Spike TV orders 10-episode series for Red Mars written by Babylon 5 creator

According to sources speaking to Variety , Kim Stanley Robinson’s Red Mars has been green-lighted for a 10-episode TV adaptation on Spike TV. Each episode will be an hour long, and J. Michael Straczynski, creator and writer of Babylon 5 and co-creator of Sense8 will serve as Red Mars ’ writer, co-executive producer, and showrunner. Vince Gerardis, co-executive producer of Game of Thrones , will also serve as executive producer on Red Mars with Straczynski. Robinson will reportedly be an on-the-set consultant. The Red Mars project has been on Spike TV’s plate for some time , but the network only just decided to move full-speed ahead with it, according to Variety . The show will go into production this summer and premiere in January 2017. Read 2 remaining paragraphs | Comments

Continued here:
Spike TV orders 10-episode series for Red Mars written by Babylon 5 creator

New diabetes cases finally on the decline

(credit: Steven Depolo/Flickr ) After more than a quarter of a century of rising diabetes rates, the number of new cases seems to be on a downward trend. From 1980 to 2009, the annual number of new diabetes cases more than tripled in the US, going from 493,000 to 1.7 million diagnoses a year in people aged 18 to 79. But since 2009, case numbers appear to have slumped, though the decline had not registered as statistically significant. Now, using newly released data from 2014 , the Centers for Disease Control and Prevention announced that case numbers are definitely on their first sustained decline. In 2014, the number of diagnosed cases was down to 1.4 million. “It seems pretty clear that incidence rates have now actually started to drop,” said Edward Gregg, one of the CDC’s top diabetes researchers told the New York Times . “Initially it was a little surprising because I had become so used to seeing increases everywhere we looked.” Read 2 remaining paragraphs | Comments

See the article here:
New diabetes cases finally on the decline

DirecTV will broadcast live 4K content by “early next year”

(credit: Adam Melancon ) Even if 4K TVs were popular Black Friday and Cyber Monday steals, there continues to be a lack of 4K content to watch on them. DirecTV wants to provide a solution: the company’s SVP of Video and Space Communications Phil Goswitz confirmed at New York’s TranSPORT conference that DirecTV will launch a live 4K broadcasting service sometime in “early 2016.” At the conference, Goswitz explained that the company currently has the ability to transmit up to 50 new UHD channels, and live sports transmissions are already being tested as part of next year’s rollout. DirecTV already has the hardware in place, and according to Goswitz, the company wants to get ahead of cable companies and provide viewers with 4K content they can’t get from their cable companies. “I think the belief that there are technology challenges is a bit of a misinformed myth,” he said. “I think technology throughout the entire ecosystem is ready. But I think content is king; the plane is ready to take off and there is no king on board.” Goswitz went on to say that DirecTV is “moving into working with partners” to create more 4K content. Currently Netflix and YouTube have some 4K video ready to stream, but most companies continue to focus on hardware. Roku and TiVo recently came out with updated set-top boxes ready for 4K streaming, but they still have to work with the finite amount of 4K content available. Read 1 remaining paragraphs | Comments

See more here:
DirecTV will broadcast live 4K content by “early next year”

The National Security Letter spy tool has been uncloaked, and it’s bad

It took 11 years to finally unveil what the FBI demands in a National Security Letter. How it evolved over the years is shown above. (credit: ACLU ) The National Security Letter (NSL) is a potent surveillance tool that allows the government to acquire a wide swath of private information—all without a warrant. Federal investigators issue tens of thousands of them each year to banks, ISPs, car dealers, insurance companies, doctors, and you name it. The letters don’t need a judge’s signature and come with a gag to the recipient, forbidding the disclosure of the NSL to the public or the target. Nicholas Merrill (credit: Wikipedia ) For the first time, as part of a First Amendment lawsuit, a federal judge ordered the release of what the FBI was seeking from a small ISP as part of an NSL. Among other things, the FBI was demanding a target’s complete Web browsing history, IP addresses of everyone a person has corresponded with, and records of all online purchases, according to a court document unveiled Monday. All that’s required is an agent’s signature denoting that the information is relevant to an investigation. “The FBI has interpreted its NSL authority to encompass the websites we read, the Web searches we conduct, the people we contact, and the places we go. This kind of data reveals the most intimate details of our lives, including our political activities, religious affiliations, private relationships, and even our private thoughts and beliefs,” said Nicholas Merrill, who was president of Calyx Internet Access in New York when he received the NSL targeting one of his customers in 2004. Read 6 remaining paragraphs | Comments

