Weird Orbits of Alien Planets May Be Due to Twin Stars

Space.com - Wed, 30/07/2014 - 5:04pm
Some of the oddly skewed orbits of many alien worlds may be due to the twin stars they are often found circling, a new study suggests.
Categories: Science

Early Earth: A Battered, Hellish World with Water Oases for Life

Space.com - Wed, 30/07/2014 - 5:03pm
Cosmic bombardment of the early Earth repeatedly covered the planet's surface with molten rock during its earliest days, but still may have left oases of water that could have supported the evolution of life, scientists say.
Categories: Science

Double Star Is Forming Planets At Funky Angles | Video

Space.com - Wed, 30/07/2014 - 5:03pm
The binary system HK Tauri's ‘wildly misaligned’ discs of dust and gas may help explain why some exoplanets have eccentric orbits around their Suns. The Atacama Large Millimeter/submillimeter Array (ALMA) imaged the system. More: http://goo.gl/XMR3Hz
Categories: Science

How the Moon Got Its Lemon Shape

Space.com - Wed, 30/07/2014 - 5:03pm
Tidal forces exerted during the solar system's youth can explain most of the moon's large-scale topography, including its slight lemon shape, reports the study, which was published online today (July 30) in the journal Nature.
Categories: Science

Dark Data, Amber, and Attenborough

Wired News - Wed, 30/07/2014 - 4:45pm
A new pygmy grasshopper found in amber is named for Sir David Attenborough. Featuring a video explainer narrated by Sir David himself!






Categories: Science

UK To Allow Driverless Cars By January

Slashdot - Wed, 30/07/2014 - 4:29pm
rtoz sends this news from the BBC: The UK government has announced that driverless cars will be allowed on public roads starting in January next year. It also invited cities to compete to host one of three trials of the tech, which would start at the same time. In addition, ministers ordered a review of the UK's road regulations to provide appropriate guidelines. ... The debate now is whether to allow cars, like the prototype unveiled by Google in May, to abandon controls including a steering wheel and pedals and rely on the vehicle's computer. Or whether, instead, to allow the machine to drive, but insist a passenger be ready to wrest back control at a moment's notice.

Read more of this story at Slashdot.








Categories: Science

Supportive moms and sisters boost female baboon's rank

Science Daily - Wed, 30/07/2014 - 4:02pm
A study of dominance in female baboons suggests that the route to a higher rank is to maintain close ties with mom, and to have lots of supportive sisters.
Categories: Science

Money talks when it comes to acceptability of 'sin' companies, study reveals

Science Daily - Wed, 30/07/2014 - 4:02pm
Companies who make their money in the 'sin' industries such as the tobacco, alcohol and gaming industries typically receive less attention from institutional investors and financial analysts. But new research shows social norms and attitudes towards these types of businesses are subject to compromise when their share price looks to be on the rise.
Categories: Science

Saving seeds the right way can save the world's plants

Science Daily - Wed, 30/07/2014 - 4:02pm
Exotic pests, shrinking ranges and a changing climate threaten some of the world's most rare and ecologically important plants, and so conservationists establish seed collections to save the seeds in banks or botanical gardens in hopes of preserving some genetic diversity. For decades, these seed collections have been guided by simple models that offer a one-size-fits-all approach for how many seeds to gather. A new study, however, has found that more careful tailoring of seed collections to specific species and situations is critical to preserving plant diversity.
Categories: Science

Dimly lit working environments: Correcting body clock is possible

Science Daily - Wed, 30/07/2014 - 4:02pm
Researchers have, for the first time, conducted a study under real conditions on the body clocks of members of an international polar research station. The researchers have shown that a particular kind of artificial light is capable of ensuring that their biological rhythms are correctly synchronized despite the absence of sunlight.
Categories: Science

Naltrexone may be effective in diminishing impulse control disorders in Parkinson's disease patients

Science Daily - Wed, 30/07/2014 - 4:01pm
Parkinson's disease (PD) patients may confront a common but largely unrecognized challenge: the occurrence of impulse control disorders (ICDs) such as compulsive gambling, sexual behavior, eating, or spending. A team of investigators conducted a pilot study and found that the opioid antagonist naltrexone may be an effective treatment for diminishing ICD symptoms in PD patients.
Categories: Science

Many depressed preschoolers still suffer in later school years

Science Daily - Wed, 30/07/2014 - 4:01pm
Children diagnosed with depression as preschoolers are likely to suffer from depression as school-age children and young adolescents, new research shows. The investigators followed 246 children, now ages 9 to 12, who were enrolled in the study as preschoolers when they were 3 to 5 years old. The children and their primary caregivers participated in up to six annual and four semiannual assessments. They were screened using a tool called the Preschool Feelings Checklist and evaluated using an age-appropriate diagnostic interview.
Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science

Black Hat Researchers Actively Trying To Deanonymize Tor Users

Slashdot - Wed, 30/07/2014 - 3:47pm
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.

Read more of this story at Slashdot.








Categories: Science