Scientists Build Smallest, Single Atom, Working Heat Engine

William Herkewitz, writing for Popular Mechanics: Physicists have just built the smallest working engine ever created. It’s a heat-powered motor barely larger than the single atom it runs on. Designed and build by a team of experimental physicists led by Johannes at the University of Mainz in Germany, the single atom engine is about as efficient as your car at transforming the changing temperature into mechanical energy. While scientists have previously created several micro-engines consisting of a mere 10, 000 particles, Johannes’s new engine blows these out of the water by paring down the machine to a singular atom housed in a nano-sized cone of electromagnetic radiation. The project is outlined today in the journal Science. “The engine has the same working principles as the well-known [combustion] car engine, ” Johannes says. It follows the same four strokes; expanding then cooling, contracting then heating.There’s some confusion here. The article says it’s a “four-stroke” engine. But as we know, a four-stroke engine consists of an intake stroke, a compression stroke, a power stroke, and an exhaust stroke — things that the engine in the article doesn’t seem to have. The article doesn’t mention how a single atom is able to mimic all the effects of a combustion engine. Update: 04/15 18:24 GMT by M :The article appears to have been updated for clarification. Read more of this story at Slashdot.

More:
Scientists Build Smallest, Single Atom, Working Heat Engine

Canadian Police Have Had BlackBerry’s Global Decryption Key Since 2010

Justin Ling and Jordan Pearson, reporting for Vice News: A high-level surveillance probe of Montreal’s criminal underworld shows that Canada’s federal policing agency has had a global encryption key for BlackBerry devices since 2010. The revelations are contained in a stack of court documents that were made public after members of a Montreal crime syndicate pleaded guilty to their role in a 2011 gangland murder. The documents shed light on the extent to which the smartphone manufacturer, as well as telecommunications giant Rogers, cooperated with investigators. According to technical reports by the Royal Canadian Mounted Police that were filed in court, law enforcement intercepted and decrypted roughly one million PIN-to-PIN BlackBerry messages in connection with the probe. The report doesn’t disclose exactly where the key — effectively a piece of code that could break the encryption on virtually any BlackBerry message sent from one device to another — came from. But, as one police officer put it, it was a key that could unlock millions of doors. Government lawyers spent almost two years fighting in a Montreal courtroom to keep this information out of the public record. Motherboard has published another article in which it details how Canadian police intercept and read encrypted BlackBerry messages. “BlackBerry to Canadian court: Please don’t reveal the fact that we backdoored our encryption, ” privacy and security activist Christopher Soghoian wittily summarizes the report. “Canadian gov: If you use Blackberry consumer encryption, you’re a “dead chicken”. Read more of this story at Slashdot.

More:
Canadian Police Have Had BlackBerry’s Global Decryption Key Since 2010

Man Deletes His Entire Company With One Line of Bad Code

Reader JustAnotherOldGuy writes: Marco Marsala appears to have deleted his entire company with one mistaken piece of code. By accidentally telling his computer to delete everything in his servers, the hosting provider has seemingly removed all trace of his company and the websites that he looks after for his customers. Marsala wrote on a Centos help forum, “I run a small hosting provider with more or less 1535 customers and I use Ansible to automate some operations to be run on all servers. Last night I accidentally ran, on all servers, a Bash script with a rm -rf foo/bar with those variables undefined due to a bug in the code above this line. All servers got deleted and the offsite backups too because the remote storage was mounted just before by the same script (that is a backup maintenance script).” The terse “rm -rf” is so famously destructive that it has become a joke within some computing circles, but not to this guy. Can this example finally serve as a textbook example of why you need to make offsite backups that are physically removed from the systems you’re archiving?”Rm -rf” would mark the block as empty, and unless the programmer hasn’t written anything new, he should be able to recover nearly all of the data. Something about the story feels weird. Read more of this story at Slashdot.

Original post:
Man Deletes His Entire Company With One Line of Bad Code

Microsoft Sues US Justice Department, Asks Court To Declare Secrecy Orders Unconstitutional

Todd Bishop, reporting for GeekWire: Microsoft is suing the U.S. Justice Department, asking a federal judge to declare unconstitutional a provision of U.S. law that lets the government keep Microsoft and other tech companies from informing their customers when investigators seek access to emails and other cloud data. The suit, filed moments ago in U.S. District Court in Seattle, targets Section 2705(b) of the Electronic Communications Privacy Act, which allows the government to seek and obtain secrecy orders preventing companies from letting their customers know when their data is the target of a federal warrant, subpoena or court order. Brad Smith, Microsoft’s president and chief legal officer, recently criticized the 30-year-old Electronic Communications Privacy Act as outdated during his testimony in February before the U.S. House Judiciary Committee — bringing along IBM’s first laptop, released the same year, to help illustrate his point.Microsoft argues that these “indefinite gag orders” violate the First Amendment rights to inform customers. Furthermore, the company adds that the law also “flouts” the Fourth Amendment, which requires the government to give a notice to the concerned person when his or her property is being searched or seized. “This is a First Amendment fight that needed to get picked and I’m glad Microsoft picked it. Just as in the real world with physical seizures, secrecy in digital seizures should be the exception and not the rule. Yet as the Microsoft complaint shows, it’s receiving thousands of law enforcement gag orders every year and more than two-thirds of them are eternal gags with no end data, ” said Kevin Bankston, internet freedom advocate and digital rights lawyer. “This is clearly unconstitutional, yet with so many orders per year, it makes sense to strike at the root with a facial challenge to the law rather than try and challenge them all individually. And based on previous similar cases around gag orders in national security cases, I think they’ll succeed in striking this overbroad law down.” Read more of this story at Slashdot.

