News & Updates

Major depressive disorder is a significant health problem, but its biological underpinnings aren’t well understood. That’s in part because there’s variability in both the disease’s symptoms and its heritability. A recent study published in Nature Genetics identified five independent gene variants from four genome regions that are associated with depression, raising hopes that we can get a better handle on the disorder.

The study used a meta analysis of data collected by consumer genetics company 23andMe as well as previously published studies of depression. These studies can identify regions of the chromosome—and sometimes individual genes—that are frequently inherited along with the disorder. A correlation can imply causation.

The most significantly associated gene was OFLM4, which encodes for olfactomedin-4, a protein that promotes tumor growth and cell adhesion. This gene has not been previously associated with any psychiatric disorders, but it is known to be expressed in some brain regions, including the amygdala and the temporal lobe.

Read 7 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

(credit: NASA)

SpaceX appears to have taken a significant step forward with the development of a key component of its Mars mission architecture. According to multiple reports, during the Small Satellite Conference Tuesday in Logan, Utah, SpaceX President Gwynne Shotwell said the company has shipped a Raptor engine to its test site in MacGregor, Texas. A spokesman confirmed to Ars that the engine has indeed been moved to Texas for developmental tests.

The Raptor is SpaceX’s next generation of rocket engine. It may be as much as three times more powerful than the Merlin engines that power its Falcon 9 rocket and will also be used in the Falcon Heavy rocket that may fly in late 2016 or early 2017. The Raptor will power SpaceX’s next generation of rocket after the Falcon Heavy, the so-called Mars Colonial Transporter.

Although official details regarding the Raptor engine remain scarce, SpaceX founder Elon Musk has suggested the engine will have a thrust of about 500,000 pounds, roughly the same power as a space shuttle’s main engines. Whereas the shuttle was powered by three main engines and two booster rockets, however, it is believed the large rocket SpaceX uses to colonize Mars would likely be powered by a cluster of nine Raptor engines.

Read 2 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

For months now, the digital rights management solution known as Denuvo has proven utterly impervious to cracks and workarounds—so impervious that a major piracy group warned games may become completely “crack-proof” within two years (that same group later took a public break from even attempting any more single-player hacks). In recent days, however, the first cracks have started to develop in Denuvo’s digital armor (pun intended).

Denuvo works by creating a unique key for a game based on the specific hardware configuration of the legitimate purchaser’s machine. If those game files are shared with another player using another computer, Denuvo’s protection will detect the hardware differences and make sure the game doesn’t work as intended.

Over the weekend, a hacker going by the handle Voksi crafted a workaround for this protection by building off the demo for id Software’s recent Doom remake. Using a custom loader program, Voksi managed to swap the Steam AppID for a pirated copy of the full Doom game with that of a legitimately downloaded free demo. With that change, Steam and Denuvo apparently viewed the full game as if it was the legitimate demo and allowed it to load without issue. The same essential workaround was adapted for other Denuvo-protected games, including Rise of the Tomb Raider.

Read 3 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

Asus’ ZenBook UX305C was almost a perfect midrange laptop, at least by my estimation. The cheaper models were missing extras like touchscreens or backlit keyboards and they weren’t as fast as Dell’s XPS 13 or the MacBook Pro, but they offered enough speed for most people and Asus got a lot of stuff right: $700 for a 1080p IPS screen, a sturdy build, a decent keyboard and trackpad, and a respectable 256GB of storage and 8GB of RAM. There are better laptops and there are cheaper laptops but that one sat right at the intersection of both.

Asus’ follow-up to the UX305C is a slightly different riff on the same idea. The Zenbook Flip UX360CA (hereafter Zenbook Flip or just Flip) still uses Intel’s Skylake Core M processors, still includes 8GB of RAM and a 256GB SSD, still uses a 1080p screen, is still really thin, and still starts at $700. But it’s got a Lenovo Yoga-style 360-degree hinge and a standard touchscreen, turning what was once a basic laptop into a basic laptop that can pretend to be a tablet.

A lot of what I liked about the old Zenbook design is still here, but a few things have been improved and, sadly, a few things have gotten worse.

Read 24 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

(credit: Jim Resnick)

Judged by its reputation, the Mini Cooper S should be a sporty little thing with telepathic steering, go-kart handling, and zippy throttle response. Yet, my very first impression—and this continued on throughout the test—is to ask no one in particular, yet everyone collectively: “Where the hell is its engine?” I certainly couldn’t hear it.

Top up, down, engine idling, engaging the clutch, launching hard—even bouncing off the soft rev limiter—was there mechanical music? Was there merely mechanical? No. They’ve over-silenced the engine. The 189hp (141kW) turbocharged four-cylinder unit actually makes decent power, but it’s either so stuffed full of turbo plumbing or blanketed by NVH nannies that you’ll simply never hear evidence that it exists.

Inside, the Mini is expectedly quirky. Some quirks of past Minis have gone conventional, like the old dash-mounted chrome window levers. Those are gone, replaced by press-and-lift buttons on the doors like almost every other car on the lot. However, some of its quirks feel more like simple mistakes. The center armrest is in the way of the car’s iDrive-like infotainment control on the center console. This armrest also impedes your right arm’s freedom of movement, an unforgivable error in a car with a manual transmission. (Pivoting it backwards helps only marginally.)

Read 12 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

(credit: Lawrence Livermore National Lab)

Last month, we reported on a small but enduring mystery in cosmology: why is there so much of one isotope of lithium around? Both 6Li and 7Li should have been produced when the first atoms formed after the Big Bang, but how much of them should have been made?

The question comes down to basic nuclear physics. When two hydrogen atoms collide under pressure, what is the probability that they will make helium? That sort of physics also applies to collisions between other elements, some of which produce lithium. It is an astonishing achievement that cosmologists can, from basic physics, predict the relative fractions of hydrogen and helium produced in the Big Bang. It is just as astonishing that we can look back in time and measure these fractions and know that cosmologists have it almost exactly right.

Almost. These calculations fall flat when it comes to lithium. They suggest there should be much more 7Li than we observe in the Universe and a lot less 6Li. Does that mean the estimates are wrong, or is there a real discrepancy? New experiments indicate that when it comes to 6Li, the problem seems to be with the Universe and not our calculations.

Read 10 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

We just got back from the 49th annual Gen Con tabletop gaming convention, arms aching from all the dice-rolling. The convention officially takes place at the Indiana Convention Center in downtown Indianapolis, but the excitement of over 60,000 board game fans can’t be contained—the convention actually spills out to swallow up pretty much all of downtown Indy.

There are tournaments, panels, parades, music, cosplayers, vendors, artists, and parties. But above all else, there is gaming. Endless, around-the-clock tabletop gaming. For four straight days. Even though it’s utterly exhausting, for certain types of people—like the Ars Cardboard crew—it’s a small slice of heaven.

If you didn’t make it to the show this year, our gallery below will give you a taste of the insanity. And stay tuned—this Saturday, we’ll be running down our top games of the con.

Read 1 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

Today I had a pleasure to speak with a true talent of the hacking community.Nikie, she is an intriguing figure that I want to present you.

Enjoy the interview!

Nikie

Hi Nikie, you are a talent of the hacking community, can you tell more about your technical background? When did you start hacking?

I wouldn’t call myself a hacker in the strictest sense of the term. I participate more in intelligence gathering, background support and activist support than active hacking. I am always on a quest for more information about everything, irrespective of its source and that’s really what’s lead me to where I am now. My first computer was a nondescript, beige, plastic tower from a Big Box store in my hometown.
I can’t even remember any of the specs for it, but I have fond memories of losing hours playing Encarta’s Mind Maze alone in my room.
Back then, I wasn’t allowed to connect to the internet, so everything was offline. My family also wasn’t technically skilled, so I remember reading manuals and books that had been purchased at the same time as the computer, trying to learn how to fix various issues, to varying levels of success.

When I eventually did get connected, I spent almost every available moment online, reading and researching any topic I could think of, from cryptozoology to poorly written tutorials. I’ve always had an insatiable desire for information and that rings true today, even though it occasionally got me into trouble in the process.

My first “hacking” experience probably came about when I was a teen, maybe 14 or 15. I wasn’t very skilled socially, but I felt comfortable talking with people online, so I had taken to frequenting various chat rooms and BBSs. I managed to attract the attention of a particularly vindictive user who demanded that I send him photos or he would hack my computer into oblivion. Rather than cave to his demands, I dared him to do it. I can’t quite remember what he did, but I ended up with
a strange file on my system that interfered with my computer’s ability to get online. Luckily, I had a friend in my neighborhood who let me use his computer to do some digging and we eventually fixed the problem. It was a gamble, but I was, and probably still am, too vindictive to let someone try and push me around.

After that though, I was hyper-aware that there weren’t always going to be friendly entities online and that they wouldn’t hesitate to take advantage of someone. I never stood down against a bully IRL and seeing how other women were being treated online inspired me to continue growing my skillset so that I would always be able to respond in kind to future threats. That pushed me to learn about how I could prevent future attacks, both against myself and others who may not be as conscious of the threats out there. My concern for others’ safety later lead me down the path to security and privacy research. I’ve been neck deep in it ever since then, professionally and personally.

Which are the most interesting hacking communities on the web today?

For me, there is no one community that is more interesting than another. I currently follow discussions about personal information security and encryption advancements pretty closely, as they tie in to my professional interests, but I am also fascinated by the growing communities of hackers working toward improving accessibility for the differently abled and those communities that are undermining oppressive regimes with the proliferation of knowledge.

