Hubble finds additional evidence of water vapor plumes on Europa

Enlarge / Scenario for getting water to Europa’s surface. Artist’s conception of ridges and fractures on Europa. (credit: Caltech/NASA) In the seminal science fiction series Space Odyssey , novelist Arthur C. Clarke called attention to the Jovian moon Europa’s special place in the Solar System. At the end of the series’ second novel, 2010: Odyssey Two , a spaceship sent to the Jupiter system receives a message from aliens: “All these worlds are yours except Europa. Attempt no landing there.” In data released publicly Monday NASA didn’t get quite such a declarative message from the intriguing moon, but the new information is nonetheless thrilling. Astronomers using NASA’s Hubble Space Telescope have imaged what are likely water vapor plumes erupting off the surface of Jupiter’s moon Europa. If the plumes do, in fact, emerge and rain down on the surface, it will be significantly easier for scientists to study the moon’s interior ocean. “E uropa is a world of great interest,”  Paul Hertz, director of the Astrophysics Division at NASA Headquarters in Washington, said during a news conference Monday. Monday’s news is significant because it comes as NASA is taking formative steps toward launching a pair missions to Europa in the 2020s—an orbiter to scout the moon, and a lander that will follow a couple of years later. The same engineers at the Jet Propulsion Laboratory in California who masterminded Curiosity’s landing on Mars have turned their attention toward how best to land a probe on Europa’s icy surface. And it is no easy feat. The moon creaks as Jupiter’s gravitation bulk rends its frozen surface in deep crevasses, pushing and pulling the ice upward and downward by tens of meters every few days. And with only a very tenuous atmosphere, it is cold: -210 degrees Celsius. The radiation from nearby Jupiter would kill a human in a matter of hours or days. Read 7 remaining paragraphs | Comments

See more here:
Hubble finds additional evidence of water vapor plumes on Europa

Conspiracy! The Reddit rundown on the man who deleted Clinton e-mails

Bleach those bits away. (credit: Adina Firestone ) A system administrator with Platte River Networks, the company that took over hosting Hillary Clinton’s mail server after it was moved out of her basement in Chappaqua, has been the target of a crowdsourced investigation on Reddit into whether he took part in a conspiracy to cover up Clinton’s e-mails. Paul Combetta, an employee of Platte River Networks who was granted immunity from prosecution by the Justice Department in exchange for cooperation with the FBI’s investigation of Clinton’s e-mails, apparently went to Reddit for help with a sticky problem related to the e-mail investigation by the House Select Committee on Benghazi—scrubbing the e-mails of Clinton’s personal address. While the post doesn’t provide evidence that Clinton herself instructed Combetta to erase her e-mails, it does suggest that his staff wanted to excise her private e-mail address from the archives to be turned over to the State Department—ånd in turn, to the House Select Committee. The later destruction of the e-mails during the continuing investigation was apparently, as Combetta told investigators, an “oh-shit moment.” Read 8 remaining paragraphs | Comments

More here:
Conspiracy! The Reddit rundown on the man who deleted Clinton e-mails

After 23 years, the Apple II gets another OS update

Hello, old friend Yesterday, software developer John Brooks released what is clearly a work of pure love: the first update to an operating system for the Apple II computer family since 1993. ProDOS 2.4, released on the 30 th anniversary of the introduction of the Apple II GS, brings the enhanced operating system to even older Apple II systems, including the original Apple ][ and ][+. Which is pretty remarkable, considering the Apple ][ and ][+ don’t even support lower-case characters. You can test-drive ProDOS 2.4 in a Web-based emulator set up by computer historian Jason Scott on the Internet Archive. The release includes Bitsy Bye, a menu-driven program launcher that allows for navigation through files on multiple floppy (or hacked USB) drives. Bitsy Bye is an example of highly efficient code: it runs in less than 1 kilobyte of RAM. There’s also a boot utility that is under 400 bytes—taking up a single block of storage on a disk. Read 2 remaining paragraphs | Comments

