Luxury Liner SS United States Cannot Be Put Back In Service

tomhath writes: Once the fastest ocean liner ever built, the SS United States has been mothballed for almost 50 years. An ambitious project to refurbish the SS United States as a luxury liner has been abandoned due to insurmountable technical and commercial obstacles. Plan B, to turn it into a floating hotel/convention center, might go forward. Miami Herald provides some history of the SS United States in its report: “The iconic 1950s vessel, which was bigger than the Titanic and once carried celebrities across the Atlantic Ocean, was set for a $700 million overhaul by the Los Angeles-based luxury line, which also has offices in Miami. The SS United States was decommissioned in 1969 and has been gutted and docked in Philadelphia for two decades on the Delaware River. On its maiden voyage in 1952, the ship traversed the Atlantic in three days, 10 hours and 42 minutes — a record it held until 1990.” Read more of this story at Slashdot.

View original post here:
Luxury Liner SS United States Cannot Be Put Back In Service

New Attack Steals SSNs, E-mail Addresses, and More From HTTPS Pages

Security researchers at KU Leuven have discovered an attack technique, dubbed HEIST (HTTP Encrypted Information can be Stolen Through TCP-Windows), which can exploit an encrypted website using only a JavaScript file hidden in a maliciously crafted ad or page. ArsTechnica reports: Once attackers know the size of an encrypted response, they are free to use one of two previously devised exploits to ferret out the plaintext contained inside it. Both the BREACH and the CRIME exploits are able to decrypt payloads by manipulating the file compression that sites use to make pages load more quickly. HEIST will be demonstrated for the first time on Wednesday at the Black Hat security conference in Las Vegas. “HEIST makes a number of attacks much easier to execute, ” Tom Van Goethem, one of the researchers who devised the technique, told Ars. “Before, the attacker needed to be in a Man-in-the-Middle position to perform attacks such as CRIME and BREACH. Now, by simply visiting a website owned by a malicious party, you are placing your online security at risk.” Using HEIST in combination with BREACH allows attackers to pluck out and decrypt e-mail addresses, social security numbers, and other small pieces of data included in an encrypted response. BREACH achieves this feat by including intelligent guesses — say, @gmail.com, in the case of an e-mail address — in an HTTPS request that gets echoed in the response. Because the compression used by just about every website works by eliminating repetitions of text strings, correct guesses result in no appreciable increase in data size while incorrect guesses cause the response to grow larger. Read more of this story at Slashdot.

See the article here:
New Attack Steals SSNs, E-mail Addresses, and More From HTTPS Pages

Mint 18 review: “Just works” Linux doesn’t get any better than this

We tested the latest Mint on this beauty: Dell’s XPS 13 Developer’s Edition (2016). (credit: Scott Gilbertson) The newly released Mint 18 is a major upgrade. Not only has the Linux Mint project improved Mint’s dueling desktops (Cinnamon and MATE), but the group’s latest work impacts all  underlying systems. With Mint 18, Linux Mint has finally moved its base software system from Ubuntu 14.04 to the new Ubuntu 16.04 . Upgrading to the latest long-term support (LTS) release of Ubuntu means, as with the Mint 17.x series, the Mint 18.x release cycle is now locked to its base for two years. Rather than tracking alongside Ubuntu, Mint 18 and all subsequent releases will stick with Ubuntu 16.04. Mint won’t necessarily get as out of date as Ubuntu LTS releases tend to by the end of their two-year cycle, but this setup does mean nothing major is going to change for quite a while. If the Mint 17.x release series is anything to judge by, that’s a good thing. Stability allows Mint to focus on its own projects rather than spending development time creating patches for every Ubuntu update. That should be especially good news for the 18.x series since Ubuntu plans to make some major changes in the next two years: moving to a new display server (Mir) and updating its own Unity desktop to Unity 8 are chief among the priorities. Many of those initiatives will impact components that affect downstream users like Mint. Read 40 remaining paragraphs | Comments

Originally posted here:
Mint 18 review: “Just works” Linux doesn’t get any better than this

