Enlarge / Scenario for getting water to Europa’s surface. Artist’s conception of ridges and fractures on Europa. (credit: Caltech/NASA) In the seminal science fiction series Space Odyssey , novelist Arthur C. Clarke called attention to the Jovian moon Europa’s special place in the Solar System. At the end of the series’ second novel, 2010: Odyssey Two , a spaceship sent to the Jupiter system receives a message from aliens: “All these worlds are yours except Europa. Attempt no landing there.” In data released publicly Monday NASA didn’t get quite such a declarative message from the intriguing moon, but the new information is nonetheless thrilling. Astronomers using NASA’s Hubble Space Telescope have imaged what are likely water vapor plumes erupting off the surface of Jupiter’s moon Europa. If the plumes do, in fact, emerge and rain down on the surface, it will be significantly easier for scientists to study the moon’s interior ocean. “E uropa is a world of great interest,” Paul Hertz, director of the Astrophysics Division at NASA Headquarters in Washington, said during a news conference Monday. Monday’s news is significant because it comes as NASA is taking formative steps toward launching a pair missions to Europa in the 2020s—an orbiter to scout the moon, and a lander that will follow a couple of years later. The same engineers at the Jet Propulsion Laboratory in California who masterminded Curiosity’s landing on Mars have turned their attention toward how best to land a probe on Europa’s icy surface. And it is no easy feat. The moon creaks as Jupiter’s gravitation bulk rends its frozen surface in deep crevasses, pushing and pulling the ice upward and downward by tens of meters every few days. And with only a very tenuous atmosphere, it is cold: -210 degrees Celsius. The radiation from nearby Jupiter would kill a human in a matter of hours or days. Read 7 remaining paragraphs | Comments
See more here:
Hubble finds additional evidence of water vapor plumes on Europa
Joseph Menn and John Walcott, reporting for Reuters: A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. The tools, which enable hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet Inc, were dumped onto public websites last month by a group calling itself Shadow Brokers. The public release of the tools coincided with U.S. officials saying they had concluded that Russia or its proxies were responsible for hacking political party organizations in the run-up to the Nov. 8 presidential election. On Thursday, lawmakers accused Russia of being responsible. Various explanations have been floated by officials in Washington as to how the tools were stolen. Some feared it was the work of a leaker similar to former agency contractor Edward Snowden, while others suspected the Russians might have hacked into NSA headquarters in Fort Meade, Maryland. Read more of this story at Slashdot.
Trailrunner7 writes from a report via On the Wire: Attackers can add an arbitrary page to the end of a Google login flow that can steal users’ credentials, or alternatively, send users an arbitrary file any time a login form is submitted, due to a bug in the login process. A researcher in the UK identified the vulnerability recently and notified Google of it, but Google officials said they don’t consider it a security issue. The bug results from the fact that the Google login page will take a specific, weak GET parameter. Using this bug, an attacker could add an extra step to the end of the login flow that could steal a user’s credentials. For example, the page could mimic an incorrect password dialog and ask the user to re-enter the password. [Aidan Woods, the researcher who discovered the bug, ] said an attacker also could send an arbitrary file to the target’s browser any time the login form is submitted. In an email interview, Woods said exploiting the bug is a simple matter. “Attacker would not need to intercept traffic to exploit — they only need to get the user to click a link that they have crafted to exploit the bug in the continue parameter, ” Woods said. Google told Woods they don’t consider this a security issue. Read more of this story at Slashdot.