Two Major ISPs Are Suffering Outages, Making the Internet Really Slow Right Now

Freshly Exhumed writes: Two major backbone internet service providers — Level 3 and Cogent — appear to be suffering from massive outages and downgraded service, according to ISP monitoring service Downdetector. Users in San Francisco, Los Angeles, Chicago, Boston, Dallas, Atlanta, New York, Philadelphia, Baltimore, and Washington, D.C. are apparently being hit the hardest. Comcast is also said to be affected to a lesser degree. “Backbone internet service providers work directly with large internet platforms like Netflix to deliver large amounts of data across networks, and also work behind the scenes of consumer-facing ISPs, ” reports Slate. “Since the internet is an interconnected mess of wires, disruptions with Level 3 and Cogent could impact service for Comcast and Verizon users in turn.” Read more of this story at Slashdot.

Follow this link:
Two Major ISPs Are Suffering Outages, Making the Internet Really Slow Right Now

Bitcoin Jumps Another 10% in 24 Hours, Sets New Record at $19,000

An anonymous reader quotes Ars Technica: Bitcoin’s price set a new record on Saturday as the virtual currency rose above $19, 000 for the first time on the Bitstamp exchange. The gains came just hours after the currency crossed the $18, 000 mark. Bitcoin’s value has doubled over the last three weeks, and it’s up more than 20-fold over the last year. Bitcoin’s value keeps rising despite a growing chorus of experts who say the currency value is an unsustainable bubble. One CNBC survey this week found that 80 percent of Wall Street economists and market strategists saw bitcoin’s rise as a bubble, compared to just two percent who said the currency’s value was justified. Another survey reported by The Wall Street Journal this week found that 51 out of 53 economists surveyed thought bitcoin’s price was an unsustainable bubble. Less than a month ago, Bitcoin was selling for $8, 000. Read more of this story at Slashdot.

See more here:
Bitcoin Jumps Another 10% in 24 Hours, Sets New Record at $19,000

T-Mobile Is Becoming a Cable Company

T-Mobile has revealed that it’s launching a TV service in 2018, and that is has acquired Layer3 TV (a company that integrates TV, streaming and social networking) to make this happen. The company thinks people are ditching cable due to the providers, not TV itself. Engadget reports: It claims that it can “uncarrier” TV the way it did with wireless service, and has already targeted a few areas it thinks it can fix: it doesn’t like the years-long contracts, bloated bundles, outdated tech and poor customer service that are staples of TV service in the U.S. T-Mobile hasn’t gone into detail about the functionality of the service yet. How will it be delivered? How much will it cost? Where will it be available? And will this affect the company’s free Netflix offer? This is more a declaration of intent than a concrete roadmap, so it’s far from certain that the company will live up to its promises. Ultimately, the move represents a big bet on T-Mobile’s part: that people like TV and are cutting the cord based on a disdain for the companies, not the service. There’s a degree of truth to that when many Americans are all too familiar with paying ever-increasing rates to get hundreds of channels they don’t watch. However, there’s no guarantee that it’ll work in an era when many people (particularly younger people) are more likely to use Netflix, YouTube or a streaming TV service like Sling TV. Read more of this story at Slashdot.

Read More:
T-Mobile Is Becoming a Cable Company

Searchable Database of 1.4 Billion Stolen Credentials Found On Dark Web

YVRGeek shares a report from IT World Canada: A security vendor has discovered a huge list of easily searchable stolen credentials in cleartext on the dark web, which it fears could lead to a new wave of cyber attacks. Julio Casal, co-founder of identity threat intelligence provider 4iQ, which has offices in California and Spain, said in a Dec. 8 blog his firm found the database of 1.4 billion username and password pairs while scanning the dark web for stolen, leaked or lost data. He said the company has verified at least a group of credentials are legitimate. What is alarming is the file is what he calls “an aggregated, interactive database that allows for fast (one second response) searches and new breach imports.” For example, searching for “admin, ” “administrator” and “root” returned 226, 631 passwords of admin users in a few seconds. As a result, the database can help attackers automate account hijacking or account takeover. The dump file was 41GB in size and was found on December 5th in an underground community forum. The total amount of credentials is 1, 400, 553, 869. Read more of this story at Slashdot.

Original post:
Searchable Database of 1.4 Billion Stolen Credentials Found On Dark Web

AI-Assisted Fake Porn Is Here and We’re All Screwed

New submitter samleecole shares a report from Motherboard: There’s a video of Gal Gadot having sex with her stepbrother on the internet. But it’s not really Gadot’s body, and it’s barely her own face. It’s an approximation, face-swapped to look like she’s performing in an existing incest-themed porn video. The video was created with a machine learning algorithm, using easily accessible materials and open-source code that anyone with a working knowledge of deep learning algorithms could put together. It’s not going to fool anyone who looks closely. Sometimes the face doesn’t track correctly and there’s an uncanny valley effect at play, but at a glance it seems believable. It’s especially striking considering that it’s allegedly the work of one person — a Redditor who goes by the name ‘deepfakes’ — not a big special effects studio that can digitally recreate a young Princess Leia in Rouge One using CGI. Instead, deepfakes uses open-source machine learning tools like TensorFlow, which Google makes freely available to researchers, graduate students, and anyone with an interest in machine learning. Anyone could do it, and that should make everyone nervous. Read more of this story at Slashdot.

View post:
AI-Assisted Fake Porn Is Here and We’re All Screwed

Zimbabwe’s Internet Went Down for About Five Hours. The Culprit Was Reportedly a Tractor.

Zimbabweans lost internet access en masse on Tuesday when a tractor reportedly cut through key fiber-optic cables in South Africa and another internet provider experienced simultaneous issues with its primary internet conduits. From a report: The outage began shortly before noon local time and persisted for more than five hours, affecting not only citizens’ day-to-day internet usage but businesses that rely upon web access. And while five internet-free hours might sound unfathomable to those of us accustomed to having the web constantly at our fingertips, large-scale internet outages — from inadvertent lapses caused by ship anchors to government-calculated blackouts designed to showcase political power — do happen, and maybe more frequently than you’d thought. According to local news sources, a tractor in South Africa damaged cables belonging to Liquid Telecom, which has an 81.5 percent market share of Zimbabwe’s international-equipped internet bandwidth as of the second quarter of 2017 and leases capacity to other internet providers. In a bad coincidence, city council employees in Kuwadzana, a suburb of Zimbabwe’s capitol city of Harare, cut an additional TelOne cable around the same time. (According to NewsDay Zimbabwe, it was an accident. The company blamed “faults that occurred on our main links through South Africa and Botswana” in a statement.) Read more of this story at Slashdot.

Read the original:
Zimbabwe’s Internet Went Down for About Five Hours. The Culprit Was Reportedly a Tractor.

Man Hacks Jail Computer Network To Get Inmate Released Early

An anonymous reader writes: A Michigan man pleaded guilty last week to hacking the computer network of the Washtenaw County Jail, where he modified inmate records in an attempt to have an inmate released early. To breach the jail’s network, the attacker used only spear-phishing emails and telephone social engineering. The man called jail employees and posed as local IT staffers, tricking some into accessing a website, and downloading and installing malware under the guise of a jail system upgrade. Once the man (Konrads Voits) had access to this data, investigators said he accessed the XJail system, searched and accessed the records of several inmates, and modified at least one entry “in an effort to get that inmate released early.” Jail employees noticed the modification right away and alerted the FBI. The man as arrested a month later and is now awaiting sentencing (maximum 10 years and a fine of up to $250, 000). Read more of this story at Slashdot.

More:
Man Hacks Jail Computer Network To Get Inmate Released Early

Two Technologists Create Black Metal Album Using An AI

An anonymous reader quotes a report from The Outline: Coditany of Timeness” is a convincing lo-fi black metal album, complete with atmospheric interludes, tremolo guitar, frantic blast beats and screeching vocals. But the record, which you can listen to on Bandcamp, wasn’t created by musicians. Instead, it was generated by two musical technologists using a deep learning software that ingests a musical album, processes it, and spits out an imitation of its style. To create Coditany, the software broke “Diotima, ” a 2011 album by a New York black metal band called Krallice, into small segments of audio. Then they fed each segment through a neural network — a type of artificial intelligence modeled loosely on a biological brain — and asked it to guess what the waveform of the next individual sample of audio would be. If the guess was right, the network would strengthen the paths of the neural network that led to the correct answer, similar to the way electrical connections between neurons in our brain strengthen as we learn new skills. Read more of this story at Slashdot.

More here:
Two Technologists Create Black Metal Album Using An AI

Every iPhone X Is Not Created Equal

According to a PC Magazine report that uses data from Cellular Insights, the Qualcomm-powered iPhone X has better LTE performance than the Intel-powered model. From the report: There are three iPhone X models sold globally. Using lab equipment, Cellular Insights tested two of them: the Qualcomm-powered A1865, sold by Sprint, Verizon, and U.S. Cellular and in Australia, China, and India; and the Intel-powered A1901, sold by most other global carriers including AT&T and T-Mobile. (The third model, A1902, is only sold in Japan.) Here in the U.S., we anticipate that the SIM-free model sold directly by Apple will be the A1865, as that’s the model that supports all four U.S. carriers. For this test, Cellular Insights looked at performance on LTE Band 4, which is used by every major U.S. carrier except Sprint, as well as in Canada and parts of Latin America. Cellular Insights attenuated an LTE signal from a strong -85dBm until the modems showed no performance. While both modems started out with 195Mbps of download throughput on a 20MHz carrier, the Qualcomm difference appeared quickly, as the Intel modem dropped to 169Mbps at -87dBm. The Qualcomm modem took an additional -6dBm of attenuation to get to that speed. Most consumers will feel the difference in very weak signal conditions, where every dBm of signal matters, so we zoomed in on that in the chart below. At very weak signal strength, below -120dBm, the Qualcomm modem got speeds on average 67 percent faster than the Intel modem. The Intel modem finally died at -129dBm and the Qualcomm modem died at -130dBm, so we didn’t find a lot of difference in when the modems finally gave out. Read more of this story at Slashdot.

See original article:
Every iPhone X Is Not Created Equal

The Underground Uber Networks Driven by Russian Hackers

Joseph Cox, reporting for DailyBeat: Uber’s ride-sharing service has given birth to some of the most creative criminal scams to date, including using a GPS-spoofing app to rip off riders in Nigeria, and even ginning up fake drivers by using stolen identities. Add to those this nefariously genius operation: Cybercriminals, many working in Russia, have created their own illegitimate taxi services for other crooks by piggybacking off Uber’s ride-sharing platform, sometimes working in collaboration with corrupt drivers. Based on several Russian-language posts across a number of criminal-world sites, this is how the scam works: The scammer needs an emulator, a piece of software which allows them to run a virtual Android phone on their laptop with the Uber app, as well as a virtual private network (VPN), which routes their computer’s traffic through a server in the same city as the rider. The scammer acts, in essence, as a middleman between an Uber driver and the passenger — ordering trips through the Uber app, but relaying messages outside of it. Typically, this fraudulent dispatcher uses the messaging app Telegram to chat with the passenger, who provides pickup and destination addresses. The scammer orders the trip, and then provides the car brand, driver name, and license plate details back to the passenger through Telegram. Read more of this story at Slashdot.

Continue reading here:
The Underground Uber Networks Driven by Russian Hackers