Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Google

Zero Day Hole In Samsung Smart TVs Could Have TV Watching You 249

chicksdaddy writes with news of a remote exploit in Samsung Smart TVs, and a warning for those who got one with a built-in camera. From the article: "The company that made headlines in October for publicizing zero day holes in SCADA products now says it has uncovered a remotely exploitable security hole in Samsung Smart TVs. If left unpatched, the vulnerability could allow hackers to make off with owners' social media credentials and even to spy on those watching the TV using built-in video cameras and microphones. In an e-mail exchange with Security Ledger, the Malta-based firm said that the previously unknown ('zero day') hole affects Samsung Smart TVs running the latest version of the company's Linux-based firmware. It could give an attacker the ability to access any file available on the remote device, as well as external devices (such as USB drives) connected to the TV. And, in a Orwellian twist, the hole could be used to access cameras and microphones attached to the Smart TVs, giving remote attacker the ability to spy on those viewing a compromised set."
Announcements

Want to Change the Slashdot Logo? For 1 Day in October, You Can 128

The Slashdot logo has been around for a long time now; the truth is, we're rather fond of it, and have only rarely introduced substantial changes. But for the month of October, as a way of celebrating the site's 15 years of delivering News for Nerds, we invite you to help us temporarily change it. If you have an idea of what the Slashdot logo should look like for one day in October, this is your chance to see it on the page. Starting September 15th, we'll be accepting entries, and sending limited edition anniversary T-shirts to the artists we pick to show off on the page throughout the month. (And a Nexus 7 tablet to the artist who ranks best in show.) Click through for information on what we're looking for, how to enter, and the long list of rules that the legal department has provided for your reading pleasure; we look forward to seeing and sharing your ideas.
Windows

Windows 8 Is 'a Work of Art.' But It's No Linux 371

colinneagle writes "Earlier this week I installed the final version of Windows 8. And it is awesome. That's not a joke. Windows 8 is absolutely, unequivocally stellar. And yet, at the end of the day, I am right back to using Linux. Why is that? What is it about Linux that makes me so excited to use it — even while enjoying another operating system that I view as, in all seriousness, a work of art? Why do I not simply install Windows 8 on every machine I own and be happy with it? For me, it's the ability to slowly chip away and remove items from your user interface until you are left with only want you want, and nothing more. The option of looking at an item on the screen, right clicking on it, and declaring to said item 'Listen up, mister Thing-On-My-Screen. I don't want you anymore. Be gone!' Panels, bars, docks, launchers, widgets, gadgets – whatever is on your screen, there is probably a way to send it to whatever form of the afterlife is reserved for unwanted Desktop Crud. And, I'll tell you this right now – as great as it is, you don't find a whole lot of 'Right click, Remove Panel' in Windows 8."
Medicine

US Doctors Back Circumcision 1264

ananyo writes "On 27 August, a report by the American Academy of Pediatrics concludes for the first time that, overall, boys will be healthier if circumcised. The report says that although the choice is ultimately up to parents, medical insurance should pay for the procedure. The recommendation, coming from such an influential body, could boost U.S. circumcision rates, which, at 55%, are already higher than much of the developed world. The researchers estimate that each circumcision that is not performed costs the U.S. health-care system $313."
The Media

Photo Reveals UK Plan: "Assange To Be Arrested Under All Circumstances" 847

politkal writes with the lead from a CNN story: "A policeman in London appears to have accidentally revealed an arrest plan for WikiLeaks founder Julian Assange, in what UK media have branded an embarrassing slip-up by London's Metropolitan Police. Clearly legible in a zoomed-in view of the clipboard, on a sheet of paper headed 'Restricted,' are the words: 'EQ Embassy brief — Summary of current position re. Assange. Action required — Assange to be arrested under all circumstances.' It goes on to suggest possible ways in which he could exit the building, such as in a diplomatic bag or vehicle."
The Internet

How To Watch Internet TV Across International Borders 206

colinneagle writes "Living in the U.S., one of my greatest regrets is that I can't watch BBC video with iPlayer. If I were living in the U.K., I'd feel the same away about not being able to watch shows on Hulu. But, with a Web proxy or a virtual private network (VPN) and an IP address in a country where the content is available, you can watch these shows. Technically, it's easy to set your browser up to use a Web proxy or VPN software. With a Web proxy and Windows XP, for example, you just go to Internet Options, click the Connections tab, and then click LAN Settings. Next, under Proxy server you click to select the 'Use a proxy server for your LAN' check box. Finally, you enter the IP address of the proxy server and in the Port box, type the IP number that is used by the proxy server for client connections—that's usually 8080. It's usually pretty simple to do that in any browser and operating system. There are also programs, such as Proxy Switchy, for Chrome that makes it easy to switch from one proxy to another in a single session. When you use a proxy, though, all your traffic is still open to network administrators. If you want to visit another country and watch their TV in privacy, you'll need a VPN."
Security

Iranian State Goes Offline To Avoid Cyber-Attacks 165

DavidGilbert99 writes "The Iranian minister for telecommunication has said that the government will be taking key ministries and state agencies offline in the next month to protect sensitive information from cyber-attacks. However this move is just the initial step in an 18 month plan to take the country off the world wide web, and replace it with a state-controlled intranet. From the article: 'The US began offensive cyber-attacks against Iran during the presidency of George W. Bush when the Olympics Games project was founded. Out of this was [born] the Stuxnet cyber-weapon, which was designed to specifically target the Natanz nuclear enrichment facility in Iran.'"
Biotech

