73018191
submission
Daniel_Stuckey writes:
A security flaw discovered in the website of Charter Communications, a cable and Internet provider active in 28 states, may have exposed the personal account details of millions of its customers.
Security researcher Eric Taylor discovered the internet service provider’s vulnerability as part of his research, and demonstrated how a simple header modification performed with a browser plug-in could reveal details of Charter subscriber accounts. After Fast Company notified Charter of the issue, the company said it had installed a fix within hours.
66447273
submission
Daniel_Stuckey writes:
A London-based programmer has set up a new hidden service for anyone using Tor to submit anonymous tips to the FBI.
With the new .onion hidden service link (http://tksgyw4u4t6peema.onion/), which accesses the FBI’s tips page through a reverse proxy, Mustafa Al-Bassam told me in an IRC chat that he’s engineered a “proof-of-concept,” demonstrating how the bureau might go about setting up a more secure system for receiving crime tips.
65435053
submission
Daniel_Stuckey writes:
Hector Xavier Monsegur, also known online as "Sabu," was caught by the FBI in June of 2011 for a litany of hacking-related offenses and, within hours, began cooperating with authorities in hopes of receiving a lenient sentence.
Now, never-before-published FBI records and exclusive interviews detail how the informant rallied other hackers to attack various News Corp. interests, including The Sun, at a time that the FBI has said it was tracking all of Monsegur's online activity.
And for a week shortly after his arrest, he was privy to the anti-Murdoch campaign waged by Anonymous, according to the documents obtained by Motherboard.
65112885
submission
Daniel_Stuckey writes:
A new MIT study offers a way out of one of solar power's most vexing problems: the matter of efficiency, and the bare fact that much of the available sunlight in solar power schemes is wasted. The researchers appear to have found the key to perfect solar energy conversion efficiency—or at least something approaching it. It's a new material that can accept light from an very large number of angles and can withstand the very high temperatures needed for a maximally efficient scheme.
Conventional solar cells, the silicon-based sheets used in most consumer-level applications, are far from perfect. Light from the sun arrives here on Earth's surface in a wide variety of forms. These forms—wavelengths, properly—include the visible light that makes up our everyday reality, but also significant chunks of invisible (to us) ultraviolet and infrared light. The current standard for solar cells targets mostly just a set range of visible light.
64834695
submission
blottsie writes:
Apple knew as early as March 2014 of a security hole that left the personal data of iCloud users vulnerable, according to leaked emails between the company and a noted security researcher.
In a March 26 email, security researcher Ibrahim Balic tells an Apple official that he’s successfully bypassed a security feature designed to prevent “brute-force” attacks. Balic goes on to explain to Apple that he was able to try over 20,000 passwords combinations on any account.
64533887
submission
Daniel_Stuckey writes:
Friday night in Southern California's Silverado Valley, relief flew in on an old airliner. In this summer of drought and fire the DC-10, an airplane phased out of passenger service in February, has been spotted from Idaho to Arizona delivering up to 12,000 gallons of fire retardant in a single acrobatic swoop.
The three-engine DC-10 entered service in 1970 as a passenger jet, and the last airplane working in that capacity, operated by Biman Bangladesh Airlines, made its final flight on February 24. But some designs defy obsolescence. The DC-10 had already been converted to function as a mid-air refueling airplane for the Air Force, and in 2006, the first fire-fighting DC-10 was unleashed on the Sawtooth fire in San Bernardino County, California.
63610539
submission
Daniel_Stuckey writes:
But it's here, tucked away on the third floor, that you'll find precisely that: the Center for Game Science, a research lab that makes educational video games for children, and that received the bulk of its funding from the Defense Advanced Research Projects Agency, the wing of the US Department of Defense that supports research into experimental military technology. Why is DARPA the original primary funder of the CGS? According to written and recorded statements from current and former DARPA program managers, as well as other government documents, the DARPA-funded educational video games developed at the CGS have a purpose beyond the pretense of teaching elementary school children STEM skills.
63421133
submission
Daniel_Stuckey writes:
You've maybe heard a bit about Stingray. Over the past couple of years, it has emerged that police forces in the US have been using the powerful surveillance tool, which tricks phones into connecting to a dragnet, to track mobile devices, and intercept calls and text messages.
Meanwhile, the London Metropolitan Police Service (MPS) continue to remain tight lipped about their use of the technology, leaving citizens in the dark on what privacy protections, if any, are in place for those who may get swept up by the broad surveillance techniques.
