Simple radio message saved thousands of children, studies say

( CNN) A mass radio campaign in Burkina Faso spurring mothers to seek prompt therapy for sick babes has saved thousands of lives, according to a new study.

An accompanying investigate showed that it is also one of “the worlds largest” cost-effective ways of saving children’s lives.

“The study showed that in the regions that received the radio involvement, there was an increase in the amount of children being taken to health facilities. In particular, that raise was for the conditions “thats been” the focus for the campaign: malaria, diarrhea, pneumonia, ” responded Simon Cousens, a prof of epidemiology and medical statistics at the London School of Hygiene and Tropical Medicine and one of the authors of the study.


Dont Expect Big Changes from Europes Record Google Fine

European regulators took a big swing at Google Wednesday for mistreating the dominance of its Android mobile operating system, fining the company EUR4. 34 billion ($ 5 billion) and telling a modification to Android designed to put Google contenders on a more level playing field. But it’s not clear that the fine or the operational changes will have much effect.

“Google is essentially acquired, ” responds Maurice Stucke, cofounder of the Konkurrenz Group and a principle professor at the University of Tennessee. “They already reign mobile. Just think about the number of members of apps, like with Google Play and the like. There’s no way you’re going to have another operating system that is going to threaten that. Bing endowed, gosh, billions of dollars in its search engine, and it still hasn’t really made a significant dent.”

Carefully crafted indictment of 12 Russian spies heaps pressure on Trump

The US deputy attorney generals duration coincided with the president meeting the Queen

It was an extraordinary split-screen moment. On one back, president Donald Trump fulfilling the Queen at Windsor Castle and strolling past a ceremonial sentry of red-uniformed beefeaters. On the other, the US deputy attorney general, Rod Rosenstein, was simultaneously indicting 12 Russian spies for hacking and divulging the emails of elderly Democrat during the 2016 presidential election campaign.

These recent prosecutions by the special prosecutor, Robert Mueller, were carefully crafted. Its timing seems distinctly mischievous. And it heaps distres on Trump ahead of his meeting on Monday in Helsinki with the Russian president, Vladimir Putin, the three men to whom the GRU intelligence agency and its generals ultimately answer.

For two years, Trump has equivocated in the face of a simple question: did Moscow hack the US election in order to help him become president and to detriment Hillary Clinton? Despite evidence from US intelligence agencies, he has variously accused a “400-pound guy” sitting on a berth, advocated the answer is vaguely unknowable and said he could not be sure if “its been” Russia or China.

But Mueller’s latest prosecutions lay out the facts in granular detail. The document describes how groupings of profession Russian snoops working out of an anonymous classical building in center Moscow systematically hacked into the Democratic National Committee. It was a textbook ruse procedure, featuring bogus persons, concealed cryptocurrency pays and easy-to-do spear phishing.

During his meeting with Putin on Monday, Trump could challenge the extradition of the 12 GRU policemen, who, it is now known, include Viktor Borisovich Netyksho, the person in charge of the hacking activity be carried forward by two GRU units in Moscow. Putin will disclaim involvement.

If Trump does not ask, he will be clearly failing to stand up for US concerns in the face of an unprecedented cyberattack by a unfriendly foreign ability. If he does call for deportation, this signifies acknowledging that Mueller’s investigation into collusion between his expedition and Russia is not a “witch-hunt”. There are real alleged traitors. And, it is about to change, they work for Russian intelligence.

All the signs are that Trump will continue to deny Moscow’s meddling. Rosenstein said on Friday that he told the president a few days ago of the latest indictment. Trump appears to have ignored it. On Thursday, at the Nato summit in Brussels, he flattered Putin again. He even showed Russia’s leader had done good acts in Crimea, after annexing the territory in 2014, including building a connection and a submarine base.

The indictment develops farther intriguing questions as to how the US discovered the identities and precise grades of the 12 GRU detectives, one of them a major. A mole inside the GRU’s ” Aquarium” headquarters in Moscow- inspected in 2013 by Michael Flynn, Trump’s original picking for national protection consultant- cannot be ruled out. But it seems unlikely.

