Earth

A Hellish 'Hothouse Earth' Getting Closer, Scientists Say (theguardian.com) 341

The world is closer than thought to a "point of no return" after which runaway global heating cannot be stopped, scientists have said. From a report: Continued global heating could trigger climate tipping points, leading to a cascade of further tipping points and feedback loops, they said. This would lock the world into a new and hellish "hothouse Earth" climate far worse than the 2-3C temperature rise the world is on track to reach.

The climate would also be very different to the benign conditions of the past 11,000 years, during which the whole of human civilisation developed. At just 1.3C of global heating in recent years, extreme weather is already taking lives and destroying livelihoods across the globe. At 3-4C, "the economy and society will cease to function as we know it," scientists said last week, but a hothouse Earth would be even more fiery. The public and politicians were largely unaware of the risk of passing the point of no return, the researchers said.

The group said they were issuing their warning because while rapid and immediate cuts to fossil fuel burning were challenging, reversing course was likely to be impossible once on the path to a hothouse Earth, even if emissions were eventually slashed. It was difficult to predict when climate tipping points would be triggered, making precaution vital, said Dr Christopher Wolf, a scientist at Terrestrial Ecosystems Research Associates in the US. Wolf is a member of a study team that includes Prof Johan Rockstrom at the Potsdam Institute for Climate Impact Research in Germany and Prof Hans Joachim Schellnhuber at the International Institute for Applied Systems Analysis in Austria.

Security

ClickFix May Be the Biggest Security Threat Your Family Has Never Heard Of (arstechnica.com) 79

An anonymous reader quotes a report from Ars Technica: ClickFix often starts with an email sent from a hotel that the target has a pending registration with and references the correct registration information. In other cases, ClickFix attacks begin with a WhatsApp message. In still other cases, the user receives the URL at the top of Google results for a search query. Once the mark accesses the malicious site referenced, it presents a CAPTCHA challenge or other pretext requiring user confirmation. The user receives an instruction to copy a string of text, open a terminal window, paste it in, and press Enter. Once entered, the string of text causes the PC or Mac to surreptitiously visit a scammer-controlled server and download malware. Then, the machine automatically installs it -- all with no indication to the target. With that, users are infected, usually with credential-stealing malware. Security firms say ClickFix campaigns have run rampant. The lack of awareness of the technique, combined with the links also coming from known addresses or in search results, and the ability to bypass some endpoint protections are all factors driving the growth.

The commands, which are often base-64 encoded to make them unreadable to humans, are often copied inside the browser sandbox, a part of most browsers that accesses the Internet in an isolated environment designed to protect devices from malware or harmful scripts. Many security tools are unable to observe and flag these actions as potentially malicious. The attacks can also be effective given the lack of awareness. Many people have learned over the years to be suspicious of links in emails or messengers. In many users' minds, the precaution doesn't extend to sites that instruct them to copy a piece of text and paste it into an unfamiliar window. When the instructions come in emails from a known hotel or at the top of Google results, targets can be further caught off guard. With many families gathering in the coming weeks for various holiday dinners, ClickFix scams are worth mentioning to those family members who ask for security advice. Microsoft Defender and other endpoint protection programs offer some defenses against these attacks, but they can, in some cases, be bypassed. That means that, for now, awareness is the best countermeasure.
Researchers from CrowdStrike described in a report a campaign designed to infect Macs with a Mach-O executive. "Promoting false malicious websites encourages more site traffic, which will lead to more potential victims," wrote the researchers. "The one-line installation command enables eCrime actors to directly install the Mach-O executable onto the victim's machine while bypassing Gatekeeper checks."

Push Security, meanwhile, reported a ClickFix campaign that uses a device-adaptive page that serves different malicious payloads depending on whether the visitor is on Windows or macOS.
Power

Jellyfish Swarm Forces French Nuclear Plant To Shut (bbc.com) 39

AmiMoJo shares a report from the BBC: A French nuclear plant temporarily shut down on Monday due to a "massive and unpredictable presence of jellyfish" in its filters, its operator said. The swarm clogged up the cooling system and caused four units at the Gravelines nuclear power plant to automatically switch off, energy group EDF said. The plant is cooled from a canal connected to the North Sea -- where several species of jellyfish are native and can be seen around the coast when the waters are warm. According to nuclear engineer Ronan Tanguy, the marine animals managed to slip through systems designed to keep them out because of their "gelatinous" bodies.

