tsamsoniw writes "In the wake of the most recent zero-day attacks exploiting Flash Player, Adobe claims that it's worked hard to make Player secure — and that most SWF exploits stem from users opening infected Office docs attached to emails. The company has a solution, though: A forthcoming version of Flash Player will detect when it's being launched from Office and will present users with a dialog box with vague warnings of a potential threat."
Catch up on stories from the past week (and beyond) at the Slashdot story archive
dreamstateseven writes "In a not-so-unexpected move, the Department of Homeland Security has concluded that travelers along the nation's borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security. According to legal precedent, the Fourth Amendment — the right to be free from unreasonable searches and seizures — does not apply along the border. The memo highlights the friction between today's reality that electronic devices have become virtual extensions of ourselves housing everything from e-mail to instant-message chats to photos and our papers and effects — juxtaposed against the government's stated quest for national security. By the way, the government contends the Fourth-Amendment-Free Zone stretches 100 miles inland from the nation's actual border."
JG0LD writes "Students at a tiny Appalachian public school can't use Wi-Fi because any such network can throw the radio equivalent of a monkey wrench into a gigantic super-sensitive radio telescope just up the road. GBT's extraordinary sensitivity means that it's very susceptible to human-generated radio interference, according to site interference protection engineer Carla Beaudet. 'If there was no dirt between us and the transmitter, a typical access point ... would have to be on the order of 1,000,000 km [more than 620,000 miles, or about two and a half times the distance from the Earth to the Moon] distant to not interfere. Fortunately, we have mountains around us which provide lots of attenuation, so we're not seeing everything from everywhere,' she said. A standard Wi-Fi access point would wipe out a significant range of usable frequencies for the observatory. 'It simply ruins the spectrum for observations from 2400-2483.5MHz and from 5725-5875MHz for observational purposes,' wrote Beaudet."
MojoKid writes "A few weeks back, we discussed whether a new GPU like the GeForce GTX 660 could breathe new life into an older quad-core gaming system built in mid 2008. The answer concluded was definitely yes — but many readers asked to reconsider the question, this time using a lower-end dual-core Core 2 Duo. The Core 2 Duo CPU chip used was a first-generation C2D part based on Intel's 65nm Conroe core. It's clocked at 3GHz with 4MB of L2 cache and has a 1333MHz FSB. The CPU was paired with 3GB of DDR2-1066 memory. The long and short of it is, you can upgrade the graphics card on a six year-old dual core machine and expect to see a noticeable improvement in game performance — significant gains in fact, up to 50 percent or more."
tsu doh nimh writes "Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms, has suffered a compromise that cuts to the core of its business: helping clients distinguish known 'safe' files from computer viruses and other malicious software. A leading provider of 'application whitelisting' services, Bit9's security technology turns the traditional approach to fighting malware on its head. Antivirus software, for example, seeks to identify and quarantine files that are known bad or strongly suspected of being malicious. In contrast, Bit9 specializes in helping companies develop custom lists of software that they want to allow employees to run, and to treat all other applications as potentially unknown and dangerous. But in a blog post today, the company disclosed that attackers broke into its network and managed to steal the digital keys that Bit9 uses to distinguish good from bad applications. The attackers then sent signed malware to at least three of Bit9's customers, although Bit9 isn't saying which customers were affected or to what extent. The kicker? The firm said it failed to detect the intrusion in part because the servers used to store its keys were not running Bit9's own software."
ewenc writes "Mercenary computer coders are helping scientists cope with the deluge of data pouring out of research labs. A contest to write software to analyze immune-system genes garnered more than 100 entries, including many that vastly outperformed existing programs. The US$6,000 contest was launched by researchers at Harvard Medical School and Harvard Business School, both in Boston, Massachusetts. TopCoder.com, a community of more than 400,000 coders who compete in programming competitions, hosted the contest. The results are described in a letter published this week in Nature Biotechnology."
An anonymous reader writes "[Ars Technica] recently reviewed the documentary The Revisionaries, which chronicles the actions of the Texas state school board as it attempted to rewrite the science and history standards that had been prepared by experts in education and the relevant subjects. For biology, the board's revisions meant that textbook publishers were instructed to help teachers and students 'analyze all sides of scientific information' about evolution. Given that ideas only reach the status of theory if they have overwhelming evidence supporting them, it isn't at all clear what 'all sides' would involve."
