Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Why do you post less frequently on internet forums than you used to?

  • I work longer hours.
  • My kids take up my time.
  • I spend more time on a hobby.
  • Due to my physical or mental health.
  • I'm less interested in communicating with others.
  • OK, Boomer. Forums are for Boomers.
  • I post more frequently, you insensitive clod!
  • Other (please specify in comments)

[ Results | Polls ]
Comments:25 | Votes:20

posted by on Saturday May 13 2017, @10:42PM   Printer-friendly
from the hotfixin dept.

Veritas has patched multiple remote code execution vulnerabilities in its NetBackup software and the appliance by the same name.

The vulnerabilities should be patched with this hotfix as soon as possible.

The affected versions are NetBackup 7.7.2, 7.7.3, and 8.0; and NetBackup Appliances 2.7.2, 2.7.3, and 3.0 (which is also available as a virtual appliance).

In all, five vulnerabilities were disclosed by Google Security's Sven Blumenstein and Xiaoran Wang.


Original Submission

posted by takyon on Saturday May 13 2017, @08:46PM   Printer-friendly
from the General-Tso's-or-kung-pao? dept.

The South China Morning Post reports that China and the United States have agreed on an arrangement for trade between the two countries to be liberalised.

US credit rating services, electronic payment services and bond underwriting business are now all allowed in Chinese market.

[...] Under this agreement, China will accept beef from the US into the Chinese market, effectively ending the 14-year ban on American beef after an outbreak of mad-cow disease in [the] US in 2003.

Reciprocally, [the] US will allow Chinese cooked chicken to [be sold] in the American market.

The deal also provides for Chinese banks to operate in the United States, and for liquefied natural gas from the United States to be sold in China.


Original Submission

posted by cmn32480 on Saturday May 13 2017, @06:01PM   Printer-friendly
from the whoopsie-daisy dept.

It seems an Avast update has screwed the pooch again, blocking HTTP requests from all applications. That's also going to make getting support to fix the issue a bit of a problem.

An Avast software update pushed out on Wednesday is preventing web access for at least some devices running the firm's freebie anti-malware software.

Users affected by the problem have started threads (here and here among others) on Avast's support forum.

El Reg learnt of the issue through reader Michael S.

"Non tech savvy users will have issues reporting or getting the problem fixed," he explained. "To regain web access you have to disable Web Shield or disable Avast or uninstall Avast. To fix the issue you have to do a clean install of the latest version of software."

It's unclear how widespread the problem is. Avast's PR reps have acknowledged our requests for comment but are yet to supply a substantive response.


Original Submission

posted by cmn32480 on Saturday May 13 2017, @04:37PM   Printer-friendly
from the next-time-without-the-oops dept.

Fed up with Australian internet speeds that trail those in most of the developed world, Morgan Jaffit turned to a more reliable method of data transfer: the postal system.

Hundreds of thousands of people from around the world have downloaded Hand of Fate, an action video game made by his studio in Brisbane, Defiant Development. But when Defiant worked with an audio designer in Melbourne, more than 1,000 miles away, Mr. Jaffit knew it would be quicker to send a hard drive by road than to upload the files, which could take several days.

"It's really the big file sizes that kill us," said Mr. Jaffit, the company's co-founder and creative director. "When we release an update and there's a small bug, that can kill us by three or four days."

Australia, a wealthy nation with a widely envied quality of life, lags in one essential area of modern life: its internet speed. Eight years after the country began an unprecedented broadband modernization effort that will cost at least 49 billion Australian dollars, or $36 billion, its average internet speed lags that of the United States, most of Western Europe, Japan and South Korea. In the most recent ranking of internet speeds by Akamai, a networking company, Australia came in at an embarrassing No. 51, trailing developing economies like Thailand and Kenya.


Original Submission

posted by cmn32480 on Saturday May 13 2017, @03:04PM   Printer-friendly
from the doesn't-delivering-missiles-count? dept.