See more here:
Microsoft Sues US Justice Department, Asks Court To Declare Secrecy Orders Unconstitutional

FBI Offers $25K Reward For Andy Warhol Campbell’s Soup Painting Heist

coondoggie quotes a report from Networkworld: The FBI today said it was offering a reward of up to $25, 000 for information leading to the recovery of seven Andy Warhol paintings stolen from the Springfield Art Museum in Springfield, Missouri. The collection, which has been owned by the Springfield Art Museum since 1985, is set number 31 of the Campbell’s Soup I collection and is valued at approximately $500, 000. Each painting in the screen print collection measures 37 inches high by 24.5 inches wide and framed in white frames, the FBI stated. The FBI says that seven of 10 Andy Warhol paintings Campbell’s Soup I collection, made in 1968, were taken. Since its inception, the FBI’s Art Crime Team has recovered more than 2, 650 items valued at over $150 million. Read more of this story at Slashdot.

View article:
FBI Offers $25K Reward For Andy Warhol Campbell’s Soup Painting Heist

Experts Crack Petya Ransomware, Enable Hard Drive Decryption For Free

Reader itwbennett writes: Petya appeared on researchers’ radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard drive’s master boot record (MBR), leaving infected computers unable to boot into the operating system. Now, security experts have devised a method that, while not exactly straightforward, allows users to recover data from computers infected with the ransomware without paying money to cyber criminals. Folks over at BleepingComputer have confirmed that the aforementioned technique works. Read more of this story at Slashdot.

Continue Reading:
Experts Crack Petya Ransomware, Enable Hard Drive Decryption For Free

Hacked Swedish Military Servers Used In Attacks On US Banks

Reader wiredmikey writes: Swedish military computers were hacked and used in an attack targeting major U.S. banks in 2013, the armed forces said on Monday. The attack knocked out the web sites of as many as 20 major U.S. banks and financial institutions, sometimes for several days. According to Swedish military spokesman Mikael Abramsson, a server in the Swedish defense system had a vulnerability which was exploited by hackers to carry out the attacks. At the time, the attack, which began in 2012 and continued for months, was one of the biggest ever reported. U.S. officials blamed Iran, suggesting it was in retaliation for political sanctions and several earlier cyberattacks on its own systems. Read more of this story at Slashdot.

Continued here:
Hacked Swedish Military Servers Used In Attacks On US Banks

Sophisticated Bribe Scheme Gets Malware Onto Chinese Antivirus Whitelist

An anonymous reader writes “Malware operators have bribed employees of a gaming company to bundle malware with their mobile apps.” Because the app-maker reportedly had a good-faith agreement with China’s biggest antivirus company, the apps were apparently whitelisted without a thorough check, according to Softpedia. They cite a report from Check Point which describes how attackers would later pretend to be shoppers on a popular Chinese site where pictures of the desired items are sent to sellers. “The seller would open the picture on a PC and become infected, ” writes Check Point, “because the Trojan would not be detected, ” and a subsequent request for a refund would deliver the login credentials for the seller’s payment account. “This example illustrates how important it is to avoid third-party stores and to instead at least rely on stores with more reliable security, ” argues Check Point. “But even still, stores like the App Store and Google Play aren’t immune to threats.” Read more of this story at Slashdot.

Read the original post:
Sophisticated Bribe Scheme Gets Malware Onto Chinese Antivirus Whitelist

WordPress.com Enables HTTPS Encryption For All Websites

On Friday, WordPress announced that it is bringing free HTTPS to all — “million-plus” — custom domains, essentially ramping up security on every blog and website. The publishing platform says it partnered with Let’s Encrypt project to implement HTTPS across such a voluminous number of sites. From the blog: For you, the users, that means you’ll see secure encryption automatically deployed on every new site within minutes. We are closing the door to un-encrypted web traffic (HTTP) at every opportunity. Read more of this story at Slashdot.

Continue reading here:
WordPress.com Enables HTTPS Encryption For All Websites

Facebook Messenger Hits 900M Monthly Active Users; To Get Snapchat-Like Features

Facebook, on Thursday, announced that Messenger now has 900 million monthly active users. On the sidelines, the company also announced a couple of Snapchat-like features it is bringing to its messaging client. Alex Health, reporting for Tech Insider: Facebook executive David Marcus said that Messenger will soon let you create profile usernames and web links. The links will look like “m.me/yourusername” and let anyone quickly add you in Messenger without looking up your Facebook account. The usernames and profile links will also be available to businesses, which are starting to use Messenger as a way to deliver customer support and let you buy things through chatting. Every Messenger account will also have a scannable QR code within the app, which is exactly how Snapchat lets people share their profiles with others. Snapchat also recently added the ability to share profiles on the web with public URLs. It is worth noting that earlier this year, Facebook-owned WhatsApp app reached 1 billion monthly active users. Read more of this story at Slashdot.

Read More:
Facebook Messenger Hits 900M Monthly Active Users; To Get Snapchat-Like Features