Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 16 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Do you put ketchup on the hot dog you are going to consume?

  • Yes, always
  • No, never
  • Only when it would be socially awkward to refuse
  • Not when I'm in Chicago
  • Especially when I'm in Chicago
  • I don't eat hot dogs
  • What is this "hot dog" of which you speak?
  • It's spelled "catsup" you insensitive clod!

[ Results | Polls ]
Comments:88 | Votes:246

posted by CoolHand on Monday October 05 2015, @11:17PM   Printer-friendly

BBC News reports that a benign wifi virus is infecting vulnerable home routers and patching the router software so as harden them against malware attacks.

And so far, researchers at Symantec can't find that the the virus does anything malicious. In fact, Symantec wonders: Is there an Internet-of-Things vigilante out there?

Wifatch was first discovered in late 2014 and since then has been steadily scouring the web for routers and other smart devices running vulnerable software.
In a blogpost (linked above), Symantec said that once Wifatch finds and infects a vulnerable router it connects to other compromised devices to download software updates that make them harder to attack successfully.

In addition, it said, Wifatch tries to disinfect devices that have been compromised by malicious software. It regularly reboots devices to kill off malware running on them and return them to a clean state.

Still there are worries, because there are cryptographically protected back doors in Wifatch that allows only the authors to re-connect. Symantec isn't even sure what to recommend as far as removal or mitigation.

Initial infection is suspected to come via the management telnet port being open to the internet. Hopefully no Soylentils would be guilty of that!

But we gotta ask, does anyone believe there is such a thing as a White-Hat virus? Or do those back doors speak louder than actions?

   


Original Submission

posted by CoolHand on Monday October 05 2015, @09:32PM   Printer-friendly
from the no-longer-isolationist dept.

Satellite photos analyzed by IHS Janes show China has dramatically ramped up efforts to construct a second aircraft carrier—the first to be built indigenously there. While the new ship will likely not be a match for US aircraft carriers, it is important for a number of reasons, and representative of China's ambitions to be a naval superpower. The ship is in "advanced state of construction" in a Dailan shipyard, according to analysis of commercial satellite images by IHS Jane's. And China's goal is reportedly to launch the new carrier by this December (in time for Mao Zedong's 122nd birthday), and outfit it by the end of next year.

China's plans to build new carriers have not exactly been a secret. Construction of the ship started in March, and was confirmed to be a carrier by Peoples Liberation Army (PLA) officials speaking to Hong Kong Commercial Daily. The new carrier, called the Type 001A, will include technology currently only used aboard US carriers, according to PLA Navy senior officers: an electromagnetic catapult that will allow aircraft to be launched with greater fuel and weapons loads. That would put China into a very exclusive club.


Original Submission

posted by janrinok on Monday October 05 2015, @07:48PM   Printer-friendly
from the more-hot-stuff dept.

For thousands of years, humans have taken a masochistic pleasure from adding chilli to their food. Now research indicates that the spice that has undoubtedly made our lives more interesting may also make them longer.

There is only one mammal that enthusiastically eats chillies. "Humans come into the Western hemisphere about 20,000 years ago," says Paul Bosland from New Mexico State University. "And they come into contact with a plant that gives them pain - it hurts them. Yet five separate times, chilli peppers were domesticated in the Western hemisphere because humans found some usefulness - and I think it was their medicinal use."

The potential for both health and harm has always been a defining characteristic of chilli peppers, and among scientists, doctors and nutritionists it remains a matter of some dispute which prevails. A huge study, published this summer in the British Medical Journal, seemed to indicate that a diet filled with spices - including chillies - was beneficial for health. A team at the Chinese Academy of Medical Sciences tracked the health of nearly half a million participants in China for several years. They found that participants who said they ate spicy food once or twice a week had a mortality rate 10% lower than those who ate spicy food less than once a week. Risk of death reduced still further for hot-heads who ate spicy food six or seven days a week. Chilli peppers were the most commonly used spice among the sample, and those who ate fresh chilli had a lower risk of death from cancer, coronary heart disease and diabetes.

One of the authors of the study, Lu Qi - who confesses that he is very keen on spicy food - says there are likely to be many reasons for this effect. "The data encourages people to eat more spicy food to improve health and reduce mortality risk at an early age," says Qi, a nutritionist at the Harvard TH Chan School of Public Health, though he adds that spicy food may not be beneficial for those with digestive problems or stomach ulcers.

[More after the break...]

