Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Communications

Juno Probe To Get First Up-Close Look At Jupiter On Saturday (space.com) 32

NASA's Juno spacecraft will get its first up-close view at Jupiter this Saturday. Space.com reports: "At 8:51 a.m. EDT (1251 GMT) on Saturday (Aug. 27), Juno will zoom within 2,600 miles (4,000 kilometers) of Jupiter's cloud tops -- closer than the probe is scheduled to come during its entire mission, NASA officials said. And Juno will have all of its science instruments during Saturday's flyby. This was not the case during the spacecraft's only previous close approach to Jupiter, which occurred July 4 when Juno arrived in orbit around the giant planet. During Saturday's close pass, all eight of Juno's science instruments will be collecting data, and the probe's visible-light imager, known as JunoCam, will take close-up photos." You can also look forward to Venus-Jupiter Conjunction 2016, an event happening on August 27 where Venus and Jupiter's respective orbits will bring the two planets the closest that they'll be to each other until 2065. The two planets will be positioned roughly five degrees above the Western horizon on August 27.
Security

Dropbox Is Urging Users To Reset Their Passwords (fortune.com) 30

Dropbox is forcing a number of users to change their passwords after the cloud storage company found some account details linked to an old data breach. "The next time you visit dropbox.com, you may be asked to create a new password. We proactively initiated this password update prompt for Dropbox users who meet certain criteria," the company writes on its website. Fortune reports: The popular cloud storage said the move was related to the theft of an old set of Dropbox credentials, dating back to 2012. So the users the company has contacted are those who created Dropbox accounts before mid-2012 and have not updated their passwords since that time. Dropbox disclosed in July 2012 that some users were getting spammed, and the cause appeared to be the theft of usernames and passwords from other websites. As is often the case, some people reuse their usernames and passwords across different web services. (If it still needs saying, you really shouldn't reuse your passwords, ever.)
AI

Amazon, NVIDIA and The CIA Want To Teach AI To Watch Us From Space (technologyreview.com) 59

An anonymous reader quotes a report from MIT Technology Review: Satellite operator DigitalGlobe is teaming up with Amazon, the venture arm of the CIA, and NVIDIA to make computers watch the Earth from above and automatically map our roads, buildings, and piles of trash. MIT Technology Review reports: "In a joint project, DigitalGlobe today released satellite imagery depicting the whole of Rio de Janeiro to a resolution of 50 centimeters. The outlines of 200,000 buildings inside the city's roughly 1,900 square kilometers have been manually marked on the photos. The SpaceNet data set, as it is called, is intended to spark efforts to train machine-learning algorithms to interpret high-resolution satellite photos by themselves. DigitalGlobe says the SpaceNet data set should eventually include high-resolution images of half a million square kilometers of Earth, and that it will add annotations beyond just buildings. DigitalGlobe's data is much more detailed than publicly available satellite data such as NASA's, which typically has a resolution of tens of meters. Amazon will make the SpaceNet data available via its cloud computing service. Nvidia will provide tools to help machine-learning researchers train and test algorithms on the data, and CosmiQ Works, a division of the CIA's venture arm In-Q-Tel focused on space, is also supporting the project." "We need to develop new algorithms for this data," says senior vice president at DigitalGlobe, Tony Frazier. He goes on to say that health and aid programs are to benefit from software that is able to map roads, bridges and various other infrastructure. The CEO of Descartes Labs, Mark Johnson, a "startup that predicts crop yields from public satellite images," says the data that is collected "should be welcome to startups and researchers," according to MIT Technology Review. "Potential applications could include estimated economic output from activity in urban areas, or guiding city governments on how to improve services such as trash collections, he says."
NASA