Continued here:
The National Security Letter spy tool has been uncloaked, and it’s bad

Hey Reader’s Digest: Your site has been attacking visitors for days

Enlarge (credit: Malwarebytes ) An active hacking campaign is forcing Reader’s Digest and many other websites to host malicious code that can surreptitiously infect visitors with malware and linger for days or weeks before being cleaned up. Reader’s Digest has been infected since last week with code originating with Angler, an off-the-shelf hack-by-numbers exploit kit that saves professional criminals the hassle of developing their own attack scripts, researchers from antivirus provider Malwarebytes told Ars. People who visit the site with outdated versions of Adobe Flash, Internet Explorer, and other browsing software are silently infected with malware that gains control over their computers. Malwarebytes researchers said they sent Reader’s Digest operators e-mails and social media alerts last week warning the site was infected but never got a response. The researchers estimate that thousands of other sites have been similarly attacked in recent weeks and that the number continues to grow. “This campaign is still ongoing and we see dozens of new websites every day being leveraged to distribute malware via the Angler exploit kit,” Malwarebytes Senior Security Researcher Jérôme Segura wrote in an e-mail. “This attack may have been going on for some time but we noticed a dramatic increase in infections via WordPress sites in the past couple of weeks.” Read 3 remaining paragraphs | Comments

See the article here:
Hey Reader’s Digest: Your site has been attacking visitors for days

Iranian military spear-phish of State Department employees detected first by Facebook

The Facebook and email accounts of US State Department officials focused on Iran were hacked, and possibly used to gather data about US-Iranian dual citizens in Iran. More details have emerged about the hacking the computers of US State Department and other government employees, first revealed earlier this month in a Wall Street Journal report . The intrusions by hackers purported to be associated with the Iranian Revolutionary Guard may be tied to the arrest of an Iranian-American businessman in Tehran in October and other arrests of dual citizens in Iran. The attackers used compromised social media accounts of junior State Department staff as part of a “phishing” operation that compromised the computers of employees working in the State Department’s Office of Iranian Affairs and Bureau of Near Eastern Affairs and computers of some journalists. The first warning of the attacks came from Facebook, which alerted some of the affected users that their accounts had been compromised by a state-sponsored attack, the New York Times reports . The Iranian Revolutionary Guard hackers used the access to identify the victims’ contacts and build “spear-phishing” attacks that gave them access to targeted individuals’ e-mail accounts. The attack “was very carefully designed and showed the degree to which they understood which of our staff was working on Iran issues now that the nuclear deal is done,” an unnamed senior US official told the Times . This most recent attack, which came after a brief period of little or no Iranian activity against US targets over the summer according to data from Check Point and iSight Partners, was a change from tactics previously associated with Iranian hackers. Earlier attacks attributed to Iran were focused on taking financial services companies’ websites offline  and destroying data—such as in the attack attack on casino company Las Vegas Sands Corp. last year after its majority owner called for a nuclear attack on Iran. These attacks may not have been carried out by the Iranian government but by Iranian or pro-Iranian “hacktivists.” The State Department attack, however, was more subtle and aimed at cyber-espionage rather than simple vengeance—bearing hallmarks of tactics attributed to Chinese state-sponsored hackers. Read 1 remaining paragraphs | Comments

Follow this link:
Iranian military spear-phish of State Department employees detected first by Facebook