Bitcoin Exchange Bitfinex Says It Was Hacked, Roughly $60M Stolen

An anonymous reader quotes a report from Reuters: Hong Kong-based digital currency exchange Bitfinex said late on Tuesday it has suspended trading on its exchange after it discovered a security breach, according to a company statement on its website. The company said it has also suspended deposits and withdrawals of digital currencies from the exchange. “We are investigating the breach to determine what happened, but we know that some of our users have had their bitcoins stolen, ” the company said. “We are undertaking a review to determine which users have been affected by the breach. While we conduct this initial investigation and secure our environment, bitfinex.com will be taken down and the maintenance page will be left up.” The company said it has reported the theft to law enforcement. It said it has not yet determined the value of digital currencies stolen from customer accounts. CoinDesk reports that the company confirmed roughly 120, 000 BTC (more than $60 million) has been stolen via social media. “In response, bitcoin prices fell to $560.16 by 19:30 UTC, $530 by 23:30 and $480 at press time, CoinDesk USD Bitcoin Price Index (BPI) data reveals, ” reports CoinDesk. “This price was roughly 20% lower than the day’s opening of $607.37 and 27% below the high of $658.28 reached on Saturday, July 30th, when the digital currency began pushing lower.” Read more of this story at Slashdot.

Read the original post:
Bitcoin Exchange Bitfinex Says It Was Hacked, Roughly $60M Stolen

8TB disks seem to work pretty well, HGST still impressive

(credit: Alpha six ) Cloud backup and storage provider Backblaze has published its latest batch of drive reliability data. The release covers failure information for the 70,000 disks that the company uses to store some 250PB of data. This is the first quarter that Backblaze has been using a reasonable number of new 8TB disks: 45 from HGST and 2720 from Seagate. Drives from both companies are showing comparable annualized failure rates: 3.2 percent for HGST, 3.3 percent for Seagate. While the smaller HGST drives show better reliability, with annualized failure rates below one percent for the company’s 4TB drives, the figures are typical for Seagate, which Backblaze continues to prefer over other alternatives due to Seagate’s combination of price and availability. Annualized failure rates for all of Backblaze’s drives. (credit: Backblaze) But it’s still early days for the 8TB drives. While evidence for the phenomenon is inconclusive, hard drive reliability is widely assumed to experience a “bathtub curve” when plotting its failure rate against time: failure rates are high when the drives are new (due to “infant mortality” caused by drives that contain manufacturing defects) and when the drives reach their expected lifetime (due to the accumulated effects of wear and tear), with a period of several years of low failure rates in the middle. If the bathtub theory is correct, Backblaze’s assortment of 8TB drives should suffer fewer failures in the future. Read 1 remaining paragraphs | Comments

Read More:
8TB disks seem to work pretty well, HGST still impressive

Hacker Selling Data For 200 Million Yahoo Users On The Dark Web

An anonymous reader writes from a report via Softpedia: A listing was published today on TheRealDeal Dark Web marketplace claiming to be offering data on over 200 million Yahoo users, sold by the same hacker that was behind the LinkedIn, Tumblr, MySpace, and VK data dumps. In statements to Softpedia, Yahoo said it was investigating the breach, but based on the seller’s reputation, it is very likely the data is authentic. The data is up for sale for 3 Bitcoin (approximately ~$1, 800), and based on the sample the hacker provided, the data dump includes details such as usernames, MD5-hashed passwords, and dates of birth for all users. For some records, there is also a backup email address, country of origin, and ZIP code for U.S. users. The hacker, called Peace, has also told Softpedia that he previously made $50, 000 from the LinkedIn breach alone, and over $65, 000 in total from all breaches. Read more of this story at Slashdot.

