Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
Microsoft

FTC: Machinima Took Secret Cash To Shill Xbox One 47

jfruh writes: The Machinima gaming video network took money from a marketing agency hired by Microsoft to pay "influencers" up to $45,000 to promote the Xbox One. Crucially, the video endorsers did not disclose that they'd been paid, which has caused trouble with the FTC. For its part, Machinima notes that this happened in 2013, when the current management was not in charge.
Security

Government Still Hasn't Notified Individuals Whose Personal Data Was Hacked 17

schwit1 writes: Months after the federal government admitted publicly that the personal data of more than 20 million government employees had been hacked they still have not sent notifications to those millions. The agency whose data was hacked, the Office of Personnel Management (OPM), said the Defense Department will begin "later this month" to notify employees and contractors across the government that their personal information was accessed by hackers. OPM said notifications would continue over several weeks and "will be sent directly to impacted individuals." OPM also announced that it hired a contractor to help protect the identities and credit ratings of employees whose data was hacked. In a statement, OPM said it had awarded a contract initially worth more than $133 million to a company called Identity Theft Guard Solutions LLC, doing business as ID experts, for identity theft protections for the 21.5 million victims of the security data breach. The contractor will provide credit and identity monitoring services for three years, as well as identity theft insurance, to affected individuals and dependent children aged under 18, the agency said.
Biotech

New Russian Laboratory To Study Mammoth Cloning 26

An anonymous reader writes: While plans to clone a woolly mammoth are not new, a lab used in a joint effort by Russia and South Korea is. The new facility is devoted to studying extinct animal DNA in the hope of creating clones from the remains of animals found in the permafrost. IBtimes reports: "The Sakha facility has the world's largest collection of frozen ancient animal carcasses and remains, with more than 2,000 samples in its possession, including some that are tens of thousands years old, such as a mammoth discovered on the island of Maly Lyakhovsky; experts believe it may be more than 28,000 years old."

Submission + - New Russian laboratory to study mammoth cloning

An anonymous reader writes: While plans to clone a woolly mammoth are not new, a lab used in a joint effort by Russia and South Korea is. The new facility is devoted to studying extinct animal DNA in the hope of creating clones from the remains of animals found in the permafrost. IBtimes reports: "The Sakha facility has the world's largest collection of frozen ancient animal carcasses and remains, with more than 2,000 samples in its possession, including some that are tens of thousands years old, such as a mammoth discovered on the island of Maly Lyakhovsky; experts believe it may be more than 28,000 years old."
   
United Kingdom

UK Health Clinic Accidentally Publishes HIV Status of 800 Patients 45

An anonymous reader writes: A sexual health clinic in London accidentally disclosed the HIV positive status of almost 800 patients. The Guardian reports: "The health secretary, Jeremy Hunt, has ordered an inquiry into how the NHS handles confidential medical information after the “completely unacceptable” breach of the privacy of hundreds of HIV patients. The 56 Dean Street clinic in London apologized on Wednesday after sending a newsletter on Tuesday which disclosed the names and email addresses of about 780 recipients. The newsletter is intended for people using its HIV and other sexual health services, and gives details of treatments and support.
Security

Despite Reports of Hacking, Baby Monitors Remain Woefully Insecure 65

itwbennett writes: Researchers from security firm Rapid7 have found serious vulnerabilities in nine video baby monitors from various manufacturers. Among them: Hidden and hard-coded credentials providing local and remote access over services like SSH or Telnet; unencrypted video streams sent to the user's mobile phone; unencrypted Web and mobile application functions and unprotected API keys and credentials; and other vulnerabilities that could allow attackers to abuse the devices, according to a white paper released Tuesday. Rapid7 reported the issues it found to the affected manufacturers and to US-CERT back in July, but many vulnerabilities remain unpatched.
Security

Check Point Introduces New CPU-Level Threat Prevention 99

An anonymous reader writes: After buying Israeli startup company Hyperwise earlier this year, Check Point Software Technologies (Nasdaq: CHKP) now unveils its newest solution for defeating malware. Their new offering called SandBlast includes CPU-Level Threat Emulation that was developed in Hyperwise which is able to defeat exploits faster and more accurately than any other solution by leveraging CPU deubgging instruction set in Intel Haswell, unlike known anti-exploitation solutions like kBouncer or ROPecker which use older instruction sets and are therefore bypassable. SandBlast also features Threat Extraction — the ability to extract susceptible parts from incoming documents.
Security

"Extremely Critical" OS X Keychain Vulnerability Steals Passwords Via SMS 82

Mark Wilson writes: Two security researchers have discovered a serious vulnerability in OS X that could allow an attacker to steal passwords and other credentials in an almost invisible way. Antoine Vincent Jebara and Raja Rahbani — two of the team behind the myki identity management security software — found that a series of terminal commands can be used to extract a range of stored credentials. What is particularly worrying about the vulnerability is that it requires virtually no interaction from the victim; simulated mouse clicks can be used to click on hidden buttons to grant permission to access the keychain. Apple has been informed of the issue, but a fix is yet to be issued. The attack, known as brokenchain, is disturbingly easy to execute. Ars reports that this weakness has been exploited for four years.
Programming

