Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Twitter adds "report dox" option

Submitted by AmiMoJo
AmiMoJo (196126) writes "Twitter announced that its abuse-report system, which was recently refined to simplify and shorten the reporting process, has now expanded to allow users to report content such as self-harm incidents and "the sharing of private and confidential information" (aka doxing). The announcement, posted by Twitter Vice President of User Services Tina Bhatnagar, explained that December's report-process update was met with a "tripling" of the site's abuse support staff, which has led to a quintupling of abuse report processing. Chat logs recently revealed how Twitter is used by small groups to create vast harassment campaigns, thanks to sock puppet account and relative anonymity."

+ - Back to the Future's Hoverboard is HERE!->

Submitted by gurps_npc
gurps_npc (621217) writes "A company has started an Indiegogo campaign to raise money to build something they call an "airboard". Basically it is a souped-up, MORE powerful version of Marty's McFlyh;s hoverboard. Software limits how high above ground it can go and it has "power" as the movie says, so you don't need to push it with your feet. Yes, it's a bit bulkier and more expensive than the movie version, but maybe they can fix that on version 2.0."
Link to Original Source

+ - EFF Unearths Evidence of Possible Superfish-style Attacks in the Wild->

Submitted by Anonymous Coward
An anonymous reader writes "It's starting to look like Superfish and other software containing the same HTTPS-breaking code library may have posed more than a merely theoretical danger to Internet users. For the first time, researchers have uncovered evidence suggesting the critical weakness may have been exploited against real people visiting real sites, including Gmail, Amazon, eBay, Twitter, and, to name just a few.

In a blog post published Wednesday, Researchers Joseph Bonneau and Jeremy Gillula wrote:

        We searched the Decentralized SSL Observatory for examples of certificates that Komodia should have rejected, but which it ended up causing browsers to accept, and found over 1600 entries. Affected domains included sensitive websites like Google (including,, and, Yahoo (including, Bing, Windows Live Mail, Amazon, eBay (including, Twitter, Netflix, Mozilla’s Add-Ons website,, several banking websites (including and domains from HSBC and Wells Fargo), several insurance websites, the Decentralized SSL Observatory itself, and even

        While it’s likely that some of these domains had legitimately invalid certificates (due to configuration errors or other routine issues), it seems unlikely that all of them did. Thus it’s possible that Komodia’s software enabled real MitM attacks which gave attackers access to people’s email, search histories, social media accounts, e-commerce accounts, bank accounts, and even the ability to install malicious software that could permanently compromise a user’s browser or read their encryption keys."

Link to Original Source

+ - FCC votes along party lines to regulate entire Internet

Submitted by jbdigriz
jbdigriz (8030) writes "In a stunning power grab, the FCC has extended Title II, not just to the loosely and flexibly defined "broadband" market, but to the Internet as a whole, wired and wireless, including even interconnects, making ISPs common carriers of telecom services, with the possible exception of dial-up providers (dunno, haven't seen the order yet). The commission voted also to override state law in NC and TN to remove restrictions on community broadband. Ars Technica has more info here. Lawyers, start filing. I'm sure the upshot will not be enshrinement of incumbents, of course. Or "openness" as defined by Fairness Committees of "Stake Holders." Right, suckers."

