Daily Archives: November 17, 2018

Some Birds Are Excellent Tool-Makers

brindafella writes: Veterinary scientists from Viena have shown that Goffin's cockatoos can do an excellent job of remaking cardboard into tools to get rewards. This follows on from earlier experiments with the New Caledonian crow that can select tools for its purposes. So, birds are definitely not "bird-brained." "[The study] tells us that the cockatoos' mind is highly flexible and that they can modify their solution to a problem in order to save effort," said Alice Auersperg, a cognitive biologist at the University of Veterinary Medicine Vienna and lead author of the paper. The Australian Broadcast Company explains how the study was conducted: "[S]ix trained birds were given a piece of cardboard and placed in front of a cage that had food accessible through a small hole, but placed at different distances away. The birds used their beak to cut strips of cardboard they then used to reach the food. Importantly, when the food was close, the birds made a shorter strip. When it was far away, they made a longer strip. But when the researchers made the hole in the cage smaller, only one of the birds was able to fashion their cardboard tool to be narrow enough to fit through the hole. The successful bird was the only female in the group, and the researchers think she was able to do this because her beak was small enough to make a narrow tool."

Read more of this story at Slashdot.

Moscow has Increased Intel Ops Staff by Four Times Since 1991 and Counter-Intel Even More, Former KGB Illegal Says

windowoneurasia2.blogspot.com - Staunton, November 14 – Western media have been fixated on a report that Moscow now has 200 case officers working in London alone and handling 500 agents and as many as 75,000 informants and the sugg…


Tweeted by @mikercarpenter https://twitter.com/mikercarpenter/status/1064012546829680640

Google Exposed for Funding Pro-Slavery Candidates Calling for Lynchings

The Seth Meyers show does a pretty good job capturing the unapologetic racism of white supremacist candidates in America A crucial bit of analysis is missing, however. You might, like most rational people watching this video, wonder why someone saying “a public hanging, I’d be on the front row” (death penalty) suddenly pivots to throw … Continue reading Google Exposed for Funding Pro-Slavery Candidates Calling for Lynchings

flyingpenguin: Google Exposed for Funding Pro-Slavery Candidates Calling for Lynchings

The Seth Meyers show does a pretty good job capturing the unapologetic racism of white supremacist candidates in America A crucial bit of analysis is missing, however. You might, like most rational people, wonder why someone saying “a public hanging, I’d be on the front row” (death penalty) pivots to throw out anti-abortion platitudes as … Continue reading Google Exposed for Funding Pro-Slavery Candidates Calling for Lynchings →

[[ This is a summary only. Read more at flyingpenguin.com ]]

flyingpenguin

Facebook Filed a Patent To Predict Your Household’s Demographics Based On Family Photos

An anonymous reader quotes a report from BuzzFeed News: Facebook has submitted a patent application for technology that would predict who your family and other household members are, based on images and captions posted to Facebook, as well as your device information, like shared IP addresses. The application, titled "Predicting household demographics based on image data," was originally filed May 10, 2017, and made public today. The system Facebook proposes in its patent application would use facial recognition and learning models trained to understand text to help Facebook better understand whom you live with and interact with most. The technology described in the patent looks for clues in your profile pictures on Facebook and Instagram, as well as photos of you that you or your friends post. It would note the people identified in a photo, and how frequently the people are included in your pictures. Then, it would assess information from comments on the photos, captions, or tags (#family, #mom, #kids) -- anything that indicates whether someone is a husband, daughter, cousin, etc. -- to predict what your family/household actually looks like. According to the patent application, Facebook's prediction models would also analyze "messaging history, past tagging history, [and] web browsing history" to see if multiple people share IP addresses (a unique identifier for every internet network). A Facebook spokesperson said in response to the story, "We often seek patents for technology we never implement, and patents should not be taken as an indication of future plans."

Read more of this story at Slashdot.

SecurityWeek RSS Feed: Suspected Russian Hackers Impersonate State Department Aide

WASHINGTON (AP) — U.S. cybersecurity experts say hackers impersonating a State Department official have targeted U.S. government agencies, businesses and think tanks in an attack that bears similarity to past campaigns linked to Russia.

The "spear phishing" attempts began on Wednesday, sending e-mail messages purported to come from a department public affairs official.

read more



SecurityWeek RSS Feed

Quem são os youtubers recomendados por Jair Bolsonaro

O presidente eleito já deixou claro que seguirá à risca os passos de Trump na estratégia de enfrentamento da imprensa. Além de vetar a presença de determinados jornalistas em sua primeira entrevista coletiva como presidente eleito, Bolsonaro também tentou proibir a entrada de jornalista no plenário do Congresso para a comemoração dos 30 anos da Constituição Federal.

Além disso, tem ficado claro o uso de uma tática para desmoralizar a imprensa: pessoas ligadas a Bolsonaro vazam informações para jornalistas, que são publicadas. Logo em seguida, bolsonaristas negam tudo, sempre em tom de deboche, colocando dúvidas sobre a confiabilidade da imprensa. Bolsonaro passará o mandato jogando essas cascas de bananas no caminho do jornalismo.

Todas as críticas contra Bolsonaro já estão com um antídoto preparado. A teoria, difundida com sucesso, é a de que a imprensa é formada quase que completamente por esquerdistas que fabricam mentiras para prejudicar o presidente de extrema-direita. A fórmula bem-sucedida da eleição permanecerá nos próximos quatro anos. O bolsonarismo investirá pesado na manipulação da opinião pública, pautando os debates centrais e colocando toda e qualquer crítica ou denúncia no mesmo saco da “mídia esquerdista”.

Mas Bolsonaro tem uma imprensa pra chamar de sua. Nessa semana, ele recomendou nas redes sociais uma lista de canais de informação no YouTube que são de sua confiança.

 

Escrevi um pouco a respeito de cada uma dessas “excelentes opções de informação”. Tenho certeza que você não vai se surpreender nem um pouco com a credibilidade desses canais.

 

Embaixada da Resistência e Tradutores de Direita

Esses canais são comandados por pessoas anônimas e basicamente colocam legendas em português em vídeos estrangeiros, a maioria deles com conteúdo reacionário dos EUA. Muitos desses vídeos são programas da Fox News ou produzidos pela militância pró-Trump. Há também alguns vídeos de Bolsonaro legendados em inglês. O canal fornece poucas informações — às vezes, nenhuma — sobre os vídeos e não costuma colocar a fonte.

Em um vídeo publicado pela Embaixada da Resistência, Patrick Moore aparece dizendo que as “alterações climáticas são um embuste”. O canal informa ao visitante apenas que Moore é um “fundador do Greenpeace”, mas omite o fato de que hoje ele trabalha como lobista da indústria dos agrotóxicos, da indústria nuclear e do petróleo. Moore é pago para defender que o aquecimento global é uma farsa.

Ambos os canais traduzem muitos vídeos do Infowars, principalmente os estrelados pelo editor-geral do site, Paul Joseph Watson. O Infowars talvez seja a maior fábrica virtual de fake news do mundo. Seguem algumas das mentiras publicadas por esse veículo: o show de Lady Gaga no Super Bowl foi um ritual satânico disfarçado; Bill Gates tinha um plano secreto para implantar um sistema de eugenia nos EUA aos moldes de Hitler; o furacão Sandy foi fabricado por Obama; Hillary Clinton comandava uma rede de pedofilia que funcionava nos fundos de uma pizzaria; o massacre de Sandy Hook nunca existiu, as 20 crianças assassinadas eram atores mirins.

 

Diego Rox

Com quase 1 milhão de seguidores no YouTube, o jovem Diego se tornou um dos principais youtubers do conservadorismo de direita. Mas, até quatro anos atrás, Diego buscava a fama como MC de funk ostentação, cujas letras envergonhariam a família tradicional brasileira que hoje ele defende com fervor. Hoje, Diego é um neocon brasileiro que funciona basicamente como um papagaio das ideias de Olavo de Carvalho.

Rox acredita, por exemplo, na existência da Ursal, que ficou famoso nos delírios de Cabo Daciolo, mas que não passa de mais uma teoria da conspiração parida nas profundezas do reacionarismo digital brasileiro.

O youtuber fez campanha ostensiva para Bolsonaro em seu canal durante a eleição. Para ele, a denúncia do #LavaZap feita pela Folha de São Paulo — que originou uma investigação do TSE — foi “criminosa, ridícula, infantil e baseada em nada” e feita por “jornal de extrema-esquerda”. Para ele, quase nenhum jornalista presta, já que “as universidade estão formando doentes esquerdopatas”. Durante a campanha eleitoral, Diego chamou Boulos de “terrorista” e fez com que Boulos conseguisse uma liminar junto ao TSE para retirar o vídeo.

Como todo o bom reacionário, Rox gosta de jogar a carta da pedofilia e travar um falso debate. “Não há limites para os planos satânicos desses monstros”, diz o youtuber sobre os planos dos globalistas para defender a pedofilia em todos os cantos do mundo. Os globalistas seriam um conluio entre “George Soros, Rockfeller, família Gates, Ford e ONU” para implantar a “agenda gayzista, feminista, abortista e pregar racismo onde não há racismo”. Ele chama um estudo da OMS, ligada à ONU, que considera a pedofilia como um transtorno sexual, de “estudo de merda”. Para tentar desacreditar o estudo, Diego cita casos reais de crimes sexuais praticados por soldados e funcionários da ONU e decreta “a ONU é uma organização criminosa”.

O youtuber recomendado pelo presidente eleito acredita também que “o Brasil não é capitalista, mas um país socialista com cartão de crédito” e que “a agenda macabra do PSOL nada mais é do que a agenda da ONU.”

 

Bernardo Küster

Tem 30 anos e gosta de se apresentar como jornalista católico. Como católico, acredita que o Papa Francisco tem uma “posição permissiva em relação aos papas anteriores”. É um crítico feroz da Teologia da Libertação e está produzindo um documentário sobre o assunto.

Bernardo costuma reproduzir notícias de canais neocons americanos, como a que afirma categoricamente que “o parlamento francês legalizou oficialmente a pedofilia”. Ele inicia um dos seus vídeos dizendo que há um grande complô da imprensa nacional para abafar o assunto: “A notícia que eu tenho pra dar pra você nesse vídeo é bastante triste. Você não viu na Globo, na Record, na Band, em nenhum grande site de notícia. Depois da França legalizar o aborto, ser tomada por uma migração sem critério, ter a violência aumentada…agora é a vez da pedofilia ser legalizada”, afirma o youtuber indignado.

Desnecessário dizer que se trata de mais uma retumbante mentira.

Reproduzindo o modus operandi eleitoral de Bolsonaro, sempre apontando o dedo para fantasmas imaginários, Küster assusta sua audiência com a possibilidade da legalização da pedofilia chegar ao país: “A gente já sabe que isso tá vindo para o Brasil”.

Em um vídeo em que debocha das opiniões de Drauzio Varella e da ciência, Küster afirmar que “os cientistas de hoje não entendem nada” e fazem as pessoas acreditarem em “mentirinhas” como o evolucionismo e o aquecimento global. Como se vê, não foi à toa que Bolsonaro atestou a confiabilidade desse canal.

 

Olavo de Carvalho

O arquiteto do bolsonarismo e dispensa maiores apresentações. É hoje o pensador brasileiro mais popular da internet e suas ideias servem de base intelectual para o reacionarismo mais chucro do país. Sem dúvida nenhuma, é a estrela-guia dos demais youtubers recomendados na lista de Bolsonaro. Sem Olavo nada do que está acontecendo no Brasil seria possível. Todas as teorias conspiratórias do reacionarismo nasceram ou se popularizaram no Brasil através dos seus vídeos no YouTube.