A future where drones drop off your online orders is another step closer this week after a new record was set for the world's longest drone delivery. On May 5, a fixed-wing HQ-40 UAV carried a package more than 97 miles (156 km), under the watchful eye of the Nevada Institute for Autonomous Systems (NIAS).

Drones from companies like Amazon, 7-Eleven, Domino's and UPS have already taken to the skies to deliver packages and pizza to customers, but those trips are usually short, last-mile trials. The record-breaking UAV journey covered 97 miles from a location in central Texas to carry a pneumatic part to the city of Austin.


Original Submission

posted by takyon on Saturday May 13 2017, @01:26PM   Printer-friendly
from the shadow-brokers-strike-back dept.

NSA-created cyber tool spawns global ransomware attacks

From Politico via Edward Snowden via Vinay Gupta:

Leaked alleged NSA hacking tools appear to be behind a massive cyberattack disrupting hospitals and companies across Europe, Asia and the U.S., with Russia among the hardest-hit countries.

The unique malware causing the attacks - which has spread to tens of thousands of companies in 99 countries, according to the cyber firm Avast - have forced some hospitals to stop admitting new patients with serious medical conditions and driven other companies to shut down their networks, leaving valuable files unavailable.

The source of the world-wide digital assault seems to be a version of an apparent NSA-created hacking tool that was dumped online in April by a group calling itself the Shadow Brokers. The tool, a type of ransomware, locks up a company's networks and holds files and data hostage until a fee is paid. Researchers said the malware is exploiting a Microsoft software flaw.

Thoughts on a similar scenario were published by the Harvard Business Review two days before this incident.

One or more anti-virus companies may have been hacked prior to WannaCrypt infecting 75000 Microsoft Windows computers in 99 countries. First, anti-virus software like Avast fails to make HTTP connections. Second, five million of ransomware emails are rapidly sent. Although many centralized email servers were able to stem the onslaught, many instances of anti-virus software had outdated virus definitions and were defenseless against the attack. Indeed, successful attacks were above 1%. Of these, more than 1% have already paid the ransom. Although various governments have rules (or laws) against paying ransom, it is possible that ransoms have been paid to regain access to some systems.

Also, file scrambling ransomware has similarities to REAMDE by Neal Stephenson. Although the book is extremely badly written, its scenarios (offline and online) seem to come true with forceful regularity.

Further sources: BBC (and here), Russia Today, DailyFail, Telegraph, Guardian.

Telefónica reportedly affected. NHS failed to patch computers which affected US hospitals in 2016. 16 divisions of the UK's NHS taken offline with aid of NSA Fuzzbunch exploit. The fun of a public blockchain is that ransom payments of £415,000 have been confirmed. Cancellation of heart surgery confirmed. Doctors unable to check allergies or prescribe medication. Patient access to emergency treatment denied in part due to hospital telephone exchange being offline.

It also appears that one of the affected parties refused to answer a Freedom of Information request in Nov 2016 about cyber-security due to impact on crime detection. Similar parties provided responses to the same request.

UK National Health Service Paralysed by Windows Ransomware Attack

The Guardian and the BBC report respectively about a large-scale ransomware attack on its Microsoft Windows computer systems in England and Scotland. This particular piece of malware is called "WanaCryp0r 2.0" or WannaCry and encrypts the PC's hard disk and demands bitcoin to decrypt it.

About 40 hospitals, GP surgeries and other NHS organisations are affected. Patients have had operations cancelled, ambulances have been diverted and wards have been closed.

From one of the Guardian reports:

According to one junior doctor who works in a London hospital, the attack left hospitals struggling to care for people. "However much they pretend patient safety is unaffected, it's not true. At my hospital we are literally unable to do any x-rays, which are an essential component of emergency medicine."

The NHS has stressed that patients' electronic medical records have not been compromised.

