Researchers Repurpose Failed Cancer Drug Into Printable Semiconductor Slashdotby EditorDavid on biotech at January 1, 1970, 1:00 am (cached at October 5, 2019, 11:42 pm)

Long-time Slashdot reader sandbagger shared this news from the University of Illinois at Urbana, where researchers have made a surprising new discovery in a well-studied bioactive molecule: The molecule, which inserts itself into DNA to prevent replication, was once explored as a potential anti-cancer agent... "While examining these pharmaceutical molecules, we noticed that their molecular structures looked much like the organic semiconductors..." said chemical and biomolecular engineering professor Ying Diao. These molecules, called DNA topoisomerase inhibitors, are flat and contain neatly stacked columns of electrically conductive molecular rings -- features that make a good semiconductor. Distinct from a typical semiconductor, these molecular columns are linked together by hydrogen bonds that can move charges from column to column, forming bridges that transform the entire molecular assembly into a semiconductor -- something rarely seen before this study, the researchers said. "These molecules can interact with biological material with high specificity, making them good candidates for use in biosensors," Diao said. "They are also easily printable but will require new solvents because they are chemically different than other organic semiconductors. The fabrication infrastructure is already in place...." Organic semiconductors are responsible for things like flexible electronics and transparent solar cells, but researchers are working to expand their use in biomedicine and devices that require interaction between electrically active molecules and biological molecules... The team printed and tested the semiconductors and acknowledge that their efficiency and performance need improvement. Diao said the real excitement regarding this advance will come from the possibility of discovering similar molecules. "We envision partnering with researchers in machine learning who can train computers to spot the unique characteristics of these molecules," Diao said. "They can mine the vast pharmaceutical databases available today in search of molecules with similar, or maybe even better semiconducting properties."

Read more of this story at Slashdot.

'We have nothing to lose': Iraqis vow to keep up protests AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 11:16 pm)

Demonstrators seek political overhaul as death toll after days of unrest over long-standing grievances rises.
Fake News Posters In Singapore Will Face Fines, Prison Sentences Under New Law Slashdotby EditorDavid on censorship at January 1, 1970, 1:00 am (cached at October 5, 2019, 10:49 pm)

dryriver quotes CNN: Singapore's sweeping anti-fake news law, which critics warn could be used to suppress free speech in the already tightly controlled Asian city state, came into force Wednesday. Under the Protection from Online Falsehoods and Manipulation Bill, it is now illegal to spread "false statements of fact" under circumstances in which that information is deemed "prejudicial" to Singapore's security, public safety, "public tranquility," or to the "friendly relations of Singapore with other countries," among numerous other topics. Government ministers can decide whether to order something deemed fake news to be taken down, or for a correction to be put up alongside it. They can also order technology companies such as Facebook and Google -- both of which opposed the bill during its fast-tracked process through parliament -- to block accounts or sites spreading false information. The act also provides for prosecutions of individuals, who can face fines of up to 50,000 SGD (over $36,000), and, or, up to five years in prison. If the alleged falsehood is posted using "an inauthentic online account or controlled by a bot," the total potential fine rises to 100,000 SGD (around $73,000), and, or, up to 10 years in prison. Companies found guilty of spreading "fake news" can face fines of up to 1 million SGD (around $735,000).

Read more of this story at Slashdot.

Ecuador indigenous groups, workers keep up fuel protests AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 10:35 pm)

As transport unions suspend strike, indigenous groups vow to keep protesting until Moreno overturns austerity measure.
Saudi Arabia, Iran take steps towards indirect talks: Report AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 10:07 pm)

New York Times says Saudi crown prince asked leaders of Iraq and Pakistan to speak to Iran about defusing tensions.
US, Greece hail strategic relationship after signing defence deal AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 10:05 pm)

Secretary of State Mike Pompeo signs revised cooperation agreement, says Greek-US ties have 'never been stronger'.
Attackers Exploit New 0-day Vulnerability Giving Full Control of Android Phones Slashdotby EditorDavid on android at January 1, 1970, 1:00 am (cached at October 5, 2019, 9:52 pm)

"Attackers are exploiting a zero-day vulnerability in Google's Android mobile operating system that can give them full control of at least 18 different phone models," reports Ars Technica, "including four different Pixel models, a member of Google's Project Zero research group said on Thursday night." The post also says there's evidence the vulnerability is being actively exploited. An anonymous reader quotes Ars Technica: Exploits require little or no customization to fully root vulnerable phones. The vulnerability can be exploited two ways: (1) when a target installs an untrusted app or (2) for online attacks, by combining the exploit with a second exploit targeting a vulnerability in code the Chrome browser uses to render content. "The bug is a local privilege escalation vulnerability that allows for a full compromise of a vulnerable device," Stone wrote. "If the exploit is delivered via the Web, it only needs to be paired with a renderer exploit, as this vulnerability is accessible through the sandbox...." Google representatives wrote in an email: "Pixel 3 and 3a devices are not vulnerable to this issue, and Pixel 1 and 2 devices will be protected with the October Security Release, which will be delivered in the coming days. Additionally, a patch has been made available to partners in order to ensure the Android ecosystem is protected against this issue." The use-after-free vulnerability originally appeared in the Linux kernel and was patched in early 2018 in version 4.14, without the benefit of a tracking CVE. That fix was incorporated into versions 3.18, 4.4, and 4.9 of the Android kernel. For reasons that weren't explained in the post, the patches never made their way into Android security updates.

Read more of this story at Slashdot.

Libertarian Accused of Faking 1.5M Net Neutrality Comments Using Data-Breached Addre Slashdotby EditorDavid on government at January 1, 1970, 1:00 am (cached at October 5, 2019, 8:37 pm)

BuzzFeed says they've identified two firms which "misappropriated names and personal information as part of a bid to submit more than 1.5 million statements" pretending to oppose net neutrality regulations: The anti-net neutrality comments harvested on behalf of Broadband for America, the industry group that represented telecommunications giants including AT&T, Cox, and Comcast, were uploaded to the FCC website by Media Bridge founder Shane Cory, a former executive director of both the Libertarian Party and the conservative sting group Project Veritas. Cory has claimed credit for "20 or 30" major public advocacy campaigns in recent years, including, he says, record-setting submissions to the IRS, Environmental Protection Agency, Bureau of Land Management, Bureau of Ocean Energy Management, and "probably a handful of others." On Media Bridge's website, the company has described itself as having expertise in "overwhelming government agencies" with avalanches of public submissions, and has publicly dubbed its approach to marshaling comments the "Big Hammer." In the FCC campaign, Cory was working for Ralph Reed -- a high-powered political strategist and titan of the Christian right who himself was working for Broadband for America. Cory, in turn, enlisted LCX Digital to find the commenters... BuzzFeed News ran large samples of the email addresses in those files through Have I Been Pwned, a website that identifies whether an address has been exposed in any of hundreds of major data breaches. The results were stark: In one particular group of 1.9 million comments, according to BuzzFeed News' analysis, 94% of the email addresses belonged to people who had fallen victim to a hack known as the Modern Business Solutions data breach, in which millions of people's personal information, including full names, birthdates, home addresses, and email addresses, had been stolen... All these comments were uploaded by Cory, using his Media Bridge email address. (Some of the comments were full duplicates; after removing them, there were just over 1.5 million comment-and-email combinations.) In its letter to BuzzFeed News, Media Bridge contested the idea that email addresses showing up in breached databases were a sign of improprieties. In fact, it said, a "high match rate" is a sign of validity, since most Americans appear in breached databases.... Two of the commenters were named Luke Skywalker and Boba Fett -- and yet mysteriously "the names and street addresses were exactly as they appeared in that breach... A separate spot check by BuzzFeed News of 100 randomly selected Media Bridge comments revealed a similar pattern -- even down to a street address that used underscores instead of spaces." In addition, Buzzfeed found that "almost all" of the remaining 6% appears to just be "recycled" identities drawn from comments left in 2016 when the FCC was considering a new rule that would allow cable consumers to use their own set-top boxes -- a regulation that the cable industry opposed. "One year later, 99.9% of those exact same names and addresses appeared on the FCC's website, weighing in on an entirely different policy debate -- net neutrality. They were uploaded by Media Bridge."

Read more of this story at Slashdot.

France IVF access: Protests feared over law change AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 8:01 pm)

The new law also covers other controversial issues such as stem cell research and some conservative groups worry it could be expanded in the future.
Google Finds Hundreds Of Data-Race Conditions In The Linux Kernel Slashdotby EditorDavid on google at January 1, 1970, 1:00 am (cached at October 5, 2019, 7:44 pm)

Google has been testing the Linux kernel with its "sanitizer" testing software that hunts for memory corruption bugs and undefined behaviors. Now Phoronix reports on Google's newest sanitizer: Kernel Concurrency Sanitizer (KCSAN) is focused on discovering data-race issues within the kernel code. This dynamic data-race detector is an alternative to the Kernel Thread Sanitizer. In their testing just last month, in two days they found over 300 unique data race conditions within the mainline kernel. There was a recent discussion about the Kernel Concurrency Sanitizer on the LKML.

Read more of this story at Slashdot.

Ethiopia's spring festival in capital after 150 years AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 7:36 pm)

The last few years of Irreecha celebrations, held outside Addis Ababa, have been marred by protests following a stampede at the festival in 2016 where the government says 50 people were killed.
Iran allows female fans to buy tickets for FIFA WC qualifier AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 7:05 pm)

Iran will allow 3,500 female football fans in the stands for a 2022 World Cup qualifier next week.
Iran allows female fans to buy tickets for FIFA WC qualifier AL JAZEERA ENGLISH (AJE)(cached at October 5, 2019, 7:05 pm)

Iran will allow 3,500 female football fans in the stands for a 2022 World Cup qualifier next week.
[no title] Scripting News(cached at October 5, 2019, 6:59 pm)

Why are we impeaching the president, big picture. Our system has gone off the rails, we've got a monarch in the White House. The second American revolution has the same goal as the first, to depose a king. And again, we have to change the rules so it won't happen again.
Chrome Promises 'No More Mixed Messages About HTTPS ' Slashdotby EditorDavid on chrome at January 1, 1970, 1:00 am (cached at October 5, 2019, 6:44 pm)

"Today we're announcing that Chrome will gradually start ensuring that https:// pages can only load secure https:// subresources," promises an announcement on the Chromium blog. It notes that Chrome users already make HTTPS connections for more than 90% of their browsing time, and "we're now turning our attention to making sure that HTTPS configurations across the web are secure and up-to-date." In a series of steps outlined below, we'll start blocking mixed content (insecure http:// subresources on https:// pages) by default. This change will improve user privacy and security on the web, and present a clearer browser security UX to users... HTTPS pages commonly suffer from a problem called mixed content, where subresources on the page are loaded insecurely over http://. Browsers block many types of mixed content by default, like scripts and iframes, but images, audio, and video are still allowed to load, which threatens users' privacy and security. For example, an attacker could tamper with a mixed image of a stock chart to mislead investors, or inject a tracking cookie into a mixed resource load. Loading mixed content also leads to a confusing browser security UX, where the page is presented as neither secure nor insecure but somewhere in between. In a series of steps starting in Chrome 79, Chrome will gradually move to blocking all mixed content by default. To minimize breakage, we will autoupgrade mixed resources to https://, so sites will continue to work if their subresources are already available over https://. Users will be able to enable a setting to opt out of mixed content blocking on particular websites... Starting in December of 2019, Chrome 79 will include a new setting to unblock mixed content on specific sites. "This setting will apply to mixed scripts, iframes, and other types of content that Chrome currently blocks by default..." Then in Chrome 80, mixed audio and video resources will be autoupgraded to https://, and if they fail to load Chrome will block them by default.

Read more of this story at Slashdot.