All-bacterial battery makes a nutrient when charged, eats it to discharge

Diagram of a microbial fuel cell that runs on acetate, one half of the bacterial battery described here. (credit: Oak Ridge National Lab ) The chemical that powers most of our cellular processes is produced through something called the electron transport chain. As its name suggests, this system shuffles electrons through a series of chemicals that leaves them at a lower energy, all while harvesting some of the energy difference to produce ATP. But the ultimate destination of this electron transport chain doesn’t have to be a chemical. There are a variety of bacteria that ultimately send the electrons off into the environment instead. And researchers have figured out how to turn these into a fuel cell, harvesting the electrons to do something useful. While some of these designs were closer to a battery than others, all of them consumed some sort of material in harvesting the electrons. A team of researchers in the Netherlands figured out how to close the loop and create an actual bacterial battery. One half of the battery behaves like a bacterial fuel cell. But the second half takes the electrons and uses them to synthesize a small organic molecule that the first can eat. Its charging cycle is painfully slow and its energy density is atrocious, but the fact that it works at all seems rather noteworthy. Read 11 remaining paragraphs | Comments

Read More:
All-bacterial battery makes a nutrient when charged, eats it to discharge

Nvidia unveils first Pascal graphics card, the monstrous Tesla P100

The first full-fat GPU based on Nvidia’s all-new Pascal architecture is here. And while the Tesla P100 is aimed at professionals and deep learning systems rather than consumers, if consumer Pascal GPUs are anything like it—and there’s a very good chance they will be—gamers and enthusiasts alike are going to see a monumental boost in performance. The  Tesla P100 is the first full-size Nvidia GPU based on the TSMC 16nm FinFET manufacturing process—like AMD, Nvidia has been stuck using an older 28nm process since 2012—and the first to feature the second generation of High Bandwidth Memory (HBM2). Samsung began mass production of faster and higher capacity HBM2 memory back in January. While recent rumours suggested that both Nvidia and AMD wouldn’t use HMB2 this year due to it being prohibitively expensive—indeed, AMD’s recent roadmap suggests that its new Polaris GPUs won’t use HBM2 —Nvidia has at least taken the leap with its professional line of GPUs. The result of the P100’s more efficient manufacturing process, architecture upgrades, and HBM2 is a big boost in performance over Nvidia’s current performance champs like the Maxwell-based Tesla M40 and the Titan X/Quadro M6000. Nvidia says the P100 reaches 21.2 teraflops of half-precision (FP16) floating point performance, 10.6 teraflops of single precision (FP32), and 5.3 teraflops (1/2 rate) of double precision. By comparison, the Titan X and Tesla M40 offer just 7 teraflops of single precision floating point performance. Read 9 remaining paragraphs | Comments

Continue Reading:
Nvidia unveils first Pascal graphics card, the monstrous Tesla P100

Frontier customers still have problems three days after Verizon changeover

Former Verizon customers who were switched over to Frontier Communications on Friday are still reporting outages and other problems today. Verizon sold its FiOS and DSL networks in California, Florida, and Texas to Frontier, but the transition has not been smooth. On Friday, Frontier acknowledged a “technical issue” involving the integration of systems, but the company said it had been fixed by 9:30am ET that morning. That assurance seems to have been premature, with customers still reporting problems on DownDetector  and Twitter throughout the weekend and today. “Onto the 4th day without Internet or any working account…any timeframe guys? This is getting really crazy!” one California customer complained today. Read 5 remaining paragraphs | Comments

See more here:
Frontier customers still have problems three days after Verizon changeover

