❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 18 June 2024Main stream

How the Lib Dems might double their seats despite fewer votes – visualised

18 June 2024 at 08:03

A combination of a more efficient vote and a rise in tactical voting gives Ed Davey an opportunity to double Commons representation

The Liberal Democrats could increase their total seats in the new parliament owing to a more efficient vote distribution across the UK, say experts, despite the party polling a lower national vote share than in 2019.

The Lib Dems are polling at 10-11%, slightly lower than the 11.6% they won in 2019, which led to 11 seats in parliament.

Continue reading...

πŸ’Ύ

Β© Composite: Getty/Guardian Design Team

πŸ’Ύ

Β© Composite: Getty/Guardian Design Team

Gary Lineker appears to wear his own clothing range during Euros coverage

BBC says presenters β€˜regularly reminded of guidelines’ on promoting clothing after Lineker wore green T-shirt

The BBC has said on-screen presenters and contributors are β€œregularly reminded of the guidelines in relation to clothing” after Gary Lineker appeared to be wearing his own range of clothing on air.

While fronting the coverage for the BBC for England’s opening Euros game against Serbia on Sunday, the Match of the Day host wore a pale green knitted T-shirt, and put on a sage green jacket at half-time.

Continue reading...

πŸ’Ύ

Β© Photograph: John Walton/PA

πŸ’Ύ

Β© Photograph: John Walton/PA

Yesterday β€” 17 June 2024Main stream

Row as Nato chief hints at talks to increase availability of nuclear weapons

Jens Stoltenberg accused of β€˜escalation of tension’ as he warns of growing threat from Russia and China

The Nato secretary general, Jens Stoltenberg, has indicated that the military alliance is considering whether to increase the number of available nuclear weapons, triggering warnings from experts about the possibility of a new arms race.

Stoltenberg said Nato could, for the first time, face a significant nuclear threat from two fronts – Russia and China – and that it may be necessary to increase the number of deployable warheads as a deterrent.

Continue reading...

πŸ’Ύ

Β© Photograph: Omar Havana/Getty Images

πŸ’Ύ

Β© Photograph: Omar Havana/Getty Images

The Guardian view on Labour’s plan for growth: the missing ingredient is clearly demand | Editorial

By: Editorial
17 June 2024 at 13:36

The UK can’t continue with policies that have produced a productivity slump and record amounts of insecure work

In the manifestos of both the Conservative and the Labour parties, there is a commitment to implementing the NHS long-term workforce plan to ensure that the country will be able to populate the health service with UK-trained doctors and nurses. However, neither of the parties are suggesting that they will fund the Β£30bn it would cost to employ the tens of thousands of staff they say they will train. Instead, voters are expected to believe that the confidence fairy will turn up when the next government arrives – and businesses will invest, leading to economic growth.

It is magical thinking to believe that, without actually doing anything, private spending in Britain will be stimulated to such an extent that it will more than compensate for the anticipated public sector cutsΒ that depress it.

Continue reading...

πŸ’Ύ

Β© Photograph: Wiktor Szymanowicz/Future Publishing/Getty Images

πŸ’Ύ

Β© Photograph: Wiktor Szymanowicz/Future Publishing/Getty Images

The Guardian view on violent crime: the next government must keep its promises | Editorial

By: Editorial
17 June 2024 at 13:34

The gulf between rhetoric and reality on policing and justice is harmful and needs to be closed

The conviction last week of two 12-year-old boys for the murder of a 19-year-old, Shawn Seesahai, with whom they had an altercation in Wolverhampton, has pushed the subject of knife crime up the agenda in the middle of the general election campaign. The pair are the youngest people convicted of murder in the UK for more than 30 years, and a senior investigating officer described his shock at learning their ages.

Typically, rightwing parties place more emphasis on law and order. But tackling crime was not one of RishiΒ Sunak’s five pledges. Sir Keir Starmer’s Labour party, by contrast, has made β€œTake back our streets” one of the five β€œmissions” in its manifesto.

Continue reading...

πŸ’Ύ

Β© Photograph: Alan Simpson/PA

πŸ’Ύ

Β© Photograph: Alan Simpson/PA

Strengthening the Shield: Cybersecurity Strategies for SMEs

By: Editorial
17 June 2024 at 14:03

Cybersecurity Strategies

By: Abhilash R., Head of Cybersecurity at OQ Trading In a progressively digital world, small and medium sized enterprises (SMEs) are not immune to cyber threats. Despite their size, SMEs are prime targets for cyberattacks due to their limited resources and perceived vulnerability. Therefore, implementing robust cybersecurity strategies is imperative to safeguard sensitive data, maintain customer trust, and ensure business continuity. This article delves into five essential cybersecurity strategies tailored to SMEs, emphasizing their importance, and providing cost effective solutions.

Employee Education and Training

One of the most critical cybersecurity strategies for SMEs is ensuring that employees are educated and trained in cybersecurity best practices. Human error remains a significant factor in cyber incidents, making cybersecurity awareness training indispensable. Employees should be educated on recognizing phishing attempts, creating strong passwords, and understanding the importance of software updates. Importance: Employees serve as the first line of defence against cyber threats, they are also the weakest links in cybersecurity. By educating them, SMEs can significantly reduce the risk of successful cyberattacks. Solutions: Implement regular cybersecurity training sessions for all employees, covering topics such as identifying suspicious emails, safe internet browsing practices, and responding to security incidents. Utilize online training resources and simulations to reinforce learning effectively. You can develop internal cybersecurity awareness materials using free or low cost presentation tools such as Google Slides or Microsoft PowerPoint. Create engaging presentations covering topics like identifying phishing emails, password best practices, and responding to security incidents. Additionally, leverage free online resources such as cybersecurity blogs, webinars, and tutorials to supplement employee training efforts. Encourage participation in online courses offered by reputable cybersecurity organizations, some of which may be available at no cost.

Implementing Multi-Factor Authentication (MFA)

Multifactor authentication (MFA) adds an extra layer of security by requiring users to provide multiple forms of verification before accessing sensitive data or systems. This strategy helps mitigate the risk of unauthorized access, even if passwords are compromised. Importance: Passwords alone are no longer sufficient to protect against cyber threats. MFA significantly enhances security by requiring additional authentication factors, such as biometric data or one-time codes. Solutions: Implement MFA for all accounts with access to sensitive information or critical systems. Many cloud-based services and software applications offer built-in MFA capabilities, making implementation relatively straightforward and cost effective. Utilize built-in MFA features provided by cloud-based services and software applications, many of which offer MFA functionality at no additional cost. Implement open source MFA solutions that can be customized to fit the organization's specific needs without incurring licensing fees. Alternatively, explore low-cost MFA options offered by third-party providers, ensuring compatibility with existing systems and scalability as the business grows.

Regular Data Backups

Data loss can have devastating consequences for SMEs, ranging from financial losses to reputational damage. Regularly backing up data is essential for mitigating the impact of ransomware attacks, hardware failures, or accidental deletions. Importance: Data backups serve as a safety net, allowing SMEs to recover quickly in the event of a cyber incident. Without backups, businesses risk permanent loss of valuable information. Solutions: Automate regular backups of critical data to secure cloud storage or offline storage devices. Utilize backup solutions that offer versioning capabilities, allowing businesses to restore data to previous states if necessary. Utilize cloud based backup solutions that offer affordable storage options and automated backup scheduling. Leverage free or low cost backup software with basic features for backing up critical data to secure cloud storage or external hard drives. Implement a combination of full and incremental backups to optimize storage space and minimize backup times. Explore open source backup solutions that provide flexibility and customization options without the need for expensive proprietary software.

Network Security Measures

Securing the network infrastructure is crucial for protecting against external threats and unauthorized access. SMEs should implement robust network security measures, such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs). Importance: Networks are prime targets for cyberattacks, making network security measures essential for preventing unauthorized access and data breaches. Solutions: Deploy firewalls to monitor and control incoming and outgoing network traffic. Implement IDS to detect and respond to suspicious activities within the network. Utilize VPNs to encrypt data transmissions and establish secure connections for remote workers. Implement open source firewall solutions that provide robust network protection without the high cost associated with commercial firewalls. Utilize free or low cost intrusion detection system (IDS) software that offers essential features such as real time monitoring and threat detection. Explore cost effective virtual private network (VPN) solutions tailored to SMEs' needs, such as subscription based services with affordable pricing plans and easy deployment for remote workers.

Regular Security Assessments and Updates

Cyber threats are constantly evolving, requiring SMEs to stay vigilant and proactive in their cybersecurity efforts. Regular security assessments and updates help identify vulnerabilities and ensure that systems and software are up to date with the latest security patches. Importance: Cyber threats are continuously evolving, making regular security assessments and updates essential for maintaining strong cybersecurity posture. Solutions: Conduct regular security assessments to identify potential vulnerabilities in systems, networks, and applications. Develop and implement a patch management strategy to ensure that software and firmware updates are applied promptly. Conduct internal security assessments using free or low cost vulnerability scanning tools to identify potential weaknesses in systems and networks. Utilize open source penetration testing frameworks to simulate cyberattacks and assess the effectiveness of existing security measures. Implement a systematic approach to applying security patches and updates, leveraging free tools provided by software vendors or community driven initiatives. Additionally, establish internal processes for monitoring security advisories and alerts issued by relevant authorities to stay informed about emerging threats and vulnerabilities. In conclusion, cybersecurity is a critical concern for SMEs in today's digital landscape. By implementing the strategies explained above, SMEs can significantly enhance their cybersecurity posture without breaking the bank. Investing in cybersecurity is not only essential for protecting sensitive data and maintaining business operations but also for safeguarding the long-term viability and reputation of SMEs in an increasingly interconnected world. About Author: Abhilash Radhadevi, a seasoned cybersecurity leader, serves as the Head of Cybersecurity at OQ Trading, bringing over two decades of comprehensive experience in the Banking, Financial, Oil and Energy sectors. Widely recognized for his adept leadership, Abhilash has effectively steered international organizations through intricate security challenges. His illustrious career includes spearheading pioneering cybersecurity strategies, resulting in prestigious awards and acclaim. Beyond his professional achievements, Abhilash maintains a global influence and demonstrates unwavering commitment to mentoring, showcasing his dedication to shaping the future landscape of cybersecurity. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Understanding Cyberconflict in the Geopolitical Context

