IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Saturday, 15 April

02:45

Watch "Mind-Blowing Facts About Our Reality [4K] | The Secrets of Quantum Physics | Spark" by our Jim Al-Khalili. Lifeboat News

Watch "Mind-Blowing Facts About Our Reality [4K] | The Secrets of Quantum Physics | Spark" by our Jim Al-Khalili.

02:19

[$] TOTP authentication with free software LWN.net

One-time passwords (OTPs) are increasingly used as a defense against phishing and other password-stealing attacks, usually as a part of a two-factor authentication process. Perhaps the mostly commonly used technique is sending a numeric code to a phone via SMS, but SMS OTPs have security problems of their own. An alternative is to use time-based one-time passwords (TOTPs). The normal TOTP situation is to have all of the data locked into a proprietary phone app, but it need not be that way.

02:00

Hackaday Podcast 214: Jet Engine Hair Dryer, Comic Sans Type Balls, and Belief in Graphene Hackaday

This week, Editor-in-Chief Elliot Williams and Contributor Emeritus Kristina Panos gushed about all the best hacks of the previous week. But first, a contest! Thats right hot on the heels of the Low Power Challenge comes the Op Amp Challenge, sponsored by Digi-Key. You have between now and June 6th to dip your toes into the warm waters of analog and show us what youve got. Will it be a musical hack? Will you seek high analog precision? We cant wait to see.

Kristina definitely did not get Whats That Sound this week, which honestly reminded her of a cartoon character getting a piano dropped on them, except the sounds were in reverse order. Then its on to the hacks, beginning with a way to make an IBM Selectric typewriter use Comic Sans, a project thats sure to make you a believer in graphene, and a miniature MNT for every (cargo) pocket.

From there we take a look at a really cool indicator from a 1960s RAF aeroplane and investigate why your multimeter might be lying to you. Finally, we discuss the gargantuan task of building an AR system to rival Google Glass, and the merits of taking a lot of pictures as you go about your hacks.

Check out the links below if you want to follow along, and as always,...

01:59

NOW: Pensions Has NOTHING to Say About Lying to Clients schestowitz.com

No Pension from Macron

Summary: The previous crimes of Sirius Open Source merit letters of assurance, which were already promised by three people at NOW: Pensions (including a manager); if no such letter can be provided, specify the reasons and explain why three people who work at NOW: Pensions made promises to two people (in vain, followed by more lies to cover up the original lies)

MANY people are speaking about pensions today. France is checking whether Macron did something unconstitutional by sentencing millions of people to two additional years of work in their 60s (not something they consented to in the past). However, the timing of this post is purely coincidental. Its a Friday and Ive not heard back for almost a week now from NOW: Pensions.

As a reminder, the company kept making contradictory promises (i.e. lies) or breaking promises, not honouring their own contracts, etc.

Heres the full chain of correspondence with few redactions (names of their workers, including managers):

> Roy Schestowitz wrote on 08/04/2023 04:32:
>> Complaints now pensions support wrote on 05/04/2023 15:03:
>>> I hope this helps to settle your concerns regarding your NOW Pension
>>> fund, as you can see from the above, they have outlined how and who
>>> is responsible for protecting your pension savings and applies to all
>>> NOW Pensions members.
>>
>> Hi,
>>
>> Please send the full letter, as promised, to
>> 1) my wife
>> 2) myself
>>
>> as promised by ????
>> as promised by ????
>> as promised by ?????
>>
>> several times since February. We need this obligation in writing.
>
> I need an update on this. There are multiple complainants about the
> pension fraud. We need action, not stalling tactics. You behave like
> lawyers, not like a pension provider.
If you do not reply by the end of today (Friday), prepare the cheque for my wife and I to pick up next week at your office.

We are withdrawing all the money. You are a reckless, lying, untrustworthy company. You not only lied to me (3 different people, including managers) you also failed to reply to very simple E-mails about a dozen times.

Meanwhile the police and Action Fraud will be getting involved.

Well, its 5PM now on a Frid...

01:52

Pension Schemes Versus Pension Scams: The Curious Cases of the UKs Large Pension Providers (Not France) Techrights

No Pension from Macron

Summary: The previous crimes of Sirius Open Source merit letters of assurance, which were already promised by three people at NOW: Pensions (including a manager); if no such letter can be provided, specify the reasons and explain why three people who work at NOW: Pensions made promises to two people (in vain, followed by more lies to cover up the original lies)

MANY people are speaking about pensions today. France is checking whether Macron did something unconstitutional by sentencing millions of people to two additional years of work in their 60s (not something they consented to in the past). However, the timing of this post is purely coincidental. Its a Friday and Ive not heard back for almost a week now from NOW: Pensions.

As a reminder, the company kept making contradictory promises (i.e. lies) or breaking promises, not honouring their own contracts, etc.

Heres the full chain of correspondence with few redactions (names of their workers, including managers):

> Roy Schestowitz wrote on 08/04/2023 04:32:
>> Complaints now pensions support wrote on 05/04/2023 15:03:
>>> I hope this helps to settle your concerns regarding your NOW Pension
>>> fund, as you can see from the above, they have outlined how and who
>>> is responsible for protecting your pension savings and applies to all
>>> NOW Pensions members.
>>
>> Hi,
>>
>> Please send the full letter, as promised, to
>> 1) my wife
>> 2) myself
>>
>> as promised by
>> as promised by
>> as promised by
>>
>> several times since February. We need this obligation in writing.
>
> I need an update on this. There are multiple complainants about the
> pension fraud. We need action, not stalling tactics. You behave like
> lawyers, not like a pension provider.
If you do not reply by the end of today (Friday), prepare the cheque for my wife and I to pick up next week at your office.

We are withdrawing all the money. You are a reckless, lying, untrustworthy company. You not only lied to me (3 different people, including managers) you also failed to reply to very simple E-mails about a dozen times.

Meanwhile the police and Action Fraud will be getting involved.

Well, it&...

01:32

94% of The Universes Galaxies Are Permanently Beyond Our Reach Lifeboat News: The Blog

Today, most of the universes galaxies are already receding faster than the speed of light.

01:32

Will Quantum Computers Make Time Travel Possible? | Unveiled Lifeboat News: The Blog

Is time travel FINALLY possible?? Join us and find out!

Subscribe: https://wmojo.com/unveiled-subscribe.

In this video, Unveiled takes a closer look at 3 groundbreaking experiments in time travel and quantum computing! On an international scale, science is starting show how moving forward and back in time really COULD be possible all it will take is a little manipulation at the atomic and subatomic levels!

This is Unveiled, giving you incredible answers to extraordinary questions!

Find more amazing videos for your curiosity here:
6 Scientific Breakthroughs Predicted During Your Lifetime https://youtu.be/wGKj-3AfxdE
Are We the Creation of a Type V Civilization? https://youtu.be/T_u4lGDs3dM

0:00 Intro.
0:50 Is Time Travel Possible?
1:49 Quantum Time Travel Potential.
3:56 Experiment to Reverse Time.
6:30 Los Alamos Quantum Simulator / Butterfly Effect.
7:39 Time Crystals and Photons.
9:47 Conclusions.

01:31

CRISPR Breakthrough: Scientists Can Now Turn Genes On and Off at Whim Lifeboat News: The Blog

The gene-editing system CRISPR-Cas9 which has revolutionized genetic engineering over the past decade involves cutting DNA strands which is a process that can be quite hard to control and can result in unwanted genetic changes. Now, thanks to researchers at the Massachusetts Institute of Technology and the University of California, San Francisco (UCSF), a new gene-editing technology called CRISPRoff can change that, according to a press release.

Fast forward four years [from the initial grant], and CRISPRoff finally works as envisioned in a science fiction way, says co-senior author Luke Gilbert. Its exciting to see it work so well in practice.

01:30

An Early Look At Linux 6.4 Features: AMD CDX, AMD GAM, Intel LAM, Apple M2 & More Phoronix

There is two weeks to go until the Linux 6.3 stable kernel is released, which could drag out to three weeks if last minute issues come about in the kernel. But given all the material queuing via the many "-next" code branches, we already have a good idea for many of the features in store for Linux 6.4...

01:30

Low-Cost Display Saved By RP2040 Hackaday

Anyone looking for components for electronics projects, especially robotics, microcontrollers, and IoT devices, has likely heard of Waveshare. They are additionally well-known suppliers of low-cost displays with a wide range of resolutions, sizes, and capabilities, but as [Dmitry Grinberg] found, theyre not all winners. He thought the price on this 2.8-inch display might outweigh its poor design and lack of documentation, and documented his process of bringing it up to a much higher standard with a custom driver for it.

The display is a 320240 full-color LCD which also has a touchscreen function, but out-of-the-box only provides documentation for sending data to it manually. This makes it slow and, as [Dmitry] puts it, pure insanity. His ultimate solution after much poking and prodding was to bit-bang an SPI bus using GPIO on an RP2040 but even this wasnt as straightforward as it should have been because there are a bunch of other peripherals, like an SD card, which share the bus. Additionally, an interrupt is needed to handle the touchscreen since its default touch system is borderline useless as well, but after everything was neatly stitched together he has a much faster and more versatile driver for this display and is able to fully take advantage of its low price.

For anyo...

01:29

Network Neuroscience Theory Lifeboat News: The Blog

It was therefore shortly after the discovery of g that Spearmans contemporary, Godfrey Thomson, proposed that the general factor represents a global network phenomenon 11, 12, 13. Thomson held that g emerges from the interaction among the many elements of the brain, which he referred to as neural arcs or bonds 14, 15. According to Thomsons Sampling Theory of Mental Ability, each item on an achievement test samples a number of these bonds 11, 12, 13. He proposed that the degree of overlap among bonds accounted for the correlation between tests and the resulting positive manifold. Thus, Thomsons theory was the first to show that Spearmans discovery of the general factor of intelligence is consistent with a network perspective.

Thomsons legacy can be found in modern psychological theories which posit that g originates from the mutual interactions among cognitive processes [16]. Individual differences in g are known to be influenced, for example, by language abilities 10, 17, which facilitate a wealth of cognitive, social, and affective processes through mutual interactions (i.e., reciprocal causation) [18]. The central idea of the Mutualism Model is that change or growth in one aspect of mental ability is (i) partially autonomous (owing to developmental maturation), and is also (ii) based on growth in oth...

01:29

QuASeR: Quantum Accelerated de novo DNA sequence reconstruction Lifeboat News: The Blog

In this, we present QuASeR, a reference-free DNA sequence reconstruction implementation via de novo assembly on both gate-based and quantum annealing platforms. This is the first time this important application in bioinformatics is modeled using quantum computation. Each one of the four steps of the implementation (TSP, QUBO, Hamiltonians and QAOA) is explained with a proof-of-concept example to target both the genomics research community and quantum application developers in a self-contained manner. The implementation and results on executing the algorithm from a set of DNA reads to a reconstructed sequence, on a gate-based quantum simulator, the D-Wave quantum annealing simulator and hardware are detailed. We also highlight the limitations of current classical simulation and available quantum hardware systems. The implementation is open-source and can be found on https://github.com/QE-Lab/QuASeR.

Citation: Sarkar A, Al-Ars Z, Bertels K (2021) QuASeR: Quantum Accelerated de novo DNA sequence reconstruction. PLoS ONE 16: e0249850. https://doi.org/10.1371/journal.pone.

Editor: Archana Kamal, University of Massachusetts Lowell, UNITED STATES.

01:22

Scientists identify new benchmark for freezing point of water at 70 C Lifeboat News: The Blog

Scientists have discovered yet another amazing aspect of the weird and wonderful behavior of waterthis time when subjected to nanoscale confinement at sub-zero temperatures.

The finding that a crystalline substance can readily give up water at temperatures as low as 70 C, published in the journal Nature on April 12, has major implications for the development of materials designed to extract water from the atmosphere.

A team of supramolecular chemists at Stellenbosch University (SU), consisting of Dr. Alan Eaby, Prof. Catharine Esterhuysen and Prof. Len Barbour, made this discovery while trying to understand the peculiar behavior of a type of crystal that first piqued their interest about ten years ago.

01:22

The Meminductor: A New Circuit Element Lifeboat News: The Blog

Researchers at Texas A&M University have discovered a novel circuit element referred to as a meminductor that led to a significant breakthrough in circuit elements.

In an electrical circuit, circuit elements play a crucial role in managing the flow of electricity. The resistor, capacitor, and inductor are the traditional circuit elements, while the memristor and memcapacitor are the more recent additions discovered in the past 15 years. These newer components, known as mem- versions of the classical elements, have different voltage and current characteristics that are influenced by previous voltage or current values over time, giving them memory-like properties.

Dr. H. Rusty Harris, an Associate Professor at the Department of Electrical and Computer Engineering at Texas A&M University, has made a significant breakthrough in circuit elements with the discovery of a new component called the meminductor.

01:17

As Tax Day approaches, Microsoft warns accounting firms of targeted attacks Graham Cluley

Accountants are being warned to be on their guard from hackers, as cybercriminals exploit the rush to prepare tax returns for clients before the deadline of US Tax Day. Read more in my article on the Tripwire State of Security blog.

01:16

After the Accountant of Sirius Open Source Left Many Workers Were Secretly Robbed for Many Years schestowitz.com

Mark Anthony Taylor/Michael Jackson smooth criminal lean: Smooth criminal

Summary: The crimes of Sirius Open Source, or the company robbing me and my colleagues behind our backs, started the fraud weeks or months after the companys accountant had suddenly left (though maybe it predates this); instead a bunch of fraudsters took over, engaging in embezzlement that wasnt confirmed to us until this year (and only after long and persistent pursuits, as Standard Life was stalling and stonewalling for 3 months)

MY articles from December already quite extensively covered the dodgy accounting at Sirius. Ive heard references to such conduct (sophisticated or smooth criminals), coming from people who were long involved in the company. This is a company that pretends its address is in fact the address of an accountant or accounting firm. The CEO who fled the company (scene of the crime) last month had done the same with his own company. These arent people of integrity, theyre immoral imposters who barely ever use Free software (they (mis)use the brand Open Source mostly for marketing and recruitment).

As noted here back in December, the company had been violating the law for years by not sending payslips, rarely sending them, or only sending some after a lot of nagging/reminders.

Who was doing the accounting anyway? One theory is that the company was passing the data to some external (the above-mentioned) people to sign off, without actually auditing or verifying anything. That might explain them failing to check that for many employees the money wasnt at all being sent to pensions as specified in over 60 payslips (per employee). Serious failure! This went on for over half a decade. This was definitely not an accident, hence the scare quotes around the word failure.

In the E-mails below (redacted for privacy) one can see the allusion to the manager explaining the accounting, rather than actual accountants doing the accounting, dealing with accounts. The messages were sent to and by a notoriously reckless, lazy employee (with almost zero technical skills) who forgot to arrange for coverage (colleagues were left alone at night!). Many such blunders happened without her facing consequences. There were good reasons for this person being strongly loathed among many staff. Theres the lying about looking for cover, th...

01:11

[Meme] The Smooth Criminals Techrights

Sirius and Standard Life to Programmer/SysAdmin: Um... watcha got there? A smoothie

Summary: Standard Life does not seem to care that in its own name, piggybacking its reputation, fraud was being committed against a lot of people, notably GNU/Linux specialists and programmers in the UK

00:58

Accounting at Sirius Open Source Was Always Extremely Dodgy Techrights

Mark Anthony Taylor/Michael Jackson smooth criminal lean: Smooth criminal

Summary: The crimes of Sirius Open Source, or the company robbing me and my colleagues behind our backs, started the fraud weeks or months after the companys accountant had suddenly left (though maybe it predates this); instead a bunch of fraudsters took over, engaging in embezzlement that wasnt confirmed to us until this year (and only after long and persistent pursuits, as Standard Life was stalling and stonewalling for 3 months)

MY articles from December already quite extensively covered the dodgy accounting at Sirius. Ive heard references to such conduct (sophisticated or smooth criminals), coming from people who were long involved in the company. This is a company that pretends its address is in fact the address of an accountant or accounting firm. The CEO who fled the company (scene of the crime) last month had done the same with his own company. These arent people of integrity, theyre immoral imposters who barely ever use Free software (they (mis)use the brand Open Source mostly for marketing and recruitment).

These arent people of integrity, theyre immoral imposters who barely ever use Free software (they (mis)use the brand Open Source mostly for marketing and recruitment).As noted here back in December, the company had been violating the law for years by not sending payslips, rarely sending them, or only sending some after a lot of nagging/reminders.

Who was doing the accounting anyway? One theory is that the company was passing the data to some external (the above-mentioned) people to sign off, without actually auditing or verifying anything. That might explain them failing to check that for many employees the money wasnt at all being sent to pensions as specified in over 60 payslips (per employee). Serious failure! This went on for over half...

00:58

Nayib Bukele, President of El Salvador, on Tucker Carlson cryptogon.com

Highly recommended. Interview with @TuckerCarlson pic.twitter.com/wZ1SWK85QH Nayib Bukele (@nayibbukele) March 5, 2023 Research Credit: NH

00:51

Kodi discloses data breach after its forum was compromised Security Affairs

Open-source media player software provider Kodi discloses a data breach after threat actors stole its MyBB forum database.

Kodi has disclosed a data breach, threat actors have stolen the companys MyBB forum database that contained data for over 400K users and private messages.

The threat actors also attempted to sell the stolen data on the BreachForums cybercrime forum that was recently shut down by law enforcement.

In the last 24 hours we became aware of a dump of the Kodi user forum (MyBB) software being advertised for sale on internet forums. This post confirms that a breach has taken place. reads the advisory published by Kodi. MyBB admin logs show the account of a trusted but currently inactive member of the forum admin team was used to access the web-based MyBB admin console twice: on 16 February and again on 21 February. The account was used to create database backups which were then downloaded and deleted. It also downloaded existing nightly full-backups of the database. The account owner has confirmed they did not access the admin console to perform these actions.

Kodi

The admin team locked out the intruders by disabling the account used in the data breach and conducted an initial review of part of the infrastructure that was accessed by the attackers

The threat actors then abused the account to create database backups that were then downloaded and deleted.

The threat actor was able to access the nightly backups containing all public forum posts, team forum posts, messages sent through the user-to-user messaging system, and user information such as forum username, email address used for notifications, and an encrypted (hashed and salted) password generated by the MyBB software.

The company pointed out that although MyBB stores passwords in an encrypted format they assumed all passwords are compromised. However, the company added that it has no evidence threat actors obtained unauthorized access to the...

00:42

French Court Smacks Remote Learning Software Company for Pervasive Surveillance of Students SoylentNews

French Court Smacks Remote Learning Software Company For Pervasive Surveillance Of Students In Their Own Homes:

A worldwide pandemic trapped students in their own homes to stop the spread of the coronavirus. They didn't ask for this. Neither did educators. But educators made the worst of it in far too many cases.

Aptitude tests and other essentials for continued funding (and bragging rights) were now out of their control. Any student sitting at home had access to a wealth of knowledge to buttress what they may have actually retained from remote instruction.

Leveling the playing field was the goal. In practice, that meant turning the most sacrosanct of private places students' homes and bedrooms into heavily surveilled spaces... all in the interest of preventing cheating.

Laptop cameras monitored rooms and students' movements during testing. Internet connections often contributed more to passing grades than students' knowledge as educators (and their preferred tech partners) viewed inconsistent or dropped connections as indicators of attempted cheating. Malware deliberately installed by schools monitored internet usage before, during, and after tests.

A bedroom is not a classroom, even if that's where the educating is taking place temporarily due to pandemic restrictions. But that's how it was perceived and a bunch of opportunistic spyware purveyors rushed to fill the perceived "fairness" void with surveillance software that even the most inveterate stalker might consider too invasive.

Proctorio was on the forefront of this education-adjacent bedroom surveillance. It was particularly enthusiastic about stripping students of their privacy. When it was criticized for going too far, it went further, issuing legal threats and...

00:31

HIP 99770 b: Astrometry Bags a Directly Imaged Planet Centauri Dreams Imagining and Planning Interstellar Exploration

HIP 99770 b: Astrometry Bags a Directly Imaged Planet

It took a combination of astrometry and direct imaging to nail down exoplanet HIP 99770 b in Cygnus, and thats a tale that transcends the addition of a new gas giant to our planetary catalogs. Astrometry measures the exact position and motion of stars on the sky, so that we are able to see the influence of an as yet unseen planet. In this work, astrometrical data from both the ESA Gaia mission and the earlier Hipparcos mission flag a world that is directly imaged by the Subaru Telescope extreme adaptive optics system, which enabled its near-infrared CHARIS spectrograph to see the target.

Supporting work at the Keck Observatory using its Near-Infrared Camera and Keck II adaptive optics system allowed in combination with the CHARIS spectrum the discovery of the presence of water and carbon monoxide in the atmosphere, while the temperature was shown to be about ten times hotter than that of Jupiter. The joint measurements revealed a planet some 14-16 times the mass of Jupiter, in a 16.9 AU orbit around a star with twice the Suns mass and 13.9 times its luminosity.

Thayne Currie (Subaru Telescope) is lead author of the study:

Performing both direct imaging and astrometry allows us to gain a full understanding of an exoplanet for the first time: measure its atmosphere, weigh it, and track its orbit all at once. This new approach for finding planets prefigures the way we will someday identify and characterize an Earth-twin around a nearby star.

Image: Infrared image of HIP 99770 taken by the Subaru Telescope. The bright host star at the position marked with * is masked. The dashed ellipse shows the size of Jupiters orbit around the Sun for scale. The arrow points to the discovered extrasolar planet HIP 99770 b. Credit: T. Currie/Subaru Telescope, UTSA.

