Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Average users tired of "fuck beta" spam. (slashdot.org)

RealityGone writes: Seriously, we get that some of you really don't like the beta. It is kind of buggy and perhaps the aesthetics are not for everyone. Spamming the comments section of every article full of garbage "Fuck Beta" posts isn't really helping anything though.

It may seem like a lot of fun to be disruptive and annoying but all you are doing is making the comment section worthless to read. It is rather ironic that the biggest complaint about beta is that it breaks the comment system so everyone spams and makes the comments totally useless for anyone, including people using the classic interface.

If you don't like the bugs or feel that it is missing features.... IT IS A BETA! Betas have bugs and missing features. The beta is there for you to give feedback on those bugs and missing features to ensure that they get fixed. Either that or don't use the BETA version of the new slashdot.

If you don't like something that is changing either give some feedback and hope what you want gets implemented or spam the place up and make a general nuisance of yourself. The only way to actually get the change you want is the first option.

Please, stop spamming the comments. It is really annoying.

Submission + - Thieves target health insurance policy numbers (kansas.com)

anikalim writes: Most of us tightly guard our credit cards and bank account numbers, but health insurance policy numbers are also prime targets for thieves. An estimated 1.84 million people were victims of medical identity theft in 2013, according to the Poneman Institute, a research organization, which expects that number to rise.

Victims often don’t realize they’ve been targeted until they discover a drop in their credit score or until a collection agency comes after them for unpaid medical bills, said Jim Quiggle, director of communications for the Coalition Against Insurance Fraud, a group that includes insurers, consumer activists and government officials. While most of the cost of medical identity theft is borne by the health care industry and government, the Poneman Institute estimates that about 36 percent of victims in 2013 incurred out-of-pocket costs such as reimbursements for services provided to impostors, legal fees and identity protection services. The average cost for these victims amounted to $18,660; in a few cases, it exceeded $100,000.

Medical identity theft can happen in several ways. In one common scenario, the criminal persuades a consumer to divulge his health insurance number. Strategies for collecting these numbers can be highly sophisticated, especially when crooks operate in teams, Quiggle said. “They might invite seniors to bogus health fairs where they take their blood pressure and give them some nutritional supplements and ask to see their Medicare cards.”

Jennifer Trussell, who investigates medical identity theft for the Department of Health and Human Services’ Office of Inspector General, has seen cases where criminal rings target senior centers or homeless shelters and offer people $50 for, say, their Medicare number. “That information is sold again and again,” she said.

Even though the victims in these instances voluntarily share their numbers, they may not realize the impact, Quiggle said. “They'll discover to their horror that their Medicare account is being rifled and even maxed out by thieves who are making false claims against their policy.”

Some cases are perpetrated by employees of medical offices or even health care providers. Trussell worked on a case involving an Iowa chiropractor who had lifted the names and dates of birth of more than 200 patients to collect fraudulent Medicaid payments. In another case, a Baltimore pharmacy owner and two employees were indicted for allegedly submitting bogus claims for prescription refills to Medicaid and Medicare. Sometimes medical identity theft happens with the cooperation of the victim, who allows a family member or acquaintance to use his health insurance card to obtain care. Poneman Institute founder Larry Poneman said these “Robin Hood” crimes made up 30 percent of the medical identity thefts his group studied in 2013.

Giving your insurance number to someone in need might seem like a generous thing to do, but it’s still a crime and you could suffer consequences if the visits rack up bills that go unpaid or result in incorrect additions to your medical records, Poneman said. If an impostor’s blood type or medical condition gets added to your record, you could end up receiving inappropriate or even life-threatening treatment. Electronic medical records make your medical data easier to steal, because any clerk with access to patient records can load patient information onto a thumb drive and sell it to cronies or crime rings, Quiggle said. And because the Internet makes electronic records easy to share, tracking down all the providers who have received incorrect data can be difficult.

So how do you protect yourself? Never give your medical identity credentials to anyone but those with a legitimate reason for needing this information, such as the billing person at your doctor’s office, Quiggle said. Treat with suspicion anyone who asks you for your insurance number without a good reason, and never give these numbers to telemarketers or callers conducting “health surveys.” Closely scrutinize the “Explanation of Benefits” or “Medicare Summary Notice” documents that are sent to you to make sure that you actually received the services and products listed, he said.

