Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Video Will 'Chip and Pin' Credit Card Technology Really Increase Security? (Video) 315

The answer seems to be: sort of, a little, but not a whole lot, according to Jerry Irvine, who is a member of the U.S. Chamber of Commerce Cybersecurity Leadership Council and CIO of Chicago-based Prescient Solutions. More security theater? It sounds that way when Jerry starts reeling off the kinds of attacks the new cards will do nothing to prevent. Even so, October 1 is the date after which merchants are supposed to be liable for fraudulent purchases made with old-style cards, and are supposed to have point of sale terminals that accept "chip and PIN" cards.

Can High-Tech Academia Survive Silicon Valley's Talent Binge? 137

An anonymous reader writes: Earlier this year, Carnegie Mellon had one of the most capable robotics research centers in the world. Then, Uber hired away dozens of workers in a frantic push to jump start development of autonomous driving technology, which left CMU reeling. Now the NY Times asks whether such high-tech labs can continue to exist; Silicon Valley seems ready to flood such organizations with money whenever a vital new technology is almost ripe. "Carnegie Mellon's experience is a familiar one in the world of high-tech research. As a field matures, universities can wake up one day to find money flooding the premises; suddenly they're in a talent war with deep-pocketed firms from Silicon Valley. The impacts are also intellectual. When researchers leave for industry, their expertise winks off the map; they usually can't publish what they discover — or even talk about it over drinks with former colleagues. ... [Also], the intellectual register of their work changes. No more exploring hard, ''basic'' problems out of deep curiosity; they need to solve problems that will make their employers money."

Nearly Every Seabird May Be Eating Plastic By 2050 149

sciencehabit writes: According to a new study almost every ocean-foraging species of birds may be eating plastic by 2050. In the five large ocean areas known as "garbage patches," each square kilometer of surface water holds almost 600,000 pieces of debris. Sciencemag reports: "By 2050, about 99.8% of the species studied will have eaten plastic, the researchers report online today in the Proceedings of the National Academy of Sciences. Consuming plastic can cause myriad problems, Wilcox says. For example, some types of plastics absorb and concentrate environmental pollutants, he notes. After ingestion, those chemicals can be released into the birds’ digestive tracts, along with chemicals in the plastics that keep them soft and pliable. But plastic bits aren’t always pliable enough to get through a gull’s gut. Most birds have trouble passing large bits of plastic, and they build up in the stomach, sometimes taking up so much room that the birds can’t consume enough food to stay healthy."

IBM Tells Administrators To Block Tor On Security Grounds 70

Mickeycaskill writes: IBM says Tor is increasingly being used to scan organizations for flaws and launch DDoS, ransomware and other attacks. Tor, which provides anonymity by obscuring the real point of origin of Internet communications, was in part created by the US government, which helps fund its ongoing development, due to the fact that some of its operations rely on the network. However, the network is also widely used for criminal purposes. A report by the IBM says administrators should block access to Tor , noting a "steady increase" an attacks originating from Tor exit nodes, with attackers increasingly using Tor to disguise botnet traffic. "Spikes in Tor traffic can be directly tied to the activities of malicious botnets that either reside within the Tor network or use the Tor network as transport for their traffic," said IBM. "Allowing access between corporate networks and stealth networks can open the corporation to the risk of theft or compromise, and to legal liability in some cases and jurisdictions."

Underground Piracy Sites Want To Block Windows 10 Users 394

An anonymous reader writes: Some smaller pirate sites have become concerned about Windows 10 system phoning home too many hints regarding that the users are accessing their site. Therefore, the pirate administrators have started blocking Windows 10 users from accessing the BitTorrent trackers that the sites host. The first ones to hit the alarm button were iTS, which have posted a statement and started redirecting Windows 10 users to a YouTube video called Windows 10 is a Tool to Spy on Everything You Do. Additionally, according to TorrentFreak, two other similar dark web torrent trackers are also considering following suit. "As we all know, Microsoft recently released Windows 10. You as a member should know, that we as a site are thinking about banning the OS from FSC," said one of the FSC staff. Likewise, in a message to their users, a BB admin said something similar: "We have also found [Windows 10] will be gathering information on users' P2P use to be shared with anti piracy group."

New Blood-Cleansing Device Removes Pathogens, Toxins From Blood 60

jan_jes writes: A team of scientists at the Wyss Institute last year described the development of a device to treat sepsis that works by mimicking the human spleen. The device cleanses pathogens and toxins from blood flowing through a dialysis-like circuit. Now the team has developed an improved device that works with conventional antibiotic therapies and is better positioned for near-term use in clinics. The improved design will be described in the October issue of Biomaterials. This approach can be administered quickly, even without identifying the infectious agent.

Italian City To Dump OpenOffice For Microsoft After Four Years 316

An anonymous reader writes: Between 2011 and 2014, the municipality of Pesaro, Italy, trained up its 500 employees to use OpenOffice. However, last year the organization decided to switch back to Microsoft and use its cloud productivity suite Office 365. According to a report from Netics Observatory (Google translation of Italian original), the city administration will be able to save up to 80% of the software's total cost of ownership by going back. The savings are largely due to the significant and unexpected deployment costs. In particular, having to repaginate and tweak a number of documents due to a lack of compatibility between the proprietary and the open source systems translated into a considerable waste of time and productivity. The management estimates that every day roughly 300 employees had to spend up to 15 minutes each sorting out such issues.

Thunderstrike2 Details Revealed 65

An anonymous reader writes: Prior to DefCon and BlackHat, we learned that Trammell Hudson had developed a firmware worm for Apple machines that could spread over Thunderbolt hardware accessories. Now that both conferences have finished, Hudson has published slides and an annotated transcript detailing how the worm works.

A brief quote: "Thunderstrike 2 takes advantage of four older, previously disclosed vulnerabilities. These had all been known and fixed on other platforms, but not on Apple's MacBooks. ... Speed Racer (Incorrect BIOS_CNTL configuration, 2014, VU#766164), Darth Venamis (S3 boot script injection, 2014, VU#976132) Snorlax (Flash configuration is not set after S3 sleep, 2013 VU#577140) and PrinceHarming (2015) Unsigned Option ROMs (2007, 2012). ... While we're looking at Apple specifically in this research, the overall message is that many vendors are not keeping up to date and are not responding to CERT, especially if it requires effort to port or test vulnerabilities from other vendor platforms."

Linux Servers' Entropy Pool Too Shallow, Compromising Security 111

The BBC reports that Black Hat presenters Bruce Potter and Sasha Woods described at this year's Black Hat Briefings a security flaw in Linux servers: too few events are feeding the entropy pool from which random numbers are drawn, which leaves the systems "more susceptible to well-known attacks." Unfortunately, [Potter] said, the entropy of the data streams on Linux servers was often very low because the machines were not generating enough raw information for them. Also, he said, server security software did little to check whether a data stream had high or low entropy. These pools often ran dry leaving encryption systems struggling to get good seeds for their random number generators, said Mr Potter. This might meant they were easier to guess and more susceptible to a brute force attack because seeds for new numbers were generated far less regularly than was recommended. Update: 08/10 01:05 GMT by T : Please note that Sasha Woods' name was mis-reported as Sasha Moore; that's now been changed in the text above.

Techies Hire Witch To Protect Computers From Viruses and Offices From Spirits 232

schwit1 writes: It may seem like your computer or smartphone is possessed by an evil spirit sometimes when a mysterious bug keeps causing an app to crash, but if you truly think your machine has been invaded by an evil spirit, there's someone who will take your call — Reverend Joey Talley. A Wiccan witch from the San Francisco Bay Area, Talley claims to solve supernatural issues for techies. Business Insider reports: "Talley’s website says she welcomes issues too unusual or dangerous to take the the straight world of Western helpers. But she also says no problem is too big or small, even, perhaps, your printer malfunctioning. However before you jump on the phone, you should be aware that Talley’s services do not come cheap. She charges $200 an hour (though a phone consultation is free)."

Video How Will IT Workers' Roles Change in the Next Five Years? (Video) 138

We asked Sarah Lahav this question. She's founder and CEO of service management and help desk software company SysAid, and a staunch supporter of Sysadmin Appreciation Day, so keeping an eye on the future of IT is essential for her company, her clients, and the friends she's made in her years as an IT person and -- later -- IT service company executive. As she says in the interview, "[Some] people say that the IT person will not exist because everything will go to the cloud. And the other half claims that people from the IT [department] will have new skills. It wouldn’t be the same IT person as we know him now, there will be focus more on firewalls than on fixing computers and stuff like that." Is she right? Is she wrong? Or will changes in IT people's roles be so different from company to company that there is no one right answer?

Brazilian Evangelicals Set Up a "Sin Free" Version of Facebook 293

An anonymous reader writes: With $16,000 and the help of the Mayor of Ferraz de Vasconcelos, the town he lives in, Atilla Barros and three other Evangelical Christians created Facegloria, a "sin-free" version of Facebook. Swearing is banned, along with about 600 other words, as well as any violent or erotic content, and depictions of homosexual activity. 100,000 users have signed up the first month. "In two years we hope to get to 10 million users in Brazil. In a month we have had 100,000 and in two we are expecting a big increase thanks to a mobile phone app," Barros says. Acir dos Santos, the mayor, adds: "Our network is global. We have bought the Faceglory domain in English and in all possible languages. We want to take on Facebook and Twitter here and everywhere."

Aussie ISP Bakes In Geo-dodging For Netflix, Hulu 40

New submitter ste7en7 writes: A new Australian ISP is integrating geo-blocking circumvention into its broadband service, allowing customers to access streaming services like Hulu, Netflix USA, BBC iPlayer and Amazon Prime. When Yournet launches in August, customers will be able to sign up for broadband that allows users to instantly change the country they are supposedly surfing from.

Ask Slashdot: What's the Harm In a Default Setting For Div By Zero? 1067

New submitter CodeInspired writes: After 20 years of programming, I've decided I'm tired of checking for div by zero. Would there be any serious harm in allowing a system wide setting that said div by zero simply equals zero? Maybe it exists already, not sure. But I run into it all the time in every language I've worked with. Does anyone want their div by zero errors to result in anything other than zero?

Surface Pro 3 Handily Outperforms iPad Air 2 and Nexus 9 204

An anonymous reader points to an interesting comparison of current tablets' peformance, as measured with the Geekbench benchmarking tool, which boils down various aspects of performance to produce a single number. The clear winner from the models fielded wasn't from Apple of Samsung (Samsung's entrants came much lower down, in fact), but from Microsoft: the i5-equipped Surface Pro 3, with a Geekbench score of 5069.; second place goes to the Apple iPad Air 2, with 4046. The Nexus 9 rated third, with 3537. One model on the list that U.S. buyers may not be familiar with is the Tesco Hudl 2, a bargain tablet which Trusted Reviews seems quite taken by.

Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask!