Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Intel to rebrand Atom chips along lines of Core processors->

Submitted by angry tapir
angry tapir (1463043) writes "Intel has announced that going forward it will use style of branding for its Atom chips that is similar to its branding for Core chips. Atom CPUs will have the X3, X5 and X7 designations, much like with the Core i3, i5 and i7 brands. An Atom X3 will deliver good performance, X5 will be better and X7 will be the best, an Intel spokeswoman said."
Link to Original Source

+ - What happens when Betelgeuse explodes? 1

Submitted by StartsWithABang
StartsWithABang (3485481) writes "One of the great, catastrophic truths of the Universe is that everything has an expiration date. And this includes every single point of light in the entire sky. The most massive stars will die in a spectacular supernova explosion when their final stage of core fuel runs out. At only an estimated 600 light years distant, Betelgeuse is one (along with Antares) of the closest red supergiants to us, and it’s estimated to have only perhaps 100,000 years until it reaches the end of its life. Here's the story on what we can expect to see (and feel) on Earth when Betelgeuse explodes!"

+ - Most French Nuclear Plants 'Should Be Shut Down' Over Drone Threat-> 1

Submitted by mdsolar
mdsolar (1045926) writes "“You don’t need massive amounts of force to allow a nuclear plant to go into instability. The plant has enough energy to destroy itself. Drones can be used to tickle the plant into instability.”

With devastating simplicity, John Large explains how drones could be used to coordinate a terror attack on a nuclear power station. First, one drone hits the distribution grid serving the plant, depriving the facility of off-site power, making it dependent on its diesel generators to cool the reactor, which generates up to 1,000 megawatts of power – enough to light up half of Paris. Then the generators are easily taken out by an unmanned drone with a relatively small payload. Without power to cool the radioactive fuel, Large estimates it would take approximately 30 seconds before the fuel begins to melt, leading to potential leakages of nuclear waste.

It’s the same cause behind the meltdown at the Fukushima nuclear plant in Japan after it was hit by a tsunami in March 2011. But potential terrorists wouldn’t need to trigger an earthquake, just be able to accurately pilot a pair of readily-available commercial drones carrying small payloads of explosive. Last year, unmanned drones were spotted flying over at least 13 nuclear power stations in France. The last widely-reported sighting was on 3 January, when two aircraft were seen flying over a nuclear facility in Nogent-sur-Seine, in northern-central France."

Link to Original Source

+ - Hackers Using PowerShell, WMI to Evade Detection->

Submitted by wiredmikey
wiredmikey (1824622) writes "Attackers are doing a better job at hiding by using relatively obscure built in components of Microsoft Windows, according to a new report from Mandiant.

In its M-Trends report, the breach investigations company found that more often than before, APT groups are using Windows Management Instrumentation (WMI) and PowerShell to move laterally, harvest credentials, and search for useful information within Windows environments.

“Attackers are using built in components of Windows that are extremely powerful but relatively obscure in lieu of a lot of the things where attackers needed to previously use specialized tools or malware,” Ryan Kazanciyan, technical director at Mandiant, told SecurityWeek. “They are not necessarily ways to infect a system from scratch, but they are ways that attackers can remain persistent in an environment and evade detection for a much longer period by using some of these advanced techniques,” he said.

Additionally, Mandiant's report found that free credential-stealing tools have made harvesting passwords and escalating privileges in a Windows environment much easier. Mandiant experts found that attackers typically used two techniques: “Pass-the-hash” to authenticate with stolen NTLM hashes, and using the “Mimikatz” tool to recover plaintext passwords from memory. Concerningly, Mandiant said that it did not see a single instance when a victims’ anti-virus software detected or blocked Mimikatz, despite the tool’s popularity."

Link to Original Source

Comment: Re:More of this ridiculous (Score 1) 132

by Selur (#49118279) Attached to: Pakistanis Must Provide Fingerprints Or Give Up Cellphone

> how come in a simple public discussion slashdot readers can come up with simple practical scenarios why mass-surveillance "solutions" like this will be completely ineffective, yet the people considering (or actually) deploying them cannot?

Must be that all /.ers are EVIL to the core and have a gift to fight against GOOD.
Everything else would just cause to much upset.

+ - Carnegie-Mellon University Sends Hundreds of Acceptance Letters by Mistake

Submitted by Anonymous Coward
An anonymous reader writes "As reported in the Pittsburgh Post-Gazette, Carnegie-Mellon University mistakenly sent 800 acceptances for its Master of Science in Computer Science program. They're not saying "computer error," but what are the other explanations? High irony all around. The program accepts fewer than nine percent of more than 1,200 applicants, which places the acceptance level at about a hundred, so they're bad at math, too."

+ - With Insider Help, ID Theft Ring Stole $700,000 in Apple Gift Cards->

Submitted by itwbennett
itwbennett (1594911) writes "The Manhattan District Attorney’s office has indicted five people for using personal information stolen from around 200 people to fund the purchase of hundreds of thousands of dollars in Apple gift cards, which in turn were used to buy Apple products. 'Using stolen information to purchase Apple products is one of the most common schemes employed by cybercrime and identity theft rings today,' District Attorney Cyrus Vance said in a statement. 'We see in case after case how all it takes is single insider at a company—in this instance, allegedly, a receptionist in a dentists’ office—to set an identity theft ring in motion, which then tries to monetize the stolen information by purchasing Apple goods for resale or personal use,' he said."
Link to Original Source

+ - Samsung releases source code of Tizen Phone Z1->

Submitted by rzr
rzr (898397) writes "Last month Samsung launched Tizen Z1 mobile for Indian market and some of them managed to be in developers hands (or the opposite). Anyway we all knew it ships mostly FLOSS to start with the kernel Linux, so Samsung made it available to anyone.

If you want to study tizen 2.3 mobile profile or even try to port OS to other devices (ie: previous tizen references devices) you have no excuse to not doing so.

Also author shared some pratical informations about making apps for the only "GNU/Linux inspired " system for mobile. At least with devices and support from the industry .. am I right ? I wish not... but still community depends on actual devices."

Link to Original Source

+ - Google avoids fine in UK but will change its privacy policies->

Submitted by DW100
DW100 (2227906) writes "Google has avoided a fine from UK data regulators for its privacy policies that were introduced in 2012. While French and Spanish regulators issued fines of €150,000 and €900,000 respectively, the UK's Information Commissioner's Office (ICO) appears happy to simply ask Google to change the wording of its policies and make them clearer to users so that they can understand more clearly how their data is being gathered and used by the search giant."
Link to Original Source

+ - Lab samples database "JuliaBase" published as open source->

Submitted by bronger
bronger (721978) writes "After six years of closed-source development, the Research Centre Jülich published its database solution for laboratory samples and processes as open source, while continuing maintaining it. JuliaBase is a framework written in Python/Django that enables research institution or research group to set up browser-based samples tracking and measurement management easily. Next to Bika and LabLey, this is one of the very few open source LIMS systems, and in contrast to the others, not specialized in biomedicine or service labs."
Link to Original Source

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...