Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

+ - Deepest Dwelling Creatures On Earth Discovered By College Students->

Submitted by mpicpp
mpicpp (3454017) writes "Whitman biology professor Paul Yancey and students Anna Downing '16 and Chloe Weinstock '17 have returned from the first detailed study of the Mariana Trench aboard Schmidt Ocean Institute's research vessel Falkor.

The Mariana Trench — located in the Western Pacific near Guam — has been the focus of high-profile voyages to conquer Challenger Deep, the deepest place on Earth. This recent expedition to the Trenchonboard Research Vessel Falkor targeted multiple depths and found active thriving communities of animals. The expedition set many new records, including the deepest rock samples ever collected and the discovery of new fish species at the greatest depths ever recorded.

New species were discovered on this expedition that will provide insight into the physiological adaptations of animals to this high-pressure environment. This research is being conducted in the lab of Whitman College'sProfessor of Biology Paul Yancey. In the past, Yancey and his students, working on animals from moderate depths, discovered certain organic molecules that protect the cells of deep-sea animals from the effects of high pressure, which distorts proteins such as enzymes. These kinds of protective molecules are also being tested to treat human diseases that are caused by malformed proteins, such as cystic fibrosis. Additionally, his work on protective molecules in fishes predicted that fish would not be able to live below about 8,200 meters (27,060 feet). Prior to this expedition, the deepest documented fish was from 7,700 meters (25,410 feet).

The expedition also broke several records for the deepest living fish either caught or seen on video. Setting the record at 8,143 meters, (26,872 feet) was a completely unknown variety of snail fish, which stunned scientists when it was filmed several times during sea floor experiments. The white translucent fish had broad wing-like fins and an eel-like tail, and slowly glided over the bottom."

Link to Original Source

+ - 65,000 Complaints Later, Microsoft Files Suit Against Tech Support Scammers-> 2

Submitted by MojoKid
MojoKid (1002251) writes "Tech support scammers have been around for a long time and are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers. According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person's computer, which lets them steal personal and financial information and even install malware."
Link to Original Source
Communications

Tor Network May Be Attacked, Says Project Leader 83

Posted by timothy
from the routing-around-the-routing-around dept.
Earthquake Retrofit writes The Register is reporting that the Tor Project has warned that its network – used to mask peoples' identities on the internet – may be knocked offline in the coming days. In a Tor blog post, project leader Roger 'arma' Dingledine said an unnamed group may seize Tor's directory authority servers before the end of next week. These servers distribute the official lists of relays in the network, which are the systems that route users' traffic around the world to obfuscate their internet connections' public IP addresses.

+ - TOR network may be attacked->

Submitted by Earthquake Retrofit
Earthquake Retrofit (1372207) writes "The Register is reporting that the Tor Project has warned that its network – used to mask peoples' identities on the internet – may be knocked offline in the coming days.

In a Tor blog post (https://blog.torproject.org) project leader Roger "arma" Dingledine said an unnamed group may seize Tor's directory authority servers before the end of next week. These servers distribute the official lists of relays in the network, which are the systems that route users' traffic around the world to obfuscate their internet connections' public IP addresses."

Link to Original Source
Medicine

How a 3D Printer Let a Dog Run For the First Time 24

Posted by timothy
from the dogs-have-been-running-since-forever dept.
Nerval's Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology's potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.

+ - How a 3D Printer Let a Dog Run for the First Time->

Submitted by Nerval's Lobster
Nerval's Lobster (2598977) writes "Ever since 3-D printing began to enter the mainstream, people have discussed the technology’s potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade."
Link to Original Source

+ - Warblers Hear Tornadoes Coming from Hundreds of Miles Away

Submitted by HughPickens.com
HughPickens.com (3830033) writes "Osvaldo Nunez reports that a recent study out of UC Berkeley says that golden-winged warblers can predict the coming of storms and tornadoes while the closest tornado is still hundreds of miles away. In April, a massive thunderstorm ravaged central and southern United States, causing more than $1 billion in damage across 17 states. The birds nest and breed around the Great Lakes and the Appalachian Mountains every summer. After flying 1,500-miles down to Tennessee, two days before the storms, flocks of songbirds and golden-winged warblers departed the areas and flew 900-miles to Florida and Cuba. They escaped just south of the tornadoes' path — and then went straight home again. By May 2, five tagged birds were back in their nesting area. "At the same time that meteorologists on The Weather Channel were telling us this storm was headed in our direction, the birds were apparently already packing their bags and evacuating the area," says Henry Streby.

The most likely tip-off was the deep rumble that tornadoes produce, well below what humans can hear. Noise in this "infrasound" range travels thousands of kilometers, and may serve as something of an early warning system for animals that can pick it up. "It's very unlikely that this species is the only group doing this," says Streby. The new study is the first time that migratory birds have been seen taking such dramatic evasive action. "We know that birds can alter their route to avoid things during regular migration. But it hadn't been shown before that they would leave once the migration is over, and they'd established their breeding territory, to escape severe weather." With the predicted increase in severity and frequency of similar storms as anthropogenic climate change progresses, understanding large-scale behavioral responses of animals to such events will be an important objective of future research."
Security

Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony 160

Posted by timothy
from the forewarned-is-forearmed dept.
wiredmikey writes Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise. While not mentioning Sony by name in its advisory, instead referring to the victim as a "major entertainment company," US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks. According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool. US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations.

+ - Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

Submitted by wiredmikey
wiredmikey (1824622) writes "Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise.

While not mentioning Sony by name in its advisory, instead referring to the victim as a “major entertainment company,” US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks.

According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool.

US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations."

Google News Sci Tech: Obama vows US response to North Korea over Sony cyber attack - Reuters->

From feed by feedfeeder

Reuters

Obama vows US response to North Korea over Sony cyber attack
Reuters
WASHINGTON (Reuters) - President Barack Obama vowed on Friday to respond to a devastating cyber attack on Sony Pictures that he blamed on North Korea, and scolded the Hollywood studio for caving in to what he described as a foreign dictator imposing...
Sony made a mistake: ObamaThe Australian (blog)

all 13,468 news articles

Link to Original Source

Google News Sci Tech: Obama Vows a Response to Cyberattack on Sony - New York Times->

From feed by feedfeeder

New York Times

Obama Vows a Response to Cyberattack on Sony
New York Times
WASHINGTON — President Obama said on Friday that the United States “will respond proportionally” against North Korea for its destructive cyberattacks on Sony Pictures, but he criticized the Hollywood studio for giving in to intimidation when it withdrew “The...
Sony hack: Obama and Lynton point fingers on surreal dayLos Angeles Times
Think North Korea hacked Sony? Think about thisPCWorld
Obama declares US will retaliate against North Korea for hacking attack on SonySydney Morning Herald
BBC News-Reuters-Huffington Post
all 13,445 news articles

Link to Original Source
Businesses

Staples: Breach May Have Affected 1.16 Million Customers' Cards 92

Posted by timothy
from the your-name-here dept.
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.

+ - Staples: Breach may have affected 1.16 million customers' cards->

Submitted by mpicpp
mpicpp (3454017) writes "The office-supply retailer gave new details about a breach at more than 100 of its stores.

Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October.

The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers’ credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached.

Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers’ names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said."

Link to Original Source

Google News Sci Tech: Sued by Google, a State Attorney General Retreats - New York Times->

From feed by feedfeeder

New York Times

Sued by Google, a State Attorney General Retreats
New York Times
Attorney General Jim Hood of Mississippi on Friday agreed to call a “time out” in his fight with Google after the Internet giant filed a lawsuit accusing him of conspiring with the movie industry. The move by Mr. Hood, who has been one Google's most outspoken...
Google sues Mississippi Attorney General 'for doing the MPAA's dirty work'The Register
As Its Battle With Hollywood Returns, Google Takes Aim at Mississippi Attorney ... Wired
Google Sues Mississippi Over Campaign to Restrict SearchesWall Street Journal
Businessweek-MiamiHerald.com-Ars Technica
all 140 news articles

Link to Original Source

Money is the root of all wealth.

Working...