TrueCrypt is safer than previously reported, detailed analysis concludes

(credit: Khürt Williams ) The TrueCrypt whole-disk encryption tool used by millions of privacy and security enthusiasts is safer than some studies have suggested, according to a comprehensive security analysis conducted by the prestigious Fraunhofer Institute for Secure Information Technology. The extremely detailed 77-page report comes five weeks after Google’s Project Zero security team disclosed two previously unknown TrueCrypt vulnerabilities . The most serious one allows an application running as a normal user or within a low-integrity security sandbox to elevate privileges to SYSTEM or even the kernel. The Fraunhofer researchers said they also uncovered several additional previously unknown TrueCrypt security bugs. Despite the vulnerabilities, the analysis concluded that TrueCrypt remains safe when used as a tool for encrypting data at rest as opposed to data stored in computer memory or on a mounted drive. The researchers said the vulnerabilities uncovered by Project Zero and in the Fraunhofer analysis should be fixed but that there’s no indication that they can be exploited to provide attackers access to encrypted data stored on an unmounted hard drive or thumb drive. According to a summary by Eric Bodden , the Technische Universität Darmstadt professor who led the Fraunhofer audit team: Read 4 remaining paragraphs | Comments

View article:
TrueCrypt is safer than previously reported, detailed analysis concludes

Android adware can install itself even when users explicitly reject it

(credit: Lookout) Two weeks ago, Ars reported on newly discovered Android adware that is virtually impossible to uninstall . Now, researchers have uncovered malicious apps that can get installed even when a user has expressly tapped a button rejecting the app. The hijacking happens after a user has installed a trojanized app that masquerades as an official app available in Google Play and then is made available in third-party markets. During the installation, apps from an adware family known as Shedun try to trick people into granting the app control over the Android Accessibility Service , which is designed to provide vision-impaired users alternative ways to interact with their mobile devices. Ironically enough, Shedun apps try to gain such control by displaying dialogs such as this one, which promises to help weed out intrusive advertisements. From that point on, the app has the ability to display popup ads that install highly intrusive adware. Even in cases where a user rejects the invitation to install the adware or takes no action at all, the Shedun-spawned app uses its control over the accessibility service to install the adware anyway. Read 4 remaining paragraphs | Comments

View original post here:
Android adware can install itself even when users explicitly reject it

Chicago issued $2.4 million in bogus traffic tickets from speed cameras

The Chicago Tribune reported Wednesday as part of an exhaustive investigation that as many as 110,000 “questionable” speeding tickets totalling $2.4 million have been issued in the past two years in Chicago as part of a speed-camera program designed to keep kids safe near parks and schools. …City Hall has systematically ticketed drivers near schools without the legally required evidence of a schoolchild in sight. A Tribune random-sample analysis puts the number of those questionable tickets at about 110,000. And while it was pitched by the mayor as a way to protect youngsters walking near parks and schools, the most prolific cameras in the 2-year-old “Children’s Safety Zone” initiative can be found along major roadways, where crash data show child pedestrians are least likely to be struck by speeders. The lengthy  report is worth a read. Among other things, the report found that Mayor Rahm Emanuel’s speed camera program issued 22,000 tickets for speeding near parks and another 11,000 tickets near parks that were closed for the night. What’s more, another 28,000 citations “were issued at cameras plagued by problems with warning signs that did not meet the minimum legal requirements.” And at least 62,000 tickets were given during the summer “when school activity is so limited that drivers are left to guess whether school is in session or not.” Read 2 remaining paragraphs | Comments

Read the original:
Chicago issued $2.4 million in bogus traffic tickets from speed cameras

Visual Studio now supports debugging Linux apps; Code editor now open source

The Visual Studio Code editor, now open source, editing TypeScript on OS X. (credit: Microsoft) NEW YORK—Developers can now debug apps running on Linux servers or IoT devices from the comfort of Visual Studio. Microsoft today released a preview of a Visual Studio extension that adds remote debugging using GDB of Linux software. This was one of many announcements made at Microsoft’s Connect developer event today as the company aims to give its developer platform the broadest reach it’s ever had, able to handle Android, iOS, and Linux development, alongside the more expected Azure, Office, and Windows. Visual Studio 2015 already made big strides in this direction, and Microsoft is pushing ahead to try to make Visual Studio the best development environment around. The free and cross-platform Chromium-based code editor Visual Studio Code is being open sourced today. A new build has also been published, adding an extension mechanism to the editor. There are already some 60 extensions available, including new language support (such as Go language), richer debugging, code linters, and more. Read 10 remaining paragraphs | Comments

Link:
Visual Studio now supports debugging Linux apps; Code editor now open source