By EditorDavid from Slashdot's billions-and-billions department
A seed-funded company named Axiom wants to build a private-sector outpost in orbit by launching a new module for the International Space Station, according to an article on Space News.
Once on the station, Axiom Space would use it for commercial purposes, ranging from research to tourism. [Former space station manager] Suffredini said that it would also be available for use by NASA when the company is not using it, helping the process of transitioning research done on the International Space Station to future private stations. Research hardware elsewhere in the station could eventually be moved to this module to allow its continued use after the station's retirement.
Slashdot reader MarkWhittington shares an article from Blasting News:
In the meantime, Nanoracks, a company that is already handling some of the logistics for the ISS, is proposing a commercial airlock for the ISS. The development of commercial space stations, as well as commercial spacecraft such as the SpaceX Dragon and the Boeing Starliner, constitutes NASA's long-term strategy of handing off low-Earth orbit to the private sector while it concentrates on deep space exploration.Read Replies (0)
By EditorDavid from Slashdot's RIP,-Chekov department
Anton Yelchin, who played Chekov in the new Star Trek movies, was killed Sunday when his own vehicle rolled backwards. Now Slashdot reader ripvlan writes:
It has recently emerged that his vehicle was a Jeep. As discussed on Slashdot previously consumers are having a hard time knowing if the vehicle is in "Park." A new class action lawsuit is gaining momentum... Also Maserati has a similar system and can join the class action.
In fact, Maserati "is recalling about 13,000 sedans that have the same sort of gear shifter that was used in the Jeep that killed Yelchin," according to CNN Money, and Chrysler Fiat had in fact already filed a recall notice with federal regulators in April for Yelchin's band of Jeep, "but owners had only received a warning and not an official recall notice at the time of Yelchin's death". The lawsuit claims Chrysler "fraudulently concealed and failed to remedy a gear shifter design defect affecting 811,000 vehicles and linked to driverless rollaway incidents," including 2014-2015 Jeep Grand Cherokees, 2012-2014 Chrysler 300s, and 2012-2014 Dodge Chargers.Read Replies (0)
By manishs from Slashdot's why-do-we-fall,-Mr.-Wayne? department
In the aftermath of the United Kingdom voting to leave the European Union, UK's technology industry is reassessing its position, with many of them considering moving to a continental location. According to reports, Samsung, LG, and Acer have noted that the UK leaving the EU will affect their operations. From a BBC report:As news of Brexit broke, tech firms including BT, TalkTalk and software firm Sage reported share price falls. [...] "I have concerns that the local market might slow down," said Drew Benvie, founder of London-based digital agency Battenhall. From a report on The Guardian:Britain's financial technology sector is particularly hard-hit, with the prospect of losing access to European markets an unappealing one. "Fintech" has long been one of the UK's most promising growth areas, in part due to London's position as the financial capital of Europe. [...] Not one of the 14 billion-dollar tech firms based in the UK the Guardian asked said leaving the EU would be good for their business.Toby Coppel, the co-founder of venture capital firm Mosaic, said: "The next entrepreneur who's 22 years old, graduating from a technical university in Germany may, instead of moving to London to do their Fintech startup, decide to go to Berlin instead. I think that's one of the biggest concerns I have about the trajectory of the London technical ecosystem."Read Replies (0)
By EditorDavid from Slashdot's 20-years-later department
By EditorDavid from Slashdot's this-is-Peppermint department
Softpedia reports on the newest version of Peppermint OS, "a lightweight, stable, elegant, and fast computer operating system based on GNU/Linux and Open Source technologies." An anonymous Slashdot reader quotes their report:
It's a bit earlier than expected, but the Peppermint OS 7 GNU/Linux distribution has been officially unveiled...based on the Ubuntu 16.04 LTS (Xenial Xerus) operating system [with] a lot of packages from the Ubuntu 16.04 LTS distro, which means that it will also be a long-term support release.... "Along with the shift to the 16.04 (Xenial) code base, Peppermint 7 continues our policy of choosing the best components from other desktop environments, wherever that may be, and integrating them into a cohesive whole with our own software," reads today's announcement.
