Patience may be a virtue. For U.S. tech companies looking to do deals that involve China, it is also an expensive necessity. From a report: Cisco Systems and Applied Materials each received different lessons on that score last week. On Friday, Cisco found its $2.6 billion deal to buy Acacia Communications in serious jeopardy after Acaia announced it was terminating the merger due to a lack of approval from Chinese regulators. Cisco's unusual response was that it did, in fact, receive the necessary approval, and it is now seeking a court mandate that would prevent the deal from being terminated. The deal was first struck in July 2019 and was Cisco's largest acquisition since its $3.7 billion pickup of AppDynamics more than two years prior. Applied Materials took a different tack. The maker of semiconductor manufacturing gear earlier in the week announced in a regulatory filing that it has upped its price for Kokusai Electric to $3.5 billion from the $2.2 billion the two companies first agreed upon in June 2019. That deal is also only awaiting approval from Chinese regulators. With its higher price, Applied was able to extend the deadline to close the merger to March 19 from its original date of Dec. 30. Both cases are just the latest sign of soured trade relations between the U.S. and China. The departing Trump administration has continued to pursue aggressive actions, such as export controls on Chinese chipmaking giant SMIC and an order requiring the delisting of three Chinese telecommunications companies from the New York Stock Exchange.Read more of this story at Slashdot.
A new trend is emerging among ransomware groups where they prioritize stealing data from workstations used by top executives and managers in order to obtain "juicy" information that they can later use to pressure and extort a company's top brass into approving large ransom payouts. From a report: ZDNet first learned of this new tactic last week during a phone call with a company that paid a multi-million dollar ransom to the Clop ransomware gang. Similar calls with other Clop victims and email interviews with cybersecurity firms later confirmed that this wasn't just a one-time fluke, but instead a technique that the Clop gang had fine-tuned across the past few months. The technique is an evolution of what we've been seen from ransomware gangs lately. For the past two years, ransomware gangs have evolved from targeting home consumers in random attacks to going after large corporations in very targeted intrusions. These groups breach corporate networks, steal sensitive files they can get their hands on, encrypt files, and then leave ransom notes on the trashed computers. In some cases, the ransom note informs companies that they have to pay a ransom demand to receive a decryption key. In case data was stolen, some ransom notes also inform victims that if they don't pay the ransom fee, the stolen data will be published online on so-called "leak sites."Read more of this story at Slashdot.
D-Link is trying to make it simple to give your computer a Wi-Fi upgrade. From a report: The networking company has announced what it's calling an "industry-first" Wi-Fi 6 adapter built into a USB stick. Plug it into your laptop or desktop computer, and you may be able to get better performance than from your older Wi-Fi chip. The adapter advertises speeds up to 1,200Mbps. It's not entirely clear who the target audience is for this upgrade. You'll need to be connected to a Wi-Fi 6 router to get the biggest benefits, and most people still don't own one of those (the Wi-Fi 6 standard only started rolling out two years ago). And if the laptop or desktop you're using was bought any time in recent memory, chances are it supports Wi-Fi 5, which isn't a huge step down from Wi-Fi 6.Read more of this story at Slashdot.
Donald Trump received unexpected backing from Germany and France after the U.S. president was shut off social media platforms including Twitter and Facebook, extending Europe's battle with big tech. From a report: German Chancellor Angela Merkel objected to the decisions, saying on Monday that lawmakers should set the rules governing free speech and not private tech companies. "The chancellor sees the complete closing down of the account of an elected president as problematic," Steffen Seibert, her chief spokesman, said at a regular news conference in Berlin. Rights like the freedom of speech "can be interfered with, but by law and within the framework defined by the legislature -- not according to a corporate decision." The German leader's stance was echoed by French Finance Minister Bruno Le Maire, who said that the state and not "the digital oligarchy" is responsible for regulations, calling big tech "one of the threats" to democracy.Read more of this story at Slashdot.
Charlotte Web writes: With Linux 5.10 having shipped as the latest Long Term Support (LTS) release to be maintained for at least the next five years, a discussion has begun over dropping a number of old and obsolete CPU platform support currently found within the mainline kernel. For many of the architectures being considered for removal they haven't seen any new commits in years but as is the case once proposals are made for them to be removed there are often passionate users wanting the support to be kept.Read more of this story at Slashdot.
Social networking service Parler sued Amazon on Monday, accusing its web hosting service of breaking anti-trust laws in taking off the platform that is popular with many right-leaning social media users. You can read the court document here.Read more of this story at Slashdot.
A hacker took control of people's internet-connected chastity cages and demanded a ransom to be paid in Bitcoin to unlock it. From a report: "Your cock is mine now," the hacker told one of the victims, according to a screenshot of the conversation obtained by a security researcher that goes by the name Smelly and is the founder of vx-underground, a website that collects malware samples. In October of last year, security researchers found that the manufacturer of an Internet of Things chastity cage -- a sex toy that users put around their penis to prevent erections that is used in the BDSM community and can be unlocked remotely -- had left an API exposed, giving malicious hackers a chance to take control of the devices. That's exactly what happened, according to a security researcher who obtained screenshots of conversations between the hacker and several victims, and according to victims interviewed by Motherboard. A victim who asked to be identified only as Robert said that he received a message from a hacker demanding a payment of 0.02 Bitcoin (around $750 today) to unlock the device. He realized his cage was definitely "locked," and he "could not gain access to it."Read more of this story at Slashdot.
Game streaming has been slowly growing in recent years with the launches of Nvidia's GeForce Now, Google's Stadia, Microsoft's xCloud and Amazon's Project Luna. This year, however, it looks to finally be picking up more steam. At CES 2021, LG announced that some of its 2021 TVs will support apps for playing games from Google Stadia and GeForce Now right on the TV. From a report: Those who subscribe to Stadia Pro, Google's subscription offering for Stadia that runs $10 per month that allows gamers to play an assortment of games for free, will be able to stream in 4K HDR, 60 FPS and 5.1 surround sound to their LG TVs. Stadia support is expected to arrive in the second half of the year in a handful of countries including the US, Canada, UK, France, Spain, Germany, Italy, Ireland, Sweden, Denmark, Norway the Netherlands and Belgium. At launch, the app will only work on LG TVs running the company's webOS 6.0 software though the company says it will come to webOS 5.0 TVs "later this year." Support for Nvidia's platform is slightly less vague, with LG only promising that it will be available in the fourth quarter. The company did not mention which countries would be able to access the service.Read more of this story at Slashdot.
Mozilla developers plan to remove support for using the Backspace key as a Back button inside Firefox. From a report: The change is currently active in the Firefox Nightly version and is expected to go live in Firefox 86, scheduled to be released next month, in late February 2021. The removal of the Backspace key as a navigational element didn't come out of the blue. It was first proposed back in July 2014, in a bug report opened on Mozilla's bug tracker. At the time, Mozilla engineers argued that many users who press the Backspace key don't always mean to navigate to the previous page (the equivalent of pressing the Back button).Read more of this story at Slashdot.
