Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Communications

Tor Network May Be Attacked, Says Project Leader 24

Posted by timothy
from the routing-around-the-routing-around dept.
Earthquake Retrofit writes The Register is reporting that the Tor Project has warned that its network – used to mask peoples' identities on the internet – may be knocked offline in the coming days. In a Tor blog post, project leader Roger 'arma' Dingledine said an unnamed group may seize Tor's directory authority servers before the end of next week. These servers distribute the official lists of relays in the network, which are the systems that route users' traffic around the world to obfuscate their internet connections' public IP addresses.
Medicine

How a 3D Printer Let a Dog Run For the First Time 7

Posted by timothy
from the dogs-have-been-running-since-forever dept.
Nerval's Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology's potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.
Security

Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony 82

Posted by timothy
from the forewarned-is-forearmed dept.
wiredmikey writes Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise. While not mentioning Sony by name in its advisory, instead referring to the victim as a "major entertainment company," US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks. According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool. US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations.
Businesses

Staples: Breach May Have Affected 1.16 Million Customers' Cards 62

Posted by timothy
from the your-name-here dept.
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.
Cellphones

T-Mobile To Pay $90M For Unauthorized Charges On Customers' Bills 43

Posted by timothy
from the oh-you-wanted-honesty dept.
itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.
Education

Ask Slashdot: Resources For Kids Who Want To Make Games? 92

Posted by Soulskill
from the building-blocks-of-fun dept.
Mr. Jones writes: My 11-year-old son is fascinated by games — game mechanics in particular. He has been playing everything from Magic to WarFrame since he was 5 years old. He seems mostly interested in creating the lore and associated mechanics of the games (i.e. how a game works). If it was only programming I could help him, but I am lost when it comes to helping him learn more formal ways of developing and defining gameplay. I really see a talent for this in him and I want to support it any way I can. Can you suggest any conferences, programs, books, websites, etc. that would help him learn?
Transportation

Tesla About To Start Battery-Swap Pilot Program 98

Posted by Soulskill
from the not-free-of-charge dept.
cartechboy writes: Remember 18 months ago when Tesla promised it was going to launch battery-swap stations? Well, it's finally happening, sort of. It seems Tesla's about to announce a battery-swap pilot program that will launch next week. The swap site will be located across the street from a Tesla Supercharger site in Harris Ranch, California — 184 miles south of San Francisco and about 200 miles north of Los Angeles. The pilot program will involve an unspecified number of Model S electric-car owners, who will be invited to take part in the test. For now, the battery-swap service will be offered by appointment only, at a cost of roughly a tank of gas in a premium sedan. Tesla's using words to describe this pilot program like "exploratory work" and "intended to test technology and assess demand" for a swapping service. While originally pitched that the battery swap would take less time than it would to take to refill the gas tank of a comparable luxury sedan, the company says now that "for this specific iteration" the swap process will take "approximately 3 minutes" — though it adds Tesla has "the ability to improve that time with future iterations." Is this test going to show that battery swapping is or isn't a realistic initiative?
Earth

Geoengineered Climate Cooling With Microbubbles 96

Posted by Soulskill
from the or-we-could-make-an-ocean-sized-mirror dept.
Rambo Tribble writes: Scientists from the University of Leeds have proposed that brighter ships' wakes, created by reducing their component bubbles' sizes, could moderately increase the reflectivity of our oceans, which would have a cooling effect on the climate. The technology is touted as being available and simple, but there could be side effects, like wetter conditions in some regions. Still, compared to many speculative geoengineering projects, "The one advantage about this technology — of trying to generate these tiny 'micro-bubbles' — is that the technology does already exist," according to Leeds' Prof Piers Forster.
Linux

LinuxFest Northwest 2015 Will be Held April 25 and 26 (Video) 20

Posted by Roblimo
from the the-coolest-conference-in-our-country's-upper-left-hand-corner dept.
Their website says, 'Come for the code, stay for the people! We have awesome attendees and electrifying parties. Check out the robotics club, the automated home brewing system running on Linux, or the game room for extra conference fun.' This is an all-volunteer conference, and for a change the volunteers who run it are getting things together far in advance instead of having sessions that don't get scheduled until a few days before the conference, which has happened more than once with LFNW.

So if you have an idea for a session, this is the time to start thinking about it. Sponsors are also welcome -- and since LFNW sponsorships regularly sell out, it's not to soon to start thinking about becoming a sponsor -- and if you are part of a non-profit group or FOSS project, LFNW offers free exhibit space because this is a conference that exists for the community, not to make money for a corporate owner. But don't delay. As you can imagine, those free exhibit spots tend to fill up early. (Alternate Video Link)
Sony

Schneier Explains How To Protect Yourself From Sony-Style Attacks (You Can't) 299

Posted by Soulskill
from the just-look-less-hackable-than-the-schmuck-next-to-you dept.
phantomfive writes: Bruce Schneier has an opinion piece discussing the Sony attack. He says, "Your reaction to the massive hacking of such a prominent company will depend on whether you're fluent in information-technology security. If you're not, you're probably wondering how in the world this could happen. If you are, you're aware that this could happen to any company." He continues, "The worst invasion of privacy from the Sony hack didn’t happen to the executives or the stars; it happened to the blameless random employees who were just using their company’s email system. Because of that, they’ve had their most personal conversations—gossip, medical conditions, love lives—exposed. The press may not have divulged this information, but their friends and relatives peeked at it. Hundreds of personal tragedies must be unfolding right now. This could be any of us." Related: the FBI has officially concluded that the North Korean government is behind the attack.
Biotech

Machine Learning Reveals Genetic Controls 10

Posted by Soulskill
from the finally-explains-why-your-ears-stick-out-so-far dept.
An anonymous reader writes with this quote from Quanta Magazine: Most genetic research to date has focused on just 1 percent of the genome — the areas that code for proteins. But new research, published today in Science, provides an initial map for the sections of the genome that orchestrate this protein-building process. "It's one thing to have the book — the big question is how you read the book," said Brendan Frey, a computational biologist at the University of Toronto who led the new research (abstract).

For example, researchers can use the model to predict what will happen to a protein when there’s a mistake in part of the regulatory code. Mutations in splicing instructions have already been linked to diseases such as spinal muscular atrophy, a leading cause of infant death, and some forms of colorectal cancer. In the new study, researchers used the trained model to analyze genetic data from people afflicted with some of those diseases. The scientists identified some known mutations linked to these maladies, verifying that the model works. They picked out some new candidate mutations as well, most notably for autism.

One of the benefits of the model, Frey said, is that it wasn’t trained using disease data, so it should work on any disease or trait of interest. The researchers plan to make the system publicly available, which means that scientists will be able to apply it to many more diseases.
Robotics

The Dominant Life Form In the Cosmos Is Probably Superintelligent Robots 332

Posted by Soulskill
from the quick-destroy-all-the-remaining-copies-of-Battlebots dept.
Jason Koebler writes: If and when we finally encounter aliens, they probably won't look like little green men, or spiny insectoids. It's likely they won't be biological creatures at all, but rather, advanced robots that outstrip our intelligence in every conceivable way. Susan Schneider, a professor of philosophy at the University of Connecticut, joins a handful of astronomers, including Seth Shostak, director of NASA's Search for Extraterrestrial Intelligence, NASA Astrobiologist Paul Davies, and Library of Congress Chair in Astrobiology Stephen Dick in espousing the view that the dominant intelligence in the cosmos is probably artificial. In her paper "Alien Minds," written for a forthcoming NASA publication, Schneider describes why alien life forms are likely to be synthetic, and how such creatures might think.
The Courts

All the Evidence the Government Will Present In the Silk Road Trial Is Online 45

Posted by Soulskill
from the defendant-knowingly-and-willfully-went-on-the-internets dept.
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."

"It's ten o'clock... Do you know where your AI programs are?" -- Peter Oakley

Working...