Submission + - 6 Female Founders Accuse VC Justin Caldbeck of Making Unwanted Advances (techcrunch.com)

An anonymous reader writes: Yesterday The Information reported on allegations made by half a dozen women working in the tech industry who say they have faced unwanted and inappropriate advances from Silicon Valley venture capitalist, Justin Caldbeck, co-founder and managing partner of Binary Capital. The women include Niniane Wang, co-creator of Google Desktop and a prior CTO of Minted; and Susan Ho and Leiti Hsu, co-founders of Journy, a travel planning and booking service. The Information also talked to three other women who said Caldbeck made inappropriate advances to them. It says these women did not want their names disclosed for fear of retaliation from the VC — and because of wider concerns they might suffer a backlash from men in the industry who don’t see inappropriate advances as a problem. Among the allegations made to The Information are that Caldbeck sent explicit text messages to women; that Caldbeck sent messages in the middle of the night suggesting meeting up; that Caldbeck suggested going to a hotel bedroom during a meeting; that Caldbeck made a proposition about having an open relationship; and that Caldbeck grabbed a woman’s thigh under the table of a bar during a meeting. Several of the women reported finding Caldbeck’s advances so awkward they gave up on continued dealings with him.

Submission + - Google's Gmail Will No Longer Scan Messages to Personalize Ads (vortex.com)

Lauren Weinstein writes: Google has announced that beginning later this year, they will no longer scan or otherwise use messages in their free Gmail system for ad personalization purposes (this is already the case for their paid Gmail (G Suite) product.

This is a good decision to help undercut the Google haters’ false propaganda, but let’s be clear — this Gmail message scanning was always utterly harmless.

Submission + - Creating Glaciers in the Desert (icestupa.org)

randomErr writes: Ladakh is a trans-Himalayan mountain desert in the extreme north of India. It is a cold desert with winter temperatures touching -30 C, and an average annual rain/snow fall of only 100 mm or less than 4 inches. SECMOL Alternative Institute the Pheyang Monastery near the institute started making an ice stupa from artificial glaciers. The stupa's store waste winter water in the form of ice mountains that melt and feed the farms when water is most needed by the farmers.

Submission + - TOR Hidden Services Stealth Authentication For Private Home Camera (symantec.com)

netcoredor writes: Want to use TOR Hidden Services Stealth cookie to privately view your home cameras? This post is for people who want to have a home camera system but have the following security and privacy requirements: 1. A Camera DVR system that does not send content to a cloud provider. 2. Ability to leverage cheaper home/business camera DVR systems. 3. Ability to view DVR cameras over an encrypted internet channel. 4. Ability to hide the location of the DVR system from prying eyes.

Submission + - Twitch to stream free six-day marathon of classic Mystery Science Theater 3000 (betanews.com)

BrianFagioli writes: Today, Twitch announces its latest marathon offering — Mystery Science Theater 3000. If you aren't familiar with the cult-classic show, it features a man and two puppet-robots that talk over old B-level films. In other words, you are sort of watching a movie along with them, but the comedic commentary is the real focal point — not the actual film.

"The MST3K marathon will feature 38 of the classic episodes that originally aired on Comedy Central and Sci-Fi Channel from 1989 to 1997. Created by Joel Hodgson, the series follows a hapless host, trapped by mad scientists on a satellite in space, who is forced to watch some of the most outrageously unfortunate B movies ever created. To keep sane, he has built two robot sidekicks, and together they do a running commentary on the films, affectionately mocking their flaws with inspired wisecracks and acting as a demented movie theater peanut gallery," says Twitch.

Submission + - Why Everyone Missed the Most Important Invention in the Last 500 Years (hackernoon.com)

buddha379 writes: You’ve never heard of Yuji Ijiri. But back in 1989 he created something incredible.

It’s more revolutionary than the Internet, the cotton gin, the steam engine, the PC and the smart phone combined.

When people look back hundreds of years from now, only the printing press and the Internet will have it beat for sheer mind-boggling impact on society. Both the net and the printing press enabled the democratization of information and single-handedly uplifted the collective knowledge of people all over the world.

