Forgot your password?
typodupeerror

Comment: Re:Articles on the elementary education imbalance? (Score 5, Informative) 579

by BobSutan (#47784297) Attached to: Why Women Have No Time For Wikipedia

Every time you hear about a gender gap in STEM, it's because someone didn't do their homework and are operating from a false premise. The truth is there's no gender imbalance in STEM. This is this is the best kept secret out there: they omit biological _sciences_ from the "STEM" definition because women are an overwhelming majority of those fields. When you add them back in there is. no. gap.

This is all just the result of gender feminists playing games with terminology to benefit their pet projects. It's since taken on it's own life and now people think we need more women in STEM. The REAL gender gap is in education and academia. Men are only about 13% of school teachers and that's got to change if we want our kids to grow up with a balanced view of the genders.

The Military

Hackers Plundered Israeli Defense Firms That Built 'Iron Dome' Missile Defense 184

Posted by Soulskill
from the intercepting-missiles-is-easier-than-learning-not-to-click-on-attachments dept.
An anonymous reader writes: Brian Krebs reports on information from Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. that attackers thought to be operating out of China hacked into the corporate networks of three top Israeli defense technology companies. The attackers were seeking technical documents related to Iron Dome, Israel's air defense system. "IAI was initially breached on April 16, 2012 by a series of specially crafted email phishing attacks. ... Once inside the IAI’s network, [the attackers] spent the next four months in 2012 using their access to install various tools and trojan horse programs on systems throughout company’s network and expanding their access to sensitive files, CyberESI said. The actors compromised privileged credentials, dumped password hashes, and gathered system, file, and network information for several systems. The actors also successfully used tools to dump Active Directory data from domain controllers on at least two different domains on the IAI’s network. All told, CyberESI was able to identify and acquire more than 700 files — totaling 762 MB total size — that were exfiltrated from IAI’s network during the compromise. The security firm said most of the data acquired was intellectual property and likely represented only a small portion of the entire data loss by IAI." Most of the stolen material pertained to Arrow III missiles, UAVs, and ballistic rockets.
Microsoft

Tired of Playing Cyber Cop, Microsoft Looks For Partners In Crime Fighting 113

Posted by Soulskill
from the every-batman-needs-a-robin dept.
chicksdaddy writes: When it comes to fighting cybercrime, few companies can claim to have done as much as Redmond, Washington-based Microsoft, which spent the last five years as the Internet's Dirty Harry: using its size, legal muscle and wealth to single-handedly take down cyber criminal networks from Citadel, to Zeus to the recent seizure of servers belonging to the (shady) managed DNS provider NO-IP. The company's aggressive posture towards cyber crime outfits and the companies that enable them has earned it praise, but also criticism. That was the case last week after legitimate customers of NO-IP alleged that Microsoft's unilateral action had disrupted their business. There's evidence that those criticisms are hitting home – and that Microsoft may be growing weary of its role as judge, jury and executioner of online scams. Microsoft Senior Program Manager Holly Stewart gave a sober assessment of the software industry's fight against cyber criminal groups and other malicious actors. Speaking to a gathering of cyber security experts and investigators at the 26th annual FIRST Conference in Boston, she said that the company has doubts about the long term effectiveness of its botnet and malware takedowns.
Microsoft

Microsoft Wants You To Trade Your MacBook Air In For a Surface Pro 3 365

Posted by samzenpus
from the try-ours-instead dept.
mpicpp writes with news about a new Microsoft trade-in program to encourage sales of the new Surface Pro 3. Microsoft is offering a limited time Surface Pro 3 promotion via which users can get up to $650 in store credit for trading in certain Apple MacBook Air models. The new promotion, running June 20 to July 31, 2014 -- "or while supplies last" -- requires users to bring MacBook Airs into select Microsoft retail stores in the U.S., Puerto Rico and Canada. (The trade-in isn't valid online.)...To get the maximum ($650) value, users have to apply the store credit toward the purchase of a Surface Pro 3, the most recent model of the company's Intel-based Surface tablets.

Comment: Re:Want to code? (Score 1) 548

by BobSutan (#47284175) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

It's getting close at 57-60%, which is where it's at last time I checked. 66% is what they're predicting by 2020. One analyst quipped that if trends continue the last American male will graduate with a college degree in 2067:

http://www.eagleforum.org/educ...

"Tom Mortenson, senior scholar at the Pell Institute for the Study of Opportunity in Higher Education, warned that if statistical trends were to continue at their current rate there would be no men graduating from college after 2067."

More info:
http://www.aei-ideas.org/2013/...

Comment: Re:Sexism (Score 1) 548

by BobSutan (#47284103) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

There's different types of feminists now. You've got the actual equality feminists like Christina Hoff Sommers, and then you've got the radfem types that phone in bomb threats, pull fire alarms, and so on because they feel feminism is the only lens gender issues can be look at through. Ryerson University's student union actually banned any an all groups from forming unless women's interests are the center of their existence as a way of preventing men's groups from forming on campus. Bigotry much?

Comment: Re:Want to code? (Score 1) 548

by BobSutan (#47283007) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

Read the book War Against Boys by Christina Hoff Sommers. It's chilling how terrible academia is for boys and men these days. She sounded the alarm 14 years ago and only now are educators starting to wonder why boys are dropping out of the system and falling through the cracks. By the end of the decade colleges will be 2:1 girls to boys. That sounds great on the surface if you're a guy going to school, but the truth is guys are being denigrated, disenfranchised, and more.

Comment: Re:Sexism (Score 2) 548

by BobSutan (#47282985) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

Nope.

http://rixstep.com/2/20111127,...

This documentary did a great job looking into what drives our choice of careers and found women are just not that interested in STEM jobs, generally speaking.

tl;dw - The more free and open a society becomes, the more likely people are to follow their predispositions. For women that means comfortable jobs with lots of socializing opportunities. For men that was more hands-on type of work relating to personal interests.

Comment: Re:Why I don't buy the misogyny argument (Score 1) 548

by BobSutan (#47282975) Attached to: Girls Take All In $50 Million Google Learn-to-Code Initiative

This documentary did a great job looking into what drives our choice of careers and found women are just not that interested in STEM jobs, generally speaking.

http://rixstep.com/2/20111127,...

tl;dw - The more free and open a society becomes, the more likely people are to follow their predispositions. For women that means comfortable jobs with lots of socializing opportunities. For men that was more hands-on type of work relating to personal interests.

Security

Nasty Security Flaw In OAuth, OpenID 18

Posted by Soulskill
from the another-day-another-flaw dept.
jones_supa writes: "A notable security vulnerability has been discovered which impacts both OAuth and OpenID, which are software packages that provide a secure delegated access to websites. Wang Jing, a Ph.D student at the Nanyang Technological University in Singapore, discovered that the 'Covert Redirect' flaw can masquerade as a login popup based on an affected site's domain. Covert Redirect is based on a well-known exploit parameter. For example, someone clicking on a malicious phishing link will get a popup window in Facebook, asking them to authorize the app. Instead of using a fake domain name that's similar to trick users, the Covert Redirect flaw uses the real site address for authentication. If a user chooses to authorize the login, personal data will be released to the attacker instead of to the legitimate website. Wang did already warn a handful of tech giants about the vulnerability, but they mostly dodged the issue. In all honesty, it is not trivial to fix, and any effective remedies would negatively impact the user experience. Users who wish to avoid any potential loss of data should be careful about clicking links that immediately ask you to log in to Facebook or Google, and be aware of this redirection attack."
Television

The Ultimate Hopes For the New Cosmos Series 183

Posted by samzenpus
from the think-big dept.
StartsWithABang writes "So unless you've been living under a rock, you're aware that it's only a few short weeks until the premiere of the new Cosmos: A Space-Time Odyssey starring Neil de Grasse Tyson. Many have hopes (and fears) concerning what the series will (and won't) be, but this perspective — on what a 'successful' Cosmos series could mean for the future of humanity — is worth a read for anyone who hasn't given up on dreaming big."

How many NASA managers does it take to screw in a lightbulb? "That's a known problem... don't worry about it."

Working...