Artificial Jellyfish Built From Silicone and Rat Cells 61

ananyo writes "Bioengineers have made an artificial jellyfish using silicone and muscle cells from a rat's heart. The synthetic creature, dubbed a medusoid, looks like a flower with eight petals. When placed in an electric field, it pulses and swims exactly like its living counterpart. The team now plans to build a medusoid using human heart cells. The researchers have filed a patent to use their design, or something similar, as a platform for testing drugs (abstract). 'You've got a heart drug?' says Kit Parker, a biophysicist at Harvard University in Cambridge, Massachusetts, who led the work. 'You let me put it on my jellyfish, and I'll tell you if it can improve the pumping.'" The video that accompanies the text is at once beautiful and creepy.
Android

Google's Honeycomb Source Code Release Is On Ice 136

itwbennett writes "'Ice Cream Sandwich', that is. Apparently it's source code delay week, as Google joins Apple in delaying the release of source code for open source licensed software. Except, unlike Apple, which promptly released the LGPL WebKit code in question Monday afternoon, Google stated yesterday that it will not release the source code for Android 3.0 (Honeycomb) until after the release of the next version of Android (Ice Cream Sandwich). This is not necessarily news, since Google said last month that source code would be held for an indeterminate time and released when it was ready. It's just that now 'indeterminate' has an actual date: post-launch of Ice Cream Sandwich. The question, says blogger Brian Proffitt, is: 'How the heck can they do this, given that Honeycomb is licensed under the Apache Software License v2?'"

Comment Mirrored by Carnegie Mellon professor (Score 5, Informative) 508

George Hotz's work has been mirrored by Carnegie Mellon professor David Touretzky, known for his excellent work towards freedom of speech on the Internet through his publication of The Secrets of Scientology. Dave Touretzky has repeatedly shown himself willing to accept whatever the MAFIAA et al will throw at him.

Google

Chrome OS Doesn't Trust Apps Or Users 410

holy_calamity writes "Google's Chrome OS chiefs explain in Technology Review how most of the web-only OS's features flow from changing one core assumption of previous operating system designs. 'Operating systems today are centered on the idea that applications can be trusted to modify the system, and that users can be trusted to install applications that are trustworthy,' says Google VP Sundar Pichai. Chrome doesn't trust applications, or users — and neither can modify the system. Once users are banned from installing applications, or modifying the system security, usability, and more are improved, the Googlers claim."
Programming

Developing StarCraft 2 Build Orders With Genetic Algorithms 200

Jamie recommends a blog post from software engineer Louis Brandy explaining how using genetic algorithms to evaluate build orders in StarCraft 2 has led to some surprisingly powerful results. Quoting: "One of the reasons build-order optimization is so important is that you can discover openings that 'hard-counter' other openings. If I can get an army of N size into your base when you do opening X, you will always lose. ... a genetic algorithm is a type of optimization algorithm that tries to find optimal solutions using a method analogous to biologic evolution (to be specific: descent with modification & natural selection). Put simply, you take a 'population' of initial build orders, evaluate them for fitness, and modify the population according to each element’s fitness. In other words, have the most successful reproduce. The program’s input is simply the desired game state. In practice, this means 'make N units' to determine some rush build order (but it also allows for other types of builds, like make N workers with some defensive structures and a small army)."
NASA

Houston, We Have a Family Reunion 75

crimeandpunishment writes "If all goes according to plan, the only space sibling team will be hooking up in orbit. And not only are Scott and Mark Kelly brothers, they're identical twins. Scott took off Friday on a Russian Soyuz rocket to begin a five and a half month mission as the next commander of the International Space Station. Mark is the next commander of the space shuttle Endeavour, scheduled to lift off in February and hook up with the space station March 1st."
Education

Simple Virus For Teaching? 366

ed1023 writes "Currently I am teaching a 101 class on computers. It is more of a 'demystifying the black box' type of class. The current topic is computer viruses; I am looking for a virus with which I can infect the lab computers (only connected to local network, no outside network connection) that would be easy for the students to remove by hand. Can the Slashdot community point me in any directions? Is there an executable out there that would work, or do I try to write one myself, or is there one that is written that I can compile myself?"

Submission + - HTC Dragging Feet On GPL Source Yet Again (ppcgeeks.com)

An anonymous reader writes: HTC is once again at its song and dance with source code. Last time it was the HTC Hero, but this time it's the HTC Desire. HTC went public with Android OS 2.2 (Froyo) for the HTC Desire, however any attempts to get the source for the kernel has fallen on HTC's deaf ears. Their copy-and-paste garbage brush-off response to requests say that they are "waiting for the developers to provide the source." Some interesting correspondence between a rising of users on www.xda-developers.com and HTC tech support can be found here http://forum.xda-developers.com/showthread.php?t=781850. The users have also pointed out that HTC is ignoring its own EULA/Legal agreement for their Android devices which specifically states that "you
may obtain a copy of the source code corresponding to the binaries for GPL-licensed file by sending a request to HTC customer service at www.htc.com, and HTC will send you a link to such source code."

From the information in the XDA-Developers thread, HTC's e-mail support is oblivious to the fact that they are the contact point for acquiring said source code. For any one who has read the GPL v2 can see that this failure to provide requested information is a violation of the license itself. This situation is very similar to previous issues with HTC — the company ignores users unless otherwise compelled to address them. This should not be a reoccurring issue — someone with power needs to light a fire under under the situation. Interestingly enough, HTC promptly released the source code for the Evo and Incredible within mere hours after the public compiled binary was released.

HTC's EULA/Legal Agreement can be found here: http://member.america.htc.com/download/Web_materials/Manual/Warranty/Android/0525_G_WarrantyEULA_76x126_US-BP.pdf

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...