White House Names Retired Air Force General As First Cyber Security Chief

An anonymous reader quotes a report from Reuters: The White House on Thursday named a retired U.S. Air Force general as the government’s first federal cyber security chief, a position announced eight months ago that is intended to improve defenses against hackers. Gregory Touhill’s job will be to protect government networks and critical infrastructure from cyber threats as federal chief information security officer, according to a statement. President Barack Obama announced the new position in February alongside a budget proposal to Congress asking for $19 billion for cyber security across the U.S. government. Touhill is currently a deputy assistant secretary for cyber security and communications at the Department of Homeland Security. He will begin his new role later this month, a source familiar with the matter said. Grant Schneider, who is the director of cyber security policy at the White House’s National Security Council, will be acting deputy to Touhill, according to the announcement. wiredmikey adds from a report via SecurityWeek.Com: The White House today announced that Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). Back in February, President Barack Obama unveiled a cybersecurity “national action plan” (CNAP) which called for an overhaul of aging government networks and a high-level commission to boost security awareness. As part of the plan, the White House said it would hire a federal CISO to direct cybersecurity across the federal government. General Touhill is currently the Deputy Assistant Secretary for Cybersecurity and Communications in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). The key hire comes at a time when the government needs cybersecurity talent more than ever. Earlier this week a report published by the U.S. House of Representatives Committee said the data breaches disclosed by the Office of Personnel Management (OPM) last year were a result of culture and leadership failures, and should not be blamed on technology. Read more of this story at Slashdot.

Follow this link:
White House Names Retired Air Force General As First Cyber Security Chief

Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

New submitter Kinwolf writes: Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove. Called Umbreon, after a Pokemon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. [It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.] According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn’t need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system. The reports adds: “The rootkit uses a trick to hijack the standard C library (libc) functions without actually installing any kernel objects. Umbreon hijacks these functions and forces other Linux executables to use its own libc-like library. This puts the rootkit in a man-in-the-middle position, capable of modifying system calls made by other programs and altering their output. The rootkit also creates a hidden Linux account that can be accessed via any authentication method supported by Linux, including SSH (Secure Shell). This account does not appear in files like /etc/passwd because the rootkit can modify the output of such files when read, the Trend Micro researchers said in a blog post. Umbreon also has a backdoor component called Espereon, named after another Pokemon character, that can establish a reverse shell to an attacker’s machine when a TCP packet with special field values are received on the monitored Ethernet interface of an affected device.” Read more of this story at Slashdot.

See more here:
Pokemon-Themed Umbreon Rootkit Targets Linux Systems On ARM and x86

Apple To Unveil ‘AirPods’ That Use Custom Bluetooth Chip

It’s no secret that Apple is planning to remove the headphone jack in its upcoming flagship smartphones. A new report from KGI Securities analyst Ming-Chi Kuo, which confirms rumors that Apple will indeed remove the headphone jack in the iPhone 7 to improve the device’s water resistance, suggests that Apple is developing earbuds called “AirPods” that will employ its own Bluetooth-like communication chip. Mac Rumors reports: “First and foremost, as has been rumored, Kuo suggests Apple is working on its own Bluetooth-like communication chip and its own Bluetooth headphones. Previous information suggests the Bluetooth chip will improve battery performance for longer battery life. The chip may be included in the wireless earbuds Apple has in development, which are said to be Bragi Dash-style wireless Bluetooth earbuds that are entirely wire free. The earbuds will be called “AirPods, ” based on trademark filings that have been discovered, and the product could be unveiled as early as September 7 alongside the iPhone 7. According to Kuo, Apple will sell its Apple-branded Bluetooth headphones alongside its Beats line of headphones, targeting the high-end market with the “AirPods” and the mid-range market with the Beats headphones. Kuo does not believe the company will package Bluetooth headphones with the iPhone 7. Instead, Apple is likely to ship the iPhone 7 with Lightning-based EarPods that feature a Lightning connector instead of a 3.5mm headphone jack.” Read more of this story at Slashdot.

Original post:
Apple To Unveil ‘AirPods’ That Use Custom Bluetooth Chip

Sunken British Submarine Found Off the Coast of Denmark

On April 10, 1940, British submarine HMS Tarpon and its crew of 50 were sent to Norway to intercept Nazi merchant vessels. They were was never heard from again. Now, after 76 years, the sub has finally been found. An investigation of the remarkably well preserved vessel shows it didn’t go down without a fight. Read more…

See more here:
Sunken British Submarine Found Off the Coast of Denmark

Microsoft Working On Skype Teams, Its Slack Competitor

Earlier this year, we heard rumors that Microsoft was interested in purchasing the popular team-chat app Slack for as much as $8 billion. The deal never happened, so naturally, Microsoft has decided to make a Slack-like app. Microsoft-centric news blog MSPowerUser reports: Meet Skype Teams. Skype Teams is going to be Microsoft’s take on messaging apps for teams. Skype Teams will include a lot of similar features which you’ll find on Slack. For example, Skype Teams will allow you to chat in different groups within a team, also known as “channels”. Additionally, users will be able to talk to each other via Direct Messages on Skype Teams. Skype Teams will also feature Threaded Conversations, which is a major feature that’s lacking on Slack. With Threaded Conversations, you can simply reply to a message on a channel by clicking on the reply button and anyone else can join the thread whenever they want — just like Facebook Comments, or Disqus Comments. Microsoft, of course, isn’t leaving out some of the core features of Skype on Skype Teams. Similar to Skype itself, teams will be able to make video calls in a channel or privately. To take this even further, the company is adding the ability to schedule online meetings, which can be quite useful for large teams. Read more of this story at Slashdot.