In the past few years, I have met and talked with so many people working toward building inclusive communities within the technology sphere. Activism and hacktivism is also another area that really
resonates with me. I love interacting with the people who are working to bring information to oppressed countries and communities, breaking down false ideologies and giving people the opportunity to build informed opinions based in actual fact rather than political
propaganda.

Political and social concerns aside, I think that Twitter has been the most active and entertaining community to be a part of. I only occasionally pop up in larger conversations online, but I like that my sense of humor and wit is usually well received within the Twitter/hacking community and the community is, in general, a fairly good humored group of astronomically smart people having a good laugh.

What about the militarization of the cyberspace?

Militarization of technology and information has always been one of the strongest tools any group can have, be they “official” or rebellious. By attempting to control and manipulate the flow of
information and availability of technology, regimes attempt to influence and control their populations, limiting the opportunity for dissent and strengthening their own holds over power. It’s a scary thing to consider, but every modern nation or emerging nation is doing this and so much of the population is unaware that they’re being manipulated. The cyber landscape is the easiest platform for nation states to attempt to control as well, so it’s doubly concerning.
With the advancements in technology and inter-connectivity, it has become incredibly simple to capitalize upon cheap technology to strengthen the power of the governing party. It’s uncomfortable and disheartening to see governments, large and local, using technology
against their citizens and hiding behind the veil of “security”. To me, the only way to help keep some of these powers in check is to constantly expose and teach about the new technologies and their uses.
The more people know about what is available to be used against them, the more vigilant they will become. Hell, even my grandmother has a glittery snail sticker over her webcam now and she actively uses multi-factor authentication in her online interactions.

What scares you the most on the Internet?

I think ignorance of the generally connected population is the scariest thing. As we move into the era where IoT becomes commonplace and our lives and information are more freely passing through the tubes, ignorance of the threats out there and apathy toward groups attempting
to strip away protections like encryption and standards for privacy weigh heavily on my mind. The lack of concern that the average user has for the invasions of privacy and violations of what I see as human rights is worrying. People should care about what their political systems are doing with their information and how they’re attempting to spy on their citizens AND their enemies. I don’t think enough people worry about the possibility of losing access to the endless troves of information if the wrong regime comes to power.

I’m also constantly concerned for the underrepresented on the internet. I support the fight against rampant sexism, racism, ableism and exclusionary tactics online and I worry that others are abused
because they may not be as aggressive as I have had to become or they don’t have the support to fight back against what’s being said to or about them.

What would you change about the cyber security industry and why?

I am currently helping to build a more inclusive environment for women within the CyberSec/InfoSec community. Part of this is through activism and participation in communities that focus on bringing young girls and women into the fold and showing them that gender has nothing to do with skill or ability and that we need them more than ever.
Another arm is actively calling out people in the community when they think they are getting away with abusing, criticizing, harassing or outright attacking women in the industry and bringing attention to their actions.

There’s this long lived stereotype that hackers and security professionals are all uncool neck-beards who live in a relative’s basement and don’t ever talk to women. While that’s, for the most
part, untrue, every time I’m at an event where men are heckling or harassing the women there just because they’re women, or some guy thinks it’s totally okay to ignore a blatant “No” from a woman, that stereotype pops into my head. I know far too many women who have been scared out of the community by men who treated them like they were unworthy or somehow lesser, simply based upon gender (which usually seems like an insecurity on that man’s part), and it’s disgusting.

Stuff like this continues to happen though, mainly because people don’t draw attention to it and don’t force the perpetrators into the spotlight, so my goal is to bring every instance I see to light. If
they don’t feel safe skulking around, acting like cavemen, then maybe some of this behavior will stop and the community will be able to benefit from the resulting influx of women who don’t feel threatened.

I’m a common Internet user that is asking you how to protect my privacy? Which are the tools that I can use to avoid monitoring and surveillance on the Internet?

If you are online, then there will always be a threat to your privacy and security, regardless of the safeguards in place. That being said, my standard advice to those who ask is to always consider what you are putting out there to begin with. Information is the strongest tool in an arsenal and when you limit what others can get, then you limit your exposure and vulnerability. I try to teach my family and colleagues about the benefits of encryption and operational security. Helping
people understand that laziness and convenience can be one of the most detrimental aspects to their safety is important to me, so explaining why the hassle of using a VPN or incognito/private modes on browsers is usually a first step. I try to openly and frequently bring up new phishing techniques that I’m seeing and talk to my friends and family about keeping an eye out for suspicious behavior when they’re online.

Ideally, no secrets connected to the rest of the world is the safest, but that’s just not possible anymore. Now, we just have to focus on being our own custodians of our data, protecting what we put out there and considering the impact of what is already available.

Don’t be lazier than the person trying to take advantage of you.

Thank you .Nikie!

Pierluigi

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

(Security Affairs – .Nikie, hacker)

The post Hacker Interviews – Speaking with .Nikie (@needtodestroy) appeared first on Security Affairs.

Source: Security affairs