Joseph Cox, reporting at Vice's Motherboard: One user travelled through a park a few blocks south of an Islamic cultural center. Roughly every two minutes, their phone reported their physical location. Another was next to a bank two streets over from a different mosque. A third person was at a train station, again near a mosque. Perhaps unbeknownst to these people, Salaat First (Prayer Times), an app that reminds Muslims when to pray, was recording and selling their granular location information to a data broker, which in turn sells location data to other clients. Motherboard has obtained a large dataset of those raw, precise movements of users of the app from a source. The source who provided the dataset was concerned that such sensitive information, which could potentially track Muslims going about their day including visiting places of worship, could be abused by those who buy and make use of the data. The company collecting the location data, a French firm called Predicio, has previously been linked to a supply chain of data involving a U.S. government contractor that worked with ICE, Customs and Border Protection, and the FBI. The news about Salaat First, which has been downloaded more than 10 million times on Android, highlights not only the use of religious apps to harvest location data, but also the ease at which this sensitive information is traded in the location data industry. Motherboard is withholding some specifics about the dataset such as its exact size in order to protect the source, but the significance is clear: users of a Muslim-focused app are being tracked likely without their informed consent. "Being tracked all day provides a lot of information, and it shouldn't be usable against you, especially if you are unaware of it," the source said. Motherboard granted them anonymity to avoid repercussions from their employer.Read more of this story at Slashdot.
Twitter shares fell 7% in pre-market trading after the social media platform permanently banned outgoing President Donald Trump. From a report: The company confirmed its decision in a blog post on Friday, saying Trump's tweets breached policies by risking incitement to violence. It cited his posts on the riots in the U.S. capital last week. It's a watershed moment for technology platforms that have faced conflicting pressures on one hand to restrict misinformation and hate speech, and defend free speech on the other. Twitter was Trump's preferred channel for amplifying attacks on his rivals, spreading conspiracies and provoking other nations during his four years in power.Read more of this story at Slashdot.
The Turkish Competition Board said on Monday it launched an investigation into WhatsApp and its owner Facebook after the messaging app asked users to agree to let Facebook collect user data including phone numbers and locations. From a report: In a written statement, the Competition Board said it ruled the data-collection requirement should be suspended until the probe is complete. "The Competition Board has opened an investigation into Facebook and WhatsApp and suspended the requirement to share Whatsapp data," it said. WhatsApp updated its terms of service last Wednesday, allowing Facebook and its subsidiaries to collect user data. The deadline for agreeing to the new terms is Feb. 8.Read more of this story at Slashdot.
The Verge reports:The CEO of the conservative-friendly social app Parler said that all of its vendors have abandoned the company following recent bans from Google, Apple, and Amazon. "Every vendor, from text message services to email providers to our lawyers, all ditched us too, on the same day," Parler CEO John Matze said in an interview with Fox News on Sunday... Matze said that it was having difficulties finding a new vendor to work with. "We're going to try our best to get back online as quickly as possible, but we're having a lot of trouble because every vendor we talk to says they won't work with us. Because if Apple doesn't approve and Google doesn't approve, then they won't." But the app also has another problem, reports Mashable:The number two most downloaded free app in both Apple's App Store and the Google Play Store is an app called Parlor. That's Parlor with an "o," not an "e." Coincidence? We think not. Parlor is a "social talking app" in which people can get on and talk with strangers about different topics. It's been around for 10 years according to the app listing, and, Sensor Tower data indicates it had 40,000 downloads as of December 2020. Its reviews are not great to say the least, and it looks, well, pretty porn-y.Read more of this story at Slashdot.
Amazon, Walmart, and other companies are using artificial intelligence "to decide whether it makes economic sense to process a return," reports the Wall Street Journal:For inexpensive items or large ones that would incur hefty shipping fees, it is often cheaper to refund the purchase price and let customers keep the products. The relatively new approach, popularized by Amazon and a few other chains, is being adopted more broadly during the Covid-19 pandemic, as a surge in online shopping forces companies to rethink how they handle returns. "We are getting so many inquiries about this that you will see it take off in coming months," said Amit Sharma, chief executive of Narvar Inc., which processes returns for retailers... A Target Corp. spokeswoman said the retailer gives customers refunds and encourages them to donate or keep the item in a small number of cases in which the company deems that option is easier than returning the purchase. A Walmart spokeswoman said the "keep it" option is designed for merchandise it doesn't plan to resell and is determined by customers' purchase history, the value of the products and the cost of processing the returns... Processing online returns can cost $10 to $20, excluding freight, depending on the item, said Rick Faulk, chief executive of Locus Robotics, which uses robots to help automate returns.Read more of this story at Slashdot.
The Associated Press reports:New Zealand's central bank said Sunday that one of its data systems has been breached by an unidentified hacker who potentially accessed commercially and personally sensitive information. A third party file sharing service used by the Reserve Bank of New Zealand to share and store sensitive information had been illegally accessed, the Wellington-based bank said in a statement. Governor Adrian Orr said the breach has been contained. The bank's core functions "remain sound and operational," he said... "The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information," Orr added... Dave Parry, professor of computer science at Auckland University, told Radio New Zealand that another government was likely behind the bank data breach. "Ultimately if you were coming from a sort of like criminal perspective, the government agencies aren't going to pay your ransom or whatever, so you'd be more interested probably coming in from a government-to-government level," Parry said.Read more of this story at Slashdot.
"It might be easier at this point to ask which tech platforms President Donald Trump can still use," jokes TechCrunch. The Wall Street Journal reports:Stripe Inc. will no longer process payments for President Trump's campaign website following last week's riot at the Capitol, according to people familiar with the matter. The financial-technology company handles card payments for millions of online businesses and e-commerce platforms, including Mr. Trump's campaign website and online fundraising apparatus. Stripe is cutting off the president's campaign account for violating its policies against encouraging violence, the people said... Stripe asks users to agree that they won't accept payments for "high risk" activities, including for any business or organization that "engages in, encourages, promotes or celebrates unlawful violence or physical harm to persons or property," according to its website. TechCrunch fills in the rest of the story. "Sources told the Journal that the reason for the company's decision was the violation of company policies against encouraging violence.... "The deplatforming of the president has effectively removed Trump from all social media outlets including Snap, Facebook, Twitter, Pinterest, Spotify and TikTok."Read more of this story at Slashdot.
"More than two months after Alex Trebek's death, fans of Jeopardy! finally got the chance to say goodbye," reports CBS News:A video tribute to the host closed Friday's episode of the quiz show, the final one that Trebek taped before pancreatic cancer claimed his life on November 8. The 90-second montage, set to Hugh Jackman singing the Peter Allen song "Once Before I Go," is a lighthearted and laughter-filled remembrance showing Trebek's changing look through his 36 years as host, with moustache and without, with black hair and with grey, with suits from several decades. It celebrated the wackier moments of the usually strait-laced Trebek, showing him verbally sparring with contestants and arm-wrestling with one. "You really make me feel inadequate," he tells a child contestant. "Sorry about that," she sassily answers. Trebek is shown walking on the set pants-less in one clip, dressed as the Statue of Liberty in another, and wearing the costume of a Trojan solider in another.... The show will continue next week with a series of interim hosts, starting with veteran "Jeopardy!" champion Ken Jennings. The week's final Trebek episodes began Monday with the host urging viewers to give to others who were suffering during the coronavirus pandemic. "We're trying to build a gentler, kinder society, and if we all pitch in just a little bit, we're going to get there," Trebek said...Read more of this story at Slashdot.
Space.com reports:High above the North Pole, the polar vortex, a fast-spinning whirl of frigid air, is doing a weird shimmy that may soon bring cold and snowy weather to the Eastern U.S., Northern Europe and East Asia for weeks on end, meteorologists say. While it's not unusual for the polar vortex to act up, this particular reconfiguration — wandering around and possibly splitting in two — may be tied to climate change in the rapidly warming Arctic, said Judah Cohen, director of seasonal forecasting at Atmospheric and Environmental Research in Massachusetts, part of Verisk Analytics, a risk-assessment company. "Expect a more wintery back-half of winter here in the Eastern U.S. than what we had in the first half," Cohen told Live Science. The Arctic is heating up faster than any other region in the world. As a result, sea-ice cover there is shrinking — in September 2020 and December 2020, the Arctic sea-ice cover shrunk to its second-lowest and third-lowest minimum on record for those months, respectively, according to the National Snow and Ice Data Center. The warmer-than-usual temperatures in the Arctic are likely throwing the polar vortex out of whack, Cohen said... During the winter, a jet stream of air that keeps the polar vortex in place sometimes weakens, allowing the vortex's chilly air to extend southward... Disruptions to the polar vortex are key for forecasts, as about two weeks after they happen, the troposphere gets a wallop of weird weather, which can last for weeks. Because of this week's polar vortex disruption, "there's indications we'll see some colder weather within two weeks... in the Eastern U.S., Northern Europe and East Asia," Cohen said.Read more of this story at Slashdot.
