mask.of.sanity writes "Hundreds of organizations have been detected running dangerously vulnerable versions of SAP that were more than seven years old and thousands more have placed their critical data at risk by exposing SAP applications to the public Internet. The new research found the SAP services were inadvertently made accessible thanks to a common misconception that SAP systems were not publicly-facing and remotely-accessible. The SAP services contained dangerous vulnerabilities which were since patched by the vendor but had not been applied."
Become a fan of Slashdot on Facebook
Runefox writes "Cerulean Studios, the company behind the long-lived Trillian instant messaging client, has released preliminary specifications to their proprietary "Astra" protocol, now named IMPP (Instant Messaging and Presence Protocol), which provides continuous client functionality as well as mandatory TLS encryption for clients. According to their blog, Cerulean Studios' motivation for the release is to promote interoperability among the throngs of IM services and clients available by allowing others to also use the protocol. Future concepts include federation with XMPP. While the documentation is in an early state and the protocol is claimed to still be in development, it is hoped that it will help decentralize the very heavily fragmented messaging ecosystem. It's implied that, in turn, greater options for privacy may become available in the wake of the PRISM scandal via privately-run federated servers, unaffiliated with major networks, yet still able to communicate with them."
sciencehabit writes "Show a native-born Chinese person a picture of the Great Wall, and suddenly they'll have trouble speaking English, even if they usually speak it fluently. That's the conclusion of a new study, which finds that reminders of our home country can complicate our ability to speak a new language. The findings could help explain why cultural immersion is the most effective way to learn a foreign tongue and why immigrants who settle within an ethnic enclave acculturate more slowly than those who surround themselves with friends from their new country."
crackspackle writes "The Supreme Court ruled in favor of the State of Texas earlier today in a murder trial where the defendant, prior to be taken into custody, had been questioned by the police and chose to remain silent on key questions. This fact was bought up at trial and used to convict him. Most of us have seen at least enough cop shows to know police must read a suspect their Miranda rights when placing them in custody. The issue was a bit murkier here in that the defendant had not yet been detained and while we all probably thought the freedom from self-incrimination was an implicit right as stated in the Constitution, apparently SCOTUS now thinks you have to claim that right or at least be properly mirandized first." It appears that if you are "free to leave at any time" you lose a few rights. Fancy trick, up there with getting kids to write apology letters.
Bob the Super Hamste writes "The St. Paul Pioneer press is reporting that Comcast is planning on expanding its network of public WiFi hot spots in the Twin Cities area by using home internet connections and user's WiFi routers. Customers will be upgraded to new wireless routers that will have 2 wireless networks, one for the home users and one for the general public. Subscribers to Comcast's Xfinity service and customers that participate in the public WiFi program will be allowed free access to the public WiFi offered by this service. Non Comcast customers get 2 free sessions a month each lasting 1 hour with additional sessions costing money. The article mentions that a similar service already exists and is provided by the Spain-based company Fon."
sciencehabit writes "In a few years, an iPhone app may give you a 3D layout of a room as soon as you step into it. Researchers have developed an algorithm that spits out the shape and contours of complex structures (including Switzerland's Lausanne Cathedral) using data compiled from four randomly placed microphones. The technology, which relies on the same sort of echolocation bats and dolphins use to navigate, could be used to develop more realistic echoes in video games and virtual reality simulations and to eliminate the echo from phone calls."
Lasrick writes "Evie Sobczak won a trip to Jet Propulsion Lab for her biofuel invention: 'For a fifth-grade science fair, Evie Sobczak found that the acid in fruit could power clocks; she connected a cut-up orange to a clock with wire and watched it tick. In seventh grade, she generated power by engineering paddles that could harness wind. And in eighth grade, she started a project that eventually would become her passion: She wanted to grow algae and turn it into biofuel.'"
kkleiner writes "A self-described think tank of engineers and inventors called Two Bit Circus have completed a successful crowdfunding campaign to launch a high tech reinvention of carnivals from yesteryear. The campaign raised over $100k to launch the STEAM Carnival (as in Science, Technology, Engineering, Art, and Math) to take place in Los Angeles and San Francisco next year. Showcasing robots, fire, and lasers, the goal of the carnival is to inspire young people into science and technology through these entertaining and educational events."
MTorrice writes "A surprising suite of microbial species colonizes plastic waste floating in the ocean, according to a new study. The bacteria appeared to burrow pits into the plastic. One possible explanation is that bacteria eat into the polymers, weakening the pieces enough to cause them to break down more quickly and eventually sink to the sea floor. While the microbes could speed the plastic's decay, they might also cause their own ecological problems, the researchers say."
