2018-01-01 00:00:00 ..
2018-03-22 14:18:28 UTC
2018-03-23 00:10:51 UTC
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
The suspect in a spate of bombings that terrorized residents of Austin, Texas, died after detonating an explosive inside his vehicle as a SWAT team approached to apprehend him on the side of a highway, officials said.
Early Wednesday, authorities tracked the suspect — a 24-year-old white man — to a hotel in Round Rock, a city in the Austin metropolitan area, Austin Police Chief Brian Manley told a news conference early Wednesday.
They tracked his vehicle until it pulled over on Interstate 35 and the suspect "detonated a bomb inside the vehicle, knocking one of our SWAT officers back and one of our officers fired on the vehicle as well," Manley said.
The UK says that a Soviet-developed Novichok nerve agent was used against Sergei Skripal, his daughter, and bystanders, and has given Russia "until midnight tonight" to explain how it came to be used:
British Foreign Secretary Boris Johnson said Tuesday that Russia has "until midnight tonight" to explain how a lethal Novichok nerve agent that was developed in Russia came to be used on U.K. soil. Johnson said Britain is preparing to take "commensurate but robust" action.
Reiterating British Prime Minister Theresa May's statement that it was "highly likely" Russia was to blame for the poisoning of former Russian spy Sergei Skripal and his daughter, Yulia, Johnson said, "the use of this nerve agent would represent the first use of nerve agents on the continent of Europe since the Second World War."
Meanwhile, police are probing the death of a Russian exile living in London:
Nikolai Glushkov, a Russian exile who was a close friend of a noted critic of President Vladimir Putin, has died from an "unexplained" cause in London, police say. The Metropolitan Police says that its counter-terrorism unit is handling the case "because of associations that the man is believed to have had."
Glushkov, 68, was a close friend of former Russian oligarch Boris Berezovsky, a prominent critic of the Kremlin who was found dead in 2013. At the time, an inquiry found he had hanged himself — but Glushkov publicly disputed the idea that his friend and former business ally would have killed himself.
As British media began reporting Glushkov's death, the police issued a statement saying, "An investigation is underway following the death of a man in his 60s in Kingston borough."
[Ed note: After this story was submitted, it became known that there was a remote code execution (RCE) vulnerability on the Trustico web site which allowed malicious users to run arbitrary code as root on the server. Story at Ars Technica: Trustico website goes dark after someone drops critical flaw on Twitter. Link to the tweet. As of the time of this writing, the Trustico web site is unavailable. --martyb]
Customers of HTTPS certificate reseller Trustico are reeling after being told their website security certs – as many as 23,000 – will be rendered useless within the next 24 hours.
This is allegedly due to a security blunder in which the private keys for said certificates ended up in an email sent by Trustico. Those keys are supposed to be secret, and only held by the cert owners, and certainly not to be disclosed in messages. In the wrong hands, they can be used by malicious websites to masquerade as legit operations.
Unless the affected certificates are replaced in time, visitors to websites using Trustico-sold HTTPS certs will be turned away by their browsers, due to the digital certificates being revoked.
The whole situation is a mess, and possibly the result of a turf war. Here's what we've managed to ascertain.
What is Trustico?
Trustico, based in Croydon, UK, touted SSL/TLS certificates, which are used by websites to encrypt and secure their connections. It resold certs from the Symantec brand umbrella: Symantec, GeoTrust, Thawte, and RapidSSL. This umbrella is now owned and operated by DigiCert.
If you wanted to buy, say, a RapidSSL-issued certificate, you could do so via Trustico. The HTTPS cert ultimately leads back, along a chain of trust, to DigiCert, a root certificate authority trusted by web browsers and other software. In turn, a website presenting the Trustico-sold cert is trusted, its traffic secured using encryption, and the reassuring green padlock is displayed in visitors' browsers.
Why are the certificates being revoked?
According to DigiCert's chief product officer Jeremy Rowley earlier today, Trustico told DigiCert in early February that its resold certificates had been in some way "compromised," and that the certs needed to be mass revoked as a result.
DigiCert staff, we're told, asked Trustico for more information on this security mishap. The reseller replied it had a copy of the private keys, which is usually grounds for revocation, and thus insisted that DigiCert revoke the certificates.
When pressed for evidence, Trustico on Wednesday simply emailed DigiCert 23,000 certificates' private keys as proof it held this information, it is claimed. This forced DigiCert's hand: under the rulebook of standards set by the elders of the certificate security and browser worlds, the Trustico-sold certificates had to be revoked as a precaution within 24 hours. Specifically, the ones with their private keys in the email will be canceled.
There has been a "security incident" at the entrance to the NSA's headquarters in Fort Meade, Maryland:
Several people have been injured and a suspect was taken into custody after a car crashed outside the US National Security Agency's headquarters.
Gunfire rang out after the black SUV approached the facility in Fort Meade, Maryland, without authorisation.
An NSA spokesman said it was unclear if the shots had been fired by law enforcement officers or the suspect, adding that the scene was now secure.
Update: Launch seems to have been successful. The two side boosters landed nearly simultaneously. Footage from the drone ship was cut off. The car made it into space; but the third stage will need to coast through the Van Allen radiation belts for around six hours before it makes the final burn for trans-Mars injection.
SpaceX's newest rocket, the Falcon Heavy, is set to be launched at around 1:30 PM EST (6:30 PM UTC) today. The launch window extends to 4:00 PM EST (9:00 PM UTC).
SpaceX will attempt to recover all three boosters during the launch. The two previously-flown side boosters will attempt to land nearly simultaneously at Cape Canaveral Air Force Station's Landing Zones 1 and 2. The center core will attempt to land on a drone barge hundreds of miles off the coast of Florida.
The dummy payload for the Falcon Heavy is Elon Musk's personal 2008 Tesla Roadster. It is carrying a mannequin wearing SpaceX's
space suit flight suit that will be used when the company begins to send astronauts to the International Space Station. The car will be launched into a heliocentric orbit that will bring it close to Mars (and back near Earth) periodically, and is equipped with three cameras. Its stereo system will be playing David Bowie's Space Oddity.
If the launch is successful, the Falcon Heavy could be flown within the next 3 to 6 months for a customer such as the U.S. Air Force, Arabsat, Inmarsat, or ViaSat.
Falcon Heavy will be capable of launching 63,800 kg to low-Earth orbit (LEO), 26,700 kg to geosynchronous transfer orbit (GTO), 16,800 kg to Mars, or 3,500 kg to Pluto (New Horizons was 478 kg). It will supplant the Delta IV Heavy, which is capable of launching 28,790 kg to LEO or 14,220 kg to GTO. Space Launch System Block 1 will be capable of launching 70,000 kg to LEO (Block 1B: 105,000 kg to LEO, Block 2: 130,000 kg to LEO).
Musk has suggested that an additional two side boosters could be added to Falcon Heavy (perpendicularly?) to make a "Falcon Super Heavy" with even more thrust. This may not happen if SpaceX decides to focus on the BFR instead, which as planned would be able to launch 150,000 kg to LEO while being fully reusable and potentially cheaper than the Falcon 9 (or capable of launching 250,000 kg to LEO in expendable mode).
Computerworld has just posted a story warning that you should immediately hold off installing any of Intel's Meltdown/Spectre microcode fixes.
The warning, which encompasses just about every Intel processor out there, from all PC manufacturers, takes effect immediately. And there's no indication when it will get fixed.
You know how you're supposed to flash the BIOS or update the UEFI on all of your Intel machines, to guard against Meltdown/Spectre? Well, belay that order, private! Intel just announced that you need to hold off on all of its new patches. No, you can't uninstall them. To use the technical term, if you ran out and applied your Intel PC's latest firmware patch, you're hosed.
In what appears to be a catastrophic curtain call to the "oops" moment that I discussed ten days ago, it now seems that the bright, new firmware versions — which Intel has had six months to patch — have a nasty habit of causing "higher system reboots."
According to executive vice president Navin Shenoy, on the Intel Newsroom site, the current advice is:
We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior.
And that covers just about everybody in the sentient non-ARM universe.
While the affected products site[*] doesn't list individual chips, the breadth of the recall is breathtaking — second-, third-, fourth-, fifth-, sixth-, seventh- and eighth-generation Core processors, Xeon, Atom, and lesser Core i3, i5 and i7 processors — they're all in the bin.
As we start the week, I want to provide an update on the reboot issues we reported Jan. 11. We have now identified the root cause for Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Over the weekend, we began rolling out an early version of the updated solution to industry partners for testing, and we will make a final release available once that testing has been completed.
Based on this, we are updating our guidance for customers and partners:
- We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior. For the full list of platforms, see the Intel.com Security Center site.
- We ask that our industry partners focus efforts on testing early versions of the updated solution so we can accelerate its release. We expect to share more details on timing later this week.
- We continue to urge all customers to vigilantly maintain security best practice and for consumers to keep systems up-to-date.
[*] Intel's updated security advisory lists the affected processors:
The following Intel-based platforms are impacted by this issue. Intel may modify this list at a later time. Please check with your system vendor or equipment manufacturer for more information regarding updates for your system.
- Intel® Core™ i3 processor (45nm and 32nm)
- Intel® Core™ i5 processor (45nm and 32nm)
- Intel® Core™ i7 processor (45nm and 32nm)
- Intel® Core™ M processor family (45nm and 32nm)
- 2nd generation Intel® Core™ processors
- 3rd generation Intel® Core™ processors
- 4th generation Intel® Core™ processors
- 5th generation Intel® Core™ processors
- 6th generation Intel® Core™ processors
- 7th generation Intel® Core™ processors
- 8th generation Intel® Core™ processors
- Intel® Core™ X-series Processor Family for Intel® X99 platforms
- Intel® Core™ X-series Processor Family for Intel® X299 platforms
- Intel® Xeon® processor 3400 series
- Intel® Xeon® processor 3600 series
- Intel® Xeon® processor 5500 series
- Intel® Xeon® processor 5600 series
- Intel® Xeon® processor 6500 series
- Intel® Xeon® processor 7500 series
- Intel® Xeon® Processor E3 Family
- Intel® Xeon® Processor E3 v2 Family
- Intel® Xeon® Processor E3 v3 Family
- Intel® Xeon® Processor E3 v4 Family
- Intel® Xeon® Processor E3 v5 Family
- Intel® Xeon® Processor E3 v6 Family
- Intel® Xeon® Processor E5 Family
- Intel® Xeon® Processor E5 v2 Family
- Intel® Xeon® Processor E5 v3 Family
- Intel® Xeon® Processor E5 v4 Family
- Intel® Xeon® Processor E7 Family
- Intel® Xeon® Processor E7 v2 Family
- Intel® Xeon® Processor E7 v3 Family
- Intel® Xeon® Processor E7 v4 Family
- Intel® Xeon® Processor Scalable Family
- Intel® Xeon Phi™ Processor 3200, 5200, 7200 Series
- Intel® Atom™ Processor C Series
- Intel® Atom™ Processor E Series
- Intel® Atom™ Processor A Series
- Intel® Atom™ Processor x3 Series
- Intel® Atom™ Processor Z Series
- Intel® Celeron® Processor J Series
- Intel® Celeron® Processor N Series
- Intel® Pentium® Processor J Series
- Intel® Pentium® Processor N Series
After 10 PM EST on Friday, The U.S. Senate rejected a deal that would fund the U.S. government for another month:
Only five Democrats voted to advance the bill — Sens. Joe Manchin (W.Va.), Joe Donnelly (Ind.), Heidi Heitkamp (N.D.) and Claire McCaskill (Mo.), who are all up for reelection this year in states carried by President Trump in 2016 election, and newly-elected Sen. Doug Jones (D-Ala.).
Republicans were also not united, as Sens. Rand Paul (Ky.), Lindsey Graham (S.C.), Mike Lee (Utah) and Jeff Flake (Ariz.) also voted against advancing the legislation. Sen. John McCain (R-Ariz.), who is battling brain cancer, was absent.
The procedural vote remained open late Friday, though it needed 60 votes to pass and was well short of that number with 48 senators voting against it.
Senate Majority Leader Mitch McConnell and Senate Minority Leader Charles Schumer continued to negotiate after the vote opened (archive), but no deal has been reached yet. As of midnight (5 minutes before this story went live), the government shutdown was in effect.
From the NY Daily News (and covered almost everywhere):
A Kansas man shot to death by police earlier this week was the victim of a misdirected online prank known as "swatting," according to social media chatter.
The victim, identified as Andrew Finch, was gunned down on Thursday night after cops responded to his Wichita home amid a false report that he had shot his father to death and was holding his mother, brother and sister hostage.
A responding officer fatally shot Finch, 28, when he came to the front door, Wichita deputy police chief Troy Livingston said during a press conference. Livingston declined to comment on what triggered the officer to open fire and would not say whether Finch was armed.
takyon: The swatting was quickly linked to a dispute between two Call of Duty players:
On Twitter, more than a dozen people who identified themselves as being in the gaming community told The Eagle that a feud between two Call of Duty players sparked one to initiate a "swatting" call. After news began to spread about what happened Thursday night, the people in the gaming community, through Twitter posts, pointed at two gamers.
"I DIDNT GET ANYONE KILLED BECAUSE I DIDNT DISCHARGE A WEAPON AND BEING A SWAT MEMBER ISNT MY PROFESSION," said one gamer, who others said made the swatting call. His account was suspended overnight.