Article includes more possible benefits, but then comes the potential negative side.

Dong is the co-author of a 2011 review, published in the journal Cancer Research, titled The Two Faces of Capsaicin, in which claims about the spice's benefits for health are laid alongside a long list of counter-claims, pointing to negative effects. The report details six studies on rats and mice in which the animals developed signs of cancer in the stomach or liver after their diet was changed to include more capsaicin. Meanwhile, studies examining the effects of capsaicin on the human stomach have delivered wildly divergent results. While one showed visible gastric bleeding after consumption of red pepper, another showed no abnormalities, even when ground jalapeno peppers were placed directly in the stomach.

"Probably it is harmful in the stomach or oesophagus because capsaicin itself can cause inflammation," says Dong. "And if anything can cause inflammation or so-called burning effect, it must cause some cell deaths and therefore the long-term chronic inflammation is maybe harmful."

Far from seeing the chilli's piquancy as an evolutionary "trick" that we are clever enough to see through, as Joshua Tewksbury does, he sees it as a hint to eat the food in moderation - a hint that many of us are ignoring.. Capsaicin - and the chilli pepper - remains enigmatic. But whether it is a friend or foe, we're exposing ourselves to it more and more. Between 1991 and 2011, global consumption of dry chillies increased by 2.5% per year, while our per capita intake increased by 130% in that time. "There's a worldwide huge consumption of this spice, or vegetable, or whatever you want to call it," says Dong. "It's consumed everywhere in the world. Therefore its impact is huge for human health."


Original Submission

posted by janrinok on Monday October 05 2015, @06:17PM   Printer-friendly
from the and-daddies dept.

Mummies aren't just Egyptian pharaohs or toilet paper-wrapped children on Halloween. The ancient British also practiced mummification, researchers say.

A significant amount of skeletons unearthed from the Bronze Age in Great Britain show strong evidence of mummification, according to a paper published Wednesday in the journal Antiquity.

Researchers compared ancient British skeletons with the bones of known mummies, including one from Ireland and one from Yemen. They found similarities indicating that some of the British bodies had been mummified too.


Original Submission

posted by janrinok on Monday October 05 2015, @04:42PM   Printer-friendly
from the growing-confusion dept.

EU Directive 2015/412 allows EU member governments "to restrict or prohibit the cultivation of genetically modified organisms (GMOs) in their territory" and as part of the transitional measures of the directive member states could overrule and exclude themselves from any EU-approved GMO by notification before the 3rd of October 2015.

The following 19 (out of 28) have done so: Austria, Belgium for the Wallonia region, Britain for Scotland, Wales and Northern Ireland, Bulgaria, Croatia, Cyprus, Denmark, France, Germany (except for research), Greece, Hungary, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Poland and Slovenia.

From the Greenpeace link further below:

The bans currently notified apply to the only GM crop currently approved for cultivation in Europe – Monsanto's pesticide-producing GM maize, known as MON810 – but also to the seven GM crops awaiting approval by the Commission.

Sources:


Original Submission

posted by janrinok on Monday October 05 2015, @03:09PM   Printer-friendly
from the another-catchy-name dept.

Scientists have discovered a species of ancient mammal that survived the event that led to the extinction of the dinosaurs.

The remains of this large, rodent-like creature give clues about how mammals "took over" when dinosaurs died out. Kimbetopsalis simmonsae, as the newly-discovered species has been named, was a plant-eating creature that resembled a beaver. The news is published in the Zoological Journal of the Linnean Society.

Dr Stephen Brusatte from the University of Edinburgh, lead researcher on the study, explained how a student on his team called Carissa Raymond found the fossil while prospecting at a site in New Mexico, US. "We realised pretty quickly that this was a totally new type of mammal that no-one has seen before," he told BBC News. The researchers noticed in particular the animal's teeth, which were specialised for plant-chewing, with complicated rows of cusps at the back and incisors at the front for gnawing. They named the species after Kimbeto Wash, the area in the New Mexico badlands where it was found. "The other part of the name - psalis - means 'cutting shears' and is in reference to [the] blade-like teeth," Dr Brusatte explained.

This group of now-extinct mammals, collectively known as multituberculates, originated alongside the dinosaurs, during the Jurassic and thrived for more than 100 million years until they were apparently superseded by rodents.

"[During the Jurassic] these animals were all pretty small," said Dr Brusatte. "Then the asteroid hit, wiped out the dinosaurs and suddenly - in geological terms - this [group of animals] started to proliferate and get bigger. "That's how the rise of mammals started and really the end result of that is us being here today."