NASA's Voyager 2 Flew By Saturn 35 Years Ago Today (space.com) 61

An anonymous reader quotes a report from Space.com: Thirty-five years ago today, a NASA spacecraft got an up-close look at beautiful, enigmatic Saturn. On Aug. 25, 1981, the Voyager 2 probe zoomed within 26,000 miles (41,000 kilometers) of the ringed planet's cloud tops. The discoveries made by Voyager 2 -- and by its twin, Voyager 1, which had flown past Saturn nine months earlier -- reshaped scientists' understanding of the Saturn system and planted the seed for NASA's Cassini mission, which began orbiting the ringed planet in 2004, NASA officials said. Voyager 1 and Voyager 2 launched a few weeks apart in 1977, tasked with performing a "grand tour" of the solar system's big planets -- Jupiter, Saturn, Uranus and Neptune. The two spacecraft accomplished that goal, eyeing all four gaseous worlds up close, and also studying 48 of their moons. (Voyager 1 flew past Jupiter and Saturn, while Voyager 2 had close encounters with all four planets.) The Voyagers weren't the first spacecraft to fly by Saturn; that distinction belongs to NASA's Pioneer 11 probe, which did so in 1979. But the Voyagers broke a lot of new ground; they discovered four new Saturn moons, for example, and revealed an incredible diversity of landscapes on satellites such as Dione, Tethys and Iapetus, NASA officials said. August 25th appears to be a good day for nerds. You can view some out-of-this-world photos from NASA's Voyager 1 and 2 probes here.
AI

Microsoft Buys AI-Powered Scheduling App Genee (thestack.com) 28

An anonymous reader quotes a report from The Stack: Microsoft has announced that it has completed its acquisition of artificial intelligence-based scheduling app Genee for an undisclosed amount. The app, which was launched in beta last year, uses natural language processing tools and decision-making algorithms to allow users to schedule appointments without having to consult a calendar. Prior to the acquisition, Genee supported scheduling across Facebook, Twitter, Skype, email, and via SMS. From September 1, Genee will close its own service and will officially join Microsoft, supposedly the Office 365 team. Microsoft believes the addition will help it "further [its] ambition to bring intelligence into every digital experience."
Electronic Frontier Foundation

US Customs and Border Protection Wants To Know Who You Are On Twitter (eff.org) 347

An anonymous reader quotes a report from Electronic Frontier Foundation: U.S. border control agents want to gather Facebook and Twitter identities from visitors from around the world. But this flawed plan would violate travelers' privacy, and would have a wide-ranging impact on freedom of expression -- all while doing little or nothing to protect Americans from terrorism. A proposal has been issued by U.S. Customs and Border Protection to collect social media handles from visitors to the United States from visa waiver countries. The Electronic Frontier Foundation opposes the proposal and has commented on it individually and as part of a larger coalition. "CBP specifically seeks 'information associated with your online presence -- Provider/Platform -- Social media identifier' in order to provider DHS 'greater clarity and visibility to possible nefarious activity and connections' for 'vetting purposes,'" reports EFF. "In our comments, we argue that would-be terrorists are unlikely to disclose social media identifiers that reveal publicly available posts expressing support for terrorism." They say this plan "would unfairly violate the privacy of innocent travelers," would cause "innocent travelers" to "engage in self-censorship, cutting back on their online activity out of fear of being wrongly judged by the U.S. government," and would lead to a "slippery slope, where CBP would require U.S. citizens and residents returning home to disclose their social media handles, or subject both foreign visitors and U.S. persons to invasive device searches at ports of entry with the intent of easily accessing any and all cloud data."
Businesses

Cisco Reports Fourth-Quarter 2016 Earnings (cnbc.com) 30

Cisco has reported its fiscal fourth-quarter earnings and they have exceeded analysts' expectations. CRN reported yesterday that the company will be laying off about 14,000 employees, representing nearly 20 percent of the company's global workforce, according to multiple sources close to the company. Instead, the company will be cutting only 5,500 positions, representing roughly 7 percent of its global workforce, beginning in the fiscal first quarter of 2017. CNBC reports: "The company reported fiscal fourth-quarter earnings of 63 cents a share on revenues of $12.64 billion, beating analyst expectations for 60 cents per share on revenues of $12.57 billion, according to a Thomson Reuters consensus estimate. The company said that 'today's market requires Cisco and our customers to be decisive, move with greater speed and drive more innovation than we've seen in our history.' Cisco said it expects to reinvest the cost savings from its restructuring plan into 'key priority areas such as security, IoT, collaboration, next generation data center and cloud.'"
Intel

