schwit1 shares a report from Popular Science: University of Buffalo biologist Charlotte Lindqvist and her international team in Pakistan and Singapore provided the first strong evidence that presumed yetis are actually bears. They published their results in the Proceedings of the Royal Society B on Tuesday. Icon Film secured nine samples that purported to be genuine yeti artifacts, and Lindqvist gathered 15 samples from known bear populations. By sequencing mitochondria from all these sources, she and her fellow researchers were able to determine that all but one of the yeti artifacts actually came from local bears. That last sample was from a dog. They also figured out that Himalayan brown bears split off from the rest of the regional bear population several thousand years ago, which is why they’re so genetically distinct from most other brown bears. Living in geographic isolation for so long has separated them from other Asian brown bears, and even from their relatives on the nearby Tibetan plateau. They even look different. But prior to Lindqvist’s work, it wasn’t clear just how long Himalayan bears had been on their own. Researchers will need higher-quality samples to figure out the whole picture, but even this small step is major for a species that’s hardly been studied. Read more of this story at Slashdot.
See original article:
DNA Analysis Finds That Yetis Are Actually Bears
An anonymous reader writes: “Thai security researcher Worawit Wang has put together an exploit based on ETERNALSYNERGY that can also target newer versions of the Windows operating system, ” reports Bleeping Computer. “ETERNALSYNERGY is one of the NSA exploits leaked by the Shadow Brokers hacking group in April this year. According to a Microsoft technical analysis, the exploit can allow an attacker to execute code on Windows machines with SMB services exposed to external connections. The exploit works up to Windows 8. According to Microsoft, the techniques used in the original ETERNALSYNERGY exploit do not work on newer platforms due to several kernel security improvements. Wang says his exploit targets the same vulnerability but uses a different exploitation technique. His method ‘should never crash a target, ‘ the expert says. ‘Chance should be nearly 0%, ‘ Wang adds.” Combining his exploit with the original ETERNALSYNERGY exploit would allow a hacker to target all Windows versions except Windows 10. This is about 75% of all Windows PCs. The exploit code is available for download from Wang’s GitHub or ExploitDB. Sheila A. Berta, a security researcher for Telefonica’s Eleven Paths security unit, has published a step-by-step guide on how to use Wang’s exploit. Read more of this story at Slashdot.
Jason Koebler, reporting for Motherboard: Apple has taken new and extreme measures to make the iPhone unrepairable. The company is now using software locks to prevent independent repair of specific parts of the phone. Specifically, the home buttons of the iPhone 7 and iPhone 7 Plus are not user replaceable, raising questions about both the future repairability of Apple products and the future of the thriving independent repair industry. The iPhone 7 home button will only work with the original home button that it was shipped with; if it breaks and needs to be replaced, a new one will only work if it is “recalibrated” in an Apple Store. Read more of this story at Slashdot.
An anonymous reader quotes KrebsOnSecurity: On Thursday, a Ukrainian man who hatched a plan in 2013 to send heroin to my home and then call the cops when the drugs arrived was sentenced to 41 months in prison for unrelated cybercrime charges. Separately, a 19-year-old American who admitted to being part of a hacker group that sent a heavily-armed police force to my home in 2013 was sentenced to three years probation. Sergey Vovnenko, a.k.a. “Fly, ” “Flycracker” and “MUXACC1, ” pleaded guilty last year to aggravated identity theft and conspiracy to commit wire fraud. Prosecutors said Vovnenko operated a network of more than 13, 000 hacked computers, using them to harvest credit card numbers and other sensitive information… A judge in New Jersey sentenced Vovnenko to 41 months in prison, three years of supervised released and ordered him to pay restitution of $83, 368. Separately, a judge in Washington, D.C. handed down a sentence of three year’s probation to Eric Taylor, a hacker probably better known by his handle “Cosmo the God.” Taylor was among several men involved in making a false report to my local police department at the time about a supposed hostage situation at our Virginia home. In response, a heavily-armed police force surrounded my home and put me in handcuffs at gunpoint before the police realized it was all a dangerous hoax known as “swatting”… Taylor and his co-conspirators were able to dox so many celebrities and public officials because they hacked a Russian identity theft service called ssndob[dot]ru. That service in turn relied upon compromised user accounts at data broker giant LexisNexis to pull personal and financial data on millions of Americans. Read more of this story at Slashdot.