More probable is that US intelligence agencies carried out extensive counter-hacking and intercept measures of their own. And relied on input from America’s European allies including Britain- the same friends that Trump minimized on Thursday during his astonishing attack on Nato countries for what he sees as armed underspending.

According to reports, in the summer of 2014 the Dutch intelligence service hacked into one of the GRU’s undercover cells, controlling out of a university house near Red Square. The Netherlands gained better access to computers being used by the Cozy Bear group. They even sleuthed on the GRU outfit through closed-circuit TV cameras, witnessing their activities in real time.

Seemingly, the US intelligence community- regularly attacked by Trump as a malevolent action- is good at its chore. Michael McFaul, the former US ambassador in Moscow, described himself on Friday as “very impressed” by Mueller’s indictment. It presented” the prodigious capabilities of our intelligence community”, he tweeted, supposing the” Kremlin will take note “.

Putin will not give the GRU detectives to stand trial in America any time soon. But by asking for their extradition, Trump might mitigate the impression that he is beholden to Putin and that his safarus unit may even have colluded with the Kremlin on his track to the White House.

Read more: https :// us-news/ 2018/ jul/ 13/ carefully-crafted-indictment-of-1 2-russian-spies-heaps-pressure-on-trump

New York’s MTA only had one IT guy capable of rebooting the system

The MTA had a crisis that merely Miguel could determine .
Image: marcaux/ Getty Images

IT guys and girls get a bad rap for being fretful cave beings, but everyone knows that powers mostly stop functioning without them.

That croaks quadruple for one of “the worlds largest” notoriously dysfunctional mass transit systems in the world, the New York Metropolitan Transit Authority( MTA ). Apparently, in the midst of a crisis, the MTA only had one( unreachable) IT guy capable of rebooting the end ticket vending system.

Hello, MTA? Have you tried transforming it off and on again?

Image: giphy

Recently, the NYC subway system’s deterioration has become a national mockery, political hot potato, and maddening actuality for equestrians. Exactly four eras after a particularly damning New York Times investigation property last drop-off, the MTA announced its employ of mass transit-veteran Andy Byford to turn things around as president of MTA New York City Transit.

Now six months into the job, the New Yorker has published a detailed, attractiveness, and utterly entertaining chart of Byford. In profiling its brand-new master, the slouse too depicts a behind-the-scenes and at times hair-pulling detail of how New York’s subway system functions.

One such revealing anecdote involves transgressed ticket vending machine, a frenzied MTA war room, and an elusive IT guy mentioned Miguel.

According to the bit, on a Friday evening, MTA ticket vending machine stopped accepting debit and charge card. The MTA’s control center watched people jumping turnstiles on observes and objections explode on Twitter. The crisis even spread into the New Jersey transit and seemed to be ballooning before their eyes.

MTA officials were powerless to stop the chaos. As noted by the Washington Post’s Jeff Stein on Twitter, the one gentleman capable of rebooting the vending organization had a truly admirable work-life equilibrium: Miguel was not refuting his phone during his Friday night commute home to his town three hours northward of the City, leaving the MTA bereft of IT support for this specific issue.

In the article, Byford dedicates to utilize “a dozen Miguels civilized up by Monday.”

When asked about the incident, the MTA told Mashable that the situation was a little bit more complicated than the inability to reboot, thanks to one off-the-clock male with a password. But it did confirm that, since then, four additional employees and two consultants were trained and given the ability that previously exclusively resided within the mind of Miguel.

Twitter is definitely on #TeamMiguel, but thinks he should get some help.

All hail the IT wizardry of Miguel. And never, ever underestimate the IT crowd.

Read more:

WhatsApp now marks forwarded messages to curb the spread of deadly misinformation

WhatsApp exactly introduced a new feature designed to help its customers specifying the origin of information that they receive in the messaging app. For the first time, a forwarded WhatsApp message will include an indicator that distinguishes it as forwarded. It’s a small shift for the messaging programme, but potentially one that could make a big difference in the way parties transmit knowledge, specially questionable viral material, over the app.

The newest version of WhatsApp includes the boast, which marks forwarded meanings in subtle but still hard to miss italicized text above the content of a message.