Intel To Manufacture Rival ARM Chips In Mobile Push 81

An anonymous reader writes: Chip maker Intel has entered an unlikely partnership with British semiconductor firm ARM in an effort to boost opportunities for its foundry business. The licensing agreement, which was confirmed at the Intel Development Forum in San Francisco, means that from 2017 Intel's Custom Foundry will manufacture ARM chips -- used by smartphone giants such as Apple, Qualcomm and Samsung. On the announcement of its latest earnings report, Intel was clear to highlight a shift in focus, away from the traditional PC market, to emerging areas such as the Internet of Things and mobile -- a sector dominated by one-time arch rival ARM. It seems that Intel has now decided to surrender to the latter's prominence in the field.
Cloud

New RancherOS Offers Lean Linux Functionality Within Docker Containers (rancher.com) 49

RancherOS is a lean Linux distribution aiming to offer "the minimum necessary to get Docker up and running," and tucking many actual Linux services into Docker containers. An anonymous Slashdot reader quotes Distrowatch: Josh Curl has announced the release of a new version of RancherOS [which] moves the project out of its alpha status and introduces new features, including an official Raspberry Pi image... "We're especially excited about this since it offers users a cheap method of getting started with Docker and RancherOS."
Cloud

Researchers Warn Linux Vendors About Cloud-Memory Hacking Trick (thestack.com) 73

An anonymous Slashdot reader writes: Hacking researchers have uncovered a new attack technique which can alter the memory of virtual machines in the cloud. The team, based at Vrije Universiteit, Amsterdam, introduced the attack, dubbed Flip Feng Shui (FFS)...and explained that hackers could use the technique to crack the keys of secured VMs or install malicious code without it being noticed...

Using FFS, the attacker rents a VM on the same host as their chosen victim. They then write a memory page which they know exists on the vulnerable memory location and let it de-duplicate. The identical pages, with the same information, will merge in order to save capacity and be stored in the same part of memory of the physical computer. This allows the hacker to change information in the general memory of the computer.

The researchers demonstrated two attacks on Debian and Ubuntu systems -- flipping a bit to change a victim's RSA public key, and installing a software package infected with malware by altering a URL used by apt-get. "Debian, Ubuntu and other companies involved in the research were notified before the paper was published, and have all responded to the issue."
Cloud

Should Cloud Vendors Decrypt Data For The Government? (helpnetsecurity.com) 136

An anonymous Slashdot reader quotes an article by Help Net Security's editor-in-chief: More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance (CSA). 35 percent believe cloud app vendors should be forced to provide government access to encrypted data while 55 percent are opposed. 64 percent of US-based infosec professionals are opposed to government cooperation, compared to only 42 percent of EMEA respondents.
Raj Samani, CTO EMEA at Intel Security, told Help Net Security the answers ranged from "no way, to help yourself, and even to I don't care..." But since vendors can't satisfy both camps, he believes the situation "demands some form of open debate on the best approach to take..."
Microsoft

Skype For Windows Phone Will Stop Working in 2017 (betanews.com) 147

Mark Wilson, writing for BetaNews: With the release of Windows 10 Mobile, Microsoft's support for Windows Phone is gradually starting to die off. We already knew that Windows Phone support for Skype was coming to an end, but now we know more. Microsoft has now announced that as well as ending support for Skype on Windows Phone in October, come 'early 2017' the apps will simply stop working. And it's all thanks to a move to the cloud. The company has already said that the future of Skype is cloud-based rather than peer-to-peer, and this is the reason Windows Phone support is coming to a complete stop. Considering the amount of investment Microsoft has put into Skype, the decision to kill the app entirely is perhaps a little strange, but legacy support -- particularly for such a niche handset -- does not come cheap.
Botnet

