Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

+ - Made-In-Nigeria Smart Cards To Extend Financial Services To The Poor->

Submitted by jfruh
jfruh (300774) writes "A new factory producing smart cards opened in Lagos this week, promising to open up access to financial services to many poor Africans and other inhabitants of the Global South. The cards can be used by people without traditional bank accounts to access the worldwide credit card and smart phone infrastructure."
Link to Original Source

+ - U.S. Gas Stations Vulnerable To Internet Attacks->

Submitted by itwbennett
itwbennett (1594911) writes "Automated tank gauges (ATGs), which are used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated over the Internet by malicious attackers, according to security firm Rapid7. 'An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system,' said HD Moore, the chief research officer at Rapid7."
Link to Original Source

+ - Winklevoss Twins Plan Regulated Bitcoin Exchange->

Submitted by itwbennett
itwbennett (1594911) writes "They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. 'This means that your money will never leave the country,' the twins wrote in a blog post. 'It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.'"
Link to Original Source

+ - Fujitsu Psychology Tool Profiles Users At Risk Of Cyberattacks->

Submitted by itwbennett
itwbennett (1594911) writes "Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like 'an action log analysis than looks into the potential risks of a user,' said a spokesman for the lab. 'It judges risk based on human behavior and then assigns a security countermeasure for a given user.'"
Link to Original Source

+ - Calls For European ISPs To Filter Content Could Be Illegal->

Submitted by jfruh
jfruh (300774) writes "Last week, justice ministers from EU countries called for ISPs to censor or block certain content in the "public interest." But a legal analysis shows that such moves could actually violate EU privacy laws, since it would inevitably involve snooping on the content of Internet traffic to see what should be blocked."
Link to Original Source

+ - Federal Court OKs Dish Network's Internet Streaming TV Service->

Submitted by jfruh
jfruh (300774) writes "Fox, armed with the recent Supreme Court ruling that effectively banned Aero, went to court to stop the Dish Network from allowing its subscribers to stream live and DVR'd content over the Internet to their devices. But a federal court ruled that the situations are different: Dish has already purchased retransmission rights from content creators, and the streaming service falls within the rights of individual subscriber to place- and time-shift content."
Link to Original Source

+ - Don't Blame Sharks For Asian Internet Problems->

Submitted by itwbennett
itwbennett (1594911) writes "Internet connections in the South East Asian nation have been affected by problems with the Asia America Gateway (AAG) submarine cable system for the fourth time in a year, according to local news outlets. The cause of the outages is as yet unknown, but that's not stopping online reports for pinning the blame on sharks. The more likely, but less dramatic cause of the damage was ship anchors or fishing, says Michael Costin, Chairman of the AAG Cable Consortium."
Link to Original Source

+ - Facebook Will Let You Flag Content As 'False'->

Submitted by jfruh
jfruh (300774) writes "If you're tired of seeing fake or misleading news articles posted by your friends to Facebook and then spreading like wildfire, you might be in luck. In a system that's something like Slashdot comment moderation on a grand scale, you'll now be able to flag a story as false. Links that have been flagged this way by many users will appear less frequently in people's newsfeeds, or with a disclaimer attached."
Link to Original Source

+ - Nine programing skills - the jobs they could lead to->

Submitted by IsoQuantic
IsoQuantic (17626) writes "A new report from the tech career site Gooroo sheds light on which programming skills are most in demand for which tech positions. Its recently released International Tech Careers and Salary Index is based on an analysis of 3 million tech job listings from the United States, Great Britain and Australia from January through September, 2014. For a number of common tech job titles, Gooroo analyzed which skills are mentioned the most in listings for that position.

The bottom line is that different kinds of programming skills are better suited for different kinds of software development jobs. For example, if you want to be an iOS developer, being able to code in Objective-C will help you a lot more than other skills. Also, some programming skills will make you a more attractive candidate for non-developer positions. Being able to write SQL, for instance, comes in handy for system administrators, data scientists and Web designers.

By analyzing the numbers about available programming jobs, it's possible to see which skills are most in demand in the tech world. For example, the five skills most often mentioned in tech job listings were: SQL (24.3%), Java (14.5%), JavaScript (13.1%), C# (10.4%), and CSS (9.9%). In terms of salary, the five most popular tech job listings were: Python ($95,948), Java ($93,668), JavaScript ($89,101), SQL ($87,502) and C# ($87,446).

See slide show and comments below the same at the link below."

Link to Original Source

+ - How To Remain (Mostly) Invisible Online->

Submitted by itwbennett
itwbennett (1594911) writes "It's a basic truth that when people use a medium owned or operated by a third party, such as the Internet, an elevator with a camera or a mobile app that requires connectivity, there is no privacy. So the best thing you can do, is to place some value on your personal information and then lie, lie, lie your way into obscurity, says Frank Ahearn, a privacy expert and author of the book 'How to Disappear.'"
Link to Original Source

+ - Verizon Grateful To Researcher Who Spotted Flaw In MyFiOS App->

Submitted by jfruh
jfruh (300774) writes "When Randy Westergren, acting out of curiosity, investigated Verizon's Android MyFiOS app for security vulnerabilities, he spotted some big ones, and let the telecom giant know about them. Somewhat amazingly, Verizon didn't react by punishing the messenger, but rather fixed the problems right away and gave him a free year of FiOS for his trouble."
Link to Original Source

+ - Report: NSA Can Hijack Existing Malware Botnets->

Submitted by jfruh
jfruh (300774) writes "According to a new report derived from the treasure trove of documents leaked by Edward Snowden, the NSA uses hijacks existing criminal botnets for its own purposes. Computers already infected by run-of-the-mill crooks might find themselves repurposed by the NSA, and then launching attacks that would be difficult to trace back to the shadowy security agency."
Link to Original Source

+ - Qualcomm Puts A Kill Switch In A CPU->

Submitted by jfruh
jfruh (300774) writes "Since a smartphone is an easily portable — and easily losable, and easily stealable — device that contains all sorts of personal data, the idea of a remote "kill switch" or wipe solution is a popular one. Now Qualcomm is looking to build the concept right into their next-gen Snapdragon chip, preventing any OS-level workarounds."
Link to Original Source

+ - Google Finally Quashes Month-Old Malvertising Campaign->

Submitted by jfruh
jfruh (300774) writes "Since the middle of December, visitors to sites that run Google AdSense ads have intermittently found themselves redirected to other sites featuring spammy offerings for anti-aging and brain-enhancing products. While webmasters who have managed to figure out which advertisers are responsible could quash the attacks on their AdSense consoles, only now has Google itself managed to track down the villains and ban them from the service."
Link to Original Source

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (7) Well, it's an excellent idea, but it would make the compilers too hard to write.

Working...