New York’s rat population has genetically diverged into "uptown" and "downtown" subspecies

Matthew Combs, a Fordham University Louis Calder Center Biological Field Station grad student worked with colleagues from Fordham and the Providence College Department of Biology to sequence the genomes of brown rats in Manhattan, and made a surprising discovery: the geography of rats has a genetic correlation, so a geneticist can tell where a rat was born and raised by analyzing its DNA. (more…)

Read More:
New York’s rat population has genetically diverged into "uptown" and "downtown" subspecies

Chicago seeks a high-speed O’Hare link, Boring Company to propose 125mph “Loop”

Enlarge / An artist’s rendering of an electric skate. (credit: The Boring Company ) On Wednesday, the city of Chicago opened a Request for Qualifications (RFQ) for an express train that would take passengers from the city’s O’Hare airport to downtown. The system would have to be completely privately funded—Chicago says no taxpayer money would be used for it. Elon Musk’s Boring Company—a tunneling company that the SpaceX and Tesla CEO started last year—will respond to the request. Musk hopes to get to the second round when bidding will take place. On Wednesday evening, he tweeted that his company “will compete to fund, build & operate a high-speed Loop connecting Chicago O’Hare Airport to downtown.” Musk’s reference to a “Loop” is explained more clearly on  The Boring Company’s FAQ page : “Loop is a high-speed underground public transportation system in which passengers are transported on autonomous electric skates traveling at 125-150 miles per hour. Electric skates will carry between 8 and 16 passengers (mass transit), or a single passenger vehicle.” Unlike Musk’s idea for a Hyperloop, a Loop won’t draw a vacuum. “For shorter routes, there is no technical need to eliminate air friction,” The Boring Company states. Read 6 remaining paragraphs | Comments

Read the article:
Chicago seeks a high-speed O’Hare link, Boring Company to propose 125mph “Loop”

Apple’s High Sierra security patch affected Mac file sharing

Apple’s latest update for macOS High Sierra hasn’t gone well. As revealed earlier this week, the update included a bug that made it pretty easy for anyone to gain admin rights to your Mac — an obvious privacy concern. Apple rolled out a patch for the issue, but it seems that’s not without its problems either, as some users are now unable to authenticate or connect to file shares on their Macs. Fortunately, there’s a simple fix. As Apple Insider reports: 1. Open the Terminal app, in the Utilities folder of the Applications folder. 2. Type sudo /usr/libexec/configureLocalKDC and hit Return. 3. Enter your administrator password and press Return. 4. Quit the Terminal app. Done. The number of people affected by the new security update’s flaw is unknown. Apple jumped on the case relatively quickly when the initial problems became clear, but whether or not they’ll release yet another update for this latest issue is unknown. Source: Apple Insider

Read More:
Apple’s High Sierra security patch affected Mac file sharing

Physicists Made An Unprecedented 53 Qubit Quantum Simulator

Two teams of researchers have published papers [1, 2] in the journal Nature detailing how they were able to create unprecedented quantum simulators consisting of over 50 qubits. The University of Maryland team and National Institute of Standards and Technology team — the two teams behind one of the two new papers — were able to create a quantum simulator with 53 qubits. Motherboard reports: Quantum simulators are a special type of quantum computer that uses qubits to simulate complex interactions between particles. Qubits are the informational medium of quantum computers, analogous to a bit in an ordinary computer. Yet rather than existing as a 1 or 0, as is the case in a conventional bit, a qubit can exist in some superposition of both of these states at the same time. For the Maryland experiment, each of the qubits was a laser cooled ytterbium ion. Each ion had the same electrical charge, so they repelled one another when placed in close proximity. The system created by Monroe and his colleagues used an electric field to force the repelled ions into neat rows. At this point, lasers are used to manipulate all the ytterbium qubits into the same initial state. Then another set of lasers is used to manipulate the qubits so that they act like atomic magnets, where each ion has a north and south pole. The qubits either orient themselves with their neighboring ions to form a ferromagnet, where their magnetic fields are aligned, or at random. By changing the strength of the laser beams that are manipulating the qubits, the researchers are able to program them to a desired state (in terms of magnetic alignment). According to Zhexuan Gong, a physicist at the University of Maryland, the 53 qubits can be used to simulate over a quadrillion different magnetic configurations of the qubits, a number that doubles with each additional qubit added to the array. As these types of quantum simulators keep adding more qubits into the mix, they will be able to simulate ever more complex atomic interactions that are far beyond the capabilities of conventional supercomputers and usher in a new era of physics research. Another team from Harvard and Maryland also released a paper today in which it demonstrated a quantum simulator using 51 qubits. Read more of this story at Slashdot.

