posted 3 days ago on slashdot
randomErr writes from a report via Business Insider (alternate source): Ethereum, the rival to bitcoin, has been on a tear. Its founders said the latest trend in the cryptocurrency space may not be as good for the cryptocurrency as some might think. Ethereum is up 1,700% over the last year, and that spike has occurred in tandem with the growth of the hottest new trend in fundraising: initial coin offerings. Approximately $1.2 billion has been raised by the new cryptocurrency-based capital raising method this year, according to Autonomous Next, a financial technology analytics service. It is a trend that has sparked excitement across Wall Street. But the cofounder of the company behind the cryptocurrency, Charles Hoskinson, told Bloomberg that initial coin offerings may not benefit Ethereum. "People say ICOs are great for ethereum because, look at the price, but it's a ticking time-bomb," said Hoskinson. "There's an over-tokenization of things as companies are issuing tokens when the same tasks can be achieved with existing blockchains. People are blinded by fast and easy money."

Read More...
posted 3 days ago on slashdot
After 3 months, Samsung announced that the voice capabilities of its digital assistant are now rolling out to U.S. Galaxy S8 and S8+ owners. Now, if you happen to own a Galaxy S8 or S8+, the physical Bixby button on the lefthand side of your phone will be able to actually do something somewhat useful. The Verge reports: Bixby's voice capabilities have been available in the US as part of an opt-in beta test, and Samsung says that feedback has led to faster response times, improved comprehension of varied phrasing around the same question, better hands-free operation, and more. Over 100,000 users of the flagship devices have enrolled in the early access program and issued over 4 million voice commands. Also, Samsung says Bixby can now read aloud your latest SMS messages and emails -- if you use its stock apps on the Galaxy S8. Bixby can be activated with a push of the dedicated Bixby button located on the side of the Galaxy S8 and S8+, or by saying "hi Bixby." Like Siri and Google Assistant, Bixby can handle alarms, send texts, and so on, but its real power lies in the ability to access granular phone settings or -- in supported apps -- automatically move through several menu screens to perform commands that Google Assistant simply can't do. Samsung says that deep learning should allow Bixby to improve over time as it begins to recognize users' preferences and ways of speaking. Here's a video showing some of the voice commands Bixby can respond to.

Read More...
posted 3 days ago on slashdot
An anonymous reader quotes a report from Bleeping Computer: An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. The hack was possible due to a flaw in the Parity Ethereum client. The vulnerability allowed the hacker to exfiltrate funds from multi-sig wallets created with Parity clients 1.5 and later. Parity 1.5 was released on January 19, 2017. The attack took place around 19:00-20:00 UTC and was immediately spotted by Parity, a company founded by Gavin Wood, Ethereum's founder. The company issued a security alert on its blog. The Ether stolen from Parity multi-sig accounts was transferred into this Ethereum wallet, currently holding 153,017.021336727 Ether. Because Parity spotted the attack in time, a group named "The White Hat Group" used the same vulnerability to drain the rest of Ether stored in other Parity wallets that have not yet been stolen by the hacker. This money now resides in this Ethereum wallet. According to messages posted on Reddit and in a Gitter chat, The White Hat Group appears to be formed of security researchers and members of the Ethereum Project that have taken it into their own hands to secure funds in vulnerable wallets. Based on a message the group posted online, they plan to return the funds they took. Their wallet currently holds 377,116.819319439311671493 Ether, which is over $76 million.

Read More...
posted 3 days ago on slashdot
schwit1 shares a report from CNN: In the sometimes hostile waters of the Persian Gulf looms the U.S. Navy's first -- in fact, the world's first -- active laser weapon. The LaWS, an acronym for Laser Weapons System, is not science fiction. It is not experimental. It is deployed on board the USS Ponce amphibious transport ship, ready to be fired at targets today and every day by Capt. Christopher Wells and his crew. It costs "about a dollar a shot" to fire, said Lt. Cale Hughes, laser weapons system officer. LaWS begins with an advantage no other weapon ever invented comes even close to matching. It moves, by definition, at the speed of light. For comparison, that is 50,000 times the speed of an incoming ICBM. For the test, the USS Ponce crew launched the target -- a drone aircraft, a weapon in increasing use by Iran, North Korea, China, Russia and other adversaries. In an instant, the drone's wing lit up, heated to a temperature of thousands of degrees, lethally damaging the aircraft and sending it hurtling down to the sea. "It operates in an invisible part of the electromagnetic spectrum so you don't see the beam, it doesn't make any sound, it's completely silent and it's incredibly effective at what it does," said Hughes.

