Windows 10 Insider Preview Build 14361 Released

An anonymous reader writes from a report via BetaNews: Windows Insider chief Dona Sarkar announced in a blog post that they are releasing Windows 10 Insider Preview Build 14361 for both PC and Mobile to Windows Insiders in the Fast ring. This new release includes new features, some improvements to existing features, and various bug fixes that the company hopes to iron out before the Windows 10 Anniversary Update. A LastPass extension for the Microsoft Edge browser, and Hyper-V Container, which will let you use Docker natively on Windows 10, has been added. A series of improvements have been made to Windows Ink, and the Settings app, which includes changes to the colors so it’s more obvious where you are. The Blu-ray icon and Network Quick Action icon have also been updated. You can read the full list of improvements and fixes for PC here. Read more of this story at Slashdot.

Excerpt from:
Windows 10 Insider Preview Build 14361 Released

Google To Deprecate SSLv3, RC4 in Gmail IMAP/POP Clients

Michael Mimoso, reporting for Threatpost: Google said that it will initiate on June 16 a gradual deprecation of SSLv3 and RC4 for Gmail IMAP/POP mail clients. Both the crypto protocols cipher are notoriously unsafe and are being phased out in big chunks of the Internet. Google, for its part, had already announced in May that it would no longer support SSLv3 and RC4 connections for Gmail SMTP. Google does note that most mail clients already default to safer TLS connections, and most will not be affected by the impending changes.”Unlike Gmail SMTP, this change will be rolled out as a gradual change, where it may take longer than 30 days for users to be fully restricted from connecting to Gmail from SSLv3 or RC4 connections; however, we recommend updating your clients soon in order to avoid any potential disruption, ” Google said in an announcement. Read more of this story at Slashdot.

Read More:
Google To Deprecate SSLv3, RC4 in Gmail IMAP/POP Clients

North Korea Restarts Plutonium Production For Nuclear Bombs

New submitter ReginaldBryan45 quotes a report from Reuters: North Korea has restarted production of plutonium fuel, a senior State Department official said on Tuesday, showing that it plans to pursue its nuclear weapons program in defiance of international sanctions. The International Atomic Energy Agency (IAE) said on Monday that it had seen signs based on satellite imagery that show that the secretive country had re-activated the nuclear fuel production reactor at Yongbyon. The analysis by the IAEA pointed to “resumption of the activities of the five megawatt reactor, the expansion of centrifuge-related facility, [and] reprocessing — these are some of the examples of the areas [of activity indicated at Yongbyon].” U.S. Intelligence tried to infect the Yongbyon site with a variant of the Stuxnet malware last year but ultimately failed. Experts at the U.S.-Korea Institute at John Hopkins University’s School of Advanced International Studies in Washington predicted last year that the country’s nuclear arsenal could grow to as many as 100 bombs within five years, from an estimated 10 to 16. Naturally, this news is a cause for concern as North Korea had four (failed) test launches in the last two months. Read more of this story at Slashdot.

See the article here:
North Korea Restarts Plutonium Production For Nuclear Bombs

‘Alarming’ Rise In Ransomware Tracked

An anonymous reader quotes a report from BBC: Cyber-thieves are adopting ransomware in “alarming” numbers, say security researchers. There are now more than 120 separate families of ransomware, said experts studying the malicious software. Other researchers have seen a 3, 500% increase in the criminal use of net infrastructure that helps run ransomware campaigns. The rise is driven by the money thieves make with ransomware and the increase in kits that help them snare victims. Ransomware was easy to use, low risk and offered a high reward, said Bart Parys, a security researcher who helps to maintain a list of the growing numbers of types of this kind of malware. Mr Parys and his colleagues have now logged 124 separate variants of ransomware. Some virulent strains, such as Locky and Cryptolocker, were controlled by individual gangs, he said, but others were being used by people buying the service from an underground market. A separate indicator of the growth of ransomware came from the amount of net infrastructure that gangs behind the malware had been seen using. The numbers of web domains used to host the information and payment systems had grown 35-fold, said Infoblox in its annual report which monitors these chunks of the net’s infrastructure. A lot of ransomware reached victims via spear-phishing campaigns or booby-trapped adverts, he said, but other gangs used specialized “crypters” and “packers” that made files look benign. Others relied on inserting malware into working memory so it never reached the parts of a computer on which most security software keeps an eye. Ars Technica reports that drive-by attacks that install the TeslaCrypt crypto ransomware are now able to bypass Microsoft’s EMET. Read more of this story at Slashdot.

Read More:
‘Alarming’ Rise In Ransomware Tracked

Facebook Nixes Access To Chats Outside Of Messenger Walled Garden

Tom Mendelsohn, reporting for Ars Technica: Some smartphone users of Facebook are reporting that they’re no longer able to access their messages from the mobile site, and that they’re being directed towards the free content ad network’s dedicated Messenger app. Users of the regular Facebook mobile app were shunted over to Facebook Messenger to access their chats a while ago. Now, folk who access the service on their phone’s Web browsers, or via third-party apps such as Tinfoil or Metal, are beginning to find that they can no longer view their messages. Complaints are popping up from users who are being told by Facebook that “your conversations are moving to Messenger.” Some Android users are even finding themselves automatically redirected to the download link on the Google Play store when they try and view their messages on the mobile site. Read more of this story at Slashdot.