The scientists say that this, and other mammal discoveries from that "brave new world", paint a picture of how mammals made it through the extinction event. "A whole lot of mammals did die, but this group is one that made it through pretty well," Dr Brusatte explained. "Literally, the world changed one day. "That asteroid hit and suddenly the dinosaurs are wiped out. It looks like mammals were just waiting their turn and as soon as the dinosaurs disappeared, they thrived."


Original Submission

posted by janrinok on Monday October 05 2015, @01:37PM   Printer-friendly
from the its-a-hard-life dept.

Sprint's place among the big four US wireless carriers continues to be a precarious one, with news reports saying the company now aims to reduce its number of employees and cut between $2 billion and $2.5 billion in costs over the next six months.

A memo from Sprint management to staff said there will be a hiring freeze and "job reductions," according to The Wall Street Journal.

Sprint announced days ago that it will skip a major auction of low-band spectrum, a decision that could push the company further behind its rivals. Sprint has licenses to more spectrum than any other carrier, but AT&T and Verizon control a large majority of low-band spectrum, which is ideal for providing coverage over long distances and indoors. T-Mobile says it intends to buy enough low-band spectrum to cover the entire nation; Sprint says it can improve coverage with its existing spectrum by increasing the number of cell towers.

"Cutting $2.5 billion in costs is an ambitious target," the Journal wrote. "The company had $7.5 billion in operating expenses during the three months ended June 30. The company has said previously it cut $1.5 billion in expenses in the last 12 months... Sprint hasn't posted an annual profit since 2006. In the most recent quarter, it posted a $20 million loss and burned through $2.2 billion in cash."

What's the plan B for Sprint customers, which carrier will they jump to?


Original Submission

posted by janrinok on Monday October 05 2015, @12:09PM   Printer-friendly
from the heartfelt-plea dept.

I'm just informed enough about IT security to know that I really know very very little about it. That said, I probably know ten times as much as do 99% of people. I'm an expert in my field, and while I've been a jack of all trades on many fronts, today's threats to privacy and IT security require expert knowledge to combat.

I do not have time.

  • For example, I hear that Microsoft added updates to Win7/8 that threaten my family's privacy...yet I have not yet gone and removed the offending updates. I moved myself to Ubuntu/xfce, but my son is still using Win8. I'll get to it eventually.
  • For example, java script is a security risk, and I have No-Script, turn off 3rd party cookies, etc, but invariably I have to turn it off for some website (i.e. to pay my bill), and eventually, I stop turning it back to full security.
  • I installed Cyanogenmod and Fdroid on my phone. And for the most part its great..and I have very few apps with permissive permissions settings....but my wife is still using an iphone and ipad, with all sorts of apps...with ridiculous permission leaks..and that is a struggle.

The long winded point I have is that it is now just too damn much work to do it all right. I'm tired after a 10 hour workday. I've obviously taken more steps than most, but it is still leaky as hell...

I need a company/organization that I can reasonably trust to manage my information security/property, to manage my computers, manage my vpns, e.g., to isolate my web browser windows over multiple vpns, ... all of it, and it can't be GOOGLE. My data is my property, as long as I can hold it, so it needs to be a company/organization that built in privacy obligations (like lawyers and doctors supposedly do).

-Signed: A Frustrated Tired Old Nerd (with children)

[Ed's Comment: Does such a company exist? Is it even possible to provide such a service? Or have we just identified a niche in the market for some enterprising person to fill?]


Original Submission

posted by cmn32480 on Monday October 05 2015, @10:37AM   Printer-friendly
from the the-sounds-of-silence dept.

In research presented at the 2015 European Symposium on Research in Computer Security, University of Alabama at Birmingham (UAB) researchers have found that automated and human verification for voice-based user authentication systems are vulnerable to voice impersonation attacks. Nitesh Saxena, Ph.D., is the director of the Security and Privacy In Emerging computing and networking Systems (SPIES) lab and associate professor of computer and information sciences at UAB.

The researchers were able to fool automated systems 80%-90% of the time, and humans about 50% of the time. They warn that computer hardware and voice imitation software continue to improve while the human ability to distinguish real from imitation likely will not.

Using an off-the-shelf voice-morphing tool, the researchers developed a voice impersonation attack to attempt to penetrate automated and human verification systems.

