DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
Games

One in Five Mobile Phones Shipped Abroad Are Phoney (theregister.co.uk) 28

Nearly one-fifth of mobile phones and one-quarter of video game consoles shipped abroad are fake, according to a report by the the Organisation for Economic Co-operation and Development (OECD). The Register adds: The Trade in Counterfeit ICT Goods report, published ahead of the 2017 OECD Global Anti-Corruption and Integrity Forum this month, identified a growing trend in fake goods. Smartphone batteries, chargers, memory cards, magnetic stripe cards, solid state drives and music players are also increasingly falling prey to counterfeiters. On average, 6.5 per cent of global trade in ICT goods is in counterfeit products, according to analysis of 2013 customs data, that is up from 2.5 per cent of overall traded goods found to be fake in a 2016 report. China is the primary source of fake ICT goods, and US manufacturers are the worst affected by lost revenue and erosion of brand value, the report said. Almost 43 per cent of seized fake ICT goods infringe the IP rights of US firms, followed by 25 per cent for Finnish firms and 12 per cent for Japanese firms.
Businesses

DJI Proposes New Electronic 'License Plate' For Drones (digitaltrends.com) 98

linuxwrangler writes: Chinese drone maker DJI proposed that drones be required to transmit a unique identifier to assist law enforcement to identify operators where necessary. Anyone with an appropriate receiver could receive the ID number, but the database linking the ID with the registered owner would only be available to government agencies. DJI likens this to a license plate on a car and offers it as a solution to a congressional mandate that the FAA develop methods to remotely identify drone operators. "The best solution is usually the simplest," DJI wrote in a white paper on the topic, which can be downloaded at this link. "The focus of the primary method for remote identification should be on a way for anyone concerned about a drone flight in close proximity to report an identifier number to the authorities, who would then have the tools to investigate the complaint without infringing on operator privacy. [...] No other technology is subject to mandatory industry-wide tracking and recording of its use, and we strongly urge against making UAS the first such technology. The case for such an Orwellian model has not been made. A networked system provides more information than needed, to people who don't require it, and exposes confidential business information in the process."
Government

Hong Kong Government Loses Laptops Containing Personal Data of 3.7 Million Voters (hongkongfp.com) 19

New submitter fatp writes: Hong Kong Free Press reports that the Registration and Electoral Office (REO) has lost two laptops containing the personal data of all 3.7 million voters after the chief executive election [on Sunday]. The REO said "the personal data was encrypted and there was no evidence that it had been leaked." Only 1,194 people had right to vote in the election.
China

Tesla Deal Boosts Chinese Presence in US Auto Tech (reuters.com) 60

From a Reuters report:China's Tencent has bought a 5 percent stake in U.S. electric car maker Tesla for $1.78 billion, the latest investment by a Chinese internet company in the potentially lucrative market for self-driving vehicles and related services. Tencent's investment, revealed in a U.S. regulatory filing, provides Tesla with an additional cash cushion as it prepares to launch its mass-market Model 3. Tesla's shares were up 2.9 percent at $277.03 in midday trading on Tuesday, enabling it to rival Ford as the second-most-valuable U.S. auto company behind General Motors. The deal expands Tencent's presence in an emerging investment sector that includes self-driving electric cars, which could enable such new modes of transportation as automated ride-sharing and delivery services, as well as ancillary services ranging from infotainment to e-commerce.
Government

After Healthcare Defeat, Can The Trump Administration Fix America's H-1B Visa Program? (bloomberg.com) 541

Friday the Trump administration suffered a political setback when divisions in the president's party halted a move to repeal healthcare policies passed in 2010. But if Trump hopes to turn his attention to how America's H-1B visa program is affecting technology workers, "time is running out," writes Slashdot reader pteddy. Bloomberg reports: [T]he application deadline for the most controversial visa program is the first week of April, which means new rules have to be in place for that batch of applicants or another year's worth of visas will be handed out under the existing guidelines... There probably isn't enough time to pass legislation on such a contentious issue. But Trump could sign an executive order with some changes. The article points out that under the current system, one outsourcing firm was granted 6.5 times as many U.S. visas as Amazon. There's also an interesting map showing which countries' workers received the most H-1B visas in 2015 -- 69.4% went to workers in India, with another 10.5% going to China -- and a chart showing which positions are most in demand, indicating that two-thirds of the visa applications are for tech workers.
China