CNN reports:When President Donald Trump signed the $2.3 trillion coronavirus relief and government funding bill into law in December, so began the 180-day countdown for US intelligence agencies to tell Congress what they know about UFOs. No, really. The director of National Intelligence and the secretary of defense have a little less than six months now to provide the congressional intelligence and armed services committees with an unclassified report about "unidentified aerial phenomena." It's a stipulation that was tucked into the "committee comment" section of the Intelligence Authorization Act for Fiscal Year 2021, which was contained in the massive spending bill. That report must contain detailed analyses of UFO data and intelligence collected by the Office of Naval Intelligence, the Unidentified Aerial Phenomena Task Force and the FBI, according to the Senate intelligence committee's directive... A spokesperson for the Office of the Director of National Intelligence confirmed the news to the fact-checking website Snopes.Read more of this story at Slashdot.
"It's not enough to slash greenhouse gas emissions," warns a new article in IEEE Spectrum (shared by schwit1). "Experts say we need direct-air capture of atmospheric carbon."West Texas is a hydrocarbon hot spot, with thousands of wells pumping millions of barrels of oil and billions of cubic feet of natural gas from the Permian Basin. When burned, all that oil and gas will release vast amounts of greenhouse gases into the atmosphere. A new facility there aims to do the opposite. Rows of giant fans spread across a flat, arid field will pull carbon dioxide from the air and then pump it deep underground. When completed, the project could capture 1 million metric tons of carbon dioxide per year, doing the air-scrubbing work of some 40 million trees. Canadian firm Carbon Engineering is designing and building this "direct-air capture" facility with 1PointFive, a joint venture between a subsidiary of Occidental Petroleum Corp. and the private equity firm Rusheen Capital Management. Carbon Engineering will devote much of 2021 to front-end engineering and design work in Texas, with construction slated to start the following year and operations by 2024, the partners say. The project is the biggest of its kind in the world and will likely cost hundreds of millions of dollars to develop. Carbon Engineering is among a handful of companies with major direct-air capture developments underway this year. Zurich-based Climeworks is expanding across Europe, while Dublin's Silicon Kingdom Holdings plans to install its first CO2-breathing "mechanical tree" in Arizona. Global Thermostat, headquartered in New York City, has three new projects in the works. All the companies say they intend to curb the high cost of capturing carbon by optimizing technology, reducing energy use, and scaling up operations.Read more of this story at Slashdot.
"With the runaway success of the new ARM-based M1 Macs, non-x86 architectures are getting their closeup," explains a new article at ZDNet. "RISC-V is getting the most attention from system designers looking to horn-in on Apple's recipe for high performance. Here's why..." RISC-V is, like x86 and ARM, an instruction set architecture (ISA). Unlike x86 and ARM, it is a free and open standard that anyone can use without getting locked into someone else's processor designs or paying costly license fees... Reaching the end of Moore's Law, we can't just cram more transistors on a chip. Instead, as Apple's A and M series processors show, adding specialized co-processors — for codecs, encryption, AI — to fast general-purpose RISC CPUs can offer stunning application performance and power efficiency. But a proprietary ISA, like ARM, is expensive. Worse, they typically only allow you to use that ISA's hardware designs, unless, of course, you're one of the large companies — like Apple — that can afford a top-tier license and a design team to exploit it. A canned design means architects can't specify tweaks that cut costs and improve performance. An open and free ISA, like RISC-V, eliminates a lot of this cost, giving small companies the ability to optimize their hardware for their applications. As we move intelligence into ever more cost-sensitive applications, using processors that cost a dollar or less, the need for application and cost-optimized processors is greater than ever... While open operating systems, like Linux, get a lot of attention, ISAs are an even longer-lived foundational technology. The x86 ISA dates back 50 years and today exists as a layer that gets translated to a simpler — and faster — underlying hardware architecture. (I suspect this fact is key to the success of the macOS Rosetta 2 translation from x86 code to Apple's M1 code.) Of course, an open ISA is only part of the solution. Free standard hardware designs — with tools to design more — and smart compilers to generate optimized code are vital. That larger project is what Berkeley's Adept Lab is working on. As computing continues to permeate civilization, the cost of sub-optimal infrastructure will continue to rise. Optimizing for efficiency, long-life, and broad application is vital for humanity's progress in a cyber-enabled world. One RISC-V feature highlighted by the article: 128-bit addressing (in addition to 32 and 64 bit).Read more of this story at Slashdot.
"Turning digital data into profit," is the slogan of Cognesia, a data analytics company whose client list includes Visa, Rolls-Royce, and Toys 'R' Us. Now Variety reports:Brad Rukstales, the chief executive of a Chicago-area company that provides data-marketing solutions, said he was arrested Wednesday after he entered the U.S. Capitol alongside a mob of pro-Trump rioters seeking to overturn the 2020 presidential election... "Our CEO, Brad Rukstales, participated in the recent Washington DC protests," Schaumburg, Illinois-based Cognesia said in a statement Thursday. "Those actions were his own and [and he was] not acting on behalf [of] Cogensia nor do his actions in any way reflect the policies or values of our firm..." Rukstales, in his own statement posted on Twitter, apologized for what he called "the single worst personal decision of my life." "In a moment of extremely poor judgment following the Jan. 6 rally in Washington, I followed hundreds of others through an open set of doors to the Capitol building to see what was taking place inside," Rukstales wrote. "I was arrested for the first time in my life and charged with unlawful entry." He continued, "My decision to enter the Capitol was wrong, and I am deeply regretful to have done so," adding that he "condemn[ed] the violence and destruction that took place in Washington." Twitter now reports that Cognesia's account "no longer exists." (This after their tweeted statement received dozens of unrelentingly negative comments.) Their LinkedIn profile includes a link to a more recent announcement that CEO Rukstales "has been terminated by the company's Board of Directors effective immediately," with their new CEO saying Rukstales' actions "were inconsistent with the core values of Cogensia. Cogensia condemns what occurred at the U.S. Capitol on Wednesday, and we intend to continue to embrace the values of integrity, diversity and transparency in our business operations, and expect all employees to embrace those values as well." Thursday CEO Rukstales shared his memory of Wednesday's events with a local news crew. "It was great to see a whole bunch of people together in the morning and hear the speeches, but it turned into chaos... I had nothing to do with charging anybody or anything or doing any of that. I was in the wrong place at the wrong time and I regret my part in that." And Rukstales' written apology is still online. "Without qualification and as a peaceful and law-abiding citizen, I condemn the violence and destruction that took place in Washington," Rukstales wrote. "I offer my sincere apologies for my indiscretion, and I deeply regret that my actions have brought embarrassment to my family, colleagues, friends and fellow countrymen..." "I have no excuse for my actions and I wish I could take them back."Read more of this story at Slashdot.