+ - AMD Carrizo APU With Excavator Core Architecture Unveiled->

Submitted by MojoKid
MojoKid (1002251) writes "AMD just unveiled new details about their upcoming Carrizo APU architecture and the company is claiming the processor, which is still built on Global Foundries' 28nm 28SHP node like its predecessor, will nonetheless deliver big advances in both performance and efficiency. When it was first announced, AMD detailed support for next generation Radeon Graphics (DX12, Mantle, and Dual Graphics support), H.265 decoding, full HSA 1.0 support, and ARM Trustzone compatibility. But perhaps one of the biggest advantages of Carrizo is the fact that the APU and Southbridge are now incorporated into the same die; not just two separates dies built into and MCM package. This not only improves performance, but also allows the Southbridge to take advantage of the 28SHP process rather than older, more power-hungry 45nm or 65nm process nodes. In addition, the Excavator cores used in Carrizo have switched from a High Performance Library (HPL) to a High Density Library (HDL) design. This allows for a reduction in the die area taken up by the processing cores (23 percent, according to AMD). This allows Carrizo to pack in 29 percent more transistors (3.1 billion versus 2.3 billion in Kaveri) in a die size that is only marginally larger (250mm2 for Carrizo versus 245mm2 for Kaveri). When all is said and done, AMD is claiming a 5 percent IPC boost for Carrizo and a 40 percent overall reduction in power usage."
Link to Original Source

+ - Gemalto Heist Could Affect Online And Mobile Pyments

Submitted by eWonga
eWonga (4020767) writes "Apple Pay and Google Wallet both use Gemalto-based technology to operate. That technology is provided by Softcard, which was created by a coalition of US cellular firms including AT&T, Verizon, and T-Mobile.

The report said it was "unclear" if contactless payment services were compromised by the two intelligence agencies. Gemalto may know more when it talks on Wednesday."

+ - Facebook users at risk from malicious face-ageing app->

Submitted by Anonymous Coward
An anonymous reader writes "A malicious Facebook app, purporting to show users what they will look like in 20 years, has been uncovered which solicited usernames and passwords to hijack accounts and spread spam. The app, which pops up on newsfeeds, walls and in advertising spots, takes the oblivious user to a fake Facebook phishing site designed to harvest login details by asking for usernames and passwords from the users to gain access to the ‘ageing’ app. The hook message currently features an image of actress Katie Holmes alongside her aged mock-up. Once the credentials are stolen and the account hijacked, the cybercriminals can easily spread the scam among the users’ Facebook friends and can use the account to other malicious ends with permission to access photos, inbox messages, and to post status updates and photos without authorization from the account owner."
Link to Original Source

Comment: Look closer (Score 1) 1

by LeadSongDog (#49094795) Attached to: Ask /dot: Gmail Spammers
Gmail allows that "+nnnn" on any existing address. It's useful for minimizing the damage when a spammer harvests the address. If the account owner of watkinsaddie38009(at) never uses the basic address, just ones with the tracking suffix, then those suffixes can be individually filtered on receipt, treated as spamful-or-not, etc. It's a way of reducing the stakes, handy for things like ebay or craigslist posts.

Comment: Re:Curse you gizmag! (Score 1) 2

by LeadSongDog (#48931525) Attached to: Telomere-Lengthening Procedure Turns Clock Back Years in Human Cells
Doh! What I meant to cite was:
John Ramunas, Eduard Yakubov, Jennifer J. Brady, Stéphane Y. Corbel, Colin Holbrook, Moritz Brandt, Jonathan Stein, Juan G. Santiago, John P. Cooke, and Helen M. Blau "Transient delivery of modified mRNA encoding TERT rapidly extends telomeres in human cells" FASEB J fj.14-259531; published ahead of print January 22, 2015, doi:10.1096/fj.14-259531

Comment: Curse you gizmag! (Score 1) 2

by LeadSongDog (#48931507) Attached to: Telomere-Lengthening Procedure Turns Clock Back Years in Human Cells
A better source is the press release without all the gizmag clickbait:
The actual paper is:
Klaus G. Schmetterer, Alina Neunkirchner, Daniela Wojta-Stremayr, Judith Leitner, Peter Steinberger, and Winfried F. Pickl "STAT3 governs hyporesponsiveness and granzyme B-dependent suppressive capacity in human CD4+ T cells" FASEB J fj.14-257584; published ahead of print November 14, 2014, doi:10.1096/fj.14-257584

"It's when they say 2 + 2 = 5 that I begin to argue." -- Eric Pepke