A spiritual successor to Aaron Swartz is angering publishers all over again

Aaron Swartz would be proud of Alexandra Elbakyan. The 27-year-old is at the center of a lawsuit brought by a leading science publisher that is labeling her a hacker and infringer. (credit: Courtesy of Alexandra Elbakyan) Stop us if you’ve heard this before: a young academic with coding savvy has become frustrated with the incarceration of information. Some of the world’s best research continues to be trapped behind subscriptions and paywalls. This academic turns activist, and this activist then plots and executes the  plan. It’s time to free information from its chains—to give it to the masses free of charge. Along the way, this research Robin Hood is accused of being an illicit, criminal hacker. This, of course, describes the tale of the late Aaron Swartz . His situation captured the Internet’s collective attention as the data crusader attacked research paywalls. Swartz was notoriously charged as a hacker for trying to free millions of articles from popular academic hub JSTOR. At age 26, he tragically committed suicide just ahead of his federal trial in 2013. But suddenly in 2016, the tale has new life.  The Washington Post   decries it as academic research’s Napster moment, and it all stems from a 27-year-old bioengineer turned Web programmer from Kazakhstan (who’s living in Russia). Just as Swartz did, this hacker is freeing tens of millions of research articles from paywalls, metaphorically hoisting a middle finger to the academic publishing industry, which, by the way, has again reacted with labels like “hacker” and “criminal.” Read 30 remaining paragraphs | Comments

More:
A spiritual successor to Aaron Swartz is angering publishers all over again

Reddit removes “warrant canary” from its latest transparency report

(credit: Cyrus Farivar) Reddit has removed the warrant canary posted on its website, suggesting that the company may have been served with some sort of secret court order or document for user information. At the bottom of its 2014 transparency report , the company wrote: “As of January 29, 2015, reddit has never received a National Security Letter, an order under the Foreign Intelligence Surveillance Act, or any other classified request for user information. If we ever receive such a request, we would seek to let the public know it existed.” That language was conspicuously missing from the 2015 transparency report that was published Thursday morning. Read 3 remaining paragraphs | Comments

Read more here:
Reddit removes “warrant canary” from its latest transparency report

Maryland hospital group hit by ransomware

Baltimore’s Union Memorial is one of the hopitals hit by Samsam, an autonomous ransomware strain spread by exploiting JBoss servers. (credit: MedStar) Baltimore’s Union Memorial Hospital is the epicenter of a malware attack upon its parent organization, MedStar. Data at Union Memorial and other MedStar hospitals in Maryland have been encrypted by ransomware spread across the network, and the operators of the malware are offering a bulk deal: 45 bitcoins (about $18,500) for the keys to unlock all the affected systems. Reuters reports that the FBI issued a confidential urgent “Flash” message to the industry about the threat of Samsam on March 25, seeking assistance in fighting the ransomware and pleading, “We need your help!” The FBI’s cyber center also shared signature data for Samsam activity to help organizations screen for infections. But the number of potential targets remains vast, and the FBI was concerned that entire networks could fall victim to the ransomware. According to sources who spoke to the Baltimore Sun , the malware involved in MedStar’s outages is Samsam, also known as Samas and MSIL. The subject of a recent confidential FBI cyber-alert, Samsam is form of malware that uses well-known exploits in the JBoss application server and other Java-based application platforms. As Ars reported on Monday, Samsam uses exploits published as part of JexBoss , an open-source security and penetration testing tool for checking JBoss servers for misconfiguration. Read 3 remaining paragraphs | Comments

Original post:
Maryland hospital group hit by ransomware

New ransomware installs in boot record, encrypts hard disk [Updated]

Yet another harsh lesson for people who click things they shouldn’t. A new type of malware has been described, one that takes crypto-extortion to a new level. While most cryptographic ransomware variants are selective about what they encrypt—leaving the computer usable to make it easier for the victim to pay—this new entry targets the victim’s entire startup drive, encrypting the master file table (MFT). Called Petya, the new ransomware is just the latest ransomware deliberately tailored for victims within organizations with IT support instead of a broader audience.  As BleepingComputer’s Lawrence Abrams documented , Petya is currently being delivered via Dropbox links in e-mail messages targeting human resources departments at companies in Germany. The links are purported to be to an application to be installed by the HR employee. Running the attachment throws up a Windows alert; if the user clicks to continue, Petya is inserted into the master boot record (MBR) of the victim’s computer, and the system restarts. On reboot, the malware performs a fake Windows CHKDSK, warning “One of your disks contains errors and needs to be repaired,” Petya then flashes up an ASCII skull and crossbones on a red and white screen, announcing “You became victim of the PETYA RANSOMWARE!” Read 3 remaining paragraphs | Comments

