Data Storage

Apple File System in macOS High Sierra Won't Work With Fusion Drives (arstechnica.co.uk) 8

An anonymous reader shares a report: MacOS High Sierra will come out of beta and roll out to the public next week. If you have previously installed the beta version, you may need to take extra steps before installing the release so your Fusion Drive-toting machine doesn't experience any negative consequences. Apple announced that the new Apple File system (APFS) won't immediately support Fusion Drives and will only support systems with all-flash built-in storage in the initial release of High Sierra. Those who tested out the beta versions of macOS High Sierra had their Fusion Drives converted to the new APFS. However, support was removed from the most recent beta versions, and it isn't coming back with the public release of High Sierra. Apple provided a set of instructions to help those users convert their Fusion Drives back from APFS to the standard HFS+ format before installing the High Sierra update. The instructions include backing up data using Time Machine, creating a bootable installer, reformatting the machine using Disk Utility, and reinstalling the operating system update.
Entertainment

Sonos To Launch a Wireless Speaker That Would Support Multiple Voice Assistants (yahoo.com) 15

Sonos, a mid- to high-end speaker manufacturer, released an updated privacy policy for its speakers that almost certainly confirms that the company will release a speaker with Amazon's Alexa voice assistant built into the device in the near term. From a report: Though many devices that integrate with Alexa have been announced and are starting to come to market, this is one of the higher-profile examples and could be instructive for smart-speaker designers. The company first announced its intention to add voice-assistant integration to its speakers over a year ago, but didn't give any specific time frame for that step. And an FCC filing from the company that surfaced a few weeks ago showed that it is looking into systems that would support multiple voice assistants, so a user could potentially have the option to choose between Amazon's Alexa or Google's Assistant, depending on what other devices they own and what platform they prefer.
Iphone

Developer Marco Arment Shares Thoughts On iPhone X's Notch (marco.org) 81

Developer Marco Arment writes about the infamous notch on the iPhone X, which Apple has told developers to embrace rather than ignore: This is the new shape of the iPhone. As long as the notch is clearly present and of approximately these proportions, it's unique, simple, and recognizable. It's probably not going to significantly change for a long time, and Apple needs to make sure that the entire world recognizes it as well as we could recognize previous iPhones. That's why Apple has made no effort to hide the notch in software, and why app developers are being told to embrace it in our designs. That's why the HomePod software leak depicted the iPhone X like this: it's the new basic, recognizable form of the iPhone. Apple just completely changed the fundamental shape of the most important, most successful, and most recognizable tech product that the world has ever seen.
Chrome

Google Chrome Most Resilient Against Attacks, Researchers Find (helpnetsecurity.com) 70

Between Google Chrome, Microsoft Edge, and Internet Explorer, Chrome has been found to be the most resilient against attacks, an analysis by security researchers has found. Firefox, Safari, and Opera were not included in the test. From a report: "Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. However, the attack surface of modern web browsers is increasing due to new technologies and the increasing complexity of web browsers themselves," noted Markus Vervier, Managing Director of German IT security outfit X41 D-Sec (and one of the researchers involved in the analysis). The researchers' aim was to determine which browser provides the highest level of security in common enterprise usage scenarios.
Encryption

Why You Shouldn't Use Texts For Two-Factor Authentication (theverge.com) 70

An anonymous reader quotes a report from The Verge: A demonstration video posted by Positive Technologies (and first reported by Forbes) shows how easy it is to hack into a bitcoin wallet by intercepting text messages in transit. The group targeted a Coinbase account protected by two-factor authentication, which was registered to a Gmail account also protected by two-factor. By exploiting known flaws in the cell network, the group was able to intercept all text messages sent to the number for a set period of time. That was enough to reset the password to the Gmail account and then take control of the Coinbase wallet. All the group needed was the name, surname and phone number of the targeted Bitcoin user. These were security researchers rather than criminals, so they didn't actually steal anyone's bitcoin, although that would have been an easy step to take. At a glance, this looks like a Coinbase vulnerability, but the real weakness is in the cellular system itself. Positive Technologies was able to hijack the text messages using its own research tool, which exploits weaknesses in the cellular network to intercept text messages in transit. Known as the SS7 network, that network is shared by every telecom to manage calls and texts between phone numbers. There are a number of known SS7 vulnerabilities, and while access to the SS7 network is theoretically restricted to telecom companies, hijacking services are frequently available on criminal marketplaces. The report notes of several ways you can protect yourself from this sort of attack: "On some services, you can revoke the option for SMS two-factor and account recovery entirely, which you should do as soon as you've got a more secure app-based method established. Google, for instance, will let you manage two-factor and account recovery here and here; just set up Authenticator or a recovery code, then go to the SMS option for each and click 'Remove Phone.'"
Medicine

Bacteria In Tumors Can Inactivate Common Chemotherapy Drugs, Study Suggests (arstechnica.com) 28

Researchers caught the bacteria Mycoplasma hyorhinis hiding out among cancer cells, thwarting chemotherapy drugs intended to treat the tumors they reside in. The findings have been published this week in Science. Ars Technica reports: Drug resistance among cancers is a "foremost challenge," according to the study's authors, led by Ravid Straussman at the Weizmann Institute of Science. Yet the new data suggest that certain types of drug-resistant cancers could be defeated with a simple dollop of antibiotics alongside a chemotherapy regimen. Dr. Straussman and his colleagues got a hunch to look for the bacteria after noticing that, when they grew certain types of human cancer cells together in lab, the cells all became more resistant to a chemotherapy drug called gemcitabine. This is a drug used to treat pancreatic, lung, breast, and bladder cancers and is often sold under the brand name Gemzar. The researchers suspected that some of the cells may secrete a drug-busting molecule. So they tried filtering the cell cultures to see if they could catch it. Instead, they found that the cell cultures lost their resistance after their liquid broth passed through a pretty large filter -- 0.45 micrometers. This would catch large particles -- like bacteria -- but not small molecules, as the researchers were expecting.

Looking closer, the researchers noticed that some of their cancer cells were contaminated with M. hyorhinis. And these bacteria could metabolize gemcitabine, rendering the drug useless. When the researchers transplanted treatable cancer cells into the flanks of mice -- some with and some without M. hyorhinis -- the bacteria-toting tumors were resistant to gemcitabine treatment.

Bitcoin

Ethereum Will Match Visa In Scale In a 'Couple of Years,' Says Founder (techcrunch.com) 90

Ethereum's founder, Vitalik Buterin, believes that his cryptocurrency has the potential to replace things like credit card networks and gaming servers. He even goes as far to say that Ethereum will replace Visa in "a couple of years," though he later clarified that "ethereum *will have Visa-scale tx capacity*, not that it will 'replace Visa.'" TechCrunch reports: "There's the average person who's already heard of bitcoin and the average person who hasn't," he said. His project itself builds upon that notion by adding more utility to the blockchain, thereby creating something everyone will want to hear about. "Where Ethereum comes from is basically you take the idea of crypto economics and the kinds of economic incentives that keeps things like bitcoin going to create decentralized networks with memory for a whole bunch of applications," he said. "A good blockchain application is something that needs decentralization and some kind of shared memory." That's what he's building and hopes others will build on the Ethereum network.

Right now the network is a bit too slow for most mainstream applications. "Bitcoin is processing a bit less than 3 transactions per second," he said. "Ethereum is doing five a second. Uber gives 12 rides a second. It will take a couple of years for the blockchain to replace Visa." Buterin doesn't think everything should run on the blockchain but many things can. As the technology expands it can grow to replace many services that require parallelization -- that is programs that should run at the same time.

Communications

T-Mobile To Increase Deprioritization Threshold To 50GB This Week (tmonews.com) 47

After raising its deprioritization threshold to 32GB in May, it looks like T-Mobile will bump it up to 50GB on September 20th, according to a TmoNews source. The move will widen the gap between T-Mobile and its competition. For comparison, Sprint's deprioritization threshold is currently 23GB, while AT&T and Verizon's are both 22GB. TmoNews reports: It's said that this 50GB threshold won't change every quarter and no longer involves a specific percentage of data users. As with the current 32GB threshold, customers that exceed this new 50GB deprioritization threshold in a single month may experience reduced speeds in areas where the network is congested. T-Mobile hasn't issued an announcement regarding this news, but the official @TMobileHelp account recently tweeted "Starting 9/20, the limit will be increased!" in response to a question about this news.
United Kingdom

Diesel Cars Contribute To 5,000 Premature Deaths a Year In Europe, Says Study (phys.org) 176

An anonymous reader quotes a report from Phys.Org: Emissions from diesel cars rigged to appear eco-friendly may be responsible for 5,000 air pollution deaths per year in Europe alone, according to a study published on Monday. The numbers are in line with previous assessments of deaths due to the so-called "Dieselgate" scandal, which erupted when carmaker Volkswagen admitted in 2015 to cheating on vehicle emissions tests. Many other carmakers have since fallen under suspicion. The researchers from Norway, Austria, Sweden and the Netherlands calculated that about 10,000 deaths in Europe per year can be attributed to small particle pollution from light duty diesel vehicles (LDDVs). Almost half of these would have been avoided if emissions of nitrogen oxides (NOx) from diesel cars on the road had matched levels measured in the lab. If diesel cars emitted as little NOx as petrol ones, almost 4,000 of the 5,000 premature deaths would have been avoided, said the authors. The countries with the heaviest burden are Italy, Germany, and France, the team added, "resulting from their large populations and high share of diesel cars in their national fleets." Touted as less polluting, the share of diesel cars in Europe rose fast compared to petrol since the 1990s, and now comprise about half the fleet. There are more than 100 million diesel cars in Europe today, twice as many as in the rest of the world together, said the study authors. Diesel engines emit less planet-warming carbon dioxide than petrol ones, but significantly more NOx. The study has been published in the journal Environmental Research Letters.
AI

AI Just Made Guessing Your Password a Whole Lot Easier (sciencemag.org) 116

sciencehabit shares a report from Science Magazine: The Equifax breach is reason for concern, of course, but if a hacker wants to access your online data by simply guessing your password, you're probably toast in less than an hour. Now, there's more bad news: Scientists have harnessed the power of artificial intelligence (AI) to create a program that, combined with existing tools, figured more than a quarter of the passwords from a set of more than 43 million LinkedIn profiles.

Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A "generator" attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a "discriminator" tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter. The Stevens team created a GAN it called PassGAN and compared it with two versions of hashCat and one version of John the Ripper. The scientists fed each tool tens of millions of leaked passwords from a gaming site called RockYou, and asked them to generate hundreds of millions of new passwords on their own. Then they counted how many of these new passwords matched a set of leaked passwords from LinkedIn, as a measure of how successful they'd be at cracking them. On its own, PassGAN generated 12% of the passwords in the LinkedIn set, whereas its three competitors generated between 6% and 23%. But the best performance came from combining PassGAN and hashCat. Together, they were able to crack 27% of passwords in the LinkedIn set, the researchers reported this month in a draft paper posted on arXiv. Even failed passwords from PassGAN seemed pretty realistic: saddracula, santazone, coolarse18.

Google

Jeweler Forged Judge's Signature To Force Google To Kill Negative Reviews (thedailybeast.com) 47

A sapphire salesman is facing jail time for forging a judge's signature in a case involving Google. Kelly Weill from The Daily Beast reports: Michael Arnstein is the third-generation owner of the Natural Sapphire Company, a Manhattan-based jewelry business. After a falling-out with a former business partner, Arnstein's company amassed dozens of negative reviews, which featured prominently in the Natural Sapphire Company's Google search results. Arnstein sued the former business partner in 2011, accusing him of writing defamatory negative reviews, and a judge ordered the partner to delete 54 of the negative comments. But some negative reviews remained, even after the court order. So Arnstein copied the judge's signature and forged new court orders of his own, demanding that Google scrub negative reviews from his company's search results, Arnstein admitted in a guilty plea on Friday.
The Military

Navy Plans To Use Xbox 360 Controllers For New Periscope Systems Aboard Its Submarines (go.com) 100

According to ABC News, the U.S. Navy is planning to use Xbox 360 controllers to operate periscopes aboard its most advanced submarines. High-resolution cameras and large monitors are replacing the traditional rotating periscope in the Navy's Virginia-class subs. While they can be controlled by a helicopter-style stick, the Navy plans to integrate an Xbox controller into the system because they're more familiar to younger sailors and require less training. They are also considerably cheaper. The controller typically costs less than $30 compared to the $38,000 cost of a photonic mast handgrip and imaging control panel. The Xbox controller will be included as part of the integrated imaging system for Virginia-class subs beginning with the future USS Colorado. It is supposed to be commissioned by November.
Security

Equifax Suffered a Hack Almost Five Months Earlier Than the Date It Disclosed (bloomberg.com) 82

Bloomberg is reporting that Equifax, the credit reporting company that recently reported a cybersecurity incident impacting roughly 143 million U.S. consumers, learned about a breach of its computer systems in March -- almost five months before the date it has publicly disclosed. The company said the March breach was unrelated to the recent hack involving millions of U.S. consumers, but one of the people familiar with the situation said the breaches involve the same intruders. From the report: Equifax hired the security firm Mandiant on both occasions and may have believed it had the initial breach under control, only to have to bring the investigators back when it detected suspicious activity again on July 29, two of the people said. Equifax's hiring of Mandiant the first time was unrelated to the July 29 incident, the company spokesperson said. The revelation of a March breach will complicate the company's efforts to explain a series of unusual stock sales by Equifax executives. If it's shown that those executives did so with the knowledge that either or both breaches could damage the company, they could be vulnerable to charges of insider trading. The U.S. Justice Department has opened a criminal investigation into the stock sales, according to people familiar with the probe.

In early March, they said, Equifax began notifying a small number of outsiders and banking customers that it had suffered a breach and was bringing in a security firm to help investigate. The company's outside counsel, Atlanta-based law firm King & Spalding, first engaged Mandiant at about that time. While it's not clear how long the Mandiant and Equifax security teams conducted that probe, one person said there are indications it began to wrap up in May. Equifax has yet to disclose that March breach to the public.

Businesses

Slashdot Asks: Which IT Hiring Trends Are Hot, and Which Ones Are Going Cold? 166

snydeq writes: Recruiting and retaining tech talent remains IT's biggest challenge today, writes Paul Heltzel, in an article on what trends are heating up and what's cooling off when it comes to IT staffing. "One thing hasn't changed this year: Recruiting top talent is still difficult for most firms, and demand greatly outstrips supply," writes Heltzel. "That's influencing many of the areas we looked at, including compensation and retention. Whether you're looking to expand your team or job searching yourself, read on to see which IT hiring practices are trending and which ones are falling out of favor." What are you seeing companies favoring in the hiring market these days?

Slashdot Top Deals