"Team Peppermint" says they're switching to Firefox as their default browser for site-specific browser functionality (similar to Chrome's -app mode) after Google dropped their 32-bit version of Chrome and moved to PPAPI plugins "which effectively ends Flash support in 32-bit Chromium"... But you can also still choose Chrome or Chromium for site-specific browsing (and the OS comes in 32-bit and 64-bit editions).Read Replies (0)
By EditorDavid from Slashdot's hacking-coughs department
Slashdot reader Orome1 shares an article by Bitdefender's senior "e-threat analyst," warning about an increasing number of attacks on healthcare providers:
In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identity theft. This personal data often contains information regarding a patient's medical history, which could be used in targeted spear-phishing attacks...and hackers are able to access this data via network-connected medical devices, now standard in high-tech hospitals. This is opening up new possibilities for attackers to breach a hospital or a pharmaceutical company's perimeter defenses.
If a device is connected to the internet and left vulnerable to attack, an attacker could remotely connect to it and use it as gateways for attacking network security... The majority of healthcare organizations have often been shown to fail basic security practices, such as disabling concurrent login to multiple devices, enforcing strong authentication and even isolating critical devices and medical data storing servers from a direct internet connection.
The article suggests the possibility of attackers tampering with the equipment that dispenses prescription medications, in which case "it is likely that future cyber-attacks could lead to the loss of human life."Read Replies (0)
By EditorDavid from Slashdot's extra-extortions department
Kaspersky Lab is reporting that the last year saw a 500% increase in the number of users who encountered crypto ransomware.
Trailrunner7 shares an article from On The Wire:
Data compiled by Kaspersky researchers from the company's cloud network shows that from April 2015 to March 2016, the volume of crypto ransomware encountered by users leapt from 131,111 to 718,536. That's a massive increase, especially considering the fact that ransomware is a somewhat mature threat. It didn't just burst onto the scene a couple of years ago. Kaspersky's researchers said the spike in crypto ransomware can be attributed to a small group of variants. "Looking at the malware groups that were active in the period covered by this report, it appears that a rather short list of suspects is responsible for most of the trouble caused by crypto-ransomware..."
It's difficult to overstate how much of an effect the emergence of ransomware has had on consumers, enterprises, and the security industry itself. The FBI has been warning users about crypto ransomware for some time now, and has consistently advised victims not to pay any ransoms. Security researchers have been publishing decryption tools for specific ransomware variants and law enforcement agencies have had some success in taking down ransomware gangs.
Enterprise targets now account for 13% of ransomware attacks, with attackers typically charging tens of thousands of dollars, the article reports, and "Recent attacks on networks at the University of Calgary and Hollywood Presbyterian Medical Center have demonstrated the brutal effectiveness of this strategy."Read Replies (0)
By manishs from Slashdot's curious-case-of-Telegram department
Earlier this week, The Intercept evaluated the best instant messaging clients from the privacy standpoint. The list included Facebook's WhatsApp, Google's Allo, and Signal -- three apps that employ end-to-end encryption. One popular name that was missing from the list was Telegram. A report on Gizmodo sheds further light on the matter, adding that Telegram is riddled with a wide range of security issues, and "doesn't live up to its proclamations as a safe and secure messaging application." Citing many security experts, the report states:One major problem Telegram has is that it doesn't encrypt chats by default, something the FBI has advocated for. "There are many Telegram users who think they are communicating in an encrypted way, when they're not because they don't realize that they have to turn on an additional setting," Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union, told Gizmodo. "Telegram has delivered everything that the government wants. Would I prefer that they used a method of encryption that followed industry best practices like WhatsApp and Signal? Certainly. But, if it's not turned on by default, it doesn't matter."The other issue that security experts have taken a note of is that Telegram employs its own encryption, which according to them, "is widely considered to be a fatal flaw when developing encrypted messaging apps." The report adds:"They use the MTproto protocol which is effectively homegrown and I've seen no proper proofs of its security," Alan Woodward, professor at the University of Surrey told Gizmodo. Woodward criticized Telegram for their lack of transparency regarding their home cooked encryption protocol. "At present we don't know enough to know if it's secure or insecure. That's the trouble with security by obscurity. It's usual for cryptographers to reveal the algorithms completely, but here we are in the dark. Unless you have considerable experience, you shouldn't write your own crypto. No one really understands why they did that."The list goes on and on.Read Replies (0)