Read More:
New ransomware installs in boot record, encrypts hard disk [Updated]

Texas cops joke on Facebook about Ebola-tainted meth and net one arrest

A Central Texas police department issued a “breaking news alert” on Facebook, cautioning residents that meth and heroin in the Granite Shoals area “could be contaminated with the life-threatening disease Ebola .” Last week’s fake Facebook alert urged the public “NOT” to ingest those illicit drugs “until it has been properly checked for possible Ebola contamination” by the police department. The ploy netted one arrest, the Granite Shoals Police Department (GSPD)  reported on Facebook. A woman allegedly brought in her meth so the police department could analyze it for Ebola: This morning, we had our first concerned citizen notify the Granite Shoals Police Department (GSPD) that they believed their methamphetamine may be tainted. Our officers gladly took the item for further testing. Results and booking photos are pending. Please continue to report any possibly tainted methamphetamine or other narcotics to the Granite Shoals Police Department. Public health and safety continue to remain our #1 priority. ‪#‎notkidding‬ For the uninitiated, there are no Ebola-contaminated drugs. The alert was a hoax played on the citizens of Granite Shoals, a town of about 5,000 northwest of Austin. But the arrest of 29-year-old Chastity Eugina Hopson is not a joke. She was accused of possessing under a gram of a controlled substance. The police department described Hopson’s arrest as “the winner of the Facebook post challenge.” Read 2 remaining paragraphs | Comments

Follow this link:
Texas cops joke on Facebook about Ebola-tainted meth and net one arrest

Cops: Lottery terminal hack allowed suspects to print more winning tickets

Six people have been charged in what prosecutors say was a scheme to hack Connecticut state lottery terminals so they produced more winning tickets and fewer losing ones. At least two of the suspects have been charged with felonies, including first-degree larceny, first-degree computer crimes, and rigging a game, according to an article published by The Hartford Courant . The suspects allegedly owned or worked at retail stores that produced winning tickets in numbers that were much higher than the state average. Of tickets generated at one liquor store, for instance, 76 percent were instant winners in one sample and 59 percent in another sample. The state-wide average, meanwhile, was just 24 percent. After manipulating the terminals, the suspects cashed the tickets and took the proceeds, prosecutors alleged. The charges come several months after lottery officials suspended a game called the 5 Card Cash after they noticed it was generating more winning tickets than its parameters should have allowed. The game remains suspended. Investigators say more arrests may be made in the future. Almost a year ago, prosecutors in Iowa presented evidence indicating the former head of computer security for the state’s lottery association tampered with lottery computers prior to buying a ticket that won a $14.3 million jackpot. Read 2 remaining paragraphs | Comments

Continue reading here:
Cops: Lottery terminal hack allowed suspects to print more winning tickets

After Verizon breach, 1.5 million customer records put up for sale

Verizon Enterprise offers security services, but it is dealing with a breach of its own this week. (credit: Verizon ) After a data breach at Verizon Enterprise Solutions, a customer database and information about Verizon security flaws were reportedly put up for sale by criminals this week. According to KrebsOnSecurity , “a prominent member of a closely guarded underground cybercrime forum posted a new thread advertising the sale of a database containing the contact information on some 1.5 million customers of Verizon Enterprise.” The entire database was priced at $100,000, or $10,000 for each set of 100,000 customer records. “Buyers also were offered the option to purchase information about security vulnerabilities in Verizon’s Web site,” security journalist Brian Krebs reported. Verizon Enterprise is itself a seller of security products and services , often helping Fortune 500 businesses clean up after data breaches. Verizon Enterprise also sells Internet service to large businesses, along with a variety of other networking products. Read 4 remaining paragraphs | Comments

See the article here:
After Verizon breach, 1.5 million customer records put up for sale