From InfoSecurity, FastCompany and elsewhere:

A major ransomware attack has been reported, with targets including banks and NHS Trusts all being hit.

According to Russia Today, a number of NHS employees have been reported as being hit by the ransomware, while one user posted on Twitter a screenshot of the ransomware which asks for "$300 worth of Bitcoin".

Australian Brodcast Corporation reports:

'Biggest ransomware outbreak in history' hits nearly 100 countries with data held for ransom

A global cyberattack has hit international shipper FedEx, disrupted Britain's health system and infected computers in nearly 100 countries.

The ransomware attack hit Britain's health service, forcing affected hospitals to close wards and emergency rooms with related attacks also reported in Spain, Portugal and Russia. [...] [the attack] is believed to have exploited a vulnerability purportedly identified for use by the US National Security Agency (NSA) and later leaked to the internet. [...] Private security firms identified the ransomware as a new variant of "WannaCry"[pt] that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft's Windows operating system.
[...] Leading international shipper FedEx Corp said it was one of the companies whose system was infected with the malware that security firms said was delivered via spam emails.

[...] Only a small number of US-headquartered organisations were infected because the hackers appear to have begun the campaign by targeting organisations in Europe, a research manager with security software maker Symantec said. By the time they turned their attention to US organisations, spam filters had identified the new threat and flagged the ransomware-laden emails as malicious, Vikram Thakur said.

Also at WLTX: Massive, Fast-moving Cyberattack Hits 74 Countries

Shadow Brokers Flaw Used in Ransomware

The Los Angeles Times reports that a security bug in Microsoft Windows, made public when the Shadow Brokers released exploits claimed to have been taken from the NSA, is being used in ransomware. According to the story, a patch for the bug was released by Microsoft in March.

The Spanish government said several companies, including Telefonica, were targeted [...] a message that was purportedly sent to workers at Telefonica carried a subject line referencing a wire transfer and asked them to check a website for more details. That link — when launched on a Windows computer suffering from the vulnerability discovered by the NSA — unleashed the program that rendered files inaccessible.

As recently as last week, about 1.7 million computers connected to the Internet were susceptible to such an attack [...]

Among the organisations compromised by the ransomware were the UK's National Health Service and Russia's Interior Ministry.

Related: Windows Servers at Risk [UPDATED]
"Shadow Brokers" Release the Rest of Their NSA Hacking Tools
Former NSA Contractor May Have Stolen 75% of TAO's Elite Hacking Tools
The Shadow Brokers Identify Hundreds of Targets Allegedly Hacked by the NSA
NSA Contractor Accused of "Stealing" Terabytes of Information, Charged Under Espionage Act
Probe of Leaked U.S. NSA Hacking Tools Examines Operative's `Mistake'
Cisco Begins Patching an NSA Exploit Released by the Shadow Brokers
NSA `Shadow Brokers' Hack Shows SpyWar With Kremlin is Turning Hot
"The Shadow Brokers" Claim to Have Hacked NSA

Extra: 'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack
Threat seen fading for now


Original Submission #1Original Submission #2Original Submission #3Original Submission #4Original Submission #5Original Submission #6Original Submission #7

posted by mrpg on Saturday May 13 2017, @11:58AM   Printer-friendly
from the of-course dept.

Submitted via IRC for TheMightyBuzzard

The Dakota Access pipeline already had its first leak – 84 gallons of oil – at a pump station in South Dakota in early April, sparking outrage and calling into question its environmental safety.

[...] The report of the spill can be found on the Department of Environmental and Natural Resources website. The agency apparently did not make any official announcement on the incident as it was relatively minor and had no environmental impact, according to Brian Walsh, a scientist with the department, as cited by the Guardian. The site "was cleaned up right away," the official added as quoted by ABC news.

The spill occurred less than 110 miles from Lake Oahe, which supplies Sioux tribes with water.