"They were able to evade the first set of filters then get caught in the secondary drum system," he told the BBC. Mr Tanguy, who works at the WNA, said this will have created a blockage which reduced the amount of water being drawn in, prompting the units to shut down automatically as a precaution. He stressed that the incident was a "non-nuclear event" and more a "nuisance" for the on-site team to clean up. For local people, there would be no impact on their safety or how much energy they could access: "They wouldn't perceive it as any different to any other shut-down of the system for maintenance."

Microsoft

Microsoft Says Some SharePoint Server Hackers Now Using Ransomware (reuters.com) 26

A cyber-espionage campaign exploiting vulnerable Microsoft server software has escalated to deploying ransomware against victims, Microsoft said, marking a significant shift from typical state-backed data theft operations to attacks designed to paralyze networks until payment is made. The campaign by a group Microsoft calls "Storm-2603" has compromised at least 400 organizations, according to Netherlands-based cybersecurity firm Eye Security, quadrupling from 100 victims cataloged over the weekend. The National Institutes of Health confirmed one server was breached and additional servers were isolated as a precaution, while reports indicate the Department of Homeland Security and multiple other federal agencies were also compromised.
ISS

NASA Delays Commercial Crew Launch To Assess ISS Air Leak (cbsnews.com) 18

NASA and Axiom Space have indefinitely delayed the Axiom-4 launch to the International Space Station due to concerns about a persistent air leak in the Russian PrK vestibule of the aging Zvezda module. "The PrK serves as a passageway between the station's Zvezda module and spacecraft docked at its aft port," notes CBS News. From the report: In a blog post, NASA said cosmonauts aboard the station "recently performed inspections of the pressurized module's interior surfaces, sealed some additional areas of interest, and measured the current leak rate. Following this effort, the segment now is holding pressure." The post went on to say the Axiom-4 delay will provide "additional time for NASA and (the Russian space agency) Roscosmos to evaluate the situation and determine whether any additional troubleshooting is necessary."

Launched in July 2000 atop a Russian Proton rocket, Zvezda was the third module to join the growing space station, providing a command center for Russian cosmonauts, crew quarters, the aft docking port and two additional ports now occupied by airlock and research modules. The leakage was first noticed in 2019, and has been openly discussed ever since by NASA during periodic reviews and space station news briefings. The leak rate has varied, but has stayed in the neighborhood of around 1-to-2 pounds per day. "The station is not young," astronaut Mike Barratt said last November during a post flight news conference. "It's been up there for quite a while, and you expect some wear and tear, and we're seeing that in the form of some cracks that have formed." The Russians have made a variety of attempts to patch a suspect crack and other possible sources of leakage, but air has continued to escape into space.

In November, Bob Cabana, a former astronaut and NASA manager who chaired the agency's ISS Advisory Committee, said U.S. and Russian engineers "don't have a common understanding of what the likely root cause is, or the severity of the consequences of these leaks." "The Russian position is that the most probable cause of the PrK cracks is high cyclic fatigue caused by micro vibrations," Cabana said. "NASA believes the PrK cracks are likely multi-causal including pressure and mechanical stress, residual stress, material properties and environmental exposures. "The Russians believe that continued operations are safe, but they can't prove to our satisfaction that they are, and the US believes that it's not safe, but we can't prove that to the Russian satisfaction that that's the case."

As an interim step, the hatch leading to the PrK and the station's aft docking compartment is closed during daily operations and only opened when the Russians need to unload a visiting Progress cargo ship. And as an added precaution on NASA's part, whenever the hatch to the PrK and docking compartment is open, a hatch between the Russian and U.S. segments of the station is closed. "We've taken a very conservative approach to close a hatch between the US side and the Russian side during those time periods," Barratt said. "It's not a comfortable thing, but it is the best agreement between all the smart people on both sides. And it's something that we crew live with and enact." Cabana said last year that the Russians do not believe "catastrophic disintegration of the PrK is realistic (but) NASA has expressed concerns about the structural integrity of the PrK and the possibility of a catastrophic failure."

