Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Power

Nikola Motor Company Reveals Hydrogen Fuel Cell Truck With Range of 1,200 Miles (valuewalk.com) 1

An anonymous reader quotes a report from ValueWalk: Nikola Motor Company just unveiled a huge class 8 truck which will run on hydrogen fuel cells. Nikola claimed that the truck's operational range will be as much as 1,200 miles (1,900 km), and it will be released in 2020. Nikola designed the Nikola One for long-haul transport across a large landmass. The truck will deliver over 1,000 horsepower and 2,000 foot-pounds of torque. Provided these claims are true, the vehicle will provide nearly double the power of the current-gen diesel-powered semis/articulated lorries, notes Ars Technica. The leasing cost of the trucks will include the fuel price, servicing costs and warranty, but exactly how the lease will work is not known now, notes Ars Technica. The company says it has already accepted nearly $3 billion in future orders. A fully-electric drivetrain which gets power from high-density lithium batteries runs the vehicle, and a hydrogen fuel cell charges the batteries on the go. Its reach is presently limited, as hydrogen fueling stations currently exist in only small numbers. This made Nikola decide to construct a network of 364 hydrogen fueling stations across the U.S. and Canada, just like Tesla with its network of Superchargers. Milton claims it will come with a smart dashboard which has the capability of picking the most cost-efficient route for drivers. Also one or two full-size beds will be included inside the vehicle's enormous cab. It will have other luxuries and necessities as well, such as Wi-Fi, a refrigerator, 4G LTE connectivity, freezer, a 40-inch curved 4K TV with Apple TV and a microwave.
Security

The 'USB Killer' Has Been Mass Produced -- Available Online For About $50 (arstechnica.com) 37

New submitter npslider writes: The "USB Killer," a USB stick that fries almost everything that it is plugged into, has been mass produced -- available online for about $50. Ars Technica first wrote about this diabolical device that looks like a fairly humdrum memory stick a year ago. From the report: "The USB Killer is shockingly simple in its operation. As soon as you plug it in, a DC-to-DC converter starts drawing power from the host system and storing electricity in its bank of capacitors (the square-shaped components). When the capacitors reach a potential of -220V, the device dumps all of that electricity into the USB data lines, most likely frying whatever is on the other end. If the host doesn't just roll over and die, the USB stick does the charge-discharge process again and again until it sizzles. Since the USB Killer has gone on sale, it has been used to fry laptops (including an old ThinkPad and a brand new MacBook Pro), an Xbox One, the new Google Pixel phone, and some cars (infotainment units, rather than whole cars... for now). Notably, some devices fare better than others, and there's a range of possible outcomes -- the USB Killer doesn't just nuke everything completely." You can watch a video of EverythingApplePro using the USB Killer to fry a variety of electronic devices. It looks like the only real defense from the USB Killer is physically capping your ports.
Security

Hackers Steal $31 Million at Russia's Central Bank (cnn.com) 22

The Bank of Russia has confirmed Friday that hackers have stolen 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank. Central bank security executive Artiom Sychev said it could've been much worse as hackers tried to steal 5 billion rubles, but the central banking authority managed to stop them. CNNMoney reports: Hackers also targeted the private banks and stole cash from their clients, the central bank reported. The central bank did not say when the heist occurred or how hackers moved the funds. But so far, the attack bears some similarity to a recent string of heists that has targeted the worldwide financial system. Researchers at the cybersecurity firm Symantec have concluded that the global banking system has been under sustained attack from a sophisticated group -- dubbed "Lazarus" -- that has been linked to North Korea. But it's unclear who has attacked Russian banks this time around. Earlier Friday, the Russian government claimed it had foiled an attempt to erode public confidence in its financial system. Russian's top law enforcement agency, the FSB, said hackers were planning to use a collection of computer servers in the Netherlands to attack Russian banks. Typically, hackers use this kind of infrastructure to launch a "denial of service" attack, which disrupts websites and business operations by flooding a target with data. The FSB said hackers also planned to spread fake news about Russian banks, sending mass text messages and publishing stories on social media questioning their financial stability and licenses to operate.
Transportation

