Factions fight for two Libyan oil terminals AL JAZEERA ENGLISH (AJE)(cached at March 5, 2017, 11:30 pm)

Haftar's LNA launches air strikes in attempt to regain control of Es Sider and Ras Lanuf ports seized by BDB fighters.
Windows 10 Build 15048 Has a Windows Mixed Reality Demo You Can Try Slashdotby EditorDavid on microsoft at January 1, 1970, 1:00 am (cached at March 5, 2017, 11:04 pm)

Microsoft's big push into mixed reality involves headsets from multiple manufacturers (including ASUS, Dell, HP, Lenovo), and developer kits with Acer's headset will begin a phased rollout this month. But Windows 10's latest "Insider Preview" build already includes a mixed reality simulator with a first-person 3D environment that can be navigated with the W, A, S and D keys. Slashdot reader Mark Wilson writes: From the look of the changelog for Windows 10 build 15048 that was released a few days ago to Insiders, it looked to be little more than a bug fixing release. But in fact Microsoft has already started to include references to -- and even a portal for -- Windows Mixed Reality. We have seen reference to Windows Holographic in Windows 10 before, but this is the first time there has been anything to play with. It coincides nicely with Microsoft revealing that Windows Mixed Reality is the new name for Windows Holographic, and it gives Insiders the chance to not only see if their computer meets the recommended specs, but also to try out a Windows Mixed reality simulation.

Read more of this story at Slashdot.

Another example of maldoc string obfuscation, with extra bonus: UAC bypass, (Sun, Ma SANS Internet Storm Center, InfoCON: green(cached at March 5, 2017, 11:00 pm)

I had to help out someone with this sample.

It contains obfuscated strings like these:

Notice the Like operator. This is a strong indication that the strings are obfuscated by adding extra characters (e.g. the string left of the Like keyword). If we remove all these extra characters, we end up with this:

This PowerShell command executes a downloaded EXE and bypasses UAC with the eventviewer method.

If you want more details on the steps I took to deobfuscate these strings, you can watch this video:

Didier Stevens
Microsoft MVP Consumer Security
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Another example of maldoc string obfuscation, with extra bonus: UAC bypass, (Sun, Ma SANS Internet Storm Center, InfoCON: green(cached at March 5, 2017, 11:00 pm)

I had to help out someone with this sample.

It contains obfuscated strings like these:

Notice the Like operator. This is a strong indication that the strings are obfuscated by adding extra characters (e.g. the string left of the Like keyword). If we remove all these extra characters, we end up with this:

This PowerShell command executes a downloaded EXE and bypasses UAC with the eventviewer method.

If you want more details on the steps I took to deobfuscate these strings, you can watch this video:

Didier Stevens
Microsoft MVP Consumer Security
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Microsoft Browser Usage Drops 50% As Chrome Soars Slashdotby EditorDavid on chrome at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:04 pm)

An anonymous reader quotes Network World's report about new statistics from analytics vendor Net Applications: From March 2015 to February 2017, the use of Microsoft's IE and Edge on Windows personal computers plummeted. Two years ago, the browsers were run by 62% of Windows PC owners; last month, the figure had fallen by more than half, to just 27%. Simultaneous with the decline of IE has been the rise of Chrome. The user share of Google's browser -- its share of all browsers on all operating systems -- more than doubled in the last two years, jumping from 25% in March 2015 to 59.5% last month. Along the way, Chrome supplanted IE to become the world's most-used browser... In the last 24 months, Mozilla's Firefox -- the other major browser alternative to Chrome for macOS users -- has barely budged, losing just two-tenths of a percentage point in user share. [And] in March 2015, an estimated 69% of all Mac owners used Safari to go online. But by last month, that number had dropped to 56%, a drop of 13 percentage points -- representing a decline of nearly a fifth of the share of two years prior.

Read more of this story at Slashdot.

DateTime-Locale-1.14 search.cpan.orgby Dave Rolsky at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

Localization support for DateTime.pm
DateTime-Locale-1.14 search.cpan.orgby Dave Rolsky at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

Localization support for DateTime.pm
CPAN-Plugin-Sysdeps-0.24 search.cpan.orgby Slaven Rezić at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

CPAN.pm plugin for installing external dependencies
CPAN-Plugin-Sysdeps-0.24 search.cpan.orgby Slaven Rezić at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

CPAN.pm plugin for installing external dependencies
Linux-LXC-1.0000 search.cpan.orgby Kevin Hagner at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

Manage LXC containers.
Linux-LXC-1.0000 search.cpan.orgby Kevin Hagner at January 1, 1970, 1:00 am (cached at March 5, 2017, 10:03 pm)

Manage LXC containers.
Sikh Coalition: After Seattle attack we are vigilant AL JAZEERA ENGLISH (AJE)(cached at March 5, 2017, 9:30 pm)

Sikh Coalition, a New York-based civil rights group, calls on Trump administration to prioritise hate crime prevention.
Sikh Coalition: After Seattle attack we are vigilant AL JAZEERA ENGLISH (AJE)(cached at March 5, 2017, 9:30 pm)

Sikh Coalition, a New York-based civil rights group, calls on Trump administration to prioritise hate crime prevention.
Hidden Backdoor Discovered In Chinese IoT Devices Slashdotby EditorDavid on china at January 1, 1970, 1:00 am (cached at March 5, 2017, 9:04 pm)

"A backdoor has been found in devices made by a Chinese tech firm specializing in VoIP products," reports TechRadar. An anonymous reader quotes their article: Security outfit Trustwave made the discovery of a hidden backdoor in DblTek's devices which was apparently put there to allow the manufacturer access to said hardware -- but of course, it's also open to being exploited by other malicious parties. The backdoor is in the Telnet admin interface of DblTek-branded devices, and potentially allows an attacker to remotely open a shell with root privileges on the target device. What's perhaps even more worrying is that when Trustwave contacted DblTek regarding the backdoor last autumn -- multiple times -- patched firmware was eventually released at the end of December. However, rather than removing the flaw, the vendor simply made it more difficult to access and exploit. And further correspondence with the Chinese company has apparently fallen on deaf ears. The firmware with the hole "is present on almost every GSM-to-VoIP device which DblTek makes," and Trustwave "found hundreds of these devices on the net, and many other brands which use the same firmware, so are equally open to exploit."

Read more of this story at Slashdot.

Liver transplant pioneer Thomas Starzl dies aged 90 BBC News | Science/Nature | UK Edition(cached at March 5, 2017, 8:30 pm)

The surgeon carried out the first successful liver transplant in 1967 and helped normalise the surgery.