An anonymous reader writes from a report via Bloomberg: The Food and Drug Administration cleared the first implant in the U.S. to treat heroin and opioid painkiller addictions. The product, Probuphine, may be used to treat addicts continuously for six months with the drug buprenorphine, according to a statement from the agency on Thursday. Titan Pharmaceuticals Inc. and partner Braeburn Pharmaceuticals are the two companies behind the implant and plan to bring it to the market just as Congress passed a bill aimed at addressing the opioid crisis. Buprenorphine differs from methadone in that it doesn't require a treatment program. Doctors can prescribe the implant to patients after they take a four-hour training program. The FDA rejected the implant in 2013 because the original dose that the companies proposed was too low to provide effective treatment. The companies decided to maintain the lower dose and attempt to gain approval by restricting use to patients who already were stable on such amounts. Meanwhile, employers are struggling to find workers who can pass a pre-employment drug test.
Leap Towards a Career in Ethical Hacking with 60+ Hours of Prep Toward CISM, CISA, & More Certification Exams at 95% off ×
An anonymous reader writes from a report via Reuters: After the San Bernardino terrorist attack, key U.S. lawmakers pledged to require technology companies to give law enforcement agencies a "back door" to encrypted communications and electronic devices. Now, the push for legislation is dead only months after the terrorist attack. In April, Senators Richard Burr and Dianne Feinstein released the official version of their anti-encryption bill with hopes for it to pass through Congress. But with the lack of White House support for the legislation as well as the high-profile court case between Apple and the Justice Department, the legislation will likely not be introduced this year, and even if it were, it would stand no chance of advancing, said sources familiar with the matter. "The short life of the push for legislation illustrates the intractable nature of the debate over digital surveillance and encryption, which has been raging in one form or another since the 1990s," reports Reuters. Technology companies believe security would be undermined if it were to create a "back door" for law enforcement, while law enforcement agencies believe they need to monitor phone calls, emails, text messages and encrypted data in general for security purposes.
New submitter maharvey writes: A woman in Pennsylvania has contracted a strain of E Coli that is unaffected by all known legal antibiotics, including the antibiotics of last resort. We have had bacteria that were resistant, but this is the first bacteria that is completely immune. Such bacteria were known in China, but since the woman has not traveled recently it means she contracted it in the wild in the USA. This is a major step toward the terrifying post-antibiotic world.
Karl Bode, reporting for DSLReports: In a letter being sent to Comcast customers in usage capped markets, the company says that with the recent announcement of usage caps being bumped to 1 terabyte, the company is also capping the amount of additional charges capped users can incur -- to $200 in a single month. As it stands, customers that cross the 1 terabyte limit face overage fees of $10 per each additional 50 GB consumed. But under the revised plans, customers have to pay $50 (up from $30 to $35) extra per month to avoid usage caps entirely. "Because you are an unlimited data customer, we will maintain your current rate of $35 until the end of 2016," the letter reads. Comcast's recent decision to bump their caps to 1 terabyte weren't driven by altruism. With the FCC preventing Charter from imposing caps for seven years as a merger condition, the agency has signaled that it may start getting more serious about cracking down on usage caps in the broadband market.
An anonymous reader shares an article on Fox Business: As fast-food workers across the country vie for $15 per hour wages, many business owners have already begun to take humans out of the picture. "I was at the National Restaurant Show yesterday and if you look at the robotic devices that are coming into the restaurant industry -- it's cheaper to buy a $35,000 robotic arm than it is to hire an employee who's inefficient making $15 an hour (warning: autoplaying video) bagging French fries -- it's nonsense and it's very destructive and it's inflationary and it's going to cause a job loss across this country like you're not going to believe," said former McDonald's USA CEO Ed Rensi during an interview on the FOX Business Network's Mornings with Maria. According to the Bureau of Labor Statistics, 1.3 million people earned the current minimum wage of $7.25 per hour with about 1.7 million having wages below the federal minimum in 2014. These three million workers combined made up 3.9 percent of all hourly paid workers.