Programming columnist Mike Melanson describes the announcement of this year's programming language of the year:The TIOBE Index, the somewhat dubious ranking of programming language popularity according to search engine results, has announced its yearly proclamation of "language of the year," with the award going to Python for the fourth time in its history [more than any other programming language]. The title, the project leads write, "is awarded to the programming language that has gained most popularity in one year," with Python moving up 2.01% in 2020, which they attribute to "the ease of learning the language and its high productivity," alongside its numerous use cases. C++ "is a very close runner up" for programming language of the year, TIOBE tells us, "with an increase of 1.99%. Other winners are C (+1.66%), Groovy (+1.23%) and R (+1.10%)... "What else happened in the TIOBE index in 2020? C has become number 1 again, beating Java. Java lost almost 5% in only 1 year."Read more of this story at Slashdot.
"New data from EU satellites shows that 2020 is in a statistical dead heat with 2016 as the world's warmest year," reports the BBC (in an article shared by long-time Slashdot reader AmiMoJo):The Copernicus Climate Change Service says that last year was around 1.25C above the long-term average. The scientists say that unprecedented levels of heat in the Arctic and Siberia were key factors in driving up the overall temperature. The past 12 months also saw a new record for Europe, around 0.4C warmer than 2019... The Copernicus data comes from a constellation of Sentinel satellites that monitor the Earth from orbit, as well as measurements taken at ground level... Globally, the 10-year period from 2011-2020 is the warmest decade, with the last six years being the six hottest on record. The article points out that in some parts of Siberia and the Arctic, temperatures for the year were six degrees C above the long-term average. "This exceptional warming led to a very active wildfire season. Fires in the Arctic Circle released a record amount of CO2, according to the study, up over a third from 2019."Read more of this story at Slashdot.
After Wednesday's invasion by protesters, America's Capitol building is now grappling with "the process of securing the offices and digital systems after hundreds of people had unprecedented access to them," writes Wired. Long-time Slashdot reader SonicSpike shares their report:Rioters could have bugged congressional offices, exfiltrated data from unlocked computers, or installed malware on exposed devices. In the rush to evacuate the Capitol, some computers were left unlocked and remained accessible by the time rioters arrived. And at least some equipment was stolen; Senator Jeff Merkley of Oregon said in a video late Wednesday that intruders took one of his office's laptops off a conference table... Former Senate sergeant at arms Frank Larkin, who retired as Senate sergeant at arms in 2018, adds that cybersecurity is the next priority after physical security. In spite of this, the mob Wednesday had ample opportunities to steal information or gain device access if they wanted to. And while the Senate and House each build off of their own shared IT framework, ultimately each of the 435 representatives and 100 senators runs their own office with their own systems. This is a boon to security in the sense that it creates segmentation and decentralization; getting access to Nancy Pelosi's emails doesn't help you access the communications of other representatives. But this also means that there aren't necessarily standardized authentication and monitoring schemes in place. Larkin emphasizes that there is a baseline of monitoring that IT staffers will be able to use to audit and assess whether there was suspicious activity on congressional devices. But he concedes that representatives and senators have varying levels of cybersecurity competence and hygiene. It's also true that potentially exposed data at the Capitol on Wednesday would not have been classified, given that the mob had access only to unclassified networks. But congressional staffers are not subject to Freedom of Information Act obligations and are often much more candid in their communications than other government officials. Security and intelligence experts also emphasize that troves of unclassified information can still reveal sensitive or even classified information when combined... Kelvin Coleman, executive director of the National Cyber Security Alliance, who formerly worked in the Department of Homeland Security and National Security Council... adds, though, that for now the most important thing congressional IT staffers can do is account for which devices were stolen and begin a mass effort to reset passwords, add multifactor authentication to any accounts that don't already have it, wipe and reimage hard drives when practical, and comb monitoring logs for signs of access or exfiltration.Read more of this story at Slashdot.
The WebAssembly portable binary format will now have wider support from Wasmer, the server-side runtime which "allows universal binaries compiled from C++, Rust, Go, Python, and other languages to run on different operating systems and in web browsers without modification," reports InfoWorld:Wasmer can run lightweight containers based on WebAssembly on a variety of platforms — Linux, MacOS, Windows, Android, iOS — from the desktop to the cloud to IoT and mobile devices, while also allowing these containers to be embedded in any programming language. The Wasmer runtime also is able to run the Nginx web server and other WebAssembly modules... Wasmer was introduced in December 2018, with the stated goal of doing for WebAssembly what JavaScript did for Node.js: establish it server-side. By leveraging Wasmer for containerization, developers can create universal binaries that work anywhere without modification, including on Linux, MacOS, and Windows as well as web browsers. WebAssembly automatically sandboxes applications by default for secure execution, shielding the host environment from malicious code, bugs, and vulnerabilities in the software being run. Wasmer 1.0 reached "general availability status" with its release on January 5, and its developers are now claiming "out of this world" runtime and compiler performance. "We believe that WebAssembly will be a crucial component for the future of software execution and containerization (not only inside the browser but also outside)."Read more of this story at Slashdot.
EFF special consultant/blogger/science fiction writer Cory Doctorow warns in Locus magazine about the dangers of what Bruce Schneier calls "feudal security":Here in the 21st century, we are beset by all manner of digital bandits, from identity thieves, to stalkers, to corporate and government spies, to harassers... To be safe, then, you have to ally yourself with a warlord. Apple, Google, Facebook, Microsoft, and a few others have built massive fortresses bristling with defenses, whose parapets are stalked by the most ferocious cybermercenaries money can buy, and they will defend you from every attacker — except for their employers. If the warlord turns on you, you're defenseless. We see this dynamic playing out with all of our modern warlords. Google is tweaking Chrome, its dominant browser, to block commercial surveillance, but not Google's own commercial surveillance. Google will do its level best to block scumbag marketers from tracking you on the web, but if a marketer pays Google, and convinces Google's gatekeepers that it is not a scumbag, Google will allow them to spy on you. If you don't mind being spied on by Google, and if you trust Google to decide who's a scumbag and who isn't, this is great. But if you and Google disagree on what constitutes scumbaggery, you will lose, thanks, in part, to other changes to Chrome that make it much harder to block the ads that Chrome lets through. Over in Facebook land, this dynamic is a little easier to see. After the Cambridge Analytica scandal, Facebook tightened up who could buy Facebook's surveillance data about you and what they could do with it. Then, in the runup to the 2020 US elections, Facebook went further, instituting policies intended to prevent paid political disinformation campaigns at a critical juncture. But Facebook isn't doing a very good job of defending its users from the bandits. It's a bad (or possibly inattentive, or indifferent, or overstretched) warlord, though... Back to Apple. In 2017, Apple removed all effective privacy tools from the Chinese version of the iPhone/iPad App Store, at the behest of the Chinese government. The Chinese government wanted to spy on Apple customers in China, and so it ordered Apple to facilitate this surveillance... If Apple chose not to comply with the Chinese order, it would either have to risk fines against its Chinese subsidiary and possible criminal proceedings against its Chinese staff, or pull out of China and risk having its digital services blocked by China's Great Firewall, and its Chinese manufacturing subcontractors could be ordered to sever their relations with Apple. In other words, the cost of noncompliance with the order is high, so high that Apple decided that putting its customers at risk was an acceptable alternative. Therein lies the problem with trusting warlords to keep you safe: they have priorities that aren't your priorities, and when there's a life-or-death crisis that requires them to choose between your survival and their own, they will throw you to the bandits... "The fact that Apple devices are designed to prevent users from overriding the company's veto over their computing makes it inevitable that some government will demand that this veto be exercised in their favor..." Doctorow concludes. "As with feudal aristocrats, the state is happy to lend these warlords their legitimacy, in exchange for the power to militarize the aristocrat's holdings... " His proposed solution? What if Google didn't collect or retain so much user data in the first place -- or gave its users the power to turn off data-collection and data-retention altogether? And "What if Apple — by design — made is possible for users to override its killswitches?"Read more of this story at Slashdot.
