Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Firefox for iOS Beta coming to iPhone and iPad very soon (betanews.com)

BrianFagioli writes: Mozilla initially refused to cave to Apple and release a neutered version without its own Gecko engine. Last year, however, Mozilla announced that it was bringing a version of the browser to the mobile operating system by saying, "we need to be where our users are so we're going to get Firefox on iOS". While I am still dismayed that browser will not use the Gecko engine on iOS, I've come to accept it as a necessity for Firefox to survive. Today, Mozilla announces that the project is still on track and a beta is on the way soon.

Submission + - Universe's dark ages may not be invisible after all

StartsWithABang writes: The Universe had two periods where light was abundant, separated by the cosmic dark ages. The first came at the moment of the hot Big Bang, as the Universe was flooded with (among the matter, antimatter and everything else imaginable) a sea of high-energy photons, including a large amount of visible light. As the Universe expanded and cooled, eventually the cosmic microwave background was emitted, leaving behind the barely visible, cooling photons. It took between 50 and 100 million years for the first stars to turn on, so in between these two epochs of the Universe being flooded with light, we had the dark ages. Yet the dark ages may not be totally invisible, as the forbidden spin-flip-transition of hydrogen may illuminate this time period after all.
The Almighty Buck

FBI: Social Media, Virtual Currency Fraud Becoming a Huge Problem 39

coondoggie writes: Criminals taking advantage of personal data found on social media and vulnerabilities of the digital currency system are two of the emerging Internet law-breaking trends identified by the FBI's Internet Crime Complaint Center (IC3) in its annual look at online crime. The IC3 said 12% of the complaints submitted in 2014 contained a social media trait. Complaints involving social media have quadrupled over the last five years. In most cases, victim’s personal information was exploited through compromised accounts or social engineering.

Slashdot Top Deals

God help those who do not help themselves. -- Wilson Mizner

Working...