Hole In The Ozone Layer Smallest In 29 Years

An anonymous reader quotes the Weather Channel: The hole in the ozone layer over Antarctica is the smallest it’s been since 1988, NASA said. According to a press release, the hole in the Earth’s ozone layer is 1.3 million square miles smaller than last year and 3.3 million square miles smaller than 2015… This year, the hole grew to 7.6 million square miles. NASA and NOAA scientists said warmer temperatures and a stormier upper atmosphere helped keep damaging chemicals chlorine and bromine from eating ozone from the layer that protects the Earth’s surface from harmful ultraviolet rays… The hole that hovers over Antarctica has been slowly recovering, scientists say, due to an international ban on harmful chemicals that were previously used in refrigerants and aerosols. The hole was its largest in 2000 and measured 11.5 million square miles. Although recovery is underway, the size of the hole remains large compared to the 1980s, when the hole was first detected, NASA noted. And while there has been significant healing of the ozone layer in recent years, some scientists say full healing is a slow process and will not occur until sometime in the 22nd century, Yale Environment 360 reports. Others expect the Antarctic ozone hole to recover back to 1980 levels around 2070, NASA said. Read more of this story at Slashdot.

Continue reading here:
Hole In The Ozone Layer Smallest In 29 Years

Student Charged By FBI For Hacking His Grades More Than 90 times

An anonymous reader shares a report: In college, you can use your time to study. Or then again, you could perhaps rely on the Hand of God. And when I say “Hand of God, ” what I really mean is “keylogger.” Think of it like the “Nimble Fingers of God.” “Hand of God” (that makes sense) and “pineapple” (???) are two of the nicknames allegedly used to refer to keyloggers used by a former University of Iowa wrestler and student who was arrested last week on federal computer-hacking charges in a high-tech cheating scheme. According to the New York Times, Trevor Graves, 22, is accused in an FBI affidavit of working with an unnamed accomplice to secretly plug keyloggers into university computers in classrooms and in labs. The FBI says keyloggers allowed Graves to record whatever his professors typed, including credentials to log into university grading and email systems. Court documents allege that Graves intercepted exams and test questions in advance and repeatedly changed grades on tests, quizzes and homework assignments. This went on for 21 months — between March 2015 and December 2016. The scheme was discovered when a professor noticed that a number of Graves’ grades had been changed without her authorization. She reported it to campus IT security officials. Read more of this story at Slashdot.

Continued here:
Student Charged By FBI For Hacking His Grades More Than 90 times

Critical Flaws In Maritime Communications System Could Endanger Entire Ships

Orome1 shares a report from Help Net Security: IOActive security consultant Mario Ballano has discovered two critical cybersecurity vulnerabilities affecting Stratos Global’s AmosConnect communication shipboard platform. The platform works in conjunction with the ships’ satellite equipment, and integrates vessel and shore-based office applications, as well as provides services like Internet access for the crew, email, IM, position reporting, etc. The first vulnerability is a blind SQL injection in a login form. Attackers that successfully exploit it can retrieve credentials to log into the service and access sensitive information stored in it. The second one is a built-in backdoor account with full system privileges. “Among other things, this vulnerability allows attackers to execute commands with SYSTEM privileges on the remote system by abusing AmosConnect Task Manager, ” Bellano shared. The found flaws can be exploited only by an attacker that has access to the ship’s IT systems network, he noted, but on some ships the various networks might not be segmented, or AmosConnect might be exposed to one or more of them. The vulnerabilities were found in AmosConnect 8.4.0, and Stratos Global was notified a year ago. But Inmarsat won’t fix them, and has discontinued the 8.0 version of the platform in June 2017. Read more of this story at Slashdot.

More:
Critical Flaws In Maritime Communications System Could Endanger Entire Ships

Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

An anonymous reader quotes a report from Techdirt: Back in May, the Justice Department — apparently lacking anything better to do with its time — sent a subpoena to Twitter, demanding a whole bunch of information on five Twitter users, including a few names that regular Techdirt readers may be familiar with. If you can’t see that, it’s a subpoena asking for information on the following five Twitter users: @dawg8u (“Mike Honcho”), @abtnatural (“Virgil”), @Popehat (Ken White), @associatesmind (Keith Lee) and @PogoWasRight (Dissent Doe). I’m pretty sure we’ve talked about three of those five in previous Techdirt posts. Either way, they’re folks who are quite active in legal/privacy issues on Twitter. And what info does the DOJ want on them? Well, basically everything: [users’ names, addresses, IP addresses associated with their time on Twitter, phone numbers and credit card or bank account numbers.] That’s a fair bit of information. Why the hell would the DOJ want all that? Would you believe it appears to be over a single tweet from someone to each of those five individuals that consists entirely of a smiley face? I wish I was kidding. Here’s the tweet and then I’ll get into the somewhat convoluted back story. The tweet is up as I write this, but here’s a screenshot in case it disappears. The Department of Justice’s subpoena is intended to address allegations that Shafer, who has a history of spotting weak encryption and drawing attention to it, cyberstalked an FBI agent after the agency raided his home. Vanity Fair summarizes the incident: “In 2013, Shafer discovered that FairCom’s data-encryption package had actually exposed a dentist’s office to data theft. An F.T.C. settlement later validated Shafer’s reporting, but in 2016, when another dentist’s office responded to Shafer’s disclosure by claiming he’d violated the Computer Fraud and Abuse Act and broken the law, the F.B.I. raided his home and confiscated many of his electronics. Shafer was particularly annoyed at F.B.I. Special Agent Nathan Hopp, who helped to conduct the raid, and who was later involved in a different case: in March, he compiled a criminal complaint involving the F.B.I.’s arrest of a troll for tweeting a flashing GIF at journalist Kurt Eichenwald, who is epileptic. Shafer began to compile publicly available information about Hopp, sharing his findings on Twitter. The Twitter users named in the subpoena had started a separate discussion about Hopp, with one user calling Hopp the “least busy F.B.I. agent of all time, ” a claim that prompted Shafer’s smiley-faced tweet.” Read more of this story at Slashdot.

Read the article:
Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. From a report: In October, a report from the Wall Street Journal claimed that in 2015, the Russian firm targeted an employee of the NSA known for working on the intelligence agency’s hacking tools and software. The story suggested that the unnamed employee took classified materials home and operated on their PC, which was running Kaspersky’s antivirus software. Once these secretive files were identified — through an avenue carved by the antivirus — the Russian government was then able to obtain this information. Kaspersky has denied any wrongdoing, but the allegation that the firm was working covertly with the Russian government was enough to ensure Kaspersky products were banned on federal networks. There was a number of theories relating to what actually took place — was Kaspersky deliberately targeting NSA employees on behalf of the Kremlin, did an external threat actor exploit a zero-day vulnerability in Kaspersky’s antivirus, or were the files detected and pulled by accident? According to Kaspersky, the latter is true. On Wednesday, the Moscow-based firm said in a statement that the results of a preliminary investigation have produced a rough timeline of how the incident took place. It was actually a year earlier than the WSJ believed, in 2014, that code belonging to the NSA’s Equation Group was taken. Read more of this story at Slashdot.

Read the original post:
Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

China Shuts Down Tens Of Thousands Of Factories In Widespread Pollution Crackdown

Buildings in China are shrouded in smog. From a report: China has implemented an unprecedented pollution crackdown in recent months as the country shuts down tens of thousands of factories. The effort is part of a national effort to address China’s infamous pollution and has affected wide swaths of China’s manufacturing sector. In total, it is estimated that 40 percent of all China’s factories have been shut down at some point in order to be inspected by environmental bureau officials. As a result of these inspections over 80, 000 factories have been hit with fines and criminal offenses as a result of their emissions. Safety officials have been moving from province to province (30 in total so far) shutting down factories as well as electricity and gas as they inspect the factories for meeting emissions requirements. This has resulted in late and missed orders, increased costs, and could ultimately result in higher prices on US shelves. Read more of this story at Slashdot.

View original post here:
China Shuts Down Tens Of Thousands Of Factories In Widespread Pollution Crackdown

Arkansas Will Pay Up To $1,000 Cash To Kids Who Pass AP Computer Science A Exam

theodp writes: The State of Arkansas will be handing out cash to high school students who pass an Advanced Placement test in computer science. “The purpose of the incentive program is to increase the number of qualifying scores (3, 4, or 5) on Advanced Placement Computer Science A exams, ” explained a press release for the Arkansas Advanced Placement Computer Science A Incentive Program (only 87 Arkansas public school students passed the AP CS A exam in 2016, according to College Board data). Gov. Asa Hutchinson added, “The Arkansas Department of Education’s incentive for high scores on the AP Computer Science A exam is a terrific way to reward our students for their hard work in school. The real payoff for their hard work, of course, is when they show their excellent transcripts to potential employers who offer good salaries for their skills.” The tiered monetary awards call for public school students receiving a top score of 5 on the AP CS A exam to receive $1, 000, with another $250 going to their schools. Scores of 4 will earn students $750 and schools $150, while a score of 3 will result in a $250 payday for students and $50 for their schools. The program evokes memories of the College Board’s Google-funded AP STEM Access program, which rewarded AP STEM teachers with a $100 DonorsChoose.org gift card for each student who received a 3, 4, or 5 on an AP exam. DonorsChoose.org credits were also offered later by tech-bankrolled Code.org and Google to teachers who got their students coding. Read more of this story at Slashdot.

More:
Arkansas Will Pay Up To $1,000 Cash To Kids Who Pass AP Computer Science A Exam

Discovery of 50km Cave Raises Hopes For Human Colonisation of Moon

New submitter Zorro shares a report: Scientists have fantasised for centuries about humans colonising the moon. That day may have drawn a little closer after Japan’s space agency said it had discovered an enormous cave beneath the lunar surface that could be turned into an exploration base for astronauts. The discovery, by Japan’s Selenological and Engineering Explorer (Selene) probe, comes as several countries vie to follow the US in sending manned missions to the moon. Using a radar sounder system that can examine underground structures, the orbiter initially found an opening 50 metres wide and 50 metres deep, prompting speculation that there could be a larger hollow. This week scientists at the Japan Aerospace Exploration Agency (Jaxa) confirmed the presence of a cave after examining the hole using radio waves. The chasm, 50km (31 miles) long and 100 metres wide, appears to be structurally sound and its rocks may contain ice or water deposits that could be turned into fuel, according to data sent back by the orbiter, nicknamed Kaguya after the moon princess in a Japanese fairytale. Jaxa believes the cave, located from a few dozen metres to 200 metres beneath an area of volcanic domes known as the Marius Hills on the moon’s near side, is a lava tube created during volcanic activity about 3.5bn years ago. Read more of this story at Slashdot.

View post:
Discovery of 50km Cave Raises Hopes For Human Colonisation of Moon

First Mass-Produced Electric Truck Unveiled

AmiMoJo shares a report from NHK WORLD: Japan’s Mitsubishi Fuso Truck and Bus has unveiled what it says is the world’s first mass-produced electric truck, as automakers around the world go all out to develop cars that run on battery power. The vehicle can carry about 3 tons of cargo and travel about 100 kilometers on a single charge. The truck, unveiled on Thursday, will be used by Japan’s largest convenience store chain, Seven-Eleven. Seven-Eleven President Kazuki Furuya says some people complain about the noise delivery vehicles make, and says he is very impressed at how quiet the electric truck is. Read more of this story at Slashdot.

See the original article here:
First Mass-Produced Electric Truck Unveiled

Ubuntu 17.10 Artful Aardvark Released

Canonical has made available the download links for Ubuntu 17.10 “Artful Aardvark”. It comes with a range of new features, changes, and improvements including GNOME as the default desktop, Wayland display server by default, Optional X.org server session, Mesa 17.2 or Mesa 17.3, Linux kernel 4.13 or kernel 4.14, new Subiquity server installer, improved hardware support, new Ubuntu Server installer, switch to libinput, an always visible dock using Dash to Dock GNOME Shell extension, and Bluetooth improvements with a new BlueZ among others. Read more of this story at Slashdot.

See more here:
Ubuntu 17.10 Artful Aardvark Released