Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Businesses

Amazon's Delivery Drones Will Be Able To Track Your Location 99

stowie writes: According to the filing with the USPTO, the e-commerce giant's delivery drones will be able to communicate with each other, find the best flight path available, and update the delivery location as a customer changes location. Package delivery locations will be updated as customers move around, so a package can come to you at work or home, depending on where you are when your shipment is ready — including pulling location data from a smartphone. There will also be relay locations, allowing drones to drop off packages for further transport, or to recharge or swap batteries. Amazon even supplies a mockup of what its delivery drone could look like, including eight propellers, two removable power modules and much more.
Facebook

Is Facebook Keeping You In a Political Bubble? 179

sciencehabit writes: Does Facebook make it harder for people with different political views to get along? Political scientists have long wondered whether the social network's news feed selectively serves up ideologically charged news while filtering out content from different camps. Now, a study by Facebook's in-house social scientists finds that this does happen, though the effect seems to be very small. "There's a growing concern that social media platforms like Facebook and Twitter allow us to more precisely engineer our informational environments than ever before, so we only get info that's consistent with our prior beliefs," says David Lazer, a political and computer scientist who authored a commentary on the paper.
The Military

FAA: Big Tech Challenges For Massive Washington, DC Warbirds Flyover 54

coondoggie writes: It will be one of the largest gatherings of flying WWII aircraft in history as 56 famous vintage warbirds will fly through restricted airspace over the National Mall Friday in remembrance of the 70th anniversary of VE-Day or Victory in Europe Day. The huge flyover, dubbed "The Arsenal of Democracy," of so many different types of aircraft – from seaplanes to fighters and the only flying B-29 Superfortress – was no easy undertaking. The first plane should be visible along the National Mall around 12:10 p.m. With roughly 90 seconds between formations, the Flyover will end by 1 p.m. Reagan National Airport will be closed to commercial traffic from 12 noon to 1 p.m. to accommodate the flights. The Flyover will be streamed live here.
Google

Superfish Injects Ads In 1 In 25 Google Page Views 91

An anonymous reader writes: A new report from Google has found that more than 5% of unique daily IP addresses accessing Google — tens of millions — are interrupted by ad-injection techniques, and that Superfish, responsible for a major controversy with Lenovo in February is the leading adware behind what is clearly now an industry. Amongst the report's recommendations to address the problem is the suggestion that browser makers "harden their environments against side-loading extensions or modifying the browser environment without user consent." Some of the most popular extensions for Chrome and Firefox, including ad-blockers, depend on this functionality.
Businesses

Keurig Stock Drops, Says It Was Wrong About DRM Coffee Pods 369

An anonymous reader writes: Green Mountain (Keurig) stock dropped by 10% this morning after a brutal earnings report. The reason? CNN Money reports that DRM has weakened sales of their Keurig 2.0. CEO Brian Kelley admits, "Quite honestly, we were wrong." Last year Green Mountain decided to make their new coffee machines work with licensed pods only. The company says they now plan to license more outside brands, and bring back “My K-Cup” reusable filters.
Crime

What To Say When the Police Tell You To Stop Filming Them 509

HughPickens.com writes: Robinson Meyer writes in The Atlantic that first of all, police shouldn't ask. "As a basic principle, we can't tell you to stop recording," says Delroy Burton, a 21-year veteran of DC's police force. "If you're standing across the street videotaping, and I'm in a public place, carrying out my public functions, [then] I'm subject to recording, and there's nothing legally the police officer can do to stop you from recording." What you don't have a right to do is interfere with an officer's work. ""Police officers may legitimately order citizens to cease activities that are truly interfering with legitimate law enforcement operations," according to Jay Stanley who wrote the ACLU's "Know Your Rights" guide for photographers, which lays out in plain language the legal protections that are assured people filming in public. Police officers may not confiscate or demand to view your digital photographs or video without a warrant and police may not delete your photographs or video under any circumstances.

What if an officer says you are interfering with legitimate law enforcement operations and you disagree with the officer? "If it were me, and an officer came up and said, 'You need to turn that camera off, sir,' I would strive to calmly and politely yet firmly remind the officer of my rights while continuing to record the interaction, and not turn the camera off," says Stanley. The ACLU guide also supplies the one question those stopped for taking photos or video may ask an officer: "The right question to ask is, 'am I free to go?' If the officer says no, then you are being detained, something that under the law an officer cannot do without reasonable suspicion that you have or are about to commit a crime or are in the process of doing so. Until you ask to leave, your being stopped is considered voluntary under the law and is legal."
Privacy

Santa Clara County Opts Against Buying Stingray Due To Excessive Secrecy 39

An anonymous reader writes: The Santa Clara County (California) Board of Supervisors voted in February to acquire a Stingray device for the sheriff's office. However, the subsequent negotiations with Harris Corp. required such a level of secrecy that the county announced that it will forego the $500,000 grant and not buy the device. In a memo released Wednesday, the County Executive's Office said "after lengthy negotiations regarding contract terms, including business and legal issues," an agreement could not be reached with the manufacturer, the Harris Corp. As a result, "the system will not be purchased at this time," and the work group focused on drafting a use policy will be disbanded.
Privacy

LinkedIn Used To Create Database of 27,000 US Intelligence Personnel 82

An anonymous reader writes: A new group, Transparency Toolkit, has mined LinkedIn to reveal and analyze the resumes of over 27,000 people in the U.S. intelligence community. In the process, Transparency Toolkit said it found previously unknown secret codewords and references to surveillance technologies and projects. "'Transparency Toolkit uses open data to watch the watchers and hold the powerful to account,' the group's website says. 'We build free software to collect and analyze open data from a variety of sources. Then we work with investigative journalists and human rights organizations to turn that into useful, actionable knowledge. Currently, our primary focuses are investigating surveillance and human rights abuses.'"
Programming

C Code On GitHub Has the Most "Ugly Hacks" 264

itwbennett writes: An analysis of GitHub data shows that C developers are creating the most ugly hacks — or are at least the most willing to admit to it. To answer the question of which programming language produces the most ugly hacks, ITworld's Phil Johnson first used the search feature on GitHub, looking for code files that contained the string 'ugly hack'. In that case, C comes up first by a wide margin, with over 181,000 code files containing that string. The rest of the top ten languages were PHP (79k files), JavaScript (38k), C++ (22k), Python (19k), Text (11k), Makefile (11k), HTML, (10k), Java (7k), and Perl (4k). Even when controlling for the number of repositories, C wins the ugly-hack-athon by a landslide, Johnson found.
Security

Self-Destructing Virus Kills Off PCs 107

mpicpp sends word about particularly bad virus making the rounds, with this snippet from the BBC: "A computer virus that tries to avoid detection by making the machine it infects unusable has been found. If Rombertik's evasion techniques are triggered, it deletes key files on a computer, making it constantly restart. Analysts said Rombertik was 'unique' among malware samples for resisting capture so aggressively. On Windows machines where it goes unnoticed, the malware steals login data and other confidential information. Rombertik typically infected a vulnerable machine after a booby-trapped attachment on a phishing message had been opened, security researchers Ben Baker and Alex Chiu, from Cisco, said in a blogpost. Some of the messages Rombertik travels with pose as business inquiry letters from Microsoft. The malware 'indiscriminately' stole data entered by victims on any website, the researchers said. And it got even nastier when it spotted someone was trying to understand how it worked. 'Rombertik is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis,' the researchers said."
Earth

Global Carbon Dioxide Levels Reach New Monthly Record 372

mrflash818 writes: For the first time since we began tracking carbon dioxide in the global atmosphere, the monthly global average concentration of carbon dioxide gas surpassed 400 parts per million in March 2015, according to NOAA's latest results. “It was only a matter of time that we would average 400 parts per million globally,” said Pieter Tans, lead scientist of NOAA’s Global Greenhouse Gas Reference Network. “We first reported 400 ppm when all of our Arctic sites reached that value in the spring of 2012. In 2013 the record at NOAA’s Mauna Loa Observatory first crossed the 400 ppm threshold. Reaching 400 parts per million as a global average is a significant milestone."
Security

Researcher: Drug Infusion Pump Is the "Least Secure IP Device" He's Ever Seen 83

chicksdaddy writes: This is a bad month for the medical equipment maker Hospira. First, security researcher Billy Rios finds a raft of serious and remotely exploitable holes in the company's MedNet software, prompting a vulnerability alert from ICS CERT. Now, one month later, ICS CERT is again warning of a "10 out of 10" critical vulnerability, this time in Hospira's LifeCare PCA drug infusion pump. The problem? According to this report by Security Ledger the main problem was an almost total lack of security controls on the device. According to independent researcher Jeremy Williams, the PCA pump listens on Telnet port 23. Connecting to the device via Telnet, he was brought immediately to a root shell account that gave him total, administrator level access to the pump without authentication. "The only thing I needed to get in was an interest in the pump," he said. Richards found other examples of loose security on the PCA 3: a FTP server that could be accessed without authentication and an embedded web server that runs Common Gateway Interface (CGI). That could allow an attacker to tamper with the pump's operation using fairly simple scripts. Also: The PCA pump stores wireless keys used to connect to the local (medical device) wireless network in plain text on the device. That means anyone with physical access to the Pump (which has an ethernet port) could gain access to the local medical device network and other devices on it. The problems prompted Richards to call the PCA 3 pump "the least secure IP enabled device" he has ever worked with.
Security

FBI Releases Its Files On DEF CON: Not Amused By Spot-the-Fed 102

v3rgEz writes: Not surprisingly, the FBI has compiled reports on notorious hacker gathering DEF CON, now released thanks to a Freedom of Information Act request. The files detail the lack of amusement at the Spot-the-Fed game, as well as which conference tracks attract the most interest. "In a bit of FOIrony, the file contains a copy of the Spot the Fed contest rules, including the facetious aside to feds offering t-shirts in exchange for agency coffee mugs."
Security

MacKeeper May Have To Pay Millions In Class-Action Suit 41

jfruh writes: If you use a Mac, you probably recognize MacKeeper from the omnipresent popup ads designed to look vaguely like system warnings urging you to download the product and use it to keep your computer safe. Now the Ukranian company behind the software and the ads may have to pay millions in a class action suit that accuses them of exaggerating security problems in order to convince customers to download the software.
AMD

AMD Outlines Plans For Zen-Based Processors, First Due In 2016 166

crookedvulture writes: AMD laid out its plans for processors based on its all-new Zen microarchitecture today, promising 40% higher performance-per-clock from from the x86 CPU core. Zen will use simultaneous multithreading to execute two threads per core, and it will be built using "3D" FinFETs. The first chips are due to hit high-end desktops and servers next year. In 2017, Zen will combine with integrated graphics in smaller APUs designed for desktops and notebooks. AMD also plans to produce a high-performance server APU with a "transformational memory architecture" likely similar to the on-package DRAM being developed for the company's discrete graphics processors. This chip could give AMD a credible challenger in the HPC and supercomputing markets—and it could also make its way into laptops and desktops.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...