World’s Only Sample of Metallic Hydrogen Has Been Lost

New submitter drunkdrone quotes a report from International Business Times: A piece of rare meta poised to revolutionize modern technology and take humans into deep space has been lost in a laboratory mishap. The first and only sample of metallic hydrogen ever created on earth was the rarest material on the planet when it was developed by Harvard scientists in January this year, and had been dubbed “the holy grail of high pressure physics.” The metal was created by subjecting liquid hydrogen to pressures greater that those at the center of the Earth. At this point, the molecular hydrogen breaks down and becomes an atomic solid. Scientists theorized that metallic hydrogen — when used as a superconductor — could have a transformative effect on modern electronics and revolutionize medicine, energy and transportation, as well as herald in a new age of consumer gadgets. Sadly, an attempt to study the properties of metallic hydrogen appears to have ended in catastrophe after one of the two diamonds being used like a vice to hold the tiny sample was obliterated. The metal was being held between two diamonds at a pressure of around 71.7 million pounds per square inch — more than a third greater than at the Earth’s core. According to The Independent, one of these diamonds shattered while the sample was being measured with a laser, and the metal was lost in the process. Read more of this story at Slashdot.

Original post:
World’s Only Sample of Metallic Hydrogen Has Been Lost

Russia Arrests Top Kaspersky Hacking Investigator for Treason

Under mysterious circumstances, Russia has arrested Ruslan Stoyanov, head of computer incidents investigations unit at the huge cybersecurity firm at Kaspersky. He’s been charged with treason. Read more…

Original post:
Russia Arrests Top Kaspersky Hacking Investigator for Treason

Iran censored porn so hard it broke the internet in Hong Kong

If you had trouble visiting explicit websites in the last few days, the fault may have come from an unexpected source: Iran. According to a new report from The Verge , a recent attempt to block pornography websites in the country’s borders hampered access in Russia, Hong Kong and other nations in the region. What happened? Apparently, Iran’s national telecom abused the honor system. The issue is an ancient, insecure and essential part of the internet called Border Gateway Protocol. It’s a commonly used method service provider use to exchange and distribute routing information — the insturctions your computer uses to find web addresses. The only problem is that BGP kind of works on the honor system : there’s no standard in place to stop someone from putting forth a false routing path and taking a site down. It happened in 2008, when Pakistan accidental blocked YouTube . Turkey once filtered the majority of traffic from Amazon, Microsoft, CNN and other sites through its own servers. When Iran used BGP to spoof traffic away from a few hundred porn sites, the false routes spread — blocking users as far away as Hong Kong. It’s not clear if it’s an honest mistake, or if the wider blocking was intentional, but it also wasn’t a careful solution. Iran’s networks are a major routing center for the region, and it’s easy for malicious or false BGP data to spread from Iran’s sources. The issue is mostly resolved down, with exterior networks blocking the false routes — but the event serves as a good reminder: the internet is fragile, and open to attack. Browse carefully, my friends. Source: Verge

Excerpt from:
Iran censored porn so hard it broke the internet in Hong Kong

Bigger Than Mirai: Leet Botnet Delivers 650 Gbps DDoS Attack

Reader Mark Wilson writes: Earlier in the year, a huge DDoS attack was launched on Krebs on Security. Analysis showed that the attack pelted servers with 620 Gbps, and there were fears that the release of the Mirai source code used to launch the assault would lead to a rise in large-scale DDoS attacks. Welcome Leet Botnet. In the run-up to Christmas, security firm Imperva managed to fend off a 650 Gbps DDoS attack. But this was nothing to do with Mirai; it is a completely new form of malware, but is described as “just as powerful as the most dangerous one to date”. The concern for 2017 is that “it’s about to get a lot worse”. Clearly proud of the work put into the malware, the creator or creators saw fit to sign it. Analysis of the attack showed that the TCP Options header of the SYN packets used spelled out l33t, hence the Leet Botnet name. Read more of this story at Slashdot.

