By Carolina

Selena Gomez, a well-known celebrity pop star, is in the

This is a post from HackRead.com Read the original post: Woman charged for hacking & leaking private pictures of Selena Gomez

02:43

Beyond honeypots: HADES tricks hackers into giving up their secrets Lifeboat News: The Blog

The simulated virtual environment lets network defenders deceive, interact with and analyze adversaries in real time.

02:43

How to Structure an Enterprise-Wide Threat Intelligence Strategy Lifeboat News: The Blog

To keep an organization safe, you must think about the entire IT ecosystem.

The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, to insider threats and system vulnerabilities from within, todays expanded attack surfaces cut across the whole enterprise landscape and that means an enterprises threat intelligence strategy must address the entire IT ecosystem.

To be effective, threat intelligence must be proactive, comprehensive, and done in a way that doesnt inadvertently create more risk. Unfortunately, as a recent Ponemon survey illustrates, most organizations fall short of this goal tripped up by a range of challenges, including a lack of expertise and overwhelming volumes of data. Improved threat intelligence comes from improving the strategy, techniques, and tools employed by enterprises to probe their networks for weakness and shore up defenses and resiliency.

02:42

Blue Origin will push its rocket to its limits with high-altitude emergency abort test today Lifeboat News: The Blog

Update July 18th, 11:35AM ET: Blue Origin pulled off another successful test launch today, landing both the New Shepard rocket and capsule after flight. The company ignited the capsules emergency motor after it had separated from the rocket, pushing the spacecraft up to a top altitude of around 74 miles a new record for Blue Origin. The firing also caused the capsule to sustain up to 10 Gs during the test, but Blue Origin host Ariane Cornell said that is well within what humans can take, especially for such a short spurt of time.

This morning, Jeff Bezos aerospace company Blue Origin will attempt the ninth test flight of its sub-orbital rocket, the New Shepard a reusable vehicle designed to take tourists to the edge of space and back. And for this launch, the company will be testing out the vehicles escape motor once again. Thats the system that could help save the lives of future passengers if something were to go wrong during the climb through Earths atmosphere.

Like most vertical rockets, the New Shepard is designed to take off upright from a launchpad at Blue Origins facilities in West Texas. Perched on top of the vehicle is a capsule for crew members, which the rocket carries skyward during flight. Once the New Shepard reaches an altitude of around 62 miles whats often considered the edge of space the capsule and rocket separate. If passengers were on board, thats when they would experience a few minutes of weightlessness. Then, both the capsule and rocket fall back to Earth. Parachutes deploy to gently land the capsule, while the rocket reignites its engine to land upright on the ground.

02:42

Giant holes are bursting open in Siberia, and you can hear the explosions from 60 miles away Lifeboat News: The Blog

Methane explosions are forming craters in the northern tundra of Russia and thats deeply alarming to climatologists.

02:35

Getting it Right: UN Special Rapporteur Incorporates Citizen Lab Recommendations on Technology-Facilitated Violence, Abuse, and Harassment News The Citizen Lab

The UN Special Rapporteur on violence against women, Ms. Dubravka imonovi, recently released her draft report to the Human Rights Council on online violence against women and girls from a human rights perspective.

The Special Rapporteurs report includes many key insights from the Citizen Labs formal response on this issue last fall and echoes many of our sixteen key recommendations. In particular, we commend the Special Rapporteur for:

Recognizing the impact of online violence, harassment, and abuse against human rights defenders and womens rights organizations

At paragraph 29, the Special Rapporteur acknowledges that:

Women human rights defenders, journalists and politicians are directly targeted, threatened, harassed or even killed for their work. . the online abuse against women journalists and women in the media are a direct attack on womens visibility and full participation in public life.

Our submission made reference to Citizen Labs extensive work on targeted digital threats against civil society, noting the particular risk posed to women human rights defenders by the abuse of hacking and spyware technologies. In a recent series of reports, Citizen Lab revealed that both a well-known female journalist as well as a prominent female lawyer representing the families of three slain Mexican women were personally targeted with NSO Groups government-exclusive Pegasus spyware. There is an urgent need to create accountability among private market actors engaged in the sale of digital surveillance tools, which are abused by governments and malicious actors (including intimate partners) alike.

Affirming the importance of encryption and...

02:33

Re: Multiple vulnerabilities in Jenkins Open Source Security

Posted by Daniel Beck on Jul 18

CVE-2018-1999001

CVE-2018-1999002

CVE-2018-1999003

CVE-2018-1999004

CVE-2018-1999005

CVE-2018-1999006

CVE-2018-1999007

02:27

DARPA Shows Off Some Things You Can Do With Distributed Electric Propulsion IEEE Spectrum Recent Content full text

The Ground X Vehicle Technologies program explores the advantages of powering vehicles with multiple electric motors

In late June, shortly after IEEE Spectrums recent feature on in-wheel motors for electric vehicles went to press, the Defense Advanced Research Projects Agency (DARPA) issued a press release describing various novel concepts for military vehicles, some of which make use of distributed electric motors. These prototypes were developed as part of DARPAs Ground X Vehicle Technologies (GXV-T) program, which is intended to find ways to make military vehicles less vulnerable to attack. The usual technique for doing that is, of course, to add heavy armor. The GXV-T program explored another approachto make vehicles nimbler and thus improve survivability without up-armoring the vehicle, according to program manager Amber Walker.
 
One of the technologies developed under the GXV-T program is an in-wheel motor developed by U.K.-based QinetiQ. Like the commercial in-wheel motors described in Spectrums recent feature article, QinetiQs motor can improve the handling of a vehicle by allowing each wheel to be powered separately. It differs from the commercial offering described in Spectrum's July issue, though, in that it has a built-in transmission. (The commercial unit makes do with no gearing at all.)

For a military vehicle, a key advantage of using in-wheel motors rather than a centrally mounted electric motor and transmission is that it eliminates the drive shafts or axles that youd otherwise need under a vehiclecomponents that can become deadly projectiles in a military vehicle should it run over an explosive.


Another thrust of the GXV-T program was to develop technology that would allow vehicles to negotiate extremely rough terrain. Engineers from Pratt & Miller achieved that goal by constructing an odd-looking vehicle with a suspension system that allowed each wheel to be move...

02:18

Red Hat Continues Driving Wonderful Innovations In Fedora Workstation Phoronix

Red Hat's Christian Schaller has provided an update regarding some of the new feature work and improvements that the Red Hat developers have been working on this summer for Fedora Workstation...

02:01

Apple Transfers Chinese Users' iCloud Data to State-Controlled Data Centers The Hacker News

There's terrible news for Apple users in China. Apple's Chinese data center partner has transferred iCloud data, belonging to 130 million China-based users, to a cloud storage service managed by a state-owned mobile telecom providerraising concerns about privacy. Back in February this year, Apple moved the encryption keys and data of its Chinese iCloud users from its US servers to local

02:01

Hot Camera Contest: Build A Battery Powered Thermal Camera Hackaday

Heres a challenge for all you hardware hackers out there. Peter Jansen has opened up the Hot Camera Contest on Hackaday.io to use a thermal imaging camera in a battery-powered project.

The challenge here is simple. Use a Flir Lepton thermal imaging camera module in a battery-powered configuration. Theres a catch, though: this is a project to use the Lepton in radiometric mode, where the camera spits out an actual temperature value for each pixel. Yes, this is a documented feature in the Flir Lepton module, but so far very few people are using it, and no one has done it with a small, battery-powered device.

The rules for this challenge are to use the Flir Lepton 2.5 in radiometric mode using either the Raspberry Pi Zero W or ESP32. Any software in this challenge must spit out absolute temperature values in a text format, and there must be a demonstration of putting the Flir Lepton into low-power mode. There are two challenges here, one for the Raspi and one for the ESP32; and winner will be named for each.

Getting More from a Fascinating Sensor

The Flir Lepton is a tiny little thermal camera thats been available to the Maker community for some time now, first through GroupGets and now through Sparkfun. For a pair o...

01:42

Celebrating Success at Our First Conference Lifeboat News: The Blog

We brought the leading experts in aging research and biotech investment together for an action-packed day of science. See what happened at this exciting event and check out our first event video now.


On July 12th, we hosted our first conference, Ending Age-Related Diseases: Investment Prospects & Advances in Research, at the Frederick P. Rose Auditorium, which is part of the Cooper Union campus in New York City. We are delighted to announce that the conference was a huge success with 160 attendees, a wide variety of speakers from both research and business, and some great discussion panels.

The goal of this conference was to promote multidisciplinary collaboration in order to foster the development of next-generation drugs and therapies that directly target the processes of aging and thus have the potential to prevent and cure age-related diseases.

For those of you who could not join us there, we have recorded the talks and panels from the conference, and we will be making them available on our website in the next few weeks once we have edited them. As a special thank you, the Lifespan Heroes, our monthly patrons, will be offered early access to these videos ahead of a public release.

01:34

Dem lawmaker calls for cryptocurrency probe after Mueller indictments The Hill: Technology Policy

A Democratic congressman is calling on the federal government to investigate the cryptocurrency industry out of concern that digital currencies helped enable Russian intelligence officials to interfere in the 2016 election. In a letter to Treasurys...

01:33

Indiana Murder Suspect Found by Using Genealogical Website SoylentNews

Murder suspect due in U.S. court after DNA cracks open 1988 case

A 59-year-old Indiana man will be formally charged on Thursday with the 1988 murder of an eight-year-old girl after the decades-old cold case was cracked open by DNA evidence linked to a genealogical website, authorities said on Tuesday.

John Miller of Grabill, Indiana, was arrested in nearby Fort Wayne on Sunday after DNA evidence and records on publicly accessible genealogical websites helped investigators track him down. Investigators followed a pattern similar to that used to track down the "Golden State Killer" in California earlier this year.

Miller on Monday was preliminarily charged with murder, child molestation and confinement of someone under 14 years old, 30 years after eight-year-old April Tinsley was found dead in a ditch. He has been ordered held without bond.

If you don't hand over your DNA, you want child murderers to frolic in freedom.

Related: DNA From Genealogy Site Led to Capture of Golden State Killer Suspect
GEDmatch: "What If It Was Called Police Genealogy?"
DNA Collected from Golden State Killer Suspect's Car, Leading to Arrest
Another Alleged Murderer Shaken Out of the Family Tree
'Martyr of the A10': DNA Leads to France Arrests Over 1987 Murder
DNA Methylation Can Reveal Information About Criminal Suspects


Original Submission

Read more of this story at SoylentNews.

01:30

Transforming A Bookshelf Speaker Into A Portable Boombox Hackaday

Theres a lot of fun to be had in modernizing an old boombox but what about turning one of those ubiquitous shelf speakers into a portable boombox, complete with a handle for carrying? Thats what [GreatScott] did when a friend gave him a just such a shelf speaker.

These days youd very likely use your phone as the audio source so he included a 20 watt stereo class D amplifier which could be disconnected at the throw of a switch if not needed. To power the amplifier he used 16 18650 lithium-ion batteries which were leftover from previous projects. He estimates they should give him around 100 hours of enjoyable tunes. And to make further use of the batteries, he also added a USB charger so that he could charge up his phone from it, something else which is nice to be able to do when on the road.

A battery management system (BMS), an XT60 connector for charging the batteries, his battery level indicator circuit which we talked about before, a new passive audio crossover, and some rather nice work on that case all round out the boombox. Check out his full construction in the video below and make sure to stay until the end when he gives a taste of its awesome sound (you may even swear your desk is vibrating from the bass despite wearing earbuds, like we did).

And on the subject of speaker-to-boombox conversions, heres one from a few years ago which makes use of a car MP3 player module giving it FM, USB, and SD card support.

01:26

Development release: FreeNAS 11.2-BETA1 DistroWatch.com: News

The FreeNAS project has published a new development snapshot, giving users a chance to test new features in the FreeBSD-based network attached storage system. This development snapshot includes a new user interface style, the Jails framework has migrated from Warden to iocage, and the boot loader has been....

01:21

[$] The PEP 572 endgame LWN.net

Over the last few months, it became clear that the battle over PEP 572 would be consequential; its scale and vehemence was largely unprecedented in the history of Python. The announcement by Guido van Rossum that he was stepping down from his role as benevolent dictator for life (BDFL), due in part to that battle, underscored the importance of it. While the Python project charts its course in the wake of his resignation, it makes sense to catch up on where things stand with this contentious PEP that has now been accepted for Python 3.8.

01:06

Red Hat Open-Sources Scanner That Checks Linux Binaries For Spectre V1 Potential Phoronix

The great folks at Red Hat have open-sourced a new security checker that is able to scan compiled Linux x86_64 binaries to look for potential Spectre Variant One vulnerabilities...

01:01

Stable kernel 4.17.8 LWN.net

Stable kernel 4.17.8 has been released. This fixes the issue with i386 systems that was present in the 4.17.7 kernel.

00:55

Security updates for Wednesday LWN.net

Security updates have been issued by Arch Linux (curl, lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), Debian (blender, ffmpeg, and wordpress), Fedora (curl), Gentoo (tqdm), Oracle (kernel), Slackware (mutt), SUSE (xen), and Ubuntu (policykit-1).

00:49

Sinclair announces deal changes in attempt to win FCC's favor on Tribune merger The Hill: Technology Policy

Sinclair is revising its plan to sell some of its companies in an attempt to appease the Federal Communications Commission (FCC) after the agency outlined issues with the broadcaster's pending merger with Tribune Media.The...

00:39

Multiple vulnerabilities in Jenkins Open Source Security

Posted by Daniel Beck on Jul 18

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:

* Jenkins (weekly) 2.133
* Jenkins (LTS) 2.121.2

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://jenkins.io/security/advisory/2018-07-18/

We provide advance notification for...

00:25

Whats Going on With the Semiconductor Workforce? The U.S. Government Wants to Know IEEE Spectrum Recent Content full text

The U.S. government requests information on high-demand skill sets, hiring difficulties, apprenticeship programs, and pipeline challenges

The U.S. National Institute of Standards and Technology (NIST) wants to know about efforts to educate and train the future semiconductor workforce, and how the U.S. government can help.

NIST has asked for input on this topic from semiconductor companies, and their suppliers, trade associations, equipment manufacturers, educational institutions, and other related organizations, for a new report. The deadline to submit ideas is 15 August 2018.

Government assistance could include enhanced support for K-12, undergraduate, and graduate STEM education (with a particular focus on semiconductor technology), targeted technical training, internship and apprenticeship programs, and cooperative education programs, according to NISTs request for information.

The outreach effort was sparked by President Donald Trumps 2017 National Security Strategy, and its concerns about the impact of semiconductor-dependent technologies, like encryption, advanced computing, and artificial intelligence, on U.S. economic growth and security.

Among the specific issues those submitting information are asked to consider are:

  • The types of technical positions for which hiring is most difficult

  • Educational levels at which hiring is most difficult

  • Expected changes in staffing levels over the next 5 to 15 years

  • Skill sets that are likely to grow in importance

  • Things your company is doing to bring people into the tech workforce

  • Ideas for ways of stimulating semiconductor workforce growth

  • Thoughts on apprenticeship programs

The full request for information is published in the Federal Register here. Written comments should be submitted by email to semiwkfc@nist.gov.

00:08

Greg Kroah-Hartman on Linux, Security, and Making Connections at Open Source Summit

People might not think about the Linux kernel all that much when talking about containers, serverless, and other hot technologies, but none of them would be possible without Linux as a solid base to build on, says Greg Kroah-Hartman.  He should know. Kroah-Hartman maintains the stable branch of the Linux kernel along with several subsystems.

00:03

CVE-2018-8042: Passwords for Hadoop credential stores are visible in Ambari Agent standard out in Apache Ambari Open Source Security

Posted by Robert Levas on Jul 18

CVE-2018-8042: Passwords for Hadoop credential stores are visible in Ambari Agent standard out

Severity: Important

Vendor: Hortonworks

Versions Affected: Ambari 2.5.x, Ambari 2.6.x

Versions Fixed: Ambari 2.7.0

Description:
Passwords for Hadoop credential stores are exposed in Ambari Agent informational log messages when the credential store
feature is enabled for eligible services. For example, Hive and Oozie.

Mitigation:
Ambari 2.5.x...

00:02

Urbanization and changes to climate could pack a one-two punch for watersheds in the future, study finds Lifeboat News: The Blog

Watersheds channel water from streams to oceans, and more than $450 billion in food, manufactured goods and other economic factors depend on them, according to the Environmental Protection Agency. Watersheds also are crucial to the health of surrounding ecosystems and communities. Now, researchers from the University of Missouri have found that climatic changes and urban development, when working in tandem, could have profound effects on watersheds by midcentury.

In some cases, the effects of urban development and climatic changes on hydrologic conditions can be intensified when both stressors are considered, said Michael Sunde, a researcher in MUs School of Natural Resources. In spring, for example, we found that both factors could increase runoff, which, in turn, can send more pollutants into streams, increase erosion and cause more serious flooding.

