‘Sinking’ Pacific Nation Tuvalu Is Actually Getting Bigger

mi shares a report from Phys.Org: The Pacific nation of Tuvalu — long seen as a prime candidate to disappear as climate change forces up sea levels — is actually growing in size, new research shows. A University of Auckland study examined changes in the geography of Tuvalu’s nine atolls and 101 reef islands between 1971 and 2014, using aerial photographs and satellite imagery. It found eight of the atolls and almost three-quarters of the islands grew during the study period, lifting Tuvalu’s total land area by 2.9 percent, even though sea levels in the country rose at twice the global average. Co-author Paul Kench said the research, published Friday in the journal Nature Communications, challenged the assumption that low-lying island nations would be swamped as the sea rose. It found factors such as wave patterns and sediment dumped by storms could offset the erosion caused by rising water levels. Read more of this story at Slashdot.

Continued here:
‘Sinking’ Pacific Nation Tuvalu Is Actually Getting Bigger

California Senate Defies FCC, Approves Net Neutrality Law

The California State Senate yesterday approved a bill to impose net neutrality restrictions on Internet service providers, challenging the Federal Communications Commission attempt to preempt such rules. From a report: The FCC’s repeal of its own net neutrality rules included a provision to preempt state and municipal governments from enforcing similar rules at the local level. But the governors of Montana and New York have signed executive orders to enforce net neutrality and several states are considering net neutrality legislation. The FCC is already being sued by t21 states and the District of Columbia, which are trying to reverse the net neutrality repeal and the preemption of state laws. Attempts to enforce net neutrality rules at the state or local level could end up being challenged in separate lawsuits. Read more of this story at Slashdot.

Read this article:
California Senate Defies FCC, Approves Net Neutrality Law

Washington Bill Makes It Illegal To Sell Gadgets Without Replaceable Batteries

Jason Koebler writes: A bill that would make it easier to fix your electronics is rapidly hurtling through the Washington state legislature. The bill’s ascent is fueled by Apple’s iPhone-throttling controversy, which has placed a renewed focus on the fact that our electronics have become increasingly difficult to repair. Starting in 2019, the bill would ban the sale of electronics that are designed “in such a way as to prevent reasonable diagnostic or repair functions by an independent repair provider. Preventing reasonable diagnostic or repair functions includes permanently affixing a battery in a manner that makes it difficult or impossible to remove.” Read more of this story at Slashdot.

Excerpt from:
Washington Bill Makes It Illegal To Sell Gadgets Without Replaceable Batteries