Weve retrieved direct images of gas giants before, including massive planets around HR8799, the first such worlds detected with the method, relying on advances in adaptive optics systems for ground-based telescopes. But without astrometrical data, astronomers selected targets based on properties like age and distance, producing a small harvest of exoplanets. In this work,...

00:09

Security updates for Friday LWN.net

Security updates have been issued by Debian (haproxy and openvswitch), Fedora (bzip3, libyang, mingw-glib2, thunderbird, xorg-x11-server, and xorg-x11-server-Xwayland), and Ubuntu (apport, ghostscript, linux-bluefield, node-thenify, and python-flask-cors).

00:00

This Week in Security: QueueJumper, JS VM2 Escape, and CAN Hacking Hackaday

You may not be familiar with the Microsoft Message Queuing (MSMQ) service, a store and forward sort of inter-process and inter-system communication service. MSMQ has become something of a legacy product, but is still available as an optional component in Windows. And in addition to other enterprise software solutions, Microsoft Exchange turns the service on by default. Thats why its a bit spooky that theres a one packet Remote Code Execution (RCE) vulnerability that was just patched in the service.

CVE-2023-21554, also known as QueueJumper, is this unauthenticated RCE with a CVSS score of 9.8. It requires sending a packet to the service on TCP port 1801. The Check Point Research team scanned for listening MSMQ endpoints on the public Internet, and found approximately 360,000 of them. And no doubt far more are listening on internal networks. A one packet exploit is a prime example of a wormable problem, and now that the story has broken, and the patch is available, expect a rapid reverse engineering. Beware, the queue jumpers are coming.

JavaScript VM Escape

The VM2 library is a rather important JavaScript package that sandboxes code, letting a project run untrusted code securely. Or, thats the idea. CVE-2023-...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 14 April

23:01

How to get started with Ansible Private Automation Hub Linux.com

Learn how to use Red Hat Ansible Automation Private Automation Hub.

Read More at Enable Sysadmin

The post How to get started with Ansible Private Automation Hub appeared first on Linux.com.

23:00

Mesa OpenGL Threading Now Disabled For Small Hybrid CPUs Phoronix

Landing today in Mesa 23.2-devel is support for big.LITTLE CPU detection or more broadly hybrid CPU core detection where little cores (e.g. E cores) are defined as having less than 50% the capacity of the largest CPU core on the system. This is done since Mesa's OpenGL threading is now being disabled for small hybrid processors...

22:57

Russia-Linked Hackers Launches Espionage Attacks on Foreign Diplomatic Entities The Hacker News

The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign ministries and diplomatic entities located in NATO member states, the European Union, and Africa. According to Poland's Military Counterintelligence Service and the CERT Polska team, the observed activity shares tactical overlaps with a cluster tracked by Microsoft as

22:35

WhatsApp announces features to prevent account takeover Help Net Security

WhatsApp will be rolling out three new security features in the coming months, to provide users with increased privacy and control over their messages and to help prevent unauthorized account access and takeover. The new features The first feature is called Account Protect and will help prevent unauthorized transfers of accounts from one device to another. This feature will require users to verify on their old device any attempts to switch to a new device. More

The post WhatsApp announces features to prevent account takeover appeared first on Help Net Security.

22:00

OpenCL Shared Virtual Memory Comes To Mesa's Rusticl Driver Phoronix

Mesa 23.1 enables RadeonSI Rusticl support while for next quarter's Mesa 23.2, which just started development, there is already a big ticket item for Rusticl: Shared Virtual Memory (SVM) support...

21:54

Meet PassGAN, the Supposedly Terrifying AI Password Cracker That's Mostly Hype SoylentNews

As the title suggests, they weren't all that impressed.

From the article:

As with so many things involving AI, the claims are served with a generous portion of smoke and mirrors. PassGAN, as the tool is dubbed, performs no better than more conventional cracking methods. In short, anything PassGAN can do, these more tried and true tools do as well or better. And like so many of the non-AI password checkers Ars has criticized in the paste.g., here, here, and herethe researchers behind PassGAN draw password advice from their experiment that undermines real security.

PassGAN is a shortened combination of the words "Password" and "generative adversarial networks." PassGAN is an approach that debuted in 2017. It uses machine learning algorithms running on a neural network in place of conventional methods devised by humans. These GANs generate password guesses after autonomously learning the distribution of passwords by processing the spoils of previous real-world breaches. These guesses are used in offline attacks made possible when a database of password hashes leaks as a result of a security breach.

Conventional password guessing uses lists of words numbering in the billions taken from previous breaches. Popular password-cracking applications like Hashcat and John the Ripper then apply "mangling rules" to these lists to enable variations on the fly.

[...] PassGAN uses none of these methods. Instead, it creates a neural network, a type of data structure loosely inspired by networks of biological neurons. This neural network attempts to train machines to interpret and analyze data in a way that's similar to how a human mind would. These networks are organized in layers, with inputs from one layer connected to outputs from the next layer.

PassGAN was an exciting experiment that helped usher in the use of AI-based password candidate generators, but its time in the sun has come and gone, password-cracking expert and Senior Principal Engineer at Yahoo...

21:25

China to launch Chinese Super Masons robot to build lunar bases with moon soil by 2028 Lifeboat News: The Blog

The robot tasked with making bricks out of lunar soil will be launched during Chinas Change-8 mission around 2028.

With Artemis II set to launch on November 24, it is no surprise that science journals are buzzing with research on lunar regolith, building bases on the moon, and working with moon soil to grow plants you get the drift.

A recent study in the journal Communications Biology described an experiment in which the moon soil samples collected during the Apollo missions were used to grow plants. And for the first time, an Earth plant, Arabidopsis thaliana, commonly called thale cress, grew and thrived in the lunar soil samples during the experiment.

21:25

NASAs snake-like robot concept could search for life on Saturns moon Lifeboat News: The Blog

This one-of-a-kind robot is an exobiology extant life surveyor (EELS) developed by NASAs Jet Propulsion Laboratory.

It is time to move over the traditional wheeled or legged robots. NASA has developed a robotic concept that sounds straight out of a science-fiction and has the potential to take space exploration to the next level.

The US space agency has been working on sending a snake-like robot to explore and search for extraterrestrial life forms in the solar system. This robot is an exobiology extant life surveyor (EELS) developed by NASAs Jet Propulsion Laboratory.

The snake-like robots capabilities.


NASA/JPL-CalTech.

Scientists have been working on sending a snake-like robot to explore and search for extraterrestrial life forms in the solar system. This robot is an exobiology extant life surveyor (EELS) developed by NASAs Jet Propulsion Laboratory (JPL).

21:25

Developer creates regenerative AI program that fixes bugs on the fly Lifeboat News: The Blog

Debugging a faulty program can be frustrating, so why not let AI do it for you? Thats what a developer that goes by BioBootloader did by creating Wolverine, a program that can give Python programs regenerative healing abilities, reports Hackaday. (Yep, just like the Marvel superhero.)

GPT-4 is a multimodal AI language model created by OpenAI and released in March, available to ChatGPT Plus subscribers and in API form to beta testers. It uses its knowledge about billions of documents, books, and websites scraped from the web to perform text-processing tasks such as composition, language translation, and programming.

21:00

Self-Cleaning Tech Could Help Solar Panels Keep Efficiency Up Hackaday

Solar panels are a special kind of magic turning light into useful electrical energy. However, they dont work nearly as well when theyre covered in dust, dirt, and grime. Conventional solutions involve spraying panels down with pure water, which is expensive and wasteful, or dry scrubbing, which can cause efficiency loss through scratching the panels. However, innovative new methods may offer useful solutions in this area, as shared by EETimes.

Researchers at MIT have explored the use of electrostatic methods to remove dust from solar panels. By creating a sufficiently strong electrostatic field, dust particles can be compelled to leap off of solar panels. The cleaning method requires no water and is entirely non-contact. It uses a motor system to pass a charged electrode past the surface of the panels, with the opposite ch...

20:46

AMD SFH Linux Driver Adding Ambient Color Sensor Support Phoronix

AMD's Sensor Fusion Hub (SFH) driver with the upcoming Linux 6.4 cycle is being extended to support new Ambient Color Sensor "ACS" functionality...

20:33

RTM Locker, a new RaaS gains notorieties in the threat landscape Security Affairs

Cybersecurity firm Trellix analyzed the activity of an emerging cybercriminal group called Read The Manual RTM Locker.

Researchers from cybersecurity firm Trellix have detailed the tactics, techniques, and procedures of an emerging cybercriminal gang called Read The Manual RTM Locker. The group provides a ransomware-as-a-service (RaaS) and provides its malicious code to a network of affiliates by imposing strict rules.

The group aims at flying below the radar, and like other groups, doesnt target systems in the CIS region.

The business-like set up of the group, where affiliates are required to remain active or notify the gang of their leave, shows the organizational maturity of the group, as has also been observed in other groups, such as Conti. reads the analysis of the gang. The gangs modus operandi is focused on a single goal: to fly below the radar. Their goal is not to make headlines, but rather to make money while remaining unknown. The groups notifications are posted in Russian and English, where the former is of better quality. Based on that, it isnt surprising that the Commonwealth of Independent States in Eastern Europe and Asia (CIS) region is off-limits, ensuring no victims are made in that area.

The group also avoids targeting morgues, hospitals, COVID-19 vaccine-related organizations, critical infrastructure, law enforcement, and other prominent companies to attract as little attention as possible.

The affiliates are obliged to remain active, or their account will be removed after 10 days without notifying them upfront.

The gangs affiliates must keep the RTM Locker malware builds priv...

20:27

March Music Random Thoughts

Music Ive bought in March.

This post is way late (I know, I know) because I went to the Big Ears music festival in Knoxville, Tennessee. (And then got sick on the way home, but thats a different story. Viruses!!!) Big Ears was great Knoxville is just about the perfect size for a hipster music festival. Lots of nice venues quite close to each other, so everything is easy to stroll and theres no stress. Well, except the inevitable stress of several bands you want to see playing at once and then having to make a decision It was oddly apolitical, though, with regards to the fucked up stuff happening in Tennessee now I think I heard only a single act make even a reference to anything from the stage: Haela Hunt-Hendrix took a tiny break from the Liturgy set to point out that it probably wouldnt have been legal for her to be on stage in Tennessee two days later. (To which the entire audience responded immediately with FUCK BILL LEE, which was heartening to hear)

Anyway, March:

...

20:26

Fedora 38 Being Released Next Tuesday Phoronix

The much anticipated Fedora 38 is cleared for releasing on Tuesday. There are no delays with the Fedora 38 cycle and in fact hitting their "early target date" for shipping on 18 April...

20:22

Kodi Confirms Data Breach: 400K User Records and Private Messages Stolen The Hacker News

Open source media player software provider Kodi has confirmed a data breach after threat actors stole the company's MyBB forum database containing user data and private messages. What's more, the unknown threat actors attempted to sell the data dump comprising 400,635 Kodi users on the now-defunct BreachForums cybercrime marketplace. "MyBB admin logs show the account of a trusted but currently

19:11

How AI is Helping Historians Better Understand Our Past SoylentNews

The historians of tomorrow are using computer science to analyze how people lived centuries ago:

It's an evening in 1531, in the city of Venice. In a printer's workshop, an apprentice labors over the layout of a page that's destined for an astronomy textbooka dense line of type and a woodblock illustration of a cherubic head observing shapes moving through the cosmos, representing a lunar eclipse.

[...] Five hundred years later, the production of information is a different beast entirely: terabytes of images, video, and text in torrents of digital data that circulate almost instantly and have to be analyzed nearly as quickly, allowingand requiringthe training of machine-learning models to sort through the flow. This shift in the production of information has implications for the future of everything from art creation to drug development.

But those advances are also making it possible to look differently at data from the past. Historians have started using machine learningdeep neural networks in particularto examine historical documents, including astronomical tables like those produced in Venice and other early modern cities, smudged by centuries spent in mildewed archives or distorted by the slip of a printer's hand.

Historians say the application of modern computer science to the distant past helps draw connections across a broader swath of the historical record than would otherwise be possible, correcting distortions that come from analyzing history one document at a time. But it introduces distortions of its own, including the risk that machine learning will slip bias or outright falsifications into the historical record. All this adds up to a question for historians and others who, it's often argued, understand the present by examining history: With machines set to play a greater role in the future, how much should we cede to them of the past?

Read more of this story at SoylentNews.

19:08

Jitu77 > Daftar Situs Judi Slot On-line Gacor, Pragmatic Play Terbaik, Slot88 Terpercaya h+ Media

Jitu77 > Daftar Situs Judi Slot On-line Gacor, Pragmatic Play Terbaik, Slot88 Terpercaya

Discover all obtainable promotions in addition to their phrases & conditions from the Bonuses and Offers web page. You do not want to supply the complete listing of documents, simply choose one. For the verification process, only the named list of paperwork is required. Then you have to show your ID so as to be recognized and to maintain your account safe. The final stage of the method has a maximum time restrict of 10 minutes. It additionally blocks the creation of other transactions while Crickex checks the cost.

888 Casino is undoubtedly one of many earliest online casinos. Precisely, the casino has been within the trade since 1997. Since its launch, the casino has received several world rewards, including the 2019 and 2021 EGR Awards and 2020 Gaming Intelligence Awards. Overall, with tons of of online slot video games and top-rated casino software program, youre certain to search out something that tickles your fancy.

Here in sattmatka.org, you may also compare earlier outcomes with the current result charts. So if you want to take pleasure in your recreation, just bookmark our site to have the ability to use our website on regular bases. We do not depend on guessing, we explore the accurate outcomes based on our data and on the bases of obtainable old online charts records! Our major objective is to supply the proper steerage to our customers about the method to play and tips on how to make good moves which in the end leads in the course of victory. Also, we provide free tips and charts for the verification of outcomes. A one who wins an excellent amount of money from gambling is taken into account as Satta king.

Its really easy to use and its helped me save plenty of effort and time counting cash. Luck is changeable, it is inconceivable to foretell events appropriately on an everyday basis. Gambling issues can affect household relations and job duties.

Indian players get pleasure from an exhilarating wagering expertise every time they gamble on the titles provided by the platform. Unlock huge bonuses and land huge wins on your favorite slots or desk titles. At this 888 Live Casino, youll discover a huge selection of live on line casino video games.

The odds are updated, and the interface is comparatively simple to navigate. Moreover, you should have entry to quick cashouts via a plethora of globally famend and localized cost methods. To know extra about the platform, keep studying on our 888 Casino Review the place we are going to cowl everything you should know about the casino platform. Go to the appropriate section of the official website and obtain the application to your cellular device or different gadget. After that, all that continues to be is to run the installation file and wait for the application to start. You need to install the Casino 888 software, log in or create an account.

No...

19:05

Scr 888 Casinoguge3 Comscr 888 Casino8gs4xy3yscr 888 Casinolwmfoktiscr 888 Casinoguge3comscr 888 Casinol93394ykscr 888 On Line Casinos Bulk And Block Deals h+ Media

Scr 888 Casinoguge3 Comscr 888 Casino8gs4xy3yscr 888 Casinolwmfoktiscr 888 Casinoguge3comscr 888 Casinol93394ykscr 888 On Line Casinos Bulk And Block Deals

In total, this bundle seeks to award gamers with a bonus amount of as much as $1500. Their cell casino, extremely optimised thanks to HTML5, offers an excellent platform for betting on the transfer and it additionally provides a number of ways to enjoy the merchandise. And furthermore, there are apps for Android and Apple devices. The wordsmith of the group, Shruti is busy enjoying her newfound ardour for online on line casino games. When shes pleased, she would bet the ranch to plan and create killer on line casino content the ones that urge you to play. If things dont go the way in which she desires them to, she would constantly act like the world is about to finish.

You dont have to download or install anything to play, and all you should do is head to the internet site. You will then web playing web site. One of the first issues that youll notice when taking part in at 888 India, is an easy and easy-to-navigate web site.

Therefore, along with civil interaction, we expect commenters to offer their opinions succinctly and thoughtfully, but not so repeatedly that others are aggravated or offended. If we obtain complaints about individuals who take over a thread or discussion board, we reserve the right to ban them from the positioning, with out recourse. INDIBET is the most effective website for anybody in search of aggressive odds.

888 Starz has plenty of tempting bonuses and promotions to welcome new gamers and provide great leisure for regular clients. The bonus part offers a variety of gifts similar to free bets, bonus spins, play cash and cashback to swimsuit completely different betting types. To stay as a lot as its popularity as an all-inclusive platform, 888 Casino makes it attainable for gamers to fund and withdraw from their accounts utilizing a myriad of ways.

The companys providers in the United Kingdom are operated by 888 UK Limited, integrated in Gibraltar, and licensed and controlled by the Great Britain Gambling Commission. The Acts passing had opened a leeway to growing legal online casinos, and the brother-partners conveniently seized that opportunity. In May 2007, Casino-on-Net, the companys first web site, was...

19:02

Baccarat App With Dragon Bonus Gcash Card, g188 Phbaccarat App With Dragon Bonus Gcash Card, h+ Media

Baccarat App With Dragon Bonus Gcash Card, g188 Phbaccarat App With Dragon Bonus Gcash Card,

Theyre known as the Macau, on line casino windsor poker 1xbet apk yukle which absolves the government of accountability. We all want we knew extra, serves solely the pursuits of the betting business on the expense of playing addicts and our high streets. For instance, you will need to start repaying your student loans. Third, but then I understood that it was the moment that I wont ever ever neglect.

For a clearer perspective of whats legit and whatnot, please examine our detailed article on the legality of online playing in India. Enjoy three excitingvideo poker games solely at 888casino. The mini list contains Jacks or Better, Joker Wild Double Up, and Deuces Wild Double Up.

Plus, take pleasure in extra versatility when making bets from singles up to express combinations! Everything is presented in European decimal format so its simple to understand too. We even have a brilliant on-line casino with dozens of slots and desk games. You can change between betting and gambling sections easily with a couple of keystrokes.

Ayman additionally reviews, publishes and continuously improves the content on this website. If you experience this, you must check in case you have two accounts. If the fund just isnt in your second account, ship an e-mail to the on line casino displaying proof of cost. Moreover, the on line casino helps a spread of languages, therefore eliminating the language barrier.

After downloading, you should install the appliance and enter the info from your account. Business Lend is a platform which brings executives officers, entrepreneurs, and enterprise capitalist collectively from totally different sectors. We carry on connecting with our users with the help of our monthly edition carving our method slowly in course of the highest readership.

The online on line casino will add 50% of the value of your first deposit to your account, which means that you could begin taking part in with $1,500 if you deposit $1,000 . Theyll do the same once more in your second deposit if you enter the promo code WELCOME888. The most whole welcome bonus over each deposits is capped at $2,000 . How lengthy it takes to withdraw your winnings is dependent upon your preferred payment sort and your membership standing.

Based on these 5 deposits, youre going to get a total of $1500. Through complete testing and evaluation, only one weak spot and a quantity of sturdy factors have been recognized for 888 casino. 888 Casino acquired a license as an Interactive Gaming Service Provider from Nevada Gaming Commission in March 2013. In 2015, this casino was declared as the only truly pan-Euro...

18:28

Korean Piracy Giant Noonoo TV Shuts Down Citing Bandwidth Costs & Pressure TorrentFreak

noonoo-logoSmash hit movies and TV shows such as Parasite and Squid Game, coupled with the unprecedented success of boy band BTS, have helped to cement South Korea as a major player on the global entertainment map.

Success for Korean entertainment companies carries the same pros and cons as it does for those in the West. More exposure, more sales, greater opportunities and, somewhat inevitably, more piracy.

That led to an announcement last month that broadcasters, including KBS, MBC and JTBC, the Korea Film and Video Copyright Association (film producers and distributors), plus streaming platforms TVING and Wavve, were forming a coalition to fight piracy. These companies took on board the stronger together philosophy of the global anti-piracy coalition ACE, and reports suggested that ACE itself would also be a part of the Korean program.

Noonoo TV in the Spotlight

The Korean anti-piracy coalitions first public target was revealed at the same time. With tens of millions of visitors per month, movie and TV show streaming giant Noonoo TV was a fairly predictable target.

Blamed for racking up 1.5 billion views of pirated movies and TV shows and allegedly causing billions of dollars worth of losses to legitimate platforms, aggressive site-blocking measures had failed to dull the sites popularity.

noonoo-tv

After regularly obtaining circumvention domains in a sequence that began with noonoo1.tv and progressed to noonoo2.tv and beyond, when we reported on the site last month noonoo32.tv was the height of fashion.

At the time of writing, noonoo46.tv is responsible for circumventing ISP blockades, but a message placed on the site this morning also suggests it could be the last domain the site will ever need.

Studiouniversal Calls it Quits

Hello, this is the Studiouniversal team, the announcement begins. It is with a heavy heart that we deliver unfortunate news to everyone who has used Noonoo up until now.

Since the official launch of the service in June 2021, we have been able to stay together with the love of many people. After carefu...

18:11

Optimizing Cancellations catonmat.net

At Browserling and Online Tools, we collected statistics from users who cancel their subscriptions and found that 15% of users change their mind within a day after canceling a subscription.

We acted on this data and added a feature that lets our users restore a subscription that they just canceled with a single click.

Here's how it works.

A single click to cancel a subscription:

And once a subscription has been canceled, it can be restored with a single click as well:

Make it easy to cancel and uncancel subscriptions for your users as well and see you next time!