Sunde (pronounced Soond) and his colleagues used several models, including land cover change, hydrologic and climate model projections to identify potential changes in a Missouri watershed for the mid-21st century. Individually, increased urbanization and climate change were shown to have different impacts on the watershed. Researchers found that urban development is likely to increase runoff and limit the amount of water absorbed into the ground as groundwater. Evaporation of water from soil and other surfaces and consumptive water use by plants is also expected to decrease due to urbanization. Conversely, projected temperature increases and changing precipitation patterns would cause decreases to runoff and increased evaporation and plant transpiration. However, climate impacts were shown to vary widely, depending on the season and direction of precipitation changes projected by climate models.

00:02

Ubisoft Games Hit by Massive DDoS Attacks HackRead

By Waqas

France based video game publisher Ubisoft suffered a series of

This is a post from HackRead.com Read the original post: Ubisoft Games Hit by Massive DDoS Attacks

00:01

What to Expect When Youre Expecting A Trademark Hackaday

A trademark represents a brand, so it can be words like Apple, including made up words like Kleenex. It can be symbols, like the Nike swoosh. It can also be colors, like UPS brown, and even scents like the flowery musk scent in Verizon stores. Filing a trademark in the United States is surprisingly easy. With a couple hundred dollars and a couple hours, you can be well on your way to having your very own registered trademark and having the right to use the  symbol on your mark. You dont need a lawyer, but you should know some of the hangups you might run into. The USPTO has a fantastic primer on trademarks, but well TL;DR it for you.

Knowing If a Registered Trademark Is Right For You

The United States Patent and Trademark Office (USPTO) registers trademarks and issues patents, but its not always the best way to spend your money. A patent is only as valuable as ones ability to defend it, so a startup spending their few resources trying to get a patent doesnt make sense if they dont have the resources to sue someone who violates it. The same is true of a trademark. You can bluff your way with Cease and Desist letters, and people might see the trademark and patent and steer clear of it, so its not worthless, but its also not ironclad protection of your intellectual property.

With trademarks, its possible to skip registering entirely but still get protection through the  sign. In fact, it costs nothing to use it, and you can sprinkle it liberally on any logo or word mark you create and intend to protect. You can also use up until your is registered. The downside is that its a common-law right and not as strong, so its harder to defend. Consider it the equivalent of putting a sign on your fence that says trespassers will be shot.

If youre doing business across the nation, you have some resources at your disposal to protect your if needed, and you have a brand that you want to protect, then registering is a good idea.

Filing Trademark: So Easy Anyone Can Do It

The process of filing the trademark involves a few steps. First, and absolutely the most important, is to do some due diligence and make sure you have a high likelihood of success by looking for similar trademarks that have already been registered. The person at the USPTO with the power is going to look at your application, then look for other trademarks that are conf...

00:01

HealthEngine App Caught Giving Medical Data to Lawyers SoylentNews

Australian Health Minister Greg Hunt has ordered an urgent review of Australia's biggest online doctor booking searching HealthEngine which has given hundreds of user's medical information to lawyers. This is how ambulance chasing works in the 21st century. No need to chase actual ambulances, just scan the medical records of people looking for clients. HealthEngine is partially owned by Telstra, which may explain this behaviour.

Prominent law firm Slater and Gordon confirmed that HealthEngine passed a list of potential clients to them on a daily basis averaging 200 per month which netted them at least $500,000 in legal fees. The app collects data such as whether or not the medical problem was a workplace injury making it easy to target potential clients for the lawyers to chase. The privacy policy for the app makes no mention of sharing the information with third parties for marketing purposes. While there is a collection notice, this information is not readily obvious to users many of whom are unaware that their private data is being sent on to other companies.

[...] HealthEngine and Slater and Gordon both declined interview requests and did not respond directly to questions.

HealthEngine said in a statement the company used advertising to "deliver relevant and timely information from our many different advertising partners to our users."


Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 18 July

23:37

EU Fines Google Record $5 Billion in Android Antitrust Case The Hacker News

Google has been hit by a record-breaking $5 billion antitrust fine by the European Union regulators for abusing the dominance of its Android mobile operating system and thwarting competitors. That's the largest ever antitrust penalty. Though Android is an open-source and free operating system, device manufacturers still have to obtain a license, with certain conditions, from Google to

23:29

Success: Blue Origin Subjects its Rocket to High-Altitude Escape Test [Update: 2] SoylentNews

[Update 2: Successful mission! Successful separation, clean booster and escape capsule landing.

Mission launch time:  11:11AM EDT (15:11 UTC)
Max ascent velocity:  2,236 mph
max capsule apogee:   389,846ft (119km)
Mission elapsed time: 11m17s

Overheard on the live feed that max G forces for the escape capsule was: 10G.]

[Update 1: there was a brief hold of approximately 10 minutes; countdown has resumed.]

Watch Live: Blue Origin Subjects its Rocket to High-Altitude Escape Test:

As it continues to progress toward human flights, Blue Origin will perform another potentially dangerous, uncrewed test today of its New Shepard rocket and spacecraft. Although it has not yet provided details, the company says it will fly "a high altitude escape motor testpushing the rocket to its limits." The test is scheduled to begin at 11 am EDT (15:00 UTC) [corrected times] at the company's West Texas launch site.

This is the ninth test of the reusable New Shepard system, and the third in which it has included commercial payloads on it short suborbital flights. This time, the company is also flying a suite of materials from Blue Origin employees as a part of its internal Fly My Stuff program. (It's unclear at this point exactly how "abort test" and "payload" fit together in the same missionpresumably the high altitude abort will be followed by the New Shepard spacecraft pressing to orbit, but we're not exactly sure. Blue Origin will have more details about exactly what's going on when its webcast starts.)

This is not the first high-energy test of New Shepard. In October, 2016, the company conducted a lower altitude in-flight escape test when engineers intentionally triggered the spacecraft's launch abort system at about 45 seconds after launch, and an altitude of 16,000 feet. Such systems are designed to fire quickly and separate the crew capsule from the booster during an emergency.

Live feed on YouTube should start approximately 20 minutes before the 11:00 EDT (15:00 UTC) launch.

Note: it appears the launch may have originally been scheduled at 14:00 UTC but now appears to be scheduled for 15:00 UTC.

See also: spaceflightnow and space.com (which still has the orig...

23:28

Integris Software secures $10 Million Series A financing round Help Net Security

Integris Software announced it has raised a $10 million Series A financing round led by Aspect Ventures with participation from Workday Ventures, Madrona Venture Group, and Amplify Partners. The round brings Integris Softwares total funding to $13M. Integris will use the funding to continue to build on its data privacy automation platform and meet the demand for a data privacy solution. Recent developments in data privacy, such as the EUs General Data Protection Regulation (GDPR) More

The post Integris Software secures $10 Million Series A financing round appeared first on Help Net Security.

23:27

Alert Logic extends network IDS capability for containers Help Net Security

Alert Logic announced the network intrusion detection system (IDS) for containers, available in Alert Logic Cloud Defender and Threat Manager solutions. This innovation brings organizations capabilities to inspect network traffic for malicious activity targeting containers, and detection of compromises to enhance the security of workloads running on the AWS Cloud. The Alert Logic network IDS capability supports containers deployed on AWS including Docker, Amazon Elastic Container Service, Kubernetes, CoreOS, and AWS Elastic Beanstalk. Support for More

The post Alert Logic extends network IDS capability for containers appeared first on Help Net Security.

23:25

Linux File Server Guide

Linux file servers play an essential role. The ability to share files is a basic expectation with any modern operating system in the workplace. When using one of the popular Linux distributions, you have a few different file sharing options to choose from. Some of them are simple but not that secure. Others are highly secure, yet require some know-how to set up initially.

23:23

Ubuntu 18.04.1 LTS Introducing Revised Server Installer, Adds Missing Features Phoronix

With the April release of Ubuntu 18.04 LTS on the server front was a brand new, in-house developed server installer created by Canonical to differentiate it from Debian's long-used text installer for the Ubuntu Server images. While it offered a fresh look and some new features, it shipped without many features common to Linux server installers. Fortunately, that is changing with the upcoming Ubuntu Server 18.04.1 release...

23:22

CrowdStrikes Falcon Discover enhances security for workloads on AWS Help Net Security

CrowdStrike announced the availability of Falcon Discover for Amazon Web Services (AWS) workloads. Falcon Discover provides security, operations and development teams with visibility and control over Amazon Elastic Compute Cloud (Amazon EC2) instances, improving security posture. As todays enterprises continue to migrate their data and implement hybrid centers to host workloads that are both on-premises and on the cloud, maintaining security is challenging. Many organizations of all sizes lack security resources and are looking for More

The post CrowdStrikes Falcon Discover enhances security for workloads on AWS appeared first on Help Net Security.

23:17

ObserveIT closes $33M in Series B financing Help Net Security

ObserveIT announced it closed $33 million in Series B funding. The investment round includes participation from Bain Capital Ventures, Spring Lake Equity Partners and NightDragon Security, the cybersecurity investment firm founded by industry veteran Dave DeWalt. The funding will be used to accelerate innovation for ObserveITs insider threat management solutions and to expand ObserveITs sales and marketing teams to support the companys growth. This will enable the company to fulfill the demand for its threat More

The post ObserveIT closes $33M in Series B financing appeared first on Help Net Security.

23:07

PTI Support To Address Meltdown Nearing The Finish Line For x86 32-bit Linux Phoronix

While Page Table Isolation (PTI/KPTI) has been available since the Meltdown CPU vulnerability was disclosed at the start of the year, that's been for x86_64 Linux while the x86 32-bit support has remained a work-in-progress and only relatively recently has come together...

22:57

Free training courses on DDoS protection, from introduction to mitigation Help Net Security

The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. If youre involved in IT security or network operations, you know that DDoS attacks are a problem thats not going away. Recent studies indicate that almost 75% of organizations have suffered at least one attack over the past 12 months. Whats inside? This comprehensive quiz-based training course, available at both the Basic and Advanced levels, More

The post Free training courses on DDoS protection, from introduction to mitigation appeared first on Help Net Security.

22:56

200,000 fine for exposing possible child abuse victims in classic Cc/Bcc email blunder Graham Cluley

The Independent Inquiry into Child Sexual Abuse (IICSA) has been fined 200,000 for revealing identities of abuse victims in a mass email.

22:40

Microsoft tops list of brands impersonated by phishers Help Net Security

The number one brand spoofed by phishers in Q2 2018 in North America was Microsoft, says email security company Vade Secure. The company credits the surging of adoption of Microsoft Office 365 for this unfortunate statistic. Its clear that Office 365 has become the number one target for corporate phishing attacks, the company explained. The reason is that its highly profitable to compromise an Office 365 account. Hackers see email-based attacks as an easy entry More

The post Microsoft tops list of brands impersonated by phishers appeared first on Help Net Security.

22:38

US Biggest Blood Testing Laboratories LabCorp suffered a security breach Security Affairs

Hackers have breached the network at LabCorp, one of the largest diagnostic blood testing laboratories in the US, millions of Americans potentially at risk.

The biggest blood testing laboratories network in the US, LabCorp has suffered a security breach. The company announced the incident on Monday, the security breach occurred over the weekend.

The hackers breached into the LabCorp Diagnostic systems, but the company says theres no indication that attackers compromised also the systems used by its drug development business Covance.

At this time, there is no evidence of unauthorized transfer or misuse of data. LabCorp has notified the relevant authorities of the suspicious activity and will cooperate in any investigation, it said, in its statement.

LabCorp did not share further details about the security breach, in response to the incident the company shut down part of its infrastructure.

LabCorp immediately took certain systems offline as part of its comprehensive response to contain the activity, the firm said in8-K filed with the Securities and Exchange Comission.

This temporarily affected test processing and customer access to test results over the weekend. Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed today, and we anticipate that additional systems and functions will be restored through the next several days, 

Biggest Blood Testing Laboratories LabCorp

Mike Thomas, a technologist at LabCorp, works with patient samples at the companys location in Burlington. JULIE KNIGHT Source www.bizjournals.com

The company is currently testing operations that have been resumed, other suctions will be fully restored in the next days, meantime some customers may face brie...

22:31

Viewing Linux Logs from the Command Line

Title: 
Viewing Linux Logs from the Command Line

22:31

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States SoylentNews

Submitted via IRC for Sulla

The nation's top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them.

In a letter sent to Sen. Ron Wyden (D-OR) in April and obtained recently by Motherboard, Election Systems and Software acknowledged that it had "provided pcAnywhere remote connection software ... to a small number of customers between 2000 and 2006," which was installed on the election-management system ES&S sold them.

The statement contradicts what the company told me and fact checkers for a story I wrote for the[sic] New York Times in February. At that time, a spokesperson said ES&S had never installed pcAnywhere on any election system it sold. "None of the employees, ... including long-tenured employees, has any knowledge that our voting systems have ever been sold with remote-access software," the spokesperson said.

Read more of this story at SoylentNews.

22:15

Do you have what it takes to become a Chief Scientist in the infosec industry? Help Net Security

Igor Baikalov, Chief Scientist at security analytics firm Securonix, is a trained scientist: he spent over 16 year working on various aspects of Structural Biology, developing new methods for determining the structure of basic building blocks of life: proteins, DNA, and their interactions. A lot of this work had to do with processing and interpreting massive amounts of data and writing tons of code to do that something I realized I was pretty good More

The post Do you have what it takes to become a Chief Scientist in the infosec industry? appeared first on Help Net Security.

22:07

Qt Creator 4.7 Released With Clang Code Model Turned On By Default Phoronix

The Qt Company has officially released Qt Creator 4.7 as the newest feature release to this open-source, cross-platform Qt/C++ focused integrated development environment...

22:01

Eliminating the Product Owner Role

The Product Owner role no longer exists I recently announced to an entire department in a large company. A few POs looked a bit shocked and concerned. What would they do instead?

Before I get into who or what would replace the PO role, let me offer a bit of background on this group. Three coaches, including myself, had assessed this group prior to beginning work with them. Our findings were typical:

22:00

How to use the cloud to improve your technology training Help Net Security

Anyone who has tried to hire an IT expert knows that the shortage of qualified people is real. Were not just talking about IT security jobs, either. Almost every area of tech faces a skills shortage that threatens to sap productivity and presents challenges to IT departments of all sizes. Informal on-the-job training has been the norm for most IT teams. However, the rise of cyberthreats and the pace at which they arise leaves companies More

The post How to use the cloud to improve your technology training appeared first on Help Net Security.

21:49

Elon Musk retracts vile Twitter accusation against cave rescuer Graham Cluley

Elon Musk retracts vile Twitter accusation against cave rescuer

Tesla chief Elon Musk retracts his unfounded allegations against man who helped boys escape from a Thai cave, but scammers are given another opportunity to strike.

21:49

Pentagon Working on Neural Interface cryptogon.com

Via: NextGov: The idea of humans controlling machines with their minds has spun off sci-fi blockbusters like Pacific Rim and entire subgenres of foreign film, but while today skyscraper-sized fighting robots exist only on the big screen, the Pentagon is building technology that could one day make them a reality. Today, the Defense Advanced Research []

21:45

Only 65% of organizations have a cybersecurity expert Help Net Security

Despite 95 percent of CIOs expecting cyberthreats to increase over the next three years, only 65 percent of their organizations currently have a cybersecurity expert, according to a survey from Gartner. The survey also reveals that skills challenges continue to plague organizations that undergo digitalization, with digital security staffing shortages considered a top inhibitor to innovation. Gartners 2018 CIO Agenda Survey gathered data from 3,160 CIO respondents in 98 countries and across major industries, representing More

The post Only 65% of organizations have a cybersecurity expert appeared first on Help Net Security.

21:30

Digital transformation will help cloud service providers increase revenue Help Net Security

A new IDC survey found that cloud service providers have a high degree of confidence in their business outlook as a result of very strong customer demand for cloud services to enable digital transformation. Cloud service providers around the world are rapidly changing their business models in response to unprecedented customer demand, offering a mix of new cloud infrastructure, application, and managed services as part of an agile investment strategy, said Rory Duncan, research vice More

The post Digital transformation will help cloud service providers increase revenue appeared first on Help Net Security.

21:27

[$] Kernel symbol namespacing LWN.net

In order to actually do anything, a kernel module must gain access to functions and data structures in the rest of the kernel. Enabling and controlling that access is the job of the symbol-export mechanism. While the enabling certainly happens, the control part is not quite so clear; many developers view the nearly 30,000 symbols in current kernels that are available to all modules as being far too many. The symbol namespaces patch set from Martijn Coenen doesn't reduce that number, but it does provide a mechanism that might help to impose some order on exported symbols in general.