Source: Dakota Access pipeline suffers oil leak even before becoming operational


Original Submission

posted by mrpg on Saturday May 13 2017, @10:31AM   Printer-friendly
from the OpenVZ dept.

New research finds that 25% of all physical servers -- and 30% of all virtual servers -- are comatose. These are systems that have no activity in the last six months.

The problem with comatose, or zombie, physical servers is well known. Past studies have routinely put the number of undead enterprise physical servers in the 20% to 30% range. But this latest research looked at virtual servers as well, and they may represent a significant cost to IT departments.

That's because users may be paying licensing fees on their virtual servers, as well as on the software they support, said the researchers.

Comatose servers, both virtual and physical, may also represent "an unappreciated security risk" because they aren't patched and maintained, according to the research paper by Jonathan Koomey, a research fellow at Stanford University, and Jon Taylor, a partner at the Athensis Group, a consulting firm.

The Zombie Apocalypse may not take the form you've been expecting...


Original Submission

posted by mrpg on Saturday May 13 2017, @09:01AM   Printer-friendly
from the supercool dept.

A Prince Rupert's drop looks like a glass tadpole from a beginner's crafts festival, but it's so strong it can take a hammer hit without breaking. That would be impressive enough, but if you break its tail, which can be done with finger pressure, the drop explodes into powder. The reason for this has mystified scientists for 400 years, but a team from Purdue University, the University of Cambridge, and Tallinn University of Technology in Estonia finally has an answer.

[...]Focusing on the head of the drop instead of the tail, the current study found that the compressive stresses in the glass are about 50 tons per square inch, which gives it the strength of some steels. According to the team, this is because the outside of the drop cools faster than the inside. This turns the outside into a layer of powerful compressive forces pushing inward. These are balanced out by the tensile or pulling forces inside the drop.

So long as these forces remain in balance, the drop remains stable and can withstand tremendous punishment. Normally, because glass is a supercooled liquid rather than a solid, any cracks in the surface propagate at the speed of sound through a glass object, breaking it.

But in a Prince Rupert's drop, the interface between the inner and outer regions deflects the forces sideways, so the crack can't propagate. However, if the tail is broken, The shallow cracks in the tail shoot parallel to the axis of the drop, deep into the head, and into the interface. The damage is so great that the balanced forces are released, causing the drop to explode.


Original Submission

posted by mrpg on Saturday May 13 2017, @07:27AM   Printer-friendly
from the c80eab5af3a3b8ab69c0e3a3d444540f2d740c76 dept.

Submitted via IRC for TheMightyBuzzard

"Beginning May 9, 2017, Microsoft released updates to Microsoft Edge and Internet Explorer 11 to block sites that are protected with a SHA-1 certificate from loading and to display an invalid certificate warning," the company announced.

The change, however, impacts only SHA-1 certificates that chain to a root in the Microsoft Trusted Root Program where the end-entity certificate or the issuing intermediate uses SHA-1. This means that enterprises or self-signed SHA-1 certificates won't be affected by this. They are, however, encouraged to migrate to SHA-2 based certificates as fast as possible.

"Microsoft recommends that all customers migrate to SHA-2, and the use of SHA-1 as a hashing algorithm for signing purposes is discouraged and is no longer a best practice. The root cause of the problem is a known weakness of the SHA-1 hashing algorithm that exposes it to collision attacks. Such attacks could allow an attacker to generate additional certificates that have the same digital signature as an original," the company notes.

Source: Microsoft Kills SHA-1 Support in Edge, Internet Explorer 11


Original Submission

posted by mrpg on Saturday May 13 2017, @06:03AM   Printer-friendly
from the first-the-talkies-now-the-onlinies dept.

Official press release

The Cannes Film Festival is taking a stand against Netflix. Responding to a rumor that the streaming service's Okja, directed by Bong Joon Ho, and The Meyerowitz Stories, directed by Noah Baumbach, would be excluded from awards consideration after being included in the Competition lineup, the festival released a statement clarifying and adjusting its positioning going forward. The short version: From now on, if you want to compete at Cannes, your movie had better be released in French movie theaters—not just online.