Read the article:
Facebook Nixes Access To Chats Outside Of Messenger Walled Garden

Scientists Announce Plans For Synthetic Human Genomes

An anonymous reader writes: After it was reported three weeks ago that scientists have held a secret meeting to consider creating a synthetic human genome, the participants of that meeting have officially published their plans. They announced a plan to launch a project that would radically reduce the cost of synthesizing human genomes — a revolutionary development in biotechnology that could enable technicians to grow human organs for transplantation. The Washington Post reports: “The announcement, published Thursday in the journal Science, is the latest sign that biotechnology is going through a rapidly advancing but ethically fraught period. The promoters of synthetic genomes envision a project that would eventually be on the same scale as the Human Genome Project of the 1990s, which led to the sequencing of the first human genomes. The difference this time would be that, instead of ‘reading’ genetic codes, which is what sequencing does, the scientists would be ‘writing’ them. They have dubbed this the ‘Genome Project-write.'” Read more of this story at Slashdot.

Read this article:
Scientists Announce Plans For Synthetic Human Genomes

Wal-Mart Says It Is 6-9 Months From Using Drones To Check Warehouse Inventory

Multinational retail corporation Wal-mart announced on Thursday that it is six to nine months from starting to use drones to check warehouse inventories in the United States. The drones, which are capable of operating on autopilot, fly through the aisles snapping 30 images a second, and deliver real-time data to employees about whether the correct product is shelved in the proper place. From a Reuters report: Finding ways to more efficiently warehouse, transport and deliver goods to customers has taken on new importance for Wal-Mart as it deals with wages costs while seeking to beat back price competition and boost online sales. Wal-Mart said the camera and technology on top of the drones have been custom-built for the retailer. Read more of this story at Slashdot.

View the original here:
Wal-Mart Says It Is 6-9 Months From Using Drones To Check Warehouse Inventory

Google new tools let anyone create art using AI

Google doesn’t just want to dabble in using AI to create art — it wants you to make that art yourself. As promised , the search giant has launched its Magenta project to give artists tools for bringing machine learning to their creations. The initial effort focuses around an open source infrastructure for producing audio and video that, ideally, heads off in unexpected directions while maintaining the better traits of human-made art. Ultimately, Google doesn’t just want the technology to produce ‘optimal’ art based on what it learns from samples. It’s hoping for the same imbalance (that is, focusing on one element over others), surprise and long-term narratives that you see in people-powered projects. It should feel like there’s a distinct personality to a song or video. You can look at Google’s early Magenta code right now , and the company is vowing to accept both code and blog posts from outsiders who have something to add. If enough people rally around the idea, you could see a budding community of artists who add AI flourishes to their productions. Source: Magenta , GitHub

Taken from:
Google new tools let anyone create art using AI

US Court Says No Warrant Needed For Cellphone Location Data

Dustin Volz, reporting for Reuters: Police do not need a warrant to obtain a person’s cellphone location data held by wireless carriers, a U.S. appeals court ruled on Tuesday, dealing a setback to privacy advocates. The full 4th U.S. Circuit Court of Appeals in Richmond, Virginia, voted 12-3 that the government can get the information under a decades-old legal theory that it had already been disclosed to a third party, in this case a telephone company. The ruling overturns a divided 2015 opinion from the court’s three-judge panel and reduces the likelihood that the Supreme Court would consider the issue. The decision arose from several armed robberies in Baltimore and Baltimore County, Maryland, in early 2011, leading to the convictions of Aaron Graham and Eric Jordan. The convictions were based in part on 221 days of cellphone data investigators obtained from wireless provider Sprint, which included about 29, 000 location records for the defendants, according to the appeals court opinion. Read more of this story at Slashdot.

See more here:
US Court Says No Warrant Needed For Cellphone Location Data

Fiverr Suffers Six-Hour DDoS Attack After Removing DDoS-For-Hire Listings

Two days after Fiverr, a marketplace for digital services, removed user listings from its website that advertised DDoS-for-hire services, the company’s website suffered a six-hour long DDOS attack. Softpedia reports: The incident took place on the morning of May 27 (European timezones), and the service admitted its problems on its Twitter account. At the time of writing, Fiverr has been back up and functioning normally for more than two hours. Fiverr’s problems stem from an Incapsula probe that found DDoS-for-hire ads on its marketplace, available for $5. Incapsula reported the suspicious listings to Fiverr, who investigated the issue and removed the ads. Fiverr first removed all listings advertising blatantly illegal DDoS services, but later also removed the ads offering to “test” a website for DDoS “protection” measures. Read more of this story at Slashdot.

Taken from:
Fiverr Suffers Six-Hour DDoS Attack After Removing DDoS-For-Hire Listings