Scientists Locate Sunken, Radioactive Aircraft Carrier Off California Coast

HughPickens.com writes: Aaron Kinney reports in the San Jose Mercury News that scientists have captured the first clear images of the USS Independence, a radioactivity-polluted World War II aircraft carrier that rests on the ocean floor 30 miles off the coast of Half Moon Bay. The Independence saw combat at Wake Island and other decisive battles against Japan in 1944 and 1945 and was later blasted with radiation in two South Pacific nuclear tests. Assigned as a target vessel for the Operation Crossroads atomic bomb tests, she was placed within one-half-mile of ground zero and was engulfed in a fireball and heavily damaged during the 1946 nuclear weapons tests at Bikini Atoll. The veteran ship did not sink, however (though her funnels and island were crumpled by the blast), and after taking part in another explosion on 25 July, the highly radioactive hull was later taken to Pearl Harbor and San Francisco for further tests and was finally scuttled off the coast of San Francisco, California, on 29 January 1951. “This ship is an evocative artifact of the dawn of the atomic age, when we began to learn the nature of the genie we’d uncorked from the bottle, ” says James Delgado. “It speaks to the ‘Greatest Generation’ — people’s fathers, grandfathers, uncles and brothers who served on these ships, who flew off those decks and what they did to turn the tide in the Pacific war.” Delgado says he doesn’t know how many drums of radioactive material are buried within the ship — perhaps a few hundred. But he is doubtful that they pose any health or environmental risk. The barrels were filled with concrete and sealed in the ship’s engine and boiler rooms, which were protected by thick walls of steel. The carrier itself was clearly “hot” when it went down and and it was packed full of fresh fission products and other radiological waste at the time it sank. The Independence was scuttled in what is now the Gulf of the Farallones sanctuary, a haven for wildlife, from white sharks to elephant seals and whales. Despite its history as a dumping ground Richard Charter says the radioactive waste is a relic of a dark age before the enviornmental movement took hold. “It’s just one of those things that humans rather stupidly did in the past that we can’t retroactively fix.”” Read more of this story at Slashdot.

See original article:
Scientists Locate Sunken, Radioactive Aircraft Carrier Off California Coast

J.J. Abrams reveals new Force Awakens teaser, details

On Thursday, J.J. Abrams kicked off a weekend-long Star Wars convention by revealing the second teaser trailer for the upcoming Star Wars: The Force Awakens film, and it included the first reveal of Harrison Ford reprising his role as Han Solo. “Chewie, we’re home!” Ford says with Chewbacca standing behind him to close the teaser, which also included footage of a Millennium Falcon chase, a melted Darth Vader mask, a lightsaber hand-off, and Mark Hamill narrating a speech to an heir apparent (though unseen). Stormtroopers, X-Wings, TIE Fighters, new droids, and the sequel’s three new leads also feature prominently. As a lead-up to that teaser reveal, Entertainment Weekly columnist Anthony Breznican hosted a panel with Abrams and Lucasfilm president Kathleen Kennedy, where he asked questions about filming scenes in Abu Dhabi, designing new droids (including new droid “BB8,” whose impressive rolling ball design includes a head that swivels on its top), and casting the series’ three new lead actors. Read 8 remaining paragraphs | Comments