2017’s biggest cybersecurity facepalms

2017 was a year like no other for cybersecurity. It was the year we found out the horrid truths at Uber and Equifax, and border security took our passwords . A year of WannaCry and Kaspersky , VPNs and blockchains going mainstream, healthcare hacking , Russian hackers , WikiLeaks playing for Putin’s team , and hacking back . In 2017 we learned that cybersecurity is a Lovecraftian game in which you trade sanity for information. Let’s review the year that was (and hopefully will never be again). Moscow mules This was the year Kaspersky finally got all the big press they’ve been angling for. Unfortunately for them, it wasn’t for their research. The antivirus company spent an uncomfortable year in the headlines being accused of working with Russia’s FSB (former KGB) . Eventually those suspicions got it banned from use by US government agencies. Kaspersky’s alleged coziness with Putin’s inner circle has made the rounds in the press and infosec gossip for years. But it came to a head when an NSA probe surfaced, the Senate pushed for a ban, and — oddly — the Trump administration came with the executioner’s axe. Obviously, Kaspersky — the company, and its CEO of the same name — denied the accusations, and offered to work with the US government. They offered up their code for review and filed suit when the ban passed. At this point, the only thing that might save Kaspersky’s reputation in the US is finding us that pee tape. Fingers crossed. Be still my backdoored heart A ransomware attack on Hollywood Presbyterian Hospital in 2016 put health care hacking center stage, but in 2017 it turned into a true nightmare. The WannaCry ransomware attack spread like wildfire, locking up a third of the National Health Service (NHS) in England. That was followed by other worms, like Petya/NotPetya, which hit US hospitals in June. The security of pacemakers was exposed as being awful, specifically in the case of medical device manufacturer St. Jude Medical (now rebranded as Abbott). A lot of people hated on researcher Justine Bone and MedSec for the way they went about exposing pacemaker flaws, but they were right . The FDA put a painful pin in it when it notified the public of a voluntary recall (as a firmware update) of 465, 000 pacemakers made by St. Jude Medical. Meanwhile, white hat hackers put together the first Cyber Med Summit — a doctor-run, hacker boot camp for medical professionals. That the Summit exists is a tiny bit of good news in our medical mess, but it also proved that you should probably make sure your doctor keeps a hacker on staff. Medical staff at the Summit got a wake-up call about medical devices exploits, and concluded they need to add “hacking” to their list of possible problems to assess and diagnose. I’m not crying, you’re crying On May 12, over 150 countries were hit in one weekend by a huge ransomware crimewave named WannaCry . The attack was derived from a remote code execution vulnerability (in Windows XP up through Windows Server 2012) called “EternalBlue, ” found in the April Shadow Brokers/NSA dump. Those who did their Windows updates were not affected. WannaCry demanded $300 in Bitcoin from each victim and among those included were the UK’s National Health Service (NHS). The ransomworm was stopped in its tracks by the registration of a single domain that behaved like a killswitch. The creators apparently neglected to secure their own self destruct button. Researcher MalwareTech was the hero of the day with his quick thinking, but was sadly repaid by having his identity outed by British tabloids. Adding injury to insult, he was later arrested on unrelated charges as he attempted to fly home after the DEF CON hacking conference in August. Two weeks after the attack, Symantec published a report saying the ransomware showed strong links to the Lazarus group (North Korea). Others independently came to the same conclusion. Eight months later, and just in time for his boss’ warmongering on North Korea, Trump team member Thomas P. Bossert wrote in the Wall Street Journal that “the U.S. today publicly attributes the massive “WannaCry” cyberattack to North Korea.” Maybe he’s just a backdoor man US Deputy Attorney General Rod Rosenstein in October introduced the world to the new and totally made-up concept of ” responsible encryption ” — and was promptly laughed out of the collective infosec room. “Responsible encryption is effective secure encryption, coupled with access capabilities, ” he said . He suggested that the feds won’t mandate encryption backdoors “so long as companies can cough up an unencrypted copy of every message, call, photo or other form of communications they handle.” Even non-infosec people thought his new PR buzzwords were suspect. “Look, it’s real simple. Encryption is good for our national security; it’s good for our economy. We should be strengthening encryption, not weakening it. And it’s technically impossible to have strong encryption with any kind of backdoor, ” said Rep. Will Hurd (R-Texas) at The Atlantic’s Cyber Frontier event in Washington, D.C. Politico wrote : It’s a cause Rosenstein has quietly pursued for years, including two cases in 2014 and 2015 when, as the US attorney in Maryland, he sought to take companies to court to make them unscramble their data, a DOJ official told POLITICO. But higher-ups in President Barack Obama’s Justice Department decided against it, said the official, who isn’t authorized to speak to the news media about the cases. To everyone’s dismay, Rosenstein doubled down on his “responsible encryption” campaign when he capitalized on a mass shooting (using as his example the phone of Devin Patrick Kelley who opened fire on a congregation in Texas, killing 26 people). He said , “Nobody has a legitimate privacy interest in that phone … But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge.” Like Uber, but for Equifax If there was some kind of reverse beauty pageant for worst look, worst behavior, and best example of what not to do with security, we’d need a tiebreaker for 2017. Equifax and Uber dominated the year with their awfulness. Equifax was forced to admit it was hacked badly in both March and July, with the latter affecting around 200 million people (plus 400, 000 in the UK). Motherboard reported that “six months after the researcher first notified the company about the vulnerability, Equifax patched it — but only after the massive breach that made headlines had already taken place… This revelation opens the possibility that more than one group of hackers broke into the company.” Shares of Equifax plummeted 35% after the July disclosure. And news that some of its execs sold off stock before the breach was made public triggered a criminal probe. Which brings us to the “unicorn” that fell from grace . In late November Uber admitted it was hacked in October 2016, putting 57 million users and over half a million drivers at risk. Uber didn’t report the breach to anyone — victims or regulators — then paid $100K to the hackers to keep it quiet, and hid the payment as a bug bounty. All of which led to the high-profile firing and departures of key security team members. Just a couple weeks later, in mid-December, the now-notorious ‘Jacobs letter’ was unsealed, accusing Uber of spying and hacking . “It was written by the attorney of a former employee, Richard Jacobs, and it contains claims that the company routinely tried to hack its competitors to gain an edge, ” Engadget wrote , and “used a team of spies to steal secrets or surveil political figures and even bugged meetings between transport regulators — with some of this information delivered directly to former CEO Travis Kalanick.” The letter was so explosive it’s now the trial between Uber and Waymo — so we can be sure we haven’t seen the last of Uber’s security disasters in the news. Images: Getty Images/iStockphoto (Wannacry); D. Thomas Magee (All illustrations)