Mercedes Unveils Digital Headlights That Project Street Signs, Markings Onto the Road Ahead (newatlas.com) 30

An anonymous reader quotes a report from New Atlas: Mercedes has just announced a conceptual new set of lamps that can not only adapt their light distribution to cater to the environment, but can project high-res visual aids onto the road ahead, such as makeshift zebra crossings for nearby pedestrians. The new system is dubbed Digital Light and features two million pixels that, with the help of algorithms and sensors that analyze the vehicle's surroundings, can each adjust their individual brightness depending on the scenario. An example of this might be a partial dimming to avoid blinding a cyclist. We have seen this kind of adaptive lighting technology before in systems developed by Fraunhofer and indeed Mercedes itself, although tuning it to control millions of pixels individually does appear to be new territory. But where the Digital Light system gets quite interesting is with the ability to project different objects onto the road. Imagine you are rolling up to an intersection in a foreign city with unfamiliar streets signs and the car, having collected the necessary information, projects a stop sign onto the road out ahead. Perhaps just as practical is the ability to shoot out strips of light that represent the precise width of the car, which could be pretty hand just as you try to squeeze through that extremely narrow gap. For what it's worth, Mercedes says it has already fitted it to a number of demo vehicles and reckons it will be on the road "in the near future."
Twitter

Reuters Built An Algorithm That Can Identify Real News On Twitter (popsci.com) 48

Reuters has built an algorithm called News Tracer that flags and verifies breaking news on Twitter. The algorithm weeds through all 500 million tweets that are posted on a daily basis to "sort real news from spam, nonsense, ads, and noise," writes Corinne Iozzio via Popular Science: In development since 2014, reports the Columbia Journalism Review, News Tracer's work starts by identifying clusters of tweets that are topically similar. Politics goes with politics; sports with sports; and so on. The system then uses language-processing to produce a coherent summary of each cluster. What differentiates News Tracer from other popular monitoring tools, is that it was built to think like a reporter. That virtual mindset takes 40 factors into account, according to Harvard's NiemanLab. It uses information like the location and status of the original poster (e.g. is she verified?) and how the news is spreading to establish a "credibility" rating for the news item in question. The system also does a kind of cross-check against sources that reporters have identified as reliable, and uses that initial network to identify other potentially reliable sources. News Tracer can also tell the difference between a trending hashtag and real news. The mix of data points News Tracer takes into account means it works best with actual, physical events -- crashes, protests, bombings -- as opposed to the he-said-she-said that can dominate news cycles.
Crime

Foxconn Employee Faces 10-Year Prison Sentence For Stealing 5,700 iPhones Worth $1.5 Million (thenextweb.com) 25

A Taiwanese Foxconn manager faces a stiff prison sentence after he stole 5,700 iPhones from his employer, and went to sell them for $1.56 million. The Next Web reports: Foxconn is a tech manufacturing giant. It makes a lot of things, including laptops for HP, phones for Apple, games consoles for Sony, and its workers so depressed it has to install suicide nets. The Taiwanese manager at the center of this crime -- known only by his family name, Tsai -- worked in the testing department at Foxconn's factory in Shenzhen, mainland China. According to Taiwanese prosecutors, Tsai ordered eight of his subordinates to smuggle out thousands of iPhones which were used by the company for testing and quality assurance purposes. These were destined to be scrapped after use. The stolen iPhones (mostly iPhone 5 and iPhone 5s models) made their way to stores in Shenzhen, and went on to make Tsai and his accomplices nearly $1.56 million USD (Tw$50 million). Tsai has since been charged with breach of trust and, if found guilty, he faces a maximum 10-year jail term.
AI

Stephen Hawking: Automation and AI Is Going To Decimate Middle Class Jobs (businessinsider.com) 212

