By EditorDavid from Slashdot's France-has-spoken department
"France has voted for continuity," candidate Marine Le Pen said in the wake of her defeat in France's presidential election, conceding that Emmanuel Macron had a decisive lead. Reuters has ongoing coverage of Le Pen's concession phone call and reactions from world leaders. "France Rejects Far Right," read a headline at CNN, touting their own live updates and early results showing Macron with a 65.9% to 34.1% lead, "on course for a decisive win." Macron is schedule to speak at the Louvre museum (where the grounds were "briefly evacuated" this morning after discovery of a suspicious bag.) Quartz is calling 39-year-old Macron "the second Generation X president of a major world power" (after Canada's Justin Trudeau).
The election was closely watched after a 9-gigabyte trove of emails from Macron's campaign were leaked online. CNBC reports that "One of the most talked about emails makes reference to binge-watching Dr. Who and masturbating to the sound of running water. It sounds generally incoherent. It could be false, or maybe the person wrote it after a few too many." The New Yorker traces the leak to a right-leaning Canadian site, whose editor says he found the documents on 4chan. But Reuters is crediting WikiLeaks with providing "the largest boost of attention" to the leaked documents, according to an analysis pubished by the Digital Forensic Research Lab of the Atlantic Council, a D.C.-based think tank on international affairs. They tweeted about the leak 15 times, bragging to Reuters that "we were hours ahead of all other major outlets." On Friday WikiLeaks also disputed the Macron campaign's claim that the leak mixed real documents with fake ones. "We have not yet discovered fakes in #MacronLeaks & we are very skeptical that the Macron campaign is faster than us."
< article continued at Slashdot's France-has-spoken department
>Read Replies (0)
By EditorDavid from Slashdot's probing-the-planets department
NASA's Cassini spacecraft explored the inner edge of the rings of Saturn for the first time, and Phys.org reports that it made a surprising discovery: nothing. "Scientists have been surprised to find that not all that much -- not even space dust -- lies between Saturn's iconic rings." After the first pass, the NASA official managing the project described the the region between the rings and Saturn as "the big empty." An anonymous reader quotes the Pittsburgh Post-Gazette:
Cassini also beamed back pictures and other essential data as it maneuvered the 1,500-mile-wide space between the solar system's second largest planet and its icy rings. The images, which take 78 minutes to make the billion-mile trip back to Earth, reveal a blazing, mysterious process of alternating light and darkness in the rings that scientists will be working for years to understand. That seems only fair since it has already taken 20 years for Cassini to be in a position to do what it is doing so far.
Between now and September, Cassini will make 22 dives between Saturn's rings and the planet, clocking at an impressive 76,800 mph each time. The end result should be a treasure trove of stunning images of the planet and its diverse and mysterious rings, along with detailed maps of the gas giant's gravity, magnetic fields and atmospheric conditions. On Sept. 15, it will plunge into Saturn's atmosphere, streaming data back to Earth as it makes its descent of no return.Read Replies (0)
By EditorDavid from Slashdot's privates-into-programmers department
mirandakatz writes: David Molina was finishing up his 12-year time in the army when he started teaching himself to code, and started to think that he might like to pursue it professionally once his service was done. But with a wife and family, he couldn't dedicate the four years he'd need to get an undergraduate degree in computer science -- and the GI Bill, he learned, won't cover accelerated programs like code schools. So he started an organization dedicated to changing that. Operation Code is lobbying politicians to allow vets to attend code schools through the GI Bill and prepare themselves for the sorts of stable, middle-class jobs that have come to be called "blue-collar coding." Molina sees it as a serious failing that the GI Bill will cover myriad vocational programs, but not those that can prepare veterans for one of the fastest-growing industries in existence.
The issue seems to be quality. The group estimates there are already nine code schools in the U.S. which do accept GI Bill benefits -- but only "longer-standing ones that have made it through State Approving Agencies." Meanwhile, Course Report calculates 18,000 people finished coding bootcamps last year -- and that two thirds of them found a job within three months.
But I just liked how Molina described his introduction into the world of programmers. While stationed at Dover Air Force Base, he attended Baltimore's long-standing Meetup for Ruby on Rails, where "People taught me about open source. There was pizza, there was beer. They made me feel like I was at home."Read Replies (0)
By EditorDavid from Slashdot's dangerous-drone-designs department
Slashdot reader msm1267 quotes ThreatPost:
Drones, many readily available on ecommerce shops such as Amazon, are plagued by vulnerabilities that could give attackers full root access, read or delete files, or crash the device. The United States Computer Emergency Readiness Team (US-CERT) published a warning about one model, the DBPOWER U818A WiFi quadcopter, last month, but according to the researcher who reported the vulnerabilities, multiple drone models -- manufactured by the same company but sold under different names -- are also vulnerable.
They contain two appealing attack vectors: an open access point and a misconfigured FTP server. If an attacker was within WiFi range of the drone they could easily obtain read and write permissions to the drone's filesystem and modify its root password... Like any attack dependent on Wi-Fi, an attacker would need to be in close proximity to the drone to carry out an attack, but an attacker could connect their computer to the drone access point, essentially treating it as a proxy to spy on the device's live feed or the drone's open ports.Read Replies (0)
By EditorDavid from Slashdot's news-for-nodes department
An anonymous reader writes:
The FBI issued a press release about the 30-year prison sentence for a 58-year-old Florida man running "the world's largest child pornography website, with more than 150,000 users around the world." But their investigation involved what Gizmodo describes as "a decision controversial to this day" -- taking over the child pornography site and running it "for almost two weeks while distributing malware designed to unmask its visitors." Thursday the FBI described it as "a court-approved network investigative technique" which led to more than 1,000 leads in the U.S. and "thousands more" for law enforcement partners in other countries, leading to arrests in the EU, Israel, Turkey, Peru, Malaysia, Chile, and the Ukraine. Those 1,000 U.S. leads led to "at least 350 U.S-based individuals arrested", as well as actual prosecutions of 25 producers of child pornography and 51 hands-on abusers, while 55 children were "identified or rescued" in America, and another 296 internationally who were sexually abused.
Though Motherboard describes it as hacking "over 8,000 computers in 120 countries based on one warrant," the FBI calls it their "most successful effort to date against users of Tor's hidden service sites," adding that the agency "has numerous investigations involving the dark web." Though they'd soon became aware of the site's existence, "given the nature of how Tor hidden services work, there was not much we could do about it" -- until a foreign law enforcement agency discovered the site had "slipped up" by revealing its actual IP address, and notified the U.S. investigators. The FBI also says the investigation "has opened new avenues for international cooperation in efforts to prosecute child abusers around the world."
The site's two other administrators -- both men in their 40s -- were also given 20-year prison sentences earlier this year.Read Replies (0)
By EditorDavid from Slashdot's les-tweets department
"The French media and public have been warned not to spread details about a hacking attack on presidential candidate Emmanuel Macron," writes Slashdot reader schwit1, with the election commission threatening criminal charges. But meanwhile, "the leaked documents have since spread like wildfire across social media, particularly on Twitter," reports Recode.
Nicole Perlroth, a cybersecurity reporter with the New York Times, pointed out that an overwhelming amount of the tweets shared about the Macron campaign hack appear to come from automated accounts, commonly referred to as bots. About 40% of the tweets using the hashtag #MacronGate, Perlroth noted, are actually coming from only 5% of accounts using the hashtag. One account tweeted 1,668 times in 24 hours, which is more than one tweet per minute with no sleep... Twitter appears not to have done anything to combat what is obviously a bot attack, despite the fact the social media company is well aware of the problem of bot accounts being used to falsely popularize political issues during high-profile campaigns to give the impression of a groundswell of grassroots support.
