Apple’s iOS 9 Breaks VPNs

An anonymous reader writes with a report from The Stack that researchers have discovered a crucial security problem in the latest version of iOS 9: it breaks VPN connections to corporate servers. According to the linked piece, “The flaw was first detected in the iOS 9 beta, and has not been fixed in the released version. Neither has the bug been removed in the current iOS 9.1 beta.” The workaround might not be what you want to hear, either, if you’ve happily upgraded to the latest version: it’s to downgrade to iOS 8.4.1. Read more of this story at Slashdot.

See more here:
Apple’s iOS 9 Breaks VPNs

Wasps Have Injected New Genes Into Butterflies

sciencehabit writes: If you’re a caterpillar, you do not want to meet a parasitic wasp. The winged insect will inject you full of eggs, which will grow inside your body, develop into larvae, and hatch from your corpse. But a new study reveals that wasps have given caterpillars something beneficial during these attacks as well: pieces of viral DNA that become part of the caterpillar genome, protecting them against an entirely different lethal virus. In essence, the wasps have turned caterpillars into genetically modified organisms. Read more of this story at Slashdot.

Read More:
Wasps Have Injected New Genes Into Butterflies

Nine of World’s Biggest Banks Create Blockchain Partnership

An anonymous reader writes: Nine major banks, including Barclays, Goldman Sachs, Credit Suisse, and JP Morgan have teamed up to bring Bitcoin’s blockchain technology to financial markets. “Over the past year, interest in blockchain technology has grown rapidly. It has already attracted significant investment from many major banks, which reckon it could save them money by making their operations faster, more efficient and more transparent.” Leaving aside the question of whether banks actually want to become more transparent, they’re funding a firm dedicated to running tests on how data can be shared and collected through the blockchain. “The blockchain works as a huge, decentralized ledger of every bitcoin transaction ever made that is verified and shared by a global network of computers and therefore is virtually tamper-proof. … The data that can be secured using the technology is not restricted to bitcoin transactions. Two parties could use it to exchange any other information, within minutes and with no need for a third party to verify it.” Read more of this story at Slashdot.

View the original here:
Nine of World’s Biggest Banks Create Blockchain Partnership

Open Source Router Firmware OpenWRT 15.05 Released

aglider writes: The newest stable iteration of the famous and glorious OpenWRT has just been released in the wild for all the supported architectures. The latest version is 15.05, codenamed “Chaos Calmer” after a cocktail drink, just like all previous ones. Major changes from the official announcements: “Linux kernel updated to version 3.18. Improved Security Features. Rewritten package signing architecture based on ed25519. Added support for jails. Added support for hardened builds. Improved Networking Support. Platform and Driver Support.” For the full details you are welcome on the forums while the firmware itself and extra packages are available from the distribution servers. Read more of this story at Slashdot.

Continue reading here:
Open Source Router Firmware OpenWRT 15.05 Released

First Library To Support Anonymous Internet Browsing Halts Project After DHS Email

An anonymous reader writes with an update to the news we discussed in July that a small library in New Hampshire would be used as a Tor exit relay. Shortly after the project went live, the local police department received an email from the Department of Homeland Security. The police then met with city officials and discussed all the ways criminals could make use of the relay. They ultimately decided to suspend the project, pending a vote of the library board of trustees on Sept. 15. DHS spokesman Shawn Neudauer said the agent was simply providing “visibility/situational awareness, ” and did not have any direct contact with the Lebanon police or library. “The use of a Tor browser is not, in [or] of itself, illegal and there are legitimate purposes for its use, ” Neudauer said, “However, the protections that Tor offers can be attractive to criminal enterprises or actors and HSI [Homeland Security Investigations] will continue to pursue those individuals who seek to use the anonymizing technology to further their illicit activity.” …Deputy City Manager Paula Maville said that when she learned about Tor at the meeting with the police and the librarians, she was concerned about the service’s association with criminal activities such as pornography and drug trafficking. “That is a concern from a public relations perspective and we wanted to get those concerns on the table, ” she said. Read more of this story at Slashdot.