According to posts on Twitter, two gamers were arguing when one threatened to target the other with a swatting call. The person who was the target of the swatting gave the other gamer a false address, which sent police to a nearby home instead of his own, according to Twitter posts. The person who was to be the target of the swatting sent a Tweet saying, "Someone tried to swat me and got an innocent man killed." [...] Dexerto, a online news service focused on gaming and the Call of Duty game, reported the argument began over a $1 or $2 wager over the game.
Update: 911 Call from suspect (4m58s).
Several people were killed Monday morning when an Amtrak train derailed and fell off a bridge over Interstate 5 near Mounts Road between Lakewood and Olympia. The Associated Press, citing an unnamed U.S. official, reported that at least six people were killed in the crash. Gov. Jay Inslee has called a state of emergency in response to the derailment.
Pierce County Sheriff's spokesman Ed Troyer told news media that there were fatalities on the train and that motorists had been injured, but not killed. A total of 77 people were sent to hospitals in Pierce and Thurston counties, according to CHI Franciscan Health, which operates numerous hospitals in Western Washington. Four of the injured are "level red" patients, with critical injuries. The injured are being taken to St. Joseph Medical Center in Tacoma, St. Claire Hospital in Lakewood, St. Anthony Hospital in Gig Harbor and Tacoma General Hospital and Providence St. Peter Hospital in Olympia.
There were 78 passengers and five crew members on the train when it derailed, according to Amtrak.
The train was running on a new, faster service route using a new bypass. This was the first day that the new route was used.
WASHINGTON — The Federal Communications Commission voted on Thursday to dismantle rules regulating the businesses that connect consumers to the internet, granting broadband companies the power to potentially reshape Americans' online experiences.
The agency scrapped the so-called net neutrality regulations that prohibited broadband providers from blocking websites or charging for higher-quality service or certain content. The federal government will also no longer regulate high-speed internet delivery as if it were a utility, like phone service.
The action reversed the agency's 2015 decision, during the Obama administration, to have stronger oversight over broadband providers as Americans have migrated to the internet for most communications. It reflected the view of the Trump administration and the new F.C.C. chairman that unregulated business will eventually yield innovation and help the economy.
It will take weeks for the repeal to go into effect, so consumers will not see any of the potential changes right away. But the political and legal fight started immediately. Numerous Democrats on Capitol Hill called for a bill that would reestablish the rules, and several Democratic state attorneys general, including Eric T. Schneiderman of New York, said they would file a suit to stop the change.
Explosion in Baumgarten (Austria) gas transit plant, russian gas delivery halted for Austria, Slovakia, Hungary, Slovenia, and Croatia. Italy declares energy crisis. Gas price in Europe jumps ~20%. Crude oil futures rise too.
* https://www.youtube.com/watch?v=IMyiQtm56co (far away video)
UPDATE from: http://www.bbc.com/news/world-europe-42321217
Police have cordoned off the area. Some victims suffering burns have been airlifted out by helicopter, Austrian ORF news reports.
One unconfirmed report spoke of 60 hurt.
"I heard a huge explosion and thought at first it was a plane crash," photographer Thomas Hulik, who lives in a nearby village in Slovakia, told AFP news agency. "Then I saw an immense ball of flame."
Gas Connect said the incident should have no effect on gas deliveries to Austria but those to Italy and Croatia might be reduced.
Meanwhile, Russia's Gazprom Export said it was working to redirect gas flows.
It said it was "doing everything possible to secure uninterrupted gas supplies" to customers in the region.
Spot prices rose sharply across Europe after the incident.
You can log in as root on the latest version of MacOS by pressing enter on the login prompt a few times. Just type in root as the user and press enter. There you go no password required.
Not sure what else to say; is this the stupidest massive security hole ever?
From Extreme Tech:
Reproing the bug is simple (at least until Apple fixes it): Type the login "root," then move the cursor into the password field and hit enter several times. It also apparently works if you simply hit the "login" button several times rather than using the keyboard, though a few tries may be necessary.
This was also reported at Ars Technica. Beware that the behavior seems to be that if you do not already have a root account with a (preferably strong) password, this bug essentially creates a root account with an empty password. Attempting this on your own system should be followed up by ensuring that any root a count has a strong password.
There is a patch that has just been made available; again according to Ars Technica:
Yesterday we learned that Apple had made a serious security error in macOS—a bug that, under certain conditions, allowed anyone to log in as a system administrator on a Mac running High Sierra by simply typing in "root" as the username and leaving the password field blank. Apple says that vulnerability has now been fixed with a security update that became available for download this morning on the Mac App Store. Further, the update will automatically be applied to Macs running High Sierra 10.13.1 later today.
Apple's brief notes for this security update (Security Update 2017-001) explain the bug by saying, "A logic error existed in the validation of credentials," and claims the problem has been addressed "with improved credential validation."
