IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 13 March

01:12

Yellen Says No Federal Bailout for Silicon Valley Bank cryptogon.com

Via: AP: Treasury Secretary Janet Yellen said Sunday that the federal government would not bail out Silicon Valley Bank, but is working to help depositors who are concerned about their money. Were not going to do that again, she said. But we are concerned about depositors, and were focused on trying to meet their []

01:00

Large E-Paper Slow Movie Player Offers Great Docs Hackaday

Over the last couple of years weve seen several iterations of the slow movie player concept, where a film is broken up into individual frames which are displayed on an e-paper display for a few minutes at a time. This turns your favorite movie into a constantly changing piece of long-term art. Unfortunately, due to the relatively high cost of e-paper panels, most of the examples weve seen have only been a few inches across.

Of course, technology tends to get cheaper with time, which has allowed [szantaii] to put together this beautiful 10.3-inch version. With a 1872 1404 Waveshare panel capable of displaying 16 shades of gray and a Raspberry Pi Zero 2 W installed in a commercially purchased frame, the final product looks very professional. It certainly wouldnt look out of place in a well-appointed living room.

...

00:51

Linux and Scanners and Stuff Random Thoughts

Some years back, I had to scan a bunch of stuff for various projects. One of them was the Lanterne series thing its totally frivolous, which is what makes it fun.

But now Ive managed to buy a whole bunch more books, so it was time to scan some more covers. (Thats the result of hunting books for three years up there.)

So I wheeled out my Epson DS-50000 again and dusted off three years worth of dust and plugged it into my laptop.

And, wonders of wonders, it worked fine.

Except it was stran...

00:25

Scientists discovered a totally new way to measure time Lifeboat News: The Blog

Measuring time might not seem like that complex of a thing. After all, we rely on simply counting seconds between the then and the now. But when you really start to break time down to the quantum level, things begin to get a bit foggier.

00:24

Harvard Professor Reveals 4 EASY Ways to Slow and Reverse Aging | Dr. David Sinclair Lifeboat News: The Blog

Opening comment which is repeated later: He is 50, but was biologically 60, until he changed his lifestyle and diet, and now he is 31. OMG does that mean we can already rejuvenate to a youthful state? Well no. These clocks measure how healthy you are, and yes if you copied Davids lifestyle youll get more yearsor more accurately, healthy years. Perhaps David would have made it to 80, but now hell make it to 100 and be active for most of it. But that is not true rejuvenation. For that he mentions reprogramming near the end of the vid and the fact they are working on whole body rejuvenation with the success they had in the eyes of mice.


Are you tired of feeling old and worn out? Do you want to look and feel younger without resorting to expensive treatments or surgeries? In this video, Dr. David Sinclair shares his expert tips on how to slow and reverse aging using simple, everyday practices like intermittent fasting, supplements, a healthy lifestyle, and proper diet. With over 20 years of experience studying longevity, Dr. Sinclair is a leading authority on the science of aging.#intermittentfasting #supplements #longevity.

Dr. Sinclairs AMAZING book: https://amzn.to/3Jp47m6

Products Mentioned by Dr. Sinclair:

High-Quality NMN: https://amzn.to/3ZYaHWp.
Resveratrol Supplement: https://amzn.to/3YDBXIG

Our website is supported by our users. We sometimes earn commissions when you click through the affiliate links on our website. This is not an endorsement of any product or company. As always, you should do your own research.

In this 6-minute video, youll discover:

- The surprising benefits of intermittent fasting for longevity and overall health.
- The top supplements that can help slow down the aging process.
- How a healthy lifestyle can add years to your life and keep you feeling young and vibrant.
- The power of a proper diet to nourish your body and keep you looking and feeling your best.

00:09

Linux 5.15.101 LTS Released To Fix Broken Intel Graphics At Boot Phoronix

Yesterday saw emergency hot-fix releases in the Linux 6.2 and 6.1 series for addressing an easy-to-trigger kernel oops when mounting and unmounting external storage. This weekend is proving more volatile with today bringing an emergency hot-fix release for the Linux 5.15 LTS series due to a separate issue...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 12 March

23:06

Chocolate 3D Printer, Cocoa Press, to Ship this Fall SoylentNews

Instead of outputting in plastic, this printer builds models that you can eat:

All of the best 3D printers print from some form plastic, either from filament or from resin. But an upcoming printer, Cocoa Press, uses chocolate to create models you can eat. The brainchild of Maker and Battlebots Competitor Ellie Weinstein , who has been working on iterations of the printer since 2014, Cocoa Press will be available for pre-order, starting on April 17th via cocoapress.com (the company is also named Cocoa Press).

[...] In lieu of a roll of filament or a tank full of resin, the Cocoa Press uses 70g cartridges of special chocolate that solidifies at up to 26.67 degrees Celsius (80 degrees Fahrenheit), which the company will sell for $49 for a 10 pack. The cigar-shaped chocolate pieces go into a metal syringe where the entire thing is melted at the same time rather than melting as it passes through the extruder (like a typical FDM printer).

Video demonstrating how the Cocoa Press works.

Related: Why Chocolate Feels So Good? It's Down to Lubrication


Original Submission

Read more of this story at SoylentNews.

22:45

Linux GMUX Support For T2 Macs On The Way For Dual-GPU Graphics Switching Phoronix

A set of patches are expected to be merged for the Linux 6.4 cycle in two months enable support for the MMIO-based GMUX found on dual GPU Apple T2 Macs...

22:23

Linux 6.4 To Remove Old Workaround For Running On Very Outdated Distributions Phoronix

Linux 6.4 is set to remove the old CONFIG_SYSFS_DEPRECATED and CONFIG_SYSFS_DEPRECATED_V2 options that are used for running newer versions of the Linux kernel with very old Linux distributions and user-space tools. Pre 2007~2008 distributions as a result would likely run into trouble trying to run on Linux 6.4+ kernels...

22:22

Earths water came from super deep space, and its older than you can imagine Lifeboat News: The Blog

Astronomers found compelling evidence that the water in our solar system came from interstellar space. This water around a distant protostar is quite similar to the water found in our solar system, and on Earth.

22:03

SDL3 Introduces The Concept Of Child Popup Windows Phoronix

Development work on SDL3 continues at full-speed for the next commonly used by cross-platform games. The newest feature merged is support for child pop-up windows...

22:00

Immersive Virtual Reality from the Humble Webcam Hackaday

Webcam VR

[Russ Maschmeyer] and Spatial Commerce Projects developed WonkaVision to demonstrate how 3D eye tracking from a single webcam can support rendering a graphical virtual reality (VR) display with realistic depth and space. Spatial Commerce Projects is a Shopify lab working to provide concepts, prototypes, and tools to explore the crossroads of spatial computing and commerce.

The graphical output provides a real sense of depth and three-dimensional space using an optical illusion that reacts to the viewers eye position. The eye position is used to render view-dependent images. The computer screen is made to feel like a window into a realistic 3D virtual space where objects beyond the window appear to have depth and objects before the window appear to project out into the space in front of the screen. The resulting experience is like a 3D view into a virtual space. The downside is that the experience only works for one viewer.

Eye tracking is performed using Googles MediaPipe Iris library, which relies on the fact that the iris diameter of the human eye is almost exactly 11.7 mm for most humans. Computer vision algorithms in the library use this geome...

21:40

NVIDIA VA-API Driver 0.0.9 Released With YUV444 Support Phoronix

The open-source nvidia-vaapi-driver project is an independent effort implementing the Video Acceleration API (VA-API) atop of the NVDEC interface supported by NVIDIA's proprietary driver. This VA-API-on-NVDEC implementation allows for video acceleration within Firefox and other software only targeting this open API...

20:30

Week in review: Public MS Word RCE PoC, API exploitation, Patch Tuesday forecast Help Net Security

Microsoft to boost protection against malicious OneNote documents Microsoft has announced that, starting in April 2023, they will be adding enhanced protection when users open or download a file embedded in a OneNote document a known high-risk phishing file type. Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits GitGuardian scanned 1.027 billion new GitHub commits in 2022 (+20% compared to 2021) and found 10,000,000 secrets occurrences (+67% compared to 2022). More

The post Week in review: Public MS Word RCE PoC, API exploitation, Patch Tuesday forecast appeared first on Help Net Security.

20:25

Physicists explore mysteries of strange metals Lifeboat News: The Blog

Physicists are learning more about the bizarre behavior of strange metals, which operate outside the normal rules of electricity.

Theoretical physicist Yashar Komijani, an assistant professor at the University of Cincinnati, contributed to an international experiment using a strange metal made from an alloy of ytterbium, a . Physicists in a lab in Hyogo, Japan, fired radioactive gamma rays at the strange metal to observe its unusual electrical behavior.

Led by Hisao Kobayashi with the University of Hyogo and RIKEN, the study was published in the journal Science. The experiment revealed unusual fluctuations in the strange metals .

20:25

Two exoplanets orbiting a sun-like star discovered Lifeboat News: The Blog

Astronomers report the discovery of two new exoplanets orbiting a bright sun-like star about 175 light years away. The newfound alien worlds, designated HIP 104,045 b and HIP 104,045 c, were classified as a Jupiter analog and a super Neptune planet, respectively. The finding was detailed in a paper published March 2 on the pre-print server arXiv.

The radial velocity (RV) method to detect an is based on the detection of variations in the velocity of the central star, due to the changing direction of the gravitational pull from an unseen exoplanet as it orbits the star. Thanks to this technique, more than 600 exoplanets have been detected so far.

Now, a team of astronomers led by Thiago Ferreira of the University of So Paulo in Brazil, reports the detection of two new exoplanets using the RV method. They observed a solar-type star HIP 104,045 with the High Accuracy Radial Velocity Planet Searcher (HARPS) spectrograph on the 3.6m telescope of the European Southern Observatory (ESO) in La Silla, Chile. The observations, conducted as part of the Solar Twin Planet Search (STPS) program, resulted in the discovery of two massive extrasolar worlds.

20:25

A framework to self-test all entangled states using quantum networks Lifeboat News: The Blog

Self-testing is a promising method to infer the physics underlying specific quantum experiments using only collected measurements. While this method can be used to examine bipartite pure entangled states, so far it could only be applied to limited kinds of quantum states involving an arbitrary number of systems.

Researchers at Sorbonne University, ICFO-Institute of Photonic Sciences and Quantinuum recently introduced a framework for the quantum network-assisted self-testing of all pure entangled states of an arbitrary number of systems. Their paper, published in Nature Physics, could inform future research efforts aimed at certifying .

I was a postdoctoral researcher in Barcelona in 2014 in the group of Antonio Acn when the first author, Ivan upi and I began working on self-testing quantum states together, Matty Hoban, one of the researchers who carried out the study, told Phys.org. That is, certifying that you have systems in particular quantum states without trusting the devices and treating them as (called the device-independent setting). Part of this work involved exploring different kinds of scenarios of trust.

20:25

Aluminum-based low-loss interconnects for superconducting quantum processors Lifeboat News: The Blog

Quantum processors are computing systems that process information and perform computations by exploiting quantum mechanical phenomena. These systems could significantly outperform conventional processors on certain tasks, both in terms of speed and computational capabilities.

While engineers have developed several promising quantum computing systems over the past decade or so, scaling these systems and ensuring that they can be deployed on a large-scale remains an ongoing challenge. One proposed strategy to increase the scalability of entails the creation of modular systems containing multiple smaller quantum modules, which can be individually calibrated and then arranged into a bigger architecture. This, however, would require suitable and effective interconnects (i.e., devices for connecting these smaller modules).

Researchers at the Southern University of Science and Technology, the International Quantum Academy and other institutes in China have recently developed low-loss interconnects for linking the individual modules in modular superconducting quantum processors. These interconnects, introduced in Nature Electronics, are based on pure cables and on-chip impendence transformers.

20:25

A super-resolution microscopy method for rapid differentiation of molecular structures in 3D Lifeboat News: The Blog

Super-resolution microscopy methods are essential for uncovering the structures of cells and the dynamics of molecules. Since researchers overcame the resolution limit of around 250 nanometers (while winning the 2014 Nobel Prize in Chemistry for their efforts), which had long been considered absolute, the methods of microscopy have progressed rapidly.

Now a team led by LMU chemist Prof. Philip Tinnefeld has made a further advance through the combination of various methods, achieving the highest resolution in three-dimensional space and paving the way for a fundamentally new approach for faster imaging of dense molecular structures. The new method permits axial resolution of under 0.3 nanometers.

The researchers combined the so-called pMINFLUX method developed by Tinnefelds team with an approach that utilizes special properties of graphene as an energy acceptor. pMINFLUX is based on the measurement of the fluorescence intensity of molecules excited by laser pulses. The method makes it possible to distinguish their lateral distances with a resolution of just 1 nanometer.

20:25

Density-Functional Models Get Excited Lifeboat News: The Blog

A venerable strategy for approximating a systems ground states has now been extended to accommodate its excited states.

Density-functional theory (DFT) owes its name and utility to its central insight: that a potentials influence on a system of interacting electrons can be expressed in terms of the electrons density. Existing models restrict DFT to ground states and exclude excited states. But now Tim Gould of Griffith University, Australia, and his collaborators have found a way to overcome the restriction [1].

At the heart of DFT are exchange-correlation models, which simplify the treatment of electrons behavior by using certain limiting cases. This simplification allows DFT to simulate ground states of large electronic systems. A generalization of the theory, called ensemble DFT, can cope with excited states, but this theorys more complex exchange-correlation models make large systems computationally intractable. Gould and his collaborators discovered that when the electron density is sufficiently low, these complications vanish and the models for dealing with excited states revert to being as simple as those used for regular DFT. Then, regular DFT suffices. At the other extremewhen electron density is highcomplications are simplified to the point that exact solutions can be obtained.

20:24

Muted Response to New Claim of a Room-Temperature Superconductor Lifeboat News: The Blog

Another part of that wariness arises because, to date, no one has independently reproduced Dias teams results. This lack of verification was raised by Jorge Hirsch of the University of California, San Diego, in the last talk of the session in which Dias and his team spoke. Hirsch argued that those claiming to have created high-temperature superconducting hydrides suffered from confirmation bias, cherry-picking evidence to support their agenda. (Hirsch has been an outspoken critic of Dias work.) As the last question of the session, Dias asked Hirsch, Could you also have confirmation bias? Maybe, Hirsch replied.

After the session, a few attending researchersall collaborators of Diasspoke with Physics Magazine, telling us that they disagreed with Hirschs cherry-picking conclusion. One of them, Russell Hemley of the University of Illinois Chicago confirmed Pasans claim that they have replicated the 2020 carbonaceous sulfur hydrideas reported in an arXiv paper that the team recently posted [3].

Dias group still needs to more precisely characterize NLHs chemical composition, Pasan said. The samples also appear to consist of two phases, an observation that they need to investigate. Ultimately, they plan to innovate upon this material to create a superconductor at ambient pressure and temperature conditions, a goal that Pasan said he thinks is feasible. But extraordinary claims require extraordinary evidence, and the community has much of the latter still to gather.

20:12

Cisco fixed CVE-2023-20049 DoS flaw affecting enterprise routers Security Affairs

Cisco fixed a high-severity DoS vulnerability (CVE-2023-20049) in IOS XR software that impacts several enterprise routers.

Cisco has released security updates to address a high-severity DoS vulnerability, tracked as CVE-2023-20049 (CVSS score of 8.6), in IOS XR software used by several enterprise-grade routers.

The vulnerability resides in the bidirectional forwarding detection (BFD) hardware offload feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers.

An unauthenticated, remote attacker can trigger the flaw to cause a line card to reset, resulting in a denial of service (DoS) condition.

An attacker can trigger the CVE-2023-20049 vulnerability by sending a crafted IPv4 BFD packet to a vulnerable device.

This vulnerability is due to the incorrect handling of malformed BFD packets that are received on line cards where the BFD hardware offload feature is enabled. reads the advisory published by the vendor. . A successful exploit could allow the attacker to cause line card exceptions or a hard reset, resulting in loss of traffic over that line card while the line card reloads.

This flaw affects Cisco routers running a vulnerable release of Cisco IOS XR 64-bit Software and have BFD hardware offload enabled for any of the installed line cards:

  • ASR 9000 Series Aggregation Services Routers only if they have a Lightspeed or Lightspeed-Plus-based line card installed
  • ASR 9902 Compact High-Performance Routers
  • ASR 9903 Compact High-Performance Routers

The company pointed out that this vulnerability does not affect the following Cisco products:

  • IOS Software
  • IOS XE Software
  • IOS XR Platforms not listed in the Vulnerable Products section of this advisory

As a workaround, Cisco recommends disabling the BFD hardware offload and creating Infrastructure Access Control lists.

The IT giant addressed the issue with the release of IOS XR versions 7.5.3, 7.6.2, and 7.7.1.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(...

20:00

Hack Your Heathkit to Trace MOSFET Curves Hackaday

[TRX Lab] has an old Heathkit model IT-1121 curve tracer, and wants to modify it so he can plot the I-V curves of MOSFETs. For the uninitiated, curve tracers are used to determine the precise characteristics of components by measuring the output for a set of specific inputs either voltage or current depending on the device youre testing.

The IT-1121 was introduced in 1973 and supports bipolar and FET transistors of types NPN, PNP, N-channel, and P-channel, along with various other semiconductor devices. But [TRX] wanted to enhance the tester to deal with MOSFETs as well.

The IT-1121 is very flexible, and has selector switches for all the usual polarity and sweep settings Heathkit also sold a model IT-3121 in later years, but this seems to have been the same basic tester. [TRX] found two shortcomings when plotting the I-V curve of MOSFETs. First, there is no way to apply a Vgs threshold voltage to the curves. Second, when set for FET testing, the polarity of the gate voltage stair step waveform doesnt match the desired polarity of the drain-source voltage.

In the video below the break, [TRX] first walks us through some of the reasons youd want a curve tracer in your lab. In the next part of the video, he breadboards up the modification for testi...

18:19

Newly Spotted 50-meter Asteroid Tops Risk List SoylentNews

Newly spotted 50-meter asteroid tops Risk List:

Valentine's Day 2046 could be memorable for a number of reasons. Not only might you receive a card from an admirer you never knew you had, but you might also witness a large asteroid slamming into Earth and causing widespread devastation.

Hopefully the only delivery anyone will be getting that day is a card, but scientists say that a 49-meter-wide asteroid discovered last week is currently calculated to have a 1-in-625 chance of hitting our planet in a couple of decades from now.

The rock, called 2023 DW, now sits atop the European Space Agency's Risk List as the only one with a "1" rating on the Torino scale, which is used for categorizing the impact hazard of near-Earth objects.

[...] As asteroid 2023 DW was only discovered a few days ago, scientists are continuing with their analysis to determine more precisely the characteristics of the rock, which is similar in size to an Olympic swimming pool.

[...] If later analysis suggests an increased risk of 2023 DW crashing into Earth, it would be a golden opportunity for NASA to deploy its asteroid deflection system. The technology was tested last year with great success when it smashed a spacecraft into a distant asteroid, with the force of the impact altering the rock's course.


Original Submission

Read more of this story at SoylentNews.

17:54

Bug fixing in wscons OpenBSD Journal

Crystal Kolipe has written up more of her work on the console. This time, it regards bugs in the handling of UTF-8: ExoticSilicon.com - fixing cringeworthy bugs in the OpenBSD console code.

As Crystal pointed out in her email to Undeadly, Miod Vallat (miod@) has committed fixes.