More:
After 23 years, the Apple II gets another OS update

Police IT staff checked wrong box, deleted 25% of body cam footage

Enlarge (credit: Justin Sullivan / Getty Images News) One quarter of all body-worn camera footage from the Oakland, Calif. police was accidentally deleted in October 2014, according to the head of the relevant unit. As per the San Francisco Chronicle , Sgt. Dave Burke testified on Tuesday at a murder trial that this was, in fact, a mistake. This incident marks yet another setback in the efforts to roll out body-worn cameras to police agencies nationwide. Read 7 remaining paragraphs | Comments

Read more here:
Police IT staff checked wrong box, deleted 25% of body cam footage

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

The SENA UD100 Bluetooth adapter, plus a slightly larger antenna, allows Blue Hydra to peer deep into the Bluetooth world. Sean Gallagher My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling at the stoplight at the corner in their Volkswagen Beetle, following directions from their Garmin Nuvi. Another person was using an Apple Pencil with their iPad at a nearby shop. And someone just turned on their Samsung smart television. I knew all this because each person advertised their presence wirelessly, either over “classic” Bluetooth or the newer Bluetooth Low Energy (BTLE) protocol—and I was running an open source tool called Blue Hydra , a project from the team at Pwnie Express . Blue Hydra is intended to give security professionals a way of tracking the presence of traditional Bluetooth, BTLE devices, and BTLE “iBeacon” proximity sensors. But it can also be connected to other tools to provide alerts on the presence of particular devices. Despite their “Low Energy” moniker, BTLE devices are constantly polling the world even while in “sleep” mode. And while they use randomized media access control (MAC) addresses, they advertise other data that is unique to each device, including a universally unique identifier (UUID). As a result, if you can tie a specific UUID to a device by other means, you can track the device and its owner. By using the Received Signal Strength Indication (RSSI), you can get a sense of how far away they are. Read 6 remaining paragraphs | Comments

Excerpt from:
Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

5,300 Wells Fargo employees fired after 2 million fake accounts discovered

(credit: Mike Mozart ) Since at least 2011, Wells Fargo employees have been creating fake accounts using customers’ identities to boost their sales numbers, federal regulators said on Thursday. The Consumer Financial Protection Bureau (CFPB) fined the bank $100 million after a third-party consulting firm found that 2 million fake deposit and credit card accounts had been made without the consent of the person whose name was on the account. According to CNN Money, the bank fired 5,300 employees for taking part in the scheme, which constitutes about 1 percent of the bank’s payroll. In order to boost their sales numbers, employees opened 1.5 million deposit accounts and 565,000 credit card accounts on customers’ behalf but without authorization from those customers. “Employees then transferred funds from consumers’ authorized accounts to temporarily fund the new, unauthorized accounts,” the CFPB wrote. “This widespread practice gave the employees credit for opening the new accounts, allowing them to earn additional compensation and to meet the bank’s sales goals.” Read 7 remaining paragraphs | Comments

Read More:
5,300 Wells Fargo employees fired after 2 million fake accounts discovered

Group claims to hack NSA-tied hackers, posts exploits as proof

(credit: Shadow Brokers ) In what security experts say is either a one-of-a-kind breach or an elaborate hoax, an anonymous group has published what it claims are sophisticated software tools belonging to an elite team of hackers tied to the US National Security Agency. In a recently published blog post, the group calling itself Shadow Brokers claims the leaked set of exploits were obtained after members hacked Equation Group (the post has since been removed from Tumblr). Last year, Kaspersky Lab researchers described Equation Group as one of the world’s most advanced hacking groups , with ties to both the Stuxnet and Flame espionage malware platforms. The compressed data accompanying the Shadow Broker post is slightly bigger than 256 megabytes and purports to contain a series of hacking tools dating back to 2010. While it wasn’t immediately possible for outsiders to prove the posted data—mostly batch scripts and poorly coded python scripts—belonged to Equation Group, there was little doubt the data have origins with some advanced hacking group. Not fully fake “These files are not fully fake for sure,” Bencsáth Boldizsár, a researcher with Hungary-based CrySyS who is widely credited with discovering Flame, told Ars in an e-mail. “Most likely they are part of the NSA toolset, judging just by the volume and peeps into the samples. At first glance it is sound that these are important attack related files, and yes, the first guess would be Equation Group.” Read 6 remaining paragraphs | Comments