Read More:
J.J. Abrams reveals new Force Awakens teaser, details

Botnet that enslaved 770,000 PCs worldwide comes crashing down

Law enforcement groups and private security companies around the world said they have taken down a botnet that enslaved more than 770,000 computers in 190 countries, stealing owners’ banking credentials and establishing a backdoor to install still more malware. Simda, as the botnet was known, infected an additional 128,000 new computers each month over the past half year, a testament to the stealth of the underlying backdoor trojan and the organization of its creators. The backdoor morphed into a new, undetectable form every few hours, allowing it to stay one step ahead of many antivirus programs. Botnet operators used a variety of methods to infect targets, including exploiting known vulnerabilities in software such as Oracle Java , Adobe Flash , and  Microsoft Silverlight . The exploits were stitched into websites by exploiting SQL injection vulnerabilities and exploit kits such as Blackhole and Styx. Other methods included sending spam and other forms of social engineering. Countries most affected by Simda included the US, with 22 percent of the infections, followed by the UK, Turkey with five percent, and Canada and Russia with four percent. The malware modified the HOSTS file Microsoft Windows machines use to map specific domain names to specific IP addresses. As a result, infected computers that attempted to visit addresses such as connect.facebook.net or google-analytics.com were surreptitiously diverted to servers under the control of the attackers. Often the booby-trapped HOSTS file remains even after the Simda backdoor has been removed. Security researchers advised anyone who may have been infected to inspect their HOSTS file, which is typically located in the directory %SYSTEM32%driversetchosts. People who want to discover if they have been infected by Simda can check this page provided by AV provider Kaspersky Lab. The page is effective as long as a person’s IP address hasn’t changed from when the infection was detected. Read 2 remaining paragraphs | Comments

View post:
Botnet that enslaved 770,000 PCs worldwide comes crashing down

Hacked French network exposed its own passwords during TV interview

While French authorities continued investigating how the TV5Monde network had 11 of its stations’ signals interrupted the night before, one of its staffers proved just how likely a basic password theft might have led to the incident. In an interview with French news program 13 Heures , TV5Monde reporter David Delos unwittingly revealed at least one password for the station’s social media presence. That’s because he was filmed in front of a staffer’s desk—which was smothered in sticky notes and taped index cards that were covered in account usernames and passwords. Delos’s segment revealed the usernames and passwords for TV5Monde’s Twitter and Instagram accounts, but they were too difficult to read in an archived video of the broadcast . That wasn’t the case for the YouTube information, however;  Twitter user pent0thal confirmed that account’s displayed password was “lemotdepassedeyoutube,” which translates in English to “the password of YouTube.” Read 2 remaining paragraphs | Comments

Continue Reading:
Hacked French network exposed its own passwords during TV interview

Eighth-grader charged with felony for shoulder-surfing teacher’s password

A 14-year-old Florida boy has been charged with felony computer intrusion after shoulder-surfing his school’s computer network password and using it to play a prank on a teacher. Domanik Green, an eighth-grader at Paul R. Smith Middle School in Holiday, Florida, was charged with an offense against a computer system and felony unauthorized access, according to a report published Thursday by The Tampa Bay Times . In late March, the youth allegedly used the administrative-level password without permission to log in to the school’s network and change the images displayed on a teacher’s computer to one of two men kissing. One of the computers accessed allegedly contained encrypted questions to the FCAT, short for the Florida Comprehensive Assessment Test . While the factual allegations laid out in the article seem to indicate the youth perpetrated some form of trespass, they also alleged a litany of poor practices on the part of school administrators. These practices include weak passwords, entering passwords in front of others, and widespread unauthorized access, possibly that went undetected. From the report: Read 1 remaining paragraphs | Comments

Original post:
Eighth-grader charged with felony for shoulder-surfing teacher’s password

Descent Underground Kickstarter crosses $600,000 finish line

It’s no doubt been a long day for Eric “Wingman” Peterson and the other folks at Descendent Studios , but their crowdfunded reboot of the six-degrees-of-freedom shooter Descent is now over the $600,000 mark and will receive its funding, which will allow Peterson and team to buckle down and get to work on the title—once the post-Kickstarter partying is over, of course. Though the funding campaign got off to a good start, pledges slowed over the last week of the campaign. However, backers donated more than $200,000 of the $600,000 goal in the past four days, with $70,000 of donations coming in today, on the campaign’s final day. With about two hours left on the clock, the donation mark stands at just a bit over $602,000. Descent Underground engine demo running on an Oculus Rift DK2. Our stomachs lurch in anticipation! Peterson and his team (which includes several former members of the Austin branch of Cloud Imperium, which is currently focusing on building Star Citizen’s persistent universe) have set their sights on resurrecting the Decent series of games, which reached the height of their popularity in the late 1990s and cast players as the pilot of a fast, maneuverable spaceship blasting killer robots in underground mines. The game’s hook was that unlike other FPS titles, Descent allowed full movement along all axes—you could move up, down, left right, forward, backward, and rotate in any direction. Read 3 remaining paragraphs | Comments