There has long been a point of tension between Cannes and Netflix, to the extent where the inclusion of Okja and The Meyerowitz Stories came as a bit of a surprise. Netflix films had previously been snubbed and festival officials had advocated for "discouraging" the streaming service's online-first approach to release. The two movies included in Cannes' lineup this year are slated for theatrical bows stateside, but according to the festival's official statement, "no agreement has been reached" to get the moves into French cinemas and the effort to reach one was made "in vain." However, the statement does clarify that this rule goes into effect next year, so Okja and The Meyerowitz Stories will remain in competition and eligible for the Palme d'Or.

Seems the Cannes Film Festival is less about film and more about an outdated business model.


Original Submission

posted by mrpg on Saturday May 13 2017, @04:31AM   Printer-friendly
from the 2x²+x+64 dept.

If you've ever had to help your child with math homework, you really appreciate their teachers, who do it every day. "Math anxiety" isn't something only kids experience.

Maybe you haven't seen an algebra formula in years, and weren't that comfortable with them when you were a student. Maybe you're a skilled mathematician, but don't know how to explain what you're doing to a child. Whatever the case, math homework can leave parents feeling every bit as frustrated as their children. Homework doesn't have to lead to unpleasantness, though.

What I've learned through my own experience—as a teacher, a researcher, from helping my own children, and now watching my daughter work as an elementary school mathematics teacher—is that communication is (excuse the pun) the common denominator when it comes to making math homework a positive experience.

The National Science Foundation (NSF), where I work, is dedicated to research. We support scientists across the country who study learning and education systems. But we're also teachers at heart. On lunch breaks in the past, a group of us gathered to help our NSF peers with their own questions about how to help their kids learn math.

Here are a few tips from what we've learned:

Do Soylentils have better tips, things that have really helped their own kids learn math?


Original Submission

posted by mrpg on Saturday May 13 2017, @03:03AM   Printer-friendly
from the air-is-a-fluid dept.

a team of researchers from the University of California, Los Angeles (UCLA) and the University of Connecticut have designed a biofriendly supercapacitor system that charges up using electrolytes from biological fluids, such as blood serum and urine. It works in tandem with an energy harvester that can convert heat and motion into electricity that is stored in the supercapacitor.
...
The new biosupercapacitor consists of an electrode that is made of graphene layered with modified human proteins, while biological fluids act as electrolytes. Unlike unmodified graphene oxide, which was found to cause toxic cell damage at low doses, the protein-modified graphene oxide nanocomposite material developed by the team showed no toxicity in mouse embryo fibroblasts and cell cultures at high concentrations.

The team says the bioelectrical capacitor device measures just one micrometer thick, is flexible, allowing it to stand up the mechanical stresses of being twisted and turned inside the body, and boasts an energy density comparable to lithium thin film batteries that are currently used in pacemakers. Although supercapacitors haven't yet been widely incorporated in medical implant devices, the researchers claim the technology holds potential for such uses.

"Combining energy harvesters with supercapacitors can provide endless power for lifelong implantable devices that may never need to be replaced," said Maher El-Kady, a UCLA postdoctoral researcher. "Our research focused on custom-designing our supercapacitor to capture energy effectively, and finding a way to make it compatible with the human body."

It would never work. Medical device manufacturers would lose too much money.


Original Submission

posted by martyb on Saturday May 13 2017, @01:32AM   Printer-friendly
from the why-not-use-customers-for-beta-testing dept.

An Anonymous Coward writes:

Waymo plans to add another 500 minivans to the ones they already have wired for autonomous operation and let selected customers in the Phoenix area use them. Story found at this link, http://www.automotivetestingtechnologyinternational.com/news.php?NewsID=85295

These vehicles have already been tested on public roads by employees and contractors. The latest trials will enable the company to obtain data on how people experience and use self-driving vehicles.