Privacy

Insurance Firm Lemonade Says API Glitch Exposed Some Driver's License Numbers (securityweek.com) 5

An anonymous reader quotes a report from SecurityWeek: Insurance firm Lemonade is notifying roughly 190,000 individuals that their driver's license numbers were likely exposed due to a technical glitch. Copies of the notification letter that were submitted to regulators in several states show that the incident involved an online application that enables individuals to obtain car insurance quotes and purchase policies. According to the company, a vulnerability in the car insurance quote flow resulted in the exposure of certain driver's license numbers for identifiable individuals. The vulnerability has been addressed, Lemonade says.

Between April 2023 and September 2024, the platform transmitted the information unencrypted, which the company says allowed driver's license numbers to be accessed without authorization. "We have no evidence to suggest that your driver's license number has been misused but we are providing this notice as a precaution to inform potentially affected individuals and share some steps you can take to help protect yourself," the company's notification letter reads. The insurer is providing the impacted individuals with 12 months of free credit monitoring and identity protection services.

United States

After 7.0 Earthquake, Coastal Northern California Phones Get 'Tsunami Warning' Alert (Since Cancelled) (sfgate.com) 46

A tsunami warning was issued — and then cancelled about an hour later — for 400 miles of California coastline after a 7.0-magnitude earthquake struck off the coast near California's northern border with Oregon. "About 5 million people were under the warning while it was in effect," reports a San Francisco news site.

Phones had sounded with an emergency tone in affected areas, with a warning that "You are in danger. Get away from coastal waters. Move to high ground or inland now." Warning sirens sounded in some areas, and as a precaution San Francisco paused service for its BART trains travelling under the San Francisco Bay. But while tsunami waves were originally predicted to hit San Francisco at 12:10 p.m. — they didn't. New information prompted the cancellation of the tsunami warning.

Thanks to long-time Slashdot reader sinij for sharing the news.
United Kingdom

NHS Major 'Cyber Incident' Forces Hospitals To Use Pen and Paper (theregister.com) 28

The ongoing cybersecurity incident affecting a North West England NHS group has forced sites to fall back on pen-and-paper operations. From a report: The Wirral University Teaching Hospital NHS Trust updated its official line on the incident on Wednesday evening, revealing new details about the case, but remains coy about the true nature of the attack.

"After detecting suspicious activity, as a precaution, we isolated our systems to ensure that the problem did not spread. This resulted in some IT systems being offline," the updated statement said.

"We have reverted to our business continuity processes and are using paper rather than digital in the areas affected. We are working closely with the national cybersecurity services and we are planning to return to normal services at the earliest opportunity."

United States

Investigation Finds 'Little Oversight' Over Crucial Supply Chain for US Election Software (politico.com) 94

Politico reports U.S. states have no uniform way of policing the use of overseas subcontractors in election technology, "let alone to understand which individual software components make up a piece of code."

For example, to replace New Hampshire's old voter registration database, state election officials "turned to one of the best — and only — choices on the market," Politico: "a small, Connecticut-based IT firm that was just getting into election software." But last fall, as the new company, WSD Digital, raced to complete the project, New Hampshire officials made an unsettling discovery: The firm had offshored part of the work. That meant unknown coders outside the U.S. had access to the software that would determine which New Hampshirites would be welcome at the polls this November.

The revelation prompted the state to take a precaution that is rare among election officials: It hired a forensic firm to scour the technology for signs that hackers had hidden malware deep inside the coding supply chain. The probe unearthed some unwelcome surprises: software misconfigured to connect to servers in Russia ["probably by accident," they write later] and the use of open-source code — which is freely available online — overseen by a Russian computer engineer convicted of manslaughter, according to a person familiar with the examination and granted anonymity because they were not authorized to speak about it... New Hampshire officials say the scan revealed another issue: A programmer had hard-coded the Ukrainian national anthem into the database, in an apparent gesture of solidarity with Kyiv.

None of the findings amounted to evidence of wrongdoing, the officials said, and the company resolved the issues before the new database came into use ahead of the presidential vote this spring. This was "a disaster averted," said the person familiar with the probe, citing the risk that hackers could have exploited the first two issues to surreptitiously edit the state's voter rolls, or use them and the presence of the Ukrainian national anthem to stoke election conspiracies. [Though WSD only maintains one other state's voter registration database — Vermont] the supply-chain scare in New Hampshire — which has not been reported before — underscores a broader vulnerability in the U.S. election system, POLITICO found during a six-month-long investigation: There is little oversight of the supply chain that produces crucial election software, leaving financially strapped state and county offices to do the best they can with scant resources and expertise.