Microsoft Delivers Secure China-Only Cut of Windows 10 (theregister.co.uk) 98

Earlier this week, CEO of Microsoft Greater China, Alain Crozier, told China Daily that the company is ready to roll out a version of Windows 10 with extra security features demanded by China's government. "We have already developed the first version of the Windows 10 government secure system. It has been tested by three large enterprise customers," Crozier said. The Register reports: China used Edward Snowden's revelations to question whether western technology products could compromise its security. Policy responses included source code reviews for foreign vendors and requiring Chinese buyers to shop from an approved list of products. Microsoft, IBM and Intel all refused to submit source code for inspection, but Redmond and Big Blue have found other ways to get their code into China. IBM's route is a partnership with Dalian Wanda to bring its cloud behind the Great Firewall. Microsoft last year revealed its intention to build a version of Windows 10 for Chinese government users in partnership with state-owned company China Electronics Technology Group Corp. There's no reason to believe Crozier's remarks are incorrect, because Microsoft has a massive incentive to deliver a version of Windows 10 that China's government will accept. To understand why, consider that China's military has over two million active service personnel, the nation's railways employ similar numbers and Microsoft's partner China Electronics Technology Group Corp has more than 140,000 people on its books. Not all of those are going to need Windows, but plenty will.
China

China's Police Will Shoot Illegal Drones With Radio-Jamming Rifles (mashable.com) 62

"Police in China are being equipped with new high-tech weaponry to help them fight back against illegal drone use," writes new submitter drunkdrone. Mashable reports: A Chinese city's police department is arming itself with more than 20 drone-jamming rifles...which work by emitting radio signals that force the drones to land, purportedly without damaging them. The drone-killing rifles will be used during the upcoming 2017 Wuhan Marathon, to raise security. Wuhan police demonstrated the drone-killing rifles last week, where they shot down six drones, according to the Chutian Metropolitan Daily.
Each rifle costs $36,265, and has a range of 0.6 miles.
Robotics

America May Miss Out On the Next Industrial Revolution (theverge.com) 297

An anonymous reader quotes a report from The Verge: Robots are inevitably going to automate millions of jobs in the U.S. and around the world, but there's an even more complex scenario on the horizon, said roboticist Matt Rendall. In a talk Tuesday at SXSW, Rendall painted a picture of the future of robotic job displacement that focused less on automation and more on the realistic ways in which the robotics industry will reshape global manufacturing. The takeaway was that America, which has outsourced much of its manufacturing and lacks serious investment in industrial robotics, may miss out on the world's next radical shift in how goods are produced. That's because the robot makers -- as in, the robots that make the robots -- could play a key role in determining how automation expands across the globe. As the CEO of manufacturing robotics company Otto Motors, Rendall focuses on building fleets of warehouse bots that could eventually replace the many fulfillment workers who are hired by companies like Amazon. "The robots are coming," Rendall said. "After the Great Recession, there was a fundamental change in people's interest in automation. People started feeling the pain of high-cost labor and there's an appetite for automation that we haven't seen before." While Rendall described himself as one of the optimists, who believes automation will, in the long-term, improve society and help humans live better lives, he said there are changes afoot in the global manufacturing scene that could leave American industries in the dust. "China is tracking to be the No. 1 user in robots used in industrial manufacturing," he said, adding that the country is driving "an overwhelming amount" of growth. The difference, he added, is how China is responding to automation, which is by embracing it instead of shying away from it. This is in stark contrast to industrial advances of the previous century, like Ford's assembly line, that helped transform American industries into the most powerful on the planet.
China

NSA, DOE Say China's Supercomputing Advances Put US At Risk (computerworld.com) 130

dcblogs quotes a report from Computerworld: Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending. China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies. The report stems from a workshop held in September that was attended by 60 people, many scientists, 40 of whom work in government, with the balance representing industry and academia. "Meeting participants, especially those from industry, noted that it can be easy for Americans to draw the wrong conclusions about what HPC investments by China mean -- without considering China's motivations," the report states. "These participants stressed that their personal interactions with Chinese researchers and at supercomputing centers showed a mindset where computing is first and foremost a strategic capability for improving the country; for pulling a billion people out of poverty; for supporting companies that are looking to build better products, or bridges, or rail networks; for transitioning away from a role as a low-cost manufacturer for the world; for enabling the economy to move from 'Made in China' to 'Made by China.'"
Android

Malware Found Preinstalled On 38 Android Phones Used By 2 Companies (arstechnica.com) 54