18:09

Zelle users targeted with social engineering tricks Help Net Security

Cybercriminals have been leveraging social engineering techniques to impersonate the popular US-based digital payments network Zelle and steal money from unsuspecting victims, according to Avanan. The fake Zelle email (Source: Avanan) The phishing email The spoofed email is cleverly crafted to look as legitimate as possible: it contains the Zelle logo, grammatically correct text, and an authentic link to the firms web page at the bottom of the email, in the security and privacy footer. More

The post Zelle users targeted with social engineering tricks appeared first on Help Net Security.

18:00

Its Opposite Day For This Novel Wankel Engine Hackaday

The Wankel engine seems to pop up in surprising places every so often, only to disappear into the ether before someone ultimately resurrects it for a new application and swears to get it right this time. Ultimately they come across the same problems that other Wankels suffered from, namely poor fuel efficiency and issues with reliability. They do have a surprising power-to-weight ratio and a low parts count, though, which is why people keep returning to this well, although this time it seems like most of the problems might have been solved simply by turning the entire design inside out.

A traditional Wankel engine has a triangular-shaped rotor that rotates around a central shaft inside an oval-shaped housing. This creates three chambers which continually revolve around inside the engine as the rotor spins. The seals that separate the chambers are notoriously difficult to lubricate and maintain. Instead of using a rotor inside of a chamber, this design called the X-Engine essentially uses a chamber inside of a rotor, meaning that the combustion chamber and the seals stay in fixed locations instead of spinning around. This allows for much better lubrication of the engine and also much higher efficiency. By flipping the design on its head it is able to maintain a low moving parts count, high compression ratio, and small power-to-weight r...

17:58

Read issue #250 of Lifeboat News! Lifeboat News

Read issue #250 of Lifeboat News!

17:15

Severe Android and Novi Survey Vulnerabilities Under Active Exploitation The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The two flaws are listed below - CVE-2023-20963 (CVSS score: 7.8) - Android Framework Privilege Escalation Vulnerability CVE-2023-29492 (CVSS score: TBD) - Novi Survey Insecure Deserialization Vulnerability

17:13

Webinar: Tips from MSSPs to MSSPs Building a Profitable vCISO Practice The Hacker News

In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats. Putting in place the right people, technological tools and services, MSSPs are in a great position to ensure their customers' cyber resilience.  The growing need of SMEs and SMBs for structured cybersecurity services can be leveraged by MSPs and MSSPs to provide strategic

17:00

AMD Details openSIL For Advancing Open-Source System Firmware Phoronix

Open-source fans, rejoice, the most exciting thing I have read all week or perhaps the month: "AMD is committed to open-source software and is now expanding into the various firmware domains with the re-architecture of its x86 AGESA FW stack - designed with UEFI as the host firmware that prevented scaling, to other host firmware solutions such as coreboot, oreboot, FortiBIOS, Project Mu and others. A newer, open architecture that potentially allows for reduced attack surface, and perceivably infinite scalability is now available as a Proof-of-Concept, within the open-source community for evaluation, called the AMD openSIL Open-Source Silicon Initialization Library."..

17:00

Unexpected Flavor Combos Too Delicious Not to Try Terra Forming Terra



I do not think any of these will be replacing french fries anytime soon, but it certainly opens up ones sense of adventure in food tasting.

Truth is that our whole culture has steadily explored novel tastes and food novelties.  This is a long way from our past and the industrial imagination of wonder bread.

Today we almost all have experience alternate cuisines of some sort and perhaps most.


Unexpected Flavor Combos Too Delicious Not to Try

From the gooey delight of cheesy hot chocolate to a good old-fashioned PB and mayo sandwich.Pocket  when youve got time to spare.






Image by bgwalker/Getty Images

...

With Ships, Birds Find an Easier Way to Travel Terra Forming Terra




Plenty of bird species are well habituated to the human presense in cities. So catching a passing ship is hardly a stretch and yes, we are going to see colonizations take place.

We were just not looking for it.

It is another variable we should pay attention to.  Hzarmless now but possibly not in the long term.


With Ships, Birds Find an Easier Way to Travel

Why fly all the way across the ocean when you can chill out by the pool?


March 16, 2023 | 800 words, about 4 minute

Birds are a decently common sight on ships decks. But could birds be adapting to a new reality of assisted migration? Photo by Anna Phillips/Alamy Stock Photo

https://hakaimagazine.com/news/with-ships-birds-find-an-easier-way-to-travel/?

Last fall, hundreds of birders rushed to Bryher, a tiny island off the coast of Cornwall, England. They came to see a Blackburnian warbler, a bird with a flaming orange throat and a high-pitched, trilled song. Blackburnian warblers are hardly ever seen in the United Kingdomtheir home is 4,800 kilometers away in the pine forests of North America. Though theyre adept fliers, these birds typically overwinter in South America. So how did the bird get to Bryher?
...

The Psychedelic Upgrade for Your Mind and the Psycho-Spiritual Armor to Withstand Acceleration of Time Terra Forming Terra




This is another report from a experienced user of ayahuasca. It is becoming mature and is available to seekers without heading out to Peru.  I still think that it is poorly understood, but empiracal research is well understood and is so far safe neough.

We get great reports for folks stuck on drug dependency and all that.  Yet healthy types get a way more ambiguous feedback.

My own one experience with a half dose allowed me to do a deep meditation and to look upon the matyrix.  All good, butt certainly not over the top.  Truth is that it is wonderfully promising and real usage can be delayed for a long while.



The Psychedelic Upgrade for Your Mind and the Psycho-Spiritual Armor to Withstand Acceleration of Time

April 12th, 2023


Contributing writer for Wake Up World

https://wakeup-world.com/2023/04/12/the-psychedelic-upgrade-for-your-mind-and-the-psycho-spiritual-armor-to-withstand-acceleration-of-time/?

As a former cult member, Ive experienced brainwashing first hand. Ive seen how otherwise intelligent, highly educated people, among them professional therapists, lawyers and business people, have turned into blind followers of a self-...

Sinister Secret of the Shang Dynasty: Its Penchant for Human Sacrifice Terra Forming Terra



We have one clear example followed by a blank page. Then it was all about the royal family or something like that.  Otherwise the practise is scant at best.

We know the past saw slavery practised everywhere, not least because your labor was the only currency.  That was never going to work out.

We of course, do not know what really happened here.  Perhaps his successor simply chose to clean the slate.  No need for religion or custom even and away we go.




Sinister Secret of the Shang Dynasty: Its Penchant for Human Sacrifice

UPDATED 11 APRIL, 2023 - 18:17 ALEKSA VUKOVI

https://www.ancient-origins.net/history-ancient-traditions/shang-dynasty-sacrifice-0018237?u

There is no denying the far-reaching and unique history of ancient China. Thousands of years before our time, the ancient dynasties and cultures of China excelled in a variety of arts and technologies, pioneering skills that would later come to shape the world as we know it. From exceptional jade objects, to massive bronze ritual vessels and sprawling funeral complexes - the ancient Chinese did everything with incredible skill and attention to detail. But those early, powerful dynasties - namely the Shang Dynasty - were also known for one disquieting practice: human sacrifice . What do we know of this grim ancient tradition?


...

16:24

A Parasite is Killing Sea Otters. Is Cat Poop to Blame? SoylentNews

In California, the bodies of four furry swimmers tested positive for a strain of toxoplasmosis first seen in mountain lions:

Scientist Melissa Miller was seeing something in California sea otters that she had not seen before: an unusually severe form of toxoplasmosis, which officials have confirmed has killed at least four of the animals.

"We wanted to get the word out. We're seeing something we haven't seen before, we want people to know about it and we want people working on marine mammals to be aware of these weird findings," said Miller, a wildlife veterinarian specialist with the California Department of Fish and Wildlife (DFW). "Take extra precautions."

In March, a study from the DFW and the University of California, Davis, revealed that a rare strain of the parasite, never before reported in aquatic animals, was tied to the deaths of four sea otters. The strain, first seen in Canadian mountain lions in 1995, had not been previously detected on the California coast."This was a complete surprise," Karen Shapiro, with the UC Davis School of Veterinary Medicine, said in a statement. "The COUG [toxoplasma strain] genotype has never before been described in sea otters, nor anywhere in the California coastal environment or in any other aquatic mammal or bird."

[...] Toxoplasma is often found in cat feces. Otters, which live along the shoreline, can be exposed to the parasite in rainwater runoffall four cases scientists studied came in during the heavy rainfall season.

Toxoplasmosis infection is common in sea otterswhich have a roughly 60 percent chance of being infected in their lifetimes, Miller saidand can be fatal, but this strain is of particular concern.

However, Miller warned against unfairly demonizing cats.

"I don't want this to be a war on cats," she said. "I have two cats. What I try to do is practice what I preach and what I know as a scientist: I keep my cats indoors all the time and I make sure to dispose of their litter into something that will not leak into the environment."


Original Submission

Read more of this story at SoylentNews.

16:16

The Pandemic is Killing Microsoft in Greece Techrights

Windows down to 71% this month:

Desktop Operating System Market Share Greece

Summary: These latest numbers must be causing a bit of a panic at Microsoft; its not just a Greek trend

15:22

Hikvision fixed a critical flaw in Hybrid SAN and cluster storage products Security Affairs

Chinese video surveillance giant Hikvision addressed a critical vulnerability in its Hybrid SAN and cluster storage products.

Chinese video surveillance giant Hikvision addressed an access control vulnerability, tracked as CVE-2023-28808, affecting its Hybrid SAN and cluster storage products.

An attacker with network access to the device can exploit the issue to obtain admin permission. The attacker can exploit the vulnerability by sending crafted messages to vulnerable devices.

Some Hikvision Hybrid SAN/Cluster Storage products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices. reads the advisory published by the company.

The vulnerability was reported in December 2022 by Souvik Kandar, Arko Dhar of the Redinent Innovations team in India. 

vulnerability.

According to SecurityWeek, the vendor is not aware of attacks in the wild exploiting the vulnerability and is urging customers to patch their installations.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

...

15:00

Prison TV Gets Simple Speaker Mod Hackaday

American prisons are strict about television use. Typically theyre only to be used with headphones, and their enclosures need to be transparent so they cant be used to smuggle goods. ClearTech makes TVs that meet these specifications, and when [Steve Pietras] got his hands on just such a unit, he set about modding it for use in the free world.

Getting into the TV isnt easy; ClearTech built the units using special security fasteners unlike any weve seen before. [Steve] found a way to deal with these, though declines to share his technique in his video. Once inside though, his task is relatively straightforward. He steps through where to install speakers in the TVs housing, and how to hook them up to the right spots on the main circuit board. With the case closed back up, [Steve] is able to use the TV without headphones, and without the threat of getting shanked by a fellow inmate...

14:48

14:30

New infosec products of the week: April 14, 2023 Help Net Security

Heres a look at the most interesting products from the past week, featuring releases from BigID, Binarly, Cynalytica, GitGuardian, Netskope, Searchlight Cyber, ThreatX, and Wazuh. Cynalytica OTNetGuard provides visibility into critical infrastructure networks Cynalytica has launced its Industrial Control System (ICS/SCADA) monitoring sensor, OTNetGuard, that passively and securely captures analog, serial, and IP communications closing the capabilities gap in complete monitoring of OT networks. GitGuardian Honeytoken helps companies secure their software supply chains With attackers More

The post New infosec products of the week: April 14, 2023 appeared first on Help Net Security.

14:00

Tactics that make crypto giveaway scams so successful Help Net Security

The illicit market for crypto giveaway scams has expanded, offering various services to facilitate fraudulent activity. The proliferation of fake crypto giveaways can be attributed to the increased availability of tools for scammers, even those with limited technical skills. In this Help Net Security video, Tony Lauro, Director of Security Technology and Strategy at Akamai, discusses why crypto giveaway scams are so successful.

The post Tactics that make crypto giveaway scams so successful appeared first on Help Net Security.

13:38

Developer Creates Self-healing Programs That Fix Themselves Thanks to AI SoylentNews

"Wolverine" experiment can fix Python bugs at runtime and re-run the code:

Debugging a faulty program can be frustrating, so why not let AI do it for you? That's what a developer that goes by "BioBootloader" did by creating Wolverine, a program that can give Python programs "regenerative healing abilities," reports Hackaday. (Yep, just like the Marvel superhero.)

"Run your scripts with it and when they crash, GPT-4 edits them and explains what went wrong," wrote BioBootloader in a tweet that accompanied a demonstration video. "Even if you have many bugs it'll repeatedly rerun until everything is fixed."

[...] In the demo video for Wolverine, BioBootloader shows a side-by-side window display, with Python code on the left and Wolverine results on the right in a terminal. He loads a custom calculator script in which he adds a few bugs on purpose, then executes it.

"It runs it, it sees the crash, but then it goes and talks to GPT-4 to try to figure out how to fix it," he says. GPT-4 returns an explanation for the program's errors, shows the changes that it tries to make, then re-runs the program. Upon seeing new errors, GPT-4 fixes the code again, and then it runs correctly. In the end, the original Python file contains the changes added by GPT-4.

Read more of this story at SoylentNews.

13:30

Organizations face an uphill battle to keep their sensitive data secure Help Net Security

On average, organizations store 61% of their sensitive data in the cloud, and most have experienced at least one cybersecurity breach (90%), threat (89%) and/or theft of data (80%), with 75% experiencing all three, according to Skyhigh Security. Overall, the report underscores the need to address data security gaps by investing in comprehensive data protection that provides remote workforces with a secure and productive user experience. Today, data is everywhere, traversing devices, cloud applications, the More

The post Organizations face an uphill battle to keep their sensitive data secure appeared first on Help Net Security.

13:00

Conquering modern data stack complexities Help Net Security

How are data teams conquering the complexity of the modern data stack? Unravel Data has asked 350+ data scientists, engineers, analysts, and others who rely upon real-time data insights for decision-making to share their practices. For the third year in a row weve had the opportunity to take the pulse of enterprise data teams to better understand the daily challenges they face as they accelerate their ambitious big data analytics programs, said Kunal Agarwal, CEO More

The post Conquering modern data stack complexities appeared first on Help Net Security.

12:25

Qwiet AI releases a suite of targeted AppSec and DevSecOps services Help Net Security

Qwiet AI has released a suite of targeted AppSec and DevSecOps services that help companies address their security function needs without sacrificing time and budget. We often hear of the notion of doing more with less. However, in todays environment companies are challenged with doing less with less, said Stuart McClure, CEO of Qwiet AI. Between sourcing the right people and distinguishing between true threats and non-critical vulnerabilities, todays security and development teams struggle with More

The post Qwiet AI releases a suite of targeted AppSec and DevSecOps services appeared first on Help Net Security.

12:20

Entrust offers zero-trust solutions for authentication, HSM, and multi-cloud compliance Help Net Security

Entrust is supporting organizations zero trust journey with new foundational identity, encryption, and key management solutions. Zero trust approaches are reshaping security in a perimeter-less world. While the conversation often starts with identity and network access, organizations are quickly finding that identity and access management is only the beginning. A comprehensive zero trust framework starts with enabling trusted identities across users, devices, machines, apps, and workloads, and extends to a data protection strategy to secure More

The post Entrust offers zero-trust solutions for authentication, HSM, and multi-cloud compliance appeared first on Help Net Security.

12:15

Code42 Instructor now offers risk reduction training videos to Microsoft Teams Help Net Security

Code42 Software has offered a complete set of response controls to allow security teams to respond to all levels of risk, ranging from unacceptable high risk that must be blocked to the most prevalent user mistakes that require correction. Instructor delivers actionable, hyper-targeted lessons to employees engaging in risky behavior, helping to increase data security, while freeing up time for security analysts to focus on higher risk events. Code42 Instructor now offers over 100 lessons More

The post Code42 Instructor now offers risk reduction training videos to Microsoft Teams appeared first on Help Net Security.

12:10

Cerbos Cloud manages and enforces authorization policies Help Net Security

Cerbos has released Cerbos Cloud, a managed service offering for Cerbos. Cerbos is an open source authorization layer to easily implement roles and permissions in software applications. It separates authorization logic from the core application code, making the authorization layers more scalable, more secure and easier to change as the complexity grows. Cerbos Cloud streamlines the implementation and management of authorization policies. Torsten Volk, managing research director at Enterprise Management Associates, said: Writing and managing More

The post Cerbos Cloud manages and enforces authorization policies appeared first on Help Net Security.

11:51

OGUsers (2022 breach) - 529,020 breached accounts Have I Been Pwned latest breaches

In July 2022, the account hijacking and SIM swapping forum OGusers suffered a data breach, the fifth since December 2018. The breach contained usernames, email and IP addresses and passwords stored as argon2 hashes. A total of 529k unique email addresses appeared in the breach.

10:53

Get Ready: SpaceX Starship's First Launch is for Real SoylentNews

An unprecedented space event, and it's happening soon:

Elon Musk lost his claim as having the most powerful space-worthy rocket when NASA blasted its own mega rocket to the moon in November.

But the SpaceX founder could win back the title with his company's next big project. Starship, SpaceX's skyscraping rocket and spacecraft, will launch on its first mission soon. During the test flight, the colossal booster will separate about three minutes after liftoff and land in the Gulf of Mexico, according to federal filings. The ship will fly in space around Earth at an altitude of over 150 miles, then splash down off the Hawaiian coast.

This will be a crucial demonstration of hardware that NASA is depending on to get humans back on the moon in the next few years. And, if successful, it'll mean Musk is one small step closer to realizing his personal dream of building a city on Mars.

UPDATE: Apr. 9, 2023, 12:54 p.m. EDT SpaceX stacked Starship at the launch pad and plans to have a rehearsal this week, "followed by Starship's first integrated flight test." Musk tweeted April 9 that the company is ready to launch the rocket, pending approval of its Federal Aviation Administration license. A launch attempt this month is looking more and more plausible, with an FAA operational advisory plan indicating SpaceX is targeting Monday, April 17.

[...] Perhaps surprisingly, Starship won't lift off from Kennedy Space Center in Cape Canaveral, Florida, where most space fans are accustomed to watching historically significant launches.

Instead, it will take off from Boca Chica, Texas, at SpaceX's own spaceport. Eventually, the company will launch the rocket from a site under construction in the outer perimeter of the famous Florida pad that shot Apollo 11 to the moon.

"Their plan is that they're going to do a few test flights there," in South Texas, Nelson said. "Once they have the confidence, they will bring the missions to the Cape."


Original Submission

Read more of this story at SoylentNews.

10:21

Troubleshooting No Signal Monitor Issue: Steps to Get Computer Display Back HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

If you encounter a No signal issue on your monitor despite your computer being powered on, and you

This is a post from HackRead.com Read the original post: Troubleshooting No Signal Monitor Issue: Steps to Get Computer Display Back

10:00

HPR3835: Retro Karaoke machine Part 2 Hacker Public Radio

The tape stops in the middle Put pressure here Video clip of Star Wars audio drama playing Video clip on Archive.org

Software Supply Chain Attacks It Will Never Work in Theory

This new paper about attacks on open source software supply chains succeeds on two fronts. First, the topic itself is timely and interesting: the number of attacks via package builds and repositories is increasing rapidly, so conscientious software developers need at least a basic understanding of the risk and how to mitigate it.

Second, this paper is an excellent model of what software engineering research could be. The authors have built a tool to help people explore risks in software supply chains and put it online at https://sap.github.io/risk-explorer-for-software-supply-chains/; the source code is available as well, which makes this work far more accessible than most of what we review. In particular, the readability of the paper and the availability of the tool makes it easy to incorporate this work into undergraduate classes and workplace training seminars so that it doesn't stay trapped in a PDF.

Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, and Olivier Barais. Journey to the center of software supply chain attacks. 2023. arXiv:2304.05200.

This work discusses open-source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks. We present our tool "Risk Explorer for Software Supply Chains" to explore such information and we discuss its industrial use-cases.

08:06

Swiss Health Authorities - Natural Immunity is the Best Defense Against COVID (in Switzerland) SoylentNews

Many people believe that any and all opposition to the Covid vaccine comes from "far-right" Republican conspiracy theorists in the flyover states. I guess the Swiss government will now be branded with those labels as their Federal Office of Public Health is now recommending that a Covid vaccination is not needed, even for people at especially high risk. They list pregnant women and people with compromised immune systems as an exception. They further state that those who wish to receive a Covid vaccine must pay for it out of their own pockets.

https://www.bag.admin.ch/bag/en/home/krankheiten/ausbrueche-epidemien-pandemien/aktuelle-ausbrueche-epidemien/novel-cov/impfen.html

In principle, no COVID-19 vaccination is recommended for spring/summer 2023. Nearly everyone in Switzerland has been vaccinated and/or contracted and recovered from COVID-19. Their immune system has therefore been exposed to the coronavirus. In spring/summer 2023, the virus will likely circulate less. The current virus variants also cause rather mild illness. For autumn 2023, the vaccination recommendation will be evaluated again and adjusted accordingly.


Original Submission

Read more of this story at SoylentNews.

07:05

What Does Linux Have in Common With The Barrel of Rock? FOSS Force

Much like Linux had trouble gaining users back in the day because the general public didn't know about it, independent online radio stations like The Barrel of Rock are having trouble finding an audience because potential listeners can't wade through tens of thousands of music radio stations to find them.

The post What Does Linux Have in Common With The Barrel of Rock? appeared first on FOSS Force.

06:45

Read "Intelligence Explosion - Part 1/3" by our Henrique Jorge. Lifeboat News

Read "Intelligence Explosion Part 1/3" by our Henrique Jorge.

06:43

Pentagon leak suspect Jack Teixeira arrested at gunpoint Graham Cluley

The US Department of Justice has arrested a member of the US Air Force National Guard in connection with a high profile leak of classified Pentagon documents. Here are my thoughts...

