Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Deepest Dwelling Creatures On Earth Discovered By College Students (kulr8.com)

mpicpp writes: Whitman biology professor Paul Yancey and students Anna Downing '16 and Chloe Weinstock '17 have returned from the first detailed study of the Mariana Trench aboard Schmidt Ocean Institute's research vessel Falkor.

The Mariana Trench — located in the Western Pacific near Guam — has been the focus of high-profile voyages to conquer Challenger Deep, the deepest place on Earth. This recent expedition to the Trenchonboard Research Vessel Falkor targeted multiple depths and found active thriving communities of animals. The expedition set many new records, including the deepest rock samples ever collected and the discovery of new fish species at the greatest depths ever recorded.

New species were discovered on this expedition that will provide insight into the physiological adaptations of animals to this high-pressure environment. This research is being conducted in the lab of Whitman College'sProfessor of Biology Paul Yancey. In the past, Yancey and his students, working on animals from moderate depths, discovered certain organic molecules that protect the cells of deep-sea animals from the effects of high pressure, which distorts proteins such as enzymes. These kinds of protective molecules are also being tested to treat human diseases that are caused by malformed proteins, such as cystic fibrosis. Additionally, his work on protective molecules in fishes predicted that fish would not be able to live below about 8,200 meters (27,060 feet). Prior to this expedition, the deepest documented fish was from 7,700 meters (25,410 feet).

The expedition also broke several records for the deepest living fish either caught or seen on video. Setting the record at 8,143 meters, (26,872 feet) was a completely unknown variety of snail fish, which stunned scientists when it was filmed several times during sea floor experiments. The white translucent fish had broad wing-like fins and an eel-like tail, and slowly glided over the bottom.

Submission + - Five Craziest Space Missions (bbc.com)

An anonymous reader writes: We’ve landed on a comet – so where next? The BBC Future lists its choice of the five craziest space missions currently being proposed. They may sound wild, but all of these are missions that have been seriously discussed as possible future missions: Floating astronauts in the clouds of Venus, sailing on the methane seas of Titan, melting a torpedo probe through the ice of Europa, catching an asteroid in a net and bringing it to lunar orbit, and a 100-year starship mission to the Alpha Centauri and beyond.

Submission + - 48,000 Federal Employees Potentially Affected by Second Background Check Hack (nextgov.com)

schwit1 writes: The Office of Personnel Management is alerting more than 48,000 federal employees their personal information may have been exposed following a breach at KeyPoint Government Solutions, which conducts background investigations of federal employees seeking security clearances.

"As we examine the potential impact on DHS employees, we are committed to ensuring the privacy of our workforce and will take all appropriate measures to safeguard it,"
Was the PII encrypted?
Is there a DHS requirement that all PII be encrypted?

Submission + - How a 3D Printer Let a Dog Run for the First Time (dice.com)

Nerval's Lobster writes: Ever since 3-D printing began to enter the mainstream, people have discussed the technology’s potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.

Submission + - The Beatles, Bob Dylan and the 50-Year Copyright Itch

HughPickens.com writes: Victoria Shannon writes in the NYT that fifty years ago was a good year for music with the Beatles appearing on Billboard’s charts for the first time, the Rolling Stones releasing their first album, the Supremes with five No. 1 hits and Simon and Garfunkel releasing their debut album. The 50-year milestone is significant, because music published within the first half-century of its recording gets another 20 years of copyright protection under changes in European law. So every year since 2012, studios go through their tape vaults to find unpublished music to get it on the market before the deadline. The first year, Motown released a series of albums packed with outtakes by some of its major acts, and Sony released a limited-edition collection of 1962 outtakes by Bob Dylan, with the surprisingly frank title, “The Copyright Extension Collection, Vol. I.” In 2013, Sony released a second Dylan set, devoted to previously unreleased 1963 recordings. Similar recordings by the Beatles and the Beach Boys followed. This year, Sony is releasing a limited-edition nine-LP set of 1964 recordings by Dylan, including a 46-second try at “Mr. Tambourine Man,” which he would not complete until 1965. The Beach Boys released two copyright-extension sets of outtakes last week. And while there's no official word on a Beatles release, last year around this time, “The Beatles Bootleg Recordings 1963” turned up unannounced on iTunes.

Submission + - USBdriveby: The $20 Device That Installs a Backdoor in a Second

Trailrunner7 writes: Samy Kamkar has a special talent for turning seemingly innocuous things into rather terrifying attack tools. First it was an inexpensive drone that Kamkar turned into a flying hacking platform with his Skyjack research, and now it’s a $20 USB microcontroller that Kamkar has loaded with code that can install a backdoor on a target machine in a few seconds and hand control of it to the attacker.

Kamkar has been working on the new project for some time, looking for a way to install the backdoor without needing to use the mouse and keyboard. The solution he came up with is elegant, fast and effective. By using code that can emulate the keyboard and the mouse and evade the security protections such as local firewalls, Kamkar found a method to install his backdoor in just a couple of seconds and keep it hidden on the machine. He loaded the code onto an inexpensive Teensy USB microcontroller.

Kamkar’s USBdriveby attack can be executed in a matter of seconds and would be quite difficult for a typical user to detect once it’s executed. In a demo video, Kamkar runs the attack on OS X, but he said the code, which he’s released on GitHub, can be modified easily to run on Windows or Linux machine. The attack inserts a backdoor on the target machine and also overwrites the DNS settings so that the attacker can then spoof various destinations, such as Facebook or an online banking site, and collect usernames and passwords. The backdoor also goes into the cron queue, so that it runs at specified intervals.

Submission + - New Zeus Variant Targets Users Of 150 Banks

An anonymous reader writes: A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan. Chthonic, as the variant has been named by Kaspersky Lab researchers, shares a lot of similarities with previous Zeus variants. The malware is capable of collecting system information, stealing saved passwords, logging keystrokes, recording video and sound via the computer's webcam and microphone, grabbing the contents of online forms, injecting web pages and fake windows, and allows criminals to connect to the infected computer remotely and use it to carry out transactions.

Submission + - Nicholas Negroponte on the Future of Learning: Nanobots Will Hack the Brain (hacked.com)

giulioprisco writes: Nicholas Negroponte describes future nanobots hacking our neurons to make us learn faster and better. Able to communicate wirelessly with each other and with the external world, the nanobots would hack the brain like read/write computer memory. Negroponte says: '[I]n theory you could load Shakespeare into your bloodstream and as the little robots get to the various part of the brain they deposit little pieces of Shakespeare or the little pieces of French if you want to learn how to speak French. So in theory you can ingest information.'

Comment Maybe they could re-shoot it, varying the script - (Score 0) 230

- so that it's set in Cuba instead.

(I am not kidding. In fact, call it THE INTERVIEW II: HAVANA GILA MONSTER" and make frequent in-joke references to the previous one, even though -- especially because! -- nearly no one has seen it.)

But this time, assassinate Castro, instead.

 

Submission + - Extracting Data from the Microsoft Data (jeffhuang.com)

An anonymous reader writes: The Microsoft Band introduced last month hosts a slew of amazing sensors, but like so many wearable computing devices, users are unable to access their own data. A Brown University professor decompiles the app, finds that the data is transmitted to the Microsoft "cloud", and explains how to intercept the traffic to retrieve the raw minute-by-minute data captured by the Band.

Submission + - Wikileaks.org users at risk due to a Web vulnerability (wikileaks-forum.com)

An anonymous reader writes: We have been made aware of a potential security risk with open source software Wikileaks is utilizing which uses a flash library to display PDF files in .swf format. Two vulnerabilities XSS and content spoofing can be used by malicious users. Whether to affect the privacy of users of wikileaks. eg: Using Flash components specifically to decloack behind Tor network users OR link to external content to discredit Wikileaks, something Wikileaks should avoid given the nature of the content published on Wikileaks servers. Given the fact that most browsers use plugins to enable the reading of PDF's, we strongly urge Wikileaks to link directly to PDF files instead of using third party software that could put users at risk

Submission + - Woz on being Aussie, and escaping Steve Jobs 'dogma' (afr.com)

Techy77 writes: Apple co-founder Steve Wozniak has become an Aussie permanent resident. Wide-ranging interview on how Apple is escaping Steve Jobs' "dogma", why Google Glass is an admirable failure and why he isn't universally liked within Apple.

Submission + - Grinch Vulnerability Could Put a Hole In Your Linux Stocking (itworld.com)

itwbennett writes: In a blog post Tuesday, security service provider Alert Logic warned of a Linux vulnerability, named grinch after the well-known Dr. Seuss character, that could provide attackers with unfettered root access. The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user full administrative access. Alert Logic warned that Grinch could be as severe as the Shellshock flaw that roiled the Internet in September.

Comment Re:Poll purpose (the simple explanation) (Score 5, Interesting) 286

Nah

Actually, it's my 40th birthday, and I've been amused (pleased, too) by the nice greetings I've gotten from friends both older and younger. If Dice Incorporated Amalgamated International Limited wants to make something of the results, they're free to, but since (this being a Slashdot poll) the answers are far less the point than the discussion, I don't think that's very likely. Our polls (we love poll submissions, by the way) are kernels for discussion, and often the product of whimsy. There are lots of ways that age (esp. in technical fields) tends to come up on Slashdot, and a pretty wide range both of what "old" *is* and what it means.

There may be many conspiracies in the world; this just isn't one :)

 

Slashdot Top Deals

"Intelligence without character is a dangerous thing." -- G. Steinem

Working...