New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

An anonymous reader writes: Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users: the Linux.Ekoms.1 trojan. It includes functionality that allows it to take screenshots and record audio. While the screenshot activity is working just fine, Dr.Web says the trojan’s audio recording feature has not been turned on, despite being included in the malware’s source code. “All information transmitted between the server and Linux.Ekoms.1 is encrypted. The encryption is initially performed using the public key; and the decryption is executed by implementing the RSA_public_decrypt function to the received data. The Trojan exchanges data with the server using AbNetworkMessage.” Read more of this story at Slashdot.

Taken from:
New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

Serious Linux Kernel Vulnerability Patched

msm1267 writes: A patch for a critical Linux kernel flaw, present in the code since 2012, is expected to be pushed out today. The vulnerability affects versions 3.8 and higher, said researchers at startup Perception Point who discovered the vulnerability. The flaw also extends to two-thirds of Android devices, the company added. An attacker would require local access to exploit the vulnerability on a Linux server. A malicious mobile app would get the job done on an Android device. The vulnerability is a reference leak that lives in the keyring facility built into the various flavors of Linux. The keyring encrypts and stores login information, encryption keys and certificates, and makes them available to applications. Here’s Perception Point’s explanation of the problem. Read more of this story at Slashdot.

Continue Reading:
Serious Linux Kernel Vulnerability Patched

Grisly Find Suggests Humans Inhabited Arctic 45,000 Years Ago

sciencehabit points out this story which may rewrite the early history of humans in North America. From the Sciencemag story: “In August of 2012, an 11-year-old boy made a gruesome discovery in a frozen bluff overlooking the Arctic Ocean. While exploring the foggy coast of Yenisei Bay, about 2000 kilometers south of the North Pole, he came upon the leg bones of a woolly mammoth eroding out of frozen sediments. Scientists excavating the well-preserved creature determined that it had been killed by humans: Its eye sockets, ribs, and jaw had been battered, apparently by spears, and one spear-point had left a dent in its cheekbone—perhaps a missed blow aimed at the base of its trunk. When they dated the remains, the researchers got another surprise: The mammoth died 45, 000 years ago. That means that humans lived in the Arctic more than 10, 000 years earlier than scientists believed, according to a new study. The find suggests that even at this early stage, humans were traversing the most frigid parts of the globe and had the adaptive ability to migrate almost everywhere.” Read more of this story at Slashdot.

Read the original post:
Grisly Find Suggests Humans Inhabited Arctic 45,000 Years Ago

"DDoS-For-Bitcoin" Blackmailers Arrested

An anonymous reader writes: The DDoSing outfit that spawned the trend of “DDoS-for-Bitcoin” has been arrested by Europol in Bosnia Herzegovina last month. DD4BC first appeared in September 2015, when Akamai blew the lid on their activities. Since then almost any script kiddie that can launch DDoS attacks has followed their business model by blackmailing companies for Bitcoin. Read more of this story at Slashdot.

Read More:
"DDoS-For-Bitcoin" Blackmailers Arrested

EU Companies Can Monitor Employees’ Private Conversations While At Work

An anonymous reader writes: A recent ruling of the European Court of Human Rights has granted EU companies the right to monitor and log private conversations that employees have at work while using the employer’s devices. The ruling came after a Romanian was fired for using Yahoo Messenger back in 2007, while at work, to have private conversations with his girlfriend. He argued that his employer was breaking his right for privacy and correspondence. Both Romanian and European courts disagreed. Read more of this story at Slashdot.

Excerpt from:
EU Companies Can Monitor Employees’ Private Conversations While At Work

Trend Micro Flaw Could Have Allowed Attacker To Steal All Passwords

itwbennett writes: Trend Micro has released an automatic update fixing the problems in its antivirus product that Google security engineer Tavis Ormandy discovered could allow “anyone on the internet [to] steal all of your passwords completely silently, as well as execute arbitrary code with zero user interaction.” The password manager in Trend’s antivirus product is written in JavaScript and opens up multiple HTTP remote procedure call ports to handle API requests, Ormandy wrote. Ormandy says it took him 30 seconds to find one that would accept remote code. He also found an API that allowed him to access passwords stored in the manager. This is just the latest in a string of serious vulnerabilities that have been found in antivirus products in the last seven months. Read more of this story at Slashdot.

See the original article here:
Trend Micro Flaw Could Have Allowed Attacker To Steal All Passwords

Planetary Resources Reveals Out-of-This-World 3D Printing

Zothecula writes: If one is going to get into the asteroid mining business, one needs to prove that you can do something with what’s brought back. That seems to be the thinking behind Planetary Resources’ recent presentation at CES in Las Vegas, where the asteroid mining company unveiled the first object 3D printed using extraterrestrial materials. Made in collaboration with 3D Systems, the nickel-iron sculpture represents a stylized, geometric spacecraft, such as might be used for asteroid mining or prospecting. Planetary Resources says it is representative of what could be printed in a weightless environment. Read more of this story at Slashdot.

See the original article here:
Planetary Resources Reveals Out-of-This-World 3D Printing

Watch An Apple IIgs Boot Over 20 Years After It Was Last Turned Off

 Digital archeology is one of my favorite blog post forms. An avid X user from 198X resurrects an old system that he or she had used to create something amazing/build a business/write a game/or generally hack around. The resulting material – photos, video, and commentary – are priceless. Today we bring you Quinn Dunki has post a truly amazing look inside her Apple IIgs and a passel… Read More

Continued here:
Watch An Apple IIgs Boot Over 20 Years After It Was Last Turned Off

OCZ RevoDrive 400 NVMe SSD Unveiled With Nearly 2.7GB/Sec Tested Throughput

MojoKid writes: Solid State Drive technology continues to make strides in performance, reliability and cost. At the CES 2016 show there were a number of storage manufacturers on hand showing off their latest grear, though not many made quite the splash that Toshiba’s OCZ Technology group made with the annoucement of their new RevoDrive 400 NVMe PCI Express SSD. OCZ is tapping on Toshiba’s NVMe controller technology to deliver serious bandwidth in this consumer-targeted M.2 gumstick style drive that also comes with a X4 PCI Express card adapater. The drive boasts specs conservatively at 2.4GB/sec for reads and 1.6GB/sec for writes in peak sequential transfer bandwidth. IOPs are rated at 210K and 140K for writes respectively. In the demo ATTO test they were running, the RevoDrive 400 actually peaks at 2.69GB/sec for reads and also hits every bit of that 1.6GB/sec write spec for large sequential transfers. Read more of this story at Slashdot.

Visit link:
OCZ RevoDrive 400 NVMe SSD Unveiled With Nearly 2.7GB/Sec Tested Throughput

How We Know North Korea Didn’t Detonate a Hydrogen Bomb

StartsWithABang writes: The news has been aflame with reports that North Korea detonated a hydrogen bomb on January 6th, greatly expanding its nuclear capabilities with their fourth nuclear test and the potential to carry out a devastating strike against either South Korea or, if they’re more ambitious, the United States. The physics of what a nuclear explosion actually does and how that signal propagates through the air, oceans and ground, however, can tell us whether this was truly a nuclear detonation at all, and if so, whether it was fusion or fission. From all the data we’ve collected, this appears to be nothing new: just a run-of-the-mill fission bomb, with the rest being a sensationalized claim. (Related: Yesterday’s post about how seismic data also points to a conventional nuke, rather than an H-bomb.) Read more of this story at Slashdot.

Taken from:
How We Know North Korea Didn’t Detonate a Hydrogen Bomb