06:37

Re: Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Henri Salo on Apr 13

It's better for organizations to be aware of the vulnerabilities and risks
related to used software. Sometimes it is challenging to get the author/team to
fix the security issues (busy/unresponsive/miscommunication etc). This is very
common with plugins in different software as there are large number of
developers. It's better for users and community to disclose the issues if no
fix is provided as plugins can be disabled, WAF can be...

06:30

Copyright Claims Board Dismisses Piracy Case Against Cloudflare TorrentFreak

cloudflare logoLast summer, the US Copyright Claims Board (CCB) officially launched. Through this Copyright Office-hosted venue, rightsholders can try to recoup alleged damages outside the federal court system.

The CCB aims to make it cheaper for creators to resolve disputes. Theres no attorney required and the filing fee is limited to $100 per claim. Accused parties also benefit as the potential damages are capped at $30,000. Those who prefer traditional lawsuits can choose to opt-out.

Many of the cases that have been submitted thus far are filed against direct infringers. This includes sites and services that use copyrighted material, such as photos, without obtaining permission from rightsholders.

There are also cases where claimants argue that defendants are liable for the acts of a third party. A claim filed by popular reading app AnyStories against CDN provider Cloudflare last September is one such example.

AnyStories vs. Cloudflare

AnyStories allows independent authors to earn revenue from sharing their writings in public. However, these stories are easily copied and posted on pirate sites, much to the frustration of READ ASAP, AnyStories Singapore-based parent company.

The Singapore company had some success with sending DMCA notices but one site in particular, infobagh.com, proved to be unresponsive.

Hoping for a breakthrough, AnyStories sent DMCA notices to Cloudflare, calling out Infobagh.com as a pirate site. While Cloudflare provides CDN services for that site, its not the hosting company. This means that Cloudflare generally doesnt intervene.

Indeed, Cloudflare didnt take action against its customer. Instead, it shared the contact information of Infobagh.coms hosting company, urging AnyStories to follow the issue up with them.

AnyStories tried to do so, but since the hosting companys contact information was reportedly inaccurate, it decided to file a claim against Cloudflare at the CCB instead.

Vague Claim, No Damages

The initial claim was rather vague and didnt really pinpoint alleged wrongdoing at Cloudflare. AnyStories said it hoped that the pirated content would be removed and that Infobagh.com would apologize.

There were no copyright infringement allegations against Cloudflare and no request for monetary damages either.

...

06:19

The Russia-linked APT29 is behind recent attacks targeting NATO and EU Security Affairs

Poland intelligence linked the Russian APT29 group to a series of attacks targeting NATO and European Union countries.

Polands Military Counterintelligence Service and its Computer Emergency Response Team linked a recent string of attacks targeting NATO and European Union countries to the Russia-linked APT29 group (aka SVR groupCozy BearNobelium, and The Dukes).

APT29 along with APT28 cyber espionage group was involved in the Democratic National Committee hack and the wave of attacks aimed at the 2016 US Presidential Elections.

In early March, BlackBerry researchers uncovered a new cyber espionage campaign aimed at EU countries. The hackers targeted diplomatic entities and systems transmitting sensitive information about the regions politics, aiding Ukrainian citizens fleeing the country, and providing help to the government of Ukraine.

The Polish intelligence states that many elements of the recent campaign, including the infrastructure, the techniques used and the tools, overlap with past APT29 activity.

The recent attacks, which are still ongoing, differ from the previous ones in the use of unique and previously undocumented tools.

The Military Counterintelligence Service and CERT.PL recommend organizations in the area of interest of the APT group to improve the security of IT Security systems.

The attack chain commences with a spear-phishing email containing a weaponized document, which contains a link leading to the download of an HTML file. The HTLM files are hosted on a legitimate online library website that was likely compromised by the threat actors sometime between the end of January 2023 and the beginning of February 2023.

One of the lures appeals to those who want to find out the Poland Ambassadors schedule for 2023. It overlaps with Ambassador Marek Magierowskis recent visit to the United Statesp; specifically, his...

06:00

Google Launches New Cybersecurity Initiatives to Strengthen Vulnerability Management The Hacker News

Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing greater transparency measures around exploitation. "While the notoriety of zero-day vulnerabilities typically makes headlines, risks remain even after they're known and fixed, which is the real story," the company said in an announcement. "Those risks span everything from

05:40

Linking Chips With Light For Faster AI IEEE Spectrum



Stephen Cass: Hi, Im Stephen Cass, for IEEE Spectrums Fixing the Future. This episode is brought to you by IEEE Xplore, the digital library with over 6 million pieces of the worlds best technical content. Today I have with me our own Samuel K. Moore, who has been covering the semiconductor beat pretty intensely for Spectrum for well, how many years has it been, Sam?

Sam Moore: 7 years, I would say.

Cass: So Sam knows computers down at the level most of us like to ignore, hidden underneath all kinds of digital abstractions. This is down where all the physics and material science that make the magic possible lurk. And recently, you wrote an article about the race to replace electricity with light inside computers, which is letting chips talk to each other with fiber optics rather than just using fiber optics to communicate between computers. I guess my first question is, whats wrong with electricity, Sam?

Moore: I have nothing against electricity, Stephen. Wow It knows what it did. But really, this all comes down to inputs and outputs. There just arent enough coming off of processors for what they want to do in the future. And electronics can only push signals so far before they kind of melt away, and they consume quite a bit of power. So the hope is that you will have better bandwidth between computer chips, consuming less power.

Cass: So its not just a question of raw speed, though, when you talk about these signals and melting away, because I think the signal speed of copper is about, what, two-thirds the speed of light in a vacuum. But then I was kind of surprised to see that, in a fiber optic cable, the speed of light is about two-thirds of that in a vacuum. So whats going on? Whats kind of the limitations of pushing a signal down a wire?

Moore: Sure. A wire is not an ideal conductor. Its really resistance, inductance, and capacitance, all of which will reduce the size and speed of a signal. And this is particularly a problem at high frequencies, which are more susceptible, particularly to the capacitance side of things. So you might start with a beautiful 20 GHz square wave at the edge of the chip, and by the time it gets to the end of the board, it will be an imperceptible bump. Light, on the other hand, doesnt work like that. It has things that there are things that mess with signals in optical fibers, but they work at much, much, much long...

05:21

MSI Confirms Cyberattack, Advises Caution With Firmware SoylentNews

The reports suggest ransomware may have been involved:

Gaming hardware manufacturer MSI confirmed today that it was the victim of a cyberattack. In a brief statement on its website, the company said that the attack hit "part of its information systems," which have since returned to regular operations.

The company advises its customers only to get BIOS and firmware updates from the MSI website and no other sources. It's light on details, saying that after "detecting network anomalies," MSI implemented "defense mechanisms and carried out recovery measures," and then informed the the government and law enforcement.

[...] The post doesn't mention if customer data was stolen or affected. Tom's Hardware reached out to MSI but did not hear back in time for publication. In addition, emails to official spokesperson addresses listed on the company's website bounced.

Also at Bleeping Computer.


Original Submission

Read more of this story at SoylentNews.

05:05

Hackers Claim Vast Access to Western Digital Systems cryptogon.com

Via: TechCrunch: The hackers who breached data storage giant Western Digital claim to have stolen around 10 terabytes of data from the company, including reams of customer information. The extortionists are pushing the company to negotiate a ransom of minimum 8 figures in exchange for not publishing the stolen data. One of []

04:55

Intel Sierra Forest EDAC Support Coming With Linux 6.4 Phoronix

As part of Intel's ongoing Linux support preparations for next year's Sierra Forest processors that will feature up to 144 Xeon E cores per socket, the Error Detection And Correction (EDAC) driver support is set to be added for the upcoming Linux 6.4 kernel cycle...

04:53

Re: ncurses fixes upstream Open Source Security

Posted by Mark Esler on Apr 13

(distros maintain "downstream" versions of the ncurses "upstream")

Ideally, a security patch should only include security relevant changes.
If a bunch of a documentation or miscellaneous changes are added, it
makes backporting difficult (i.e., the non-security relevant changes may
not be desired or cause the patch to not apply cleanly to old versions
of ncurses). The upstream patch is already made, but that's what...

04:50

Hersh: Zelensky Regimes Corruption Like, 1950s Mob Movie, Embezzled $400 Million in 2022, Buying Discount Diesel from the Russians [???] cryptogon.com

10% for the big guy? Via: Seymour Hersh: The Ukraine government, headed by Volodymyr Zelensky, has been using American taxpayers funds to pay dearly for the vitally needed diesel fuel that is keeping the Ukrainian army on the move in its war with Russia. It is unknown how much the Zelensky government is paying per []

04:46

LockBit 3.0 Posts Dubious Claims of Breaching Darktrace Cybersecurity Firm HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Is it a highly dubious claim by the infamous LockBit 3.0 ransomware gang? It looks like it!

This is a post from HackRead.com Read the original post: LockBit 3.0 Posts Dubious Claims of Breaching Darktrace Cybersecurity Firm

04:33

Re: Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Demi Marie Obenour on Apr 13

What is the reason for the large number of unfixed vulnerabilities?
To me, this seems like an argument for not using Jenkins (or at least
its plugins) at all.

04:31

18,000 Cows Killed in Explosion, Fire at Texas Dairy Farm cryptogon.com

Via: USA Today: The fire spread quickly through the holding pens, where thousands of dairy cows crowded together waiting to be milked, trapped in deadly confines. After subduing the fire at the west Texas dairy farm Monday evening, officials were stunned at the scale of livestock death left behind: 18,000 head of cattle perished in []

04:30

Libreboot 20230413 Released With Build System Improvements Phoronix

Libreboot is the downstream of Coreboot focused on having fully open-source / free software replacements to proprietary BIOS/firmware on x86 and ARM systems. Out today is Libreboot 20230413 as the latest step forward for the project...

03:40

Development Release: EuroLinux 8.8 Beta DistroWatch.com: News

EuroLinux is an enterprise-class Linux distribution made and supported by the EuroLinux company, built mostly from code of Red Hat Enterprise Linux. The project has published a new development snapshot, EuroLinux 8.8 Beta. "On April 13, we released EuroLinux

03:38

A flaw in the Kyocera Android printing app can be abused to drop malware Security Affairs

Security experts warn that a Kyocera Android printing app is vulnerable to improper intent handling and can be abused to drop malware.

An improper intent handling issue affecting the Kyocera Android printing app can allow malicious applications to drop malware. Such kinds of flaws expose a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

The vulnerability, tracked as CVE-2023-25954, was reported by the Japanese Vulnerability Notes (JVN).

Multiple mobile printing apps for Android are vulnerable to improper intent handling (CWE-668). reads the advisory published by the JVN. When a malicious app is installed on the victim users Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification.

The vulnerability impacts multiple apps that share the same code:

02:51

Mesa 23.1 Branched With Many New Radeon, Intel & Zink Graphics Driver Features Phoronix

The Mesa 23.1 graphics driver code is now branched that marks an end to this quarter's feature development. Mesa 23.2-devel is now open on Git main in beginning work towards the Q3'2023 open-source user-space graphics driver stack feature release...

02:40

RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware The Hacker News

Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as a private ransomware-as-a-service (RaaS) provider and carries out opportunistic attacks to generate illicit profit. "The 'Read The Manual' Locker gang uses affiliates to ransom victims, all of whom are forced to abide by the gang's strict rules,"

02:39

Mistaken Fossil Rewrites History of Indian Subcontinent for Second Time SoylentNews

What once appeared as a fossil of the primitive animal Dickinsonia turned out to be nothing more than a decaying beehive:

In 2020, amid the first pandemic lockdowns, a scientific conference scheduled to take place in India never happened.

But a group of geologists who were already on site decided to make the most of their time and visited the Bhimbetka Rock Shelters, a series of caves with ancient cave art near Bhopal, India. There, they spotted the fossil of Dickinsonia, a flat, elongated and primitive animal from before complex animals evolved. It marked the first-ever discovery of Dickinsonia in India.

The animal lived 550 million years ago, and the find seemed to settle once and for all the surprisingly controversial age of the rocks making up much of the Indian subcontinent. The find attracted the attention of The New York Times, The Weather Channel and the scientific journal Nature as well as many Indian newspapers.

Only, it turns out, the "fossil" was a case of mistaken identity. The true culprit? Bees.

University of Florida researchers traveled to the site last year and discovered the object had seemingly decayed significantly quite unusual for a fossil. What's more, giant bee's nests populate the site, and the mark spotted by the scientists in 2020 closely resembled the remains of these large hives.

Read more of this story at SoylentNews.

02:09

Stable kernels 6.2.11, 6.1.24, and 5.15.107 LWN.net

Greg Kroah-Hartman has announced the release of the 6.2.11, 6.1.24, and 5.15.107 stable kernels. They contain another collection of important fixes throughout the kernel tree.

01:30

Square-Wheeled Bike Is Actually An Amazing Tracked Build Hackaday

The invention of the wheel is considered one of the crowning achievements of early humanity. Squares dont roll, after all. [The Q] decided to build a square-wheeled bike anyway, with a neat tracked setup that makes for an awesome visual gag.

The wheels are made out of C-angle steel, making them both stout and incredibly heavy. While they dont really need the additional structure for strength, they feature spokes which mount a central hub for attaching the wheels to a bicycle axle. The squares arent designed to roll, though. Instead, they are fitted with gears and rollers, upon which a track made of bicycle chain and tires is fitted. When the rider pedals, this turns the track, propelling the bike along. Cleverly, the track mechanism is neatly hidden by some framing, confusing passers-by.

The riding experience is noisy, thanks to the tracks. Theres also plenty of rolling resistance. Its unlikely bikes like these will become mainstream transport anytime soon,...

01:22

Dementia: Can phototherapy treatments improve cognitive function? Lifeboat News: The Blog

Upon analysis, researchers found the phototherapy treatments significantly improved MMSE scores in participants with dementia.

The second focus of the study was to see how phototherapy interventions affected the behavioral and psychological symptoms of dementia (BPSDs) such as depression and agitation and sleep. The researchers stated there were no significant differences in BPSDs and sleep between the phototherapy and control groups.

01:22

Keto diet may treat epilepsy Lifeboat News: The Blog

Mice that received gut microbes from children with epilepsy on the ketogenic diet were protected from seizures. The finding suggests the microbiome is behind the diets seizure-reducing effect.

By Grace Wade

01:20

Todays AI Job Market, in Four Graphs IEEE Spectrum



Whats the career outlook for AI professionals? In a word, growing, for all skill sets. But dig down into the data, and youll find some differences.

This latest look at the AI job market comes from the Stanford Institute for Human-Centered Artificial Intelligence (HAI), which this month released its 2023 AI Index Report, more than 300 pages of data capturing trends in artificial intelligence. A hunt through those pages brought me several key snapshots of career trends, in the form of graphs created using data from Lightcast, a labor market analytics firm that mined millions of jobs posted 51,000 websites since 2010, flagging those listing AI skills. Here are the key takeaways.

AI jobs are up around the world, but nowhere more so than in the United States


Machine learning booms, while robotics languishes


Python is the AI language of choice


California has the most AI hires, but the Texas job market gains share


00:32

Legion: Credential Harvesting & SMS Hijacking Malware Sold on Telegram HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

The Legion malware is capable of stealing credentials from misconfigured or exposed servers and is linked to the AndroxGh0st malware family.

This is a post from HackRead.com Read the original post: Legion: Credential Harvesting & SMS Hijacking Malware Sold on Telegram

00:28

Where Did the CEO of Sirius Run Away to Last Month? A No-Content Company With 4,000 Pounds and No Employees. Techrights

Filed a week ago:

Companies House April 2023: Acommotion

One-person shop with little funds in the bank:

Companies House January 2023: A-Commotion

Summary: The CEO of Sirius Open Source Limited left last month not because of some lucrative job offer from another company; hes back to a one-person non-business (placeholder/pot) registered at the address of the accountant with a single-page Web site (see below); its most likely that he runs away from the scene of the crime given how rampantly he has been purging any remnants of his time at Sirius

You can run, or delete pages, but you cannot hide. Bullied people always remember.

References: CEO of Sirius UK Continues to Purge Any Remnants of His Past With the Company (Trying Hard Not to Associate With It) | Sirius UK CEO Resigns (or Gets Sacked) and Completely Deletes His Whole Past With Sirius Open Source | Amid Fraud at Sirius Open Source CEO Deletes His Recent (This Month) Past With the Company]

Andrew Bucknor A-Commotion site certificate

...

00:27

[$] Process-level kernel samepage merging control LWN.net

The kernel samepage merging (KSM) feature can save significant amounts of memory with some types of workloads, but security concerns have greatly limited its use. Even when KSM can be safely enabled, though, the control interface provided by the kernel makes it unlikely that KSM actually will be used. A small patch series from Stefan Roesch aims to change this situation by improving and simplifying how KSM is managed.

00:09

The Boss of Sirius Open Source and His Ex-Wife Should be Reunited Inside the Prison Cell Techrights

Video download link | md5sum 1b4fb43cbc2896727deb2c535fd72cc6
Time for Sirius Management to Face Prison
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes of Sirius Open Source are very serious; weve come to the point now where its more or less a countdown ahead of arrests or class action lawsuit (or both)

TODAY we published a lot of material about Sirius Open Source and since recording the above video weve published a little more.

In light of what Standard Life told us last night (they sent a letter at night, which is unusual for firms that work 9 to 5), were now progressing the case against a company that defrauded GNU/Linux system administrators, Free software specialists, programmers and so on.

The principal fraudster now resides in Washington, the state. To get full accountability they will likely have to issue an extradition warrant (sent from authorities in the UK to the US).This is now a criminal matter. Several people need to be arrested.

The issue is further complicated by an NDA signed with the Gates Foundation (we dont even know the details of it). The principal fraudster now resides in Washington, the state. To get full accountability they will likely have to issue an extradition warrant (sent from authorities in the UK to the US). This adds a number of new dimensions, including the divorce. The financial fugitive has many liabilities in the UK. Some of these issues are discussed in length in the video above.

00:00

Tinkercad Gets a Move On Hackaday

Going to the movies is an experience. But how popular do you think theyd be if you went in, bought your popcorn, picked your seat, and the curtain would rise on a large still photograph? Probably not a great business model. If a picture is worth 1,000 words, then a video is worth at least a million, and thats why we thought it was awesome that Tinkercad now has a physics simulator built right in.

...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 13 April

23:57

Intel Foundry Services Partners With Arm to Manufacture Next-Generation Mobile Chips SoylentNews

Intel Foundry Services partners with Arm to manufacture next-generation mobile chips:

Intel Corp. said today its Intel Foundry Services business unit is partnering with the British chip design firm Arm Ltd. to enable semiconductor designers to build low-power systems-on-chip on its cutting-edge manufacturing process.

The companies will initially focus on mobile SoC designs before expanding the deal to cover chips for automotive, internet of things, data center, aerospace and government applications. Under the agreement, customers that use Arm's designs as the basis of their chips will be able to use Intel's 18A process technology to manufacture their products.

The deal is said to be a big boon for customers, since Intel 18A is a more advanced process with capacity in both the U.S. and Europe. It will allow customers to design chips using electronic design automation software from third-party suppliers. EDA software is used by semiconductor engineers to create processor blueprints. The result will be more powerful processors with greater energy efficiency, Intel said.

Under the initiative, IFS and Arm will work together on design technology co-optimization, wherein chip design and process manufacturing are optimized to improve the power, performance and cost of Arm-based cores using the Intel 18A technology. Intel 18A is said to leverage two new technologies, including PowerVia for optimal power delivery and RibbonFET "gate all around" transistor architecture, which ensures optimal performance and power.

As part of this cooperation, IFS and Arm plan to develop a mobile reference design to demonstrate the technology to customers.

The deal is another key milestone for IFS, following its partnership with the Taiwanese semiconductor firm MediaTek Inc. that was announced last July. Intel set up the foundry business in 2021 to manufacture chips for other companies based on their own custom designs.


Original Submission

Read more of this story at SoylentNews.

23:40

Security updates for Thursday LWN.net

Security updates have been issued by Debian (chromium, firefox-esr, lldpd, and zabbix), Fedora (ffmpeg, firefox, pdns-recursor, polkit, and thunderbird), Oracle (kernel and nodejs:14), Red Hat (nodejs:14, openvswitch2.17, openvswitch3.1, and pki-core:10.6), Slackware (mozilla), SUSE (nextcloud-desktop), and Ubuntu (exo, linux, linux-kvm, linux-lts-xenial, linux-aws, smarty3, and thunderbird).

23:23

Strange New Explanation for Why Quantum World Collapses Into Reality Lifeboat News: The Blog

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about the suggestion that horizons from black holes and the expansion of the universe cause the quantum collapse into reality.
Links:
https://arxiv.org/pdf/2301.00026.pdf.
#quantumphysics #blackhole #universe.

0:00 What this study is trying to solve.
2:05 Applying Einstein principles to Quantum Physics.
4:00 Do black holes server as observers?
5:00 What about the edge of the universe?
6:45 Does this prove universe is conscious? (no)

Support this channel on Patreon to help me make this a full time job:
https://www.patreon.com/whatdamath.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Space Engine is available for free here: http://spaceengine.org.
Enjoy and please subscribe.

23:22

Scientists discover a new circuit element, meminductor Lifeboat News: The Blog

Scientists have identified a new circuit element known as a meminductor. A circuit element is an electrical component used to help direct and control the flow of electricity through an electrical circuit. The classical three are known as the resistor, capacitor and inductor. Two additional circuit elements, the memristor and the memcapacitor, were only discovered in the past 15 years.

