North Korea suffers another Internet outage, hurls racial slur at Pres. Obama

With its latest response in the country’s on-going flap with the US, Agence France-Presse reports North Korea called President Barack Obama a “monkey” today. The racial slur comes after a recent double blow to North Korea: the country suffered yet another Internet outage Saturday and  Sony officially released The Interview , its fictional Kim Jong-Un assassination film, on Thursday. North Korea has fingered Washington for the outages and insists President Obama encouraged US theaters to re-embrace  The Interview.  “Obama always goes reckless in words and deeds like a monkey in a tropical forest,” a spokesman for North Korea’s National Defence Commission said in a statement published by the country’s official KCNA news agency. “If the US persists in American-style arrogant, high-handed, and gangster-like arbitrary practices despite repeated warnings, the US should bear in mind that its failed political affairs will face inescapable deadly blows.” An apparent DDoS attack knocked North Korea off the ‘net earlier this week, and it experienced another mass outage Saturday evening. This one even affected North Korea’s telecommunication networks, according to Chinese state-run Xinhua news agency (via AFP ). Read 2 remaining paragraphs | Comments

Visit site:
North Korea suffers another Internet outage, hurls racial slur at Pres. Obama

Watching lava fight with snow in Kamchatka

Depending on the context, volcanic eruptions are either terrifying or transfixing—sometimes both, but rarely neither. The opportunity to safely view the otherworldly spectacle of lava rarely fails to ignite a child-like, giddy wonder. The damage currently being done by a lava flows in the Cape Verde Islands , on the other hand, is heart-breaking. We study these things because they are both lovely and terrible. We want to see a lava flow spill across a snowfield out of curiosity, and we want to better understand the hazards surrounding snow-capped volcanoes out of caution. Benjamin Edwards of Dickinson College and Alexander Belousov and Marina Belousova of Russia’s Institute of Volcanology and Seismology got the opportunity to witness one of these events last year in Russia’s Kamchatka Peninsula. For nine months, Tolbachik spewed basaltic lava flows that ultimately covered 40 square kilometers, reaching as far as 17 kilometers from their source. The lava flows came in two flavors , known to geologists by Hawaiian names. (While frozen Kamchatka doesn’t exactly evoke coconuts and grass skirts, these lavas are similar to those of the Hawaiian volcanoes.) First there’s ‘a’a (pronounced as a staccato “AH-ah”), which ends up a chunky, blocky crumble of basalt. The other is pahoehoe (roughly “puh-HOY-hoy”, which is how volcanologists answer the phone), which flows more like thick batter and can solidify into a surface resembling a pile of ropes. Read 8 remaining paragraphs | Comments

See the article here:
Watching lava fight with snow in Kamchatka

Computer intrusion inflicts massive damage on German steel factory

A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by IDG News. The attackers took control of the factory’s production network through a spear phishing campaign, IDG said, citing a report published Wednesday by the German government’s Federal Office for Information Security. Once the attackers compromised the network, individual components or possibly entire systems failed. IDG reporter Loek Essers wrote: Due to these failures, one of the plant’s blast furnaces could not be shut down in a controlled manner, which resulted in “massive damage to plant,” the BSI said, describing the technical skills of the attacker as “very advanced.” The attack involved the compromise of a variety of different internal systems and industrial components, BSI said, noting that not only was there evidence of a strong knowledge of IT security but also extended know-how of the industrial control and production process. The incident is notable because it’s one of the few computer intrusions to cause physical damage. The Stuxnet worm that targeted Iran’s uranium enrichment program has been dubbed the world’s first digital weapon, destroying an estimated 1,000 centrifuges. Last week, Bloomberg News reported that a fiery blast in 2008 that hit a Turkish oil pipeline was the result of hacking , although it’s not clear if the attackers relied on physical access to computerized controllers to pull it off. The suspected sabotage of a Siberian pipeline in 1982 is believed to have used a logic bomb. Critics have long argued that much of the world’s factories and critical infrastructure aren’t properly protected against hackers. Read on Ars Technica | Comments