By: Editorial
17 June 2024 at 14:00

Cyberconflict

By Hoda Alkhzaimi The technological prowess of small nations is increasingly recognized as a significant driver of global economic power. This is because technology is a great equalizer; it can enable small nations to leapfrog development stages and compete on a global scale. For instance, the UNCTAD Technology and Innovation Report 2021 highlights that frontier technologies like AI, robotics, and biotechnology have the potential to significantly boost sustainable development, while also posing the risk of widening the digital divide. Small nations, by embracing these technologies, can foster innovation, improve productivity, and create high-value industries that contribute to global trade and economic growth. Moreover, the digital transformation allows for the democratization of information and resources, enabling smaller economies to participate in markets traditionally dominated by larger countries. The OECD also emphasizes the role of SMEs in adapting to a more open and digitalized environment, which is essential for inclusive globalization. Therefore, the technological development of small nations is not just about national progress; it's about contributing to and shaping the global economic landscape. By investing in technology and innovation, small nations can assert their presence on the world stage, influencing global trends and economic policies. Cyber conflicts have emerged as a significant factor in international relations, influencing the dynamics of power in the digital age. The Atlantic Council's Cyber Statecraft Initiative highlights the shift from traditional deterrence strategies to more proactive measures like Defend Forward and Persistent Engagement, reflecting the evolving nature of cyber threats. Research published in Armed Forces & Society suggests that cyber conflicts, termed 'cool wars', are reshaping interactions between states, with denial-of-service attacks and behaviour-changing tactics significantly affecting state relations. Moreover, the ICRC has raised concerns about the protection of civilians from cyber threats during armed conflicts, emphasizing the need for legal and policy frameworks to address the digital risks in warfare. The CyberPeace Institute's analysis of cyberattacks in the context of the Ukraine conflict provides valuable data on the harm to civilians and the evolution of cyber threats. Additionally, the European Repository of Cyber Incidents offers an extensive database of cyber incidents, which can serve as a resource for understanding the scope and impact of cyber warfare. These insights underscore the importance of cyber capabilities in asserting influence and the need for robust cyber defence mechanisms to safeguard national security and civilian welfare in the face of digital threats. The interplay between cyber operations and political power is complex, and as technology continues to advance, the implications for international stability and power hierarchies will likely become even more pronounced

The Role of Misinformation and Disinformation in Cyberconflict

Misinformation and disinformation play a critical role in the landscape of cyberconflict, shaping public perception and influencing the dynamics of geopolitical tensions. A report by Full Fact highlights the detrimental impact of false information on democratic societies, emphasizing the need for informed citizenship to combat the spread of such information. Similarly, data from UNESCO underscores the pervasive risk of encountering disinformation across various media platforms, with statistics indicating a significant trust deficit in media and an increase in the manipulation of news consumption. The cybersecurity sector also recognizes disinformation as a substantial threat, with a study by the Institute for Public Relations revealing that 63% of Americans view disinformation as a major societal issue, and nearly half of cybersecurity professionals consider it a significant threat to security. These concerns are echoed globally, as a survey found that over 85% of people worry about the impact of online disinformation on their country's politics. The intertwining of misinformation, disinformation, and cyberconflict presents a complex challenge that requires a multifaceted approach, including media literacy, regulatory frameworks, and international cooperation to mitigate its effects and safeguard information integrity.

The Role of Big Tech in Cyberconflict Interplay

The role of big tech companies in cyber conflict is a complex and evolving issue. These companies often find themselves at the forefront of cyber conflict, whether as targets, mediators, or sometimes even participants. For instance, during civil conflicts, digital technologies have been used to recruit followers, finance activities, and control narratives, posing additional challenges for peacemakers. The explosive growth of digital technologies has also opened new potential domains for conflict, with state and non-state actors capable of carrying out attacks across international borders, affecting critical infrastructure and diminishing trust among states. In response to the invasion of Ukraine, big tech companies played crucial roles in addressing information warfare and cyber-attacks, showcasing their significant influence during times of conflict. Moreover, the technological competition between major powers like the United States and China further highlights the geopolitical dimension of big tech's involvement in cyber conflict. These instances underscore the need for a robust framework to manage the participation of big tech in cyber conflict, ensuring that their capabilities are harnessed for peace and security rather than exacerbating tensions.

Hedging the Risks of Using AI and Emerging Tech To Scaleup Misinformation and Global Cyberconflicts

In response to the growing threat of election misinformation, various initiatives have been undertaken globally. The World Economic Forum has identified misinformation as a top societal threat and emphasized the need for a concerted effort to combat it, especially in an election year with a significant global population going to the polls. The European Union has implemented a voluntary code of practice for online platforms to take proactive measures against disinformation, including the establishment of a Rapid Alert System and the promotion of fact-checking and media literacy programs. In the United States, the Brennan Center for Justice advocates for active monitoring of false election information and collaboration with internet companies to curb digital disinformation. Additionally, the North Carolina State Board of Elections (NCSBE) provides guidelines for the public to critically assess the credibility of election news sources and encourages the use of reputable outlets. These initiatives represent a multifaceted approach to safeguarding the integrity of elections by enhancing public awareness, improving digital literacy, and fostering collaboration between governments, tech companies, and civil society. In the ongoing battle against election misinformation, several key alliances and actions have been formed. Notably, the AI Elections Accord was proposed for public signature at the Munich Security Conference on February 16, 2024. This accord represents a commitment by technology companies to combat deceptive AI content in elections. In a similar vein, Meta established a dedicated team on February 26, 2024, to address disinformation and the misuse of AI leading up to the European Parliament elections. Furthermore, the Federal Communications Commission (FCC) in the United States took a decisive step by making AI-generated voices in robocalls illegal on February 8, 2024, to prevent their use in misleading voters. These measures reflect a growing recognition of the need for collaborative efforts to safeguard the integrity of elections in the digital age. The alliances and regulations are pivotal in ensuring that the democratic process remains transparent and trustworthy amidst the challenges posed by advanced technologies. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Washington Post accuses incoming editor of using work of β€˜blagger’

Article in US paper claims Robert Winnett, due to join from Telegraph, used material from self-described β€˜thief’

The Washington Post has published an investigation that accuses its own future editor of using the work of a self-described blagger who stole private records to order.

Under the headline β€œIncoming Post editor tied to self-described β€˜thief’ who claimed role in his reporting”, the newspaper claimed that Robert Winnett used material from a self-confessed blagger, John Ford, while working as a journalist on the Sunday Times during the 2000s.

Continue reading...

πŸ’Ύ

Β© Photograph: Andrew Harnik/Getty Images

πŸ’Ύ

Β© Photograph: Andrew Harnik/Getty Images

TCE Cyberwatch: Breaches Hit Universities and Big Names

By: Editorial
17 June 2024 at 10:10

TCE Cyberwatch

This week on TCE Cyberwatch, we report on significant breaches affecting both prominent companies and universities, with thousands of individuals impacted. In addition, TCE Cyberwatch explores the evolving landscape of cybersecurity legality, highlighting Australia's ongoing court case against X. TCE Cyberwatch also delves into advancements in corporate cybersecurity, such as Apple’s upcoming announcement of their very own password management app. Keep reading to find out more!

Akira Ransomware Group Targets Panasonic Australia

The Akira ransomware group has reportedly compromised Panasonic Australia's data, claiming to have exfiltrated sensitive project information and business agreements. The authenticity and full impact of this breach are still unverified. In response, Singapore's Cyber Security Agency (CSA) and Personal Data Protection Commission (PDPC) have advised organizations to report such attacks rather than paying ransoms. This recommendation follows confirmation by law firm Shook Lin & Bok that they paid Akira $1.4 million in Bitcoin. The CSA has warned that paying ransoms does not guarantee data recovery and could potentially encourage further attacks. They recommend implementing robust security measures, including strong password policies, multi-factor authentication, reputable antivirus software, regular vulnerability scans, network segregation, routine backups, incident response exercises, and minimizing data collection. Additionally, the FBI and CISA had previously included Akira in their #StopRansomware campaign, emphasizing the importance of these preventive measures. Read More

Xbox One Kernel Exploit Discovered: Tinkering with Game Script App

An individual known as carrot_c4k3 has discovered a kernel-level exploit for Xbox One consoles using an app called β€˜Game Script’ from the Microsoft Store. This exploit is not a jailbreak but allows users to gain control over virtual machine (vm) homebrews without enabling pirated software. The method involves two components: initial code execution in UWP applications and a kernel exploit granting full read/write permissions. A proof of concept has been shared on GitHub, currently limited to UWP apps. The exploit bypasses developer mode fees and modifies game save data but does not alter actual games. It may also allow running simple emulators. However, Microsoft could potentially detect this exploit, so using an offline console is recommended. It is also possible that the exploit has already been patched in the latest firmware update, version 10.0.25398.4478. Read More

Over 8,000 at VIT Bhopal University Potentially Exposed in Data Breach

VIT Bhopal University in India has reportedly experienced a major data breach, impacting more than 8,000 students and faculty members. The breach, first revealed on June 10, 2024, on BreachForums, involves the alleged leak of sensitive information, including unique identification numbers, usernames, full names, email addresses, passwords, and user activation keys. This compromised data could potentially allow unauthorized access to personal and university accounts, raising significant concerns about phishing attacks and other malicious activities. VIT Bhopal, established in 2017 and ranked 65th in India by the National Institutional Ranking Framework, offers programs in engineering, technology, management, and architecture. As of now, the university has not commented on the breach or disclosed the full extent of the compromised data. Read More

Energy Giant Potentially Breached: Hacker Selling Alleged SGCC Data

A hacker named Desec0x claims to have breached the State Grid Corporation of China (SGCC) and is selling the stolen data on BreachForums for $1,000. The data reportedly includes user account information, employee details, and department roles in SQL and XLSX formats. SGCC, the world's largest utility company, serves over 1.1 billion people in China and owns assets in several countries. If confirmed, this breach could have serious implications for SGCC and its stakeholders. Cyberattacks on the energy sector are increasing, with notable incidents in 2023 and 2024 targeting companies like Consol Energy and Petro-Canada. SGCC has not yet confirmed the breach, and its website appears to be unaffected. Read More

Deepfakes Target Australian Politicians in Investment Scams

Australian politicians, including Finance Minister Katy Gallagher and Foreign Minister Penny Wong, have been targeted in AI-generated deepfake investment scam videos. The scam also used images of Nationals senator Bridget McKenzie and former Prime Minister Scott Morrison, among others. These videos, promoted via Facebook ads, falsely depict the politicians endorsing fraudulent investment schemes. Federal Minister Stephen Jones warned that AI could amplify fraud and proposed reforms to make social media companies more accountable. Gallagher stressed that neither she nor other politicians would promote products online, urging people to report such scams. The government is considering measures like mandatory AI image watermarking to combat misuse. Read More

Get Ready to Switch? Apple Unveils Passwords Manager at WWDC

At Apple's Worldwide Developer Conference next week, the company is expected to unveil its own standalone password manager, named Passwords, which will rival apps like 1Password and LastPass. According to Bloomberg News, Passwords will offer features surpassing those of iCloud and Mac Keychain, enabling users to save Wi-Fi passwords, store passkeys, and categorize login credentials. The app is also anticipated to be compatible with Windows machines, though its availability for Android users remains uncertain. Read More

Monti Ransomware Targets West After Conti's Demise

The Monti ransomware group, which bears similarities to the defunct Conti ransomware, has recently changed ownership and shifted its focus towards Western targets. The new owners are revamping its infrastructure for future operations. Recent attacks in the South of France disrupted the Pau-PyrΓ©nΓ©es airport, the Pau business school, and a digital campus, compromising sensitive data and raising significant cybersecurity concerns. Monti exploits vulnerabilities like Log4Shell to infiltrate networks, encrypt desktops, and disrupt servers. Analysts believe the group leverages Conti’s leaked data for its operations. The cybersecurity community emphasizes the need for strengthened defenses and collaboration to combat such evolving threats. The Monti group’s activities highlight the critical need for robust cybersecurity measures to protect essential infrastructures.Read More

TCE Cyberwatch: Wrap Up

. Recent events have shown that even large, well-protected companies can fall victim to cyberattacks. Therefore, it's always wise to stay proactive and ensure your defenses are up-to-date. Stay safe, stay informed, and take steps to safeguard your digital security.

AridSpy Malware Targets Android Users in Middle East: Messaging Apps Used to Spread Spyware

By: Editorial
17 June 2024 at 07:51

AridSpy spyware

A new wave of cyberattacks targeting Android users in the Middle East has surfaced, with a focus on both Palestine and Egypt. Dubbed AridSpy, this multistage Android malware is allegedly orchestrated by the notorious Arid Viper APT group, a name synonymous with cyber espionage in the region. The malicious software, discovered being distributed through five dedicated websites, is ingeniously disguised within seemingly legitimate applications, marking a dangerous evolution in cyber threats. The modus operandi of these campaigns, initiated as early as 2022 and persisting to this day, revolves around the deployment of trojanized apps designed to infiltrate unsuspecting users' devices. These applications, ranging from messaging platforms to job opportunity portals, harbor the insidious AridSpy spyware within their code, allowing the attackers to remotely control the infected devices and extract sensitive information with alarming efficiency.

Arid Viper APT group Leveraging AridSpy to Target Victims

A key element of AridSpy's strategy lies in its ability to camouflage itself within genuine apps, thus bypassing traditional security measures. By leveraging existing applications and injecting them with malicious code, the perpetrators exploit the trust users place in familiar software, amplifying the reach and impact of their cyber offensive. ESET's investigation into these activities uncovered various instances of AridSpy infiltration, with the majority of cases centered around the distribution of the malicious Palestinian Civil Registry app. This tactic, coupled with the impersonation of reputable messaging platforms like StealthChat and Voxer Walkie Talkie Messenger, underscores the group's sophisticated approach to cyber warfare. LukΓ‘Ε‘ Ε tefanko, a researcher at ESET, sheds light on the mechanics of AridSpy's infiltration, detailing how unsuspecting users are lured into installing the tainted applications. β€œIn order to gain initial access to the device, the threat actors try to convince their potential victim to install a fake, but functional, app. Once the target clicks the site’s download button, myScript.js, hosted on the same server, is executed to generate the correct download path for the malicious file,” explains Ε tefanko. Through deceptive download buttons and carefully crafted scripts, the attackers exploit vulnerabilities in users' trust and familiarity with popular apps, paving the way for the silent installation of AridSpy on their devices.

Reverse-Engineering AppsΒ 

Moreover, Arid Viper's ingenuity extends beyond mere app impersonation, as evidenced by their manipulation of legitimate app servers to facilitate data exfiltration. By reverse-engineering existing apps and utilizing their infrastructure, the group orchestrates a seamless data extraction process, further complicating detection and mitigation efforts. AridSpy's capabilities are not limited to data espionage alone; the spyware boasts a sophisticated feature set aimed at evading detection and maximizing information extraction. Through a combination of network evasion tactics and event-triggered data exfiltration mechanisms, AridSpy operates stealthily, siphoning off a plethora of sensitive data including call logs, text messages, media files, and even location information. As the online threats continue to target victims globally, users and organizations alike must remain vigilant against hackers groups and ransomware gangs. By staying informed and adopting robust security measures, individuals can mitigate the risks posed by malicious actors such as the Arid Viper group, safeguarding their digital assets and personal information from exploitation.

ASUS Releases Firmware Update for Critical Remote Authentication Bypass Affecting Seven Routers

17 June 2024 at 07:34
A report from BleepingComputer notes that ASUS "has released a new firmware update that addresses a vulnerability impacting seven router models that allow remote attackers to log in to devices." But there's more bad news: Taiwan's CERT has also informed the public about CVE-2024-3912 in a post yesterday, which is a critical (9.8) arbitrary firmware upload vulnerability allowing unauthenticated, remote attackers to execute system commands on the device. The flaw impacts multiple ASUS router models, but not all will be getting security updates due to them having reached their end-of-life (EoL). Finally, ASUS announced an update to Download Master, a utility used on ASUS routers that enables users to manage and download files directly to a connected USB storage device via torrent, HTTP, or FTP. The newly released Download Master version 3.1.0.114 addresses five medium to high-severity issues concerning arbitrary file upload, OS command injection, buffer overflow, reflected XSS, and stored XSS problems.

Read more of this story at Slashdot.

Researchers Devise Photosynthesis-Based Energy Source With Negative Carbon Emissions

17 June 2024 at 04:39
Researchers have devised a way to extract energy from the photosynthesis process of algae, according to an announcement from Concordia University. Suspended in a specialized solution, the algae forms part of a "micro photosynthetic power cell" that can actually generate enough energy to power low-power devices like Internet of Things (IoT) sensors. "Photosynthesis produces oxygen and electrons. Our model traps the electrons, which allows us to generate electricity," [says Kirankumar Kuruvinashetti, PhD 20, now a Mitacs postdoctoral associate at the University of Calgary.] "So more than being a zero-emission technology, it's a negative carbon emission technology: it absorbs carbon dioxide from the atmosphere and gives you a current. Its only byproduct is water." [...] Muthukumaran Packirisamy, professor in the Department of Mechanical, Industrial and Aerospace Engineering and the paper's corresponding author, admits the system is not yet able to compete in power generation with others like photovoltaic cells. The maximum possible terminal voltage of a single micro photosynthetic power cell is only 1.0V. But he believes that, with enough research and development, including artificial intelligence-assisted integration technologies, this technology has the potential to be a viable, affordable and clean power source in the future. It also offers significant manufacturing advantages over other systems, he says. "Our system does not use any of the hazardous gases or microfibres needed for the silicon fabrication technology that photovoltaic cells rely on. Furthermore, disposing of silicon computer chips is not easy. We use biocompatible polymers, so the whole system is easily decomposable and very cheap to manufacture." In the paper the researchers also described it as a Γ’oemicrobial fuel cellΓ’...

Read more of this story at Slashdot.

Don’t Be a Sitting Duck: The Cybersecurity Checklist You Need Right Now

By: Editorial
17 June 2024 at 03:43

Cybersecurity Checklist

A cybersecurity checklist is essential for strengthening the security of both personal devices and corporate networks in today's digital landscape. While primarily geared towards businesses ensuring cyber safety for their employees and workplaces, these measures are equally crucial for individual device security. This checklist outlines fundamental practices to safeguard against evolving cyber threats, ensuring proactive defense strategies are in place.

Must-have Cybersecurity Checklist

1. Data Encryption

Data encryption converts sensitive information into a coded format, rendering it unreadable to unauthorized users. This security measure ensures confidentiality and compliance with privacy regulations. Even if attackers gain access to encrypted data, they cannot decipher it without the correct decryption key, thereby maintaining data integrity.

2. Disaster Recovery Policy

A disaster recovery policy is vital for organizations to respond to and recover from cyberattacks or system failures swiftly. It includes procedures for data restoration, minimizing downtime, and ensuring business continuity. Regular updates and drills ensure readiness to handle emergencies effectively.

3. External Hard Drive Backup

Maintaining backups on an external hard drive provides an offline data redundancy solution. This practice safeguards critical data independently from primary systems. In scenarios like ransomware attacks or network failures, offline backups facilitate quick data restoration, complementing cloud-based backups.

4. Updated Software

Regularly updating software is critical to patch known vulnerabilities that cybercriminals exploit. Updates not only enhance security but also improve software functionality and performance. Neglecting updates leaves systems vulnerable to cyber threats and compromises overall system integrity.

5. Cybersecurity Insurance

Cybersecurity insurance offers financial protection against losses resulting from cyber incidents. It covers expenses such as investigation costs, legal fees, and mitigation efforts. This insurance serves as a safety net, ensuring businesses can recover and resume operations following significant cybersecurity events.

6. Antivirus Updates

Frequent updates to antivirus software are essential to defend against emerging malware threats. Updated antivirus solutions detect and block malicious activities, enhancing overall system security. Continuous updates ensure systems are protected against evolving cyber threats.

7. Principle of Least Privilege

Implementing the principle of least privilege limits user access rights to only what is necessary for their roles. This mitigates the risk of insider threats and unauthorized access, maintaining control over system configurations and enhancing overall security posture.

8. Secure Connections

Secure connections, often facilitated by VPNs (Virtual Private Networks), encrypt data during transmission over public or unsecured networks. This practice prevents interception and unauthorized access to sensitive information, ensuring data confidentiality and integrity.

9. Robust Firewall

A robust firewall acts as a barrier between trusted internal networks and external networks, filtering incoming and outgoing traffic. It blocks malicious traffic and unauthorized access attempts, safeguarding network infrastructure and sensitive data from cyber threats.

10. Cybersafety Policies

Establishing comprehensive cybersafety policies is crucial for promoting cybersecurity awareness and best practices among employees. These policies cover password guidelines, internet usage protocols, and email security measures. Regular training reinforces these policies, reducing vulnerabilities to phishing attacks and unauthorized access attempts.

Conclusion

This cybersecurity checklist encompasses essential measures to prepare against potential cyber threats. It emphasizes proactive strategies both online and physically, including the use of external hard drives for backups and the implementation of robust cybersecurity policies. By adopting these practices, individuals and organizations can enhance their resilience against the evolving landscape of cyber threats. In a world where cybersecurity threats are increasingly prevalent, implementing these checklist points is crucial. We at The Cyber Express hope this guide has been informative and encourages widespread adoption of these cybersecurity best practices for a safer digital environment.

America's Defense Department Ran a Secret Disinfo Campaign Online Against China's Covid Vaccine

17 June 2024 at 01:45
"At the height of the COVID-19 pandemic, the U.S. military launched a secret campaign to counter what it perceived as China's growing influence in the Philippines..." reports Reuters. "It aimed to sow doubt about the safety and efficacy of vaccines and other life-saving aid that was being supplied by China, a Reuters investigation found." Reuters interviewed "more than two dozen current and former U.S officials, military contractors, social media analysts and academic researchers," and also reviewed posts on social media, technical data and documents about "a set of fake social media accounts used by the U.S. military" β€” some active for more than five years. Friday they reported the results of their investigation: Through phony internet accounts meant to impersonate Filipinos, the military's propaganda efforts morphed into an anti-vax campaign. Social media posts decried the quality of face masks, test kits and the first vaccine that would become available in the Philippines β€” China's Sinovac inoculation. Reuters identified at least 300 accounts on X, formerly Twitter, that matched descriptions shared by former U.S. military officials familiar with the Philippines operation. Almost all were created in the summer of 2020 and centered on the slogan #Chinaangvirus β€” Tagalog for China is the virus. "COVID came from China and the VACCINE also came from China, don't trust China!" one typical tweet from July 2020 read in Tagalog. The words were next to a photo of a syringe beside a Chinese flag and a soaring chart of infections. Another post read: "From China β€” PPE, Face Mask, Vaccine: FAKE. But the Coronavirus is real." After Reuters asked X about the accounts, the social media company removed the profiles, determining they were part of a coordinated bot campaign based on activity patterns and internal data. The U.S. military's anti-vax effort began in the spring of 2020 and expanded beyond Southeast Asia before it was terminated in mid-2021, Reuters determined. Tailoring the propaganda campaign to local audiences across Central Asia and the Middle East, the Pentagon used a combination of fake social media accounts on multiple platforms to spread fear of China's vaccines among Muslims at a time when the virus was killing tens of thousands of people each day. A key part of the strategy: amplify the disputed contention that, because vaccines sometimes contain pork gelatin, China's shots could be considered forbidden under Islamic law... A senior Defense Department official acknowledged the U.S. military engaged in secret propaganda to disparage China's vaccine in the developing world, but the official declined to provide details. A Pentagon spokeswoman... also noted that China had started a "disinformation campaign to falsely blame the United States for the spread of COVID-19." A senior U.S. military officer directly involved in the campaign told Reuters that "We didn't do a good job sharing vaccines with partners. So what was left to us was to throw shade on China's." At least six senior State Department officials for the region objected, according to the article. But in 2019 U.S. Defense Secretary Mark Esper signed "a secret order" that "elevated the Pentagon's competition with China and Russia to the priority of active combat, enabling commanders to sidestep the StateDepartment when conducting psyops against those adversaries." [A senior defense official] said the Pentagon has rescinded parts of Esper's 2019 order that allowed military commanders to bypass the approval of U.S. ambassadors when waging psychological operations. The rules now mandate that military commanders work closely with U.S. diplomats in the country where they seek to have an impact. The policy also restricts psychological operations aimed at "broad population messaging," such as those used to promote vaccine hesitancy during COVID... Nevertheless, the Pentagon's clandestine propaganda efforts are set to continue. In an unclassified strategy document last year, top Pentagon generals wrote that the U.S. military could undermine adversaries such as China and Russia using "disinformation spread across social media, false narratives disguised as news, and similar subversive activities [to] weaken societal trust by undermining the foundations of government." And in February, the contractor that worked on the anti-vax campaign β€” General Dynamics IT β€” won a $493 million contract. Its mission: to continue providing clandestine influence services for the military.

Read more of this story at Slashdot.

Teachers and GPs β€˜staggering’ under extra demands caused by poverty in Great Britain

Schools and health services forced to offer crisis help in the form of food, clothing, money and advice

Britain’s schools and primary health services are β€œstaggering” under the pressure of demand caused by an epidemic of extreme poverty, as desperate families unable to afford food, clothing or heating increasingly turn to them for crisis help.

Teachers and GPs in England, Scotland and Wales are informally acting as emergency food providers, welfare advisers, housing officers and social workers alongside their day jobs, as they devote more and more time and resources to support struggling parents and children, new research has found.

Primary school staff estimated 48% of their pupils, and primary care staff 57% of their patients, had experienced hardship at some point since the start of the school year or over the past 12 months.

A third of schools, and nearly half of GP surgeries, had set up food banks to provide emergency food supplies to hungry pupils and families. Staff in schools in deprived areas estimated 44% of pupils had come to school hungry over the past year.

Nearly a quarter of NHS primary care staff and 40% of teachers said they had dipped into their own pockets to help pupils and patients. In one case, a nurse gave new underpants, still in their packet and intended for her husband, to a desperate patient.

Continue reading...

πŸ’Ύ

Β© Photograph: Adrian Sherratt/Alamy

πŸ’Ύ

Β© Photograph: Adrian Sherratt/Alamy

Global spending on nuclear weapons up 13% in record rise

States are on course to spend $100bn a year, driven by a sharp increase in US defence budgets

Global spending on nuclear weapons is estimated to have increased by 13% to a record $91.4bn during 2023, according to calculations from the International Campaign to Abolish Nuclear Weapons (Ican) pressure group.

The new total, which is up $10.7bn from the previous year, is driven largely by sharply increased defence budgets in the US, at a time of wider geopolitical uncertainty caused by Russia’s invasion of Ukraine and the Israel-Hamas war.

Continue reading...

πŸ’Ύ

Β© Photograph: Russian Defence Ministry Press S Handout/EPA

πŸ’Ύ

Β© Photograph: Russian Defence Ministry Press S Handout/EPA

ASUS Promises Support Overhaul After YouTube Investigators Allege Dishonesty

16 June 2024 at 22:25
ASUS has suddenly agreed "to overhaul its customer support and warranty systems," writes the hardware review site Gamers Nexus β€” after a three-video series on its YouTube channel documented bad and "potentially illegal" handling of customer warranties for the channel's 2.2 million viewers. The Verge highlights ASUS's biggest change: If you've ever been denied a warranty repair or charged for a service that was unnecessary or should've been free, Asus wants to hear from you at a new email address. It claims those disputes will be processed by Asus' own staff rather than outsourced customer support agents.... The company is also apologizing today for previous experiences you might have had with repairs. "We're very sorry to anyone who has had a negative experience with our service team. We appreciate your feedback and giving us a chance to make amends." It started five weeks ago when Gamers Nexus requested service for a joystick problem, according to a May 10 video. First they'd received a response wrongly telling them their damage was out of warranty β€” which also meant Asus could add a $20 shipping charge for the requested repair. "Somehow that turned into ASUS saying the LCD needs to be replaced, even though the joystick is covered under their repair policies," the investigators say in the video. [They also note this response didn't even address their original joystick problem β€” "only that thing that they had decided to find" β€” and that ASUS later made an out-of-the-blue reference to "liquid damage."] The repair would ultimately cost $191.47, with ASUS mentioning that otherwise "the unit will be sent back un-repaired and may be disassembled." ASUS gave them four days to respond, with some legalese adding that an out-of-warranty repair fee is non-refundable, yet still "does not guarantee that repairs can be made." Even when ASUS later agreed to do a free "partial" repair (providing the requested in-warranty service), the video's investigators still received another email warning of "pending service cancellation" and return of the unit unless they spoke to "Invoice Quotation Support" immediately. The video-makers stood firm, and the in-warranty repair was later performed free β€” but they still concluded that "It felt like ASUS tried to scam us." ASUS's response was documented in a second video, with ASUS claiming it had merely been sending a list of "available" repairs (and promising that in the future ASUS would stop automatically including costs for the unrequested repair of "cosmetic imperfections" β€” and that they'd also change their automatic emails.) Gamers Nexus eventually created a fourth, hour-long video confronting various company officials at Computex β€” which finally led to them publishing a list of ASUS's promised improvements on Friday. Some highlights: ASUS promises it's "created a Task Force team to retroactively go back through a long history of customer surveys that were negative to try and fix the issues." (The third video from Gamers Nexus warned ASUS was already on the government's radar over its handling of warranty issues.) ASUS also announced their repairs centers were no longer allowed to claim "customer-induced damage" (which Gamers Nexus believes "will remove some of the financial incentive to fail devices" to speed up workloads). ASUS is creating a new U.S. support center allowing customers to choose either a refurbished board or a longer repair. Gamers Nexus says they already have devices at ASUS repair centers β€” under pseudonyms β€” and that they "plan to continue sampling them over the next 6-12 months so we can ensure these are permanent improvements." And there's one final improvement, according to Gamers Nexus. "After over a year of refusing to acknowledge the microSD card reader failures on the ROG Ally [handheld gaming console], ASUS will be posting a formal statement next week about the defect."

Read more of this story at Slashdot.

Before yesterdayMain stream

AI Researcher Warns Data Science Could Face a Reproducibility Crisis

16 June 2024 at 20:16
Long-time Slashdot reader theodp shared this warning from a long-time AI researcher arguing that data science "is due" for a reckoning over whether results can be reproduced. "Few technological revolutions came with such a low barrier of entry as Machine Learning..." Unlike Machine Learning, Data Science is not an academic discipline, with its own set of algorithms and methods... There is an immense diversity, but also disparities in skill, expertise, and knowledge among Data Scientists... In practice, depending on their backgrounds, data scientists may have large knowledge gaps in computer science, software engineering, theory of computation, and even statistics in the context of machine learning, despite those topics being fundamental to any ML project. But it's ok, because you can just call the API, and Python is easy to learn. Right...? Building products using Machine Learning and data is still difficult. The tooling infrastructure is still very immature and the non-standard combination of data and software creates unforeseen challenges for engineering teams. But in my views, a lot of the failures come from this explosive cocktail of ritualistic Machine Learning: - Weak software engineering knowledge and practices compounded by the tools themselves; - Knowledge gap in mathematical, statistical, and computational methods, encouraged black boxing API; - Ill-defined range of competence for the role of data scientist, reinforced by a pool of candidates with an unusually wide range of backgrounds; - A tendency to follow the hype rather than the science. - What can you do? - Hold your data scientists accountable using Science. - At a minimum, any AI/ML project should include an Exploratory Data Analysis, whose results directly support the design choices for feature engineering and model selection. - Data scientists should be encouraged to think outside-of-the box of ML, which is a very small box - Data scientists should be trained to use eXplainable AI methods to provide context about the algorithm's performance beyond the traditional performance metrics like accuracy, FPR, or FNR. - Data scientists should be held at similar standards than other software engineering specialties, with code review, code documentation, and architectural designs. The article concludes, "Until such practices are established as the norm, I'll remain skeptical of Data Science."

Read more of this story at Slashdot.

Between hollow rhetoric and war: how sanctions work – and why they often don’t

From ancient Greece to modern Russia, sanctions are now the go-to option for policy-makers – so why do they so rarely achieve their aims?

In the year 432BCE, the Athenian empire sought to teach its smaller neighbour, Megara, a punitive lesson after various acts of defiance. Instead of going to war, which would break the peace with Sparta, Athens took the novel path of blocking the Megarians from using all the ports in the region.

It was known as the Megarian decree, and it was arguably the first recorded case of economic sanctions. It was also a failure, at least when it came to fending off a conflict. The Peloponnesian war, pitting Athens against Sparta, erupted a year later, and some ancient historians believe it was triggered by the Megarian sanctions.

Continue reading...

πŸ’Ύ

Β© Photograph: StΓ©phanie Lecocq/EPA

πŸ’Ύ

Β© Photograph: StΓ©phanie Lecocq/EPA

FCC Approves Mysterious SpaceX Device: Is It for the Starlink Mini Dish?

16 June 2024 at 18:34
"SpaceX has received FCC clearance to operate a mysterious 'wireless module' device," PC Magazine reported earlier this week, speculating that the device "might be a new Starlink router." On Tuesday, the FCC issued an equipment authorization for the device, which uses the 2.4GHz and 5GHz Wi-Fi radio bands. A document in SpaceX's filing also says it features antennas along with Wi-Fi chips apparently from MediaTek. Another document calls the device by the codename "UTW-231," and defines it as a "wireless router" supporting IEEE 802.11b/g/n/ax for Wi-Fi 6 speeds up to 1,300Mbps. But perhaps the most interesting part is an image SpaceX attached, which suggests the router is relatively small and can fit in a person's open hand.... SpaceX CEO Elon Musk has said the "Starlink mini" dish is slated to arrive later this year and that it's small enough to fit in a backpack... On Wednesday, PCMag also spotted the official Starlink.com site referencing the name "Mini" in a specification page for the satellite internet system. Today saw some interesting speculation on the unoffical "Starlink Hardware" blog (written by Noah Clarke, who has a degree in electronics). Clarke guesses the product "will be aimed at portable use cases, such as camping, RV's, vans, hiking... designed to be easy to store, transport, and deploy". But he also notes Starlink updated their app today, with a new shopping page showing what he believes the upcoming product will look like. ("Very similar to the Standard dish, just smaller. It has a similar shape, and even a kickstand.") If you go into developer mode and play around with the Mini network settings, you notice something interesting. There is no separate router. Devices are connected to the dish itself... I'm guessing that, in order to make the Mini as portable as possible, Starlink decided it was best to simplify the system and limit the number of components. There are more Wifi details that have been revealed, and that is mesh compatibility. For those of you that might be interested in using the Mini at home, or for larger events where you need additional Wifi coverage, the Mini's built-in router will be compatible with Starlink mesh. You'll be able to wirelessly pair another Starlink router to the Mini.

Read more of this story at Slashdot.

'Blue Screen of Death' Comes To Linux

16 June 2024 at 17:10
In 2016, Phoronix remembered how the early days of Linux kernel mode-setting (KMS) had brought hopes for improved error messages. And one long-awaited feature was errors messages for "Direct Rendering Manager" (or DRM) drivers β€” something analgous to the "Blue Screen of Death" Windows gives for critical errors. Now Linux 6.10 is introducing a new DRM panic handler infrastructure enabling messages when a panic occurs, Phoronix reports today. "This is especially important for those building a kernel without VT/FBCON support where otherwise viewing the kernel panic message isn't otherwise easily available." With Linux 6.10 the initial DRM Panic code has landed as well as wiring up the DRM/KMS driver support for the SimpleDRM, MGAG200, IMX, and AST drivers. There is work underway on extending DRM Panic support to other drivers that we'll likely see over the coming kernel cycles for more widespread support... On Linux 6.10+ with platforms having the DRM Panic driver support, this "Blue Screen of Death" functionality can be tested via a route such as echo c > /proc/sysrq-trigger. The article links to a picture shared on Mastodon by Red Hat engineer Javier Martinez Canillas of the error message being generated on a BeaglePlay single board computer. Phoronix also points out that some operating systems have even considered QR codes for kernel error messages...

Read more of this story at Slashdot.

Which Way is the EV Market Headed? And Does the US Lag the World?

16 June 2024 at 15:58
Wednesday the annual electric vehicle outlook report was released by market researcher BloombergNEF. And the analyst wrote that "Our long-term outlook for EVs remains bright," according to the Los Angeles Times: In 2023, EVs made up 18% of global passenger-vehicle sales. By 2030, according to the report, 45% will be EVs. That number jumps to 73% by 2040 β€” still short of what the world needs to reach net zero emissions in transportation, the firm says, but enough to achieve major reductions in climate-changing carbon emissions... [D]ifferent countries are moving at different speeds and with different levels of commitment. Today, "China, India and France are still showing signs of healthy growth, but the latest data from Germany, Italy and the U.S. is more concerning," BloombergNEF said. Global EV sales "are set to rise from 13.9 million in 2023 to over 30 million in 2027," despite the lagging U.S. [The article points out later that "For the first quarter in China, EV sales were up 37%, according to BloombergNEF. In India, it's 39%, and in France, 20%. The U.S. was a laggard, up just 4%."] Whatever the geography, consumer concerns about price, driving range, battery lifespan, and unreliable public charging continue to dampen many buyers' enthusiasm for EVs. BloombergNEF's findings are echoed by consulting firm McKinsey and the AAA motor club, in recent forecasts of their own. But EV prices are coming down, range is improving, and large numbers of public chargers are being installed, all of which could revive sales growth. Consumers around the planet are warming to the idea of buying an electric car, but they're moving slowly. According to McKinsey, 14% of 30,000 global survey respondents in 2021 said their next vehicle would be an EV. This year, it's 18%. In the U.S. it's a different story, where consumer interest in an EV purchase declined to 18% this year, according to AAA's survey, down from 23% in 2023. And nearly two-thirds reported they were unlikely to buy an EV next time they buy a car. Interest in hybrids is on the rise. One in three said they were likely to buy a hybrid, a vehicle that adds a small battery to an internal combustion engine to improve fuel efficiency. That's bad news for pure EV sales, at least in the immediate future, said Greg Brannon, head of automotive research at AAA. Early adopters already have their EVs, he said, while mainstream buyers remain skeptical. The article does note that major automakers "are losing billions of dollars in their EV division," with several cutting the EV goals for the U.S. (Though Hyundai and Kia are not.) And then there's this... A global survey conducted by consulting firm McKinsey, also released Wednesday, included this shocker: 29% of EV owners told McKinsey they plan to replace the EV they bought with a gasoline or diesel car, a figure that jumps to 38% for U.S. EV owners. Phillip Kampshoff, who leads McKinsey's Center for Future Mobility in the Americas, said he'd seen EV sales as "a one way street. Once you buy, you're hooked on an EV. But that's not what the data shows...." But the article points out that both BloombergNEF and McKinsey still remained bullish that adoption will increase in the future.

Read more of this story at Slashdot.

53 LA County Public Health Workers Fall for Phishing Email. 200,000 People May Be Affected

16 June 2024 at 14:44
The Los Angeles Times reports that "The personal information of more than 200,000 people in Los Angeles County was potentially exposed after a hacker used a phishing email to steal the login credentials of 53 public health employees, the county announced Friday." Details that were possibly accessed in the February data breach include the first and last names, dates of birth, diagnoses, prescription information, medical record numbers, health insurance information, Social Security numbers and other financial information of Department of Public Health clients, employees and other individuals. "Affected individuals may have been impacted differently and not all of the elements listed were present for each individual," the agency said in a news release... The data breach happened between Feb. 19 and 20 when employees received a phishing email, which tries to trick recipients into providing important information such as passwords and login credentials. The employees clicked on a link in the body of the email, thinking they were accessing a legitimate message, according to the agency... The county is offering free identity monitoring through Kroll, a financial and risk advisory firm, to those affected by the breach. Individuals whose medical records were potentially accessed by the hacker should review them with their doctor to ensure the content is accurate and hasn't been changed. Officials say people should also review the Explanation of Benefits statement they receive from their insurance company to make sure they recognize all the services that have been billed. Individuals can also request credit reports and review them for any inaccuracies. From the official statement by the county's Public Health department: Upon discovery of the phishing attack, Public Health disabled the impacted e-mail accounts, reset and re-imaged the user's device(s), blocked websites that were identified as part of the phishing campaign and quarantined all suspicious incoming e-mails. Additionally, awareness notifications were distributed to all workforce members to remind them to be vigilant when reviewing e-mails, especially those including links or attachments. Law enforcement was notified upon discovery of the phishing attack, and they investigated the incident.

Read more of this story at Slashdot.

Flesh-Eating Bacteria That Can Kill in Two Days Spreads in Japan

16 June 2024 at 13:44
Bloomberg reports: A disease caused by a rare "flesh-eating bacteria" that can kill people within 48 hours is spreading in Japan after the country relaxed Covid-era restrictions. Cases of streptococcal toxic shock syndrome (STSS) reached 977 this year by June 2, higher than the record 941 cases reported for all of last year, according to the National Institute of Infectious Diseases, which has been tracking incidences of the disease since 1999. Group A Streptococcus (GAS) typically causes swelling and sore throat in children known as "strep throat," but some types of the bacteria can lead to symptoms developing rapidly, including limb pain and swelling, fever, low blood pressure, that can be followed by necrosis, breathing problems, organ failure and death. People over 50 are more prone to the disease. "Most of the deaths happen within 48 hours," said Ken Kikuchi, a professor in infectious diseases at Tokyo Women's Medical University. "As soon as a patient notices swelling in foot in the morning, it can expand to the knee by noon, and they can die within 48 hours...." At the current rate of infections, the number of cases in Japan could reach 2,500 this year, with a "terrifying" mortality rate of 30%, Kikuchi said.

Read more of this story at Slashdot.

The Guardian view on the climate crisis and heatwaves: a killer we need to combat | Editorial

By: Editorial
16 June 2024 at 13:30

Britain may be chilly, but from Greece to India, people are dying due to record temperatures. The death toll will grow without urgent action

While Britons don jumpers and complain about the unseasonable cold, much of the world has been reeling due to excessive temperatures. India has been in the grip of its longest heatwave in recorded history, with thermometers hitting 50C in some places. Greece closed the Acropolis in the afternoon last week as temperatures hit 43C; never has it seen a heatwave so early in the year. Soaring temperatures in the Sahel and western Africa saw mortuaries in Mali reportedly running short of space this spring, while swathes of Asia suffered in May.

Mexico and the south-west of the US have also endured blistering conditions; it was particularly shocking to hear Donald Trump pledge again to β€œdrill, baby, drill” at a rally that saw supporters taken to hospital with heat exhaustion. These bouts of extreme weather are increasing as the climate crisis worsens. Although the El NiΓ±o weather pattern contributed to heatwaves over the last 12 months, they are becoming more frequent, extreme and prolonged thanks to global heating. By 2040, almost half the world’s inhabitants are likely to experience major heatwaves, 12 times more than the historic average.

Continue reading...

πŸ’Ύ

Β© Photograph: Stelios Misinas/Reuters

πŸ’Ύ

Β© Photograph: Stelios Misinas/Reuters

The Guardian view on social security: Labour must face the harm caused by benefit cuts | Editorial

By: Editorial
16 June 2024 at 13:25

A huge gap has opened up between pensions and working-age benefits, and millions of children are paying the price

Strict upper limits on the total amount that families can receive in state benefits continue to exacerbate a growing problem of poverty. Among children in the UK, absolute poverty has risen by its highest rate for 30 years, with new analysis from the Resolution Foundation showing that households in the bottom fifth of the income distribution have lost an average of Β£2,800 a year since 2010. Labour’s refusal to commit to lifting the two-child cap, which prevents parents of third or subsequent children born since 2017 from claiming child-linked benefits, means it is unclear if and how this awful situation will be remedied. While the school breakfast clubs that the party has promised are a positive measure, children should not need to go to school in order to eat.

The former prime minister Gordon Brown is campaigning for a Β£1bn social impact bond to promote the chances of the β€œchildren of austerity”. Charities are pushing for a statutory β€œessentials guarantee” – creating a floor beneath which benefits would not be allowed to sink. So far, Sir Keir Starmer’s team have refused to give ground.

Continue reading...

πŸ’Ύ

Β© Photograph: Andrew Fox/The Observer

πŸ’Ύ

Β© Photograph: Andrew Fox/The Observer

Wine Staging 9.11 Released with A Patch For A 17 Year Old Bug

16 June 2024 at 12:34
Building off Friday's release of Wine 9.11, the development team has now also released Wine Staging 9.11 with some 428 patches, reports Phoronix founder Michael Larabel: Catching my interest was a patch for Bug 7955. That right away catches my attention since the latest Wine bug reports are at a bug ticket number over 56,000.... Yep, Bug 7955 dates back 14 years ago to April 2007. The #7955 bug report is over the S-Hoai Windows client displaying an application exception when clicking the "File" or "Projects" menu. S-Hoai is a Windows application used in Germany by architects and building engineers/contractors for managing estimates and billing according to German laws.

Read more of this story at Slashdot.

Students going home could put 35 Tory seats at risk in election, analysis says

Higher Education Policy Institute research suggests that holding ballot in summer break may be strategic error

More than 30 Conservative seats are at risk of changing hands because of students returning home for the summer holidays, according to analysis of how student voters could influence the outcome of the UK’s general election.

The cabinet minister Esther McVey’s Tatton constituency is one of the 35 suburban or rural seats where Tory hopes could be dashed by students registered to vote at their family home, rather than their university term-time address.

Continue reading...

πŸ’Ύ

Β© Photograph: James Veysey/REX/Shutterstock

πŸ’Ύ

Β© Photograph: James Veysey/REX/Shutterstock

Almost half of UK adults struggling to get prescription drugs amid shortages

Survey finds more people blame Brexit than anything else for supply problems

Almost half of adults in the UK have struggled to get medicine they have been prescribed – and more people blame Brexit than anything else for the situation, research shows.

Forty-nine per cent of people said they had had trouble getting a prescription dispensed over the past two years, the period during which supply problems have increased sharply.

One in 12 people (8%) have gone without a medication altogether because it was impossible to obtain.

Thirty-one per cent found the drug they needed was out of stock at their pharmacy.

Twenty-three per cent of pharmacies did not have enough of the medication available.

Continue reading...

πŸ’Ύ

Β© Photograph: Graham Turner/The Guardian

πŸ’Ύ

Β© Photograph: Graham Turner/The Guardian

In Memoriam: Dr. Ed Stone, Former NASA JPL Director and Voyager Project Scientist

16 June 2024 at 11:34
Slashdot reader hackertourist shared this announcement from NASA's Jet Propulsion Laboratory: Edward C. Stone, former director of NASA's Jet Propulsion Laboratory and project scientist of the Voyager mission for 50 years, died on June 9, 2024. He was age 88... Stone served on nine NASA missions as either principal investigator or a science instrument lead, and on five others as a co-investigator (a key science instrument team member). These roles primarily involved studying energetic ions from the Sun and cosmic rays from the galaxy. He had the distinction of being one of the few scientists involved with both the mission that has come closest to the Sun (NASA's Parker Solar Probe) and the one that has traveled farthest from it (Voyager). Stone is best known for his work on NASA's longest-running mission, Voyager, whose twin spacecraft launched in 1977 and are still exploring deep space today. He served as Voyager's sole project scientist from 1972 until his retirement in 2022. Under Stone's leadership, the mission took advantage of a celestial alignment that occurs just once every 176 years to visit Jupiter, Saturn, Uranus, and Neptune. During their journeys, the spacecraft revealed the first active volcanoes beyond Earth, on Jupiter's moon Io, and an atmosphere rich with organic molecules on Saturn's moon Titan. Voyager 2 remains the only spacecraft to fly by Uranus and Neptune, revealing Uranus' unusual tipped magnetic poles, and the icy geysers erupting from Neptune's moon Triton. The mission "transformed our understanding of the solar system, and is still providing useful data today," writes hackertourist. (Watch Stone speak in this 2018 video about the Voyager 2 spacecraft.) NASA's announcement also includes stories of Stone's desire to engage the public and his thoughtfulness in considering the true boundary of interstellar space. As director of JPL, Stone was responsible for more than two dozen other missions, including landing NASA's Pathfinder mission with the first Mars rover in 1996. "Ed Stone was a trailblazer who dared mighty things in space. He was a dear friend to all who knew him, and a cherished mentor to me personally," said Nicola Fox, associate administrator for the Science Mission Directorate at NASA Headquarters in Washington. "Ed took humanity on a planetary tour of our solar system and beyond, sending NASA where no spacecraft had gone before. His legacy has left a tremendous and profound impact on NASA, the scientific community, and the world."

Read more of this story at Slashdot.

CISA Head Warns Big Tech's 'Voluntary' Approach to Deepfakes Isn't Enough

16 June 2024 at 10:34
The Washington Post reports: Commitments from Big Tech companies to identify and label fake artificial-intelligence-generated images on their platforms won't be enough to keep the tech from being used by other countries to try to influence the U.S. election, said the head of the Cybersecurity and Infrastructure Security Agency. AI won't completely change the long-running threat of weaponized propaganda, but it will "inflame" it, CISA Director Jen Easterly said at The Washington Post's Futurist Summit on Thursday. Tech companies are doing some work to try to label and identify deepfakes on their platforms, but more needs to be done, she said. "There is no real teeth to these voluntary agreements," Easterly said. "There needs to be a set of rules in place, ultimately legislation...." In February, tech companies, including Google, Meta, OpenAI and TikTok, said they would work to identify and label deepfakes on their social media platforms. But their agreement was voluntary and did not include an outright ban on deceptive political AI content. The agreement came months after the tech companies also signed a pledge organized by the White House that they would label AI images. Congressional and state-level politicians are debating numerous bills to try to regulate AI in the United States, but so far the initiatives haven't made it into law. The E.U. parliament passed an AI Actt year, but it won't fully go into force for another two years.

Read more of this story at Slashdot.

β€˜Playing the ref’: how attacking the BBC became a fixture of UK elections

Complaints about BBC coverage can quickly become the story, drawing attention away from the actual issue

Nigel Farage knows the BBC will not allow him to join its televised Sunak vs Starmer leaders’ debate later this month. But the he also knows that a battle with the BBC can be an effective political tactic.

β€œIf the BBC want a fight with me on this, they can have one,” Farage has said.

Continue reading...

πŸ’Ύ

Β© Photograph: James Veysey/REX/Shutterstock

πŸ’Ύ

Β© Photograph: James Veysey/REX/Shutterstock

What Advice Would You Give a First-Time Linux User?

16 June 2024 at 07:22
ZDNet published a new article this week with their own tips for new Linux users. It begins by arguing that switching to the Linux desktop "is easier than you think" and "you'll find help everywhere". (And also that "You won't want for apps.") That doesn't mean it has everything. For example, there is no version of Adobe Photoshop. There is GIMP (which is just as powerful as Photoshop) but for those of you accustomed to Adobe's de facto standard, you're out of luck. The worst-case scenario is you have to learn a new piece of software to meet your graphic needs. At the same time, you might have to turn to proprietary software. For open-source purists, that's a no-go. But for those who just need to get things done, you'll find a mixture of open-source and proprietary software will give you everything you need to be productive and entertained. Their article also recommends new users should "weed out Arch-based distributions," while warning that "Linux is more secure, but..." The truth is, any time you have a computer connected to a network, it's vulnerable and it doesn't matter what operating system you use. To that end, it's crucial that you keep your operating system (and the installed applications) up to date. Fortunately, most Linux operating systems make this very easy... You're probably used to the slow trickle of updates and improvements found in the likes of Windows or MacOS. On Linux, you can count on that process being considerably faster. This is especially important with updates. When a vulnerability is found in an application that affects Linux, it is fixed far faster than it would be on competing platforms. The reason for this is that most Linux software is created and maintained by developers who don't have to answer to boards or committees or have a painfully slow bug resolution process. It might be announced that a vulnerability has been discovered in an application and the fix is officially released the next day. I've seen that very thing happen more times than I can count. But it's not just about vulnerabilities. Developers add new features to software all the time and even listen to users. You could contact a developer of an open-source application with an idea and find it implemented in the next update. Linux is always evolving and it does so much faster than other operating systems. And there's one final caveat. "Not all hardware will work (but most will)." I'll say this (and I stand by it): Ubuntu Linux probably has the best hardware detection and support of any operating system on the market. But that doesn't mean it works with everything. Certain peripherals you own could have trouble working with Linux. Two of the more problematic pieces of hardware are scanners and wireless chips. When I find a piece of hardware that isn't supported, here's one thing I've often done: I try a different Linux distribution... (Fedora often ships with a newer kernel than Ubuntu Linux, and therefore supports more modern hardware.) Keep in mind that most Linux distributions are offered as Live images, which means you can test-drive them without making any changes to your hard drive. This is a great way to tell if a distribution will support all the hardware you need to use. Agree? Disagree? Share your reactions in the comments... And what advice would you give to a first-time Linux user?

Read more of this story at Slashdot.

Election diary: a tax on disco music, a levy on punctuation – and VAT terror stalking rural England

16 June 2024 at 05:00

We’re halfway and it’s time to analyse the best comedy offerings among the general election campaigns, with special mentions for the PM and Ed Davey

If you see a guy trying to pogo-stick along a trapeze while arguing for an overhaul of capital gains tax, think twice before calling the authorities – it’s Β­probably Ed Davey. The Lib Dem leader has so far talked tactical Β­voting in a fairground teacup and endured an assault course in Tunbridge Wells. We knew the Tories were Β­worried about the Lib Dem assault on the β€œblue wall”, but installing trenches and rigging seems excessive. Congrats to Davey for this hard-fought win.

Continue reading...

πŸ’Ύ

Β© Photograph: Tolga Akmen/EPA

πŸ’Ύ

Β© Photograph: Tolga Akmen/EPA

FAA Investigating How Counterfeit Titanium Got Into Boeing and Airbus Jets

16 June 2024 at 04:10
"Titanium that was distributed with fake documentation has been found in commercial Boeing and Airbus jets," reports CNN. America's Federal Aviation Administration is now investigating whether those components pose a safety hazard to the public," along with the manufacturers of the aircraft and supplier Spirit AeroSystems. "A parts supplier found small holes in the material from corrosion," the New York Times reported Friday: Boeing and Airbus both said their tests of affected materials so far had shown no signs of problems. Boeing said it directly purchased most of the titanium used in its plane production, so most of its supply was unaffected. "This industrywide issue affects some shipments of titanium received by a limited set of suppliers, and tests performed to date have indicated that the correct titanium alloy was used," Boeing said in a statement. "To ensure compliance, we are removing any affected parts on airplanes prior to delivery. Our analysis shows the in-service fleet can continue to fly safely."

Read more of this story at Slashdot.

How to reverse austerity? Scrap some of the tax-relief schemes worth Β£204bn | Philip Inman

Even the HMRC doesn’t know if any of the 341 tax breaks promote economic growth – many merely line the pockets of company owners and the super-rich

β€’ Caution, not grand plans, is needed if Labour is to build wealth in Britain

When Keir Starmer and Rachel Reeves consider the funding gap between what they want a Labour government to achieve and the money available, there are billions of pounds in unjustified tax giveaways that could be cancelled to help reverse austerity.

Successive governments have put in place tax breaks to boost economic growth that in the worst examples have proved to be a fraudsters’ charter and, even in less scandalous circumstances, are undermined by a lack of evidence about whether they achieve their aims.

Continue reading...

