Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:When guns are outlawed... (Score 3, Interesting) 62

Eh, it's kind of like your Android phone not making root readily available. It's there to protect the unwashed masses from themselves. Serious hobbyists (or bad actors) don't have much difficulty getting around the restrictions. I don't think anyone seriously thinks that "geofencing" software will keep a terrorist from flying a drone into restricted airspace. What it will do is keep the "hold my beer and watch this!" crowd from flying their drone into the glide path of a 747.

Submission + - Epson Trying To Kill the Printer Ink Cartridge (wsj.com)

An anonymous reader writes: Inkjet printer cartridges have been the bane of many small business es and home offices for decades. It's interesting, then, that Epson is trying something new: next month, they're launching a new line of printers that come with small tanks of ink, instead of cartridges. The tanks will be refilled using bottles of ink. They're reversing the economics, here: the printer itself will be more expensive, but the refills will be much cheaper. Early reports claim you'll be spending a tenth as much on ink as you were before, but we'll see how that shakes out. The Bloomberg article makes a good point: it's never been easier to not print things. The printer industry needs to innovate if it wants us to keep churning out printed documents, and this may be the first big step.
Government

FAA Has Approved More Than 1,000 Drone Exemptions 62

coondoggie writes: The Federal Aviation Administration today said it has issued 1,008 exemptions to businesses wanting to fly unmanned aircraft in the national airspace. Such small drones have been on the bad side of the news in the past few days: there have been at least three complaints about the diminutive aircraft flying near the flight path of JFK airport in New York. All three of the flights landed safely but the events prompted New York Senator Charles Schumer to call for "tougher FAA rules on drones," as well as geofencing software that could prohibit a done from flying higher than 500 feet, and keep it two miles away from any airport or sensitive area.

Comment Re:Remember when the Internet was uncontrolled? (Score 3, Insightful) 121

remember, Facebook != Internet

It is to many people, particularly those that came of age after the internet went mainstream, as well as those that are older and less technically adept.

Like it or hate it, Facebook is the Internet to a lot of people. Try having a brick and mortar business these days without a presence on Facebook. There are countless people that will go looking for something on Facebook long before they think of a simple Google search. Why do you think Google has invested so much effort into social media despite their many failures? They're terrified of people like this.

At the rate things are going the "dark web" isn't going to be warez, criminals, and black hats; it's going to be anything that's not on Facebook and Twitter.

Comment Ataturk was a punk (Score 2) 121

I was only in Istanbul once, and only long enough to have dinner, fall asleep and run to the airport. But my Serbian monther-in-law has some very strong opinions about Turks. She's usually such a sweet little old lady, but don't get her started on the Turks. I mean, the Ottoman Empire was gone before she was born, but damn, she's still mad about something.

Comment Re:Wrong. (Score 1) 223

"open, widely used and available"
Yeahhh... No.
So Perl, Python ?
Military systems have life spans of decades. What is widely used today is a niche tomorrow. When Ada was first specified about the only languages that fit your requirements where COBOL and FORTRAN. If you want to stretch it a bit you might include Pascal.
This was 1977 after all.
Ada actually fits your requirements pretty well. Most new systems are now using C++ but Ada is an interesting language for writing highly reliable systems.

Comment Re:Good (Score 1) 223

I have to say that while I do not extremists groups of any type your examples leave me wondering.
Violet Blue is not a well known security expert she is sex columnist. I also think that you in the context of computer security least she is not highly respected. I can seen the logic in the statement that a sex talk has no place in a computer security conference.

Submission + - Researchers Use ZigBee Sniffing Drone to Find, Fingerprint, and Map IoT Devices (praetorian.com)

pjauregui writes: Today, security researchers at Praetorian released a new interactive map that showcases exposed and potentially vulnerable Internet of Things (IoT) devices in major cities. If you’re familiar with SHODAN, which allows you to search for open ports on industrial networks, Praetorian is applying a similar idea to IoT devices operating in residential, commercial, and industrial zones. The project just started, so right now it’s limited to Austin, but they’ve already mapped over 1,500 unique devices in that one city and the goal is to quickly expand this to other major metro areas across the US. They also show manufacturer statistics, such as how many Phillips Hue lighting devices were found in the sample set they released.

To do this, they’re using a customized IoT-hunting drone that’s specially equipped to ‘sniff’ out ZigBee IoT beacons. Once a device is discovered, it's then analyzed to determine its security settings, manufacturer ID, channel, extended source, and other unique attributes of the device. Here’s a link to the real-time map they have for the Austin area: https://www.praetorian.com/iotmap/

Based on the data released, security itself doesn't seem to be at the heart of the project at this point. At its core, the project is currently "driven by exploration" and discovery in the IoT space. Though it does appear that the project will take a heavier security-focus at some point:

According to Gartner, 4.9 billion connected things will be in use during 2015, up 30 percent from 2014, and will reach 25 billion by 2020. In today’s connected world, the perception of security risk alone, even if not realized, can still negatively impact consumer confidence necessary for new technologies to meet their full market potential. Recent, high-profile data breaches have heightened consumers’ awareness of data security and privacy issues. As a result, consumer adoption may suffer until vendors can adequately address security and privacy concerns. Joining the Internet of Things adds many new layers of complexity for any product environment. New technologies, existing technologies working together in new ways, limited standards, and competing protocols all add to the challenge of delivering a secure connected product to the market. From smart homes, connected lighting, smart grids and retail services to connected cars, industrial automation, and physical plant operation, Internet of Things security testing and assurance is critical for delivering and deploying secure connected products. We'll be sharing a lot more about IoT security as the project evolves.


Yahoo!

Hackers Exploit Adobe Flash Vulnerability In Yahoo Ads 77

vivaoporto notes a report that a group of hackers have used online ad networks to distribute malware over several of Yahoo's websites. The attack began on Tuesday, July 28, and was shut down on Monday, August 3. It was targeted at Yahoo's sports, finance, gaming, and news-related sites. Security firm Malwarebytes says the hackers exploited a Flash vulnerability to redirect users to the Angler Exploit Kit. "Attacks on advertising networks have been on the rise ... researchers say. Hackers are able to use the advertising networks themselves, built for targeting specific demographics of Internet users, to find vulnerable machines. While Yahoo acknowledged the attack, the company said that it was not nearly as big as Malwarebytes had portrayed it to be."

Comment Re:Remember when the Internet was uncontrolled? (Score 3, Interesting) 121

The EU isn't a defensive alliance; that's what NATO is for and Turkey is already a NATO member. One that's keeping us from forming a coherent policy against ISIS, incidentally, since our natural allies in the region and only proven effective anti-ISIS force happen to be Turkey's sworn enemy.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...