Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×
Power

Submission + - Society of Automotive Engineers announces electric car charging plug standard-> 1

cylonlover writes: The electric and plug-in hybrid car industry is learning the lesson of the mobile phone makers. Instead of allowing a plethora of incompatible charging plugs to sprout up, the Society of Automotive Engineers (SAE) International hopes to forestall confusion by settling on one charging plug design for North America. SAE has selected the J1772 combo plug as the standard, which uses paired couplers to allow for both AC and DC charging using the same plug. Published this week, the SAE International decision marks the first official charging standard for North American cars. According to SAE, it was the result of consultation with 190 “global experts” from the automotive, charging equipment, utilities industries and national laboratories.
Link to Original Source
Google

Submission + - Google threatens French media ban->

another random user writes: Google has threatened to exclude French media sites from search results if France goes ahead with plans to make search engines to pay for content.

In a letter sent to several ministerial offices, Google said such a law "would threaten its very existence".

French newspaper publishers have been pushing for the law, saying it is unfair that Google receives advertising revenue from searches for news. French Culture Minister Aurelie Filippetti also favours the idea. She told a parliamentary commission it was "a tool that it seems important to me to develop".

Link to Original Source
Security

Submission + - Hackers' 'Zero-Day' Exploits Stay Secret For Ten Months On Average->

Sparrowvsrevolution writes: Maybe instead of zero day vulnerabilities, we should call them -312 day vulnerabilities. That's how long it takes on average for software vendors to become aware of new vulnerabilities in their software after hackers begin to exploit them, according to a study presented by Symantec at an Association of Computing Machinery conference in Raleigh, NC this week.

The researchers used data collected from 11 million PCs to correlate a catalogue of zero-day attacks with malware signatures taken from those machines. Using that retrospective analysis, they found 18 attacks that represented zero-day exploits between February 2008 and March of 2010, seven of which weren't previously known to have been zero-days. And most disturbingly, they found that those attacks continued more than 10 months on average–up to 2.5 years in some cases–before the security community became aware of them. “In fact, 60% of the zero-day vulnerabilities we identify in our study were not known before, which suggests that there are many more zero-day attacks than previously thought—perhaps more than twice as many,” the researchers write.

Link to Original Source

What we anticipate seldom occurs; what we least expect generally happens. -- Bengamin Disraeli

Working...