Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Hackers Gain "Full Control" of Critical SCADA Systems 195

mask.of.sanity writes "Researchers have found holes in industrial control systems that they say grant full control of systems running energy, chemical and transportation systems. They also identified more than 150 zero day vulnerabilities of varying degrees of severity affecting the control systems and some 60,000 industrial control system devices exposed to the public internet."
Power

Record Wind Power Levels Trigger Energy Price Fall Across Europe 226

New submitter Forty Two Tenfold writes "Electricity prices across Europe dropped last month as mild temperatures, strong winds and stormy weather produced wind power records in Germany, France and the UK, according to data released by Platts. The price decline was more marked in Germany, where the average day-ahead baseload price in December fell 10% month over month to €35.71/MWh. On a daily basis, December was a month of extremes for Germany, with day-ahead base prices closing on December 10 and 11 at less than €60/MWh – the highest over-the-counter levels seen all year – only to fall to its lowest level December 24 to €0.50/MWh."
News

Cartels Are Using Firetruck-Sized Drillers To Make Drug Pipelines 323

Daniel_Stuckey writes "In the beginning, they used catapults, dune buggies, 'jalapeños,' $1 million submarines, and sophisticated drug tunnels to move drugs northward. Now, Mexican drug cartels are taking to high-end industrial drills to carve out literal drug pipelines into the U.S. It's the next big leap in the evolution of the narcos' ingenious smuggle tech. The future of borderland drug running, it turns out, is boring. Jason Kersten reports on the phenomenon in a great GQ feature that focuses on the Sinaloa Cartel, the international crime syndicate believed to be behind the first known narco pipeline in 2008: '...Mexican authorities, responding to reports of a cave-in and flooding near the [All-American] canal, discovered a tunnel unlike anything they'd ever seen. Only ten inches wide, it was essentially a pipe. The Mexican cops traced it back to a house about 600 feet from the border, where they found a tractor-like vehicle with a long barrel on its side—a horizontal directional drill, or HDD.'"
Hardware

End of Moore's Law Forcing Radical Innovation 275

dcblogs writes "The technology industry has been coasting along on steady, predictable performance gains, as laid out by Moore's law. But stability and predictability are also the ingredients of complacency and inertia. At this stage, Moore's Law may be more analogous to golden handcuffs than to innovation. With its end in sight, systems makers and governments are being challenged to come up with new materials and architectures. The European Commission has written of a need for 'radical innovation in many computing technologies.' The U.S. National Science Foundation, in a recent budget request, said technologies such as carbon nanotube digital circuits will likely be needed, or perhaps molecular-based approaches, including biologically inspired systems. The slowdown in Moore's Law has already hit high-performance computing. Marc Snir, director of the Mathematics and Computer Science Division at the Argonne National Laboratory, outlined in a series of slides the problem of going below 7nm on chips, and the lack of alternative technologies."
Twitter

Dallas PD Uses Twitter To Announce Cop Firings 118

New submitter natarnsco writes "The Dallas, Texas police chief has used an unusual weapon in his arsenal to announce firings and other disciplinary measures in the Dallas police force: Twitter. 'Dallas Police Chief David O. Brown has fired or disciplined 27 officers and employees in the last year. And every time he brings down the hammer, he announces it on Facebook and Twitter, specifying exactly who the men and women are and what they did. On Dec. 30, it was five officers and a 911 call operator.' The article goes on to say, 'Chief Brown is, as far as we know, unique among police chiefs in his use of social media. "I'm unaware of anyone else doing this," says Lt. Max Geron, who handles media relations at the Dallas Police Department. "If we weren't the first, we were one of the first." We checked out the Twitter profiles of various departments around the country as well and couldn't find a similar situation. The social media posts aren't an official policy of the DPD, but rather a "push for transparency" initiative, in Lt. Geron's words. "[It comes from] a desire to be more transparent and to get our message out to the greater community," he says.'"
Red Hat Software

Red Hat To Help Develop CentOS 186

An anonymous reader writes with news that Red Hat and the CentOS project are "joining forces" to develop the next version of CentOS. For years, CentOS has been a popular choice for users who want to use Red Hat Enterprise Linux without having to pay for it. Some of the CentOS developers are moving to Red Hat, but they won't be working on RHEL — they say the "firewall" between the two distros will remain in place. CentOS Project Chair Karanbir Singh said, 'The changes we make are going to be community inclusive, and promoted, proposed, formalised, and actioned in an open community centric manner on the centos-devel mailing list. And I highly encourage everyone to come along and participate.'
The Military

Are New Technologies Undermining the Laws of War? 317

Lasrick writes "This is a great read — from the article: 'Today, emerging military technologies — including unmanned aerial vehicles, directed-energy weapons, lethal autonomous robots, and cyber weapons — raise the prospect of upheavals in military practice so fundamental that they challenge assumptions underlying long-established international laws of war, particularly those relating to the primacy of the state and the geographic bounds of warfare. But the laws of war have been developed over a long period, with commentary and input from many cultures. What would seem appropriate in this age of extraordinary technological change, the author concludes, is a reconsideration of the laws of war in a deliberate and focused international dialogue that includes a range of cultural and institutional perspectives.'"
EU

EU Copyright Reform: Your Input Is Needed! 154

An anonymous reader writes "The European Commission has finally (as of last month) opened its public consultation on copyright reform. This is the first time the general public can influence EU copyright policy since fifteen years back, and it is likely at least as much time will pass until next time. In order to help you fill out the (English-only, legalese-heavy) questionnaire, some friendly hackers spent some time during the 30c3 to put together a site to help you. Anyone, EU citizen or not, organization or company, is invited to respond (deadline fifth of February). Pirate MEP Amelia Andersdotter has a more in-depth look at the consultation."
United States

FBI Edits Mission Statement: Removes Law Enforcement As 'Primary' Purpose 539

schwit1 writes with news that the FBI has altered their declared primary function from "law enforcement" to "national security." From the article: "Following the 9/11 attacks, the FBI picked up scores of new responsibilities related to terrorism and counterintelligence while maintaining a finite amount of resources. What's not in question is that government agencies tend to benefit in numerous ways when considered critical to national security as opposed to law enforcement. 'If you tie yourself to national security, you get funding and you get exemptions on disclosure cases,' said McClanahan. 'You get all the wonderful arguments about how if you don't get your way, buildings will blow up and the country will be less safe.'"
The Almighty Buck

The SEC Is About To Make Crowdfunding More Expensive 366

PapayaSF writes "Proposed new rules require that funding portals register with the Securities and Exchange Commission and the Financial Intermediary Regulatory Authority. In addition, investors must have access to a business plan, use of proceeds, a valuation of the company, and financials, so Certified Public Accountants may be needed. The SEC estimates that for amounts under $100,000, the fees will be 12.9% to 39% of the money raised, though it may drop to under 8% for higher amounts. Is this needed regulation, or bureaucratic overreach?"
Security

Reverse Engineering a Bank's Security Token 55

An anonymous reader writes "An engineer from Brazil has posted a technical walkthrough of how he was able to reverse engineer his bank's code-generating security token. He found a way to accurately generate his unlock codes with some custom code and an Arduino clone. (Don't worry: his method doesn't give him access to anybody else's codes.) 'Every exception thrown by this piece of code is obfuscated, as well as many of the strings used throughout the code. That is a major roadblock, since exception messages and strings in general are a great way of figuring out what the code is doing when reverse engineering something. Luckily, their developers decided to actually show useful text when a problem occurs and an exception gets thrown, so they wrapped those obfuscated strings with a.a, presumably a decryption routine that returns the original text. That routine is not too straightforward, but it is possible to get a high level understanding of what it is doing.'"
The Military

U.S. Waived Laws To Keep F-35 On Track With China-made Parts 348

An anonymous reader sends this report from Reuters: "The Pentagon repeatedly waived laws banning Chinese-built components on U.S. weapons in order to keep the $392 billion Lockheed Martin Corp F-35 fighter program on track in 2012 and 2013, even as U.S. officials were voicing concern about China's espionage and military buildup. According to Pentagon documents reviewed by Reuters, chief U.S. arms buyer Frank Kendall allowed two F-35 suppliers, Northrop Grumman Corp and Honeywell International Inc, to use Chinese magnets for the new warplane's radar system, landing gears and other hardware. Without the waivers, both companies could have faced sanctions for violating federal law and the F-35 program could have faced further delays."
Government

Senator Bernie Sanders Asks NSA If Agency Is Spying On Congress 363

cold fjord writes with this excerpt from Fox News: "A U.S. senator on Friday pressed the National Security Agency on whether its controversial spying practices extend to monitoring members of Congress. 'Has the NSA spied, or is the NSA currently spying, on members of Congress or other American elected officials?' Sen. Bernie Sanders, I-Vt., asked in a letter to NSA Director Gen. Keith Alexander released from the senator's office. Sanders, a self-described 'democratic socialist,' defines spying as monitoring the phone calls, emails and internet traffic of elected officials."
Facebook

Facebook Being Sued Over Mining of Private Messages 170

Kimomaru writes "Two Facebook users are trying to start a class action lawsuit against Facebook for allegedly mining information from private messages with the intention of selling is to advertisers (full complaint PDF). It's not the first time a social medial player has been in the press over privacy or security issues. But when the services are provided free of charge, does the user have a realistic expectation of privacy or security, especially when it's understood that the user's data is being mined for advertising? If not, should social media networks be allowed to use words like 'private' (as in private messaging) or 'security' to describe their services?"

Slashdot Top Deals

As far as the laws of mathematics refer to reality, they are not certain, and as far as they are certain, they do not refer to reality. -- Albert Einstein

Working...