How We Know North Korea Didn’t Detonate a Hydrogen Bomb

StartsWithABang writes: The news has been aflame with reports that North Korea detonated a hydrogen bomb on January 6th, greatly expanding its nuclear capabilities with their fourth nuclear test and the potential to carry out a devastating strike against either South Korea or, if they’re more ambitious, the United States. The physics of what a nuclear explosion actually does and how that signal propagates through the air, oceans and ground, however, can tell us whether this was truly a nuclear detonation at all, and if so, whether it was fusion or fission. From all the data we’ve collected, this appears to be nothing new: just a run-of-the-mill fission bomb, with the rest being a sensationalized claim. (Related: Yesterday’s post about how seismic data also points to a conventional nuke, rather than an H-bomb.) Read more of this story at Slashdot.

Taken from:
How We Know North Korea Didn’t Detonate a Hydrogen Bomb

Tesla Model S Software Updates Lets Car Park Itself With No One Inside It

An anonymous reader writes with a lnk to this article at Boy Genius Report about a software upgrade now hitting Tesla owners, which begins: Tesla earlier today began pushing out version 7.1 of its software to Model S and Model X owners and, suffice it to say, it’s a doozy of a software update. While we’ll get to the full changelog shortly, we first wanted to highlight a feature called Summon which enables users to park their cars without having to be inside it. Conversely, it also lets Tesla owners summon their cars that already happen to be parked. Read more of this story at Slashdot.

See more here:
Tesla Model S Software Updates Lets Car Park Itself With No One Inside It

New Dell Tech Support Scams Have Customers Worried Company Was Hacked

Trailrunner7 writes: A new twist on the fake tech support scam has arisen that has victims wondering whether Dell has been hacked.There has been a recent rash of calls to Dell customers in which the caller says he is from Dell itself and is able to identify the victim’s PC by model number and provide details of previous warranty and support interactions with the company. These are details that, it would seem, only Dell or perhaps its contractors would know. One person who was contacted by the scammers wrote a detailed description of the call, and said the caller had personal details that could not have been found online. Dell officials say they’re looking into it. Read more of this story at Slashdot.

More here:
New Dell Tech Support Scams Have Customers Worried Company Was Hacked

Twitter To Extend 140-Character Limit For Tweets

An anonymous reader writes: According to Re/code, Twitter is doing away with its 140-character limit for tweets. The company is currently planning on increasing the limit to 10, 000 characters, though the final number may change before they roll it out. “Twitter is currently testing a version of the product in which tweets appear the same way they do now, displaying just 140 characters, with some kind of call to action that there is more content you can’t see. Clicking on the tweets would then expand them to reveal more content. The point of this is to keep the same look and feel for your timeline, although this design is not necessarily final, sources say.” Read more of this story at Slashdot.

Link:
Twitter To Extend 140-Character Limit For Tweets

How an IRS Agent Stole $1M From Taxpayers

Trailrunner7 writes: Few, if any, companies or government agencies store more sensitive personal information than the IRS, and consumers have virtually no insight into how that data is used and secured. But, as the results of a recent Justice Department investigation show, when you start poking around in those dark corners, you sometimes find very ugly things. Beginning in 2008, a small group of people–including an IRS employee who worked in the Taxpayer Advocate Service section–worked a simple and effective scam that involved fake tax returns, phony refunds, dozens of pre-loaded debit cards, and a web of lies. The scheme relied upon one key ingredient for its success: access to taxpayers’ personal information. And it brought the alleged perpetrators more than $1 million. What sets this case apart is that the accused IRS employee, Nakeisha Hall, was tasked specifically with helping people who had been affected by some kind of tax-related identity theft or fraud. Read more of this story at Slashdot.

See more here:
How an IRS Agent Stole $1M From Taxpayers

802.11ah Wi-Fi Standard Approved

alphadogg writes: A new wireless standard that extends Wi-Fi’s reach down into the 900MHz band will keep the 802.11 family at the center of the developing Internet of Things, the Wi-Fi Alliance announced today. 802.11ah, combines lower power requirements with a lower frequency, which means that those signals propagate better. That offers a much larger effective range than current Wi-Fi standards, which operate on 2.4GHz and 5GHz frequencies, and lets the newer technology penetrate walls and doors more easily. Read more of this story at Slashdot.

View article:
802.11ah Wi-Fi Standard Approved

Four Elements Added To Periodic Table

physburn writes: The Guardian reports that four new elements, with atomic numbers 113, 115, 117, and 118, have been formally added to the periodic table. The International Union of Pure and Applied Chemistry has now initiated the process of formalizing names and symbols for these elements. “The RIKEN collaboration team in Japan have fulfilled the criteria for element Z=113 and will be invited to propose a permanent name and symbol.” 115 and 117, with the temporary names of ununpentium and ununseptium, will be named by researchers from Oak Ridge and Lawrence Livermore national labs in the U.S., as well as from the Joint Institute for Nuclear Research in Russia. 118, known for now as ununoctium, will be named by the same group minus the Oak Ridge researchers. Professor Paul Karol said, “A particular difficulty in establishing these new elements is that they decay into hitherto unknown isotopes of slightly lighter elements that also need to be unequivocally identified, but in the future we hope to improve methods that can directly measure the atomic number, Z.” Read more of this story at Slashdot.

View post:
Four Elements Added To Periodic Table

Arrested Nigerian Email Scammer Facing Up To 30 Years In Prison

McGruber writes: Amechi Colvis Amuegbunam, 28, a Nigerian man living in the U.S. on a student visa, faces federal wire fraud charges in connection with a sophisticated email phishing scam targeting businesses. He was arrested in Baltimore and charged with scamming 17 North Texas companies out of more than $600, 000 using the technique. If convicted, Amuegbunam faces up to 30 years in prison and a fine of up to $1 million. Read more of this story at Slashdot.

Follow this link:
Arrested Nigerian Email Scammer Facing Up To 30 Years In Prison

North Korea’s Operating System Analyzed

Bruce66423 points out an analysis at The Guardian of North Korea’s Red Star Linux-based OS, based on a presentation Sunday to the Chaos Communication Congress in Berlin : The features of their Fedora based OS include a watermarking system to enable tracking of files — even if unopened. The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website outside North Korea and explored the code in detail. … This latest version, written around 2013, is based on a version of Linux called Fedora and has eschewed the previous version’s Windows XP feel for Apple’s OS X – perhaps a nod to the country’s leader Kim Jong-un who, like his father, has been photographed near Macs. The OS, unsurprisingly, allowed only tightly fettered access to web sites, using a whitelist approach that gives access to government-controlled or approved sites. Read more of this story at Slashdot.

More:
North Korea’s Operating System Analyzed

Juniper’s Backdoor Password Disclosed, Likely Added In Late 2013

itwbennett writes: In a blog post on Rapid7’s community portal Sunday, HD Moore posted some notes on the Juniper ScreenOS incident, notably that his team discovered the backdoor password that enables the Telnet and SSH bypass. Quoting: “Although most folks are more familiar with x86 than ARM, the ARM binaries are significantly easier to compare due to minimal changes in the compiler output. … Once the binary is loaded, it helps to identify and tag common functions. Searching for the text “strcmp” finds a static string that is referenced in the sub_ED7D94 function. Looking at the strings output, we can see some interesting string references, including auth_admin_ssh_special and auth_admin_internal. … The argument to the strcmp call is

Continue Reading:
Juniper’s Backdoor Password Disclosed, Likely Added In Late 2013