See more here:
Bigger Than Mirai: Leet Botnet Delivers 650 Gbps DDoS Attack

Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

schwit1 quotes a report from Reuters: A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday. The malware was able to retrieve communications and some locational data from infected devices, intelligence that would have likely been used to strike against the artillery in support of pro-Russian separatists fighting in eastern Ukraine, the report from cyber security firm CrowdStrike found. The hacking group, known commonly as Fancy Bear or APT 28, is believed by U.S. intelligence officials to work primarily on behalf of the GRU, Russia’s military intelligence agency. The implant leveraged a legitimate Android application developed by a Ukrainian artillery officer to process targeting data more quickly, CrowdStrike said. Its deployment “extends Russian cyber capabilities to the front lines of the battlefield, ” the report said, and “could have facilitated anticipatory awareness of Ukrainian artillery force troop movement, thus providing Russian forces with useful strategic planning information.” Read more of this story at Slashdot.

Continue Reading:
Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

Russian Hackers Stole $5 Million Per Day From Advertisers With Bots and Fake Websites

Russian hackers have used fake websites and bots to steal millions of dollars from advertisers. According to researchers, the fraud has siphoned more than $180 million from the online ad industry. CNNMoney reports: Dubbed “Methbot, ” it is a new twist in an increasingly complex world of online crime, according to White Ops, the cybersecurity firm that discovered the operation. Methbot, so nicknamed because the fake browser refers to itself as the “methbrowser, ” operates as a sham intermediary advertising ring: Companies would pay millions to run expensive video ads. Then they would deliver those ads to what appeared to be major websites. In reality, criminals had created more than 250, 000 counterfeit web pages no real person was visiting. White Ops first spotted the criminal operation in October, and it is making up to $5 million per day — by generating up to 300 million fake “video impressions” daily. According to White Ops, criminals acquired massive blocks of IP addresses — 500, 000 of them — from two of the world’s five major internet registries. Then they configured them so that they appeared to be located all over the United States. They built custom software so that computers (at those legitimate data centers) acted like real people viewing those ads. These “people” even appeared to have Facebook accounts (they didn’t), so that premium ads were served. Hackers fooled ad fraud blockers because they figured out how to build software that mimicked a real person who only surfed during the daytime — using the Google Chrome web browser on a Macbook laptop. Read more of this story at Slashdot.

Read More:
Russian Hackers Stole $5 Million Per Day From Advertisers With Bots and Fake Websites

Dailymotion Hack Exposes Millions of Accounts

Millions of accounts associated with video sharing site Dailymotion, one of the biggest video platforms in the world, have been stolen. From a ZDNet report: A hacker extracted 85.2 million unique email addresses and usernames from the company’s systems, but about one-in-five accounts — roughly 18.3 million– had associated passwords, which were scrambled with the bcrypt hashing function, making the passwords difficult to crack. The hack is believed to have been carried out on October 20 by a hacker, whose identity isn’t known, according to LeakedSource, a breach notification service, which obtained the data. Dailymotion launched in 2005, and is currently the 113rd most visited website in the world, according to Alexa rankings. Read more of this story at Slashdot.

Read More:
Dailymotion Hack Exposes Millions of Accounts

Hackers Steal $31 Million at Russia’s Central Bank

The Bank of Russia has confirmed Friday that hackers have stolen 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank. Central bank security executive Artiom Sychev said it could’ve been much worse as hackers tried to steal 5 billion rubles, but the central banking authority managed to stop them. CNNMoney reports: Hackers also targeted the private banks and stole cash from their clients, the central bank reported. The central bank did not say when the heist occurred or how hackers moved the funds. But so far, the attack bears some similarity to a recent string of heists that has targeted the worldwide financial system. Researchers at the cybersecurity firm Symantec have concluded that the global banking system has been under sustained attack from a sophisticated group — dubbed “Lazarus” — that has been linked to North Korea. But it’s unclear who has attacked Russian banks this time around. Earlier Friday, the Russian government claimed it had foiled an attempt to erode public confidence in its financial system. Russian’s top law enforcement agency, the FSB, said hackers were planning to use a collection of computer servers in the Netherlands to attack Russian banks. Typically, hackers use this kind of infrastructure to launch a “denial of service” attack, which disrupts websites and business operations by flooding a target with data. The FSB said hackers also planned to spread fake news about Russian banks, sending mass text messages and publishing stories on social media questioning their financial stability and licenses to operate. Read more of this story at Slashdot.