πŸ’Ύ

Β© Photograph: Lucy North/PA

πŸ’Ύ

Β© Photograph: Lucy North/PA

Rethinking Cybersecurity: Can Neurodiversity Be the Missing Link?

By: Editorial
16 June 2024 at 01:33

Neurodiversity in Cybersecurity

Imagine a team of brilliant detectives, each with their own quirks and talents. One might be a meticulous observer, another a whiz at puzzles, and the third a master of creative leaps. This diverse team is unstoppable, able to crack any case because their strengths complement each other. That's the power of neurodiversity in cybersecurity! People with autism, ADHD, dyslexia, and other conditions bring fresh and valuable perspectives to the fight against cybercrime, enhancing the ability to address complex challenges in innovative ways. They excel at spotting patterns, focusing intensely, and thinking outside the box - exactly what defenders need to outsmart hackers. Neurodiversity in cybersecurity is a concept that has gained significant traction over the past decade. The term "neurodiversity" originated in the late 1990s and has since evolved to encompass a range of conditions, not as limitations, but as strengths. Within the industry, this movement gained momentum around the mid-2010s. It stemmed from a critical need for diverse problem-solving skills and innovative thinking. Cybersecurity challenges are complex puzzles, requiring a variety of approaches to detect, analyze, and mitigate threats. By embracing neurodiversity, the industry doesn't just improve its capabilities, it sets a standard for inclusivity. It taps into a pool of untapped talent that perceives and interacts with the world in ways that benefit everyone. To celebrate this diversity, The Cyber Express hosted the "Inclusive Cyber" webinar. The event brought together experts to discuss how neurodiversity, with its wide range of cognitive styles and personalities, significantly enhances the field of cybersecurity. It's a space where innovation and diverse perspectives are not just beneficial, but essential.

Speakers' Insights on Neurodiversity in Cybersecurity

The webinar featured renowned cybersecurity champion Holly Foxcraft, recognized as one of the most influential women in the field. Alongside her was security wiz and advocate Jennifer Cox, Director for Ireland at Women in Cyber Security (WiCyS) UK & Ireland and a Security Engineering Manager at Tenable. The session was moderated by Jo Mikleus, Senior Vice President at Cyble, who skillfully facilitated the discussion, highlighting the critical role of inclusive practices in cybersecurity. Both speakers shared their personal and professional experiences with neurodiversity, providing valuable insights into the integration of neurodivergent professionals in the tech industry. Holly Foxcraft initiated the discussion by defining neurodiversity and its societal implications. She highlighted how societal norms often fail to accommodate the diverse ways individuals process information, which can lead to misunderstandings and underutilization of potential. Foxcraft explained, "Neurodiversity means that just like physical traits, our cognitive differences are natural. Society, however, has established certain expectations about how individuals should behave and process information. Deviations from these norms are termed as neurodivergence, encompassing recognized conditions such as autism and ADHD, and broader, undefined behaviors that diverge from what is considered typical." Following Holly’s introduction, Jennifer Cox discussed the common misconceptions about neurodivergent individuals, especially those with ADHD. She expressed, "There’s a prevalent myth that individuals with ADHD have boundless energy, which is far from reality. Managing everyday conversations can be as draining for us as physical exertion, leading to rapid burnout." Cox also shared her personal journey with ADHD, diagnosed in her forties, underscoring the challenges and late realizations many neurodivergent individuals face.

Challenges Faced by Neurodivergent Professionals

Jennifer Cox further addressed the managerial misconceptions surrounding the support needs of neurodivergent employees. She clarified that contrary to popular belief, neurodivergent individuals do not necessarily require extensive managerial time. Instead, they benefit significantly from targeted adjustments and understanding. "Simple changes like providing information in bullet points or understanding that lack of eye contact might indicate deeper concentration can make a substantial difference. These minor adaptations can greatly enhance workplace inclusivity and productivity," Cox explained. Both speakers emphasized the importance of tailored management strategies to effectively support neurodivergent employees. Implementing clear communication, recognizing the need for sensory accommodations, and allowing flexible work arrangements were discussed as key strategies that can enhance productivity and workplace satisfaction for all employees.

The Way Forward with Neurodiversity

The "Inclusive Cyber" webinar concluded by highlighting the indispensable link between neurodiversity and cybersecurity. By embracing neurodivergent capabilities, the cybersecurity industry not only enriches its pool of problem-solving strategies but also fosters a more inclusive and dynamic workforce capable of tackling complex security challenges. As the cybersecurity field continues to evolve, the insights shared by Jennifer Cox and Holly Foxcraft provide invaluable guidance for building diverse teams ready to face future challenges. The thoughtful integration of neurodivergent professionals into cybersecurity roles not only enhances the effectiveness of security measures but also contributes to a more inclusive and innovative workplace culture. This approach not only prepares organizations to better tackle emerging threats but also sets a precedent for the broader tech industry to follow.

The Observer view on the French election: Emmanuel Macron is playing a dangerous game

16 June 2024 at 01:30

The president wants to save France from itself, but he may just be handing the country over to the far right

Those complaining about the tedium and predictability of the UK’s general election must gaze with envy across the Channel to France, a country suddenly plunged into a frenzy of electoral uncertainty. And those in Britain who bemoan a lack of bold leadership cannot but note the contrast presented by its president, Emmanuel Macron, who may be arrogant and impetuous but is certainly not lacking in political courage.

Audacity was the quality most esteemed by the French revolutionary Georges Danton (although it ultimately led him to the guillotine), and this Macron possesses in abundance. It enabled his storming of the presidency in 2017 at the youngest-ever age ofΒ 39. It has sustained him through successive national upheavals and an approval rating stuck at underΒ 35%. Now it has led him to call a snap parliamentary election at the very moment his far-right enemies enjoy record support.

Continue reading...

πŸ’Ύ

Β© Photograph: Ludovic Marin/AFP/Getty Images

πŸ’Ύ

Β© Photograph: Ludovic Marin/AFP/Getty Images

The Observer view: manifestos reveal the gulf between the main parties

16 June 2024 at 01:00

The Conservatives have no new vision for the next five years and the Liberal Democrats project a qualified optimism, but Labour could eventually prove transformative

The Britain that the next government will inherit on 5 July has been profoundly misgoverned for 14 years. Productivity, the heart of prosperity, has stagnated, as has business investment; the already weakΒ trends were ruptured in 2016, the year of the BrexitΒ referendum, and have stubbornly refused to budge since. Low growth and frozen living standards areΒ thus guaranteed until those trends are reversed. Even though taxation has climbed, there cannot be one citizen unaware of the intolerable stress on underfunded public services set to intensify in the yearsΒ ahead on current spending plans.

Meanwhile, life expectancy in disadvantaged parts of England is falling for the first time in more than a century; infant mortality is rising; poverty so blights 4.3 million children that we have among the shortest five-year-olds in Europe; one in six adults are illiterate or innumerate. People commonly live with their parents until their mid 30s because housing, whether rented or mortgaged, is prohibitively expensive. Having children is deferred; the birthrate is falling.

Continue reading...

πŸ’Ύ

Β© Photograph: Stefan Rousseau/PA

πŸ’Ύ

Β© Photograph: Stefan Rousseau/PA

Is There Life on This Saturn Moon? Scientists Plan a Mission to Find Out

16 June 2024 at 00:59
It's one of Saturn's 146 moons β€” just 310 miles in diameter (or 498 kilometers). Yet the European Space Agency plans to send a robot on a one-billion mile trip to visit it. Why? Because astronomers have discovered Enceladus "possesses geysers that regularly erupt from its surface and spray water into space," reports the Guardian: Even more astonishing, these plumes contain complex organic compounds, including propane and ethane. "Enceladus has three key ingredients that are considered to be essential for the appearance of life," said astronomer Professor Michele Dougherty of Imperial College London. "It has got liquid water, organic material and a source of heat. That combination makes it my favourite moon in the whole solar system." A panel of expert scientists have now recommended the Saturn moon for an ESA mission by 2040, according to the article, "with the aim of either landing on the moon or flying through the geysers spraying water and carbon chemicals from its surface into space. Preferably, both goals would be attempted, the panel added." It will be tricky. Dougherty warns that Enceladus "is small with weak gravity, which means you will need a lot of fuel to slow it down so that it does not whiz past its target into deep space. That is going to be a tricky issue for those designing the mission." But Dougherty has a special interest, as the principal investigator for the magnetometer flown on the Cassini mission that studied Saturn and its moons between 2004 and 2017. "At one point, Cassini passed close to Enceladus and our instrument indicated Saturn's magnetic field was being dragged round the moon in a way that suggested the little moon had an atmosphere," said Dougherty. Cassini's managers agreed to direct the probe to take a closer look and, in July 2005, the spaceship swept over the moon's surface at a height of 173km β€” and detected significant amounts of water vapour. "It was wonderful," recalls Dougherty. Subsequent sweeps produced even greater wonders. Huge geysers of water were pictured erupting from geological fault lines at the south pole. The only other body in the solar system, apart from Earth, possessing liquid water on its surface had been revealed. Finally came the discovery of organics in those plumes and Enceladus went from being rated a minor, unimportant moon to a world that is now set to trigger the expenditure of billions of euros and decades of effort by European astronomers and space engineers. Thanks to long-time Slashdot reader thephydes for sharing the article.

Read more of this story at Slashdot.

Is C++ More Popular Than C?

15 June 2024 at 22:24
Last month TIOBE announced its estimate that the four most popular programming languages were: 1. Python 2. C 3. C++ 4. Java But this month C++ "overtook" C for the first time, TIOBE announced, becoming (according to the same methodology) the #2 most popular programming language, with C dropping to #3. " C++ has never been that high in the TIOBE index," says TIOBE Software CEO Paul Jansen in the announcement, "whereas C has never been that low." 1. Python 2. C++ 3. C 4. Java C++ started a new life as of 2011 with its consistent 3 yearly updates. Although most compilers and most engineers can't take up with this pace, it is considered a success to see the language evolve. The main strengths of C++ are its performance and scalability. Its downside is its many ways to get things done, i.e. its rich idiom of features, which is caused by its long history and aim for backward compatibility. C++ is heavily used in embedded systems, game development and financial trading software, just to name a few domains. There's different rankings from the rival PYPL index of programming language popularity. It lumps C and C++ together to award them a collective ranking (#5). But unlike TIOBE, it shows Java [and JavaScript and C#] all being more popular (with Python still the #1 most popular language). Of course, statistical anomalies could be also skewing the results. Visual Basic also lost two ranks in popularity in the last month, according to TIOBE, dropping from the #7 position to the #9 position (now falling just behind Go and SQL). This becomes the first time that Go has risen as high as #7, according to TIOBE's announcement β€” with Rust also reaching an all-time high of #17...

Read more of this story at Slashdot.

Security Lessons from the Change Healthcare Ransomware Catastrophe

15 June 2024 at 18:34
The $22 million paid by Change Healthcare's parent company to unlock its systems "may have emboldened bad actors to further target the vulnerable industry," writes Axios: There were 44 attacks against the health care sector in April, the most that [cybersecurity firm] Recorded Future has seen in the four years it's been collecting data. It was also the second-largest month-over-month jump, after 30 ransomware attacks were recorded in March. There were 32 attacks in February and May. But an analysis by the security-focused magazine CSO says the "disastrous" incident also "starkly illustrated the fragility of the healthcare sector, prompting calls for regulatory action." In response to the attack, US politicians have called for mandated baseline cybersecurity standards in the health sector, as well as better information sharing. They have also raised concerns that industry consolidation is increasing cyber risk. So what went wrong? The attackers used a set of stolen credentials to remotely access the company's systems. But the article also notes Change Healthcare's systems "suffered from a lack of segmentation, which enables easy lateral movement of the attack" β€” and that the company's acquisition may have played a role: Mergers and acquisitions create new cyber threats because they involve the integration of systems, data, and processes from different organizations, each with its own security protocols and potential vulnerabilities. "During this transition, cybercriminals can exploit discrepancies in security measures, gaps in IT governance, and the increased complexity of managing merged IT environments," Aron Brand, CTO of CTERA told CSOonline. "Additionally, the heightened sharing of sensitive information between parties provides more opportunities for data breaches." And "In the end, paying the ransom failed to protect UHG from secondary attempts at extortion." In April, cybercriminals from the RansomHub group threatened to leak portions of 6TB of sensitive data stolen from the breach of Change Healthcare, and obtained through Nichy, according to an analysis by security vendor Forescout. An estimated one in three Americans had their sensitive data exposed as a result of the attack. Such secondary scams are becoming increasingly commonplace and healthcare providers are particularly at risk, according to compliance experts... The US Department of Health and Human Services (HHS) is investigating whether a breach of protected health information occurred in assessing whether either UHG or Change Healthcare violated strict healthcare sector privacy regulations. Thanks to Slashdot reader snydeq for sharing the article.

Read more of this story at Slashdot.

Researchers Find No Amount of Alcohol is Healthy For You

15 June 2024 at 17:34
The New York Times magazine remembers that once upon a time, in the early 1990s, "some prominent researchers were promoting, and the media helped popularize, the idea that moderate drinking...was linked to greater longevity. "The cause of that association was not clear, but red wine, researchers theorized, might have anti-inflammatory properties that extended life and protected cardiovascular health..." More recently, though, research has piled up debunking the idea that moderate drinking is good for you. Last year, a major meta-analysis that re-examined 107 studies over 40 years came to the conclusion that no amount of alcohol improves health; and in 2022, a well-designed study found that consuming even a small amount brought some risk to heart health. That same year, Nature published research stating that consuming as little as one or two drinks a day (even less for women) was associated with shrinkage in the brain β€” a phenomenon normally associated with aging... [M]ore people are now reporting that they consume cannabis than alcohol on a daily basis. Some governments are responding to the new research by overhauling their messaging. Last year, Ireland became the first country to pass legislation requiring a cancer warning on all alcohol products sold there, similar to those found on cigarettes: "There is a direct link between alcohol and fatal cancers," the language will read. And in Canada, the government has revised its alcohol guidelines, announcing: "We now know that even a small amount of alcohol can be damaging to health." The guidelines characterize one to two drinks a week as carrying "low risk" and three to six drinks as carrying "moderate risk." (Previously the guidelines suggested that women limit themselves to no more than two standard drinks most days, and that men place that limit at three.)

Read more of this story at Slashdot.

OpenAI CEO Says Company Could Become a For-Profit Corporation Like xAI, Anthropic

15 June 2024 at 16:34
Wednesday The Information reported that OpenAI had doubled its annualized revenue β€” a measure of the previous month's revenue multiplied by 12 β€” in the last six months. It's now $3.4 billion (which is up from around $1 billion last summer, notes Engadget). And now an anonymous reader shares a new report from The Information: OpenAI CEO Sam Altman recently told some shareholders that the artificial intelligence developer is considering changing its governance structure to a for-profit business that OpenAI's nonprofit board doesn't control, according to a person who heard the comments. One scenario Altman said the board is considering is a for-profit benefit corporation, which rivals such as Anthropic and xAI are using, this person said. Such a change could open the door to an eventual initial public offering of OpenAI, which currently sports a private valuation of $86 billion, and may give Altman an opportunity to take a stake in the fast-growing company, a move some investors have been pushing. More from Reuters: The restructuring discussions are fluid and Altman and his fellow directors could ultimately decide to take a different approach, The Information added. In response to Reuters' queries about the report, OpenAI said: "We remain focused on building AI that benefits everyone. The nonprofit is core to our mission and will continue to exist." Is that a classic non-denial denial? Note that the nonprofit's "continuing to exist" does not in any way preclude OpenAI from becoming a for-profit business β€” with a spin-off nonprofit, continuing to exist...

Read more of this story at Slashdot.

Have Scientists Found 'Potential Evidence' of Dyson Spheres?

15 June 2024 at 15:34
Have scientists discovered infrared radiation, evidence of waste heat generated by the energy-harvesting star-surrounding spheres first proposed by British American physicist Freeman Dyson? CNN reports: [A] new study that looked at 5 million stars in the Milky Way galaxy suggests that seven candidates could potentially be hosting Dyson spheres β€” a finding that's attracting scrutiny and alternate theories... Using historical data from telescopes that pick up infrared signatures, the research team looked at stars located within less than 1,000 light-years from Earth: "We started with a sample of 5 million stars, and we applied filters to try to get rid of as much data contamination as possible," said lead study author MatΓ­as Suazo, a doctoral student in the department of physics and astronomy of Uppsala University in Sweden. "So far, we have seven sources that we know are glowing in the infrared but we don't know why, so they stand out...." Among the natural causes that could explain the infrared glow are an unlucky alignment in the observation, with a galaxy in the background overlapping with the star, planetary collisions creating debris, or the fact that the stars may be young and therefore still surrounded by disks of hot debris from which planets would later form... An earlier study, published in March and using data from the same sources as the new report, had also found infrared anomalies among a sample dataset of 5 million stars in our galaxy. "We got 53 candidates for anomalies that cannot be well explained, but can't say that all of them are Dyson sphere candidates, because that's not what we are specifically looking for," said Gabriella Contardo, a postdoctoral research fellow at the International School for Advanced Studies in Trieste, Italy, who led the earlier study. She added that she plans to check the candidates against Suazo's model to see how many tie into it. "You need to eliminate all other hypotheses and explanations before saying that they could be a Dyson sphere," she added. "To do so you need to also rule out that it's not some kind of debris disk, or some kind of planetary collision, and that also pushes the science forward in other fields of astronomy β€” so it's a win-win." Both Contardo and Suazo agree that more research is needed on the data, and that ultimately they could turn to NASA's James Webb Space Telescope for more information, as it is powerful enough to observe the candidate stars directly. However, because of the lengthy, competitive procedures that regulate use of the telescope, securing access might take some time. CNN adds that "A May 23 paper published in response to the one by Suazo and his colleagues suggests that at least three of the seven stars have been 'misidentified' as Dyson spheres and could instead be 'hot DOGs' β€” hot dust-obscured galaxies β€” and that the remaining four could probably be explained this way as well." But "As for Dyson himself, if he were still alive, he also would be highly skeptical that these observations represent a technological signature, his son George argued: 'But the discovery of new, non-technological astronomical phenomena is exactly why he thought we should go out and look.' "

Read more of this story at Slashdot.

Rust's Foundation Announces a New 'Safety-Critical Rust Consortium'

15 June 2024 at 14:34
This week the Rust Foundation jointly announced "the Safety-Critical Rust Consortium" with industry partners including Arm, AdaCore, Lynx Software Technologies, and Toyota's mobility tech subsidiary Woven. Its goal is supporting "responsible use" of Rust "in safety-critical software β€” systems whose failure can impact human life or cause severe environmental or property harm." "This is exciting," said Rust creator Graydon Hoare in a statement. "I am truly pleased to see the Rust Foundation and anyone in the safety-critical space coming together on this topic." From the announcement: "Safety is our foremost priority in vehicle software development. Traditionally, achieving the highest levels of safety has been a complex and lengthy endeavor, requiring the use of specialized tools and processes beyond the programming language," said JF Bastien, Distinguished Engineer at Woven by Toyota. "We are therefore pleased to collaborate with leading experts in the safety industry to integrate new tools such as Rust into our safety-critical systems...." Industries that are particularly concerned with functional safety include transportation (such as automotive, aviation, space), energy, life sciences, and more. Because of their potential impacts, these industries are often regulated, have liability considerations, and are guided by standards... These industries have decades of experience delivering products, learning from iterating based on real-world feedback, and improving processes. An ecosystem of tools and tool vendors have evolved, and best practices have been learned to create a safety culture around tooling. Rust offers particular advantages in terms of developer ergonomics, productivity and software quality; however, it lacks a deep and established well of safety-processes and collective industry knowledge of safety-critical systems. Without closing this gap, a developer must primarily rely on best practices and normative precautions, which can limit innovation. Rust developers who stray from the well-trod path can find themselves facing an inquiry were an accident to occur. In these circumstances, anything that seems unusual will be investigated for fault. This risk creates a disincentive to widespread Rust adoption, leaving developers unable to reap all its advantages while potentially facing financial, reputational and moral costs. The gap in safety-critical resources within the Rust programming language ecosystem is also an exciting opportunity. By rapidly incorporating lessons learned from years of careful development and past mistakes in the wider open source ecosystem, Rust can become a valuable component of a safety toolkit adaptable to various safety-critical industries and severity levels. "Work under the consortium will begin with the creation of a public charter and goals," according to the announcement, with a scope possibly including "the development of guidelines, linters, libraries, static analysis tools, formal methods and language subsets to meet industrial and legal requirements. The group may further shepherd Rust Foundation-funded implementation work, including grants to existing academic teams or FOSS projects... The group will further attempt to coordinate with and expand on existing safety-critical projects and standards including SAE JA1020. The group will maintain communication with the larger Rust Project, and "The Consortium's deliverables will be developed and licensed in a manner compatible with other Rust Project endeavors."

Read more of this story at Slashdot.

Solar Modules Deployed In France In 1992 Still Provide 79.5% of Original Output

15 June 2024 at 13:34
French photovoltaics group Hespul tested solar panels installed in 1992, reports PV Magazine: The testing showed that the modules still produce on average 79.5% of their initial power after 31 years of operation. In a previous testing carried out 11 years ago, the panels were found to produce 91.7% of their initial power. "This result exceeds the performance promised by the manufacturers who said the panels would have maintained 80% of their output after 25 years," said Hespul. The drop in performance is on average 20.5%, or 0.66% per year over 31 years, and 1.11% per year over the last 11 years... Another more recent study carried out by the US Department of Energy's National Renewable Energy Laboratory (NREL) on 1,700 American sites totaling 7.2 GW of power, showed a median degradation of around -0.75%/year. Moveover, another research study focused on 4,300 residential installations in operation in Europe and used different data processing methodologies. Depending on the methods, a median loss of -0.36% to -0.67%/year was obtained. Thanks to long-time Slashdot reader storkus for sharing the news.

Read more of this story at Slashdot.

❌
❌