An anonymous reader quotes a report from Business Insider: In a column in The Guardian, the world-famous physicist wrote that "the automation of factories has already decimated jobs in traditional manufacturing, and the rise of artificial intelligence is likely to extend this job destruction deep into the middle classes, with only the most caring, creative or supervisory roles remaining." He adds his voice to a growing chorus of experts concerned about the effects that technology will have on workforce in the coming years and decades. The fear is that while artificial intelligence will bring radical increases in efficiency in industry, for ordinary people this will translate into unemployment and uncertainty, as their human jobs are replaced by machines. Automation will, "in turn will accelerate the already widening economic inequality around the world," Hawking wrote. "The internet and the platforms that it makes possible allow very small groups of individuals to make enormous profits while employing very few people. This is inevitable, it is progress, but it is also socially destructive." He frames this economic anxiety as a reason for the rise in right-wing, populist politics in the West: "We are living in a world of widening, not diminishing, financial inequality, in which many people can see not just their standard of living, but their ability to earn a living at all, disappearing. It is no wonder then that they are searching for a new deal, which Trump and Brexit might have appeared to represent." Combined with other issues -- overpopulation, climate change, disease -- we are, Hawking warns ominously, at "the most dangerous moment in the development of humanity." Humanity must come together if we are to overcome these challenges, he says.
Crime

Lawyer Sues 20-Year-Old Student Who Gave a Bad Yelp Review, Loses Badly (arstechnica.com) 59

20-year-old Lan Cai was in a car crash this summer, after she was plowed into by a drunk driver and broke two bones in her lower back. She didn't know how to navigate her car insurance and prove damages, so she reached out for legal help. Things didn't go as one would have liked, initially, as ArsTechnica documents:The help she got, Cai said, was less than satisfactory. Lawyers from the Tuan A. Khuu law firm ignored her contacts, and at one point they came into her bedroom while Cai was sleeping in her underwear. "Seriously, it's super unprofessional!" she wrote on Facebook. (The firm maintains it was invited in by Cai's mother.) She also took to Yelp to warn others about her bad experience. The posts led to a threatening e-mail from Tuan Khuu attorney Keith Nguyen. Nguyen and his associates went ahead and filed that lawsuit, demanding the young woman pay up between $100,000 and $200,000 -- more than 100 times what she had in her bank account. Nguyen said he didn't feel bad at all about suing Cai. Cai didn't remove her review, though. Instead she fought back against the Khuu firm, all thanks to attorney Michael Fleming, who took her case pro bono. Fleming filed a motion arguing that, first and foremost, Cai's social media complaints were true. Second, she couldn't do much to damage the reputation of a firm that already had multiple poor reviews. He argued the lawsuit was a clear SLAPP (strategic Lawsuit Against Public Participation). Ultimately, the judge agreed with Fleming, ordering the Khuu firm to pay $26,831.55 in attorneys' fees.
AT&T

FCC Calls Out AT&T, Verizon For 'Zero Rating' Their Own Video Apps (zdnet.com) 44

U.S. regulators are calling out AT&T and Verizon for exempting their own video apps from data caps on customers' smartphones. The FCC has sent letters to the country's biggest wireless carriers saying the way they handle the practice, known as "zero rating," can hurt competition and consumers. From a report on ZDNet: AT&T launched DirecTV Now earlier this week. AT&T Mobility customers can stream video data over LTE without impacting their data allowance. Verizon offers something similar with its go90 service. AT&T and Verizon don't see any wrongdoing. In a statement Friday, AT&T said exempting services like DirecTV Now from data caps saves customers money. Verizon said its practices are good for consumers and comply with regulations. "We will provide the FCC with additional information on why the government should not take away a service that saves consumers money," AT&T wrote in a statement Friday. The FCC hasn't released any official ruling on "zero rating," just guidance. It said on Thursday a similar letter was sent to AT&T in November, but the FCC didn't like AT&T's original response.
Facebook

Facebook Commits Millions to Help Silicon Valley's Have-Nots (fortune.com) 54

Facebook wants to be a better corporate citizen, which is perhaps why on Friday it announced a partnership with local community organizations near its headquarters in which it will initially commit $20 million towards making affordable housing, job training, and legal services available to more people in the area. From a report on Fortune: A few groups have signed up to participate, including Youth United for Community Action, Faith in Action Bay Area, Community Legal Services in East Palo Alto, Comite de Vecinos del Lado Oeste -- East Palo Alto, along with the local governments of East Palo Alto and Menlo Park. Here's how that first round of funding will be spread out: This new coalition will allocate $18.5 million into a fund called the Catalyst Housing Fund. The goal is to find ways to accelerate and grow the production of affordable housing in the community. Additionally, $250,000 will be given to Rebuilding Together Peninsula which seeks to assist low-income residents with the upkeep of their homes. $625,000 has been assigned to promote science, technology, engineering, and mathematics in schools, something Silicon Valley has been actively encouraging for years.
Technology