An anonymous reader quotes a report from Ars Technica: An assortment of malware was found on 38 Android devices belonging to two unidentified companies. This is according to a blog post published Friday by Check Point Software Technologies, maker of a mobile threat prevention app. The malicious apps weren't part of the official ROM firmware supplied by the phone manufacturers but were added later somewhere along the supply chain. In six of the cases, the malware was installed to the ROM using system privileges, a technique that requires the firmware to be completely reinstalled for the phone to be disinfected. Most of the malicious apps were info stealers and programs that displayed ads on the phones. One malicious ad-display app, dubbed "Loki," gains powerful system privileges on the devices it infects. Another app was a mobile ransomware title known as "Slocker," which uses Tor to conceal the identity of its operators. Check Point didn't disclose the names of the companies that owned the infected phones. Padon said it's not clear if the two companies were specifically targeted or if the infections were part of a broader, more opportunistic campaign. The presence of ransomware and other easy-to-detect malware seems to suggest the latter. Check Point also doesn't know where the infected phones were obtained. One of the affected parties was a "large telecommunications company" and the other was a "multinational technology company."
Security

Nearly 200,000 Wi-Fi Cameras Are Open To Hacking (bleepingcomputer.com) 46

An anonymous reader quotes a report from BleepingComputer: What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking. The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors. Security researcher Pierre Kim says the firmware produced by this Chinese vendor comes with several flaws, which have all made their way down the line into the products of other companies that bought the white-label (unbranded) camera. In total, nearly 1,250 camera models based on the original camera are affected. At the heart of many of these issues is the GoAhead web server, which allows camera owners to manage their device via a web-based dashboard. According to Kim, the cameras are affected by a total of seven security flaws. Yesterday, Kim said that around 185,000 vulnerable cameras could be easily identified via Shodan. Today, the same query yields 198,500 vulnerable cameras. Proof-of-concept exploit code for each of the seven flaws is available on Kim's blog, along with a list of all the 1,250+ vulnerable camera models.
China

China Developing Manned Space Mission To the Moon 149

China is building a manned spacecraft capable of sending astronauts to the moon as well as near-Earth orbit flight, according to Chinese state media. From a report on CNBC: The official newspaper of the Ministry of Science and Technology of China cited system chief architect Zhang Bainan who claimed the craft is being designed to carry as many as six astronauts. The newspaper, Science and Technology Daily, quoted Zhang Bainan as saying China wished to catch up with international standards of space exploration. The fresh announcement follows a separate Chinese ambition to bring back samples from the moon before the end of this year.
China

China Expresses Concern at Revelations in Wikileaks Dump of Hacked CIA Data (reuters.com) 122

China has expressed concern over revelations in a trove of data released by Wikileaks purporting to show that the CIA can hack all manner of devices, including those made by Chinese companies. From a report on Reuters: Dozens of firms rushed to contain the damage from possible security weak points following the anti-secrecy organization's revelations, although some said they needed more details of what the U.S. intelligence agency was up to. Widely-used routers from Silicon Valley-based Cisco were listed as targets, as were those supplied by Chinese vendors Huawei and ZTE and Taiwan supplier Zyxel for their devices used in China and Pakistan. "We urge the U.S. side to stop listening in, monitoring, stealing secrets and internet hacking against China and other countries," Chinese Foreign Ministry spokesman Geng Shuang told a daily news briefing.
Google

Google AMP Is Rolling Out For 1 Billion People In Asia-Pacific Region (meshrepublic.com) 48

meshrepublic shares a report: As per the latest announcement, Google AMP is rolling out for 1 billion people in Asia Pacific. Baidu and Sogou, which account for around 90% of the search market in China, made the announcement on the opening day of the first AMP developer conference which is taking place in New York. Also, Yahoo Japan will connect to AMP pages from their Search results. This will bring all the benefits of AMP to their 58m daily users in Japan. With the addition of these search giant's, means, a billion more people will be using Google Accelerated Mobile Pages. Per Google research, 70 percent of conventional mobile pages take seven to 10 seconds for visual page content to load. By comparison, AMP pages' load in less than one second, on average.
Businesses

China's ZTE Pleads Guilty, Will Pay $1.19 Billion For Violating US Trade Sanctions (reuters.com) 50

An anonymous reader quotes a report from Reuters: Chinese telecom equipment maker ZTE Corp will plead guilty and pay $1.19 billion ($892 million in the Iran case) to settle allegations it violated U.S. laws that restrict the sale of American-made technology to Iran and North Korea, the company and U.S. government agencies said on Tuesday. ZTE entered into an agreement to plead guilty to conspiring to violate the International Emergency Economic Powers Act, obstruction of justice and making a material false statement, the U.S. Justice Department said. The Commerce Department investigation followed reports by Reuters in 2012 that ZTE had signed contracts to ship millions of dollars worth of hardware and software from some of the best-known U.S. technology companies to Iran's largest telecoms carrier. Between January 2010 and January 2016, ZTE directly or indirectly shipped approximately $32 million of U.S.-origin items to Iran without obtaining the proper export licenses from the U.S. government. ZTE then lied to federal investigators during the investigation when it insisted that the shipments had stopped, Justice said. It also took actions involving 283 shipments of controlled items to North Korea, authorities said. Shipped items included routers, microprocessors and servers controlled under export regulations for security, encryption and anti-terrorism reasons.
China

