Tattoos Found To Interfere With Apple Watch Sensors

An anonymous reader writes: A number of early Apple Watch adopters have complained that their tattoos cause interference with many of the new product’s key features. According to multiple tattooed sources, inked wrists and hands can disrupt communication with the wearable’s sensors installed in the underside of the device leading to malfunction. Owners of Apple Watch have taken to social media to voice their frustration using the hashtag #tattoogate and sharing their disappointment over the newly discovered Apple flaw. One user reported that the Watch’s lock system did not disable as it should when the device was placed on a decorated area of skin – forcing those affected to constantly enter their security pins. A further source suggested that notification alerts would fail to ‘ping’ as they are supposed to, and that heart rate monitoring differed significantly between tattooed and non-tattooed wrist readings. Read more of this story at Slashdot.

View post:
Tattoos Found To Interfere With Apple Watch Sensors

How One Tweet Wiped $8bn Off Twitter’s Value

An anonymous reader writes: Someone mistakenly published earnings information on a Nasdaq-run investor relations page for Twitter before the company officially released the news and it sent the stock into a tailspin. Initially the earnings statement went unnoticed, but soon a Tweet with the results got a lot of attention. The stock lost more than $8 billion at one point as news spread. “We asked the New York Stock Exchange to halt trading once we discovered our Q1 numbers were out, and we published our results as soon as possible thereafter, ” said Twitter’s senior director for investor relations, Krista Bessinger. “Selerity, who provided the initial tweets with our results, informed us that earnings release was available on our Investor Relations site before the close of market. Nasdaq hosts and manages our IR website, and we explicitly instructed them not to release our results until after the market close and only upon our specific instructions, which is consistent with prior quarters. We are continuing to investigate with them exactly what occurred.” Read more of this story at Slashdot.

Continue reading here:
How One Tweet Wiped $8bn Off Twitter’s Value

New Privacy Threat: Automated Vehicle Occupancy Detection

An anonymous reader writes: The Electronic Frontier Foundation is warning against a new potential privacy threat: cameras that look inside cars and try to identify how many people are inside. This technology is a natural combination of simpler ones that have existed for years: basic object recognition software and road-side cameras (red light cameras, speeding cameras, license plate readers — you name it). Of course, we can extrapolate just a bit further, and point out that as soon as the cameras have high enough resolution, they can start running face recognition algorithms on the images, and determine the identities of a vehicle’s occupants. “The San Diego Association of Governments (SANDAG), a government umbrella group that develops transportation and public safety initiatives across the San Diego County region, estimates that 15% of drivers in High Occupancy Vehicle (HOV) lanes aren’t supposed to be there. After coming up short with earlier experimental projects, the agency is now testing a brand new technology to crack down on carpool-lane scofflaws on the I-15 freeway. … In short: the technology is looking at your image, the image of the people you’re with, your location, and your license plate. (SANDAG told CBS the systems will not be storing license plate data during the trial phase and the system will, at least for now, automatically redact images of drivers and passengers. Xerox’s software, however, allows police the option of using a weaker form of redaction that can be reversed on request.)” Read more of this story at Slashdot.

Read More:
New Privacy Threat: Automated Vehicle Occupancy Detection

TeslaCrypt Isn’t All That Cryptic

citpyrc writes: TeslaCrypt, the latest-and-greatest ransomware branch off of the CryptoWall family, claims to the unwitting user that his/her documents are encrypted with “a unique public key generated for this computer”. This coudn’t be farther from truth. In actuality, the developers of this malware appear to have been lazy and implemented encryption using symmetric AES256 with a decryption key generated on the user’s machine. If any of your machines are afflicted, Talos has developed a tool that can be used to generate the user’s machine’s symmetric key and decrypt all of the ransomed files. Read more of this story at Slashdot.

See original article:
TeslaCrypt Isn’t All That Cryptic

Pandora Paying Artists $0.0001 More Per Stream Than It Was Last Year

journovampire writes: Pandora has revealed that it’s paying a 10, 000th of a dollar more to music labels and artists than it was in 2014. From the article: “Pandora has revealed that its royalty payments to SoundExchange, the US licensing body which collects performance royalties on behalf of record labels and artists, have just increased by 8%. The news was confirmed in a call with investors following Pandora’s Q1 fiscal results announcement on Thursday (April 23), in which it posted a three-month net loss of $48.3m. In what Pandora CEO Brian McAndrews called a scheduled annual step-up, Pandora has from January 1 been paying out an average $0.0014 per ad-funded stream and $0.0024 per premium stream to SoundExchange.” Read more of this story at Slashdot.