Fake Apple Chargers Fail Safety Tests (bbc.com) 103

Investigators have warned consumers they face potentially fatal risks after 99% of fake Apple chargers failed a basic safety test. From a report on BBC: Trading Standards, which commissioned the checks, said counterfeit electrical goods bought online were an "unknown entity." Of 400 counterfeit chargers, only three were found to have enough insulation to protect against electric shocks. It comes as Apple has complained of a "flood" of fakes being sold on Amazon. Apple revealed in October that it was suing a third-party vendor, which it said was putting customers "at risk" by selling power adapters masquerading as those sold by the Californian tech firm.
Facebook

Facebook Knows What You're Streaming (bloomberg.com) 92

Facebook is gathering information about the shows Roku and Apple TV owners are streaming. The company then uses the Facebook profile linked to the same IP addresses to tailor the commercials that are shown to individual users. From a report on Bloomberg: For the past few weeks, the social network says, it's been targeting ads to people streaming certain shows on their Roku or Apple TV set-top boxes. It customizes commercials based on the Facebook profiles tied to the IP addresses doing the streaming, according to a company spokesman. He says Facebook is trying out this approach with the A&E network (The Killing, Duck Dynasty) and streaming startup Tubi TV, selecting free test ads for nonprofits or its own products along with a handful of name brands. This push is part of a broader effort by social media companies to build their revenue with ads on video. Twitter is placing much of its ad-sales hopes on streaming partnerships with sports leagues and other content providers. In October, CFO Anthony Noto told analysts on an earnings call that the ads played during Twitter's NFL Thursday Night Football streaming exclusives had been especially successful, with many people watching them in their entirety with the sound turned on. The participants in these partnerships don't yet have a default answer to questions such as who should be responsible for selling the ads or who should get which slice of revenue.
Operating Systems

Taking a Stand Against Unofficial Ubuntu Images (ubuntu.com) 87

Canonical isn't pleased with cloud providers who are publishing broken, insecure images of Ubuntu despite being notified several times. In a blogpost, Mark Shuttleworth, the founder of Ubuntu, and the Executive Chairman and VP, Product Strategy at Canonical, made the situation public for all to see. An excerpt from the blog post: We are currently in dispute with a European cloud provider which has breached its contract and is publishing insecure, broken images of Ubuntu despite many months of coaxing to do it properly. The home-grown images on the cloud, VPS and bare metal services of this provider disable fundamental security mechanisms and modify the system in ways that are unsupportable. They are likely to behave unpredictably on update in weirdly creative and mysterious ways (the internet is full of fun examples). We hear about these issues all the time, because users assume there is a problem with Ubuntu on that cloud; users expect that 'all things that claim to be Ubuntu are genuine', and they have a right to expect that. We have spent many months of back and forth in which we unsuccessfully tried to establish the same operational framework on this cloud that already exists on tens of clouds around the world. We have on multiple occasions been promised it will be rectified to no avail. We are now ready to take legal steps to remove these images. We will seek to avoid affecting existing running users, but we must act to prevent future users from being misled. We do not make this move lightly, but have come to the view that the value of Ubuntu to its users rests on these commitments to security, quality and updates.
United Kingdom

UK Homes Lose Internet Access After Cyber-Attack (theguardian.com) 31

More than 100,000 people in the UK have had their internet access cut after a string of service providers were hit by what is believed to be a coordinated cyber-attack, taking the number affected in Europe up to about a million. From a report on The Guardian, shared by reader JoshTops: TalkTalk, one of Britain's biggest service providers, the Post Office and the Hull-based KCom were all affected by the malware known as the Mirai worm, which is spread via compromised computers. The Post Office said 100,000 customers had experienced problems since the attack began on Sunday and KCom put its figure at about 10,000 customers since Saturday. Earlier this week, Germany's Deutsche Telekom said up to 900,000 of its customers had lost their internet connection as part of the same incident.
Android

