The real reason America controls its nukes with ancient floppy disks

America’s nuclear arsenal depends on a surprising relic of the 1970s that few of us may recall: the humble floppy disk.

It’s hard to believe these magnetic, 8-inch data storage devices are what’s propping up the most fearsome weapons humanity has ever created. But the Department of Defense is still relying on this technology to coordinate key strategic forces such as nuclear bombers and intercontinental ballistic missiles, according to a new government report.

The floppy disks help run what’s known as the Strategic Automated Command and Control System, an important communications network that the Pentagon uses to issue launch orders to commanders and to share intelligence. And in order to use the floppy disks, the military must also maintain a collection of IBM Series/1 computers that to most people would look more at home in a museum than in a missile silo.

Källa: The real reason America controls its nukes with ancient floppy disks – The Washington Post

Symantec says SWIFT malware linked to attack in Philippines

The malware that was used to steal $81 million from Bangladesh’s central bank has been linked to another cyber attack, this time on a bank in the Philippines, cyber security company Symantec Corp said in a blog post on Thursday.The company said it had identified three pieces of malware that were used in limited targeted attacks against financial institutions in South-East Asia. (symc.ly/1sRNHc7)The initial success of the group that attacked the Bangladesh Central Bank and the Philippines bank could prompt more attacks, Symantec said in the post.In February, thieves hacked into the Society for Worldwide Interbank Financial Telecommunication (SWIFT) payments system of the Bangladesh central bank, sending messages to the Federal Reserve Bank of New York allowing them to steal $81 million.The emergence of new possible instances of compromise is not entirely surprising as banks conduct more reviews, SWIFT spokeswoman Natasha de Teran told Reuters.”Many may turn out to be false positives, and or have nothing to do with SWIFT messages, but it is key that these reviews take place and banks’ environments are secured,” she added.

Källa: Symantec says SWIFT malware linked to attack in Philippines | Reuters

Last Exit to Elsewhere

Last Exit to Elsewhere

Last Exit to Elsewhere

Last Exit to Elsewhere

 

 

Based off conversations William Least Heat-Moon had on the road in his book ‘Blue Highways: A Journey into America.’ This film represents my journey of lonely miles through small towns and empty highways.
In late 2015 I went on a 5,000mile road trip through the bottom half of the US from California to Louisiana and back. Driving through back-road highways, much like the Least Heat-Moon, I avoided the Interstate Highways as much as I could. It is off these Interstate highways where you can still find remnants of America as it used to be, maybe back when the author drove through it in the late 70’s. Over the course of my journey whilst reading ‘Blue Highways’ I found my experiences on the road mirrored that of the author and though it was written in 1978, still held true to my journey in 2015.
Director/Editor: Dan Sadgrove
Music: Hanan Townshend
Narration: Ólafur Darri Ólafsson
Sound: Morgan Johnson at Barking Owl Sound
Color: Kath Raisch at Company 3

 

Apple ville köpa Time Warner

Apple ville köpa Time Warner

Apple ville köpa Time Warner

Apple ville köpa Time Warner

 

Apple hade planer på att köpa Time Warner och företagen möttes i samtal men de fördes aldrig upp på högsta nivå.

Uppgifterna publiceras idag av Financial Times (betalvägg) men de är inte nya. Redan i våras så spekulerades det om att Apple ville köpa Time Warner och HBO för att få fart på sin planerade tv-tjänst.

Macken: Apple intresserade av Time Warner

Enligt Financial Time lyftes frågan i ett samtal mellan Eddy Cue och Olaf Olafsson men den fördes inte vidare, inte upp högsta ledningsnivå.

Attack mot NS1s DNS-tjänst

Attack mot NS1s DNS-tjänst

Attack mot NS1s DNS-tjänst

Attack mot NS1s DNS-tjänst

Sedan ett par dagar så har NS1 DNS-tjänst attackerats vilket påverkar tillgången till en stor rad tjänster och webbplatser.

Over the course of last week, we sustained dozens of large DDoS attacks, ranging in strategy from simple volumetric attacks, to complex direct DNS lookup attacks, to concentrated attacks against our upstream network providers and other vendors. These attacks are an escalation above and beyond a recently observed increase in malicious activity broadly targeting the DNS, CDN, and internet infrastructure industries.

Attackerna görs mot NS1 direkt, inte mot någon av deras kunder utan det är en centralt riktad attack. Det är dessutom i perioder en mycket omfattande attack.

The attack traffic was also mobile – with the largest ongoing assaults directed at our European infrastructure, but also migrating to attack our network in the western US and Asia. By combining multiple highly targeted techniques, the attackers created a complex and evolving situation that did result in brief periods of packet loss at several of our nodes. This caused partial DNS delivery service failure during those periods, particularly in Europe.

Går det trögt att surfa, svarar vissa webbtjänster inte alls eller långsamt så kan detta vara förklaringen.

NS1