Windows 10 roadmap: Control everything remotely

As Microsoft continues to court businesses and encourage them to upgrade to Windows 10, the company has taken the novel step of publishing a roadmap of Windows 10 features . This roadmap describes business-oriented features that are coming to Windows 10. Some, such as biometric authentication in the Edge browser, have already been announced as part of the forthcoming Anniversary Update and are currently available in the Insider Preview . But others are not. While some are so vague as to tell us nothing—the Passport API used for biometric authentication is being “enhanced” to improve enterprise functionality—other features are rather more concrete. Microsoft plans to add device-based PC unlocking, wherein Windows and Android phones can be used to store authentication credentials, and the feature can be used to both unlock the PC and authenticate apps and services that use Windows Hello and the Passport API. The same is also being enabled for what Microsoft calls “Companion devices” that integrate with a new API called the “Companion Device Framework.” The Microsoft Band 2 fitness device will plug into this framework, and third-party devices will also be able to join in. Read 6 remaining paragraphs | Comments

View original post here:
Windows 10 roadmap: Control everything remotely

Researchers help shut down spam botnet that enslaved 4,000 Linux machines

A botnet that enslaved about 4,000 Linux computers and caused them to blast the Internet with spam for more than a year has finally been shut down. Known as Mumblehard, the botnet was the product of highly skilled developers . It used a custom “packer” to conceal the Perl-based source code that made it run, a backdoor that gave attackers persistent access, and a mail daemon that was able to send large volumes of spam. Command servers that coordinated the compromised machines’ operations could also send messages to Spamhaus requesting the delisting of any Mumblehard-based IP addresses that sneaked into the real-time composite blocking list , or CBL, maintained by the anti-spam service. “There was a script automatically monitoring the CBL for the IP addresses of all the spam-bots,” researchers from security firm Eset wrote in a blog post published Thursday . “If one was found to be blacklisted, this script requested the delisting of the IP address. Such requests are protected with a CAPTCHA to avoid automation, but OCR (or an external service if OCR didn’t work) was used to break the protection.” Read 2 remaining paragraphs | Comments

Read more here:
Researchers help shut down spam botnet that enslaved 4,000 Linux machines

Why Microsoft needed to make Windows run Linux software

It’s bash, it’s Windows, it’s not a virtual machine. Perhaps the biggest surprise to come from Microsoft’s Build developer conference last week was the Windows Subsystem for Linux  (WSL). The system will ship as part of this summer’s Anniversary Update for Windows 10. WSL has two parts; there’s the core subsystem,  which is already included in Insider Preview builds of the operating system , and then a package of software that Canonical will provide. The core subsystem is what provides the Linux API on Windows, including the ability to natively load Linux executables and libraries. Canonical will provide bash and all the other command-line tools that are expected in a Linux environment. Microsoft is positioning WSL strictly as a tool for developers, with a particular view to supporting Web developers and the open source software stacks that they depend on. Many developers are very familiar with the bash shell, with building software using make and gcc , and editing text in vi or emacs . WSL will give these developers versions of these tools that are equal in just about every regard to the ones you get on Linux, because they’ll be the ones you get on Linux running unmodified on Windows. Read 22 remaining paragraphs | Comments

