Multiple Linux Distributions Affected By Crippling Bug In Systemd

An anonymous reader writes: System administrator Andrew Ayer has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with one command. “After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system.” According to the bug report, Debian, Ubuntu, and CentOS are among the distros susceptible to various levels of resource exhaustion. The bug, which has existed for more than two years, does not require root access to exploit. Read more of this story at Slashdot.

Taken from:
Multiple Linux Distributions Affected By Crippling Bug In Systemd

New California Law Allows Test of Autonomous Shuttle With No Driver

If you live in California, you may soon start to see self-driving cars on the road with no operators to be seen. California Governor Jerry Brown signed into law on Thursday a bill that allows a self-driving vehicle with no operator inside to test on a public road. Currently, companies are legally able to test self-driving cars in California as long as the operators are located inside the vehicles when they are being tested. Fortune reports: The bill introduced by Democratic Assemblywoman Susan Bonilla allows testing in Contra Costa County northeast of San Francisco of the first full-autonomous vehicle without a steering wheel, brakes, accelerator or operator. New legislation was necessary because although driverless vehicles can be tested on private land like the office park, the shuttle will cross a public road on its loop through the campus. The new law means that two cube-like Easymile shuttles that travel no faster than 25 mph (40 kph) will be tested for a period of up to six months before being deployed and used by people. In an interview with Reuters in March, Bonilla said the “natural tension” between regulators concerned about safety and lawmakers trying to encourage innovation in their state necessitated a new bill. “They’re risk averse and we’re saying we need to open the door here and take steps (to innovate), ” Bonilla said, calling the driverless shuttle project “a very wise first out-of-the-gate opportunity” to show how the technology could work safely. Read more of this story at Slashdot.

Continue reading here:
New California Law Allows Test of Autonomous Shuttle With No Driver

IEEE Sets New Ethernet Standard That Brings 5X the Speed Without Cable Ripping

Reader coondoggie writes: As expected the IEEE has ratified a new Ethernet specification — IEEE P802.3bz — that defines 2.5GBASE-T and 5GBASE-T, boosting the current top speed of traditional Ethernet five-times without requiring the tearing out of current cabling. The Ethernet Alliance wrote that the IEEE 802.3bz Standard for Ethernet Amendment sets Media Access Control Parameters, Physical Layers and Management Parameters for 2.5G and 5Gbps Operation lets access layer bandwidth evolve incrementally beyond 1Gbps, it will help address emerging needs in a variety of settings and applications, including enterprise, wireless networks. Indeed, the wireless component may be the most significant implication of the standard as 2.5G and 5G Ethernet will allow connectivity to 802.11ac Wave 2 Access Points, considered by many to be the real driving force behind bringing up the speed of traditional NBase-T products. Read more of this story at Slashdot.

Taken from:
IEEE Sets New Ethernet Standard That Brings 5X the Speed Without Cable Ripping

California Launches Mandatory Data Collection For Police Use-of-Force

An anonymous Slashdot reader quotes the AP: All 800 police departments in California must begin using a new online tool launched Thursday to report and help track every time officers use force that causes serious injuries… The tool, named URSUS for the bear on California’s flag, includes fields for the race of those injured and the officers involved, how their interaction began and why force was deemed necessary. “It’s sort of like TurboTax for use-of-force incidents, ” said Justin Erlich, a special assistant attorney general overseeing the data collection and analysis. Departments must report the data under a new state law passed last November. Though some departments already tracked such data on their own, many did not… “As a country, we must engage in an honest, transparent, and data-driven conversation about police use of force, ” California Attorney General Kamala Harris said in a news release. It’s an open source tool developed by Bayes Impact, and California plans to share the code with other interested law enforcement agencies across the country. Only three other states currently require their police departments to track data about use-of-force incidents, “but their systems aren’t digital, and in Colorado’s case, only capture shootings.” Read more of this story at Slashdot.

More here:
California Launches Mandatory Data Collection For Police Use-of-Force

Spam Hits Its Highest Level Since 2010

Long-time Slashdot reader coondoggie quotes Network World: Spam is back in a big way — levels that have not been seen since 2010 in fact. That’s according to a blog post from Cisco Talos that stated the main culprit of the increase is largely the handiwork of the Necurs botnet… “Many of the host IPs sending Necurs’ spam have been infected for more than two years. “To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions… This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again.” Before this year, the SpamCop Block List was under 200, 000 IP addresses, but surged to over 450, 000 addresses by the end of August. Interestingly, Proofpoint reported that between June and July, Donald Trump’s name appeared in 169 times more spam emails than Hillary Clinton’s. Read more of this story at Slashdot.

