Apple pledges $1 billion to support manufacturing jobs in the US

Apple probably won’t start building iPhones and iPads in the United States any time soon , but CEO Tim Cook is happy to help other companies keep their manufacturing businesses stateside. Apple will pour $1 billion into a fund aimed at promoting advanced manufacturing jobs in the US, Cook announced on Mad Money today. “By doing that, we can be the ripple in the pond, ” Cook said. “Because if we can create many manufacturing jobs around, those manufacturing jobs create more jobs around them because you have a service industry that builds up around them.” Apple will announce the first beneficiary of its fund later in May. Cook touched on other areas of interest for Apple, including its intention to support programs that help train developers and get more people coding. Apple will announce details about this endeavor in the summer. “We’re really looking at this thing deeply, ” Cook said. “How do we grow our employee base? How do we grow the developer base? How do we grow manufacturing? You will see us bring things to market in all of those areas across this year.” One of President Donald Trump’s rallying cries during the campaign was the idea that he would bring manufacturing jobs back to the US. In early 2016, Trump said he’d force Apple to “build their damn computers in this country, ” though in reality there’s no teeth to such a threat and the company still assembles its gadgets abroad . Source: Mad Money

Visit site:
Apple pledges $1 billion to support manufacturing jobs in the US

Amazon Confirms Advertising Will Become a ‘Meaningful’ Part of Its Business

An anonymous reader shares a report: Amazon’s advertising business has loomed quietly in the digital media space for some time but the online behemoth has given the clearest indication yet that it will now come to the fore. Advertisers and agencies have been hearing Amazon-sized footsteps for some time but until now the business has erred away from revealing too much. However, on its latest earnings call Amazon was asked by one analyst as to whether advertising could become a more “meaningful part of the business” over the near to mid-term. “It’s pretty early in the days with advertising but we’re very pleased with the team we have and the results, ” said Amazon’s chief financial officer Brian Olsavsky in response to another analyst query. “Our goal is to be helpful to consumers and enhance their shopping or their viewing experience with targeted recommendations, and we think a lot of the information we have and preferences of customers and recommendations help us do that for customers.” Read more of this story at Slashdot.

Continue reading here:
Amazon Confirms Advertising Will Become a ‘Meaningful’ Part of Its Business

Gigabyte Firmware Bugs Allow the Installation of BIOS/UEFI Ransomware

An anonymous reader writes from a report via BleepingComputer: Last week, at the BlackHat Asia 2017 security conference, researchers from cyber-security firm Cylance disclosed two vulnerabilities in the firmware of Gigabyte BRIX small computing devices, which allow an attacker to write malicious content to the UEFI firmware. During their presentation, researchers installed a proof-of-concept UEFI ransomware, preventing the BRIX devices from booting, but researchers say the same flaws can be used to plant rootkits that allow attackers to persist malware for years. The two vulnerabilities discovered are CVE-2017-3197 and CVE-2017-3198. The first is a failure on Gigabyte’s part to implement write protection for its UEFI firmware. The second vulnerability is another lapse on Gigabyte’s side, who forgot to implement a system that cryptographically signs UEFI firmware files. Add to this the fact that Gigabyte uses an insecure firmware update process, which doesn’t check the validity of downloaded files using a checksum and uses HTTP instead of HTTPS. A CERT vulnerability note was published to warn users of the impending danger and the bugs’ ease of exploitation. Read more of this story at Slashdot.

Read the original post:
Gigabyte Firmware Bugs Allow the Installation of BIOS/UEFI Ransomware

Companies Start Implanting Microchips Into Workers’ Bodies

A Swedish start-up called Epicenter is offering to implant its employees and start-up members with microchips that function as swipe cards, allowing them to open doors, operate equipment or buy food and drinks with a wave of the hand. While these microchips have been available for decades, the technology has never been implanted in humans on such a broad scale. “Epicenter and a handful of other companies are the first to make chip implants broadly available, ” reports Associated Press. From the report: [A]s with most new technologies, it raises security and privacy issues. Although the chips are biologically safe, the data they generate can show how often employees come to work or what they buy. Unlike company swipe cards or smartphones, which can generate the same data, people cannot easily separate themselves from the chips. Epicenter, which is home to more than 100 companies and roughly 2, 000 workers, began implanting workers in January 2015. Now, about 150 workers have the chips. A company based in Belgium also offers its employees such implants, and there are isolated cases around the world in which tech enthusiasts have tried them out in recent years. The small implants use near-field communication technology, or NFC, the same as in contactless credit cards or mobile payments. When activated by a reader a few inches away, a small amount of data flows between the two devices via electromagnetic waves. The implants are “passive, ” meaning they contain information that other devices can read, but cannot read information themselves. Ben Libberton, a microbiologist at Stockholm’s Karolinska Institute, says hackers could conceivably gain huge swaths of information from embedded microchips. The ethical dilemmas will become bigger the more sophisticated the microchips become. Epicenter workers stage monthly events where attendees can receive the implant. Read more of this story at Slashdot.

Read the original:
Companies Start Implanting Microchips Into Workers’ Bodies

Amazon Outage Cost S&P 500 Companies $150M

From a report on Axios: Cyence, an economic modeling platform, shared some data with Axios that show the ramifications: Losses of $150 million for S&P 500 companies. Losses of $160 million for U.S. financial services companies using the infrastructure. Read more of this story at Slashdot.