[...] Advances in technology, specifically those that automate speech synthesis such as voice morphing, allow an attacker to build a very close model of a victim's voice from a limited number of samples. Voice morphing can be used to transform the attacker's voice to speak any arbitrary message in the victim's voice.

[...] Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features of vocal cords but also on his or her entire body shape, and on the way sound is formed and articulated.

[More after the Break]

[...] If an attacker can imitate a victim's voice, the security of remote conversations could be compromised. The attacker could make the morphing system speak literally anything that the attacker wants to, in the victim's tone and style of speaking, and can launch an attack that can harm a victim's reputation, his or her security, and the safety of people around the victim.

[...] The results show that the state-of-the-art automated verification algorithms were largely ineffective to the attacks developed by the research team. The average rate for rejecting fake voices was less than 10 to 20 percent for most victims. Even human verification was vulnerable to the attacks. According to two online studies with about 100 users, researchers found that study participants rejected the morphed voice samples of celebrities as well as somewhat familiar users about half the time.

"Our research showed that voice conversion poses a serious threat, and our attacks can be successful for a majority of cases," Saxena said. "Worryingly, the attacks against human-based speaker verification may become more effective in the future because voice conversion/synthesis quality will continue to improve, while it can be safely said that human ability will likely not."

I spent well over an hour in failed attempts to locate the original research paper and the "off-the-shelf-morphing tool." Do any Soylentils have any experience in this realm or have pointers to where one could download such a tool?

I find the security implications to be staggering. Think of all the current and historical recordings once could use for samples: speeches, presentations, court testimony, movies, and simple YouTube postings.

See our recent story: Stealing Fingerprints — Authentication in the Digital Age where there were several comments about using voice prints in lieu of fingerprints for biometric authentication.


Original Submission

posted by cmn32480 on Monday October 05 2015, @08:45AM   Printer-friendly

Mitochondria are the organelles ("small organs") within almost all biological cells that provide energy to the cell (in the form of ATP) but they also have a number of other crucial functions and biological importance in relation to diseases and death.

The SENS Research Foundation (SRF) (Wikipedia link) co-founded by Aubrey de Grey (who also co-founded the Methuselah Foundation (Wikipedia link)) are ultimately looking for ways to defeat death, or less controversially stated "ending aging" or even less so "transform the way the world researches and treats age-related disease" and identified mitochondrial mutations as one of seven key types of cellular damage they wished to find strategies and cures against.

As part of this the SRF launched a crowdfunding campaign called the MitoSENS Mitochondrial Repair Project which has now surpassed its funding target. The aim of the project is to engineer replacements for mitochondrial genes from copies of the genome so that mitochondrial functions can restored when lost as happens during aging and mitochondrial diseases.

An excerpt from the MitoSENS funding page:

At the SENS Research Foundation, we are in the early stages of creating an innovative system to repair these mitochondrial mutations. If this project is successful we will have demonstrated, for the first time, a mechanism that can provide your cells with a modified backup copy of the entire mitochondrial genome. This genome would then reside within the protective confines of the cell's nucleus, thereby mitigating damage to the mitochondrial genome. In fact, during the long course of evolution, this gradual transfer of genetic information into the nucleus has already occurred with the majority of mitochondrial genome, leaving behind a mere 13 protein coding genes within the mitochondria. Demonstrating the effectiveness of this technology would be a major milestone in the prevention and reversal of aging in the human body.


Original Submission

posted by cmn32480 on Monday October 05 2015, @06:33AM   Printer-friendly
from the wrap-the-car-in-bubble-wrap dept.

Emily Badger and Christopher Ingraham report at the Washington Post that new research finds that improvements in road safety since the 1990s haven't been evenly shared with fatality rates actually increasing for people 25 and older with less than a high school diploma. In 1995, death rates — adjusted for age, sex and race — were about 2.5 times higher for people at the bottom of the education spectrum than those at the top. By 2010, death rates for the least educated were about 4.3 times higher than for the most educated.

According to Badger and Ingraham, the underlying issue is not that a college degree makes you a better driver. Rather, the least-educated tend to own cars that are older and have lower crash-test ratings and those with less education are likely to earn less and to have the money for fancy safety features such as side airbags, automatic warnings and rear cameras. Poor people are also more likely to live in areas where infrastructure is crumbling and have less political clout to get anything done about dangerous road conditions.

