Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Intel to rebrand Atom chips along lines of Core processors (computerworld.com.au)

angry tapir writes: Intel has announced that going forward it will use style of branding for its Atom chips that is similar to its branding for Core chips. Atom CPUs will have the X3, X5 and X7 designations, much like with the Core i3, i5 and i7 brands. An Atom X3 will deliver good performance, X5 will be better and X7 will be the best, an Intel spokeswoman said.

Submission + - Most French Nuclear Plants 'Should Be Shut Down' Over Drone Threat (newsweek.com) 1

mdsolar writes: “You don’t need massive amounts of force to allow a nuclear plant to go into instability. The plant has enough energy to destroy itself. Drones can be used to tickle the plant into instability.”

With devastating simplicity, John Large explains how drones could be used to coordinate a terror attack on a nuclear power station. First, one drone hits the distribution grid serving the plant, depriving the facility of off-site power, making it dependent on its diesel generators to cool the reactor, which generates up to 1,000 megawatts of power – enough to light up half of Paris. Then the generators are easily taken out by an unmanned drone with a relatively small payload. Without power to cool the radioactive fuel, Large estimates it would take approximately 30 seconds before the fuel begins to melt, leading to potential leakages of nuclear waste.

It’s the same cause behind the meltdown at the Fukushima nuclear plant in Japan after it was hit by a tsunami in March 2011. But potential terrorists wouldn’t need to trigger an earthquake, just be able to accurately pilot a pair of readily-available commercial drones carrying small payloads of explosive. Last year, unmanned drones were spotted flying over at least 13 nuclear power stations in France. The last widely-reported sighting was on 3 January, when two aircraft were seen flying over a nuclear facility in Nogent-sur-Seine, in northern-central France.

Submission + - What happens when Betelgeuse explodes? 1

StartsWithABang writes: One of the great, catastrophic truths of the Universe is that everything has an expiration date. And this includes every single point of light in the entire sky. The most massive stars will die in a spectacular supernova explosion when their final stage of core fuel runs out. At only an estimated 600 light years distant, Betelgeuse is one (along with Antares) of the closest red supergiants to us, and it’s estimated to have only perhaps 100,000 years until it reaches the end of its life. Here's the story on what we can expect to see (and feel) on Earth when Betelgeuse explodes!

Submission + - Hackers Using PowerShell, WMI to Evade Detection (securityweek.com)

wiredmikey writes: Attackers are doing a better job at hiding by using relatively obscure built in components of Microsoft Windows, according to a new report from Mandiant.

In its M-Trends report, the breach investigations company found that more often than before, APT groups are using Windows Management Instrumentation (WMI) and PowerShell to move laterally, harvest credentials, and search for useful information within Windows environments.

“Attackers are using built in components of Windows that are extremely powerful but relatively obscure in lieu of a lot of the things where attackers needed to previously use specialized tools or malware,” Ryan Kazanciyan, technical director at Mandiant, told SecurityWeek. “They are not necessarily ways to infect a system from scratch, but they are ways that attackers can remain persistent in an environment and evade detection for a much longer period by using some of these advanced techniques,” he said.

Additionally, Mandiant's report found that free credential-stealing tools have made harvesting passwords and escalating privileges in a Windows environment much easier. Mandiant experts found that attackers typically used two techniques: “Pass-the-hash” to authenticate with stolen NTLM hashes, and using the “Mimikatz” tool to recover plaintext passwords from memory. Concerningly, Mandiant said that it did not see a single instance when a victims’ anti-virus software detected or blocked Mimikatz, despite the tool’s popularity.

Comment Re:More of this ridiculous (Score 1) 134

> how come in a simple public discussion slashdot readers can come up with simple practical scenarios why mass-surveillance "solutions" like this will be completely ineffective, yet the people considering (or actually) deploying them cannot?

Must be that all /.ers are EVIL to the core and have a gift to fight against GOOD.
Everything else would just cause to much upset.

Submission + - Carnegie-Mellon University Sends Hundreds of Acceptance Letters by Mistake

An anonymous reader writes: As reported in the Pittsburgh Post-Gazette, Carnegie-Mellon University mistakenly sent 800 acceptances for its Master of Science in Computer Science program. They're not saying "computer error," but what are the other explanations? High irony all around. The program accepts fewer than nine percent of more than 1,200 applicants, which places the acceptance level at about a hundred, so they're bad at math, too.

Submission + - Samsung releases source code of Tizen Phone Z1 (tizenexperts.com)

rzr writes: Last month Samsung launched Tizen Z1 mobile for Indian market and some of them managed to be in developers hands (or the opposite). Anyway we all knew it ships mostly FLOSS to start with the kernel Linux, so Samsung made it available to anyone.

If you want to study tizen 2.3 mobile profile or even try to port OS to other devices (ie: previous tizen references devices) you have no excuse to not doing so.

Also author shared some pratical informations about making apps for the only "GNU/Linux inspired " system for mobile. At least with devices and support from the industry .. am I right ? I wish not... but still community depends on actual devices.

Submission + - With Insider Help, ID Theft Ring Stole $700,000 in Apple Gift Cards (itworld.com)

itwbennett writes: The Manhattan District Attorney’s office has indicted five people for using personal information stolen from around 200 people to fund the purchase of hundreds of thousands of dollars in Apple gift cards, which in turn were used to buy Apple products. 'Using stolen information to purchase Apple products is one of the most common schemes employed by cybercrime and identity theft rings today,' District Attorney Cyrus Vance said in a statement. 'We see in case after case how all it takes is single insider at a company—in this instance, allegedly, a receptionist in a dentists’ office—to set an identity theft ring in motion, which then tries to monetize the stolen information by purchasing Apple goods for resale or personal use,' he said.

Comment too much tech,... (Score 1) 198

unless the kids get 'borg-yfied' the problem isn't the amount of tech it's how it is introduced and utilized
if you allow them to use facebook, whatsapp, twitter and who knows what all the time sure learning isn't that attractive unless it's done the right way, by teachers who know what they are doing,...

Submission + - Lab samples database "JuliaBase" published as open source (juliabase.org)

bronger writes: After six years of closed-source development, the Research Centre Jülich published its database solution for laboratory samples and processes as open source, while continuing maintaining it. JuliaBase is a framework written in Python/Django that enables research institution or research group to set up browser-based samples tracking and measurement management easily. Next to Bika and LabLey, this is one of the very few open source LIMS systems, and in contrast to the others, not specialized in biomedicine or service labs.

Slashdot Top Deals

8 Catfish = 1 Octo-puss

Working...