Foi Olavo, por exemplo, um dos responsáveis por popularizar o boato da Ursal, que, nas palavras dele, trata-se de um “órgão do Foro de São Paulo”. Só isso já seria motivo para chacota, mas há muito mais.

O guru do Bolsonarismo tem grande aversão à ciência moderna. Para ele, “a cultura científica moderna é baseada em falsificações históricas e científicas absolutamente monstruosas” e o “evolucionismo foi pai do comunismo e do nazismo”.

Olavo acredita que Albert Einstein foi um farsante que inventou a teoria da relatividade só pra não admitir que a Terra é imóvel e “não gira em torno do sol”. Isaac Newton? Seria portador de uma “uma burrice formidável”. Galileu? Não passou de um charlatão protegido pelo Papa.

Ele também afirma com muita convicção que cigarro não faz mal à saúde e que combustíveis fósseis não existem. Todas essas constatações científicas seriam obra dos globalistas para impor sua agenda ao mundo. Para Olavo, a Globo é a grande responsável pela disseminação do marxismo cultural no país.

Ficou famoso o vídeo em que ele reproduz um dos boatos mais esdrúxulos já fabricados na internet. A Pepsi, segundo ele, adoçava seus refrigerantes com células de fetos humanos abortados. “Quem bebe Pepsi é um abortista terceirizado”, afirmou o farol intelectual do bolsonarismo.

 

Nando Moura

Metaleiro, católico e conservador, Nando é o youtuber mais popular da lista de recomendações de Bolsonaro e conta com quase 3 milhões de seguidores no YouTube. Costuma arranjar tretas com outras estrelas das redes sociais e falar muitos palavrões, mimetizando o seu guru Olavo de Carvalho.

Para Nando Moura, o “conservadorismo não é uma ideologia”, o nazismo foi um sistema de governo de esquerda e o aquecimento global é uma farsa. Ele já entrevistou duas vezes Jair Bolsonaro para seu canal. Entrevistou também o professor de geografia Ricardo Felício, um negacionista do aquecimento global, que se candidatou (e perdeu) a uma vaga na Câmara pelo partido de Bolsonaro.

Quando Dilma sofreu impeachment, Nando publicou um vídeo intitulado “A PUTA VERMELHA CAIU!!! #TCHAUQUERIDA”, em que aparece assistindo à votação e xingando esquerdistas. “Colocaram essa puta lá, agora ela está saindo, seus filhos da puta. Chora, seus filhos da puta”, esperneou Nando Moura.

Bom, são esses os veículos de informação que o nosso presidente eleito recomenda confiáveis. Desejo boa sorte a todos nós a partir de 2019. Mamadeira de piroca vai ser fichinha perto do que está por vir.

The post Quem são os youtubers recomendados por Jair Bolsonaro appeared first on The Intercept.

XRP Price Up 14% In Two Days as Swiss Exchange Launches Crypto ETP

XRP (XRP) consolidated its newly gained second position in the market cap rankings Saturday, with a 5% valuation spike over twenty-four hours. This compounds the coin’s runaway growth since the recent market dip, from which time XRP has climbed 14% in price. The price movement comes amid news that the prominent Swedish stock exchange, SIX, […]

The post XRP Price Up 14% In Two Days as Swiss Exchange Launches Crypto ETP appeared first on Hacked: Hacking Finance.

Meet the women changing tires and making history in NASCAR’s top series

Brehanna Daniels and Breanna O’Leary, both talented college athletes, knew little about the sport before they were recruited through NASCAR’s Drive for Diversity program. Not only are the pair the first female duo to pit for the same team in NASCAR’s top series, but Brehanna is the first African-American woman to ever change tires in a NASCAR cup race.

Mageia 2018-0458: squid security update

LinuxSecurity.com: Due to incorrect input handling, Squid is vulnerable to a Cross-Site Scripting vulnerability when generating HTTPS response messages about TLS errors (CVE-2018-19131). Due to a memory leak in SNMP query rejection code, Squid is vulnerable

[updates-announce] MGASA-2018-0454: Updated sdl2/mingw-SDL2 packages fix security vulnerabilities

LinuxSecurity.com: This update fixes various security vulnerabilities affecting the SDL2_image library, listed below. The fixes are provided in SDL2_image 2.0.4, which depends on SDL2 2.0.8 or later. As such, the SDL2 and SDL2_mixer libraries are also updated to their current stable releases, providing various bug fixes and features.

EFF, MuckRock Partner To See How Local Police Are Trading Your Car’s Location

v3rgEz writes: The Electronic Frontier Foundation and transparency non-profit MuckRock helped file over a thousand public records requests, looking into how local police departments were trading away sensitive data on where you drive and park, picked up by their use of automated license plate recognition devices. They've just published the results of those requests, including looking at how hundreds of departments freely share that data with hundreds of other organizations -- often with no public oversight. Explore the data yourself, or, if your town isn't yet in their database, requests its information free on MuckRock and they'll file a request for it. "[Automated license plate readers (ALPR)] are a combination of high-speed cameras and optical character recognition technology that can identify license plates and turn them into machine-readable text," reports the EFF. "What makes ALPR so powerful is that drivers are required by law to install license plates on their vehicles. In essence, our license plates have become tracking beacons. After the plate data is collected, the ALPR systems upload the information to a central a database along with the time, date, and GPS coordinates. Cops can search these databases to see where drivers have traveled or to identify vehicles that visited certain locations. Police can also add license plates under suspicion to 'hot lists,' allowing for real-time alerts when a vehicle is spotted by an ALPR network."

Read more of this story at Slashdot.

Why Vienna is still a hotbed of spies

bbc.co.uk - I watched from a distance as a chartered maroon and white plane from New York, carrying 10 Russian spies, parked on the runway at Vienna airport next to a Russian plane with four more agents on board.


Tweeted by @cyber_priest https://twitter.com/cyber_priest/status/1063927885679988737

Bill Godbout, Early S-100 Bus Pioneer, Perished In the Camp Wildfire

evanak writes: Bill Godbout was one of the earliest and most influential supports of the S-100 bus in the mid-1970s. He passed away last week due to the Camp wildfire in Concow, California, according to a Vintage Computer Federation blog post. More than 50 other people also died in the fires, but chances are Mr. Godbout was the only one with a license to fly blimps. "Godbout was born October 2, 1939," the blog post reads. "He talked about his introduction to computing in an interview with InfoWorld magazine for their February 18, 1980 issue. 'My first job out of college was with IBM. I served a big-system apprenticeship there, but I think the thing that really triggered [my interest] was the introduction of the 8008 by Intel,' he said. 'I was fascinated that you could have that kind of capability in a little 18-pin package.'" Godbout's family has set up a GoFundMe campaign to support their needs in this difficult time.

Read more of this story at Slashdot.

CVE-2018-19343 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read), obtain sensitive information, or possibly have unspecified other impact via a U3D sample because of a "Data from Faulting Address controls Code Flow starting at U3DBrowser!PlugInMain+0x00000000000f43ff" issue.

CVE-2018-19345 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at U3DBrowser!PlugInMain+0x0000000000053f8b" issue.

CVE-2018-19341 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at FoxitReader!std::basic_ostream >::operator<<+0x0000000000087906" issue.

CVE-2018-19344 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address may be used as a return value starting at U3DBrowser!PlugInMain+0x0000000000031a75" issue.

CVE-2018-19342 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation starting at U3DBrowser+0x000000000000347a" issue.

CVE-2018-19346 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11ea" issue.

CVE-2018-19348 (foxit_reader, u3d)

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x000000000012dff5" issue.

CVE-2018-19347

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11bb" issue.

CVE-2018-19345

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at U3DBrowser!PlugInMain+0x0000000000053f8b" issue.

CVE-2018-19346

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11ea" issue.

CVE-2018-19348

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x000000000012dff5" issue.

CVE-2018-19344

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address may be used as a return value starting at U3DBrowser!PlugInMain+0x0000000000031a75" issue.

CVE-2018-19343

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read), obtain sensitive information, or possibly have unspecified other impact via a U3D sample because of a "Data from Faulting Address controls Code Flow starting at U3DBrowser!PlugInMain+0x00000000000f43ff" issue.

CVE-2018-19342

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation starting at U3DBrowser+0x000000000000347a" issue.

CVE-2018-19341

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at FoxitReader!std::basic_ostream >::operator<<+0x0000000000087906" issue.

Bitcoin Sees Biggest Volatility Spike of the Year; Should Long-Term Holders Be Worried?

Bitcoin’s precipitous drop over the past 48 hours has rendered the virtual currency highly susceptible to new bear-market lows. According to one indicator, the sudden and dramatic downshift disrupted a period of calm not seen  disrupted a period of calm not seen in over two years. Bitcoin Volatility Surges In the span of just 24 […]

The post Bitcoin Sees Biggest Volatility Spike of the Year; Should Long-Term Holders Be Worried? appeared first on Hacked: Hacking Finance.

People Sensitive To Caffeine’s Bitter Taste Drink More Coffee, Study Finds

An anonymous reader quotes a report from NPR: A team of researchers conducted their analysis using data stored in something called the UK Biobank. More than 500,000 people have contributed blood, urine and saliva samples to the biobank, which scientists can use to answer various research questions. The volunteers also filled out questionnaires asking a variety of health-related questions, including how much coffee they drink. Part of what determines our sensitivity to bitter substances is determined by the genes we inherit from our parents. So the researchers used genetic analysis of samples from the biobank to find people who were more or less sensitive to three bitter substances: caffeine, quinine (think tonic water) and a chemical called propylthiouracil that is frequently used in genetic tests of people's ability to taste bitter compounds. Then they looked to see if people sensitive to one or more of these substances drank more or less coffee than people who were not sensitive. To the researchers' surprise, people who were more sensitive to caffeine reported increased coffee consumption compared with people who were less sensitive. The result was restricted to the bitterness of caffeine. People sensitive to quinine and propylthiouracil -- neither of which is in coffee -- tended to drink less coffee. The effect of increased caffeine sensitivity was small: it only amounted to about two tablespoons more coffee per day. But by analyzing so many samples, the researchers were able to detect even small differences like that. The reason may be that people "learn to associate that bitter taste with the stimulation that coffee can provide," says one of the study authors.

Read more of this story at Slashdot.

Fear This Man

foreignpolicy.com - As the sun rose over the banks of the Seine and the medieval, half-timbered houses of Rouen, France, on July 13, 2012, Hisham Almiraat opened his inbox to find “Denunciation” in the subject line of a…


Tweeted by @ThomasS4217 https://twitter.com/ThomasS4217/status/1063899081553190912

Apple’s Siri May Soon Process Voice Locally On a Device, No Cloud Required

Proudrooster writes: "Apple wants Siri to become more useful to users when not connected to the internet, including the possibility of an offline mode that does not rely on a backend server to assist with voice recognition or performing the required task, one that would be entirely performed on the user's device," reports Apple Insider. Just give it 10 years and everything old is new again. Siri will join the ranks of Ford/Microsoft Sync and Intel Edison. Do any other phones/cars/speakers have this option right now? The new capabilities are outlined in a recently-published patent application that describes an "Offline personal assistant." "Rather than connected to Apple's servers, the filing suggests the speech-to-text processing and validation could happen on the device itself," reports Apple Insider. "On hearing the user make a request, the device in question will be capable of determining the task via onboard natural language processing, working out if the requested task as it hears it is useful, then performing it. "

Read more of this story at Slashdot.