HughPickens.com writes: Ron Nixon reports at the NYT that facing a backlash over long security lines and management problems, TSA administrator Peter V. Neffenger has shaken up his leadership team, replacing the agency's top security official Kelly Hoggan (Warning: source may be paywalled) and adding a new group of administrators at Chicago O'Hare International Airport. Beginning late that year, Hoggan received $90,000 in bonuses over a 13-month period, even though a leaked report from the Department of Homeland Security showed that auditors were able to get fake weapons and explosives past security screeners 95 percent of the time in 70 covert tests. Hoggan's bonus was paid out in $10,000 increments, an arrangement that members of Congress have said was intended to disguise the payments. During a hearing of the House Oversight Committee two weeks ago, lawmakers grilled Mr. Neffenger about the bonus, which was issued before he joined the agency in July. Last week and over the weekend, hundreds of passengers, including 450 on American Airlines alone, missed flights because of waits of two or three hours in security lines, according to local news reports. Many of the passengers had to spend the night in the terminal sleeping on cots. The TSA has sent 58 additional security officers and four more bomb-sniffing dog teams to O'Hare. Several current and former TSA employees said the moves to replace Hoggan and add the new officials in Chicago, where passengers have endured hours long waits at security checkpoints, were insufficient. "The timing of this decision is too late to make a real difference for the summer," says Andrew Rhoades, an assistant federal security director at Minneapolis-St. Paul International Airport who testified his supervisor accused him of "going native" after attending a meeting at a local mosque and that TSA's alleged practice of "directed reassignments," or unwanted job transfers were intended to punish employees who speak their minds. "Neffenger is only doing this because the media and Congress are making him look bad."
An anonymous reader writes from a report via Quartz: A report released May 24 by Gigya surveyed 4,000 adults in the U.S. and U.K. and found that 18- to 34-year-olds are more likely to use bad passwords and report their online accounts being compromised. The majority of respondents ages 51 to 69 say they completely steer away from easily cracked passwords like "password," "1234," or birthdays, while two-thirds of those in the 18-to-34 age bracket were caught using those kind of terms. Quartz writes, "The diligence of the older group could help explain why 82% of respondents in this age range did not report having had any of their online accounts compromised in the past year. In contrast, 35% of respondents between 18 and 34 said at least one of their accounts was hacked within the last 12 months, twice the rate of those aged 51 to 69."
Karl Bode, reporting for DSLReports (edited for clarity): Just a reminder to AT&T customers: the company's usage caps on U-Verse broadband connections is now in effect. When AT&T originally announced broadband caps on fixed-line connections back in 2011, it capped DSL customers at 150 GB per month and U-Verse customers at 250 GB per month. But while the DSL customer cap was enforced (by and large because AT&T wants these users to migrate to wireless anyway), AT&T didn't enforce caps for its U-Verse customers. Until now, anyway. Back in March AT&T announced it would begin enforcing usage caps on all connections starting May 23. As of today, U-Verse customers face different caps depending on their speed tier. AT&T says customers on U-Verse tiers with speeds between 768 Kbps and 6 Mbps will now face a 300 GB cap; customers on U-Verse tiers of speeds between 12 Mbps and 75Mbps will see a 600 GB cap, and customers on speeds between 100 Mbps and 1 Gbps will see a cap of 1 terabyte. Users who exceed these caps in any given month will automatically have to pay for 50 GB of additional data for $10 each.
