Australian Birds of Prey Are Deliberately Setting Forests On Fire

An anonymous reader writes: If you’ve been counting the ways the Australian environment is trying to kill you, you can now add “arson” to the list. According to a six-year study published in The Journal of Ethnobiology, observers have confirmed what Aboriginal rangers have been observing for years: birds of prey routinely carry burning or smouldering sticks into dry grassy areas to scare small mammals into fleeing so they can be pack-hunted more effectively. This has implications for environmental management, since the best firebreak will not protect your controlled burn from a “firehawk” determined to breach it. Read more of this story at Slashdot.

Read More:
Australian Birds of Prey Are Deliberately Setting Forests On Fire

"SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)"

  by: SANS Pen Test Team Imagine you are sitting at your desk and come across a great command line tip that will assist you in your careeras an information security professional, so you jot the tip down on a note, post-it, or scrap sheet of paper and tape it to your white board… now … Continue reading SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)

Excerpt from:
"SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)"

Saudi Arabia Becomes First Nation To Grant Citizenship To Humanoid Robot

Saudi Arabia became the first country in the world to offer citizenship to a humanoid robot, but Brad Keywell, CEO of Uptake, a predictive analytics technology company, told FOX Business on Thursday artificial intelligence (AI) will not replace humans anytime soon. From a report: “Humans are made super-human through the intelligence that can be derived from these sensors and there is a clear argument that’s made about the possibility that there will be no humans, there’d be just autonomous everything… but this is something that has historically involved humans and I just don’t see that changing, ” he told Maria Bartiromo on “Mornings with Maria.” Uptake’s products are used in a collection of industries ranging from energy to aviation, helping “people and machines work better and faster, ” according to the company website. Read more of this story at Slashdot.

Read More:
Saudi Arabia Becomes First Nation To Grant Citizenship To Humanoid Robot

Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. From a report: In October, a report from the Wall Street Journal claimed that in 2015, the Russian firm targeted an employee of the NSA known for working on the intelligence agency’s hacking tools and software. The story suggested that the unnamed employee took classified materials home and operated on their PC, which was running Kaspersky’s antivirus software. Once these secretive files were identified — through an avenue carved by the antivirus — the Russian government was then able to obtain this information. Kaspersky has denied any wrongdoing, but the allegation that the firm was working covertly with the Russian government was enough to ensure Kaspersky products were banned on federal networks. There was a number of theories relating to what actually took place — was Kaspersky deliberately targeting NSA employees on behalf of the Kremlin, did an external threat actor exploit a zero-day vulnerability in Kaspersky’s antivirus, or were the files detected and pulled by accident? According to Kaspersky, the latter is true. On Wednesday, the Moscow-based firm said in a statement that the results of a preliminary investigation have produced a rough timeline of how the incident took place. It was actually a year earlier than the WSJ believed, in 2014, that code belonging to the NSA’s Equation Group was taken. Read more of this story at Slashdot.

Read the original post:
Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Higher Minimum Wages Bring Automation and Job Losses, Study Suggests

An anonymous reader shares a report via email: As of the start of the year, 19 U.S. states had raised minimum wages, dramatizing a long simmering debate: Do minimum wages kill jobs, and make the working class worse off in the end? Or do they simply make them a little richer, with little or no loss to overall employment? In a new paper, economists Grace Lordan of the London School of Economics and David Neumark of UC Irvine parse 35 years of census data and come down on the worse-off side: For lower-skill jobs like bookkeepers and assembly-line workers, they say, higher minimum wages encourage employers to automate — according to their calculations, a $1 increase can cost tens of thousands of jobs nationally. Read more of this story at Slashdot.

Read More:
Higher Minimum Wages Bring Automation and Job Losses, Study Suggests

Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

An anonymous reader quotes a report from Ars Technica: A Russian government-sponsored group accused of hacking the Democratic National Committee last year has likely been infecting other targets of interest with the help of a potent Windows exploit developed by, and later stolen from, the National Security Agency, researchers said Friday. Eternal Blue, as the exploit is code-named, is one of scores of advanced NSA attacks that have been released over the past year by a mysterious group calling itself the Shadow Brokers. It was published in April in the group’s most damaging release to date. Its ability to spread from computer to computer without any user action was the engine that allowed the WCry ransomware worm, which appropriated the leaked exploit, to shut down computers worldwide in May. Eternal Blue also played a role in the spread of NotPetya, a follow-on worm that caused major disruptions in June. Now, researchers at security firm FireEye say they’re moderately confident the Russian hacking group known as Fancy Bear, APT 28, and other names has also used Eternal Blue, this time in a campaign that targeted people of interest as they connected to hotel Wi-Fi networks. In July, the campaign started using Eternal Blue to spread from computer to computer inside various staff and guest networks, company researchers Lindsay Smith and Ben Read wrote in a blog post. While the researchers didn’t directly observe those attacks being used to infect guest computers connected to the network, they said a related campaign from last year used the control of hotel Wi-Fi services to obtain login credentials from guest devices. Read more of this story at Slashdot.

