Facebook’s ‘Lite’ app has over 200 million users (updated)

Just because you’re using Facebook Lite , it doesn’t mean you want to compromise on features. Neither do any of the 200 million users worldwide taking advantage of the bare-bones version of the app. Fortunately, there’s an update that rolls out many missing features today such as the ability to Like, Comment and Share posts. Facebook created Lite as a pared down version of its main app in 2015 for lower-end Android phones with spotty network connections. COO Sheryl Sandberg was keen to outline the benefits that users of the standalone app are getting. Business users, for example, can use the more feature-rich update to reach mobile-only and mobile-first customers while using less data. Performance improvements are a given with any update, especially when the company wants to assure a fast, reliable connection to the social network no matter what. Facebook has also found that people who use Facebook Lite tend to share phones, so it has provided an easier way to log on and off their accounts in this new update. The update brings Facebook Lite to more regions, including the definitely not emerging markets of South Korea, Israel, the United Arab Emirates, and Italy. It’s available in 150 countries in addition to the original eight of Bangladesh, Vietnam, Nigeria, Nepal, South Africa, Sudan, Sri Lanka and Zimbabwe. Update : Contrary to the information we initially received, Facebook has confirmed it added Like/Comment/Share support to the Lite app last March, when it announced over 100 million monthly active users. We have updated this post to reflect that. Source: Sheryl Sandberg (Facebook) , Facebook Lite

View article:
Facebook’s ‘Lite’ app has over 200 million users (updated)

A rash of invisible, fileless malware is infecting banks around the globe

(credit: INVISIBLE-MAN_1933_James Whale) Two years ago, researchers at Moscow-based Kaspersky Lab discovered their corporate network was infected with malware that was unlike anything they had ever seen . Virtually all of the malware resided solely in the memory of the compromised computers, a feat that had allowed the infection to remain undetected for six months or more. Kaspersky eventually unearthed evidence that Duqu 2.0, as the never-before-seen malware was dubbed, was derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program. Now, fileless malware is going mainstream, as financially motivated criminal hackers mimic their nation-sponsored counterparts. According to research Kaspersky Lab plas to publish Wednesday, networks belonging to at least 140 banks and other enterprises have been infected by malware that relies on the same in-memory design to remain nearly invisible. Because infections are so hard to spot, the actual number is likely much higher. Another trait that makes the infections hard to detect is the use of legitimate and widely used system administrative and security tools—including PowerShell , Metasploit , and Mimikatz —to inject the malware into computer memory. “What’s interesting here is that these attacks are ongoing globally against banks themselves,” Kaspersky Lab expert Kurt Baumgartner told Ars. “The banks have not been adequately prepared in many cases to deal with this.” He went on to say that people behind the attacks are “pushing money out of the banks from within the banks,” by targeting computers that run automatic teller machines. Read 5 remaining paragraphs | Comments

Read the article:
A rash of invisible, fileless malware is infecting banks around the globe

Hamas ‘Honey Trap’ Dupes Israeli Soldiers

wiredmikey quotes Security Week: The smartphones of dozens of Israeli soldiers were hacked by Hamas militants pretending to be attractive young women online, an Israeli military official said Wednesday. Using fake profiles on Facebook with alluring photos, Hamas members contacted the soldiers via groups on the social network, luring them into long chats, the official told journalists on condition of anonymity. Dozens of the predominantly lower-ranked soldiers were convinced enough by the honey trap to download fake applications which enabled Hamas to take control of their phones, according to the official. Read more of this story at Slashdot.

More:
Hamas ‘Honey Trap’ Dupes Israeli Soldiers

Private company says it is fully funded for mission to the Moon

An artist’s concept of Moon Express’ MX-1 lander on the surface of the Moon. (credit: Moon Express) Any organization wishing to accomplish a major spaceflight goal must address two basic sets of problems—rocket science and political science. And while the technical challenges of spaceflight are considerable, it’s arguable that political science remains the greater of these two hurdles. Building spacecraft and rockets requires lots of money, after all, and due to international law they can’t just be launched from anywhere to anywhere. So it is no small achievement for the private, US-based Moon Express to have conquered the political science part of sending a rover to the Moon. Last August, after a lengthy regulatory process, the company received permission from the US government to send a commercial mission beyond low Earth orbit. And on Friday, the company announced that it has successfully raised an additional $20 million, meaning it has full funding for its maiden lunar mission. “Now it’s just about the rocket science stuff,” said company co-founder and Chief Executive Bob Richards. That, he realizes, remains a formidable challenge. Moon Express is one of five entrants in the Google Lunar X Prize competition to finalize a launch contract. Each of the teams is competing to become the first to send a rover to the lunar surface by the end of this year, have it travel 500 meters, and transmit high-definition imagery back to Earth. First prize is $20 million. Read 6 remaining paragraphs | Comments

View original post here:
Private company says it is fully funded for mission to the Moon

A Hiker Stumbled Across This Incredibly Rare 2,000-Year-Old Gold Coin

Finding money on the floor is rarely this exciting. This single gold coin was discovered by a hiker and Israel’s Antiquities Authority has since established that it’s one of only two ever discovered. The coin’s 2, 000 years old—and, before you ask, priceless. Read more…

Read More:
A Hiker Stumbled Across This Incredibly Rare 2,000-Year-Old Gold Coin

Stealing Keys From a Laptop In Another Room — and Offline

Motherboard carries a report that with equipment valued at about $3, 000, a group of Israeli researchers have been able to extract cryptographic keys from a laptop that is not only separated by a physical wall, but protected by an air gap. This, they say, “is the first time such an approach has been used specifically against elliptic curve cryptography running on a PC.” From the article: The method is a so-called side-channel attack: an attack that doesn’t tackle an encryption implementation head on, such as through brute force or by exploiting a weakness in the underlying algorithm, but through some other means. In this case, the attack relies on the electromagnetic outputs of the laptop that are emitted during the decryption process, which can then be used to work out the target’s key. Specifically, the researchers obtained the private key from a laptop running GnuPG, a popular implementation of OpenPGP. (The developers of GnuPG have since released countermeasures to the method. Tromer said that the changes make GnuPG âoemore resistant to side-channel attack since the sequence of high-level arithmetic operations does not depend on the secret key.â) Read more of this story at Slashdot.

More here:
Stealing Keys From a Laptop In Another Room — and Offline

Israel’s Only Bottle Factory Turns Desert Sand Into Mountains of Glass

Deep in the heart of Israel’s desert, shimmering mountains of green, brown and white glass dominate the landscape, awaiting a new life. It’s a beautiful spectacle. Read more…

View the original here:
Israel’s Only Bottle Factory Turns Desert Sand Into Mountains of Glass

House looks into claims the NSA spied on Congress

You’re not the only one concerned that the National Security Agency might be spying on Congress … Congress is, too. The House Intelligence Committee says it’s investigating claims that the NSA monitored communications between members of Congress and Israeli leadership as they discussed the Iran nuclear agreement. The Committee not only wants a point-by-point verification of the Wall Street Journal ‘s original report, but to find out whether or not the NSA was following the rules. There’s potential for trouble. While the White House reportedly didn’t order the eavesdropping, it also didn’t stop the activity when it found out. Moreover, this came after officials claimed that the US no longer snoops on NATO members’ heads of state — apparently, that courtesy doesn’t extend to allies outside of the region. Even if any surveillance was completely above-board, it’ll still raise questions about where and when the NSA is allowed to operate. [Image credit: AP Photo/J. Scott Applewhite] Source: The Hill

Read the article:
House looks into claims the NSA spied on Congress

These Huge Roman Mosaics Were Hidden Under City Streets For 1,700 Years 

Twenty years ago, construction workers in the Israeli town of Lod working under a city street came across something extraordinary: A massive mosaic, laid down almost two millennia before. Now, they’ve found another . Read more…

See the article here:
These Huge Roman Mosaics Were Hidden Under City Streets For 1,700 Years 

MIT scientists make it easy to tweak designs for 3D printing

Two different groups of MIT researchers found a way to print out objects with glass instead of plastic and to make a printer spew out 10 different materials at once earlier this year. This particular team along with researchers from the Interdisciplinary Center Herzliya in Israel, however, have chosen to focus on creating a system that makes it possible for even novices to customize the objects they want to print. Designers typically have to adjust a CAD file to tweak the object’s looks by typing in numerical values, and then wait for minutes to hours for a simulation software to make sure the final product is viable. The system this group developed dramatically speeds up the process. It displays the design along with sliders representing different parameters — say, the height of a shoe’s heel or the base size and width of a mug — on a web browser. The user can then easily play with the sliders to achieve the look they want. Now, here’s the best thing about it: it won’t let you design unstable structures or anything that can’t be printed or used. Nobody has to spend hours waiting for software to make sure the modified digital object is feasible, and all the user needs to do is to send it straight to the 3D printer. Filed under: Science Comments Source: MIT Tags: 3dprinter, 3dprinting, MIT

Taken from:
MIT scientists make it easy to tweak designs for 3D printing