Hacker Says They Compromised ProtonMail; ProtonMail Calls BS

A hacker going by the name AmFearLiathMor is claiming to have hacked ProtonMail and stolen "significant" amounts of data. They have posted a ransom demand to an anonymous Pastebin but it reads like a prank, as it states that the alleged hackers have access to underwater drone activity and treaty violations in Antarctica. Lawrence Abrams writes via BleepingComputer: According to the message, a hacker going by the name AmFearLiathMor makes quite a few interesting claims such as hacking ProtonMail's services and stealing user's email, that ProtonMail is sending their user's decrypted data to American servers, and that ProtonMail is abusing the lack of Subresource Integrity (SRI) use to purposely and maliciously steal their user's passwords. After reading the Pastebin message (archive.is link), which is shown in its entirety below minus some alleged keys, and seeing the amount of claims, the first thing that came to mind was a corporate version of the sextortion scams that have been running rampant lately. As I kept reading it, though, it just felt like a joke. ProtonMail posted on Twitter that this is a hoax and that there is no evidence that anything states is true. The encrypted email service provided a statement to BleepingComputer: "We believe this extortion attempt is a hoax, and we have seen zero evidence to suggest otherwise. Not a single claim made is true and many of the claims are unsound from a technical standpoint. We are aware of a small number of ProtonMail accounts that have been compromised as a result of those individual users falling for phishing attempts. However, there is zero evidence of a breach of our infrastructure."

Read more of this story at Slashdot.

Million password resets and 2FA codes exposed in unsecured Vovox DB

Million of password resets and two-factor authentication codes exposed in unsecured Vovox DB.

Sébastien Kaul, a security researcher based in Berlin, has discovered a poorly secured database owned by communication firm Vovox that contained left names, phone numbers, tens of millions of SMS messages, temporary passwords, two-factor codes, shipping alerts, and other information belonging to customers of companies including Microsoft, Amazon, and Google.

It has been estimated that the exposed archive included at least 26 million text messages year-to-date.

“Although Kaul found the exposed server on Shodan, a search engine for publicly available devices and databases, it was also attached to one of Voxox’s own subdomains.reported Techcrunch.

“Worse, the database — running on Amazon’s Elasticsearch — was configured with a Kibana front-end, making the data within easily readable, browsable and searchable for names, cell numbers and the contents of the text messages themselves.”

Vovox data leak

Vovox promptly took down the database after TechCrunch informed the company with an inquiry.

Anyone that accessed to the database while it was exposed online could have obtained two-factor codes sent by users to access their accounts potentially exposing them to account take over.

Below TechCrunch’s findings from a cursory review of the data:

  • We found a password sent in plaintext to a Los Angeles phone number by dating app Badoo;
  • Several Booking.com partners were sent their six-digit two-factor codes to log in to the company’s extranet corporate network;
  • Fidelity Investments also sent six-digit security codes to one Chicago Loop area code;
  • Many messages included two-factor verification codes for Google accounts in Latin America;
  • A Mountain View, Calif.-based credit union, the First Tech Federal Credit Union, also sent a temporary banking password in plaintext to a Nebraska number;
  • We found a shipping notification text sent by Amazon with a link, which opened up Amazon’s delivery tracking page, including the UPS tracking number, en route to its destination in Florida;
  • Messenger apps KakaoTalk and Viber, and quiz app HQ Trivia use the service to verify user phone numbers;
  • We also found messages that contained Microsoft’s account password reset codes and Huawei ID verification codes;
  • Yahoo also used the service to send some account keys by text message;
  • And, several small to mid-size hospitals and medical facilities sent reminders to patients about their upcoming appointments, and in some cases, billing inquiries.

Kevin Hertz, Voxox’s co-founder and chief technology officer, wrote in an email that the company is “looking into the issue and following standard data breach policy at the moment,” and that the company is “evaluating impact.”

Pierluigi Paganini

(Security Affairs – Voxox, data leak)

The post Million password resets and 2FA codes exposed in unsecured Vovox DB appeared first on Security Affairs.

Mark Shuttleworth Reveals Ubuntu 18.04 Will Get a 10-Year Support Lifespan

At the OpenStack Summit in Berlin last week, Ubuntu Linux founder Mark Shuttleworth said in a keynote that Ubuntu 18.04 Long Term Support (LTS) support lifespan would be extended from five years to 10 years. "I'm delighted to announce that Ubuntu 18.04 will be supported for a full 10 years," said Shuttleworth, "In part because of the very long time horizons in some of industries like financial services and telecommunications but also from IoT where manufacturing lines for example are being deployed that will be in production for at least a decade." ZDNet reports: Ubuntu 18.04 released in April 2018. While the Ubuntu desktop gets most of the ink, most of Canonical's dollars comes from server and cloud customers. It's for these corporate users Canonical first extended Ubuntu 12.04 security support, then Ubuntu 14.04's support, and now, preemptively, Ubuntu 18.04. In an interview after the keynote, Shuttleworth said Ubuntu 16.04, which is scheduled to reach its end of life in April 2021, will also be given a longer support life span. When it comes to OpenStack, Shuttleworth promised again to support versions of OpenStack dating back to 2014's IceHouse. Shuttleworth said, "What matters isn't day two, what matters is day 1,500." He also doubled-down on Canonical's promise to easily enable OpenStack customers to migrate from one version of OpenStack to another. Generally speaking, upgrading from one version of OpenStack is like a root canal: Long and painful but necessary. With Canonical OpenStack, you can step up all the way from the oldest supported version to the newest one with no more than a second of downtime.

Read more of this story at Slashdot.

No Signs of Crypto Revival as Weekend Begins; XRP Overtakes Ethereum by a Wider Margin

Bitcoin and alternative cryptocurrencies remained under pressure Saturday following one of the worst drops of 2018, as the fallout from the bitcoin cash hard fork offered little reassurance that the market had moved past the divisive rhetoric. Market Update and XRP/Ethereum “Flippening” The combined market value of all cryptocurrencies averaged $183 billion on Saturday, according […]

The post No Signs of Crypto Revival as Weekend Begins; XRP Overtakes Ethereum by a Wider Margin appeared first on Hacked: Hacking Finance.

Search Msdn: Tony Schreiner’s Blog – Developer – blogs.msdn.microsoft.com

Blogs My coworker Jeff Davis posted about IE7 and the cyclical nature of blogging, especially for those of us working on things that haven’t yet been publicly announced. It includes a great ship analogy, and having been on the “critical path” for most of IE7 development (and before that having endured all my Longhorn Alpha work being ...

Search Msdn

CVE-2018-19333 (gvisor)

pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.

CVE-2018-19333

pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.

Trade Recommendation: Steem

An extended bear market may be upon us as altcoins either create new yearly lows or revisit historical support areas. While the prolonged downtrend can be difficult to trade, it doesn’t necessarily mean that there are no profitable trade opportunities. In fact, we’re seeing a promising setup now in Steem/Bitcoin (STEEM/BTC). Steem broke support of […]

The post Trade Recommendation: Steem appeared first on Hacked: Hacking Finance.

Mac Virus: Apple and Android updates 17th November 2018

Bleeping Computer: iPhone X, Galaxy S9, Xiaomi Mi6 Fall at Pwn2Own Tokyo – “iPhone X, Samsung Galaxy S9, and Xiaomi Mi6 all fell at the hands of hackers that found bugs in various components and crafted exploits that allowed complete take over of the targeted device.”


 for ESET: Google’s data charts path to avoiding malware on Android
“How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers”


Cyberscoop: Apple’s new security chip kills access to microphone – “In a security pamphlet released after Apple’s press event on Tuesday, the company revealed that the chip will completely cut off access to the device’s microphone when the MacBook lid is shut.”


The Register: Android fans get fat November security patch bundle – if the networks or mobe makers are kind enough to let ’em have it – “And Apple fixes Watch-killing security patch of its own”


Graham Cluley for BitDefender: Yes, you should update your iPhone to iOS 12.1, but its lock screen is *still* unsafe

John E. Dunn for Sophos: Another day, another update, another iPhone lock screen bypass


Sophos: Update now! Apple releases security fixes for iOS, MacOS, Safari, others


Brian Krebs: Busting SIM Swappers and SIM Swap Myths – “KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.”

David Harley

Advertisements




Mac Virus

Trade Recommendation: Aeternity

Aeternity (AE/BTC) appeared to be doing well prior to the November 14, 2018 bloodbath. It bounced off lows of 0.0001266 on September 12, 2018, and climbed as high 0.0002275 on October 20. At that point, AE/BTC looked strong. In only needed to preserve support of 0.0001735 to resume its uptrend. Unfortunately, Aeternity fell as one […]

The post Trade Recommendation: Aeternity appeared first on Hacked: Hacking Finance.

Halifax Security Forum: American senators say Trump’s heated rhetoric not in line with U.S. actions | The Chronicle Herald

thechronicleherald.ca - HALIFAX — Two outspoken U.S. senators — one Republican and one Democrat — took aim Friday at President Donald Trump’s fiery rhetoric about rejecting globalism in favour of nationalism. Republican Sen…


Tweeted by @CSFI_DCOE https://twitter.com/CSFI_DCOE/status/1063834166524030977

New variant of APT28 Lojax rootkit discovered

Hackers know a prime target when they spot one. Unfortunately, small-to-midsize businesses (SMBs) are often those prime targets. A lot of small business owners like to think that malicious attackers don’t have anything to gain by going after “the little guy,” or that they don’t have much to lose.

A new variant of the infamous APT28 Lojax (aka Double-Agent) has been discovered by the Cybaze ZLab – Yoroi team. It is the latest version of the well-known rootkit Double-Agent, previously analyzed by ESET researchers.

The behaviour of the Lojax sample seems to be similar to the previous versions and exploits the legitimate “Absolute Lojack” software to grant its persistence on the infected system. Lojack is an anti-theft and localization software developed by Absolute Software Corporation and it is pre-installed in the BIOS image of several Lenovo, HP, Dell, Fujitsu, Panasonic, Toshiba, and Asus machines. In the past, this software was known as “Computrace”.

Despite its legitimate purposes, the Absolute Lojack software acts like a rootkit (more precisely as a bootkit): its BIOS component forces the writing of a small agent named “rpcnetp.exe” into the system folder. The agent periodically contacts the Absolute server and sends to it the current machine’s position.

That’s simply not the case. Sixty-one percent of SMBs have been hit by cyberattacks, and the average cost of those breaches has exceeded $1,000,000. Here are some of the easy ways that hackers barge their way into small business networks – Malware, Phishing, Ransomware, Spoofing and Rootkit.

Malware is malicious software designed to infiltrate computer systems and extract any important information it might find. It comes in several different forms, including viruses, spyware, Trojans, rootkits, and worms.

The size of the malicious artefact is the same as the legitimate one, so the only manipulation seems to the modification of the C2C address, in according with other firms that previously analyzed the malware.

Virginia To Produce 25K-35K Additional CS Grads As Part of Amazon HQ2 Deal

theodp writes: Developers! Developers! Developers! To make good on the proposal that snagged it a share of the Amazon HQ2 prize, the State of Virginia is also apparently on the hook for doubling the annual number of graduates with computer science or closely related degrees, with a goal to add 25,000 to 35,000 graduates (Amazon's HQ2 RFP demanded info on "education programs related to computer science"). To do that, the state will establish a performance-based investment fund for higher education institutions to expand their bachelor's degree programs, and spend up to $375 million on George Mason University's Arlington campus and a new Virginia Tech campus in Alexandria. The state will also spend $50 million on STEM + CS education in public schools and expanding internships for higher education students. Amazon is certainly focused on boosting the ranks of software engineer types. Earlier this month, Amazon launched Amazon Future Engineer, a program that aims to teach more than 10 million students a year how to code, part of a $50 million Amazon commitment to computer science education that was announced last year at a kickoff event for the Ivanka Trump-led White House K-12 CS Initiative. And on Wednesday, Amazon-bankrolled Code.org -- Amazon is a $10+ million Diamond Supporter of the nonprofit; CS/EE grad Jeff Bezos is a $1+ million Gold Supporter -- announced it has teamed with Amazon Future Engineer to build and launchHour of Code: Dance Party, a signature tutorial for this December's big Hour of Code (powered by AWS in 2017), which has become something of a corporate infomercial (Microsoft recently boasted "learners around the world have completed nearly 100 million Minecraft Hour of Code sessions"). Students participating in the Dance Party tutorial, Code.org explained, can choose from 30 hits like Katy Perry's "Firework" and code interactive dance moves and special effects as they learn basic CS concepts. "The artists whose music is used in this tutorial are not sponsoring or endorsing Amazon as part of licensing use of their music to Code.org," stresses a footnote in Code.org's post. So, don't try to make any connections between Katy Perry's Twitter endorsement of the Code.org/Amazon tutorial later that day and those same-day follow-up Amazon and Katy Perry tweets touting their new exclusive Amazon Music streaming deal, kids!