17:00

This Open Hardware Li-Ion Charger Skips the TP4056 Hackaday

Theres a good chance that if you build something which includes the ability to top up a lithium-ion battery, its going to involve the incredibly common TP4056 charger IC. Now, theres certainly nothing wrong with that. Its a decent enough chip, and there are countless pre-made modules out there that make it extremely easy to implement. But if the chip shortage has taught us anything, its that alternatives are always good.

So wed suggest bookmarking this opensource hardware Li-Ion battery charger design from [Shahar Sery]. The circuit uses the BQ24060 from Texas Instruments, which other than the support for LiFePO4 batteries, doesnt seem to offer anything too new or exciting compared to the standard TP4056. But thats not the point this design is simply offered as a potential alternative to the TP4056, not necessarily an upgrade.

...

14:38

Read "On the Controllability of Artificial Intelligence: An Analysis of Limitations" by our Roman V. Yampolskiy. Lifeboat News

Read "On the Controllability of Artificial Intelligence: An Analysis of Limitations" by our Roman V. Yampolskiy.

14:00

Electronic Bandage Speeds Wound Healing Hackaday

A closeup of a ring and "flower" electrode attached to a translucent piece of material with fainter wires. The flower and ring electrodes are made of molybdenum that has a somewhat accordion fold back-and-forth cross-section.

Were a long way from the dermal regenerators in Star Trek, but researchers at Northwestern University have made a leap forward in the convenient use of...

13:37

Graph Databases Provide a Significant Advantage Over Well-Architected Relational Databases SoylentNews

The results of the great DB debate on The Register were announced. Although it was a close-run race, and RDBMS was well ahead at several points during the week before a late surge for graph DBs yesterday. Over 2,000 readers voted. This debate is a part of the current spotlight on databases.

Our first contributor, arguing FOR the motion, was Andy Pavlo, associate professor of databaseology at Carnegie Mellon University. Pavlo's starting point on Monday was that graph DBMSs are "fundamentally flawed and, for most applications, inferior to relational DBMSs."

Jim Webber, Neo4j's chief scientist and a professor of computer science at Newcastle University, arguing AGAINST, said in his rebuttal that he could not back the idea that "relational can do anything" and rejected the assertion that graph databases cannot properly support views and migrations.

Then, on Wednesday, Pavlo threw down the gauntlet, stating that abandoning the relational database model would be akin to "reinventing the wheel." He also doubled down on a public wager he'd previously made that graph databases won't overtake relational databases in 2030 by marketshare. He has promised that if he loses, Pavlo will replace his official CMU photo with one of him wearing a shirt that says "Graph Databases Are #1."

Webber then countered this in his Thursday argument, noting that the pending standard for graphs, GQL, is overseen by the same ISO committee that delivered SQL. If SQL extensions were enough to solve the graph problem, the committee wouldn't have bothered itself, he seemed to be saying. Instead, it decided graphs were different enough to warrant a full query language.

Webber also mentioned: In late 2010, I visited former colleagues at the University of Sydney, Australia. I gave a talk on graph databases and ended it by lightheartedly saying something like, "This technology category is going to catch on. You're going to ignore it for now, but in about a decade you will become interested and start telling us that we've done it all wrong."

Several papers from CIDR 2023 were cited in the discussion.


Original Submission

...

13:11

Read "A Reputation System for Artificial Societies" (PDF) coauthored by our Ben Goertzel, Matt Ikle, and Anton Kolonin. Lifeboat News

Read "A Reputation System for Artificial Societies" (PDF) coauthored by our Ben Goertzel, Matt Ikl, and Anton Kolonin.

12:52

HAPPY 40th ANNIVERSARY TO THE ACORN ELECTRON COMPUTER! commodore64crap

HAPPY 40th ANNIVERSARY TO THE ACORN ELECTRON COMPUTER!

This year (2023) marks the fortieth anniversary of the Acorn Electron computer!

Heres a summary of the Acorn Electrons pros and cons

  • BBC BASIC programming language built in, which could also be mixed with 6502 Assembly Language in the same program
  • Most BBC BASIC programs could run on the Acorn electron as well
  • It could display text in 80 columns, as well as 40 columns and 20 columns
  • Its highest resolution display mode was 640256 in 2 colours
  • It was featured on the TV series Me and My Micro presented by Fred Harris as one of only two computers which they used to teach BASIC programming. The other was the Sinclair ZX Spectrum.
  • It lacked the many interfaces of the BBC micro, which most people may never have used, but they were partly responsible for the BBC Micros higher price
  • It lacked the three channel sound synthesizer chip of the BBC micro, having only a one channel tone generator
  • It could only display 8 different colours, as used in Teletext/Videotext
  • It lacked the Teletext/Videotext display mode of the BBC Micro, which was called MODE 7

To sum this up, the Acorn Electron had almost everything I was looking for in a computer! I must emphasise th...

11:20

ThreatBlockr and Engaged Security Partners help users prioritize breach prevention Help Net Security

ThreatBlockr and Engaged Security Partners announced a partnership focusing on left of boom protection to bring enhanced breach prevention to customers. Engaged Security Partners uses ThreatBlockrs platform for threat intelligence management and integration into the network. Together, Engaged Security Partners customers will benefit from blocking malicious traffic and reducing human error, turning employees into threat hunters and creating a strong first and last line of defense. We have been seeking a partner who prioritizes breach More

The post ThreatBlockr and Engaged Security Partners help users prioritize breach prevention appeared first on Help Net Security.

11:00

Quick and Dirty Microscope Motion Control for Focus Stacking Hackaday

If youve spent much time looking through a microscope, you know that their narrow depth of field can be a bit challenging to deal with. Most microscopes are designed to only have a very thin slice of the specimen in focus, so looking at anything above or below that plane requires a focus adjustment. Its tedious and fussy, and that makes it a perfect target for automation.

The goal behind [ItMightBeWorse]s microscope mods is focus stacking, a technique where multiple images of the same sample taken at different focal planes can be stitched together so that everything appears to be in focus. Rather than twist knobs and take pictures manually, he built a simpler Arduino-based rig to do the job for him. Focus control is through a small stepper motor connected to the fine focus knob of the scope, while the DSLR camera shutter is triggered throug...

08:59

How to add an IP alias on Amazon Linux 2 nixCraft

See all Amazon AWS web services related articles/faq

IP aliasing is nothing but associating more than one IP address to a network interface such as eth0. For example, using the following methods, you can add an IP alias on Amazon Linux 2.

Love this? sudo share_on: Twitter - Facebook - LinkedIn - Whatsapp - Reddit

The post How to add an IP alias on Amazon Linux 2 appeared first on nixCraft.

08:52

Room-Temperature Superconductor Works at Lower Pressures SoylentNews

Results come from a lab that had an earlier superconductivity paper retracted:

On Wednesday, a paper was released by Nature that describes a mixture of elements that can superconduct at room temperature. The work follows a general trend of finding new ways of stuffing hydrogen into a mixture of other atoms by using extreme pressure. This trend produced a variety of high-temperature superconductors in previous research, though characterizing them was difficult because of the pressures involved. This new chemical, however, superconducts at much lower pressures than previous versions, which should make it easier for others to replicate the work.

The lab that produced the chemical, however, had one of its earlier papers on high-temperature superconductivity retracted due to a lack of details regarding one of its key measurements. So, it's a fair bet that many other researchers will try to replicate it.

The form of superconductivity involved here requires that electrons partner up with each other, forming what are called Cooper pairs. One of the things that encourages Cooper pair formation is a high-frequency vibration (called a phonon) among the atomic nuclei that these electrons are associated with. That's easier to arrange with light nuclei, and hydrogen is the lightest around. So finding ways to stuff more hydrogen into a chemical is thought to be a viable route toward producing higher-temperature superconductors.

The surest way of doing that, however, involves extreme pressures. These pressures can induce hydrogen to enter the crystal structure of metals or to form hydrogen-rich chemicals that are unstable at lower pressures. Both of these approaches have resulted in chemicals with very high critical temperatures, the highest point at which they'll support superconductivity. While these have approached room temperature, however, the pressures required were multiple Gigapascalswith each Gigapascal being nearly 10,000 times the atmospheric pressure at sea level.

In essence, this involves trading off impractical temperatures for impractical pressures.


Original Submission #1 Original Submission #2

Read more of this story at SoylentNews.

08:00

A Retro-Style Trainer For Motorolas 1-Bit Chip Hackaday

If you want to program a microcontroller today, you pop open your editor of choice, bang out some code, and flash it over USB. But back in ancient times, when your editor was a piece of paper and you didnt even have a computer of your own, things were a bit different. In that case, you might have reached for a trainer: a PCB that included the chip you wanted to program along with an array of switches, LEDs, and maybe even a hex keypad for good measure. Grab yourself the programming manual (printed on paper, naturally), and youre good to go.

So when [Nicola Cimmino] became curious about the Motorola MC14500, a 1-bit ICU (Industrial Control Unit) from the 1970s, he could think of no more appropriate way to get up close and personal with the chip than to design an era-appropriate trainer for it. The resulting board, which hes calling the PLC14500 Nano, is festooned with LEDs that show the status of the system buses and registers. Thanks to the chips single-step mode, this gives you valuable insight into whats happening inside this piece of classic silicon.

...

06:40

PlugX malware delivered by exploiting flaws in Chinese programs Security Affairs

Researchers observed threat actors deploying PlugX malware by exploiting flaws in Chinese remote control programs Sunlogin and Awesun.

Researchers at ASEC (AhnLab Security Emergency response Center) observed threat actors deploying the PlugX malware by exploiting vulnerabilities in the Chinese remote control software Sunlogin and Awesun.

Sunlogin RCE vulnerability (CNVD-2022-10270 / CNVD-2022-03672) is known to be exploited by threat actors since an exploit code was disclosed. In the past, the issue was exploited in attacks to deliver Sliver C2, XMRig CoinMiner, and Gh0st RAT.

The same threat actors performed an RCE vulnerability exploitation on both Sunlogin and AweSun to install Sliver C2. reads the analysis published by ASEC.

The PlugX backdoor has been used since 2008 by multiple China-linked APT groups, including Mustang Panda, Winnti, and APT41

In the attacks observed by ASEC, once exploited the vulnerability, threat actors executed a PowerShell command to create a file named esetservice.exe.

esetservice.exe is actually a legitimate HTTP Server Service program made by the security firm ESET. Attackers also downloaded a file named http_dll.dll aside from esetservice.exe.

The http_dll.dll is invoked by the esetservice.exe when placed in the same directory, in a classic DLL side-loading attack.

The DLL acts as the loader for the PlugX malware,...

06:34

VirtIO Native Context Being Worked On For AMD Drivers To Enhance VM Performance Phoronix

As part of an AMD effort to enhance the performance of the AMD Linux graphics drivers when running in a virtualized environment, a set of initial patches are pending for Mesa that implement native context support for VirtIO...

05:23

Watch "Brain, meet computer" by our Nuno Martins. Lifeboat News

Watch "Brain, meet computer" by our Nuno Martins.

05:05

Biden Asks for Massive $886 Billion Military Budget for 2024 cryptogon.com

Via: Antiwar: Congress could easily bring the 2024 NDAA to over $900 billion, closing in on the $1 trillion mark. The NDAAs dont include the funds authorized for the Ukraine war, which could add another $100 billion if the US keeps spending on the conflict at the same pace.

05:01

DNA Contamination of COVID-19 Injectable Products cryptogon.com

Via: Jessica Rose: The left-over expression vectors used to manufacture the mRNAs are at contamination levels 100-fold higher than originally proposed and imply trillions of DNA molecules per dose. This has implications for integration into our genome. Why were these basic assays/procedures not done/carried out prior to injecting billions of people? Or at least, []

04:05

Musk Apologizes for Mocking and Firing Twitter Exec With Muscular Dystrophy SoylentNews

https://arstechnica.com/tech-policy/2023/03/musk-apologizes-for-mocking-and-firing-twitter-exec-with-muscular-dystrophy/

After a tweet exchange where Twitter CEO Elon Musk questioned a fired former Twitter executive's disabilities and work performance, Musk has issued a rare apology and offered to rehire former Senior Director of Product Design Haraldur "Halli" Thorleifsson.

Thorleifsson joined Twitter in 2021, saying on the podcast Fast Politics with Molly Jong-Fast that he decided to let his successful design agency Ueno get acquired by Twitter because he really believed that, much like Musk, Twitter had "never lived up to its potential." Until his exit from Twitter, Thorleifsson led an innovation team at Twitter, but Musk apparently was not familiar with the meaningful contributions Thorleifsson made to the company until after he let Thorleifsson go. Now Musk apparently regrets dismissing Thorleifsson.

[...] Before Thorleifsson got the official notification that he'd been fired from Twitter, he told the BBC that he had a theory explaining why it took Twitter nine days to respond to his inquiries about layoffs.

"My theory is they made a mistake and are now looking for anything they can find to make this a 'for cause' firing to avoid having to fulfill their contractual obligations," Thorleifsson told the BBC.

According to The New York Times, the cost of firing Thorleifsson may be greater to Twitter than the cost of keeping him on, which could be another factor motivating Musk's decision to try to rehire the former design executive. Twitter users have speculated that his severance package could be worth $100 million, and Thorleifsson seems willing to take the money and leave. He tweeted that he's OK with his exit from Twitter and asked Musk to confirm he'll receive his full severance.

Related:
Open Source Teams at Google Hit Hard by Layoffs: Was It the Algorithm?


Original Submission

Read more of this story at SoylentNews.

03:00

False Starts: The Story of Vehicle-to-Grid Power IEEE Spectrum



In 2001, a team of engineers at a then-obscure R&D company called AC Propulsion quietly began a groundbreaking experiment. They wanted to see whether an electric vehicle could feed electricity back to the grid. The experiment seemed to prove the feasibility of the technology. The companys president, Tom Gage, dubbed the system vehicle to grid or V2G.

The concept behind V2G had gained traction in the late 1990s after Californias landmark zero-emission-vehicle (ZEV) mandate went into effect and compelled automakers to commercialize electric cars. In V2G, environmental-policy wonks saw a potent new application of the EV that might satisfy many interests. For the utilities, it promised an economical way of meeting rising demand for electricity. For ratepayers, it offered cheaper and more reliable electricity services. Purveyors of EVs would have a new public-policy rationale backing up their market. And EV owners would become entrepreneurs, selling electricity back to the grid.


AC Propulsions experiment was timely. It occurred in the wake of the California electricity crisis of 2000 and 2001, when mismanaged deregulation, market manipulation, and environmental catastrophe combined to unhinge the power grid. Some observers thought V2G could prevent the kinds of price spikes and rolling blackouts then plaguing the Golden State. Around the same time, however, General Motors and other automakers were in the process of decommissioning their battery EV fleets, the key component of V2G.

Photo-illustration of a man speaking into a microphone while another person looks on. A car and computer are visible in the background. AC Propulsions president, Tom Gage, explains the companys vehicle-to-grid technology at a 2001 conference in Seattle. Photo-illustration: Max-o-matic; photo source: Alec Brooks

The AC Propuls...

02:46

Piracy Subreddit Avoided a Reddit Ban By Censoring Itself to Death TorrentFreak

iptv-smallIn the wake of the music industrys destruction of Napster, hopes of a file-sharing vacuum were overwhelmed by a laundry list of protocols and software clients, some pre-existing, some new.

DCC, Gnutella, Freenet, eDonkey2000, Kazaa/FastTrack, WinMX, Bearshare, Grokster, Morpheus the list went on and on but with no social media, various news and discussion forums took off. Sites like Slyck, Unite the Cows, and Zeropaid became the subreddits of the day, but even 20+ years ago, these platforms were hardly a piracy free-for-all, far from it.

Unlike today, where users happily post direct links to infringing content on social media in their own name, two decades ago in a legal environment far less developed than it is today that was generally forbidden and respected as such.

Reddits /r/piracy, which celebrated its one-millionth member this week, has an exponentially larger task on its hands but, considering its scale, does a remarkably good job of stifling users intent on breaking its rules and ultimately getting the community banned by Reddits administrators. Other piracy subs havent been so lucky.

Reddit Bans For Excessive Infringment

During the first half of 2022 alone, Reddit banned 1,543 subreddits for excessive copyright infringement. Many of those went down in flames after failing to self-censor, but thats not the only way to break up a community.

Reddits /r/iptv subredditt was created on Mar 6, 2011, and with 123,000+ members, ranks in the top 1% of subreddits according to data in its sidebar.

/r/iptv wordcloud (sandhoefner)iptv-reddit-cloud

For those starting out in the world of pirate IPTV services or those already established, /r/iptv was a thriving community to learn about IPTV, discuss services and the pros and cons of software, solve technical issues, and much more. Today the community is almos...

02:00

Optical Algorithm Simplifies Analog AI Training IEEE Spectrum



Researchers have developed a range of analog and other unconventional machine learning systems in the expectation that they will prove vastly more energy efficient than todays computers. But training these AIs to do their tasks has been a big stumbling block. Researchers at NTT Device Technology Labs and the University of Tokyo now say theyve come up with a training algorithm (announced by NTT last month) that goes a long way toward letting these systems meet their promise.

Their results, established on an optical analog computer, represent progress towards obtaining the potential efficiency gains that researchers have long sought from unconventional computer architectures.

Modern AI programs use a biologically-inspired architecture called an artificial neural network to execute tasks like image recognition or text generation. The strength of connections between artificial neurons, which control the outputs of the computation, must be modified or trained using standard algorithms. The most prominent of these algorithms is called backpropagation, which updates the connection strengths to reduce the networks errors, while it processes trial data. Because adjustments to some parameters depend on adjustments to others, there is a need for active information passing and routing by the computer.

As Spectrum has elsewhere explained, Error backpropagation is like running inference in reverse, moving from the last layer of the network back to the first layer; weight update then combines information from the original forward inference run with these backpropagated errors to adjust the network weights in a way that makes the model more accurate.

Alternative computing architectures, which trade complexity for efficiency, often cannot perform the information passing required by the algorithm. As a consequence, the trained parameters of the network must be obtained from an independent physics simulation of the entire hardware setup and its information processing. But creating simulations of sufficient quality can itself be challenging.

We found that it was very hard and tough to apply backpropagation algorithms to our device, said Katsuma Inoue of NTT Device Technology Labs, one of the resea...

01:57

BSD Release: helloSystem 0.8.1 DistroWatch.com: News

helloSystem is a FreeBSD-based, desktop-oriented operating system. The project seeks to provide a macOS-style desktop interface and layout while using open source software. The project has published an update to its 0.8.x series which includes a number of bug fixes and improvements. "USB sound devices are now shown....

01:27

More (hopefully) stable kernels LWN.net

The 6.2.4 and 6.1.17 stable kernels have been released; each contains a pair of reverts for problematic patches in yesterday's updates. But it doesn't stop there; also released are 6.2.5, 6.1.18, and 5.15.100 with another set of important fixes.

00:32

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads The Hacker News

The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. According to cybersecurity company eSentire, malicious ads are used to spoof a wide range of legitimate apps and services such as Adobe, OpenAPI's ChatGPT, Spotify, Tableau, and Zoom. BATLOADER, as the name suggests, is a loader that's responsible for

00:22

Get Ready to Meet the ChatGPT Clones Lifeboat News: The Blog

ChatGPT might well be the most famous, and potentially valuable, algorithm of the moment, but the artificial intelligence techniques used by OpenAI to provide its smarts are neither unique nor secret. Competing projects and open-source clones may soon make ChatGPT-style bots available for anyone to copy and reuse.