Multiple Vulnerabilities In AirDroid Opens At Least 10 Million Android Users To MITM Attacks, Hijackings (androidpolice.com) 28

AirDroid is a popular Android application that allows users to send and receive text messages and transfer files and see notifications from their computer. Zimperium, a mobile security company, recently released details of several major security vulnerabilities in the application, allowing attackers on the same network to access user information and execute code on a user's device. Since there are between 10 and 50 million installations of the app, many users may be imperiled by AirDroid. Android Police reports: The security issues are mainly due to AirDroid using the same HTTP request to authorize the device and send usage statistics. The request is encrypted, but uses a hardcoded key in the AirDroid application (so essentially, everyone using AirDroid has the same key). Attackers on the same network an intercept the authentication request (commonly known as a Man-in-the-middle attack) using the key extracted from any AirDroid APK to retrieve private account information. This includes the email address and password associated with the AirDroid account. Attackers using a transparent proxy can intercept the network request AirDroid sends to check for add-on updates, and inject any APK they want. AirDroid would then notify the user of an add-on update, then download the malicious APK and ask the user to accept the installation. Zimperium notified AirDroid of these security flaws on May 24, and a few days later, AirDroid acknowledged the problem. Zimperium continued to follow up until AirDroid informed them of the upcoming 4.0 release, which was made available last month. Zimperium later discovered that version 4.0 still had all these same issues, and finally went public with the security vulnerabilities today.
Censorship

China Is Censoring People's Chats Without Them Even Knowing About It (qz.com) 74

An anonymous reader quotes a report from Quartz: A new study from The Citizen Lab, a research group at the University of Toronto, reveals that censorship on WeChat occurs primarily in group chats rather than one-on-one chats between two people, and often in such a way where the sender of a text isn't even aware a piece of text has been scrubbed. The discoveries illuminates how China's government attempts to keep its citizens blind to the scope of its censorship regime. The researchers set out find the extent to which certain keywords got scrubbed from conversations between two or more users in WeChat. To do this, in June 2016 the team posed as a Chinese WeChat user and sent out 26,821 keywords containing terms that had been censored on other apps, including Tom-Skype (a made-for-China version of Skype) and YY (a live broadcast app). A corresponding Canadian user in the two-way chat would then report back to say whether or not the message had been received. The report states that out of the entire sample, only one term -- Falun Gong -- had been scrubbed. When they ran an identical test in August, even that text mysteriously passed without censorship. Yet when they tested group chats, they found multiple cases in which certain keywords triggered a removal. Specifically, while sensitive terms used in isolation were unlikely to trigger censorship (say "June 4th," a reference to the Tiananmen Square protests, brutally put down on June 4, 1989), it took effect when they were used in a full sentence or with other keywords. The researchers also discovered that when WeChat censored a message, the sender received no notice informing him that his text had not reached the intended recipient. The study also notes that "WeChat only censors content for users who bind their account to a mainland Chinese phone number when they first register to use the app." The censorship is still applied even if Chinese residents move to different countries or change phone numbers.
IBM

Erich Bloch, Who Helped Develop IBM Mainframe, Dies At 91 (google.com) 27

shadowknot writes: The New York Times is reporting (Warning: may be paywalled; alternate source) that Erich Bloch who helped to develop the IBM Mainframe has died at the age of 91 as a result of complications from Alzheimer's disease. From the article: "In the 1950s, he developed the first ferrite-core memory storage units to be used in computers commercially and worked on the IBM 7030, known as Stretch, the first transistorized supercomputer. 'Asked what job each of us had, my answer was very simple and very direct,' Mr. Bloch said in 2002. 'Getting that sucker working.' Mr. Bloch's role was to oversee the development of Solid Logic Technology -- half-inch ceramic modules for the microelectronic circuitry that provided the System/360 with superior power, speed and memory, all of which would become fundamental to computing."
ISS

Russian Supply Rocket Malfunctions, Breaks Up Over Siberia En Route To ISS (npr.org) 132