The technology vendors who build software used on Election Day face razor-thin profit margins in a market that is unforgiving commercially and toxic politically. That provides little room for needed investments in security, POLITICO found. It also leaves states with minimal leverage over underperforming vendors, who provide them with everything from software to check in Americans at their polling stations to voting machines and election night reporting systems. Many states lack a uniform or rigorous system to verify what goes into software used on Election Day and whether it is secure.

The article also points out that many state and federal election officials "insist there has been significant progress" since 2016, with more regular state-federal communication. "The Cybersecurity and Infrastructure Security Agency, now the lead federal agency on election security, didn't even exist back then.

"Perhaps most importantly, more than 95% of U.S. voters now vote by hand or on machines that leave some type of paper trail, which officials can audit after Election Day."
Android

Google Sold Android Phones With Hidden Insecure Feature, Companies Find (washingtonpost.com) 30

Google's master software for some Android phones includes a hidden feature that is insecure and could be activated to allow remote control or spying on users, according to a security company that found it inside phones at a U.S. intelligence contractor. From a report: The feature appears intended to give employees at stores selling Pixel phones and other models deep access to the devices so they can demonstrate how they work, according to researchers at iVerify who shared their findings with The Washington Post. The discovery and Google's lack of explanation alarmed the intelligence contractor, data analysis platform vendor Palantir Technologies, to the extent that it has stopped issuing Android phones to employees, Palantir told The Post.

"Mobile security is a very real concern for us, given where we're operating and who we're serving," Palantir Chief Information Security Officer Dane Stuckey said. "This was very deleterious of trust, to have third-party, unvetted insecure software on it. We have no idea how it got there, so we made the decision to effectively ban Androids internally." The security company said it contacted Google about its findings more than 90 days ago and that the tech giant has not indicated whether it would remove or fix the application. On Wednesday night, Google told The Post that it would issue an update to remove the application. "Out of an abundance of precaution, we will be removing this from all supported in-market Pixel devices with an upcoming Pixel software update," said company spokesperson Ed Fernandez. He said distributors of other Android phones would also be notified.

AI

From Sci-Fi To State Law: California's Plan To Prevent AI Catastrophe (arstechnica.com) 39

An anonymous reader quotes a report from Ars Technica: California's "Safe and Secure Innovation for Frontier Artificial Intelligence Models Act" (a.k.a. SB-1047) has led to a flurry of headlines and debate concerning the overall "safety" of large artificial intelligence models. But critics are concerned that the bill's overblown focus on existential threats by future AI models could severely limit research and development for more prosaic, non-threatening AI uses today. SB-1047, introduced by State Senator Scott Wiener, passed the California Senate in May with a 32-1 vote and seems well positioned for a final vote in the State Assembly in August. The text of the bill requires companies behind sufficiently large AI models (currently set at $100 million in training costs and the rough computing power implied by those costs today) to put testing procedures and systems in place to prevent and respond to "safety incidents."

The bill lays out a legalistic definition of those safety incidents that in turn focuses on defining a set of "critical harms" that an AI system might enable. That includes harms leading to "mass casualties or at least $500 million of damage," such as "the creation or use of chemical, biological, radiological, or nuclear weapon" (hello, Skynet?) or "precise instructions for conducting a cyberattack... on critical infrastructure." The bill also alludes to "other grave harms to public safety and security that are of comparable severity" to those laid out explicitly. An AI model's creator can't be held liable for harm caused through the sharing of "publicly accessible" information from outside the model -- simply asking an LLM to summarize The Anarchist's Cookbook probably wouldn't put it in violation of the law, for instance. Instead, the bill seems most concerned with future AIs that could come up with "novel threats to public safety and security." More than a human using an AI to brainstorm harmful ideas, SB-1047 focuses on the idea of an AI "autonomously engaging in behavior other than at the request of a user" while acting "with limited human oversight, intervention, or supervision."

To prevent this straight-out-of-science-fiction eventuality, anyone training a sufficiently large model must "implement the capability to promptly enact a full shutdown" and have policies in place for when such a shutdown would be enacted, among other precautions and tests. The bill also focuses at points on AI actions that would require "intent, recklessness, or gross negligence" if performed by a human, suggesting a degree of agency that does not exist in today's large language models.
The bill's supporters include AI experts Geoffrey Hinton and Yoshua Bengio, who believe the bill is a necessary precaution against potential catastrophic AI risks.