So what am I talking about? What did Ijiri create that’s so amazing?

Triple-entry accounting.

Uh, what?

Yeah. I’m serious.

Submission + - Vault 7: CIA Has Malware for Hacking Air-Gapped Networks via USB Thumb Drives (bleepingcomputer.com)

An anonymous reader writes: WikiLeaks dumped today the manuals of several hacking utilities part of Brutal Kangaroo, a CIA malware toolkit for hacking into air-gapped (offline) networks using tainted USB thumb drives. The CIA uses these tools as part of a very complex attack process, that allows CIA operatives to infect offline, air-gapped networks.

The first stage of these attacks start with the infection of a "primary host," an Internet-connected computer at a targeted company. Malware on this primary host automatically infects all USB thumb drives inserted into the machine. If this thumb drive is connected to computers on an air-gapped network, a second malware is planted on these devices.

This malware is so advanced, that it can even create a network of hacked air-gapped PCs that talk to each other and exchange commands. To infect the air-gapped computers, the CIA malware uses LNK (shortcut) files placed on the USB thumb drive. Once the user opens and views the content of the thumb drive in Windows Explorer, his air-gapped PC is infected without any other interaction.

Submission + - Gene-Edited Algae Offers Potential For More Biofuel (inhabitat.com)

LCooke writes: Synthetic Genomics and ExxonMobil drew on gene editing techniques to modify a strain of algae so it produces more oil — and its growth isn't stunted. That oil can be turned into biofuel that supposedly isn't so different from today's diesel. The researchers may be years away from commercialization but claim it's a significant milestone.

Submission + - The trouble with geoengineers "hacking the planet" (thebulletin.org)

Dan Drollette writes: Despite all the hype, geoengineering would not be simple or easy, or a one-time solution, or buy us any time. Instead, "hacking the planet" would be a difficult undertaking that humanity would have to commit to essentially forever—and still not fix the underlying problem. Assuming it even works.

Submission + - IT Services Company Wipro forces 600 employees to work in bedbug infested office (11alive.com) 2

McGruber writes: Information Technology Services Corporation Wipro's (http://www.wipro.com/) 600-employee call center in Chamblee, Georgia is in infected with bed bugs according to Atlanta television station 11 Alive (http://www.11alive.com/news/employees-say-theyre-forced-to-work-amid-bed-bug-infestation/451441739).

The facilities manager admits there is a bed bug problem and it’s been an issue since late May.

Employees told the tv station that the bugs are all over the three floors — and they’re biting. But employees are being told they still must go to work. Kwanita Holmes sent 11Alive photos of what she said is a bed bug bite on her arm — “We’re at work 8 hours a day and we’re getting munched on all day,” she said.

Wipro said it’s paying for in-home bed bug consultations and treatments for employees.

Submission + - FCC Website Vulnerability Exploited (wirelessestimator.com)

RendonWI writes: A Wisconsin wireless contractor discovered a flaw in the FCC’s Antenna Structure Registration (ASR) database, and changed the ownership of more than 40 towers from multiple carriers and tower owners into his company’s name during the past five months without the rightful owners being notified by the agency, according to FCC documents and sources knowledgeable of the illegal transfers.

Submission + - What It Was Like to Review the First iPhone (wired.com)

mirandakatz writes: The iPhone turns 10 this week, and in that decade it's been around, it's fundamentally changed the way we interact with the world. At Backchannel, Steven Levy reflects on what it was like to review that first iPhone in 2007, when the hype was completely out of control. Levy and three other journalists received early copies of the phone, while eager adopters lined up for blocks outside Apple stores across the country. What did having an iPhone before anyone else entail? Personal phone calls from Steve Jobs and attacks by overzealous strangers, to start. And the experience changed product reviews forever.

Submission + - Microsoft says 'no known ransomware' runs on Windows 10 S. We tried to hack it (zdnet.com)

An anonymous reader writes: Microsoft claims "no known ransomware" runs on Windows 10 S, its newest, security-focused operating system.

