Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
XBox (Games)

Submission + - Report: Halo: Reach has dethroned Modern Warfare 2 (raptr.com)

almehdaaol writes: According to a new report released today by Raptr, Halo: Reach has dethroned Modern Warfare 2 as the most played game on the Xbox 360. Modern Warfare 2 was previously at the top of the list for 10 months. Raptr's new Halo: Reach report and infographic also includes fascinating Halo: Reach facts and figures such as the amount of people who have beaten the game in its first week of launch and the top 10 games Halo: Reach stole playtime from on the Xbox 360.
Security

Submission + - Pentagon Computers Vulnerable, says Cyber Command (csmonitor.com)

Sonny Yatsen writes: Head of US Cyber Command, Gen. Keith Alexander, noted in his first hearing before the House Armed Services Committee the increasingly difficult issue of securing Pentagon computers against "terrorist and criminal syndicates, foreign intelligence organizations, and “hacktivists” intent on infiltrating power grids and financial networks." Especially interesting is that Gen. Alexander noted that, in case of a cyber attack against the US power grids, US Cyber Command would be unable to act to defend and any defense must be borne by the commercial sector.

Submission + - Toshiba Adds WiMax Support To New Notebooks (crn.com)

cgriffin21 writes: Toshiba on Wednesday unveiled several high-end laptops with 4G WiMax-ready chips and said it will make them available to retailers September 26. Toshiba is offering WiMax support in three new Satellite models: the A665, the M645, and the E205. WiMax support is also included in the Portege R705. All are priced in the $750 to $1,100 range and come with screen sizes ranging from 13 to 16 inches.

Submission + - Java Creator James Gosling: Why I Quit Oracle (eweek.com)

An anonymous reader writes: In an exclusive interview with eWEEK, Java creator James Gosling discusses a series of issues he earlier declined to take public, including why he left Oracle.
Idle

Submission + - In Case of Emergency, Please Remove Your Bra (cnet.com)

An anonymous reader writes: Caught in a disaster? You'd better hope you're wearing the Emergency Bra. Simply unsnap the bright red bra, separate the cups, and slip it over your head — one cup for you, and one for your friend.

Dr. Elena Bodnar won an Ignoble Award for the invention last year, an annual tribute to scientific research that on the surface seems goofy but is often surprisingly practical. And now Bodnar has brought the eBra to the public; purchase one online for just $29.95.

Security

Submission + - How Cybercrime Gangs Work (securityweek.com)

techinsider writes: The hacking industry’s pillars are supply chain, optimization and automation. Interesting piece that shows how cybercrime organizations operate and the division of labor within the hacking organization breaks down as well as how hackers are optimizing their resources in order to gain the most from compromised applications or computers.

In reality, when we talk about hackers, we are talking about a fully organized, well-oiled machine intent on gaining money. And hacking is most definitely a big industry. One estimate puts the its size at $1 trillion. They are growing bigger, faster and stronger by the day. It does not help to simply recognize the problem....

Microsoft

Submission + - Hackers Swarm On Latest Microsoft Zero-Day Bug (computerworld.com) 1

CWmike writes: Microsoft has warned users that hackers are now exploiting an unpatched bug in ASP.Net to hijack encrypted Web sessions. In a Monday update to a previously-published security advisory, Microsoft said that it was seeing 'limited, active attacks at this time.' Symantec, which has a massive global network of sensors and honey trap-like systems to detect and capture exploits, said it had not seen any attacks, however. Microsoft acknowledged the flaw last Friday, the same day that a pair of researchers demonstrated how the 'oracle padding' bug can be exploited by force-feeding cipher text to an ASP.Net application and noting the returned error messages it returns. The company again promised to patch the vulnerability, but like last week, did not set a delivery date for the fix.
Iphone

Submission + - Testing Your Blood Sugar with Your Iphone (singularityhub.com)

kkleiner writes: Multinational pharmaceutical giant Sanofi Aventis just unveiled it’s latest diabetes technology: a stand alone blood glucose monitor that can plug directly into your iPhone and iPod Touch. The device, known as the iBGStar, would allow diabetics to test their blood sugar levels on the go, record notes, and send information to their healthcare providers via a free iPhone App. Devices like this are just another way in which continuous health monitoring could revolutionize medicine in the years ahead.
Encryption

Intel Threatens DMCA Using HDCP Crack 373

mikesd81 writes "Intel is apparently threatening to use the DMCA against anyone using the HDCP crack under the DMCA's anti-circumvention clause. 'There are laws to protect both the intellectual property involved as well as the content that is created and owned by the content providers,' said Tom Waldrop, a spokesman for the company, which developed HDCP. 'Should a circumvention device be created using this information, we and others would avail ourselves, as appropriate, of those remedies.'"
Politics

Swedish Pirate Party Fails To Enter Parliament 224

pickens writes "TorrentFreak reports that with 95 percent of the votes counted, it is clear that the Pirate Party will not enter the Swedish Parliament. The Party is currently stuck at about 1 percent of the total vote, nowhere near the 4 percent threshold it needs. This means that neither WikiLeaks nor The Pirate Bay will be hosted under Parliamentary immunity and the Party won't get the chance to legalize non-commercial file-sharing or criminalize 'copyright abuse' as they planned. 'The Swedish Pirate Party did its best election campaign ever. We had more media, more articles, more debates, more handed-out flyers than ever. Unfortunately, the wind was not in our sails this time, as it was with the European elections,' says party leader Rick Falkvinge. The party will now have to wait four more years before they have another shot at entering the Swedish Parliament. 'Each generation must reconquer democracy,' adds Falkvinge. 'Nobody said it was going to be an easy fight.'"
Google

Google Apps Gets Two-Factor Security 118

judgecorp writes "Passwords alone are not enough to secure access. Many organisations require two-factor authentication with a token. Google just added free two-factor verification to Google Apps, sending a one-off token to the user's mobile phone. It's good to have this for free, and it backs up Google's assertion that cloud apps are more secure — but it doesn't answer how it helps if an intruder is getting into Apps through a lost or stolen phone."
Cellphones

Texting On the Rise In the US 468

frontwave links to this stat-laden overview of trends in text-messaging among Americans, citing a few of its findings: "The average teen (even including teens without cell phones) sends and receives five times more text messages a day than a typical adult. A teen typically sends or receives 50 text messages a day, while the average adult sends or receives 10. Fully 31% of teens send more than 100 texts a day and 15% send more than 200 a day, while just 8% and 5% of adults send that many, respectively."
Australia

What Happens to Australia's E-Waste 78

lukehopewell1 writes "Aussies recycle several million tonnes of computers, TVs, mobile phones and other e-waste every year, with the number set to skyrocket over the next decade. ZDNet Australia takes an extended look into what happens to your devices when you're done with them. Take a peek inside the e-waste recycling process and find out what happens to your tech when it goes off to the wreckers."
Security

Linux Kernel Exploit Busily Rooting 64-Bit Machines 488

An anonymous reader writes "Running 64-bit Linux? Haven't updated yet? You're probably being rooted as I type this. CVE-2010-3081, this week's second high-profile local root exploit in the Linux kernel, is compromising machines left and right. Almost all 64-bit machines are affected, and 'Ac1db1tch3z' (classy) published code to let any local user get a root shell. Ac1db1tch3z's exploit is more malicious than usual because it leaves a backdoor behind for itself to exploit later even if the hole is patched. Luckily, there's a tool you can run to see if you've already been exploited, courtesy of security company Ksplice, which beat most of the Linux vendors with a 'rebootless' version of the patch."

Slashdot Top Deals

A failure will not appear until a unit has passed final inspection.

Working...