Visit link:
Computer intrusion inflicts massive damage on German steel factory

FBI claims North Korean involvement in Sony Pictures attack

The Federal Bureau of Investigation’s Washington press office has issued an update on the investigation into the cyber attack on Sony Pictures Entertainment, including the conclusion that North Korea was behind it. “As a result of our investigation, and in close collaboration with other US government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions,” the office said in a statement. However, the information cited by the FBI’s update may not be as conclusive as many would like. Other hints at the attribution were provided to news organizations off-the-record, but the FBI’s public statements are far from definitive. Read 9 remaining paragraphs | Comments

View original post here:
FBI claims North Korean involvement in Sony Pictures attack

AnandTech snapped up by parent company of Tom’s Hardware and LaptopMag

Purch, Inc. announced  on Wednesday that it had purchased AnandTech.com, ending the site’s 17-year run as an independent publication. Purch also owns a number of other long-running technology sites, including LaptopMag (founded as Laptop Magazine in 1991), Tom’s Hardware (founded 1996), and a handful of other offshoot tech publications. Purch says the acquisition will help it “dominate the tech expert and enthusiast market.” Anand Shimpi, founder and original editor-in-chief of the site, left his post for Apple in late August. Shimpi says he is “happy to see [AnandTech] end up with a partner committed to taking good care of the brand and its readers.” Current Editor-In-Chief Ryan Smith says the site has “grown by leaps and bounds over the past several years” but that it was “nearing what’s possible as an independent company.” Smith goes on to say that Purch values AnandTech’s exhaustive hardware testing and reviews, and that Purch would enable the site to grow “without compromising the quality that made us who we are today.” Under Smith, AnandTech has continued to run reviews of individual PC components and, less frequently, complete consumer products like laptops, phones, and operating systems. While the site misses Shimpi’s voice and expertise (and that of former mobile editor Brian Klug, who also left for Apple this year), its coverage and testing procedures continue to be deep and thorough, and they will hopefully remain that way post-acquisition. Read 1 remaining paragraphs | Comments

Read More:
AnandTech snapped up by parent company of Tom’s Hardware and LaptopMag

ICANN e-mail accounts, zone database breached in spearphishing attack

Unknown attackers used a spearphishing campaign to compromise sensitive systems operated by the Internet Corporation for Assigned Names and Numbers (ICANN), a coup that allowed them to take control of employee e-mail accounts and access personal information of people doing business with the group. ICANN, which oversees the Internet’s address system, said in a release published Tuesday that the breach also gave attackers administrative access to all files stored in its centralized zone data system , as well as the names, postal addresses, e-mail addresses, fax and phone numbers, user names, and cryptographically hashed passwords of account holders who used the system. Domain registries use the database to help manage the current allocation of hundreds of new generic top level domains (gTLDs) currently underway. Attackers also gained unauthorized access to the content management systems of several ICANN blogs. “We believe a ‘spear phishing’ attack was initiated in late November 2014,” Tuesday’s press release stated. “It involved email messages that were crafted to appear to come from our own domain being sent to members of our staff. The attack resulted in the compromise of the email credentials of several ICANN staff members.” Read 4 remaining paragraphs | Comments

Original post:
ICANN e-mail accounts, zone database breached in spearphishing attack

FCC expected to fine Sprint $105 million for overcharging customers

The Federal Communications Commission is reportedly on the verge of fining Sprint $105 million for cramming charges that brought complaints from tens of thousands of customers. The $105 million fine would match one levied on AT&T , which was accused of the same illegal practice. The US government has also sued T-Mobile  over cramming charges. The FCC has not confirmed the action against Sprint, but it was reported Monday in the National Journal  and yesterday in The   Wall Street Journal . “According to the enforcement action, which hasn’t been finalized, Sprint billed customers for third-party services it knew they hadn’t asked for and didn’t want,”  National Journal wrote. Read 2 remaining paragraphs | Comments