See more here:
Hackers Steal $31 Million at Russia’s Central Bank

Royal Navy Giving Up Anti-Ship Missiles, Will Rely On Cannons For Naval Combat

cold fjord writes: It will soon be a bit more difficult for Britain’s Royal Navy to rule the waves as it gives up anti-ship missiles as a result of budget cuts. That will force the Royal Navy to go “old school” and rely upon naval gunfire for ship-to-ship combat. Cannon fire as the primary means of ship-to-ship combat has been largely obsolete since the 1950s following the invention of guided missiles in World War 2. Prior to that, cannon fire had been the primary means of naval combat for hundreds of years. Although the Royal Navy ranged up to 16″ guns on battleships, the largest gun currently in active service is a 4.5″ gun. That will leave the Royal Navy unable to engage targets beyond approximately 17 miles / 27 km, whereas Harpoon missiles provide an 80 mile / 130 m range. The loss of anti-ship missile capability will begin in 2018 and may last for 10 years for warships, and 2 years for helicopters. The Sun quotes a naval insider who said: “It’s like Nelson saying, ‘don’t worry, I don’t need canons, we’ve got muskets.'” The loss of missile capability heaps more misfortune upon a naval force that recently has seen its available frontline combat force drop to an unprecedented 24 warships. Read more of this story at Slashdot.

Continue Reading:
Royal Navy Giving Up Anti-Ship Missiles, Will Rely On Cannons For Naval Combat

Latest WikiLeaks Reveal Suggests Facebook Is Too Close For Comfort With Clinton

MojoKid writes: As we quickly approach the November 8th elections, email leaks from the Clinton camp continue to loom over the presidential candidate. The latest data dump from WikiLeaks shines a light on emails between Hillary Clinton’s campaign manager, John Podesta and Facebook Chief Operating Officer, Sheryl Sandberg. In one email exchange, dated June 6th, 2015, Sandberg expresses her desire for Clinton to become president, writing to Podesta, “And I still want HRC to win badly. I am still here to help as I can.” While that was a private exchange, Sandberg also made her zest for seeing Clinton as the 45th President of the United States publicly known in a Facebook post on July 28th of this year. None of that is too shocking when you think about it. Sandberg has every right to endorse whichever candidate she wants for president. However, a later exchange between Sandberg and Podesta showed that Mark Zuckerberg was looking to get in on the action a bit, and perhaps curry favor with Podesta and the Clinton camp in shaping public policy. Donald Trump has long claimed that Clinton is too cozy with big businesses, and one cannot dismiss the fact that Facebook has a global user base of 1.7 billion users. When you toss in the fact that Facebook came under fire earlier this year for allegedly suppressing conservative news outlets in the Trending News bar, questions begin to arise about Facebook’s impartiality in the political race. The report also notes that Sandberg is at the top of the list when it comes to picks for Treasury Secretary, if Clinton wins the election. In an interview with Politico, David Segal, executive director for Demand Progress, said “[Sandberg] is a proxy for this growing problem that is the hegemony of five to ten major Silicon Valley platforms.” Lina Khan, a fellow with the Open Markets Program at the New American think tank adds: “If a senior Cabinet member is from Facebook, at worst it could directly interfere [in antitrust actions]. But even in the best of cases there’s a real worry that it will have a chilling effect on good-faith antitrust efforts to scrutinize potential anti-competitive implications of dominant tech platforms.” Read more of this story at Slashdot.

Read More:
Latest WikiLeaks Reveal Suggests Facebook Is Too Close For Comfort With Clinton