Read More...
posted 3 days ago on slashdot
New submitter sarbonn writes: Facebook is testing whether or not it can start charging for stories by placing a paywall that appears after ten stories have been viewed from one of its media sources. An interesting takeaway is that Facebook would like to do this by avoiding the mandatory 30 percent cut that Apple and Google get from their stores by going around their app stores. This is being targeted for around October. The news comes from Campbell Brown, who heads Facebook's new partnerships business. "We are in early talks with several news publishers about how we might better support subscription business models on Facebook. As part of the Facebook Journalism Project, we are taking the time to work closely together with our partners and understand their needs," Brown told TechCrunch in a statement via a spokesperson.

Read More...
posted 3 days ago on slashdot
An anonymous reader quotes a report from The Verge: In a recent report, Russia-24, a state-owned news channel, suggests that fidget spinners are being used by Russian opposition parties in order to recruit young people. As reported by The New York Times, the reporters in Russia-24's initial story say, "It is a mystery why it has become so popular in Russia right now. Who is promoting this to the masses so actively?" The video segment says the toys were being distributed at a rally for opposition leader Alexei Navalny and in online ads that direct viewers to YouTube channels that promote opposition politicians. The reporters said that while the toy's popularity was declining in the West, fidget spinners are more popular than ever in Russia. "As you can see here there is only writing in English, on the other side there is not a word in Russian," says one of the show's anchors during the report, presenting a new spinner in its packaging to the camera. According to Newsweek, a second report on Russia-24 also aired on July 12th, directly saying fidget spinners were an "object for zombifying" and a form of "hypnosis." The program featured a report from psychologist Svetlana Filatova, claiming that the spinners could help dexterity in children but otherwise "dulls" people's minds. The reports spurred Russia's consumer protection agency, Rospotrebnadzor, into action, saying on Tuesday they would launch an investigation into the toy.

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: According to a confidential document obtained by Motherboard, wireless communications lobby group CTIA took issue with an in-depth report by the Department of Homeland Security on mobile device security, including flaws with the SS7 network. In a white paper sent to members of Congress and the Department of Homeland Security, CTIA, a telecom lobbying group that represents Verizon, AT&T, and other wireless carriers, argued that "Congress and the Administration should reject the [DHS] Report's call for greater regulation" while downplaying "theoretical" security vulnerabilities in a mobile data network that hackers may be able to use to monitor phones across the globe, according to the confidential document obtained by Motherboard. However, experts strongly disagree about the threat these vulnerabilities pose, saying the flaws should be taken seriously before criminals exploit them. SS7, a network and protocol often used to route messages when a user is roaming outside their provider's coverage, is exploited by criminals and surveillance companies to track targets, intercept phone calls or sweep up text messages. In some cases, criminals have used SS7 attacks to obtain bank account two-factor authentication tokens, and last year, California Rep. Ted Lieu said that, for hackers, "the applications for this vulnerability are seemingly limitless."

Read More...
posted 3 days ago on slashdot
Earlier this week, Comcast filed its comments in favor of the FCC's plan to eliminate the 2015 net neutrality rules. While much of the document was devoted to arguments we've heard before -- Comcast believes the current rules are anti-competitive and hurt investment, but generally supports the principles of net neutrality -- one statement stood out. The Verge adds: Buried in the 161-page document was this quirky assertion (emphasis ours): "At the same time, the Commission also should bear in mind that a more flexible approach to prioritization may be warranted and may be beneficial to the public... And paid prioritization may have other compelling applications in telemedicine. Likewise, for autonomous vehicles that may require instantaneous data transmission, black letter prohibitions on paid prioritization may actually stifle innovation instead of encouraging it. In other words, Comcast is arguing for paid prioritization and internet fast lanes to enable self-driving cars to communicate better with other vehicles and their surrounding environment, thus making them a safer and more efficient mode of transportation. The only problem is that autonomous and connected cars don't use wireless broadband to communicate. When cars talk with each other, they do it by exchanging data wirelessly over an unlicensed spectrum called the Dedicated Short Range Communications (DSRC) band, using technology similar to Wi-Fi. The FCC has set aside spectrum in the 5.9GHz band specifically for this purpose, and it is only meant to be used for vehicle-to-everything (V2X) applications. That includes vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-pedestrian (V2P) -- so cars talking to other cars, to traffic signals, to the phone in your pocket... you name it. Soon enough, all cars sold in the US will be required to include V2V technology for safety purposes, if the Department of Transportationâ(TM)s new rule goes into effect.