Continue Reading:
2017’s biggest cybersecurity facepalms

56,000 Layoffs and Counting: India’s IT Bloodbath This Year May Just Be the Start

An anonymous reader quotes a report from Quartz: For Indian techies, 2017 was the stuff of nightmares. One of the top employment generators until a few years ago, India’s $160 billion IT industry laid off more than 56, 000 employees this year. Some analysts believe this spree was worse than the one during the 2008 financial crisis. Meanwhile, hiring plummeted, with entry-level openings having more than halved in 2017, according to experts. Tata Consultancy Services (TCS) and Infosys, two of India’s largest IT companies and once leaders in job creation, reduced their headcounts for the first time ever. Even mid-sized players like Tech Mahindra retrenched several employees. Compared to the normal rate of forced attrition (i.e. asking non-performers to leave) of around 1% in earlier years, 2017 saw Indian IT companies letting go of between 2% and 6% of their employees, said Alka Dhingra, general manager of IT staffing at TeamLease Services. Infosys cut 9, 000 jobs in January. “Instead of 10 people, what if we have three people to work on (a project). If we don’t have the software, then some others will take the advantage (away from us), ” Vishal Sikka, the former CEO of the Bengaluru-based company, said in February. Meanwhile, around 6, 000 Indian employees at Cognizant reportedly lost their jobs to automation. Read more of this story at Slashdot.

Originally posted here:
56,000 Layoffs and Counting: India’s IT Bloodbath This Year May Just Be the Start

AnyDVD Supports UHD Blu-Ray Ripping, While Devices Patch Security Holes

The controversial ripping tool AnyDVD has released a new beta version that allows users to decrypt and copy UHD Blu-Ray discs. The software makes use of the leaked keys that came out recently and appears to work well. Meanwhile, disc drive manufacturers are patching security holes. TorrentFreak reports: This year there have been some major developments on this front. First, full copies of UHD discs started to leak online, later followed by dozens of AACS 2.0 keys. Technically speaking AACS 2.0 is not confirmed to be defeated yet, but many discs can now be ripped. This week a popular name jumped onto the UHD Blu-Ray bandwagon. In its latest beta release, AnyDVD now supports the format, relying on the leaked keys. “New (UHD Blu-ray): Fetch AACS keys from external file for use with ‘UHD-friendly’ drives, ” the release notes read. The involvement of AnyDVD is significant because it previously came under legal pressure from decryption licensing outfit AACS LA. This caused former parent company Slysoft to shut down last year, but the software later reappeared under new management. Based on reports from several AnyDVD users, the UHD ripping works well for most people. Some even claim that it’s faster than the free alternative, MakeMKV. Read more of this story at Slashdot.

