Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Crime

Finnish KRP Questions Suspected Lizard Squad Member 62

An anonymous reader writes Coming on the heels of the UK arrest of Vinnie Omari, Yle reports that Finnish police have interviewed "Ryan", the Finland-based hacker reportedly responsible for hacking the PlayStation and Xbox networks on Christmas day, but have not arrested him — contrary to reports in the international media (such as Washington Post). Lizard Squad had tweeted that the Finland-based hacker had been detained. Chief Inspector Tero Muurman of Keskusrikospoliisi (Finnish National Bureau of Investigation) confirmed Yle that reports of "Ryan" having been detained were wide of the mark. He had been interviewed at the start of the week, but then released. Finnish police are continuing their probe and co-operating closely with the FBI.
Portables (Apple)

Thunderbolt Rootkit Vector 163

New submitter Holi sends this news from PC World: Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface. The attack, dubbed Thunderstrike, installs malicious code in a MacBook's boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.

Comment Security is a two way street (Score 1) 396

You do need HTTPS to protect mundane content: Saying otherwise is very short sighted...

You might not care about the content, but the way someone, somewhere, is accessing it, does offer a lot of "value".
It can allow a watchful eye to either accuse the reader of being outside the norm, criminal, not respectful and whatnot (reason why librarians fought hard for the right to lend books without giving the list to the state!) or allow them to caracterise, profile, target a person over time for many different reasons.

Thus everyone should have the to right to read anonymously and willingly.
Witholding this right from others is being complicit with opressors.

Advertising

Fraud Bots Cost Advertisers $6 Billion 190

Rambo Tribble writes A new report claims that almost a quarter of the "clicks" registered by digital advertisements are, in fact, from robots created by cyber crime networks to siphon off advertising dollars. The scale and sophistication of the attacks which were discovered caught the investigators by surprise. As one said, "What no one was anticipating is that the bots are extremely effective of looking like a high value consumer."
Sony

Sony Employees Receive Email Threat From Hackers: 'Your Family Will Be In Danger 184

MojoKid writes: Things are going from bad to worse when it comes to the recent Sony Pictures Entertainment breach. Not only has sensitive financial information been released — including the salaries of high-ranking Sony executives — but more damaging personal information including 47,000 Social Security numbers of employees and actors have been leaked to the internet. We're now learning some even more disturbing details, unfortunately. Guardians of Peace (GOP), the hackers claiming responsibility for infiltrating Sony's computer network, are now threatening to harm the families of Sony employees. GOP reportedly sent Sony employees an email, which just so happened to be riddled with spelling and grammatical errors, that read in part, "your family will be in danger."
Sony

The Sony Pictures Hack Was Even Worse Than Everyone Thought 528

An anonymous reader writes with today's installment of Sony hack news. "It's time to take a moment of silence for Sony Pictures, because more startling revelations about leaked information just came out and employees are starting to panic. BuzzFeed raked through some 40 gigabytes of data and found everything from medical records to unreleased scripts. This is probably the worst corporate hack in history. Meanwhile, Fusion's Kevin Roose is reporting on what exactly happened at Sony Pictures when the hack went down. The hack was evidently so extensive that even the company gym had to shut down. And once the hackers started releasing the data, people started 'freaking out,' one employee said. That saddest part about all of this is that the very worst is probably still to come. Hackers say they stole 100 terabytes of data in total. If only 40 gigabytes contained all of this damning information, just imagine what 100 terabytes contains."
Robotics

Microsoft Rolls Out Robot Security Guards 140

An anonymous reader writes: Microsoft is testing a group of five robot security guards. They contain a sophisticated sensor suite that includes 360-degree HD video, thermal imaging, night vision, LIDAR, and audio recorders. They can also detect various chemicals and radiation signatures, and do some rudimentary behavioral analysis on people they see. (And they look a bit like Daleks.) The robots are unarmed, so we don't have to worry about a revolt just yet, but they can sound an alarm and call for human officers. They weigh about 300 lbs each, can last roughly a day on a battery charge, and know to head to the charging station when they're low on power.
Crime

Incapacitating Chemical Agents: Coming Soon To Local Law Enforcement? 152

Lasrick writes To this day, Russian authorities refuse to disclose the incapacitating chemical agent (ICA) they employed in their attempt, 12 years ago, to save 900 hostages held in a theater by Chechen fighters. Malcom Dando elaborates on a new report (PDF) that Russia, China, Israel, and a slew of other countries are continuing research into ICAs, and the apparent indifference of the international community into such research. Proponents of ICAs have long promoted their use in a variety of scenarios, including that of law enforcement, because in theory these chemicals incapacitate without permanent disability. Critics, however, point out that these weapons rely on exact dosage to prevent fatality, and that the ability to 'deliver the right agent to the right people in the right dose without exposing the wrong people, or delivering the wrong dose' is a near-impossible expectation. ICAs represent the further misuse and militarization of the life sciences and a weakening of the taboo against the weaponization of toxic substances, and the idea that they could be used in law enforcement situations is a disturbing one."
Facebook

We Need Distributed Social Networks More Than Ello 269

Frequent contributor Bennett Haselton writes: Facebook threatened to banish drag queen pseudonyms, and (some) users revolted by flocking to Ello, a social network which promised not to enforce real names and also to remain ad-free. Critics said that the idealistic model would buckle under pressure from venture capitalists. But both gave scant mention to the fact that a distributed social networking protocol, backed by a player large enough to get people using it, would achieve all of the goals that Ello aspired to achieve, and more. Read on for the rest.
Iphone

Users Report Warping of Apple's iPhone 6 Plus 421

MojoKid writes: Apple's iPhone 6 Plus weighs six ounces, and it's a scant 7.1mm thick. As an added bonus, according to a number of users, it has a hidden feature — it bends! And no, we don't mean it bends in a "Hey, what an awesome feature!" sort of way. More like a "Hey, the entire phone is near to snapping" kind of way. What's even more troubling is that many of the users who are reporting bent devices also claim that they were carrying it in front pockets or in a normal fashion as opposed to sitting on it directly. Either some of the iPhone 6 Plus hardware is defective (the vastly preferable option) or it's because the tests run by other venues are putting different kinds of stress on the chassis. It's not clear what the story is. Hopefully Apple will clarify it soon.
Media

Ask Slashdot: What To Do After Digitizing VHS Tapes? 268

An anonymous reader writes Now that I've spent close to a month digitizing a desk drawer's worth of VHS tapes, deinterlacing and postprocessing the originals to minimize years of tape decay, and compressing everything down to H.264, I've found myself with a hard drive full of loosely organized videos. They'll get picked up by my existing monthly backup, but I feel like I haven't gained much in the way of redundancy, as I thought I would. Instead of having tapes slowly degrade, I'm now open to losing entire movies at once, should both of my drives go bad. Does anyone maintain a library, and if so, what would they recommend? Is having them duplicated on two drives (one of which is spun down for all but one day of the month) a good-enough long term strategy? Should I look into additionally backing up to optical discs or flash drives, building out a better (RAIDed) backup machine, or even keeping the original tapes around despite them having been digitized?

Comment Re:containment (Score 1) 296

Yeah, not so much for permeation, maybe, but they still quote this as one of the things that help. Could maybe do some for actual leaks - but getting air in would be sad too. The big reason for lower pressure is the lower resistance though - I like paying less in power&cooling thanks to lower power use to keep the platters spinning.

Comment Re:containment (Score 4, Informative) 296

Clever materials choices and lower pressure than on the outside (~40% IIRC). Luckily leakage is easily measured in the product design and testing phase, as well as ongoing QA. So not nearly as much risk to your data as stupid firmware bugs that only turn up under some circumstances after lots of usage. And no, they won't be refillable.

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...