Russia Suspected In GPS-Spoofing Attacks On Ships

How did a 37-ton tanker suddenly vanish from GPS off the coast of Russia? AmiMoJo shares a report from Wired: The ship’s systems located it 25 to 30 miles away — at Gelendzhik airport… The Atria wasn’t the only ship affected by the problem… At the time, Atria’s AIS system showed around 20 to 25 large boats were also marooned at Gelendzhik airport. Worried about the situation, captain Le Meur radioed the ships. The responses all confirmed the same thing: something, or someone, was meddling with the their GPS… After trawling through AIS data from recent years, evidence of spoofing becomes clear. GPS data has placed ships at three different airports and there have been other interesting anomalies. “We would find very large oil tankers who could travel at the maximum speed at 15 knots, ” said a former director for Marine Transportation Systems at the U.S. Coast Guard. “Their AIS, which is powered by GPS, would be saying they had sped up to 60 to 65 knots for an hour and then suddenly stopped. They had done that several times”… “It looks like a sophisticated attack, by somebody who knew what they were doing and were just testing the system…” says Lukasz Bonenberg from the University of Nottingham’s Geospatial Institute. “You basically need to have atomic level clocks.” The U.S. Maritime Administration confirms 20 ships have been affected — all traveling in the Black Sea — though a U.S. Coast Guard representative “refused to comment on the incident, saying any GPS disruption that warranted further investigation would be passed onto the Department of Defence.” But the captain of the 37-ton tanker already has his own suspicions. “It looks like the Russians define an area where they don’t want the GPS to apply.” Read more of this story at Slashdot.

Continue reading here:
Russia Suspected In GPS-Spoofing Attacks On Ships

Laser Light Forges Graphene Into the Third Dimension

Big Hairy Ian quotes New Atlas: The wonder material graphene gets many of its handy quirks from the fact that it exists in two dimensions, as a sheet of carbon only one atom thick. But to actually make use of it in practical applications, it usually needs to be converted into a 3D form. Now, researchers have developed a new and relatively simple way to do just that, using lasers to ‘forge’ a three-dimensional pyramid out of graphene… By focusing a laser onto a fine point on a 2D graphene lattice, the graphene at that spot is irradiated and bulges outwards. A variety of three-dimensional shapes can be made by writing patterns with the laser spot, with the height of the shape controlled by adjusting the irradiation dose at each particular point. The team illustrated that technique by deforming a sheet of graphene into a 3D pyramid, standing 60 nm high. That sounds pretty tiny, but it’s 200 times taller than the graphene sheet itself. “The beauty of the technique is that it’s fast and easy to use, ” says one of the researchers. “It doesn’t require any additional chemicals or processing.” Read more of this story at Slashdot.

Excerpt from:
Laser Light Forges Graphene Into the Third Dimension

Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

schwit1 was the first Slashdot reader to bring us the news. Newsweek reports: Archaeologists believe they have found the key to unlocking a mystery almost as old as the Great Pyramid itself: Who built the structure and how were they able to transport two-ton blocks of stone to the ancient wonder more than 4, 500 years ago…? Experts had long established that the stones from the pyramid’s chambers were transported from as far away as Luxor, more than 500 miles to the south of Giza, the location of the Great Pyramid, but had never agreed how they got there. However, the diary of an overseer, uncovered in the seaport of Wadi al-Jafr, appears to answer the age-old question, showing the ancient Egyptians harnessed the power of the Nile to transport the giant blocks of stone. According to a new British documentary Egypt’s Great Pyramid: The New Evidence, which aired on the U.K.’s Channel 4 on Sunday, the Great Pyramid, also known as the Pyramid of Khufu, was built using an intricate system of waterways which allowed thousands of workers to pull the massive stones, floated on boats, into place with ropes. Along with the papyrus diary of the overseer, known as Merer, the archaeologists uncovered a ceremonial boat and a system of waterworks. The ancient text described how Merer’s team dug huge canals to channel the water of the Nile to the pyramid. Read more of this story at Slashdot.

