NASA melds vacuum tube tech with silicon to fill the terahertz gap

Vacuum tubes in a guitar amplifier. Shane Gorski The transistor revolutionized the world and made the abundant computing we now rely on a possibility, but before the transistor, there was the vacuum tube. Large, hot, power hungry, and prone to failure, vacuum tubes are a now-forgotten relic of the very earliest days of computing. But there’s a chance that vacuum tube technology could make its way back into computers—albeit without the vacuum—thanks to NASA research that has put together nanoscale “vacuum channel” transistors that can switch at more than 400GHz. Vacuum tubes have three important components: two electrodes—the negative, electron-emitting cathode, and the positive, electron-receiving anode—and a control grid placed between them. The flow of current between the cathode and the anode is controlled by the grid; the higher the voltage applied to the grid, the greater the amount of current that can flow between them. All three parts are housed in an evacuated glass tube or bulb and look somewhat like a kind of overcomplicated light bulb. The thing that made vacuum tubes so hot and power hungry was the cathode. Electrons can be encouraged to cross gaps by using very high voltages, but these tend to be difficult to work with. Instead, a phenomenon called thermionic emission is used—heat a piece of metal up enough, and the thermal energy lets the electrons escape the metal. Vacuum tubes have heating elements to make the cathode hot enough to emit electrons. Read 8 remaining paragraphs | Comments

View post:
NASA melds vacuum tube tech with silicon to fill the terahertz gap

Mint 17 is the perfect place for Linux-ers to wait out Ubuntu uncertainty

The team behind Linux Mint unveiled its latest update this week—Mint 17 using kernel 3.13.0-24, nicknamed “Qiana.” The new release indicates a major change in direction for what has quickly become one of the most popular Linux distros available today. Mint 17 is based on Ubuntu 14.04, and this decision appears to have one major driver.  Consistency.  Like the recently released Ubuntu 14.04, Mint 17 is a Long Term Support Release. That means users can expect support to continue until 2019. But even better, this release marks a change in Mint’s relationship with Ubuntu. Starting with Mint 17 and continuing until 2016, every release of Linux Mint will be built on the same package base—Ubuntu 14.04 LTS. With this stability, instead of working to keep up with whatever changes Ubuntu makes in the next two years, Mint can focus on those things that make it Mint. With major changes on the way for Ubuntu in the next two years, Mint’s decision makes a lot of sense. Not only does it free up the Mint team to focus on its two homegrown desktops (Cinnamon and MATE), but it also spares Mint users the potential bumpy road that is Ubuntu’s future. Read 53 remaining paragraphs | Comments

Original post:
Mint 17 is the perfect place for Linux-ers to wait out Ubuntu uncertainty

IE users get new protection against potent form of malware attack

a_codepoet Microsoft developers have fortified Internet Explorer with new protections designed to prevent a type of attack commonly used to surreptitiously install malware on end-user computers. The “isolated heap for DOM objects” made its debut with last week’s Patch Tuesday . Just as airbags lower the chance of critical injuries in automobile accidents, the new IE protection is designed to significantly lessen the damage attackers can do when exploiting so-called use-after-free flaws in the browser code. As the name suggests, use-after-free bugs are the result of code errors that reference computer memory objects after they have already been purged, or freed, from the operating system heap. Attackers can exploit them by refilling the improperly freed space with malicious code that logs passwords, makes computers part of a botnet, or carries out other nefarious behavior. Use-after-free flaws are among the most commonly exploited, often at great expense to end users. Recent in-the-wild attacks that targeted IE versions 9, 10, and 11 capitalized on a use-after-free bug. The bug class has been at the heart of many other real-world attacks on IE that are too numerous to count . (They have also been known to bring down Google Chrome and Mozilla Firefox.) Wei Chen, an exploit developer with Rapid 7’s Metasploit vulnerability framework, likens use-after-free exploits to sneaking tainted cookies into an already-opened bag of Oreos. Read 5 remaining paragraphs | Comments