North Korea appears to have launched another intercontinental ballistic missile, the Pentagon said Tuesday, with experts calculating that Washington, D.C., is now technically within Kim Jong Un's reach.
[...] The missile launched early Wednesday local time traveled some 620 miles and reached a height of about 2,800 miles before landing off the coast of Japan, flying for a total of 54 minutes. This suggested it had been fired almost straight up — on a "lofted trajectory" similar to North Korea's two previous intercontinental ballistic missile tests. [...] If it had flown on a standard trajectory designed to maximize its reach, this missile would have a range of more than 8,100 miles, said David Wright, co-director of the global security program at the Union of Concerned Scientists. [...] The U.S. capital is 6,850 miles from Pyongyang.
Although it may be cold comfort, it is still unlikely that North Korea is capable of delivering a nuclear warhead to the U.S. mainland. Scientists do not know the weight of the payload the missile carried, but given the increase in range, it seems likely that it carried a very light mock warhead, Wright said. "If true, that means it would not be capable of carrying a nuclear warhead to this long distance, since such a warhead would be much heavier," he said in a blog post.
[Update: The launch was delayed to the end of the 5-minute launch window because of a vessel in the safety area in the bay. Launch was successful. Second-stage separation went cleanly and the Cygnus supply ship is on course for its journey to the International Space Station. NASA TV coverage resumes for solar array deployment scheduled at 8:45 EST (13:45 UTC) --martyb]
[Update 2: Solar array deployment was successful and "the cargo craft is set to fine-tune its approach to the space station with a series of thruster firings over the next two days." - Fnord666]
Managers aborted liftoff of a commercial Antares cargo launcher Saturday when an aircraft strayed into restricted airspace near the rocket's planned flight path east from Virginia's Eastern Shore.
The Antares rocket and a Cygnus supply ship, both owned by Orbital ATK, were ready for liftoff at 7:37 a.m. EST (1237 GMT) Saturday. The launch team loaded kerosene and liquid oxygen propellants into the first stage of the Antares booster, and a computer-controlled countdown sequencer took over for the final three minutes before liftoff.
But an unidentified aircraft ventured into the safety zone surrounding the rocket and its planned trajectory over the Atlantic Ocean. "LC, LC, we are red," a member of the launch team told Adam Lewis, Orbital ATK's launch conductor. "We have an aircraft in the hazard area." "Copy that," Lewis replied. "Abort, abort, abort. This is LC on the countdown net. Abort, abort, abort. Proceed to the abort safing checklist."
Another attempt will be made today (Sunday) at 7:14 AM EST (1214 GMT). You can watch coverage on NASA TV starting right now.
Also at Spaceflight Insider.
While you were doing whatever you were doing last Sunday, the International Consortium of Investigative Journalists - the same that brought you the Panama papers less than two years ago revealed itself to be in the possession of a 13.4 million leaked documents on tax dodgers.
A trove of 13.4 million records exposes ties between Russia and U.S. President Donald Trump's billionaire commerce secretary, the secret dealings of the chief fundraiser for Canadian Prime Minister Justin Trudeau and the offshore interests of the queen of England and more than 120 politicians around the world.
The leaked documents, dubbed the Paradise Papers, show how deeply the offshore financial system is entangled with the overlapping worlds of political players, private wealth and corporate giants, including Apple, Nike, Uber and other global companies that avoid taxes through increasingly imaginative bookkeeping maneuvers.
One offshore web leads to Trump's commerce secretary, private equity tycoon Wilbur Ross, who has a stake in a shipping company that has received more than $68 million in revenue since 2014 from a Russian energy company co-owned by the son-in-law of Russian President Vladimir Putin.
In all, the offshore ties of more than a dozen Trump advisers, Cabinet members and major donors appear in the leaked data.
The new files come from two offshore services firms as well as from 19 corporate registries maintained by governments in jurisdictions that serve as waystations in the global shadow economy. The leaks were obtained by German newspaper Süddeutsche Zeitung and shared with the International Consortium of Investigative Journalists and a network of more than 380 journalists in 67 countries.
[...] The most detailed revelations emerge in decades of corporate records from the white-shoe offshore law firm Appleby and corporate services provider Estera, two businesses that operated together under the Appleby name until Estera became independent in 2016.
At least 31,000 of the individual and corporate clients included in Appleby's records are U.S. citizens or have U.S. addresses, more than from any other country. Appleby also counted clients from the United Kingdom, China and Canada among its biggest sources of business.
Keep your eyes peeled for more articles as they are published by various news outlets: