Snowden Documents: CSE Tracks Millions of Downloads Daily 4

Posted by samzenpus
from the keeping-an-eye-on-things dept.
Advocatus Diaboli writes Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed 'Levitation' are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

Scientists Discover How To Track Natural Errors In DNA Replication 6

Posted by samzenpus
from the points-of-failure dept.
BarbaraHudson writes Researchers figured out how to label and keep track of new pieces of DNA, and learned to follow the enzyme responsible for copying those pieces. Their research focused on enzymes called polymerases. These enzymes create small regions in DNA that act as scaffolds for the copied DNA. Scientists assumed that the body deletes the scaffolds containing errors, or mutations, and the standard computer models supported this theory. However, the actual research showed that about 1.5 percent of those erroneous scaffolds are left over, trapped within the DNA. After running models, scientists now believe they can track how DNA replicates and find the most likely areas where these scaffolds with errors turn up. The erroneous scaffolds usually appear close to genetic switches, those regions that turn on when genes activate. The mutations damage the switch, which results in genetic disease, as well as increasing the likelihood of cancer.

Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites 81

Posted by samzenpus
from the watch-what-you-watch dept.
MojoKid writes Adobe issued a patch for bug CVE-2015-0311, one that exposes a user's browser to become vulnerable to code injection, and the now infamous Angler EK (Exploit Kit). To fall victim to this kind of attack, all someone needs to do is visit a website with compromised Flash files, at which point the attacker can inject code and utilize Angler EK, which has proven to be an extremely popular tool over the past year. This particular version of Angler EK is different, however. For starters, it makes use of obfuscated JavaScript and attempts to detect virtual machines and anti-virus products. Its target audience is also rather specific: porn watchers. According to FireEye, which has researched the CVE-2015-0311 vulnerability extensively, this exploit has reached people via banner ads on popular adult websites. It was also noted that even a top 1000 website was affected, so it's not as though victims are surfing to the murkiest depths of the web to come in contact with it.

Scientists 3D-Printing Cartilage For Medical Implants 17

Posted by samzenpus
from the body-printing dept.
Molly McHugh writes Scientists and physicians at The Feinstein Institute for Medical Research have discovered a way to use MakerBot's 3D-printing technologies to create cartilage and repair tissue damage in the trachea. From the article: "Researchers found that it’s possible to use the MakerBot Replicator 2X Experimental 3D Printer to print what’s called 'scaffolding,' made up of PLA, a bioplastic commonly used in in surgical implant devices. The team customized the printer so that living cells could be printed onto the scaffolding. The 3D-printed mixture of healthy cells found in cartilage, and collagen, eventually grew into the shape of a trachea that could be implanted into a patient."

Anonymous No More: Your Coding Style Can Give You Away 124

Posted by samzenpus
from the leaving-your-mark dept.
itwbennett writes Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a "code stylometry" that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google's Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code. Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%.

Book Review: Designing and Building a Security Operations Center 18

Posted by samzenpus
from the read-all-about-it dept.
benrothke writes Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous point solutions (anti-virus, firewalls, IDS/IPS, ERP, access control, IdM, single sign-on, etc.) that can create millions of daily log messages. In addition to directed attacks becoming more frequent and sophisticated, there are regulatory compliance issues that place increasing burden on security, systems and network administrators. This creates a large amount of information and log data without a formal mechanism to deal with it. This has led to many organizations creating a security operations center (SOC). A SOC in its most basic form is the centralized team that deals with information security incidents and related issues. In Designing and Building a Security Operations Center, author David Nathans provides the basics on how that can be done. Keep reading for the rest of Ben's review

The American App Economy Is Now "Bigger Than Hollywood" 84

Posted by samzenpus
from the there's-an-app-for-that dept.
Lemeowski writes Technology business analyst Horace Deidu found an interesting nugget while closely examining an Apple press release from earlier this year: "The iOS App Store distributed $10 billion to developers in 2014, which, Deidu points out, is just about as much as Hollywood earned off U.S. box office revenues the same year." That means the American app industry is poised to eclipse the American film industry. Additionally, Apple says its App Store has created 627,000 jobs, which Deidu contrasts with the 374,000 jobs Hollywood creates

Nobel Laureate and Laser Inventor Charles Townes Passes 60

Posted by samzenpus
from the rest-in-peace dept.
An anonymous reader writes Charles Hard Townes, a professor emeritus of physics at the University of California, Berkeley, who shared the 1964 Nobel Prize in Physics for invention of the laser and subsequently pioneered the use of lasers in astronomy, died early Tuesday in Oakland. He was 99. "Charlie was a cornerstone of the Space Sciences Laboratory for almost 50 years,” said Stuart Bale, director of the lab and a UC Berkeley professor of physics. “He trained a great number of excellent students in experimental astrophysics and pioneered a program to develop interferometry at short wavelengths. He was a truly inspiring man and a nice guy. We’ll miss him.”

Graphene: Reversible Method of Magnetic Doping Paves Way For Semiconductor Use 24

Posted by Soulskill
from the nano-baby-steps dept.
concertina226 writes: A team of physicists at University of California, Riverside have discovered how to induce magnetism in graphene in a way that still preserves the material's electronic properties, which paves the way for graphene to be used as a semiconductor.

The researchers grew a sheet of yttrium iron garnet using laser molecular beam epitaxy in a laboratory (abstract). Magnetic substances like iron are known to disrupt graphene's electrical conduction properties, but yttrium iron garnet works well as it is an electric insulator.