LinkedIn Suffers Huge Bot Attack That Steals Members' Personal Data (siliconbeat.com) 109

An anonymous reader quotes a report from SiliconBeat: Data thieves used a massive "botnet" against professional networking site LinkedIn and stole member's personal information, a new lawsuit reveals. "LinkedIn members populate their profiles with a wide range of information concerning their professional lives, including summaries (narratives about themselves), job histories, skills, interests, educational background, professional awards, photographs and other information," said the company's complaint, filed in Northern California U.S. District Court (PDF). "During periods of time since December 2015, and to this day, unknown persons and/or entities employing various automated software programs (often referred to as 'bots') have extracted and copied data from many LinkedIn pages." It is unclear to what extent LinkedIn has been able to stymie the attack. A statement from the firm's legal team suggests one avenue of penetration has been permanently closed, but does not address other means of incursion listed in the lawsuit. "Their actions have violated the trust that LinkedIn members place in the company to protect their information," the complaint said. "LinkedIn will suffer ongoing and irreparable harm to its consumer goodwill and trust, which LinkedIn has worked hard for years to earn and maintain, if the conduct continues." LinkedIn says it has more than 128 million U.S. members and more than 400 million worldwide. According to the complaint, the hackers got around six LinkedIn cybersecurity systems, and also manipulated a cloud-services company that was on the company's "whitelist" of "popular and reputable service providers, search engines and other platforms" which interact with LinkedIn under less severe security measures than other third parties. The manipulation allowed the hackers to send requests to LinkedIn servers. "This was not an attack or data breach where confidential data was stolen," LinkedIn's legal team said in a statement. "This suit is about unknown entities using automated systems to scrape and copy data that members have made available on LinkedIn, violating the law and our Terms of Service."
Security

Dota 2 Forum Breach Leaks 2 Million User Accounts (zdnet.com) 34

Reader cloud.pt writes: In another case of serious programmer impairment, the DOTA 2 official forums have been hacked, making available to the perpetrators around 2 million emails, usernames, and MD5 hashed passwords. [...] From the report: The hack was carried out last month on July 10. The copy of the leaked database was provided to breach notification site LeakedSource.com, which allows users to search their usernames and email addresses in a wealth of stolen and hacked data. The hacker took advantage of an SQL injection vulnerability used by the older vBulletin forum software, which powers the community. That allowed them to access the database of limited user data, such as username, email, IP address of the user. The data also includes the user's hashed password -- which uses the MD5 algorithm, which is widely considered insecure by today's standards, alongside the salt, used to scramble the password further. A member of the LeakedSource group told me that 1.54 million of the passwords -- or about 80 percent -- have already been unscrambled using rudimentary and run-of-the-mill cracking tools.
Windows

London's Metropolitan Police Still Running 27,000 Windows XP Desktops (thestack.com) 166

An anonymous reader writes: London's Met Police has missed its deadline for abandoning the out-of-date operating system Windows XP, as findings reveal 27,000 computers still run on the software two years after official support ended. Microsoft stopped issuing updates and patches for Windows XP in Spring 2014, meaning that any new bugs and flaws in the operating system are left open to attack. A particularly risky status for the UK capital's police force – itself running operations against hacking and other cybercrime activity. The figures were disclosed by Conservative politician Andrew Boff. The Greater London Assembly member said: 'The Met should have stopped using Windows XP in 2014 when extended support ended, and to hear that 27,000 computers are still using it is worrying.' As in similar cases across civil departments, the core problem is bespoke system development, and the costs and time associated with integrating a new OS with customized systems.

Slashdot Top Deals