IT Workers, Companies Cautious on H1B Visa Program Review

During a recent visit to Wisconsin, President Donald Trump announced he was signing an Executive Order reviewing the visa program that brings many technical workers to the United States, known as the H1B visa. About 85,000 workers come to the United States annually using an H1B visa. More from VOA’s Kane Farabaugh

Strato-glider to Explore Little-known Mountain Waves

Later this year, two pilots in a sailplane will try to break the world altitude record for a glider, soaring more than 27 kilometers above sea level. But their primary mission will be to explore the little-known phenomenon called “mountain waves” and to carry a number of experiments designed by school students. VOA’s George Putic reports.

Beyond ‘Fake News:’ Facebook Fights ‘Information Operations’

Facebook is acknowledging that governments or other malicious non-state actors are using its social network to sway political sentiment, including elections.

That’s a long way from CEO Mark Zuckerberg’s assertion in November that the idea that bogus information on Facebook influenced the U.S. presidential election was “pretty crazy.” It also illustrates how the world’s biggest social network has been forced to grapple with its outsized role in how the world communicates, for better or for worse.

In an online posting Thursday, the company said that it would monitor efforts to disrupt “civic discourse” on Facebook. It is also looking to identify fake accounts, and says that it will warn people if their accounts have been targeted by cyber-attackers.

Apple Cuts Off Payments, Qualcomm Slashes Expectations

Qualcomm slashed its profit expectations Friday by as much as a third after saying that Apple is refusing to pay royalties on technology used in the iPhone.

Its shares hit a low for 2017.

Apple Inc. sued Qualcomm earlier this year, saying that the San Diego chipmaker has abused its control over essential technology and charged excessive licensing fees. Qualcomm said Friday that Apple now says it won’t pay any fees until the dispute is resolved. Apple confirmed Friday that it has suspended payments until the court can determine what is owed.

“We’ve been trying to reach a licensing agreement with Qualcomm for more than five years but they have refused to negotiate fair terms,” Apple said. “As we’ve said before, Qualcomm’s demands are unreasonable and they have been charging higher rates based on our innovation, not their own.”

Qualcomm said it will continue to vigorously defend itself in order to “receive fair value for our technological contributions to the industry.”

But the effect on Qualcomm, whose shares have already slid 15 percent since the lawsuit was filed by Apple in January, was immediate.

Qualcomm now expects earnings per share between 75 and 85 cents for the April to June quarter. Its previous forecast was for earnings per share between 90 cents and $1.15.

Revenue is now expected to be between $4.8 billion and $5.6 billion, down from its previous forecast between $5.3 billion and $6.1 billion.

Shares of Qualcomm Inc. tumbled almost 4 percent at the opening bell to $51.22.

Driverless Apple Car Spotted in Silicon Valley

Just weeks after receiving official approval, an Apple self-driving car has been seen making its way through the streets of Silicon Valley.

The Lexus fitted with various sensors is the latest entrant in the quest to make driverless cars commercially viable. Apple, a late comer, likely will face fierce competition from Google’s Waymo, which has carried out millions of miles of road testing, and Uber, which has been testing autonomous cars for months.

Apple’s initiative, officially called Project Titan, is driven by hardware developed by Velodyne Lidar, while Apple is expected to develop the software.

Based on documents obtained by Business Insider, Apple’s cars sound very much like other self-driving cars. The cars are “capable of sending electronic commands for steering, accelerating, and decelerating and may carry out portions of the dynamic driving task,” according to the documents.

As with other driverless cars, humans are still present and can override the self-driving mode at any time.

Despite being somewhat late to the game, Apple may find an opening in the way of a potentially lengthy legal battle between Waymo and Uber, with Waymo alleging that Uber stole its trade secrets.

On Thursday, Uber executive Anthony Levandowski recused himself from work on driverless cars in the wake of the lawsuit, which alleges he stole intellectual property while employed at Google.