On Friday, America's Cybersecurity and Infrastructure Security Agency revealed that the "threat actor" behind the massive breach of U.S. networks through compromised SolarWinds software also used password guessing and password spraying attacks, according to ZDNet. And they may still be breaching federal networks, reports GCN:"Specifically, we are investigating incidents in which activity indicating abuse of Security Assertion Markup Language (SAML) tokens consistent with this adversary's behavior is present, yet where impacted SolarWinds instances have not been identified," according to updated guidance published Jan 6. "CISA is continuing to work to confirm initial access vectors and identify any changes to the tactics, techniques, and procedures (TTPs)." SAML tokens having a 24-hour validity period or not containing multi-factor authentication details where expected are examples of these red flags. As more about the SolarWinds Orion breach has surfaced, analysts and lawmakers have repeatedly commented on how difficult it will be to remove hackers from the government's networks because their access is probably no longer predicated on flaws in SolarWinds Orion, an IT management software. CISA's new guidance appears to confirm that suspicion, stating Microsoft, which is helping the federal government investigate the hack, reported the hackers are tampering with the trust protocols in Azure/Microsoft 365. "Microsoft reported that the actor has added new federation trusts to existing on premises infrastructure," according to the agency's guidance. "Where this technique is used, it is possible that authentication can occur outside of an organization's known infrastructure and may not be visible to the legitimate system owner." In cases where administrative level credentials were compromised, organizations should conduct a "full reconstruction of identity and trust services," CISA said. Microsoft published a query to help identify this type of activity.Read more of this story at Slashdot.
Today MSN published an article listing "Every social media platform Donald Trump is banned from using (so far)." Some excerpts:- Trump was suspended from Snapchat amid the riots on January 6, a spokesperson confirmed to The Hill... - On January 7, Twitch, the Amazon-owned video live-streaming platform made popular by gamers, disabled Trump's account indefinitely... - Though Trump does not have a Pinterest account, the image-sharing app has reportedly been limiting pro-Trump related topics since around November. For example, if you search "StoptheSteal," you will see the following message: "Pins about this topic often violate our community guidelines, so we're currently unable to show search results...." - Oh, how the tables have turned. Remember when Trump tried to ban TikTok? Well, even though Trump does not have an account of his own, the video platform still found a way to limit his reach. On January 7, TikTok confirmed it would be removing videos of Trump's speeches believed to have incited violence at the Capitol. Furthermore, it is redirecting hashtags used by rioters like #stormthecapitol and #patriotparty to its community guidelines. However, the company has not specified that it would ban Trump should he try to join the platform.Read more of this story at Slashdot.
"Apple has suspended Parler until the makers of the app solve its content moderation challenges," reports Forbes, citing a statement from Apple saying "there is no place on our platform for threats of violence and illegal activity. Parler has not taken adequate measures to address the proliferation of these threats..." Meanwhile, BuzzFeed News reports:Amazon notified Parler that it would be cutting off the social network favored by conservatives and extremists from its cloud hosting service Amazon Web Services, according to an email obtained by BuzzFeed News. The suspension, which will go into effect on Sunday just before midnight, means that Parler will be unable to operate and will go offline unless it can find another hosting service... In an email obtained by BuzzFeed News, an AWS Trust and Safety team told Parler Chief Policy Officer Amy Peikoff that the calls for violence propagating across the social network violated its terms of service. Amazon said it was unconvinced that the service's plan to use volunteers to moderate calls for violence and hate speech would be effective. "Recently, we've seen a steady increase in this violent content on your website, all of which violates our terms," the email reads. "It's clear that Parler does not have an effective process to comply with the AWS terms of service." Earlier in the day, Bloomberg supplied some context:A group representing some Amazon.com Inc. employees has called for the company's cloud unit to cut ties with Parler after reports that the social media network was used by those who planned Wednesday's riot at the U.S. Capitol... It's unclear how many employees the group represents. Participation in rallies, social media statements and open letters has ranged from dozens of workers to thousands at events held before the Covid-19 pandemic. Amazon last year fired two of the group's leaders for what it said was violation of company policy. The employees say they were terminated for their activism.Read more of this story at Slashdot.
Thelasko quotes gHacks: Linux Mint 20.1 is now available. The first stable release of Linux Mint in 2021 is available in the three flavors Cinnamon, MATE and Xfce. The new version of the Linux distribution is based on Ubuntu 20.04 LTS and Linux kernel 5.4... - Linux Mint 20.1 comes with a unified file system that sees certain directories being merged with their counterparts in /usr, e.g. /bin merged with /usr/bin, /lib merged with /usr/lib for compatibility purposes... - The developers have added an option to turn websites into desktop applications in the new version [using the new Web App manager]... Web apps behave like desktop programs for the most part; they start in their own window and use a custom icon, and you find them in the Alt-Tab interface when you use it. Web apps can be pinned and they are found in the application menu after they have been created.Read more of this story at Slashdot.
Bleeping Computer reports:NVIDIA has released security updates to address six security vulnerabilities found in Windows and Linux GPU display drivers, as well as ten additional flaws affecting the NVIDIA Virtual GPU (vGPU) management software. The vulnerabilities expose Windows and Linux machines to attacks leading to denial of service, escalation of privileges, data tampering, or information disclosure. All these security bugs require local user access, which means that potential attackers will first have to gain access to vulnerable devices using an additional attack vector. Following successful exploitation of one of the vulnerabilities patched today, attackers can easily escalate privileges to gain permissions above the default ones granted by the OS.Read more of this story at Slashdot.
The author of the book Online Afterlives describes the unusual projects of people like Eugenia Kuyda, co-founder of Luka, an AI-powered chat simulator that books restaurant reservations and makes recommendations. Kuyda worked with computer scientists to convert several thousand text messages between deceased tech entrepreneur Roman Mazurenko and his friends and relatives into a chatbot simulation:"How are you there?" asks a friend. "I'm OK. A little down. I hope you aren't doing anything interesting without me," Roman responds. His friend replies that they all miss him. Another acquaintance asks him if God and the soul exist. Having probably indicated his atheism in chats while he was alive, he says no. "Only sadness." Not content with Luka, Eugenia also designed a chatbot called Replika. A cross between a diary and a personal assistant, Replika asks users a series of questions, eventually learning to mimic their personalities. The goal is to get closer to creating a digital avatar that would be able to reproduce us and replace us once we're dead, but also one that is able to create "friendships" with humans. Since the second half of 2017, over two million people have downloaded Replika onto their mobile devices... Luka and Replika are not the only inventions designed to give a voice to the digital ghosts of the deceased. A few years ago, James Vlahos, an American journalist who has been an AI enthusiast since childhood, created what he calls a "Dadbot." It all started on April 24, 2016, when his father John was diagnosed with lung cancer. Upon learning of his father's illness, James began recording all of their conversations with the idea of writing a commemorative book after his father's death. After 12 sessions, each an hour and a half, he found himself with 91,970 words. The printed transcripts filled around 203 pages... He decided to use the recordings of his father to create something other than a commemorative book. He remembered writing an article that discussed PullString (previously known as ToyTalk), a program designed to create conversations with fictional characters... James used PullString to reorganize the MP3 recordings of his father. He also used it to create his Dadbot, software that works on his smartphone and simulates a written conversation with John, based on the processing of almost 100,000 recorded words... The tone of the conversations reflects the personality of the deceased: "Where are you now?" asks James. "As a bot I suppose I exist somewhere on a computer server in San Francisco. "And also, I suppose, in the minds of people who chat with me."Read more of this story at Slashdot.