An anonymous reader quotes a report from NPR: An unmanned cargo rocket bound for the International Space Station was destroyed after takeoff on Thursday. The Russian rocket took off as planned from Baikonur, Kazahkstan, on Thursday morning but stopped transmitting data about six minutes into its flight, as NPR's Rae Ellen Bichell reported: "'Russian officials say the spacecraft failed [...] when it was about 100 miles above a remote part of Siberia. The ship was carrying more than 2 1/2 tons of supplies -- including food, fuel and clothes. Most of that very likely burned up as the unmanned spacecraft fell back toward Earth. NASA says the six crew members on board the International Space station, including two Americans, are well stocked for now.'" This is the fourth botched launch of an unmanned Russian rocket in the past two years. Roscomos officials wrote in an update today: "According to preliminary information, the contingency took place at an altitude of about 190 km over remote and unpopulated mountainous area of the Republic of Tyva. The most of cargo spacecraft fragments burned in the dense atmosphere. The State Commission is conducting analysis of the current contingency. The loss of the cargo ship will not affect the normal operations of the ISS and the life of the station crew."
Botnet

International Authorities Take Down Massive 'Avalanche' Botnet, Sinkhole Over 800,000 Domains (arstechnica.com) 52

plover writes: Investigators from the U.S. Department of Justice, the FBI, Eurojust, Europol, and other global partners announced the takedown of a massive botnet named "Avalanche," estimated to have involved as many as 500,000 infected computers worldwide on a daily basis. A Europol release says: "The global effort to take down this network involved the crucial support of prosecutors and investigators from 30 countries. As a result, five individuals were arrested, 37 premises were searched, and 39 servers were seized. Victims of malware infections were identified in over 180 countries. In addition, 221 servers were put offline through abuse notifications sent to the hosting providers. The operation marks the largest-ever use of sinkholing to combat botnet infrastructures and is unprecedented in its scale, with over 800,000 domains seized, sinkholed or blocked." Sean Gallagher writes via Ars Technica: "The domains seized have been 'sinkholed' to terminate the operation of the botnet, which is estimated to have spanned over hundreds of thousands of compromised computers around the world. The Justice Department's Office for the Western Federal District of Pennsylvania and the FBI's Pittsburgh office led the U.S. portion of the takedown. 'The monetary losses associated with malware attacks conducted over the Avalanche network are estimated to be in the hundreds of millions of dollars worldwide, although exact calculations are difficult due to the high number of malware families present on the network,' the FBI and DOJ said in their joint statement. In 2010, an Anti-Phishing Working Group report called out Avalanche as 'the world's most prolific phishing gang,' noting that the Avalanche botnet was responsible for two-thirds of all phishing attacks recorded in the second half of 2009 (84,250 out of 126,697). 'During that time, it targeted more than 40 major financial institutions, online services, and job search providers,' APWG reported. In December of 2009, the network used 959 distinct domains for its phishing campaigns. Avalanche also actively spread the Zeus financial fraud botnet at the time."
The Courts

French Man Sentenced To Two Years In Prison For Visiting Pro-ISIS Websites (theverge.com) 367

According to French media, a court in the department of Ardeche on Tuesday sentenced a 32-year-old man in France to two years in prison for repeatedly visiting pro-ISIS websites -- even though there was no indication he planned to stage a terrorist attack. Police raided his house and found the man's browsing history. They also found pro-ISIS images and execution videos on his phone, personal computer, and a USB stick, an ISIS flag wallpaper on his computer, and a computer password that was "13novembrehaha," referencing the Paris terrorist attacks that left 130 people dead. Slashdot reader future guy shares with us an excerpt from The Verge's report: In court, the man argued that he visited the sites out of curiosity. "I wanted to tell the difference between real Islam and the false Islam, now I understand," he said, according to FranceBleu. But the man reportedly admitted to not reading other news sites or international press, and family members told the court that his behavior had recently changed. He became irritated when discussing religion, they said, and began sporting a long beard with harem pants. A representative from the Ardeche court confirmed to The Verge that there was no indication that the man had any plans to launch an attack. In addition to the two-year prison sentence, he will have to pay a 30,000 euros (roughly $32,000) fine.

Slashdot Top Deals