Yahoo sued over employee rankings, anti-male discrimination

(credit: Clever Cupcakes ) A new lawsuit  (PDF) filed against flailing tech giant Yahoo claims that company managers governing the “Media Org” were biased against men. It also claims that the company’s Quarterly Performance Review (QPR) process favored female employees and that the company engaged in mass layoffs without proper warnings. Gregory Anderson was editorial director of Yahoo’s Autos, Homes, Shopping, Small Business, and Travel sections until he was terminated in 2014. In his complaint, Anderson says that between 2012 and 2015, Yahoo reduced its work force by more than 30 percent to fewer than 11,000 employees. That constitutes a mass-layoff, which requires 60-day notice under state and federal law, he says. Read 13 remaining paragraphs | Comments

Read more here:
Yahoo sued over employee rankings, anti-male discrimination

Why the calorie is broken

(credit: Getty Images) Calories consumed minus calories burned—it’s the simple formula for weight loss or gain, but dieters often find that it doesn’t work. Cynthia Graber and Nicola Twilley of Gastropod investigate for Mosaic science , where this story first appeared . It’s republished here under a Creative Commons license. “For me, a calorie is a unit of measurement that’s a real pain in the rear.” Bo Nash is 38. He lives in Arlington, Texas, where he’s a technology director for a textbook publisher. He has a wife and child. And he’s 5’10” and 245 lbs—which means he is classed as obese. Read 44 remaining paragraphs | Comments

Follow this link:
Why the calorie is broken

Media devices sold to feds have hidden backdoor with sniffing functions

(credit: AMX) A company that supplies audio-visual and building control equipment to the US Army, the White House, and other security-conscious organizations built a deliberately concealed backdoor into dozens of its products that could possibly be used to hack or spy on users, security researchers said. Members of Australia-based security firm SEC Consult said they discovered the backdoor after analyzing the AMX NX-1200 , a programmable device used to control AV and building systems. The researchers first became suspicious after encountering a function called “setUpSubtleUserAccount” that added an highly privileged account with a hard-coded password to the list of users authorized to log in. Unlike most other accounts, this one had the ability to capture data packets flowing between the device and the network it’s connected to. “Someone with knowledge of the backdoor could completely reconfigure and take over the device and due to the highest privileges also start sniffing attacks within the network segment,” SEC Consult researcher Johannes Greil told Ars. “We did not see any personal data on the device itself, besides other user accounts which could be cracked for further attacks.” Read 4 remaining paragraphs | Comments

See the original article here:
Media devices sold to feds have hidden backdoor with sniffing functions

DOJ and 4 states want $24 billion in fines from Dish Network for telemarketing

Four states and the US Department of Justice (DOJ) are seeking up to $24 billion in fines from Dish Network after a judge ruled that the company and its contractors made more than 55 million illegal telemarketing calls using recorded messages and phoning people on do-not-call lists. The trial to decide whether Dish was aware that it was breaking the law and whether the company is responsible for calls made by its subcontractors began yesterday. A spokesperson for Dish, which is based outside of Denver, Colorado, noted in an e-mail to Ars that “Most of the Dish calls complained about took place almost ten years ago and Dish has continued to improve its already compliant procedures.” The spokesperson added that in 2008, the satellite TV and Internet provider hired Possible Now, a company that specializes in marketing and regulatory compliance, to make sure that Dish’s marketing practices were legal. According to Dish, Possible Now gave the company a passing grade on compliance with federal regulatory rules. However, the DOJ as well as Ohio, Illinois, California, and North Carolina say that Dish disregarded federal laws on call etiquette. US lawyers are asking for $900 million in civil penalties, and the four states are asking for $23.5 billion in fines, according to the Denver Post . “Laws against phoning people on do-not-call lists and using recorded messages allow penalties of up to $16,000 per violation,” the Post added. Read 4 remaining paragraphs | Comments

Visit site:
DOJ and 4 states want $24 billion in fines from Dish Network for telemarketing

Apple releases OS X 10.11.3 with fixes for bugs and security [Updated]

