Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Transportation

"Infrared Curtain" Brings Touchscreen Technology To Cheap Cars 123

Posted by samzenpus
from the go-ahead-and-touch dept.
An anonymous reader writes with news about an affordable way to integrate touch screen technology in any car. "Although touchscreen controls are appearing in the dashboards of an increasing number of vehicles, they're still not something that one generally associates with economy cars. That may be about to change, however, as Continental has announced an "infrared curtain" system that could allow for inexpensive multi-touch functionality in any automobile. The infrared curtain consists of a square frame with a series of LEDs along two adjacent sides, and a series of photodiodes along the other two. Each LED emits a beam of infrared light, which is picked up and converted into an electrical signal by the photodiode located in the corresponding spot on the opposite side of the frame."

Comment: Re:Ought to bring down ... (Score 2) 151

by NIK282000 (#48310259) Attached to: Ford Develops a Way To Monitor Police Driving

Knowing where speed traps are would make them 100% effective. The point is to reduce speeding and no one will speed if they know there is a trap on the road, no one gets a ticket and the road becomes safer. The only way in which the trap is ineffective is that it doesn't generate any cash for the department.

Security

Researcher Finds Tor Exit Node Adding Malware To Downloads 126

Posted by Soulskill
from the at-least-it's-anonymous-malware dept.
Trailrunner7 writes: A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan Security Group ran across the misbehaving Tor exit node while performing some research on download servers that might be patching binaries during download through a man-in-the middle attack.

What Pitts found during his research is that an attacker with a MITM position can actively patch binaries–if not security updates–with his own code. In terms of defending against the sort of attack, Pitts suggested that encrypted download channels are the best option, both for users and site operators. "SSL/TLSis the only way to prevent this from happening. End-users may want to consider installing HTTPS Everywhere or similar plugins for their browser to help ensure their traffic is always encrypted," he said via email.
Security

Hackers Break Into HealthCare.gov 150

Posted by samzenpus
from the our-bad dept.
mpicpp is one of many to point out that hackers broke into the HealthCare.gov website in July and uploaded malicious software. "Hackers silently infected a Healthcare.gov computer server this summer. But the malware didn't manage to steal anyone's data, federal officials say. On Thursday, the Health and Human Services Department, which manages the Obamacare website, explained what happened. And officials stressed that personal information was never at risk. "Our review indicates that the server did not contain consumer personal information; data was not transmitted outside the agency, and the website was not specifically targeted," HHS spokesman Kevin Griffis said. But it was a close call, showing just how vulnerable computer systems can be. It all happened because of a series of mistakes. A computer server that routinely tests portions of the website wasn't properly set up. It was never supposed to be connected to the Internet — but someone had accidentally connected it anyway. That left it open to attack, and on July 8, malware slipped past the Obamacare security system, officials said.

You can be replaced by this computer.

Working...