View article:
IE users get new protection against potent form of malware attack

At least 32,000 servers broadcast admin passwords in the clear, advisory warns

An alarming number of servers containing motherboards manufactured by Supermicro continue to expose administrator passwords despite the release of an update that patches the critical vulnerability, an advisory published Thursday warned. The threat resides in the baseboard management controller (BMC), a motherboard component that allows administrators to monitor the physical status of large fleets of servers, including their temperatures, disk and memory performance, and fan speeds. Unpatched BMCs in Supermicro motherboards contain a binary file that stores remote login passwords in clear text. Vulnerable systems can be detected by performing an Internet scan on port 49152. A recent query on the Shodan search engine indicated there are 31,964 machines still vulnerable, a number that may not include many virtual machines used in shared hosting environments. “This means at the point of this writing, there are 31,964 systems that have their passwords available on the open market,” wrote Zachary Wikholm, a senior security engineer with the Carinet Security Incident Response Team. “It gets a bit scarier when you review some of the password statistics. Out of those passwords, 3,296 are the default combination. Since I’m not comfortable providing too much password information, I will just say that there exists a subset of this data that either contains or just was ‘password.'” Read 5 remaining paragraphs | Comments

Visit site:
At least 32,000 servers broadcast admin passwords in the clear, advisory warns

Undergrad breaks Android crypto ransomware

Early in June, Ars reported the discovery of Android/Simplocker , which appeared to be the first cryptographic ransomware Trojan targeted at Android devices. Simplocker encrypts photos, documents, and videos in devices’ local storage and then instructs the device owner to send money if they ever want to see that content again. One researcher—Simon Bell, an undergraduate student at the University of Sussex—managed to dissect the code for Simplocker. He found that while the code actually called back to a command and control server over the Tor anonymizing network to pass information about the infected device, all of the encryption work was done by the malware itself. Today, Bell released an antidote to Simplocker —a Java program that can decrypt the files attacked by the malware. “The antidote was incredibly easy to create because the ransomware came with both the decryption method and the decryption password,” Bell wrote. “Therefore producing an antidote was more of a copy-and-paste job than anything.” Read 3 remaining paragraphs | Comments

Original post:
Undergrad breaks Android crypto ransomware

Unicode 7.0 introduces 2,834 new characters, including 250 emoji

We can leave dumb old “words” behind as soon as emoji evolve to express all forms of human feeling and emotion. Andrew Cunningham The Unicode Consortium has just announced the release of version 7.0 of the Unicode Standard , the list of characters ” which specifies the representation of text in all modern software products and standards .” Unicode 7.0 adds 2,834 new characters to the existing list of 110,187 characters defined by Unicode 6.3, including new symbols for currency, new “lesser-used and historic scripts,” and extended support “for written languages of North America, China, India, other Asian countries, and Africa.” Of course, the Internet being what it is, what people seem the most excited about are the 250 new emoji characters, listed here by Emojipedia . Notable additions include “hot pepper,” “sleuth or spy,” “man in business suit levitating,” “reversed hand with middle finger extended,” and “raised hand with part between middle and ring fingers” (aka the ” live long and prosper ” thing). The list of emoji also extends the character set’s adorable fascination with outmoded technology thanks to icons like “soft shell floppy disk,” “fax icon,” and “old personal computer.” Mostly absent from that list of new emoji are the more racially diverse characters Apple said it was trying to introduce back in March . There are a few characters that suggest progress on that front (“sideways black left pointing index,” “black up pointing backhand index,” and so on, assuming that “index” is a reference to index fingers), but those additions don’t introduce parity between black- and white-skinned icons, nor do they account for other skin tones. That’s not necessarily surprising, since these standards take a long time to change—hopefully more characters are introduced in a future Unicode release. Read 1 remaining paragraphs | Comments