Read more of this story at Slashdot.

Children’s Smartwatch Vulnerability Allows Hackers To Stalk and Talk To Your Kids

Child-tracking smartwatches provide a convenient means of monitoring a child’s safety for parents. However, if the devices have security flaws,

Children’s Smartwatch Vulnerability Allows Hackers To Stalk and Talk To Your Kids on Latest Hacking News.

10 Best Torrent Sites To Download E-Books For Free

Even in the digital age of the 21st century, books haven’t lost their importance and they are still a reliable source for gathering information.

Though we can now carry thousands of e-books on our smartphones. Well, if you have been looking for book torrents then you are reading the right article.

So these are some of the best torrent sites for ebooks.

NOTE: Techworm does not condone using torrents to illegally obtain content. Using the following torrent websites for illegal purposes is done entirely at your own risk. Techworm takes no responsibility for any legal problems you encounter.

ALSO READ: How To Unblock Torrent Sites

Top 10 Best Torrent Sites To Download E-Books

Wikibooks

The first best torrent site for books is Wikibooks. This popular books torrent site has a massive database of e-books available in English, Deutsch, Portugues, Italiano, Hindi and five more languages. Wikibooks has a clean UI and searching ebooks is fairly simple.

So as to download book torrent from Wikibooks simply select your preferred language and search for the book that you want to download.

VISIT Wikibooks

The Pirate Bay

The Pirate Bay is one of the oldest and most reliable services for book torrents. This popular torrent site for books has a minimal UI, and you can only find a search bar with some primary filters on the homepage.

A majority of torrents on The Pirate Bay are verified. Consequently, finding the right e-book won’t be an issue. It is worth noting that, The Pirate Bay is blocked in many countries and regions. So, you can check out the Best Pirate Bay alternatives.

VISIT The Pirate Bay

Free-eBooks.net

Free-eBooks.net is another reliable website reading free ebooks. Content on Free-eBooks.net is very well organized into different sections like Fiction, Sci-fi Fantasy, Science, Philosophy, Business, Technology, and much more.

All ebooks on Free-eBooks.net are available in pdf format. Furthermore, the website displays the size and number of downloads for every ebook on the platform. Lastly, its necessary to signup for the service before downloading free ebooks.

VISIT Free-eBooks.net

1337X

The next best torrent site for books is 1337X. Well, 1337X has dedicated sections for both ebooks and audiobooks.

1337X allows users to upload and share all sort of ebooks on the platform. The well-developed UI makes it easier for users to search and download book torrents.

In addition to ebooks, you can even also download movies, televisions, games, music, anime, apps, documentaries and much more.

VISIT 1337X

Torlock

Torlock is another reliable torrent books website that has a clean and simple UI. Similar to 1337X Torlock also has a dedicated section for ebooks.

Furthermore, Torlock is one among very few websites that only list verified torrents. Searching and downloading your favorite ebook is fairly straightforward.

Overall Torlock is a perfect website for ebook torrents. As for downsides, advertisements on Torlock may annoy some users.

DOWNLOAD Torlock

Books-share

Books-share is one among the best torrent sites for ebooks. All of the ebooks are very well organized into different categories like Technology & Engineering, Humor, Literary collections, Psychology, Religion and much more.

This torrent site for books displays the language, the number of pages, and offers a detailed description for every ebook on the platform.

The clean and simple UI of Books-share makes it easier for users to search and download their favorite ebooks. It is worth noting that, you have to signup for the service before downloading ebooks.

VISIT Books-share

Torrent9

The next perfect torrent books site on the list is Torrent9. Similar to Torlock, Torrent9 also offers verified torrents.

Torrent9 has a dedicated section for ebooks which makes it easier to search torrent book. The UI of the website is visually impressive, and content is segregated into different sections.

In addition to ebooks, you can even also download other content like movies, televisions, games, music, anime, and apps from Torrent9.

VISIT Torrent9

BookYards

BookYards is another well-developed best torrent site for books. This popular website has an extensive collection of more than 7000 ebooks and audiobooks. In addition to that, downloading these ebooks is completely free.

All ebooks on BookYards are very well organized into different categories like Art, Fiction, Religion & Spirituality, Parenting, Biography Memoirs, Economics
and much more.

Every ebook on BookYards is available in pdf format. Overall, BookYards is a reliable book torrents site and you can definitely get some good content to read on BookYards.

VISIT BookYards

SeedPeer

The next best torrent site for books is SeedPeer. Similar to other book torrents sites SeedPeer also has a dedicated section for ebooks.

The visually clean UI of SeedPeer makes it easier to search ebooks. Well, SeedPeer is the renamed version of the popular decade-old torrent website Meganova.

SeedPeer displays the size of every ebook and the time it was uploaded on. Searching and downloading ebooks on SeedPeer is fairly simple.

VISIT SeedPeer

Ebookee

The last website on the list for downloading free ebooks is Ebookee. If you are looking for educational ebooks then Ebookee will definitely impress you.

Ebookee has a clean UI and ebooks are very well segregated into different sections like Health, Business, Medical, Novel, Entertainment, Technology, Graphic & Design and much more.

Overall, Ebookee is one of the best torrenting E-book sites for reading educational ebooks.

VISIT Ebookee

Related Articles-

CONCLUSION

So these were some of the best torrent sites for books that are worth checking out. You will definitely find good book torrents using these websites. Do share any other personal recommendations for book torrents in the comments section below.

The post 10 Best Torrent Sites To Download E-Books For Free appeared first on TechWorm.

In Yakutsk, cyber criminals stole 316,000$ from the local ATMs


In Yakutsk the cyber criminals were able to steal more than $316,000 from local ATMs. As it turned out, the attackers used Malware. A criminal case was opened against two men.

Investigators found that hackers are brothers, unemployed and originally from Moscow. Using malicious programs, brothers Bulakhov stole about $ 316,000 from ATMs in Yakutsk.

ATM security is one of the most important trends in the field of information security.

Hackers, according to experts of Positive Technologies, have found a way to hack all ATMs. They are talking about twenty-six models of ATMs produced by NCR, Diebold Nixdorf and GRGBanking.

Experts have found that for fifteen minutes attackers can get card data of a customer. To do this, they need access to the ATM service area.

In some cases, hackers manage it in ten minutes. It is also found that third-party devices can easily connect with ATMs.

CVE-2018-19329

GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button.

How To Play PUBG On Any Mac

Player Unknown’s Battlegrounds is still one of the best online multiplayer battle royale game that has gained immense popularity in recent years.

PUBG is now available on every major platform like Windows, Xbox, and even PlayStation. Well, the game is not yet available for Mac users. So here’s how to play PUBG on Mac.

ALSO READ: Playerunknown’s Battlegrounds (PUBG) PC Download Free And Paid

Play PUBG On Mac: Using GeForce NOW

The first method to play PUBG on Mac using GeForce NOW is relatively straightforward.

Well, GeForce NOW is Nvidia’s new cloud-based game streaming service that allows users to play games from their Steam or Battle.net libraries.

Since its a cloud-based service the actual hardware configuration of your Mac computer doesn’t even matter.

Consequently, you can easily play PUBG both on the underpowered 12-inch MacBook and on the highly powered iMac Pro.

That said, the major factor that impacts the performance while playing PUBG on Mac is your internet connection speed.

So as to play games without frame drops you should have a minimum speed of 25Mbps. Though Nvidia recommends a speed of 50Mbps.

You can signup for GeForce NOW BETA and easily use this service. As for downsides, the service is presently available only for people in North America or Europe.

VISIT GeForce NOW

Play PUBG On Mac: Boot camp

If GeForce Now is not available in your country or you don’t have a reliable Internet connection you can still play PUBG on Mac using boot camp.

Using boot camp you can easily install Windows OS on your Mac computer and use the Windows OS to play PUBG.

This time around the actual hardware performance on your Mac does matter. In addition to that, you should also take care of the storage allocated to Windows OS as PUBG in itself is around 30GB in size.

Apart from PUBG, you can play every game made for Windows using boot camp.

So these were two simple methods to play PUBG on any Mac computer. We recommend that you try out both these methods and use the one that is more optimal.

The post How To Play PUBG On Any Mac appeared first on TechWorm.

BlackBerry Buys Cybersecurity Firm Cylance For $1.4 Billion

wiredmikey shares a report from SecurityWeek: BlackBerry on Friday announced that it has agreed to acquire endpoint security firm Cylance for $1.4 billion in cash. "We plan on immediately expanding the capabilities across BlackBerry's 'chip-to-edge' portfolio, including QNX, our safety-certified embedded OS that is deployed in more than 120 million vehicles, robot dogs, medical devices, and more," a BlackBerry company spokesperson told SecurityWeek. "Over time, we plan to integrate Cylance technology with our Spark platform, which is at the center of our strategy to ensure data flowing between endpoints (in a car, business, or smart city) is secured, private, and trusted." Cylance has raised roughly $300 million in funding [prior being acquired]. BlackBerry describes the "Spark platform" as a secure chip-to-edge communications platform "designed for ultra-security and industry-specific safety-certifications, such as ISO 26262 in automobiles."

Read more of this story at Slashdot.

China builds an ‘artificial sun’ that is 6 times hotter than our ‘natural sun’

China builds an ‘artificial sun’ that can hit temperatures of 100 million degrees Celsius

Last month, we had reported that a team of scientists at the Chengdu Aerospace Science and Technology Microelectronics System Research Institute Co (CASC) in China has developed an “artificial moon”, 8 times brighter than the natural moon to replace streetlights in the country by 2020.

Now, a team at the Hefei Institutes of Physical Science of the Chinese Academy of Sciences announced that its Experimental Advanced Superconducting Tokamak (EAST) reactor, has hit a new temperature of reaching 100 million degrees Celsius.

The EAST has been dubbed as “artificial sun” since it replicates the process used by the sun to produce energy. It burns at 100 million degrees Celsius, which is over six times hotter than the core of the sun. The temperature of the real sun’s core is at around 15 million degrees Celsius. The state-of-the-art reactor is designed to turn hydrogen into cost-effective green energy.

“Scientists carried out the experiments on plasma equilibrium and instability, confinement and transport, plasma-wall interaction and energetic particle physics to demonstrate the long time scale steady-state H-mode operation with good control of impurity, core/edge MHD stability, heat exhaust using an ITER-like tungsten divertor,” the institute wrote in its announcement article.

Our sun generates light and heat energy by a process called nuclear fusion when two hydrogen nuclei combine to produce huge amount of energy. Scientists believe that nuclear fusion occurs at 100 million degrees Celsius. However, since these two hydrogen nuclei normally resist each other, it requires vast temperatures to overcome their opposing forces.

Hence, reaching over 100 million degrees Celsius is an important step as this is the minimum temperature required to create conditions that are suitable for nuclear fusion on Earth.

The aim of the EAST is to comprehend nuclear fusion process before building a full reactor and use it as an alternative source of energy on Earth in the future. The process promises more power and is far safer than fission, producing almost no dangerous nuclear waste.