21:22

Doug Ethell presenting at Undoing Aging 2018 Lifeboat News: The Blog

New video from Undoing Aging 2018: Doug Ethell, Founder and CEO of Leucadia Therapeutics, presenting: Alzheimers Disease Begins as a Fixable Plumbing Problem.

21:12

Google hit with record $5 billion fine The Hill: Technology Policy

The European Union (EU) hit Google with a record $5 billion antitrust fine, accusing the company of illegally using its Android mobile operating system to cement its dominance over other online services.Margrethe Vestager, the European Commission's...

21:08

Links 18/7/2018: System76s Manufacturing Facility, Microsoft-Led Lobby for Antitrust Against Android Techrights

GNOME bluefish

Contents

GNU/Linux

21:00

DIY Tube Oven Brings the Heat to Homebrew Semiconductor Fab Hackaday

Specialized processes require specialized tools and instruments, and processes dont get much more specialized than the making of semiconductors. Theres a huge industry devoted to making the equipment needed for semiconductor fabrication plants, but most of it is fabulously expensive and out of reach to the home gamer. Besides, wheres the fun in buying when you can build your own fab lab stuff, like this DIY tube oven?

A tube oven isnt much more complicated than it sounds its just a tube that gets hot. Really, really hot [Nixie] is shooting for 1,200 C. Not just any materials will do for such an oven, of course, and this one is built out of blocks of fused alumina ceramic. The cavity for the tube was machined with a hole saw and a homebrew jig that keeps everything aligned; at first we wondered why he didnt use his lathe, but then we realized that chucking a brittle block of ceramic would probably not end well. A smaller hole saw was used to make trenches for the Kanthal heating element and the whole thing was put in a custom stainless enclosure. A second post covers the control electronics and test runs up to 1,000C, which ends up looking a little like the Eye of Sauron.

Weve been following [Nixie]s home semiconductor fab buildout for a while now, starting with a sputtering rig for thin-film deposition. Its been interesting to watch the progress, and were eager to see where this all leads.

Site News -- A Potpourri SoylentNews

First the good news. I just received word that janrinok, our Editor-in-Chief, is finally out of the hospital and back in his own home! He is very tired and has severe restrictions on his activities but is otherwise in excellent spirits. He very much appreciated the kind thoughts and wishes expressed by the community in our prior stories. It will still be many weeks or months before he can resume his prior level of activities on SoylentNews, but hopes to pop in once in a while to "second" stories that are in the story queue. Please join me in welcoming him back home!

Next, the good news. In janrinok's absence, the other editors have stepped up to the challenge. I'd like to call out chromas, fnord666, mrpg, and takyon who have all freely given from their spare time to make sure we have a steady stream of stories appearing here. I even saw CoolHand pop in on occasion to second some stories! teamwork++

Then, I have to bring up the good news that our development and systems staff have kept this whole thing running so smoothly. Besides the site, there is e-mail, the wiki, our IRC server, and a goodly number of other processes and procedures that make this all happen. That they are largely invisible attests to how well they have things set up and running!

Lastly, the good news. This is what's known in the press as the "silly season". Summer in the Northern Hemisphere means most educational institutions are on break, so less research is done and reported. other ventures are closed or running on reduced staffing levels. In short, the amount of news to draw from is greatly diminished. Yet, even in that environment, the vast majority of the time finds us with a selection of stories in the submissions queue to draw from.

We recently hit a low spot where I combed the web for a couple quick stories I could submit, but that has been the exception rather than the rule. Generally, we look for stories that have some kind of tech-related angle to them. The community has spoken loud and clear that there are plenty of other sites to read about celebrities, politics, and religion. We make a slight nod to politics in so much as it affects technical areas or has large scale ramifications (e.g. a story about President Trump having a meeting with Russian president Vladimir Putin would fit that description). Even then we generally try to keep it down to one story per day.

That said, if you see a story on the 'net that catches your fancy, please send it in! Feel free to draw upon titles listed on our Storybot page, then pop onto IRC (Internet Relay Chat) and simply issue the command ~arthur $code where $...

20:46

Flipkart Dismisses FIFA 18 PC Piracy Report as Irrelevant Question TorrentFreak

The name Flipkart probably doesnt ring too many bells in the United States but if all goes to plan, one of the countrys major retailers will soon be a 77% owner.

Flipkart is Indias largest online retailer and according to a report published in 2017, it controls almost 40% of the entire market.

That prompted Walmart and Amazon to file bids for Flipkart, with the former coming out on top with a $16 billion offer for what CNN describes as the most valuable startup in India.

Like all successful online retailers, Flipkart offers a wide range of genuine and authentic products to its consumers. However, like rivals Amazon, it does have an issue with some sellers attempting to sell pirated and counterfeit products via its virtual shelves.

As can be seen in the image below, Flipkart offers PC games for sale, many at heavily discounted prices. However, those listed for offline use only raise alarm bells.

One particular listing for a PC game caught the eye of Vidit Sahni, a resident of New Delhi in India. While browsing Flipkart he came across an advert for EAs FIFA 18, which was offered for the princely sum of 799 rupees around US$11.66.

The listing highlights that the game has 50% off its retail price and potential buyers should hurry since theres only a few left. However, a closer look shows that the seller probably has access to an unlimited supply.

NOTE: THERE IS A CRACK ONLY NO DIGITAL CODE, the tell-tale text on the bottom right corner of the listing warns.

Before installation the game first off your internet and antivirus. 1. All CD file copy in...

20:15

Alphabet Kicks Marwan Fawaz Out of the Nest SoylentNews

Nest CEO steps down as division is brought under the Google Home team

Nest CEO Marwan Fawaz is stepping down as the smart home gadget maker is reshuffled yet again, now operating under the Google division responsible for the company's Home smart speakers, according to a report from CNET. Just five months ago, Fawaz oversaw Nest's reintegration under Google; for the last three years, Nest operated as an independent entity under Google parent company Alphabet.

The decision to bring Nest back under the Google umbrella was designed to help hardware chief Rick Osterloh better integrate Nest products with Google's own hardware and software, much of it increasingly driven by artificial intelligence advances. Now, Fawaz is taking on an advisory role, and Nest will be overseen by Rishi Chandra, the vice president of product management for Google's home and living room products. CNET reports that many inside the company felt that Fawaz was not an adequate leader of Nest and more of an operations manager, and the change is reportedly a welcome one.

[...] CNET reports that Alphabet even considered selling Nest in 2016 to none other than Amazon, with talks described as "serious discussions" in an effort known internally as Project Amalfi. Though Fadell reportedly scuttled the deal by threatening to leave, which he would go on to do later that year regardless, it seems like Alphabet leadership has struggled to help Nest grow and find its place within its complex corporate structure.

Also at MarketWatch and TechCrunch.

Related: Google Absorbs Nest, Nest Co-Founder Quits
Amazon Plans to Remove Google's Nest Products After Acquisition of Ring


Original Submission

Read more of this story at SoylentNews.

20:01

Perl One-Liners for $1 in Linux Geek Humble Book Bundle good coders code, great coders reuse

Put on your tux! You can get my book, Perl One-Liners, together with other great books for just $1 in the Linux Geek Humble Book Bundle by my publisher No Starch Press.

My book will make you the command line god. You'll be able to solve problems in seconds that take mere mortals minutes if not hours.

8000 bundles sold in the first 24 hrs! Make it 8001 and get it in Linux Geek Humble Bundle.

See you next time!

19:44

REAPER 5.93 Brings New Linux-Native Builds Phoronix

Since 2016 we have been looking forward to the REAPER digital audio workstation software for Linux while with this week's v5.93 release, the experimental Linux-native builds are now officially available...

19:40

What Are Mature Stateful Applications?

BlueK8s is a new open source Kubernetes initiative from big data workloads company BlueData  the projects direction leads us to learn a little about which direction containerised cloud-centric applications are growing.

The first open project in the BlueK8s initiative is Kubernetes Director (aka KubeDirector), for deploying and managing distributed stateful applications with Kubernetes.

Apps can be stateful or stateless....

19:26

CVE-2018-14056: path traversal in ZNC Open Source Security

Posted by Alexey Sokolov on Jul 18

Severity: medium

Versions affected:
0.045 through 1.7.0

Mitigation:
upgrade to 1.7.1, or disable HTTP via `/msg *status AddPort`, `/msg
*status DelPort` commands.

Description:
ZNC before 1.7.1-rc1 is prone to a path traversal flaw. A non-admin user
can set web skin name to ../ to access files outside of the intended
skins directories and to cause DoS.

Upstream patch:
https://github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773...

19:24

CVE-2018-14055: privilege escalation in ZNC Open Source Security

Posted by Alexey Sokolov on Jul 18

Severity: high

Versions affected:
1.6.0 through 1.7.0
Potentially, all earlier versions too, but there is no known way to
trigger this before 1.6.0

Mitigation:
upgrade to 1.7.1

Description:
ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming
from the network, allowing a non-admin user to escalate privilege,
inject rogue values into znc.conf, and gain shell access.

Upstream patches:...

19:22

Out-of-bounds memory access in MP4v2 2.0.0 Open Source Security

Posted by Ruikai Liu on Jul 18

Hi,

A out-of-bounds memory access bug is found in MP4v2 2.0.0, a legacy
library dealing with MP4 media file.

========= find atom by type =========

The function `FindAtom` iterates the atom tree and find the target by
comparing its type with the given one:

316 MP4Atom* MP4Atom::FindChildAtom(const char* name)
317 {
318 uint32_t atomIndex = 0;
319
320 // get the index if we have one, e.g. moov.trak[2].mdia...
321...

19:21

What Serverless Architecture Actually Means, and Where Servers Enter the Picture

Serverless architecture is not, despite its name, the elimination of servers from distributed applications. Serverless architecture refers to a kind of illusion, originally made for the sake of developers whose software will be hosted in the public cloud, but which extends to the way people eventually use that software. Its main objective is to make it easier for a software developer to compose code, intended to run on a cloud platform, that performs a clearly-defined job.

19:10

Americas largest diagnostics service LabCorp suffers massive data breach HackRead

By Waqas

Private records of millions of patients could be at risk

This is a post from HackRead.com Read the original post: Americas largest diagnostics service LabCorp suffers massive data breach

19:04

QUASAR, SOBAKEN AND VERMIN RATs involved in espionage campaign on Ukraine Security Affairs

Security experts from ESET uncovered an ongoing cyber espionage campaign aimed at Ukrainian government institutions and involving three different RATs, including the custom-made VERMIN.

Security researchers from ESET uncovered an ongoing cyber espionage campaign aimed at Ukrainian government institutions, attackers used at least three different remote access Trojans (RATs).

The campaign was first spotted in January by experts from PaloAlto Networks when the researchers discovered a new piece of malware tracked VERMIN RAT targeting Ukraine organizations.

Pivoting further on the initial samples we discovered, and their infrastructure, revealed a modestly sized campaign going back to late 2015 using both Quasar RAT and VERMIN. reads the report from PaloAlto Networks.

VERMIN RAT 2

Back to the present, the experts discovered that the attackers used several RATs to steal sensitive documents, the researchers collected evidence of the involvement of the Quasar RAT, Sobaken RAT, and Vermin.

The RATs have been used against different targets at the same time, experts noticed they share some infrastructure and connect to the same C&C servers.

...

18:46

Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services The Hacker News

Microsoft today launched a new bug bounty program for bug hunters and researchers finding security vulnerabilities in its "identity services." Hacking into networks and stealing data have become common and easier than ever but not all data holds the same business value or carries the same risk. Since new security today depends on the collaborative communication of identities and identity data

18:38

Netflix Shares Plunge as Subscriber Growth Rate Stalls SoylentNews

Netflix shares plunged by more than 14% in after-hours trade on Monday, after the firm reported disappointing subscriber growth.

Netflix said it added 5.2 million subscribers in the three months to the end of June, the same number it did during the period last year.

The streaming service had forecast growth of 6.2 million.

The decline in share price follows a successful run for the stock, which had roughly doubled so far this year.

Is the number of Netflix subscribers reaching a plateau based on its current library of titles, or are competitors eating into its growth?


Original Submission

Read more of this story at SoylentNews.

18:25

Business email compromise scams have netted $12.5 billion, says FBI Graham Cluley

The FBI is warning businesses of the serious dangers posed by business email compromise (BEC) scams, saying that losses globally have risen by 136% since December 2016.

Read more in my article on the Bitdefender Business Insights blog.

18:22

Blood test detects melanoma skin cancer while its easily treatable Lifeboat News: The Blog

A blood test that detects melanoma in its early stages may allow people to get treatment before the cancer spreads and becomes difficult to cure.

18:22

Drones are checking up on insurance claims to look for fraudsters Lifeboat News: The Blog

Insurance companies are training hundreds of drone pilots to check property damage from the air to make sure claims are legitimate.

18:07

Linux To Better Protect Entropy Sent In From User-Space Phoronix

Fedora has begun utilizing a user-space jitter entropy daemon for feeding entropy to the kernel at boot time in case not enough is available for the kernel's random needs. But with that approach not being from a true hardware random number generator, a patch worked out by veteran Linux kernel developer Ted Ts'o will mix in RdRand entropy...

18:05

[SECURITY] [DSA 4250-1] wordpress security update Bugtraq

Posted by Sebastien Delafond on Jul 18

-------------------------------------------------------------------------
Debian Security Advisory DSA-4250-1 security () debian org
https://www.debian.org/security/ Sebastien Delafond
July 18, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : wordpress
CVE ID : CVE-2018-12895
Debian Bug :...

18:05

CVE-2018-8011: Apache HTTP Server mod_md DoS Open Source Security

Posted by Mark Cox on Jul 18

CVE-2018-8011: mod_md DoS via Coredumps on specially crafted requests

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.4.33

Description:
By specially crafting HTTP requests, the mod_md challenge
handler would dereference a NULL pointer and cause the child
process to segfault. This could be used to DoS the server

Mitigation:
All httpd users should upgrade to 2.4.34 or later.

Credit:
The issue was...

18:02

CVE-2018-1333: Apache HTTP Server HTTP/2 DoS Open Source Security

Posted by Mark Cox on Jul 18

CVE-2018-1333: DoS for HTTP/2 connections by crafted requests

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.4.18-2.4.33

Description:
By specially crafting HTTP/2 requests, workers would be
allocated 60 seconds longer than necessary, leading to
worker exhaustion and a denial of service.

Mitigation:
All httpd users should upgrade to 2.4.34 or later.

Credit:
The issue was discovered by Craig Young of Tripwire...

18:00

How Low Can You Go? Tiny Current Generator Hackaday

Current limited power supplies are a ubiquitous feature of the bench, and have no doubt helped prevent many calamities and much magic smoke being released from pieces of electronics. But for all their usefulness they are a crude tool that has a current resolution in the range of amps rather than single digit milliamps or microamps.

To address this issue, [Yann Guidon] has produced a precision current source, a device designed to reliably inject tiny currents. And in a refreshing twist, it has an extremely simple circuit in the form of a couple of PNP transistors. It has a range from 20 mA to 5 A which is set and fine-tuned by a pair of pots, and it has a front-panel ammeter hacked from a surplus pocket multimeter, allowing the current to be monitored. Being powered by its own internal battery (and a separate battery for the ammeter) it is not tied to the same ground as the circuit into which its current is being fed.

[Yann] is a prolific builder whose work has featured here more than once. Take a look at his rubidium reference and his discrete component clocks, for example, and his portable LED flash.

17:54

Gab Isnt Free Speech But a Safe Space for Bigots That Censors Innocent Accounts Without Warning and Without Explanation for the Censorship schestowitz.com

I used to complain that Twitter was shadowbanning and suppressing my account. As an act of protest, even though I wasnt leaning towards the political worldview of most Gab users, I then opened an account there. I later opened another account, one for TuxMachines, in order to separate my GNU/Linux postings from more political ones (some people just want the technical news, not opinions).

The TuxMachines account has been in Gab for a long time, well over a year, and earned hundreds of followers (almost 500 people last I checked). I didnt post anything controversial and didnt do anything abusive.

More than half a day ago the account was terminated along with its 10,000+ posts! No prior warning was given and no reason is being given for this. Theyre stonewalling. Even some followers of the accounts have enquired about it, but Gab isnt answering. Curiously enough, as soon as I spoke out about it other people came out stating that they too had been banned by Gab, citing some truly ridiculous reasons.

Make no mistake; Gab isnt some politically-correct hyper-sensitive site. The site has many accounts of literal Nazis, people who even call for genocides. For some reason, Gab appears to have no issue with such accounts. They cite free speech, but as the above comes to show thats just a facade for tolerating extremely intolerant views, bordering glorification of violence (e.g. lynching black people) and condoning genocide.

Gab cannot really use the free speech card (or excuse) to rationalise having that cesspool among its userbase. They use terms like free speech, but they dont actually believe in free speech. Its a site for snowflakes who cant stand leftist views and gang up on those who express such views. Nazis? OK. GNU/Linux news? Get out!