Stability AI, a startup that has already developed and open-sourced advanced image-generation technology, is working on an open competitor to ChatGPT. We are a few months from release, says Emad Mostaque, Stabilitys CEO. A number of competing startups, including Anthropic, Cohere, and AI21, are working on proprietary chatbots similar to OpenAIs bot.

The impending flood of sophisticated chatbots will make the technology more abundant and visible to consumers, as well as more accessible to AI businesses, developers, and researchers. That could accelerate the rush to make money with AI tools that generate images, code, and text.

00:22

GPT-4 reveal: Microsoft wont comment on launch rumors Lifeboat News: The Blog

Andreas Braun, CTO of Microsoft Germany, announced the introduction of GPT-4 for next week. The models will be multimodal.

At the AI in Focus Digital Kickoff event, Microsoft Germany presented business applications of large language models and talked about its cooperation with OpenAI and new Azure offerings resulting from it.

As Silke Hahn reports for Heise, Braun announced a GPT-4 reveal next week: Next week we will present GPT-4, there we have multimodal models that offer completely different possibilities for example videos, Braun said.

00:22

Microsoft Says OpenAIs Latest Blockbuster AI Is Dropping Next Week Lifeboat News: The Blog

Update, March 10: A spokesperson for OpenAI has confirmed in a statement to Futurism that OpenAI has not announced any timing for GPT-4.

A German Microsoft executive has, for some reason, claimed that OpenAIs next large language model (LLM) will drop imminently.

We will introduce GPT-4 next week, there we will have multimodal models that will offer completely different possibilities for example, videos, claimed Microsoft Germany CTO Andreas Braun during a digital kickoff event yesterday, per German tech news site Heise Online.

00:22

Microsoft will launch ChatGPT 4 with AI videos next week Lifeboat News: The Blog

Microsoft has just revealed its plans to launch GPT-4 next week. AI videos and music.

00:01

Learn How to Code a zkApp Hello World With Me Using TypeScript David Wong | Cryptologie | HTML

Recorded this video for the Mina Foundation going through the first tutorial for zkapps. If you're interested in understanding what goes into these zk smart contracts then this is for you!

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 11 March

23:53

Prometei botnet evolves and infected +10,000 systems since November 2022 Security Affairs

than 10,000 systems worldwide since November 2022, experts warn.

Cisco Talos researchers reported that the Prometei botnet has infected more than 10,000 systems worldwide since November 2022. The crypto-mining botnet has a modular structure and employs multiple techniques to infect systems and evade detection.

The Prometei botnet was first observed by Cisco Talos experts on July 2020. A deep investigation on artifacts uploaded on VirusTotal allowed the experts to determine that the botnet may have been active at least since May 2016. Experts pointed out that the malware has constantly been updated by its creators with the implementation of new modules and features.

Now Talos confirms that the Prometei botnet continues to improve modules and exhibits new capabilities in recent updates.

More specifically, the botnet operators updated certain submodules of the execution chain to automate processes and challenge forensic analysis methods. reads the post published by Cisco Talos. We assess with high confidence that v3 of the Prometei botnet is of medium size, with more than 10,000 infected systems worldwide, based on data obtained by sinkholing the DGA domains over a period of one week in February 2023.

Prometei botnet
...

23:23

Silicon Valley Bank Shut Down by Regulators, Biggest Bank Failure Since 2008 Global Financial Crisis cryptogon.com

Via: CNBC: Financial regulators have closed Silicon Valley Bank and taken control of its deposits, the Federal Deposit Insurance Corp. announced Friday, in what is the largest U.S. bank failure since the global financial crisis more than a decade ago. The collapse of SVB, a key player in the tech and venture capital community, leaves []

23:18

How the 8086 Processor Determines the Length of an Instruction SoylentNews

https://www.righto.com/2023/02/how-8086-processor-determines-length-of.html

The Intel 8086 processor (1978) has a complicated instruction set with instructions ranging from one to six bytes long. This raises the question of how the processor knows the length of an instruction.1 The answer is that the 8086 uses an interesting combination of lookup ROMs and microcode to determine how many bytes to use for an instruction. In brief, the ROMs perform enough decoding to figure out if it needs one byte or two. After that, the microcode simply consumes instruction bytes as it needs them. Thus, nothing in the chip explicitly "knows" the length of an instruction. This blog post describes this process in more detail.

[...] The 8086 uses a 6-byte instruction prefetch queue to hold instructions, and this queue will play an important role in this discussion.3 Earlier microprocessors read instructions from memory as they were needed, which could cause the CPU to wait on memory. The 8086, instead, read instructions from memory before they were needed, storing them in the instruction prefetch queue. (You can think of this as a primitive instruction cache.) To execute an instruction, the 8086 took bytes out of the queue one at a time. If the queue ran empty, the processor waited until more instruction bytes were fetched from memory into the queue.


Original Submission

Read more of this story at SoylentNews.

23:15

Linux 6.4 To Enable Sensor Monitoring On More ASUS Z590 Motherboards Phoronix

A simple patch queued in "hwmon-next" this week for the Linux 6.4 cycle later this spring gets motherboard sensor monitoring working on three more ASUS motherbards for modern Intel systems...

23:09

Linux 6.2.4 & 6.1.17 Released To Fix An Easy-To-Trigger Kernel Oops Phoronix

Linux 6.2.4 and 6.1.17 kernels have been released this morning as new emergency releases...

23:03

GNU Octave 8.1 Released For Free Software MATLAB Alternative Phoronix

GNU Octave 8.1 is out today as the newest feature release to this free software for scientific computing and numerical computations that remains a leading open-source alternative to MATLAB...

23:00

A Fancy Connected Caliper For Not A Lot Hackaday

An essential for the engineer is a decent caliper, to measure dimensions with reasonable accuracy. Some of us have old-fashioned Vernier scales, while many up-to-date versions are electronic. When entering large numbers of dimensions into a CAD package matters can become a little tedious, so the fancier versions have connectivity for automatic reading transfer. [Mew463] didnt want to shell out the cash for one of those, so modified a cheaper caliper with an ESP32-C3 microcontroller to provide a Bluetooth interface.

Many cheaper calipers have a handy hidden serial port, and its to this interface the mod is connected via a simple level shifter. The ESP and associated circuitry is mounted on a custom PCB on the back of the caliper body, with a very neatly designed case also holding a small Li-Po cell. It adds a little bulk to the instrument, but not enough to render it unusable. Whether the work required to design and build it is worth the cost saving over an off-the-shelf connected caliper is left to the reader to decide.

Weve covered similar hacks in the past, but this ones to a very high standard. Meanwhile if calipers are of interest to you then theyre...

22:22

24/7 AI Seinfeld show is back on Twitch Lifeboat News: The Blog

Really bad now. BUT, the future of entertainment industry:


Transphobic comments lead to Larry Feinbergs downfall on Twitch. According to the host, the reason for Feinbergs bias is an outdated OpenAI language model without a functioning moderation system.

Since mid-December 2022, the small media group Mismatch Media has been running one of the most unusual shows on Twitch (and thats saying something): Using AI tools like DALL-E, GPT-3, Stable Diffusion, and more, Mismatch Media broadcasts an AI-generated show inspired by the popular U.S. sitcom Seinfeld every day, around the clock. Nothing, Forever is the name the team has given to their art project.

The AI-generated content is stitched together in the Unity engine to create an audiovisual pixel show reminiscent of early 90s video games. The jokes rarely have punchlines, the conversations are empty and incoherent, and the audiences fake applause starts in the wrong places.

22:16

KDE's Konsole Now Works On Windows, More Plasma Wayland Fixes Come Too Phoronix

It was a busy March week for KDE developers as they have now got the Konsole terminal emulator working on Windows, Qt apps surviving compositor restarts, other Plasma 6.0 development work under their belt, and the continued flow of fixes...

20:24

Scientists Say The Moon Needs Its Own Lunar Time Zone. Heres Why Lifeboat News: The Blog

On July 21, 1969, Neil Armstrong took that first fateful step onto the Moon. The exact moment occurred just as our planets standard universal time hit 2.56 am. But what time was it for Neil?

Theres currently no answer to that question, but with plans in place to inhabit the Moon, that may need to change.

At a recent meeting in the Netherlands, members from space organizations around the world agreed that we need to implement a proper lunar time zone an internationally accepted common lunar reference time that all future missions can use to communicate and navigate with ease.

20:24

Meet ALAN, a robot that requires minimal human supervision Lifeboat News: The Blog

Deepak Pathak/YouTube.

Researchers at Carnegie Mellon University have created ALAN, an autonomous robot, meaning that it can perceive its environment, make decisions based on what it perceives, and can possibly work for extended periods of time. It has been programmed in such a way that it can recognize and then move or manipulate tasks within that environment.

20:23

Solving Previously Unsolvable Problems: A New Type of Analog Quantum Computer Lifeboat News: The Blog

Physicists have created a novel type of analog quantum computer capable of addressing challenging physics problems that the most powerful digital supercomputers cannot solve.

A groundbreaking study published in Nature Physics.

As the name implies, Nature Physics is a peer-reviewed, scientific journal covering physics and is published by Nature Research. It was first published in October 2005 and its monthly coverage includes articles, letters, reviews, research highlights, news and views, commentaries, book reviews, and correspondence.

20:23

Scientists Discover Enzyme That Can Turn Air Into Electricity Lifeboat News: The Blog

In an exciting turn for the field of sustainable energy research, Australian scientists have found a way to make energy out of thin air. Literally.

As detailed in a new study published this week in the journal Nature, researchers from Monash University in Melbourne, Australia discovered a new bacterial enzyme that transforms the traces of hydrogen in our atmosphere into electricity, technology that could one day be used in fuel cells that power anything from a smartwatch to even a car.

Weve known for some time that bacteria can use the trace hydrogen in the air as a source of energy to help them grow and survive, including in Antarctic soils, volcanic craters, and the deep ocean, said Professor Chris Greening, a contributor to the study, in a statement.

20:23

Is Neuralink the Next Step in Human Evolution? (Or its Downfall) Lifeboat News: The Blog

Thank you for watching my video about Elon Musks Neuralink! If you liked it, please consider subscribing! Have a great day. #neuralink #elonmusk.

Neuralink is a neurotechnology company founded by Elon Musk in 2016 with the goal of.
merging the human brain with artificial intelligence. The company aims to develop a.
brain-machine interface that will enable humans to communicate with computers and other.
devices directly through their thoughts. Neuralinks ultimate vision is to create a symbiotic.
relationship between humans and AI, where the brain and the computer work together to.
enhance human capabilities. While there is a huge potential in this field, it could also turn out.
to be extremely dangerous. Heres why.

20:00

A Love Letter to the Sphere Computer Hackaday

[Ben Z] loves the Sphere computer, a very early entry in the personal computer boom of the mid 1970s. The 6800 CPU was unique in its day that it was a full system at least in theory. If you could afford the whole system, you got a nice case with a keyboard and a memory-mapped display board. You can see a great video tour of the system below the break.

The Sphere suffered from a few problems, none of which were easily foreseeable by its designer. First, the 6800 didnt get the traction that the 8080-derived CPUs did. Second, the S-100 bus would prove to be popular but that nearly always meant an 8080-type processor in practice. Third, while an all-in-one system was the right idea, it was pricey at the time, and many people would opt for something less expensive even if it had less capability. People also wanted to leverage hardware they may have already had. It was easier to imagine hooking up a surplus TeleType, for example, to a more conventional computer than to a Sphere that expected its own display hardware and keyboard.

...

19:20

CISA adds VMwares Cloud Foundation bug to Known Exploited Vulnerabilities Catalog Security Affairs

US CISA added an actively exploited vulnerability in VMwares Cloud Foundation to its Known Exploited Vulnerabilities Catalog.

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in VMwares Cloud Foundation, tracked as CVE-2021-39144 (CVSS score: 9.8), to its Known Exploited Vulnerabilities Catalog.

The remote code execution vulnerability resides in the XStream open-source library. Unauthenticated attackers can exploit the vulnerability in low-complexity attacks without user interaction.

Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of root on the appliance. reads the advisory published by the company.

The flaw was reported by Sina Kheirkhah and Steven Seeley from Source Incite.

...

19:00

What Plants Are Saying About Us Terra Forming Terra



This is really different.  What if the most important aspect of the human brain happens to be its majorly extended surface area?  Turns out that we are talking about 1500 to 2000 square centimeters or almost two large pages of newspaper.

Now imagine a field of dandelions with their massdive head of petals.  Ceertainly enough to provide potential cognitiln for the God of the dandelions which is something encountered along with the green man.  All of a sudden area and affinity maters for cognition.

All of a sudden plant cognition is not so unlikely.  Can we share our intents?


What Plants Are Saying About Us

Your brain is not the root of cognition.

BY AMANDA GEFTER

March 7, 2023


Iwas never into house plants until I bought one on a whima prayer plant, it was called, a lush, leafy thing with painterly green spots and ribs of bright red veins. The night I brought it home I heard a rustling in my room. Had something scurried? A mouse? Three jumpy nights passed before I realized what was happening: The plant was moving. During the day, its leaves would splay flat, sunbathing, but at night theyd clamber over one another to stand at attention, their stems steadily rising as the leaves turned vertical, like hands in prayer.

Who knew plants do stuff? I marveled. Suddenly plants seemed more interesting. When the pandemic hit, I brought more of them home, just to add some life to the place, and then there were more, and more still, until the ratio of plants to...

What the dogs of Chernobyl can teach us about life at the edge Terra Forming Terra



We do see life hold out totally in the ZONE.  Considering what we have been taught, this is very good news.  No spare body parts to be seen and we can presume internal cleanup is happening.

Maybe someday we will actually know.

At least this is a great start on good science and not the rehashing of old wives tales..

What the dogs of Chernobyl can teach us about life at the edge


By Jason Mast March 3, 2023Reprints


https://www.statnews.com/2023/03/03/what-the-dogs-of-chernobyl-can-teach-us-about-life-at-the-edge/

A pack of free-roaming dogs that lives within the industrial areas of the Chernobyl Nuclear Power Plant.CLEAN FUTURES FUND

Youd think an irradiated wasteland would be a poor place to make a home, but some animals beg to differ.

Since the Chernobyl nuclear meltdown 37 years ago, both wild animals and free-roaming domesticated dogs have, to the surprise and delight of environmentalists, flocked to and flourished in the evacuated,1,000 square mile zone surrounding the plant. Its a revealing paradox of modern life: A place too corrosive for humans to live is the rare place animals can live undisturbed.

...

NATO a captured entity Terra Forming Terra

 





What makes all this frightening is that it appears that NATO is a captured tool of the  global DEEp STATE. Their apparent intent is to trigger a war with Russia with the intent to knock it all about.  Yet this is a war for the sake of war.  It was never necessary.

I do think that this is under control and real Russian response is most likely a lot of play acting.  Folks have died ,bhut likely a lot less than claimed.

Again do understand the Trump remains in charge and it is movie with the cooperation of Putin.  If you do not understand that you will be scared for cause.


The Dire Significance of Putins Feb 21 Speech

53643 ViewsFebruary 22, 2023

by David Sant for the Saker blog

https://t.me/Thomas_Anderson_Author/5773

On Tuesday, February 21st President Putin gave a speech that was expected to be very significant. After it was delivered, however, most pundits said he didnt say anything we didnt already know. Most of them focused on his announcement of the withdrawal from the START II treaty. However, he said something far more significant.


An Existential Threat

What Mr. Putin said, when read through the lens of international law, should be chilling to the West.


We would do well to remember that Mr. Putin majored in international law. His speech made a legal case against NATO.


First he listed,...

This Planet would have Died without the Galactics with steve beckow Terra Forming Terra



If depleted uranium is the problem here claimed, then it is astonding it was ever used.  My own sense is that any and all atoms soon make it into the dirt and oxidize and then become water soluable and then migrate deep, just like all geological uranium.

Depleted means the bad isotopes are deeply reduced.  The rest is fear mongering on the basis of the name.  We actually use up the bad isotopes.

Terraforming Terra will tackle all forms of pollution because mankind can do this.  It is only a matter of intent.

This Planet would have Died without the Galactics | Steve Beckow


This Planet Would Have Died Without the Galactics

September 5, 2018


https://voyagesoflight.blogspot.com/2018/09/this-planet-would-have-died-without.html

I was having a discussion with a reader and the subject arose of the contributions of the galactics.

I said that they had saved the planet numerous times and needed only to point to cleaning up depleted uranium in the atmosphere as one occasion (prevention of nuclear wa...

18:34

When Forecasting Trends, Reading a Bar Chart Versus a Line Graph Biases Our Judgement SoylentNews

Study suggests that judgmental forecasting of trends in time-series data, such as weekly sales data, is lower when the information is displayed in bar chart format as opposed to a line graph or point graph:

A new study suggests that the format in which graphs are presented may be biasing people into being too optimistic or pessimistic about the trends in data that the graphs display.

Academics from City, University of London and University College London found that when people who were not experts about a set of data made predictions about how a trend in the data would develop over time, they made lower judgements when the trend was presented as a 'bar chart' type graph as compared to when exactly the same data was presented as a line graph or a graph consisting of a set of data points only.

Nevertheless, across many different types of trend participants consistently thought sales would be lower when the data were presented as bar charts than line graphs or point graphs.

The researchers wondered whether the reason was that in bar charts the area inside the bar is usually heavily shaded and hence visually draws attention to itself, lowering participants' estimates as compared to the other types of graph where there is no shading to attract the eye and attention.

However, in a third experiment, they found the same lower forecasts for bars even when the bars were left unshaded.

where the bars emanated from the top of the graph rather than the bottom. While subtle trends in the data suggest this may reverse the bias, the findings were inconclusive.

Read more of this story at SoylentNews.

18:20

Shopper+ - 878,290 breached accounts Have I Been Pwned latest breaches

In March 2023, "Canada's online shopping mall" Shopper+ disclosed a data breach discovered on a public hacking forum. The breach dated back to September 2020 and included 878k customer records with email and physical addresses, names, phone numbers and in some cases, genders and dates of birth.

17:00

27 Litres And 12 Cylinders, With A Practical Station Wagon Body Hackaday

If you were to name one of the most famous individual road cars in the world, what would it be? If youre British and of a Certain Age, then its possible your nomination is for sale, because The Beast, the one-off creation of [John Dodd] using a 27-litre Rolls-Royce Merlin aero engine, is up for auction. The Late Brake Shows [Jonny Smith] has given it a drive, and weve pasted the resulting video below the break.

A second-hand motor isnt usual Hackaday fare, but its the manner of this cars building which we think will draw you in. [John] originally acquired somebodys failed project featuring not a Merlin but its de-tuned derivative intended for tanks. He solved the problem of finding a transmission able to handle the immense power, and built it up with a pretty 1970s coupe body. After a fire a few years later he commissioned a new body from a dragster manufacturer, which is the wildly period estate car youll see in the video. It famously originally had a Rolls-Royce Cars grille, for which he ended up in court in the 1980s as the carmaker sought successfully to have it removed.

The tale of this car is one of epic scale hackery, as there is quite simply nothing else like it. It was once the worlds most powerful road car, and remains capable of well over 20...

16:00

Linux 6.4 Slated To Start Removing Old, Unused & Unmaintained PCMCIA Drivers Phoronix

Queued up ahead of the Linux 6.4 cycle this spring is removing all of the PCMCIA "char" drivers as part of a broader effort to remove PCMCIA socket and card driver code where there is no apparent users remaining...

14:00

The USB Protocol, Explained Hackaday

If you can explain what a USB PID, a J state, a K state, and an SOF are, you can probably stop reading now. But if you dont know or you want a refresher, you can spend 15 minutes watching [Sine Labs] straightforward explanation of the USB protocol details. You can find the video below.

The motivation for this is he wants to add USB to his projects using an ATMega with a hardware USB implementation. Honestly, most of the time, youll just consume some premade library and get it working that way. However, understanding the terminology can help you, especially if things dont go as planned.

Of course, another useful method is to just use a canned USB serial port and treat the whole thing like an old-fashioned serial port. But for some things you do want to take advantage of the speed and capabilities of the USB specification.

The last few minutes of the video get to a practical example. We agree with the decision to use a library, and in this case, he uses LUFA, an open-source USB stack for the processor he wants to use. But understanding the actual protocol will help you make sense of the documentation and troubleshoot. The example uses a HID device, which is yet more protocol youll have to read up on separately.

If you want to learn more about USB-C, [Arya Vor...

14:00

Avast One Platinum protects users against new and evolving threats Help Net Security

Avast launched Avast One Platinum, the new premium tier of the Cyber Safety service, Avast One. The new Platinum offering combines the full feature set from Avast One Family with identity monitoring and protection, identity theft resolution and reimbursement, and premium technical support, to give people more control and reassurance over their digital lives. The new Avast One Platinum tier is a step-change improvement to the award-winning Avast One integrated solution, said Leena Elias, CPO More

The post Avast One Platinum protects users against new and evolving threats appeared first on Help Net Security.

14:00

HDB Financial Services - 1,658,750 breached accounts Have I Been Pwned latest breaches

In March 2023, the Indian non-bank lending unit HDB Financial Services suffered a data breach that disclosed over 70M customer records. Containing 1.6M unique email addresses, the breach also disclosed names, dates of birth, phone numbers, genders, post codes and loan information belonging to the customers.

13:47

Freeing Up Japan's PhD Potential SoylentNews

Better prospects are needed in universities and industry to make the most of valuable talent:

Japanese science has a problem: there are too many PhD holders and not enough senior roles in universities for them to move into. This is partly caused by a well-meaning, but flawed policy to promote Japanese research that dates back almost three decades.

In 1996, Japan began a plan to boost the number of its academic researchers with a PhD but who are not yet in permanent faculty positions. The country aimed to produce 10,000 of these postdoctoral roles and by 2006 it had exceeded this goal, creating more than 16,000 positions. This leaves a fairly obvious question; what happens to a researcher after they've completed a postdoc? There hasn't been a serious enough effort to create a career pathway for these researchers in academia. Employment in industry is also an uphill battle for them because although progress has been made Japanese businesses on the whole still don't fully appreciate PhDs as a qualification.

Some comparison:

Many students here in Japan increasingly believe that finding jobs in industry, even in pharmaceutical firms and other research-related companies, is easier without a PhD. This is because there can be a belief in industry that it's better and easier for a company to train newly hired employees from scratch, rather than training someone who already has their 'own way of doing things'. In the United States, 40.2% of PhD holders are employed in private industry, but in Japan that figure is just 14%. Hopefully, the 14% in Japan will prove how PhD holders can contribute to businesses so that more companies employ doctoral graduates, something that could also lead to greater collaboration between academia and industry.

Earning a PhD demands an excess of patience, imagination, flexibility and expertise. Surely these are enviable characteristics for any candidate seeking promotion, be that in academia or private industry.


Original Submission

Read more of this story at SoylentNews.

11:40

Atera and ESET join forces to arm customers against zero-day threats Help Net Security

Atera announced a new strategic partnership and integration with ESET, enabling Ateras community of IT professionals to deploy anti-malware solutions to protect their customers. As cyberattacks increase in sophistication and frequency, it is important that we partner with cybersecurity leaders like ESET to offer proactive protection against the toughest malware, and arm customers against zero-day threats, said Gil Pekelman, CEO of Atera. ESETs multi-layered approach to threat detection as well as response, including threat intelligence More

The post Atera and ESET join forces to arm customers against zero-day threats appeared first on Help Net Security.

11:37

11:30

Aura partners with Robert Downey Jr. to increase awareness about the significance of online safety Help Net Security

Aura announced a multi-year partnership with Robert Downey Jr. Through the partnership, Downey Jr. joins Auras Board of Directors, invests in the company and commits to working with Aura as a strategist and brand advocate, supporting consumer education. Honestly, the exponential growth of online crime, just in the last several years, is truly terrifying, said Robert Downey Jr. It requires an innovative solution to protect our families, which is why Im joining Hari and his More

The post Aura partners with Robert Downey Jr. to increase awareness about the significance of online safety appeared first on Help Net Security.

11:00

Low-Power Wi-Fi Includes e-Paper Display Hackaday

Designing devices that can operate in remote environments on battery power is often challenging, especially if the devices need to last a long time between charges or battery swaps. Thankfully there are some things available that make these tasks a little easier, such as e-ink or e-paper displays which only use power when making changes to the display. That doesnt solve all of the challenges of low-power devices, but [Albertas] shows us a few other tricks with this development board.

The platform is designed around an e-paper display and is meant to be used in places where something like sensor data needs to not only be collected, but also displayed. It also uses the ESP32C3 microcontroller as a platform which is well-known for its low power capabilities, and additionally has an on-board temperature and humidity sensor. With Bluetooth included as well, the tiny device can connect to plenty of wireless networks while consuming a remarkably low 34 A in standby.

With a platform like this that can use extremely low power when not taking measurements, a battery charge can last a surprisingly long time. And, since it is based on common components, adding even a slightly larger battery would not be too difficult and could greatly extend this capability as well. But,...

10:32

NetWire Malware Site and Server Seized, Admin Arrested HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

The alleged administrator of the website selling NetWire malware has been arrested in Croatia.

This is a post from HackRead.com Read the original post: NetWire Malware Site and Server Seized, Admin Arrested

10:15

QuSecure launches live end-to-end satellite quantum resilient link through space Help Net Security

QuSecure has accomplished the first known live, end-to-end quantum-resilient cryptographic communications satellite link through space, marking the first time U.S. satellite data transmissions have been protected from classical and quantum decryption attacks using post-quantum cryptography (PQC). The quantum-secure communication to space and back to Earth was made through a Starlink satellite working with a leading Global System Integrator (GSI) and security provider. Starlink is a satellite internet constellation operated by SpaceX consisting of more than More

The post QuSecure launches live end-to-end satellite quantum resilient link through space appeared first on Help Net Security.

08:53

The FBI Just Admitted It Bought US Location Data SoylentNews

Rather than obtaining a warrant, the bureau purchased sensitive data:

Federal Bureau of Investigation has acknowledged for the first time that it purchased US location data rather than obtaining a warrant. While the practice of buying people's location data has grown increasingly common since the US Supreme Court reined in the government's ability to warrantlessly track Americans' phones nearly five years ago, the FBI had not previously revealed ever making such purchases.

The disclosure came today during a US Senate hearing on global threats attended by five of the nation's intelligence chiefs. Senator Ron Wyden, an Oregon Democrat, put the question of the bureau's use of commercial data to its director, Christopher Wray: "Does the FBI purchase US phone-geolocation information?" Wray said his agency was not currently doing so, but he acknowledged that it had in the past. He also limited his response to data companies gathered specifically for advertising purposes.

"To my knowledge, we do not currently purchase commercial database information that includes location data derived from internet advertising," Wray said. "I understand that we previouslyas in the pastpurchased some such information for a specific national security pilot project. But that's not been active for some time." He added that the bureau now relies on a "court-authorized process" to obtain location data from companies.

It's not immediately clear whether Wray was referring to a warrantthat is, an order signed by a judge who is reasonably convinced that a crime has occurredor another legal device. Nor did Wray indicate what motivated the FBI to end the practice.

In its landmark Carpenter v. United States decision, the Supreme Court held that government agencies accessing historical location data without a warrant were violating the Fourth Amendment's guarantee against unreasonable searches. But the ruling was narrowly construed. Privacy advocates say the decision left open a glaring loophole that allows the government to simply purchase whatever it cannot otherwise legally obtain. US Customs and Border Protection (CBP) and the Defense Intelligence Agency are among the list of federal agencies known to have taken advantage of this loophole.

Read more of this story at SoylentNews.

08:41

Top Five Reads on FOSS Force for Week Ending March 10, 2023 FOSS Force

Here are the five most read articles on FOSS Force for the week ending March 3, 2023.

The post Top Five Reads on FOSS Force for Week Ending March 10, 2023 appeared first on FOSS Force.

08:00

More Drill Press Mods: Adding a VFD Means No More Belt Changes Hackaday

A decent drill press is an essential machine tool for almost any kind of shop, and marks a significant step up in precision compared to a hand drill. The ability to drill square, true holes is one thing, but the added power over whats possible with a portable tool is the real game changer. If only you didnt have to switch around those damn belts to change speeds, though.

You dont, of course, if you go through the effort to add a variable frequency drive to your drill press like [Midwest Cyberpunk] did, along with some other cool mods. The donor tool for these mods came from where else? Harbor Freight. Some will quibble with that choice, but the tool was pretty cheap, and really all [Midwest] was interested in here was some decent castings and a quill with acceptable runout, since the entire power train of the tool was slated for replacement. The original motor gave way to a beefy Baldor 3-phase/240-volt motor controlled by a VFD mounted on a bracket to th...

07:45

OpenForum Europe Mourns Passing of Co-Founder Basil Cousins at 91 FOSS Force

Basil Cousins, the co-founder and director of OpenForum Europe has died after a long illness.

The post OpenForum Europe Mourns Passing of Co-Founder Basil Cousins at 91 appeared first on FOSS Force.

07:39

Law enforcement seized the website selling the NetWire RAT and arrested a Croatian man Security Affairs

An international law enforcement operation seized the infrastructure associated with the NetWire RAT and resulted in the arrest of its administrator.

A coordinated international law enforcement operation resulted in the seizure of the infrastructure associated with the NetWire RAT, the police also arrested its administrator.

Law enforcement seized the website www.worldwiredlabs[.]com and its alleged administrator, a Croatian national.

NetWire RAT...

07:09

06:45

Radeon ProRender SDK 3.1 Released - Finishes Transition From OpenCL To HIP Phoronix

AMD today published Radeon ProRender SDK 3.1 as the newest rendering engine...

06:30

Making Dry Ice at Home is Just as Hard as It Sounds Hackaday

Along the road to developing his own cryocooler to produce liquid nitrogen, there are a number of interesting rabbit holes [Hyperspace Pirate] has found himself taking a look at. For example, using dry ice for a pre-cooling stage and subsequently wondering what itd take to make this dry ice oneself.

Getting the CO2 required for the dry ice is the easy part, requiring nothing more complicated than baking soda and a suitable acid (like hydrochloric acid). The other options to gather CO2 include using yeast, capturing the gas from the air people breathe out, calcium hydroxide, etc., none of which are as easy or convenient.

...

06:30

Video Friday: Agilicious IEEE Spectrum



Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We also post a weekly calendar of upcoming robotics events for the next few months. Please send us your events for inclusion.

HRI 2023: 1316 March 2023, STOCKHOLM
Robotics Summit & Expo: 1011 May 2023, BOSTON
ICRA 2023: 29 May2 June 2023, LONDON
RoboCup 2023: 410 July 2023, BORDEAUX, FRANCE
RSS 2023: 1014 July 2023, DAEGU, KOREA
IEEE RO-MAN 2023: 2831 August 2023, BUSAN, KOREA
CLAWAR 2023: 24 October 2023, FLORIANOPOLIS, BRAZIL
Humanoids 2023: 1214 December 2023, AUSTIN, TEXAS

Enjoy todays videos!

Agilicious is a co-designed hardware and software framework tailored to autonomous, agile quadrotor flight, which has been developed and used since 2016 at the Robotics and Perception Group of the University of Zurich. Agilicious is completely open-source and open hardware and supports both model-based and neural-network-based controllers!

[ Agilicious ]

Flexivs adaptive robot masseur fuses force control, computer vision, and artificial intelligence to emulate the skill and dexterity of a human massage therapist.

...

06:09

Feds Open New Tesla Probe After Two Model Y Steering Wheels Come Off SoylentNews

https://arstechnica.com/cars/2023/03/tesla-under-new-federal-investigation-for-steering-wheels-that-detach/

Tesla has yet another federal headache to contend with. On March 4, the National Highway Traffic Safety Administration's Office of Defects Investigation opened a preliminary investigation after two reports of Tesla Model Y steering wheels detaching in drivers' hands while driving.

NHTSA's ODI says that in both cases, the model year 2023 Model Ys each required repairs on the production line that involved removing their steering wheels. The wheels were refitted but were only held in place by frictionTesla workers never replaced the retaining bolt that affixes the steering wheel to the steering column. In 2018, Ford had to recall more than 1.3 million vehicles after an incorrectly sized bolt resulted in a similar problem.

The ODI document states that "sudden separation occurred when the force exerted on the steering wheel overcame the resistance of the friction fit while the vehicles were in motion" and that both incidents occurred while the electric vehicles still had low mileage.

Related:
Tesla recalls all cars with FSD (full self driving) option (Elon Tweet:"Definitely. The word "recall" for an over-the-air software update is anachronistic and just flat wrong!")
Feds Open Criminal Investigation Into Tesla Autopilot Claims
NHTSA Investigation Into Telsa Autopilot Intensifies
Tesla's Radar-less Cars Investigated by NHTSA After Complaints Spike
Tesla Under Federal Investigation Over Video Games That Drivers Can Play
Tesla Must Tell NHTSA How Autopilot Sees Emergency Vehicles
NHTSA Opens Investigation into Tesla Autopilot after Crashes with Parked Emergency Vehicles
Tesla Recall is Due to Failing Flash Memory
Tesla Crash Likely Caused by Video Game Distraction
Autopilot Was Engaged...

06:00

Yu Yuan on Building A Persistent Virtual World IEEE Spectrum



Despite tech giants including Meta, Microsoft, and Nvidia investing billions of dollars in the development of the metaverse, it is still little more than a fantasy. Making it a reality is likely to require breakthroughs in a range of sectors such as storage, modeling, and communication.

To spur progress in the advancement of those technologies, the IEEE Standards Association has launched the Persistent Computing for Metaverse initiative. As part of the IEEEs Industry Connections Program, it will bring together experts from both industry and academia to help map out the innovations that will be needed to make the metaverse a reality.


Although disparate virtual-reality experiences exist today, the metaverse represents a vision of an interconnected and always-on virtual world that can host thousands, if not millions, of people simultaneously. The ultimate goal is for the virtual world to become so realistic that it is almost indistinguishable from the real one.

Todays technology is a long way from making that possible, says Yu Yuan, president of the IEEE Standards Association. The Institute spoke with Yuan to find out more about the initiative and the key challenges that need to be overcome. His answers have been edited for clarity.

The Institute: What is persistent computing?

Yu Yuan: I have been working in virtual reality and multimedia for more than 20 years, I just didnt call my work metaverse. After metaverse became a buzzword, I asked myself, Whats the difference between metaverse and VR? My answer is: persistence, or the ability to leave traces in a virtual world.

Persistent computing refers to the combination of all the technologies needed to support the development and operation of a persistent virtual world. In other words, a metaverse. There are different kinds of VR experiences, but many of them are one-time events. Similar to how video games work, every time a user logs in, the entire virtual world resets. But users in t...

05:32

Cybersecurity Firm Acronis Data Breach: Hackers Leak 21GB of Data HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Acronis has confirmed the data breach, stating that the leak does not contain login credentials.

This is a post from HackRead.com Read the original post: Cybersecurity Firm Acronis Data Breach: Hackers Leak 21GB of Data

05:22

Its Board Election Time at Open Source Initiative Again FOSS Force

If this is March, it must be election time at OSI. This year, two individual seats and one affiliate seat are in the running.

The post Its Board Election Time at Open Source Initiative Again appeared first on FOSS Force.

05:10

UK Govt: Piracy Snitch Campaign Not Ideal During a Cost of Living Crisis TorrentFreak

mind-smallAfter reading hundreds of copyright reports, anti-piracy studies, lobbying documents, and submissions to government and law enforcement agencies, anything that strays from the norm tends to stand out.

Last month the Industry Trust For IP published Taking a Whole Society Approach to Infringement in the UK, a report promoting collaboration and understanding to reduce piracy levels in the UK.

Our initial article focused on just one item in the report but something much more fundamental ran throughout. A pleasant surprise, even.

Softer, More Cooperative Tone

There is no such thing as a friendly anti-piracy report, the topic immediately rules that out, but the language and tone in the Industry Trusts publication is interestingly close. Considering that companies behind the Industry Trust include Sony, Universal, Disney, and Warner, not to mention Sky, Premier League and the Federation Against Copyright Theft, that seemed a little unusual.

Familiar themes are present calls for tech platforms to do more and hosts to implement Know Your Customer regimes to help identify pirates, for example. However, forceful language such as must be required to implement X and should be prevented from doing Y are mostly replaced by scenarios where various entities could be a real help if they did A, B or C.

Policymakers could update the UK Policy framework with due diligence protocols for intermediaries providing commercial services to online businesses

Technology companies could support enforcement efforts by introducing improved customer identification and verification

Technology companies could implement technical measures that introduce greater friction into infringement journeys

This type of language and tone certainly fits the overall sentiment of a collaborative campaign but also unusual enough to warrant a closer look.

Whether by pure coincidence or otherwise, the government appears to have concluded that aggressive messaging over online piracy may seem at odds with the cooperative tone that it considers advisable in communications this year.

Its hard to say whether the Industry Trusts recent report should be viewed as a product of government advice or independently prudent, but these them...

05:01

Inject external data in policy evaluations with Conftest Linux.com

Separating policy from data enables more robust and reusable policy definitions that allow you to factor external data sources in compliance evaluation.

Read More at Enable Sysadmin

The post Inject external data in policy evaluations with Conftest appeared first on Linux.com.

03:39

EPO Weaponises International Womens Day to Cover Up Its Attacks on Women Techrights

Video download link | md5sum 16272ba8c3034e82e1d6d5269085e6e5
EPO Women Affairs
Creative Commons Attribution-No Derivative Works 4.0

Summary: The narcissistic management of the EPO pats itself on the back over feminism, diversity etc. while women who actually work real work at the Office (examiners, not the family/cabal lodged at the top floor) dispute this misleading PR-esque narrative

Some years ago there was some waffle [PDF] from Elodie Bergot, who was promoted not as a woman but as a family member (spouse) of the EPOs mafia (Benot Battistellis faithful servant from INPI). Bergot seems to be attacking more women than she attacks men (M. & E.). Hows that for an achievement? Cat fights are not breeding diversity more so in an office that already fails to attract women and barely offers them promotions (compared to men), according to the EPOs own numbers.

International womens dayAntnio Campinos also supports women. He brought women without relevant experience in patents just because they had previously worked with him at EUIPO the subject of a new scandal as noted in the video above. It is connected to Christian Archambeau, a confidant of Campinos, who originally came from the EPO.

Nothing allures women scientists more and even attracts them to the EPO than a Mr. Campinos d...

03:30

Box86 v0.3 & Box64 v0.2.2 Released For Running Linux x86/x86_64 Programs On Arm Phoronix

In addition to this week seeing new releases of FEX-Emu and Hangover for open-source projects aiming to run x86/x86_64 binaries on 64-bit Arm, the Box86 and related Box64 projects are out today with their own feature updates for helping to enable x86 and x86_64 Linux binaries on Arm systems...

03:27

Moderna CEO Says Private Investors Funded COVID VaccineNot Billions From Gov't SoylentNews

https://arstechnica.com/science/2023/03/moderna-ceo-says-private-investors-funded-covid-vaccine-not-billions-from-govt/

Moderna CEO Stphane Bancel on Monday pushed back on criticism of the company's plans to raise the price of its mRNA-based COVID-19 vaccines by 400 percent, arguing that the billions of dollars in federal funding the company received played little role in the vaccine's development.

Speaking at the Wall Street Journal Health Forum, Bancel suggested that the vaccine's development is thanks to private investors and that the federal funding merely hastened development that would have occurred regardless.
[...]
While the government most recently paid $26 per dose of Moderna's updated booster, the company is planning to raise the price of its shots to $110 to $130 per dose.

Related:
"Pure and Deadly Greed": Lawmakers Slam Pfizer's 400% Price Hike on COVID Shots


Original Submission

Read more of this story at SoylentNews.

02:51

Unearthing Crimes of Sirius Open Source schestowitz.com

Video download link | md5sum c00ff3859f267c20af0e44af8b6a439c
The Series on Sirius Crimes
Creative Commons Attribution-No Derivative Works 4.0

Summary: Today we start a string of videos and short texts about the company my wife and I left in December (we resigned just over 3 months ago); as it turns out, the company had been committing crimes for years before we left

THE Pensiongate mini-series is becoming a lot more extensive and far longer than we first estimated. We find out more and more things as one scandal helps unfold another. As such, this morning we started a dedicated Wiki page, Crimes of Sirius Open Source a complementary subset of Sirius Open Source, which started back in December.

The video above explains the motivation and emphasises that well try to cover this a lot in the form of videos, delivering perhaps a dozen more parts, including bits of evidence. Video will be a convenient means by which to deliver the material in a privacy-respecting matter.

Its sort of sad that weve come to this, but if you deal with people who defrauded not only you but also your colleagues, then it becomes imperative to speak out and do something about it. Some people have asked me to pursue a legal opinion on this. As a side note, several people say they love the term Mr. Kink, which does not infringe anyones privacy yet says a lot.

The journey required to write the series is mostly free free as in beer/gratis. The material is in the public domain, e.g. the Companies House. Its free. Except all the times we phoned pension providers quite an expensive endeavour when you do it for 2-3 months. The upside is that along the way we learned a lot about how the system works and how it is abused. Its cheaper to learn that on ones own. For instance, when my wife and I demand the money from both our accounts the providers are pretending its not possible (it is; with...

02:48

Iran and Saudi Arabia Agree to Restore Relations cryptogon.com

Via: Al Jazeera: Iran and Saudi Arabia have agreed to re-establish diplomatic relations and reopen their embassies within two months, according to Iranian and Saudi state media. The agreement was reached on Friday during talks in Beijing. Iranian state media posted images and video of Ali Shamkhani, secretary of the Supreme National Security Council of []

02:47

Sirius Open Source Pensiongate: A Long Story Merits Many Videos Techrights

Video download link | md5sum c00ff3859f267c20af0e44af8b6a439c
The Series on Sirius Crimes
Creative Commons Attribution-No Derivative Works 4.0

Summary: Today we start a string of videos and short texts about the company my wife and I left in December (we resigned just over 3 months ago); as it turns out, the company had been committing crimes for years before we left

THE Pensiongate mini-series is becoming a lot more extensive and far longer than we first estimated. We find out more and more things as one scandal helps unfold another. As such, this morning we started a dedicated Wiki page, Crimes of Sirius Open Source a complementary subset of Sirius Open Source, which started back in December.

For those who have missed some of the context, here are just several of the posts that covered this matter:

  1. Sirius Open Source and the Money Missing From the Pension
  2. Sirius Finished
  3. Sirius Open Source Pensiongate: An Introduction
  4. When the Pension Vanishes
  5. Sirius Open Source Pensiongate (Sirius Financial Crisis): Company May Have Squandered/Plundered the Pensions of Many People
  6. ...

02:15

Security Affairs

automated transfer system framework and targets 400 banks.

The author of the Xenomorph Android malware, the Hadoken Security Group, continues to improve their malicious code.

In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

The banking Trojan was used to target 56 European banks and steal sensitive information from the devices of their customers. The analysis of the code revealed the presence of not implemented features and the large amount of logging present, a circumstance that suggests that this threat is under active development.

Xenomorph shares overlaps with the Alien banking trojan, but it has functionalities radically different from the Aliens one. 

The experts noticed that the was continuously improved during 2022 and was distributed in small campaigns. The operators first distributed the Android malware via the GymDrop dropper operation, later the malicious code was also distributed via the Zombinder operation.

Experts warn that a new variant recently discovered, tracked as Xenomorph.C, was significantly improved.

The new variant supports a new automated transfer system (ATS) framework and can target over 400 banks and financial institutions mainly from Spain, Turkey, Poland, the United States, Australia, Canada, Italy, Portugal, France, Germany, UAE, and India

capabilities to an already feature rich Android Banker, most notably the introduction of a very extensive runtime engine powered by Accessibility services, which is used by actors to implement a complete ATS framework. With these new features, Xenomorph is now able to completely automate the whole fraud chain, from infection to funds exfiltration, making it one of the most advanced and dangerous Android Malware trojans in circulation. reads the report published by Threat Fabric. In addition, the samples identified by ThreatFabric featured config...

01:57

[$] Interview: the FreeCAD Project Association LWN.net

The sustainability of free software continues to be mostly uncharted waters. No team is the same as any other, so copying, say, the Blender Foundations approach to governance will, most likely, not work for other projects. But there is value in understanding how various non-commercial organizations operate in order to make informed decisions for the governance of new ones. In late 2021, the FreeCAD team launched the FreeCAD Project Association (FPA) to handle the various assets that belong to this free 3D CAD project. In this interview, Yorik van Havre, a longtime FreeCAD developer and current president of the Association guides us through the process of starting and managing the FPA.

01:46

Microsoft to boost protection against malicious OneNote documents Help Net Security

Microsoft has announced that, starting in April 2023, they will be adding enhanced protection when users open or download a file embedded in a OneNote document a known high-risk phishing file type. Users will receive a notification when the files seem dangerous to improve the file protection experience in OneNote on Windows, the company said. A popular technique for malware delivery When last July Microsoft started blocking VBA macros from running by default in More

The post Microsoft to boost protection against malicious OneNote documents appeared first on Help Net Security.

01:40

Three stable kernel updates LWN.net

The 6.2.3, 6.1.16, and 5.15.99 stable kernel updates have been released. The first updates after the close of a merge window tend to be huge, and these ones certainly fit that description.

01:37

Security updates for Friday LWN.net

Security updates have been issued by Debian (chromium and wireless-regdb), Fedora (caddy, python-cryptography, and redis), Oracle (gnutls), SUSE (hdf5, opera, python-Django, redis, tomcat, and xen), and Ubuntu (apache2 and snakeyaml).

01:09

Tracing Water through the Stages of Planet Formation Centauri Dreams Imagining and Planning Interstellar Exploration

Tracing Water through the Stages of Planet Formation

The presence of water in the circumstellar disk of V883 Orionis, a protostar in Orion some 1300 light years out, is not in itself surprising. Water in interstellar space is known to form as ice on dust grains in molecular clouds, and clouds of this nature collapse to form young stars. We would expect that water would be found in the emerging circumstellar disk.

What new work with data from the Atacama Large Millimeter/submillimeter Array (ALMA) shows is that such water remains unchanged as young star systems evolve, a chain of growth from protostar to protoplanetary disk and eventually planets and water-carrying comets. John Tobin, an astronomer at the National Science Foundations National Radio Astronomy Observatory (NRAO), is lead author on the paper on this work:

We can think of the path of water through the Universe as a trail. We know what the endpoints look like, which are water on planets and in comets, but we wanted to trace that trail back to the origins of water. Before now, we could link the Earth to comets, and protostars to the interstellar medium, but we couldnt link protostars to comets. V883 Ori has changed that, and proven the water molecules in that system and in our Solar System have a similar ratio of deuterium and hydrogen.

Image: While searching for the origins of water in our Solar System, scientists homed in on V883 Orionis, a unique protostar located 1,305 light-years away from Earth. Unlike with other protostars, the circumstellar disk surrounding V883 Ori is just hot enough that the water in it has transformed from ice into gas, making it possible for scientists to study its composition using radio telescopes like those at the Atacama Large Millimeter/submillimeter Array (ALMA). Radio observations of the protostar revealed water (orange), a dust continuum (green), and molecular gas (blue) which suggests that the water on this protostar is extremely similar to the water on objects in our own Solar System, and may have similar origins. Credit: ALMA (ESO/NAOJ/NRAO), J. Tobin, B. Saxton (NRAO/AUI/NSF).

V883 Ori is interesting in its own right as a star undergoing a so-called accretion burst, a rarely observed occurrence in which a star in the process of formation ingests a huge amount of disk material, forcing an increase i...

01:04

WhatsApp and UK government on collision course, as app vows not to remove end-to-end encryption Graham Cluley

The boss of WhatsApp, the most popular messaging platform in the UK, says that it will not remove end-to-end encryption from the app to comply with requirements set out in the UK government's online safety bill. Learn more in my article on the Hot for Security blog.

01:02

New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide The Hacker News

called Prometei has infected more than 10,000 systems worldwide since November 2022. The infections are both geographically indiscriminate and opportunistic, with a majority of the victims reported in Brazil, Indonesia, and Turkey. Prometei, first observed in 2016, is a modular botnet that features a large repertoire of components and several proliferation

00:56

Pirated copies of Final Cut Pro infect Macs with cryptojacking malware Graham Cluley

Torrents on The Pirate Bay which claim to contain Final Cut Pro are instead being used to distribute cryptojacking malware to Macs.

00:50

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware The Hacker News

A suspecting China-linked hacking campaign has been observed targeting unpatched SonicWall Secure Mobile Access (SMA) 100 appliances to drop malware and establish long-term persistence. "The malware has functionality to steal user credentials, provide shell access, and persist through firmware upgrades," cybersecurity company Mandiant said in a technical report published this week. The

00:49

CVE-2023-26464: Apache Log4j 1.x (EOL) allows DoS in Chainsaw and SocketAppender Open Source Security

Posted by Arnout Engelen on Mar 10

Severity: low

Description:

** UNSUPPORTED WHEN ASSIGNED **

When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to
cause a logging entry involving a specially-crafted (ie, deeply nested)
hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available
memory in the virtual machine and achieve Denial of Service when the object is...

00:45

OpenBSD Finally Adds Guided Disk Encryption To Its Installer Phoronix

Full disk encryption is quite important in today's computing environment while some operating systems still sadly don't provide an easy and streamlined manner of setting up an encrypted disk at install-time. Thankfully with the next release of OpenBSD, they are introducing a guided disk encryption option to their installer...

00:43

Threat Actors are Using Advanced Malware to Backdoor Business-grade Routers SoylentNews

Hiatus hacking campaign has infected roughly 100 Draytek routers:

Researchers have uncovered advanced malware that's turning business-grade routers into attacker-controlled listening posts that can sniff email and steal files in an ongoing campaign hitting North and South America and Europe.

Besides passively capturing IMAP, SMTP, and POP email, the malware also backdoors routers with a remote-access Trojan that allows the attackers to download files and run commands of their choice. The backdoor also enables attackers to funnel data from other servers through the router, turning the device into a covert proxy for concealing the true origin of malicious activity.

"This type of agent demonstrates that anyone with a router who uses the Internet can potentially be a targetand they can be used as proxy for another campaigneven if the entity that owns the router does not view themselves as an intelligence target," researchers from security firm Lumen's Black Lotus Labs wrote. "We suspect that threat actors are going to continue to utilize multiple compromised assets in conjunction with one another to avoid detection."

[...] Black Lotus still doesn't know how devices are getting hacked in the first place. Once (and however) that happens, the malware gets installed through a bash script that's deployed post-exploitation. It downloads and installs the two main binaries.

[...] Hiatus is mainly targeting DrayTek routers running an i386 architecture. The researchers, however, have uncovered prebuilt binaries compiled for ARM, MIPS64 big endian, and MIPS32 little endian platforms.

Read more of this story at SoylentNews.

00:39

International Law Enforcement Takes Down Infamous NetWire Cross-Platform RAT The Hacker News

A coordinated international law enforcement exercise has taken down the online infrastructure associated with a cross-platform remote access trojan (RAT) known as NetWire. Coinciding with the seizure of the sales website www.worldwiredlabs[.]com, a Croatian national who is suspected to be the website's administrator has been arrested. While the suspect's name was not released, investigative

00:30

Lenovo Begins Supporting LinuxBoot Firmware With ByteDance Phoronix

This week TikTok-owner ByteDance hosted the CloudFW Open System Firmware Symposium to talk up their open-source firmware work, showcase their industry partnerships, and more. One interesting takeaway is that thanks to the weight of ByteDance, Lenovo is now supporting LinuxBoot in some capacity...

00:22

This 1,000-foot Multi-Rotor Floating Turbine Can Power 80,000 Homes Lifeboat News: The Blog

A Norwegian Greentech company has recently unveiled its new 1,000-foot (324m) tall, floating wind turbine array. Called Wind Catcher, this innovation in renewable energy generation could be used to power as many as 80,000 homes.

The system has been developed by the Norwegian-based Wind Catching Systems (WCS), who declare that their new wind turbine setup could generate five times the annual energy of the worlds biggest standalone wind turbines. Not only that, but if scaled, it could reduce the costs of wind energy to be competitive with traditional grid-supplied electricity.

00:22

Breakthrough drug works against all the main types of primary bone cancer Lifeboat News: The Blog

Researchers at the University of East Anglia have developed a new drug that works against all of the main types of primary bone cancer.

Cancer that starts in the bones, rather than cancer that has spread to the bones, predominantly affects children.

Current treatment is grueling, with outdated chemotherapy cocktails and limb amputation.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 10 March

23:56

When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About The Hacker News

Multi-factor Authentication (MFA) has long ago become a standard security practice. With a wide consensus on its ability to fend off more than 99% percent of account takeover attacks, it's no wonder why security architects regard it as a must-have in their environments. However, what seems to be less known are the inherent coverage limitations of traditional MFA solutions. While compatible with

23:32

Alleged seller of NetWire RAT arrested in Croatia Help Net Security

This week, as part of a global law enforcement operation, federal authorities in Los Angeles successfully confiscated www.worldwiredlabs.com, a domain utilized by cybercriminals to distribute the NetWire remote access trojan (RAT) allowed perpetrators to assume control of infected computers and extract a diverse range of sensitive information from their unsuspecting victims. A RAT is a type of malware that allows for covert surveillance, allowing a backdoor for administrative control and unfettered and unauthorized remote access More

The post Alleged seller of NetWire RAT arrested in Croatia appeared first on Help Net Security.

23:00

Cornell Updates Their MCU Course for the RP2040 Hackaday

The School of Electrical and Computer Engineering at Cornell University has made [Bruce Land]s lectures and materials for the Designing with Microcontrollers (ECE 4760) course available for many years. But recently [Bruce], who semi-retired in 2020, and the new lecturer [Hunter Adams] have reworked the course and labs to use the Raspberry Pi Pico. You can see the introductory lecture of the reworked class below.

Not only are the videos available online, but the classs GitHub repository hosts extensive and well-documented examples, lecture notes, and helpful links. If you want to get started with RP2040 programming, or just want to dig deeper into a particular technique, this is a great place to start.

From what we can tell, this is the third overhaul of the class this century. Back in 2012 the course was using the ATmega1284 AVR microcontroller, and in 2015 it switched to the Microstick II using a Microchip PIC32MX. Not only were these lecture series also available free online, but each has been maintained as reference after being replaced. One common thread with all of these platforms is their low cost of entry. Assuming you already have a computer, setting up the hardware and software development en...

22:48

Embree 4.0.1 Released With Intel Data Center GPU Flex Series Support Phoronix

Embree 4.0.1 is out with a few changes to note for this open-source high performance ray-tracing library for CPUs and GPUs...

22:36

Chrome 112 Beta Released With CSS Nesting, WebAssembly Tail Call Phoronix

Chrome 112 beta is now available for testing as the next step forward for Google's web browser...

22:25

Internet crime in 2022: Over $3 billion lost to investment scammers Help Net Security

In 2022, investment scam losses were the most (common or dollar amount) scheme reported to the Internet Crime Complaint Center (IC3), the FBI shared in its 2022 Internet Crime Report. This category includes crypto-investment scams such as liquidity mining, celebrity impersonation, pig butchering, and many more. Business email compromise (BEC) scams are overall the second most financially destructive, followed by tech support scams and personal data breaches. 2022 Internet Crime Report: Additional findings The number More

The post Internet crime in 2022: Over $3 billion lost to investment scammers appeared first on Help Net Security.

22:25

AMD Releases AOMP 17.0-0 For Latest Radeon OpenMP Offloading Compiler Phoronix

On Thursday AMD engineers released AOMP 17.0-0 as the newest latest development patches around Radeon/Instinct OpenMP GPU/accelerator offloading support...

22:22

Metas powerful AI language model has leaked online what happens now? Lifeboat News: The Blog

Supposedly bouncing around out of 4C and in hacker forums.


Metas leaked AI language model could be a big deal.

22:22

First Complete Wiring Map of Neurons in Insect Brain: 3016 Neurons and 548,000 Synapses Mapped Lifeboat News: The Blog

Summary: A newly constructed brain map shows every single neuron and how they are wired together in the brains of fruit fly larvae.

Source: UK Research and Innovation.

Researchers have built the first ever map showing every single neuron and how theyre wired together in the brain of the fruit fly larva.

22:22

Bank of America Obsessed With AI, Says Its the New Electricity Lifeboat News: The Blog

The financial industrys response to artificial intelligence has been all over the place. Now, Bank of America is weighing in very much on the side of the bots.

In a note to clients viewed by CNBC and other outlets, BofA equity strategist Haim Israel boasted that AI was one of its top trends to watch and invest in for the year, and used all kinds of hypey language to convince its clients.

We are at a defining moment like the internet in the 90s where Artificial Intelligence (AI) is moving towards mass adoption, the client note reads, with large language models like ChatGPT finally enabling us to fully capitalize on the data revolution.

22:22

Long-Sought Math Proof Unlocks More Mysterious Modular Forms Lifeboat News: The Blog

Using refreshingly old tools, mathematicians resolved a 50-year-old conjecture about how to categorize important functions called modular forms, with consequences for number theory and theoretical physics.

22:06

Distribution Release: siduction 22.1.1 DistroWatch.com: News

Ferdinand Thommes has announced the release of siduction 22.1.1, un updated build of the project's distribution based on Debian's "unstable" branch and offering official variants with KDE Plasma, LXQt and Xfce desktops: "We are pleased to offer siduction 2022.1.1 as a bug-fix release. It is based on an....

21:56

Forget Designer Babies. Heres How CRISPR is Really Changing Lives SoylentNews

The gene-editing tool is being tested in people, and the first treatment could be approved this year:

Forget about He Jiankui, the Chinese scientist who created gene-edited babies. Instead, when you think about gene editing you should think of Victoria Gray, the African-American woman who says she's been cured of her sickle-cell disease symptoms.

[...] But the designer-baby debate is a distraction from the real story of how gene editing is changing people's lives, through treatments used on adults with serious diseases.