New submitter ElDuque writes "Slate's top story today is a long, heavily-researched article about the life of, and case against, Aaron Swartz. It covers the formative years of both Mr. Swartz and the free information / open knowledge movement he felt so strongly about. Quoting: 'Aaron Swartz is a difficult puzzle. He was a programmer who resisted the description, a dot-com millionaire who lived in a rented one-room studio. He could be a troublesome collaborator but an effective troubleshooter. He had a talent for making powerful friends, and for driving them away. He had scores of interests, and he indulged them all. ... He was fascinated by large systems, and how an organization’s culture and values could foster innovation or corruption, collaboration or paranoia. Why does one group accept a 14-year-old as an equal partner among professors and professionals while another spends two years pursuing a court case that’s divorced from any sense of proportionality to the alleged crime? How can one sort of organization develop a young man like Aaron Swartz, and how can another destroy him?'"
Presto Vivace sends this news from the Hill: "House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) said Friday that they plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA) next week during a speech at the Center for Strategic and International Studies in Washington. The bill is aimed at improving information-sharing about cyber threats between government and industry so cyberattacks can be thwarted in real time. ... It would also encourage companies to share anonymous cyber-threat information with one another, and provide liability protection for businesses so they don't get hit with legal action for sharing data about cyber threats. " You may recall CISPA from last year, when it was hailed as being even worse than SOPA, the Stop Online Piracy Act. We discussed why it was a bad bill back then; the new version is reportedly identical, so all of the same reasons will apply. The bill stalled last year against White House plans to veto it. Congressman Rogers said this about privacy fears: "We're talking about exchanging packets of information, zeroes and ones, if you will, one hundred millions times a second. So some notion that this is a horrible invasion of content reading is wrong. It is not even close to that." Don't worry folks; it's just zeroes and ones.
First time accepted submitter NewtonBoxers writes "Considering the amount of time most of us spend at work, it's surprising how few novels are set in the workplace and base their plot on the goings-on there. Perhaps, having spent a long day slaving in the corporate salt mines, many of us would rather forget about such humdrum matters and take refuge in books that offer us more excitement. Others, though, seem to enjoy the humor that can derive from the very things that drive us mad – management incompetence, byzantine procedures, pointless meetings... in short the stuff of everyday office life. We read Dilbert, we watch The Office, and we could do a lot worse than read Augustus Gump's very funny second novel, The Rise and Fall of T. John Dick. " Read on for the rest of NewtonBoxers's review.
New submitter rHBa sends this article about another high-profile email account breach: "The apparent hack of several e-mail accounts has exposed personal photos and sensitive correspondence from members of the Bush family, including both former U.S. presidents. The posted photos and e-mails contain a watermark with the hacker's online alias, 'Guccifer.' ... Included in the hacked material is a confidential October 2012 list of home addresses, cell phone numbers, and e-mails for dozens of Bush family members, including both former presidents, their siblings, and their children. ... Correspondence obtained by the hacker indicates that at least six separate e-mail accounts have been compromised, including the AOL account of Dorothy Bush Koch, daughter of George H.W. Bush and sister of George W. Bush. Other breached accounts belong to Willard Heminway, 79, an old friend of the 41st president who lives in Greenwich, Connecticut; CBS sportscaster Jim Nantz, a longtime Bush family friend; former first lady Barbara Bush’s brother; and George H.W. Bush’s sister-in-law. "
theodp writes "Got Milk? Got Milk Delivery Patent? Perhaps unfamiliar with the concept of the Milkman, the USPTO has granted Amazon.com a patent for the Recurring Delivery of Products , an idea five Amazon inventors came up with to let customers schedule product deliveries to their doorsteps or mailboxes on a recurring basis, without needing to submit a new order every time. 'For instance,' the filing explains, 'a customer may request delivery of one bunch of bananas every week and two gallons of milk every two weeks.'"
Nerval's Lobster writes "The U.S. Department of Justice has just settled with book publisher Macmillan in an ongoing case over the price of e-books, bringing its number of settlements with big-name publishers up to five. Justice claims that those five publishers, along with Apple, agreed to 'raise retail e-book prices and eliminate price competition, substantially increasing prices paid by consumers.' Apple competes fiercely in the digital-media space against Amazon, which often discounts the prices of Kindle e-books as a competitive gambit; although all five publishers earn significant revenues from sales of Kindle e-books, Amazon's massive popularity among book-buyers — coupled with the slow decline of bricks-and-mortar bookstores — gives it significant leverage when it comes to lowering those e-book prices as it sees fit. But Justice and Apple seem determined to keep their court date later this year."
Orome1 writes "Adobe has pushed out an emergency Flash update that solves two critical vulnerabilities (CVE-2013-0633 and CVE-2013-0634) that are being actively exploited to target Windows and OS X users, and is urging users to implement it as soon as possible. According to a security bulletin released on Thursday, the OS X exploit targets Flash Player in Firefox or Safari via malicious Flash content hosted on websites, while Windows users are targeted with Microsoft Word documents delivered as an email attachments which contain malicious Flash content. Adobe has also announced its intention of adding new protections against malicious Flash content embedded in Microsoft Office documents to its next feature release of Flash Player."