17:03

Rolls-Royce is building robot roaches and snakes to repair airplane engines Lifeboat News: The Blog

The engines of an airplane are complicated machines with plenty of hard-to-reach places, and keeping them in working order requires a lot of time and maintenance. The future of this task, as Rolls-Royce sees it, could involve deploying different kinds of of robots that patrol these aircraft parts and quickly nip any problems in the bud.

17:03

Researchers develop new solar sailing technology for NASA Lifeboat News: The Blog

Spacecraft outfitted with sails and propelled by the sun are no longer the stuff of science fiction or theoretical space missions. Now, a Rochester Institute of Technology researcher is taking solar sailing to the next level with advanced photonic materials.

Metamaterialsa new class of manmade structures with unconventional propertiescould represent the next technological leap forward for solar sails, according to Grover Swartzlander, professor in RITs Chester F. Carlson Center for Imaging Science. He proposes replacing reflective metallic sails with diffractive metafilm sails. The new materials could be used to steer reflected or transmitted photons for near-Earth, interplanetary and interstellar space travel.

Diffractive films may also be designed to replace heavy and failure-prone mechanical systems with lighter electro-optic controls having no moving parts, he said.

17:01

Microsoft to Team Up With Walmart to Take on Amazon SoylentNews

Amazon Foes Walmart and Microsoft Deepen Tech Partnership

Walmart and Microsoft Join Forces in Battle Against Amazon

At first glance, Walmart's announcement today that it has signed a five-year agreement with Microsoft seems like it's just a major step towards boosting its lagging online growth. But it's really a battle cry against a mutual foe: Amazon (AMZN).

The agreement gives Walmart (WMT) access to Microsoft's 365 and Azure cloud computing systems across all its lines of business, migrating some of its apps and websites to Azure. The retail giant plans to build out a worldwide Internet of Things platform with Microsoft (MSFT), connecting its stores and shipping systems to streamline its supply chain. But it's also likely to break down sales-data silos to better recommend products.

[...] In an interview with the Wall Street Journal, Microsoft CEO Satya Nadella said the companies' shared rivalry with Amazon "is absolutely core to this." While Walmart is interested in cashierless checkout systems, it is pursuing its own solutions rather than using Microsoft's technology.

Is this really going to bring down Amazon or will they help bring down Walmart (ask Ford and Nokia, etc, how great it is to partner up with Microsoft).

Submitted by stupid tablet.


Original Submission

Read more of this story at SoylentNews.

17:00

The Ringmakers of Saturn Terra Forming Terra






















This is one more example of the pernicious effect state secrecy has on the development of knowledge.  We are allowed to believe we know most of what is going on when that has never been true.  Whatever the military knows, what we do know is that they started with Tesla in the twenties.  That initial build has been rolling out ever since and has been actually limiting rediscovery of technology from the beginning.


All our competitors have been allowed to think that they are perhaps twenty years behind or near enough.  The truth is that the public and the rest of the world and science outside the military itself is likely a full six generations behind on all forms of true space related technology.  The rocket show is for show.

Here we get to actually look at what is plausibly going on around Saturn.  I will be posting his book shortly on a chapter by chapter basis for you to review the evidence cited.

I have long since posted that we do have a significant space fleet of our own including thousands of crew on twenty year long assignments and that alien species maintain an extensive presence in our solar system including deep habitats on Earth itself.  We would do exactly the same ourselves and will.




The Ringmakers of Saturn


https://nationalufocenter.com/?

A NASA scientist Dr. Norman Bergrun who wrote the book The Ringmakers of Saturn has posted his excellent book in its entirety up on a website that is well worth reading. Having privy to top-secret documents during his time in NASA came at a cost, as Bergrun himself explained in a Project Camelot interview, I had to sign my life away for thirty years. He also intimated that there was a limit to what he can say even now, and revealed that his life would be in serious danger should he say too much.


With exclusive access to the raw NASA photographs been sent back from Voyager I in 1980, Bergrun saw firsthand what the general public was not allowed to see, making him the first legitimate, verified member of the scientific community to discover cylindrical vehicles.


...

17:00

Austrailian Indigenous historian Bruce Pascoe says weve got our story all wrong Terra Forming Terra

Bruce Pascoe says we need to look closer at our history. Picture: Andy Rogers













This is huge of course.  We were all taught that Australia was completely out of contact until Europeans found the place.   That was a difficult sell at best as ample shipping existed in the Indonesian Archipelago to go there continuously.  I think that the real problem was that the northern parts where inhospitable Jungle like Papua New Guinea  and it was a long, even treacherou...

17:00

Controversial Australian study finds no evidence that cannabis helps chronic pain Terra Forming Terra


A new Australian study is casting doubt over the efficacy of cannabis as a tool to...


It is hard to determine if they found any evidence when self reporting users actually high scaled the cannabis. The whole study is problematic and 1500 is not a great sample either.  Throw away five somehow and fine detail ends.  We now have a large body of reports that are generally uncovering a benefit for chronic pain.  Even they are far from conclusive though.  What most of this is saying is that the underlying problems require actual healing which CBDs do sometime confer.  If healing is not part of the equation it is hard to think that pain relief is ever enough and all reporting must naturally vary over time as sensitivity fluctuates.  ..
Controversial Australian study finds no evidence that cannabis helps chronic pain

Rich Haridy

July 3rd, 2018
A new Australian study is casting doubt over the efficacy of cannabis as a tool to treat chronic pain despite prior studies suggesting the contrary(Credit: yellow2j/Depositphotos)
 https://newatlas.com/australian-cannabis-chronic-pain-study/55298/
The results of one of the world's longest in-depth studies examining the relationship between cannabis use and chronic pain is raising doubts over whe...

17:00

'Our relationship had never been worse... but that changed four hours ago' Terra Forming Terra

 


 It took thirty years but we now have both Russia and the USA on the same page as was ultimately the promise of the end of the Cold War.

This was always inevitable, but had been deeply side tracked by the DEEP STATE to the complete and visible frustration of Russia.   We now have two adults in the room and their opponents are all running for their lives as they should.  

The big problem remains EU leadership or more correctly the lack of an effective presidential system to provide electoral leadership.

Yet for the first time since WWII the whole European enterprise is ready for a complete re working that can include a political union of both Eastern Europe and the EU with full Russian participation.


Also:  The Roman Catholic Church may dissolve back into the Orthodox Christian establishment and the primacy of Mt Athos road to spirituality in particular.  Prophecy has put Francis as our last Pope. The take down of the DEEP STATE will include perverse elements in the Church opening this door.  such a combine will rapidly draw back the thousands of christian sects into the Communion of Christianity to establish Christian unity and a full press expansion of global evangelism and confrontation with those aspects of Islam not sanctioned by Jesus.

The prophetic stage is set and no war will likely take place at all a...

16:58

[SECURITY] [DSA 4248-1] blender security update Bugtraq

Posted by Moritz Muehlenhoff on Jul 17

-------------------------------------------------------------------------
Debian Security Advisory DSA-4248-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 17, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : blender
CVE ID : CVE-2017-2899 CVE-2017-2900...

16:55

[SECURITY] [DSA 4249-1] ffmpeg security update Bugtraq

Posted by Moritz Muehlenhoff on Jul 17

-------------------------------------------------------------------------
Debian Security Advisory DSA-4249-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 17, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : ffmpeg
CVE ID : CVE-2018-6392 CVE-2018-6621...

16:54

[slackware-security] mutt (SSA:2018-198-01) Bugtraq

Posted by Slackware Security Team on Jul 17

[slackware-security] mutt (SSA:2018-198-01)

New mutt packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/mutt-1.10.1-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues. Upstream strongly recommends
that all IMAP and POP users upgrade as soon as possible.
(* Security fix *)...

16:53

Cyber espionage campaign targets Samsung service centers in Italy Security Affairs

Security researchers from Italian security firm TG Soft have uncovered an ongoing malware campaigns targeting Samsung service centers in Italy.

TG Softs Research Centre (C.R.A.M.) has analyzed the campaign of spear-phishing on 2 april 2018 targeting the service centers of Samsung Italy. reads the analysis published by TG Soft.

The campaign analyzed is targeting only the service centers of Samsung Italy,  its an attack multi-stage and we have monitored it until July 2018

The campaign has similarities with the attacks campaigns that targeted similar electronics service centers in Russia that was discovered by Fortinet in June. The attackers motivation is still unclear, experts explained that the malicious code is not particularly sophisticated.

The attackers used spear-phishing emails sent to Samsung Italy service center workers. The messages have attached weaponized Excel documents.

The documents trigger the CVE-2017-11882 Office Equation Editor vulnerability to infect users.

According to a technical report published by the experts, this attack and the one against Russian service centers offering maintenance and support for various electronic goods started in the same period, in March.

While Russian service centers were hit by the Imminent Monitor RAT, the attacks on Samsung Italy service centers also involved other RATs, such Netwire and njRAT.

The quality of the spear phishing messages was high in both campaigns, they appear to have been written by a native in Italian and Russian, respectively.

The attachment used in this campaign is an Excel document titled QRS non autorizzati.xlsx, while the phishing messages are signed with the name of the Samsung IT Service Manager, a real employee of Samsung Italia, and includes the email and phone numbers of the employee.

...

16:45

[CVE-2018-1000211] Public apps can't revoke OAuth access & refresh tokens in Doorkeeper Bugtraq

Posted by Justin Bull on Jul 17

Good morning everyone,

A security bulletin for all of you.

Software:
--------
Doorkeeper (https://github.com/doorkeeper-gem/doorkeeper)

Description:
----------
Doorkeeper is an OAuth 2 provider for Rails written in Ruby.

Affected Versions:
---------------
4.2.0 - 4.3.2
5.0.0.rc1

Fixed Versions:
-------------
4.4.0
5.0.0.rc2

Problem:
--------

Any OAuth application that uses public/non-confidential authentication when
interacting with...

16:43

No more zigzags: Scientists uncover mechanism that stabilizes fusion plasmas Lifeboat News: The Blog

Sawtooth swingsup-and-down ripples found in everything from stock prices on Wall Street to ocean wavesoccur periodically in the temperature and density of the plasma that fuels fusion reactions in doughnut-shaped facilities called tokamaks. These swings can sometimes combine with other instabilities in the plasma to produce a perfect storm that halts the reactions. However, some plasmas are free of sawtooth gyrations thanks to a mechanism that has long puzzled physicists.

Researchers at the U.S. Department of Energys (DOE) Princeton Plasma Physics Laboratory (PPPL) have recently produced complex simulations of the process that may show the physics behind this , which is called pumping. Unraveling the process could advance the development of fusion energy.

16:42

Thousands of scientists pledge not to help build killer AI robots Lifeboat News: The Blog

Co-founder of Google DeepMind and CEO of SpaceX amongst the 2,400 signatories of pledge to block lethal autonomous weapons.

Science editor.

16:03

g2k18 hackathon report: Florian Obser on rtadvd(8) -> rad(8) progress (actually, rewrite) OpenBSD Journal

Fresh from the just concluded hackathon in Ljubjlana comes our next report from Florian Obser (florian@) who writes:

Sometimes you have to roll the hard six.

I have been trying to bolt a standard OpenBSD parse.y based config file onto rtadvd(8) for about a year now. I could not do it. The code base is just too weird. There are other bugs lurking as well and I have a hard time fixing them.

Read more

15:47

Mesa 18.2 Gets Extra Two Weeks Of Development Time Phoronix

Serving as the Mesa 18.2 release manager is Andres Gomez of Igalia. He's now pushed back the release plan by two weeks, although Mesa 18.2.0 still should end up shipping in August...

15:42

Google researchers create AI that maps the brains neurons Lifeboat News: The Blog

Google researchers, in collaboration with the Max Planck Institute of Neurobiology, have developed a neural network that maps neurons inside the brain more accurately than previous methods.

15:27

Planet Nine Search Turns Up 10 More Moons of Jupiter SoylentNews

Astronomers have found a new crop of moons around Jupiter, and one of them is a weirdo

Ten more moons have been confirmed to orbit around Jupiter, bringing the planet's total known satellite count to 79. That's the highest number of moons of any planet in the Solar System. And these newly discovered space rocks are giving astronomers insight as to why the Jupiter system looks like it does today.

Astronomers at Carnegie Institution for Science first found these moons in March 2017, along with two others that were already confirmed in June of last year. The team initially found all 12 moons using the Blanco 4-meter telescope in Chile, though finding these objects wasn't their main goal. Instead, they were searching for incredibly distant small objects or even planets that might be lurking in our Solar System beyond Pluto. But as they searched for these fringe space rocks, they decided to take a peek at what might be lurking around Jupiter at the same time. Now, the moons they found have been observed multiple times, and their exact orbits have been submitted for approval from the International Astronomical Union, which officially recognizes celestial bodies.

These moons are all pretty tiny, ranging between less than a mile and nearly two miles wide. And they break down into three different types. Two orbit closer to Jupiter, moving in the same direction that the planet spins. Farther out from those, about 15.5 million miles from the planet, there are nine that rotate in the opposite direction, moving against Jupiter's rotation. But in this same distant region, one strange moon that astronomers are calling Valetudo is moving with Jupiter's spin, like the two inner moons.

Moons of Jupiter.

Also at NPR and CNN.

Previously: Two Tiny New Moons Found Around Jupiter

Related: Retrograde Jupiter Co-Orbital Asteroid May Have an Interstellar Origin
Another Trans-Neptunian Object With a High Orbital Inclination Points to Planet Nine
CU Boulder Researchers Say Collective Gravity, Not Planet Nine, Explains Orbits of Detached Objects


...

15:00

The Biggest Corner Antenna Weve Ever Seen Hackaday

Radio waves are received on antennas, for which when the signal in question comes over a long distance a big reflector is needed. When the reception distance is literally astronomical, the reflector has to be pretty darn big. [The Thought Emporium] wants to pick up signals from distant satellites, the moon, and hopefully a pulsar. On the scale of home-built amateur radio, this will be a monstrous antenna. The video also follows the break.

In hacker fashion, the project is built on a budget, so all the parts are direct from a hardware store, and the tools are already in your toolbox or hackerspace. Electrical conduit, chicken wire, PVC pipes, wood blocks, and screws make up most of the structure so put away your crazy links to Chinese distributors unless you need an SDR. The form of the antenna is the crucial thing, and the shape is three perpendicular panels as seen in the image and video. The construction in the video is just a suggestion, but it doesnt involve welding, so that opens it to even more amateurs.

Even if you are not trying to receive a pulsars signature, we have hacks galore for radios and antennas.

14:01

Raspberry Pi On Linux 4.19 Will Be Able To Report Under-Voltage Issues Phoronix

The Linux 4.19 kernel will be introducing a new "raspberrypi-hwmon" driver capable of reporting under-voltage conditions for Raspberry Pi boards...

13:50

Quadrillion Tons of Diamond Estimated to Lie Beneath Earth's Surface SoylentNews

Sound waves reveal diamond cache deep in Earth's interior

There may be more than a quadrillion tons of diamond hidden in the Earth's interior, according to a new study from MIT and other universities. But the new results are unlikely to set off a diamond rush. The scientists estimate the precious minerals are buried more than 100 miles below the surface, far deeper than any drilling expedition has ever reached.

The ultradeep cache may be scattered within cratonic roots the oldest and most immovable sections of rock that lie beneath the center of most continental tectonic plates. Shaped like inverted mountains, cratons can stretch as deep as 200 miles through the Earth's crust and into its mantle; geologists refer to their deepest sections as "roots."

In the new study, scientists estimate that cratonic roots may contain 1 to 2 percent diamond. Considering the total volume of cratonic roots in the Earth, the team figures that about a quadrillion (1016) tons of diamond are scattered within these ancient rocks, 90 to 150 miles below the surface.

"This shows that diamond is not perhaps this exotic mineral, but on the [geological] scale of things, it's relatively common," says Ulrich Faul, a research scientist in MIT's Department of Earth, Atmospheric, and Planetary Sciences. "We can't get at them, but still, there is much more diamond there than we have ever thought before."

Also at National Geographic and Discover Magazine.

Multidisciplinary Constraints on the Abundance of Diamond and Eclogite in the Cratonic Lithosphere (DOI: 10.1029/2018GC007534) (DX)


Original Submission

Read more of this story at SoylentNews.

12:11

China Will Focus on a Lunar Surface Station Rather than a Lunar Orbiting Station SoylentNews

Chinese space official seems unimpressed with NASA's lunar gateway

This week, the European and Chinese space agencies held a workshop in Amsterdam to discuss cooperation between Europe and China on lunar science missions. The meeting comes as Europe seems increasingly content to work with China on spaceflight programs.