More:
Ancient Papyrus Finally Solves Egypt’s ‘Great Pyramid’ Mystery

Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

An anonymous reader writes: SafeBrowse, a Chrome extension with more than 140, 000 users, contains an embedded JavaScript library in the extension’s code that mines for the Monero cryptocurrency using users’ computers and without getting their consent. The additional code drives CPU usage through the roof, making users’ computers sluggish and hard to use. Looking at the SafeBrowse extension’s source code, anyone can easily spot the embedded Coinhive JavaScript Miner, an in-browser implementation of the CryptoNight mining algorithm used by CryptoNote-based currencies, such as Monero, Dashcoin, DarkNetCoin, and others. This is the same technology that The Pirate Bay experimented with as an alternative to showing ads on its site. The extension’s author claims he was “hacked” and the code added without his knowledge. Read more of this story at Slashdot.

View original post here:
Popular Chrome Extension Embedded A CPU-Draining Cryptocurrency Miner

AI Just Made Guessing Your Password a Whole Lot Easier

sciencehabit shares a report from Science Magazine: The Equifax breach is reason for concern, of course, but if a hacker wants to access your online data by simply guessing your password, you’re probably toast in less than an hour. Now, there’s more bad news: Scientists have harnessed the power of artificial intelligence (AI) to create a program that, combined with existing tools, figured more than a quarter of the passwords from a set of more than 43 million LinkedIn profiles. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter. The Stevens team created a GAN it called PassGAN and compared it with two versions of hashCat and one version of John the Ripper. The scientists fed each tool tens of millions of leaked passwords from a gaming site called RockYou, and asked them to generate hundreds of millions of new passwords on their own. Then they counted how many of these new passwords matched a set of leaked passwords from LinkedIn, as a measure of how successful they’d be at cracking them. On its own, PassGAN generated 12% of the passwords in the LinkedIn set, whereas its three competitors generated between 6% and 23%. But the best performance came from combining PassGAN and hashCat. Together, they were able to crack 27% of passwords in the LinkedIn set, the researchers reported this month in a draft paper posted on arXiv. Even failed passwords from PassGAN seemed pretty realistic: saddracula, santazone, coolarse18. Read more of this story at Slashdot.

Read the article:
AI Just Made Guessing Your Password a Whole Lot Easier

Equifax Has Been Sending Consumers To a Fake Phishing Site for Almost Two Weeks

An anonymous reader shares a Gizmodo report (condensed for space): For nearly two weeks, the company’s official Twitter account has been directing users to a fake lookalike website. After announcing the breach, Equifax directed its customers to equifaxsecurity2017.com, a website where they can enroll in identity theft protection services and find updates about how Equifax is handing the “cybersecurity incident.” But the decision to create “equifaxsecurity2017” in the first place was monumentally stupid. The URL is long and it doesn’t look very official — that means it’s going to be very easy to emulate. To illustrate how idiotic Equifax’s decision was, developer Nick Sweeting created a fake website of his own: securityequifax2017.com. (He simply switched the words “security” and “equifax” around.) As if to demonstrate Sweeting’s point, Equifax appears to have been itself duped by the fake URL. The company has directed users to Sweeting’s fake site sporadically over the past two weeks. Gizmodo found eight tweets containing the fake URL dating back to September 9th. Read more of this story at Slashdot.

Continue Reading:
Equifax Has Been Sending Consumers To a Fake Phishing Site for Almost Two Weeks

Equifax CEO Hired a Music Major as the Company’s Chief Security Officer

Susan Mauldin, the person in charge of the Equifax’s data security, has a bachelor’s degree and a master of fine arts degree in music composition from the University of Georgia, according to her LinkedIn profile. Mauldin’s LinkedIn profile lists no education related to technology or security. If that wasn’t enough, news outlet MarketWatch reported on Friday that Susan Mauldin’s LinkedIn page was made private and her last name was replaced with “M”, in a move that appears to keep her education background secret. Earlier this month Equifax, which is one of the three major consumer credit reporting agencies, said that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers. On Friday, the UK arm of the organisation said files containing information on “fewer than 400, 000” UK consumers was accessed in the breach. Read more of this story at Slashdot.