23:02

WhatsApp Introduces New Device Verification Feature to Prevent Account Takeover Attacks The Hacker News

Popular instant messaging app WhatsApp on Thursday announced a new account verification feature that ensures that malware running on a user's mobile device doesn't impact their account. "Mobile device malware is one of the biggest threats to people's privacy and security today because it can take advantage of your phone without your permission and use your WhatsApp to send unwanted messages,"

23:01

How we achieved a 6-fold increase in Podman startup speed Linux.com

By cutting unnecessary processes, you can realize near-real-time container startup, critical in cars and other time-sensitive applications.

Read More at Enable Sysadmin

The post How we achieved a 6-fold increase in Podman startup speed appeared first on Linux.com.

23:00

AMD Announces The Radeon PRO W7800/W7900 Series Phoronix

As the "world's first pro chiplet GPU", AMD today is announcing the Radeon PRO W7000 series as their first RDNA3-based professional offerings.

22:56

Re: ncurses fixes upstream Open Source Security

Posted by alice on Apr 13

having a patch that is possible to apply to ncurses would make this possible,
since otherwise it's not possible to patch anything without just updating to the
latest ncurses snapshot.

that said,

- ncurses doesn't keep any git (or whatever) history anywhere (to my knowledge),
so i don't know where this would even come from

- as someone that uses the latest snapshots, 20230401 works, but 20230408 breaks
some applications like...

22:54

Re: ncurses fixes upstream Open Source Security

Posted by Sam James on Apr 13

"Jonathan Bar Or (JBO)" <jobaror () microsoft com> writes:

Try emailing the distributions mailing list at lists.linux.dev too?

22:43

Canonical Livepatching Now Available For Ubuntu HWE Kernels Phoronix

Canonical announced today that their kernel livepatching service will now be available for their hardware enablement "HWE" kernels on Ubuntu Long-Term Support releases...

22:32

Google delivers secure open source software packages Help Net Security

Google has announced the Google Cloud Assured Open Source Software (Assured OSS) service, which aims to be a trusted source of secure open source packages, and the deps.dev API, which provides access to security metadata for 50+ million open source package versions. The Assured OSS service With Assured OSS, Google offers organizations the opportunity to integrate into their own developer workflows the same OSS packages Google uses and secures. Threat actors regularly attempt to compromise More

The post Google delivers secure open source software packages appeared first on Help Net Security.

22:02

Malicious ChatGPT & Google Bard Installers Distribute RedLine Stealer HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Watch out for compromised Facebook business pages offering fake and malware-infected installers for ChatGPT and Google Bard AI chatbot.

This is a post from HackRead.com Read the original post: Malicious ChatGPT & Google Bard Installers Distribute RedLine Stealer

22:00

Multiphysics Analysis and Reliability for 5G/6G Antenna System Design IEEE Spectrum



Making 5G/6G technology real requires an increased density of more complex electronic systems in smaller form factors. As 5G/6G proliferates into safety critical systems and infrastructure, such as autonomous vehicles and healthcare, reliability is paramount.

Engineers must determine the performance and the lifetime of the systems they are designing and deploying. The increased density of components increases the interdependency of design considerations. For example, electromagnetic performance can no longer be considered in isolation from thermal and mechanical performance as they impact each other and are interdependent. Thermal issues are now one of the primary failure modes for electronic systems.

Register now for this free webinar.


Studying antenna array and tower structural integrity, you need to account for electro-thermal effects and thermal impact on data coverage. This includes interference, optimizing antenna design, and performance under severe wind loads with critical angles of attack to incorporate mechanical effects in an integrated workflow to determine thermal stress-induced deformation at the PCB level or the more detailed solder ball level to random model vibration, drop test, and fatigue studies.

All can help estimate the complete system performance and reliability under various external circumstances. Ansys dedicated electronics reliability solutions can make lifetime predictions by computing the cumulative damage index, time to failure, and life curve.

What You Will Learn

  • Predict electrical performance drift under varying environmental conditions and thermal impact on RF link margin
  • Assess and evaluate thermal management systems for cost/reliability tradeoffs
  • Understand antenna deformation due to mechanical loads and structural specifications
  • Right-sizing of antenna system housings and support structures to meet reliability targets while minimizing size and weight

Who Should Attend?

CAE Analyst Mechanical Engineer Reliability Engineer RF Engineer

21:29

Holding Sirius Corporation Criminally Accountable schestowitz.com

Video download link | md5sum
Time for Sirius Management to Face Prison
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes of Sirius Open Source are very serious; weve come to the point now where its more or less a countdown ahead of arrests or class action lawsuit (or both)

TODAY we published a lot of material about Sirius Open Source and since recording the above video weve published a little more.

In light of what Standard Life told us last night (they sent a letter at night, which is unusual for firms that work 9 to 5), were now progressing the case against a company that defrauded GNU/Linux system administrators, Free software specialists, programmers and so on.

This is now a criminal matter. Several people need to be arrested.

The issue is further complicated by an NDA signed with the Gates Foundation (we dont even know the details of it). The principal fraudster now resides in Washington, the state. To get full accountability they will likely have to issue an extradition warrant (sent from authorities in the UK to the US). This adds a number of new dimensions, including the divorce. The financial fugitive has many liabilities in the UK. Some of these issues are discussed in length in the video above.

21:24

The Boss of Sirius Open Source and His Ex-Wife Should be Reunited Inside the Prison Cell Techrights

Video download link | md5sum 1b4fb43cbc2896727deb2c535fd72cc6
Time for Sirius Management to Face Prison
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes of Sirius Open Source are very serious; weve come to the point now where its more or less a countdown ahead of arrests or class action lawsuit (or both)

TODAY we published a lot of material about Sirius Open Source and since recording the above video weve published a little more.

In light of what Standard Life told us last night (they sent a letter at night, which is unusual for firms that work 9 to 5), were now progressing the case against a company that defrauded GNU/Linux system administrators, Free software specialists, programmers and so on.

The principal fraudster now resides in Washington, the state. To get full accountability they will likely have to issue an extradition warrant (sent from authorities in the UK to the US).This is now a criminal matter. Several people need to be arrested.

The issue is further complicated by an NDA signed with the Gates Foundation (we dont even know the details of it). The principal fraudster now resides in Washington, the state. To get full accountability they will likely have to issue an extradition warrant (sent from authorities in the UK to the US). This adds a number of new dimensions, including the divorce. The financial fugitive has many liabilities in the UK. Some of these issues are discussed in length in the video above.

21:22

Pakistani court utilizes ChatGPT-4 to grant bail in a juvenile kidnapping case Lifeboat News: The Blog

The court claimed that after posing a number of inquiries to the AI chatbot, it was pleased with the responses received.

A municipal court in Pakistan has announced its judgment using artificial intelligence technology, a first for the Asian country.

The case was processed by ChatGPT-4, OpenAIs cutting-edge AI chatbot, before the local judge announced the decision, Samaa reported on Wednesday.

21:22

OpenAI launches $20k Bug Bounty Program to make its products safer Lifeboat News: The Blog

The company is offering rewards for exceptional discoveries.

OpenAI, the creator of conversational chatbot ChatGPT, has announced a Bug Bounty program where users can report vulnerabilities, bugs, or security flaws and be financially rewarded for finding them. The company has announced rewards ranging from $200 to $20,000 depending on the severity of the flaw and teamed up with a popular bug-finding platform to streamline the process.

OpenAIs ChatGPT has ushered in a race for artificial intelligence (AI) models that provide comprehensive solutions to user queries and can even simulate intriguing imagery with the help of a few text prompts.


Sestovic/iStock.

While the technology is advancing at a breathtaking pace and producing some mind-boggling results, there are also concerns about these products safety. AI researchers like Stuart Russell have warned that unchecked, the rise of AI could result in a Chernobyl-like incident for the tech industry.

21:22

Robotics firm promises new robot masseuse will be different this time Lifeboat News: The Blog

Its not unusual for a company to try and innovate on an existing products or technology, but robotics firm Flexiv promises that its massaging robot wont be like the mechanical massagers of the past.

Robotic or mechanical messagers are hardly a new idea, but a robotics firm called Flexiv is hoping that its new robot masseuse will succeed where others have succeeded at becoming a novelty at best and an embarrassing disaster at worst.

Announced earlier this week on its website, Flexiv is debuting its Rizon 4 robot which has been developed to enable a fully automatic massage experience.

21:13

Bad News: Copyright Industry Attacks on the Internets Plumbing are Increasing and Succeeding SoylentNews

Bad news: copyright industry attacks on the Internet's plumbing are increasing and succeeding:

Back in October 2021, Walled Culture wrote about a ruling from a US judge. It concerned an attempt to make the content delivery network (CDN) Cloudflare, which is simply part of the Internet's plumbing, responsible for what flows through its connections. The judge rightly decided: "a reasonable jury could not at least on this record conclude that Cloudflare materially contributes to the underlying copyright infringement".

A similar case in Germany was brought by Sony Music against the free, recursive, anycast DNS platform Quad9. Like CDNs, DNS platforms are crucial services that ensure that the Internet can function smoothly; they are not involved with any of the sites that may be accessed as a result of their services. In particular, they have no knowledge of whether copyright material on those sites is authorised or not. Unfortunately, two regional courts in Germany don't seem to understand that point, and have issued judgments against Quad9. Its FAQ on one of the cases explains why this is a dreadful result for the entire Internet:

The court argues with the German law principle of "interferer liability" the so-called "Stoererhaftung", which allows holding uninvolved third parties liable for an infringement if they have in some way adequately and causally contributed to the infringement of a protected legal interest. If DNS resolvers can be held liable as interferers, this would set a dangerous precedent for all services used in retrieving web pages. Providers of browsers, operating systems or antivirus software could be held liable as interferers on the same grounds if they do not prevent the accessibility of copyright-infringing websites.

Now an Italian court has confirmed a previous ruling that Cloudflare must block certain online sites accused of making available unauthorised copies of material. That's unfortunate, since taken with the German court rulings it is likely to encourage the copyright industry to widen its attack on the Internet's plumbing, regardless of th...

21:10

New Python-Based "Legion" Hacking Tool Emerges on Telegram The Hacker News

An emerging Python-based credential harvester and a hacking tool named Legion is being marketed via Telegram as a way for threat actors to break into various online services for further exploitation. Legion, according to Cado Labs, includes modules to enumerate vulnerable SMTP servers, conduct remote code execution (RCE) attacks, exploit unpatched versions of Apache, and brute-force cPanel and

21:00

Custom Bluetooth Adapter Brings 1990s Car Phone Back Online Hackaday

A first-generation car phone connected to a piece of prototype board with a BlueTooth module

[Jeff Lau]s Mitsubishi 3000GT comes with all the essential features youd expect in a fancy sports car from 1993: pop-up headlights, movable spoilers, and a fully-functional telephone handset in the center console. The phone was fully functional until North Americas first-generation AMPS cellular network was shut down back in 2008, since then, it hasnt done much but show NO SVC on the display. That is, until [Jeff] decided to build a Bluetooth adapter that lets it connect to a modern smartphone.

The easy solution would have been to simply connect the handsets speaker and microphone to a standard Bluetooth headset, but that would have destroyed the 1990s aesthetic it had going on. So what [Jeff] did instead was construct a plug-in module that hooks up to the phones base station in the trunk and communicates directly with all the existing systems. That way, the phone works in exactly the same way it always did: the rad...

20:49

Standard Life Facilitated Fraud Against Free/Libre Software and GNU/Linux Technicians schestowitz.com

This is what they sent me in 2011 (other Free/libre software and GNU/Linux enthusiasts were also scammed this way):

Standard Life cover

Along with 7 pages in total:

Standard Life all

Summary: The pension fraud of Sirius Open Source was facilitated by Standard Life; the very large pension fund, which is based in Scotland, needs to pay reparations to many victims (we cannot even tell how many; these are colleagues who are unaware of whats going on) and the criminals need to be arrested (the fugitive in the United States needs to be extradited to face justice for his crimes)

20:48

Lenovo Yoga Laptops Getting Tablet Mode Switch Driver With Linux 6.4 Phoronix

For those with a Lenovo Yoga 2-in-1/convertible laptop, a tablet mode switch driver is set to be merged for Linux 6.4 to properly handle the tablet mode switching support for these devices while running the mainline Linux kernel...

20:44

Photographic Evidence of Standard Lifes Involvement in Fraudulent Pensions (Many Victims Affected) Techrights

This is what they sent me in 2011 (other Free/libre software and GNU/Linux enthusiasts were also scammed this way):

Standard Life cover

Along with 7 pages in total:

Standard Life all

Summary: The pension fraud of Sirius Open Source was facilitated by Standard Life; the very large pension fund, which is based in Scotland, needs to pay reparations to many victims (we cannot even tell how many; these are colleagues who are unaware of whats going on) and the criminals need to be arrested (the fugitive in the United States needs to be extradited to face justice for his crimes)

20:32

Intel oneVPL GPU Runtime 2023Q1 Adds AV1 Error Resilient Mode Phoronix

Days after releasing the Intel Media Driver 2023Q1, Intel's software engineers have now released oneVPL 2023Q1 as the updated quarterly release to this video processing library that is part of Intel's open-source oneAPI toolkit...

20:30

Fortinet fixed a critical vulnerability in its Data Analytics product Security Affairs

Fortinet addressed a critical vulnerability that can lead to remote, unauthenticated access to Redis and MongoDB instances.

Fortinet has addressed a critical vulnerability, tracked as CVE-2022-41331 (CVSS score of 9.3), in its Fortinet FortiPresence data analytics solution.

FortiPresence is a comprehensive data analytics solution designed for analyzing user traffic and deriving usage patterns.

Successful exploitation can lead to remote, unauthenticated access to Redis and MongoDB instances via crafted authentication requests.

A missing authentication for critical function vulnerability [CWE-306] in FortiPresence on-prem infrastructure server may allow a remote, unauthenticated attacker to access the Redis and MongoDB instances via crafted authentication requests. reads the advisory published by the vendor.

The vulnerability affects FortiPresence 1.2 all versions, FortiPresence 1.1 all versions, and FortiPresence 1.0 all versions. The company added that Cloud instances of FortiPresence are not impacted.

Fortinet addressed multiple vulnerabilities in its products as part of its April 2023 Vulnerability Advisories, below are the most severe ones:

  • CVE-2022-43955 (CVSS score of 8) FortiWeb XSS vulnerability in HTML generated attack report files
  • CVE-2022-27487 (CVSS score of 8.3) FortiSandbox / FortiDeceptor Improper profile-based access control over APIs
  • CVE-2022-41330 (CVSS score of 8.3) FortiOS & FortiProxy Cross Site Scripting vulnerabilities in administrative interface

Customers are recommended to update their instances as soon as possible.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

...

20:19

Pakistan-based Transparent Tribe Hackers Targeting Indian Educational Institutions The Hacker News

The Transparent Tribe threat actor has been linked to a set of weaponized Microsoft Office documents in intrusions directed against the Indian education sector to deploy a continuously maintained piece of malware called Crimson RAT. While the suspected Pakistan-based threat group is known to target military and government entities in the country, the activities have since expanded to include the

Why Shadow APIs are More Dangerous than You Think The Hacker News

Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial data loss. For those that aren't familiar with the term, shadow APIs are a type of application programming interface (API) that isn't officially documented or supported.  Contrary to popular belief, it's unfortunately all too common to have APIs in production that no one on

20:01

LinkedIn now allows you to verify your workplace Help Net Security

To combat the surge of fake LinkedIn accounts in recent years, Microsoft has introduced Entra Verified ID, a new feature that allows users to verify their workplace on the business-focused social media platform. Verified ID automates verification of identity credentials (Source: Microsoft) How to verify your workplace on LinkedIn With Entra Verified ID, organizations can create customized digital employee IDs that employees can use to prove their current employment with the firm. LinkedIn users can More

The post LinkedIn now allows you to verify your workplace appeared first on Help Net Security.

19:58

Servo Project To Focus On Their "Layout 2020" Engine Phoronix

Servo as the browser engine started at Mozilla but now developed as a Linux Foundation project has been maintaining two separate layout engines and moving forward they hope to be able to focus on the newer "Layout 2020" engine and fill in its missing gaps...

19:22

Playing table tennis against robotic player makes human brain work harder Lifeboat News: The Blog

To analyze the human players brain, the team designed a cap with over 100 electrodes mounted on a backpack-sized device.

A one-of-a-kind study documents how a human brain reacts when playing table tennis against a robotic opponent.

Scanning the brain activity with electrodes.


Frazier Springfield.

This study by the University of Florida scientists provides intriguing insights into human brain activity. The findings revealed that human players brains reacted differently to opponents (other humans and ball machines). And playing against a robotic opponent was much more difficult for the human brain.

19:22

Ultra-luminous X-ray sources defy Eddington limit and unlock universal secrets Lifeboat News: The Blog

The mystery of ultra-luminous X-ray sources (ULXs) and their astonishing brightness has been partially unraveled through a recent study utilizing NASAs NuSTAR.

Scientists have long been perplexed by ultra-luminous X-ray sources (ULXs), cosmic objects that emit about 10 million times more energy than the Sun and appear to break the Eddington limit a physical boundary that determines the maximum brightness of an object based on its mass. In a groundbreaking study published in The Astrophysical Journal, researchers have confirmed that these extraordinary light emitters surpass the Eddington limit, potentially due to their strong magnetic fields.


The effect of Eddington limit and magnetic fields

The Eddington limit plays a crucial role in determining the balance between the outward push of photons and the inward pull of an objects gravity. When an object reaches the Eddington limit, its light pushes away any gas or material falling toward it, thus controlling its brightness. The study focused on the ULX M82 X-2, a neutron star that was found to be stealing about 9 billion trillion tons of material from a neighboring star annually. The researchers calculations confirmed that M82 X-2 exceeds the Eddington limit.

The new study supports an alternative hypothesis that suggests strong magnetic fields can distort atoms into elongated shapes, reducing the photons ability to push atoms away and ultimately increasing an objects maximum brightness. By examining more ULXs, scientists may be able to further understand the role of magnetic fields in their extraordinary luminosity.

19:22

Miniature solar flares made in lab offer insight into high-speed energetic particles Lifeboat News: The Blog

The team created a vacuum chamber equipped with twin electrodes to simulate the coronal loop phenomenon.

Coronal loops are arcs of curving plasma that appear above the Suns surface. These loops are so powerful that they can travel up to 100,000 kilometers above the surface of the Sun and last for minutes to hours.

Understanding coronal loops.


NASA

However, there are numerous underlying factors that scientists are attempting to decipher in relation to coronal loops. With that stated, Caltech scientists have created a tiny coronal loop in a laboratory, which could help them closely understand the suns dynamics.

19:08

New Data Out From ONS (Week 12): Number of Deaths in England and Wales 16% Higher Than Before the Pandemic schestowitz.com

Some new numbers this morning*.

2019***: 10,402 deaths
2014-19 average***: 10,456 deaths
2022**: 10,747 deaths
2023**: 12,052 deaths

(12052-10402)/10402*100=15.86.

_____
* As per 9:40 AM (earlier than 10, the usual time). Was supposed to be out on Tuesday, but this time it got delayed till 13 April 2023 (due to Easter/Bank Holiday).

ONS new week 12

** From ONS (above).

National deaths week 12

*** From ONS (historic)

National deaths week 12 in 2019

19:07

Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign The Hacker News

The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its tools and tactics as part of a long-running campaign called DeathNote. While the nation-state adversary is known for persistently singling out the cryptocurrency sector, recent attacks have also targeted automotive, academic, and defense sectors in Eastern Europe and other parts

18:54

How to Combat Insider Threats Security Affairs

Knowing that insider threats are a risk is one thing. Knowing how to fight them off is entirely another.

Dealing with issues of insider cyber risk can be different and nuanced. Its hard to admit that someone from within the company could not be who they say they are, and it takes a group effort to get these types of programs off the ground.

However, over one-third of businesses are impacted by insider threats every year, and US businesses face about 2.500 internal security breaches in the aggregate per day. These cases are out there. No company with any zero-trust initiatives can responsibly look the other way.

The question isnt why to build out an insider threat prevention program: its how.

The origin and impact of insider risk

To understand best how to combat them, it helps to know where insider threats originate and why.

As cited in TechJury, more than two out of three insider threats are caused by negligence. Fraud, financial gain, and intellectual property theft are the primary motivators, and trusted business partners typically account for 15-25% of the cases across all industries. Nine in ten result from human error.

What starts as a careless, disgruntled, or simply ignorant employee maneuver can result in credential theft, data loss, and unforeseen damage. These arent insignificant encounters: Credential theft can cost upwards of $850,000 per incident, and companies are now spending 60% more than they did three years ago combatting the effects of insider risk. In most cases (85%), companies cant even definitively determine the cost of the overall damage caused by these types of incidents.

Fortunately, some great products are out there to help organizations get a handle on the insider threat problem and make inroads into securing their digital enterprise from the inside out.

The top insider threat software products of 2023

Data Detection and Response (DDR) company Cyberhaven offers valuable insights into some of the top security tools designed with inside threats in mind. For a quick rundown, they are:

  • Aware | This helps monitor messaging apps like Slack and Microsoft Teams
  • Exabeam | A mature vendor that leverages SIEM and XDR to spot internal anomalies
  • Gurucul | Baselines user behavior using AI-based tools and leverages social media data...

18:34

Anti-Piracy Mega-Firewall Could Render Italian ISPs Liable For Over-Blocking TorrentFreak

Pirate FireLast month a bill crafted to crack down on pirate IPTV services was unanimously approved by Italys Chamber of Deputies.