63197007
submission
Daniel_Stuckey writes:
Now the NSA has yet another dilemma on its hands: Investigative journalist Jason Leopold is suing the agency for denying him the release of financial disclosure statements attributable to its former director. According to a report by Bloomberg , prospective clients of Alexander's, namely large banks, will be billed $1 million a month for his cyber-consulting services. Recode.net quipped that for an extra million, Alexander would show them the back door (state-installed spyware mechanisms) that the NSA put in consumer routers.
62328709
submission
Daniel_Stuckey writes:
Hidden From Google, the brainchild of a web programmer in New Jersey, archives each website that Google is required to take down from European Union search listings thanks to the recent court decision that allows people to request that certain pages be scrubbed from Google's search results if they're outdated or irrelevant. That decision has resulted in takedown requests from convicted sex offenders and huge banking companies, among thousands of others.
62088083
submission
Daniel_Stuckey writes:
Dubai is building "the world's first climate-controlled city"—it's a 4.3 mile pedestrian mall that will be covered with a retractable dome to provide its shoppers with air conditioning in the summer heat. The Mall of the World, as it's called, will become the sort of spectacular, over-the-top attraction Dubai is known for. Shortly after, it will probably become an equally spectacular real-world dystopia.
By sectioning off a 3-million-square-foot portion of the city with an air conditioned dome, Dubai is dropping one of the most tangible partitions between the haves and the have nots of the modern era—the 100 hotels and apartment complexes inside the attraction will be cool, comfortable, and nestled into a entertainment-filled, if macabre, consumer paradise.
61297429
submission
Daniel_Stuckey writes:
Weeks after he started working quietly as an FBI informant, Hector Xavier Monsegur, known by his online alias "Sabu," led a cyber attack against one of the bureau's very own IT contractors.
In July 2011, at Monsegur's urging, members of AntiSec, an offshoot of the hacking collective Anonymous, took advantage of compromised log-in credentials belonging to a contractor with a top secret security clearance employed at the time by ManTech International.
According to chat logs recorded by Monsegur at the behest of the FBI and obtained by Motherboard, the informant directed hackers to pilfer as much data as possible from ManTech's servers as investigators stood by. Stolen data was published as the third installment of AntiSec's "Fuck FBI Friday" campaign: a collection of leaks intended to embarrass the same federal agency that presided over the hack and others.
61268635
submission
Daniel_Stuckey writes:
It hopefully doesn't come as a surprise that your friends shape who you are. But we tend to think of that on a micro level: If your close circle of friends tends to have tattoos, wear polo shirts, or say "chill" a lot, it's quite possible that you'll emulate them over time—and they'll emulate you too.
But what happens on a macro scale, when your friend circle doesn't just include the dozen people you actually hang out with regularly, but also the hundreds or thousands of acquaintances you have online? All of those feeds may seem filled with frivolities from random people (and they are!) but that steady stream of life updates—photos, rants, slang—are probably shaping you more than you think.
A massive Facebook study recently published in PNAS found solid evidence of so-called emotional contagion—emotional states spreading socially, like a virus made of emoji—on the social network.
61178389
submission
Daniel_Stuckey writes:
You're likely familiar with the theory of how the Moon formed: a stray body smashed into our young Earth, heating the planet and flinging debris into its orbit. That debris coalesced and formed the Moon. The impact theory still holds, but a team of geochemists from the University of Lorraine in Nancy, France has refined the date, finding that the Moon is about 60 million years older than we thought. As it turns out, that also means the Earth is 60 million years older than previously thought, which is a particularly cool finding considering just how hard it is to estimate the age of our planet.
61054545
submission
Daniel_Stuckey writes:
Following broad security scares like that caused by the Heartbleed bug, it can be frustratingly difficult to find out if a site you use often still has gaping flaws. But a little known community of software developers is trying to change that, by creating a searchable, public index of websites with known security issues. Think of Project Un1c0rn as a Google for site security. Launched on May 15th, the site's creators say that so far it has indexed 59,000 websites and counting. The goal, according to its founders, is to document open leaks caused by the Heartbleed bug, as well as "access to users' databases" in Mongo DB and MySQL. According to the developers, those three types of vulnerabilities are most widespread because they rely on commonly used tools. For example, Mongo databases are used by popular sites like LinkedIn, Expedia, and SourceForge, while MySQL powers applications such as WordPress, Drupal or Joomla, and are even used by Twitter, Google and Facebook.