Robot Takes Recovering Child to Her Seat in Class

“I would like for you to have a pencil out on your desk,” fifth-grade teacher Mary Fucella said to her reading class at Point Pleasant Elementary School in Glen Burnie, Maryland. A kilometer and a half away, in a pink bedroom, Cloe Gray pulled a pencil out, too, and listened.

Cloe, 11, is at home, recuperating from leg surgery. For the first month after the operation, a home tutor visited her. But the precocious child grew withdrawn and didn’t want to leave her bed. She missed routine. She missed her friends. She missed real school.

“You could tell she wasn’t happy,” said Rob Gray, Cloe’s dad.     

The Anne Arundel County school system in Maryland had a cure. Cloe now attends class virtually through a $3,000 robot. Hers, which she named Clo-Bot, was donated by the local Rotary Club. Since she began using it, the learning hasn’t stopped.

Clo-Bot is basically an iPad attached to a pole on wheels. Cloe uses the keyboard on her home computer to remotely control the device, rolling it into and out of the classroom. She speaks through a headset and is heard through the iPad. When the class breaks up into small groups, one classmate holds materials up to the iPad, and Cloe contributes to the project.

Fucella said Cloe was a little shy at first about “raising” Clo-Bot’s hand, “but now I feel like it’s just like having the normal Cloe in the classroom.”

To answer a question, Cloe clicks on a slider, and the iPad raises to the teacher’s eye level. Cloe said the robot had given her confidence to participate. “I’ll try it and I’ll get it right,” she said. “Woo-hoo! Personal victory!”

The Anne Arundel schools have six of the robots. Patrick Malone of the district’s Office of Instructional Technology said he and his colleagues had been stunned at their effectiveness.

“Every kid that uses this technology starts to smile again,” Malone said. “They start to feel like a regular kid again, and I cannot put a price on that.”

Devices like Clo-Bot are the brainchild of Double Robotics, a privately held technology company in Burlingame, California.

The telepresence robot can be used for business or education, anywhere people need a physical presence. Double Robotics co-founder and CEO David Cann said he understood the importance of school attendance, educationally and socially, and that it was humbling “to be able to provide a way for all students to attend school, no matter their situation.”

Double Robotics has 300 of its robots in the United States, with 25 others placed in education facilities in China, Japan, Australia and Canada.

When it’s lunchtime at Point Pleasant, Cloe’s best friend, Kyla Jones, walks with Clo-Bot to the lunchroom. The sight of a fifth-grader walking with an iPad rolling beside her seems like a scene from a science fiction movie.

“At first it was kind of weird because it was Cloe, but not really Cloe,” Kyla said. But now, it’s natural for the two to discuss, well, whatever fifth-graders discuss. On a recent day, the topic was flip-flops.

Cloe uses the device’s 150-degree wide-angle lens to look down as she maneuvers the robot beside the cafeteria table. Cloe’s dad delivers her lunch to her desk at home, and classmates start joining Clo-Bot at the lunch table.

Cloe said it’s sometimes nerve-racking to enter the lunchroom. “Everyone’s like, ‘Hi, Cloe!’ ‘Bye, Cloe!’ ” she said.

Clo-Bot waits until school is over to get its energy. Cloe maneuvers it to a charging station, where it sits until the bell rings the next morning. Then Cloe will happily drive her virtual self back to Ms. Fucella’s class.

Robot Takes Sick Child to Class

Think back to grade school. If you were sick, you stayed home. If you had a serious illness, you’d miss weeks, or even months of classes. Technology could change all this, with a robot attending school in place of the sick child. VOA’s Carolyn Presutti introduces us to a Baltimore girl who is homebound no more.

Most US Teens Have Taken Social Media Break, Poll Finds

The common stereotype has teens glued to their phones 24-7. But nearly 60 percent of teens in the U.S. have actually taken a break from social media – the bulk of them voluntarily, a new survey found.

