Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

New submitter Kinwolf writes: Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove. Called Umbreon, after a Pokemon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. [It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.] According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn’t need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system. The reports adds: “The rootkit uses a trick to hijack the standard C library (libc) functions without actually installing any kernel objects. Umbreon hijacks these functions and forces other Linux executables to use its own libc-like library. This puts the rootkit in a man-in-the-middle position, capable of modifying system calls made by other programs and altering their output. The rootkit also creates a hidden Linux account that can be accessed via any authentication method supported by Linux, including SSH (Secure Shell). This account does not appear in files like /etc/passwd because the rootkit can modify the output of such files when read, the Trend Micro researchers said in a blog post. Umbreon also has a backdoor component called Espereon, named after another Pokemon character, that can establish a reverse shell to an attacker’s machine when a TCP packet with special field values are received on the monitored Ethernet interface of an affected device.” Read more of this story at Slashdot.

See more here:
Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

Sunken British Submarine Found Off the Coast of Denmark

On April 10, 1940, British submarine HMS Tarpon and its crew of 50 were sent to Norway to intercept Nazi merchant vessels. They were was never heard from again. Now, after 76 years, the sub has finally been found. An investigation of the remarkably well preserved vessel shows it didn’t go down without a fight. Read more…

See more here:
Sunken British Submarine Found Off the Coast of Denmark

The Grocery Store Items That Will Be More Expensive in 2017

According to the USDA, food prices have dropped 1.6% since last year. The USDA rounded up a few food items that are expected to continue to drop in price in 2016, but fair warning: these same items will probably be more expensive next year. Read more…

Continue reading here:
The Grocery Store Items That Will Be More Expensive in 2017

Netflix Finds x265 20% More Efficient Than VP9

Reader StreamingEagle writes (edited): Netflix conducted a large-scale study comparing x264, x265 and libvpx (Google-owned VP9), under real-world conditions, and found that x265 encodes used 35.4% to 53.3% fewer bits than x264, and between 21.8% fewer bits than libvpx, when measured with Netflix’s advanced VMAF assessment tool. This was the first large-scale study to use real-world encoder implementations, and a large sample size of high quality, professional content.A Netflix spokesperson explained why they did the test in the first place; “We wanted to understand the current state of the x265 and libvpx codec implementations when used to generate non-realtime encodes optimized for OTT use case. It was important to see how the codecs performed when testing on a diverse set of premium content from our catalog. This test can help us find areas of improvement for the different codecs.” Read more of this story at Slashdot.

Read More:
Netflix Finds x265 20% More Efficient Than VP9

TheAppStore Searches iTunes and the Mac App Store with Age, Price, and Rating Filters

Web: For some reason, Apple has never made a fully-functional online version of the iTunes App Store or Mac App Store, and definitely hasn’t built an easy web search tool.Well, there’s a fan-made app for that now. TheAppStore finally lets you browse the web for iOS and Mac apps from any device. Read more…

See the original post:
TheAppStore Searches iTunes and the Mac App Store with Age, Price, and Rating Filters

Giant Pandas Are No Longer Endangered

By the mercy of some higher power, the giant panda—an oversized mashup between a raccoon and a sloth whose offspring can’t shit on their own—is no longer endangered. At a meeting of the World Conservation Congress in Hawaii this weekend, experts took giant pandas off the IUCN’s official Red List, citing a population rebound in China. Read more…

Taken from:
Giant Pandas Are No Longer Endangered

Lost Philae Lander Found Wedged Into a Crack on its Comet

The European Space Agency lost contact with its Rosetta mission’s plucky little lander, Philae, in May 2015. Now the orbiter’s high-resolution camera has found Philae wedged into a dark crack on the surface of Comet 67P/Churyumov-Gerasimenko. Read more…

Read More:
Lost Philae Lander Found Wedged Into a Crack on its Comet

Warner Bros Issues Takedown For Own Website

An anonymous reader writes: In a case of sloppy automation run amok, Warner Bros’ copyright enforcement contractor — Vobile — issued takedown notices for legitimate distributors and Warner Bros’ own website, according to the BBC. It also asked the search giant to remove links to legitimate movie streaming websites run by Amazon and Sky, as well as Amazon-owned film database IMDB. Fortunately for them, Google chose to cut them a break and ignore those requests. Read more of this story at Slashdot.

Continued here:
Warner Bros Issues Takedown For Own Website

New Carbon Nanotube Chip Outperforms Silicon Semiconductors

“Researchers at the University of Wisconsin-Madison are the first to have fabricated carbon nanotube transistors (CNTs) that outperform the current-density of conventional semiconductors like silicon and gallium arsenide, ” reports NanotechWeb. Slashdot reader wasteoid shares the site’s interview with one of the researchers: “When the transistors are turned on to the conductive state (meaning that current is able to pass through the CNT channel) the amount of current traveling through each CNT in the array approaches the fundamental quantum limit, ” he tells nanotechweb.org. “Since the CNTs conduct in parallel, and the packing density and conductance per tube are very high, the overall current density is very high too — at nearly twice that of silicon’s. The result is that these CNT array FETs have a conductance that is seven times higher than any previous reported CNT array field-effect transistor.” The research was funded in part by the U.S. Army and Air Force, as well as the National Science Foundation. “The implication here is that by replacing silicon with a CNT channel, it should be possible for us to make either a higher performing device or one that works at lower power.” In other news, Fujitsu announced this week that it’s joining an effort to release a 256-megabyte 55-nanometer carbon nanotube-based NRAM by 2018. Read more of this story at Slashdot.

Read More:
New Carbon Nanotube Chip Outperforms Silicon Semiconductors

Police Seize Two ‘Perfect Privacy’ VPN Servers

An anonymous reader writes from a report via TorrentFreak: VPN provider Perfect Privacy has informed its customers that two of its servers had been seized by the police in Rotterdam, Netherlands. Torrent Freak reports: “The authorities went directly to the hosting company I3D and the VPN provider itself wasn’t contacted by law enforcement. ‘Currently we have no further information since the responsible law enforcement agency did not get in touch with us directly, we were merely informed by our hoster, ‘ Perfect Privacy says. Despite losing control over two servers, Perfect Privacy assures its customers that no personally identifiable data is present on the seized hardware. Like many other VPNs, the company maintains a strict no-logging policy. ‘Since we are not logging any data there is currently no reason to believe that any user data was compromised, ‘ the VPN provider says. ‘When the Dutch police contact us with a subpoena, we work with them in a professional manner and ensure their request and our responses are in compliance with the Dutch law, ‘ I3D informs us. ‘We think with the affected customer as well, for example by making temporary capacity available so the customer does not suffer extended downtime during the investigation.'” Read more of this story at Slashdot.

Follow this link:
Police Seize Two ‘Perfect Privacy’ VPN Servers