The Linkielist

Linking ideas with the world

How IBM Watson saved the life of a woman dying from cancer, exec says – Business Insider

“There’s a 60-year-old woman in Tokyo. She was at the University of Tokyo. She had been diagnosed with leukemia six years ago. She was living, but not healthy. So the University of Tokyo ran her genomic sequence through Watson and it was able to ascertain that they were off by one thing. Actually, she had Read more about How IBM Watson saved the life of a woman dying from cancer, exec says – Business Insider[…]

Full Disclosure: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security

An attacker can misuse PwC ACE security vulnerability in order to: – make changes to the production systems and their settings including manipulating or corrupting ABAP programs shipped by SAP and making the system and data inoperable; – plant an SAP backdoor for accessing the system and sensitive data later; and – shut down the Read more about Full Disclosure: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security[…]

AMD Introduces Radeon Instinct Machine Intelligence And Deep Learning Accelerators

AMD is announcing a new series of Radeon-branded products today, targeted at machine intelligence (AI) and deep learning enterprise applications, called Radeon Instinct. As its name suggests, the new Radeon Instinct line of products are comprised of GPU-based solutions for deep learning, inference, and training. The new GPUs are also complemented by a free, open-source library Read more about AMD Introduces Radeon Instinct Machine Intelligence And Deep Learning Accelerators[…]

Hardcoded root accounts found in 80 Sony IP security camera models

Researchers from SEC Consult have found two backdoor accounts that exist in 80 models of professional Sony security cameras, mainly used by companies and government agencies given their high price. One set of hard-coded credentials is in the Web interface and allows a remote attacker to send requests that would enable the Telnet service on Read more about Hardcoded root accounts found in 80 Sony IP security camera models[…]

Chicago Face Database

The Chicago Face Database was developed at the University of Chicago by Debbie S. Ma, Joshua Correll, and Bernd Wittenbrink. The CFD is intended for use in scientific research. It provides high-resolution, standardized photographs of male and female faces of varying ethnicity between the ages of 17-65. Extensive norming data are available for each individual Read more about Chicago Face Database[…]

PowerShell security threats greater than ever, researchers warn

In March 2016, security experts warned that PowerShell had been fully weaponised. In the following month, a report confirmed that PowerShell was used to launch 38% of cyber attacks seen by security firm Carbon Black and its partners in 2015. Now more than 95% of PowerShell scripts analysed by Symantec researchers have been found to Read more about PowerShell security threats greater than ever, researchers warn[…]

Holding Shift + F10 During Windows 10 Updates Opens Root CLI, Bypasses BitLocker – Slashdot

This CLI debugging interface grants the attacker full access to the computer’s hard drive, despite the presence of BitLocker. The reason is that during the Windows 10 update procedure, the OS disables BitLocker while the Windows PE (Preinstallation Environment) installs a new image of the main Windows 10 operating system. Source: Holding Shift + F10 Read more about Holding Shift + F10 During Windows 10 Updates Opens Root CLI, Bypasses BitLocker – Slashdot[…]

Uber begins collection of rider location data – whether using the app or not

The app update (it’s 3.222.4, for those keeping track) changes the way Uber collects location data from its users. Previously, Uber only collected location information while a user had the app open – now, Uber asks users to always share their location with the ride-hailing company. Uber says that, even though it can harvest your Read more about Uber begins collection of rider location data – whether using the app or not[…]

The FBI Just Got Disturbing New Hacking Powers

Under the old version of “Rule 41,” agencies like the FBI needed to apply for a warrant in the right jurisdiction to hack a computer, presenting difficulties when investigating crimes involving suspects who had anonymized their locations or machines in multiple places. Under the new version, a federal judge can approve a single search warrant Read more about The FBI Just Got Disturbing New Hacking Powers[…]

TensorFlow — Googles’ Open Source Software Library for Machine Intelligence

TensorFlow™ is an open source software library for numerical computation using data flow graphs. Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional data arrays (tensors) communicated between them. The flexible architecture allows you to deploy computation to one or more CPUs or GPUs in a desktop, server, or mobile Read more about TensorFlow — Googles’ Open Source Software Library for Machine Intelligence[…]

Acquired administrator level access to all of the Microsoft Azure managed Red Hat Update Infrastructure that supplies all the packages for all Red Hat Enterprise Linux instances booted from the Azure marketplace.

Acquired administrator level access to all of the [Microsoft Azure](https://azure.microsoft.com) managed [Red Hat Update Infrastructure](https://access.redhat.com/documentation/en/red-hat-update-infrastructure/3.0.beta.1/paged/system-administrator-guide/chapter-1-about-red-hat-update-infrastructure) that supplies all the packages for all [Red Hat Enterprise Linux](https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux) instances booted from the Azure marketplace. Basically it’s easy to find all servers, then bump up a package version number, upload it to the update host and get all Read more about Acquired administrator level access to all of the Microsoft Azure managed Red Hat Update Infrastructure that supplies all the packages for all Red Hat Enterprise Linux instances booted from the Azure marketplace.[…]

These Are The 48 Organizations That Now Have Access To Every Brit’s Browsing History

While the UK was obsessing with Brexit and its aftermath, parliament quietly passed a contentious snooping law that gives authorities, everyone from police and spies to food regulators, fire officials and tax inspectors, the right to legally look at the internet browsing records of everyone in the country. […] Which government agencies have access to Read more about These Are The 48 Organizations That Now Have Access To Every Brit’s Browsing History[…]

Battery breakthrough will let phones charge in seconds and last for a week

charge has been created by researchers at the University of Central Florida. The high-powered battery is packed with supercapacitors that can store a large amount of energy. It looks like a thin piece of flexible metal that is about the size of a finger nail and could be used in phones, electric vehicles and wearables, Read more about Battery breakthrough will let phones charge in seconds and last for a week[…]

Google’s AI translation tool seems to have invented its own secret internal language

If you can translate from A to B and from B to C can you translate from A to C without learning the translations directly? Well yes you can. So the translate AI has created its’ own language B (we think) that can function as a midpoint between not only A and C, but also Read more about Google’s AI translation tool seems to have invented its own secret internal language[…]

The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger. In all, the FBI obtained over 8,000 IP Read more about The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant[…]

Thermoelectric paint enables walls to convert heat into electricity

Already researchers have developed photovoltaic paint, which can be used to make “paint-on solar cells” that capture the sun’s energy and turn it into electricity. Now in a new study, researchers have created thermoelectric paint, which captures the waste heat from hot painted surfaces and converts it into electrical energy. “I expect that the thermoelectric Read more about Thermoelectric paint enables walls to convert heat into electricity[…]

Surveillance camera compromised in 98 seconds

Robert Graham, CEO of Errata Security, on Friday documented his experience setting up a $55 JideTech security camera behind a Raspberry Pi router configured to isolate the camera from his home network. According to Graham’s series of Twitter posts, his camera was taken over by the Mirai botnet in just 98 seconds. Note: it was Read more about Surveillance camera compromised in 98 seconds[…]

Royal Navy to lose missiles and be left only with guns

Royal Navy warships will be left without anti-ship missiles and be forced to rely on naval guns because of cost-cutting, the Ministry of Defence has admitted. The Navy’s Harpoon missiles will retire from the fleet’s frigates and destroyers in 2018 without a replacement, while there will also be a two year gap without helicopter-launched anti-shipping Read more about Royal Navy to lose missiles and be left only with guns[…]

Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The UK has just passed a massive expansion in surveillance powers, which critics have called “terrifying” and “dangerous”. The new law, dubbed the “snoopers’ charter”, was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general Read more about Britain has passed the ‘most extreme surveillance law ever passed in a democracy’[…]

NIH Scientists Identify Potent Antibody that Neutralizes Nearly All HIV Strains

Scientists from the National Institutes of Health have identified an antibody from an HIV-infected person that potently neutralized 98 percent of HIV isolates tested, including 16 of 20 strains resistant to other antibodies of the same class. The remarkable breadth and potency of this antibody, named N6, make it an attractive candidate for further development Read more about NIH Scientists Identify Potent Antibody that Neutralizes Nearly All HIV Strains[…]