Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Businesses

Alibaba Face Off With Chinese Regulator Over Fake Products 79

hackingbear writes China's State Administration of Industry and Commerce on Wednesday issued a scathing report against one of the country's biggest stars, accusing e-commerce giant Alibaba of failing to do enough to prevent fake goods from being sold on its websites. SAIC said Alibaba allowed "illegal advertising" that misled consumers with false claims about low prices and other details. It claims some Alibaba employees took bribes and the company failed to deal effectively with fraud. Alibaba fired back with charges of bias and misconduct by accusing the SAIC official in charge of Internet monitoring, Liu Hongliang, of unspecified "procedural misconduct" and warned it will file a formal complaint. Such public defiance is almost unheard of in China. Apparently, Alibaba has long attained the too big to fail status.
Microsoft

Microsoft To Invest In Rogue Android Startup Cyanogen 280

An anonymous reader writes The Wall Street Journal reports that Microsoft plans to be a minority investor in a roughly $70 million round of equity financing for mobile startup Cyanogen Inc. Neither company is commenting on the plan but last week during a talk in San Francisco, Cyanogen's CEO said the company's goal was to "take Android away from Google." According to Bloomberg: "The talks illustrate how Microsoft is trying to get its applications and services on rival operating systems, which has been a tenet of Chief Executive Officer Satya Nadella. Microsoft has in the past complained that Google Inc., which manages Android, has blocked its programs from the operating system."
Businesses

LibreOffice Gets a Streamlined Makeover With 4.4 Release 148

TechCurmudgeon sends word that LibreOffice 4.4 has been released. "The Document foundation announced availability of the latest version of LibreOffice on Thursday, which it says is the most beautiful version of the open source productivity suite yet. LibreOffice 4.4 also fixes some compatibility issues with files that are saved in Microsoft's OOXML formats. LibreOffice 4.4 has got a lot of UX and design love," Jan "Kendy" Holesovsky, who leads the design team for Libreoffice, said in a statement. LibreOffice 4.4 is currently available for Windows."
Security

D-Link Routers Vulnerable To DNS Hijacking 64

An anonymous reader writes At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered. Todor Donev, a member of the Ethical Hacker research team, says that the vulnerability is found in the ZynOS firmware of the device, D-Link's DSL-2740R ADSL modem/wireless router. The firmware in question is implemented in many networking equipment manufactured by D-Link, TP-Link Technologies and ZTE.

Submission + - Microsoft to Invest in Rogue Android Startup Cyanogen

An anonymous reader writes: The Wall Street Journal reports that Microsoft plans to be a minority investor in a roughly $70 million round of equity financing for mobile startup Cyanogen Inc.. Neither company is commenting on the plan but last week during a talk in San Francisco, Cyanogen's CEO said the company's goal was to "take Android away from Google." According to Bloomberg: "The talks illustrate how Microsoft is trying to get its applications and services on rival operating systems, which has been a tenet of Chief Executive Officer Satya Nadella. Microsoft has in the past complained that Google Inc., which manages Android, has blocked its programs from the operating system."
Crime

Why ATM Bombs May Be Coming Soon To the United States 378

HughPickens.com writes Nick Summers has an interesting article at Bloomberg about the epidemic of 90 ATM bombings that has hit Britain since 2013. ATM machines are vulnerable because the strongbox inside an ATM has two essential holes: a small slot in front that spits out bills to customers and a big door in back through which employees load reams of cash in large cassettes. "Criminals have learned to see this simple enclosure as a physics problem," writes Summers. "Gas is pumped in, and when it's detonated, the weakest part—the large hinged door—is forced open. After an ATM blast, thieves force their way into the bank itself, where the now gaping rear of the cash machine is either exposed in the lobby or inside a trivially secured room. Set off with skill, the shock wave leaves the money neatly stacked, sometimes with a whiff of the distinctive acetylene odor of garlic." The rise in gas attacks has created a market opportunity for the companies that construct ATM components. Several manufacturers now make various anti-gas-attack modules: Some absorb shock waves, some detect gas and render it harmless, and some emit sound, fog, or dye to discourage thieves in the act.

As far as anyone knows, there has never been a gas attack on an American ATM. The leading theory points to the country's primitive ATM cards. Along with Mongolia, Papua New Guinea, and not many other countries, the U.S. doesn't require its plastic to contain an encryption chip, so stealing cards remains an effective, nonviolent way to get at the cash in an ATM. Encryption chip requirements are coming to the U.S. later this year, though. And given the gas raid's many advantages, it may be only a matter of time until the back of an American ATM comes rocketing off.
Space

The Big Bang By Balloon 23

StartsWithABang writes If you want to map the entire sky — whether you're looking in the visible, ultraviolet, infrared or microwave, your best bet is to go to space. Only high above the Earth's atmosphere can you map out the entire sky, with your vision unobscured by anything terrestrial. But that costs millions of dollars for the launch alone! What if you've got new technology you want to test? What if you still want to defeat most of the atmosphere? (Which you need to do, for most wavelengths of light.) And what if you want to make observations on large angular scales, something by-and-large impossible from the ground in microwave wavelengths? You launch a balloon! The Spider telescope has just completed its data-taking operations, and is poised to take the next step — beyond Planck and BICEP2 — in understanding the polarization of the cosmic microwave background.
Government

Drone Maker Enforces No-Fly Zone Over DC, Hijacking Malware Demonstrated 165

An anonymous reader writes A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. Rahul Sasi, a security engineer at Citrix R&D, created MalDrone, the first backdoor malware for the AR drone ARM Linux system to target Parrot AR Drones, but says it can be modified to target others as well. The malware can be silently installed on a drone, and be used to control the drone remotely and to conduct remote surveillance. Meanwhile, the Chinese company that created the drone that crashed on the White House grounds has announced a software update for its "Phantom" series that will prohibit flight within 25 kilometers of the capital.
Medicine

Brain Implants Get Brainier 49

the_newsbeagle writes "Did my head just beep?" wonders a woman who just received a brain implant to treat her intractable epilepsy. We're entering a cyborg age of medicine, with implanted stimulators that send pulses of electricity into the brain or nervous system to prevent seizures or block pain. The first generation of devices sent out pulses in a constant and invariable rhythm, but device-makers are now inventing smart stimulators that monitor the body for signs of trouble and fire when necessary.
Businesses

One In Five Developers Now Works On IoT Projects 252

dcblogs writes Evans Data Corp., which provides research and intelligence for the software development industry, said that of the estimated 19 million developers worldwide, 19% are now doing IoT-related work. A year ago, the first year IoT-specific data was collected, that figure was 17%. But when developers were asked whether they plan to work in IoT development over the next year, 44% of the respondents said they are planning to do so, said Michael Rasalan, director of research at Evans.
Science

Spider Spins Electrically Charged Silk 42

sciencehabit writes In their quest to make ultrastrong yet ultrasmall fibers, the polymer industry may soon take a lesson from Uloborus spiders. Uloborids are cribellate spiders, meaning that instead of spinning wet, sticky webs to catch their prey, they produce a fluffy, charged, wool-like silk. A paper published online today in Biology Letters details the process for the first time. It all starts with the silk-producing cribellar gland. In contrast with other spiders, whose silk comes out of the gland intact, scientists were surprised to discover that uloborids' silk is in a liquid state when it surfaces. As the spider yanks the silk from the duct, it solidifies into nanoscale filaments. This "violent hackling" has the effect of stretching and freezing the fibers into shape. It may even be responsible for increasing their strength, because filaments on the nanoscale become stronger as they are stretched. In order to endow the fibers with an electrostatic charge, the spider pulls them over a comblike plate located on its hind legs. The technique is not unlike the so-called hackling of flax stems over a metal brush in order to soften and prepare them for thread-spinning, but in the spider's case it also gives them a charge. The electrostatic fibers are thought to attract prey to the web in the same way a towel pulled from the dryer is able to attract stray socks.
Businesses

Amazon Takes On Microsoft, Google With WorkMail For Businesses 65

alphadogg writes Amazon Web Services today launched a new product to its expansive service catalog in the cloud: WorkMail is a hosted email platform for enterprises that could wind up as a replacement for Microsoft and Google messaging systems. The service is expected to cost $4 per user per month for a 50GB email inbox. It's integrated with many of AWS's other cloud services too, including its Zocalo file synchronization and sharing platform. The combination will allow IT shops to set up a hosted email platform and link it to a file sharing system.
Privacy

Snowden Documents: CSE Tracks Millions of Downloads Daily 103

Advocatus Diaboli writes Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed 'Levitation' are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.
Medicine

Scientists Discover How To Track Natural Errors In DNA Replication 19

BarbaraHudson writes Researchers figured out how to label and keep track of new pieces of DNA, and learned to follow the enzyme responsible for copying those pieces. Their research focused on enzymes called polymerases. These enzymes create small regions in DNA that act as scaffolds for the copied DNA. Scientists assumed that the body deletes the scaffolds containing errors, or mutations, and the standard computer models supported this theory. However, the actual research showed that about 1.5 percent of those erroneous scaffolds are left over, trapped within the DNA. After running models, scientists now believe they can track how DNA replicates and find the most likely areas where these scaffolds with errors turn up. The erroneous scaffolds usually appear close to genetic switches, those regions that turn on when genes activate. The mutations damage the switch, which results in genetic disease, as well as increasing the likelihood of cancer.
Security

Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites 203

MojoKid writes Adobe issued a patch for bug CVE-2015-0311, one that exposes a user's browser to become vulnerable to code injection, and the now infamous Angler EK (Exploit Kit). To fall victim to this kind of attack, all someone needs to do is visit a website with compromised Flash files, at which point the attacker can inject code and utilize Angler EK, which has proven to be an extremely popular tool over the past year. This particular version of Angler EK is different, however. For starters, it makes use of obfuscated JavaScript and attempts to detect virtual machines and anti-virus products. Its target audience is also rather specific: porn watchers. According to FireEye, which has researched the CVE-2015-0311 vulnerability extensively, this exploit has reached people via banner ads on popular adult websites. It was also noted that even a top 1000 website was affected, so it's not as though victims are surfing to the murkiest depths of the web to come in contact with it.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...