Brazzers Porn Site’s Forum Hacked, Exposes Data Of 800,000 Users

Forum of porn website Brazzers has been hacked, exposing the data of as many as 800, 000 users, reports Motherboard. Though the data originated from the company's separate forum, the report adds, Brazzers users who never signed up to the forum may also find their details included in the dump. From the report: Motherboard was provided the dataset by breach monitoring site Vigilante.pw for verification purposes. The data contains 790, 724 unique email addresses, and also includes usernames and plaintext passwords. (The set has 928, 072 entries in all, but many are duplicates.) Troy Hunt, a security researcher and creator of the website Have I Been Pwned? helped verify the dataset by contacting subscribers to his site, who confirmed a number of their details from the data. Read more of this story at Slashdot.

Only 36 Percent of Indian Engineers Can Write Compilable Code, Says Study

New submitter troublemaker_23 quotes a report from ITWire: Only 36% of software engineers in India can write compilable code based on measurements by an automated tool that is used across the world, the Indian skills assessment company Aspiring Minds says in a report. The report is based on a sample of 36, 800 from more than 500 colleges across India. Aspiring Minds said it used the automated tool Automata which is a 60-minute test taken in a compiler integrated environment and rates candidates on programming ability, programming practices, run-time complexity and test case coverage. It uses advanced artificial intelligence technology to automatically grade programming skills. "We find that out of the two problems given per candidate, only 14% engineers are able to write compilable codes for both and only 22% write compilable code for exactly one problem, " the study said. It further found that of the test subjects only 14.67% were employable by an IT services company. When it came to writing fully functional code using the best practices for efficiency and writing, only 2.21% of the engineers studied made the grade. Read more of this story at Slashdot.

NASA’s Messenger captures first photos of ice on Mercury

It's easy to assume, that finding ice on the first rock from the sun, would be like finding a snowflake in a furnace (it can reach 800 degrees Fahrenheit after all). But, you'd be wrong. And NASA's long had radar and photographic proof (just nothing in the visual range) that water ice did exist on the planet. Now, we have the first optical evidence -- after pictures snapped by the NASA's Messenger spacecraft managed to snag enough sunlight inside the 70 mile-wide, permanently-shadowed Prokofiev crater on the north pole of the planet for a photo. The images might not look like much to the untrained eye (though still wonderfully otherworldly), but they provide those that know with enough information to suggest that the ice deposits are relatively recent (and not from when the planet was being formed). No doubt, more revelations will come as the images get scrutinized fruther, and Messenger continues the good work . Filed under: Science Comments Via: Space Source: Geology Journal

NYU Accidentally Exposed Military Code-breaking Computer Project To Entire Internet

An anonymous reader writes: A confidential computer project designed to break military codes was accidentally made public by New York University engineers. An anonymous digital security researcher identified files related to the project while hunting for things on the internet that shouldn't be, The Intercept reported. He used a program called Shodan, a search engine for internet-connected devices, to locate the project. It is the product of a joint initiative by NYU's Institute for Mathematics and Advanced Supercomputing, headed by the world-renowned Chudnovsky brothers, David and Gregory, the Department of Defense, and IBM. Information on an exposed backup drive described the supercomputer, called -- WindsorGreen -- as a system capable of cracking passwords. Read more of this story at Slashdot.

Mac users installing popular DVD ripper get nasty backdoor instead

(credit: Patrick Wardle ) Hackers compromised a download server for a popular DVD-ripping software named HandBrake and used it to push stealthy malware that stole victims' password keychains, password vaults, and possibly the master credentials that decrypted them, security researchers said Monday. Over a four-day period ending Saturday, a download mirror located at download.handbrake.fr delivered a version of the video conversion software that contained a backdoor known as Proton, HandBrake developers warned over the weekend . At the time that the malware was being distributed to unsuspecting Mac users, none of the 55 most widely used antivirus services detected it. That's according to researcher Patrick Wardle , who reported results here and here from the VirusTotal file-scanning service. When the malicious download was opened, it directed users to enter their Mac administer password, which was then uploaded in plain text to a server controlled by the attackers. Once installed, the malware sent a variety of sensitive user files to the same server. In a blog post published Monday morning , Thomas Reed, director of Mac offerings at antivirus provider Malwarebytes, wrote: Read 5 remaining paragraphs | Comments

