After 150 Years, Scientists Finally Know How Barnacle Glue Works

Over a century and a half ago, Charles Darwin first described the remarkable adhesive capabilities of barnacles. He couldn’t figure out how their natural superglue worked, though. And it took until now to finally unlock the barnacle glue’s mysteries . Read more…

Read the original post:
After 150 Years, Scientists Finally Know How Barnacle Glue Works

Electricity-Eating Bacteria Are Real and More Common Than We Thought

In the extreme world of bacteria, stunts such as living in hot springs or without oxygen are, like, totally unimpressive. But then there are bacteria that live off electricity, feeding directly on naked electrons. Even more surprisingly, scientists are finding that these bacteria are not even that rare . Read more…

View article:
Electricity-Eating Bacteria Are Real and More Common Than We Thought

More Forgotten Vials of Deadly Diseases Discovered

schwit1 (797399) writes FDA officials now admit that when they discovered six undocumented vials of smallpox in a facility in Maryland they also found 327 additional vials that contained dengue, influenza, and rickettsia. “FDA scientists said they have not yet confirmed whether the newly disclosed vials actually contained the pathogens listed on their labels. The agency is conducting a nationwide search of all cold storage units for any other missing samples. Investigators destroyed 32 vials containing tissue samples and a non-contagious virus related to smallpox. Several unlabeled vials were sent to the Centers for Disease Control and Prevention for testing and the remaining 279 samples were shipped to the Department of Homeland Security for safekeeping.” The FDA’s deputy director is quoted with what might be the understatement of the year. “The reasons why these samples went unnoticed for this long is something we’re actively trying to understand.” Read more of this story at Slashdot.

See the article here:
More Forgotten Vials of Deadly Diseases Discovered

Breaches Exposed 22.8 Million Personal Records of New Yorkers

An anonymous reader writes Attorney General Eric T. Schneiderman issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. The report reveals that the number of reported data security breaches in New York more than tripled between 2006 and 2013. In that same period, 22.8 million personal records of New Yorkers have been exposed in nearly 5, 000 data breaches, which have cost the public and private sectors in New York upward of $1.37 billion in 2013. The demand on secondary markets for stolen information remains robust. Freshly acquired stolen credit card numbers can fetch up to $45 per record, while other types of personal information, such as Social Security numbers and online account information, can command even higher prices. Read more of this story at Slashdot.

View article:
Breaches Exposed 22.8 Million Personal Records of New Yorkers

Leaked Build of Windows 9 Shows Start Menu Return

Billly Gates writes A leaked alpha of Windows 9 has been brewing on the internet. Today a screenshot shows what MS showed us at BUILD which includes a start menu with additional tiny tiles for things like people, calendar, pc settings, and news etc. “The new hybridized Start menu appears to be part of build 9788, which was compiled on July 4. While no one seems to have leaked the ISOs for build 9788 yet, the general consensus seems to be that the build does indeed exist somewhere at Microsoft — and that it might also feature Windows NT kernel version 6.4 (i.e. the complete version number is 6.4.9788). The screenshots show a Windows 8.1 Pro watermark, but this isn’t unusual for a very early alpha of a new build of Windows. If this really is the next version of the Windows NT kernel, then we’re most likely looking at an early build of Windows 9 (Threshold) rather than Windows 8.2.” Read more of this story at Slashdot.

Read this article:
Leaked Build of Windows 9 Shows Start Menu Return

Source Code Leaked For Tinba Banking Trojan

msm1267 (2804139) writes “The source code for Tinba, known as the smallest banker Trojan in circulation, has been posted on an underground forum. Researchers say that the files turned out to be the source code for version one of Tinba, which was identified in 2012, and is the original, privately sold version of the crimeware kit. Tinba performs many of the same malicious functions as other banker Trojans, injecting itself into running processes on an infected machine, including the browser and explorer.exe. The malware is designed to steal financial information, including banking credentials and credit-card data and also makes each infected computer part of a botnet. Compromised machines communicate with command-and-control servers over encrypted channels. Tinba got its name from an abbreviation of “tiny banker, ” and researchers say that it’s only about 20 KB in size.” Read more of this story at Slashdot.

See the original post:
Source Code Leaked For Tinba Banking Trojan

New Technology Uses Cellular Towers For Super-Accurate Weather Measurements

Iddo Genuth (903542) writes “Israeli scientists from the Tel Aviv University perfected a method for using cell phone service towers’ microwave emitters to measure rain and snow and even (for the first time ) detect fog with great accuracy over vast areas in real time. The research team members have analyzed endless amounts of raw cellular data and developed more accurate ways to measure meteorological information and added more parameters that they can now measure using their growing database. When combined with existing meteorological monitoring technologies such as radars and local ground based weather stations, the results show unprecedented level of accuracy that can give better and further weather forecast as well as special warnings about upcoming floods, fog and hail which can affect both people and crop production.” Read more of this story at Slashdot.

Originally posted here:
New Technology Uses Cellular Towers For Super-Accurate Weather Measurements

Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld Scanners

wiredmikey (1824622) writes “China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world. According to security firm TrapX, the attack begins at a Chinese company that provides hardware and software for handheld scanners used by shipping and logistics firms worldwide to inventory the items they’re handling. The Chinese manufacturer installs the malware on the Windows XP operating systems embedded in the devices. Experts determined that the threat group targets servers storing corporate financial data, customer data and other sensitive information. A second payload downloaded by the malware then establishes a sophisticated C&C on the company’s finance servers, enabling the attackers to exfiltrate the information they’re after. The malware used by the Zombie Zero attackers is highly sophisticated and polymorphic, the researchers said. In one attack they observed, 16 of the 48 scanners used by the victim were infected, and the malware managed to penetrate the targeted organization’s defenses and gain access to servers on the corporate network. Interestingly, the C&C is located at the Lanxiang Vocational School, an educational institution said to be involved in the Operation Aurora attacks against Google, and which is physically located only one block away from the scanner manufacturer, TrapX said.” Read more of this story at Slashdot.

Taken from:
Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld Scanners

Peer Review Ring Broken – 60 Articles Retracted

blackbeak (1227080) writes The Washington Post reports that the Journal of Vibration and Control’s review system was hijacked by a ring of reviewers. 60 articles have been retracted as a result. “After a 14-month investigation, JVC determined the ring involved “aliases” and fake e-mail addresses of reviewers — up to 130 of them — in an apparently successful effort to get friendly reviews of submissions and as many articles published as possible by Chen and his friends.’On at least one occasion, the author Peter Chen reviewed his own paper under one of the aliases he created, ‘ according to the SAGE announcement.” Read more of this story at Slashdot.

View post:
Peer Review Ring Broken – 60 Articles Retracted