Although the meeting is not being streamed online, space systems designer and lunar exploration enthusiast Angeliki Kapoglou has been providing some coverage of the meeting via Twitter. Among the most interesting things she has shared are slides from a presentation by Pei Zhaoyu, who is deputy director of the Lunar Exploration and Space Program Center of the China National Space Administration.

[...] Overall, Pei does not appear to be a fan of NASA's plan to build a deep space gateway, formally known as the Lunar Orbital Platform-Gateway, at a near-rectilinear halo orbit. Whereas NASA will focus its activities on this gateway away from the Moon, Pei said China will focus on a "lunar scientific research station."

[...] So far, NASA has yet to finalize commitments with Europe, Russia, or other International Space Station partners on contributions to the gateway. While European officials are interested, it seems like they may also be willing to go along with China if that country has a more direct plan to land humans on the Moon.

Related: NASA Could Scale Down First Manned Flight of the SLS
2020s to Become the Decade of Lunar Re-Exploration
This Week in Space Pessimism: SLS, Mars, and Lunar Gateway


Original Submission

Read more of this story at SoylentNews.

12:01

Bomb Hoist Teardown Shows Cold-War-Era Big Iron Hackaday

Buying surplus equipment lends a frisson of excitement as you eagerly await the package or crate containing your purchase. Did you buy a hidden treasure, or has some shyster succeeded in unloading a pile of garbage onto you, their mark? [Professor Churls] shelled out $49.99 for a military surplus bomb hoist which definitely falls into the former category. His teardown reveals it to be a beautifully over-engineered piece of Cold-War-era American hardware.

As the package with its extremely heavy contents is first inspected, he reminds us just what a bomb hoist does, it is clipped to an aircraft by ground crew and serves as a small but extremely powerful crane to lift up to a 6000-pound piece of ordnance onto the wing pylon of an aircraft. This particular example dates from the 1960s, and features a 28-volt DC motor coupled to a bulky gearbox assembly on a swivel mount for attachment.

His teardown is extremely detailed, but such is the engineering and complexity of the device youll want to read every part of it. The motor is a fairly traditional separately-excited brushed DC design such as youd expect from that era, but with unusual features such as brushes on pivots rather than a slide. The multiple sets of gears are packed in aged and phenolic-smelling grease, and have unusual features such as stub-form teeth for high torque at low durations. There is even an entirely separate gear train for the hex drive provided so that crews could keep the bombers rolling even when the power was out.

He leaves us with the tantalising information that there is a project awaiting this device, but doesnt tell us what that might be. We hope well get to see it, whatever it is. Meanwhile its great to see that this kind of item can still be found from military surplus suppliers, where this is being written they have degenerated into little more than stockists of camouflage-printed camping gear. Our colleague [Brandon Dunson] lamented in 2015 on the slow decline of the electronic surplus business in his location.

11:42

Scientists have created an AI inside a test tube using strands of DNA, and they hope it will soon start to form its own memories Lifeboat News: The Blog

An artificial neural network thats made entirely from DNA and mimics the way the brain works has been created by scientists in the lab.

The test tube artificial intelligence can solve a classic machine learning problem by correctly identifying handwritten numbers.

The work is a significant step in demonstrating the ability to program AI into man-made organic circuits, scientists claim.

11:42

CRISPR editing may cause more DNA damage than expected Lifeboat News: The Blog

The DNA chaos that CRISPR unleashes has been seriously underestimated, study author and geneticist Allan Bradley of U.K.s Wellcome Sanger Center tells STAT. This should be a wake-up call.

Read more toggle.

11:42

Scientists just found 150,000,000,000,000,000,000,000,000 of diamonds on Earth Lifeboat News: The Blog

Dont tell the Hatton Garden gang: scientists just unearthed an eye-watering hoard of diamonds, so valuable it would completely destroy the worlds economy.

The scientists reckon theres a quadrillion tonnes of diamond buried in the cratonic roots in continents.

Theres just one, tiny, catch: the treasure trove is buried 100 miles down, deeper than any drill has ever penetrated, according to MIT researchers.

10:34

Microsoft Killing off the Old Skype Client, Adding Built-in Call Recording SoylentNews

Ars Technica:

Coming over the summer, Microsoft is going to add integrated call recording (something that previously required third-party applications and a deprecated API), read receipts to show when a message recipient has read a message, and end-to-end encryption of text and audio chat using the Signal protocol.

Microsoft is also making Skype audio and video calls easier to integrate into streams such as those used on Mixer and Twitch. Support for the NDI API means that streaming applications such as Xsplit and OBS can use a Skype call as an audio/video source. That means they can be overlaid on games or other content, just as is already done with webcam input.

Will the changes come in time to save Skype's userbase?


Original Submission

Read more of this story at SoylentNews.

10:25

NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 18 Jul, 2018 0:25:28 UTC

The new edition of Off The Wall from 17/07/2018 has been archived and is now available online.

10:18

Humans Show Racial Bias Towards Robots of Different Colors: Study IEEE Spectrum Recent Content full text

Do people display different racial biases towards black robots and white robots? A new study says yes

The majority of robots are white. Do a Google image search for robot and see for yourself: The whiteness is overwhelming. There are some understandable reasons for this; for example, when we asked several different companies why their social home robots were white, the answer was simply because white most conveniently fits in with other home decor.

But a new study suggests that the color white can also be a social cue that results in a perception of race, especially if its presented in an anthropomorphic context, such as being the color of the outer shell of a humanoid robot. In addition, the same issue applies to robots that are black in color, according to the study. The findings suggest that people perceive robots with anthropomorphic features to have race, and as a result, the same race-related prejudices that humans experience extend to robots.

Christoph Bartneck, the lead author of the study and a professor at the Human Interface Technology Lab at the University of Canterbury in New Zealand, presented the results at the ACM/IEEE International Conference on Human Robot Interaction (HRI) in Chicago earlier this year.

We hope that our study encourages robot designers to create robots that represent the diversity of their communities, Bartneck told me. There is no need for all robots to be white.

Bartneck suspected the research could prove controversial, but he and his collaboratorsfrom Guizhou University of Engineering Science, China; Monash University, Australia; and University of Bielefeld, Germanywere determined to pursue the issue. The discussion on this topic was like walking through a minefield, he said, adding that their paper received extensive scrutiny from reviewers, some of whom accused the authors of sensationalism.

To learn more about the project, and the controversy surrounding it, we spoke with Bartneck via email. If youd like more details on the methods used, statistical analyses applied, and numerical results, the full paper is available for download here.

IEEE Spectrum: Why hasnt this topic been studied before,...

10:07

10:00

HPR2598: Calculating planetary orbits in Haskell Hacker Public Radio

Function signatures (it might or might not be helpful to have these at hand while listening): Helpers: radToDeg :: Floating a =&gt; a -&gt; a degToRad :: Floating a =&gt; a -&gt; a clamp :: Float -&gt; Float Time: day :: Int -&gt; Int -&gt; Int -&gt; Float -&gt; Day Float Orbital parameters: longitudeOfAscendingNode :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; LongAscNode body center inclinationToEcliptic :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; InclToEcl body center argumentOfPeriapsis :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; ArgPeri body center semiMajorAxis :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; SemiMajor body center eccentricity :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; Ecc body center meanAnomaly :: Orbit body center =&gt; body -&gt; center -&gt; Day d -&gt; MeanAno body center Calculating location on orbital plane: eccAnomaly :: MeanAno a b -&gt; Ecc a b -&gt; EccAnomaly a b trueAnomaly :: EccAnomaly a b -&gt; Ecc a b -&gt; TrueAnomaly a b dist :: EccAnomaly a b -&gt; Ecc a b -&gt; SemiMajor a b -&gt; Distance a b Translating between coordinate systems: toEclCoord :: TrueAnomaly a b -&gt; Distance a b -&gt; LongAscNode a b -&gt; ArgPeri a b -&gt; InclToEcl a b -&gt; EclCoord a b toEqCoordinates :: EclCoord body Earth -&gt; Day Float -&gt; EqCoord body Some helpful links: Guide by Paul Schlyter - http://www.stjarnhimlen.se/comp/ppcomp.html Sample calculations by Paul Schlyter - http://www.stjarnhimlen.se/comp/tutorial.html tuturto's blog post - https://engineersjourney.wordpress.com/2018/06/29/planetary-orbits-and-haskell/ Definition of orbital elements in Wikipedia - https://en.wikipedia.org/wiki/Orbital_elements Units of angle in Wikipedia - https://en.wikipedia.org/wiki/Degree_(angle) and https://en.wikipedia.org/wiki/Radian

09:54

What Patent Lawyers Arent Saying: Most Patent Litigation Has Become Too Risky to be Worth It Techrights

These people rely on a constant flow of lawsuits (for them to bill and profit from both sides)

Old key

Summary: The lawyers key to the castle is lost or misplaced; they cant quite find/obtain leverage in courts, but they dont want their clients to know that

THE SUMMERTIME/summer season generally brings out or yields fewer decisions, hence less news. The EPO and SUEPO have been quiet this past week and the USPTO says just about nothing. Iancu seemingly vanished (his name hasnt been brought up in nearly a month). Court proceedings, however, still go on.

Iancu seemingly vanished (his name hasnt been brought up in nearly a month).The real (and growing) risk of getting oneself fined at times pretty badly for frivolous patent litigation is becoming more profound (under 35 U.S.C. 285).

Some days ago we said that Cellspin Soft Will Likely Need to Pay the Accused Partys Lawyers Too After Frivolous Litigation With Patents Eliminated Under 35 U.S.C. 101 and Donald Zuhn caught up with a similar case shortly afterward when he wrote:

Last month, in Akeso Health Sciences, LLC v. Designs for Health, Inc., District Judge S. James Otero of the U.S. District Court for the Central District of California denied a Motion for Exceptional Case Determination and Award of Attorneys Fees filed by Defendant Designs for Health, Inc. (DFH). In its Motion, DFH argued that the case should be deemed exceptional within the meaning of 35 U.S.C. 285, and that DFH should therefore be awarded attorneys fees.

Frivolous patent litigation going astray and punished again? We have seen not one but several such cases very recently. Its becoming somewhat of a trend. 35 U.S.C. 28...

09:40

British politician: Cambridge Analytica-linked Facebook data possibly accessed from Russia The Hill: Technology Policy

Personal Facebook data gathered without users' knowledge by Cambridge Analytica prior to the 2016 election was possibly accessed from Russia and other countries, a member of British Parliament said Tuesday.Damian Collins, a Conservative MP...

09:19

Fedora Gets An Unofficial Kernel Based On Clear Linux Phoronix

While the kernel configuration is just one part of Intel's Clear Linux optimizations for their performance-oriented distribution, a Fedora user has taken the liberty of spinning a Fedora kernel build based upon Clear Linux's kernel configuration...

09:04

Software Patents Royalty (Tax) Campaign by IBM, a Serial Patent Bully, and the EPOs Participation in All This Techrights

The EPO continues to advocate software patents, even at the USPTO (post-Alice)

A typefiend

Summary: The agenda of US-based patent maximalists, including patent trolls and notorious bullies from the United States, is still being served by the European Patent Office, which has already outsourced some of its work (e.g. translations, PR, surveillance) to the US

THE EPO has not changed under Antnio Campinos. Only the face changed, not even the nationality. We generally try not to mix posts about the US with posts about Europe, but this one will be the exception because the EPO is going to the US again, as Battistelli used to do quite a lot (even hiring US-based PR firms, contracting US academics for preparation of his propaganda, setting up UPC propaganda events over there and so on).

the EPO is going to the US again, as Battistelli used to do quite a lot (even hiring US-based PR firms, contracting US academics for preparation of his propaganda, setting up UPC propaganda events over there and so on).For those who dont know, the patent maximalists in the US have been hyping up some case known as Berkheimer, which we have written over a dozen articles about. In a nutshell, its some old (almost half a year) Federal Circuit case that spoke about fact-finding or weight of evidence considered by the Patent Trial and Appeal Board (PTAB) when dealing with inter partes reviews (IPRs). As we explained right from the very start (publication of this decision), nothing but spin came out of it, courtesy of law firms with a selfish agenda. Yesterday even a European firm, Marks & Clerk (promoting software patents as usual) pulled a Berkheimer even though the US Supreme Court (SCOTUS) pretty much said no to software patents. Remember that Marks & Clerk also supported policies of corrupt Battistelli and lobbied pretty hard for the UP...

09:02

Think Everyone Died Young in Ancient Societies? Think Again SoylentNews

People in the past were not all dead by 30. Ancient documents confirm this. In the 24th century BCE, the Egyptian Vizier Ptahhotep wrote verses about the disintegrations of old age. The ancient Greeks classed old age among the divine curses, and their tombstones attest to survival well past 80 years. Ancient artworks and figurines also depict elderly people: stooped, flabby, wrinkled.

This is not the only type of evidence, however. Studies on extant traditional people who live far away from modern medicines and markets, such as Tanzania's Hadza or Brazil's Xilixana Yanomami, have demonstrated that the most likely age at death is far higher than most people assume: it's about 70 years old. One study found that although there are differences in rates of death in various populations and periods, especially with regards to violence, there is a remarkable similarity between the mortality profiles of various traditional peoples.

High infant mortality and inaccuracy at the other end of the age range skew the numbers.


Original Submission

Read more of this story at SoylentNews.

09:00

Teensy Hat Controls Games Hackaday

[Carson] didnt know how to use an accelerometer until he wired one up to a Teensy and put it all in a hat. The result is a joystick that will probably cause you neck problems if you play video games for very long. You can see a video of how the device came to be and how it works, below.

We liked the approach of building up the circuit and testing it before integrating it with the hat. He used a small breadboard with half the Teensy pins hanging off. That seems to work, although wed be worried about something shorting or floating pins causing issues. Of course, if you drove the disconnected pins as outputs or inputs with pullups that might not be a big deal.

A lot of the video is focused more upon the setup of the custom controller for some specific games, but it did seem to work well. We couldnt help but be envious of anyone who can move their neck that much without aches and pains.

The controller didnt seem very practical, if were honest, although he did get a little better at using it by the end of the video. It was a fun way to experiment with an accelerometer, however it would probably be nice to add a battery and some wireless communication so that you arent trailing a cable.

The code is available via Pastebin. About the biggest takeaway from that was the need to program a dead zone so that tiny movements dont turn into control inputs.

If you are more interested in how these accelerometers work which is quite interesting [Bill Hammack] has just the video for that. If moving your head isnt really your cup of tea, you can use the same ideas for gesture control, as well.

08:24

The European Council Needs to Check Battistellis Back Room Deals/Back Door/Backchannel With Respect to Christian Archambeau Techrights

Archambeau and Casado (Team Battistelli) next to Belgiums Jrme Debrulle, the alleged special bridge/link/shim between the two

CASDAO with ARCHAMBEAU

Summary: Worries persist that Archambeau is about to become an unworthy beneficiary (nepotism) after a Battistelli setup that put Campinos in power, supported by the Belgian delegation which is connected to Archambeau, a national/citizen of Belgium

IT IS NO secret that Battistelli and Antnio Campinos are close and have been close for many years, not just because they both speak French and are French nationals. Christian Archambeau too is rather close, having worked at the EPO, where he too could speak French (hes Belgian).

Practitioners in this domain dont seem to know that Battistelli might have something to do with Christian Archambeau getting the seat of Battistellis successor of choice.As we noted this morning, there are good reasons to investigate allegations that Archambeau will get his new (prospective) position as part of an elaborate exchange set up by Battistelli and maybe Campinos too. This isnt how promotions and hirings are supposed to be done, certainly not in the EU. Practitioners in this domain dont seem to know that Battistelli might have something to do with Christian Archambeau getting the seat of Battistellis successor of choice. Maybe they dont care, either. World Intellectual Property Review (WIPR) has just published this article titled Practitioners share hopes for Campinoss replacement and it talks about Brexit:

Christian Archambeaus succession of Antnio Campinos as executive director of the European Union Intellectual Property Office (EUIPO) has been well received by practitioners, who hope he will be a safe pair of hands amid Brexit turmoil.

The Permanent Representatives Committee, which is respo...

08:24

Hillicon Valley: Trump tries to quell Russia furor | Sparks fly at hearing on social media | First House Republican backs net neutrality bill | Meet the DNC's cyber guru | Sinclair defiant after merger setback The Hill: Technology Policy

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Morgan Chalfant (@mchalfant16),...

07:56

07:47

No Friday Free Software Directory IRC meetup on Friday July 20th FSF blogs

No meeting will be taking place this week due to travel, but meetings will return to our regular schedule starting on Friday, July 27th.

When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.

If you are eager to help, and you can't wait until the next meeting, our participation guide will provide you with all the information you need to get started on helping the Directory today!

07:42

Lawmaker credits Facebook for removing page inciting violence against Republicans The Hill: Technology Policy

Facebook on Tuesday removed a page for inciting violence against Republicans after Rep. Matt Gaetz (R-Fla.) brought it up in a hearing.Gaetz said his office previously brought the page to Facebook's attention and the social media...