See the original article here:
Hacker Selling Data For 200 Million Yahoo Users On The Dark Web

Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

An anonymous reader writes: Washington State has filed a lawsuit against Comcast to the sum of $100 million, accusing Comcast of “engaging in a pattern of deceptive practices.” It claims that Comcast’s documents reveal a pattern of illegally deceiving its own customers for profit. KOMO News reports: “The lawsuit (PDF) alleges more than 1.8 million individual violations of the Washington Consumer Protection Act. The Attorney General’s Office says 500, 000 Washington consumers were affected. The lawsuit also accuses Comcast of violating the Consumer Protection Act to all of its nearly 1.2 million Washington subscribers due to its deceptive ‘Comcast Guarantee, ‘ Ferguson said. The lawsuit accuses Comcast of misleading 500, 000 Washington consumers and deceiving them into paying at least $73 million in subscription fees over the last five years for what the attorney general says is a a near-worthless protection plan. Customers who sign up for Comcast’s Service Protection Plan pay a $4.99 monthly fee to avoid being charged if a Comcast technician visits their home. But the plan did not cover wiring inside a wall, the lawsuit says. The Attorney General Office says 75 percent of the time, customers who contacted Comcast were told the plan covered inside wiring. Customer service scripts, which the Attorney General’s Office said it obtained during its investigation, told Comcast representatives to say that the plan covers calls ‘related to inside wiring’ and ‘wiring inside your home.'” According to KOMO News, the lawsuit is seeking more than $73 million in restitution to pay back Service Protection Plan subscriber payments; full restitution for all service calls that applied an improper resolution code, estimated to be at least $1 million; removal of improper credit checks from the credit reports of more than 6, 000 customers; up to $2, 000 per violation of the Consumer Protection Act; and that Comcast clearly disclose the limitations of its Service Protection Plan in advertising and through its representatives, correct improper service codes that should not be chargeable and implement a compliance procedure for improper customer credit checks. Read more of this story at Slashdot.

Read More:
Washington State Sues Comcast For $100M Over ‘Pattern of Deceptive Practices’

Windows 10 one year later: The Anniversary Update

Last year’s  Windows 10 release  was unlike any Windows release I’ve ever used before, and I’ve used most of them. Almost every Windows release to-date had a sort of unfinished vibe that reflects the product’s history. Parts of the operating system developed long ago have almost fossilized, being preserved verbatim in each subsequent release. It gives the entire operating system an overall incomplete feel. Take Control Panel as an example. The oldest parts of Control Panel use dialogs for each group of settings, as this mouse window exemplifies. Those tabs are extensible by third parties. That SetPoint Settings tab, for example, launches Logitech’s mouse app for configuring the various buttons on my Performance MX mouse. New systems to this very day continue to use this extensibility; most Windows laptops will have a tab to configure their touchpad. Read 92 remaining paragraphs | Comments

Read More:
Windows 10 one year later: The Anniversary Update

Open Source Gardening Robot ‘FarmBot’ Raises $560,000

Slashdot reader Paul Fernhout writes: FarmBot is an open-source gantry-crane-style outdoor robot for tending a garden bed. The project is crowdfunding a first production run and has raised US$561, 486 of their US$100, 000 goal — with one day left to go… The onboard control system is based around a Raspberry Pi 3 computer and an Arduino Mega 2560 Microcontroller. Many of the parts are 3D printable. Two years ago Slashdot covered the genesis of this project, describing its goal as simply “to increase food production by automating as much of it as possible.” Read more of this story at Slashdot.

Continue reading here:
Open Source Gardening Robot ‘FarmBot’ Raises $560,000

Malvertising Campaign Infected Thousands of Users Per Day For More Than a Year

An anonymous reader writes from a report via Softpedia: Since the summer of 2015, users that surfed 113 major, legitimate websites were subjected to one of the most advanced malvertising campaigns ever discovered, with signs that this might have actually been happening since 2013. Infecting a whopping 22 advertising platforms, the criminal gang behind this campaign used complicated traffic filtering systems to select users ripe for infection, usually with banking trojans. The campaign constantly pulled between 1 and 5 million users per day, infecting thousands, and netting the crooks millions each month. The malicious ads, according to this list, were shown on sites like The New York Times, Le Figaro, The Verge, PCMag, IBTimes, Ars Technica, Daily Mail, Telegraaf, La Gazetta dello Sport, CBS Sports, Top Gear, Urban Dictionary, Playboy, Answers.com, Sky.com, and more. Read more of this story at Slashdot.

More:
Malvertising Campaign Infected Thousands of Users Per Day For More Than a Year