Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Study Finds Link Between Artificial Sweeteners and Glucose Intolerance

onproton writes: The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance, a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health.

Submission + - Study Finds Link Between Artificial Sweeteners and Glucose Intolerance

onproton writes: The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance, a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health.
Security

Tinba Trojan Targets Major US Banks 61

An anonymous reader writes Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit."
Security

Tinba Trojan Targets Major US Banks 61

An anonymous reader writes Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit."

Submission + - Snowden's Leaks Didn't Help Terrorists 1

HughPickens.com writes: The Interecept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden’s revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF).” In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

Earlier this month former NSA head Michael Hayden stated, “The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups”, while Matthew Olsen of the National Counterterrorism Centre would add “Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance.” Snowden’s critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia’s invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."

Submission + - Snowden's Leaks Didn't Help Terrorists 1

HughPickens.com writes: The Interecept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden’s revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF).” In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

Earlier this month former NSA head Michael Hayden stated, “The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups”, while Matthew Olsen of the National Counterterrorism Centre would add “Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance.” Snowden’s critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia’s invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."

Submission + - FCC May Raise Broadband Speed Requirements for Subsidies to ISPs 1

An anonymous reader writes: On Wednesday at a hearing in front of the US House Committee on Small Business, FCC Chairman Tom Wheeler stated that for ISPs to be eligible for government broadband subsidies, they would have to deliver speeds of at least 10 Mbps. Said Wheeler: "What we are saying is we can't make the mistake of spending the people's money, which is what Universal Service is, to continue to subsidize something that's subpar." He further indicated that he would remedy the situation by the end of 2014. The broadband subsidies are collected through bill surcharges paid for by phone customers.
IT

Ask Slashdot: Remote Support For Disconnected, Computer-Illiterate Relatives 334

An anonymous reader writes I use email to communicate with my folks overseas. Their ISP only allows dial-up access to their email account (there is no option of changing ISP), that can receive messages no larger than 1MB nor hold more than 15MB (no hope of changing that either). They are computer-illiterate, click on everything they receive, and take delight on sending their information to any Nigerian prince that contacts them, "just in case this one is true". Needless to say, their PC is always full of viruses and spyware. In my next yearly visit, instead of just cleaning it up, I'd like to gift them with some "hardened" PC to use for email only that would hopefully last the year before someone has to fix it. So far, these are the things I have in mind:
  • Some kind of linux distro, or maybe even mac. Most viruses over there are windows only and propagate via Autorun.inf or by email attachments, not having Windows could prevent both.
  • Some desktop environment that hides anything unrelated to connecting to the net and accessing their account (dial-up software, email client, web browser, exchanging files between their hard disk/email attachments and USB drives). By "hide", I just want the rest to be out of the way, but not entirely removed, so that if necessary, I can guide them over the phone. For this, Ubuntu's Unity seems like a particularly bad solution, but a Gnome desktop with non-removable desktop shortcuts (is this possible?) for the file manager, browser, email client and dial-up program could work. An android system is unlikely to work (they have no wifi, and they were utterly confused with Android's UI).
  • This could be a life saver: some kind of extension to the email client that executes commands on specially formatted emails (e.g., signed with my private key), so that I can do some basic diagnostics or install extra software if I have to. This las point is important: they currently rely on acquaintances who may not be competent (they can't evaluate that) if something happens between my visits. They, most likely, wont know how to deal with anything non-windows, so all tech support would fall on me. (This is the reason I haven't moved them from windows yet.)
  • Another very useful extension would be something to automatically re-assemble attachments split into several emails, to overcome the 1MB message limit.

Does any of that exist? If I have to build that system myself (or parts of it), do you have other suggestions? For the inevitable and completely reasonable suggestion of getting someone competent for tech support: I've tried that too. The competent ones don't last beyond the third visit.

Submission + - Inside Shenzen's Grey-Market iPhone Mall (itworld.com)

jfruh writes: Despite being largely manufactured in China, iPhones are still too expensive for most Chinese to afford — new ones, anyway. That's why thousands come to a bustling marketplace in Shenzen that specializes in older grey-market iPhones. Many of them are damaged phones that have been refurbished by enterprising merchants.
The Almighty Buck

Airbnb To Start Collecting Hotel Tax On Rentals In San Francisco 71

An anonymous reader writes Airbnb announced that it will begin collecting a 14% occupancy tax on behalf of its San Francisco hosts October 1. "This is the culmination of a long process that began earlier this year when we announced our intent to help collect and remit occupancy taxes in San Francisco," wrote Airbnb public policy leader David Owen. The company already collects taxes in Portland, and has discussed the possibility of collecting taxes in New York.
Space

ULA and Jeff Bezos' Blue Origin Announce Rocket Engine Partnership 19

An anonymous reader writes During an event at the National Press Club, Bezos announced an agreement with Blue Origin and United Launch Alliance, the joint venture of Boeing and Lockheed Martin, to continue development of a new rocket engine for ULA's Atlas and Delta rocket lines. From the article: "Called BE-4, the engine has been in the works at Blue Origin for three years and is currently in testing at the company's West Texas facilities. ULA, founded in 2006, has supplied rockets to the US Department of Defense and NASA and will now co-fund the BE-4 project to accelerate its completion. The agreement is for a four-year development process with testing slated for 2016 and flight in 2019."

Submission + - Netropolitan Is A Facebook For The Affluent, And It's Only $9000 To Join (hothardware.com)

MojoKid writes: Facebook has become too crowded and too mundane. With around 1.3 billion Facebook users, it's understandable to be overwhelmed by everything and want to get away from it all. However, unlike Facebook which is looking to connect everyone to the internet, there is a new site called Netropolitan that focuses more on exclusivity and privacy. The site was founded by composer and former conductor of the Minnesota Philharmonic Orchestra James Touchi-Peters who wanted to provide a social media site for affluent and accomplished individuals. People wishing to join need only pay a mere $9,000 to join. Of that amount, $6,000 is the initiation fee and the remaining $3,000 is for the annual membership fee which users will continue to pay. So what does the initiation and annual fee get you? For starters, Netropolitan will offer an ad-free experience and will not promote any kind of paid promotions to its members. However, it will allow the creation of groups by businesses in which members can advertise to each other under certain guidelines. $9K just to join? There must be another hook...

Submission + - Apple Glosses Over Vulnerabilities Patched in iOS 8, Snubs Security Researcher (zdziarski.com) 1

PainMeds writes: At this year's HOPE conference, security researcher Jonathan Zdziarski discussed his findings (slides) of a number of iOS vulnerabilities which made national news. Apple quickly addressed the issues in iOS 8 Beta 5, and Zdziarski explained the fixes in detail. Now that iOS 8 has been officially released, the security release notes appear to avoid mentioning the vulnerabilities that were addressed altogether, except for an out-of-place mention of some "diagnostics changes" in a note at the very bottom, and fail to give any credit to the researcher for finding the problems. Zdziarski has published an open letter to Tim Cook and Apple's Security Team highlighting this:
"I am very glad to see that Apple has taken security seriously enough lately to address vulnerabilities quickly, and – from what I’ve seen – elegantly. I’ve even written up a paper praising Apple for their quick and thorough response to these issues. ... What I’m not glad about at all is that Apple has seemingly swept these issues under the rug, to the degree that they’re not even acknowledged in your security notes. Apple’s code fixes can be clearly observed right in the iOS 8 firmware, and yet there is not a single mention of them in the release notes, nor any acknowledgments for the researcher. If there is any ethical practice to be expected in information security – or science of any kind for that matter – it is to properly acknowledge those who’s research you’ve consumed. In many settings, failure to do so is considered plagiarism." ... "there has been no mention of the more serious issues being fixed, or ever existing." ... "Not one mention of file relay, wireless lockdown vulnerabilities, packet sniffer access control vulnerabilities, or backup encryption bypass vulnerabilities."

Build

Video Are Matt's Robot Hexapods Creepy or Cute? (Video) 35

University of Arizona grad student Matt Bunting doesn't come across as a mad scientist. That's a very good thing, because his robot hexapod creations are easy to imagine crawling across the USA in large hordes, devouring everything in their path and using all the electricity they come across to feed their Queen Hexapod, a 3-D printer mounted on a hexapod chassis that turns everything fed to it into more robots. Luckily, the real life Matt is an affable (self-described) "Roboticist, Electrical Engineer, Musician, and Rock Crawler" who freely admits that at this time his robotic creations have no practical application whatsoever. This is probably true, except for the fact that they can liven up a music video like mad, as you can see on YouTube in Pedals Music Video (featuring REAL robots) . Our little video is a lot simpler, of course. In it, we interview Matt and he tells us what he's up to with his robots, and gives some 'how to get started with robotics' advice for budding young engineers. (Alternate Video Link)

Slashdot Top Deals

"You don't go out and kick a mad dog. If you have a mad dog with rabies, you take a gun and shoot him." -- Pat Robertson, TV Evangelist, about Muammar Kadhafy

Working...