If you see anything suspicious, ask to see your medical record to look for mistakes or evidence that your identity has been compromised. “A lot of people don’t realize that they have the right to read their medical records,” Poneman said. He recalls a case where a woman who stood more than 6 feet tall went in for bypass surgery; her medical record, however, showed that she was just over 5 feet tall because, unbeknown to her, an impostor had used her identity to receive care. Had she been given anesthesia and other drugs based on the impostor’s size, she could have faced serious problems with the surgery.

Think twice before sharing detailed medical information on social media, Trussell said. Posting a medical diagnosis on social media is akin to posting your address along with the dates that you’ll be away on vacation. An impostor could use that information to obtain services that might not raise red flags with your insurer. For instance, if you tweet about your diabetes diagnosis, Trussell said, it’s possible that “next thing you know, you’re getting diabetes test strips you didn’t order or receive billed to your insurance company.”

If you discover that your medical identity has been stolen, your first step should be a call to the police, Ponemon said. Next, call the Federal Trade Commission’s identity theft hotline, 877-ID-THEFT, or report the problem online at www.ftc.gov/idtheft. Report Medicare- or Medicaid-related crimes to oig.hhs.gov/fraud/hotline or by calling 800-HHS-TIPS.

Submission + - What are the weirdest places you've spotted Linux?

colinneagle writes: Bryan Lunduke recently pulled together a collection of the weirdest places he's found Linux, from installations in North Korea and the International Space Station to a super-computer made out of Legos and computer engineer Barbie.

But I figured the Slashdot crowd would have some suggestions to expand the list. See any weird places for Linux not mentioned in this list?

Submission + - Google Chrome Now Lets You Play With LEGO In The Browser 1

kc123 writes: From TechCrunch — "This is a pretty obvious movie tie-in, but it’s still pretty cool: Google has partnered with LEGO to build an app that lets you play with LEGOs right in the browser. Using WebGL and other modern web technologies, a Google team in Australia first developed this application as an experiment in 2012 and now Google is opening it up to everybody."

Submission + - Hasbro, Cracked Still Owned; Providing Zombies for Botnets? (threatpost.com)

msm1267 writes: Hasbro[.]com, a leading toy and game distributor in the United States, is infected and serving malware to visitors of the site. Researchers at Barracuda Networks said the site remained infected and Hasbro has not responded to an email from the security firm disclosing the issue.
The Java-based attack is similar to one conducted against popular humor website cracked[.]com, which was found in November to also be hosting a drive-by download attack, and as of two weeks ago, was again serving up malware in drive-by attacks.
Like Cracked, Hasbro is a popular website that, based on traffic analysis from Alexa.com from 2013, gets upwards of 215,000 daily visitors. Barracuda estimates that given current Java installations and patching levels, the site could potentially be infecting up to 20,000 visitors a day. While the Cracked and Hasbro attacks don’t seem to be related, Barracuda research scientist Daniel Peck said, the possibility exists that these compromises are recruiting zombie endpoints for a botnet.

Submission + - Cloud Providers Being Asked To Wall Off Data From US (itworld.com)

chicksdaddy writes: The U.S. government is giving large Internet firms more leeway to discuss secret government requests for data.(http://www.nytimes.com/2014/01/28/business/government-to-allow-technology-companies-to-disclose-more-data-on-surveillance-requests.html?hp) But when it comes to trust, the battle may already be lost. IT World reports that U.S. hosting companies and cloud providers say they now face pressure from international customers to keep data off of U.S. infrastructure – a request many admit is almost impossible to honor.

The article quotes an executive at one, prominent U.S. hosting firm who says that the picture of NSA spying that has come as a result of leaks by Edward Snowden prompted a slew of requests from European customers to have data cordoned off from U.S. infrastructure. Customers in Germany are often the source of the requests, he said, but the phenomenon isn't limited to Germany, where revelations of NSA spying there, including a tap on the phone of German Chancellor Angela Merkel, have stoked a kind of economic nationalism.

Chris Swan, the chief technology officer at Cohesive FT, a cloud networking company, said that his company began fielding calls from European clients, Germany companies, in particular, last year. "They were asking for help finding and using non U.S.-affiliated infrastructure," he said.

"It’s a bit of a gradient with Germany at the top of the hill and the Swiss standing right alongside them," said Swan.

The requests take a couple different forms, according to the hosting company executive. Customers have asked for their data to be kept 'locally,' segregating it on infrastructure located within the geographic border of Germany or other EU nations that are not perceived to be subject to access from U.S. intelligence agencies. Others are asking for changes that at least give them plausible deniability with local press and government officials. For example, they might ask for hosting firms to transfer the registration IP addresses used to host content from U.S.–based entities to a German or EU-based subsidiary, according to the report.

Comment Re:It won't work (Score 4, Insightful) 368

How the ringless piston works:
In place of the rings, each piston has numerous small, angled grooves, semi-circular at their apex. With the small clearances between them, the movement of the piston creates high-speed eddies -- air pressure working like metal rings to cut leakage and loss during the compression and combustion strokes.

“That means there’s no metal-to metal contact between the pistons or rotors and their mating cylinders or housings. Virtually no friction means the mechanism needs no lubrication and there’s no wear and tear on major components,” said Trigg.

There’s an important by-product here, too. Putting an “air cushion” around the periphery of the combustion chamber creates a stratified air-fuel charge – an injection profile that enriches the mixture in the centre of the chamber and leans it up towards the periphery.

Submission + - Congressman Accepts BitCoin For His US Senate Run (businessinsider.com) 1

SonicSpike writes: US Representative Steve Stockman, a vocal opponent of Federal Reserve policy, told reporters that he wants to promote Bitcoin, whose most fervent evangelists tout as an alternative to fiat currency.

To do so, he is now accepting Bitcoin for his Senate campaign against incumbent John Cornyn of Texas.

The announcement was made last night at the launch event for the NYC Bitcoin Center, located just up the street from the New York Stock Exchange. Center founder Nick Spanos a real estate developer and Bitcoin enthusiast says the Center itself is still in something of a planning stage, existing more as a statement about Bitcoin itself, though he plans on hosting a "hackathon" later this month.

Submission + - Phony copyright claims exploit holes in U.S. Internet law (dispatch.com)

schwit1 writes: Ecuador's president is using phony copyright claims to force American companies such as YouTube and Google to remove videos and documents that criticize his government.

Last month, more than 140 videos posted by Chevron abruptly vanished from YouTube, replaced by notices that said they were yanked due to copyright-infringement claims by a Spanish video-distribution company called Filmin.

Filmin didn’t specify what copyrights it owns on the videos for the excellent reason that it doesn’t have any. Nearly all of them were outtakes from a film called Crude, a documentary about an Ecuadorian lawsuit against Chevron over oil-drilling pollution.

Chevron’s attorneys won the legal right to view and disseminate the outtakes, which show various sleazy acts of behind-the-scenes collaboration between the plaintiffs, the Ecuadorian government and the supposedly neutral judicial authorities hearing the case.

Using the DMCA, they claim they own everything from a mock wanted poster for the father of a cabinet member accused of raping a child to a left-wing documentary criticizing the government for granting mining concessions to foreign companies.

Submission + - Harvard Bomber Hoax Perpetrator Caught through Tor (nbcnews.com)

Meshach writes: The FBI has caught the student who called in a bomb threat on December 16. The student used a temporary anonymous email account routed through Tor but the FBI were able to trace it because it originated in the Harvard wireless network. He could face as long as five years in prison, three years of supervised release and a $250,000 fine if convicted.
Idle

Submission + - Irony is Dead: Tea Party Posts Material from Bioshock Infinite to Facebook Page (forbes.com)

barlevg writes: The National Liberty Foundation, a Tea Party group, posted to their Facebook page an image featuring George Washington keeping at bay a crowd containing a wide assortment of ethnic groups above a banner reading "It is our holy duty to guard against the foreign hordes." While such images are hardly uncharacteristic of the group's photo stream, this particular image was in fact promotional material from from Irrational Games' BioShock Infinite, set in a dystopian city controlled by warring factions that "strive to keep the city for pure Americans" and worship the founding fathers as deities.

Submission + - Edward Snowden's coworker refutes NSA claims (forbes.com)

wannabegeek2 writes: check for dupes.

in an article which purportedly was carefully verified, a former coworker states that the NSA's current PR blitz amounts to a smear campaign against Mr. Snowden. Further, he describes him as a genius among genius's, who was given the access he needed by the NSA, and did not need to steal or dupe his coworkers to obtain passwords to accomplish his task.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...