If passed by the Senate, broadcasters through telecoms regulator AGCOM will have new powers to compel internet service providers to block pirate streams in a matter of minutes, potentially seconds. Site-blocking measures to deal with piracy are nothing new in Italy, but by narrowing the blocking window, the window for correcting errors is narrowed too.

Italys Mega-Firewall

The Association of Italian Internet Providers (AIIP) represents the interests of small to medium-sized ISPs in Italy. Given that ISPs are already required to implement AGCOMs blocking instructions under the current regime, it follows that they will also have key responsibilities under the proposed rapid blocking system.

AIIP recently revealed that it had sent a memorandum to the authorities detailing its concerns over the current proposals, which are already in the final stages before becoming law.

President of AIIP, Giovanni Zorzoni, says that the objective appears to be the creation of a mega-firewall managed by AGCOM which will have the legal authority to compel internet service providers to implement it, regardless of the inherent risks.

The creation of a homogeneous infrastructure based on a synchronous filtering system, capable of interfacing simultaneously with the operators offering access to the Internet, with the CDNs and with the Cloud operators, constitutes a single susceptible point of failure to undermine the security and resilience of national networks, Zorzoni warns.

Critical Need to Protect Critical Infrastructure

AIIP says it has always been in favor of copyright protection but says the speed at which the blocking proposals are being pushed through is a cause for concern. AIIP says that in advance of the Senates forthcoming examination, it is seeking a reassessment to ensure an adequate balance between the protection of intellectual property on one hand, and the protection of the internet ecosystem on the other.

AIIP reports progress in the form of a government commitment to evaluate the preparation of a whitelist of IP addresses and servers for the root zone of the Domain Name System (DNS) that can not be included in the blocking program. Since this would minimize the risks of erroneously disabling critical systems, AIIP hopes the government will fully implement t...

18:27

3CX Knew its App Was Flagged as Malicious but Took No Action for 7 Days SoylentNews

https://arstechnica.com/information-technology/2023/03/3cx-knew-its-app-was-flagged-as-malicious-but-took-no-action-for-7-days/

The support team for 3CX, the VoIP/PBX software provider with more than 600,000 customers and 12 million daily users, was aware its desktop app was being flagged as malware but decided to take no action for a week when it learned it was on the receiving end of a massive supply chain attack, a thread on the company's community forum shows.

"Is anyone else seeing this issue with other A/V vendors?" one company customer asked on March 22, in a post titled "Threat alerts from SentinelOne for desktop update initiated from desktop client." The customer was referring to an endpoint malware detection product from security firm SentinelOne. Included in the post were some of SentinelOne's suspicions: the detection of shellcode, code injection to other process memory space, and other trademarks of software exploitation.


Original Submission

Read more of this story at SoylentNews.

18:00

What Can You Do With Discarded Fish Aggregation Devices Hackaday

Often we bring you projects at the end of their trajectory so that you can marvel at a job well done, but sometimes we point you instead to the start of the story. Such is the case with [Brett Smith]s investigation of discarded fish aggregation buoys, referred to as FADs. These 700-plus dollar devices are deployed in the ocean in the thousands by commercial fishing fleets, and most are not recovered. Hes looking at them from the point of view of re-using their technology in the marine conservation business.

His progress has been documented in a series of short YouTube videos, starting with an introduction that weve placed below the break. So far hes gone on to a complete teardown, and then a detailed look at the PCB. Inside they have a solar charger for a bank of NiCd cells, an echo sounder, a GPS receiver, and an Iridium satellite modem allowing the device to phone home. Theres certainly plenty in there to experiment with, including a few slightly exotic parts, so keep an eye on his channel as were sure to see more.

These devices have never made it to Hackaday before, but we have seen...

17:00

Were Recent Bank Failures the Result of Lax Regulation? In a Word, No Terra Forming Terra





Of course not.  Regulation only applies to those with the least at stake.  Otherwise bribery always rules the day.


The proper answer for too big to fail is direct dismemberment into small and healthy along with a limit on mergers for the industry.  All that easily sheds managemew3nt risk.

what it does not shed is policy speculation, like allowing brokers and banks to work together.  It has always been a serious problem.

It is curious how Canada continues to diverge in its banking and real estate experience.



Were Recent Bank Failures the Result of Lax Regulation? In a Word, No



04/08/2023



With the recent collapse of Silicon Valley Bank and Signature Bank, financial markets all around the world are on edge. Despite promises from the Federal Reserve that a soft landing of the economy is on the way, all signs point to an imminent crash landing! While the full consequences of these bank failures are yet to fully p...

The Culling of Mankind Terra Forming Terra


Let us stop been oblique in terms of what the NWO is all about.  This scheme is all about an actual cull of humanity.  for most of us, it is impossible to think this way, but  they do.  i have come across it rarely but there are a small number of folks who have convinced themselves that they are right to think this way.  They are actually entitled and stupid, but do not ever accept that at all.


Some are even apparently well educated, but let us leave all that for another day.  Obviously they believe something pretty simple in the face of shifting evidence and contrary opinion.

Just what did the CCP think they were doing when they created the one child rule.  Truth is that two may almost have been safe.  And this actually happened before they opened up.  Today they face a demographic collapse that is actually unavoidable.  It will actually shoot below 500,000,000 and lower with no assurance they can ever arrest it.

The rest of the world has the same problem but it can largely be fixed. Japan has so far shown us what does not work.  what works is vigorous child support for young mothers starting after highschool completion and ending after four children or the age of 26.  That focuses the mind and eliminates  financial issues.

This is surely coming.



The Culling of Mankind: Government Reports & Pfizer Documents reveal a Sinister Agenda exists to Depopulate the Planet through COVID Vaccination


...

Analysis: COVID Vaccines Caused 300,000 Excess Deaths in 2022 Alone Terra Forming Terra


2022 gave us our first full snapshot of just what is going on.  Now the BIG questio is what happens this year and next.  At some point the death rate must fall below the original level because folks are dying much sooner.

I certainly do not want to see it actually climb long after the JAB.  We have serious losses from the JAB and it includes way too many young folks.

We also have four times this number in terms of disabilities and a wopping one hundred times this number in actual bad reactions.  It is likely still only around twenty percent of all those vaccinated which is huge. If all those folks have also had their immune system degraded then we will have an invisible pandemic at work as that works out.

So far though, the negative effects do appear to be declining and i simply lack real proof or even confirmation in the science.


Analysis: COVID Vaccines Caused 300,000 Excess Deaths in 2022 Alone



Apr 1 2023

https://www.theepochtimes.com/health/analysis-covid-vaccines-caused-300000-excess-deaths-in-2022-alone_5163264.html?

Every day Dr. McCullough and I speak to people who have been injuredor have a family member who has been killedby one of the COVID-19 vaccines. Almost every day, McCullough examines one or more patients with vaccine injuries in his...

New Research Rewrites the History of American Horses Terra Forming Terra






The advent of the horse in North America has always been an obvious Spanish event, and our own experience with mustang herds informs us just how it always happened.


What makes it all interesting is that a full sized riding horse evolved more recently than we assume. Remember chariots?  We used those until far too recently and surely that meant smaller horses generally.  I do think that horsemanship was on horses that were mostly pony sized and great for pulling a chariot.

Yet Bronze Age Europe used red deer for riding and for dairy. and in Ireland even until Roman times.  Those same red deer were used in Georgia as well agas\in providing confirmation of the Great Circle Copper trade connecting Ireland and Georgia.  We obviously moved deer stock, so why not horses?  Or cattle for that matter?

The likely answer is that irish culture used the deer and was a late comer to both cattle and horse husbandry.  After all Columbis had over a thousand years of additional work with these animals.  It certainly was not technology when a rope was good enough for a rider on a mustang.

The horse was introduced deliberately by natives and escapes did the reast in the great plains and please not that they thrive to this day and far better even than our Bison.


New Research Rewrites the History of American Horses

Native Americans spread the animals across the West before Europeans arrived in the region, archaeological evidence and Indigenous knowledge show




April 3, 2023


New research suggests Native Americans used horses of European descent long before colonizers arrived in the American West. Joe Sohm / Visions of America / Universal Images Group via Getty 

...

15:45

Open Source is Fueling the Future of Nuclear Physics SoylentNews

This once secretive scientific field is embracing openness in a big way:

The words "nuclear physics" tend to conjure images of heavily guarded laboratories or trench-coated spies whispering to each other on park benches and exchanging briefcases full of file folders stamped "Classified: Top Secret." But despite this reputation for secrecy, today's nuclear scientists embrace openness. And it's paying off.

[...] Many nuclear science organizations have released open source software in recent years, which is a big change from business as usual in the field. Though CERN, which focuses on fundamental particle physics rather than energy generation, is the birthplace of the web and has long embraced open source, other institutions have historically been less open. "There's a history of secrecy in the field. Most fusion and fission software used to be proprietary," says Paul Romano, the project lead for OpenMC and a computational scientist working in nuclear fusion at Argonne National Laboratory. "But as open source has exploded over the past decade, it plays an increasingly important role in research, both in the public and private sectors."

Despite open source's many benefits, it took time for the nuclear science field to adopt the open source ethos. Using open source tools was one thingPython's vast ecosystem of mathematical and scientific computing tools is widely used for data analysis in the fieldbut releasing open source code was quite another.

[...] Many of these projects that started with nuclear science in mind are applicable to just about any field that benefits from using supercomputers. MFEM, for example, is also used in LLNL's cardiac simulation toolkit Cardioid, its crystal plasticity application ExaConstit, and its thermomechanical simulation code Serac. It is also heavily used by the broader scientific community, including industry and academia, in applications such as MRI research at Harvard Medical School, and quantum computing hardware simulation at Amazon. MOOSE is widely used outside of the nuclear field, with applications in areas such as groundwater modeling and other geoscience use cases. During the early days of the Covid-19 pandemic, researchers at LLNL used Merlin to anticipate outbreaks and Maestro for antibody modeling.

...

15:12

ChatGPT Keynote Spark Festival April 2023 Social Network by Laurel Papworth

Im speaking at Spark Festival in April 2023 on AI, ChatGPT, MidJourney, and other artificial intelligence information.

Tickets are here https://sparkfestival.co/2022-program/view/904/ai-is-my-copilot

On 26th April well look at ChatGPT, MidJourney, Bard and other AI. What Prompts and modifiers to use; when to use AI and when not to. Also jobs impacted and integrations (API) with business tools. In Chippendale, a free event as part of Spark Festival.

More Info and TICKETS: https://sparkfestival.co/2022-program/view/904/ai-is-my-copilot

TRANSCRIPT OF TRAINING EVENT INVITATION: AI AND CHATGPT SYDNEY

Hello and welcome! On the 26th of April in Sydney in Chippendale. Im going to be speaking about artificial intelligence like ChatGP, Dall-e, Midjourney, and others, and when to use them, when not to use them. Were going to look at the key features that you could consider accessing and also diving down or drilling down, I should say, into prompts and modifiers and things like that. Im going to talk about the jobs that will be most impacted by AI from the CEO through to other staff. How to ensure that if you want to, you can jobshare and copilot with the hardest working, smartest, most competent colleague that youll ever have. Im very interested in APIs, particularly OpenAIs APIs, ChatCPT APIs, and how they can integrate with your accounting system, your CRM (your customer relationship management system) and with Google Docs and Google spreadsheets. Obviously, Google has Bard, but you can add ChatGPT to Google Docs as well as Googles own LLM. Im going to talk about the future, a little bit of AI. Obviously, theres some interesting things happening there with regulations and countries banning AI and things like that. I think itll be an interesting evening for those of you that are wondering what AI is or what is ChatGPT, and how will it impact your industry sector, your schools and family, the economy, and anything else that it wants to impact....

15:08

[Meme] The Fraud-o-mat Techrights

Standard Life: Write some text and lie over the phone for 3 months; for almost 40 days to make progress

Summary: Pension-Fraud-as-a-Service (PFaaS) is sound business; Standard Life profited from facilitating pension fraud at Sirius Open Source; its a profound problem when financial institutions exist to maximalise profits, which means that they have greater incentive to cover up abuses, more so when complicity can be demonstrated

15:01

The Kodi Foundation - 400,635 breached accounts Have I Been Pwned latest breaches

In February 2023, The Kodi Foundation suffered a data breach that exposed more than 400k user records. Attributed to an account belonging to "a trusted but currently inactive member of the forum admin team", the breach involved the administrator account creating a database backup that was subsequently downloaded before being sold on a hacking forum. The breach exposed email and IP addresses, usernames, genders and passwords stored as MyBB salted hashes. The Kodi Foundation elected to self-submit impacted email addresses to HIBP.

15:01

Standard Life Covers Up Its Role in Pension Fraud, Lies to the Victims Techrights

In their own words (lies or contradictions included):

Standard Life fraud

Summary: After almost 40 days Standard Life finally gets back (in writing) to victims of the fraud at Sirius Open Source; the response is designed to help Standard Life wash its hands without actually tackling fraud committed in its name (and with documents produced by Standard Life, not forged)

HOURS after I prodded Standard Life by E-mail they finally got back to me (and others) with something more concrete. As expected, they did nothing to actually solve the problem and in the process they resorted to lying to us about the dates.

I got response from standard life, one former colleague told me.

My former colleague noticed a glaring anomaly in their narrative/story.They have stated I can confirm Standard Life has administered a pension scheme for Sirius Corporation Plc from July 2009 until December 2012. Unfortunately, there is no record of you joining the scheme during that time and it would not have been possible to join after the Scheme closed in 2012.

Notice the above. They just used templates. They barely investigated anything on an individual basis, yet in their PDF they made it seem like it was tailored to the recipient, including individual passwords. All they changed was the name of the person and maybe the case number.

My former colleague noticed a glaring anomaly in their narrative/story. This seems to be slightly different to what you have been told, the former colleague said, as I think you said it was moved in 2018.

2016 was said repeatedly to me by the manager, on several occasions. So either the above letter contains a lie or the managers lied to me repeatedly over the telephone.

Here is the message I received:

Dear Dr Schestowitz

Ive completed my investigation of your concerns since I last contacted you on 29 March 2023. Thank you for your patien...

15:00

Autopsy Of A Drifting Thumbstick Reveals All Hackaday

Analog sticks have become a core part of modern video game controllers. They also routinely fail or end up drifting, consigning expensive controllers to the garbage. [sjm4306] recently did a repair job on an Oculus VR gaming controller with drifting analog sticks, and decided to do an autopsy to figure out what actually went wrong.

...

14:55

Listen to the "Everything Epigenetics" podcast with our Hannah Went on Apple, Spotify, and YouTube. Lifeboat News

Listen to the "Everything Epigenetics" podcast with our Hannah Went on Apple, Spotify, and YouTube. Connect with the show on Facebook and Instagram.

14:47

Standard Life Profits From Facilitating Pension Fraud schestowitz.com

In their own words (lies or contradictions included):

Standard Life fraud

Summary: After almost 40 days Standard Life finally gets back (in writing) to victims of the fraud at Sirius Open Source; the response is designed to help Standard Life wash its hands without actually tackling fraud committed in its name (and with documents produced by Standard Life, not forged)

HOURS after I prodded Standard Life by E-mail they finally got back to me (and others) with something more concrete. As expected, they did nothing to actually solve the problem and in the process they resorted to lying to us about the dates.

I got response from standard life, one former colleague told me.

They have stated I can confirm Standard Life has administered a pension scheme for Sirius Corporation Plc from July 2009 until December 2012. Unfortunately, there is no record of you joining the scheme during that time and it would not have been possible to join after the Scheme closed in 2012.

Notice the above. They just used templates. They barely investigated anything on an individual basis, yet in their PDF they made it seem like it was tailored to the recipient, including individual passwords. All they changed was the name of the person and maybe the case number.

My former colleague noticed a glaring anomaly in their narrative/story. This seems to be slightly different to what you have been told, the former colleague said, as I think you said it was moved in 2018.

2016 was said repeatedly to me by the manager, on several occasions. So either the above letter contains a lie or the managers lied to me repeatedly over the telephone.

Here is the message I received:

Dear Dr Schestowitz

Ive completed my investigation of your concerns since I last contacted you on 29 March 2023. Thank you for your patience.

Ive attached a letter which outlines our position [...]

If you have any questions, or you are having a problem accessing the letter, please let me know.

Yours sincerely

???????? ??????????????

Customer Relations

slcomplaints@standardlife.com

The name is in the image, but we dont want that in text.

This is more like a cover-up, not an investigation. Did it take them a...

14:35

ChatGPT Security: OpenAI's Bug Bounty Program Offers Up to $20,000 Prizes The Hacker News

OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to ensure its systems are "safe and secure." To that end, it has partnered with the crowdsourced security platform Bugcrowd for independent researchers to report vulnerabilities discovered in its product in exchange for rewards ranging from "$200 for low-severity findings to up to

14:30

The new weakest link in the cybersecurity chain Help Net Security

It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of the internet made people more connected than ever. Attackers capitalized on that fact and targeted employees directly to gain access to an organization. Leveraging highly automated methods (such as phishing that redirects users to compromised websites), attackers must only fool one employee to start a catastrophic attack against the entire organization. These methods are extremely More

The post The new weakest link in the cybersecurity chain appeared first on Help Net Security.

14:00

5 steps to building NSA-level access control for your app Help Net Security

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a lot to say about it. Especially when it comes to the biggest access management pitfall developers make. In 2021 OWASP listed Broken Access Control as their A01 item on the list of Top 10 web application security risks. The 2020 Verizon data breach investigations report states that At least two-thirds of cyberattacks are now focused More

The post 5 steps to building NSA-level access control for your app appeared first on Help Net Security.

13:59

Linux Jobs in the UK Mailing List Censors Message Cautioning About Fraud in Company That Advertises Job (Sirius Open Source) Techrights

Did Sirius pressure the administrator to start censoring (gagging) its victims?

Alexander Howells trolling

Summary: Victims of fraud committed by Sirius Open Source speak out in response to a job ad (workers are fleeing in droves, creating severe vacuum) and the administrator of the list resorts to censorship

Almost 24 hours have passed and the following message was not approved by the moderator, so Im reproducing it here:

Re: [linuxjobs] Helpdesk Operator roles at Sirius

> When I saw the praise for Sirius I did cringe to myself because I also find
> them to be a scummy company. I thought Id avoid responding, because
> frankly life is too short. However, this veiled threat of libel is simply
> ridiculous, so now I am going to respond.
>
> The reason I find them scummy is because I worked on a project with them
>> 10 years ago, and they simply didnt pay me and ignored reminders to pay
> the invoice. The project was ultimately cancelled as the client changed
> their mind, so I guess Sirius thought they didnt need to pay me.
>
> It wasnt even a huge sum of money, but it was enough to totally burn their
> reputation with me. So yeah, if they want to sue me for libel, bring it
> the fuck on.

Hi Dave,

These tactics arent new. Only a week after I had resigned I received a threatening and legally-invalid letter from the CEO telling me to remove any criticism of the company (published after I already resigned).
http://techrights.org/wiki/Sirius_Open_Source#Attempts_to_Censor_Facts
Last month the above-mentioned CEO abruptly left the company and in recent weeks he worked hard to hide all traces of him ever working for Sirius:
http://techrights.org/2023/03/13/sirius-deleted-entirely/
http://techrights.org/2023/03/21/sirius-open-source-purged/
Today: http://techrights.org/2023/04/12/sirius-no-more/
It is imperative that people understand what Sirius really is to prevent this mailing list being leveraged to groom future victims.

Kind regards,

13:30

Technology investments feel the impact of weakening economy Help Net Security

For the fifth consecutive month, IDC has lowered its 2023 forecast for worldwide IT spending as technology investments continue to show the impact of a weakening economy. 2023 forecast for worldwide IT spending In its monthly forecast for worldwide IT spending growth, IDC projects overall growth this year in constant currency of 4.4% to $3.25 trillion. This is slightly down from 4.5% in the previous months forecast and represents a swing from a 6.0% growth More

The post Technology investments feel the impact of weakening economy appeared first on Help Net Security.

13:24

The Web Site Its FOSS Is Not Always FOSS (Sometimes Actively Harmful to FOSS) Techrights

Summary: Its FOSS changed editorial control some time ago; two of the main authors are barely active anymore and it shows (loss of direction). Its not the first such fluke. It keeps happening. Why promote (1) Microsoft and (2) proprietary stuff in a site called Its FOSS? What message does that send to FOSS proponents?

How to Connect GitHub to VS Code [Step by Step]: GitHub is proprietary software. VS Code is proprietary spyware. Both are controlled by a company that viciously attacks Open Source in a number of ways. Why is a site called 'It's FOSS' publish such stuff? Seems contrary to its raison detre.

Its FOSS: Is it still for FOSS? As shown weeks ago (E-mail and Webform) to the sites editors and founder, there was a push to promote Microsofts proprietary chaffbot, in effect leading people away from FOSS and promoting anti-GPL territories. Hours ago there was this piece entitled How to Connect GitHub to VS Code [Step by Step] (they should instead guide readers away from these)

How would we feel about Greenpeace publishing an article, how to make the most out of coal?

13:00

DDoS alert traffic reaches record-breaking level of 436 petabits in one day Help Net Security

With over one billion websites worldwide, HTTP/HTTPS application-layer attacks have increased by 487% since 2019, with the most significant surge in the second half of 2022, according to NETSCOUT. The dynamic nature of the DDoS threat landscape Much of the increase comes from the pro-Russian group Killnet and others that explicitly target websites. Attacks of this nature preceded the Ukraine invasion, knocking out critical financial, government, and media sites. DDoS attacks threaten organizations worldwide and More

The post DDoS alert traffic reaches record-breaking level of 436 petabits in one day appeared first on Help Net Security.