The software giant announced the version of Windows earlier this year as the flagship student-focused operating system to ship with its newest Surface Laptop. Microsoft touted the operating system as being less susceptible to ransomware because of its locked down configuration — to the point where you can't run any apps outside the protective walled garden of its app store. In order to get an app approved, it has to go through rigorous testing to ensure its integrity. That's one of several mitigations that helps to protect the operating system to known file-encrypting malware.

We wanted to see if such a bold claim could hold up.

Spoiler alert: it didn't.

Last week on its debut day, we got our hands on a brand new Surface Laptop, the first device of its kind to run Windows 10 S. We booted it up , went through the setup process, created an offline account, and installed a slew of outstanding security patches — like any other ordinary user would (hopefully) do.

Submission + - The people GoFundMe leaves behind (theoutline.com)

citadrianne writes: President Donald Trump’s proposed budget seeks to slash $54 billion from social services including programs like Medicaid and Meals on Wheels. As these resources dry up, crowdfunding websites will further entrench themselves as extra-governmental welfare providers in order to fill the gap. For a lucky few, these sites are a lifeline. For most people, they are worthless. ...

Crowdfunding’s fatal flaw is that not every campaign ends up getting the money it needs. A recent study published in the journal Social Science & Medicine found that more than 90 percent of GoFundMe campaigns never meet their goal. For every crowdfunding success story, there are hundreds of failures.

“As many happy stories as there are in charitable crowdfunding, there are a lot of really worthy causes when you browse these platforms that nobody has given a cent to,” Rob Gleasure, professor at the business school of the National University of Ireland, Cork told The Outline. “People haven’t come across them.”

Submission + - The real story behind IoT security that none of us knows (osenetwork.com)

sfcrazy writes: When you hear about IoT there is a lot of misunderstanding. Those who claim 'IoT is going to kill us all' don't even understand the market and it's depth. They are fear-mongering populists who wants to exploit sentiments.

Swapnil Bhartiya says he spent the past two weeks talking to more than a dozen experts from the IoT world to get a better grip of the situation and understand how real these threats are, what are the causes, and what can be done to mitigate them, if it’s even possible to be mitigated.

Submission + - Password Reset MITM: Exposing The Need For Better Security Choices (helpnetsecurity.com)

Orome1 writes: The Password Reset Man in the Middle attack exploits the similarity of the registration and password reset processes. To launch such an attack, the attacker only needs to control a website. To entice victims to make an account on the malicious website, the attacker can offer free access to a wanted resource. Once the user initiates the account registration process by entering their email address, the attacker can use that information to initiate a password reset process on another website that uses that piece of information as the username (e.g. Google, YouTube, Amazon, Twitter, LinkedIn, PayPal, and so on). Every request for input from that site is forwarded to the potential victim, and then his or her answers forwarded back to that particular site.

Submission + - Western tech firms bow to Russian demands to share cyber secrets (reuters.com)

SpzToid writes: Russian authorities are asking Western tech companies to allow them to review source code for security products such as firewalls, anti-virus applications and software containing encryption before permitting the products to be imported and sold in the country. The requests, which have increased since 2014, are ostensibly done to ensure foreign spy agencies have not hidden any "backdoors" that would allow them to burrow into Russian systems.

But those inspections also provide the Russians an opportunity to find vulnerabilities in the products' source code — instructions that control the basic operations of computer equipment — current and former U.S. officials and security experts said.

While a number of U.S. firms say they are playing ball to preserve their entree to Russia's huge tech market, at least one U.S. firm, Symantec, told Reuters it has stopped cooperating with the source code reviews over security concerns. That halt has not been previously reported.

Submission + - Device allows police to view phone activity during a traffic stop (hackread.com) 1

dcsmith writes: Textalyzer is an electronic tablet size device which will allow the law enforcement in the United States to see if drivers have been using their cellphones whilst driving. That’s not all; the device aims to crack down suspects by recording their every click, tap or swipe. It would even know what apps the drivers are using. Police officers can also download all the data from the suspect’s smartphone within a few seconds right on the spot.

Slashdot Top Deals