Rick Zeman writes "Showing once again that once a privacy door is opened every law enforcement agency will run through it, The Washington Post details how state drivers license photo databases are being mined by various LEOs in their states--and out. From the article: '[L]aw enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. The most advanced systems allow police to run searches from laptop computers in their patrol cars and offer access to the FBI and other federal authorities. Such open access has caused a backlash in some of the few states where there has been a public debate. As the databases grow larger and increasingly connected across jurisdictional boundaries, critics warn that authorities are developing what amounts to a national identification system — based on the distinct geography of each human face.'"
An anonymous reader writes "China's Tianhe-2 is the world's fastest supercomputer, according to the latest semiannual Top 500 list of the 500 most powerful computer systems in the world. Developed by China's National University of Defense Technology, the system appeared two years ahead of schedule and will be deployed at the National Supercomputer Center in Guangzho, China, before the end of the year."
benrothke writes "It's said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests been written as a spy thriller, it would have been a fascinating novel of international intrigue. But the book is far from a novel. It's a dense, well-researched overview of China's cold-war like cyberwar tactics against the US to regain its past historical glory and world dominance." Read below for the rest of Ben's review.
Brandon Butler writes "Red Hat made its first $1 billion commercializing Linux. Now, it hopes to make even more doing the same for OpenStack. Red Hat executives say OpenStack – the open source cloud computing platform – is just like Linux. The code just needs to be massaged into a commercially-hardened package before enterprises will really use it. But just because Red Hat successfully commercialized Linux does not guarantee its OpenStack effort will go as well. Proponents say businesses will trust Red Hat as an OpenStack distribution company because of its work in the Linux world. But others say building a private cloud takes a lot more than just throwing some code on top of a RHEL OS."
Zothecula writes "Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA tagging. The difference is that instead of tagging the objects being stolen, the company's system tags the perpetrator with DNA. While this has been tried before by applying the DNA to a fleeing criminal with a gun, ADNAS has adopted a more subtle approach."
MojoKid writes "Odds are, if you've purchased anything that uses Flash memory in the last 20 years or so, you already own a piece of SanDisk technology. The company has been in Flash storage since the late '80s and manufactures products used in everything from smartphones to digital cameras. Even though it enjoys a long history in the Flash memory business, SanDisk is perhaps not as well known for its Solid State Drive (SSD) solutions for desktop and mobile PCs. However, SanDisk recently expanded their product stack with new, high-performance SSDs that leverage the company's own NAND Flash memory and Marvell's popular 88SSS9187 controller. The new drives are SanDisk's Extreme II family of SSDs targeted performance enthusiasts, workstations professionals and gamers. The initial line-up of drives consists of 120GB, 240GB, and 480GB models. Performance specifications for the three drives come in at 545MB/s – 550MB/s for reads with write performance from 340MB/s to 510MB/s, depending on density. In the benchmarks, SanDisk's Extreme II SSD showed it has the chops to hang with some of the fastest drives on the market from Samsung, Corsair and OCZ."
The Superman reboot Man of Steel broke the record for the biggest June opening weekend ever with a whopping $125.1 million. Reviews have been mixed so far, ranging from: "DC and Warner Brothers have opted to produce a movie that foregoes a character-driven story. Instead, we're left with a trite blockbuster that holds beautiful special effects, an inspiring music score, a story that panders to the movie-goer who refrains from looking deep into the story, and neglects to define Superman as character, leaving him only as a hollow symbol and stock character, which ultimately leaves the movie about the events that transpire rather than the characters involved in them," to " What this version of the iconic DC Comics superhero does is emote convincingly. Thanks to director Zack Snyder and a serious-minded script by David S. Goyer (who shares story credit with his The Dark Knight collaborator, Christopher Nolan), Man of Steel gives the last son of Krypton an action-packed origin story with a minimum of camp and an intense emotional authenticity. Not bad for somebody who spends half the movie wearing blue tights." Personally, I found it to be the best 2-hour action sequence with 30 minutes of stock romance involving Superman that I am likely to see this summer. What did you think?
An anonymous reader writes "Not to be left out Apple has released details about government requests for customer data. The company said it received between 4,000-5,000 government requests, affecting as many as 10,000 accounts or devices. From the article: 'The iPad maker said that it received between 4,000 and 5,000 requests from U.S. law enforcement agencies for customer data from December 1, 2012 to May 31, 2013, and that 9,000 to 10,000 accounts or devices were specified in the requests. Apple did not state how many of the requests were from the National Security Agency or how many affected accounts or devices may have been tied to any NSA requests.' Facebook and Microsoft released their numbers this weekend."
First time accepted submitter Rebecka Schumann writes "Ontario couple Ken Campbell and Nicole Sauve said a recent fence installation led them to discover what is being labeled a historical find. Sauve, who said the duo originally believed the skeleton to be from bones of an animal, called the Ontario Provincial Police to investigate; Forensic Anthropologist Michael Spence confirmed the bones were that of an aboriginal woman who died at age 24 between the late 1500s to the early 1600s. In spite of reporting their find and Spence's evaluation, Suave and Campbell were told they were required to hire an archeologist to assess their property at their own expense under Ontario's Funeral, Burial and Cremation Services Act. The act, which requires evaluation for all properties found to house human remains, has the Canadian couple stuck with a big bill."
Loadmaster writes "The new Oddworld game New 'n' Tasty is coming to every platform in the current generation and even the next generation but not the Xbox One. It's not that developer Oddworld Inhabitants isn't porting the game. It's not that they hate Microsoft or the Xbox One. No, it's that Microsoft has taken an anti-indie dev stance with the Xbox One. While the game industry is moving to Kickstarter and self-funded shops, Microsoft has decided all developers must have a publisher to grace their console."
cold fjord writes "Yet more details about the controversy engulfing the NSA. From CNET: 'Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee, explained how the program worked without violating individuals' civil rights. "We take the business records by a court order, and it's just phone numbers — no names, no addresses — put it in a lock box," Rogers told CBS News' "Face The Nation." "And if they get a foreign terrorist overseas that's dialing in to the United Sates, they take that phone number... they plug it into this big pile, if you will, of just phone numbers — it's like a phonebook without any names and any addresses with it — to see if there's a connection, a foreign terrorist connection to the United States." "When a number comes out of that lock box, it's just a phone number — no names, no addresses," he said. "If they think that's relevant to their counterterrorism investigation, they give that to the FBI. Then upon the FBI has to go out and meet all the legal standards to even get whose phone number that is."' From the AP: ' ... programs run by the National Security Agency thwarted potential terrorist plots in the U.S. and more than 20 other countries — and that gathered data is destroyed every five years. Last year, fewer than 300 phone numbers were checked against the database of millions of U.S. phone records ... the intelligence officials said in arguing that the programs are far less sweeping than their detractors allege.... both NSA programs are reviewed every 90 days by the secret court authorized by the Foreign Intelligence Surveillance Act. Under the program, the records, showing things like time and length of call, can only be examined for suspected connections to terrorism, they said. The ... program helped the NSA stop a 2009 al-Qaida plot to blow up New York City subways.'"
According to a story at VentureBeat, "Google is working on a new database of flagged images of child porn and abuse that can be shared with other search engines and child protection organizations. The database will help create systems that automatically eliminate that sort of content. ... If the database is used effectively, any flagged image in the database would not be searchable through participating search engines or web hosting providers. And maybe best of all, computers will automatically flag and remove these images without any human needing to see them." Here's the announcement.
An Ominous Cow Erred writes "In an odd approach to reaching out to otherwise shut-in sufferers of mental distress, an organization called Anxiety Gaming is betting that online intervention is the best way to reach people with emotional difficulties. Their argument is that the social nature of modern gaming makes it a valid means of reaching people who might not otherwise seek help through more traditional channels. According to their Facebook page, their future intentions seem to include distributing consoles to homes for foster youth, to encourage them to look to games for positival interpersonal communication."
Reuters reports that Saudi Arabia's government, after banning Viber within the kingdom, is poised to prohibit at least two other such communication apps: Skype and WhatsApp. Says the article: "Conventional international calls and texts are a lucrative earner for telecom operators in Saudi Arabia, which hosts around nine million expatriates. These foreign workers are increasingly using Internet-based applications such as Viber to communicate with relatives in other countries, analysts say." With fewer legal options, a wide-scale Internet censorship regime would be easier to implement, too.
McGruber writes "The NY Times has the news that federal judge Thomas Penfield Jackson, who ruled in 2000 that Microsoft was a predatory monopoly and must be split in half, has died. He was 76 years old. 'A technological novice who wrote his opinions in longhand and used his computer mainly to e-mail jokes, Judge Jackson refuted Microsoft's assertion that it was impossible to remove the company's Internet Explorer Web browser from its operating system by doing it himself. When a Microsoft lawyer complained that too many excerpts from Bill Gates's videotaped deposition — liberally punctuated with the phrase "I don't remember" — were shown in the courtroom, Judge Jackson said, "I think the problem is with your witness, not the way his testimony is being presented."'"