Forgot your password?
typodupeerror

+ - Facebook to DEA: Stop Using Phony Profiles to Nab Criminals

Submitted by HughPickens.com
HughPickens.com (3830033) writes "CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Faceook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says Privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls."

+ - Delivering Malicious Android Apps Hidden In Image Files

Submitted by Anonymous Coward
An anonymous reader writes "Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, seemingly innocuous wrapper app. Fortinet malware researcher Axelle Apvrille and reverse engineer Ange Albertini created a custom tool they dubbed AngeCryption, which allows them to encrypt the payload Android application package (APK) and make it look like an image (PNG, JPG) file . They also had to create another APK that carries the "booby-trapped" image file and which can decrypt it to unveil the malicious APK file and install it. A malicious app thusly encrypted is nearly invisible to reverse engineers, and possibly even to AV solutions and Google's Android Bouncer."

+ - Statoil's oil find in North Sea bigger than expected

Submitted by stephendavion
stephendavion (2872091) writes "An oil find by Statoil in the Norwegian sector of the North Sea is much bigger than earlier thought and the find could be tied into the Grane field, the firm said in a statement on Tuesday. The discovery, first proven in 1992, contains between 30 and 80 million barrels of recoverable oil, well above previous estimates for about 6 million barrels, the Norwegian Petroleum Directorate added."

+ - Using Apple's Metal Compute Shaders for Parallel Processing in iOS

Submitted by Anonymous Coward
An anonymous reader writes "Apple's Metal is a new technology that gives developers low overhead access to the GPU via a C++ style language. As well as the commonly used vertex and fragment shaders, Metal supports compute shaders for parallel processing.

In a series of two blog posts (here and here), Simon Gladman demonstrates how to implement Metal compute shaders under Swift and then run a reaction diffusion model using cellular automata on an iPhone."

+ - Australian physicists build reversible tractor beam->

Submitted by Anonymous Coward
An anonymous reader writes "Physicists at Australian National University have developed a tiny tractor beam that improves in several ways upon previous attempts. First, it operates on scales which, while still tiny, are higher than in earlier experiments. The beam can move particles up to 200 microns in diameter, and it can do so over a distance of 20 cm. "Unlike previous techniques, which used photon momentum to impart motion, the ANU tractor beam relies on the energy of the laser heating up the particles and the air around them. The ANU team demonstrated the effect on gold-coated hollow glass particles. The particles are trapped in the dark center of the beam. Energy from the laser hits the particle and travels across its surface, where it is absorbed creating hotspots on the surface. Air particles colliding with the hotspots heat up and shoot away from the surface, which causes the particle to recoil, in the opposite direction. To manipulate the particle, the team move the position of the hotspot by carefully controlling the polarization of the laser beam."
Link to Original Source

+ - Dr.Who to teach kids to code ->

Submitted by DCFC
DCFC (933633) writes "The BBC is releasing a game to help ten 8-11 year olds get into coding. Based on Dr.Who, it alternates between standard platform game and programming puzzles that introduce the ideas of sequence, loops, if..then, variables and a touch of event driven programming...and you get to program a Dalek to make him more powerful, apparently the BBC thinks upgrading psychopathic racist death machines is a good idea."
Link to Original Source

+ - First Demonstration Of Artificial Intelligence On A Quantum Computer

Submitted by KentuckyFC
KentuckyFC (1144503) writes "Machine learning algorithms use a training dataset to learn how to recognise features in images and use this 'knowledge' to spot the same features in new images. The computational complexity of this task is such that the time required to solve it increases in polynomial time with the number of images in the training set and the complexity of the "learned" feature. So it's no surprise that quantum computers ought to be able to rapidly speed up this process. Indeed, a group of theoretical physicists last year designed a quantum algorithm that solves this problem in logarithmic time rather than polynomial, a significant improvement. Now, a Chinese team has successfully implemented this artificial intelligence algorithm on a working quantum computer, for the first time. The information processor is a standard nuclear magnetic resonance quantum computer capable of handling 4 qubits. The team trained it to recognise the difference between the characters '6' and '9' and then asked it to classify a set of handwritten 6s and 9s accordingly, which it did successfully. The team say this is the first time that this kind of artificial intelligence has ever been demonstrated on a quantum computer and opens the way to the more rapid processing of other big data sets--provided, of course, that physicists can build more powerful quantum computers."

+ - Annals of sleazy domain name squatting

Submitted by lpress
lpress (707742) writes "The domain name ebola.com is for sale. In the meantime, the folks who own it are redirecting to ebola.org, where you can read frightening articles and purchase BHT, a nutritional supplement that could help with ebola. I don't know which is more depressing — the fact that someone would try to exploit the ebola epidemic this way or that there are enough people who would pay for BHT to fend off ebola to make squatting on disease domain names a profitable business."

+ - Analysis of Linux backdoor used in freenode hack

Submitted by Anonymous Coward
An anonymous reader writes "A detailed analysis has been done of the Linux backdoor used in the freenode hack. It employed port knocking and crypto to provide security of the backdoor against others using it.. This seems a little more sophisticated than your average jane hacker.. Criminal? Government?"

+ - Supposed Battery Breakthrough. 70% charge in 2mins, 20yr life.->

Submitted by chaosdivine69
chaosdivine69 (1456649) writes "According to Scientists at Nanyang Technology University (NTU), they have developed ultra-fast charging batteries that can be recharged up to 70 per cent in only two minutes and have a 20 yr lifespan (10,000 charges). The impact of this is potentially a game changer for a lot of industries reliant on lithium ion batteries.

In the car industry for example, consumers will save huge on costs for battery replacement and manufacturers will save on material construction since they're using a nanotube structure of Titanium dioxide which is an abundant, cheap and safe material found in soil. Titanium dioxide is commonly used as a food additive or in sunscreen lotions to absorb harmful ultraviolet rays. It is believed that charging an electric car can be achieved in as little as 5 minutes making it comparable to filling up a gasoline based automobile."

Link to Original Source

+ - Remote exploit vulnerability found in bash->

Submitted by kdryer39
kdryer39 (1210976) writes "A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271. This affects Debian as well as other Linux distributions.

The major attack vectors that have been identified in this case are HTTP requests and CGI scripts. Another attack surface is OpenSSH through the use of AcceptEnv variables. As well through TERM and SSH_ORIGINAL_COMMAND. An environmental variable with an arbitrary name can carry a nefarious function which can enable network exploitation."

Link to Original Source
Windows

+ - WINDOWS 8 PREVIEW REVEALS MAJOR UI METAMORPHOSIS->

Submitted by
martty
martty writes "Microsoft began its Windows 8 publicity blitz in earnest Wednesday, previewing an operating system that appears to break from the norm in more ways than one.
It has a tile interface similar to that of Windows Phone 7, it will run on PCs and tablets, and it will support both touchscreen and mouse-and-keyboard interactions."

Link to Original Source
Microsoft

+ - 8 rumored features in Windows 8->

Submitted by stinkymountain
stinkymountain (962420) writes "Microsoft recently allowed select OEM partners to download updated preview builds of Windows 8. Since then, there have been several leaked images of supposedly new features that you might see in the next version of Windows when it launches (perhaps in early 2012). And Microsoft showed off some features in a preview last week. Here's a compilation..."
Link to Original Source

Are we running light with overbyte?

Working...