On Thursday Axios tried to assess QAnon's role in the mob that stormed America's Capitol building:Adherents of the QAnon conspiracy theory, who imagine a vast deep-state cabal of pedophiles arrayed against Trump, have for years insisted that a moment of reckoning for their enemies is imminent. QAnon believers have largely accepted that Trump is waiting for the right time to bring a hammer down on his enemies (or already has, in secret). But time is running out. Because Congress was slated to officially certify Biden's victory on Jan. 6, the day became the focal point of a new conspiracy theory — that Trump would, on that date, reveal mountains of evidence of electoral fraud, somehow invalidate Biden's win, and secure a second term. The catch: That evidence does not exist. Instead, Trump Wednesday addressed the followers who came to Washington by reeling off a familiar list of grievances... Determined to play their part in the foreordained events of Jan. 6, the mob descended on the Capitol... The bottom line: The pro-Trump internet willed into being a siege on the Capitol that successfully delayed the certification of Biden's victory. But Tuesday, KrebsOnSecurity was already arguing that QAnon's infrastructure might have a legal vulnerability (according to this article shared by Slashdot reader aaltmann):In October 2020, KrebsOnSecurity looked at how a web of sites connected to conspiracy theory movements QAnon and 8chan were being kept online by DDoS-Guard, a dodgy Russian firm that also hosts the official site for the terrorist group Hamas. New research shows DDoS-Guard relies on data centers provided by a U.S.-based publicly traded company, which experts say could be exposed to civil and criminal liabilities as a result of DDoS-Guard's business with Hamas... A review of the several thousand websites hosted by DDoS-Guard is revelatory, as it includes a vast number of phishing sites and domains tied to cybercrime services or forums online. Replying to requests for comment from a CBSNews reporter following up on my Oct. 2020 story, DDoS-Guard issued a statement saying, "We observe network neutrality and are convinced that any activity not prohibited by law in our country has the right to exist." But experts say DDoS-Guard's business arrangement with a Denver-based publicly traded data center firm could create legal headaches for the latter thanks to the Russian company's support of Hamas... Hamas has long been named by the U.S. Treasury and State departments as a Specially Designated Global Terrorist (SDGT) organization. Under such a designation, any U.S. person or organization that provides money, goods or services to an SDGT entity could face civil and/or criminal prosecution and hefty fines ranging from $250,000 to $1 million per violation. Sean Buckley, a former Justice Department prosecutor with the law firm Kobre & Kim... said companies can incur fines and prosecution for violating SDGT sanctions even when they don't know that they are doing so.Read more of this story at Slashdot.
What's the world's richest man up to? Digital Trends reports:Tech CEO Elon Musk has urged his almost 42 million Twitter followers to use secure messaging app Signal instead of Facebook products. In a series of tweets, Musk shared a meme referencing Facebook's role in the spread of misinformation leading to the attack on Congress this week and suggested people should use the Signal app. The tweets seem to have been prompted by a recent change to Facebook's privacy policy. As reported by The Hacker News, the new updates allow more sharing of data between Facebook and its partner company WhatsApp, including the sharing of phone numbers, interactions on the platform, information about mobile devices used to access the service, and IP addresses. If WhatsApp users do not agree to the data sharing, their accounts are disabled. Musk has been vocally critical of Facebook in the past, saying that he chose to delete Facebook accounts for SpaceX and Tesla in the wake of the Cambridge Analytica scandal in 2018. He has also had spats with Facebook CEO Mark Zuckerberg personally, the two of them having sniped at each other over Twitter and other social media platforms several times in the past.Read more of this story at Slashdot.
Slashdot reader the_newsbeagle shares an article from IEEE Spectrum:Many associate XPrize with a $10-million award offered in 1996 to motivate a breakthrough in private space flight. But the organization has since held other competitions related to exploration, ecology, and education. And in November, they launched the Pandemic Response Challenge, which will culminate in a $500,000 award to be split between two teams that not only best predict the continuing global spread of COVID-19, but also prescribe policies to curtail it... For Phase 1, teams had to submit prediction models by 22 December... Up to 50 teams will make it to Phase 2, where they must submit a prescription model... The top two teams will split half a million dollars. The competition may not end there. Amir Banifatemi, XPrize's chief innovation and growth officer, says a third phase might test models on vaccine deployment prescriptions. And beyond the contest, some cities or countries might put some of the Phase 2 or 3 models into practice, if Banifatemi can find adventurous takers. The organizers expect a wide variety of solutions. Banifatemi says the field includes teams from AI strongholds such as Stanford, Microsoft, MIT, Oxford, and Quebec's Mila, but one team consists of three women in Tunisia. In all, 104 teams from 28 countries have registered. "We're hoping that this competition can be a springboard for developing solutions for other really big problems as well," Miikkulainen says. Those problems include pandemics, global warming, and challenges in business, education, and healthcare. In this scenario, "humans are still in charge," he emphasizes. "They still decide what they want, and AI gives them the best alternatives from which the decision-makers choose." But Miikkulainen hopes that data science can help humanity find its way. "Maybe in the future, it's considered irresponsible not to use AI for making these policies," he says. For the Covid-19 competition, Banifatemi emphasized that one goal was "to make the resulting insights available freely to everyone, in an open-source manner — especially for all those communities that may not have access to data and epidemiology divisions, statisticians, or data scientists."Read more of this story at Slashdot.
Mashable reports:We're all judged by the company we keep. With that adage seemingly in mind, Discord moved Friday to ban a pro-Donald Trump server from its platform. TheDonald, as the server was titled, allowed likeminded individuals to digitally gather and was directly linked to the recently banned r/DonaldTrump subreddit and a separate discussion forum... "While there is no evidence of that server being used to organize the Jan 6 riots, Discord decided to ban the server called TheDonald yesterday due to its overt connection to an online forum used to incite violence, plan an armed insurrection in the United States, and spread harmful misinformation related to 2020 U.S. election fraud," a Discord spokesperson confirmed over email. Mashable even notes one comment they'd spotted about shooting politicians. And the forum's reaction to Discord's ban included "calling Discord 'pedos' and saying 'these CEOs need to be dragged out into the street.'"Read more of this story at Slashdot.
"As COVID-19 relentlessly infects more and more of us, scientists are getting a close look at the strange and frightening damage it can inflict on our bodies," writes Science Alert (in an article shared by long-time Slashdot reader AmiMoJo):We've known since early in the pandemic this disease wreaks havoc on more than just the respiratory system, also causing gastrointestinal conditions, heart damage and blood clotting disorders. Now, a year into the pandemic, in-depth autopsies of COVID-19 patients have revealed greater details of widespread inflammation and damage in brain tissues. This may help explain the deluge of neurological symptoms that have manifested in some patients, from headaches, memory loss, dizziness, weakness and hallucinations to more severe seizures and strokes. Some estimate that up to 50 percent of those hospitalised with COVID-19 could have neurological symptoms that can leave people struggling to do even common daily tasks like preparing a meal. "We were completely surprised. Originally, we expected to see damage that is caused by a lack of oxygen," said physician and clinical director at National Institute of Health (NIH), Avindra Nath. "Instead, we saw multifocal areas of damage that is usually associated with strokes and neuroinflammatory diseases...." Their report was published in the New England Journal of Medicine. The article also remembers a September remark by a University of Liverpool neurologist to Nature magazine back in September who had also suggested possible neurological symptoms from COVID-19. "We've seen this group of younger people without conventional risk factors who are having strokes, and patients having acute changes in mental status that are not otherwise explained."Read more of this story at Slashdot.