07:30

07:30

Get Tips to Build Your Power Supply Skill Set IEEE Spectrum Recent Content full text

4 Ways to Build Your Power Supply Skill Set

More of today's design problems are being caused by the systems that power them. Designs are placing higher demands on their power systems and so during the design phase, your power supply needs to be able to provide reliable power to your device under test. Learn expert tips in the "4 Ways to Build Your Power Supply Skill Set" eBook so you can better understand these issues and how to prevent them. 

07:29

System76 Moves Ahead With Preparing To Manufacture Their Own Desktop Linux PCs Phoronix

Back in April 2017 was the announcement that System76 would begin designing and manufacturing their own systems beginning with desktops and to be followed at a later date by their own laptops, rather than relying upon whitebox designs that they currently retail with their Ubuntu/Pop!_OS-loaded PCs. The Colorado-based company is inching closer to fully realizing their goal...

07:29

The British Are Building a Spaceport SoylentNews

The lure of commercial riches in space is spurring a variety of plans to help launch all the components necessary for a fully functioning orbital economy.

The latest to enter this private-sector race is the U.K., which announced Monday that it plans to construct the nation's first commercial vertical launch spaceport in northern Scotland. Lockheed Martin Corp. was awarded $31 million for two U.K. projects: Establishing vertical launch operations in Sutherland and a development program slated for Reading to deploy a new "delivery vehicle" to deploy as many as six small satellites.

Is it the second coming of the Space Race?


Original Submission

Read more of this story at SoylentNews.

07:03

Lawmakers split over how to expand rural broadband The Hill: Technology Policy

Lawmakers on Tuesday sparred over ways to bring more investment to rural broadband services.The House Energy and Commerce Subcommittee on Communications and Technology heard from experts on the problems with building out rural broadband.Rep. Marsha...

07:00

abc News Not Even Wrong

[For those not up to speed on this story, see blog posts here and here from last December, as well as comments to those posts.]

The last couple months Ive heard reports from several people claiming that arithmetic geometers Peter Scholze and Jakob Stix had identified a serious problem with Mochizukis claimed proof of the abc conjecture. These reports indicated that Scholze and Stix had traveled to Kyoto to discuss this with Mochizuki, and that they were writing a manuscript, to appear sometime this summer. It seemed best then to not publicize this here, better to give Mochizuki, Scholze and Stix the time to sort out the mathematics and wait for them to have something to say publicly.

Today though I saw that Ivan Fesenko has put out a document entitled Remarks on Aspects of Modern Pioneering Mathematical Research. It refers in footnote 18 to:

two recent texts by Sh. Mochizuki, Report on discussions, held during the period March 1520, 2018, concerning inter-universal Teichmller theory (IUTCH)and Comments on the manuscript by ScholzeStix concerning inter-universal Teichmller theory (IUTCH), July 2018

I havent seen these two texts, or the Scholze-Stix manuscript. What I have heard about them is that Scholze-Stix identify what they see as a specific, serious flaw in the proof, and that Mochizuki denies that this is a problem or that his manuscript needs to be revised. Presumably, after the two sides try and sort this out amongst themselves, at some point well see something publicly available describing the details of their disagreement.

Fesenkos document has a lot of unpleasant things to say about those who have written anything at all skeptical concerning Mochizukis claimed proof, mostly without naming names. He refers to journalists and US bloggers as having produced ignorant absurd articles and posts, presumably has someone other than me in mind since the information posted here about this I believe has been quite accurate and of reasonably high quality. The one negative reference to identified mathematicians is in the text with footnote 18 pointing to Scholze and Stix, which says:

Several researchers, who could have become potential learners of IUT and then progressed to become experts, declined invitations to participate in the IUT workshops. Some, affected by negative emotions, broke professional rules of conduct and made public their ignorant and sometimes intolerant opinions. Tellingly, the only questions produced were shallow and misplaced and they were communicated only after several years of requests to do so.

...

06:30

Nanoparticles Enable Molecular Electronic Devices IEEE Spectrum Recent Content full text

Nanoparticle contacts open the way to better sensors

Last week, researchers at IBM Research-Zurich in Rschlikon, Switzerland, and the Universities of Basel and Zurich announced in a letter published in Nature a new method for creating electrical contacts to individual molecules on a silicon chip. The advance could open up a promising new way to develop sensors and possibly other electronic or photonic applications of manipulating single molecules.

When, in the mid-1970s, researchers discovered single molecules with interesting electronic properties such as that of a diode, hopes were high that this would spur the development of a new semiconductor technology that might compete with silicon-based electronics. However, establishing electrical contacts to such molecules remained essentially an activity confined to the laboratory. While it is possible to make contact with these molecules from the tips of scanning tunneling microscopes (STMs), these experiments required vacuum and low-temperature conditions. Moreover, single electrical junctions remained difficult to reproduce because they varied widely in the current they admitted to the molecule. These problems were the main reason why, up to now, no molecular-electronic devices were available. 

We needed to fabricate devices that are more or less identical, ambient stable, and that can be placed on a robust platform, such as a silicon chip, in numbers of several billions, to compete with CMOS technology, says Emanuel Lrtscher, of IBM Research, who is a coauthor of the Nature paper. 

To accomplish that, the researchers first turned to a sandwich-on-silicon approach attempted in the past. But that did not work. On a silicon wafer, they created platinum electrodes, which they covered with a dielectric, a thin layer of nonconducting material. Then they created nanopores in this layer, using conventional etching techniques. They filled these pores with a solution of alkane-dithiol molecules and allowed the molecules in the solution to form a self-assembled monolayer in the pores and form a single monolayer of densely packed parallel oriented molecules.

Like the bottoms of wine bottles in a crate, one end of the molecules made contact with the exposed platinum layer at the bottom of the pores. Up to now, researchers had attempted to cover these nanopores with another thin platinum layer to form the upper contact. But the electrical contacts obtained in this way showed a wide variation in contact resistance caused by variations in...

06:22

Developing Microrobotics for Disaster Recovery and High-Risk Environments Lifeboat News: The Blog

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage. Partnering rescue personnel with robots to evaluate high-risk scenarios and environments can help increase the likelihood of successful search and recovery efforts, or other critical tasks while minimizing the threat to human teams.

Whether in a natural disaster scenario, a search and rescue mission, a hazardous environment, or other critical relief situation, robots have the potential to provide much needed aide and support, said Dr. Ronald Polcawich, a DARPA program manager in the Microsystems Technology Office (MTO). However, there are a number of environments that are inaccessible for larger robotic platforms. Smaller robotics systems could provide significant aide, but shrinking down these platforms requires significant advancement of the underlying technology.

Technological advances in microelectromechanical systems (MEMS), additive manufacturing, piezoelectric actuators, and low-power sensors have allowed researchers to expand into the realm of micro-to-milli robotics. However, due to the technical obstacles experienced as the technology shrinks, these platforms lack the power, navigation, and control to accomplish complex tasks proficiently.

06:09

Twitter suspended 58 million accounts last quarter of 2017 The Hill: Technology Policy

Twitter suspended at least 58 million accounts in the last quarter of 2017 according to numbers reviewed by the Associated Press. The new figure comes after the company confirmed that it separately booted another 70 million fake accounts from its...

06:00

Beverage Holder of Science Hackaday

The folks at [K&J Magnetics] have access to precise magnetometers, a wealth of knowledge from years of experience but when it comes to playing around with a silly project like a magnetic koozie, they go right to trial and error rather than simulations and calculations. Granted, this is the opposite of mission-critical.

Once the experimentation was over, they got down to explaining their results so we can learn more than just how to hold our beer on the side of a toolbox. They describe three factors related to magnetic holding in clear terms that are the meat and bones of this experiment. The first is that anything which comes between the magnet and surface should be thin. The second factor is that it should be grippy, not slippy. The final element is to account for the leverage of the beverage being suspended. Say that three times fast.

Magnets are so cool for anything from helping visualize gas atoms, machinists tools, and circumventing firearm security features.

05:57

The Galaxy S10's Key Feature will Reportedly be Ultrasonic SoylentNews

It's one of the worst-kept secrets in the phone industry: Samsung is hoping to eventually sell you a phone with a fingerprint sensor that lives underneath the screen.

But how? Well, a pair of reports out of China and Korea suggest that sucker might be ultrasonic -- firing high-frequency acoustic waves through the glass that capture your fingerprint without fear of being defeated by dirt or grease.

Might be fun to hack the sensor to do other things.


Original Submission

Read more of this story at SoylentNews.

05:55

Oracle Solaris 11.4 Public Beta Updated With KPTI For Addressing Meltdown Phoronix

In addition to sending down a new SRU for Solaris 11.3, the Oracle developers left maintaining Solaris have issued their second beta of the upcoming Solaris 11.4...

05:53

Microsoft rumored to be working on its own Android smartphone TechWorm

Is Microsoft planning to release its own Android powered smartphone?

Last year, Microsoft had discontinued its Windows 10 Mobile-powered Lumia series of phones, withdrew the Lumia project citing disappointing sales and exited the smartphone market. However, the company has not stopped creating or adapting software for Android and iOS smartphones to make their presence felt in the market.

Now, a Microsoft Store employee (who wanted to remain anonymous) in a series of messages with a...

05:43

Sparks fly at hearing on anti-conservative bias in tech The Hill: Technology Policy

Lawmakers clashed Tuesday at a contentious hearing over claims that social media platforms and tech companies are biased against conservative viewpoints.Republicans on the House Judiciary Committee said the hearing addressed a serious issue. But...

05:39

GitHub adds Python support for security alerts Help Net Security

GitHub has announced that its recently introduced feature for alerting developers about known vulnerabilities in software packages that their projects depend on will now also work for Python packages. About Security Alerts The security alerts service depends on the Dependency Graph, which is turned on by default for every public repository and can be set up for private repositories. GitHub tracks public vulnerabilities in Ruby gems, NPM and Python packages on MITREs Common Vulnerabilities and More

The post GitHub adds Python support for security alerts appeared first on Help Net Security.

05:22

Samsung Galaxy S10 could come in three sizes with a 6.4-inch infinity display TechWorm

Samsung Galaxy S10 may reportedly come in 3 models and sport ultrasonic fingerprint scanner

While the Samsung Galaxy Note 9 is expected to hit the shelves in early August this year, there is already a lot of leaks and rumors surrounding its next flagship, Galaxy S10 expected to be released early next year.

According to a new report from the renowned TF International Securities analyst, Ming-Chi Kuo, Samsung is reportedly planning to release three models of the upcoming flagship, Galaxy S10 in the year 2019 to match Apples rumored trifecta of iPhones.

Ming-Chi Kuo believes that the S10 lineup will be launched in three different models: one with a 5.8-inch panel, another with a 6.1-inch display and a third one with a 6.4-inch screen.

The two larger higher-end Galaxy S10 models will reportedly feature ultrasonic FOD, or fingerprint on display technology, which will allow users to scan their finger by placing it on the screen. The fingerprint scanners on these devices will be embedded in the front of their displays. However, the smaller Galaxy S10 will have the fingerprint sensor on the side of the device. According to the report, the ultrasonic FOD part is made by GIS and O-film and based on a Qualcomm design and software.

Kuo said he believes Samsung will aggressively promote the on-screen fingerprint scanning, as one of the biggest differences between the rivals. Samsung CEO Guo Minghao, who was present at a recent event in Wuhan, China confirmed that the company is set to integrate the ultrasonic fingerprint tech in the Galaxy Note 10, and on the Galaxy high-end A series slated for launch next year.

Recently, there was also a rumor that the higher-end S10 might include five cameras, which could feature a triple camera setup at the back and dual cameras on the front.

Samsung typically releases its new Galaxy S lineup in late February at the annual Mobile World Congress (MWC) trade show. It is scheduled to hold an event on August 9th to announce the Note 9. Probably, we might be able to hear some more news on S10. Keep watching this space for more updates!!!

Source: Business Insider

The post Samsung Galaxy S10 could come in three sizes with a 6.4-inch infinity display appeared firs...

05:11

Dem lawmaker blasts Amazon over sale of white-supremacist merchandise The Hill: Technology Policy

Rep. Keith Ellison (D-Minn.) is demanding answers from Amazon CEO Jeff Bezos after a report found that his company has been profiting off of white-supremacist merchandise sold on the site.In a letter sent to Bezos on Tuesday amid the ...

04:42

A Novel Gene Therapy To Treat One Of The Worlds Biggest Growing Chronic Disease: Dementia and Alzhiemers Lifeboat News: The Blog

The brain is about 10% neurons and 90% neural network support cells, called neuroglia, or glial cells, which surround and insulate neurons, protect them from damage, and supply them with nutrients and oxygen. Neuroglia are often found to malfunction in neurological disorders such as Alzheimers Disease or amyotrophic lateral sclerosis (ALS).


Research studies indicate that telomerase gene therapy may not only reverse Alzheimers Disease and other dementias, but it may even protect people from developing such diseases.

This is indeed hopeful news for the nearly 50 million victims of Alzheimers or related dementia worldwide as well as for the millions of aging people with Parkinsons and aging-related mental decline.

Telomerase gene therapy appears to rejuvenate microglial (the immune cells of the brain) cells in Alzheimers Disease according to promising research study data.

04:39

2600 JOINS THE SECUREDROP NETWORK 2600 - 2600: The Hacker Quarterly

We are very proud to join forces with the Freedom of the Press Foundation by becoming a part of the SecureDrop open-source whistleblower system. This is an extremely secure method of accepting documents and other material from anonymous sources. Coded by the late Aaron Swartz, SecureDrop is currently in operation worldwide at a variety of media outlets who have a strong interest in protecting their sources and publishing the truth.

In order to use SecureDrop, you must run Tor Browser and connect to our .onion address. Specific details can be found at www.2600.com/securedrop. It's very simple to add documents and have them sent to us without our ever knowing who the source is. The system allows for messages to be sent back and forth between us and the submitter, again without identities, IP numbers, or geographical locations being revealed.

SecureDrop has been a topic at previous HOPE conferences and there are panels on the groundbreaking service at The Circle of HOPE this weekend. We are thrilled to add our names to those who have already made this project as vital as it is to a free and open press.

(You can still submit articles to 2600 in the old-fashioned way by emailing them to articles@2600.com. Your contributions to our pages are what help make the hacker world so interesting.)

04:37

IT87 Linux Driver For Supporting Many Motherboard Sensors Is Facing Death Phoronix

While Linux hardware support for desktop PCs has advanced a great deal over the years, one area that continues to struggle is support for fan/thermal/power sensors on many of today's motherboards. This area has struggled with not enough public documentation / data-sheets from ASIC vendors as well as not enough upstream Linux kernel developers being interested in the hwmon subsystem. The IT87 Linux driver for many common Super I/O chips found on countless motherboards is unfortunately facing a downfall...

04:36

Pirates Punish Denuvo-Protected Games With Poor Ratings TorrentFreak

The Denuvo anti-piracy system has been a sworn enemy of many gaming pirates for years.

Early on, the anti-tampering system appeared to be unbreakable. While its getting cracked more easily nowadays, its still seen as a major roadblock.

Denuvo leaves the average game pirate powerless. While they wait for crackers to find a patch, theres little they can do, aside from bickering and complaining perhaps, which is quite common and not without consequence.

According to new research published by Dr. Zike Cao of the Erasmus Universitys Rotterdam School of Management, game pirates are retaliating against Denuvo-protected games by posting fake negative ratings.

In a paper titled Revenge after Freebies Are Gone? Effects of Curbing Piracy on Online User Ratings Cao researched the effect of Denuvo protection on user comments posted on the review site Metacritic. The results suggest that Denuvo protection leads to significantly lower ratings across the board.

The researcher compared reviews of protected PC games with non-Denuvo protected console versions of the same games, showing that the former get a significantly lower rating on average.

After ruling out several alternative explanations, including the suggestion that Denuvo hurts gameplay, he sees only one explanation for this finding.

In summary, the results from multiple identification tests consistently point to one conclusion: The decreases in mean PC user ratings of Denuvo games are likely due to deliberate posting of extremely negative ratings from illegal gamers out of retaliation for being deprived of the opportunity to play free cracked games.

Moreover, those retaliating illegal gamers are more likely to write textual comments along with the extremely negative ratings, but they seem to write significantly shorter than genuine reviewers do, Cao adds.

Denuvo vs non-Denuvo

The decrease in ratings is quite substantial. The estimates suggest that a Denuvo-protected game suffers, on average, a decrease of 0.5 to 0.9 points on a ten point scale. This difference is mostly driven by extremely negative reviews, where users rate games with a 0 or 1.

This negative effect remains and is even more pronounced when reviews from professional critics (Metascores) are exactly the same for Denuvo-protected (PC) a...