More:
Why Microsoft needed to make Windows run Linux software

Nvidia unveils first Pascal graphics card, the monstrous Tesla P100

The first full-fat GPU based on Nvidia’s all-new Pascal architecture is here. And while the Tesla P100 is aimed at professionals and deep learning systems rather than consumers, if consumer Pascal GPUs are anything like it—and there’s a very good chance they will be—gamers and enthusiasts alike are going to see a monumental boost in performance. The  Tesla P100 is the first full-size Nvidia GPU based on the TSMC 16nm FinFET manufacturing process—like AMD, Nvidia has been stuck using an older 28nm process since 2012—and the first to feature the second generation of High Bandwidth Memory (HBM2). Samsung began mass production of faster and higher capacity HBM2 memory back in January. While recent rumours suggested that both Nvidia and AMD wouldn’t use HMB2 this year due to it being prohibitively expensive—indeed, AMD’s recent roadmap suggests that its new Polaris GPUs won’t use HBM2 —Nvidia has at least taken the leap with its professional line of GPUs. The result of the P100’s more efficient manufacturing process, architecture upgrades, and HBM2 is a big boost in performance over Nvidia’s current performance champs like the Maxwell-based Tesla M40 and the Titan X/Quadro M6000. Nvidia says the P100 reaches 21.2 teraflops of half-precision (FP16) floating point performance, 10.6 teraflops of single precision (FP32), and 5.3 teraflops (1/2 rate) of double precision. By comparison, the Titan X and Tesla M40 offer just 7 teraflops of single precision floating point performance. Read 9 remaining paragraphs | Comments

Continue Reading:
Nvidia unveils first Pascal graphics card, the monstrous Tesla P100

Frontier customers still have problems three days after Verizon changeover

Former Verizon customers who were switched over to Frontier Communications on Friday are still reporting outages and other problems today. Verizon sold its FiOS and DSL networks in California, Florida, and Texas to Frontier, but the transition has not been smooth. On Friday, Frontier acknowledged a “technical issue” involving the integration of systems, but the company said it had been fixed by 9:30am ET that morning. That assurance seems to have been premature, with customers still reporting problems on DownDetector  and Twitter throughout the weekend and today. “Onto the 4th day without Internet or any working account…any timeframe guys? This is getting really crazy!” one California customer complained today. Read 5 remaining paragraphs | Comments

See more here:
Frontier customers still have problems three days after Verizon changeover

A spiritual successor to Aaron Swartz is angering publishers all over again

Aaron Swartz would be proud of Alexandra Elbakyan. The 27-year-old is at the center of a lawsuit brought by a leading science publisher that is labeling her a hacker and infringer. (credit: Courtesy of Alexandra Elbakyan) Stop us if you’ve heard this before: a young academic with coding savvy has become frustrated with the incarceration of information. Some of the world’s best research continues to be trapped behind subscriptions and paywalls. This academic turns activist, and this activist then plots and executes the  plan. It’s time to free information from its chains—to give it to the masses free of charge. Along the way, this research Robin Hood is accused of being an illicit, criminal hacker. This, of course, describes the tale of the late Aaron Swartz . His situation captured the Internet’s collective attention as the data crusader attacked research paywalls. Swartz was notoriously charged as a hacker for trying to free millions of articles from popular academic hub JSTOR. At age 26, he tragically committed suicide just ahead of his federal trial in 2013. But suddenly in 2016, the tale has new life.  The Washington Post   decries it as academic research’s Napster moment, and it all stems from a 27-year-old bioengineer turned Web programmer from Kazakhstan (who’s living in Russia). Just as Swartz did, this hacker is freeing tens of millions of research articles from paywalls, metaphorically hoisting a middle finger to the academic publishing industry, which, by the way, has again reacted with labels like “hacker” and “criminal.” Read 30 remaining paragraphs | Comments

More:
A spiritual successor to Aaron Swartz is angering publishers all over again

Maryland hospital group hit by ransomware

Baltimore’s Union Memorial is one of the hopitals hit by Samsam, an autonomous ransomware strain spread by exploiting JBoss servers. (credit: MedStar) Baltimore’s Union Memorial Hospital is the epicenter of a malware attack upon its parent organization, MedStar. Data at Union Memorial and other MedStar hospitals in Maryland have been encrypted by ransomware spread across the network, and the operators of the malware are offering a bulk deal: 45 bitcoins (about $18,500) for the keys to unlock all the affected systems. Reuters reports that the FBI issued a confidential urgent “Flash” message to the industry about the threat of Samsam on March 25, seeking assistance in fighting the ransomware and pleading, “We need your help!” The FBI’s cyber center also shared signature data for Samsam activity to help organizations screen for infections. But the number of potential targets remains vast, and the FBI was concerned that entire networks could fall victim to the ransomware. According to sources who spoke to the Baltimore Sun , the malware involved in MedStar’s outages is Samsam, also known as Samas and MSIL. The subject of a recent confidential FBI cyber-alert, Samsam is form of malware that uses well-known exploits in the JBoss application server and other Java-based application platforms. As Ars reported on Monday, Samsam uses exploits published as part of JexBoss , an open-source security and penetration testing tool for checking JBoss servers for misconfiguration. Read 3 remaining paragraphs | Comments