“Nuclear fusion is arguably the best way for human beings to get energy. In terms of raw materials, deuterium and tritium required for nuclear fusion are almost inexhaustible in the ocean. Besides, nuclear fusion does not produce any radioactive waste, so it is extremely environmentally friendly,” said the researchers in a recently issued statement.

Matthew Hole, an Associate professor from the Australian National University told ABC News that the achievement was an important step for nuclear fusion science and could be the solution to global energy problems.

“It’s certainly a significant step for China’s nuclear fusion program and an important development for the whole world,” Dr. Hole said.

“The benefit is simple in that it is very large-scale baseload [continuous] energy production, with zero greenhouse gas emissions and no long-life radioactive waste.

The research group in charge of EAST say it accomplished this milestone through the use of various new methods in heating and controlling the plasma; however, they were able to maintain the record temperature for just around 10 seconds.

Dr. Hole also adds that the nuclear fusion reactors evade the risks related to the current nuclear fission reactors, which can be modified into dangerous weapons and are susceptible to possible meltdowns with catastrophic outcomes.

The artificial sun was designed and built by China back in 2006. EAST is 11 meters tall, has an 8 meters diameter and weighs 400 tons. According to China Daily, China becomes the first country to design and develop such an equipment on its own.

The post China builds an ‘artificial sun’ that is 6 times hotter than our ‘natural sun’ appeared first on TechWorm.

What Happens When a Barrio 18 Soldier Tries to Leave the Gang

Benjamin suspected the Salvadoran gang Barrio 18 Revolucionarios would kill him when he asked permission to leave. He was 21 years old and had been in the gang for a decade. He was ready to die to get out.

He had joined at age 12 because his world didn’t feel right. He thought the gang looked cool by comparison; it took him years to name the deeper attraction. Neighborhoods like his were violent places where no one made a living wage, and the justice system was absent except to punish. Kids like him were either ignored or treated like criminality coursed through their veins. But not if he was Barrio 18. The gang, with its brotherhood and strict rules, promised him protection and stability. Here were his wafer-thin options: Benjamin could remain passive, buffeted by the winds of danger and impunity. Or he could do something proactive. He chose to act.

Within a few years, he saw that the gang’s promise was a siren song. A few years after that, he found the courage to plot his escape.

He called his mother to say goodbye. He summoned the leaders of the area cliques. He delivered his speech: He had done much for the gang, killing dozens who wished the group harm, especially MS-13 rivals. He had collected extortion taxes to feed and clothe the tens of thousands of members and their families and to hire defense lawyers when they were arrested. Now he felt called to evangelical Christianity, so he had researched churches and chosen one that was strict; no vices like alcohol or non-Christian music allowed. It would keep him out of trouble. He had earned his retirement.

Benjamin is about 5 1/2 feet tall. He is thin and angular; his face runs from cheekbones to sharp nose to jutting jaw. He has cobalt hair cropped close and pupils so glossy dark they’re nearly mirrors. He looks like a falcon. He could play Dracula. And in that moment, he stood before his audience, the gang’s leaders, pleading for a second chance at life.

To his surprise, they said yes. They let him go. He had to check in regularly and couldn’t do anything to harm the gang, like snitching. He couldn’t ask them for favors or use his previous affiliation to gain anything. They would observe his change to ensure it was genuine. They reserved the right to call him back to active duty. But with those conditions, he was free.

I met Benjamin five weeks later. (“Benjamin” is a pseudonym; as for most people in this article, to use his real name would cause an immediate threat to his life.) We met as part of a project: For four years, I followed four kids as they tried to leave their gangs. None of them knew each other. They were all under age 22.

One fled MS-13 without permission. She changed her name, moved across the country, and had a child. The gang tracked her down. Now she is paying to save her child’s life, and her own, with constant criminal favors. Another, a young man who also deserted MS-13 without permission, withdrew from our interviews, so ashamed of his past that he decided to amputate it, to banish his former self. The third retired with permission from Barrio 18, found work at a chain of thrift stores run by evangelical Christians, went to church every day, and raised his toddler son. His name was Jonathan Osvaldo Tobar. On August 7, 2015, he was shot dead in the middle of a market by unidentified gunmen. His funeral was a tense juxtaposition of the people one meets in such a life.

The fourth was Benjamin.

Paradoxically, the danger faced by gang members increases when they leave. In the gang, Benjamin was a soldier in a war. He was armed and he was backed by an army. But the problem with retiring is that the battlefield has no boundaries, and the war has no end. That’s in part due to a colloquial belief in Salvadoran society that gang members are people forever ruined. Given the havoc they wreak, they are reviled. So society blocks on-ramps to civilian life like education and employment. Police see them as fodder for vengeance. For former enemies, they’re easy prey.

Yet even in the hardest moments, Benjamin believed he could be salvaged. There are an estimated 60,000 gang members in El Salvador. What is the solution to this problem if they can’t retire?

He didn’t expect society to welcome him. “People don’t trust us. They don’t like us and I understand why,” he told me. “If I’m well-known in some places, it isn’t because I was a good person. Imagine how much evil I did to numerous families, how much pain I caused them.” He saw the ostracization as karma. “I’m paying off a tiny bit of the many things I did.”

Kids like Benjamin try to leave their gangs by hiding in plain sight. They bury their pasts and attempt to start over. They do it in myriad ways and so well that often they’re even unaware of each other. Alone, they shed skin like any wild creature and take on a new identity.

But their needs are akin to those of child soldiers or war veterans — and the devastating cruelty wrought by gangs leaves little public will to provide that kind of support. As a result, the process is like burrowing through a boulder with a screwdriver. Exhausting. Seemingly impossible. You sweat it out alone.

There are some exceptions. Retiring to evangelical Christianity, as Benjamin did, is a path that has existed almost as long as the gangs themselves. But it, too, can be hazardous. And as Benjamin would find, swapping gang for church means trading one black-and-white vision of the world for another. It was initially effective but became insufficient the longer he lived and the more his world blossomed into color.

There was one more problem. El Salvador is small. Like the civilians threatened by gangs — who very frequently must flee the country to survive — kids trying to leave gangs can only hide for so long.

Benjamin’s attempt began in December 2015. We met nearly once a week. He shared his experiences with me, a foreign journalist, because he was desperate to circulate his story. He knew many gang members who wanted to leave, but they were afraid. He wanted to show them they could.

“I’d like to be recognized by society. It’s not that I want to be famous. It’s like with young people who want to be guitarists — they have an example of some well-known guitarist,” he told me. “There is no example for me, to show me a better life is possible. I have to be that example.”

No Extra Lives

Violence didn’t appear in Benjamin’s life when he joined the gang. He was born into violence.

His uncle, who raised him as a son, was a guerrilla fighter in the 12-year Salvadoran civil war, which ended in 1992 after a nominally democratic government, funded by billions of dollars from the U.S., tried to annihilate a leftist guerrilla force. The war turned his uncle into an alcoholic who spent most of his time playing war-themed video games. When 12-year-old Benjamin murdered a boy in a gang initiation — a repelling and traumatic experience that became easier with repetition, he told me — in his mind he retreated to images from his uncle’s games, as if willing the bloody boy to come back to life in a next round.

The civil war introduced particular kinds of violence to El Salvador. Government death squads pulled students off buses and church workers from their beds, aiming to puncture leftist thought and litter the roadsides with tortured corpses as messages to those considering dissent. Thousands of youth taken by the state simply disappeared.

In December 1988, the Spanish Jesuit priest Ignacio Martín-Baró, who lived and taught at the Central American University in San Salvador, described what raged around him in the introduction to a book called “The Social Psychology of War.” Thousands fled the armed forces, “pursued like animals,” while in the U.S., President Ronald Reagan boasted that those same forces were defenders of democracy. Reagan was performing a part, “‘the good guy in the movie,’ ‘the righteous cowboy,’” the priest wrote, and was ignorant about El Salvador. But his administration’s “ideological blindness and tooth-and-nail militarism,” Martín-Baró wrote, turned the country into “a living laboratory in which the principles of ‘low intensity conflict’ have been put into practice,” thus changing El Salvador forever. “War has become part of the frame of reference of Salvadoran lives. In some way, the fact that there’s war is now assumed as ‘natural,’ and no one is surprised by the daily aspects of shootouts and ambushes, cadavers and wounded.” Martín-Baró was murdered by the army less than a year later.

On January 16, 1992, 16 signatures on paper, the peace accords, officially ended the war. Violence remained.

Gangs that had formed among war refugees in Los Angeles were then deported to El Salvador. The government shored up its post-war power by turning on this new internal enemy, meeting it with a bellicose security policy called mano dura, “iron fist.”

It wasn’t that murders spiked when the gangs arrived. In fact, the first years of the 21st century were a time of relative peace: The homicide rate dropped and reached a post-war low. But the ruling right-wing party, the Nationalist Republican Alliance, known by its Spanish acronym ARENA, feared its weak prognosis in the 2004 presidential elections. So in 2003, the president announced mano dura, which had the simultaneous effect of fishing up gangs from a cauldron of national problems and then selling ARENA as the only force capable of vanquishing them. ARENA won.

Gangs offered an opportunity: Political parties could prop up this straw man — young people in poor communities — and then humiliate, incarcerate, beat, and kill them, and emerge victorious at ballot boxes nationwide.

Between July 2003 and July 2005, the police arrested 30,934 alleged gang members in SWAT-style raids choreographed for news cameras. Many detainees were released and re-arrested 48 hours later, according to scholar José Miguel Cruz. The Salvadoran president erroneously claimed in 2004 that gangs committed 40 percent of the country’s murders; the national coroner’s office counted only 10 percent.

Mano dura was repression masquerading as policy — but 80 percent of the population bought into it. “Gang members have a mental illness called murder,” said police chief Ricardo Meneses. The following year, the FBI described in a press release how it was “ganging up on” gangs by partnering with Salvadoran authorities.

Mano dura has remained and mutated ever since. In response, the gangs became sophisticated and heinous. Their victims multiply in a country besieged by grief and fear. For those who suffer, the most important thing is not that the policy doesn’t work, or that violence-as-security is a self-perpetuating cycle. Mano dura gave victims a name for the cause of their misery. It gave them a stability similar to what Benjamin sought in the gang.

The policy had striking success in just two areas: in continually selling itself despite being counterproductive, and in selling the image of gang members as irreformable youth who no longer belong to El Salvador or any nation, to whom nothing is owed but iron bars or bullets.

In January 2015, police director Mauricio Ramírez Landaverde announced that “any member of the institution who needs to use their firearm to comply with the duty of self-defense, or defense of others, should do so without fear.” The reaction was vivid: In 2014, police had killed 49 suspected gang members. In 2015, they killed 320. The police followed the U.S. model, creating elite anti-gang forces, one of which did target practice on images of Osama bin Laden’s face. “These two gangs need to be annihilated,” said former New York City Mayor Rudy Giuliani to the Salvadoran press in May 2015, when he was hired as a security consultant whose services cost millions of dollars.

“I see the faces of wealthy politicians, and then I see [people] who work all day, every day and make $5 a day,” Benjamin told me in April 2016. “Why do so many youth become gang members? Because they see that. Why are they arming the police? There will be more deaths. They’re not thinking with their brains. They’re thinking of their money, of their power.”

U.S. President Donald Trump has repeatedly referred to members of MS-13, the one Salvadoran gang he’s apparently aware of, as “animals.” This is the same word he chose to refer to Middle Eastern combatants who he argued the U.S. should torture by waterboarding. He employs the term with a goal: to rally his base. The president, like Reagan before him, is ignorant of the situation. He is using gangs to increase his power. But in El Salvador, state security forces are torturing and murdering young people suspected of gang membership, and the words of the U.S. president are encouraging them.

This is the new war, a Russian doll of a war: gangs against each other, police against them all. Civilians again in the middle. It is as bloody as its predecessor, its engine pumped with the same gasoline: men who want power.

Benjamin wanted out.

leaving-gang-el-salvador-02-1541874095

Illustration: Clay Rodery for The Intercept

Normal Dangers

The first thing Benjamin did on his first morning of freedom was smoke pot. “Habit,” he told me. Also terror. Still in bed, he burned through five blunts, paralyzed by a refrain: “What will come of me?”

Every day of the past decade of his life had been determined by the gang. The gang’s interests were his duties, its members were his peers. The gang’s risks were his and its forms of protection were too. But not anymore. He didn’t even have a place to live; he had woken up in the gang house, and today he must leave. Then, a scarier thought: There was a trade-off implicit in his decision. Yesterday he had an identity, but today he had freedom.

He bounced between hostels until just before Christmas, when he found an affordable apartment in an old brick structure near the National University of El Salvador, four stories tall and packed with people. He was relieved to have a room. He needed to lock himself in it for protection from former enemies and police — “people who want me dead” — but also from himself. He had spent most days high on marijuana or acid or cocaine before leaving the gang, and his zealous new evangelical identity prohibited drugs, so he was antsy to wean himself off them. He needed to whittle himself down to his acceptable parts, his holy parts.

Within days, it was clear that loneliness would be the hardest part.

He spent Christmas alone. He was a marked man now; it would put his mother at risk to be together on a predictable day. So he sat on the floor and leaned against the wall under a window. There were families gathered outside. “Everyone was so happy at midnight, giving each other hugs. A ton of people in the streets. And there I was, just listening to them. I laughed at the funny things they said,” he remembered, “and then I cried.” He got high and tried to sleep.

Leaving home was always risky. One afternoon, he arrived late to our meeting at the Metrocentro mall food court. The block around his apartment had been teeming with anxious cops — there had been a homicide — and he feared that an officer would arrest him, a solitary young man near a crime scene. So he waited until a neighbor with her toddler daughter offered to walk hand in hand as if he were an older son. Everyone knew the police were dangerous.

He tried reconnecting on Facebook with friends from childhood. One by one, they shut him out.

“It hurts to be in the streets,” he told me. “On the bus, I hear someone answer a phone and say, ‘Wait for me, I’ll be there soon!’ And I think, ‘No one is waiting for me anymore.’” He saw people hugging each other, walking to school or to a store, “all of those daily things that take people to other people.”

There was relief on Monday, Tuesday, and Friday evenings, when he could go to church services and youth group. Otherwise, he rarely left his apartment, except for our meetings. Most days, “I don’t speak a word,” he told me in late January. “Imagine spending just one full day staring at the wall.” Benjamin spent weeks like that. He simmered in regret. “I wish I could be a child again. I wish I could do none of the things I did with my life.”

As the weeks passed, Benjamin’s language changed. He became a fire-and-brimstone Christian. He diagnosed the downfall of a society that produced people like him, a biblical lineup of sinners: Prostitutes. Homosexuals. Drug addicts. Rap. Bad fathers. Women with necklines too low. Women who posted “half-naked photos on Facebook.” Women who were “losing their value.”

It was a straight path out of the gang. The world was still a battlefield, but he was now a soldier in a different army.

He made progress he could measure. Once, on a bus to pay rent with money that his aunt, an immigrant in the U.S., lent him, two men robbed him at gunpoint. I asked him if he considered retreating to his clique. “Look,” he said dreamily, as if in love. “When you return to Christ, you forget the gang.”

Searching for a job was hard. When asked for his resume, he had nothing to offer. He had to lie about his past. But employers wouldn’t hire a young man with no history.

Another complicating factor: He had been incarcerated in 2013, and he’d been violating the terms of his parole. He was obligated to study upon release, but that would mean regularly crossing MS-13 territory to get to the public school, which was too dangerous. Now there was an outstanding warrant for his arrest.

These struggles are nearly universal in the experience of those who try to leave Salvadoran gangs, but that doesn’t make them any easier to face. One day we visited one of Benjamin’s mentors, a pastor and former gang member named Julio Iglesia, who lived deep in a labyrinthine hot zone called Tikal. Iglesia was from the first generation of homegrown Barrio 18 members, the ones who joined what the deportees from California started. “In this country, there has never been peace,” he told me. “We live at war.”

Across from Iglesia sat a giant man, his face etched in “18” ink, trembling. The man had left the gang after serving a jail sentence. Days earlier, he narrowly avoided yet another murder attempt by a joint patrol of police and soldiers. But Iglesia interceded, saving him. “They want to kill me because of what I have on my body,” the man said. “They’ll never again see me doing something bad. They sought me out. It’s because of what I have on my body.”

The pastor’s wife hung wet laundry on a line on the front porch. She dashed inside and bolted the metal door when a group of kids, guns in hand, sprinted down the street toward the community border. Tikal was Barrio 18 and the neighbors were rivals. Iglesia warned us that we needed to leave because if gunfire broke out, the police would show up and splay out house to house. The state of siege would last until tomorrow. Benjamin was at great risk.

A tense 30 minutes passed before we could find someone with a car to hustle us out of the conflict zone.

For Benjamin, these were normal dangers. The chance to sit with someone who was once in his shoes was precious. But he was beginning to worry that he wasn’t strong enough to become good. Even the most faithful iron posture toward the world can’t save a holy soldier from loneliness.

Then he met Zelda.

You’re a Mess

The night they met, Zelda came home from a bar and found Benjamin curled up drunk on the front steps. The landlord evicted disorderly residents, so Zelda hooked her thin arms under the new neighbor kid, who had spent weeks locked in his room down the hall. “I don’t think he ever even ate,” she told me later.

Zelda told me this story at a gay bar in San Salvador. She wore a sleeveless T-shirt and suspenders, her head half-shaved. Tattoos scaled her bicep. She spoke with a half-smile and a confident chin.

She deposited Benjamin in his apartment that first night, and the next morning, she woke up hungover and suspected he’d feel worse. She made soup and knocked on his door. He opened it, hair askew and eyes sleepy. “Take a shower, you’re a mess,” she laughed. “Then come eat, and then you can go back to bed.”

He stumbled into her apartment minutes later, smelling of soap, without pleasantries. This kid must have dropped out of the wilderness, she thought. He told me a few days later — months before I heard the story from Zelda — that he felt shy around this shockingly friendly stranger.

Zelda was a lesbian feminist painter who taught art therapy workshops to victims of domestic violence. He gazed at the walls covered in her paintings. “So you like art?” she asked. He mumbled something about loving it since he was a child. “He might have even drooled a little,” Zelda chuckled as she remembered in the bar. “He was in a trance.”

He told her he was a Christian, but she noticed a tattoo on his heel. “That’s a big tattoo for a Christian,” she joked. “He just laughed. He was always laughing,” she told me at the bar. “He never told me much about himself, just that he used to do drugs and graffiti and live on the street.”

For the duration of their friendship, Benjamin struggled with withholding his full story from Zelda. “I’m afraid she’ll reject me,” he told me at the time.

Zelda started bringing Benjamin meals. He seemed so lonely, and who could live like that, staring at four walls all day? She delivered the apartment building gossip: who was sleeping with whom, who he could trust and who he shouldn’t. One of the men on their floor was rumored to be MS-13. He was aggressive and referred to Zelda as “the dyke.” Benjamin started helping her avoid him.

Benjamin expected to face difficult tests on this journey to a new life. He didn’t expect Zelda. The church members who made his second chance possible, the only people who knew his full story, preached that people like Zelda were sinners akin to addicts and adulterers. People like Zelda were far from God, and Benjamin’s salvation would come from walking in the opposite direction.

But now he had company for the endless days. One afternoon, Benjamin wandered to the roof of the apartment building. Blinking in the sun, he found Zelda there painting. She was smoking a joint and offered him a drag. He said he used to smoke but was a Christian now. Zelda, an atheist, laughed and handed it to him. He took a drag.

He stood silently. He clearly was here to stay. “OK, kiddo,” she said. “Tell me, what color is the sky?” He looked up, then looked back at her. “No one’s ever asked me that,” he said. A few seconds later he ventured: “Blue?” She smiled. “That’s what everyone thinks. But there are many tones that make up that blue. Look back up. Tell me what they are.” He smiled and inhaled sharply. “He always used to do that when he was excited about something,” she told me at the bar, mimicking him and laughing. “He was like a child, so excited about the world.”

“You’re not a bad guy,” she told him. “You’ve got a good heart.”

In the next conversation that Benjamin and I had, he repeated this phrase three times: “You’ve got a good heart.”

Soon, Zelda was toting Benjamin out with her friends, other lesbian feminist activists. She had to defend him more than once. To explain himself, he could only offer that he used to be a drug-addicted street kid and was now an evangelical Christian, neither of which played well here. But Zelda is charismatic. If anyone could sneak an evangelical kid without a history into a lesbian feminist clan, it was Zelda.

They took him to a concert by the Guatemalan rapper Rebeca Lane. They took him to the beach for a weekend. He told them he didn’t know how to swim, an excuse to avoid removing his shirt and exposing his torso covered in Barrio 18 tattoos. “He was stuck to a plastic chair the whole time,” Zelda remembered. They took him to dinners at fast food restaurants at malls. Sometimes they’d end the night at a bar. Benjamin chuckled uncomfortably as he recounted how, more than once, the group separated into couples, a long table of women kissing — plus Benjamin, the boy nursing a Pilsner, the evangelical with a big secret.

“I think that if they knew what I used to be, they’d immediately reject me,” he told me then. Once he asked one of Zelda’s friends what her opinion was of the kids who retire from gangs. “I’ve never met anyone like that,” she told him. “If I ever did, I’d have to think hard about it.” He didn’t say anything else.

“I know them, and I know now that they’re good people, and I’d have criticized them once, people like this,” he told me. In fact, he loved hanging out with Zelda’s friends because they had pride in spite of society’s rejection. “They value themselves so much,” he said. Benjamin was born into a hyper-macho society and then he joined the gang, which concentrates that machismo. He’d never had friends who autopsied reggaeton songs to air out their misogyny, much less queer women.

But this wasn’t easy. Apart from Zelda, the church was all he had. “It’s God who has allowed me to step aside [from the gang], but this confuses me,” he told me.

Benjamin had never lived outside the battlefield. Zelda was teaching him to see parts of life that are invisible in war.

During the beach weekend, they walked the shore. She pointed to a piece of driftwood. Benjamin saw nothing in it, but Zelda’s finger traced its outline in the air and then he could see: It was a woman, waist to hip to thigh. They coaxed it from the waves and whittled it into an ad hoc sculpture. “I feel like I’m falling in love with life,” he told me later.

But he wasn’t naive. “Sometimes I feel like my destiny is to die for having been a gang member,” he told me. He felt that it wouldn’t matter what he did to change; the end result would be the same. “But I find the motivation in myself,” he said. “I carry on.”

leaving-gang-el-salvador-03-1541874141

Illustration: Clay Rodery for The Intercept

Left for Dead

Benjamin had just finished buying groceries when a police patrol detained him at a bus stop in a middle-class neighborhood called San Luis. It was a Wednesday evening in April, at about 7:30 p.m. When one officer lifted Benjamin’s shirt and discovered his tattooed torso, he said to the others, “Ah, here’s one we can kill.” They loaded him into the back seat of the patrol truck, folding him over at the waist so he could not be seen through the window, and drove him to a police station, where they led him into a room through a back entrance.

