By BeauHD from Slashdot's brushed-under-the-rug department
Yesterday, it was reported that Apple's iCloud services in mainland China will be operated by a Chinese company from next month. What wasn't reported was the fact that Apple has included iCloud accounts that were opened in the U.S., are paid for using U.S. dollars and/or are connected to U.S.-based App Store accounts in the data that will be handled by local partner Guizhou-Cloud Big Data (GCBD) from February 28. TechCrunch reports: Apple has given China-based users the option to delete their data, but there is no opt out that allows them to have it stored elsewhere. That has concerned some users who are uneasy that the data migration is a sign of closer ties with the Chinese government, particularly since GCBD is owned by the Guizhou provincial government. When asked for comment, Apple pointed TechCrunch to its terms and conditions site which explains that it is migrating iCloud accounts based on their location: "The operation of iCloud services associated with Apple IDs that have China in their country or region setting will be subject to this transition. You will be notified of this transition via email and notifications on your devices. You don't need to take any further action and can keep using iCloud in China. After February 28, 2018, you will need to agree to the terms and conditions of iCloud operated by GCBD to keep using iCloud in China."
However, TechCrunch found instances of iCloud accounts registered overseas that were part of the migration. One user did find an apparent opt-out. That requires the user switching their iCloud account back to China, then signing out of all devices. They then switch their phone and iCloud settings to the U.S. and then, upon signing back into iCloud, their account will (seemingly) not be part of the migration. Opting out might be a wise-move, as onlookers voice concern that a government-owned company is directly involved in storing user data.Read Replies (0)
By BeauHD from Slashdot's when-it-rains-it-pours department
An anonymous reader quotes a report from Ars Technica: Meltdown and Spectre are not the only security problems Intel is facing these days. Today, researchers at F-Secure have revealed another weakness in Intel's management firmware that could allow an attacker with brief physical access to PCs to gain persistent remote access to the system, thanks to weak security in Intel's Active Management Technology (AMT) firmware -- remote "out of band" device management technology installed on 100 million systems over the last decade, according to Intel. [T]he latest vulnerability -- discovered in July of 2017 by F-Secure security consultant Harry Sintonen and revealed by the company today in a blog post -- is more of a feature than a bug. Notebook and desktop PCs with Intel AMT can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu, and selecting configuration for Intel's Management Engine BIOS Extension (MEBx).
If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password, enable remote access, and set the firmware to not give the computer's user an "opt-in" message at boot time. "Now the attacker can gain access to the system remotely," F-Secure's release noted, "as long as they're able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)."Read Replies (0)
By BeauHD from Slashdot's safe-guard department
Cyberthreat intelligence firm Check Point on Friday disclosed the existence of malicious code buried inside dozens of apps that displays pornographic images to users. Many of the apps are games reportedly geared toward young children. As a result, Google quickly removed the roughly 60 apps said to be affected from its Play Store. Gizmodo reports: While they appeared as such, the pornographic images displayed were not actually Google ads. Google supposedly maintains tight controls on all ads that appear in what it calls "Designed for Family" apps. The company also maintains a white-list of advertisers deemed safe for children under the ages of 13. None of the affected apps were part of Google's "Family Link" program, which is the category of recognized kid-friendly apps available across Google's platforms. The malware, dubbed AdultSwine, is said to have displayed the highly inappropriate images while also attempting to trick users into installing a fake-security app, or "scareware." After the fake "ads" were delivered, users would've received a "Remove Virus Now" notification, or something similar, designed to provoke users into downloading the scareware. The affected gaming apps included at least one which may have had up to 5,000,000 downloads -- Five Nights Survival Craft -- as well as many others which had between 50,000 and 500,000 downloads.Read Replies (0)
By msmash from Slashdot's old-habits-die-hard department
An anonymous reader shares a report: Last summer, Ford worked with Domino's Pizza on a test in Ann Arbor, Michigan, where it delivered pizza to randomly chosen customers in a self-driving Ford Fusion hybrid. An operator was inside the car, and a regular human-driven car trailed behind, videotaping the drive. Customers had to approach the car and enter a number on a touch screen on the side of the vehicle to get their pizza. Speaking at CES, the annual consumer electronics show, in Las Vegas this week, Jim Farley, Fordâ(TM)s executive vice president, acknowledged that the idea sounds silly, "but we learned so freaking much," he said. Apparently, most people say "thank you" to the car after getting their pizza.Read Replies (0)
By BeauHD from Slashdot's existential-threats department
A new study published in the journal Current Biology found that as much as 99 percent of baby green sea turtles in warm equatorial regions are being born female. "The study took a look at turtle populations at nesting sites at Raine Island and Moulter Cay in the northern Great Barrier Reef, an area plagued with unprecedented levels of coral bleaching from high temperatures," reports Futurism. "The researchers compared these populations with sea turtles living at sites in the cooler south." From the report: Using a new, non-invasive hormone test, the researchers from the U.S. National Oceanic and Atmospheric Administration (NOAA) Fisheries Department and the Queensland Department of Environment and Heritage Protection found that while 65 -69 percent of the turtles from the southern region were female, between 86.8 and 99.8 of turtles tested in the northern region were female, depending on age. The sex of green sea turtles, along with some other species of turtles, crocodiles, and alligators, is not regulated by the introduction of sex chromosomes at key points during early development, as seen in humans and other mammals. Their sex is actually influenced by the temperature at which the eggs are incubated, with warmer temperatures more likely to lead to females. The difference between predominately male and predominately female hatchlings is only a few degrees, such as that formerly found between the cool, damp bottom of a sandy sea turtle nest and the sun-warmed top. The ages of the female turtles in the north suggest that this population has experienced temperatures that cause this imbalance since at least the 1990s. Given that the warmer temperatures seen in northern Australia have been distributed around the globe, experts predict that other sea turtle populations in warm regions are also following the same trend.Read Replies (0)