Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Staples: Breach may have affected 1.16 million customers' cards (fortune.com)

mpicpp writes: The office-supply retailer gave new details about a breach at more than 100 of its stores.

Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October.

The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers’ credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached.

Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers’ names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.

Education

Ask Slashdot: Resources For Kids Who Want To Make Games? 121

Mr. Jones writes: My 11-year-old son is fascinated by games — game mechanics in particular. He has been playing everything from Magic to WarFrame since he was 5 years old. He seems mostly interested in creating the lore and associated mechanics of the games (i.e. how a game works). If it was only programming I could help him, but I am lost when it comes to helping him learn more formal ways of developing and defining gameplay. I really see a talent for this in him and I want to support it any way I can. Can you suggest any conferences, programs, books, websites, etc. that would help him learn?
Transportation

Tesla About To Start Battery-Swap Pilot Program 133

cartechboy writes: Remember 18 months ago when Tesla promised it was going to launch battery-swap stations? Well, it's finally happening, sort of. It seems Tesla's about to announce a battery-swap pilot program that will launch next week. The swap site will be located across the street from a Tesla Supercharger site in Harris Ranch, California — 184 miles south of San Francisco and about 200 miles north of Los Angeles. The pilot program will involve an unspecified number of Model S electric-car owners, who will be invited to take part in the test. For now, the battery-swap service will be offered by appointment only, at a cost of roughly a tank of gas in a premium sedan. Tesla's using words to describe this pilot program like "exploratory work" and "intended to test technology and assess demand" for a swapping service. While originally pitched that the battery swap would take less time than it would to take to refill the gas tank of a comparable luxury sedan, the company says now that "for this specific iteration" the swap process will take "approximately 3 minutes" — though it adds Tesla has "the ability to improve that time with future iterations." Is this test going to show that battery swapping is or isn't a realistic initiative?

Submission + - T-Mobile To Pay $90M for Unauthorized Charges On Customers' Bills (itworld.com)

itwbennett writes: T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn’t want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.

Submission + - Deepest Dwelling Creatures On Earth Discovered By College Students (kulr8.com)

mpicpp writes: Whitman biology professor Paul Yancey and students Anna Downing '16 and Chloe Weinstock '17 have returned from the first detailed study of the Mariana Trench aboard Schmidt Ocean Institute's research vessel Falkor.

The Mariana Trench — located in the Western Pacific near Guam — has been the focus of high-profile voyages to conquer Challenger Deep, the deepest place on Earth. This recent expedition to the Trenchonboard Research Vessel Falkor targeted multiple depths and found active thriving communities of animals. The expedition set many new records, including the deepest rock samples ever collected and the discovery of new fish species at the greatest depths ever recorded.

New species were discovered on this expedition that will provide insight into the physiological adaptations of animals to this high-pressure environment. This research is being conducted in the lab of Whitman College'sProfessor of Biology Paul Yancey. In the past, Yancey and his students, working on animals from moderate depths, discovered certain organic molecules that protect the cells of deep-sea animals from the effects of high pressure, which distorts proteins such as enzymes. These kinds of protective molecules are also being tested to treat human diseases that are caused by malformed proteins, such as cystic fibrosis. Additionally, his work on protective molecules in fishes predicted that fish would not be able to live below about 8,200 meters (27,060 feet). Prior to this expedition, the deepest documented fish was from 7,700 meters (25,410 feet).

The expedition also broke several records for the deepest living fish either caught or seen on video. Setting the record at 8,143 meters, (26,872 feet) was a completely unknown variety of snail fish, which stunned scientists when it was filmed several times during sea floor experiments. The white translucent fish had broad wing-like fins and an eel-like tail, and slowly glided over the bottom.

Sony

Schneier Explains How To Protect Yourself From Sony-Style Attacks (You Can't) 343

phantomfive writes: Bruce Schneier has an opinion piece discussing the Sony attack. He says, "Your reaction to the massive hacking of such a prominent company will depend on whether you're fluent in information-technology security. If you're not, you're probably wondering how in the world this could happen. If you are, you're aware that this could happen to any company." He continues, "The worst invasion of privacy from the Sony hack didn’t happen to the executives or the stars; it happened to the blameless random employees who were just using their company’s email system. Because of that, they’ve had their most personal conversations—gossip, medical conditions, love lives—exposed. The press may not have divulged this information, but their friends and relatives peeked at it. Hundreds of personal tragedies must be unfolding right now. This could be any of us." Related: the FBI has officially concluded that the North Korean government is behind the attack.

Submission + - Five Craziest Space Missions (bbc.com)

An anonymous reader writes: We’ve landed on a comet – so where next? The BBC Future lists its choice of the five craziest space missions currently being proposed. They may sound wild, but all of these are missions that have been seriously discussed as possible future missions: Floating astronauts in the clouds of Venus, sailing on the methane seas of Titan, melting a torpedo probe through the ice of Europa, catching an asteroid in a net and bringing it to lunar orbit, and a 100-year starship mission to the Alpha Centauri and beyond.
Robotics

The Dominant Life Form In the Cosmos Is Probably Superintelligent Robots 391

Jason Koebler writes: If and when we finally encounter aliens, they probably won't look like little green men, or spiny insectoids. It's likely they won't be biological creatures at all, but rather, advanced robots that outstrip our intelligence in every conceivable way. Susan Schneider, a professor of philosophy at the University of Connecticut, joins a handful of astronomers, including Seth Shostak, director of NASA's Search for Extraterrestrial Intelligence, NASA Astrobiologist Paul Davies, and Library of Congress Chair in Astrobiology Stephen Dick in espousing the view that the dominant intelligence in the cosmos is probably artificial. In her paper "Alien Minds," written for a forthcoming NASA publication, Schneider describes why alien life forms are likely to be synthetic, and how such creatures might think.

Submission + - 48,000 Federal Employees Potentially Affected by Second Background Check Hack (nextgov.com)

schwit1 writes: The Office of Personnel Management is alerting more than 48,000 federal employees their personal information may have been exposed following a breach at KeyPoint Government Solutions, which conducts background investigations of federal employees seeking security clearances.

"As we examine the potential impact on DHS employees, we are committed to ensuring the privacy of our workforce and will take all appropriate measures to safeguard it,"
Was the PII encrypted?
Is there a DHS requirement that all PII be encrypted?

Submission + - How a 3D Printer Let a Dog Run for the First Time (dice.com)

Nerval's Lobster writes: Ever since 3-D printing began to enter the mainstream, people have discussed the technology’s potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.
The Courts

All the Evidence the Government Will Present In the Silk Road Trial Is Online 52

apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."
Piracy

Anyone Can Now Launch Their Own Version of the Pirate Bay 81

An anonymous reader writes: Not satisfied with merely launching The Old Pirate Bay, torrent site isoHunt today debuted The Open Bay, which lets anyone deploy their own version of The Pirate Bay online. This is achieved via a new six-step wizard, which the group says requires you to be somewhat tech-savvy and have "minimal knowledge of how the Internet and websites work." The Pirate Bay, the most popular file sharing website on the planet, went down last week following police raids on its data center in Sweden. As we've noted before, The Old Pirate Bay appears to be the best alternative at the moment, but since The Pirate Bay team doesn't know if it's coming back yet, there is still a huge hole left to be filled.

Submission + - The Beatles, Bob Dylan and the 50-Year Copyright Itch

HughPickens.com writes: Victoria Shannon writes in the NYT that fifty years ago was a good year for music with the Beatles appearing on Billboard’s charts for the first time, the Rolling Stones releasing their first album, the Supremes with five No. 1 hits and Simon and Garfunkel releasing their debut album. The 50-year milestone is significant, because music published within the first half-century of its recording gets another 20 years of copyright protection under changes in European law. So every year since 2012, studios go through their tape vaults to find unpublished music to get it on the market before the deadline. The first year, Motown released a series of albums packed with outtakes by some of its major acts, and Sony released a limited-edition collection of 1962 outtakes by Bob Dylan, with the surprisingly frank title, “The Copyright Extension Collection, Vol. I.” In 2013, Sony released a second Dylan set, devoted to previously unreleased 1963 recordings. Similar recordings by the Beatles and the Beach Boys followed. This year, Sony is releasing a limited-edition nine-LP set of 1964 recordings by Dylan, including a 46-second try at “Mr. Tambourine Man,” which he would not complete until 1965. The Beach Boys released two copyright-extension sets of outtakes last week. And while there's no official word on a Beatles release, last year around this time, “The Beatles Bootleg Recordings 1963” turned up unannounced on iTunes.

Submission + - USBdriveby: The $20 Device That Installs a Backdoor in a Second

Trailrunner7 writes: Samy Kamkar has a special talent for turning seemingly innocuous things into rather terrifying attack tools. First it was an inexpensive drone that Kamkar turned into a flying hacking platform with his Skyjack research, and now it’s a $20 USB microcontroller that Kamkar has loaded with code that can install a backdoor on a target machine in a few seconds and hand control of it to the attacker.

Kamkar has been working on the new project for some time, looking for a way to install the backdoor without needing to use the mouse and keyboard. The solution he came up with is elegant, fast and effective. By using code that can emulate the keyboard and the mouse and evade the security protections such as local firewalls, Kamkar found a method to install his backdoor in just a couple of seconds and keep it hidden on the machine. He loaded the code onto an inexpensive Teensy USB microcontroller.

Kamkar’s USBdriveby attack can be executed in a matter of seconds and would be quite difficult for a typical user to detect once it’s executed. In a demo video, Kamkar runs the attack on OS X, but he said the code, which he’s released on GitHub, can be modified easily to run on Windows or Linux machine. The attack inserts a backdoor on the target machine and also overwrites the DNS settings so that the attacker can then spoof various destinations, such as Facebook or an online banking site, and collect usernames and passwords. The backdoor also goes into the cron queue, so that it runs at specified intervals.

Submission + - New Zeus Variant Targets Users Of 150 Banks

An anonymous reader writes: A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan. Chthonic, as the variant has been named by Kaspersky Lab researchers, shares a lot of similarities with previous Zeus variants. The malware is capable of collecting system information, stealing saved passwords, logging keystrokes, recording video and sound via the computer's webcam and microphone, grabbing the contents of online forms, injecting web pages and fake windows, and allows criminals to connect to the infected computer remotely and use it to carry out transactions.

Slashdot Top Deals

"Who alone has reason to *lie himself out* of actuality? He who *suffers* from it." -- Friedrich Nietzsche

Working...