Writing in the Atlantic, programmer/economics commentator Steve Randy Waldman explains "Why I changed my mind" about the Communication Decency Act's Section 230:In the United States, you are free to speak, but you are not free of responsibility for what you say. If your speech is defamatory, you can be sued. If you are a publisher, you can be sued for the speech you pass along. But online services such as Facebook and Twitter can pass along almost anything, with almost no legal accountability, thanks to a law known as Section 230. President Donald Trump has been pressuring Congress to repeal the law, which he blames for allowing Twitter to put warning labels on his tweets. But the real problem with Section 230, which I used to strongly support, is the kind of internet it has enabled. The law lets large sites benefit from network effects (I'm on Facebook because my friends are on Facebook) while shifting the costs of scale, like shoddy moderation and homogenized communities, to users and society at large. That's a bad deal. Congress should revise Section 230 — just not for the reasons the president and his supporters have identified. When the law was enacted in 1996, the possibility that monopolies could emerge on the internet seemed ludicrous. But the facts have changed, and now so must our minds... By creating the conditions under which we are all herded into the same virtual space, Section 230 helped turn the internet into a conformity machine. We regulate one another's speech through shame or abuse, but we have nowhere to go where our own expression might be more tolerable. And while Section 230 immunizes providers from legal liability, it turns those providers into agents of such concentrated influence that they are objects of constant political concern. When the Facebook founder Mark Zuckerberg and the Twitter founder Jack Dorsey are routinely (and justifiably!) browbeaten before Congress, it's hard to claim that Section 230 has insulated the public sphere from government interference... If made liable for posts flagged as defamatory or unlawful, mass-market platforms including Facebook and Twitter would likely switch to a policy of taking down those posts automatically.... Vigorous argument and provocative content would migrate to sites where people take responsibility for their own speech, or to forums whose operators devote attention and judgment to the conversations they host. The result would be a higher-quality, less consolidated, and ultimately freer public square.Read more of this story at Slashdot.
A Sriwijaya Air flight with 62 aboard is missing after losing contact with Indonesia's aviation authorities shortly after takeoff from Jakarta. From a report: Flight SJ182, a 26-year-old Boeing 737-500, was scheduled to depart from the nation's capital to Pontianak on the island of Borneo at 1:40 p.m. local time, according to FlightRadar24 data. It had 56 passengers on board, along with two pilots and four cabin crew, MetroTV reported. Indonesian authorities said they have sent a search vessel from Jakarta to plane's last known location in the Java Sea. First responders were also deployed to the site to aid potential survivors, local TV reported. Sriwijaya Air said it's working to obtain more detailed information about the flight, and will release an official statement later. Updated at 14:53 GMT: The plane crashed, the Indonesian authorities said moments ago.Read more of this story at Slashdot.
"Both local police and the FBI are seeking information about individuals who were 'actively instigating violence' in Washington, DC, on January 6," writes Ars Technica. Then they speculate on which tools will be used to find them:While media organizations took thousands of photos police can use, they also have more advanced technologies at their disposal to identify participants, following what several other agencies have done in recent months... In November, The Washington Post reported that investigators from 14 local and federal agencies in the DC area have used a powerful facial recognition system more than 12,000 times since 2019. Neither would an agency need actual photos or footage to track down any mob participant who was carrying a mobile phone. Law enforcement agencies have also developed a habit in recent years of using so-called geofence warrants to compel companies such as Google to provide lists of all mobile devices that appeared within a certain geographic area during a given time frame... With all of that said, however, the DC Metropolitan Police and the FBI will probably need to look no further than a cursory Google search to identify many of the leaders of Wednesday's insurrection, as many of them took to social media both before and after the event to brag about it in detail. In short: you don't need fancy facial recognition tools to identify people who livestream their crimes. Friday the Washington Post also cited "the countless hours of video — much of it taken by the rioters themselves and uploaded to social media" as a useful input for facial recognition software. But in addition, they note that "The Capitol, more than most buildings, has a vast cellular and wireless data infrastructure of its own to make communications efficient in a building made largely of stone and that extends deep underground and has pockets of shielded areas. Such infrastructure, such as individual cell towers, can turn any connected phone into its own tracking device. "Phone records make determining the owners of these devices trivially easy..."Read more of this story at Slashdot.
The Weather Channel reports:One main reason humans need to get a flu vaccine annually: flu strains mutate regularly so vaccines need to be slightly altered every year. During past flu seasons, the CDC has noted a vaccine effectiveness range between 40-60%, and a reduced the risk of flu-related illness by 40-60% within the overall population. There are, however, several "universal" flu vaccines currently being studied that aim to make annual flu vaccinations a thing of the past. In fact, according to the American Society for Microbiology, some of these vaccine candidates are in phase 2 and phase 3 trials right now. Now UPI reports:Researchers believe they are one step closer to a "universal" flu vaccine, even as concerns over the seasonal virus move to the back burner during the COVID-19 pandemic. T cells found in the lungs may hold the key to long-lasting immunity against influenza A, the more common and often more severe form of the virus, according to the researchers behind a study published Friday by Science Immunology. These cells, which the researchers call resident helper T cells, help the body initiate antiviral responses against new influenza strains even after experience with only one type of the virus, the researchers said. This type of "generalized" immune response, against all virus strains, is not possible with the currently available yearly vaccine formulations, they said.Read more of this story at Slashdot.
An anonymous reader quotes a report from The Guardian: Genetic differences between identical twins can begin very early in embryonic development, according to a study that researchers say has implications for examining the effects of nature versus nurture. Identical -- or monozygotic -- twins come from a single fertilized egg that splits in two. They are important research subjects because they are thought to have minimal genetic differences. This means that when physical or behavioral differences emerge, environmental factors are presumed to be the likely cause. But the new research, published on Thursday in the journal Nature Genetics, suggests the role of genetic factors in shaping these differences has been underestimated. [Kari Stefansson, the co-author of the paper and head of Iceland's deCODE genetics] and his team sequenced the genomes of 387 pairs of identical twins and their parents, spouses and children in order to track genetic mutations. They measured mutations that occurred during embryonic growth and found that identical twins differed by an average of 5.2 early developmental mutations. In 15% of twins, the number of diverging mutations was higher. When a mutation happened in the first few weeks of embryonic development, it would be expected to be widespread both in an individual's cells and in those of their offspring. In one of the pairs of twins studied, for example, a mutation was present in all cells in one sibling's body -- meaning it is likely to have happened very early in development -- but not at all in the other twin. Stefansson said that out of the initial mass that would go on to form the individuals, "one of the twins is made out of the descendants of the cell where the mutation took place and nothing else," while the other was not. "These mutations are interesting because they allow you to begin to explore the way in which twinning happens."Read more of this story at Slashdot.
A Sriwijaya Air flight with 62 aboard is missing after losing contact with Indonesia's aviation authorities shortly after takeoff from Jakarta. From a report: Flight SJ182, a 26-year-old Boeing 737-500, was scheduled to depart from the nation's capital to Pontianak on the island of Borneo at 1:40 p.m. local time, according to FlightRadar24 data. It had 56 passengers on board, along with two pilots and four cabin crew, MetroTV reported. Indonesian authorities said they have sent a search vessel from Jakarta to plane's last known location in the Java Sea. First responders were also deployed to the site to aid potential survivors, local TV reported. Sriwijaya Air said it's working to obtain more detailed information about the flight, and will release an official statement later. Updated at 14:53 GMT: The plane crashed, the Indonesian authorities said moments ago.Read more of this story at Slashdot.