Read More:
Descent Underground Kickstarter crosses $600,000 finish line

US, European police take down highly elusive botnet known as Beebone

US and European police have shut down a botnet that provided a captive audience of backdoored PCs to criminals who were looking for an easy way to quickly install malware on large numbers of computers. The takedown of the Beebone botnet is something of a coup because the underlying malware was so resistant to detection. Polymorphic downloader software at the heart of the malicious program updated itself as many as 19 times a day. Beebone also relied on a pair of programs that re-downloaded each other, acting as an insurance policy should one of them be removed, authorities told the Associated Press . “From a techie’s perspective, they made it as difficult as they possibly could for us,” a Europol advisory told the news organization. The takedown was a joint operation that involved the US FBI, Europol’s European Cybercrime Center, and private security groups including Kaspersky Lab, Shadowserver, and McAfee. Read 4 remaining paragraphs | Comments

See more here:
US, European police take down highly elusive botnet known as Beebone

Bell Labs Fighting To Get More Bandwidth Out of Copper

jfruh writes You might think that DSL lost the race to cable and fibre Internet years ago, but Alcatel-Lucent’s Bell Labs is working on a host or projects to extract more and faster bandwidth out of existing technologies. The company’s G.fast technology aims to get hundreds of megabits a second over telephone lines. Other projects are aiming to boost speeds over fibre and cell networks as well. Read more of this story at Slashdot.

More:
Bell Labs Fighting To Get More Bandwidth Out of Copper

Apple releases OS X 10.10.3 with new Photos app, emoji, and more

Apple has just released the final version of OS X 10.10.3, the latest major update for OS X Yosemite. The update was first available to the public as a beta build back in early March , and it follows a little over three months after OS X 10.10.2 . You can view the full release notes on Apple’s site here . The star of this update is the new Photos app, an OS X version of the photo viewing and editing app included with iOS. It primarily functions as a replacement for iPhoto, the basic photo app included with the iLife suite for years before becoming available for free for all new Macs. It also replaces Aperture, Apple’s pro photo editing app—though it doesn’t actually attempt to replicate Aperture’s functionality. Neither iPhoto nor Aperture will receive further updates from Apple after today. Photos will be installed automatically when you update to 10.10.3; it appears to be a core part of OS X rather than an optional Mac App Store download. We looked at an early Photos beta back in February and came away mostly impressed by its features and speed, at least relative to iPhoto. Those of you with existing iPhoto and Aperture libraries will be able to import them into Photos after you install OS X 10.10.3. Read 5 remaining paragraphs | Comments

Original post:
Apple releases OS X 10.10.3 with new Photos app, emoji, and more

Dell support software gets flagged by antivirus program

Diagnostic software preinstalled on many Dell computers is now being flagged as a potentially unwanted program by antivirus program Malwarebytes following the discovery of a vulnerability that allows attackers to remotely execute malicious code on older versions. The application known as Dell System Detect failed to validate code before downloading and running it, according to a report published last month by researcher Tom Forbes. Because the program starts itself automatically, a malicious hacker could use it to infect vulnerable machines by luring users to a booby-trapped website. According to researchers with AV provider F-Secure , the malicious website need only have contained the string “dell” somewhere in its domain name to exploit the weakness. www.notreallydell.com was just one example of a site that would have worked. Dell released an update in response to Forbes’s report, but even then, users remained vulnerable. That’s because the updated program still accepted downloads from malicious sites that had a subdomain with “dell” in it, for instance, a.dell.fakesite.ownedbythebadguys.com. Read 2 remaining paragraphs | Comments

Read More:
Dell support software gets flagged by antivirus program