More:
First Library To Support Anonymous Internet Browsing Halts Project After DHS Email

Vietnam’s Tech Boom: a Look Inside Southeast Asia’s Silicon Valley

rjmarvin writes: Vietnam is in the midst of a tech boom. The country’s education system is graduating thousands of well-educated software engineers and IT professionals each year, recruited by international tech companies like Cisco, Fujitsu, HP, IBM, Intel, LG, Samsung, Sony, Toshiba and others setting up shop in the southern tech hub of Ho Chi Minh City and the central coastal city of Da Nang. Young Vietnamese coders and entrepreneurs are also launching more and more startups, encouraged by government economic policies encouraging small businesses and a growing culture around innovation in the country. Read more of this story at Slashdot.

Link:
Vietnam’s Tech Boom: a Look Inside Southeast Asia’s Silicon Valley

Hackers Abuse Satellite Internet Links To Remain Anonymous

msm1267 writes: Poorly secured satellite-based Internet links are being abused by nation-state hackers, most notably by the Turla APT group, to hide command-and-control operations, researchers at Kaspersky Lab said today. Active for close to a decade, Turla’s activities were exposed last year; the Russian-speaking gang has carried out espionage campaigns against more than 500 victims in 45 countries, most of those victims in critical areas such as government agencies, diplomatic and military targets, and others. Its use of hijacked downstream-only links is a cheap ($1, 000 a year to maintain) and simple means of moving malware and communicating with compromised machines, Kaspersky researchers wrote in a report. Those connections, albeit slow, are a beacon for hackers because links are not encrypted and ripe for abuse. Read more of this story at Slashdot.

View the original here:
Hackers Abuse Satellite Internet Links To Remain Anonymous

Ice-Age Fossils Unearthed At Construction Site In California

An anonymous reader writes: Constructions workers in Carlsbad, CA. have recently discovered Ice Age mammoth and prehistoric bison fossils during an excavation. The fossils were taken to the San Diego Museum of Natural History for examination and storage. “The bison fossil, which includes a skull and partial skeleton, is the most unusual and probably the most complete of the larger animals found at the project site. These are big animals, much larger than modern plains bison, ” said curator of paleontology at the San Diego Museum of Natural History, Tom Deméré. Read more of this story at Slashdot.

Read the article:
Ice-Age Fossils Unearthed At Construction Site In California

20+ Chinese Android Smartphones Models Come With Pre-Installed Malware

An anonymous reader writes: Security researchers from G DATA have published research (PDF) into Android phones produced in China, which found that a large number of devices ship with pre-installed malware and spyware. Affected models include the Xiaomi MI3, Huawei G510, Lenovo S860, Alps A24, Alps 809T, Alps H9001, Alps 2206, Alps PrimuxZeta, Alps N3, Alps ZP100, Alps 709, Alps GQ2002, Alps N9389, Android P8, ConCorde SmartPhone6500, DJC touchtalk, ITOUCH, NoName S806i, SESONN N9500, SESONN P8, Xido X1111, Star N9500, Star N8000 and IceFox Razor. The researchers do not believe the manufacturers are responsible for the malware; rather, they suspect middlemen within distribution channels. “According to G DATA, the contamination of these smartphones is done by hiding malware as add-on code in legitimate apps. Since users don’t usually interact with the malware and the add-on runs in the app’s background, unless using a mobile antivirus solution, these infections are rarely discovered.” Read more of this story at Slashdot.

View article:
20+ Chinese Android Smartphones Models Come With Pre-Installed Malware

Solar Windows Could Help Power Buildings

Lucas123 writes: Several companies are now beginning to roll out translucent photovoltaic films or solar cells embedded in windows that can supplement a significant amount of energy in the buildings where they’re used. SolarWindow Technologies, for example, is preparing to launch a transparent product made with organic PVs, while another company, Solaria, is cutting solar cells into thin strips and embedding them in windows. Both companies admit their products can’t produce the 20% efficiency ratings of today’s best rooftop solar panels, but they say that’s not their objective. Instead, the companies are looking to take advantage of millions of skyscraper windows that today are simply unused real estate for renewable energy. One company is aiming at supplementing 20% to 30% of a skyscrapers power requirements. Meanwhile, universities are also jumping into the solar window arena. Oxford University has spun off a PV window company that produces semi-transparent solar cells made of semi-transparent perovskite oxide that has achieved a 20% solar energy efficiency. Read more of this story at Slashdot.

See more here:
Solar Windows Could Help Power Buildings