(credit: Andrew Cunningham) Today Apple released OS X 10.11.3, the third major update for El Capitan since the operating system was released to the public in September. You can grab it now through the Update tab of the Mac App Store, or you can manually download and install the Combo Update version from Apple’s support site. As with the iOS 9.2.1 update, Apple’s release notes are unusually light, and the more detailed release notes aren’t available on Apple’s support site as of this writing (they will be posted  here when they’re ready). The security release notes detail a handful of fixes for El Capitan and one for the still-supported Mavericks and Yosemite, most of which have been resolved thanks to memory handling improvements. Update : The general release notes are live. 10.11.3 fixes a pair of edge cases: One where a Mac connected to a 4K display wouldn’t wake from sleep, and one where “third-party .pkg file receipts stored in /var/db/receipts are now retained when upgrading from OS X Yosemite.” Read 1 remaining paragraphs | Comments

Read the article:
Apple releases OS X 10.11.3 with fixes for bugs and security [Updated]

Skylake users given 18 months to upgrade to Windows 10

Intel Skylake die shot. (credit: Intel) If you own a system with an Intel 6th generation Core processor—more memorably known as Skylake—and run Windows 7 or Windows 8.1, you’ll have to think about upgrading to Windows 10 within the next 18 months. Microsoft announced today that after July 17, 2017, only the “most critical” security fixes will be released for those platforms and those fixes will only be made available if they don’t “risk the reliability or compatibility” of Windows 7 and 8.1 on other (non-Skylake) systems. The full range of compatibility and security fixes will be published for non-Skylake machines for Windows 7 until January 14 2020, and for Windows 8.1 until January 10 2023. Next generation processors, including Intel’s ” Kaby Lake “, Qualcomm’s 8996 ( branded as Snapdragon 820 ), and AMD’s “Bristol Ridge” APUs (which will use the company’s Excavator architecture, not its brand new Zen arch) will only be supported on Windows 10. Going forward, the company says that using the latest generation processors will always require the latest generation operating system. Read 12 remaining paragraphs | Comments

View article:
Skylake users given 18 months to upgrade to Windows 10

Department of Transportation going full speed ahead on self-driving cars

The world as seen by a self-driving car. (credit: Jonathan Gitlin) We’ve been hitting the tech of self-driving cars pretty heavily this week, taking a look at what companies like Audi , BMW , Ford , QNX , and Tesla are doing in the field. But it’s looking more and more likely that it’s not going to be the technology itself that determines when  we’ll be able to buy a self-driving car for that morning commute. Instead, all the other stuff— regulations, laws, insurance questions, and society’s comfort level —appear ready to own the issue of timing. At this week’s North American International Auto Show in Detroit, Transportation Secretary Anthony Foxx announced that “i n 2016, we are going to do everything we can to promote safe, smart and sustainable, vehicles. We are bullish on automated vehicles.” Still, w orking out how to regulate self-driving cars is far from settled. Each state (well, OK maybe every state but Maryland) has a pretty good idea of how to test young drivers to determine whether they’re ready to mix it with the rest of us in traffic. Figuring out how to apply that to a car itself is proving to be more of a challenge. California, for instance, is about to hold a couple of public workshops to get input into its draft regulations on the the matter, and DMVs in other states are being told by their respective legislatures to start working on the problem. Today, there’s a real fear in the industry that we could end up with a patchwork of different state laws (something Cars Technica even talked about on the radio yesterday ). Then there’s the federal government, where crafting policies, regulations, and guidances can be slow work. Take recent advances in headlight technology for example. Over in Europe, you can now buy cars that use LED lasers to supplement their high-beams. Those lights are intelligent enough to avoid blinding other cars on the road, and they represent a significant safety advantage. But the Federal Motor Vehicle Safety Standards for headlights in the US went into effect in 1968 and haven’t been updated since. And because they don’t make any allowances for anything other than a high beam and a low beam, such systems are illegal here in the US. Read 4 remaining paragraphs | Comments

View original post here:
Department of Transportation going full speed ahead on self-driving cars