Read More:
Pandora Paying Artists $0.0001 More Per Stream Than It Was Last Year

Liquid Mercury Found Under Mexican Pyramid

An anonymous reader writes: An archaeologist has discovered liquid mercury at the end of a tunnel beneath a Mexican pyramid, a finding that could suggest the existence of a king’s tomb or a ritual chamber far below one of the most ancient cities of the Americas. Mexican researcher Sergio Gómez … has spent six years slowly excavating the tunnel, which was unsealed in 2003 after 1, 800 years. Last November, Gómez and a team announced they had found three chambers at the tunnel’s 300ft end, almost 60ft below the the temple. Near the entrance of the chambers, they a found trove of strange artifacts: jade statues, jaguar remains, a box filled with carved shells and rubber balls. Read more of this story at Slashdot.

See the original post:
Liquid Mercury Found Under Mexican Pyramid

New Privacy Concerns About US Program That Can Track Snail Mail

Lashdots writes: A lawyers’ group has called for greater oversight of a government program that gives state and federal law enforcement officials access to metadata from private communications for criminal investigations and national security purposes. But it’s not digital: this warrantless surveillance is conducted on regular mail. “The mail cover has been in use, in some form, since the 1800s, ” Chief Postal Inspector Guy J. Cottrell told Congress in November. The program targets a range of criminal activity including fraud, pornography, and terrorism, but, he said, “today, the most common use of this tool is related to investigations to rid the mail of illegal drugs and illegal drug proceeds.” Recent revelations that the U.S. Postal Service photographs the front and back of all mail sent through the U.S., ostensibly for sorting purposes, has, Fast Company reports, brought new scrutiny—and new legal responses—to this obscure program. Read more of this story at Slashdot.

View article:
New Privacy Concerns About US Program That Can Track Snail Mail

Futures Trader Arrested For Causing 2010 ‘Flash Crash’

New submitter dfsmith writes: Apparently the “Flash Crash” of the stock market in May 2010 was perpetrated by a futures trader in the UK. The US Justice Department alleges that he used a “dynamic layering scheme” of large-volume sell orders to confuse other buyers, hence winning big in his futures trades. “By allegedly placing multiple, simultaneous, large-volume sell orders at different price points—a technique known as ‘layering’—Sarao created the appearance of substantial supply in the market. As part of the scheme, Sarao allegedly modified these orders frequently so that they remained close to the market price, and typically canceled the orders without executing them. When prices fell as a result of this activity, Sarao allegedly sold futures contracts only to buy them back at a lower price. Conversely, when the market moved back upward as the market activity ceased, Sarao allegedly bought contracts only to sell them at a higher price.” Read more of this story at Slashdot.

Read more here:
Futures Trader Arrested For Causing 2010 ‘Flash Crash’

3.46-Billion-Year-Old ‘Fossils’ Were Not Created By Life Forms

sciencehabit writes: What are the oldest fossils on Earth? For a long time, a 3.46-billion-year-old rock from Western Australia seemed to hold the record. A 1993 Science paper (abstract) suggested that the Apex chert contained tiny, wormy structures that could have been fossilized cell walls of some of the world’s first cyanobacteria. But now there is more evidence that these structures have nothing to do with life. The elongated filaments were instead created by minerals forming in hydrothermal systems, researchers report (abstract). After the minerals were formed, carbon glommed on to the edges, leaving behind an organic signature that looked suspiciously like cell walls. Read more of this story at Slashdot.

See the article here:
3.46-Billion-Year-Old ‘Fossils’ Were Not Created By Life Forms

New Dark Web Market Is Selling Zero-Day Exploits

Sparrowvsrevolution writes Over the last month, a marketplace calling itself TheRealDeal Market has emerged on the dark web, with a focus on sales of hackers’ zero-day attack methods. Like the Silk Road and its online black market successors like Agora and the recently defunct Evolution, TheRealDeal runs as a Tor hidden service and uses bitcoin to hide the identities of its buyers, sellers, and administrators. But while some other sites have sold only basic, low-level hacking tools and stolen financial details, TheRealDeal’s creators say they’re looking to broker premium hacker data like zero-days, source code, and hacking services, often offered on an exclusive, one-time sale basis. Currently an iCloud exploit is being offered for sale on the site with a price tag of $17, 000 in bitcoin, claiming to be a new method of hacking Apple iCloud accounts. “Any account can be accessed with a malicious request from a proxy account, ” reads the description. “Please arrange a demonstration using my service listing to hack an account of your choice.” Others include a technique to hack WordPress’ multisite configuration, an exploit against Android’s Webview stock browser, and an Internet Explorer attack that claims to work on Windows XP, Windows Vista and Windows 7, available for around $8, 000 in bitcoin. None of these zero days have yet been proven to be real, but an escrow system on the site using bitcoin’s multisignature transaction feature is designed to prevent scammers from selling fake exploits. Read more of this story at Slashdot.

View original post here:
New Dark Web Market Is Selling Zero-Day Exploits