Hidden Backdoor Discovered In Chinese IoT Devices (techradar.com) 85

"A backdoor has been found in devices made by a Chinese tech firm specializing in VoIP products," reports TechRadar. An anonymous reader quotes their article: Security outfit Trustwave made the discovery of a hidden backdoor in DblTek's devices which was apparently put there to allow the manufacturer access to said hardware -- but of course, it's also open to being exploited by other malicious parties. The backdoor is in the Telnet admin interface of DblTek-branded devices, and potentially allows an attacker to remotely open a shell with root privileges on the target device.

What's perhaps even more worrying is that when Trustwave contacted DblTek regarding the backdoor last autumn -- multiple times -- patched firmware was eventually released at the end of December. However, rather than removing the flaw, the vendor simply made it more difficult to access and exploit. And further correspondence with the Chinese company has apparently fallen on deaf ears.

The firmware with the hole "is present on almost every GSM-to-VoIP device which DblTek makes," and Trustwave "found hundreds of these devices on the net, and many other brands which use the same firmware, so are equally open to exploit."
Cellphones

Jolla Sailfish Will Build A Google-Free Mobile OS For China (silicon.co.uk) 60

Jolla released their Android-free mobile Linux OS (Sailfish) on their own smartphones, "but has always intended to offer it to other manufacturers," according to Silicon. The next Sailfish smartphone was the Inex Aqua Fish, and people with Sony Xperia phones can now also run Sailfish through the Sony Open Devices Program. But their next big customer is the nation of China. Mickeycaskill quotes Silicon. The Sailfish China Consortium has gained the exclusive rights and license to develop a Chinese operating system based on Sailfish. Russia is also using Sailfish to build a national mobile OS in a bid to reduce its reliance on Western technology and reduce the risk of foreign surveillance. Jolla claimed that there have been many attempts to build a national OS on Android but these had been unsuccessful because of Google's control over the code.
One of the consortium's investors claims "several" major Chinese companies are already interested in joining them, adding "I have been closely following Sailfish OS development, and seen many Chinese projects fail, while Jolla's Sailfish OS has been steadily progressing. Sailfish OS is the only viable alternative for China."
Security

Anthem's Historic Data Breach: What We Still Don't Know 2 Years Later (axios.com) 25

In February 2015, health insurer Anthem said its database had been compromised, exposing personal information for 78.8 million people, including 60 million to 70 million of its current and former customers and employees. Two years later, much of how it happened, who did it, and what consequences Anthem will face remain unanswered. From a report: Anthem has not disclosed the value of its cyber insurance policy, which defrays some of the costs. The hackers were most likely working on behalf of a foreign government. Many security experts believe it was China, but that has not been proven yet. The FBI would not comment on the pending investigation. It's unclear if Anthem will face a federal penalty. It's by far the largest health care data breach, and the Department of Health and Human Services has imposed fines in the past. We don't know for sure that Anthem was fully protected from this type of attack, and a separate federal agency that had a contract with Anthem previously said the insurer did not have controls in place "to prevent rogue devices...from connecting to its networks." Class-action lawsuits are still pending, and fact-finding discovery ended in December. Anthem could escape big damages if people can't show concrete harm.
Businesses

NSA Risks Talent Exodus Amid Morale Slump, Trump Fears (reuters.com) 251

Dustin Volz and Warren Strobel, writing for Reuters: The National Security Agency risks a brain-drain of hackers and cyber spies due to a tumultuous reorganization and worries about the acrimonious relationship between the intelligence community and President Donald Trump, according to current and former NSA officials and cybersecurity industry sources. Half-a-dozen cybersecurity executives told Reuters they had witnessed a marked increase in the number of U.S. intelligence officers and government contractors seeking employment in the private sector since Trump took office on Jan. 20. One of the executives, who would speak only on condition of anonymity, said he was stunned by the caliber of the would-be recruits. They are coming from a variety of government intelligence and law enforcement agencies, multiple executives said, and their interest stems in part from concerns about the direction of U.S intelligence agencies under Trump. Retaining and recruiting talented technical personnel has become a top national security priority in recent years as Russia, China, Iran and other nation states and criminal groups have sharpened their cyber offensive abilities. NSA and other intelligence agencies have long struggled to deter some of their best employees from leaving for higher-paying jobs in Silicon Valley and elsewhere.

Slashdot Top Deals