Read More:
FCC expected to fine Sprint $105 million for overcharging customers

Oakland cops disciplined 24 times for failing to turn on body-worn cameras

OAKLAND, Calif.—Over the last two years, the Oakland Police Department (OPD) has disciplined police officers on 24 occasions  for disabling or failing to activate body-worn cameras, newly released public records show. The City of Oakland did not provide any records prior to 2013, and the OPD did not immediately respond to Ars’ request for comment. The records show that on November 8, 2013 one officer was terminated after failing to activate his camera. Less than two weeks later, another resigned for improperly removing the camera from his or her uniform. However, most officers received minor discipline in comparison. The OPD has used Portable Digital Recording Devices (PDRDs) since late 2010 . According to the department’s  own policy , patrol officers are required to wear the cameras during a number of outlined situations, including detentions, arrests, and serving a warrant. At present, the city has about 700 officers . Read 9 remaining paragraphs | Comments

See original article:
Oakland cops disciplined 24 times for failing to turn on body-worn cameras

4 seconds of body cam video can reveal a biometric fingerprint, study says

Researchers say they can have computers examine body camera video footage and accurately identify a person wearing a body-mounted device in about four seconds, according to a recently released paper . The authors of the study had their software look at biometric characteristics like height, stride length, and walking speed to find the identity of the person shooting the footage. As they point out, this could have both positive and negative implications for civilians, law enforcement, and military personnel if they’re using body-mounted cameras. (It’s important to note that this research paper,  Egocentric Video Biometrics , was posted  to the arXiv repository . As such, it’s not considered a final, peer-reviewed work.) Using static, mounted cameras to match a person’s height and gait is a relatively common and well-researched vector for narrowing down the identity of people caught in videos. The authors said that, to get an accurate read of the biometric data of the person wearing the body cam, the footage has to be from a camera secured to one point on a person’s body (handheld cameras don’t work), and it has to have at least four seconds of video of the camera-wearer walking. Despite these restrictions, the two researchers from The Hebrew University in Jerusalem noted that once the necessary information had been gathered, “the identity of the user can be determined quite reliably from a few seconds of video.” “This is like a fingerprint,” Shmuel Peleg, one of the paper’s authors, told The Verge. “In order to find the person you have to have their fingerprint beforehand. But we can compare two people and say whether two videos were shot by the same person or not.” Read 4 remaining paragraphs | Comments

More:
4 seconds of body cam video can reveal a biometric fingerprint, study says

Samsung 850 EVO SSD takes its storage into the third dimension

Things have advanced quite a bit since our last thoroughly in-depth look at how solid state disks work, and Samsung has been one of the biggest companies leading the charge toward faster, denser solid state drives. Its 840 EVO was the first consumer SSD to use TLC NAND—that’s triple-level cell NAND, which can store three bits per memory cell instead of one or two. Now, Samsung’s newest consumer SSD takes NAND density a step further, stacking the memory cells on top of each other in a complex sandwich. The 850 EVO, formally announced this morning , uses 32-layer TLC “V-NAND,” where the “V” stands for “vertical.” As we discussed previously at the 2013 Consumer Electronics Show, Samsung is the only SSD manufacturer that makes ” the whole widget “—it’s the only vertically integrated OEM that builds every part of the SSDs it sells, including the NAND that actually holds the data. This gives the company a distinct advantage over other SSD manufacturers—most of whom source their NAND from Samsung. The 850 EVO is set to be released in four capacities: 120GB, 250GB, 500GB, and 1TB. These are all decimal measurements, not binary—so that “1TB” is properly one trillion bytes, not 1024GB (there are official IEC units for binary measurements, but I’ll eat glass before I start saying ” tebibyte “). The quoted numbers on Samsung’s site look pretty good for a consumer-level drive: max sequential read speeds of 540MB/s, max sequential write speeds of 520MB/s, and relatively high IOPS across a variety of read and write regimes. Read 5 remaining paragraphs | Comments

Read More:
Samsung 850 EVO SSD takes its storage into the third dimension