Continue Reading:
Amazon Outage Cost S&P 500 Companies $150M

An Incorrect Command Entered By Employee Triggered Disruptions To S3 Storage Service, Knocking Down Dozens of Websites, Amazon Says

Amazon is apologizing for the disruptions to its S3 storage service that knocked down and — in some cases affected — dozens of websites earlier this week. The company also outlined what caused the issue — the event was triggered by human error. The company said an authorized S3 team member using an established playbook executed a command which was intended to remove a small number of servers for one of the S3 subsystems that is used by the S3 billing process. “Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended, ” the company said in a press statement Thursday. It adds: The servers that were inadvertently removed supported two other S3 subsystems. One of these subsystems, the index subsystem, manages the metadata and location information of all S3 objects in the region. This subsystem is necessary to serve all GET, LIST, PUT, and DELETE requests. The second subsystem, the placement subsystem, manages allocation of new storage and requires the index subsystem to be functioning properly to correctly operate. The placement subsystem is used during PUT requests to allocate storage for new objects. Removing a significant portion of the capacity caused each of these systems to require a full restart. While these subsystems were being restarted, S3 was unable to service requests. Other AWS services in the US-EAST-1 Region that rely on S3 for storage, including the S3 console, Amazon Elastic Compute Cloud (EC2) new instance launches, Amazon Elastic Block Store (EBS) volumes (when data was needed from a S3 snapshot), and AWS Lambda were also impacted while the S3 APIs were unavailable. Read more of this story at Slashdot.

Continue reading here:
An Incorrect Command Entered By Employee Triggered Disruptions To S3 Storage Service, Knocking Down Dozens of Websites, Amazon Says

World’s Largest Spam Botnet Adds DDoS Feature

An anonymous reader writes from a report via BleepingComputer: Necurs, the world’s largest spam botnet with nearly five million infected bots, of which one million are active each day, has added a new module that can be used for launching DDoS attacks. The sheer size of the Necurs botnet, even in its worst days, dwarfs all of today’s IoT botnets. The largest IoT botnet ever observed was Mirai Botnet #14 that managed to rack up around 400, 000 bots towards the end of 2016 (albeit the owner of that botnet has now been arrested). If this new feature were to ever be used, a Necurs DDoS attack would easily break every DDoS record there is. Fortunately, no such attack has been seen until now. Until now, the Necurs botnet has been seen spreading the Dridex banking trojan and the Locky ransomware. According to industry experts, there’s a low chance we’d see the Necurs botnet engage in DDoS attacks because the criminal group behind the botnet is already making too much money to risk exposing their full infrastructure in DDoS attacks. Read more of this story at Slashdot.

See the original post:
World’s Largest Spam Botnet Adds DDoS Feature

Cisco Patches ‘Prime Home’ Flaw That Allowed Hackers To Reach Into People’s Homes

Orome1 quotes a report from Help Net Security: Cisco has patched a critical authentication bypass vulnerability that could allow attackers to completely take over Cisco Prime Home installations, and through them mess with subscribers’ home network and devices. The vulnerability (CVE-2017-3791), found internally by Cisco security testers, affects the platform’s web-based GUI, and can be exploited by remote attackers to bypass authentication and execute any action in Cisco Prime Home with administrator privileges. No user interaction is needed for the exploit to work, and exploitation couldn’t be simpler: an attacker just needs to send API commands via HTTP to a particular URL. The bug exists in versions 6.4 and later of Cisco Prime Home, but does not affect versions 5.2 and earlier. “Administrators can verify whether they are running an affected version by opening the Prime Home URL in their browser and checking the Version: line in the login window. If currently logged in, the version information can be viewed in the bottom left of the Prime Home GUI footer, next to the Cisco Prime Home text, ” Cisco instructed in the security advisory. Read more of this story at Slashdot.

Originally posted here:
Cisco Patches ‘Prime Home’ Flaw That Allowed Hackers To Reach Into People’s Homes

Ransomware Infects All St Louis Public Library Computers

An anonymous reader quotes a report from The Guardian: Libraries in St Louis have been bought to a standstill after computers in all the city’s libraries were infected with ransomware, a particularly virulent form of computer virus used to extort money from victims. Hackers are demanding $35, 000 (£28, 000) to restore the system after the cyberattack, which affected 700 computers across the Missouri city’s 16 public libraries. The hackers demanded the money in electronic currency bitcoin, but, as CNN reports, the authority has refused to pay for a code that would unlock the machines. As a result, the library authority has said it will wipe its entire computer system and rebuild it from scratch, a solution that may take weeks. On Friday, St Louis public library announced it had managed to regain control of its servers, with tech staff continuing to work to restore borrowing services. The 16 libraries have all remained open, but computers continue to be off limits to the public. Spokeswoman Jen Hatton told CNN that the attack had hit the city’s schoolchildren and its poor worst, as many do not have access to the internet at home. “For many we’re their only access to the internet, ” she said. “Some of them have a smartphone, but they don’t have a data plan. They come in and use the wifi.” As well as causing the loans system to seize up, preventing borrowers from checking out or returning books, the attack froze all computers, leaving no one able to access the four million items that should be available through the service. The system is believed to have been infected through a centralized computer server, and staff emails have also been frozen by the virus. The FBI has been called in to investigate. Read more of this story at Slashdot.

Continue reading here:
Ransomware Infects All St Louis Public Library Computers

Hamas ‘Honey Trap’ Dupes Israeli Soldiers

wiredmikey quotes Security Week: The smartphones of dozens of Israeli soldiers were hacked by Hamas militants pretending to be attractive young women online, an Israeli military official said Wednesday. Using fake profiles on Facebook with alluring photos, Hamas members contacted the soldiers via groups on the social network, luring them into long chats, the official told journalists on condition of anonymity. Dozens of the predominantly lower-ranked soldiers were convinced enough by the honey trap to download fake applications which enabled Hamas to take control of their phones, according to the official. Read more of this story at Slashdot.

More:
Hamas ‘Honey Trap’ Dupes Israeli Soldiers