Microsoft Has More Open Source Contributors On GitHub Than Facebook and Google

An anonymous reader writes from a report via The Next Web: Microsoft CEO Satya Nadella has really embraced open source over the past couple of years. GitHub, a site that is home to a number of the web’s biggest collaborative code projects, has counted more than 5.8 million active users on its platform over the past 12 months, and says that Microsoft has the most open source contributors. Microsoft has 16, 419 contributors, beating out Facebook’s 15, 682 contributors, Docker’s 14, 059 contributors, and Google’s 12, 140 contributors. The Next Web reports: “Of course, this didn’t happen overnight. In October 2014, it open sourced its .NET framework, which is the company’s programming infrastructure for building and running apps and services — a major move towards introducing more developers to its server-side stack. Since then, it’s open sourced its Chakra JavaScript engine, Visual Studio’s MSBuild compiling engine, the Computational Networks Toolkit for deep learning applications, its Xamarin tool for building cross-platform apps and most recently, PowerShell. It’s also worth noting that the company’s Visual Studio Code text editor made GitHub’s list of repositories with the most contributors. You can check out these lists, as well as other data from GitHub’s platform on this page.” GitHub CEO Chris Wanstrath said in an interview with Fortune, “The big .Net project has more people outside of Microsoft contributing to it than people who work at Microsoft.” Read more of this story at Slashdot.

Follow this link:
Microsoft Has More Open Source Contributors On GitHub Than Facebook and Google

Colin Powell’s Private Email Account Has Been Hacked

According to The New York Times, Former Secretary of State Colin Powell has been hacked and a password-protected archive of his personal emails has been published by DC Leaks. The Verge reports: DC Leaks is the same site that first published emails stolen from the Democratic National Committee, which many took as an explicit effort to influence the U.S. election process. Many experts in the U.S. intelligence apparatus have attributed that attack to the Russian government, although no public attribution has been made. Thus far, there’s no evidence tying Powell’s hack to Russia, and similar hacks have been carried out by mischievous teens without government affiliation. The immediate result of the hack has been political fallout for Powell himself. Last night, BuzzFeed News reported on an email in which Powell called Republican nominee Donald Trump a “national disgrace, ” and another in which he said the candidate was “in the process of destroying himself.” Read more of this story at Slashdot.

See original article:
Colin Powell’s Private Email Account Has Been Hacked

HP To Buy Samsung’s Printer Business For $1.05 Billion

HP has agreed to a deal with Samsung to acquire their printer business for $1.05 billion, a deal that will be the largest print acquisition in HP’s history. USA Today reports: “The acquisition of Samsung’s printer business allows us to deliver print innovation and create entirely new business opportunities with far better efficiency, security, and economics for customers, ” said HP president and CEO Dion Weisler in a statement. The Samsung deal would give HP access to 6, 500 printing patents as well as 1, 300 researchers and engineers “with advanced expertise in laser printer technology.” While this deal is being negotiated, Samsung’s mobile phone business has been navigating a recall of its Galaxy Note 7 smartphones over issues with batteries catching fire and exploding. One of the most recent accidents reported involved a six-year-old boy in New York, who was using the device when it “suddenly burst into flames.” Read more of this story at Slashdot.

Continue reading here:
HP To Buy Samsung’s Printer Business For $1.05 Billion

A Very Detailed Dissection of a Frame From DOOM

DOOM 2016 “cleverly re-uses old data computed in the previous frames…1331 draw calls, 132 textures and 50 render targets, ” according to a new article which takes a very detailed look at the process of rendering one 16-millisecond frame. An anonymous Slashdot reader writes: The game released earlier this year uses the Vulkan API to push graphics quality and performance at new levels. The article sheds light on rendering techniques, mega-textures, reflection computation… all the aspects of a modern game engine. Some of the information came from “The Devil is in the Details, ” a July presentation at the SIGGRAPH 2016 conferences on graphics by Tiago Sousa, id’s lead renderer programmer, and senior engine programmer Jean Geffroy. (And there’s also more resources at the end of the article, including a July interview with five id programmers by Digital Foundry.) “Historically id Software is known for open-sourcing their engines after a few years, which often leads to nice remakes and breakdowns, ” the article notes. “Whether this will stand true with id Tech 6 remains to be seen but we don’t necessarily need the source code to appreciate the nice graphics techniques implemented in the engine.” Read more of this story at Slashdot.

See the original article here:
A Very Detailed Dissection of a Frame From DOOM

Malware Infects 70% of Seagate Central NAS Drives, Earns $86,400

An anonymous Slashdot reader writes: A new malware family has infected over 70% of all Seagate Central NAS devices connected to the Internet. The malware, named Miner-C or PhotoMiner, uses these hard-drives as an intermediary point to infect connected PCs and install software that mines for the Monero cryptocurrency… The crooks made over $86, 000 from Monero mining so far. The hard drives are easy to infect because Seagate does not allow users to delete or deactivate a certain “shared” folder when the device is exposed to the Internet. Over 5, 000 Seagate Central NAS devices are currently infected. Researchers estimates the malware is now responsible for 2.5% of all mining activity for the Monero cryptocurrency, according to the article. “The quandary is that Seagate Central owners have no way to protect their device. Turning off the remote access NAS feature can prevent the infection, but also means they lose the ability to access the device from a remote location, one of the reasons they purchased the hard drive in the first place.” Read more of this story at Slashdot.

View original post here:
Malware Infects 70% of Seagate Central NAS Drives, Earns $86,400

New Research Reveals Hundreds of Undiscovered Black Holes

An anonymous reader quotes a report from Phys.Org: New research by the University of Surrey published in the journal Monthly Notices of the Royal Astronomical Society has shone light on a globular cluster of stars that could host several hundred black holes, a phenomenon that until recently was thought impossible. Globular clusters are spherical collections of stars which orbit around a galactic center such as our Milky-way galaxy. Using advanced computer simulations, the team at the University of Surrey were able to see the un-see-able by mapping a globular cluster known as NGC 6101, from which the existence of black holes within the system was deduced. These black holes are a few times larger than the Sun, and form in the gravitational collapse of massive stars at the end of their lives. It was previously thought that these black holes would almost all be expelled from their parent cluster due to the effects of supernova explosion, during the death of a star. It is only as recently as 2013 that astrophysicists found individual black holes in globular clusters via rare phenomena in which a companion star donates material to the black hole. This work, which was supported by the European Research Council (ERC), has shown that in NGC 6101 there could be several hundred black holes, overturning old theories as to how black holes form. Read more of this story at Slashdot.

See more here:
New Research Reveals Hundreds of Undiscovered Black Holes

White House Names Retired Air Force General As First Cyber Security Chief

An anonymous reader quotes a report from Reuters: The White House on Thursday named a retired U.S. Air Force general as the government’s first federal cyber security chief, a position announced eight months ago that is intended to improve defenses against hackers. Gregory Touhill’s job will be to protect government networks and critical infrastructure from cyber threats as federal chief information security officer, according to a statement. President Barack Obama announced the new position in February alongside a budget proposal to Congress asking for $19 billion for cyber security across the U.S. government. Touhill is currently a deputy assistant secretary for cyber security and communications at the Department of Homeland Security. He will begin his new role later this month, a source familiar with the matter said. Grant Schneider, who is the director of cyber security policy at the White House’s National Security Council, will be acting deputy to Touhill, according to the announcement. wiredmikey adds from a report via SecurityWeek.Com: The White House today announced that Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). Back in February, President Barack Obama unveiled a cybersecurity “national action plan” (CNAP) which called for an overhaul of aging government networks and a high-level commission to boost security awareness. As part of the plan, the White House said it would hire a federal CISO to direct cybersecurity across the federal government. General Touhill is currently the Deputy Assistant Secretary for Cybersecurity and Communications in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). The key hire comes at a time when the government needs cybersecurity talent more than ever. Earlier this week a report published by the U.S. House of Representatives Committee said the data breaches disclosed by the Office of Personnel Management (OPM) last year were a result of culture and leadership failures, and should not be blamed on technology. Read more of this story at Slashdot.

Follow this link:
White House Names Retired Air Force General As First Cyber Security Chief

T-Mobile To Boost Its LTE Speeds To 400 Mbps

An anonymous reader writes from a report via The Next Web: T-Mobile plans to boost its LTE speeds to up to 400 Mbps in the very near future. The Next Web reports: “The company is getting ready to boost its maximum theoretical internet speeds to become the faster carrier in the U.S. by a wide margin. The network will soon support theoretical speeds up to 400 Mbps — nearly half the speed of Google Fiber. There’s a two-pronged approach to the upgrade. First is incorporating 4×4 MIMO (multiple input, multiple output) technology, which will supposedly double the speed from the current 7-40 Mbps customers tend to experience with T-Mobile (about the same as Verizon with LTE-A). This upgrade is available now in 319 cities, although it’s a moot point because only the S7 and S7 Edge will be able to use the tech via a software update “later this month.” In October, the company will roll out 256 QAM support to the S7 and S7 Edge (and again, more phones later), which increases the amount of bits per transmission. T-Mobile says this will lead to theoretical maximum speeds of 400 Mbps.” The Next Web followed-up with T-Mobile to ask about what the real-world speeds would be after the upgrade. The company says “customers can expect to see real world peak speeds of 190 Mbps, ” which is over four times current peaks speeds, but also far below the theoretical 400 Mbps. Read more of this story at Slashdot.

More:
T-Mobile To Boost Its LTE Speeds To 400 Mbps

Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

New submitter Kinwolf writes: Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove. Called Umbreon, after a Pokemon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. [It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.] According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn’t need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system. The reports adds: “The rootkit uses a trick to hijack the standard C library (libc) functions without actually installing any kernel objects. Umbreon hijacks these functions and forces other Linux executables to use its own libc-like library. This puts the rootkit in a man-in-the-middle position, capable of modifying system calls made by other programs and altering their output. The rootkit also creates a hidden Linux account that can be accessed via any authentication method supported by Linux, including SSH (Secure Shell). This account does not appear in files like /etc/passwd because the rootkit can modify the output of such files when read, the Trend Micro researchers said in a blog post. Umbreon also has a backdoor component called Espereon, named after another Pokemon character, that can establish a reverse shell to an attacker’s machine when a TCP packet with special field values are received on the monitored Ethernet interface of an affected device.” Read more of this story at Slashdot.

See more here:
Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

Fugitive Arrested After Using ‘Wanted’ Poster As His Facebook Profile Pic

An anonymous Slashdot reader writes: “A fugitive in Florida has been arrested by police after he used a wanted poster adorned with his mug shot for his Facebook profile picture, ” writes the International Business Times. After investigating reports of a disturbance, police discovered the 41-year-old’s Facebook profile, which revealed the man was already wanted for six months for violating his parole after two counts of battery. “Police say that as they arrested Yearwood a bag of marijuana fell out of his pocket. They charged him with possession of cannabis under 20 grams and are continuing to investigate the battery complaint.” One Twitter user jokingly suggested that the suspect should also be charged with copyright infringement — for using the police department’s photo without their permission. Read more of this story at Slashdot.

Link:
Fugitive Arrested After Using ‘Wanted’ Poster As His Facebook Profile Pic