In fact, there are now more than 50 experimental studies underway that use gene editing in human volunteers to treat everything from cancer to HIV and blood diseases, according to a tally shared with MIT Technology Review by David Liu, a gene-editing specialist at Harvard University.

Most of these studiesabout 40 of theminvolve CRISPR, the most versatile of the gene-editing methods, which was developed only 10 years ago.

[...] To scientists, CRISPR is a revelation because of how it can snip the genome at specific locations. It's made up of a cutting protein paired with a short gene sequence that acts like GPS, zipping to a predetermined spot in a person's chromosomes.

[...] The first generation of CRISPR treatments are also limited in another way. Most use the tool to damage DNA, essentially shutting off genesa process famously described as "genome vandalism" by Harvard biologist George Church.

[...] Liu's lab is working on next-generation gene-editing approaches. These tools also employ the CRISPR protein, but it's engineered not to cut the DNA helix, but instead to deftly swap individual genetic letters or make larger edits. These are known as "base editors."

[...] Now that gene editing has had its first successes, Urnov says, there's an "urgent need" to open a "path to the clinic for all."


Original Submission

Read more of this story at SoylentNews.

21:31

ESPN & beIN Accused of Stealing Fans Viral Ancelotti Chewing Gum Video TorrentFreak

rights moneyViral videos are big business. Therefore its no surprise that specialized companies emerged to help the lucky few to monetize their viral content.

These companies typically take care of licensing and legal issues. This is also the case with Videohat, which uses the catchy tagline Rights = Money.

Unfortunately, however, getting paid isnt always straightforward. When a video goes viral, thousands of copies are made without permission, even by mainstream news outlets, other licensing companies, and some of the worlds largest copyright businesses.

Viral Gum Video

This is also what Youssef Abu Bakr noticed when he uploaded a TikTik video of Real Madrid manager Carlo Ancelotti, sharing one of his trademark chewing gums. This gesture generated millions of views on TikTok and was reposted thousands of times without permission.

ESPNs Watermarked TikTok

espn gum

Bakr licenses his videos through Videohat and the latter found out that rights dont always equal money, not directly. In addition to thousands of smaller accounts, mainstream companies including ESPN also copied the clip, as shown above.

Hoping to get rewarded, Videohat reached out to ESPN with a licensing deal but that didnt get the desired result. This eventually prompted the company to file a formal case at the U.S. Governments Copyright Claims Board (CCB) which was launched last year to deal with these types of smaller disputes.

ESPN Hit With Copyright Claim

According to the claim, ESPN is a renowned network that should be quite familiar with copyright law and licensing requirements. Despite this, ESPN reportedly failed to cooperate when Videohat reached out.

The alleged wrongdoing isnt limited to the TikTok video either. Similar posts appeared on ESPNs Twitter, Facebook, and You...

21:03

Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant The Hacker News

A new variant of the Android banking trojan named Xenomorph has surfaced in the wild, latest findings from ThreatFabric reveal. Named "Xenomorph 3rd generation" by the Hadoken Security Group, the new features that allow it to perform financial fraud in a seamless capabilities

20:29

AT&T is notifying millions of customers of data breach after a third-party vendor hack Security Affairs

AT&T is warning some of its customers that some of their information was exposed after the hack of a third-party vendors system.

AT&T is notifying millions of customers that some of their information was exposed after a third-party vendor was hacked.

CPNI is information related to the telecommunications services purchased by the customers, including the number of lines for each account or the wireless plan to which customers are subscribed.

We recently determined that an unauthorized person breached a vendors system and gained access to your Customer Proprietary Network Information (CPNI). reads a data breach communication sent by the company to the impacted customers. However, please rest assured that no sensitive personal or financial information such as Social Security number or credit card information was accessed.

Exposed data dont include financial information (i.e. credit card data) or sensitive data (i.e. Social Security Number, account passwords).

The vendor was hacked in January, and AT&T told its customers that vulnerability exploited by the attackers has been already fixed. The Telco giant added that its systems were not compromised.

The company has notified federal law enforcement, but the data breach notification does not provide the number of impacted customers.

Our report to law enforcement does not contain specific information about your account, only that the unauthorized access occurred. continues the notice.

BleepingComputer reported that approximately 9 million wireless accounts were impacted.

The company recommends its customers to add an extra security password protection to their account at no cost.

On August 2021, ShinyHunters group...

20:22

What Is Nanotechnology? Lifeboat News: The Blog

Nanotechnology is a field of science and engineering that focuses on the design and manufacture of extremely small devices and structures.

20:00

A Tape Loop Echo you Can Build Hackaday

Echo and reverb are now electronic audio effects done in a computer or an integrated circuit, but originally they were achieved through mechanical means. Reverb units used springs, and echo units used loops of magnetic tape. As a musician hankering after a mechanical tape echo unit, [Adam Paul] was left with no choice but to build his own. We featured an early prototype, but now hes back with a finished version thats intended to be replicated by other musicians.

The unit takes a cassette mechanism from one of the last still-manufactured players available through the usual sources. It splits record and play heads, with the normal cassette replaced with a tape loop made from extra-thick computer tape. A custom PCB replaces most of the electronics, and the auto-reverse system is disabled.

The result is a functional tape echo system, as can be seen in the video below the break. This is ready to build yourself, with everything on a GitHub repository and an extremely comprehensive build guide, so do any of you fancy a go?

Read about the devices earlier incarnation here.

...

19:14

Bad Onboarding Can Lead to High Quit Rates for New Workers SoylentNews

A large percentage of employees are dissatisfied with their experience of joining a company:

New employees who start a job feeling undertrained and disconnected from their work environment are far more likely to quit than those who have a good onboarding experience.

With the unemployment rate lower than it has been in decades  even more so in technology fields job candidates more often than not field multiple offers. So, if the onramp to a new job is bumpy, they're far more likely to reconsider staying with the organization, even in the short term.

According to research firm Gartner, 63% of new hires are satisfied with their onboarding experience. A recent survey by payroll and human resources provider Paychex showed onboarding experience affected how quickly they would quit after taking a position.

The survey of about 1,000 Americans by Paychex, released last month, found half (50%) of newly hired employeesplan to quit soon.

[...] Among the percentage of remote workers who said they're likely to leave their current job soon, 88% described their latest onboarding experience as boring, 78% called it confusing, and 74% saw it as a failure. On-site and hybrid employees fare better; only 36% of them viewed the onboarding process as confusing.

Remote workers are most likely to feel disoriented (60%) and devalued (52%) after onboarding, the survey found.

[...] Without a streamlined and supportive process, employees can be left frustrated, she said, which can muddle a new hire's first experience in a new position and affect their morale.

[...] "You need a two-way connection where they're not only learning about the company, but the company [is] learning about the employee and tailoring the onboarding experience to them. In that, they're also learning what the new hire brings to the table," Kohn said. "It works a lot better when a new hire comes in and sees a manager and a team already recognizes [that the new hire] brings strengths to the table."


Original Submission

Read more of this story at SoylentNews.

19:00

Johnny Depp & Marilyn Manson Sing for Satan Terra Forming Terra






Just how does a human mind accept the tenants and ideas of satanism at all?  Yet her5e we are with in your face behavior that can not be put aside.

I regret that years ago a niece claimed that her husband was deep into all this and I dismissed it all.  I simply could not accept any of it.  Otherwise she was a good rational person who really needed a break and she was as smart as can be.

Yet it is now a thing and objectively provable.  Understandable once you grasp the pathology of pedophilia.  Understand something else, homosexuality and transgenderism and other odd tastes are describable as sexual pathologies.  Sorry about all that, but the good news is that society is able to accomadate most of these pathology in someone else.

This can never happen with pedophilia because it drives the only natural conspiracy whose objectives are obvious and dangerous and stupid.  In practice, we need to band the works and there will be plenty and they do find each other. 

I now suspect that it may well be one in a thousand which produces a crowd, most contained at least.


Johnny Depp & Marilyn Manson Sing for Satan

By Mike King

"You say God and I say Satan!"

https://www.realhistorychan.com/say10.html

How many times have we heard Fake News dismissively mock the "conspiracy theory" about elite Satanists and sex rings? The deceptive tactic never varies. They will openly state the seemingly unbelievable truth -- thus allowing it to knock itself down as ridiculous. Here's a typical example -- of 100s -- from a N...

Historic Treaty Protects Marine Life in the High Seas Terra Forming Terra






Well it is a start. I certainly do not expect state players living by the rules of mercantalism to do more than play games.

however the first step is the establishment of a framework,  That allows a third party  to intervene and and enforce things.  Sooner or later it  is sorted out,.

So whatever original intent is, the land or ocean becomes settled.


Historic Treaty Protects Marine Life in the High Seas

The United Nations agreement will help conserve 30 percent of the planets oceans by 2030



Daily CorrespondentMarch 8, 2023 11:12 a.m.

https://www.smithsonianmag.com/smart-news/historic-treaty-protects-marine-life-in-the-high-seas-180981760/?

Conference president Rena Lee of Singapore announces an agreement was reached on Saturday. Ministry of Foreign Affairs, Singapore


Nearly 200 nations have agreed to a legally binding high seas treaty that will help the United Nations reach its pledge of protecting 30 percent of the planets oceans by 2030. After two decades of preliminary discussion, two weeks of negotiations at U.N. headquarters and a nearly 40-hour final session, the countries finally reached a deal on Saturday.

Now, the treaty can establish marine protected areas in international waters, which would regulate fishing, shipping and deep sea mining.

Report an ad

It is indeed a historical milestone, and its certainly good news f...

The Link Between Nightshades, Chronic Pain and Inflammation Terra Forming Terra






I do not think that potatoes are a problem here because we consume the starch.  Not so easy with tomatos.  Again though we are eating the fruit which may be much different.  That is the likely problem.

The rest are uncommonly consumed.  So just how sensitive are you?

If there is a likely problem, then doing the challenge is very appropriate.  Doing a challenge on sugar is a total eyeopener when you discover it is the go to solution for just about any processed food.  Obviously tomato also buries a lot of off flavors as well.

Go for it


The Link Between Nightshades, Chronic Pain and Inflammation
Posted on: 

Wednesday, March 8th 2023 at 9:00 am

Written By: Elisha McFarland

https://greenmedinfo.com/blog/link-between-nightshades-chronic-pain-and-inflammation

Few people are familiar with the term nightshades, and many will be surprised to learn that consuming foods from this plant group may be contributing to their pain and inflammation

Nightshades belong to the Solanaceae family which includes over 2,000 species. They also include some of the most popular foods consumed today; such as tomatoes, potatoes, all types of peppers, and eggplant. Although not truly nightshades, blueberries, huckleberries, goji berries and ashwaganda all share the same alkaloids which may have inflammation-inducing properties.

The Solanaceae family contains cholinesterase inhibiting glycoalkaloids and steroid alkaloids includi...

Archaeologists Find Evidence of Earliest Known Horseback Riders Terra Forming Terra



It took no time at all for native americans to master the horse after contact and to also become wonderfully ptoficient as well.  In the old world though two steps had to take place.  Firstly, they did have to be domesticated and this took generations of breeding.  Then they had to become big enough.

Up to that point they pulled wagons and fast chariots.  all of which is useful even militarily.  At some point, some became ridable.  You can almost see this shift in the record.

Then when they became ridable, we needed competant horse soldiers.  Again, no easy task as this also led directly to superior equipment.  This was a longish evolution and even the last of the military horsemen were far from ideal.  It was almost always an auxilluary arm unless the mass foot was run down.


Archaeologists Find Evidence of Earliest Known Horseback Riders

New research indicates that humans were riding horses as early as 5,000 years ago



Julia BinswangerMarch 7, 2023 12:06 p.m.

Studying skeletal remains, researchers identified six criteria that could indicate whether someone rode horses. Christian Heinrich via Getty Images



Who were the earliest humans to look at horses and consider trying to ride them?

Archaeologists are now one step closer to answering that question. A new analysis of 5,000-year-old human skeletal remains has revealed the earliest known direct evidence of horseback riding.

...

18:46

Sophos improves cyberthreat defenses with endpoint security advancements Help Net Security

Sophos introduced innovative advancements to its portfolio of endpoint security offerings. New adaptive active adversary protection; Linux malware protection enhancements; account health check capabilities; an integrated zero trust network access (ZTNA) agent for Windows and macOS devices; and more improve frontline defenses against advanced cyberthreats and streamline endpoint security management. Ransomware remains one of the most prevalent and damaging cyberthreats to organizations, with Sophos incident responders still consistently remediating ransomware activity worldwide. Now isnt the More

The post Sophos improves cyberthreat defenses with endpoint security advancements appeared first on Help Net Security.

18:43

North Korean UNC2970 Hackers Expands Operations with New Malware Families The Hacker News

A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of a spear-phishing campaign targeting U.S. and European media and technology organizations since June 2022. Google-owned Mandiant said the threat cluster shares "multiple overlaps" with a long-running operation dubbed "Dream Job" that employs job recruitment lures in

18:28

March 2023 Patch Tuesday forecast: Its not about luck Help Net Security

Every month I touch on a few hot topics related to security around patching and some important updates to look out for on the upcoming Patch Tuesday. Diligence to this ongoing patch process, and not luck, is critical to protecting systems and avoiding a security breach. Patching priority Ransomware continues to be a major threat, and a recent report provides some interesting supporting statistics. There was a 19% year-over-year increase in 2022 in the number More

The post March 2023 Patch Tuesday forecast: Its not about luck appeared first on Help Net Security.

18:25

New Superconducting Material Could Transform Electronics If It Works Lifeboat News: The Blog

Superconductivity is an incredible property of certain materials with exciting consequences. Once reached, for example, said materials can conduct electricity without resistance, so no loss of energy. But most materials are superconductive at extremely low temperatures. The quest for a room-temperature superconductor is ongoing, and is not without a bit of scientific drama.

A few years ago, there was a claim of a room-temperature superconductor that became supercritical at a temperature of 15C (59F), but required a pressure of 2.5 million atmospheres. Thats on the order of the pressure you might find in the core of a rocky planet, and can be achieved by squeezing materials between two diamonds. Other scientists raised issues with the way the numbers were handled, including an accusation of the data used being fabricated.

The paper was retracted by the journal Nature last September, and the team claims they are ready to resubmit that work. They have also announced a brand-new material with even more extraordinary properties (if confirmed). The new substance is described as a nitrogen-doped lutetium hydride that becomes superconductive up to 20.5C (69F) and at a much lower pressure, roughly 10,000 atmospheres. Quite the improvement.

18:24

First nasal monoclonal antibody treatment for COVID-19 shows promise for treating virus, other diseases Lifeboat News: The Blog

A pilot trial by investigators from Brigham and Womens Hospital, a founding member of the Mass General Brigham health care system, tested the nasal administration of the drug Foralumab, an anti-CD3 monoclonal antibody. Investigators found evidence that the drug dampened the inflammatory T cell response and decreased lung inflammation in patients with COVID-19. Further analysis showed the same gene expression modulation in patients with multiple sclerosis, who experienced decreased brain inflammation, suggesting that Foralumab could be used to treat other diseases. Their results are published in the Proceedings of the National Academy of Sciences.

We discovered a way to shut down inflammation not only seen in COVID-19, but also in a patient with multiple sclerosis as well as in healthy patients, said lead author Thais Moreira, Ph.D., an assistant scientist at the Ann Romney Center for Neurologic Diseases at BWH and an instructor in Neurology at Harvard Medical School. This is very exciting because not only does our study suggest that this new monoclonal antibody drug is safe and can modulate the without major side effects, but it can also decrease inflammation in multiple realms, so it may be useful for treating other diseases.

Inflammation is a major cause of many diseases, said senior author Howard Weiner, MD, founder and director of the Brigham Multiple Sclerosis Center and co-director of the Ann Romney Center for Neurologic Diseases. Our center has spent decades looking for novel ways to treat disease where there is abnormal inflammation in a way that is safe and effective.

18:24

How immune cells detect and respond to mutations in cancer cells Lifeboat News: The Blog

For the first time, a research team has identified and analyzed the steps by which immune cells see and respond to cancer cells, providing insights into reasons some treatments may be effective for certain patients but not others.

The UCLA Jonsson Comprehensive Cancer Center scientists leading the research believe their findings will lead to better, more personalized immunotherapieseven for patients whose immune systems currently do not appear to respond to treatment.

This is an important step forward in our understanding of what the T-cell responses see in the tumor and how they change over time while they are in the tumor and in circulation in the blood, searching for new tumor cells to attack, said Cristina Puig-Saus, Ph.D., a UCLA Jonsson Comprehensive Cancer Center researcher, adjunct assistant professor of medicine at UCLA, and the first author of a study in Nature.

18:15

BMW exposes data of clients in Italy, experts warn Security Affairs

Cybernews researchers discovered that BMW exposed sensitive files that were generated by a framework that BMW Italy relies on.

Original post at: https://cybernews.com/security/bmw-exposes-italy-clients/

Hackers have been enjoying their fair share of the spotlight by breaching car manufacturers defenses. The latest Cybernews discovery showcases that popular car brands sometimes leave their doors open, as if inviting threat actors to feast on their client data.

  • BMW exposed sensitive files to the public
  • Attackers could exploit the data to steal the websites source code and potentially access customer info
  • BMW secured the data that wasnt meant to be public in the first place
  • BMW clients should remain vigilant, as home addresses, vehicle location data, and many other kinds of sensitive personal information are collected by the manufacturer

BMW, a German multinational manufacturer of luxury vehicles delivering around 2.5 million vehicles a year, potentially exposed its business secrets and client data.

If a malicious hacker were to discover the flaw, they could exploit it to access customer data, steal the companys source code, and look for other vulnerabilities to exploit.

The discovery

In February, Cybernews researchers stumbled upon an unprotected environment (.env) and .git configuration files hosted on the official BMW Italy website. Environment files (.env), meant to be stored locally, included data on production and development environments.

Researchers noted that while this information is not enough for threat actors to compromise the website, they could be used for reconnaissance covertly discovering and collecting information about a system. Data could lead to the website being compromised or point attackers towards customer information storage and the means to access it.

The .git configuration file, exposed to the public, would have allowed threat actors to find other exploitable vulnerabilities, since it contained the .git repository for the sites source code.

The discovery illustrates that even well-known and trusted brands can have severely insecure configurations, allowing attackers to breach their systems in order to steal customer information or move laterally through the network. Customer information from such sources is especially valuable for cybercriminals, given that customers of luxury car brands often have more savings that could potentially be stolen, the Cybernews research team said.

Sensitive files were generated by a framework that BMW Italy relies on Laravel, a free open-source PHP framework designed for the...

17:00

Videos Teach Bare Metal RP2040 Hackaday

When we write about retrocomputers, we realize that back in the day, people knew all the details of their computer. You had to, really, if you wanted to get anything done. These days, we more often pick peripherals and just assume our C or other high level code will fit and run on the CPU.

But sometimes you need to get down to the bare metal and if your desire is to use bare metal on the RP2040, [Will Thomas] has a YouTube channel to help you. The first video explains why you might want to do this followed by some simple examples. Then youll find over a dozen other videos that give you details.

Any video that starts, Alright, Monday night. I have no friends. It is officially bare metal hours, deserves your viewing. Of course, you have to start with the traditional blinking LED. But subsequent videos talk about the second core, GPIO, clocks, SRAM, spinlocks, the UART, and plenty more.

As you might expect, the code is all in assembly. But even if you want to program using C without the SDK, the examples will be invaluable. We like assembly it is like working an intricate puzzle and getting anything to work is satisfying. We get it. But commercially, it rarely makes sense to use assembly anymore. On the other hand, when you need it, you really need it. Besides, we all do things for fun that dont make sense commercially.

We like assembly,...

16:45

Veeam Backup & Replication admins, get patching! (CVE-2023-27532) Help Net Security

Veeam Software has patched CVE-2023-27532, a high-severity security hole in its widely-used Veeam Backup & Replication solution, and is urging customer to implement the fix as soon as possible. About CVE-2023-27532 The nature of CVE-2023-27532 has not been explained Veeam only says that the vulnerable process, Veeam.Backup.Service.exe (TCP 9401 by default), allows an unauthenticated user to request encrypted credentials. Obtaining encrypted credentials might ultimately allow attackers to gain access to the backup infrastructure hosts, More

The post Veeam Backup & Replication admins, get patching! (CVE-2023-27532) appeared first on Help Net Security.

16:30

New infosec products of the week: March 10, 2023 Help Net Security

Heres a look at the most interesting products from the past week, featuring releases from 1Password, GrammaTech, Kensington, Palo Alto Networks, and Persona. New Kensington privacy screens protect against visual hacking The SA270 Privacy Screen for Studio Display (K50740WW), SA240 Privacy Screen for iMac 24 (K55170WW), and MagPro Elite Magnetic Privacy Screen for MacBook Air 2022 (K58374WW), expand Kensingtons extensive portfolio of privacy screens that enable businesses to reduce the potential loss of confidential and More

The post New infosec products of the week: March 10, 2023 appeared first on Help Net Security.

16:29

On Shaky Ground: Why Dependencies Will be Your Downfall SoylentNews

There's never enough time or staff to scan code repositories:

Software dependencies, or a piece of software that an application requires to function, are notoriously difficult to manage and constitute a major software supply chain risk. If you're not aware of what's in your software supply chain, an upstream vulnerability in one of your dependencies can be fatal.

A simple React-based Web application can have upward of 1,700 transitive NodeJS "npm" dependencies, and after a few months "npm audit" will reveal that a relatively large number of those dependencies have security vulnerabilities. The case is similar for Python, Rust, and every other programming language with a package manager.

I like to think of dependencies as decaying fruit in the unrefrigerated section of the code grocer, especially npm packages, which are often written by unpaid developers who have little motivation to put in more than the bare minimum of effort. They're often written for personal use and they're open sourced by chance, not by choice. They're not written to last.

[...] Not all hope is lost. For known (reported and accepted) vulnerabilities, tools exist, such as pip-audit, which scans a developer's Python working environment for vulnerabilities. Npm-audit does the same for nodeJS packages. Similar tools exist for every major programming language and, in fact, Google recently released OSV-Scanner, which attempts to be a Swiss Army knife for software dependency vulnerabilities. Whether developers are encouraged (or forced) to run these audits regularly is beyond the scope of this analysis, as is whether they actually take action to remediate these known vulnerabilities.

However, luckily for all of us, automated CI/CD tools like Dependabot exist to make these fixes as painless as possible. These tools will continually scan your code repositories for out-of-date packages and automatically submit a pull request (PR) to fix them. Searching for "dependabot[bot]" or "renovate[bot]" on GitHub and filtering to active PRs yields millions of results! However, 3 million dependency fixes versus hundreds of millions of active PRs at any given time is an impossible quantification to attempt to make outside of an in-depth analysis.

Read more of this story at SoylentNews.

16:04

Despite the Paid-for (Very Fake) Hype for Microsoft Chatbots, Bing Falls to Lowest Share in Years Techrights

There are also Bing layoffs, but many publishers are being paid to turn a blind eye, focus on vapourware instead

Noam Chomsky: The False Promise of ChatGPT

The most prominent strain of A.I. encodes a flawed conception of language and knowledge, famed linguist Noam Chomsky writes this week

As per this months figures (as CSV/ODF), Google rose to new highs and Bing fell to 2.7% its lowest levels since 2021:

Almost 94% for Google (Bing in a freefall, along with its proxies, e.g. DDG)

Summary: The bribed media (paid by Microsoft to relay/produce puff pieces) has predicted doom for Googles search, but what were seeing is exactly the opposite; people need Web pages, not chatbots

16:00

Synthetic identity fraud calls for a new approach to identity verification Help Net Security

In 2022, US financial institutions and the credit card sector lost an estimated $4.88 billion to synthetic identities through falsified deposit accounts and unsecured credit cards. Thats because legacy fraud prevention procedures often come up short in the effort to defend against this growing threat. As a result, increasingly sophisticated crime rings are using these techniques to not only target financial institutions, but also government agencies and enterprises as diverse as telecom firms, online gaming More

The post Synthetic identity fraud calls for a new approach to identity verification appeared first on Help Net Security.

15:30

The cybersecurity landscape in the era of economic instability Help Net Security

Economic uncertainty is squeezing organizations globally. Gartner predicts nearly half of cybersecurity leaders will change jobs by 2025. These findings are alarming but undoubtedly unsurprising in todays IT landscape. In this Help Net Security video, Denis Dorval, VP of International at JumpCloud, discusses how the responsibility of cybersecurity can no longer be placed on the shoulders of IT admins alone. Experts have long been advising that cybersecurity must be an organization-wide priority built into the More

The post The cybersecurity landscape in the era of economic instability appeared first on Help Net Security.

15:00

Young government workers show poor password management habits Help Net Security

Hybrid work has exposed another area of vulnerability, with 70% of government workers reporting they work virtually at least some of the time, according to Ivanti. The proliferation of devices, users, and locations adds complexity and new vulnerabilities for government security teams to tackle while also combatting increasingly sophisticated threat actors. With generative AI making phishing emails increasingly more realistic, the human-sized gaps in cybersecurity are placing government agencies and organizations at increasing risk More

The post Young government workers show poor password management habits appeared first on Help Net Security.

14:00

Physics-Controlled Component Auto-Placer Hackaday

[Jarrett] recently stumbled upon a class of drawing algorithms called force-directed graphs, which artificially apply forces to the elements. The final graph is then generated by applying the laws of physics and letting the system reach equilibrium. This can often result in a pleasing presentation of things like mind maps and other diagrams without having to hand-place everything. He realized that this approach almost mimics the way he places components when doing a PCB layout. Out of curiosity or intense boredom, were not sure which, he decided to implement this in a tool that interacts with KiCad ( see animated GIF below the break ).

He has to ignore certain nets such as power and ground rails, because they distort the result. This simulation treats the nets as springs, and the center of each footprint behaves a charged particle. [Jarrett] added a twist, literally, to the usual implementations each net pulls on its pin, not the part center, and therefore the chips will both rotate and be pushed around as the system stab...

14:00

1Password Unlock with SSO helps enterprises secure their employees Help Net Security

1Password has launched Unlock with Single Sign-On (SSO) which enables enterprise customers to use Okta for unlocking their 1Password accounts, with Azure AD and Duo integration to follow in the coming months. Unlock with SSO helps IT teams improve their security posture while reducing daily login hassles and stress for employees. Securing employees at scale is no small task. At 1Password, we believe that the foundation of enterprise security is secure employees, and were driven More

The post 1Password Unlock with SSO helps enterprises secure their employees appeared first on Help Net Security.

13:48

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw SoylentNews

BlackLotus represents a major milestone in the continuing evolution of UEFI bootkits:

Researchers on Wednesday announced a major cybersecurity findthe world's first-known instance of real-world malware that can hijack a computer's boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.

Dubbed BlackLotus, the malware is what's known as a UEFI bootkit. These sophisticated pieces of malware hijack the UEFI short for Unified Extensible Firmware Interfacethe low-level and complex chain of firmware responsible for booting up virtually every modern computer. As the mechanism that bridges a PC's device firmware with its operating system, the UEFI is an OS in its own right. It's located in an SPI-connected flash storage chip soldered onto the computer motherboard, making it difficult to inspect or patch.

[...] The second thing standing in the way of UEFI attacks is UEFI Secure Boot, an industry-wide standard that uses cryptographic signatures to ensure that each piece of software used during startup is trusted by a computer's manufacturer. Secure Boot is designed to create a chain of trust that will prevent attackers from replacing the intended bootup firmware with malicious firmware. If a single firmware link in that chain isn't recognized, Secure Boot will prevent the device from starting.

While researchers have found Secure Boot vulnerabilities in the past, there has been no indication that threat actors have ever been able to bypass the protection in the 12 years it has been in existence. Until now.

[...] To defeat Secure Boot, the bootkit exploits CVE-2022-21894, a vulnerability in all supported versions of Windows that Microsoft patched in January 2022. The logic flaw, referred to as Baton Drop by the researcher who discovered it, can be exploited to remove Secure Boot functions from the boot sequence during startup. Attackers can also abuse the flaw to obtain keys for BitLocker, a Windows feature for encrypting hard drives.

Previously:

13:38

Links 09/03/2023: Mesa 22.3.7, Samba 4.18.0, Peek Discontinued Techrights

  • GNU/Linux

    • Graphics Stack

      • Free Desktop mesa 22.3.7
        Hello everyone,
        
        The bugfix release 22.3.7 is now available.
        
        This is the last release of the 22.3 series. Users are encouraged to
        switch to the 23.0 series to continue receiving bugfixes.
        
        Cheers,
          Eric
        
    • Applications

    ...

12:07

11:04

Researchers Getting Better at Reading Minds SoylentNews

https://www.science.org/content/article/ai-re-creates-what-people-see-reading-their-brain-scans

As neuroscientists struggle to demystify how the human brain converts what our eyes see into mental images, artificial intelligence (AI) has been getting better at mimicking that feat. A recent study, scheduled to be presented at an upcoming computer vision conference, demonstrates that AI can read brain scans and re-create largely realistic versions of images a person has seen. As this technology develops, researchers say, it could have numerous applications, from exploring how various animal species perceive the world to perhaps one day recording human dreams and aiding communication in people with paralysis.

Many labs have used AI to read brain scans and re-create images a subject has recently seen, such as human faces and photos of landscapes. The new study marks the first time an AI algorithm called Stable Diffusion, developed by a German group and publicly released in 2022, has been used to do this. Stable Diffusion is similar to other text-to-image "generative" AIs such as DALL-E 2 and Midjourney, which produce new images from text prompts after being trained on billions of images associated with text descriptions.

For the new study, a group in Japan added additional training to the standard Stable Diffusion system, linking additional text descriptions about thousands of photos to brain patterns elicited when those photos were observed by participants in brain scan studies.

[...] Finally, the researchers tested their system on additional brain scans from the same participants when they viewed a separate set of photos, including a toy bear, airplane, clock, and train. By comparing the brain patterns from those images with those produced by the photos in the training data set, the AI system was able to produce convincing imitations of the novel photos. (The team posted a preprint of its work in December 2022.)

"The accuracy of this new method is impressive," says Iris Groen, a neuroscientist at the University of Amsterdam who was not involved with the work.

I'm wondering how this sort of ability will effect copyright, in the long term, when it becomes possible to extract high-enough fidelity copies of media from people's brains, which they have observed before and remember. If someone views an image, listens to a song, or watches a movie, and then downloads a copy from their brain to share, is that copyright infringement? Is the copy in their head infringement? Will the law determine a percentage fidelity limit?


Original Submission...

11:00

Power Tool Battery Fume Extractor Hackaday

A solder fume extractor is something we could probably all use. While there isnt much to them, [Steven Bennett] put a lot of thought into making one that was better for him, and we admired his design process, as well as the extractor fan itself. You can see the finished result in the video below.

The electrical design, of course, is trivial. A computer fan, a switch, and a battery in this case, a Makita power tool battery. But the Fusion 360 design for the 3D printed parts got a lot of thought to make this one of the best fume extractor fans weve seen.

There are a lot of details that go into making something like this look professional. For example, the plastic used matches the Makita color scheme, and the nameplate matches the Makita logo. Knowing how to interface with the battery opens up a lot of portable projects. For example, we use a similar battery to power our portable soldering irons.

This is one of those projects where you can easily get carried away. But [Stevens] design is simple yet functional. Sometimes it seems like the overriding design factor is color matching.

...

11:00

HPR3810: Clifton, Arizona Hacker Public Radio

We have left the Tucson area and moved up into the mountains to Clifton, Arizona, a mining town. Arizona is a major source of Copper for the U.S., and Clifton has one of the larger open pit mines in the world, and the largest in the U.S. Links: https://flic.kr/s/aHBqjzKQCb https://flic.kr/s/aHBqjzKSz8 https://flic.kr/s/aHBqjzKTKL https://flic.kr/s/aHBqjzKUba https://flic.kr/s/aHBqjzKSqt https://flic.kr/s/aHBqjzKUkN https://flic.kr/s/aHBqjzKU3S https://flic.kr/s/aHBqjzKXtk https://flic.kr/s/aHBqjzKXk8 https://flic.kr/s/aHBqjzKYXo https://flic.kr/s/aHBqjzKZr5 https://www.palain.com/travel/clifton-arizona/

Reducing Withdrawal and Failure Rates with Labeled Subgoals It Will Never Work in Theory

Being a good programmer doesn't automatically make you good at teaching other people to program. In fact, the unconscious competence that allows you to focus on the problem rather than stumbling over syntax issues or fumbling to create functions make actually make you worse as a teacher, since you will skip or combine steps that novices still need to do slowly and one at a time.

Research has proven that labeling subgoalsi.e., breaking a solution technique down into small steps and giving those steps nameshelps learners master material more quickly. This study looked more closely at the benefits of labeled subgoals for introductory programming courses. The authors found that it helped on quizzes given within a week of new material being presented, but didn't make a difference to overall results on final exams done later. However, students who had been given labeled subgoals performed more consistently on exams; perhaps more importantly, they were also less likely to drop or fail the course. While studies like this one may not get the same attention as Silicon Valley hype about AI disrupting education, their findings are much more likely to actually help the next generation of programmers learn their craft.

Lauren E. Margulieux, Briana B. Morrison, and Adrienne Decker. Reducing withdrawal and failure rates in introductory programming with subgoal labeled worked examples. International Journal of STEM Education, May 2020. doi:10.1186/s40594-020-00222-7.

Background: Programming a computer is an increasingly valuable skill, but dropout and failure rates in introductory programming courses are regularly as high as 50%. Like many fields, programming requires students to learn complex problem-solving procedures from instructors who tend to have tacit knowledge about low-level procedures that they have automatized. The subgoal learning framework has been used in programming and other fields to break down procedural problem solving into smaller pieces that novices can grasp more easily, but it has only been used in short-term interventions. In this study, the subgoal learning framework was implemented throughout a semester-long introductory programming course to explore its longitudinal effects. Of 265 students in multiple sections of the course, half received subgoal-oriented instruction while the other half received typical instruction.

Results: Learning subgoals consistently improved performance on quizzes, which were formative and given within a week of learning a new procedure, but not on exams, which were summative. While exam performance was not statistically better, the subgoal group had lower variance in exam scores and fewer students dropped or failed the course than in the control group....

Reducing Withdrawal and Failure Rates with Labeled Subgoals It Will Never Work in Theory

Being a good programmer doesn't automatically make you good at teaching other people to program. In fact, the unconscious competence that allows you to focus on the problem rather than stumbling over syntax issues or fumbling to create functions may actually make you worse as a teacher, since you will skip or combine steps that novices still need to do slowly and one at a time.

Research has proven that labeling subgoalsi.e., breaking a solution technique down into small steps and giving those steps nameshelps learners master material more quickly. This study looked more closely at the benefits of labeled subgoals for introductory programming courses. The authors found that it helped on quizzes given within a week of new material being presented, but didn't make a difference to overall results on final exams done later. However, students who had been given labeled subgoals performed more consistently on exams; perhaps more importantly, they were also less likely to drop or fail the course. While studies like this one may not get the same attention as Silicon Valley hype about AI disrupting education, their findings are much more likely to actually help the next generation of programmers learn their craft.

Lauren E. Margulieux, Briana B. Morrison, and Adrienne Decker. Reducing withdrawal and failure rates in introductory programming with subgoal labeled worked examples. International Journal of STEM Education, May 2020. doi:10.1186/s40594-020-00222-7.

Background: Programming a computer is an increasingly valuable skill, but dropout and failure rates in introductory programming courses are regularly as high as 50%. Like many fields, programming requires students to learn complex problem-solving procedures from instructors who tend to have tacit knowledge about low-level procedures that they have automatized. The subgoal learning framework has been used in programming and other fields to break down procedural problem solving into smaller pieces that novices can grasp more easily, but it has only been used in short-term interventions. In this study, the subgoal learning framework was implemented throughout a semester-long introductory programming course to explore its longitudinal effects. Of 265 students in multiple sections of the course, half received subgoal-oriented instruction while the other half received typical instruction.

Results: Learning subgoals consistently improved performance on quizzes, which were formative and given within a week of learning a new procedure, but not on exams, which were summative. While exam performance was not statistically better, the subgoal group had lower variance in exam scores and fewer students dropped or failed the course than in the control group....

10:07

Akamai mitigated a record-breaking DDoS attack that peaked 900Gbps Security Affairs

Akamai has mitigated the largest DDoS (distributed denial of service) attack ever, which peaked at 900.1 gigabits per second.

Akamai reported that on February 23, 2023, at 10:22 UTC, it mitigated the largest DDoS attack ever. The attack traffic peaked at 900.1 gigabits per second and 158.2 million packets per second. The record-breaking DDoS was launched against a Prolexic customer in Asia-Pacific (APAC).

On February 23, 2023, at 10:22 UTC, Akamai mitigated the largest DDoS attack ever launched against a Prolexic customer based in Asia-Pacific (APAC), with attack traffic peaking at 900.1 gigabits per second and 158.2 million packets per second. reads the post published by Akamai.

DDoS

The company pointed out that the attack was intense and short-lived, with most attack traffic bursting during the peak minute of the attack. The overall attack lasted only a few minutes.

Akamai mitigated the attack by redirecting the malicious traffic through its scrubbing network.

Most of the malicious traffic (48%) was managed by scrubbing centers in the APAC region, but the company claims that all its 26 centers were loaded, with only one center in HKG handling 14,6% of the total traffic.

Akamai states that there was no collateral damage thanks to its defense.

The previous record-breaking distributed denial of service attack mitigated by Akamai hit a company customer in Europe on September 2022. At the time, the malicious traffic peaked at 704.8 Mpps and appeared to originate from the same threat actor behind another record-breaking attack that Akamai blocked in July and that hit the same customer.

In January, Microsoft...

09:44

09:36

Vulnerability Revealed OpenSea NFT Market Users Identities HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

It was a cross-site search (XS-Search) vulnerability that could be exploited by an attacker to obtain a user's identity.

This is a post from HackRead.com Read the original post: Vulnerability Revealed OpenSea NFT Market Users Identities

08:56

Top 100 Global Innovators 2023 IEEE Spectrum



How we will live in the 2030s is being defined now. Our health, our prosperity and our very world are built on the ideas created today. At Clarivate, our focus is to pore over what humanity knows today and put forward the insight that explores all possible horizons horizons that enable transition and transformation.

For 12 years, Clarivate has identified the companies and institutions whose research and innovation do not just sit on the edge of possibility but define it. Today, we recognize the Top 100 Global Innovators 2023, companies who chose to lead and create their own horizons.

Download the report to see who made the list and more, including:

  • The evolving trends and predicted firsts in this years analysis
  • Which regions show more, fewer, or first-time entrants to the list
  • The interplay between scientific research and invention and new this year, the 50 research institutions whose papers are most cited by the Top 100

08:18

DHS Has a Program Gathering Domestic Intelligence SoylentNews

Seems the DHS has a secret program to spy on American citizens

For years, the Department of Homeland Security has run a virtually unknown program gathering domestic intelligence, one of many revelations in a wide-ranging tranche of internal documents reviewed by POLITICO.

Those documents also reveal that a significant number of employees in DHS's intelligence office have raised concerns that the work they are doing could be illegal.

Under the domestic-intelligence program, officials are allowed to seek interviews with just about anyone in the United States. That includes people held in immigrant detention centers, local jails, and federal prison. DHS's intelligence professionals have to say they're conducting intelligence interviews, and they have to tell the people they seek to interview that their participation is voluntary. But the fact that they're allowed to go directly to incarcerated people circumventing their lawyers raises important civil liberties concerns, according to legal experts.

That specific element of the program, which has been in place for years, was paused last year because of internal concerns. DHS's Office of Intelligence and Analysis, which runs the program, uses it to gather information about threats to the U.S., including transnational drug trafficking and organized crime. But the fact that this low-profile office is collecting intelligence by questioning people in the U.S. is virtually unknown.

IMHO, when your own employees are afraid they're breaking the law by doing their jobs; and those same people fear punishment if they speak up, says a lot about the ethics of this bullshit.


Original Submission

Read more of this story at SoylentNews.

08:00

A Guided Tour of the NES Hackaday

No matter your age or background, theres an excellent chance youll recognize the Nintendo Entertainment System (NES) at first glance. The iconic 8-bit system not only revitalized the gaming industry, but helped to establish the blueprint of console gaming for decades to come. Its a machine so legendary and transformative that even today, it enjoys a considerable following. Some appreciate the more austere approach to gaming from a bygone era, while others are fascinated with the functional aspects of console.

The NesHacker YouTube channel is an excellent example of that latter group. Host [Ryan] explores the ins and outs of the NES as a platform, with a leaning towards the software techniques used to push the systems 6502 processor to the limits. Even if you arent terribly interested in gaming, the videos on assembly programming and optimization are well worth a watch for anyone writing code for vintage hardware.

...

08:00

The Technical Workloads Where AMD Ryzen 9 7900X3D/7950X3D CPUs Are Excellent Phoronix

While the AMD Ryzen 9 7900X3D and Ryzen 9 7950X3D are promoted as great "gaming processors", these new Zen 4 desktop CPUs with 3D V-Cache also have great capabilities for various technical computing workloads thanks to the hefty cache size. In prior articles I've looked at the Ryzen 9 7900X3D/7950X3D in around 400 workloads on Linux while in this article I am looking more closely at these technical computing areas where these AMD Zen 4 3D V-Cache processors show the most strength and value outside of gaming.

07:22

ACE & New Anti-Piracy Coalition Target South Korean Video Piracy Globally TorrentFreak

noonoo-logoMillions of subscribers to Western streaming services will testify to the South Korean content explosion of recent years.

The Korean Wave cultural phenomenon, boosted by movies and TV shows such as Squid Game, Train to Busan, and Parasite, is something to behold.

From the successes of BTS and Psys Gangnam Style to the magnificent Oldboy released two decades ago, South Korean entertainment quite rightfully receives worldwide appreciation. If everyone actually paid for these pleasures, that would be the icing on the cake for South Korea.

Oppa Anti-Pirate Style

In a combined effort to crack down on piracy of local content, major South Korean broadcasters, including KBS, MBC and JTBC, the Korea Film and Video Copyright Association (film producers and distributors), plus streaming platforms TVING and Wavve, have announced the formation of a new, piracy-fighting coalition.

The Video Copyright Protection Council ( ) will receive support from the South Korean governments Copyright Commission as it works to curtail both local and overseas pirates. An interesting factor here is that the project involves the Alliance for Creativity and Entertainment, the worlds largest anti-piracy coalition.

First Official Target Revealed

The new coalition is expected to file a criminal complaint in South Korea today targeting pirate streaming giant Noonoo TV. While unfamiliar to many in the West, the site offers movies and TV shows to an audience of tens of millions, making it one of the more obvious choices for enforcement action.

noonoo-tv

The anti-piracy coalition blames Noonoo TV for falling subscriber numbers on legal streaming services. According to various reports, in February Noonoo TVs operator claimed that the platforms video content had accumulated more than 1.5 billion views, a figure that would outstrip traffic to legal alternatives.

Alleged Damages: 5,000,000,000,000 South Korean Won

Five trillion won at todays rates equates to roughly $3.78 billion...

07:00

Hackers leak DC Health Link data with Congress Members details HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

The data contains personal and medical details of several members of the U.S. Congress, which are now circulating on Russian hacker forums as well as on Telegram groups.

This is a post from HackRead.com Read the original post: Hackers leak DC Health Link data with Congress Members details

06:30

Hangover 0.8.3 Released For Enjoying Windows x86/x86_64 Apps/Games On Linux ARM64 Phoronix

open-source project started by several Wine developers to ease the pathway for running Windows x86/x86_64 games and applications on Linux under AArch64 (64-bit Arm) as well as other possible architectures like POWER9 and RISC-V...

06:30

Measuring a Millisecond Mechanically Hackaday

If you are manufacturing something, you have to test it. It wouldnt do, for example, for your car to say it was going 60 MPH when it was really going 90 MPH. But if you were making a classic Leica camera back in the early 20th century, how do you measure a shutter that operates at 1/1000 of a second a millisecond without modern electronics? The answer is a special stroboscope that would look at home in any cyberpunk novel. [SmarterEveryDay] visited a camera restoration operation in Finland, and you can see the machine in action in the video below.

The machine has a wheel that rotates at a fixed speed. By imaging a pattern through the camera, you can determine the shutter speed. The video shows a high-speed video of the shutter operation which is worth watching, and it also explains exactly how the rotating disk combined with the rotating shutter allows the measurement.

The marks on the spinning drum move at a precise speed adjusted by a stroboscope. The rolling shutter on the camera shows each horizontal bar as a diagonal line and the exact pattern will show the precise speed. The lines are a bit curved due to the characteristic of the shutter spring.

Honestly, this is one of those things that is probably of zero practical value today. But we never fail to marvel at the ingenuity of engineers who didnt have access to modern technology....

06:20

SonicWall SMA appliance infected by a custom malware allegedly developed by Chinese hackers Security Affairs

Alleged China-linked threat actors infected unpatched SonicWall Secure Mobile Access (SMA) appliances with a custom backdoor.

Mandiant researchers reported that alleged China-linked threat actors, tracked as UNC4540, deployed custom malware on a SonicWall SMA appliance. The malware allows attackers to steal user credentials, achieve persistence through firmware upgrades, and provides shell access.

The analysis of a compromised device revealed the presence of a set of files used by the attacker to gain highly privileged and available access to the appliance. The malicious code is composed of a series of bash scripts and a single ELF binary identified as a TinyShell variant.

The researchers believe that the threat actors have a deep understanding of the appliance.

The malware is well tailored to the system to provide stability and maintain persistence, even in the case of installation of firmware upgrades.

The primary purpose of the malware appears to be to steal hashed credentials from all logged in users. It does this in firewalld by routinely executing the SQL command select userName,password from Sessions against sqlite3 database /tmp/temp.db and copying them out to the attacker created text file /tmp/syslog.db. reads the report published by Mandiant. The source database /tmp/temp.db is used by the appliance to track session information, including hashed credentials. Once retrieved by the attacker the hashes could be cracked offline.

At this time it is unclear how the attackers gained initial access to the unpatched SonicWall Secure Mobile Access (SMA) appliance. Mandiant experts believe the threat actors may have exploited a known vulnerability that the targeted appliance.

Mandiant believes that the malware, or a predecessor of it, was likely first installed in 2021 giving attackers persistent access.

Developing malware for a managed appliance is very complex and request a deep knowledge of the target. Mandiant pointed out that vendors typically do not enable direct access to the Operating System or filesystem for users, instead offering administrators a graphical UI or limited Command Line Interface (CLI) with guardrails preventing anyone from accidentally breaking the system. The lack of access, makes it very hard to develop such kind of custom malware.

First and foremost, maintaining proper patch management is essential for mitigating the risk of vulnerability exploitation. At the time of publishing this blog post, SonicWall urges SMA100 customers to upgrade to 10.2.1.7 or higher, which includes hardening enhancements such as File Integrity Monitoring (FIM) and anomalous process identification. concludes the report. A SonicWall blog post describin...

05:52

Whos Behind the NetWire Remote Access Trojan? Krebs on Security

A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords. The arrest coincided with a seizure of the NetWire sales website by the U.S. Federal Bureau of Investigation (FBI). While the defendant in this case hasnt yet been named publicly, the NetWire website has been leaking information about the likely true identity and location of its owner for the past 11 years.

Typically installed by booby-trapped Microsoft Office documents and distributed via email, NetWire is a multi-platform threat that is capable of targeting not only Microsoft Windows machines but also Android, Linux and Mac systems.

NetWires reliability and relatively low cost ($80-$140 depending on features) has made it an extremely popular RAT on the cybercrime forums for years, and NetWire infections consistently rank among the top 10 most active RATs in use.

NetWire has been sold openly on the same website since 2012: worldwiredlabs[.]com. That website now features a seizure notice from the U.S. Department of Justice (DOJ), which says the domain was taken as part of a coordinated law enforcement action taken against the NetWire Remote Access Trojan.

As part of this weeks law enforcement action, authorities in Croatia on Tuesday arrested a Croatian national who allegedly was the administrator of the website, reads a statement by the DOJ today. This defendant will be prosecuted by Croatian authorities. Additionally, law enforcement in Switzerland on Tuesday seized the computer server hosting the NetWire RAT infrastructure.

Neither the DOJs statement nor...

05:35

Hubble In Trouble As Satellite Trails Start Affecting It Too SoylentNews

Hubble In Trouble As Satellite Trails Start Affecting It Too

The idea that we can save astronomy from satellite interference by putting telescopes in space has run into an obstacle, or more precisely 8,500.

A study of images taken by the Hubble Space Telescope finds that more than one in 40 are crossed by satellite trails. In some cases these interfere with the science, wasting the exceptionally valuable time spent taking the image. Although the affected proportion is small, it's growing, refuting the claim we can solve the problems satellites are causing for astronomers by putting the large telescopes in space.

Spotting a satellite was once rare enough to be an exciting addition to a night under the stars away from the city lights. Today, it's become an annoying impediment to enjoying the beauty of everything else. It's not only wrong to wish on space hardware, if you start you'll never do anything else.

For astronomers the problem is not just a loss of beauty. It's becoming increasingly common for satellite trails to destroy images, often ruining time precious time a scientist had to fight hard to get and holding up important research. Although this issue is getting considerable attention, a new paper in Nature Astronomy addresses an aspect that has been largely ignored.

Elon Musk, among others, has responded to concerns about satellites' effect on astronomy by saying, "We need to move telescopes to orbit anyway", but that's not necessarily a complete solution.

The Hubble Space Telescope orbits at 540 kilometers (340 miles), which is above the majority of objects humanity has put in orbit, but there are 8,460 objects more than 10 centimeters (4 inches) across above it. A team led by Dr Sandor Kruk of the Max Planck Institute for Extraterrestrial Physics recruited citizen scientists through the Hubble Asteroid Hunter project, to study Hubble's archive from 2002 to 2021 and distinguish satellite trails from asteroids.

Journal Reference:
Kruk, Sandor, Garca-Martn, Pablo, Popescu, Marcel, et al. The impact of satellite trails on Hubble Space Telescope observations [open], Nature Astronomy (DOI: 10.1038/s41550-023-01903-3)

Original Submission

Read more of this story at SoylentNews.

05:22

TSA tells US aviation industry to boost its cybersecurity Graham Cluley

The US Transportation and Security Administration (TSA) has issued new requirements for airport and aircraft operators who, they say, are facing a "persistent cybersecurity threat." Read more in my article on the Tripwire State of Security blog.

05:01

How to run containers on Mac with Podman Linux.com

Go beyond the basics, learn what happens under the hood when running Podman on your Mac, and create a flexible container environment that meets your needs.

Read More at Enable Sysadmin

The post How to run containers on Mac with Podman appeared first on Linux.com.

04:55

04:02

Americas Secret Censorship-Industrial Complex cryptogon.com

1. TWITTER FILES: Statement to CongressTHE CENSORSHIP-INDUSTRIAL COMPLEX pic.twitter.com/JLryjnINXS Matt Taibbi (@mtaibbi) March 9, 2023 Via: Michael Shellenberger: Our findings are shocking. A highly-organized network of U.S. government agencies and government contractors has been creating blacklists and pressuring social media companies to censor Americans, often without them knowing it. These organizations and others []

02:51

Plastic is Moving Quickly From Our Shops to Our Bins SoylentNews

Coastal city residents would like to do more to reduce their single-use plastic waste and they are trying to recycle more:

Coastal city residents would like to do more to reduce their single-use plastic waste and they are trying to recycle more, even trying to recycle items that simply can't be recycled, often called "wish-cycling".

But they feel unable to do so due to the current infrastructure challenges and accessibility barriers they face, a new report has found.

The study has also found that whilst young people are concerned about the use of plastic, their consumer behaviour often contradicts their beliefs.

[...] 90 per cent of people agreed it was important to recycle and 83 per cent felt that littering was a serious problem that needed addressing in Portsmouth. Results indicate that if there were more recycling options available, 79 per cent would recycle more.

However, there were obvious barriers to recycling, and people felt there was a lack of information and opportunity for recycling, with 65 per cent of people admitting they often did not know how or where to recycle plastic items.

[...] Another important finding was the impact of age on the results. The 3150 years age group were found to be more regularly shopping in Portsmouth zero-waste shops than their counterparts, while the oldest age group (over 50 years) reported being less aware and less willing to shop in these retailers. Younger respondents (less than 30 years) were more concerned about plastic waste entering the ocean than their older counterparts (over 50 years).

Read more of this story at SoylentNews.

02:34

[$] An EEVDF CPU scheduler for Linux LWN.net

The kernel's completely fair scheduler (CFS) has the job of managing the allocation of CPU time for most of the processes running on most Linux systems. CFS was merged for the 2.6.23 release in 2007 and has, with numerous ongoing tweaks, handled the job reasonably well ever since. CFS is not perfect, though, and there are some situations it does not handle as well as it should. The EEVDF scheduler, posted by Peter Zijlstra, offers the possibility of improving on CFS while reducing its dependence on often-fragile heuristics.

02:13

When You Report a Crime to the Police (and Youre Not Very Rich and/or Famous) schestowitz.com

Video download link | md5sum 8f727fe7c8e05b24b7df5efabd365817
The Police Ping-Pong
Creative Commons Attribution-No Derivative Works 4.0

I recently became aware that money had been stolen from me. It was confirmed to me some days ago. I decided to report this to the authorities; failing to do so may result in any remaining money vanishing from the thieves account. The video above does not go into the details of the case (like this series about Sirius Open Source); instead it explains how the police handles the report.

Sadly, even in 2023 the police is looking for low-grade thugs and people it can apprehend in the streets, not business people that it can arrest at their office. The police believes and trusts money. Culture is very much the same. I saw X on TV, X is not in prison, hence X is probably innocent is false logic when it comes to high-profile people, who rarely get arrested because they simply own the system and have expensive lawyers.

Cops are good at arresting poor people, whom they deem rather defenseless and easier to convict. But this leads to a sense of helplessness for victims of crime where the perpetrator is rich and powerful. Sometimes the cops are almost making them feel guilty for reporting white-collar crime because this wastes time; its not a simple physical job like arresting a person after forcibly knocking that person to the ground, based on nothing at all; I saw that done by a cop from my window just months ago attacking an innocent bystander and then arresting him for apparently nothing. I wish I had this recorded. I wanted to report this (yes, reporting cops misbehaviour to the police itself), but I could not find suitable contacts.

My deep cynicism about cops isnt new and it was the result of experiences that I covered here before. It ranges from tactless to truly irresponsible. For instance, their f...

02:11

Recently discovered IceFire Ransomware now also targets Linux systems Security Affairs

The recently discovered Windows ransomware IceFire now also targets Linux enterprise networks in multiple sectors.

SentinelLabs researchers discovered new Linux versions of the recently discovered IceFire ransomware that was employed in attacks against several media and entertainment organizations worldwide. The ransomware initially targeted only Windows-based systems, with a focus on technology companies.

IceFire was first detected in March 2022 by researchers from the MalwareHunterTeam, but the group claimed victims via its dark web leak site since August 2022.

The experts observed threat actors exploiting a deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS score: 9.8) to deploy the ransomware.

Most of IceFire infections were reported in Turkey, Iran, Pakistan, and the United Arab Emirates. Experts pointed out that these contries are typically not a focus for organized ransomware operations.

SentinelOne researchers successfully tested the IceFire Linux is 2.18 MB in size, while the 64-bit ELF binary is compiled with gcc for the AMD64 architecture.

In an attack observed by the experts, the ransomware successfully encrypted a CentOS host running a

The ransomware encrypts files and appends the .ifire extension to the filename, then deletes itself by removing the binary.

IceFire doesnt encrypt the files with .sh and .cfg extensions, it also avoids encrypting certain folders so that the infected machine continues to be usable.

Dur...

01:54

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware The Hacker News

Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the PlugX malware. AhnLab Security Emergency Response Center (ASEC), in a new analysis, said it marks the continued abuse of the flaws to deliver a variety of payloads on compromised systems. This includes the Sliver post-exploitation framework, XMRig cryptocurrency

Thursday, 09 March

19:00

Propmaking: Lego handlink replica Antarctica Starts Here.

Warning: I'm going to be geeking about about science fiction to provide context for the rest of the post. Either skip to the bottom and page up a few times or close the tab. Also, the narrative is going to wander around a bit because there's a fair amount of setup.

Note: There are a couple of affiliate links.

As my handle implies I'm a sucker for time travel stories. I love the idea of seeing history as it happens and not just reading about it. I'm not that inclined to talk about fandom, so I tend to not bring it up much. Which is probably why I've never mentioned that I've been a fan of the series Quantum Leap since I was a kid. I credit this series with my fascination and study of history, as I've ranted about occasionally. I also credit Quantum Leap with my interest in building prop replicas. While most of the series tried to fit the period (costumes, props, backgrounds, music (before the DVD releases, anyway 1)) we occasionally got brief, tantalizing glimpses of what things looked like in Sam's time. But I'll come back to that in a moment.

Last year a continuation of the original show was announced and I approached it with some skepticism, like many fans of the original Quantum Leap. Folks have their opinions, and they are welcome to and allowed to have them, and that's okay. I quite like the new series.

The original series used a fairly standard (for a 45 minute show) five act structure where almost always the whole story was told in the past. Very rarely did we as viewers get to glimpse what was going on in Sam's home time (in the charmingly futuristic year of 1999) but when we did it was depicted with an aesthetic that looked absolutely around the bend to us in the real-life late 1980's. Donald P. Bellisario deliberately scripted things so that they would look nothing like anything that existed in real life, having as few identifiable details as possible. This aesthetic is best described as randomly stuck together colored blocks with the occasional blinking light that is referred to as "a rotten pile of Gummi bears." 2 Bellasario has said in interviews that this is because fen are wont to ask questions like "So, what does this random thing do in the story?" and the answers were always "The set designers put it there to look cool, please stop analyzing every last detail and just enjoy the show."

Case in point, Al Calavicci's handlink, a hand-held minicomputer-slash-communications device used to inter...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog