Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Cosmic Mystery Solved? Possible Dark Matter Signal Spotted (space.com)

TaleSlinger writes: Astronomers may finally have detected a signal of dark matter, the mysterious and elusive stuff thought to make up most of the material universe.

While poring over data collected by the European Space Agency's XMM-Newton spacecraft, a team of researchers spotted an odd spike in X-ray emissions coming from two different celestial objects — the Andromeda galaxy and the Perseus galaxy cluster.

  "The signal's distribution within the galaxy corresponds exactly to what we were expecting with dark matter — that is, concentrated and intense in the center of objects and weaker and diffuse on the edges," [assuming that dark matter consists of sterile neutrinos] study co-author Oleg Ruchayskiy, of the École Polytechnique Fédérale de Lausanne (EPFL) in Switzerland, said in a statement.

"With the goal of verifying our findings, we then looked at data from our own galaxy, the Milky Way, and made the same observations," added lead author Alexey Boyarsky, of EPFL and Leiden University in the Netherlands.

  Researchers have proposed a number of different exotic particles as the constituents of dark matter, including weakly interacting massive particles (WIMPs), axions and sterile neutrinos, hypothetical cousins of "ordinary" neutrinos (confirmed particles that resemble electrons but lack an electrical charge).

The decay of sterile neutrinos is thought to produce X-rays, so the research team suspects these may be the dark matter particles responsible for the mysterious signal coming from Andromeda and the Perseus cluster.

Submission + - BGP Hijacking Continues, Despite the Ability to Prevent It 2

An anonymous reader writes: BGPMon reports on a recent route hijacking event by Syria. These events continue, despite the ability to detect and prevent improper route origination: Resource Public Key Infrastructure. RPKI is technology that allows an operator to validate the proper relationship between an IP prefix and an Autonomous System. That is, assuming you can collect the certificates. ARIN requires operators accept something called the Relying Party Agreement. But the provider community seems unhappy with the agreement, and is choosing not to implement it, just to avoid the RPA, leaving the the Internet as a whole less secure.

Submission + - Utilities Face Billions In Losses From Distributed Renewables (computerworld.com)

Lucas123 writes: Over the next 10 years, adoption of distributed power in the form of renewables such as solar power has the potential to reduce revenues to grid utilities by as much as $48 billion in the U.S. and by $75 billion in Europe, according to a new study. The study, by Accenture, revealed that utility executives are more nervous about the impact of distributed — or locally generated renewable power — than ever before. with 61% of those surveyed this year indicating they expect significant or moderate revenue reductions compared to only 43% last year. The cost of rooftop solar-powered electricity will be on par with prices for common coal or oil-powered generation in two years, and the technology to produce it will only get cheaper, according to a recent report from Deutsche Bank. New technologies, such as more efficient solar cells, are also threatening to increase efficiencies and drive adoption.

Submission + - Destover Malware Signed with Legit Sony Certificate (threatpost.com)

msm1267 writes: Researchers have discovered a new version of the Destover malware that was used in the recent Sony Pictures Entertainment breaches, and in an ironic twist, the sample is signed by a legitimate certificate stolen from Sony.

The new sample is essentially identical to an earlier version of Destover that was not signed. Destover has been used in a variety of attacks in recent years and it’s representative of the genre of malware that doesn’t just compromise machines and steal data, but can destroy information as well. The attackers who have claimed credit for the attack on Sony have spent the last couple of weeks gradually releasing large amounts of information stolen in the breach, including unreleased movies, personal data of Sony employees and sensitive security information such as digital certificates and passwords.

The new, signed version of Destover appears to have been compiled in July and was signed on Dec. 5, the day after Kaspersky Lab published an analysis of the known samples of the malware.

Submission + - Deep Neural Networks are Easily Fooled: Is this Snowcrash for AI? (arxiv.org) 1

An anonymous reader writes: A new paper on deep learning produces snowcrash to hack deep neural networks, producing fascinating images and raising security concerns. The paper is called "Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images".

Here is the abstract:

Deep neural networks (DNNs) have recently been achieving state-of-the-art performance on a variety of pattern-recognition tasks, most notably visual classification problems. Given that DNNs are now able to classify objects in images with near-human-level performance, questions naturally arise as to what differences remain between computer and human vision. A recent study revealed that changing an image (e.g. of a lion) in a way imperceptible to humans can cause a DNN to label the image as something else entirely (e.g. mislabeling a lion a library). Here we show a related result: it is easy to produce images that are completely unrecognizable to humans, but that state-of-the-art DNNs believe to be recognizable objects with 99.99% confidence (e.g. labeling with certainty that white noise static is a lion). Specifically, we take convolutional neural networks trained to perform well on either the ImageNet or MNIST datasets and then find images with evolutionary algorithms or gradient ascent that DNNs label with high confidence as belonging to each dataset class. It is possible to produce images totally unrecognizable to human eyes that DNNs believe with near certainty are familiar objects. Our results shed light on interesting differences between human vision and current DNNs, and raise questions about the generality of DNN computer vision.

Submission + - Anonymous demand to Lizard Squad to stop attacking Xbox Live and PSN (newsxbox.com) 1

xboxfosale2 writes: Infamous hacking group Anonymous has launched a YouTube video directed at Lizard Squad, the group claiming to be behind a series of DDoS attacks on the PlayStation Network and Xbox Live.

Both Sony’s and Microsoft’s on-line services were disrupted once more last night, with Lizard Squad claiming to be behind the attacks.

In the video, Anonymous demands that Lizard Squad stops attacking gaming communities otherwise they're going to come back come them.

"You have made countless threats against Xbox Live and PlayStation Network. You have taken down their servers with relentless Distributed-Denial-of-Service attacks," says Anonymous.
"If you continue to attempt to attack the gaming communities we will take action against you. What you are doing is wrong. You are taking away the fun and enjoyment of children as well as adults. You have no real reason for taking down their servers. Your only goal is to see how far you get without getting caught. Quit while you’re ahead because the FBI is watching you and they will find you and Anonymous will help and support them. You said your next attack on Christmas Day. We will stop at nothing to ensure that you never attack the gaming communities again. You have been warned. We are anonymous. We are legion. We do not forgive. We do not forget. Lizard Squad expect us."

Submission + - Is there really a tech worker shortage? (computerworld.com)

Gamoid writes: Silicon Valley says that we need more H-1B visas because there aren't enough developers and software engineers in the United States. But there's an increasing body of evidence to suggest that the real issue is that Silicon Valley companies aren't hiring the many, many talented people here in the US.

Submission + - Every weapon, armored truck, and plane the Pentagon gave to local police (muckrock.com)

v3rgEz writes: You may have heard that the image-conscious Los Angeles Unified School District chose to return the grenade launchers it received from the Defense Department’s surplus equipment program. You probably have not heard about some of the more obscure beneficiaries of the Pentagon giveaway, but now you can after MuckRock got the Department of Defense to release the full database, letting anyone browse what gear their local department has received.

Submission + - Fast camera: 100 billion fps (wustl.edu)

Scryer writes: Boffins at Washington University / St. Louis (WUSTL) led by Prof. Lihong Wang have developed a camera that can record up to 100 billion frames per second. They say previous best speeds were around 10 million frames per second. They call the technique "compressed ultrafast photography (CUP)". Hard-copy article: Gao L, Liang J, Li C, Wang, LV. Single-shot compressed ultrafast photography at one hundred billion frames per second. Nature. Dec. 4, 2014.

Submission + - A Cheap, Durable Robot Hand With An Adaptable Grip

An anonymous reader writes: Building robot hands that mimic human ones may not be doing robotic grasping any favors. Authors from iRobot, Harvard and Yale describe the success they've had with an underactuated, three fingered hand. It doesn't look human, but thanks to a design that prioritizes flexibility and adaptability, it can do a lot of the same jobs with a lot less programming than previous models. http://spectrum.ieee.org/robot...

Submission + - Has Microsoft admitted that it's thrown in the towel in the server space?

greglaw99 writes: Microsoft recently announcement that it is to port the .Net stack to Linux. This makes it really easy for lots of Windows Server users to swap to Linux and so puts at risk billions of dollars of Windows Server revenue. Why would they do this? I can see only two plausible explanations for this: it's good old fashioned FUD, or Microsoft has decided that the server war is lost and they are retrenching to defend against the Linux adoption wave spreading out to the desktop http://t.co/yvgqUsSdV9

Submission + - Consumer-grade SSDs survive two petabytes of writes

crookedvulture writes: The SSD Endurance Experiment previously covered on Slashdot has reached another big milestone: two freaking petabytes of writes. That's an astounding total for consumer-grade drives rated to survive no more than a few hundred terabytes. Only two of the initial six subjects made it to 2PB. The Kingston HyperX 3K, Intel 335 Series, and Samsung 840 Series expired on the road to 1PB, while the Corsair Neutron GTX faltered at 1.2PB. The Samsung 840 Pro continues despite logging thousands of reallocated sectors. It has remained completely error-free throughout the experiment, unlike a second HyperX, which has suffered a couple of uncorrectable errors. The second HyperX is mostly intact otherwise, though its built-in compression tech has reduced the 2PB of host writes to just 1.4PB of flash writes. Even accounting for compression, the flash in the second HyperX has proven to be far more robust than in the first. That difference highlights the impact normal manufacturing variances can have on flash wear. It also illustrates why the experiment's sample size is too small to draw definitive conclusions about the durability of specific models. However, the fact that all the drives far exceeded their endurance specifications bodes well for the endurance of consumer-grade SSDs in general.

Submission + - My Computer Language is Better Than Yours! (medium.com)

An anonymous reader writes: If you are a very large, rich technology company today, it seems it is no longer enough to have your own humongous data centers, luxurious buses, and organic lunch bars. You need your very own programming language, too.

Submission + - The cost of HTTPS

An anonymous reader writes: Researchers from CMU, Telefonica, and Politecnico di Torino have presented a paper at ACM CoNEXT that quantifies the cost of the “S” in HTTPS. The study shows that today major players are embracing end-to-end encryption, so that about 50% of web traffic is carried by HTTPS. This is a nice testament to the feasibility of having a fully encrypted web.
The paper pinpoints also the cost of encryption, that manifests itself through increases in the page loading time that go above 50%, and possible increase in battery usage.
However, the major loss due to the “S” is the inability to offer any in-network value added services, that are offered by middle-boxes, such as caching, proxying, firewalling, parental control, etc.
Are we ready to accept it?
Presentation can be downloaded from here

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...