[Burichan] [Futaba] [Photon] [Tinyboard] [Tinyboard B] - [Home] [Manage]

Leave these fields empty (spam trap):
Name
Subject
Comment
File
Password (for post and file deletion)
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 3000 KB.
  • Images greater than 200x200 pixels will be thumbnailed.
 

File: 1425137719918.jpg -(84.61 kB, 550x404)
86638 No.13629   [Reply]

"The Air Force urgently needs a new long-range bomber to replace its aging fleet and will keep costs at or below a $550 million cap for each warplane, top U.S. officials told lawmakers on Friday.

Air Force Secretary Deborah James said the Air Force understood that runaway costs had to be contained, and noted that a sharp reduction from the planned purchase of 80 to 100 bombers would send the price of each aircraft spiraling higher.

"We've kind of learned some lessons from the not-too-distant past about what happens when you don't keep stressing affordability, affordability, affordability," James told the defense subcommittee of the House Appropriations Committee."

http://news.yahoo.com/u-air-force-says-bomber-essential-vows-control-212634788--finance.html



File: 1424963084469.jpg -(155.98 kB, 500x344)
159720 No.13628   [Reply]

"Western powers are preparing what they say may be their most potent weapon against Moscow's interference in Ukraine - a multi billion dollar aid package to rebuild a near-bankrupt state and realize the European dream cherished by many Ukrainians.

There is just one problem: foreign governments and international financing institutions are not willing to pour money into a dysfunctional state. Only this week the businessman brought in by the new authorities to clean up the tax service was himself suspended pending a corruption inquiry.

Donors say the former Soviet republic, crippled by war and corruption, is unable or unwilling even to identify how many roads, power plants and schools its 45 million people need, let alone meet new European standards for farms and factories.

"There's strong resistance because many people in various ways benefited from the old, inefficient and largely corrupt system," said Kalman Mizsei, the head of the EU's advisory mission to Ukraine.

Ukraine is one of the world's most corrupt places, ranking as 142 out of 175 in Transparency International's corruption perception index."

Comment too long. Click here to view the full text.


File: 1424873624098.jpg -(59.74 kB, 500x444)
61171 No.13627   [Reply]

"Three Los Angeles police officers who fatally shot an unarmed man after a televised car chase in 2013 will not face charges over the killing, prosecutors said on Monday, in a case that has drawn criticism from the department's police chief.

The news was contained in a letter dated Jan. 29 and released by the Los Angeles County District Attorney's Office. It came as national scrutiny over police killings of unarmed people remains high after several high-profile deaths.

The three Los Angeles officers said they thought 51-year-old Brian Beaird, who was white, was reaching for a gun or shooting at them when they fired on him 21 times on Dec. 13, 2013."

http://news.yahoo.com/no-charges-los-angeles-officers-shot-unarmed-man-050051123.html



File: 1424872540709.jpg -(54.23 kB, 835x540)
55535 No.13626   [Reply]

"The Dutch Sim card maker at the centre of NSA-GCHQ hacking claims has said it believes that the US and UK cyberspy agencies did indeed launch attacks on its computer systems.

However, Gemalto denied that billions of mobile device encryption keys could have been stolen as a result.

The Intercept alleged last week that spies had obtained the "potential to secretly monitor" voice and data transmissions after hacking the firm.

Gemalto operates in 85 countries.

Its clients include AT&T, T-Mobile, Verizon and Sprint among more than 400 wireless network providers across the world.

GCHQ and the NSA have not commented directly on the allegations."

http://www.bbc.com/news/technology-31619907



File: 1424786892094.jpg -(106.90 kB, 496x500)
109470 No.13625   [Reply]

"Peanut allergy 'cut by early exposure'"

Comments

"Why does the BBC continue to only allow us to comment on stories that are hardly classed as news!"

http://www.bbc.com/news/health-31550816



File: 1424528201654.jpg -(118.93 kB, 1300x845)
121787 No.13624   [Reply]

"US and British intelligence agencies hacked into a major manufacturer of Sim cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says.

The Intercept says the revelations came from US intelligence contractor turned whistleblower Edward Snowden.

The Dutch company allegedly targeted - Gemalto - says it is taking the allegations "very seriously"."

http://www.bbc.com/news/technology-31545050



File: 1424443377481.jpg -(269.98 kB, 640x850)
276464 No.13623   [Reply]

"Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.

The critical threat is present on Lenovo PCs that have adware from a company called Superfish installed. As unsavory as many people find software that injects ads into Web pages, there's something much more nefarious about the Superfish package. It installs a self-signed root HTTPS certificate that can intercept encrypted traffic for every website a user visits. When a user visits an HTTPS site, the site certificate is signed and controlled by Superfish and falsely represents itself as the official website certificate."

http://arstechnica.com/security/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/



File: 1424364010440.jpg -(48.20 kB, 600x193)
49359 No.13622   [Reply]

"US search engine giant Google has warned against increasing the government's powers for infiltrating computer systems around the world, saying it would open a number of "monumental" constitutional issues.

Google released a tough-sounding statement against the Department Justice (DoJ) proposal to make it easier for the courts to issue search warrants to seize electronic data ‘remotely’ from anywhere in the world.

Efforts to rewrite federal regulations, presently encoded in a government provision known as Rule 41, "raises a number of monumental and highly complex constitutional, legal, and geopolitical concerns that should be left to Congress to decide," wrote Richard Salgado, Google's director for law enforcement and information security.

Under Rule 41, the judge that authorizes the computer tap must be situated in the same district as the computer under investigation. The new proposal would allow the FBI to operate beyond the immediate judicial area of the presiding judge.

Google warned in its statement that if the DoJ gets its way, the FBI will be authorized to hack into servers regardless of their geopolitical location, thus giving the US government unrestrained access to endless amounts of personal data around the globe."

Comment too long. Click here to view the full text.


File: 1424362483250.jpg -(56.22 kB, 600x390)
57568 No.13621   [Reply]

"An Australian former Guantanamo Bay detainee said on Thursday after a U.S. military appeals court threw out his conviction on a terrorism charge that he wants his government to pay for treatment of ailments resulting from torture.

David Hicks, who spent five years in the U.S. detention camp in Cuba, said he had not yet decided whether to seek broader compensation in Australia."

http://news.yahoo.com/australian-held-guantanamo-says-tortured-5-years-032120261.html



File: 1424183115250.jpg -(152.71 kB, 1016x632)
156376 No.13620   [Reply]

"A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

Kaspersky Lab released a report Monday that said the tools were created by the "Equation" group, which it stopped short of linking to the U.S. National Security Agency.

The tools, exploits and malware used by the group -- named after its penchant for encryption -- have strong similarities with NSA techniques described in top-secret documents leaked in 2013.

Countries hit the most by Equation include Iran, Russia, Pakistan, Afghanistan, India and China. Targets in those countries included the military, telecommunications, embassies, government, research institutions and Islamic scholars, Kaspersky said.

Kaspersky's most striking finding is Equation's ability to infect the firmware of a hard drive, or the low-level code that acts as an interface between hardware and software.

Comment too long. Click here to view the full text.


Delete Post []
Password
Previous [0] [1] [2] [3]