A Sriwijaya Air flight with 62 aboard is missing after losing contact with Indonesia's aviation authorities shortly after takeoff from Jakarta. From a report: Flight SJ182, a 26-year-old Boeing 737-500, was scheduled to depart from the nation's capital to Pontianak on the island of Borneo at 1:40 p.m. local time, according to FlightRadar24 data. It had 56 passengers on board, along with two pilots and four cabin crew, MetroTV reported. Indonesian authorities said they have sent a search vessel from Jakarta to plane's last known location in the Java Sea. First responders were also deployed to the site to aid potential survivors, local TV reported. Sriwijaya Air said it's working to obtain more detailed information about the flight, and will release an official statement later.Read more of this story at Slashdot.
Equifax said Friday that it has signed a deal to acquire Kount, providers of digital identity and fraud prevention software, for $640 million. Equifax said it plans to use Kount's technology to bolster its footprint in digital identity and fraud prevention market. ZDNet reports: Kount's software relies on artificial intelligence to link trust and fraud data signals from billions of digital interactions, devices, and annual transactions. The signals are collected and combined with Kount's AI-driven predictive insights to help businesses prevent digital fraud and protect against account takeovers in real time. Applied to business transactions, Equifax posits that Kount's technology can help facilitate faster and more accurate identity trust decisions, including payments, account creations and login, while also reducing fraud, chargebacks, false positives, and manual reviews. The full suite of Kount products will be integrated into the Equifax Luminate fraud platform, which aims to help manage fraud decisions across the consumer account lifecycle.Read more of this story at Slashdot.
Google is planning to release a new Nest Hub in 2021 that will feature sleeping tracking powered by the company's Soli radar technology. 9to5Google reports: Google's Advanced Technology and Projects group first unveiled Soli in 2015, but it did not launch on a consumer device until 2019. The sensor lets you perform air gestures over the Pixel 4 to play/pause and skip/rewind tracks, as well as snooze alarms and silence phone calls. It's also used to speed up face unlock by detecting when users reach for their phone and turning on the components needed for recognition. Third-party Android developers can incorporate the tech, which emits radar waves, into games and other interactive experiences. Meanwhile, the new Nest Thermostat also leverages it for improved motion sensing to wake the screen when you walk by. Soli will soon be used to track sleep. Embedded into this upcoming Nest Hub, Google is embracing how Smart Displays are often placed on bedside tables as alarm clocks and speakers. The original Nest Hub is more likely to be used in sensitive areas since it lacks a camera, with sleep tracking serving as another incentive to place this device on your nightstand. The FCC filing at the start of this week revealed that the Soli sensor placed in the Nest Hub will have technical capabilities identical to the Pixel 4. Google has long touted precise and fine gesture recognition, like spinning a virtual dial or adjusting a slider. This should translate to detecting any body movements you make at night. For comparison, the Nest Thermostat uses a more limited version of Soli to detect general motion. It's possible that Google will also use Soli on this Nest Hub for gestures to control content. The Nest Hub Max today already uses its camera to play/pause tracks when you hold up a hand.Read more of this story at Slashdot.
New submitter yuvcifjt writes: As of Friday 6pm EST (11pm GMT), The Verge reported that Apple and Google are under pressure and receiving complaints to deplatform Parler -- the social media platform favored by the right-wing and extremists -- from their app stores. BuzzFeed has since broken news that Apple has served notice to Parler's executives to implement a full moderation plan within 24 hours or risk being taken off the App Store. "We have received numerous complaints regarding objectionable content in your Parler service, accusations that the Parler app was used to plan, coordinate, and facilitate the illegal activities in Washington D.C. on January 6, 2021 that led (among other things) to loss of life, numerous injuries, and the destruction of property," Apple wrote to Parler. "The app also appears to continue to be used to plan and facilitate yet further illegal and dangerous activities." Google issued a similar ultimatum, although it suspended Parler from its app store until it implements a moderation plan that addresses "this ongoing and urgent public safety threat."Read more of this story at Slashdot.
A new theory described today in Scientific Reports posits that hunter-gatherers whose omnivorous digestive system prevented too much protein consumption likely shared surplus meat with wolves. Those scraps may have initiated a step toward domestication. Scientific American reports: [Maria Lahtinen, a senior researcher at the Finnish Food Authority and a visiting scholar at the Finnish Museum of Natural History] did not originally set out to solve a long-standing dog mystery. Instead she was studying the diet of late Pleistocene hunter-gatherers in Arctic and sub-Arctic Eurasia. At that time, around 20,000 to 15,000 years ago, the world was engulfed in the coldest period of the last ice age. In frigid environments then, as today, humans tended to derive the majority of their food from animals. Nutritional deficiencies came from the absence of fat and carbohydrates, not necessarily protein. Indeed, if humans eat too much meat, diarrhea usually ensues. And within weeks, they can develop protein poisoning and even die. "Because we humans are not fully adapted to a carnivorous diet, we simply cannot digest protein very well," Lahtinen says. "It can be very fatal in a very short period of time." During the coldest years of the last ice age -- and especially in harsh Arctic and sub-Arctic winters -- reindeer, wild horses and other human prey animals would have been eking out an existence, nearly devoid of fat and composed mostly of lean muscle. Using previously published early fossil records, Lahtinen and her colleagues calculated that the game captured by people in the Arctic and sub-Arctic during this time would have provided much more protein than they could have safely consumed. In more ecologically favorable conditions, wolves and humans would have been competing for the same prey animals. But under the harsh circumstances of the Arctic and sub-Arctic ice age winter, sharing excess meat with canines would have cost people nothing. The descendants of wolves that took advantage of such handouts would have become more docile toward their bipedal benefactors over time, and they likely went on to become the first domesticated dogs. As the authors point out, the theory makes sense not just ecologically but also geographically: the earliest Paleolithic dog discoveries primarily come from areas that were very cold at the time.Read more of this story at Slashdot.
Intel has talked with TSMC and Samsung about the Asian companies making some of its best chips, but the Silicon Valley pioneer is still holding out hope for last-minute improvements in its own production capabilities. Bloomberg reports: After successive delays in its chip fabrication processes, Santa Clara, California-based Intel has yet to make a final decision less than two weeks ahead of a scheduled announcement of its plans, according to people familiar with the deliberations. Any components that Intel might source from Taiwan wouldn't come to market until 2023 at the earliest and would be based on established manufacturing processes already in use by other TSMC customers, said the people, asking not to be identified because the plans are private. Talks with Samsung, whose foundry capabilities trail TSMC's, are at a more preliminary stage, the people said. An Intel spokesperson referred to previous comments by Bob Swan, the company's chief executive officer. Swan has promised investors he'll set out his plans for outsourcing and get Intel's production technology back on track when the company reports earnings Jan. 21. [...] TSMC, the largest maker of semiconductors for other companies, is preparing to offer Intel chips manufactured using a 4-nanometer process, with initial testing using an older 5-nanometer process, according to the people. The company has said it will make test production of 4-nanometer chips available in the fourth quarter of 2021 and volume shipments the following year. The Taiwanese company expects to have a new facility in Baoshan operational by the end of this year, which can be converted to production for Intel if required, one of the people said. TSMC executives previously said the new Baoshan unit would house a research center with 8,000 engineers. While Intel has outsourced production of lower-end chips before, it has kept the manufacturing of its best semiconductors in-house, considering it a competitive strength. Its engineers have historically tailored their designs to the company's manufacturing processes, making a shift to outsourcing of flagship products unthinkable in the past. As the provider of 80% of personal computer and server processors globally, Intel produces hundreds of millions of chips each year. That scale dictates that any potential supplier must create new capacity to accommodate Intel.Read more of this story at Slashdot.