Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Google Plans to Alter JavaScript Popups After Abuse from Tech Support Scammers (bleepingcomputer.com)

An anonymous reader writes: Chromium engineers are discussing plans to change how JavaScript popups work inside Chrome and other similar browsers. In a proposal published on the Google Developers portal, the Chromium team acknowledged that JavaScript popups are consistently used to harm users.

To combat this threat, Google engineers say they plan to make JavaScript modals, like the alert(), confirm(), and dialog() methods, only work on a per-tab basis, and not per-window. This change means that popups won't block users from switching and closing the tab, putting an end to any overly-aggresive tactics on the part of the website's owner(s).

There is no timeline on Google's decision to move JavaScript popups to a per-tab model, but Chromium engineers have been debating this issue since July 2016 as part of Project OldSpice. A similar change was made to Safari 9.1, released this week. Apple's decision came after crooks used a bug in Safari to block users on malicious pages using popups. Crooks then tried to extort payment, posing as ransomware.

Submission + - UW Professor: The Information War Is Real, And We're Losing It (seattletimes.com)

An anonymous reader writes: It started with the Boston marathon bombing, four years ago. University of Washington professor Kate Starbird was sifting through thousands of tweets sent in the aftermath and noticed something strange. Too strange for a university professor to take seriously. “There was a significant volume of social-media traffic that blamed the Navy SEALs for the bombing,” Starbird told me the other day in her office. “It was real tinfoil-hat stuff. So we ignored it.” Same thing after the mass shooting that killed nine at Umpqua Community College in Oregon: a burst of social-media activity calling the massacre a fake, a stage play by “crisis actors” for political purposes. “After every mass shooting, dozens of them, there would be these strange clusters of activity,” Starbird says. “It was so fringe we kind of laughed at it. “That was a terrible mistake. We should have been studying it.” Starbird argues in a new paper, set to be presented at a computational social-science conference in May, that these “strange clusters” of wild conspiracy talk, when mapped, point to an emerging alternative media ecosystem on the web of surprising power and reach. There are dozens of conspiracy-propagating websites such as beforeitsnews.com, nodisinfo.com and veteranstoday.com. Starbird cataloged 81 of them, linked through a huge community of interest connected by shared followers on Twitter, with many of the tweets replicated by automated bots. Starbird is in the UW’s Department of Human Centered Design & Engineering — the study of the ways people and technology interact. Her team analyzed 58 million tweets sent after mass shootings during a 10-month period. They searched for terms such as “false flag” and “crisis actor,” web slang meaning a shooting is not what the government or the traditional media is reporting it to be. Then she analyzed the content of each site to try to answer the question: Just what is this alternative media ecosystem saying? Starbird is publishing her paper as a sort of warning. The information networks we’ve built are almost perfectly designed to exploit psychological vulnerabilities to rumor.

Submission + - Verizon to Force AppFlash Spyware on Android phones

saccade.com writes: Verizon is joining with the creators of a tool called "Evie Launcher" to make a new app search / launcher tool called AppFlash, to be installed on all Verizon phones running Android. The app provides no functionality to users beyond what Google Search does. It does, however, give Verizon a steady stream of metrics on your app usage and searches. A quick glance at the AppFlash privacy policy confirms this is the real purpose behind it:

We collect information about your device and your use of the AppFlash services. This information includes your mobile number, device identifiers, device type and operating system, and information about the AppFlash features and services you use and your interactions with them. We also access information about the list of apps you have on your device. ... AppFlash information may be shared within the Verizon family of companies, including companies like AOL who may use it to help provide more relevant advertising within the AppFlash experiences and in other places, including non-Verizon sites, services and devices.

Submission + - Westinghouse Files For Bankruptcy, In Blow To Nuclear Power (reuters.com)

An anonymous reader writes: Westinghouse Electric Co, a unit of Japanese conglomerate Toshiba Corp, filed for bankruptcy on Wednesday, hit by billions of dollars of cost overruns at four nuclear reactors under construction in the U.S. Southeast. The bankruptcy casts doubt on the future of the first new U.S. nuclear power plants in three decades, which were scheduled to begin producing power as soon as this week, but are now years behind schedule. The four reactors are part of two projects known as V.C. Summer in South Carolina, which is majority owned by SCANA Corp, and Vogtle in Georgia, which is owned by a group of utilities led by Southern Co. Costs for the projects have soared due to increased safety demands by U.S. regulators, and also due to significantly higher-than-anticipated costs for labor, equipment and components. Pittsburgh-based Westinghouse said it hopes to use bankruptcy to isolate and reorganize around its "very profitable" nuclear fuel and power plant servicing businesses from its money-losing construction operation. Westinghouse said in a court filing it has secured $800 million in financing from Apollo Investment Corp, an affiliate of Apollo Global Management, to fund its core businesses during its reorganization. Westinghouse’s nuclear services business is expected to continue to perform profitably over the course of the bankruptcy and eventually be sold by Toshiba, people familiar with the matter said. When regulators in Georgia and South Carolina approved the construction of Westinghouse's AP1000 reactors in 2009, it was meant to be the start of renewed push to develop U.S. nuclear power. However, a flood of cheap natural gas from shale, the lack of U.S. legislation to curb carbon emissions and the 2011 Fukushima nuclear accident in Japan dampened enthusiasm for nuclear power. Toshiba had acquired Westinghouse in 2006 for $5.4 billion. It expected to build dozens of its new AP1000 reactors — which were hailed as safer, quicker to construct and more compact — creating a pipeline of work for its maintenance division.

Submission + - Chinese court lifts iPhone sales ban, Apple cleared of intellectual property the (qq.com)

fubarrr writes: A Beijing based, intellectual property court lifted sales ban of Apple iPhone 6-cn and iPhone 6S-cn mobile phones after Beijing intellectual property bureau placed it after an intellectual property theft claim by Baili Electronics in 2014. Baili claimed that Apple Computers immitated the design of Baili phones, and violeted its protected design features including "rounded corners" and "curved silhouette."

The sales ban was in effect for two years in mainland China, but as many decisions of China's de-facto defunct civil courts it was never enforced. The ban was lifted on procedural grounds as Baili Electronics went out of business, and did not provide material evidence for further legal expertise.

Link to original in Russian below.

Submission + - About 90% of Smart TVs Vulnerable To Remote Hacking Via Rogue TV Signals (bleepingcomputer.com)

An anonymous reader writes: A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV, and use the device for all sorts of nasty actions, ranging from DDoS attacks to spying on end users. The attack, developed by Rafael Scheel, a security researcher working for Swiss cyber security consulting company Oneconsult, is unique and much more dangerous than previous smart TV hacks. Scheel's method, which he recently presented at a security conference, is different because the attacker can execute it from a remote location, without user interaction, and runs in the TV's background processes, meaning users won't notice when an attacker compromises their TVs. The researcher told Bleeping Computer via email that he developed this technique without knowing about the CIA's Weeping Angel toolkit, which makes his work even more impressing. Furthermore, Scheel says that "about 90% of the TVs sold in the last years are potential victims of similar attacks," highlighting a major flaw in the infrastructure surrounding smart TVs all over the globe. At the center of Scheel's attack is Hybrid Broadcast Broadband TV (HbbTV), an industry standard supported by most cable providers and smart TV makers that "harmonizes" classic broadcast, IPTV, and broadband delivery systems. TV transmission signal technologies like DVB-T, DVB-C, or IPTV all support HbbTV. Scheel says that anyone can set up a custom DVB-T transmitter with equipment priced between $50-$150, and start broadcasting a DVB-T signal.

Submission + - Scientists Discover Way to Transmit Taste of Lemonade Over Internet (vice.com)

schwit1 writes: With the use of electrodes and sensors—and zero lemons—a group of researchers at the University of Singapore have announced that they can convince you that you're drinking lemonade, even if it's just water. Plus, they can send you a glass of lemonade virtually over the internet.

In an experiment that involved 13 tasters, the subjects' taste buds were stimulated using electricity from receiving electrodes; LED lights mimicked a lemony color. Some were convinced that the water they were drinking was, in fact, almost as sour as lemonade.

"We're working on a full virtual cocktail with smell, taste, and color all covered. We want to be able to create any drink."

Why would anyone want to drink a virtual lemonade? Advocates of virtual eating say that virtual foods can replace foods that are bad for you, that you may be allergic to, or that you shouldn't eat because of a medical condition.

Submission + - Flaws in Samsung's 'Smart' Home Let Hackers Unlock Doors and Set Off Fire Alarms (wordpress.com)

TrustedLocksmithPeac writes: A SMOKE DETECTOR that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can be programmed from your smartphone sounds convenient, too. But when a piece of malware can trigger that fire alarm at four in the morning or unlock your front door for a stranger, your “smart home” suddenly seems pretty dumb.

Submission + - The 265 members of Congress who sold you out to ISPs

Presto Vivace writes: They betrayed you for chump change

Republicans in Congress just voted to reverse a landmark FCC privacy rule that opens the door for ISPs to sell customer data. Lawmakers provided no credible reason for this being in the interest of Americans, except for vague platitudes about “consumer choice” and “free markets,” as if consumers at the mercy of their local internet monopoly are craving to have their web history quietly sold to marketers and any other 3rd party willing to pay. ... The only people who seem to want this are the people who are going to make lots of money from it. (Hint: they work for companies like Comcast, Verizon, and AT&T.) Incidentally, these people and their companies routinely give lots of money to members of Congress.

Submission + - Test flights planned for cargo drone prototype

linuxwrangler writes: Backed by Silicon Valley venture capitalist Tim Draper, drone startup Natilus is attempting to reduce global airfreight costs by 50% through the use of autonomous cargo drones. To reduce regulatory and infrastructure burden, they plan to have their cargo drones take off and land on water 12 miles offshore and fly over uninhabited areas below controlled airspace. Shipments that take 11 hours in a 747 would take 30 in the drone but at half the cost. Container shipping is less than half the cost of the drone but takes three weeks. Test flights of a 30 foot prototype over San Pablo Bay north of San Francisco are planned for this summer.

Submission + - Telecom Giants Are Pushing States to Constrain Public Rights (backchannel.com)

mirandakatz writes: There are currently plans underway in at least 17 state legislatures, as well as at the FCC, that would block cities from constraining uses of their rights-of-way by private cellular companies for 5G deployments. That means that if a city wants to set up a fair and competitive system that favors competitors, citizens, and long-range goals instead of the interests of a single big company, that would be illegal. But there's one massive catch: All of this is being done in the name of 5G—and 5G does not yet exist. At Backchannel, Susan Crawford digs into why we need to slow the onslaught of deregulatory legislation in this area and not get swept up in the still-mythical 5G hype.

Submission + - California prosecutes couple for filming officials (ap.org) 2

mi writes: California prosecutors on Tuesday charged two activists who made undercover videos of themselves interacting with officials of a taxpayer-supported organization with 15 felonies, saying they invaded privacy by filming without consent. State Attorney General Xavier Becerra, a longtime Congressional Democrat who took over the investigation in January, said in a statement that the state "will not tolerate the criminal recording of conversations."

Didn't we just determine, that filming officials is not merely a right, but a First Amendment right?

Submission + - Your Digital Life Can Be Legally Seized at the Border 3

Toe, The writes: Quincy Larson from freeCodeCamp relates some frightening stories from U.S. citizens entering their own country, and notes that you don't have fourth and fifth amendment rights at the border. People can and have been compelled to give their phone password (or be detained indefinitely) before entering the U.S and other countries. Given what we keep on our phones, he concludes that it is now both easy and legal for customs and border control to access your whole digital life. And he provides some nice insights on how easy it is to access and store the whole thing, how widespread access would be to that data, and how easy it would be for the wrong hands to get on it. His advice: before you travel internationally, wipe your phone or bring/rent/buy a clean one.

Submission + - US National Academy of Sciences allows genetic modified children (technologyreview.com)

wisebabo writes: Hey! Slashdot labelled this as *s*p*a*m* and it isn't! So I'm resubmitting this

Looks like genetically editing human germ line cells is not longer completely verboten (yes the allusion to German Nazi era eugenics by use of the word "verboten" was deliberate). A National Academy of Sciences panel has approved, under narrow (for now) circumstances, genetically modified children. Now with CRISPR-cas9, it has become easier to precisely edit the human genome.

Even if they manage to keep the circumstances "narrow" it seems obvious that other nations will not be so cautious. For example China where they've created genetically modified "super dogs" http://edition.cnn.com/2015/10... and you can even buy genetically modified "micro pigs" that don't grow big! http://www.nature.com/news/gen.... Of course China is not the only country doing this, New Zealand is pursuing an audacious project to use genetic engineering to WIPE OUT entire species (as I submitted earlier in slashdot).

Anyway, if you're bothered by the "narrow circumstances" clause in the NAS recommendation, go to Vietnam (or another one of many countries) where there are no particular regulations regarding genetic engineering.

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...