By EditorDavid from Slashdot's commuting-cops department
Since the Uber and Lyft ride-sharing apps stopped service in Austin, drunk driving has increased, riders are hunting for alternatives, and the police are conducting undercover sting operations against unauthorized ride-sharing drivers. With Chicago also considering new restrictions on ride-sharing apps, Slashdot reader MarkWhittington shares this report from Austin:
With thousands of drivers and tens of thousands of riders who once depended on ride-sharing services in a lurch, a group called Arcade City has tried to fill the void with a person-to-person site to link up drivers and riders who then negotiate a fare. Of course, according to a story on KVUE, the Austin city government, and the police are on the case. The Austin Police Department has diverted detectives and resources to conduct sting operations on ride-sharing drivers who attempt to operate without official sanction. Undercover operatives will arrange for a ride with an Arcade City driver and then bust them, impounding their vehicle and imposing a fine.
"The first Friday and Saturday after Uber was gone, we were joking that it was like the zombie apocalypse of drunk people," one former ride-sharing driver told Vocative.com. Earlier this month the site compared this year's drunk driving arrests to last years -- and discovered that in the three weeks since Uber and Lyft left Austin, 7.5% more people have been arrested for drunk driving.Read Replies (0)
By EditorDavid from Slashdot's short-circuits department
Slashdot reader Taco Cowboy brings a new report about Russian robot IR77, which has escaped from its research lab again...
The story goes that an engineer working at Promobot Laboratories, in the Russian city of Perm, had left a gate open. Out trundled Promobot, traveling some 150 feet into the city before running out of juice. There it sat, batteries mostly dead, in the middle of a Perm street for 40 minutes, slowing cars to a halt and puzzling traffic cops
A researcher at Promobot's facility in Russia said that the runaway robot was designed to interact with human beings, learn from experiences, and remember places and the faces of everyone it meets. Other versions of the Promobot have been docile, but this one just can't seem to fall in line, even after the researchers reprogrammed it twice. Despite several rewrites of Promobot's artificial intelligence, the robot continued to move toward exits. "We have changed the AI system twice," Kivokurtsev said. "So now I think we might have to dismantle it".
Fans of the robot are pushing for a reprieve, according to an article titled 'Don't kill it!': Runaway robot IR77 could be de-activated because of 'love for freedom'Read Replies (0)
By EditorDavid from Slashdot's watch-your-language department
"Researchers have discovered a vulnerability within the Swagger specification which may place tools based on NodeJS, PHP, Ruby, and Java at risk of exploit," warns ZDNet's blog Zero Day, adding "the severe flaw allows attackers to remotely execute code." Slashdot reader msm1267 writes:
A serious parameter injection vulnerability exists in the Swagger Code Generator that could allow an attacker to embed executable code in a Swagger JSON file. The flaw affects NodeJS, Ruby, PHP, Java and likely other programming languages. Researchers at Rapid7 who found the flaw disclosed details...as well as a Metasploit module and a proposed patch for the specification. The matter was privately disclosed in April, but Rapid7 said it never heard a response from Swagger's maintainers. Swagger produces and consumes RESTful web services APIs; Swagger docs can be consumed to automatically generate client-server code. As of January 1, the Swagger specification was donated to the Open API Initiative and became the foundation for the OpenAPI Specification. The vulnerability lies in the Swagger Code Generator, and specifically in that parsers for Swagger documents (written in JSON) don't properly sanitize input. Therefore, an attacker can abuse a developer's trust in Swagger to include executable code that will run once it's in the development environment.Read Replies (0)