Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Government

Think Tanks: How a Bill [Gates Agenda] Becomes a Law 165

theodp writes: The NY Times' Eric Lipton was just awarded a 2015 Pulitzer Prize for investigative reporting that shed light on how foreign powers buy influence at think tanks. So, it probably bears mentioning that Microsoft's 'two-pronged' National Talent Strategy (PDF) to increase K-12 CS education and the number of H-1B visas — which is on the verge of being codified into laws — was hatched at an influential Microsoft and Gates Foundation-backed think tank mentioned in Lipton's reporting, the Brookings Institution. In 2012, the Center for Technology Innovation at Brookings hosted a forum on STEM education and immigration reforms, where fabricating a crisis was discussed as a strategy to succeed with Microsoft's agenda after earlier lobbying attempts by Bill Gates and Microsoft had failed. "So, Brad [Microsoft General Counsel Brad Smith]," asked the Brookings Institution's Darrell West at the event, "you're the only [one] who mentioned this topic of making the problem bigger. So, we galvanize action by really producing a crisis, I take it?" "Yeah," Smith replied (video). And, with the help of nonprofit organizations like Code.org and FWD.us that were founded shortly thereafter, a national K-12 CS and tech immigration crisis was indeed created.
Science

Liquid Mercury Found Under Mexican Pyramid 133

An anonymous reader writes: An archaeologist has discovered liquid mercury at the end of a tunnel beneath a Mexican pyramid, a finding that could suggest the existence of a king's tomb or a ritual chamber far below one of the most ancient cities of the Americas. Mexican researcher Sergio Gómez ... has spent six years slowly excavating the tunnel, which was unsealed in 2003 after 1,800 years. Last November, Gómez and a team announced they had found three chambers at the tunnel’s 300ft end, almost 60ft below the the temple. Near the entrance of the chambers, they a found trove of strange artifacts: jade statues, jaguar remains, a box filled with carved shells and rubber balls.
Patents

Vizio, Destroyer of Patent Trolls 104

An anonymous reader writes: We read about a lot of patent troll cases. Some are successful and some are not, but many such cases are decided before ever going to court. It's how the patent troll operates — they know exactly how high litigation costs are. Even without a legal leg to stand on, they can ask for settlements that make better financial sense for the target to accept, rather than dumping just as much money into attorney's fees for an uncertain outcome. Fortunately, some companies fight back. TV-maker Vizio is one of these, and they've successfully defended against 16 different patent trolls, some with multiple claims. In addition, they're going on the offensive, trying to wrest legal fees from the plaintiffs for their spurious claims. "For the first time, it stands a real chance, in a case where it spent more than $1 million to win. Two recent Supreme Court decisions make it easier for victorious defendants to collect fees in patent cases. The TV maker is up against a storied patent plaintiffs' firm, Chicago-based Niro, Haller & Niro, that has fought for Oplus tooth and nail. ... For Vizio, the company feels that it's on the verge of getting vindication for a long-standing policy of not backing down to patent trolls."
Earth

Giant Survival Ball Will Help Explorer Survive a Year On an Iceberg 128

HughPickens.com writes: Ben Yeager reports in Outside Magazine that Italian explorer Alex Bellini plans to travel to Greenland's west coast, pick an iceberg, and live on it for a year as it melts out in the Atlantic. It's a precarious idea. Bellini will be completely isolated, and his adopted dwelling is liable to roll or fall apart at any moment, thrusting him into the icy sea or crushing him under hundreds of tons of ice. His solution: an indestructible survival capsule built by an aeronautics company that specializes in tsunami-proof escape pods. "I knew since the beginning I needed to minimize the risk. An iceberg can flip over, and those events can be catastrophic." Bellini plans to use a lightweight, indestructible floating capsules, or "personal safety systems" made from aircraft-grade aluminum in what's called a continuous monocoque structure, an interlocking frame of aluminum spars that evenly distribute force, underneath a brightly painted and highly visible aluminum shell. The inner frame can be stationary or mounted on roller balls so it rotates, allowing the passengers to remain upright at all times.

Aeronautical engineer Julian Sharpe, founder of Survival Capsule, got the idea for his capsules after the 2004 Indonesian tsunami. He believes fewer people would have died had some sort of escape pod existed. Sharpe hopes the products will be universal—in schools, retirement homes, and private residences, anywhere there is severe weather. The product appeals to Bellini because it's strong enough to survive a storm at sea or getting crushed between two icebergs. Bellini will spend almost all of his time in the capsule with the hatch closed, which will pose major challenges because he'll have to stay active without venturing out onto a slippery, unstable iceberg. If it flips, he'll have no time to react. "Any step away from [the iceberg] will be in unknown territory," says Bellini. "You want to stretch your body. But then you risk your life."

Submission + - Vizio, Destroyer of Patent Trolls (arstechnica.com)

An anonymous reader writes: We read about a lot of patent troll cases. Some are successful and some are not, but many such cases are decided before ever going to court. It's how the patent troll operates — they know exactly how high the litigation costs are, so even without a legal leg to stand on, they can ask for settlements that make better financial sense for the target to accept, rather than dumping just as much money into attorney's fees for an uncertain outcome. Fortunately, some companies fight back. TV-maker Vizio is one of these, and they've successfully defended against 16 different patent trolls, some with multiple claims. In addition, they're going on the offensive, trying to wrest legal fees from the plaintiffs for their spurious claims. "For the first time, it stands a real chance, in a case where it spent more than $1 million to win. Two recent Supreme Court decisions make it easier for victorious defendants to collect fees in patent cases. The TV maker is up against a storied patent plaintiffs' firm, Chicago-based Niro, Haller & Niro, that has fought for Oplus tooth and nail. ... For Vizio, the company feels that it's on the verge of getting vindication for a long-standing policy of not backing down to patent trolls."
Patents

Microsoft Increases Android Patent Licensing Reach 103

BrianFagioli writes: Microsoft may not be winning in the mobile arena, but they're still making tons of money from those who are. Patent licensing agreements net the company billions each year from device makers like Samsung, Foxconn, and ZTE. Now, Microsoft has added another company to that list: Qisda Corp. They make a number of Android and Chrome-based devices under the Qisda brand and the BenQ brand, and now Microsoft will be making money off those, too.
Security

Microsoft Opens Vulnerability Bounty Program For Spartan Browser 53

jones_supa writes: As it did in the past when it tried to make Internet Explorer more secure, Microsoft has launched a new bug bounty program for Spartan browser, the default application of Windows 10 for surfing the information highway. A typical remote code execution flaw can bring between $1,500 and $15,000, and for the top payment you also need to provide a functioning exploit. The company says that it could pay even more than that, if you convince the jury on the entry quality and complexity. Sandbox escape vulnerabilities with Enhanced Protected Mode enabled, important or higher severity vulnerabilities in Spartan or its engine, and ASLR info disclosure vulnerabilities are also eligible. If you want to accept the challenge, Microsoft provides more information on how to participate.
Windows

Buggy Win 95 Code Almost Wrecked Stuxnet Campaign 93

mask.of.sanity writes: Super-worm Stuxnet could have blown its cover and failed its sabotage mission due to a bug that allowed it to spread to ancient Windows boxes, malware analysts say. Stuxnet was on the brink of failure thanks to buggy code allowing it to spread to PCs running older and unsupported versions of Windows, and probably causing them to crash as a result. Those blue screens of death would have raised suspicions at the Natanz nuclear lab.
Crime

Allegation: Philly Cops Leaned Suspect Over Balcony To Obtain Password 225

An anonymous reader writes with this news from Ars Technica: If you want access to encrypted data on a drug dealer's digital device, you might try to break the crypto—or you might just try to break the man.

According to testimony from a police corruption trial currently roiling the city of Philadelphia, officers from an undercover drug squad took the latter route back in November 2007. After arresting their suspect, Michael Cascioli, in the hallway outside his 18th floor apartment, the officers took Cascioli back inside. Although they lacked a search warrant, the cops searched Cascioli's rooms anyway. According to a federal indictment (PDF), the officers 'repeatedly assaulted and threatened [Cascioli] during the search to obtain information about the location of money, drugs, and drug suppliers.'
That included, according to Cascioli, lifting him over the edge of his balcony to try to frighten out of him the password to his Palm Pilot. That sounds like a good time for a duress password.
China

Github DDoS Attack As Seen By Google 52

New submitter opensec writes: Last month GitHub was hit by a massive DDoS attack originating from China. On this occasion the public discovered that the NSA was not the only one with a QUANTUM-like capability. China has its own "Great Cannon" that can inject malicious JavaScript inside HTTP traffic. That weapon was used in the GitHub attack. People using Baidu services were unwitting participants in the denial of service, their bandwidth used to flood the website. But such a massive subversion of the Internet could not evade Google's watchful eye. Niels Provos, engineer at Google, tells us how it happened. Showing that such attacks cannot be made covertly, Provos hopes that the public shaming will act as a deterrent.
DRM

Microsoft, Chip Makers Working On Hardware DRM For Windows 10 PCs 304

writertype writes: Last month, Microsoft began talking about PlayReady 3.0, which adds hardware DRM to secure 4K movies. Intel, AMD, Nvidia, and Qualcomm are all building it in, according to Microsoft. "Older generations of PCs used software-based DRM technology. The new hardware-based technology will know who you are, what rights your PC has, and won’t ever allow your PC to unlock the content so it can be ripped. ... Unfortunately, it looks like the advent of PlayReady 3.0 could leave older PCs in the lurch. Previous PlayReady technology secured content up to 1080p resolution using software DRM—and that could be the maximum resolution for older PCs without PlayReady 3.0." Years back, a number of people got upset when Hollywood talked about locking down "our content." It looks like we may be facing it again for 4K video.
Government

German Intelligence Helped NSA Spy On EU Politicians and Companies 80

An anonymous reader writes: We've known for some time already that intelligence agencies operate beyond rules, laws, and regulations. Now, we learn that the NSA and the German intelligence service, BND, lied and withheld information about misuse from the German Chancellor's Office.

"The BND realized as early as 2008 that some of the selectors were not permitted according to its internal rules, or covered by a 2002 US-Germany anti-terrorism "Memorandum of Agreement" on intelligence cooperation. And yet it did nothing to check the NSA's requests systematically. It was only in the summer of 2013, after Edward Snowden's revelations of massive NSA and GCHQ surveillance, that the BND finally started an inquiry into all the selectors that had been processed. According to Der Spiegel, investigators found that the BND had provided information on around 2,000 selectors that were clearly against European and German interests. Not only were European businesses such as the giant aerospace and defense company EADS, best-known as the manufacturer of the Airbus planes, targeted, so were European politicians—including German ones.

However, the BND did not inform the German Chancellor's office, which only found out about the misuse of the selector request system in March 2015. Instead, the BND simply asked the NSA to make requests that were fully covered by the anti-terrorism agreement between the two countries. According to Die Zeit, this was because the BND was worried that the NSA might curtail the flow of its own intelligence data to the German secret services if the selector scheme became embroiled in controversy.
Google

Median Age At Google Is 29, Says Age Discrimination Lawsuit 349

dcblogs writes: The typical employee at Google is relatively young, according to a lawsuit brought by an older programmer who is alleging age discrimination. Between 2007 and 2013, Google's workforce grew from 9,500 to more than 28,000 employees, "yet as of 2013, its employees' median age was 29 years old," the lawsuit claims. That's in contrast to the median age of nearly 43 for all U.S. workers who are computer programmers, according to the lawsuit.
Security

Researcher Discloses Methods For Bypassing All OS X Security Protections 130

Trailrunner7 writes: For years, Apple has enjoyed a pretty good reputation among users for the security of its products. That halo has been enhanced by the addition of new security features such as Gatekeeper and XProtect to OS X recently, but one researcher said that all of those protections are simple to bypass and gaining persistence on a Mac as an attacker isn't much of a challenge at all. Gatekeeper is one of the key technologies that Apple uses to prevent malware from running on OS X machines. It gives users the ability to restrict which applications can run on their machines by choosing to only allow apps from the Mac App Store. With that setting in play, only signed, legitimate apps should be able to run on the machine. But Patrick Wardle, director of research at Synack, said that getting around that restriction is trivial. "Gatekeeper doesn't verify an extra content in the apps. So if I can find an Apple-approved app and get it to load external content, when the user runs it, it will bypass Gatekeeper," Wardle said in a talk at the RSA Conference here Thursday. "It only verifies the app bundle. If Macs were totally secure, I wouldn't be here talking," Wardle said. "It's trivial for any attacker to bypass the security tools on Macs."

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...