Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Study Finds Link Between Artificial Sweeteners and Glucose Intolerance

onproton writes: The journal Nature released a study today that reveals a link between the consumption of artificial sweeteners and the development of glucose intolerance, a leading risk factor for the development of type 2 diabetes, citing a critical alteration of intestinal bacteria. Paradoxically, these non-caloric sweeteners, which can be up to 20,000 times sweeter than natural sugars, are often recommended to diabetes patients to control blood glucose levels. Sugar substitutes have come under additional fire lately from studies showing that eating artificially sweetened foods can lead to greater overall calorie consumption and even weight gain. While some, especially food industry officials, remain highly skeptical of such studies, more research still needs to be done to determine the actual risks these substances may pose to health.

Submission + - Snowden's Leaks Didn't Help Terrorists 1

HughPickens.com writes: The Interecept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden’s revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF).” In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

Earlier this month former NSA head Michael Hayden stated, “The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups”, while Matthew Olsen of the National Counterterrorism Centre would add “Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance.” Snowden’s critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia’s invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."

Submission + - Inside Shenzen's Grey-Market iPhone Mall (itworld.com)

jfruh writes: Despite being largely manufactured in China, iPhones are still too expensive for most Chinese to afford — new ones, anyway. That's why thousands come to a bustling marketplace in Shenzen that specializes in older grey-market iPhones. Many of them are damaged phones that have been refurbished by enterprising merchants.

Submission + - Netropolitan Is A Facebook For The Affluent, And It's Only $9000 To Join (hothardware.com)

MojoKid writes: Facebook has become too crowded and too mundane. With around 1.3 billion Facebook users, it's understandable to be overwhelmed by everything and want to get away from it all. However, unlike Facebook which is looking to connect everyone to the internet, there is a new site called Netropolitan that focuses more on exclusivity and privacy. The site was founded by composer and former conductor of the Minnesota Philharmonic Orchestra James Touchi-Peters who wanted to provide a social media site for affluent and accomplished individuals. People wishing to join need only pay a mere $9,000 to join. Of that amount, $6,000 is the initiation fee and the remaining $3,000 is for the annual membership fee which users will continue to pay. So what does the initiation and annual fee get you? For starters, Netropolitan will offer an ad-free experience and will not promote any kind of paid promotions to its members. However, it will allow the creation of groups by businesses in which members can advertise to each other under certain guidelines. $9K just to join? There must be another hook...

Submission + - Apple Glosses Over Vulnerabilities Patched in iOS 8, Snubs Security Researcher (zdziarski.com) 1

PainMeds writes: At this year's HOPE conference, security researcher Jonathan Zdziarski discussed his findings (slides) of a number of iOS vulnerabilities which made national news. Apple quickly addressed the issues in iOS 8 Beta 5, and Zdziarski explained the fixes in detail. Now that iOS 8 has been officially released, the security release notes appear to avoid mentioning the vulnerabilities that were addressed altogether, except for an out-of-place mention of some "diagnostics changes" in a note at the very bottom, and fail to give any credit to the researcher for finding the problems. Zdziarski has published an open letter to Tim Cook and Apple's Security Team highlighting this:
"I am very glad to see that Apple has taken security seriously enough lately to address vulnerabilities quickly, and – from what I’ve seen – elegantly. I’ve even written up a paper praising Apple for their quick and thorough response to these issues. ... What I’m not glad about at all is that Apple has seemingly swept these issues under the rug, to the degree that they’re not even acknowledged in your security notes. Apple’s code fixes can be clearly observed right in the iOS 8 firmware, and yet there is not a single mention of them in the release notes, nor any acknowledgments for the researcher. If there is any ethical practice to be expected in information security – or science of any kind for that matter – it is to properly acknowledge those who’s research you’ve consumed. In many settings, failure to do so is considered plagiarism." ... "there has been no mention of the more serious issues being fixed, or ever existing." ... "Not one mention of file relay, wireless lockdown vulnerabilities, packet sniffer access control vulnerabilities, or backup encryption bypass vulnerabilities."

Submission + - Artificial sweeteners may contribute to diabetes (sciencemag.org)

sciencehabit writes: When it comes to the sweet stuff, science often turns sour. Almost every study that has linked sugar to problems such as tooth decay, diabetes, obesity, or even childhood violence has come under heavy fire. Nonetheless, the World Health Organization released draft guidelines earlier this year that halved the recommended maximum sugar intake. Now, new research is suggesting that synthetic sweeteners like saccharin might not be a great alternative. They could have a negative effect on gut microbes and thus lead to a higher risk of diabetes, researchers say.

Submission + - Chimpanzees have evolved to kill each other (sciencemag.org)

sciencehabit writes: A major new study of warfare in chimpanzees finds that lethal aggression can be evolutionarily beneficial in that species, rewarding the winners with food, mates, and the opportunity to pass along their genes. The findings run contrary to recent claims that chimps fight only if they are stressed by the impact of nearby human activity—and could help explain the origins of human conflict as well.

Submission + - Tinba Trojan Targets Major US Banks

An anonymous reader writes: Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small number of banks, that list has been amplified and now includes 26 financial institutions mostly in the US and Canada, but some in Australia and Europe as well. Tinba has been modified over the years, in an attempt to bypass new security protections set up by banks, and its source code has been leaked on underground forums a few months ago. In this new campaign, the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit.

Submission + - eBay redirect attack puts buyers' credentials at risk

mrspoonsi writes: EBay has been compromised so that people who clicked on some of its links were automatically diverted to a site designed to steal their credentials. The spoof site had been set up to look like the online marketplace's welcome page. The firm was alerted to the hack on Wednesday night but removed the listings only after a follow-up call from the BBC more than 12 hours later. One security expert said he was surprised by the length of time taken. "EBay is a large company and it should have a 24/7 response team to deal with this — and this case is unambiguously bad," said Dr Steven Murdoch from University College London's Information Security Research Group. The security researcher was able to analyse the listing involved before eBay removed it. He said that the technique used was known as a cross-site scripting (XSS) attack.

Submission + - Is The Tesla Model 3 Actually Going To Cost $50,000? 2

cartechboy writes: How low can battery cost go, and how fast? That's the question automakers are dealing with when it comes to the future of electric cars. Tesla is betting big on electric and has already proven many skeptics wrong with its Model S sedan. The company is making even bolder claims with its upcoming Model 3 stating it'll have about 200 miles of range and a base price of $35,000. That's a nice goal, but is it possible. Battery skeptic Menahem Anderman wrote a new report suggesting that the pace of cost reduction for electric car batteries won't be as swift as Tesla's CEO Elon Musk suggests. This leads Anderman to predict the actual price of the upcoming Model 3 will be in the range of $50,000-$80,000. That's quite a jump from the goal of $35,000. Can Tesla actually pull off the Model 3 with the goal price of $35,000?

Submission + - I'm pretty sure I'm not a Dubai Businessman 2

Chayat writes: But If you saw my inbox you'd be forgiven for thinking I was. Every day I get a dozen CVs complete with personal information and a covering letter asking for any relevant positions. I get invitations to seminars in Dubai and UAE. I get confirmations of hotel room bookings in Dubai too. These emails don't seem to be phishing and are only spam in the sense that I didn't solicit them. It's clear though that someone is soliciting them. At the risk of getting more spam my email address is: chayat@hotmail.com and I invite you to google it. It seems that a business in Dubai is citing it as their email address. How do you stop this kind of thing? I know I could just start a new address but I've had this one for so many years I really don't want to go though that effort if I cant help it, also it's like getting someone else's post. Just deleting it all feels wrong, these are not my emails to delete. Slashdotters with your oh so much greater intertube knowledge than I, please help me.

Submission + - Ask Slashdot: Alternate software for use on smartboards?

SmarterThanMe writes: Teacher here, you can call me Mr. SmarterThanMe. I have a fancy smartboard installed in my room. Smartboards allow me to show students a whole range of other stuff other than just whatever I'm writing. I can prepare instructions and activities before the lesson and just move through the boards. I can pull up some students' work and display it through the projector. I can bring up some stimulus for use in a writing task. So much better than blackboards.

Except the software that comes bundled with this particular brand of smartboard is ridiculously clunky. Without naming this particular piece of software, and highlighting it's shortfalls, has anyone got any suggestions on alternatives (open source or otherwise)?

The main features that I'd like are:
  • Handwriting recognition
  • The ability to make and use templates
  • Grids or guides or *something* to be able to teach measurement

I have gold star stickers for any good suggestions. Thanks in advance.

Submission + - Ask slashdot: Remote support for disconnected, computer-illiterate relatives.

An anonymous reader writes: I use email to communicate with my folks overseas. Their "ISP" only allows dial-up access to their email account (there is no option of chaning ISP), that can receive messages no larger than 1MB nor hold more than 15MB (no hope of changing that either). They are computer-illiterate, click on everything they receive, and take delight on sending their information to any nigerian prince that contacts them, "just in case this one is true". Needless to say, thir PC is always full of viruses and spyware. In my next yearly visit, instead of just cleaning it up, I'd like to gift them with some "hardened" PC to use for email only that would hopefully last the year before someone has to fix it. So far, these are the things I have in mind:
  • Some kind of linux distro, or maybe even mac. Most viruses over there are windows only and propagate via Autorun.inf or by email attachments, not having Windows could prevent both.
  • Some desktop environment that hides anything unrelated to connecting to the net and accessing their account (dial-up software, email client, web browser, exchanging files between their hard disk/email attachments and USB drives). By "hide", I just want the rest to be out of the way, but not entirely removed, so that if necessary, I can guide them over the phone. For this, Ubuntu's Unity seems like a particularily bad solution, but a Gnome desktop with non-removable desktop shortcuts (is this possible?) for the file manager, browser, email client and dial-up program could work. An android system is unlikely to work (they have no wifi, and they were utterly confused with Android's UI).
  • This could be a life saver: some kind of extension to the email client that executes commands on specially formated emails (e.g., signed with my private key), so that I can do some basic diagnostics or install extra software if I have to. This las point is important: they currently rely on aquaintances who may not be competent (they can't evaluate that) if something happens between my visits. They, most likely, wont know how to deal with anything non-windows, so all tech support would fall on me. (This is the reason I haven't moved them from windows yet.)
  • Another very useful extension would be something to automatically re-assemble attachments split into several emails, to overcome the 1MB message limit.

Does any of that exist? If I have to build that system myself (or parts of it), do you have other suggestions? For the inevitable and completely reasonable suggestion of getting someone competent for tech support: I've tried that too. The competent ones don't last beyond the third visit.

Submission + - Neuroscientists Working to Push the Boundaries of Perception Through Wearables (kickstarter.com)

An anonymous reader writes: A pair of neuroscientists from Houston, Texas, Dr. David Eagleman and his graduate student, Scott Novich, have teamed up to work on the ultimate test of pushing the boundaries of our sensory perceptions: giving deaf individuals the ability to 'hear' through their sense of touch. The two are experimenting with raising funds for the project through a crowdfunding campaign via Kickstarter. At the moment, it looks like they have a working prototype developed along with some preliminary data. If the science works out, they plan to utilize the technology to provide atypical information streams to people, like Twitter feeds or stock market data.

Slashdot Top Deals

If all else fails, lower your standards.

Working...