You Don't Have To Be Good At Math To Learn To Code 426

HughPickens.com writes: Olga Khazan writes in The Atlantic that learning to program involves a lot of Googling, logic, and trial-and-error—but almost nothing beyond fourth-grade arithmetic. Victoria Fine explains how she taught herself how to code despite hating math. Her secret? Lots and lots of Googling. "Like any good Google query, a successful answer depended on asking the right question. "How do I make a website red" was not nearly as successful a question as "CSS color values HEX red" combined with "CSS background color." I spent a lot of time learning to Google like a pro. I carefully learned the vocabulary of HTML so I knew what I was talking about when I asked the Internet for answers." According to Khazan while it's true that some types of code look a little like equations, you don't really have to solve them, just know where they go and what they do. "In most cases you can see that the hard maths (the physical and geometry) is either done by a computer or has been done by someone else. While the calculations do happen and are essential to the successful running of the program, the programmer does not need to know how they are done." Khazan says that in order to figure out what your program should say, you're going to need some basic logic skills and you'll need to be skilled at copying and pasting things from online repositories and tweaking them slightly. "But humanities majors, fresh off writing reams of term papers, are probably more talented at that than math majors are."
Technology

Second Gen Moto 360 Men's and Women's, Fitness-Oriented Moto 360 Sport Unveiled 37

MojoKid writes: Motorola's first generation Moto 360 smartwatch was one of the first Android Wear smartwatches to hit the market, and because of its round display, became the immediate flag bearer for the Android Wear platform. As new competition has entered the fray — including entries from Apple with the Apple Watch and Samsung with the Gear S2 — Motorola is announcing a second generation smartwatch that solves most of the complaints of the previous model. Motorola has ditched the archaic Texas Instruments OMAP 3 processor in the original Moto 360. The new second generation Moto 360 brings a more credible 1.2GHz, quad-core Qualcomm Snapdragon 400 processor and Adreno 305 graphics to the table. You'll also find 512MB of RAM and 4GB of storage. And if you didn't like the largish dimensions of the previous Moto 360, you'll be glad to know that Motorola is offering two sizes this time around. There's a 46mm diameter case that comes with a 360x330 display and a smaller 42mm diameter case that houses a 360x325 display. Motorola has also introduced a dedicated women's model of the Moto 360 which features a 42mm diameter case and accepts smaller 16mm bands. As for battery life, Motorola says that the men's and women's 42mm models comes with a 300 mAh battery which is good for up to 1.5 days of mixed use, while the 46mm watch comes with a larger 400 mAh battery which is good for up to 2 days on charge.
Open Source

Netflix Open Sources Sleepy Puppy XSS Hunter 8

msm1267 writes: Netflix has released a tool it calls Sleepy Puppy. The tool injects cross-site scripting payloads into a target app that may not be vulnerable, but could be stored in a database and tracks the payload if it's reflected to a secondary application that makes use of the data in the same field. "We were looking for a way to provide coverage on applications that come from different origins or may not be publicly accessible," said co-developer Scott Behrens, a senior application security engineer at Netflix. "We also wanted to observe where stored data gets reflected back, and how data that may be stored publicly could also be reflected in a large number of internal applications." Sleepy Puppy is available on Netflix's Github repository and is one of a slew of security tools its engineers have released to open source.
Businesses

Why Do So Many Tech Workers Dislike Their Jobs? 342

Nerval's Lobster writes: So what if you work for a tech company that offers free lunch, in-house gym, and dry cleaning? A new survey suggests that a majority of software engineers, developers, and sysadmins are miserable. Granted, the survey in question only involved 5,000 respondents, so it shouldn't be viewed as comprehensive (it was also conducted by a company that deals in employee engagement), but it's nonetheless insightful into the reasons why a lot of tech pros apparently dislike their jobs. Apparently perks don't matter quite so much if your employees have no sense of mission, don't have a clear sense of how they can get promoted, and don't interact with their co-workers very well. While that should be glaringly obvious, a lot of companies are still fixated on the idea that minor perks will apparently translate into huge morale boosts; but free smoothies in the cafeteria only goes so far.

Submission + - Bunch of Tech Pros Miserable, It Seems->

Nerval's Lobster writes: So what if you work for a tech company that offers free lunch, in-house gym, and dry cleaning? A new survey suggests that a majority of software engineers, developers, and sysadmins are miserable. Granted, the survey in question only involved 5,000 respondents, so it shouldn't be viewed as comprehensive (it was also conducted by a company that deals in employee engagement), but it's nonetheless insightful into the reasons why a lot of tech pros apparently dislike their jobs (Dice link). Apparently perks don't matter quite so much if your employees have no sense of mission, don't have a clear sense of how they can get promoted, and don't interact with their co-workers very well. While that should be glaringly obvious, a lot of companies are still fixated on the idea that minor perks will apparently translate into huge morale boosts; but free smoothies in the cafeteria only goes so far.
Link to Original Source
Open Source

How Open Film Project "Cosmos Laundromat" Made Blender Better 30

An anonymous reader writes: At the beginning of August the Blender Institute released Cosmos Laundromat: First Cycle, its seventh open project. More than just a 10-minute short film, Cosmos Laundromat is the Blender Institute's most ambitious project, a pilot for the first fully free and open animated feature film. In his article on Opensource.com animator and open source advocate Jason van Gumster highlights the film project and takes a look at some of its most significant contributions to the Blender open source project.
Medicine

Can Living In Total Darkness For 5 Days "Reset" the Visual System? 126

the_newsbeagle writes: That's what one neuroscientist is aiming to find out. He wants to put patients with a type of amblyopia, the vision problem commonly called lazy eye, into the dark for 5 days. His hypothesis: When they emerge, their brains' visual cortices will be temporarily "plastic" and changeable, and may begin to process the visual signals from their bad eyes correctly. Before he could do this study, though, he had to do a test run to figure out logistics. So he himself lived in a pitch black room for 5 days. One finding: Eating ravioli in the dark is hard.

When a fellow says, "It ain't the money but the principle of the thing," it's the money. -- Kim Hubbard

Working...