Read More:
Group claims to hack NSA-tied hackers, posts exploits as proof

Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

The value of bitcoins plummeted 20 percent after almost 120,000 units of the digital currency were stolen from Bitfinex, a major Bitcoin exchange. The Hong Kong-based exchange said it had discovered a security breach late Tuesday, and has suspended all transactions. “We are investigating the breach to determine what happened, but we know that some of our users have had their Bitcoins stolen. We are undertaking a review to determine which users have been affected by the breach. While we conduct this initial investigation and secure our environment, bitfinex.com will be taken down and the maintenance page will be left up,” said the company on its website . Read 7 remaining paragraphs | Comments

View original post here:
Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

Is Elon Musk serious about the Tesla Semi?

Wrightspeed is currently working with Mack Trucks to supply the OEM with electric powertrains for its LM chassis. Wrightspeed Out of all of Elon Musk’s recent “Master Plan Part Deux,” the part that really caught our eye was a short paragraph about a Tesla semi. Much of the rest—solar, autonomous driving, ride-sharing—wasn’t exactly unforeseen. But the idea of a heavy duty Tesla electric vehicle took us by surprise and left us scratching our heads. Tesla isn’t the only company going after this market; Wrightspeed, Proterra, and BYD are already building heavy duty urban electric vehicles, and Mercedes-Benz is about to enter the fray. The Nikola Motor Company (no connection to Tesla Motors) already has 7,000 orders for a zero-emission heavy duty freight hauler that won’t be revealed until December. To find out if our confusion over the Tesla Semi is unwarranted, we spoke to some of the big players in the heavy duty EV market. Even though heavy duty vehicles only account for about eight percent of US carbon emissions (light duty vehicles make up roughly 20 percent), Wrightspeed CEO Ian Wright says electrifying that sector makes more economic sense. In fact, Wright doesn’t think the economics work in favor of electric passenger vehicles. “A Nissan Leaf is twice the price of a Versa and you only save $800 a year,” he told Ars, “that’s a 20-year payback time.” Wright goes on: Read 6 remaining paragraphs | Comments

Read More:
Is Elon Musk serious about the Tesla Semi?

8TB disks seem to work pretty well, HGST still impressive

(credit: Alpha six ) Cloud backup and storage provider Backblaze has published its latest batch of drive reliability data. The release covers failure information for the 70,000 disks that the company uses to store some 250PB of data. This is the first quarter that Backblaze has been using a reasonable number of new 8TB disks: 45 from HGST and 2720 from Seagate. Drives from both companies are showing comparable annualized failure rates: 3.2 percent for HGST, 3.3 percent for Seagate. While the smaller HGST drives show better reliability, with annualized failure rates below one percent for the company’s 4TB drives, the figures are typical for Seagate, which Backblaze continues to prefer over other alternatives due to Seagate’s combination of price and availability. Annualized failure rates for all of Backblaze’s drives. (credit: Backblaze) But it’s still early days for the 8TB drives. While evidence for the phenomenon is inconclusive, hard drive reliability is widely assumed to experience a “bathtub curve” when plotting its failure rate against time: failure rates are high when the drives are new (due to “infant mortality” caused by drives that contain manufacturing defects) and when the drives reach their expected lifetime (due to the accumulated effects of wear and tear), with a period of several years of low failure rates in the middle. If the bathtub theory is correct, Backblaze’s assortment of 8TB drives should suffer fewer failures in the future. Read 1 remaining paragraphs | Comments

Read More:
8TB disks seem to work pretty well, HGST still impressive