Trailrunner7 quotes a report from onthewire.io: The FBI is working to keep information contained in a key biometric database private and unavailable, even to people whose information is contained in the records. The database is known as the Next Generation Identification System (NGIS), and it is an amalgamation of biometric records accumulated from people who have been through one of a number of biometric collection processes. That could include convicted criminals, anyone who has submitted records to employers, and many other people. The NGIS also has information from agencies outside of the FBI, including foreign law enforcement agencies and governments. Because of the nature of the records, the FBI is asking the federal government to exempt the database from the Privacy Act, making the records inaccessible through information requests. From the report: "The bureau says in a proposal to exempt the database from disclosure that the NGIS should be exempt from the Privacy Act for a number of reasons, including the possibility that providing access 'could compromise sensitive law enforcement information, disclose information which would constitute an unwarranted invasion of another's personal privacy; reveal a sensitive investigative technique; could provide information that would allow a subject to avoid detection or apprehension; or constitute a potential danger to the health or safety of law enforcement personnel, confidential sources, and witnesses.'" RT released a similar report on the matter.
An anonymous reader writes: Apple has opened its new flagship store on Thursday in San Fransisco, throwing the curtain back on a design that puts a premium on hanging out over shopping. About 20 percent of the new store's space features an open Forum area where visitors can learn about Apple's various products. The new design is rolling out to stores in Brussels, Memphis and Guilderland, N.Y. "This is the next generation of Apple retail," Angela Ahrendts, Apple's senior vice president of retail and online operations, told media. "Fifteen years ago today Apple opened its first two stores and we're thrilled to mark the occasion with the opening of Apple Union Square in San Francisco," she said. "We are not just evolving our store design, but its purpose and greater role in the community as we educate and entertain visitors and serve our network of local entrepreneurs." The new stores were designed by Ahrendts and Apple's design chief, Jony Ive. "Among the other big changes in evidence is morphing Apple's Genius Bar to Genius Grove; the addition of a new Boardroom area dedicated to small business customers; and the advent of a new staff position, Apple Creative Pro, tasked with helping consumers with specific questions on music, photography, videos and the like," writes USA Today. "In addition, some of Apple's most significant store locations, include the [Apple Union Square in San Fransisco], will feature a public Plaza that will be open 24/7 and feature free Wi-Fi as well as occasional concerts and other performances." Oh, and you can't forget about the new 6K video wall, which display broadcasts various Apple products.
Reader dcblogs shares an article on Computer World: In recent years, major high-tech firms have started releasing workforce diversity data, along with a promise to improve. And there is much room for improvement, according to federal officials. Among the top 75 Silicon Valley tech firms, whites make up 47% of the workforce, Asian Americans 41%, Hispanics, 6% and African Americans 3%, according to an analysis by the U.S. Equal Employment Opportunity Commission (EEOC). Women account for 30% of the workforce at these 75 firms. The diversity makeup of these Silicon Valley high-tech firms is very different from the national employment picture. When compared to overall private industry employment, the tech sector nationally -- not just Silicon Valley -- employed a larger share of whites (63% to 68%), as well as a larger share of Asian Americans (6% to 14%) and a smaller share of African Americans (14% to 7%) and Hispanics (14% to 8%). Employers with a workforce greater than 100 file reports to the EEOC about their employees' race, color, gender and national origin. Nationally, 64% of the employees in high-tech are men versus 52% in the broader workforce. Women account for 36% of the tech workforce, versus comprising 48% of the broader workforce.
Dan Goodin, reporting for Ars Technica (edited and condensed): ISPs around the world are being attacked by self-replicating malware that can take complete control of widely used wireless networking equipment, according to reports from customers. San Jose, California-based Ubiquiti Networks confirmed recently that attackers are actively targeting a flaw in AirOS, the Linux-based firmware that runs the wireless routers, access points, and other gear sold by the company. The vulnerability, which allows attackers to gain access to the devices over HTTP and HTTPS connections without authenticating themselves, was patched last July, but the fix wasn't widely installed. Many customers claimed they never received notification of the threat.ISPs in Argentina, Spain, Brazil have been attacked by the worm, said Nico Waisman, a research at security firm Immunity, adding that it's likely that ISPs in the U.S. and other places have also been attacked by the same malware. From the report, "Once successful, the exploit he examined replaces the password files of an infected device and then scans the network it's on for other vulnerable gear. After a certain amount of time, the worm resets infected devices to their factory default configurations, with the exception of leaving behind a backdoor account, and then disappears."