View the original here:
Equifax CEO Hired a Music Major as the Company’s Chief Security Officer

8,500 Verizon Customers Disconnected Because of ‘Substantial’ Data Use

An anonymous reader quotes a report from Ars Technica: Verizon is disconnecting another 8, 500 rural customers from its wireless network, saying that roaming charges have made certain customer accounts unprofitable for the carrier. The 8, 500 customers have 19, 000 lines and live in 13 states (Alaska, Idaho, Iowa, Indiana, Kentucky, Maine, Michigan, Missouri, Montana, North Carolina, Oklahoma, Utah, and Wisconsin), a Verizon Wireless spokesperson told Ars today. They received notices of disconnection this month and will lose access to Verizon service on October 17. Verizon said in June that it was only disconnecting “a small group of customers” who were “using vast amounts of data — some as much as a terabyte or more a month — outside of our network footprint.” But one customer, who contacted Ars this week about being disconnected, said her family never used more than 50GB of data across four lines despite having an “unlimited” data plan. We asked Verizon whether 50GB a month is a normal cut-off point in its disconnections of rural customers, but the company did not provide a specific answer. “These customers live outside of areas where Verizon operates our own network, ” Verizon said. “Many of the affected consumer lines use a substantial amount of data while roaming on other providers’ networks and the roaming costs generated by these lines exceed what these consumers pay us each month. We sent these notices in advance so customers have plenty of time to choose another wireless provider.” Read more of this story at Slashdot.

Read this article:
8,500 Verizon Customers Disconnected Because of ‘Substantial’ Data Use

Backdoor Found In WordPress Plugin With More Than 200,000 Installations

According to Bleeping Computer, a WordPress plug that goes by the name Display Widgets has been used to install a backdoor on WordPress sites across the internet for the past two and a half months. While the WordPress.org team removed the plugin from the official WordPress Plugins repository, the plugin managed to be installed on more than 200, 000 sites at the time of its removal. The good news is that the backdoor code was only found between Display Widgets version 2.6.1 (released June 30) and version 2.6.3 (released September 2), so it’s unlikely everyone who installed the plugin is affected. WordPress.org staff members reportedly removed the plugin three times before for similar violations. Bleeping Computer has compiled a history of events in its report, put together with data aggregated from three different investigations by David Law, White Fir Design, and Wordfence. The report adds: The original Display Widgets is a plugin that allowed WordPress site owners to control which, how, and when WordPress widgets appear on their sites. Stephanie Wells of Strategy11 developed the plugin, but after switching her focus to a premium version of the plugin, she decided to sell the open source version to a new developer who would have had the time to cater to its userbase. A month after buying the plugin in May, its new owner released a first new version — v2.6.0 — on June 21. Read more of this story at Slashdot.

See the original post:
Backdoor Found In WordPress Plugin With More Than 200,000 Installations

Chatbot Lets You Sue Equifax For Up To $25,000 Without a Lawyer

Shannon Liao reports via The Verge: If you’re one of the millions affected by the Equifax breach, a chatbot can now help you sue Equifax in small claims court, potentially letting you avoid hiring a lawyer for advice. Even if you want to be part of the class action lawsuit against Equifax, you can still sue Equifax for negligence in small claims court using the DoNotPay bot and demand maximum damages. Maximum damages range between $2, 500 in states like Rhode Island and Kentucky to $25, 000 in Tennessee. The bot, which launched in all 50 states in July, is mainly known for helping with parking tickets. But with this new update, its creator, Joshua Browder, who was one of the 143 million affected by the breach, is tackling a much bigger target, with larger aspirations to match. He says, “I hope that my product will replace lawyers, and, with enough success, bankrupt Equifax.” Not that the bot helps you do anything you can’t already do yourself, which is filling out a bunch of forms — you still have to serve them yourself. Unfortunately, the chatbot can’t show up in court a few weeks later to argue your case for you either. To add to the headache, small claims court rules differ from state to state. For instance, in California, a person needs to demand payment from Equifax or explain why they haven’t demanded payment before filing the form. Read more of this story at Slashdot.

Read the original:
Chatbot Lets You Sue Equifax For Up To $25,000 Without a Lawyer