Read More...
posted 3 days ago on slashdot
The European Union's top court is set to decide whether the bloc's "right to be forgotten" policy stretches beyond Europe's borders, a test of how far national laws can -- or should -- stretch when regulating cyberspace. From a report: The case stems from France, where the highest administrative court on Wednesday asked the EU's Court of Justice to weigh in on a dispute between Alphabet's Google and France's privacy regulator over how broadly to apply the right (Editor's note: the link could be paywalled; alternative source), which allows EU residents to ask search engines to remove some links from searches for their own names. At issue: Can France force Google to apply it not just to searches in Europe, but anywhere in the world? The case will set a precedent for how far EU regulators can go in enforcing the bloc's strict new privacy law. It will also help define Europe's position on clashes between governments over how to regulate everything that happens on the internet -- from political debate to online commerce. France's regulator says enforcement of some fundamental rights -- like personal privacy -- is too easily circumvented on the borderless internet, and so must be implemented everywhere. Google argues that allowing any one country to apply its rules globally risks upsetting international law and, when it comes to content, creates a global censorship race among autocrats.

Read More...
posted 3 days ago on slashdot
Software companies are seeking to exploit the current artificial intelligence craze by "AI washing" -- exaggerating the role of AI in their products, according to a new report by Gartner, the research firm. From a report: Gartner, which tracks commercial manias through a tool it calls the Hype Cycle, compares what is currently going on in AI with a prior surge in environmental over-statement -- "greenwashing, in which companies exaggerate the environmental-friendliness of their products or practices for business benefit." The bottom line: More than 1,000 vendors say their products employ AI, but many are "applying the AI label a little too indiscriminately," Gartner says in its report. Kriti Sharma, who runs the AI team at Sage, tells Axios that a lot of companies are seeking to solve problems using AI that would be better done by humans. And what is often called AI "is just automation that you are doing," she said.

Read More...
posted 3 days ago on slashdot
An anonymous reader tips us a story: Just two years ago, Microsoft cast its Wilsonville factory as the harbinger of a new era in American technology manufacturing. The tech giant stamped, "Manufactured in Portland, OR, USA" on each Surface Hub it made there. It invited The New York Times and Fast Company magazine to tour the plant in 2015, then hired more than 100 people to make the enormous, $22,000 touch-screen computer. But last week Microsoft summoned its Wilsonville employees to an early-morning meeting and announced it will close the factory and lay off 124 employees -- nearly everyone at the site -- plus dozens of contract workers. Panos Panay, the vice president in charge of the Surface product group, traveled from corporate headquarters in Redmond, Washington, to tell the staff that Microsoft was moving production to the same place it makes all other Surface products. Though workers present say he didn't disclose the location, Microsoft has previously said it makes its other Surface computers in China. The company hasn't explained, in public or to its Wilsonville employees, why it gave up on domestic manufacturing so quickly and didn't respond to repeated inquiries for comment. But the only thing surprising about Microsoft's decision is that it tried to make its computers in the U.S. in the first place.

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: India's massive diesel-guzzling railway network is getting serious about its experiments with solar. On July 14, Indian Railways rolled out its first train with rooftop solar panels that power the lights, fans, and information display systems inside passenger coaches. Although the train will still be pulled by a diesel-powered locomotive, a set of 16 solar panels atop each coach will replace the diesel generators that typically power these appliances. The railways estimate that a train with six solar-powered coaches could save around 21,000 litres (5,547 gallons) of diesel every year, worth around $108,000. In 2014, Indian Railways consumed 2.6 billion litres of diesel, accounting for around 70% to the network's total fuel bill of $4.4 billion. The first of these trains will be pressed into service on the suburban railway network of New Delhi, one of the world's most polluted cities, before two dozen more coaches are fitted with similar rooftop solar systems. Retrofitting each coach with these system, including an inverter to optimise power generation and battery for storing surplus power, costs around $14,000.

Read More...
posted 3 days ago on slashdot
Ina Fried, reporting for Axios: Intel has been traveling the country this year, broadcasting one major league game a week in virtual reality. On Tuesday, the company's crew was close to home as the San Francisco Giants defeated the Cleveland Indians 2-1 in extra innings. How it works: The games are free to watch, but require the person to have a Samsung phone and Gear VR headset. To broadcast a game in VR, Intel has camera rigs on the first and third base side, as well as the traditional "deep home" shot. It also aims to have an additional camera or two in a spot unique to each stadium. In Arizona, for example, it has one near the stadium's swimming pool. Each camera setup has six pairs of cameras to capture high-definition footage in 180 degrees. In the parking lot, meanwhile, separate teams work in two adjoining vans. One group works on the sound and stitches the images together, while a second van houses a more traditional broadcast setup, including play-by-play announcer J.B. Long. Tweaking the product: Still new at this, Intel is constantly adding new tricks to its arsenal. Last night's game, for example, was the first time the company added real-time VR graphics to the mix, showing baseball cards with stats above the players. Intel CEO has said he wants VR sports to be a billion dollar business for the company.

Read More...
posted 3 days ago on slashdot
AMD has faced calls from Edward Snowden, Libreboot and the Reddit community to release the source code to the AMD Secure Processor (PSP), a network-capable co-processor which some believe has the capacity to act as a backdoor. But despite some signs earlier that it might consider opening the PSP code at some point, the chip-maker has now confirmed that there hasn't been a change of heart yet. "We have no plans on releasing it to the public," the company executives said in a tech talk (video).

Read More...
posted 3 days ago on slashdot
An anonymous reader writes: Security firm Avast has acquired software firm Piriform. Not only does the acquired company make CCleaner, but many other solid programs too. In fact, the rest of Piriform's library -- Recuva, Speccy, and Defraggler -- are staples of the Windows freeware community. "CCleaner is a leading brand in the market, used by 130 million people, including 15 million Android users. CCleaner has an extensive and extremely loyal community of tech-savvy users, who need to speed up and optimize their PC and Android experience. Avast will maintain the CCleaner brand of products along with Avast's existing performance optimization products, Avast Cleanup and AVG Tune Up. With the addition of CCleaner, Avast has dramatically expanded its product offerings in the PC and smartphone optimization market reaching customers around the world who demand faster performance," says Avast. Vince Steckler, CEO of Avast explains, "We see many commonalities between CCleaner and Avast, allowing for great new products for our user bases. Avast and CCleaner are the top two downloaded products on popular download sites. They are both known by advanced users as focused on performance, so we believe there will be a great interest from our CCleaner customers in using Avast security products and vice versa. In today's connected world, it's all about speed and high performance, and with Piriform's robust technology we can address this need perfectly. We look forward to working with the Piriform team to grow the business together."

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: Apple's iPhone has been losing ground to domestic competitors in China. That is because Chinese smartphone makers offer sophisticated functions at reasonable prices, according to Steve Wozniak, Apple co-founder and one of the pioneers of the personal computer industry. "Here is what I admire about Chinese phones: really good, intelligent decisions about how to lower the cost but keep enough of the functionality in, because I am into products that are good, well designed, nice looking, but at prices that the average person can afford," he said. Still, Wozniak believes the quality of Apple's product makes it worth the high price tag. "In life I don't believe in quantity as much as I do in quality. So you may not have the hugest share in the market or be the No 1, but you should have the best product you can possibly build and Apple qualifies for that," Wozniak, told reporters after he discussed artificial intelligence with Liu Zihong, chairman and chied executive of Royole, in a technology forum held at Tianan Cyber Park in Dongguan, Guangdong province, on Tuesday. Unlike Chinese smartphone brands that prioritise cost-effectiveness, Apple's popular and more expensive iPhone handsets are still the leader in innovation in certain features despite being more of a "safe product," he said. "Apple products are safe. And Apple's pricing is high in the extreme. It's a safe bet for a lot of people, and when you love Apple you are willing to pay for it," he said.

Read More...
posted 3 days ago on slashdot
An anonymous reader quotes a report from Neowin: A new strain of malware designed for Android devices has recently been discovered, which not only can silently record audio and video, but can also monitor texts and calls, modify files, and ultimately spawn ransomware. Dubbed as 'GhostCtrl' by researchers over at Trend Micro, the malware is apparently a variant of OmniRAT, a remote administration tool for Android, which is available to the public. It also appears to be part of a wider campaign that targeted Israeli hospitals, where a worm called RETADUP surfaced back in June. According to the report, there are three versions of the malicious software. The first variant stole information and controlled a device's functionalities, while the second added new features to exploit. The third one combines all the features of the old versions, and adds even more malicious components into its system. The latest iteration of GhostCtrl can now monitor call logs, text messages, contacts, phone numbers, location, and browsing history. Furthermore, it has the ability to record the victim's Android version, battery level, and Bluetooth information. To make make matters worse, it can now also spy on unsuspecting victims by silently recording audio and video. The malware distributes itself via illegitimate apps for WhatsApp or Pokemon GO. Trend Micro suggests you keep your Android devices up to date and data backed up regularly. They also recommend using an app reputation system that can detect suspicious and malicious apps.

Read More...
posted 3 days ago on slashdot
French trolley-maker Navya announced its first manufacturing facility in North America. The company will build a 20,000 square foot facility for the construction of its self-driving trolley, the Arma. "It aims to construct 25 vehicles there this year," reports Observer. "It has 45 vehicles deployed around the world already. These robots have a max speed of about 27 miles per hour, but typically travel more like 12 miles per hour (the speed of a typical bike ride). Each one can transport about 15 people." From the report: The plant will be built in Saline, Michigan, a suburban town just south of Ann Arbor with a population of less than 9,000. The Michigan Economic Development Corporation estimates that the plant will support 50 new jobs. "As the greater Ann Arbor area continues to establish itself as a hub for autonomous vehicle development, we feel it's the perfect location for us. Strong government and community support for mobility initiatives combined with an excellent talent pool provide the ideal environment for our expansion in North America," Navya CEO Christophe Sapet said in a press release. "I have no doubt that they will become an important and valued member of our already stellar business community," Brian Marl, Saline's mayor, said in a release.

Read More...
posted 3 days ago on slashdot
bongey writes: T-Rex would have a hard time even catching an average human running, much less Usain Bolt or Jeeps, without shattering their legs into pieces. New research based on simulations that include the load on the bones show that T-Rex would have a hard time running faster than 12 miles per hour (5.4 meters per second) without bones breaking. The new research correlates to speeds calculated from adolescence sized T-Rex dinosaur footprints in 2016, which showed walking speeds to be only 2-5mph, and estimated running speeds 11-18 mph. Gizmodo notes that while T. rex was unable to pursue its prey at high speeds, high speed is a relative term. "For reference, typical humans can sprint anywhere between eight to 15 miles per hour (elite athletes can exceed 20 mph). So to outrun a T. rex, many animals -- or fictional humans -- would still have to run like hell."

Read More...
posted 3 days ago on slashdot
schwit1 shares a report from ProPublica: Hospitals and pharmacies are required to toss expired drugs, no matter how expensive or vital. Meanwhile the FDA has long known that many remain safe and potent for years longer. The box of prescription drugs had been forgotten in a back closet of a retail pharmacy for so long that some of the pills predated the 1969 moon landing. Most were 30 to 40 years past their expiration dates -- possibly toxic, probably worthless. But to Lee Cantrell, who helps run the California Poison Control System, the cache was an opportunity to answer an enduring question about the actual shelf life of drugs: Could these drugs from the bell-bottom era still be potent? Gerona and Cantrell, a pharmacist and toxicologist, knew that the term "expiration date" was a misnomer. The dates on drug labels are simply the point up to which the Food and Drug Administration and pharmaceutical companies guarantee their effectiveness, typically at two or three years. But the dates don't necessarily mean they're ineffective immediately after they "expire" -- just that there's no incentive for drugmakers to study whether they could still be usable. Tests on the decades-old drugs including antihistamines, pain relievers and stimulants. All the drugs tested were in their original sealed containers. The findings surprised both researchers: A dozen of the 14 compounds were still as potent as they were when they were manufactured, some at almost 100 percent of their labeled concentrations. Experts say the United States might be squandering a quarter of the money spent on health care. That's an estimated $765 billion a year.

Read More...
posted 4 days ago on slashdot
turkeydance writes: In Oregon, a state known for its avid bicycling culture, the state legislature's approval of the first bike tax in the nation has fallen flat with riders. Democratic Gov. Kate Brown is expected to sign the sweeping $5.3 billion transportation package, which includes a $15 excise tax on the sale of bicycles costing more than $200 with a wheel diameter of at least 26 inches. Even though the funding has been earmarked for improvements that will benefit cyclists, the tax has managed to irk both anti-tax Republicans and environmentally conscious bikers. The bike tax is aimed at raising $1.2 million per year in order to improve and expand paths and trails for bicyclists and pedestrians. Supporters point out that Oregon has no sales tax, which means buyers won't be dinged twice for their new wheels.

Read More...
posted 4 days ago on slashdot
The OnePlus 5, dubbed "the best sub-$500 phone you can buy" when it launched, is having a few problems. Earlier this month, some owners of the new device complained about a weird jelly-like effect that appears when scrolling through apps. OnePlus went on to claim that the effect is normal and not the result of any manufacturing issues. Now, a handful of users are reporting that the OnePlus 5 will reboot itself once 911 is called, preventing them from reaching emergency services. The Verge reports: Reddit user Nick Morrelli noticed the glitch after he tried to call 911 to report a building fire in Seattle, and other users have reported that the OnePlus 5 is unable to dial 911 (or 999 in the UK, as another user reported) without rebooting. While most users haven't reported having the issue, any percentage of devices not being able to reach emergency services is a major issue for OnePlus. In a statement to The Verge, OnePlus says it's looking into the problem. "We have contacted the customer and are currently looking into the issue. We ask anyone experiencing a similar situation to contact us at [email protected]"

Read More...
posted 4 days ago on slashdot
New submitter thegreatbob writes: Perhaps you've noticed in the last 5 years or so, progressively more entities have been providing the ability to reveal the contents of a password field. While this ability is, in many cases (especially on devices with lousy keyboards), legitimately useful, it does seem to be a reasonable source of concern. Fast forward to today; I was setting up a new router (cheapest dual-band router money can, from Tenda) and I was almost horrified to discover that it does not mask any of its passwords by default. So I ask Slashdot: is password masking really on its way out, and does password masking do anything beyond preventing the casual shoulder-surfer?

Read More...
posted 4 days ago on slashdot
An anonymous reader quotes a report from Ars Technica: The Federal Communications Commission has denied a request to extend the deadline for filing public comments on its plan to overturn net neutrality rules, and the FCC is refusing to release the text of more than 40,000 net neutrality complaints that it has received since June 2015. The National Hispanic Media Coalition (NHMC) filed a Freedom of Information Act (FoIA) request in May of this year for tens of thousands of net neutrality complaints that Internet users filed against their ISPs. The NHMC argues that the details of these complaints are crucial for analyzing FCC Chairman Ajit Pai's proposal to overturn net neutrality rules. The coalition also asked the FCC to extend the initial comment deadline until 60 days after the commission fully complies with the FoIA request. A deadline extension would have given people more time to file public comments on the plan to eliminate net neutrality rules. Instead, the FCC yesterday denied the motion for an extension and said that it will only provide the text for a fraction of the complaints, because providing them all would be too burdensome.

Read More...
posted 4 days ago on slashdot
chicksdaddy provides five (or more) "good" reasons why we should ignore the South Carolina election hacking story that was reported yesterday. According to yesterday's reports, South Carolina's voter-registration system was hit with nearly 150,000 hack attempts on election day. Slashdot reader chicksdaddy writes from an opinion piece via The Security Ledger: What should we make of the latest reports from WSJ, The Hill, etc. that South Carolina's election systems were bombarded with 150,000 hacking attempts? Not much, argues Security Ledger in a news analysis that argues there are lots of good reasons to ignore this story, if not the very real problem of election hacking. The stories were based on this report from The South Carolina Election Commission. The key phrase in that report is "attempts to penetrate," Security Ledger notes. Information security professionals would refer to that by more mundane terms like "port scans" or probes. These are kind of the "dog bites man" stories of the cyber beat -- common (here's one from 2012 US News & World Report) but ill informed. "The kinds of undifferentiated scans that the report is talking about are the internet equivalent of people driving slowly past your house." While some of those 150,000 attempts may well be attempts to hack South Carolina's elections systems, many are undifferentiated, while some may be legitimate, if misdirected. Whatever the case, they're background noise on the internet and hardly unique to South Carolina's voter registration systems. They're certainly not evidence of sophisticated, nation-state efforts to crack the U.S. election system by Russia, China or anyone else, Security Ledger argues. "The problem with lumping all these 'hacking attempts' in the same breath as you talk about sophisticated and targeted attacks on the Clinton Campaign, the DCCC, and successful penetration of some state election boards is that it dramatically distorts the nature and scope of the threat to the U.S. election system which -- again -- is very real." The election story is one "that demands thoughtful and pointed reporting that can explore (and explode) efforts by foreign actors to subvert the U.S. vote and thus its democracy," the piece goes on to argue. "That's especially true in an environment in which regulators and elected officials seem strangely incurious about such incidents and disinclined to investigate them."

Read More...