Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Medicine

How a 3D Printer Let a Dog Run For the First Time 4

Posted by timothy
from the dogs-have-been-running-since-forever dept.
Nerval's Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology's potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade.

+ - How a 3D Printer Let a Dog Run for the First Time->

Submitted by Nerval's Lobster
Nerval's Lobster (2598977) writes "Ever since 3-D printing began to enter the mainstream, people have discussed the technology’s potential for building prosthetic arms and legs for human beings. But what about doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a congenital deformity that deprived him of front paws, is outfitted with a pair of 3-D-printed prosthetics. With those "legs" in place, the dog can run for the first time, at a pretty good clip. Both the prosthetics and the video were produced by 3D Systems, which builds 3-D printers, and it seems likely that other 3-D-printing companies will explore the possibility of printing off parts for pets. And while the idea of a cyborg pooch is heartwarming, it will be interesting to see how 3D printers will continue to advance the realm of human prosthetics, which have become increasingly sophisticated over the past decade."
Link to Original Source

+ - Warblers Hear Tornadoes Coming from Hundreds of Miles Away

Submitted by HughPickens.com
HughPickens.com (3830033) writes "Osvaldo Nunez reports that a recent study out of UC Berkeley says that golden-winged warblers can predict the coming of storms and tornadoes while the closest tornado is still hundreds of miles away. In April, a massive thunderstorm ravaged central and southern United States, causing more than $1 billion in damage across 17 states. The birds nest and breed around the Great Lakes and the Appalachian Mountains every summer. After flying 1,500-miles down to Tennessee, two days before the storms, flocks of songbirds and golden-winged warblers departed the areas and flew 900-miles to Florida and Cuba. They escaped just south of the tornadoes' path — and then went straight home again. By May 2, five tagged birds were back in their nesting area. "At the same time that meteorologists on The Weather Channel were telling us this storm was headed in our direction, the birds were apparently already packing their bags and evacuating the area," says Henry Streby.

The most likely tip-off was the deep rumble that tornadoes produce, well below what humans can hear. Noise in this "infrasound" range travels thousands of kilometers, and may serve as something of an early warning system for animals that can pick it up. "It's very unlikely that this species is the only group doing this," says Streby. The new study is the first time that migratory birds have been seen taking such dramatic evasive action. "We know that birds can alter their route to avoid things during regular migration. But it hadn't been shown before that they would leave once the migration is over, and they'd established their breeding territory, to escape severe weather." With the predicted increase in severity and frequency of similar storms as anthropogenic climate change progresses, understanding large-scale behavioral responses of animals to such events will be an important objective of future research."
Security

Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony 65

Posted by timothy
from the forewarned-is-forearmed dept.
wiredmikey writes Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise. While not mentioning Sony by name in its advisory, instead referring to the victim as a "major entertainment company," US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks. According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool. US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations.

+ - Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

Submitted by wiredmikey
wiredmikey (1824622) writes "Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise.

While not mentioning Sony by name in its advisory, instead referring to the victim as a “major entertainment company,” US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks.

According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool.

US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations."

Google News Sci Tech: Obama vows US response to North Korea over Sony cyber attack - Reuters->

From feed by feedfeeder

Reuters

Obama vows US response to North Korea over Sony cyber attack
Reuters
WASHINGTON (Reuters) - President Barack Obama vowed on Friday to respond to a devastating cyber attack on Sony Pictures that he blamed on North Korea, and scolded the Hollywood studio for caving in to what he described as a foreign dictator imposing...
Sony made a mistake: ObamaThe Australian (blog)

all 13,468 news articles

Link to Original Source

Google News Sci Tech: Obama Vows a Response to Cyberattack on Sony - New York Times->

From feed by feedfeeder

New York Times

Obama Vows a Response to Cyberattack on Sony
New York Times
WASHINGTON — President Obama said on Friday that the United States “will respond proportionally” against North Korea for its destructive cyberattacks on Sony Pictures, but he criticized the Hollywood studio for giving in to intimidation when it withdrew “The...
Sony hack: Obama and Lynton point fingers on surreal dayLos Angeles Times
Think North Korea hacked Sony? Think about thisPCWorld
Obama declares US will retaliate against North Korea for hacking attack on SonySydney Morning Herald
BBC News-Reuters-Huffington Post
all 13,445 news articles

Link to Original Source
Businesses

Staples: Breach May Have Affected 1.16 Million Customers' Cards 62

Posted by timothy
from the your-name-here dept.
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.

+ - Staples: Breach may have affected 1.16 million customers' cards->

Submitted by mpicpp
mpicpp (3454017) writes "The office-supply retailer gave new details about a breach at more than 100 of its stores.

Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October.

The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers’ credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached.

Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers’ names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said."

Link to Original Source

Google News Sci Tech: Sued by Google, a State Attorney General Retreats - New York Times->

From feed by feedfeeder

New York Times

Sued by Google, a State Attorney General Retreats
New York Times
Attorney General Jim Hood of Mississippi on Friday agreed to call a “time out” in his fight with Google after the Internet giant filed a lawsuit accusing him of conspiring with the movie industry. The move by Mr. Hood, who has been one Google's most outspoken...
Google sues Mississippi Attorney General 'for doing the MPAA's dirty work'The Register
As Its Battle With Hollywood Returns, Google Takes Aim at Mississippi Attorney ... Wired
Google Sues Mississippi Over Campaign to Restrict SearchesWall Street Journal
Businessweek-MiamiHerald.com-Ars Technica
all 140 news articles

Link to Original Source

Google News Sci Tech: Hyperloop May Become a Crowd-Sourced Reality Within a Decade - NBCNews.com->

From feed by feedfeeder

Entrepreneur

Hyperloop May Become a Crowd-Sourced Reality Within a Decade
NBCNews.com
Billionaire industrialist Elon Musk's fantastical "Hyperloop" mass transit system, revealed last year as a potential alternative to high-speed railways, may actually get itself built. Hyperloop Transportation Technologies, a company dedicated to making the...
Startup: Musk's 'hyperloop' is feasible and should be nationwideSFGate
Elon Musk's Hyperloop Could Be Just 10 Years AwayHuffington Post
Hyperloop design progress makes Elon Musk's dream a possible realityUPI.com
Weekly Citizen-Load The Game-Silicon Valley Business Journal
all 36 news articles

Link to Original Source

Google News Sci Tech: Google Sues Mississippi Over Campaign to Restrict Searches - Wall Street Journal->

From feed by feedfeeder

Fortune

Google Sues Mississippi Over Campaign to Restrict Searches
Wall Street Journal
Google Inc. sued Mississippi Attorney General Jim Hood on Friday, seeking to prevent him from enforcing a wide-ranging subpoena that has become entangled in a dispute between Google and Hollywood. Filed in U.S. District Court for Southern Mississippi,...
Google Says Mississippi Sales Probe Amounts to CensorshipBusinessweek
As Its Battle With Hollywood Returns, Google Takes Aim at Mississippi Attorney ... Wired
Google files lawsuit against Mississippi attorney general to block subpoenaCNET
Huffington Post-MediaPost Communications-WHLT22
all 132 news articles

Link to Original Source
Cellphones

T-Mobile To Pay $90M For Unauthorized Charges On Customers' Bills 43

Posted by timothy
from the oh-you-wanted-honesty dept.
itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.

Man will never fly. Space travel is merely a dream. All aspirin is alike.

Working...