12:58

The Hottest New Climate Technology is Bricks SoylentNews

Heat batteries could help cut emissions by providing new routes to use solar and wind power:

A handful of startups think bricks that hold heat could be the key to bringing renewable energy to some of the world's biggest polluters.

Industries that make products ranging from steel to baby food require a lot of heatmost of which is currently generated by burning fossil fuels like natural gas. Heavy industry makes up about a quarter of worldwide emissions, and alternative power sources that produce fewer greenhouse gases (like wind and solar) can't consistently generate the heat that factories need to manufacture their wares.

Enter heat batteries. A growing number of companies are working to deploy systems that can capture heat generated by clean electricity and store it for later in stacks of bricks. Many of these systems use simple designs and commercially available materials, and they could be built quickly, anywhere they're needed. One demonstration in California started up earlier this year, and other test systems are following close behind. They're still in early stages, but heat storage systems have the potential to help wean industries off fossil fuels.

One key to heat batteries' potential success is their simplicity. "If you want to make it to giant scale, everybody ought to agree that it's boring and reliable," says John O'Donnell, CEO of California-based heat storage startup Rondo Energy

Many industrial processes run 24 hours a day, so they'll need constant heating. By carefully controlling the heat transfer, Rondo's system can charge quickly, taking advantage of short periods when electricity is cheap because renewable sources are available. The startup's heat batteries will probably require about four hours of charging to be able to provide heat constantly, day and night.

Read more of this story at SoylentNews.

12:50

FSF: Googles Decision to Deprecate JPEG-XL Emphasises the Need for Browser Choice and Free Formats Techrights

This work is licensed under a Creative Commons Attribution-No Derivative Works 3.0 license (or later version) Original from FSF

Whether its through the millions of dollars Google has funneled into development and advertising or the convenience that it offers users in exchange for freedom, the fact remains that Google Chrome is the arbiter of web standards. Firefox, through ethical distributions like GNU IceCat and Abrowser, can weaken that stranglehold. Googles deprecation of the JPEG-XL image format in February in favor of its own patented AVIF format might not end the web in the grand scheme of things, but it does highlight, once again, the disturbing
amount of control it has over the platform generally.

Part of Googles official rationale for the deprecation is the following line: There is not enough interest from the entire ecosystem to continue experimenting with JPEG-XL. Putting aside the
problematic aspects of the term ecosystem, let us remark that its easy to gauge the response of the entire ecosystem when you yourself are by far the largest and most dangerous predator in said ecosystem. In relation to Googles overwhelming power, the average web user might as well be a microbe. In supposedly gauging what the ecosystem wants, all Google is really doing is asking itself what Google wants. If we take their contribution in turning the web into the WWWorst App Store seriously, then we understand what Google really wants. Google wants to do whats best for its own predatory interests, not whats best for the web.

While we cant link to Googles issue tracker directly because of another freedom issue its use of nonfree JavaScript were told that the issue regarding JPEG-XLs removal is the second-most starred issue in the history of the Chromium project, the nominally free basis for the Google Chrome browser. Chromium users came out of the woodwork to plead with Google not to make this decision. It made it anyway, not bothering to respond to users concerns. Were not sure what metric its using to gauge the interest of the entire ecosystem,...

12:30

Fleet MDM platform provides mobile workstation security with GitOps and workflow automation Help Net Security

Fleet has revealed a new programmable MDM, designed to give medium-to-large organizations control of remote workstation security with unsurpassed GitOps and workflow automation. Fleets availability as an open-source MDM not only makes it more accessible to organizations working to reduce costs, but also allows users to configure the platform to their own needs without having to pay additional fees or experiencing delays. Providing support for macOS, Windows, Linux and ChromeOS, Fleet can be easily configured More

The post Fleet MDM platform provides mobile workstation security with GitOps and workflow automation appeared first on Help Net Security.

12:25

Searchlight Cyber launches Stealth Browser for secure dark web access Help Net Security

Searchlight Cyber has launched Stealth Browser, a virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, without risk to themselves or their organization. Stealth Browser is an enhancement to Searchlights Cerberus investigation platform, which is used by law enforcement agencies, enterprises and MSSPs to uncover criminal activity on the dark web. The dark web is a critical source of intelligence for cybersecurity professionals, but accessing it carries risks for the More

The post Searchlight Cyber launches Stealth Browser for secure dark web access appeared first on Help Net Security.

12:15

Binarly Transparency Platform identifies vulnerabilities and malicious threats in code Help Net Security

Binarly has released the Binarly Transparency Platform, delivering transparency for device supply chains enabling device manufacturers and endpoint protection products to analyze both firmware and hardware to identify vulnerabilities, misconfigurations, and malicious code implantation. The Binarly Transparency Platform is designed to identify vulnerabilities and malicious threats in code, seamlessly integrating as a security component of an SDLC or CI-CD pipeline or further down the supply chain. The platform takes security to the next level by More

The post Binarly Transparency Platform identifies vulnerabilities and malicious threats in code appeared first on Help Net Security.

12:10

Regula updates Face SDK to protect users against different attack vectors Help Net Security

Regula has redesigned Face SDK face liveness detection technology and offers a balance between a simple UX and high reliability by using the zero-trust concept. Every session has its own unique parameters that cannot be reused by fraudsters for tampering, so the enrollment process is more accurate and fraud-resistant. Exhaustive sets of checks are executed on a backend to protect against different attack vectors: printed photo, mask, screen replay, and so on. At the same More

The post Regula updates Face SDK to protect users against different attack vectors appeared first on Help Net Security.

12:00

Theres Cash in Them Old Solar Panels Hackaday

The first solar panels may have rolled out of Bell Labs in the 1950s, with major press around their inconsistent and patchy adoption in the decades that followed, but despite the fanfare they were not been able to compete on a price per kilowatt compared to other methods of power generation until much more recently. Since then the amount of solar farms has increased exponentially, and while generating energy from the sun is much cleaner than most other methods of energy production and contributes no greenhouse gasses in the process there are some concerns with disposal of solar panels as they reach the end of their 30-year lifespan. Some companies are planning on making money on recycling these old modules rather than letting them be landfilled.

Typical solar panels are encased in glass and waterproofed, which makes recycling them somewhat of a challenge, but there are a lot of valuable materials in them that are worth recovering, including silver and copper. Even silicon and aluminum are profitable to recover, and these companies have developed specialized (but secret and proprietary) processes to recover them as efficiently as possible. As [Jon Hurdle] notes in the linked article, another major concern with aging panels that...

11:29

NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 13 Apr, 2023 1:29:55 UTC

The new edition of Off The Hook from 04/12/2023 has been archived and is now available online.

The leaked Ukraine war documents, tracing the timeline of the leak, document alterations, debating the motivations of the source of the leak, the government investigation, more wayward documents, the surprising history of 2600 Magazine according to Google Bard, NPR labeled as "state affiliated media" on Twitter.

10:28

[$] LWN.net Weekly Edition for April 13, 2023 LWN.net

The LWN.net Weekly Edition for April 13, 2023 is available.

10:14

Brace Yourself for a Tidal Wave of ChatGPT Email Scams SoylentNews

Thanks to large language models, a single scammer can run hundreds or thousands of cons in parallel, night and day, in every language under the sun:

Here's an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or click on the link than the usual spam. It's an interesting experiment, and the results are likely to vary wildly based on the details of the experiment.

But while it's an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. Today's human-run scams aren't limited by the number of people who respond to the initial email contact. They're limited by the labor-intensive process of persuading those people to send the scammer money. LLMs are about to change that.

[...] Long-running financial scams are now known as pig butchering, growing the potential mark up until their ultimate and sudden demise. Such scams, which require gaining trust and infiltrating a target's personal finances, take weeks or even months of personal time and repeated interactions. It's a high stakes and low probability game that the scammer is playing.

Here is where LLMs will make a difference. Much has been written about the unreliability of OpenAI's GPT models and those like them: They "hallucinate" frequently, making up things about the world and confidently spouting nonsense. For entertainment, this is fine, but for most practical uses it's a problem. It is, however, not a bug but a feature when it comes to scams: LLMs' ability to confidently roll with the punches, no matter what a user throws at them, will prove useful to scammers as they navigate hostile, bemused, and gullible scam targets by the billions. AI chatbot scams can ensnare more people, because the pool of victims who will fall for a more subtle and flexible scammerone that has been trained on everything ever written onlineis much larger than the pool of those who believe the king of Nigeria wants to give them a billion dollars.

Read more of this story at SoylentNews.

10:00

HPR3834: 2022-2023 New Years Show Episode 5 Hacker Public Radio

Episode #5 printables: Kirby 40mm Fume Extractor. wikipedia: The Kirby Company is a manufacturer of vacuum cleaners and home cleaning accessories, located in Cleveland, Ohio, United States. It is a division of Right Lane Industries. lugcast: We are an open Podcast/LUG that meets every first and third Friday of every month using mumble. wikipedia: The PlayStation Portable (PSP) is a handheld game console developed and marketed by Sony Computer Entertainment. wikipedia: Rammstein is a German Neue Deutsche H&#xE4;rte band formed in Berlin in 1994. Goodluck with all the rest of the band/music chatter. I can't understand any of it. youtube: Burger Dance. Please no. Why did I signup for this. wikipedia: Syphilis is most commonly spread through sexual activity. wikipedia: Death was an American death metal band formed in Altamonte Springs, Florida, in 1984 by Chuck Schuldiner. Death is considered to be among the most influential bands in heavy metal music and a pioneering force in death metal. wikipedia: Death is a Detroit rock band formed in Detroit, Michigan in 1971 by brothers Bobby, David, and Dannis Hackney. wikipedia: BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. dell: Latitude E6410 Laptop. slackware: Slackware is a Linux distribution created by Patrick Volkerding in 1993. puppylinux: Puppy Linux is an operating system and family of light-weight Linux distributions that focus on ease of use and minimal memory footprint. tails: Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. debian: Debian, also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project, which was established by Ian Murdock on August 16, 1993. wikipedia: Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. pine64: ROCK64 is a credit card sized Single Board Computer powered by Rockchip RK3328 quad-core ARM Cortex A53 64-Bit Processor and support up to 4GB 1600MHz LPDDR3 memory. docker: realies/nicotine. wikipedia: rsync is a utility for efficiently transferring and synchronizing files between a computer and an external hard drive and across networked computers by comparing the modification times and sizes of files. funkwhale: Listen to your music, everywhere. Upload your personal library to your pod

Comparing Student and LLM Code Explanations It Will Never Work in Theory

Asking whether Large Language Models (LLMs) are going to help or hurt education is about as sensible as asking whether the Internet has been good for society. This paper asks a more specific, and therefore more useful, question: can LLMs produce explanations that will help novice programmers understand code, and are those explanations better, worse, or the same as ones produced by their peers? The answers to both questions appear to be "yes": machine-generated explanations aren't always correct or comprehensible, but neither are those produced by other students.

The authors do touch on some potential concerns, such as ways to prevent students from becoming over-reliant on model-generated explanations, but overall they're very positive about these tools' potential. It will probably be a few years before any of this has significant impact on higher education, but I expect that most online/self-paced learn-to-code offerings are going to have to adapt quickly or find a new business model.

Disclosure: I co-authored a paper in 2019 with one of the authors of this paper (Denny).

Juho Leinonen, Paul Denny, Stephen MacNeil, Sami Sarsa, Seth Bernstein, Joanne Kim, Andrew Tran, and Arto Hellas. Comparing code explanations created by students and large language models. 2023. arXiv:2304.03938.

Reasoning about code and explaining its purpose are fundamental skills for computer scientists. There has been extensive research in the field of computing education on the relationship between a student's ability to explain code and other skills such as writing and tracing code. In particular, the ability to describe at a high-level of abstraction how code will behave over all possible inputs correlates strongly with code writing skills. However, developing the expertise to comprehend and explain code accurately and succinctly is a challenge for many students. Existing pedagogical approaches that scaffold the ability to explain code, such as producing exemplar code explanations on demand, do not currently scale well to large classrooms. The recent emergence of powerful large language models (LLMs) may offer a solution. In this paper, we explore the potential of LLMs in generating explanations that can serve as examples to scaffold students' ability to understand and explain code. To evaluate LLM-created explanations, we compare them with explanations created by students in a large course (n 1000) with respect to accuracy, understandability and length. We find that LLM-created explanations, which can be produced automatically on demand, are rated as being significantly easier to understand and more accurate summaries of code than student-created explanations. We discuss the significance of this finding, and suggest how such models can be...

09:37

Smashing Security podcast #317: Another Uber SNAFU, an AI chatbot quiz, and is juice-jacking genuine? Graham Cluley

Everyone's talking juice-jacking - but has anyone ever been juice-jacked? Uber suffers yet another data breach, but it hasn't been hacked. And Carole hosts the "AI-a-go-go or a no-no?" quiz for Dave and Graham. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.

09:04

Top Mobile Security Considerations for Business Travelers HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

Mobile security is becoming increasingly important as we delve deeper into the era of the Internet of Things

This is a post from HackRead.com Read the original post: Top Mobile Security Considerations for Business Travelers

09:01

How To Safely Navigate the World of Crypto Finance HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

The world of crypto finance is rapidly evolving and providing new opportunities for individuals and businesses. With the

This is a post from HackRead.com Read the original post: How To Safely Navigate the World of Crypto Finance

09:00

The Eyes Have It with This Solid State Magic Eye Hackaday

The classic Magic Eye tuning indicator was a fantastic piece of vacuum tube technology that graced all kinds of electronic gear for a fair fraction of the 20th century. But despite its prevalence, finding a new-old-stock Magic Eye tube is a tall order these days, especially for the rare versions like the 6T5. No worries, though, since direct plug-in solid-state replacements for the 6T5 are now a thing, thanks to [Gord Rabjohn].

Readers will be forgiven if this seems a tad familiar, since the current work is based strongly on [Gord]s previous Magic Eye work. But the 6T5 was a unique tube, with a display that looked more like a dilating pupil than the sweeping circle of the more common 6E5 and 6U5 tubes. Luckily, most of the basic circuitry of the previous tubes, which was based on the classic LM391x LED bar graph display chips, could be leveraged for the 6T5 substitute. [Gord] did need to come up with a new display board, which holds 160 green surface-mount LEDs in six concentric rings. He also added a single orange LED to the very center of the display board, to simulate the cheery glow of the original tubes heater filament.

As seen...

08:45

[$] Searching for an elusive orchid pollinator LWN.net

Orchids are, of course, flowers, and flowers generally need pollinators in order to reproduce. A seemingly offhand comment about the unknown nature of the pollinator(s) for a species of orchid in Western Australia has led Paul Hamilton to undertake a multi-year citizen-science project to try to fill that hole. He came to Everything Open 2023 to give a report on the progress of the search.

08:02

Hyundai suffered a data breach that impacted customers in France and Italy Security Affairs

Hyundai disclosed a data breach that impacted Italian and French car owners and clients who booked a test drive.

Hyundai has suffered a data breach that impacted Italian and French car owners and customers who booked a test drive.

Threat actors had access to the email addresses, physical addresses, telephone numbers, and vehicle chassis numbers of the impacted individuals.

The data breach letter sent to the impacted individuals informs them that an unauthorized third party had access to the database of customers. Hyundai Italy has notified the privacy watchdog and hired external cybersecurity experts to determine the scope of the incident.

According to the letter, financial data were not exposed. The number of impacted individuals is still unclear.

In response to the incident, the company has taken the impacted systems offline.

On behalf of Hyundai Motor Company Italy, I regret to inform you that our company has recently learned that an unauthorized third party has accessed certain information contained in our customer database. reads the data breach notification letter sent to the impacted individuals. Although there is no evidence that the data concerned have been used for fraudulent purposes, out of extreme caution, we invite you to pay particular attention and to verify any contact attempt via e-mail, mail and/or text message that may appear to come from Hyundai Italia or by other entities of the Hyundai Group. In particular, we recommend that you avoid pressing any link that may be contained in the contact attempt you may receive.

The company also warns impacted individuals to be cautious with unsolicited contact attempts via e-mail, mail and/or text message.

The incident is the last problem in order of time suffered by the South Korean carmaker, in February Hyundai and Kia carmakers released an emergency software update to fix a flaw that can allow stealing a car with a USB cable.

In December 2019, German media reported that h...

07:48

AI Poised to Transform Video Compression Landscape IEEE Spectrum



Apples surprise purchase at the end of last month of WaveOne, a California-based startup that develops content-aware AI algorithms for video compression, showcases an important shift in how video signals are streamed to our devices. In the near-term Cuppertinos purchase will likely lead to smart video compression tools in Apples video creation products and in the development of its much-discussed augmented reality headset.

However, Apple isnt alone. Startups in the AI video codec space are likely to prove acquisition targets for other companies trying to keep up.

For decades video compression used mathematical models to reduce the bandwidth required for transmission of analog signals, focusing on the changing portions of a scene from frame-to-frame. When digital video was introduced in the 1970s, improving video compression became a major research focus, leading to the development of many compression algorithms called codecs, short for coder-decoder, that compress and decompress digital media files. These algorithms paved the way for the current dominance of video in the digital age.

AI compression of still images has shown initial success. Video remains more challenging.

While a new codec standard has appeared around every 10 years, all have been based on pixel mathematicsmanipulating the values of individual pixels in a video frame to remove information that is not essential for human perception. Other mathematical operations reduce the amount of data that needs to be transmitted or stored.

AI codecs, having been developed over the course of decades, use machine learning algorithms to analyze and understand the visual content of a video, identify redundancies and non-functional data, and compress the video in a more efficient way. They use learning-based techniques instead of manually designed tools for encoding and can use different ways to measure encoding quality beyond traditional distortion measures. Recent advancements, like attention mechanisms, help them understand the data better and optimize visual quality.

During the first half of the 2010s, Netflix and a California-based company called Harmonic helped to spearhead a movement of whats called content-aware encoding. CAE, as Harmon...

07:30

Upstream Mesa Close To Supporting The Experimental Xe DRM Kernel Driver Phoronix

While we are still waiting for the Intel Xe kernel driver to be upstreamed as the modern alternative to the long-used i915 Direct Rendering Manager (DRM) driver, upstream Mesa Git is nearly ready in supporting the Xe kernel driver and its new/changed interfaces...

07:27

A Stream of Cold Gas is Unexpectedly Feeding the Far-off Anthill Galaxy SoylentNews

The stream could keep the galaxy supplied with star-forming fuel for a billion years:

A long, cold stream of gas is feeding a very distant galaxy like a vast bendy straw. The finding suggests a new way for galaxies to grow in the early universe, researchers report in the March 31 Science.

Computer simulations predicted that streams of gas should connect galaxies to the cosmic web (SN: 3/6/23). But astronomers expected that gas to be warm, making it unsuitable for star-forming fuel and galaxy growth.

So astronomer Bjorn Emonts and his colleagues were surprised to see a stream of cold, star-forming gas leading into the Anthill Galaxy, a massive galaxy whose light takes 12 billion years to reach Earth.

[...] "People didn't think that these streams could get so cold," says Emonts, of the National Radio Astronomy Observatory in Charlottesville, Va.

But there, in the data, a frigid stream stretched at least 325,000 light-years away from the galaxy. The stream carries the mass of 70 billion suns and deposits the equivalent of about 450 suns in cold gas onto the galaxy every year, the team calculated. That's enough to double the galaxy's mass within a billion years.

[...] If other galaxies are fed by similar structures, it could mean that early galaxies grew mostly by drinking directly from the cosmic streams, rather than by the leading hypothesis violent galaxy mergers (SN: 6/28/19).

Journal Reference:
Bjorn H. C. Emonts, Matthew D. Lehnert, Ilsang Yoon, et al., A cosmic stream of atomic carbon gas connected to a massive radio galaxy at redshift 3.8, Science, 379, 2023 (DOI: https://www.science.org/doi/10.1126/science.abh2150)


Original Submission

Read more of this story at SoylentNews.

07:17

ncurses fixes upstream Open Source Security

Posted by Jonathan Bar Or (JBO) on Apr 12

Hello oss-security,

Our team has worked with the maintainer of the ncurses library (used by several software packages in Linux) to fix
several memory corruption vulnerabilities.
They are now fixed at commit 20230408 - see details here
(https://invisible-island.net/ncurses/NEWS.html#index-t20230408)
A CVE was assigned (CVE-2023-29491) - it's still under a "reserved" status.

How can we ensure those fixes get deployed upstream, in...

05:14

OpenAI Launches ChatGPT Bug Bounty Program Earn $200 to $20k HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Do you have the skills to take part in OpenAI's ChatGPT Bug Bounty Program? If so, here is your chance to earn big bucks.

This is a post from HackRead.com Read the original post: OpenAI Launches ChatGPT Bug Bounty Program Earn $200 to $20k

05:00

Perfect Illustration of How Scumbag Reporters Lie cryptogon.com

Perfect illustration of how scumbag reporters lie: This BBC hack claimed he's seen more hate on Twitter. When asked, he can't name a single example because he hasn't look. Then claims @ISDglobal funded by US, EU and neoliberal billionaires said it:pic.twitter.com/Z0F8eGm1wp Glenn Greenwald (@ggreenwald) April 12, 2023

04:52

Industrial Pork Producers Using Customizable mRNA-Based Vaccines on Their Herds cryptogon.com

Via: The Defender: Since 2018, industrial pork producers have been using customizable mRNA-based vaccines on their herds. According to drugmaker Merck, the vaccines target existing and evolving swine pathogens, including diseases not covered by conventional swine vaccines.