Continue reading here:
AnyDVD Supports UHD Blu-Ray Ripping, While Devices Patch Security Holes

Author of BrickerBot Malware Retires, Says He Bricked 10 Million IoT Devices

An anonymous reader writes: The author of BrickerBot — the malware that bricks IoT devices — has announced his retirement in an email to Bleeping Computer, also claiming to have bricked over 10 million devices since he started the “Internet Chemotherapy” project in November 2016. Similar to the authors of the Mirai malware, the BrickerBot developer dumped his malware’s source code online, allowing other crooks to profit from his code. The code is said to contain at least one zero-day. In a farewell message left on hundreds of hacked routers, the BrickerBot author also published a list of incidents (ISP downtimes) he caused, while also admitting he is likely to have drawn the attention of law enforcement agencies. “There’s also only so long that I can keep doing something like this before the government types are able to correlate my likely network routes (I have already been active for far too long to remain safe). For a while now my worst-case scenario hasn’t been going to jail, but simply vanishing in the middle of the night as soon as some unpleasant government figures out who I am, ” the hacker said. Read more of this story at Slashdot.

Read More:
Author of BrickerBot Malware Retires, Says He Bricked 10 Million IoT Devices

Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer

The sensitive personal information of 246, 000 Department of Homeland Security employees was found on the home computer server of a DHS employee in May, according to documents obtained by USA TODAY. From the report: Also discovered on the server was a copy of 159, 000 case files from the inspector general’s investigative case management system, which suspects in an ongoing criminal investigation intended to market and sell, according to a report sent by DHS Inspector General John Roth on Nov. 24 to key members of Congress. The information included names, Social Security numbers and dates of birth, the report said. The inspector general’s acting chief information security officer reported the breach to DHS officials on May 11, while IG agents reviewed the details. Acting DHS Secretary Elaine Duke decided on Aug. 21 to notify affected employees who were employed at the department through the end of 2014 about the breach. Read more of this story at Slashdot.

Read this article:
Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer

Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

schwit1 was the first Slashdot reader to bring us the news. Newsweek reports: Archaeologists believe they have found the key to unlocking a mystery almost as old as the Great Pyramid itself: Who built the structure and how were they able to transport two-ton blocks of stone to the ancient wonder more than 4, 500 years ago…? Experts had long established that the stones from the pyramid’s chambers were transported from as far away as Luxor, more than 500 miles to the south of Giza, the location of the Great Pyramid, but had never agreed how they got there. However, the diary of an overseer, uncovered in the seaport of Wadi al-Jafr, appears to answer the age-old question, showing the ancient Egyptians harnessed the power of the Nile to transport the giant blocks of stone. According to a new British documentary Egypt’s Great Pyramid: The New Evidence, which aired on the U.K.’s Channel 4 on Sunday, the Great Pyramid, also known as the Pyramid of Khufu, was built using an intricate system of waterways which allowed thousands of workers to pull the massive stones, floated on boats, into place with ropes. Along with the papyrus diary of the overseer, known as Merer, the archaeologists uncovered a ceremonial boat and a system of waterworks. The ancient text described how Merer’s team dug huge canals to channel the water of the Nile to the pyramid. Read more of this story at Slashdot.

More:
Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

Hackers Vandalize Vegas Pool Party Club in ‘All Out War’

From a CNET report: Next to DJ Tiesto’s loud image on Wet Republic’s website sits a photo of a bikini model with a beard and an eye patch, with a simple message: “It’s all out war.” Not exactly the type of message you’d expect from a spot that advertises itself as a dance club that doubles as a pool party, but when hackers are in town for Defcon, everything seems to be fair game. The hacker convention, which is in its 25th year in Las Vegas, typically has hotels on alert for its three days of Sin City talk, demos and mischief. Guests are encouraged not to pick up any flash drives lying around, and employees are trained to be wary of social engineering — that is, bad guys pretending to be someone innocent and in need of just a little help. Small acts of vandalism pop up around town. At Caesars Palace, where Defcon is happening, the casino’s UPS store told guests it was not accepting any print requests from USB drives or links, and only printing from email attachments. Hackers who saw this laughed, considering that emails are hardly immune from malware. But the message is clear: During these next few days, hackers are going to have their fun, whether it’s through a compromised Wi-Fi network or an open-to-mischief website. Wet Republic’s site had two images vandalized, both for the “Hot 100” party with DJ Shift. The digital graffiti popped up early Friday morning, less than 24 hours after Defcon kicked off. Read more of this story at Slashdot.

View post:
Hackers Vandalize Vegas Pool Party Club in ‘All Out War’