Trump Signs Executive Order On Cybersecurity

President Trump on Thursday signed a long-delayed executive order on cybersecurity that "makes clear that agency heads will be held accountable for protecting their networks, and calls on government and industry to reduce the threat from automated attacks on the internet, " reports The Washington Post. From the report: Picking up on themes advanced by the Obama administration, Trump's order also requires agency heads to use Commerce Department guidelines to manage risk to their systems. It commissions reports to assess the country's ability to withstand an attack on the electric grid and to spell out the strategic options for deterring adversaries in cyberspace. [Thomas Bossert, Trump's homeland security adviser] said the order was not, however, prompted by Russia's targeting of electoral systems last year. In fact, the order is silent on addressing the security of electoral systems or cyber-enabled operations to influence elections, which became a significant area of concern during last year's presidential campaign. The Department of Homeland Security in January declared election systems "critical infrastructure." The executive order also does not address offensive cyber operations, which are generally classified. This is an area in which the Trump administration is expected to be more forward-leaning than its predecessor. Nor does it spell out what type of cyberattack would constitute an "act of war" or what response the attack would invite. "We're not going to draw a red line, " Bossert said, adding that the White House does not "want to telegraph our punches." The order places the defense secretary and the head of the intelligence community in charge of protecting "national security" systems that operate classified and military networks. But the secretary of homeland security will continue to be at the center of the national plan for protecting critical infrastructure, such as the electric grid and financial sector. Read more of this story at Slashdot.

Massive ransomware attack hits UK hospitals, Spanish banks

Enlarge (credit: Health Service Journal) A large number of hospitals, GPs, and walk-in clinics across England have been locked down by a ransomware attack, reports suggest. There are also some reports of a ransomware attack hitting institutions in Portugal and Spain, though it isn't known if the incidents are connected. NHS England says it is aware of the issue, but hasn't yet issued an official statement. At this point it isn't clear whether a central NHS network has been knocked offline by the ransomware, or whether individual computers connected to the network are being locked out. In any case, some hospitals and clinics are reporting that their computer systems are inaccessible and some telephone services are down too. Read 7 remaining paragraphs | Comments

Soft, synthetic retinas may offer a better implant solution

Scientists have been trying to replace retinas in otherwise healthy eyes to help people suffering from diseases like retinitis pigmentosa. Unfortunately, earlier efforts were only able to use rigid, hard materials , which are very different from the natural retina. A researcher at Oxford University, however, has created a synthetic retina made of biological materials to better match natural human tissues. The study, titled "Light-Patterned Current Generation in a Droplet Bilayer Array" was published this April in Scientific Reports . Your retina sits at the back of your eye collecting light and converting them to electrical signals for your brain. The research, led by 24-year-old Vanessa Restrepo-Schild, uses a retina made of soft water droplets called hydrogels and biological cell membrane proteins. These cells act like pixels to detect light and create a gray scale image. It can then generate electrical signals to stimulate the neurons at the back of your eye just like a natural retina does. The artificial tissues don't contain anything other than natural, biodegradable materials, making it less likely that recipients' bodies will reject the implant. It's also far less invasive than devices that reproduce the system mechanically. While the new synthetic retina has only been tested in the laboratory, Restrepo-Schild hopes to continue her research to explore its potential with living tissues. That may still be a ways off, but it could surely become a more viable way than other efforts to restore sight to people with retinal issues. Via: MedicalXpress Source: Nature.com

Researcher Developing Tattoo Removal Cream

BarbaraHudson writes During tattooing, ink is injected into the skin, initiating an immune response, and cells called "macrophages" move into the area and "eat up" the ink. The macrophages carry some of the ink to the body's lymph nodes, but some that are filled with ink stay put, embedded in the skin. That's what makes the tattoo visible under the skin. Dalhousie Uiversity's Alec Falkenham is developing a topical cream that works by targeting the macrophages that have remained at the site of the tattoo. New macrophages move in to consume the previously pigment-filled macrophages and then migrate to the lymph nodes, eventually taking all the dye with them. "When comparing it to laser-based tattoo removal, in which you see the burns, the scarring, the blisters, in this case, we've designed a drug that doesn't really have much off-target effect, " he said. "We're not targeting any of the normal skin cells, so you won't see a lot of inflammation. In fact, based on the process that we're actually using, we don't think there will be any inflammation at all and it would actually be anti-inflammatory." Read more of this story at Slashdot.

Inateck’s SSD housing replaced my portable hard drives

My MacBook Air has a small SSD and there is no way to upgrade it, I've recently started carrying an SDD, in this handy $18 SSD optimized external storage case . Read the rest