Bill critics include tech policy expert Nirit Weiss-Blatt and AI community voice Daniel Jeffries. They argue that the bill is based on science fiction fears and could harm technological advancement. Ars Technica contributor Timothy Lee and Meta's Yann LeCun say that the bill's regulations could hinder "open weight" AI models and innovation in AI research.

Instead, some experts suggest a better approach would be to focus on regulating harmful AI applications rather than the technology itself -- for example, outlawing nonconsensual deepfake pornography and improving AI safety research.
Security

Museum World Hit by Cyberattack on Widely Used Software (nytimes.com) 7

Several prominent museums have been unable to display their collections online since a cyberattack hit a prominent technological service provider that helps hundreds of cultural organizations show their works digitally and manage internal documents. From a report: The Museum of Fine Arts Boston, the Rubin Museum of Art in New York and the Crystal Bridges Museum of American Art in Arkansas were among the institutions confirming that their systems have experienced outages in recent days. The service provider, Gallery Systems, said in a recent message to clients, which was obtained by The New York Times, that it had noticed a problem on Dec. 28, when computers running its software became encrypted and could no longer operate.

"We immediately took steps to isolate those systems and implemented measures to prevent additional systems from being affected, including taking systems offline as a precaution," the company said in the message. "We also launched an investigation and third-party cybersecurity experts were engaged to assist. In addition, we notified law enforcement." Signs of disruption were evident on several museum websites because eMuseum, a tool that usually lets visitors search online collections, was down. There was also disruption behind the scenes: Some curators said that they had returned from their winter vacations to find themselves unable to access sensitive information from another Gallery Systems program called TMS. That system can include the names of donors, loan agreements, provenance records, shipping information and storage locations of priceless artworks.

Security

Personal Data Stolen in British Library Cyber-Attack Appears for Sale Online (theguardian.com) 5

The British Library has confirmed that personal data stolen in a cyber-attack has appeared online, apparently for sale to the highest bidder. From a report: The attack was carried out in October by a group known for such criminal activity, said the UK's national library, which holds about 14m books and millions of other items. This week, Rhysida, a known ransomware group, claimed it was responsible for the attack. It posted low-resolution images of personal information online, offering stolen data for sale with a starting bid of 20 bitcoins (about $750,000). Rhysida said the data was "exclusive, unique and impressive" and that it would be sold to a single buyer. It set a deadline for bids of 27 November.

The images appear to show employment contracts and passport information. The library said it was "aware that some data has been leaked, which appears to be from files relating to our internal HR information." It did not confirm that Rhysida was responsible for the attack, nor that the data offered for sale was information on personnel. Academics and researchers who use the library have been told that disruption to the institution's services after the serious ransomware attack was likely to continue for months. This week, the library advised its users to change any logins also used on other sites as a precaution.

AI

AI-Generated Voice Deepfakes are Being Used in Scams (palmbeachpost.com) 19

Images and information from social media (and other online sources) are being used by AI to create "create convincing and personalized scam calls, texts and emails," writes the Palm Beach Post, citing a warning from Florida's consumer watchdog agency. In an older version of the scam, a caller would greet "Grandma" or "Grandpa" before saying, "It's me — I know I sound funny because I have a cold," and then make an urgent plea for money to get out of a scrap... Using audio and video clips found online, the con artist can clone the voice of a family member to make the call more compelling...

Listen for clues to a con like incorrect or mispronounced names or unfamiliar terms of endearment. The pressure to act quickly and to keep the call a secret are all timeless hallmarks of a scam, the agency notes. Detailed instructions on how to deliver funds in a form that is hard to recover — wired funds, a gift card or pay app — are also indications of a ripoff in the making.

The consumer watchdog agency suggests this precaution. "Encourage family members to set their social media pages to private."

