Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

Startups Increasingly Targeted With Hacks 48

Posted by Soulskill
from the waiting-for-the-easy-marks-to-ripen dept.
ubrgeek writes: Slack, makers of the popular communications software, announced yesterday that they'd suffered a server breach. This follows shortly after a similar compromise of Twitch.tv, and is indicative of a growing problem facing start-up tech companies. As the NY Times reports, "Breaches are becoming a kind of rite of passage for fledgling tech companies. If they gain enough momentum with users, chances are they will also become a target for hackers looking to steal, and monetize, the vast personal information they store on users, like email addresses and passwords."
United Kingdom

Prison Inmate Emails His Own Release Instructions To the Prison 193

Posted by Soulskill
from the just-crazy-enough-to-work dept.
Bruce66423 writes: A fraudster used a mobile phone while inside a UK prison to email the prison a notice for him to be released. The prison staff then released him. The domain was registered in the name of the police officer investigating him, and its address was the court building. The inmate was in prison for fraud — he was originally convicted after calling several banks and getting them to send him upwards of £1.8 million.
Blackberry

Iowa's Governor Terry Branstad Thinks He Doesn't Use E-mail 281

Posted by timothy
from the bizarro-er-and-bizarro-er dept.
Earthquake Retrofit writes The Washington Post reports the governor of Iowa denying he uses e-mail, but court documents expose his confusion. From the article: "Branstad's apparent confusion over smartphones, apps and e-mail is ironic because he has tried to portray himself as technologically savvy. His Instagram account has pictures of him taking selfies and using Skype... 2010 campaign ads show him tapping away on an iPad. 'Want a brighter future? We've got an app for that.' Earlier this month, the governor's office announced that it had even opened an account on Meerkat, the live video streaming app." Perhaps he's distancing himself from e-mail because it's a Hillary thing.
Facebook

Facebook Makes Messenger a Platform 48

Posted by samzenpus
from the stand-on-your-own-two-feet dept.
Steven Levy writes At Facebook's F8 developer conference, the ascension of the Messenger app was the major announcement. Messenger is no longer just a part of Facebook, but a standalone platform to conduct a wide variety of instant communications, not only with friends, but with businesses you may deal with as well. It will compete with other messaging services such as Snapchat, Line and even Facebook's own WhatsApp by offering a dizzying array of features, many of them fueled by the imagination and self-interest of thousands of outside software developers.
Businesses

RadioShack Puts Customer Data Up For Sale In Bankruptcy Auction 262

Posted by samzenpus
from the names-and-numbers dept.
itwbennett writes For years, RadioShack made a habit of collecting customers' contact information at checkout. Now, the bankrupt retailer is putting that data on the auction block. A list of RadioShack assets for sale includes more than 65 million customer names and physical addresses, and 13 million email addresses. Bloomberg reports that the asset sale may include phone numbers and information on shopping habits as well. New York's Attorney General says his office will take 'appropriate action' if the data is handed over.
Security

Possible Twitch.tv Security Breach 49

Posted by Soulskill
from the another-day,-another-breach dept.
New submitter FalleStar writes: Today, the world's largest video game livestreaming website, Twitch.tv, posted the following blog entry: "We are writing to let you know that there may have been unauthorized access to some Twitch user account information. For your protection, we have expired passwords and stream keys and have disconnected accounts from Twitter and YouTube. As a result, you will be prompted to create a new password the next time you attempt to log into your Twitch account. We also recommend that you change your password at any website where you use the same or a similar password." The full details of the breach have yet to be released. Back in a 2013 blog post, Twitch reported that one of their CDNs had mistakenly exposed user account information, and they mentioned that their user passwords are hashed, but did not indicate whether or not they are salted. In addition to the blog post, Twitch users are being notified of the intrusion by email. According to one such email, compromised data may include the last IP address a user logged in from, as well as some credit card information — but not full card numbers, since Twitch doesn't store those.
Portables

Ask Slashdot: Choosing a Laptop To Support Physics Research? 385

Posted by timothy
from the budget-for-replacement-too dept.
An anonymous reader writes My daughter is in her third year of college as a physics major. She has an internship in Europe this summer, will graduate next year, and continue with graduate physics studies. Her area of research interest is in gravitational waves and particle physics. She currently has a laptop running Win7 and wants to buy a new laptop. She would like to use Linux on it, and plans to use it for C++ programming, data analysis and simulations (along with the usual email, surfing, music, pictures, etc). For all of the physics-savvy Slashdotters out there: what should she get? PC? Mac? What do you recommend for running Linux? For a C++ development environment? What laptop do you use and how is it configured to support your physics-related activities?
Robotics

SXSW: Do Androids Dream of Being You? 80

Posted by samzenpus
from the more-you-than-you dept.
Nerval's Lobster writes In 2010, Dr. Martine Rothblatt (founder of United Theraputics and Sirius Radio) decided to build a robotic clone of her partner, named Bina. In theory, this so-called "mindclone" (dubbed Bina48) can successfully mimic the flesh-and-blood Bina's speech and decision-making, thanks to a dataset (called a "mindfile") that contains all sorts of information about her mannerisms, beliefs, recollections, values, and experiences. But is software really capable of replicating a person's mind? At South by Southwest this year, Rothblatt is defending the idea of a "mindfile" and clones as a concept that not only works, but already has a "base" thanks to individuals' social networks, email, and the like. While people may have difficulty embracing something engineered to replicate their behavior, Rothblatt suggested younger generations will embrace the robots: "I think younger people will say 'My mindclone is me, too.'" Is her idea unfeasible, or is she onto something? Video from Bloomberg suggests that Bina48 still has some kinks to work out before it can pass for human.
Yahoo!

Yahoo Debuts End-To-End Encryption Email Plugin, Password-Free Logins 213

Posted by Soulskill
from the from-one-end-of-the-internet-to-the-other dept.
An anonymous reader writes: Yahoo has released the source code for a plugin that will enable end-to-end encryption for their email service. They're soliciting feedback from the security community to make sure it's built properly. They plan to roll it out to users by the end of the year.

Yahoo also demonstrated a new authentication system that doesn't use permanent passwords. Instead, they allow you to associate your Yahoo account with your phone, and text you a code on demand any time you need to log in. It's basically just the second step of traditional two-step authentication by itself. But Yahoo says they think it's "the first step to eliminating passwords."
Blackberry

BlackBerry's Latest Experiment: a $2,300 'Secure' Tablet 95

Posted by Soulskill
from the for-people-who-think-high-end-tablets-are-too-cheap dept.
An anonymous reader writes: After missing the boat on smartphones, BlackBerry has been throwing everything they can at the wall to see what sticks. From making square phones to insisting users want physical keyboards, their only standard is how non-standard they've become. Now they're expanding this strategy to the tablet market with a security-centric tablet that costs $2,300. And they're not doing it alone — the base device is actually a Samsung Galaxy Tab S 10.5. The tablet runs Samsung Knox boot tech, as well as software from IBM and encryption specialist Secusmart (which BlackBerry recently purchased). The device will be targeted at businesses and organizations who have particular need for secure devices.

"Organizations deploying the SecuTablet will be able to set policies controlling what apps can run on the devices, and whether those apps must be wrapped, said IBM Germany spokesman Stefan Hefter. The wrapping process—in which an app is downloaded from a public app store, bundled with additional libraries that encrypt its network traffic and intercept Android 'intents' for actions such as cutting or pasting data, then uploaded to a private app store—ensures that corporate data can be protected at rest, in motion and in use, he said. For instance, it can prevent data from a secure email being copied and pasted into the Facebook app running on the same device—yet allow it to be pasted into a secure collaboration environment, or any other app forming part of the same 'federation,' he said."
Hardware Hacking

Maker Person Rich Olson Returns (Video) 42

Posted by Roblimo
from the not-everything-is-about-money dept.
In February we ran a video titled Rich Olson Embodies the Spirit of the Maker Movement. We aren't saying Rich is a superman, but more like everyman or, in this case, everymaker. He is a hobbyist who, like many others, shares his designs freely in the best spirit of open source. Today we have some more words from Rich that may help you if you are just starting to use a 3-D printer and similar tools either at home or in a makerspace. and a note: If you know someone we should interview, please email robinATroblimoDOTCOM.
The Internet

Google Error Leaks Website Owners' Personal Information 42

Posted by Soulskill
from the users-registering-their-unhappiness dept.
itwbennett writes: A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private. The privacy breach involves whois, a database that contains contact information for people who've bought domain names. For privacy reasons, people can elect to make information private, often by paying an extra fee. But Craig Williams, senior technical leader for Cisco's Talos research group, discovered that the privacy settings for domain names registered through the company eNom were being turned off right at the time when the domains were up for renewal, starting around mid-2013. Williams contacted Google, and in about six days the privacy settings had been restored. In a notice, Google blamed a "software defect." Cisco said in a blog post that some 282,867 domains were affected.
Privacy

Court Overturns Dutch Data Retention Law, Privacy More Important 38

Posted by samzenpus
from the keep-your-eyes-on-your-own-paper dept.
wabrandsma writes According to DutchNews.nl: "Internet providers no longer have to keep their clients phone, internet and email details because privacy is more important, a Dutch court ruled on Wednesday." Digital rights organization Bits of Freedom writes in a blog: "The law's underlying European directive was meant as a tool in the fight against serious crimes. The Dutch law, however, is much more expansive, including everything from terrorism to bike theft. During the hearing, the state's attorneys avowed that the Public Prosecution does not take the law lightly, and would not call on the law to request data in case of a bicycle theft. The judge's response: it doesn't matter if you exploit the possibility or not, the fact that the possibility exists is already reason enough to conclude that the current safeguards are unsatisfactory."
Hardware

The 2015 Vintage Computer Festival East is April 17-19 (Video) 23

Posted by Roblimo
from the they-don't-make-them-like-they-used-to dept.
The Vintage Computer Festival East is where you go to see working computers from the forties through the eighties. It's held at the Information Age Learning Center (InfoAge) in Wall, New Jersey, a site that is full of electronics history on its own. In addition to displays (including a number of items for sale), there are sessions on topics ranging from "Keyboard Restoration" to "Fixing what's hopelessly broken." Event volunteer Evan Koblentz, today's interviewee, says that most of the several hundred people the event draws every year come from the United States, but there are always at least a few international visitors. And if New Jersey isn't your thing, there are other Vintage Computer Festivals you might want to attend. To get current news about these events, you might want to sign up for the VCF email list.
United States

Clinton Regrets, But Defends, Use of Family Email Server 609

Posted by Soulskill
from the security-through-obscurity dept.
dcblogs writes: Former Secretary of State Hillary Clinton said Tuesday that, in hindsight, her decision to use a private email server to conduct official business was not the best one. But she is defending it and said the system was secure. Clinton, at news conference in New York, said the email server that she used had been set up for former President Bill Clinton. The system had "numerous safeguards" and is on home property protected by the U.S. Secret Service, she said. "There were no security breaches," said Clinton. "I think the use of that server, which started with my husband, proved to be effective and secure," she said. It still remains unclear about just how appropriate Clinton's system was. As a general rule, government IT policies don't give federal employees the option of using their own email accounts to exclusively conduct government business.
Communications

Clinton's Private Email System Gets a Security "F" Rating 315

Posted by timothy
from the expected-to-hold-a-media-availability dept.
Penguinisto writes According to a scan by Qualys, Hillary Clinton's personal e-mail server, which has lately generated more than a little controversy in US political circles, has earned an "F" rating for security from the security vendor. Problems include SSL2 support, a weak signature, and only having support for older TLS protocols, among numerous other problems. Note that there are allegations that the email server was possibly already hacked in 2013. (Note: Mrs. Clinton plans on Giving a press conference to the public today on the issue.)
Businesses

Apple's "Spring Forward" Event Debuts Apple Watch and More 529

Posted by samzenpus
from the here's-what-happened dept.
samzenpus (5) writes There was a lot of news at Apple's Spring Forward keynote today. Here's a list of some of the most eye-catching announcements.
  • HBO Now standalone streaming service coming to Apple TV and iOS apps in early April for $14.99 a month.
  • Lowered price of Apple TV to $69.
  • Apple Pay accepted at up to 100,000 Coca-Cola machines by the end of the year.
  • ResearchKit Announced: Is open source and allows medical researchers to create apps, and use the iPhone as a diagnostic tool.
  • New MacBook: Lightest ever at 2 pounds, 13.1mm at its thickest point. 2304x1440 display, consumes 30% less energy. Fanless, powered with Intel's Core M processor. 802.11ac, Bluetooth 4.0. and 9 hours of web browsing battery life. Supports many protocols through one connector USB-C. Ships April 10, starting at $1,299.
  • iOS 8.2 is available today
  • Apple Watch: Accurate within 50ms of UTC. Read and delete email, built-in speaker and mic so you can receive calls. It tracks your movement and exercise. Use Apple Pay, play your music, use Siri and get any notification you get on iPhone today. 18 hour battery life in a typical day. Sport model starting at $349, stainless steel price: $549-$1049 for 38mm, 42mm is $599-$1099, and gold edition starting at $10k. Pre-orders begin April 10th, available April 24th.
Social Networks

Former MLB Pitcher Doxes Internet Trolls, Delivers Real-World Consequences 467

Posted by Soulskill
from the countering-free-speech-with-more-free-speech dept.
An anonymous reader writes: When Twitter trolls began posting obscene, sexually explicit comments about his teenage daughter, former MLB pitcher Curt Schilling responded by recording their comments and gathering personal information readily available to the public. He then doxxed two of them on his blog, resulting in one being suspended from his community college and the other being fired from his part-time job as a ticket seller for the New York Yankees. There were seven others in Curt's crosshairs, all college athletes, but although he hasn't publicly doxxed those individuals, he hints, "I found it rather funny at how quickly tone changed when I heard via email from a few athletes who'd been suspended by their coaches. Gone was the tough guy tweeter, replaced by the 'I'm so sorry' apology used by those only sorry because they got caught."
GUI

Why We Should Stop Hiding File-Name Extensions 564

Posted by timothy
from the text-rules dept.
An anonymous reader writes 14 years after the Anna Kournikova virus took advantage of users' ignorance about file-name extensions in order to wreak worldwide havoc, virus writers and hackers are still taking advantage of the tendency of popular consumer operating systems to hide file-name extensions: Windows users still need to activate extension visibility manually – even though email-transmitted viruses depend most on less savvy users who will never do this. Additionally applications on even the latest versions of Apple's OSX operating system still require the user to 'opt in' to including a file-name extension during an initial save. In looking at some of the eccentricities of the modern user experience, this article argues that it might be time to admit that users need to understand, embrace and responsibly use the only plain-text, obvious indicator of what a file actually is.
Government

Hillary Clinton Used Personal Email At State Dept., Possibly Breaking Rules 538

Posted by Soulskill
from the may-have-also-used-personal-lungs-to-breathe dept.
HughPickens.com writes: The NY Times reports that Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, according to State Department officials. She may have violated federal requirements that officials' correspondence be retained as part of the agency's record. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act. "It is very difficult to conceive of a scenario — short of nuclear winter — where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business," said attorney Jason R. Baron. A spokesman for Clinton defended her use of the personal email account and said she has been complying with the "letter and spirit of the rules."