Waymo is looking for participants from a range of backgrounds with different transportation needs. Initial users will be able to book minivans using a mobile app.

“We’re at the point when it’s really important to find how real people, outside the Google environment, will use this technology. Our goal is that they will use this for all their transportation needs,” said John Krafcik, Waymo CEO.

Krafcik seems to be another one of the anointed ones out of Detroit, https://en.wikipedia.org/wiki/John_Krafcik See for example the meteoric ride (and eventual crash landing) of John Z. DeLorean...


Original Submission

posted by martyb on Friday May 12 2017, @11:59PM   Printer-friendly
from the check-your-backups dept.

ITworld has a story about certain Hewlett-Packard laptop computers:

The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post.

The audio driver was designed to identify when a special key on the PC was used. But in reality, the software will capture all the keystrokes and write them in an unencrypted file located on the laptop.

The problematic driver is called MicTray64.exe — versions 1.0.0.31 through 1.0.0.46 are known to be affected. The logged keystrokes are written either to the world-readable file C:\Users\Public\MicTray.log or through the OutputDebugString API. The latter can be observed using Microsoft's debugview utility.

The Modzero website has the technical details.

ThreatPost adds:

ModZero is warning the issue (CVE-2017-8360) could lead to the leaking of sensitive user information, such as passwords. Anyone with access to the unencrypted file system could recover the data. Furthermore, since the program isn't considered malicious, malware authors wouldn't have trouble capturing victim's keystrokes either. Researchers say the keylogger comes registered as a Microsoft Scheduled Task, so it runs after each user login. While the file is overwritten each time, ModZero says it could easily be recruited by a running process or analyzed by someone with forensic tools.

Researchers surmised the software has been recording keystrokes since version 1.0.0.31 was released, on Christmas Eve 2015, but stress that the same problem exists in the most recent version, 1.0.0.46, released last October.

ModZero also warns the audio driver comes installed on a slew of HP machines, including its EliteBook, Elite x2, ProBook, and ZBook lines, but could exist in other machines. The company also delivers audio drivers for Dell, Lenovo, and Asus machines although at this point it's not certain they feature the same audio driver.

The firm says the following HP products are affected however:

  • HP EliteBook 820 G3 Notebook PC
  • HP EliteBook 828 G3 Notebook PC
  • HP EliteBook 840 G3 Notebook PC
  • HP EliteBook 848 G3 Notebook PC
  • HP EliteBook 850 G3 Notebook PC
  • HP ProBook 640 G2 Notebook PC
  • HP ProBook 650 G2 Notebook PC
  • HP ProBook 645 G2 Notebook PC
  • HP ProBook 655 G2 Notebook PC
  • HP ProBook 450 G3 Notebook PC
  • HP ProBook 430 G3 Notebook PC
  • HP ProBook 440 G3 Notebook PC
  • HP ProBook 446 G3 Notebook PC
  • HP ProBook 470 G3 Notebook PC
  • HP ProBook 455 G3 Notebook PC
  • HP EliteBook 725 G3 Notebook PC
  • HP EliteBook 745 G3 Notebook PC
  • HP EliteBook 755 G3 Notebook PC
  • HP EliteBook 1030 G1 Notebook PC
  • HP ZBook 15u G3 Mobile Workstation
  • HP Elite x2 1012 G1 Tablet
  • HP Elite x2 1012 G1 with Travel Keyboard
  • HP Elite x2 1012 G1 Advanced Keyboard
  • HP EliteBook Folio 1040 G3 Notebook PC
  • HP ZBook 17 G3 Mobile Workstation
  • HP ZBook 15 G3 Mobile Workstation
  • HP ZBook Studio G3 Mobile Workstation
  • HP EliteBook Folio G1 Notebook PC

Other coverage:
Ars Technica.


Original Submission

Today's News | May 14 | May 12  >