Security firm sued for filing “woefully inadequate” forensics report

(credit: ErrantX ) A Las Vegas-based casino operator has sued security firm Trustwave for conducting an allegedly “woefully inadequate” forensics investigation that missed key details of a network breach and allowed credit card thieves to maintain their foothold during the course of the two-and-a-half month investigation. In a legal complaint filed in federal court in Las Vegas, Affinity Gaming said it hired Trustwave in October 2013 to investigate and contain a network breach that allowed attackers to obtain customers’ credit card data. In mid January 2014, Trustwave submitted a report required under payment card industry security rules on all merchants who accept major credit cards. In the PCI forensics report, Trustwave said it had identified the source of the data breach and had contained the malware responsible for it. More than a year later after Affinity was hit by a second credit card breach, the casino operator allegedly learned from Trustwave competitor Mandiant that the malware had never been fully removed. According to the December, 2015 complaint : Read 4 remaining paragraphs | Comments

Read More:
Security firm sued for filing “woefully inadequate” forensics report

Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears

(credit: Fortinet) Less than a month after Juniper Network officials disclosed an unauthorized backdoor in the company’s NetScreen line of firewalls , researchers have uncovered highly suspicious code in older software from Juniper competitor Fortinet. The suspicious code contains a challenge-and-response authentication routine for logging into servers with the secure shell (SSH) protocol . Researchers were able to unearth a hard-coded password of “FGTAbc11*xy+Qqz27” (not including the quotation marks) after reviewing this exploit code posted online on Saturday . On Tuesday, a researcher posted this screenshot purporting to show someone using the exploit to gain remote access to a server running Fortinet’s FortiOS software. This exploit code provides unauthorized SSH access to devices running older versions of FortiOS. (credit: Full Disclosure mailing list ) This partially redacted screenshot purports to show the exploit in action. (credit: @dailydavedavids ) Ralf-Philipp Weinmann, a security researcher who helped uncover the innerworkings of the Juniper backdoor , took to Twitter on Tuesday and repeatedly referred to the custom SSH authentication as a “backdoor.”  In one specific post , he confirmed he was able to make it work as reported on older versions of Fortinet’s FortiOS. Read 4 remaining paragraphs | Comments

Taken from:
Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears

Scientists discover 2,100-year-old stash of “fine plucked” tea

Chunks of ancient tea are on the left, and the tomb where they were excavated near Xi’an is on the right. (credit: Houyuan Lu) Researchers in China have positively identified a block of ancient vegetable matter as tiny tea buds that were lovingly tucked away in Han Yangling Mausoleum, a sumptuous tomb north of Xi’an. The city Xi’an was once known as Chang’an, seat of power for the Han Dynasty, and stood as the easternmost stop on the vast trade routes known today as the Silk Road. Previously, the oldest physical evidence of tea came from roughly 1,000 years ago. Coupled with another ancient block of tea found in western Tibet’s Gurgyam Cemetery, this new discovery reveals that the Han Chinese were already trading with Tibetans in 200 BCE, trekking across the Tibetan Plateau to deliver the luxurious, tasty drink. Though the tea was excavated over a decade ago, it wasn’t until recently that researchers had access to tests that could determine whether the vegetable matter was in fact tea. By untangling the chemical components of the leaves, including their caffeine content, the researchers were able to verify that both blocks of leaves, from China and Tibet, were tea. In fact, they even figured out what kind of tea it probably was. In Nature Scientific Reports , they write: The sample contains a mixture of tea, barley ( Hordeum vulgare , Poaceae) and other plants. Therefore, it is likely that tea buds and/or leaves were consumed in a form similar to traditionally-prepared butter tea, in which tea is mixed with salt, tsampa (roasted barley flour) and/or ginger in the cold mountain areas of central Asia. Of course, methods of brewing and consuming tea varied from culture to culture along the Silk Road . We also know the tea was what people today would call “fine plucked” or “Emperor’s Tea,” because it consisted only of the plant’s buds with a few small leaves. These parts of the plant are considered the most valuable and are used to make especially high-grade tea. Read 4 remaining paragraphs | Comments

Visit site:
Scientists discover 2,100-year-old stash of “fine plucked” tea