Original post:
Maryland hospital group hit by ransomware

New ransomware installs in boot record, encrypts hard disk [Updated]

Yet another harsh lesson for people who click things they shouldn’t. A new type of malware has been described, one that takes crypto-extortion to a new level. While most cryptographic ransomware variants are selective about what they encrypt—leaving the computer usable to make it easier for the victim to pay—this new entry targets the victim’s entire startup drive, encrypting the master file table (MFT). Called Petya, the new ransomware is just the latest ransomware deliberately tailored for victims within organizations with IT support instead of a broader audience.  As BleepingComputer’s Lawrence Abrams documented , Petya is currently being delivered via Dropbox links in e-mail messages targeting human resources departments at companies in Germany. The links are purported to be to an application to be installed by the HR employee. Running the attachment throws up a Windows alert; if the user clicks to continue, Petya is inserted into the master boot record (MBR) of the victim’s computer, and the system restarts. On reboot, the malware performs a fake Windows CHKDSK, warning “One of your disks contains errors and needs to be repaired,” Petya then flashes up an ASCII skull and crossbones on a red and white screen, announcing “You became victim of the PETYA RANSOMWARE!” Read 3 remaining paragraphs | Comments

Read More:
New ransomware installs in boot record, encrypts hard disk [Updated]

AT&T boosts data caps for home Internet and steps up enforcement

AT&T CEO Randall Stephenson. (credit: AT&T) AT&T today announced that it will increase its data caps—and expand enforcement—on home Internet service. As a result, more customers will have to pay $10 overage charges for each 50GB they use beyond their monthly limit, similar to Comcast’s data cap system. AT&T will also let customers upgrade to unlimited data for an extra $30 a month. This is only necessary for Internet-only customers. People who purchase both AT&T Internet and TV in a bundle will get unlimited home Internet data at no extra charge. That applies to bundles with either DirecTV satellite or AT&T’s wireline U-verse TV system. Previously, AT&T enforced a 150GB monthly cap on its DSL network. On May 23, AT&T will expand enforcement of caps to U-verse Internet service, which brings fiber closer to the home to boost speeds, and to “Gigapower,” its all-fiber service. Read 9 remaining paragraphs | Comments

More here:
AT&T boosts data caps for home Internet and steps up enforcement

Texas cops joke on Facebook about Ebola-tainted meth and net one arrest

A Central Texas police department issued a “breaking news alert” on Facebook, cautioning residents that meth and heroin in the Granite Shoals area “could be contaminated with the life-threatening disease Ebola .” Last week’s fake Facebook alert urged the public “NOT” to ingest those illicit drugs “until it has been properly checked for possible Ebola contamination” by the police department. The ploy netted one arrest, the Granite Shoals Police Department (GSPD)  reported on Facebook. A woman allegedly brought in her meth so the police department could analyze it for Ebola: This morning, we had our first concerned citizen notify the Granite Shoals Police Department (GSPD) that they believed their methamphetamine may be tainted. Our officers gladly took the item for further testing. Results and booking photos are pending. Please continue to report any possibly tainted methamphetamine or other narcotics to the Granite Shoals Police Department. Public health and safety continue to remain our #1 priority. ‪#‎notkidding‬ For the uninitiated, there are no Ebola-contaminated drugs. The alert was a hoax played on the citizens of Granite Shoals, a town of about 5,000 northwest of Austin. But the arrest of 29-year-old Chastity Eugina Hopson is not a joke. She was accused of possessing under a gram of a controlled substance. The police department described Hopson’s arrest as “the winner of the Facebook post challenge.” Read 2 remaining paragraphs | Comments

Follow this link:
Texas cops joke on Facebook about Ebola-tainted meth and net one arrest