An anonymous reader writes: Earlier this month, the FDA announced it would regulate electronic cigarettes and other new tobacco products. Now, the U.S. Transportation Department announced it is permanently banning passengers and crew members from carrying electronic cigarettes in checked baggage or charging the devices onboard aircraft. They have cited a number of recent incidents that show the devices can catch fire during flight. Passengers can still carry e-cigarettes in their carry-on baggage or on their person, they just can't use the devices on flights. "Fire hazards in flight are particularly dangerous," Transportation Secretary Anthony Foxx said in a statement. "Banning e-cigarettes from checked bags is a prudent and important safety measure." The new rule covers e-cigarettes, e-cigars, e-pipes, and battery-powered portable electronic smoking devices in general. It does not prohibit passengers from transporting other battery-powered devices for personal use like laptop computers or cellphones.
An anonymous reader quotes a report from USA Today: Japan-based SoftBank Robotics announced Wednesday at Google I/O, the company's annual developer's conference, that it is opening a new Pepper-focused outpost in San Francisco and unveiling an Android SDK, or software development kit, in the hopes of enticing programmers to write code for the robot. Asked if SoftBank will roll out at SDK for iOS developers, Carlin says he wouldn't rule anything out but "for the moment Android is the pervasive language." Pepper is a white hard-plastic robot with humanoid features such as large eyes and arms as well as a display screen for a chest. The robot is said to be able to read human emotions by processing visual and vocal inputs through its various microphones and cameras. Its purpose is to be "much more than a robot, he is a genuine humanoid companion created to communicate with you in the most natural and intuitive way," according to the company's website. Pepper already has been deployed commercially in Japan, where it is used to greet customers at 140 SoftBank Mobile stores as well as help take orders at fast food eateries and discuss car model details at dealerships. Carlin says programmers working on Pepper-related tech will get access to "a best in class developer portal" that includes a developer forum, links to robotics workshops, access to SoftBank's engineering team and scientific details about Pepper. Google CEO Sundar Pichai announced the Tensor Processing Unit (TPU) at Google I/O, which the company claims advances machine learning capability by a factor of three generations.
A group of bipartisan senators introduced a bill on Thursday that blocks a pending judicial rule change allowing U.S judges to issue search warrants for remote access to computers in any jurisdiction, even overseas. Associated Press reports: Justice Department officials say that requirement is not practical in complex computer crime cases where investigators don't know the physical location of the device they want to search. In instances when cybercriminals operate on networks that conceal their identity and location, the government wants to ensure that any magistrate in a judicial district where a crime may have occurred can sign off on a search warrant that gives investigators remote access to the computer. The Obama administration says that authority is especially critical in cases involving botnets, which are networks of computers infected with a virus that spill across those districts. As it now stands, federal officials say, they might have to apply for nearly identical warrants in 94 different courthouses to disrupt a botnet.The U.S. Justice Department has pushed for the rule change since 2013. It has assumed it as a "procedural tweak" needed to modernize the criminal code to pursue sophisticated 21st century criminals, reports Reuters. Congress has until Dec 1 to vote to reject, amend or postpone the changes to Rule 41 of the federal rules of criminal procedure. If lawmakers fail to act, the change will automatically take effect, a scenario seen as likely given the short timeline. ZDNet has more details.
