Submission + - Artificial Intelligence machine can identify 2 BILLION people in seconds ( 2

schwit1 writes: Yitu Technology has made an AI algorithm that can connect to millions of surveillance cameras and instantly recognise people.

The company – based in Shanghai, China – developed Dragonfly Eye to scan through millions of photographs that have been logged in the country’s national database.

This means it has a collection of 1.8 billion photos on file, including visitors to the country and those taken at ports and airports.

The cutting-edge technology is now being used track down criminals, with the early stages of use showing it has been a hugely successful.

Submission + - Searchable DB of 1.4 billion stolen credentials found on dark web ( 2

YVRGeek writes: A security vendor has discovered a huge list of easily searchable stolen credentials in cleartext on the dark web which it fears could lead to a new wave of cyber attacks.

Julio Casal, co-founder of identity threat intelligence provider 4iQ, which has offices in Calfornia and Spain, said in a Dec. 8 blog his firm found the database of 1.4 billion username and password pairs while scanning the dark web for stolen, leaked or lost data.

He said the company has verified at least a group of credentials are legitimate.

What is alarming is the file is what he calls “an aggregated, interactive database that allows for fast (one second response) searches and new breach imports.” For example, searching for “admin,” “administrator” and “root” returned 226,631 passwords of admin users in a few seconds. As a result, the database can help attackers automate account hijacking or account takeover.

Submission + - Biggest IT Management Mistakes

snydeq writes: Sure, nobody’s perfect. But for those in charge of enterprise technology, the fallout from a strategic gaffe, bad hire, or weak spine can be disastrous, writes Dan Tynan, in an article on the biggest management mistakes in IT. 'Some of the most common IT gaffes include becoming trapped in a relationship with a vendor you can't shake loose, hiring or promoting the wrong people, and hiding problems from top management until it's too late to recover.' What are some other career- and company-destroyers you've witnessed in your years in IT?

Submission + - Can the FTC Really Handle Net Neutrality? (

mmascari writes: From Wetmachine: Can the FTC Really Handle Net Neutrality? Let’s Check Against the 4 Most Famous Violations.

On the question of “does the FTC have the power to stop a broadband provider from saying ‘I’m not going to let you use a particular service or access particular content,’ the answer is a flat out straight up “no.” Because for normal everyday businesses, absent a specific enforceable regulation, offering you some limited service is not “unfair” under 15 USC 45(a). Period. Full stop.

Submission + - FCC Explains How Net Neutrality Will Be Protected Without Net Neutrality Rules (

An anonymous reader writes: The Federal Communications Commission is still on track to eliminate net neutrality rules this Thursday, but the commission said today that it has a new plan to protect consumers after the repeal. The FCC and Federal Trade Commission released a draft memorandum of understanding (MOU) describing how the agencies will work together to make sure ISPs keep their net neutrality promises. After the repeal, there won't be any rules preventing ISPs from blocking or throttling Internet traffic. ISPs will also be allowed to charge websites and online services for faster and more reliable network access. In short, ISPs will be free to do whatever they want—unless they make specific promises to avoid engaging in specific types of anti-competitive or anti-consumer behavior. When companies make promises and break them, the FTC can punish them for deceiving consumers. That's what FCC Chairman Ajit Pai and Acting FTC Chair Maureen Ohlhausen are counting on. “Instead of saddling the Internet with heavy-handed regulations, we will work together to take targeted action against bad actors," Pai said in a joint announcement with the FTC today.

Submission + - Apple Buys Shazam To Boost Apple Music (

An anonymous reader writes: Apple agreed to acquire music-identification service Shazam, taking ownership of one of the first apps to demonstrate the power of the iPhone, recognizing songs after hearing just a few bars of a tune. Terms of the deal weren’t disclosed, but a person familiar with the situation said Apple is paying about $400 million for the U.K.-based startup. That would be one of Apple’s largest acquisitions ever, approaching the size of its 1996 purchase of Next Computer Inc. which brought co-founder Steve Jobs back to the company. That transaction would be worth more than $600 million in today’s dollars. The Shazam app uses the microphone on a smartphone or computer to identify almost any song playing nearby, then points users to places they can listen to it in future, such as Apple Music or Google’s YouTube.

"Apple Music and Shazam are a natural fit, sharing a passion for music discovery and delivering great music experiences to our users," Apple said in an emailed statement on Monday. "We have exciting plans in store, and we look forward to combining with Shazam upon approval of today’s agreement. Since the launch of the App Store, Shazam has consistently ranked as one of the most popular apps for iOS," Apple also said. "Today, it’s used by hundreds of millions of people around the world, across multiple platforms." The acquisition would help Apple embed that capability more deeply into its music offerings. The company’s digital assistant Siri gained Shazam integration in 2014, so users could ask it what song is playing in the background.

Submission + - What are historic examples of net neutrality enforcement on the net? (

darkonc writes: With internet providers and the FCC pushing the end of net neutrality, on the presumption that 'net neutrality is a recent democratic creation', I'm looking back to history. Are there people here who can point me to examples of 'The Net' (even informally) requiring that people coming onto the net respect net-neutrality type rules?

Submission + - Synthetic DNA based drug first to slow progress of Huntington's

John.Banister writes: The Guardian reports of early success in the trial of a synthetic DNA based drug, Ionis-HTTRx, at University College London’s Huntington’s Disease Centre . Bionews explains that this gene silencing drug binds to the RNA transcript of the faulty huntingtin gene, triggering its destruction before it can go on to make the huntingtin protein. There's much excited speculation that the same technique could be used versus Alzheimer's and Parkinson's, once people know which genes to target.

Submission + - Why Linux HDCP isn't the end of the world (

mfilion writes: Recently, Sean Paul from Google's ChromeOS team, submitted a patch series to enable HDCP support for the Intel display driver. HDCP is used to encrypt content over HDMI and DisplayPort links, which can only be decoded by trusted devices. However, if you already run your own code on a free device, HDCP is an irrelevance and does not reduce freedom in any way.

Submission + - Eudora: Made email Famous

e432776 writes: Many Slashdot readers will (fondly) remember Eudora, an early graphical email client. A recent article from vice rehashes some of the history of that storied client, including an interesting comparison with another foundational program of the current internet, Netscape.

Submission + - The Air Force is considering training enlisted airmen to be pilots (

schwit1 writes:

The Air Force has pursued a number of policies to correct that shortage, including quality-of-life improvements, opening positions for retired pilots, and drawing more active-duty pilots from the National Guard and Reserve. The force also has the option to recall retired pilots, but says it will not avail itself of it.

Now it appears the Air Force is considering a step it has long avoided: training enlisted airmen to be combat aviators.

A new six-month pilot-training program will consist of 15 officers and five enlisted airmen, Maj. Gen. Timothy Leahy, chief of the Second Air Force, told his commanders in a November 30 email, seen by Air Force Times.

Currently, the only Air Force personnel eligible to be pilots are commissioned officers, and achieving officer status requires a four-year college degree.

Some pilots have left the service after being “demoted” to piloting drones. UAV duty would be a great place for the Air Force to conduct a trial run for NCO pilots, because it could prove good for retention — and maybe even great for morale. Non-coms would get to do something the independent Air Force has never allowed, and “real” pilots wouldn’t get stuck with UAVs.

Besides, it shouldn’t take a captain or a major to fly a steel shack in the Nevada desert.

Submission + - Using Intel Management Engine for productive purposes?

iamacat writes: Not a day goes by without a story about another Intel Management Engine vulnerability. What I get is that a lot of consumer PCs can access network and run x86 code on top of UNIX-like OS such as Minix even when powered off. This sounds pretty useful for tasks such as running an occasional use Plex server. Like I can have a box that draws very little power when idle. But when an incoming connection is detected, it can power itself and the media drive on and serve the requested content. So if Intel ME is so insecure, how do I exploit it for practically useful purposes?

Slashdot Top Deals