When a graphene sheet was placed on top of an atomically smooth sheet of yttrium iron garnet, the graphene borrowed the magnetic properties from the yttrium iron garnet and became magnetized without the need for doping.

New Micro-Ring Resonator Creates Quantum Entanglement On a Silicon Chip 44

Posted by Soulskill
from the approaching-technobabble-territory dept.
Zothecula writes: The quantum entanglement of particles, such as photons, is a prerequisite for the new and future technologies of quantum computing, telecommunications, and cyber security. Real-world applications that take advantage of this technology, however, will not be fully realized until devices that produce such quantum states leave the realms of the laboratory and are made both small and energy efficient enough to be embedded in electronic equipment. In this vein, European scientists (abstract) have created and installed a tiny "ring-resonator" on a microchip that is claimed to produce copious numbers of entangled photons while using very little power to do so.

Why Screen Lockers On X11 Cannot Be Secure 260

Posted by Soulskill
from the targeted-for-improvement dept.
jones_supa writes: One thing we all remember from Windows NT is the security feature requiring the user to press CTRL-ALT-DEL to unlock the workstation (this can still be enabled with a policy setting). The motivation was to make it impossible for other programs to mimic a lock screen, as they couldn't react to the special key combination. Martin Gräßlin from the KDE team takes a look at the lock screen security on X11. On a protocol level, X11 doesn't know anything of screen lockers. Also the X server doesn't know that the screen is locked as it doesn't understand the concept. This means the screen locker can only use the core functionality available to emulate screen locking. That in turn also means that any other client can do the same and prevent the screen locker from working (for example opening a context menu on any window prevents the screen locker from activating). That's quite a bummer: any process connected to the X server can block the screen locker, and even more it could fake your screen locker.

Justice Department: Default Encryption Has Created a 'Zone of Lawlessness' 343

Posted by Soulskill
from the what-would-you-call-this-zone-that's-allegedly-associated-with-danger? dept.
Jason Koebler writes: Leslie Caldwell, an assistant attorney general at the Justice Department, said Tuesday that the department is "very concerned" by the Google's and Apple's decision to automatically encrypt all data on Android and iOS devices.

"We understand the value of encryption and the importance of security," she said. "But we're very concerned they not lead to the creation of what I would call a 'zone of lawlessness,' where there's evidence that we could have lawful access through a court order that we're prohibited from getting because of a company's technological choices.

We May Have Jupiter To Thank For the Nitrogen In Earth's Atmosphere 41

Posted by Soulskill
from the jupiter-never-forgets-our-birthday dept.
An anonymous reader writes: Nitrogen makes up about 78% of the Earth's atmosphere. It's also the 4th most abundant element in the human body. But where did all the nitrogen on Earth come from? Scientists aren't sure, but they have a new theory. Back when the solar system was just a protoplanetary disk, the ice orbiting the early Sun included ammonia, which has a nitrogen atom and three hydrogen atoms. But there needed to be a way for the nitrogen to get to the developing Earth. That's where Jupiter comes in. During its theorized Grand Tack, where it plunged into the inner solar system and then retreated outward again, it created shock waves in the dust and ice cloud surrounding the sun. These shock waves caused gentle heating of the ammonia ice, which allowed it to melt and react with chromium-bearing metal to form a mineral called carlsbergite. New research (abstract) suggests this mineral was then present when the Earth's accretion happened, supplying much of the nitrogen we would eventually need for life.

The iPad Is 5 Years Old This Week, But You Still Don't Need One 226

Posted by Soulskill
from the interactive-chopping-boards dept. writes: Five years ago, Steve Jobs introduced the iPad and insisted that it would do many things better than either a laptop or a smartphone. Will Oremus writes at Future Tense that by most standards, the iPad has been a success, and the tablet has indeed emerged as a third category of computing device. But there's another way of looking at the iPad. According to Oremus, Jobs was right to leave out the productivity features and go big on the simple tactile pleasure of holding the Internet in your hands.

But for all its popularity and appeal, the iPad never has quite cleared the bar Jobs set for it, which was to be "far better" at some key tasks than a laptop or a smartphone. The iPad may have been "far better" when it was first released, but smartphones have come a long way. The iPhone 6 and 6 Plus and their Android equivalents are now convenient enough for most mobile computing tasks that there's no need to carry around a tablet as well. That helps explain why iPad sales have plateaued, rather than continuing to ascend to the stratospheric levels of the iPhone. "The iPad remains an impressive machine. But it also remains a luxury item rather than a necessity," concludes Oremus. "Again, by most standards, it is a major success. Just not by the high standards that Jobs himself set for it five years ago."

Facebook Censoring Images of the Prophet Muhammad In Turkey 197

Posted by Soulskill
from the a-picture-is-worth-a-thousand-complaints dept.
An anonymous reader writes: Immediately following the Charlie Hebdo attack, Mark Zuckerberg said, "... this is what we all need to reject — a group of extremists trying to silence the voices and opinions of everyone else around the world. I won't let that happen on Facebook. I'm committed to building a service where you can speak freely without fear of violence." Now, Facebook has begun censoring images of the prophet Muhammad in Turkey. According to the Washington post, "It's an illustration, perhaps, of how extremely complicated and nuanced issues of online speech really are. It's also conclusive proof of what many tech critics said of Zuckerberg's free-speech declaration at the time: Sweeping promises are all well and good, but Facebook's record doesn't entirely back it up." To be fair to Zuckerberg and Facebook, the company must obey the law of any country in which it operates. But it stands in stark contrast to the principles espoused by its founder.