Visit link:
Microsoft Working On Skype Teams, Its Slack Competitor

Netflix Finds x265 20% More Efficient Than VP9

Reader StreamingEagle writes (edited): Netflix conducted a large-scale study comparing x264, x265 and libvpx (Google-owned VP9), under real-world conditions, and found that x265 encodes used 35.4% to 53.3% fewer bits than x264, and between 21.8% fewer bits than libvpx, when measured with Netflix’s advanced VMAF assessment tool. This was the first large-scale study to use real-world encoder implementations, and a large sample size of high quality, professional content.A Netflix spokesperson explained why they did the test in the first place; “We wanted to understand the current state of the x265 and libvpx codec implementations when used to generate non-realtime encodes optimized for OTT use case. It was important to see how the codecs performed when testing on a diverse set of premium content from our catalog. This test can help us find areas of improvement for the different codecs.” Read more of this story at Slashdot.

Read More:
Netflix Finds x265 20% More Efficient Than VP9

Warner Bros Issues Takedown For Own Website

An anonymous reader writes: In a case of sloppy automation run amok, Warner Bros’ copyright enforcement contractor — Vobile — issued takedown notices for legitimate distributors and Warner Bros’ own website, according to the BBC. It also asked the search giant to remove links to legitimate movie streaming websites run by Amazon and Sky, as well as Amazon-owned film database IMDB. Fortunately for them, Google chose to cut them a break and ignore those requests. Read more of this story at Slashdot.

Continued here:
Warner Bros Issues Takedown For Own Website

Penetration-Testing Distro Kali Linux 2016.2 Released

prisoninmate writes: What’s Kali Linux 2016.2? Well, it’s an updated Live ISO image of the popular GNU/Linux distribution designed for ethical hackers and security professionals who want to harden the security of their networks, which contains the latest software versions and enhancements for those who want to deploy the OS on new systems. It’s been quite some time since the last update to the official Kali Linux Live ISOs and new software releases are announced each day, which means that the packages included in the previous Kali Linux images are very old, and bugs and improvements are always implemented in the most recent versions of the respective security tools. Best of all, the new Kali Linux 2016.2 release comes in KDE, MATE, Xfce, LXDE, and Enlightenment E17 flavors. Their blog also points out that Kali recently appeared in an episode of Mr. Robot. Read more of this story at Slashdot.

Continue reading here:
Penetration-Testing Distro Kali Linux 2016.2 Released

New Carbon Nanotube Chip Outperforms Silicon Semiconductors

“Researchers at the University of Wisconsin-Madison are the first to have fabricated carbon nanotube transistors (CNTs) that outperform the current-density of conventional semiconductors like silicon and gallium arsenide, ” reports NanotechWeb. Slashdot reader wasteoid shares the site’s interview with one of the researchers: “When the transistors are turned on to the conductive state (meaning that current is able to pass through the CNT channel) the amount of current traveling through each CNT in the array approaches the fundamental quantum limit, ” he tells nanotechweb.org. “Since the CNTs conduct in parallel, and the packing density and conductance per tube are very high, the overall current density is very high too — at nearly twice that of silicon’s. The result is that these CNT array FETs have a conductance that is seven times higher than any previous reported CNT array field-effect transistor.” The research was funded in part by the U.S. Army and Air Force, as well as the National Science Foundation. “The implication here is that by replacing silicon with a CNT channel, it should be possible for us to make either a higher performing device or one that works at lower power.” In other news, Fujitsu announced this week that it’s joining an effort to release a 256-megabyte 55-nanometer carbon nanotube-based NRAM by 2018. Read more of this story at Slashdot.

Read More:
New Carbon Nanotube Chip Outperforms Silicon Semiconductors

Police Seize Two ‘Perfect Privacy’ VPN Servers

An anonymous reader writes from a report via TorrentFreak: VPN provider Perfect Privacy has informed its customers that two of its servers had been seized by the police in Rotterdam, Netherlands. Torrent Freak reports: “The authorities went directly to the hosting company I3D and the VPN provider itself wasn’t contacted by law enforcement. ‘Currently we have no further information since the responsible law enforcement agency did not get in touch with us directly, we were merely informed by our hoster, ‘ Perfect Privacy says. Despite losing control over two servers, Perfect Privacy assures its customers that no personally identifiable data is present on the seized hardware. Like many other VPNs, the company maintains a strict no-logging policy. ‘Since we are not logging any data there is currently no reason to believe that any user data was compromised, ‘ the VPN provider says. ‘When the Dutch police contact us with a subpoena, we work with them in a professional manner and ensure their request and our responses are in compliance with the Dutch law, ‘ I3D informs us. ‘We think with the affected customer as well, for example by making temporary capacity available so the customer does not suffer extended downtime during the investigation.'” Read more of this story at Slashdot.

Follow this link:
Police Seize Two ‘Perfect Privacy’ VPN Servers