More:
Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

Apple Refuses To Enable iPhone Emergency Settings that Could Save Countless Lives

An anonymous reader shares a report: Despite being relatively easy, Apple keeps ignoring requests to enable a feature called Advanced Mobile Location (AML) in iOS. Enabling AML would give emergency services extremely accurate locations of emergency calls made from iPhones, dramatically decreasing response time. As we have covered before, Google’s successful implementation of AML for Android is already saving lives. But where Android users have become safer, iPhone owners have been left behind. The European Emergency Number Association (EENA), the organization behind implementing AML for emergency services, released a statement today that pleads Apple to consider the safety of its customers and participate in the program: “As AML is being deployed in more and more countries, iPhone users are put at a disadvantage compared to Android users in the scenario that matters most: An emergency. EENA calls on Apple to integrate Advanced Mobile Location in their smartphones for the safety of their customers.” Why is AML so important? Majority of emergency calls today are made from cellphones, which has made location pinging increasingly more important for emergency services. There are many emergency apps and features in development, but AML’s strength is that it doesn’t require anything from the user — no downloads and no forethought: The process is completely automated. With AML, smartphones running supporting operating systems will recognize when emergency calls are being made and turn on GNSS (global navigation satellite system) and Wi-Fi. The phone then automatically sends an SMS to emergency services, detailing the location of the caller. AML is up to 4, 000 times more accurate than the current systems — pinpointing phones down from an entire city to a room in an apartment. “In the past months, EENA has been travelling around Europe to raise awareness of AML in as many countries as possible. All these meetings brought up a recurring question that EENA had to reply to: ‘So, what about Apple?'” reads EENA’s statement. Read more of this story at Slashdot.

Taken from:
Apple Refuses To Enable iPhone Emergency Settings that Could Save Countless Lives

US Cyber Command may be splitting off from the NSA

It sounds as though the United States’ Cyber Command will break off from the National Security Agency and be more aligned with the military in the future. The move would “eventually” cleave Cyber Command from the intelligence-focused NSA and instead align it more with the military, according to the Associated Press . “The goal is to give Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, ” AP reports. The NSA’s core task of intelligence gathering sometimes is at odds with military cyber warfare operations, hence the proposed separation. Prior to this, the two had clashed on getting intel from Islamic State networks (the NSA’s task) and attacking (Cyber Command’s). But there are concerns that splitting off from the NSA could come at a cost. Specifically, Cyber Command’s access to the intelligence agency’s resources including some of the top mathematicians in the country and a “gigantic” super computer, according to AP ‘s sources. The moves to start the separation had begun under President Obama, and now the nitty gritty of how the “divorce” (our word) will proceed is up in the air. The result of that is uncertainty over staffing, resources and leadership. Currently both groups are led by the same person, Admiral Mike Rogers , but the shift could see new leadership for the NSA transfer to a civilian. Cyber Command may remain under military leadership under the Army’s Lieutenant General William Mayville. Mayville served as director of operations for the Joint Staff. This comes after the Cyber Command has gained a bigger seat at the table during military operations and an increased focus on using cyber warfare in places like Russia and the Middle East. Source: Associated Press

View the original here:
US Cyber Command may be splitting off from the NSA

Bitcoin Surges 10% To All-Time High Above $2,700, Has Now Doubled in May

An anonymous reader writes: In another intraday jump of more than $200, bitcoin surged to a record Thursday on strong Asian demand overnight. Bitcoin jumped more than 10 percent to an all-time high of $2, 752.07, more than twice its April 30 price of $1, 347.96 according to CoinDesk. The digital currency last traded near $2, 726. At Thursday’s record, Bitcoin has now gained more than 45 percent since last Thursday and more than 180 percent for the year so far. “There is no question that we are in the middle of a price frenzy, ” said Brian Kelly of BKCM, in a note to clients Thursday. “There will be a correction and it could be severe, but it’s unclear if that correction will start from current prices of $2700 or from some place much higher.” Read more of this story at Slashdot.

View article:
Bitcoin Surges 10% To All-Time High Above $2,700, Has Now Doubled in May

Trump Signs Executive Order On Cybersecurity

President Trump on Thursday signed a long-delayed executive order on cybersecurity that “makes clear that agency heads will be held accountable for protecting their networks, and calls on government and industry to reduce the threat from automated attacks on the internet, ” reports The Washington Post. From the report: Picking up on themes advanced by the Obama administration, Trump’s order also requires agency heads to use Commerce Department guidelines to manage risk to their systems. It commissions reports to assess the country’s ability to withstand an attack on the electric grid and to spell out the strategic options for deterring adversaries in cyberspace. [Thomas Bossert, Trump’s homeland security adviser] said the order was not, however, prompted by Russia’s targeting of electoral systems last year. In fact, the order is silent on addressing the security of electoral systems or cyber-enabled operations to influence elections, which became a significant area of concern during last year’s presidential campaign. The Department of Homeland Security in January declared election systems “critical infrastructure.” The executive order also does not address offensive cyber operations, which are generally classified. This is an area in which the Trump administration is expected to be more forward-leaning than its predecessor. Nor does it spell out what type of cyberattack would constitute an “act of war” or what response the attack would invite. “We’re not going to draw a red line, ” Bossert said, adding that the White House does not “want to telegraph our punches.” The order places the defense secretary and the head of the intelligence community in charge of protecting “national security” systems that operate classified and military networks. But the secretary of homeland security will continue to be at the center of the national plan for protecting critical infrastructure, such as the electric grid and financial sector. Read more of this story at Slashdot.

Taken from:
Trump Signs Executive Order On Cybersecurity