Encrypted DNA Storage Investigated by DOE Researchers

Biological engineers at a Department of Energy lab “are experimenting with encrypted DNA storage for archival applications.” Slashdot reader ancientribe shares an article from Dark Reading: Using this method, the researchers could theoretically store 2.2 petabytes of information in one gram of DNA. That’s 200 times the printed material at the Library of Congress… Instead of needing a 15, 000 square-foot building to store 35, 000 boxes of inactive records and archival documents, Sandia National Laboratories can potentially store information on much less paper, in powder form, in test tubes or petri dishes, or even as a bacterial cell… “Hard drives fail and very often the data can’t be recovered, ” explains Bachand. “With DNA, it’s possible to recover strands that are 10, 000 to 20, 000 years old… even if someone sneezes and the powder is lost, it’s possible to recover all the information by just recovering one DNA molecule.” Read more of this story at Slashdot.

Read More:
Encrypted DNA Storage Investigated by DOE Researchers

Ubuntu Linux Forums Hacked — IP Address, Username, Email of 2M Accounts Compromised

Canonical announced on Friday that Ubuntu forums have been hacked. The company adds that data such as IP address, username, and email address of over two million users have been compromised. BetaNews reports: Keep in mind, this does not mean that the operating system has experienced a vulnerability or weakness. The only thing affected are the online forums that people use to discuss the OS. Still, such a hack is embarrassing as it happened due to Canonical’s failure to install a patch.In a blog post, Jane Silber, Chief Executive Officer, Canonical said, “after some initial investigation, we were able to confirm there had been an exposure of data and shut down the Forums as a precautionary measure. Deeper investigation revealed that there was a known SQL injection vulnerability in the Forumrunner add-on in the Forums which had not yet been patched.” Read more of this story at Slashdot.

See the original post:
Ubuntu Linux Forums Hacked — IP Address, Username, Email of 2M Accounts Compromised

Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

An anonymous reader shares a report on The Register:A programming blunder in its reporting software has led to Citigroup being fined $7m. According to the US Securities and Exchange Commission (SEC), that error [PDF] resulted in the financial regulator being sent incomplete “blue sheet” information for a remarkable 15 years — from May 1999 to April 2014. The mistake was discovered by Citigroup itself when it was asked to send a large but precise chunk of trading data to the SEC in April 2014 and asked its technical support team to help identify which internal ID numbers they should run a request on. That team quickly noticed that some branches’ trades were not being included in the automated system and alerted those above them. Four days later a patch was in place, but it wasn’t until eight months later that the company received a formal report noting that the error had affected SEC reports going back more than a decade. The next month, January 2015, Citigroup fessed up to the SEC.The glitch resided in new alphanumeric branch codes that the bank had introduced in the mid-1990s. The program code filtered out any transactions that were given three-digit branch codes from 089 to 100 and used those prefixes for testing purposes. The report adds, “But in 1998, the company started using alphanumeric branch codes as it expanded its business. Among them were the codes 10B, 10C and so on, which the system treated as being within the excluded range, and so their transactions were removed from any reports sent to the SEC.” Read more of this story at Slashdot.

View article:
Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

George Takei Opposes Gay Sulu In ‘Star Trek Beyond’

HughPickens.com writes: Seth Abramovitch reports in the Hollywood Reporter that actor and LGBT activist George Takei says Paramount’s plans to have Sulu’s character in the upcoming ‘Star Trek Beyond’ the first LGBTQ lead character in Star Trek history is out of step with what creator Gene Roddenberry would have wanted. [Roddenberry] “was a strong supporter of LGBT equality, ” says Takei, now 79. “But he said he has been pushing the envelope and walking a very tight rope — and if he pushed too hard, the show would not be on the air.” Takei says he’d much prefer that Sulu stay straight. “I’m delighted that there’s a gay character, ” says Takei. “Unfortunately, it’s a twisting of Gene’s creation, to which he put in so much thought. I think it’s really unfortunate.” The timeline logic of the new revelation is enough to befuddle even the most diehard of Trek enthusiasts, as the rebooted trilogy takes place before the action of the original series. In other words, assuming canon orthodoxy, this storyline suggest Sulu would have had to have first been gay and married, only to then go into the closet years later. Simon Pegg, who has co-written the latest Star Trek movie, as well as starring as Scotty, has responded to criticism by the actor George Takei at the film-makers’ decision to make the character he used to play openly gay. “He’s right, it is unfortunate, it’s unfortunate that the screen version of the most inclusive, tolerant universe in science fiction hasn’t featured an LGBT character until now. We could have introduced a new gay character, but he or she would have been primarily defined by their sexuality, seen as the ‘gay character, ‘ rather than simply for who they are, and isn’t that tokenism?” says Pegg. “Our Trek is an alternate timeline with alternate details. Whatever magic ingredient determines our sexuality was different for Sulu in our timeline. I like this idea because it suggests that in a hypothetical multiverse, across an infinite matrix of alternate realities, we are all LGBT somewhere.” Read more of this story at Slashdot.

See the article here:
George Takei Opposes Gay Sulu In ‘Star Trek Beyond’

Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

New submitter Miche67 writes: Two reports say Microsoft is working on an all-in-one (AIO) PC under the Surface brand. If that’s true, it would put it in competition with HP and Dell, which have their own AIO lines, as well as put it in competition with Apple’s iMac. Network World reports: “Both DigiTimes and Windows Central picked up on the story, each citing their own sources. DigiTimes, a Taiwan-based publication with connections to the PC industry over there (but also a very mixed record of accuracy) said the new devices would come in the third quarter of this year. Windows Central, which is a little better when it comes to rumors, said it did not have a solid release date.” Business Insider was able to find a patent filing by Microsoft for a desktop PC that supports the rumored AIO design. “The device is evidently targeting a ‘modern and elegant’ design and is meant to be something akin to a premium appliance or furniture, ” Windows Central wrote. Intel’s release date of the new Kaby Lake line of processors around Q3 of this year complicates things. While Kaby Lake is said to be more mobile-friendly with less power consumption and heat, they would make for a good choice for an AIO machine. However, it would be pushing it for Microsoft to release its AIO machines in the same quarter that Kaby Lake is due. On a semi-related note, a programmer at Building 88 recently confirmed that Microsoft will release Surface 5 devices next year powered by Kaby Lake processors. He posted pictures of four device holders marked “2017” on his Twitter account. Read more of this story at Slashdot.

See the original article here:
Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

American Cities Are Installing DHS-Funded Audio Surveillance

“Audio surveillance is increasingly being used on parts of urban mass transit systems, ” reports the Christian Science Monitor. Slashdot reader itwbennett writes “It was first reported in April that New Jersey had been using audio surveillance on some of its light rail lines, raising questions of privacy. This week, New Jersey Transit ended the program following revelations that the agency ‘didn’t have policies governing storage and who had access to data.'” From the article: New Jersey isn’t the only state where you now have even more reason to want to ride in the quiet car. The Baltimore Sun reported in March that the Maryland Transit Administration has used audio recording on some of its mass transit vehicles since 2012. It is now used on 65 percent of buses, and 82 percent of subway trains have audio recording capability, but don’t use it yet, according to the Sun. And cities in New Hampshire, Connecticut, Michigan, Ohio, Nevada, Oregon and California have either installed systems or moved to procure them, in many cases with funding from the federal Department of Homeland Security. Read more of this story at Slashdot.

See original article:
American Cities Are Installing DHS-Funded Audio Surveillance

Apple Is Suing A Man That Teaches People To Repair Their MacBooks

New submitter alzoron writes: After the failure of New York’s Fair Repair Act, independent third-party unauthorized Apple repair shops seem to be under attack. Louis Rossmann, owner of Rossman Repair Group, INC has uploaded a somewhat vague video alluding to his Youtube site, where he posts videos about repairing out of warranty repairs, possibly being shut down. Several sources (Reddit, Mac Kung Fu, 9to5Mac) have been speculating about this and whether or not Apple is behind this. Game Revolution reported on the video (Link is to cache version of the site since the report has since been removed), breaking down each section of the video. 6:52: Louis informs viewers that they can download YouTube videos. 7:41: Louis mentions that YouTube channels have a “finite lifespan, ” often because a large corporation has the power and money to shut them down. 8:42: Louis shares that he’s happy when he’s lived a difficult life so that he can be strong for the immense challenge that is ahead. 10:06: Louis shares that he is going to have to fight from his point onward. 11:22: Louis states that all his videos may soon be gone. 11:32: Louis mentions that his business may disappear. Given what Louis has mentioned, it’s apparent that Louis has been threatened by Apple likely for condemning its policies to a growing subscriber base, but also for showing users how to repair its hardware without going through Apple support. Read more of this story at Slashdot.

Read this article:
Apple Is Suing A Man That Teaches People To Repair Their MacBooks

You Can Now Browse Through 427 Millon Stolen MySpace Passwords

Stan Schroeder, writing for Mashable:An anonymous hacker managed to obtain an enormous number of user credentials in June 2013 from fallen social networking giant MySpace — some 427 million passwords, belonging to approx. 360 million users. In May 2016, a person started selling that database of passwords on the dark web. Now, the entire database is available online for free. Thomas White, security researcher also known by the moniker “Cthulhu, ” put the database up for download as a torrent file on his website, here. “The following contains the alleged data breach from Myspace dating back a few years. As always, I do not provide any guarantees with the file and I leave it down to you to use responsibly and for a productive purpose, ” he wrote. The file is 14.2 GB in size; downloading it might take some time. It is password-protected, but White made the password available on Twitter and his site. Read more of this story at Slashdot.

Read More:
You Can Now Browse Through 427 Millon Stolen MySpace Passwords