Read more here:
Spam Hits Its Highest Level Since 2010

Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

An anonymous reader quotes a report from Ars Technica: For the better part of a day, KrebsOnSecurity, arguably the world’s most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn’t like a recent series of exposes reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet. The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600, 000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here. On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4 pm, Akamai gave Krebs two hours’ notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it’s twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn’t rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease. The attackers used Internet-of-things devices since they’re always-connected and easy to “remotely commandeer by people who turn them into digital cannons that spray the internet with shrapnel.” “The biggest threats as far as I’m concerned in terms of censorship come from these ginormous weapons these guys are building, ” Krebs said. “The idea that tools that used to be exclusively in the hands of nation states are now in the hands of individual actors, it’s kind of like the specter of a James Bond movie.” While Krebs could retain a DDoS mitigation service, it would cost him between $100, 000 and $200, 000 per year for the type of protection he needs, which is more than he can afford. What’s especially troubling is that this attack can happen to many other websites, not just KrebsOnSecurity. Read more of this story at Slashdot.

Visit link:
Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

People Are Drilling Holes Into Their iPhone 7 To ‘Make a Headphone Jack’

TechRax — a popular YouTuber who destroys technology for fame and riches — has uploaded a video where he drills a hole into an iPhone 7, claiming it to be a “secret hack” to reinstall a headphone jack in the device. The only problem is that he didn’t tell people it was a joke, and of course, some people fell for it. Crave Online reports: The YouTube video has amassed over 7.5 million views since being posted online last week, with it attracting 81, 000 dislikes in the process. The comments section is currently torn between people who are in on the joke, people who criticize TechRax for damaging his iPhone 7, and most unfortunately, people who have tried the “hack” out for themselves. Although this is YouTube so you can never be quite sure of whether or not these folks are trolling, parsing the comments section reveals some pretty convincing complaints lobbed in TechRax’s direction. It’s also firmly believable that there are people dumb enough to attempt drilling a hole into their iPhone 7, which is unfortunate but that’s the way the world is in 2016. You can read the comments under the YouTube video for more “convincing complaints.” But as if the report didn’t make it clear enough already, the video is a joke. Apple removed the headphone jack and there’s no way to get it back, unless you use an adapter. Read more of this story at Slashdot.

More:
People Are Drilling Holes Into Their iPhone 7 To ‘Make a Headphone Jack’

Probe Of Leaked US NSA Hacking Tools Examines Operative’s Mistake

Joseph Menn and John Walcott, reporting for Reuters: A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. The tools, which enable hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet Inc, were dumped onto public websites last month by a group calling itself Shadow Brokers. The public release of the tools coincided with U.S. officials saying they had concluded that Russia or its proxies were responsible for hacking political party organizations in the run-up to the Nov. 8 presidential election. On Thursday, lawmakers accused Russia of being responsible. Various explanations have been floated by officials in Washington as to how the tools were stolen. Some feared it was the work of a leaker similar to former agency contractor Edward Snowden, while others suspected the Russians might have hacked into NSA headquarters in Fort Meade, Maryland. Read more of this story at Slashdot.

Continued here:
Probe Of Leaked US NSA Hacking Tools Examines Operative’s Mistake

China Confirms Its Space Station Is Falling Back to Earth

The Tiangong-1, China’s prototype space station which was launched in September 2011, is no longer under the control of China. PopularMechanics reports: China’s Tiangong-1 space station has been orbiting the planet for about 5 years now, but recently it was decommissioned and the Chinese astronauts returned to the surface. In a press conference, China announced that the space station would be falling back to earth at some point in late 2017. Normally, a decommissioned satellite or space station would be retired by forcing it to burn up in the atmosphere. This type of burn is controlled, and most satellite re-entries are scheduled to burn up over the ocean to avoid endangering people. However, it seems that China’s space agency is not sure exactly when Tiangong-1 will re-enter the atmosphere, which implies that the station has been damaged somehow and China is no longer able to control it. This is important because it means Tiangong-1 won’t be able to burn up in a controlled manner. All we know is it will burn up at some point in late 2017, but it is impossible to predict exactly when or where. This means that there is a chance debris from the falling spacecraft could strike a populated area. Read more of this story at Slashdot.

Link:
China Confirms Its Space Station Is Falling Back to Earth

Lyft Says Robots Will Drive Most Of Its Cars in Five Years

A week after its rival Uber began rolling out self-driving cars in Pittsburgh, Lyft has said it also expects to roll out its self-driving by next year. Its president John Zimmer outlined a “three-phase” plan for the company, noting that self-driving cars will be made available to Lyft users in the first phase. But in this phase, it only plans to roll out self-driving cars that can “drive along fixed routes” and that the “technology is guaranteed to be able to navigate.” Recode adds: In the second phase, the self-driving cars in the fleet will navigate more than just the fixed routes, but will only drive up to 25 miles per hour. As the technology matures and the software encounters more complex environments, Zimmer wrote, cars will get faster. The third phase, expected to happen sometime in 2021 or 2022, will be when all Lyft rides will be completed by a fully autonomous car. Shortly after that phase begins, car ownership will see a steep drop-off, according to Zimmer. Zimmer, who has long been a vocal proponent of ending car ownership, set a date for the death of the personally owned car in major U.S. cities: 2025. Read more of this story at Slashdot.

Read More:
Lyft Says Robots Will Drive Most Of Its Cars in Five Years