Self-Driving Shuttle Involved In Crash Two Hours After Debut Slashdotby BeauHD on transportation at January 1, 1970, 1:00 am (cached at November 9, 2017, 11:34 pm)

New submitter Northern Pike writes: Las Vegas roll out of new driver-less shuttle spoiled by human error. It sounds like the shuttle did what it was designed to do but the human semi driver wasn't as careful. "The shuttle did what it was supposed to do, in that it's (sic) sensors registered the truck and the shuttle stopped to avoid the accident," the city said in a statement. "Unfortunately the delivery truck did not stop and grazed the front fender of the shuttle. Had the truck had the same sensing equipment that the shuttle has the accident would have been avoided." The self-driving shuttle can transport up to 12 people and has a attendant and computer monitor, but no steering wheel and no brake pedals. It relies heavily on GPS, electronic curb sensors and other technology to make its way.

Read more of this story at Slashdot.

Equifax: Hack Related Expenses Cost Company $87.5 Million in Q3 (SecurityWeek) SANS ISC SecNewsFeed(cached at November 9, 2017, 11:30 pm)

US government seizes Texas gun mass murder to demand backdoors (The Register) SANS ISC SecNewsFeed(cached at November 9, 2017, 11:30 pm)

WikiLeaks Starts Releasing Source Code For Alleged CIA Spying Tools Slashdotby BeauHD on security at January 1, 1970, 1:00 am (cached at November 9, 2017, 11:04 pm)

An anonymous reader quotes a report from Motherboard: WikiLeaks published new alleged material from the CIA on Thursday, releasing source code from a tool called Hive, which allows its operators to control malware it installed on different devices. WikiLeaks previously released documentation pertaining to the tool, but this is the first time WikiLeaks has released extensive source code for any CIA spying tool. This release is the first in what WikiLeaks founder Julian Assange says is a new series, Vault 8, that will release the code from the CIA hacking tools revealed as part of Vault 7. "This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components," WikiLeaks said in its press release for Vault 8. "Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention." In its release, WikiLeaks said that materials published as part of Vault 8 will "not contain zero-days or similar security vulnerabilities which could be repurposed by others."

Read more of this story at Slashdot.

The perfect length for a podcast Scripting News(cached at November 9, 2017, 11:03 pm)

In 2004, I decided that 40 minutes was the perfect length for a podcast.

In 2017, an update: now 20 minutes is the perfect length.

The two trendsetters: The Daily and Planet Money.

Saudi FM seeks pressure on Iran and Hezbollah AL JAZEERA ENGLISH (AJE)(cached at November 9, 2017, 11:00 pm)

In interview with CNBC, Adel al-Jubeir says Saudi Arabia wants Lebanon to 'take resolute actions against Hezbollah'.
WikiLeaks Says CIA Impersonated Kaspersky Lab (SecurityWeek) SANS ISC SecNewsFeed(cached at November 9, 2017, 11:00 pm)

US journalist Martha O'Donovan granted bail in Zimbabwe AL JAZEERA ENGLISH (AJE)(cached at November 9, 2017, 10:30 pm)

American citizen was arrested and taken into police custody over a tweet that described President Mugabe as a 'goblin'.
Face ID’s Innovation: Continuous Authentication TidBITS(cached at November 9, 2017, 10:05 pm)

It takes a lot to impress security expert Rich Mogull, but he’s convinced that Face ID is going to change the face of computer security.

 

Read the full article at TidBITS, the oldest continuously published technology publication on the Internet. To get a full-text RSS feed, help support our work and become a TidBITS member! Members also enjoy an ad-free version of our Web site, email delivery of individual articles, the ability to make long comments with live links, and discounts on Take Control orders and other Apple-related products.

Google Says Hackers Steal Almost 250,000 Logins Each Week Slashdotby msmash on google at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:04 pm)

Google is digging into the dark corners of the web to better secure people's accounts. From a report: For one year, Google researchers investigated the different ways hackers steal personal information and take over Google accounts. Google published its research, conducted between March 2016 and March 2017, on Thursday. Focusing exclusively on Google accounts and in partnership with the University of California, Berkeley, researchers created an automated system to scan public websites and criminal forums for stolen credentials. The group also investigated over 25,000 criminal hacking tools, which it received from undisclosed sources. Google said it is the first study taking a long term and comprehensive look at how criminals steal your data, and what tools are most popular. [...] Google researchers identified 788,000 potential victims of keylogging and 12.4 million potential victims of phishing. These types of attacks happen all the time. For example on average, the phishing tools Google studied collect 234,887 potentially valid login credentials, and the keylogging tools collected 14,879 credentials, each week.

Read more of this story at Slashdot.

Net-Frame-Simple-1.09 search.cpan.orgby Patrice Auffret at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:03 pm)

frame crafting made easy
App-Music-ChordPro-0.910.1 search.cpan.orgby Johan Vromans at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:03 pm)

A lyrics and chords formatting program
Text-Continuation-Parser-0.3_1 search.cpan.orgby Wesley Schwengle at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:03 pm)

Parse files with continuation lines
Importer-Zim-Base-0.12.0 search.cpan.orgby Adriano Ferreira at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:03 pm)

Base module for Importer::Zim backends
Importer-Zim-Lexical-0.10.0 search.cpan.orgby Adriano Ferreira at January 1, 1970, 1:00 am (cached at November 9, 2017, 10:03 pm)

Import functions as lexical subroutines