See more here:
Physicists Made An Unprecedented 53 Qubit Quantum Simulator

DNA Analysis Finds That Yetis Are Actually Bears

schwit1 shares a report from Popular Science: University of Buffalo biologist Charlotte Lindqvist and her international team in Pakistan and Singapore provided the first strong evidence that presumed yetis are actually bears. They published their results in the Proceedings of the Royal Society B on Tuesday. Icon Film secured nine samples that purported to be genuine yeti artifacts, and Lindqvist gathered 15 samples from known bear populations. By sequencing mitochondria from all these sources, she and her fellow researchers were able to determine that all but one of the yeti artifacts actually came from local bears. That last sample was from a dog. They also figured out that Himalayan brown bears split off from the rest of the regional bear population several thousand years ago, which is why they’re so genetically distinct from most other brown bears. Living in geographic isolation for so long has separated them from other Asian brown bears, and even from their relatives on the nearby Tibetan plateau. They even look different. But prior to Lindqvist’s work, it wasn’t clear just how long Himalayan bears had been on their own. Researchers will need higher-quality samples to figure out the whole picture, but even this small step is major for a species that’s hardly been studied. Read more of this story at Slashdot.

See original article:
DNA Analysis Finds That Yetis Are Actually Bears

Websites use your CPU to mine cryptocurrency even when you close your browser

Researchers have discovered a new technique that lets hackers and unscrupulous websites perform in-browser, drive-by cryptomining even after a user has closed the window for the offending site. Over the past month or two, drive-by cryptomining has emerged as a way to generate the cryptocurrency known as Monero. Hackers harness the electricity and CPU resources of millions of unsuspecting people as they visit hacked or deceitful websites. One researcher recently documented 2,500 sites actively running cryptomining code in visitors’ browsers , a figure that, over time, could generate significant revenue. Until now, however, the covert mining has come with a major disadvantage for the attacker or website operator: the mining stops as soon as the visitor leaves the page or closes the page window. Now, researchers from anti-malware provider Malwarebytes have identified a technique that allows the leaching to continue even after a user has closed the browser window. It works by opening a pop-under window that fits behind the Microsoft Windows taskbar and hides behind the clock. The window remains open indefinitely until a user takes special actions to close it. During that time, it continues to run code that generates Monero on behalf of the person controlling the Website. Read 4 remaining paragraphs | Comments

Original post:
Websites use your CPU to mine cryptocurrency even when you close your browser

Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer

The sensitive personal information of 246, 000 Department of Homeland Security employees was found on the home computer server of a DHS employee in May, according to documents obtained by USA TODAY. From the report: Also discovered on the server was a copy of 159, 000 case files from the inspector general’s investigative case management system, which suspects in an ongoing criminal investigation intended to market and sell, according to a report sent by DHS Inspector General John Roth on Nov. 24 to key members of Congress. The information included names, Social Security numbers and dates of birth, the report said. The inspector general’s acting chief information security officer reported the breach to DHS officials on May 11, while IG agents reviewed the details. Acting DHS Secretary Elaine Duke decided on Aug. 21 to notify affected employees who were employed at the department through the end of 2014 about the breach. Read more of this story at Slashdot.

Read this article:
Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer

US Army doxes itself, reveals $100 million NSA spy program that got flushed before it was ever used

Chris Vickery from Upguard found an Army Amazon Web Services instance with no password or encryption, containing 100GB of data on a defunct NSA program called Red Disk. (more…)

See the original post:
US Army doxes itself, reveals $100 million NSA spy program that got flushed before it was ever used

“Completely unique” Iron Age party cauldrons and more unearthed in Leicestershire

ULAS Archaeologists were called to Glenfield Park, Leicestershire, just before a development company broke ground on a massive project to build a warehouse and distribution center. People walking in the grassy field between two towns on the fringes of Leicester had found what seemed to be ancient artifacts. Previous digs in the area had uncovered a few Iron Age items, so it seemed likely there might be something more to find. Indeed there was. Much more. In fact, according to University of Leicester Archaeological Services’ John Hancock, new excavations revealed a 2000-year-old feasting center full of rare, valuable items, including 11 ceremonial cauldrons. Archaeologists had uncovered a party town. Read 8 remaining paragraphs | Comments

Read this article:
“Completely unique” Iron Age party cauldrons and more unearthed in Leicestershire

Researchers Identify 44 Trackers in More Than 300 Android Apps

Catalin Cimpanu, reporting for BleepingComputer: A collaborative effort between the Yale Privacy Lab and Exodus Privacy has shed light on dozens of invasive trackers that are embedded within Android apps and record user activity, sometimes without user consent. The results of this study come to show that the practice of collecting user data via third-party tracking code has become rampant among Android app developers and is now on par with what’s happening on most of today’s popular websites. The two investigative teams found tracking scripts not only in lesser known Android applications, where one might expect app developers to use such practices to monetize their small userbases, but also inside highly popular apps — such as Uber, Twitter, Tinder, Soundcloud, or Spotify. The Yale and Exodus investigation resulted in the creation of a dedicated website that now lists all apps using tracking code and a list of trackers, used by these apps. In total, researchers said they identified 44 trackers embedded in over 300 Android apps. Read more of this story at Slashdot.

See more here:
Researchers Identify 44 Trackers in More Than 300 Android Apps