The poll, from The Associated Press-NORC Center for Public Affairs Research, surveyed teens aged 13 to 17 and found that most value the feeling of connection with friends and family that social media provides. A much smaller number associate it with negative emotions, such as being overwhelmed or needing to always show their best selves.

The survey, released Thursday, found that teens’ social media breaks are typically a week or longer, and that boys are more likely to take longer breaks.

Teens were allowed to cite multiple reasons for their breaks. Nearly two-thirds of teens who took a break cited at least one voluntary reason. Amanda Lenhart, the lead researcher and an expert on young people and technology use, said she was surprised by this, as it counters the broader narrative that teens are “handcuffed” to their social media profiles.

Today’s teenagers might not recall a time before social media. MySpace was founded in 2003. Had it survived, it would be 14 years old today. Facebook is a year younger. Instagram launched in 2010. For an adult to understand what it might be like for someone who grew up with it to step back from social media, consider disconnecting from email – or your phone – for a couple of weeks.

Among the teens who took voluntary breaks, 38 percent did so because social media was getting in the way of work or school. Nearly a quarter said they were tired of “the conflict and drama” and 20 percent said they were tired of having to keep up with what’s going on.

Nearly half of teens who took a break did so involuntarily. This included 38 percent who said their parents took away their phone or computer and 17 percent who said their phone was lost, broken or stolen.

The involuntary break “is sort of its own challenge,” Lenhart said. “They feel that they are missing out, detached from important social relationships (as well as) news and information.”

About 35 percent of teens surveyed said they have not taken a break, citing such worries as missing out and being disconnected from friends. Some said they need social media for school or extracurricular activities.

“I like to see what my friends and family are up to,” said Lukas Goodwin, 14, who uses Instagram and Snapchat every day. He said he took a break from Instagram “a few years ago” but not recently. Now, he says, “I wouldn’t want to take a break from them.”

Among the survey’s other findings:

– Lower income teens were more likely to take social media breaks than their wealthier counterparts, and their breaks tended to last longer. The study points out that educators who use social media in the classroom need to understand that not every teen is online and connected all the time.

– Boys were more likely to feel overloaded with information on social media, while girls were more likely to feel they always have to show the best version of themselves.

– Teens who took breaks typically did so across the board, checking out of Facebook, Snapchat and all other services all at once. And they were no more or less likely to take breaks from social media based on the type of services they use.

– Although they felt relief and were happy to be away from social media for a while, most teens said things went back to how they were before once they returned to social media.

The AP-NORC poll was conducted online and by phone from Dec. 7 to 31. A sample of parents with teenage children was drawn from a probability-based panel of NORC at the University of Chicago. Parents then gave permission for their children to be interviewed. The panel, AmeriSpeak, is designed to be representative of the U.S. population. The margin of sampling error for all respondents is plus or minus 4.6 percentage points.

Hackers Exploited Word Flaw for Months While Microsoft Investigated

To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199.

The bug was unusually dangerous but of a common genre: it was in Microsoft software, could allow a hacker to seize control of a personal computer with little trace, and was fixed April 11 in Microsoft’s regular monthly security update.

But it had traveled a rocky, nine-month journey from discovery to resolution, which cyber security experts say is an unusually long time.

Google’s security researchers, for example, give vendors just 90 days’ warning before publishing flaws they find.

Microsoft Corp. declined to say how long it usually takes to patch a flaw.

While Microsoft investigated, hackers found the flaw and manipulated the software to spy on unknown Russian speakers, possibly in Ukraine.

And a group of thieves used it to bolster their efforts to steal from millions of online bank accounts in Australia and other countries.

Those conclusions and other details emerged from interviews with researchers at cyber security firms who studied the events and analyzed versions of the attack code.

Microsoft confirmed the sequence of events.

The tale began last July, when Ryan Hanson, a 2010 Idaho State University graduate and consultant at boutique security firm Optiv Inc. in Boise, found a weakness in the way that Microsoft Word processes documents from another format. That allowed him to insert a link to a malicious program that would take control of a computer.

