Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Feed Google News Sci Tech: Google Says Mississippi Sales Probe Amounts to Censorship - Businessweek (google.com)


Variety

Google Says Mississippi Sales Probe Amounts to Censorship
Businessweek
Google Inc. (GOOG:US) sued to block what it called overly broad demands by Mississippi in its investigation of online contraband sales, after accusing the state's attorney general of doing Hollywood's bidding. The lawsuit was filed today in federal court in...
Sorry Google, This Isn't About SOPA, It's About YouHuffington Post
Google Asks Court To Prohibit Miss. A.G. From Suing Over 'Illegal' ContentMediaPost Communications
Mississippi Attorney General Dares Reporters To Find Any Evidence Of ... Techdirt
Vancouver Sun-Business Insider-New York Times
all 123 news articles

Feed Google News Sci Tech: ISS astronaut needs a wrench, NASA successfully 'emails' him one - CNET (google.com)


CNET

ISS astronaut needs a wrench, NASA successfully 'emails' him one
CNET
An astronaut aboard the International Space Station needed a socket wrench, so NASA engineers emailed him designs for 3D-printing one. What a world we're living in. by Anthony Domanico @ajdomanico; 19 December 2014 9:46 pm GMT. comments. 0.
3-D Printer System Beams Up a New Tool to Space StationNBCNews.com
The One-Year Crew: Twin NASA Astronauts Scott And Mark Kelly To Reveal ... International Business Times
This Is How You Email A Wrench Into SpaceJalopnik

all 37 news articles

Submission + - Staples: Breach may have affected 1.16 million customers' cards (fortune.com)

mpicpp writes: The office-supply retailer gave new details about a breach at more than 100 of its stores.

Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October.

The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers’ credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached.

Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers’ names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.

Education

Ask Slashdot: Resources For Kids Who Want To Make Games? 121

Mr. Jones writes: My 11-year-old son is fascinated by games — game mechanics in particular. He has been playing everything from Magic to WarFrame since he was 5 years old. He seems mostly interested in creating the lore and associated mechanics of the games (i.e. how a game works). If it was only programming I could help him, but I am lost when it comes to helping him learn more formal ways of developing and defining gameplay. I really see a talent for this in him and I want to support it any way I can. Can you suggest any conferences, programs, books, websites, etc. that would help him learn?

Comment Re:Definition: Secure systems keep working, no mat (Score 1) 343

SQL injection. My work place had a typical example:
INSERT INTO users SET fname='$fname', lname='$lname';

Apart from the fact that you're mixing UPDATE syntax with INSERT syntax, substitution is perfectly valid so long as each string has been sanitized in the correct manner for a particular database connection (that is, not addslashes()). For the MySQLi client library, it looks like this:

$fname = $db->escape_string($fname);
$lname = $db->escape_string($lname);

Don't get me wrong; it's bad practice to escape manually unless you're using operator IN on a database client library that supports neither array parameters nor named placeholders (such as MySQLi). But code that correctly uses $db->escape_string() (or the equivalent for other languages or database drivers) should be safe from SQL injection, just as code that correctly uses htmlspecialchars() should be safe from script injection.

With Clonebox, if a customer's web server is hacked or otherwise damaged, we can switch it over to a ~read-only mirror. Sure that protects against hackers, and some customers have been hacked and used the protection. More often, customers simply screw up and delete important files or databases.

But how long do you keep these mirrors around, in case there's a screw-up that goes undiscovered for a while?

Transportation

Tesla About To Start Battery-Swap Pilot Program 133

cartechboy writes: Remember 18 months ago when Tesla promised it was going to launch battery-swap stations? Well, it's finally happening, sort of. It seems Tesla's about to announce a battery-swap pilot program that will launch next week. The swap site will be located across the street from a Tesla Supercharger site in Harris Ranch, California — 184 miles south of San Francisco and about 200 miles north of Los Angeles. The pilot program will involve an unspecified number of Model S electric-car owners, who will be invited to take part in the test. For now, the battery-swap service will be offered by appointment only, at a cost of roughly a tank of gas in a premium sedan. Tesla's using words to describe this pilot program like "exploratory work" and "intended to test technology and assess demand" for a swapping service. While originally pitched that the battery swap would take less time than it would to take to refill the gas tank of a comparable luxury sedan, the company says now that "for this specific iteration" the swap process will take "approximately 3 minutes" — though it adds Tesla has "the ability to improve that time with future iterations." Is this test going to show that battery swapping is or isn't a realistic initiative?

Submission + - T-Mobile To Pay $90M for Unauthorized Charges On Customers' Bills (itworld.com)

itwbennett writes: T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn’t want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.

Submission + - Deepest Dwelling Creatures On Earth Discovered By College Students (kulr8.com)

mpicpp writes: Whitman biology professor Paul Yancey and students Anna Downing '16 and Chloe Weinstock '17 have returned from the first detailed study of the Mariana Trench aboard Schmidt Ocean Institute's research vessel Falkor.

The Mariana Trench — located in the Western Pacific near Guam — has been the focus of high-profile voyages to conquer Challenger Deep, the deepest place on Earth. This recent expedition to the Trenchonboard Research Vessel Falkor targeted multiple depths and found active thriving communities of animals. The expedition set many new records, including the deepest rock samples ever collected and the discovery of new fish species at the greatest depths ever recorded.

New species were discovered on this expedition that will provide insight into the physiological adaptations of animals to this high-pressure environment. This research is being conducted in the lab of Whitman College'sProfessor of Biology Paul Yancey. In the past, Yancey and his students, working on animals from moderate depths, discovered certain organic molecules that protect the cells of deep-sea animals from the effects of high pressure, which distorts proteins such as enzymes. These kinds of protective molecules are also being tested to treat human diseases that are caused by malformed proteins, such as cystic fibrosis. Additionally, his work on protective molecules in fishes predicted that fish would not be able to live below about 8,200 meters (27,060 feet). Prior to this expedition, the deepest documented fish was from 7,700 meters (25,410 feet).

The expedition also broke several records for the deepest living fish either caught or seen on video. Setting the record at 8,143 meters, (26,872 feet) was a completely unknown variety of snail fish, which stunned scientists when it was filmed several times during sea floor experiments. The white translucent fish had broad wing-like fins and an eel-like tail, and slowly glided over the bottom.

Linux

Video LinuxFest Northwest 2015 Will be Held April 25 and 26 (Video) 21

Their website says, 'Come for the code, stay for the people! We have awesome attendees and electrifying parties. Check out the robotics club, the automated home brewing system running on Linux, or the game room for extra conference fun.' This is an all-volunteer conference, and for a change the volunteers who run it are getting things together far in advance instead of having sessions that don't get scheduled until a few days before the conference, which has happened more than once with LFNW.

So if you have an idea for a session, this is the time to start thinking about it. Sponsors are also welcome -- and since LFNW sponsorships regularly sell out, it's not to soon to start thinking about becoming a sponsor -- and if you are part of a non-profit group or FOSS project, LFNW offers free exhibit space because this is a conference that exists for the community, not to make money for a corporate owner. But don't delay. As you can imagine, those free exhibit spots tend to fill up early. (Alternate Video Link)

Comment Re:Sony security: strong or weak? (Score 5, Interesting) 343

I'd be interested in knowing the details of the attack. Was it a "social engineering" attack of some kind (ie. a virus-laden email that someone with high privileges opened)? Was it a vulnerability in their networks? I've heard someone with high level admin privileges had their account hacked, but in what way was it done?

The organization I work for is a contractor for the government of a North American jurisdiction, and yesterday morning I started getting reports that some sort of virus-laden emails were flowing out of this government's networks. Sure enough, within a half an hour, I got emails from a contact I have within this particularly agency, with an attached ZIP file with an SCR file inside. That has to be one of the oldest ways that malware has been transmitted in Windows system, I saw my first virus-laden SCR file somewhere around 1997-1998.

Apparently this critter is so new that by the time we checked, only a few AV companies had caught on to it. Even worse in some ways is that it appears that it made its debut on the very government servers in question, making me think this was a targeted attack. So you have a combination of a brand new virus of some kind that won't get caught by the scanners, lax email rules that allow the opening and execution of executable file types (not that blocking EXE variants doesn't mean some bastard won't be firing off a compromised PDF at an unpatched system), and users who through a combination of laziness and ignorance happily take the final step.

With this particular attack, there would have been no problem if Outlook had been configured not to open these kinds of attachments, and in an Active Directory environment, that's pretty trivial, so some of the blame has to go to this government agency's IT team. But still, even with the best safeguards, where users just happily click on any old attachment, it doesn't exactly take a rare alignment of the stars to have malware planted in a network. Sure, it won't have root privileges and won't be able to propagate itself via more sophisticated means, but it appears in this case it didn't need to.

So I do agree to some point that there are finite limits to what any person or organization can do to secure itself against a determined and directed attack. But there are ways to make such attacks much more difficult, and more quickly captured before they wreak too much harm.

Comment Re:Established science CANNOT BE QUESTIONED! (Score 1) 719

What would you label Al Gore "the polar caps will be gone in twenty years!!!" and the people who believed in drowning polar bears?

What do you call people who said weather would be extreme and unbearable within a few years, but it never happened.

These are extraordinary claims, yet they are proven false time and time again. THE only thing Science has proven, is CO2 levels rising. The rest of the predictive outcomes have been largely falsified.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...