View article:
Unicode 7.0 introduces 2,834 new characters, including 250 emoji

Former Microsoft employee gets 3 months in jail for leaking Windows 8 secrets

Earlier this week, a man accused of stealing trade secrets from Microsoft and handing them to a French blogger was sentenced to three months in jail and a $100 fine in the Western District of Washington. Alex Kibkalo worked for Microsoft in the company’s Russia and Lebanon offices. According to an FBI complaint filed earlier this year, Kibkalo leaked pre-release updates for Windows RT and a Microsoft-internal Activation Server SDK to a French blogger in retaliation for a poor performance review. The blogger allegedly asked a third party to verify the stolen SDK, but that third party, who connected with the blogger via Hotmail, alerted Microsoft of the theft instead. At that point, Microsoft launched its own internal investigation and searched the Hotmail account to find the blogger and his source. The company’s investigation team was soon able to trace back to Kibkalo and then discovered that he had created a virtual machine on Microsoft’s corporate network from which he uploaded the stolen goods to SkyDrive. When confronted, Kibkalo admitted to handing over software, company memos, and other documents. He was fired and later arrested. Read 3 remaining paragraphs | Comments

Original post:
Former Microsoft employee gets 3 months in jail for leaking Windows 8 secrets

Is Chicago using cell tracking devices? One man tries to find out

David D’Agostino A local activist has filed a new lawsuit against the Chicago Police Department in an attempt to learn how the city uses fake cell tower devices, also known as stingrays. Relatively little is known about the devices, which are used to track targeted phones and can also be used to intercept calls and text messages. The American Civil Liberties Union recently began a campaign to learn more about how stingrays are used by filing public records requests in Florida, the home state of the Stingray’s manufacturer, Harris Corporation. (While “Stringray” is a trademarked name and particular product, it has entered the technical lexicon as a generic term, like Kleenex or Xerox.) In nearly every sales agreement , that firm has required law enforcement agencies to sign nondisclosure agreements forbidding them from discussing whether or not an agency even possesses such a device, much less describing its capabilities. Read 8 remaining paragraphs | Comments

More:
Is Chicago using cell tracking devices? One man tries to find out

Amtrak wants 25Mbps per train

A familiar dialogue box for riders on the Northeast corridor. Amtrak is looking to build a trackside Wi-Fi network on its Northeast corridor that would bump its trains’ connections to broadband-level speeds. The increase is meant to accommodate busy trains with hundreds of customers crowding the Wi-Fi, a common scenario that results in slow or no connections for some customers. Amtrak has offered Wi-Fi on trains running between Boston and Washington, DC for several years now , but currently, the connection is 10Mbps shared among everyone on the train. In this reporter’s experience on crowded trains, this means you can only get on the Wi-Fi long enough to re-establish a connection through the network’s dialog boxes before the process resets. The company has requested proof-of-concept bids to bump the connection speed to 25Mbps per train “to meet growing customer data usage demands.” The bids will be used to see if it is “technically and financially feasible” to bring network improvements to the entire stretch of the Northeast corridor. Read 1 remaining paragraphs | Comments

Original post:
Amtrak wants 25Mbps per train

“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

Eset Security researchers have documented another first in the annals of Android malware: a trojan that encrypts photos, videos, and documents stored on a device and demands a ransom for them to be restored. The crudeness of Android/Simplocker, as the malicious app has been dubbed, suggests it’s still in the proof-of-concept phase, Robert Lipovsky, a malware researcher for antivirus provider Eset, said in a recent blog post . The malware also addresses users in Russian and demands that payments be made in Ukrainian hryvnias, an indication that it targets only people in Eastern Europe. Still, the trojan—with its combination of social engineering, strong encryption, and robust Internet architecture—could be a harbinger of more serious and widespread threats to come. After all, the first Android trojans to make hefty SMS charges also debuted in the same region. Once installed on a device, the app delivers the following message: Read 3 remaining paragraphs | Comments

More:
“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android