An anonymous reader shares a report on The Verge: Google's low-cost Chromebooks outsold Apple's range of Macs for the first time in the U.S. recently. IDC analyst Linn Huang confirmed the milestone to The Verge. "Chrome OS overtook Mac OS in the US in terms of shipments for the first time in 1Q16," says Huang. "Chromebooks are still largely a US K-12 story." IDC estimates Apple's U.S. Mac shipments to be around 1.76 million in the latest quarter, meaning Dell, HP, and Lenovo sold nearly 2 million Chromebooks in Q1 combined. Chromebooks have been extremely popular in US schools, and it's clear from IDC's comments the demand is driving US shipments. Outside of the US, it's still unclear exactly how well Google's low-cost laptops are doing. Most data from market research firms like IDC and Gartner focuses solely on Google's wins in the US.
HughPickens.com writes: Erik Eckholm reports in the NYT that the pharmaceutical giant Pfizer has announced that it has imposed sweeping controls on the distribution of its products to ensure that none are used in lethal injections, a step that closes off the last remaining open-market source of drugs used in executions. "Pfizer makes its products to enhance and save the lives of the patients we serve," the company says, and "strongly objects to the use of its products as lethal injections for capital punishment." "With Pfizer's announcement, all F.D.A.-approved manufacturers of any potential execution drug have now blocked their sale for this purpose," says Maya Foa. "Executing states must now go underground if they want to get hold of medicines for use in lethal injection." The mounting difficulty in obtaining lethal drugs has already caused states to furtively scramble for supplies. Some states have used straw buyers or tried to import drugs from abroad that are not approved by the Food and Drug Administration, only to see them seized by federal agents. Other states have experimented with new drug combinations, sometimes with disastrous results, such as the prolonged execution of Joseph Wood in Arizona in 2014, using the sedative midazolam. A few states have adopted the electric chair, firing squad or gas chamber as an alternative if lethal drugs are not available. Since Utah chooses to have a death penalty, "we have to have a means of carrying it out," said State Representative Paul Ray as he argued last year for authorization of the firing squad.
An anonymous reader writes: Chinese government is keeping an ever watchful eye on the companies doing business in the country, especially when foreign companies compete with local ones. To that end, the Chinese authorities have begun a security review among many different American technology companies like Apple and others. These, while mostly done out of the public sphere, seem to target issues like encryption and data storage. According to a report from the New York Times (paywalled; alternate source), government representatives have been questioning engineers and executives from different technology companies with regards to these issues for the last nine months. The so-called security reviews are being done by the Cyberspace Administration of China, with the government committee including experts tied to the country's military and security agencies.The Verge has more details.
An anonymous reader writes: According to Yahoo News, the CIA inspector general's office "mistakenly" destroyed its only copy of a mammoth Senate torture report at the same time lawyers for the Justice Department were assuring a federal judge that copies of the document were being preserved. Agency officials described the deletion of the document to Senate investigators as an "inadvertent" foul-up by the inspector general. "CIA inspector general officials deleted an uploaded computer file with the report and then accidentally destroyed a disk that also contained the document, filled with thousands of secret files about the CIA's use of 'enhanced' interrogation methods," reports Yahoo News. The Senate Intelligence Committee and Justice Department knew about the incident last summer, sources said. However, the destruction of a copy of the sensitive report was never made public, nor was it reported to the federal judge at the time who was overseeing a lawsuit seeking access to the still classified document under the Freedom of Information Act. Despite this incident, a CIA spokesperson has said another unopened computer disk with the full report is still locked in a vault at agency headquarters. "I can assure you that the CIA has retained a copy," wrote Dean Boyd, the agency's chief of public affairs, in an email. Feinstein is calling for the CIA inspector general to obtain a new copy of the report to replace the one that disappeared. A 500-page summary was released in 2014, and concluded that the CIA misled Americans on the effectiveness of "enhanced interrogation." Specifically, the interrogations were poorly managed and unreliable.
An anonymous reader writes: Al-Qaeda's official online propaganda magazine, Inspire, contains a montage of violent images -- things like guns and blood -- next to an image of Bill Gates. The terrorist group is urging its followers to murder successful business folks, such as Gates, which is absolutely sickening. The terrorist group says that murdering high ranking people can damage the U.S. economy.