For the next several hours, a group of officers tortured him. The torture was methodical and fit the patterns recorded that year by human rights investigators: They maced him, thrust his head into a bucket of water to simulate drowning, hung him upside down, and beat him until he lost consciousness. They put a plastic bag over his head to simulate suffocation, smacked him in the face with the butts of their rifles, and kicked him until he felt his ribs “bend.” Benjamin drifted in and out of consciousness. “They’re just going to beat me to death,” he remembers thinking. But the police had another plan.

They put him back in the truck, again doubled over. Benjamin estimates that it was past midnight. The officers drove around looking for kids walking the streets in Barrio 18 neighborhoods, whom he said they planned to execute. Then they’d kill Benjamin and position the boys’ bodies together as if they had died after ambushing the police. This is a method of extrajudicial murder common in El Salvador since 2015.

Benjamin was lucky; they found no one to kill. But the officers decided he was weak enough that they could just throw him out, shirtless, in MS-13 territory, where his tattoos would make him a quick target. They tossed his body in front of a graffiti-covered house in an MS-13 stronghold called Los Llanitos and drove away.

He lay still. Then he crawled through shrubbery and ditches on the side of the road. He made it to La Santisima Trinidad, a nearby Barrio 18 neighborhood, where a young gang member on lookout duty took him to the clique leader, who recognized Benjamin’s old alias and offered him shelter for the night. Benjamin was wary. He knew he was not allowed to ask favors under retirement rules, but the leader told him this was different. So he accepted, and the next morning, they drove him to his apartment and carried his swollen body up the stairs.

We saw each other two weeks later. He said he had forgiven his torturers.

Benjamin was five months out of the gang, and life was a wonder. It was as if he had been blind and gifted sight. This made him extremely generous toward other people’s wrongs, including his torturers. He understood the police like he did his former self: locked in a war between brotherhoods, kept there by a screwed-up world.

But the brush with death unsettled him. He asked me for a favor: If I ever read in the paper that he died in an armed confrontation with police, to please debunk that story. “I’m telling you that I will never go back to the gang. Never. Never,” he swore. He desperately wanted other youth to know it was possible to leave, and he wanted to remain proof of it, alive or dead.

In late August, though, his resolve was tested. He began to receive messages from his former clique.

Five months earlier, the Salvadoran government had begun a draconian policy called “extraordinary measures,” meant to seal off gang prisons. Inside the prisons, food and drinking water were restricted, and skin diseases and tuberculosis ripped through the population in a torrent, killing 53 percent more inmates in 2017 than the year before. The Red Cross could no longer enter prisons, nor could inmates’ families. Originally temporary, parts of the policy have since become permanent, with the support of U.S. Ambassador Jean Manes, despite an outcry from the United Nations and Red Cross.

Between the suffering in the prisons and the extrajudicial murders outside of them, his former clique decided they needed everyone on duty.

At just past 3 p.m. on a Tuesday, a gang member sent Benjamin an audio clip via Facebook listing nearly 20 members of their clique who had been arrested or killed since Benjamin left. “The situation with the system is so black right now I don’t even consider going outside,” he said. Then he wrote in nearly illegible gang slang: “Activate again asshole. Damn we need people.” Then, “Help us out. We’re going to figure out how to pull up the neighborhood. This is our time.”

Benjamin dodged. “Truly I’d like to but the truth is that the price is high for turning your back on God,” he wrote. “But I do want to talk to you about many things, nothing bad, just important.” He was suggesting that he would try to convert his former homeboy, and he hoped it would quiet the demands.

Then one evening in mid-September, at just past midnight, another member of the clique wrote on WhatsApp with a more concrete request: They needed to find $3,000 to pay a lawyer for incarcerated homies. They asked Benjamin to find the money. “I’m going to try to figure out how I can help you,” Benjamin responded. Then he wrote to me, “They don’t want that answer. They want me to activate again.” That is, they didn’t just want his money. They wanted their soldier back.

This wasn’t an invitation. He began to believe he was not far from his tomb. If he refused the clique’s demand, they might kill him along with his surviving family members — his mom and 4-year-old niece, his late sister’s child. The three of them could try to flee the country, but with his arrest warrant, he couldn’t go anywhere legally. He could kill himself. Or he could join again, which would prove society right that he was impossible to salvage.

“I want to die, I don’t know what to do, and I’m afraid,” he told me. “I wish I could run and scream and cry until I just die.”

Benjamin was arrested before the month was over. He was accused of extorting more than $7,000 from a business with a group of other young people.

In the first phone call he made to his mother from the police holding cell, he swore that he was innocent and asked her to tell me. He said there was proof in the house where they were arrested.

So his mother and I went. Benjamin and two young men who lived there were arrested together, and the boys’ mother answered our knock. She was clearly traumatized. She spoke to us, through a door cracked open, for 15 minutes. She said the boys had been playing guitar in a room when the police arrived, forced their way in, tied everyone up, and beat Benjamin and the brothers. Then they ransacked the house while insulting her for raising “rats.” They detained her youngest child in the police cruiser, threatening to turn him over to child services for her maternal incompetence.

Telling the story, she seemed to experience a flashback. At least they didn’t take her youngest, she said. She was struggling to pay the daily fees for her sons’ meals in the police holding cells. She was bitter and scared and didn’t see Benjamin’s mother as an ally. She had no allies. “I wish I could fly away,” she said. “Anywhere but this country.”

Benjamin’s mother had been silent, afraid the woman would slam the door. As if coaxing a cowering animal, she said that Benjamin told her that something in the home proved that the boys were innocent. The woman disappeared for a few moments. She returned and slipped Benjamin’s Bible through the narrow opening.

A Religious Shield

A Bible is not proof of anything.

This is Salvadoran society’s Catch-22 with ex-gang members: The Bible is only proof if we believe Benjamin. We cannot be sure he didn’t do it. And how are we to believe someone who we know is capable of so much harm?

The night the police tortured Benjamin, they found his Bible in his backpack and accused him of using it as a shield, of faking Christianity. The accusation isn’t without evidence. Some people have costumed themselves in evangelicalism while continuing to commit gang crimes. Or, even if Benjamin had actually retired, perhaps he participated in this one extortion to save his life. It was clear he had run out of options.

But the Salvadoran police also have a record of planting weapons and drugs on kids from poor communities, gang-identified or not, in order to arrest them.

I asked a retired member of MS-13 for their perception of the way the story ended. They reminded me that one potent gang tool to force retirees to reactivate was making false accusations to the police. Once the retiree is in the state’s hands — in prison — they’re also in the gang’s hands, because El Salvador jails gang members according to affiliation.

Another question is whether it matters. Benjamin’s goal was for someone to finally recognize that kids like him exist. Someone to ratify that he was doing everything possible to leave the battlefield. His goal was to share his process, in all its imperfections, in the hope that his story would loosen the chains that hold other kids hostage. He accomplished that goal at least.

But there is still a structure in place that prevented him — and many others — from achieving a sustainable new life. It’s a cage made of discrete bars. One is the iron fist: Mano dura inflates the power of gangs, legitimizes state abuses, and leaves unaddressed the injustices that cause the problem in the first place.

Another is the lack of options: Although employers are beginning to hire people like Benjamin — sometimes with careful support from U.S. federal agencies — this is still rare. Hiring them is far more labor-intensive for employers and involves risk. Ex-gang members are veterans of a particularly cruel and personal war, and they need acute, integrated emotional, logistical, and financial support to become civilians. El Salvador is full of hardworking unemployed people who’ve never been connected to gangs and don’t need that much from employers. So it’s less fraught to continue pushing gang members out of the equation, insisting that they are permanently ruined and must be locked up or disposed of, as if that weren’t a self-fulfilling prophecy.

In late 2017, Benjamin was found guilty of extortion and received a sentence of eight years in prison. His lawyer was a public defender who told me at one hearing, “He’s probably guilty. These kids always are.”

In May 2018, his mother sent me a short video by an international news agency about ex-gang evangelicals in the Gotera prison, where Benjamin is incarcerated. In it, there is a scene of a sea of inmates in white T-shirts, clapping and singing in a church service. And suddenly there he is. He stands among the throng, eyes closed, chin raised, mouth open in song.

This reporting was made possible by a grant from the Fund for Investigative Journalism and a fellowship with the Schuster Institute for Investigative Journalism, with support from the Ford Foundation.

The post What Happens When a Barrio 18 Soldier Tries to Leave the Gang appeared first on The Intercept.

Factom (FCT) Rides Recovery to 65% Gains as Mortgage Service Adopts Blockchain

Factom (FCT) climbed 65% from Wednesday through Saturday, as it continued to ride the recovery wave while the rest of the market stalled. The price surge comes amid news that Factom’s Harmony blockchain-as-a-service (BaaS) technology is to be used by mortgage software and marketing firm, Equator, as a way to increase efficiency. Factom Price on […]

The post Factom (FCT) Rides Recovery to 65% Gains as Mortgage Service Adopts Blockchain appeared first on Hacked: Hacking Finance.

Cybercriminals disturbing air traffic




Travelling via air has always been the most preferred and fastest option available to us at any given time but have we ever given a thought whether it is the safest in every context technical and cyber?

Never mind the technical mishaps that happen when least expected the accidents that occur are rare but shocking and terrible but are we aware of the dangers related to flying in the light of cyber security?

As we probably are aware, cybercriminals are driven for the most part by their thirst for money and power—and disturbing the air traffic and airport regulation helps they satisfy it. While the dominant part of these cyber security occurrences result in data breaks, but: Attacks on this imperative framework could prompt significantly more inauspicious outcomes.

Associations like the ATO and EUROCONTROL deal with the air traffic across continents, connecting with business and military bodies to control the coordination and planning of air traffic in their assigned region. These associations work firmly together, as there are numerous intercontinental flights that move across from one area then onto the next they respond quite rapidly to such episodes.
These Aviation control organisations require immaculate correspondence to work legitimately, as they are essential to keeping up the normal stream of air traffic. 

Along these lines, their related frameworks are intensely computerized which makes them the primary targets for the said cyber-attacks.

However apart from Air Traffic there are a lot more factors as well that have a specific negative effect on the transportation service. Some of the major ones being terrorist attacks, ransomeware attacks, targeted cyber-attacks in addition to the budget concerns.

Terrorists have hijacked Aircrafts before, the most known incident being 9/11, where the terrorists infiltrated onto four different air crafts, disabled the pilots. Anyway these physical, in-person hijacks are the reason behind the broad safety measures that we all experience at each major air terminal.

Despite the fact that these hijackers don't need to be physically present to cause such immense harm. As exhibited before, air crafts can be hacked remotely and malware can contaminate computer frameworks in the air crafts as well.

What's more, similar to some other industry, we likewise find numerous ransomware victims in the avionics and air traffic sector. The most popular one being air and express freight carrier FedEx that surprisingly has been a ransomeware victim twice: once through their TNT division hit by NotPetya, and once in their own conveyance unit by WannaCry.

When turning towards targeted cyberattacks the most fitting precedent is that of the IT system of Boryspil International Airport, situated in the Ukraine, which purportedly incorporated the airport's air traffic regulation system. Because of rough relations among Ukraine and Russia, attribution immediately swerved to BlackEnergy, a Russian APT group considered responsible of numerous cyberattacks on the country.

Lastly, "Where budgets are concerned, cybersecurity is treated reactively instead of proactively.
In 2017, the Air Traffic Control Aviation (ATCA) published a white paper issuing this warning as in a 2016 report by the Ponemon Institute discovered that the associations did not budget for the technical, administrative, testing, and review activities that are important to appropriately operate a  secure framework.

Bearing these factors in mind while the physical security on airports have been increased fundamentally, it appears that the cyber security of this essential framework still needs a considerable amount of work and attention, particularly remembering the sheer number of cyber-attacks on the industry that have occurred over the most recent couple of years.