Combining flaws

Hanson spent some months combining his find with other flaws to make it more deadly, he said on Twitter. Then in October he told Microsoft. The company often pays a modest bounty of a few thousands dollars for the identification of security risks.

Soon after that point six months ago, Microsoft could have fixed the problem, the company acknowledged. But it was not that simple. A quick change in the settings on Word by customers would do the trick, but if Microsoft notified customers about the bug and the recommended changes, it would also be telling hackers about how to break in.

Alternatively, Microsoft could have created a patch that would be distributed as part of its monthly software updates.

But the company did not patch immediately and instead dug deeper. It was not aware that anyone was using Hanson’s method, and it wanted to be sure it had a comprehensive solution.

“We performed an investigation to identify other potentially similar methods and ensure that our fix addresses more than just the issue reported,” Microsoft said through a spokesman, who answered emailed questions on the condition of anonymity. “This was a complex investigation.”

Hanson declined interview requests.

The saga shows that Microsoft’s progress on security issues, as well as that of the software industry as a whole, remains uneven in an era when the stakes are growing dramatically.

The United States has accused Russia of hacking political party emails to interfere in the 2016 presidential election, a charge Russia denies, while shadowy hacker groups opposed to the U.S. government have been publishing hacking tools used by the Central Intelligence Agency and National Security Agency.

Attack begin

It is unclear how the unknown hackers initially found Hanson’s bug. It could have been through simultaneous discovery, a leak in the patching process, or even hacking against Optiv or Microsoft.

In January, as Microsoft worked on a solution, the attacks began.

The first known victims were sent emails enticing them to click on a link to documents in Russian about military issues in Russia and areas held by Russian-backed rebels in eastern Ukraine, researchers said. Their computers were then infected with eavesdropping software made by Gamma Group, a private company that sells to agencies of many governments.

The best guess of cyber security experts is that one of Gamma’s customers was trying to get inside the computers of soldiers or political figures in Ukraine or Russia; either of those countries, or any of their neighbors or allies, could have been responsible. Such government espionage is routine.

The initial attacks were carefully aimed at a small number of targets and so stayed below the radar. But in March, security researchers at FireEye Inc noticed that a notorious piece of financial hacking software known as Latenbot was being distributed using the same Microsoft bug.

FireEye probed further, found the earlier Russian-language attacks, and warned Microsoft. The company, which confirmed it was first warned of active attacks in March, got on track for an April 11 patch.

Then, what counts as disaster in the world of bug-fixers struck. Another security firm, McAfee, saw some attacks using the Microsoft Word flaw on April 6.

After what it described as “quick but in-depth research,” it established that the flaw had not been patched, contacted Microsoft, and then blogged about its discovery on April 7.

The blog post contained enough detail that other hackers could mimic the attacks.

Other software security professionals were aghast that McAfee did not wait, as Optiv and FireEye were doing, until the patch came out.

McAfee Vice President Vincent Weafer blamed “a glitch in our communications with our partner Microsoft” for the timing. He did not elaborate.

By April 9, a program to exploit the flaw was on sale on underground markets for criminal hackers, said FireEye researcher John Hultquist.

The next day, attacks were mainstream. Someone used it to send documents booby-trapped with Dridex banking-fraud software to millions of computers in Australia.

Finally, on the Tuesday, about six months after hearing from Hanson, Microsoft made the patch available. As always, some computer owners are lagging behind and have not installed it.

Ben-Gurion University employees in Israel were hacked, after the patch, by attackers linked to Iran who took over their email accounts and sent infected documents to their contacts at technology companies and medical professionals, said Michael Gorelik, vice president of cyber security firm Morphisec.

When Microsoft patched, it thanked Hanson, a FireEye researcher and its own staff.

A six-month delay is bad but not unheard of, said Marten Mickos, chief executive of HackerOne, which coordinates patching efforts between researchers and vendors.

“Normal fixing times are a matter of weeks,” Mickos said.

Privately-held Optiv said through a spokeswoman that it usually gives vendors 45 days to make fixes before publishing research when appropriate, and that it “materially followed” that practice in this case.

Optiv is now comparing the details of what Hanson told Microsoft with what the spies and criminals used in the wild, trying to find out if the researcher’s work was partly responsible for the worldwide hacking spree, the spokeswoman said.

The spree included one or more people who created a hacking tool for what FireEye’s Hultquist said is probably a national government – and then appearing to double-dip by also selling it to a criminal group.

If the patching took time, others who learned of the flaw moved quickly.

On the final weekend before the patch, the criminals could have sold it along to the Dridex hackers, or the original makers could have cashed in a third time, Hultquist said, effectively staging a last clearance sale before it lost peak effectiveness.

It is unclear how many people were ultimately infected or how much money was stolen.

 

 

 

Security Firm: Cyberattacks Against Saudi Arabia Continue

Researchers at U.S. antivirus firm McAfee say the cyberattacks that have hit Saudi Arabia over the past few months are continuing, revealing new details about an unusually disruptive campaign.

Speaking ahead of the blog post ‘s publication Wednesday, McAfee chief scientists Raj Samani said the latest intrusions were very similar, albeit even worse, to the malicious software that wrecked computers at Saudi Arabia’s state-run oil company in 2012.

“This campaign was a lot bigger,” Samani said. “Way larger in terms of the amount of work that needed to be done.”

It’s a striking claim. The 2012 intrusions against Saudi Aramco and Qatari natural gas company RasGas – data-wiping attacks that wrecked tens of thousands of computers – were among the most serious cyberattacks ever publicly revealed. At the time, the United States called it “the most destructive attack that the private sector has seen to date.”

Echoing research done by others, McAfee said the most recent wave of attacks drew heavily on the malicious code used in the 2012 intrusions. McAfee also said that some of the code appears to have been borrowed by a previously known hacking group, Rocket Kitten , and used digital infrastructure also employed in a cyberespionage campaign dubbed OilRig . U.S. cybersecurity firms have tied both to Iran, with greater or lesser degrees of certainty.

McAfee stopped short of linking any particular actor to the most recent attacks.

Saudi officials and news media have given little detail about the intrusions beyond saying that more than a dozen government agencies and companies were affected, and a government adviser did not immediately return a message seeking comment.

The Iranian Embassy in Paris did not immediately return messages.

 

Wikipedia Founder Launches Site to Fight Fake News

The founder of Wikipedia is starting a website he says will fight so-called fake news.

Jimmy Wales says his Wikitribune site will bring journalists and volunteer fact checkers together to stop the spread of false news stories.

“We want to make sure that you read fact-based articles that have a real impact in both local and global events,” according to the group’s website.

The volunteer fact checkers’ role will be similar to how editors work on Wikipedia. Any changes will be reviewed by other fact checkers.

The site will also carry stories by professional journalists.

Unlike most news sites, Wikitribune says it will post full transcripts of interviews “to the maximum extent possible.”

“It takes professional, standards-based journalism, and incorporates the radical idea from the world of wiki that a community of volunteers can and will reliably protect the integrity of information,” said Wales, according to CNN.

Money to fund the site will come from contributions as opposed to advertisements or subscriptions.

“[Fake news] is literally designed to show us what we want to see, to confirm our biases, and to keep us clicking at all cost,” Wales said. “It fundamentally breaks the news.”

Some experts as skeptical, saying the site may only appeal to journalists and people who read a lot of news.

“I wonder whether it will be able to scale up to make a significant impact on the information sphere, especially on social networks such as Facebook where the main problems of fake news and misinformation occur,” saidCharlie Beckett, a professor at the London School of Economics, in an interview with CNN.

Wales’ Wikipedia has long battled criticism that it contains misleading or false information.