The Times reporter later tweeted "This could be @twitter's death knell. Algorithms exist to deal with this. Why aren't you using them?" And one Sunlight Foundation official called the discovery "statistics from the front lines of the disinformation wars," cc-ing both Twitter CEO Jack Dorsey and Mark Zuckerberg. In other news, the BBC reports France's president has promised to "respond" to the hacking incident, giving no further details, but saying he was aware of the risks because they'd "happened elsewhere"."Read Replies (0)
By EditorDavid from Slashdot's contentious-community-processes department
An anonymous reader quotes InfoWorld:
The next edition of standard Java had been proceeding toward its planned July 27 release after earlier bumps in the road over modularity. But now Red Hat and IBM have opposed the module plan. "JDK 9 might be held up by this," Oracle's Georges Saab, vice president of development for the Java platform, said late Wednesday afternoon. "As is the case for all major Java SE releases, feedback from the Java Community Process may affect the timeline..."
Red Hat's Scott Stark, vice president of architecture for the company's JBoss group, expressed a number of concerns about how applications would work with the module system and its potential impact on the planned Java Enterprise Edition 9. Stark also said the module system, which is featured in Java Specification Request 376 and Project Jigsaw, could result in two worlds of Java: one for Jigsaw and one for everything else, including Java SE classloaders and OSGI. Stark's analysis received input from others in the Java community, including Sonatype.
"The result will be a weakened Java ecosystem at a time when rapid change is occurring in the server space with increasing use of languages like Go," Stark wrote, also predicting major challenges for applications dealing with services and reflection. His critique adds that "In some cases the implementation...contradicts years of modular application deployment best practices that are already commonly employed by the ecosystem as a whole." And he ultimately concludes that this effort to modularize Java has limitations which "almost certainly prevent the possibility of Java EE 9 from being based on Jigsaw, as to do so would require existing Java EE vendors to completely throw out compatibility, interoperability, and feature parity with past versions of the Java EE specification."Read Replies (0)
By EditorDavid from Slashdot's malware-search-engines department
An anonymous reader quotes The Stack:
Search engine Shodan has announced a tool to help businesses hunt out and block traffic from malware command-and-control servers. The new Malware Hunter service, which has been designed in a collaborative project with threat intelligence company Recorded Future, continuously scans the internet to locate control panels for different remote access Trojans, including Gh0st RAT, Dark Comet, njRAT, XtremeRAT, Net Bus and Poison Ivy. The internet crawler identifies botnet C2 servers by connecting to public IP addresses and sending traffic which mimics that of an infected device. If the receiver computer sends back a response, that server is flagged.
The article reports that Shodan's Malware Hunter tool has already traced over 5,700 RAT servers -- more than 4,000 of them based in the United States.Read Replies (0)
By EditorDavid from Slashdot's eggs-bacon-spam-and-sausage department
An anonymous reader write:
Wednesday was the 39th anniversary of the world's first spam, sent by Gary Thuerk, a marketer for Massachusetts' Digital Equipment Corporation in 1978 to over 300 users on Arpanet. It was written in all capital letters, and its body began with 273 more email addresses that wouldn't fit in the header. The DEC marketer "was reportedly trying to flag the attention of the burgeoning California tech community," reports the San Jose Mercury News. The message touted two demonstrations of the DECSYSTEM-20, a PDP-10 mainframe computer.
An official at the Defense Communication Agency immediately called it "a flagrant violation of the use of Arpanet as the network is to be used for official U.S. government business only," adding "Appropriate action is being taken to preclude its occurence again." But at the time a 24-year-old Richard Stallman -- then a graduate student at MIT -- claimed he wouldn't have reminded receiving the message...until someone forwarded him a copy. Stallman then responded "I eat my words... Nobody should be allowed to send a message with a header that long, no matter what it is about."
The article reports that today the spam industry earns about $200 million each year, while $20 billion is spent trying to block spam. And the New York Times even has a quote from the DEC employee who sent that first spam. "People either say, 'Wow! You sent the first spam!' or they act like I gave them cooties."Read Replies (0)