The excrement will undoubtedly hit the propeller if the air traffic and cargo enterprises yet again fail to incorporate cybersecurity in their financial plan and structure propositions for the coming year.

Comprehensive Guide on Cewl Tool

Hello Friends!! In this article we are focusing on Generating Wordlist using Kali Linux tool Cewl and learn more about its available options.

Table of Content

  • Introduction to Cewl
  • Default Method
  • Save Wordlist in a file
  • Generating Wordlist of Specific Length
  • Retrieving Emails from a Website
  • Count the number of Word Repeated in a website
  • Increase the Depth to Spider
  • Extra Debug Information
  • Verbose Mode
  • Generating Alpha-Numeric
  • Cewl with Digest/Basic Authentication
  • Proxy URL

Introduction to Cewl

CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper. CeWL also has an associated command line app, FAB (Files Already Bagged) which uses the same meta data extraction techniques to create author/creator lists from already downloaded.

Source : https://tools.kali.org/password-attacks/cewl

Type “cewl -h” in the terminal, it will dump all the available options it accepts along with their respective description.

SYNTAX: cewl <url> [options]

Genral Options

                -h, –help:                            Show help.

                -k, –keep:                           Keep the downloaded file.

                -d <x>,–depth <x>:        Depth to spider to, default 2.

                -m, –min_word_length: Minimum word length, default 3.

                -o, –offsite:                       Let the spider visit other sites.

                -w, –write:                         Write the output to the file.

                -u, –ua <agent>:              User agent to send.

                -n, –no-words:                                 Don’t output the wordlist.

                –with-numbers:              Accept words with numbers in as well as just letters

                -a, –meta:                          include meta data.

                –meta_file file:                                Output file for Meta data.

                -e, –email:                          Include email addresses.

                –email_file <file>:           Output file for email addresses.

                –meta-temp-dir <dir>: The temporary directory used by exiftool when parsing files, default /tmp.

                -c, –count:                          Show the count for each word found.

                -v, –verbose:                    Verbose.

                –debug:                              Extra debug information

                Authentication

                –auth_type:                      Digest or basic.

                –auth_user:                      Authentication username.

                –auth_pass:                      Authentication password.

               Proxy Support

                –proxy_host:                    Proxy host.

                –proxy_port:                    Proxy port, default 8080.

                –proxy_username:        Username for proxy, if required.

                –proxy_password:         Password for proxy, if required.

Default Method

Enter the following command which spiders the given url to a specified depth and print a list of words which can then be used as dictionary for cracking password.

cewl http://www.ignitetechnologies.in/

Save Wordlist in a file

For the purpose of the record maintenance, better readability and future references, we save the print list of word onto a file. To this we will use the parameter -w to save the output in a text file.

cewl http://www.ignitetechnologies.in/ -w dict.txt

Now that we have successfully executed the command, now let’s traverse to the location to ensure whether the output has been saved on the file on not. In this case our location for output is /root /dict.txt.

cat dict.txt

Generating Wordlist of Specific Length

If you want to generate wordlist of a specific word length then use -m option as it enables minimum words limit parameter.

cewl http://www.ignitetechnologies.in/ -m 9

The above command will generate a list of minimum 9 words, as you can observe in following image, it has crawl to the given website and print the list of word with minimum 9 characters.

Retrieving Emails from a Website

You can use -e option that enables email parameter along with -n option that hides the list of word generated while crawling the given website.

cewl http://www.ignitetechnologies.in/ -n -e

As shown in the below image, it has successfully found 1 email-id from inside the website.

Count the number of Word Repeated in a website

If you want to count the number of words repeated several times in a website, then use -c options that enables count parameter.

cewl http://www.ignitetechnologies.in/ -c

As you can observe from the given below image that it has print the count for each word which is repeated in the given website.

Increase the Depth to Spider

If you want to increase the level of spider for generating larger list of word by enumerating more new words from the website then use -d option along with depth level number that enables depth parameter for making more intense creeping. By Default it the depth level set is 2.

cewl http://www.ignitetechnologies.in/ -d 3

Extra Debug Information

You can use -d option that enables debug mode and shows error and raw detail of website while crawling.

cewl http://www.ignitetechnologies.in/ --debug

Verbose Mode

To expand the website crawling result and for retrieving completed detail of a website, you can use -v option for verbose mode. Rather than generating wordlist, it will dump the information available on the website.

cewl http://www.ignitetechnologies.in/ -v

Generating Alpha-Numeric

If you want to generate an alpha-numeric wordlist then you can use –with-numbers option along with command.

cewl http://testphp.vulnweb.com/ --with-numbers

From the given below image you can observe, this time it has generated an alpha-numeric wordlist.

Cewl with Digest/Basic Authentication

If there is page authentication for login into website then above default will not work properly, in order to generate a wordlist you need to bypass the authentication page by using the following parameter:

–auth_type:                      Digest or basic.

–auth_user:                      Authentication username.

–auth_pass:                      Authentication password.

cewl http://192.168.1.105/dvwa/login.php --auth_type Digest --auth_user admin --auth_pass password -v

or

cewl http://192.168.1.105/dvwa/login.php --auth_type basic --auth_user admin --auth_pass password -v

From the given below image you can observe, it has got http-response 200 and hence generated the wordlist.

Proxy URL

When any website is running behind any proxy server then cewl will not able to generate wordlist with the help of default command as shown in the given below image.

cewl -w dict.txt http://192.168.1.103/wordpress/

You can use –proxy option to enable Proxy URL parameter to generate a wordlist with the help of following command:

cewl --proxy_host 192.168.1.103 --proxy_port 3128 -w dict.txt http://192.168.1.103/wordpress/

As you can observer in the given below image after executing 2nd command, it has successfully print the list of word as output result.

Author: Shubham Sharma is a Cyber security enthusiast and Researcher in the field of WebApp Penetration testing. Contact here

The post Comprehensive Guide on Cewl Tool appeared first on Hacking Articles.

Gmail “From field” bug makes phishing attacks easier for hackers

By Waqas

Gmail, as we know, is a popular and commonly preferred email platform around the world. That’s why any news about a bug in this platform is bound to create chaos among users. And, that’s exactly the case this time. Software developer Tim Cotten has discovered a bug Gmail’s ‘From:’ header structure that can allow the […]

This is a post from HackRead.com Read the original post: Gmail “From field” bug makes phishing attacks easier for hackers

Cyber Warfare: A Multidisciplinary Analysis (Routledge Studies in Conflict, Security and Technology) – CyberWar

tobem.com - This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of academic and professional backgrounds. Cyber warfare, meaning interstate cybe…


Tweeted by @CyberToolsBooks https://twitter.com/CyberToolsBooks/status/1063801904994705414

Dutch Government Report Says Microsoft Office Telemetry Collection Breaks EU GDPR Laws

"The Register reports that Microsoft has been accused of breaking EU's GDPR law by harvesting information through Office 365 and sending it to U.S. servers," writes Slashdot reader Hymer. "The discovery was made by the Dutch government." From the report: The dossier's authors found that the Windows goliath was collecting telemetry and other content from its Office applications, including email titles and sentences where translation or spellchecker was used, and secretly storing the data on systems in the United States. Those actions break Europe's new GDPR privacy safeguards, it is claimed, and may put Microsoft on the hook for potentially tens of millions of dollars in fines. The Dutch authorities are working with the corporation to fix the situation, and are using the threat of a fine as a stick to make it happen. The investigation was jumpstarted by the fact that Microsoft doesn't publicly reveal what information it gathers on users and doesn't provide an option for turning off diagnostic and telemetry data sent by its Office software to the company as a way of monitoring how well it is functioning and identifying any software issues. Much of what Microsoft collects is diagnostics, the researchers found, and it has seemingly tried to make the system GDPR compliant by storing Office documents on servers based in the EU. But it also collected other data that contained private information and some of that data still ended up on U.S. servers.

Read more of this story at Slashdot.

Protonmail hacked …. a very strange scam attempt

A hacker going online by the moniker AmFearLiathMor is claiming to have hacked the most popular end-to-end encrypted email service ProtonMail.

At the time it is not clear if the hacker belongs to a cyber crime gang, it claims to have stolen a “significant” amounts of data from the company.

The ransom demand (archive.is link) was posted on Pastebin, the hacker claims to have compromised user’s email and also accused ProtonMail of sending user’s decrypted data to American servers.

AmFearLiathMor also wrote that ProtonMail hasn’t configured the mandatory Subresource Integrity (SRI) allowing tampering and data collection.

“We hacked Protonmail and have a significant amount of their data from the past few months.  We are offering it back to Protonmail for a small fee, if they decline then we will publish or sell user data to the world.” wrote the hacker.

“While Protonmail’s open-source code can be freely audited on Github, they haven’t configured the mandatory SRI feature (https://www.w3.org/TR/SRI/). This leaves users without any guarantee about their source code integrity, thus allowing tampering and data collection at anytime. This will be totally transparent and unnoticed, because without enabling SRI all the users should inspect the website runtime code and its connections manually in the same moment they’re being tampered with by Protonmail to discover it.”

“Incidentally during this period we noticed that Protonmail sends decrypted user data to American servers frequently.  This may be due to the Swiss MLAT treaty requiring swiss companies reveal all their data to the Americans.  However it also might be possible they are sending this decrypted user data to the American firm that owns them.  This was simply a surprising thing to note but did not significantly influence our operation.” added the hacker.

ProtonMail denied having been hacked that added that this is just a hoax.

Below the ProtonMail reply to a Reddit thread:

“This extortion attempt is a hoax and we have seen zero evidence to suggest otherwise.” states the company.

“A closer reading of some of the claims, e.g. “circumventing the Geneva convention, underwater drone activities in the Pacific Ocean, and possible international treaty violations in Antarctica”, etc, should also cause a reasonable observer to draw the same conclusion.”

ProtonMail confirmed to be aware of a limited number of hacked accounts that have been compromised likely through credential stuffing of phishing attacks, but excluded that its systems have been breached.

“As many of you may be aware, earlier today, criminals attempted to extort ProtonMail by alleging a data breach, with zero evidence. An internal investigation turned up two messages from the criminals involved, which again repeated the allegations with zero evidence, and demanded payment. We have no indications of any breach from our internal infrastructure monitoring.” wrote the company.

“Like any good conspiracy theory, it is impossible to disprove a breach. On the other hand, a breach can be easily proven by providing evidence. The lack of evidence strongly suggests there is no breach, and this is a simple case of online extortion.”

protonmail hacked

The hackers are claiming they have data on Michael Avenatti and CNN employees.

The hacker is also offering $20 USD in bitcoin for spreading info about the alleged hack using the #Protonmail hashtag on Twitter.

This is a very strange and anomalous scam attempt, the hackers used a mix of appealing info and political data. Why mention Avenatti in a scam attempt? Is it a message to someone? Why hackers did not publish a sample of stolen data?

Stay Tuned…

Pierluigi Paganini

(Security Affairs – Protonmail, hacking)

The post Protonmail hacked …. a very strange scam attempt appeared first on Security Affairs.

Windows 10 October Update Brings Back Old Mapped Drives Bug

After a lot of chaos and problems, Microsoft has resumed the Windows 10 1809 rollout. While the recent October update

Windows 10 October Update Brings Back Old Mapped Drives Bug on Latest Hacking News.

Ethereum Price Analysis: ETH/USD Has Big Opportunity to Fly Again

  ETH/USD is running at seven consecutive sessions of losses, dropping as much as 25%. Price action is moving within a strong demand area, which could very well see the price rocketing again. Current Price Action ETH/USD is stuck within a stubborn downward trend. The price is running at a seven consecutive session losing streak. […]

The post Ethereum Price Analysis: ETH/USD Has Big Opportunity to Fly Again appeared first on Hacked: Hacking Finance.