The role of behavioral differences is murkier. Some studies show lower seat-belt use among the less-educated, but seat-belt use has also increased faster among that group over time, meaning socioeconomic differences there are narrowing. Badger and Ingraham conclude that "as we increasingly fantasize about new technologies that will save us from our own driving errors — cars that will brake for us, or spot cyclists we can't see, or even take over all the navigation — we should anticipate that, at first, those benefits may mostly go to the rich."


Original Submission

posted by cmn32480 on Monday October 05 2015, @04:02AM   Printer-friendly
from the when-will-it-charge-my-cell-phone dept.

A crystal radio set has no battery: its antenna collects radio waves as an alternating current, and its diode makes direct current which makes sound in an earphone.

Freevolt is a device which works on the same principle, turning radio frequencies such as those from mobile phone transmitters, TV broadcasts, or Wi-Fi into direct current. It can provide 100 µW of power, enough to operate a carbon monoxide detector. The maker is accepting pre-orders for a developer kit.


Original Submission

posted by cmn32480 on Monday October 05 2015, @01:49AM   Printer-friendly
from the maybe-we-ought-to-look-into-this dept.

New discoveries lead to new questions and hypotheses, but the existence of some things in the human body are hard to prove, Miller said. Here are four areas whose very existence in the body has been debated, along with the views expressed on both sides of the argument.

The G-spot

When women are surveyed, the majority of them say they believe the G-spot is real. But when doctors are asked about the existence of the Grafenberg spot, named for a German gynecologist who first described an erogenous zone on the anterior, or front, wall of the vagina that is linked with intense orgasms, there might be considerable debate on the subject.
...
Pheromones

Pheromones are chemical signals that animals release as a way to communicate with other members of the same species. Insects and other animals are known to secrete pheromones in their sweat, saliva or urine, and the animal that picks up on the compounds, often by smelling them, may get information, such as that a certain territory has been marked, that danger is nearby or that a potential mate is sexually available.
...
Irisin

The researchers suggested that irisin is a protein produced when a person exercises, and that the body may make more of it as physical activity continues, said Keith Baar, an associate professor of physiology at the University of California, Davis, who has studied exercise and irisin but was not involved in Spiegelman's research.
...
Cancer stem cells

Cancer stem cells are a big issue in cancer biology, Miller said. Normal stem cells are special cells that can give rise to other types of cells in the body, to make tissues and organs.

This has led scientists to theorize that, like normal tissue, cancer is also driven by stem cells.


Original Submission

posted by cmn32480 on Sunday October 04 2015, @11:30PM   Printer-friendly
from the lighten-up-man dept.

AlterNet reports

This week it was announced that Oregon will be expunging the old records of marijuana offenders, along with their new legalization plan. This measure is the farthest that a state has gone to date in regards to applying the new laws to old cases. However, for people who remain in jail for having a plant, the legalization plan does not go far enough.

According to the New York Times (paywall), people who have low-level felony or misdemeanor marijuana charges on their record that are at least ten years old will be eligible for expungement.

While the transition in Oregon is nowhere near what is needed for the hundreds of thousands who are still incarcerated, the aspect that allows for old cases to be expunged is at least a step in the right direction, and is helping people clear their records so they can avoid discrimination.

"Oregon is one of the first states to really grapple with the issue of what do you do with a record of something that used to be a crime and no longer is", law professor Jenny M. Roberts told the New York Times.


Original Submission

posted by janrinok on Sunday October 04 2015, @09:12PM   Printer-friendly
from the conversation dept.

Google's new advertising product, called Customer Match, lets advertisers upload their customer and promotional email address lists into AdWords. The new targeting capability extends beyond search to include both YouTube Trueview ads and the newly launched native ads in Gmail.

Customer Match marks the first time Google has allowed advertisers to target ads against customer-owned data in Adwords. Google matches the email addresses against those of signed-in users on Google. Individual addresses are hashed and are supposedly anonymized. Advertisers will be able to set bids and create ads specifically geared to audiences built from their email lists.

This new functionality seems to make de-anonymization of google's supposedly proprietary customer data just a hop, skip and jump away. If you can specify the list of addresses that get served an ad, and the criteria like what search terms will trigger that ad, you can detect if and when your target searches for specific terms. For example, create an email list that contains your target and 100 invalid email addresses that no one uses (just in case google gets wise to single-entry email lists). Then apply that list to searches for the word "herpes" - set the bid crazy high, like $100 and you are guaranteed to find out if your target searches for herpes which would be a strong indicator that they have herpes. Repeat as necessary for as many keywords and as many email addresses that you wish to monitor.


Original Submission