The forwarded content moniker is meant as additional measures to control the spread of viral misinformation in countries such as India, where the company has 200 million useds. Misinformation spread through the app has been linked to the mob killing of multiple men who were targeted by inaccurate rumors accusing them of seizing progenies. Those rumors are believed to have spread through Facebook and WhatsApp. To that goal, Facebook-owned WhatsApp bought full page ads in major Indian newspapers to raise awareness about the perils of spreading misinformation.

Facebook buys ads in Indian newspapers to forewarn about WhatsApp phonies

Last week, India’s Information Technology Ministry problem a admonishing to WhatsApp specifically 😛 TAGEND

Instances of lynching of innocent people have been discovered recently because of large groups of irresponsible and explosive letters filled with rumours and provocation are being circulated on WhatsApp. The regrettable exterminate in many regimes such as Assam, Maharashtra, Karnataka, Tripura and west Bengals are deeply agonizing and regretable.

While the Law and ordering machine was endeavouring to comprehend the villains, the abuse of platform like WhatsApp for reproduced circulation of such provocative material are equally such matters of deep concern. The Ministry of Electronics and Information Technology has taken serious memo of these irresponsible themes and their dissemination in such programmes. Deep disapproval of all these developments has been conveyed to the senior management of the WhatsApp and they have been advised that required remedial measures should be taken to prevent proliferation of these counterfeits and at times motivated/ shocking contents. The Government has also directed that spread of such contents should be instantly contained through the application of appropriate technology.

It has also been pointed out that such pulpit cannot sidestep accountability and responsibility specifically when good technological inventions are abused by some miscreants who resort to provocative words which lead to spread of violence.

The Government has also conveyed in no uncertain terms that WhatsApp must take immediate action to end this jeopardy and ensure that their programme is not used for such malafide activities.

In a blog pole accompanying the new meaning peculiarity, WhatsApp encouraged its useds to stop and think before sharing a forwarded message.

Read more:

The Worst Cybersecurity Breaches of 2018 So Far

Looking back at the first six months of 2018, there haven’t been as many government discloses and global ransomware attacks as there were by this time last year, but that’s pretty much where the good news intention. Corporate security isn’t getting better fast enough, critical infrastructure insurance hangs in the balance, and state-backed hackers from around the world are going bolder and more sophisticated.

Here are the big-hearted digital protection drama that have played out so far this year–and it’s only half over.

Russian Grid Hacking

In 2017, protection investigates clanged the alarm about Russian intruders infiltrating and probing United States power companies; there was even proof that the actors had direct access to an American utility’s control systems. Mixed with other high-profile Russian hacking from 2017, like the NotPetya ransomware attacks, the grid penetrations were a sobering revealing. It wasn’t until this year, though, that the US government inaugurated publicly acknowledging the Russian state’s participation in these actions. Officials hinted at it for months, before the Trump Administration firstly publicly attributed the NotPetya malware to Russia in February and then blamed Russia in March for grid hacking. Though these attributions were already widely acquired, the White House’s public acknowledgement is a key stair as both the government and private sector grapple with how to react. And while the state-sponsored hacking land is getting scarier by the day, you can use WIRED’s grid-hacking guide to reckon when you should really freak out.

US Universities

In March, the Department of Justice indicted nine Iranian intruders over an alleged spree of attacks on more than 300 universities in the United States and abroad. The suspects are charged with an offence infiltrating 144 US universities, 176 universities in 21 other countries, 47 private companionships, and other targets like the United People, the US Federal Energy Regulatory Commission, and the states of Hawaii and Indiana. The DOJ reads the intruders plagiarized 31 terabytes of data, estimated to be worth$ 3 billion in intellectual property. The onrushes utilized carefully crafted spearphishing emails to trick professors and other university affiliates into clicking on malicious links and entering their network login credentials. Of 100,000 reports intruders targeted, they were able to gain credentials for about 8,000, with 3,768 of those at US foundations. The DOJ responds the campaign draws back to a Tehran-based intruder clearinghouse called the Mabna Institute, which was founded around 2013. The make-up allegedly coped hackers and had ties to Iran’s Islamic Revolutionary Guard Corps. Friction between Iran and the US often sheds into the digital domain, and the situation has been in a particularly delicate stage recently.

Rampant Data Exposures

Data infringements have continued apace in 2018, but their quiet cousin, data revelation, has been foremost this year as well. A data show, as the figure proposes, is when data is accumulated and represented improperly such that it is disclosed on the open internet and could be easily is available to anyone who comes across it. This often occurs when cloud customers misconfigure a database or other storage device so it requires minimal or no authentication to access. This was the case with the marketing and data aggregation house Exactis, which left about 340 million records exposed on a publicly accessible server. The trove didn’t include Social security systems multitudes or credit card numbers, but it did comprise 2 terabytes of very personal information about hundreds of millions of US adults–not something you want hanging out for anyone to acquisition. The problem was discovered by insurance researcher Vinny Troia and reported by WIRED in June. Exactis has since safeguarded the data, but it is now facing a class action lawsuit over the incident.

Cloud holes pop up regularly, but data shows can also is the case when application faults unknowingly store data in a different format or location than aimed. For speciman, Twitter disclosed at the beginning of May that it had been unintentionally accumulating some user passwords unprotected in plaintext in an internal record. The firm tied the problem as soon as it found it, but wouldn’t enunciate how long the passwords were hanging out there.

After the revelation of a data exposure, organizations often offer the classic reassurance that there is no evidence that the data was retrieved improperly. And while companies can genuinely come to this conclusion based on re-examine access logs and other indicators, “the worlds largest” malevolent circumstance about data shows is that there’s no way to know for sure what exactly went down although no one was watching.

Under Armour

Hackers infringement Under Armour’s MyFitnessPal app in late February, compromising usernames, email addresses, and passwords from the app’s roughly 150 million customers. The companionship detected the intrusion on March 25 and disclosed it in under a week–some welcome bustle from a large corporation. And it seems Under Armour had done a good enough position setting up its data protections that the hackers couldn’t access prized user information like place, credit card quantities, or delivery years, even as they were swimming in login credentials. The busines had even protected the passwords it was storing by hashing them, or converting them into unintelligible fibres of characters. Pretty great, right? There was one crucial issue, though: Despite doing so many things well, Under Armour admitted that it had only hashed some of the passwords exploiting the robust function called bcrypt; the rest were protected by a weaker hashing scheme called SH-A1, which has known flaws. This means that attackers likely cracked some portion of the embezzled passwords without much misfortune to sell or use in other online scams. The place, while not an all-time-worst data infringe, was a annoying reminder of the unreliable district of security on corporate networks.

One to Watch: VPNFilter

At the end of May, officials forewarned about a Russian hacking safarus that has impacted more than 500,000 routers worldwide. The strike spreads a type of malware, known as VPNFilter, which can be used to coordinate the infected devices to create a massive botnet. But it can also immediately spy on and manipulate web task on the compromised routers. These abilities can be used for diverse intents, from launching system manipulation or spam safaruss to embezzling data and crafting targeted, localised onslaughts. VPNFilter can pollute dozens of mainstream router models from corporations like Netgear, TP-Link, Linksys, ASUS, D-Link, and Huawei. The FBI has been working to neuter the botnet, but investigates are still identifying the full scope and range of this attack.

More Great WIRED Stories

Inside the crypto world’s biggest scandal

Distracted driving is totally out of command

How Square made its own iPad replacing

You can now live out Westworld with your Amazon Echo

How Oprah’s network eventually found its articulation

Ogling for more? Sign up for our daily newsletter and never miss our recent and greatest floors

Thanks to Amazon, the government will soon be able to track your face

Putting the business needs of technology whales over our own privacy causes a tomb jeopardy to our democracy

Amazon, the company synonymous with online store, is equipping facial approval technology to government and law enforcement agencies over its entanglement assistances programme. Branded Rekognition, the technology is every bit as dystopian as it sounds.

Given the enormous reach of Amazon’s cloud platform and how readily agencies can unite brand-new applications into their operations, it’s distressing that the company can offer a powerful platform-based surveillance engineering without any public input, omission or regulation. Amazon shall not be required to be have free rein to develop and profit from new surveillance technologies without regard for their effects on civil liberty and human rights. Agreeing to the technological and economic obligations of these companies residence our democracy on perilous footing.

A coalitionof civil liberties and human rights establishments have voiced alarm systems, including the American Civil Liberties Union. They are requesting Amazon to stop rendering its facial acceptance engineering to government and law enforcement agencies. Amazon shareholders and Amazon laborers have joined them, voicing opposition to the company’s involvement in the business of government and police surveillance. Because of its protection and related concerns, impetu is building.

The city of Orlando dropped its pilot program use of Rekognition. Brian Brakeen, CEO of the facial identification busines Kairos, took a stand and said his firm wouldn’t sell the technology to the government.” In the hands of government surveillance those programmes and law enforcement departments ,” Brakeen writes ,” there’s plainly no way that appearance acceptance software will be not used to harm citizens .”

As professors who have studied information technologies and privacy, including the social ramifications of face recognition and biometrics, we share these reservations. We are calling on Amazon to get out of the surveillance business. Our demand is as strong as it is urgent and reasonable.

We don’t want Amazon to simply adjust the functions of its facial acknowledgment engineering or update its policies for proper use. The only responsible course of action commits Amazon doing a ended about-face. It must stop building the facial identification infrastructure for law enforcement agencies and national governments and be committed to never return to the business in the future.

Facial recognition technology poses serious and imminent the risk to political liberty and human rights. As proletarians at Amazon explained in a letter to Jeff Bezos, there is no need to wait and see if the police or government agencies will abuse the technology. It is already clear that ubiquitous, automated facial acceptance is well suited for discriminating against people of color, targeting political activists, and otherwise substantiating militaristic and tyrannical the various modes of government. There is little doubt that its implementation of an infrastructure of networked cameras connected to databases of known faces by artificial intelligence implements will eliminate privacy in public and allow the distinguishing, location, and tracking of individuals, relating their behaviour, actions and the peoples of the territories they meet to their identities.

Amazon is not your average large and strong firm. It obtains a huge amount of personal information about beings, including their buying habits and what the hell is watch and read. The company’s Echo and Alexa products, throw it access to audio recordings of what people say in their homes. It is just a stair away from lending cameras to these devices, and, surely, Amazon already marketplaces a camera for its cloud network. Most people exploiting home shopping inventions would be surprised has found that the technology is likely to be be archiving their faces for be utilized in police databases. Imagine, for example, Apple taking the data collected through its Face ID phone feature and repackaging and reselling it to the Department of Homeland Security or local police.

In fact, given the blurring strand between public policing and private defence, and between authority insurance agencies and their private contractors, we question whether a suspension on government and law enforcement uses of Rekognition would go far enough. The security industry have all along touted the public safety benefits of facial approval engineering. But a functioning facial acknowledgment plan that can systematically and accurately mark specific, targeted individuals compels improving a surveillance infrastructure of unprecedented scope and magnitude, powered by machine learning algorithm and perpetually expanding databases of identity knowledge. The menace that such a massive, automated surveillance apparatus constitutes to society far outweighs the security benefits it could provide. At the very least, it would require an evenly immense organization for oversight, clarity and public input, one that neither Amazon nor any government agency has even begun to develop.

Amazon and the information technology manufacture have lobbied hard to ensure their programmes has been operational and expand in a largely unregulated surrounding. Public policy, the claim proceeds, cannot keeping with innovation. If they believe this assertion, then these companies cannot in good faith contend that their responsibilities are limited to locking such assurances that customers abide by proven the development of policies and constitutions. When authority rehearsals contravene civil liberty, Amazon has a choice to stir. Will it blindly accelerate and exacerbate violations of human rights, or will it take responsibility for its strong technologies?

The authors are affiliated with the following institutions: Peter Asaro, the New School; Kelly Gates, University of California, San Diego; Woodrow Hartzog, Northeastern University; Lilliy Irani, University of California, San Diego; Evan Selinger, Rochester Institute of Technology; and Lucy Suchman, Lancaster University