Australian gets 4 months in jail over drunken Bali rampage AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 9:34 pm)

Nicholas Carr carried out a campaign of destruction in Seminyak, a popular tourist area on the Indonesian island.
Australian gets 4 months in jail over drunken Bali rampage AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 9:34 pm)

Nicholas Carr carried out a campaign of destruction in Seminyak, a popular tourist area on the Indonesian island.
Iran: Europeans are hypocrites for condemning nuclear-deal breach AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 9:31 pm)

Foreign Minister Zarif baulks at EU statement suggesting it has kept up its part of the bargain over the nuclear deal.
Cocaine treasure hunters warned off French beaches AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 9:29 pm)

The tide is high, and so are the locals.
Facebook Unites Payment Service Across Apps With Facebook Pay Slashdotby msmash on facebook at January 1, 1970, 1:00 am (cached at November 12, 2019, 9:05 pm)

Facebook said on Tuesday it was launching Facebook Pay, a unified payment service through which users across its platforms including WhatsApp and Instagram can make payments without exiting the app. From a report: The social network said the service would allow users to send money or make a payment with security options such as PIN or biometrics on their smartphones. Chief Executive Officer Mark Zuckerberg said earlier this year the company is planning to unify the messaging infrastructure across its platforms. He said the company would encrypt conversations on more of its messaging services and make them compatible as direct messaging was likely to dwarf discussion on the traditional, open platform of Facebook's news feed in a few years. Facebook said the new service will collect user information such as payment method, date, billing and contact details when a transaction is made and that it would use the data to show targeted advertisements to users.

Read more of this story at Slashdot.

China aims to build its own Yellowstone on Tibetan plateau AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 8:41 pm)

Chinese government also wants to set limits on the region's growth in order to design its own national park system.
China aims to build its own Yellowstone on Tibetan plateau AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 8:41 pm)

Chinese government also wants to set limits on the region's growth in order to design its own national park system.
Intel's Cascade Lake CPUs Impacted By New Zombieload v2 Attack Slashdotby msmash on intel at January 1, 1970, 1:00 am (cached at November 12, 2019, 8:32 pm)

The Zombieload vulnerability disclosed earlier this year in May has a second variant that also works against more recent Intel processors, not just older ones, including Cascade Lake, Intel's latest line of high-end CPUs -- initially thought to have been unaffected. From a report: Intel is releasing microcode (CPU firmware) updates today to address this new Zombieload attack variant, as part of its monthly Patch Tuesday -- known as the Intel Platform Update (IPU) process. Back in May, two teams of academics disclosed a new batch of vulnerabilities that impacted Intel CPUs. Collectively known as MDS attacks, these are security flaws in the same class as Meltdown, Spectre, and Foreshadow. The attacks rely on taking advantage of the speculative execution process, which is an optimization technique that Intel added to its CPUs to improve data processing speeds and performance. Vulnerabilities like Meltdown, Spectre, and Foreshadow, showed that the speculative execution process was riddled with security holes. Disclosed in May, MDS attacks were just the latest line of vulnerabilities impacting speculative execution. They were different from the original Meltdown, Spectre, and Foreshadow bugs disclosed in 2018 because they attacked different areas of a CPU's speculative execution process. Further reading: Flaw in Intel PMx driver gives 'near-omnipotent control over a victim device'.

Read more of this story at Slashdot.

Isolated Belarus looks towards Europe despite Russian overtures AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 8:26 pm)

A rare trip to an EU nation sees Lukashenko defend his human rights record.
Isolated Belarus looks towards Europe despite Russian overtures AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 8:26 pm)

A rare trip to an EU nation sees Lukashenko defend his human rights record.
As 5G Rolls Out, Troubling New Security Flaws Emerge Slashdotby msmash on communications at January 1, 1970, 1:00 am (cached at November 12, 2019, 7:59 pm)