04:30

SPINES Design Makes for Modular Energy Harvesting Hackaday

The SPINES (Self-Powered IoT Node for Environmental Sensing) Mote is a wireless IoT environmental sensor, but dont let the neatly packed single PCB fool you into thinking its not hackable. [Macro Yau] specifically designed SPINES to be highly modular in order to make designing an energy harvesting sensor node an easier task. The way [Macro] sees it, there are two big hurdles to development: one is the energy harvesting itself, and the other is the software required to manage the use of every precious joule of that harvested energy.

[Macro] designed the single board SPINES Mote in a way that the energy harvesting portion can be used independently, and easily integrated into other designs. In addition, an Arduino library is being developed to make it easy for the power management to be done behind the scenes, allowing a developer to concentrate on the application itself. A solar-powered wireless sensor node is one thing, but helping people get their ideas up and running faster in the process is wonderful to see.

The HackadayPrize2018 is Sponsored by:

04:30

How to Set Up and Use LXD on CentOS Linux 7.x Server nixCraft

I know how to setup LXD on a Debian or Ubuntu Linux. How do I install, configure and setup LXD on CentOS Linux 7.x? Introduction: Linux containers give an environment as close as possible as the one you would get from a VM but without the overhead that comes with running a separate kernel and Continue reading "How to Set Up and Use LXD on CentOS Linux 7.x Server"

The post How to Set Up and Use LXD on CentOS Linux 7.x Server appeared first on nixCraft.

04:24

Decade of Research Shows Little Improvement in Websites' Password Guidance SoylentNews

More than a decade after first examining the issue, research by the University of Plymouth has shown most of the top 10 English-speaking websites offer little or no advice guidance on creating passwords that are less likely to be hacked.

Some still allow people to use the word 'password', while others will allow single-character passwords and basic words including a person's surname or a repeat of their user identity.

Professor of Information Security Steve Furnell conducted the research, having carried out similar assessments in 2007, 2011 and 2014.

Have password restrictions ever helped?


Original Submission

Read more of this story at SoylentNews.

04:23

Millions of Telefonica customers data exposed after security breach HackRead

By Waqas

Telefonica, a telecom operator based in Spain, has become a

This is a post from HackRead.com Read the original post: Millions of Telefonica customers data exposed after security breach

04:19

Dems try to end hearing on bias against conservatives in tech The Hill: Technology Policy

Democrats on the House Judiciary Committee on Tuesday tried to end a hearing on alleged conservative bias at social media companies and instead turn the discussion to Russian meddling in the 2016 presidential election.Rep. Jerrold Nadler (...

03:31

SoftwareONE launches Security for Microsoft 365 Help Net Security

SoftwareONE announced that it has launched Security for Microsoft 365, a managed service that enhances the security of Microsoft 365 environments as well as manages and protects users, devices, applications and information from advanced security threats. In a mobile-first, cloud-first world, the attack surface has expanded past the traditional IT perimeter and enterprises need to manage identities, protect devices, govern and manage Shadow IT, and make sure sensitive information is safeguarded. Security for Microsoft 365 More

The post SoftwareONE launches Security for Microsoft 365 appeared first on Help Net Security.

03:28

OpenMP 5.0 Public Draft Released Phoronix

The public draft of the OpenMP 5.0 SMP programming standard is now available for review ahead of the specification's expected stable release before the end of 2018...

03:17

One Nation,One Poll: Will it Bring Election Reforms in India? Lifeboat News: The Blog

India is one of the largest country in world.Some of its state out of twenty eight are many time bigger than many countries.So to organize even a municipality election or a Village Panchayat election needs activating grass root workers,movable and unmovable properties and personals,Government officials and machinery,security personals and many other things.Lets have a glance on how an election is organized in India:

1-There are more than hundred political parties in India but there are only half a dozen National Political Parties and almost a little above a dozen regional political parties .Rest can be counted as local political parties or groupings. The Election Commission of India which also acts as quasi judiciary body during Elections is sole body to manage Elections in India.Its first task is to allot political symbols and flags to each political party the moment it comes in existence.

2- Second step in Election Process is declaration of Election Dates. The moment election dates are announced the Election Commission starts acting and Anti defection Law comes in place.

3- Third step is to prepare voter list on constituency wise. There are above 550 Lok Sabha seats and close to 5000 State Assembly seats.To prepare a separate Voter list in each election becomes heavy on government resources if Elections are or organized separately.

4- Election Commission has an additional task of demarking constituencies in each election as jurisdiction of districts changes,new districts/constituencies are made or some are merged.

5-To monitor criminal activities including expenditure and mode of conveyancing voters is also monitored apart from other crimes as India is home to some of biggest political criminals.

6- Relocating movable and unmovable government machinery,security personals,booth officers,EVMs and setting up booth is next step in process of organizing elections.This makes Election Commission of India the largest Government Body after Indian Railways during elections.

7- To conduct a free and fair election is next obligation of Election Commission how ever political crime like booth capturing,threatening,money laundering has been evident.

8- The EVMs are brought to District Head quarter on the same evening in safe custody and kept under supervision of security personals.

9- Election Commission has already announced a date of Counting which now,with Implementation of EVMs take less than a day unlike a week in some cases when manual counting was done.

10- Finally fate of political candidates are announced after several rounds of counting.

Now if all Local,State(remember there are twenty eight states in...

03:09

Many infosec professionals reuse passwords across multiple accounts Help Net Security

Lastline announced the results of a survey conducted at Infosecurity Europe 2018, which suggests that 45 percent of infosec professionals reuse passwords across multiple user accounts a basic piece of online hygiene that the infosec community has been attempting to educate the general public about for the best part of a decade. The research also suggested that 20 percent of security professionals surveyed had used unprotected public WiFi in the past, and 47 percent More

The post Many infosec professionals reuse passwords across multiple accounts appeared first on Help Net Security.

03:08

Best 3 alternatives to the popular movie streaming website, MegaShare 2018 TechWorm

Check out the top three alternatives to MegaShare

MegaShare, was one of the largest video streaming portals for TV shows and movies on the Internet. However, MegaShare abruptly shut down in the year 2014, due to trouble with its video hosting provider.

The shutdown announcement read, Because there are problems with video hosting company, MEGASHARE is closing and not updating new movies in future. Thank you for your support!

MegaShare didnt host any of the videos itself but it depended on files from third-party sites such as Google, Putlocker and Sockshare. It was one of the streaming portals that used Google as video hosting provider. Back then, Google was criticized for allowing pirate movie streaming portals to use its servers to distribute copyrighted material. The search giant was backlashed for not doing enough to prevent pirate sites from showing up in search results. Whether the shutting down of MegaShare was related to the video hosting troubles is still unknown.

Since its launch in 2010, MegaShare enjoyed steady growth and operated from .sh and .info domains until its shutdown in 2014. Several clone websites cropped up to take its place. However, recently Google has removed MegaShare and its clones from its search results.

In the absence of MegaShare, we have made a list of the top rated free movie streaming websites for our readers for an uninterrupted online movie watching experience.

Here are best 3 MegaShare like movie streaming websites:

  1. Solar Movie

Solar Movie website is the best alternative, as it boasts a high-quality search engine for movies online. The Solar Movie home page displays the list of most popular movies, which are typically the latest ones. Details and user rating of each movie are added, which helps one choose the most proper one to watch. Currently, the SolarMovie website is being operated from Solarmoviez.ru; however, this can quickly change as anti-piracy groups are always on the lookout to stop such streaming websites.

  1. Fmovies

Fmovies is another popular movie streaming service where you can watch movies online in high quality for free without advertisements. You can also download movie, subtitles to your PC to watch movies offline. It has a range of movies from the oldest to the newest for their viewers.

  1. 1337x

Launched in 2007, 1337x is another best and most popular torrent site. This site is basically based on community, where people share best torrent files for free download. It indexed in large database from man...

03:00

Franoise Barr-Sinoussi: Virus Hunter Hackaday

It was early 1983 and Franoise Barr-Sinoussi of the prestigious Pasteur Institute in Paris was busy at the centrifuge trying to detect the presence of a retrovirus. The sample in the centrifuge came from an AIDS patient, though the disease wasnt called AIDS yet.

Barr-Sinoussi and Montagnier in 1983Barr-Sinoussi and Montagnier in 1983, Image source: Le Globserver

Just two years earlier in the US, a cluster of young men had been reported as suffering from unusual infections and forms of cancer normally experienced by the very old or by people using drugs designed to suppress the immune system. More cases were reported and US Centers for Disease Control and Prevention (CDC) formed a task force to monitor the unusual outbreak. In December, the first scientific article about the outbreak was published in the New England Journal of Medicine.

By May 1983, researchers Barr-Sinoussi and Luc Mo...

02:51

Open Cars Kick-Off Conference, Nov 6, Orlando, Florida, USA SoylentNews

Bruce Perens is organizing a conference on Open Cars. It will take place Tuesday, November 6th, 2018 in Orlando, Florida, USA. The concept behind Open Cars, is the idea that the hardware as well as the software conform to open standards and that, as an automotive product, it must be sufficiently accessible and modular to enable technology upgrades, aftermarket products, and testing by security researchers. The interfaces must be openly documented and be backed by openly disclosed APIs and hardware interfaces. It would not have to run on open data, but could nonetheless protect data privacy and security as well as or better than proprietary automotive products do today. As the emphasis is on the standards and interfaces, both hardware and software, it would not necessarily require that manufacturers base their vehicles on open source software.

The automobile industry thinks they have a solution: lease rather than sell autonomous cars, lock the hood shut, and maintain them exclusively through their dealers.

That works great for the 1%. But what about the rest of us? The folks who drive a dented, 10-year-old car? We should have the option to drive autonomous cars, and to participate in the same world as the more wealthy folks.

Open Cars will be the solution. These are automobiles sold with standard fittings, plugs and standards, so that an autonomous driving computer can be purchased in the aftermarket, installed and tested by a certified mechanic, and put on the road. Similarly, the on-board computer, communication, navigation, and entertainment system on an Open Car will be pluggable, purchased on the aftermarket, and will fit into well-defined niches in the vehicle.


Original Submission

Read more of this story at SoylentNews.

02:45

Luminosity RAT author pleads guilty to creating & selling hacking tool HackRead

By Waqas

In February this year, we informed our readers about the

This is a post from HackRead.com Read the original post: Luminosity RAT author pleads guilty to creating & selling hacking tool

02:34

Oracle Solaris 11.3 SRU 34 Brings GCC 7.3, Other Package Updates Phoronix

While Solaris 11.4 is still in the oven being baked at Oracle, the thirty-fourth stable release update of Solaris 11.3 is now available...

02:00

This Smart Watch Detects Cardiac Arrest, and Summons Help IEEE Spectrum Recent Content full text

The new iBeat Heart Watch raises the alert if your heart rate falters

Consumers have proven fickle about wearables: Many a well-intentioned person has started out enthusiastic about a Fitbit, only to dump it in a drawer after a few months. But iBeat, the startup behind the iBeat Heart Watch, is betting that people will be more faithful to their wearable devices if their lives are on the line. 

If you saw someone wearing this new smartwatch, which launched last week, youd assume they were using it for the quaint purpose of telling time. Its true purpose would be apparent only if the watchs sensors detected the telltale signs of cardiac arrest.

Then the dial hands on the watch face would be replaced by a stark question: Are you okay? Two big touch-screen buttons allow the user to either respond yes, in which case the watch goes back to being a watch and life goes on, or no, in which case the watch sends an alert to the users emergency contacts and also notifies the iBeat dispatch office, which can place a call to emergency responders.  

Alert on the iBeat watch Photo: iBeat

The watch is designed for people who have heart problems and know that theyre at risk of sudden cardiac arrestwhich occurs when the hearts electrical system malfunctions and it stops beating. (A heart attack is a different thing that happens when a blockage in a blood vessel halts blood flow to the heart.) These at-risk people will have to wear the watch 24/7 so it can monitor them continuously. 

Because of that around-the-clock requirement, company founder and CEO Ryan Howard says his team worked hard to design a watch that would look normal on users wrists, whether theyre wearing business suits or jogging suits. Otherwise the people who need it simply wont wear it. My dad still wears purple polo shirtshe still thinks hes stylish, Howard said during a product demo at the IEEE Spectrum office. 

The iBeat watch first gained attention in 2016 with a campaign on Indiegogo and an investment announcement by TVs own Dr. Oz. Like many a company with a crowdfunded project, iBeat has missed a number of deadlines: It originally promised to start shipping watches to backers in summer of 2017.&n...

01:42

Genetically modified babies given go ahead Lifeboat News: The Blog

The Nuffield Council on Bioethics says changing the DNA of a human embryo could be morally permissable if it is in the childs best interests.

Science editor.

01:30

Emotional Hazards That Lurk Far From The Uncanny Valley Hackaday

A web search for Uncanny Valley will retrieve a lot of information about that discomfort we feel when an artificial creation is eerily lifelike. The syndrome tells us a lot about both human psychology and design challenges ahead. What about the opposite, when machines are clearly machines? Are we all clear? It turns out the answer is No as [Christine Sunu] explained at a Hackaday Los Angeles meetup. (Video also embedded below.)

When we build a robot, we know whats inside the enclosure. But people who dont know tend to extrapolate too much based only on the simple behavior they could see. As [Christine] says, people anthropomorphize at the drop of the hat projecting emotions onto machines and feeling emotions in return. This happens even when machines are deliberately designed to be utilitarian. iRobot was surprised how many Roomba owners gave their robot vacuum names and treated them as family members. A similar eruption of human empathy occurred with Boston Dynamics video footage demonstrating their robot staying upright despite being pushed around.

In the case of a Roomba, this kind of emotional power is relatively harmless. In the case of robots doing dangerous work in place of human beings, such attachment may hinder robots from doing the job they were designed for. And even more worrisome, the fact theres a power means theres a potential for abuse. To illustrate one such potential, [Christine] brought up the Amazon Echo. The cylindrical puck is clearly a machine and serves as a point-of-sale terminal, yet people have started treating Alexa as their trusted home advisor. If Amazon should start monetizing this trust, would users realize whats happening? Would they care?

Ideally that power should be put back in the hands of the user, to be used for our own goals instead of goals of a retail giant. Its easy to start doing it for ourselves. [Christine] described how one of her projects used a simple servo to mimic a pair of eyebrows that trigger an emotional response to frowns. We are also cautioned to remain wary, to keep asking ourselves who else is wielding this power and what theyre doing with it. Because one thing is certain: more robots are coming into our lives and some of them dont look like machinery. The international space station just received CIMON, a flying ball with a face. Here on earth, we have products like Kuri and...

01:22

Enough with the excuses Lifeboat News: The Blog

Excuses for age-related death are just that: excuses.


The knowledge that every ambition is doomed to frustration at the hands of a skeleton has never prevented the majority of human beings from behaving as though death were no more than an unfounded rumor.

The quote above is by Aldous Huxley. It sums up very well humanitys attitude towards death, and interestingly, it can be interpreted in two opposite ways: praise for the human ability to soldier on, even in the face of inevitable demise, or a short, withering remark on how delusional we can be that, if we just ignore it really hard, maybe we dont need to worry about death.

When I see people professing with apparently unshakable conviction the necessity of death, their not fearing it, or thatas they sometimes say in my hometown when somebody dies those who live have it worse, I cant help but think that the better interpretation of Huxleys quote is the second one.

01:18

Dell XPS 13: Windows 10 vs. Linux Distribution Benchmarks Phoronix

Recently I have published benchmarks looking at Windows Server and FreeBSD against eight Linux distributions as well as a 9-way Linux desktop OS benchmark comparison while the latest in this string of fresh Linux distribution benchmarks is looking at the Linux laptop performance impact, if any, between these operating systems. Up for this benchmarking dance was Microsoft Windows 10, Windows 10 when running Ubuntu 18.04 via WSL, Ubuntu 18.04 itself, Fedora Workstation 28, openSUSE Tumbleweed, and Clear Linux.

01:18

World's Oldest Bread Found at Prehistoric Site in Jordan SoylentNews

The discovery of flatbread remains from around 14,500 years ago in northeastern Jordan indicate that people began making bread, a vital staple food, millennia before they were thought to have developed agriculture. The charred bread residue was found in a stone fireplace at an archeological site there.

Reuters : World's oldest bread found at prehistoric site in Jordan
Haaretz : Archaeologists Find 14,400-year-old Pita in Jordan's Black Desert


Original Submission

Read more of this story at SoylentNews.

01:16

Stable kernel updates LWN.net

Stable kernels 4.17.7, 4.14.56, 4.9.113, and 4.4.141 have been released. The 4.17.7 kernel is broken for i386 systems. "I did this release anyway with this known problem as there is a fix in here for x86-64 systems that was nasty to track down and was affecting people. Given that the huge majority of systems are NOT i386, I felt this was a safe release to do at this point in time." Beyond that, these kernels all contain the usual set of important fixes.