Thanks to long-time Slashdot reader SonicSpike for sharing the article.
Crime

Bomb Threat Causes Mass Evacuation at DEF CON Hacking Convention (theregister.com) 45

A bomb threat against Caesars Forum, the main venue for this week's DEF CON hacking convention, led to the halls being cleared on Saturday evening and the building searched by fire crews and police officers. The Register reports: The timing was very bad, coming in the evening of the main party night for the event. The conference Goons, the red-shirted volunteers who serve as guides and organizers, were praised by attendees for managing the evacuation with aplomb, but when it became clear that the search for the suspect device was going to be hard to find, the DEC CON team cancelled the evening's festivities at Caesars, to the disappointment of thousands.

"Last night we were asked to evacuate the building due to a report of a suspicious package. Local police and fire departments conducted a thorough investigation and ultimately determined that the package was safe," the organizers said. "They also conducted additional sweeps of the building as a precaution before allowing our team to return and prepare for today's con. We are working quickly to keep the original schedule on track, but please check here for additional updates before arriving at DEF CON." The event kicked off on August 10 and wrapped up by August 13.

Presumably the hoax caller thought of themselves as a merry prankster, rather than the selfish idiot who ruined everyone's night - particularly the timing for those in the Track Four hall who were enjoying 2001: A Space Odyssey and who were forced to miss the crucial last 10 minutes of the movie. While tricks and pranks are something of a tradition, they only get respect if they are clever and intricate, not some fool showing they could use a telephone. It's not like security at the show wasn't heavy enough. The event was patrolled regularly by security guards in body armor with handguns, tasers, the occasional police dog, and a host of other equipment that was a bit of an overkill for a bunch of peaceable hackers. Dubbed by some as "Gravy SEALs," by the end of the show they were visibly warming up, and this hack saw several of them accepting stickers from attendees.

Businesses

Airbnb Is Banning People Who Are 'Closely Associated' With Already-Banned Users (vice.com) 122

An anonymous reader quotes a report from Motherboard: Airbnb is banning people from using its site because of their mere association with other users the short-term rental company has deemed a safety risk and removed from the platform, a decision that highlights the imperfect security protocols that Airbnb employs. In instances where a user is banned because of their association with another user deemed problematic, the user can only return to the platform if their problematic acquaintance successfully appeals the ban or if they are able to prove they are not "closely associated."

In a statement, Airbnb confirmed to Motherboard that it does sometimes ban users because the company has discovered that they "are likely to travel" with another person who has already been banned, though a spokesperson wouldn't say when this practice started or how often it occurs. The company said it does this as a "necessary safety precaution," and a spokesperson said referring to such bans as merely a result of association is overly "simplistic." But the process appears opaque; just this month, the company apologized and said it had made a "mistake" in banning the parents of right-wing activist Lauren Southern.

Airbnb has said that it understands the system is imperfect, and employs an appeals process for people who feel they have been unfairly banned. But the process is often limited and frustrating to banned users, according to conversations Motherboard has had with banned users. The bans by association underscore the difficulty (and perhaps impossibility) of keeping dangerous parties completely out of Airbnb hosts' homes without slighting associated users who feel their own bans are unjustified.

Software

BMW Owner Discovers Car's Software Update Won't Install When Parked on Incline (thedrive.com) 127

An anonymous reader shares a report: BMW i4 owner was rightfully puzzled when their car flashed a strange alert on the screen, saying its parking spot was "too steep" to perform an over-the-air software upgrade. How does that happen? And why is it a problem in the first place? As Clare Eliza found out, it simply isn't possible to remotely update any of the i4's software if the car isn't parked on flat ground. And instead of allowing the operator to override this, it will wait until you physically move it somewhere more level to continue. As it turns out, BMW doesn't have one singular reason why the vehicle can't perform this task on an incline. Rather, the limitation is there as a safety blanket.

"The vehicle has all sorts of sensors (pitch, yaw, lateral and longitudinal acceleration and deceleration, etc.) that allow it to understand its orientation, so it knows when it's on an incline," a BMW spokesperson told The Drive. "It's likely a catchall, every-worst-case-no-matter-how-unlikely scenario safety precaution to try to prevent any chance of the vehicle moving should the programming be interrupted or go wrong." Essentially, it's there just in case something unexpected happens; it's better to plan for the worst, after all.