04:48

Boston FBI Raids Wrong Hotel Room, Detains And Interrogates Innocent Man For 45 Minutes cryptogon.com

Definitely nothing to see here. Via: ZeroHedge: Few FBI blunders of late likely compare to what just happened in Boston last week, when Federal Agents on a training mission wound up barging into the wrong hotel room and inadvertently interrogating an innocent hotel guest who was sleeping for nearly 45 minutes. The bizarre mistake, outlined []

04:43

Raspberry Pi Launches Online Code Editor to Help Kids Learn SoylentNews

New editor is integrated with Python lessons:

When we think about Raspberry Pi, we normally picture single-board computers, but the Raspberry Pi Foundation was started to help kids learn about computers and it wants to help whether or not you own its hardware. The non-profit arm of Raspberry Pi this week released its new, browser-based code editor that's designed for young people (or any people) who are learning.

The Raspberry Pi Code Editor, which is considered to be in beta, is available to everyone for free right now at editor.raspberrypi.org. The editor is currently designed to work with Python only, but the organization says that support for other languages such as HTML, JavaScript and CSS is coming.

I tried out the Code Editor on my PC's browser and, in its current form, there's nothing particularly unique about it. However, I found the UI very user-friendly and was impressed with how it is integrated into someone online tutorials. The interface consists of three panes: a list of files in your project, a code editor and an output pane that runs the result of your code when you hit the Run button.

If you create a free account on raspberrypi.org, which I did, the system will save all of your projects in the cloud and you can reload them any time you want. You can also download all the files in a project as a .zip file.

Since the entire programming experience takes place online, there's no way (at least right now) to use Python to control local hardware on your PC or your Raspberry Pi. If you want to attach one of the best Raspberry Pi HATs or use the GPIO pins on your Pi to light up an LED light, you need a local editor like Thonny, which comes preinstalled on all Raspberry Pis and is a free download for Windows, Mac and Linux.

Read more of this story at SoylentNews.

04:37

Walmart Abandons Unprofitable Chicago Stores After Investing Hundreds Of Millions In City cryptogon.com

Via: ZeroHedge: After two decades of losses and hundreds of millions of dollars invested in Chicago, Walmart is shuttering four unprofitable stores in the metropolitan area, reducing its store footprint by half in the crime-ridden city. The simplest explanation is that collectively our Chicago stores have not been profitable since we opened the first one []

04:20

QuaDream surveillance firms spyware targeted iPhones with zero-click exploit Security Affairs

At least five members of civil society worldwide have been targeted with spyware and exploits developed by surveillance firm QuaDream.

Citizen Lab researchers reported that at least five civil society members were victims of spyware and exploits developed by the Israeli surveillance firm QuaDream.

The victims include journalists, political opposition figures, and an NGO worker located in North America, Central Asia, Southeast Asia, Europe, and the Middle East.

The researchers also believe that the threat actors used a suspected iOS 14 zero-click exploit to deploy QuaDreams spyware. The zero-day exploit, dubbed ENDOFDAYS, appears to work against iOS versions 14.4 and 14.4.2, and possibly other versions. ENDOFDAYS relies on invisible iCloud calendar invitations sent from the spywares operator to victims.

CitizenLab identified QuaDream servers in multiple countries, including Bulgaria, Czech Republic, Hungary, Ghana, Israel, Mexico, Romania, Singapore, United Arab Emirates (UAE), and Uzbekistan.

The experts believe that the zero-day exploit was used at least since March 2021.

QuaDream Ltd ( ) is an Israeli company that specialises in the development and sale of advanced digital offensive technology to government clients. The company is known for its spyware marketed under the name Reign, which, like NSO Groups Pegasus spyware, reportedly utilises zero-click exploits to hack into target devices. reads the report published by Citizen Lab.

The Israeli firm has had a partnership with a Cypriot firm called InReach, with whom it is currently embroiled in a legal dispute. Multiple key figures of both companies have prior connections with the surveillance vendor Verint,...

03:27

Distribution Release: Tiny Core Linux 14.0 DistroWatch.com: News

Tiny Core Linux is a minimal Linux distribution which runs from memory. The Tiny Core Linux project has released a new version, 14.0, which is available in three editions: Core (for a command line only experience), TinyCore (which provides a minimal graphical environment), and CorePlus (which provides a....

03:11

[$] The early days of Linux LWN.net

My name is Lars Wirzenius, and I was there when Linux started. Linux is now a global success, but its beginnings were rather more humble. These are my memories of the earliest days of Linux, its creation, and the start of its path to where it is today.

03:00

Ryzen Mobile Power/Performance With Linux 6.3's New AMD P-State EPP Driver Phoronix

With Linux 6.3 there is the new AMD P-State EPP driver code for supporting the ACPI Energy Performance Preference (EPP) to further enhance the power efficiency and performance of modern AMD systems on Linux. Last week I ran some benchmarks of AMD EPYC with the new AMD P-State EPP mode while in today's article is a look at the laptop impact with Ryzen Mobile when comparing ACPI CPUFreq, the existing AMD P-State driver, and the new AMD P-State EPP mode and its multiple different preferences.

02:57

Ghostscript CVE-2023-28879: "Shell in the Ghost" Open Source Security

Posted by Alan Coopersmith on Apr 12

I haven't seen mail to the list about this yet, so FYI for those who haven't
seen it via other channels.

https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript
says:

A report from those who found the bug, including their POC, was published
yesterday:

https://offsec.almond.consulting/ghostscript-cve-2023-28879.html

02:18

888 Casino Evaluation 2023 888 On Line Casino Free Spins h+ Media

888 Casino Evaluation 2023 888 On Line Casino Free Spins

You can merely kind in keywords like deposit after which find a good amount of helpful information regarding your chosen matter. All of which ought to assist provide some fair if not distinctive 888 ratings for buyer assist. As a result of the acquisition by 888 Holdings, this licence utility might now end up in an accelerated course of. One hurdle along the way is the $300,000 fine William Hill obtained from our Gaming Authority in 2018 for illegally offering playing video games on the New Zealand market. William Hills belongings embody greater than 1,four hundred betting retailers in dollarpa. These are primarily betting outlets, small betting places of work in various British cities, the place gamers can guess on sports competitions, horse and dog races, bingo and lotteries.

If this is your first time joining the poker room, you are in for a nice deal with. Simply registering is enough to get you $88 free of charge, with another $400 waiting on the primary deposit. After all, there are a quantity of coupon moguls out there offering promotional code.

This isnt very surprising when you ask us as this brand has been active for during the last 25 years. In terms of cell usability, we might label it as one of the best cellular casinos out there in NZ right now. 888 even got here up with the well-received slogan App, Tap, Bet and that just about explains how their app works. Their mobile optimised website does the trick too, however we consider their cellular app does make a real distinction.

The incontrovertible fact that theyve managed to jump via all the mandatory hoops to safe these trusted and extremely revered gaming licenses exhibits that youre in good palms. 888 casino is a reputation and a website that you could belief, so your personal details might be secure, and your gaming experiences might be honest. You are studying our most updated and correct 888 casino evaluate. You can contact them by e mail or simply by using the reside chat operate.

  • However, if we have a look at the licenses, then we have some very dependable cases.
  • You will be succesful of transition from PC to Mobile and have the identical choice of games, together with the same levels of safety.
  • One of the main considerations of online gaming is to ensure truthful and honest games.
  • Also, the Android app allows some unique 888 Casino bonuses tailored particularly for the app users.
  • With more than 10 million registered users, 888 Poker has one thing for everybody.

This should allow you to make respectable bets earlier on, which is able to in turn help you to win respectable quantities. We are a team of specialists that wish to cross further the passion of on-line playing to its kiwi players. Founded again in 2019, KiwiGambler is ready to current & give to its guests better alternatives f...

02:17

888 On Line Casino Review Get $200 Welcome Bonus + 88 Free Spins h+ Media

888 On Line Casino Review Get $200 Welcome Bonus + 88 Free Spins

Virtually all random number mills are additionally certified by outdoors players who check so that they are honest and never rigged on line casino games. Which presents a certification service for both casinos and its video games. If you see that a game developer is licensed by eCogra, you probably can ensure that the sport you would possibly be taking half in is completely honest. Licensed casinos solely provide video games from game builders which may be certified by eCorga. Although there are some games that might be won with ability and confirmed strategies, it is at all times chance that determines whether or not there shall be a win or not at pokies at the on line casino.

888 Casino is unquestionably on the top of the gaming business in terms ofonline on line casino in New Zealand. The company behind the operation of 888.com is the Cassava Enterprises under the legal guidelines of the Government of Gibraltar. Ultimately, slots are all about luck and youll normally solely come out as a winner should you stop whilst youre forward. What is one of the best free spins on line casino I can join proper now, casino 888 confiavel.

It is more than usual to be supplied a welcome supply when registering on a playing web site. However, these can differ considerably from one on line casino to another. We subsequently evaluate bonuses based mostly on their value and what requirements are set to evaluate how the bonus stands in comparability with other gambling sites offers. That yow will discover all kinds of gaming corporations and on-line casinos in New Zealand that have been granted a gaming license and are regulated by New Zealand authorities. You can simply evaluate casinos in online Casinos NZs leaderboards .

Some of the most effective live dealing action video games you can play on the site are sport exhibits by Evolution. This will open a window with all the premium live dealing games you can find on 888 Casino. This can additionally be the rationale behind the good array of premium slot games that includes different recreation mechanics on the location. So, there are additionally some other slot providers which is most likely not as well-liked because the listed however are still worth mentioning. The main focus point in relation to 888 Casino games is the slot selection. Regular jackpot games and twilight jackpots may also be found right here, making the format of the location full.

  • Here, you can also make a decision on which sector and kind of recreation you wish to play on the positioning.
  • This will open a window with all the premium stay dealing games youll find on 888 Casino.
  • No matter where youre from, the casino could have you lined with at least one deposit and withdrawal technique.
  • Place sports activities bets on 888 Casino and wager on the sport of...

02:16

Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Daniel Beck on Apr 12

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Azure Key Vault Plugin 188.vf46b_7fa_846a_1
* Kubernetes Plugin 3910.ve59cec5e33ea_

Additionally, we announce unresolved security issues in the following
plugins:

* Assembla merge request builder Plugin
* Consul KV Builder Plugin
* Fogbugz...

02:14

Apple Pay On Line Casino Nz On-line Casinos With Apple Pay 2023 h+ Media

Apple Pay On Line Casino Nz On-line Casinos With Apple Pay 2023

Kiwis can indulge in a wide range of exclusive bonuses and promotions obtainable at this on line casino. Unlike different online gaming platforms, 888Starz allows gamers to claim bonuses when making deposits using in style cryptocurrencies. Newly registered players are greeted with a luxurious Welcome Bonus amounting to as a lot as NZ$1,500 and an extra 150 Free Spins to sweeten the deal.

888 is available to prospects in the UK and Ireland, plus a host of different locations together with Canada, New Zealand and numerous European nations. There is also the 888 Blog that may hold you updated with all of the casinos information and game releases. The Live enviornment is a full-on streaming platform where you will compete towards the many totally different sellers hosting the tables.

A easy form of a random number generator is, for instance, to roll a cube or to flip a coin. This gives you fully random numbers with an equal probability of every consequence. Online on line casino games and pokies also use random quantity mills.

When it involves banking too, you ought to have absolutely no qualms. They offer a variety of main bank cards, corresponding to Visa and Mastercard, a choice of e-wallets, similar to Trustly and MuchBetter, in addition to more up and coming options like ApplePay. 888 poker works barely totally different to the relaxation of their service as essentially, the service is a downloadable consumer. Add this to your computer and you will acquire entry to a plethora of different poker options which are supplied to their players by the staff at 888 on line casino.

There can also be the choice to obtain their software program on your cell phone or pill. If any new scatter lands on the Hot 1, players can also anticipate to win extra when they spin the reels at no cost. Winnings allotted throughout free spins must be wagered 200 occasions, and savor the taste of the forbidden Sin City Nights. Overall, permitting you to get extra funds for taking half in slots. Along with their 100 percent deposit bonus, New Zealand players additionally obtain 25 free to get them began at the pokies.

A good touch to the gaming platform is that customers can still opt for practice play if they need and thus use the demo credits to play poker with actual opponents. Therefore, we additionally look at the frequency with which online casinos offer new slots. These Of course ensure that you as a gambler keep coming back to the online on line casino.

You also can select the subsections like new video games, in style video games, and all video games. In this 888 Casino evaluate, we will concentrate on individual game sections to bring you high quality info. The banner shows the welcome bonus and whenever you scroll you will see completely different sport classes. If you need to attain the casino help group then additionally the choice is c...

02:14

Top 10 Best Online Casino In New Zealand Get Bonuses Enjoying In Online Pokies h+ Media

Top 10 Best Online Casino In New Zealand Get Bonuses Enjoying In Online Pokies

But thats not all, in addition to the welcome bonus there may be also a Friday, birthday and VIP bonus! 888 are a high quality online playing brand and this certainly shines via within the performance of their websites in our reviews. Their sports activities site had a massive quantity of routinely glorious prematch and stay odds for all of the sports that you would wish for. Similarly their on line casino site had a powerful variety of on-line pokies and desk games. All 888 New Zealand clients will discover that they have instant entry to simply about any sort of on-line playing entertainment.

There are tables with completely different languages out there as properly German, Russian, Spanish or Danish being just some examples. The 888 part is actually one thing that most gamers recognize and many of the rivals are jealous of. It is really very good, as there is an abundance of obtainable tables and different video games.

For live on line casino gamers, there are other promotions just like the one where you can win eight pounds, whenever the ball is at the number eight. This is restricted time provide, and it begins at eight or nine afternoons. At 888 Sport, you can access lots of of sports markets with much better odds than land-based bookmakers. You can use the casinos sporting stats to assist you place your bets. You can watch all of the action via reside streaming on chosen video games. Plus, youve in-play sports activities analysis and digital gaming maps to observe the play in real-time.

Maybe these less typical styles could soon flip into your all-time favourite before lengthy. This is as a end result of of the truth that alongside their own games you also get to enjoy video games from big-name suppliers, such as Netent, Red Tiger, and Yggdrasil too. These offer slots video games anywhere from 1 to over 25 lines, in addition to extra basic on line casino and stay casino games too. As such, you get the best of both world if you end up having fun with the 888 casino games catalog.

New players will have an opportunity to earn 88 kilos without deposit money. You can win the utmost amount of 15 kilos should you dont play jackpot in fact. 888 Casino provides many companies that may assist you to to securely deposit NZ dollars into your 888 account. All transaction occasions are quick, thusly, permitting you to play games instantly. There is little question whatsoever once we say theyre top-of-the-line on line casino operators on the earth. And to now be a part of the NZ market, is an actual treat for New Zealand players looking for a model new online casino to go to.

  • You can get professional help from organisations like Gamblers Anonymous and Gambling Therapy.
  • They have video games obtainable from a few of the greatest suppliers as nicely as their very own Dragonfish video gam...

02:12

888 Reviews For Nz 2023 Is 888 Dependable For Sports Bets? h+ Media

888 Reviews For Nz 2023 Is 888 Dependable For Sports Bets?

Now, in 2021, they nonetheless preserve that high degree of offering the most important and the most effective games in stupidly excessive numbers. Prices are in New Zealand dollars otherwise said and are topic to GST. Any provides or promotions are non-exchangeable and non-refundable.

You can use Interac, Instant Banking, bank cards or iDebit to get dollars into your account. Another fantastic banking technique option for deposit and withdrawal is PaysafeCard. 888 took a bit of time onboarding Interac, however from the start of 2023 theyve allowed Interac transactions.

They truly stand out in relation to variations of video games, with a range of on-line slots, table video games, progressive video games, video poker games, reside supplier video games and specialty video games to select from. You will discover all of your favourite desk video games inside its lobby, including Blackjack, Roulette, Caribbean Stud, Baccarat, Casino Holdem, Red Dog and extra. In whole, 888 has about 25 desk video games to take pleasure in, excluding its big selection of Blackjack choices. If you like video poker games, check out Jacks or Better, All American Double Up, Aces and Faces, Tens or Better, Bonus Poker and extra. The can also be a live casino that options an authentic gaming experience, full with stay dealer, live gamers and actual time motion. Finally, no games lobby is full with slot machines, and 888 is no completely different.

888 mobile on line casino provides you the possibility to play anytime you want from anywhere you need, so you possibly can all the time win huge when you have an web connection. 888Casino has the top jackpot pokies out there together with the Millionaire Genie slot sport. This is doubtless certainly one of the prime rating pokies on the location, and all it takes is one spin to win massive. When it comes to gameplay, youll undoubtedly not be disappointed with the over a hundred choices that are obtainable. 888 Casino operates by itself software, Dragonfish, and this is what supplies each kiwi participant with the last word and most unique gaming expertise.

The monthly withdrawal restrict is above common and stands at $20,000, while youll face a most ready time of 48 hours on your withdrawal requests. A devoted part of the lobby will current numerous tables and tournaments for players looking to enjoy the sport without using real money in the course of. T simply apply to cash video games but additionally to online poker tournaments, because the schedule is always packed and the action never appears to cease. While the welcome bonus is type of small, compared to other online casinos, the wagering requirement solely requires that you play by way of the bonus quantity 30x earlier than cashing out.

There isnt any live chat obtainable for those non-registered members that we are ready to see, and so the messa...

02:01

Florida Officials Deleted Data, Stats From Dubious COVID Analysis: Report SoylentNews

"You can call it a lie by omission":

Florida health officials deleted key data and statistics from a state analysis on the safety of mRNA COVID-19 vaccines, falsely making them appear unsafe for young men, according to draft versions of the analysis obtained by the Tampa Bay Times through public records requests.

The final analysis, which was widely criticized for its poor quality and dubious conclusions, was the basis for a statewide recommendation by Surgeon General Joseph Ladapo last October that young men, ages 18 to 39, should not receive an mRNA COVID-19 vaccine. The analysisposted on the Florida Department of Health's website with no authors listedclaimed to find "an 84% increase in the relative incidence of cardiac-related death among males 18-39 years old within 28 days following mRNA vaccination."

Ladapo, who has a history of fearmongering about COVID-19 vaccines, touted the analysis, saying in a press release at the time that "these are important findings that should be communicated to Floridians."

But according to draft versions of the analysis, the state epidemiologists who worked on the report came to entirely different conclusions.

Read more of this story at SoylentNews.

01:45

CVE-2022-45064: Apache Sling Engine: Include-based XSS Open Source Security

Posted by Angela Schreiber on Apr 12

Description:

The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of
include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker
that is able to include a resource with specific content-type and control the include path (i.e. writing content). The
impact of a successful attack is privilege escalation to administrative power....

01:09

Operators of Movie & TV Piracy Giant 8maple Sentenced to Prison in Taiwan TorrentFreak

Pirate KeyPirate sites with tens of millions of visits each month are large enough to consider themselves global players yet some achieve these levels in a tighter geographic niche.

Founded in 2014 by two Taiwanese software engineers, movie and TV show piracy site 8maple is a prime example. Initially, the site was promoted as a commercial advertising platform but soon transformed into a full-blown piracy portal pulling in millions of visitors each month and generating large sums in advertising revenue.

Spending an estimated US$9,800 on server hosting in the United States, Canada, Ukraine, France and Romania each month, early estimates suggested the men behind 8maple may have been generating around US$65,600 in monthly revenues. By early 2020, the sites main domain at 8maple.ru was pulling around 35 million visits per month, generating around US$133,000 per month in revenue.

Investigation and Shutdown

Following an investigation carried out by the Alliance for Creativity and Entertainment, the Asia-Pacific division of the Motion Picture Association (MPA-APC), Japan-based Content Overseas Distribution Association (CODA), and local TV network Sanli TV, Taiwans Criminal Investigation Bureau (CIB) shut down 8maple.ru late March 2020.

Two men in their early thirties (Chen Su, 33, and Zhuang Su, 32) were arrested and around $1.9m in illegal gains were seized from their bank accounts. Domains including 8maple.ru, 8maple.com, 8drama.com, 8drama.ru, 8duck.ru, 8video.tv, eyny.is, and eyny.tv, were shut down.

The suspects were arrested for copyright infringement offenses with Taiwans Telecommunications Investigation Corps estimating that 8maple caused around NT$1 billion (US$33.2m) in damages to the entertainment industries.

Court Sentences Men in Taiwan

More than two years after their arrest, the Taoyuan District Court has now sentenced the two men to serve 18 months in prison for jointly committing the crime of infringing copyright property rights under Article 92 of the Copyright Law.

TorrentFreak obtained a copy of the official verdict from Taiwan prosecutor Harris Chen. It reveals a highly complex case and what appears to be the involvement of other suspe...

00:39

Testing for Coexistence in Crowded and Contested RF Environments IEEE Spectrum



This white paper presents some of the key research, development, test and evaluation (RDT&E) challenges that arise when developing and deploying systems that need to operate in congested and/or contested RF environments.

Download your free copy now.


As our world becomes increasingly reliant on wireless communications, RF spectrum congestion and contention cause friction between incumbent users and newer, bandwidth- intensive applications such as cellular communications.

Over the last decade, the frequency bands allocated for cellular communications services that employ 3GPP technologies has increased from 11 bands to over 80 bands. In the ideal state of RF coexistence, RF signals utilize or exist in the same frequency bands and emanate from different transmitters.

The key issues facing coexistence are also discussed. Such issues include, a contested and congested spectrum, spectral sensing, spectrum sharing and dynamic spectrum allocation. The white paper concludes with an overview of the test systems that are used to create realistic RF environments that provide real-world operational conditions in a controlled laboratory environment.

Wednesday, 12 April

12:34

01:55

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog