Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Abused Women (Score 1) 171

Locally, my old personal cell phones and surplus work cell phones get donated to Sasktel (local telecom) who refurbish the phones or strip the good parts for re-use and the 'new' refurbs go to battered women's shelters to help women escaping domestic abuse. Having a phone is crucial to independence and getting a job.

Submission + - A Mercenary Approach to Botnets (darkreading.com)

CowboyRobot writes: The incentives are high for many businesses and government agencies to not be too heavy handed in combating the global botnet pandemic. There's money to be had and, with each passing day, more interesting ways are being uncovered in how to package the data, and how to employ it. It used to be that the worlds of bug hunters and malware analysts were separate and far between. In the last couple of years the ability to analyze malware samples and identify exploitable vulnerabilities in them has become very important. Given that some botnets have a bigger pool of victims than many commercial software vendors have licensed customers, the value of an exploit that grants reliable remote control of a popular malware agent is rising in value. In many ways, botnets have become a golden goose to those charged with gathering intelligence on the populations of foreign entities. The bulk of the victim's data is useful for mapping populations, communication profiles, and as egress points for counter intelligence exercises. Then, given how many botnet victims there are, the probability that a few "interesting" computers will have succumbed along the way is similarly high — providing direct insight in to a pool of high value targets.

Submission + - New Windows XP Zero-Day Under Attack (securityweek.com) 1

wiredmikey writes: A new Windows kernel zero-day vulnerability is being exploited in targeted attacks against Windows XP users. Microsoft confirmed the issue and published a security advisory to acknowledge the flaw after anti-malware vendor FireEye warned that the Windows bug is being used in conjunction with an Adobe Reader exploit to infect Windows machines with malware.

Microsoft described the issue as an elevation of privilege vulnerability that allows an attacker to run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

Submission + - Google Is Building A Way To Launch Chrome Apps Without Installation

An anonymous reader writes: Google really wants Chrome apps to take off. Not only has the company added rich notifications, in-app payments, and an app launcher into its browser, but now it’s developing ephemeral apps that launch by just clicking a link. There are two separate components here. Ephemeral apps (you can enable this under the chrome://flags/#enable-ephemeral-apps flag) let you try a Chrome app before installing it. Linkable ephemeral apps (under the chrome://flags/#enable-linkable-ephemeral-apps flag) meanwhile allow you to launch said apps from hyperlinks.

Submission + - ScareMail Tries to Disrupt NSA Email Surveillance (hackaday.com)

Okian Warrior writes: "Are you on the NSA’s email watchlist? Do you want to be? The ScareMail project is designed to mess with the NSA’s email surveillance programs.

Benjamin Grosser has written a plugin for many popular web browsers that uses an algorithm to generate a clever but ultimately useless narrative in the signature of your email using as many probable NSA search terms as possible. The idea behind this is if enough people use it, it will overload the NSA’s search results, ultimately making their email keyword tracking useless.

Ben has a video describing the project."

Comment Re:Really? (Score 1) 104

Is that it? Really? Throwing a string of vulgarities together does not a troll make. Try again. The vulgarities could work if you could redo that post as a Haiku. Can you handle a haiku? (http://en.wikipedia.org/wiki/Haiku). Or a Jeopardy post! This act entails taking a dick up the ass and allowing the person ramming your butt to ejaculate in your arse. What is an anal creampie? Honestly, it's like you're new at trolling or don't understand the concept of trolling as an art.

Submission + - MS handing NSA access to encrypted chat & email (guardian.co.uk)

kaptink writes: Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal. The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail. The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide. Microsoft also worked with the FBI's Data Intercept Unit to "understand" potential issues with a feature in Outlook.com that allows users to create email aliases. Skype, which was bought by Microsoft in October 2011, worked with intelligence agencies last year to allow Prism to collect video of conversations as well as audio. Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a "team sport".

Submission + - The Steve Jobs video that sealed Apple's fate in the DOJ case (tuaw.com)

An anonymous reader writes: Apple yesterday came up on the losing end of a decision from US District Judge Denise Cote who ruled that Apple did, in fact, collude to artificially raise the price of e-books.

In looking over the decision, I found it interesting that statements made by Steve Jobs were construed as compelling evidence in the eyes of Cote.

The damning video, which was shot by Kara Swisher on her Flipcam, shows Mossberg curiously asking Jobs why someone would buy an e-book for $14.99 from Apple when they can get it for $9.99 from Amazon.

"The prices will be the same," Jobs explained, before adding that "publishers are actually withholding" books from Amazon because they aren't happy with the terms of their contract.

Submission + - Nanoparticle Drug Patches Will Deliver Cancer Treatment Without Needles (vice.com)

Daniel_Stuckey writes: Atif Sayed and Zakareya Hussein, both with backgrounds in electronics and nanotechnology, are developing Nanject, a "pharmaceutical nano patch" that can "be applied to the skin and will deliver specific amounts of target drugs where necessary." The two are crowd-funding the project on Microryza.

Two years ago Sayed was doing research into swarm robotics and artificial immune systems, and found inspiration in biological species—specifically, birds. "I was always obsessed with artificial intelligence and wanted to automate a lot of things which are kind of repetitive (like people working in factories, McDonalds, etc.)," wrote Sayed in an email. "At the same time, I was fascinated with nanorobotics or nanobots and wanted to do more research into this. Having people in my own family and friends who passed away due to cancer, I wanted to use nanobots to tackle and destroy cancer cells with little or no pain."

From there he came up with the idea of a nano patch. In place of needles and syringes, he would use magnetic nanoparticles that are small enough to pass through a hair follicle. He then wrote his thesis on "the synthesis of magnetic nanoparticles for its use in bio-medicine and targeted drug delivery." Sayed said he is now "at the point of realizing and connecting the tiny dots into one single product—Nanject."

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...