Transportation

Waze Tests New Alerts Warning Drivers About Roads With a 'History of Crashes' (theverge.com) 35

A new beta version of the Google-owned app, as reported by Israeli tech news site Geektime, can alert users about roads that have statistically high crash occurrences based on Waze community data. The Verge reports: While using this new beta version of Waze, nearby roads deemed to be high-risk are colored red on the map. Although, Geektime points out that it may not do this for roads that the user often travels on. The feature also only pushes just one pop-up notification about the dangerous roads around the driver, perhaps in an effort to keep precaution from turning into anxiety.

If you're in the country and have access to the beta release, you'll get a pop-up that states: "using reports from drivers and your route, you may see alerts for 'History of crashes' on some roads." While the feature is only in beta, it's likely to release to the general public soon. But if you would rather not have Waze paint the roads red when it comes out, the feature can be turned off with a toggle located under the app's settings section designated for alerts.

ISS

NASA Mulls SpaceX Backup Plan For Crew of Russia's Leaky Soyuz Ship (reuters.com) 61

NASA is exploring whether SpaceX's Crew Dragon spacecraft can potentially offer an alternative ride home for some crew members of the International Space Station after a Russian capsule sprang a coolant leak while docked to the orbital lab. Reuters reports: NASA and Russia's space agency, Roscosmos, are investigating the cause of a punctured coolant line on an external radiator of Russia's Soyuz MS-22 spacecraft, which is supposed to return its crew of two cosmonauts and one U.S. astronaut to Earth early next year. But the Dec. 14 leak, which emptied the Soyuz of a vital fluid used to regulate crew cabin temperatures, has derailed Russia's space station routines, with engineers in Moscow examining whether to launch another Soyuz to retrieve the three-man team that flew to ISS aboard the crippled MS-22 craft. If Russia cannot launch another Soyuz ship, or decides for some reason that doing so would be too risky, NASA is weighing another option.

"We have asked SpaceX a few questions on their capability to return additional crew members on Dragon if necessary, but that is not our prime focus at this time," NASA spokeswoman Sandra Jones said in a statement to Reuters. It was unclear what NASA specifically asked of SpaceX's Crew Dragon capabilities, such as whether the company can find a way to increase the crew capacity of the Dragon currently docked to the station, or launch an empty capsule for the crew's rescue. But the company's potential involvement in a mission led by Russia underscores the degree of precaution NASA is taking to ensure its astronauts can safely return to Earth, should one of the other contingency plans arranged by Russia fall through.

Classic Games (Games)

Alleged Poker-Cheating Scandal Gets Weirder: Employee Stole $15,000 In Chips (nypost.com) 66

An experienced poker player lost to a relative newcomer. But then, "Somehow, the Robbi Jade Lew-Garrett Adelstein scandal diving the poker world just got weirder," reports the New York Post: An internal investigation conducted by Hustler Casino Live — which streamed the game from Los Angeles — has shown that one of their High Stakes Poker Productions employees stole three $5,000 chips from Lew's stack after the broadcast concluded on September 29. The employee, Bryan Sagbigsal, was terminated from his position after he admitted to taking $15,000 in chips from Lew's stack...

The $15,000 worth of chips taken by Sagbigsal was seen as some as him taking his cut of a cheating scam.

"There is zero evidence that I cheated," Lew posted on Twitter, "simply because I did not. I have been thrust into a bizarre situation where I am being asked to prove my innocence continually, and as of yet, there is not a single thread of direct evidence illustrating my guilt. My accusers, now having exhausted buzzing seats, camera rings, microphone water bottles, and other spy paraphernalia, have now moved on to me having an alleged conspiring relationship with someone I do not know... who, in fact, stole from me."

As a precaution the casino's technology and security protocols are now being audited — but the publicity seems good for business. Hustler Casino Live is now calling the hand "The most insane hero call in poker history," and it's already racked up over half a million views on YouTube.

Here's what I see. (Am I missing something?)

After three of the five "community" cards were dealt face up, Garrett Adelstein had four of the five cards needed for a straight flush — leaving nine clubs in the deck left to draw for a flush, and an additional six that would've at least given him a straight. But with no help from the fourth "community" card, Garrett had just a 53% chance of winning. He bet $10,000, but instead of backing down Robbi raised him by $10,000. Garrett then tried an even larger bet, daring Robbi to go all-in with her $109,000 in chips — or fold. Did she sense that this suddenly-higher bet was a bluff? With nothing but a high-card jack, Robbi refused to fold — and won the hand when the fifth card failed to help either her or Garrett.

Slashdot Top Deals