01:03

Security updates for Tuesday LWN.net

Security updates have been issued by Arch Linux (thunderbird), Debian (ruby-rack-protection), Fedora (firefox and soundtouch), Red Hat (kernel), Scientific Linux (gnupg2), SUSE (perl and python-paramiko), and Ubuntu (policykit-1).

01:00

HostBRZ VPS, Shared & Reseller Hosting from $2/year! Low End Box

Elliot from HostBRZ has just submitted their first offer to LowEndBox today. They are offering pure SSD VPS, Shared and Reseller hosting based out of Chicago, Dallas and New York!

Their WHOIS is public, and you can find their ToS/Legal Docs here. They accept PayPal, Bitcoin, Litecoin, Ethereum ZCash and all major Credit Cards as payment methods.

Heres what they had to say: 

HostBRZ is a SSD hosting company that enjoys building long term partnerships with our clients by unmatched service and customer support. It is our goal to service clients at the highest level possible and accept nothing less than that.

All of our servers are powered by SSDs protected by RAID technology ensuring the highest performance and redundancy possible. With HostBRZ, your websites will load faster than your competition because of our enterprise hardware and rapid Samsung SSD performance!

Heres the offers: 

VPS-LEB-1GB

  • 1 CPU Core
  • 1GB RAM
  • 25GB SSD
  • 1.5TB Bandwidth
  • 1Gbps Uplink
  • 1 x IPv4
  • OpenVZ/SolusVM
  • $12/yr
  • [ORDER]

VPS-LEB-2GB

  • 2 CPU Core
  • 2GB RAM
  • 40GB SSD
  • 2.5TB Bandwidth
  • 1Gbps Uplink
  • 1 x IPv4
  • OpenVZ/SolusVM
  • $3.99/mo OR $21/yr
  • [ORDER]

VPS-LEB-8GB

  • 4 CPU Core
  • 8GB RAM
  • 150GB SSD
  • 10TB Bandwidth
  • 1Gbps Uplink
  • 1 x IPv4
  • OpenVZ/SolusVM
  • $7/mo OR $75/yr
  • [ORDER]

SHARED-LEB-1

  • 5GB SSD Space
  • 300GB Bandwidth
  • Host 1 Domain
  • Unlimited Databases
  • Unlimited Email Accounts
  • Unlimited FTP Accounts
  • Unlimited Subdomains
  • cPanel Control Panel
  • Softaculous Script Installer
  • LiteSpeed Web Server Powered
  • East Coast Datacenter (NY)
  • DDoS Protected Servers
  • ...

00:43

BTC-e Operator, Accused of Laundering $4 Billion, to be Extradited to France The Hacker News

In a legal extradition tug-of-war between the United States and Russia, it seems France has won the game, surprisingly. A Greek court has ruled to extradite the Russian cybercrime suspect and the former operator of now-defunct BTC-e crypto exchange to France, instead of the United States or to his native Russia, according to multiple Russian news outlets. Alexander Vinnik, 38, has been

00:38

[$] Python post-Guido LWN.net

The recent announcement by Guido van Rossum that he was stepping away from his "benevolent dictator for life" (BDFL) role for Python was met with some surprise, but not much shock, at least in the core-developer community. Van Rossum has been telegraphing some kind of change, at some unspecified point, for several years now, though the proximate cause (the "PEP 572 mess") is unfortunate. In the meantime, though, the project needs to figure out how to govern itself moving forwardVan Rossum did not appoint a successor and has left the governance question up to the core developers.

00:36

[CVE-2018-1000211] Public apps can't revoke OAuth access & refresh tokens in Doorkeeper Open Source Security

Posted by Justin Bull on Jul 17

Good morning everyone,

A security bulletin for all of you.

Software:
--------
Doorkeeper (https://github.com/doorkeeper-gem/doorkeeper)

Description:
----------
Doorkeeper is an OAuth 2 provider for Rails written in Ruby.

Affected Versions:
---------------
4.2.0 - 4.3.2
5.0.0.rc1

Fixed Versions:
-------------
4.4.0
5.0.0.rc2

Problem:
--------

Any OAuth application that uses public/non-confidential authentication when
interacting with...

00:35

Energy Storage Projects to Replace Three Natural Gas Power Plants in California IEEE Spectrum Recent Content full text

Tesla batteries and behind-the-meter Li-ion batteries could deliver electricity to meet peak Silicon Valley demand

Energy storage could get a big boost if California officials green-light plans by utility Pacific Gas and Electric Co. to move forward with some 567 megawatts of capacity.

Included in the mix is more than 180 MW of lithium-ion battery storage from Elon Musks company Tesla. The Tesla-supplied battery array would be owned by PG&E and would offer a 4-hour discharge duration. The other projects would be owned by third parties and operated on behalf of the utility under long-term contracts. All of the projects would be in and around Silicon Valley in the South Bay area.

Once deployed, the storage would sideline three gas-fired power plantsthe 605-MW Metcalf Energy Center, the 47-MW Feather River Energy Center, and the 47-MW Yuba City Energy Centerthat lack long-term energy supply contracts with utilities. Even without the contracts, the states grid operator identified the units as needed for local grid reliability. It, and independent power producer Calpine, which owns the plants, asked federal regulators to label the plants as must run. That would let them generate electricity and be paid for it even without firm utility contracts.

The storage would sideline three gas-fired power plants that lack long-term energy supply contracts with utilities

Both PG&E and Californias utility regulators object to that idea. They argue that the must-run designation without firm contracts would distort the states power market and lead to unfair prices. Backing up their objection, regulators earlier this year directed the utility to seek offers to replace the gas-fired power plants with energy storage.

The utility says that its search prompted more than two dozen storage proposals with 100 variations. PG&E narrowed the list to four, which it presented to state regulators in late June.

One of the projects, Vistra Energy Moss Landing storage project, would be owned by Dynegy Marketing and Trade, a unit of Vistra Energy Corp. The holding company manages more than 40 gigawatts of generating capacity across 12 states. The project would be a transmission-connected, stand-alone lithium-ion battery energy storage resource in Monterey County. The facility, which would feature a 300-MW, 4-hour duration battery array, could enter service in December 2020 under a 20-year contract.

A second project, Hummingbird Energy Storage, would be owned by a unit...

00:24

How to Teach Your Employees About Cybersecurity HackRead

By Carolina

In the modern world, threats to security are no longer

This is a post from HackRead.com Read the original post: How to Teach Your Employees About Cybersecurity

00:16

Tips for Success with Open Source Certification

Title: 
Tips for Success with Open Source Certification

00:03

Sinclair stands by Tribune merger despite FCC setback The Hill: Technology Policy

Sinclair Broadcast Group is sticking by its proposed $3.9 billion merger with Tribune Media despite a major setback for the deal at the Federal Communications Commission (FCC).On Monday, FCC Chairman Ajit Pai, who has been a reliable ally for...

00:01

Lets Talk About Elon Musks Submarine Hackaday

When word first broke that Elon Musk was designing a kid-sized submarine to help rescue the children stuck in Thailands Tham Luang cave, it seemed like a logical thing for Hackaday to cover. An eccentric builder of rockets and rocket-launched electric sports cars, pushing his engineering teams and not inconsiderable financial resources into action to save children? All of that talk about Elon being a real life Tony Stark was about to turn from meme into reality; if the gambit paid off, the world might have its first true superhero.

With human lives in the balance, and success of the rescue attempt far from assured (regardless of Elons involvement), we didnt feel like playing arm-chair engineer at the time. Everyone here at Hackaday is thankful that due to the heroics of the rescuers, including one who paid the ultimate price, all thirteen lives were saved.

Many said it couldnt be done, others said even saving half of the children would have been a miracle. But Elons submarine, designed and built at a breakneck pace and brought to Thailand while some of the children were still awaiting rescue, laid unused. It wasnt Elons advanced technology that made the rescue possible, it was the tenacity of the human spirit.

Now, with the rescue complete and the children well on their way to returning to their families, one is left wondering about Elons submarine. Could it have worked?

The Wild Boar

To start, lets look at what we know about Elons creation. Named Wild Boar after the childrens soccer team, calling the craft a submarine is perhaps overly generous. Essentially, the Wild Boar is a sealed tube that divers would pull along through the cave system. It has no propulsion, indeed no active control systems of any kind. Ballast is provided by divers weight belts, which would be added and subtracted as necessary depending on the weight of its occupant.

...

Tuesday, 17 July

23:58

Lawmakers call on Google, Facebook to push back on Vietnam cyber law The Hill: Technology Policy

A group of lawmakers is pressing Google and Facebook to push back against a new cybersecurity law in Vietnam that critics say amounts to an effort by the country's communist government to crack down on political dissent.The measure was approved...

23:51

Japans Increasing Stockpile of Plutonium cryptogon.com

Via: Channel News Asia: Japan has amassed enough plutonium to make 6,000 atomic bombs as part of a programme to fuel its nuclear plants, but concern is growing that the stockpile is vulnerable to terrorists and natural disasters. Japan has long been the worlds only non-nuclear-armed country with a programme to reprocess spent nuclear fuel []

23:45

Internet Archive's Open Library Now Supports Full-Text Searches for All 4+ Million Items SoylentNews

The Internet Achive's Open Library has over 40 million full-text, searchable, electronic editions of books. The full-text search for all 4+ million books has just been made available. This includes not just books that have entered the public domain but also close to half a million others. Though the press release is weak on technical details, exploring the advanced search interface quickly make clear which capabilities are available.


Original Submission

Read more of this story at SoylentNews.

23:43

San Francisco to vote on new tax on big businesses to help homeless The Hill: Technology Policy

San Francisco residents will vote this November on whether the city should increase taxes on large businesses to pay for the homeless and housing services, according to the Associated Press. The news outlet reported that the city elections...

23:39

A Proposal To Allow Python Scripting Within The GCC Compiler, Replacing AWK Phoronix

A SUSE developer is seeking feedback and interest on the possibility of allowing a scripting language -- most likely Python -- to be used within the GCC compiler code-base. This would primarily be used for replacing existing AWK scripts...

23:36

Xen Project Hypervisor Power Management: Suspend-to-RAM on Arm Architectures

Title: 
Xen Project Hypervisor Power Management: Suspend-to-RAM on Arm Architectures

23:33

Potential DNA Damage from CRISPR Has Been Seriously Underestimated cryptogon.com

Via: STAT News: From the earliest days of the CRISPR-Cas9 era, scientists have known that the first step in how it edits genomes snipping DNA creates an unholy mess: Cellular repairmen frantically try to fix the cuts by throwing random chunks of DNA into the breach and deleting other random bits. Research published []

23:30

Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems cryptogon.com

Via: Bleeping Computer: Academics say theyve mounted a successful GPS spoofing attack against road navigation systems that can trick humans into driving to incorrect locations. The research is of note because previous GPS spoofing attacks have been unable to trick humans, who, in past experiments, often received malicious driving instructions that didnt make sense or []

23:27

14,400-Year-Old Flatbread Remains That Predate Agriculture cryptogon.com

Via: Atlas Obscura: BREAD-MAKING AROUND THE WORLD HAS evolved from a similar, ancient approach of combining flour, water, and sometimes yeast. But for prehistoric societies with limited tools, making bread wasnt so simple. Given how laborious it was to make bread thousands of years ago, its long been associated with settled Neolithic societiesand only after []

23:24

Website glitches mar start of Amazons Prime Day The Hill: Technology Policy

Shoppers looking to cash in on Amazons Prime Day were met with website glitches that prevented them from completing their purchases on Monday, CNBC reported. Many shoppers had issues on the site at the start of Prime Day, which provides...

23:18

21-Year-Old Woman Charged With Hacking Selena Gomez's Email Account The Hacker News

A 21-year-old New Jersey woman has been charged with hacking into the email accounts of pop star and actress Selena Gomez, stealing her personal photos, and then leaked them to the Internet. Susan Atrach of Ridgefield Park was charged Thursday with 11 felony countsfive counts of identity theft, five counts of accessing and using computer data to commit fraud or illegally obtain money,

23:14

Defense in depth -- the Microsoft way (part 55): new software built with 5.5 year old tool shows 20+ year old vulnerabilities Bugtraq

Posted by Stefan Kanthak on Jul 17

Hi @ll,

Microsoft released <https://support.microsoft.com/en-us/help/4340040/>
"July 2018 servicing release for Microsoft Desktop Optimization Pack"
some days ago.

<https://www.microsoft.com/en-us/download/details.aspx?id=57157> offers
three executable installers to update existing installations:
MBAM2.5_Client_x64_KB4340040.exe, MBAM2.5_Client_x86_KB4340040.exe and
MBAM2.5_X64_Server_KB4340040.exe

1. All three executable...

23:02

House Republican backs bill to reinstate net neutrality rules The Hill: Technology Policy

A bill that would reinstate the Federal Communications Commission's net neutrality rules has won its first House GOP supporter who is also one of the most vulnerable Republicans in this fall's midterms.Rep. Mike Coffman (R-Colo.) announced on...

22:32

An Idle Injection Framework Queued For Linux 4.19 Phoronix

Another one of the new frameworks slated for the Linux 4.19 kernel cycle kicking off in August is for idle injection...

22:31

Researchers show how to manipulate road navigation systems with low-cost devices Security Affairs

Researchers have developed a tool that poses as GPS satellites to deceive nearby GPS receivers and manipulate road navigation systems.

Researchers have developed a tool that poses as GPS satellites to deceive nearby GPS receivers. The kit could be used to deceive receivers used by navigation systems and suggest drivers the wrong direction.

we explore the feasibility of a stealthy manipulation attack against road navigation systems. The goal is to trigger the fake turn-by-turn navigation to guide the victim to a wrong destination without being noticed. reads the research paper published by the experts.

Our key idea is to slightly shift the GPS location so that the fake navigation route matches the shape of the actual roads and trigger physically possible instructions.

The group of researchers is composed of three teams from Microsoft, Virginia Tech in the US, and the University of Electronic Science and Technology of China.

The boffins were able to spoof packets transmitted by satellites to mobile devices and navigation systems used in the automotive industry.

The tests conducted by experts allowed to remotely change the routes with up to 95 per cent accuracy. The researchers built a radio-transmitting device based on Raspberry Pi, they used just $223 of components.

The radio transmitting device broadcasts fake location data and makes it impossible for the receivers to have the real positioning data from the satellite.

In a Real attack scenario, the device could be used to deceive navigation systems in cars.

We show that adversaries can build a portable spoofer with low costs (about $223), which can easily penetrate the car body to take control of the GPS navigation system. continues the...

22:17

AMDGPU Firmware Updated From 18.20, Vega M Blobs Added Phoronix

The latest AMDGPU firmware/microcode binary images for Radeon GPUs have landed in the Linux-Firmware Git tree...

22:12

Cambridge Analytica Staff Set Up New Firm SoylentNews

Arthur T Knackerbracket has found the following story:

Former staff from scandal-hit Cambridge Analytica (CA) have set up another data analysis company.

Auspex International will be "ethically based" and offer "boutique geopolitical consultancy" services, according to its website.

CA was shut down by its parent company, SCL Elections, which itself faces criminal charges over failure to supply data when requested.

Auspex will work in the Middle East and Africa initially.

The company was set up by Ahmed Al-Khatib, a former director of Emerdata, which was also created in the wake of the Cambridge Analytica scandal to continue the work it was doing.

In a press release announcing the new company, he says CA's collapse was a "bitter disappointment" to him.

-- submitted from IRC


Original Submission

Read more of this story at SoylentNews.

22:00

PTAB and 101 (Section 101) Have Locked the Patent Parasites Out of the Patent System Techrights

They want to get back in, having put one of them (Iancu) inside the patent office

Locked out

Summary: Patent Trial and Appeal Board (PTAB) inter partes reviews (IPRs) have contributed a great deal to patent quality and have reduced the number of frivolous patent lawsuits; this means that firms which profit from patent applications and litigation hate it with a passion and still lobby to weaken if not scuttle PTAB

DO NOT be alarmed by self-serving lawyers who claim that the US has collapsed in terms of innovation or that the patent system is in trouble. The USPTO simply improved its processes somewhat. In whose favour? Not law firms. Then theres the even greater contribution of patent courts, which have become stricter in lieu with SCOTUS and the Federal Circuit (the primary appeals court for patents).

Well done. More generics!

This case (Jazz Pharms., Inc. v Amneal Pharms., Inc.) was mentioned some days ago here and elsewhere. It happened on a Friday (decision handed down), so a lot of the media overlooked/missed it. Patent maximalists said:

The patented invention at issue in Jazz Pharms is not a drug or drug treatment, but rather to a drug distribution system for tracking prescriptions for drugs with a risk of abuse[1] The PTAB found claims from all six patents to be invalid a...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog