Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Transportation

Car Hacking Concerns On the Rise 95

Pat Attack writes "I think most of the people who read Slashdot know that if it has circuitry, it can be hacked. Well, the good folks over at CNN have an article about the potential for your car to be hacked. This article lists the potential damage that could be done, proof of concept work, as well as a few scary scenarios. 'With vehicles taking up to three years to develop, [security strategist Brian Contos] says manufacturers will struggle to keep abreast of rapidly-evolving threats unless they organize regular software updates. Instead, he says, any installed technology should be given a so-called "white list" of permissible activities beyond which any procedures are blocked.' My mom reads CNN and is a Luddite. I expect to hear from her today. She'll probably tell me my new car with bluetooth is unsafe."
Crime

Secret UK Network Hunts GPS Jammers 228

garymortimer writes "A secret network of 20 roadside listening stations across the UK has confirmed that criminals are attempting to jam GPS signals on a regular basis. From the article: 'Government-funded trials involving the police have revealed more than a hundred incidents of GPS jammer use in the UK. The Sentinel project, which has been running since January 2011, was designed to measure GPS jamming on UK roads. The project, run by GPS-tracking company Chronos Technology, picked up the illegal jamming incidents via four GPS sensors in trials lasting from two to six months per location.'"
Earth

Pouring Water Into a Volcano To Generate Power 321

Hugh Pickens writes "Until recently, geothermal power systems have exploited only resources where naturally occurring heat, water, and rock permeability are sufficient to allow energy extraction. Now, geothermal energy developers plan use a new technology called Enhanced Geothermal Systems (EGS) to pump 24 million gallons of water into the side of the dormant Newberrry Volcano, located about 20 miles south of Bend, Oregon, in an effort to use the earth's heat to generate power. 'We know the heat is there,' says Susan Petty, president of AltaRock Energy, Inc. of Seattle. 'The big issue is can we circulate enough water through the system to make it economic.' Since natural cracks and pores do not allow economic flow rates, the permeability of the volcanic rock can be enhanced with EGS by pumping high-pressure cold water down an injection well into the rock, creating tiny fractures in the rock, a process known as hydroshearing. Then cold water is pumped down production wells into the reservoir, and the steam is drawn out. Natural geothermal resources only account for about 0.3 percent of U.S. electricity production, but a 2007 Massachusetts Institute of Technology report projected EGS could bump that to 10 percent within 50 years, at prices competitive with fossil-fuels. 'The important question we need to answer now,' says USGS geophysicist Colin Williams, 'is how geothermal fits into the renewable energy picture, and how EGS fits. How much it is going to cost, and how much is available.'"
Japan

Russian Scientists Say They'll Clone a Mammoth Within 5 Years 302

Many scientists (mainly Japanese and Russian) have dreamed of cloning a mammoth over the years. When the mammoth genome was partially reconstructed in 2008, that dream seemed a bit closer. Besides the millions of dollars needed for such a project, the biggest hurdle was the lack of a good sample of mammoth DNA. That hurdle has now been cleared, thanks to the discovery of well-preserved bone marrow in a mammoth thigh bone. Russian scientist Semyon Grigoriev, acting director of the Sakha Republic's mammoth museum, and colleagues from Japan's Kinki University say that within 5 years they'll likely have a clone. From the article: "What's been missing is woolly mammoth nuclei with undamaged genes. Scientists have been on a Holy Grail-type search for such pristine nuclei since the late 1990s. Now it sounds like the missing genes may have been found."
Security

CarrierIQ Tries To Silence Security Researcher 216

phaedrus5001 sends this quote from a story at Wired: "A data-logging software company is seeking to squash an Android developer's critical research into its software that is secretly installed on millions of phones, but Trevor Eckhart is refusing to publicly apologize for his research and remove the company's training manuals from his website. Though the software is installed on millions of Android, Blackberry and Nokia phones, Carrier IQ was virtually unknown until the 25-year-old Eckhart analyzed its workings, recently revealing that the software secretly chronicles a user's phone experience, from its apps, battery life and texts. Some carriers prevent users who actually find the software from controlling what information is sent." The EFF is hosting PDFs of CarrierIQ's C&D letter, as well as their response on Eckhart's behalf.

Comment Re:Games (Score 1) 1880

Have YOU tried Dia?
It has great features, but doesn't feel very polished as a program. When in Linux and don't have only minimal needs, I'll use Dia or LibO Draw. (I actually prefer Draw in that instance - even if it can't natively do UML.)

IBM

SCO Zombie Creaks Into Motion Again 208

phands writes "SCO has moved to partially reopen their 10 year old lawsuit against IBM. Unbelievable! Details at Groklaw." From the article, quoting SCO's filing: "SCO respectfully requests that the Court rule on IBM’s Motion for Summary Judgment on SCO’s Unfair Competition Claim (SCO’s Sixth Cause of Action), dated September 25, 2006 (Docket No. 782), which motion is directed at the Project Monterey Claim, and IBM’s Motion for Summary Judgment on SCO’s Interference Claims (SCO’s Seventh, Eighth and Ninth Causes of Action), dated September 25, 2006 (Docket No. 783), which motion is directed at the Tortious Interference Claims."
China

China's Cyber-Warfare Capabilities Overstated 140

An anonymous reader writes "A new paper argues that China's cyber-warfare capability is actually pretty poor. '[China has] evinced little proficiency with more sophisticated hacking techniques. The viruses and Trojan Horses they have used have been fairly easy to detect and remove before any damage has been done or data stolen. There is no evidence that China's cyber-warriors can penetrate highly secure networks or covertly steal or falsify critical data,' the paper reads (PDF). 'They would be unable to systematically cripple selected command and control, air defense and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.'"
Earth

Fish Evolve Immunity To Toxic Sludge 267

RedEaredSlider writes "Fish in the Hudson River and the harbor in New Bedford, Mass., have evolved resistance to PCBs. In the Hudson, a species of tomcod has evolved a way for a very specific protein to simply not bind to PCBs, nearly eliminating the toxicity. In New Bedford, the Atlantic killifish has proteins that bind to the toxin (just as they do in mammals) but the fish aren't affected despite high levels of PCBs in their cells. Why the killifish survive is a mystery."
EU

EU Debates Installing a Black Box On Your Computer 459

bs0d3 writes "EU MEP Tiziano Motti (Italy), wants everything you do online to be logged and saved, for the sake of the children. Like a black box installed on every computer. He proposes an early warning system of criminal activity, specifically whenever an image of sexually abused children is detected, an alarm, goes to the authorities to be able to see who uploaded it. Tiziano Motti was a politician who just over a year ago managed to get a majority of European Members of Parliament to support the proposal to expand the data storage directive to Google searches. The purpose was to protect children from pedophiles — the same excuse he is using now. His proposal involves a technology called Logbox. And just as with an aircraft's black box, Logbox is installed on computers, laptops, smartphones, and e-readers because yes, all that can be connected to the internet."
Censorship

NY Senators Want To Make Free Speech A Privilege 624

An anonymous reader writes "A group of four NY state senators have written a paper suggesting that free speech should be looked upon as a government granted privilege rather than a right. They're specifically concerned about cyberstalking and cyberbullying, and are introducing legislation to make both of those against the law. Among other troubling concepts, they argue that merely 'excluding' someone from a group is a form of cyberbullying."

Slashdot Top Deals

"You don't go out and kick a mad dog. If you have a mad dog with rabies, you take a gun and shoot him." -- Pat Robertson, TV Evangelist, about Muammar Kadhafy

Working...