It's not yet prime time for 5G networks, which still face logistical and technical hurdles, but they're increasingly coming online in major cities worldwide. Which is why it's especially worrying that new 5G vulnerabilities are being discovered almost by the dozen. From a report: At the Association for Computing Machinery's Conference on Computer and Communications Security in London today researchers are presenting new findings that the 5G specification still has vulnerabilities. And with 5G increasingly becoming a reality, time is running out to catch these flaws. The researchers from Purdue University and the University of Iowa are detailing 11 new design issues in 5G protocols that could expose your location, downgrade your service to old mobile data networks, run up your wireless bills, or even track when you make calls, text, or browse the web. They also found five additional 5G vulnerabilities that carried over from 3G and 4G. They identified all of those flaws with a new custom tool called 5GReasoner. One purported benefit of 5G is that it protects phone identifiers, like your device's "international mobile subscriber identity," to help prevent tracking or targeted attacks. But downgrade attacks like the ones the researchers found can bump your device down to 4G, or put it into limited service mode, then force it to send its IMSI number unencrypted. Increasingly, networks use an alternative ID called a Temporary Mobile Subscriber Identity that refreshes periodically to stymie tracking. But the researchers also found flaws that could allow them to override TMSI resets, or correlate a device's old and new TMSI, to track devices. Mounting those attacks takes only software-defined radios that cost a few hundred dollars. The 5GReasoner tool also found issues with the part of the 5G standard that governs things like initial device registration, deregistration, and paging, which notifies your phone about incoming calls and texts. Depending on how a carrier implements the standard, attackers could mount "replay" attacks to run up a target's mobile bill by repeatedly sending the same message or command. It's an instance of vague wording in the 5G standard that could cause carriers to implement it weakly.

Read more of this story at Slashdot.

As 5G Rolls Out, Troubling New Security Flaws Emerge Slashdotby msmash on communications at January 1, 1970, 1:00 am (cached at November 12, 2019, 7:59 pm)

It's not yet prime time for 5G networks, which still face logistical and technical hurdles, but they're increasingly coming online in major cities worldwide. Which is why it's especially worrying that new 5G vulnerabilities are being discovered almost by the dozen. From a report: At the Association for Computing Machinery's Conference on Computer and Communications Security in London today researchers are presenting new findings that the 5G specification still has vulnerabilities. And with 5G increasingly becoming a reality, time is running out to catch these flaws. The researchers from Purdue University and the University of Iowa are detailing 11 new design issues in 5G protocols that could expose your location, downgrade your service to old mobile data networks, run up your wireless bills, or even track when you make calls, text, or browse the web. They also found five additional 5G vulnerabilities that carried over from 3G and 4G. They identified all of those flaws with a new custom tool called 5GReasoner. One purported benefit of 5G is that it protects phone identifiers, like your device's "international mobile subscriber identity," to help prevent tracking or targeted attacks. But downgrade attacks like the ones the researchers found can bump your device down to 4G, or put it into limited service mode, then force it to send its IMSI number unencrypted. Increasingly, networks use an alternative ID called a Temporary Mobile Subscriber Identity that refreshes periodically to stymie tracking. But the researchers also found flaws that could allow them to override TMSI resets, or correlate a device's old and new TMSI, to track devices. Mounting those attacks takes only software-defined radios that cost a few hundred dollars. The 5GReasoner tool also found issues with the part of the 5G standard that governs things like initial device registration, deregistration, and paging, which notifies your phone about incoming calls and texts. Depending on how a carrier implements the standard, attackers could mount "replay" attacks to run up a target's mobile bill by repeatedly sending the same message or command. It's an instance of vague wording in the 5G standard that could cause carriers to implement it weakly.

Read more of this story at Slashdot.

Bolivia seeks new leader as fallen Evo Morales reaches Mexico AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 7:50 pm)

Mexico granted Morales asylum after he suddenly announced his resignation on Sunday.
'Progressive coalition' of Spanish leftists agrees to share power AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 7:49 pm)

The deal could keep the centre-right and the resurgent far-right out of power, but still needs other parties' support.
Turkish students, lecturer on trial for banned LGBTI march AL JAZEERA ENGLISH (AJE)(cached at November 12, 2019, 7:18 pm)

Defendants face up to 3 years in prison if convicted of 'unlawful assembly and protest' at annual event in Ankara.