×
Programming

Should Functional Programming Be the Future of Software Development? (ieee.org) 5

The CTO of a software company argues the software industry's current trajectory "is toward increasing complexity, longer product-development times, and greater fragility of production systems" — not to mention nightmarish problems maintaining code.

"To address such issues, companies usually just throw more people at the problem: more developers, more testers, and more technicians who intervene when systems fail. Surely there must be a better way," they write in IEEE Spectrum. "I'm part of a growing group of developers who think the answer could be functional programming...." Today, we have a slew of dangerous practices that compromise the robustness and maintainability of software. Nearly all modern programming languages have some form of null references, shared global state, and functions with side effects — things that are far worse than the GOTO ever was. How can those flaws be eliminated? It turns out that the answer has been around for decades: purely functional programming languages....

Indeed, software based on pure functions is particularly well suited to modern multicore CPUs. That's because pure functions operate only on their input parameters, making it impossible to have any interactions between different functions. This allows the compiler to be optimized to produce code that runs on multiple cores efficiently and easily....

Functional programming also has a solution to Hoare's "billion-dollar mistake," null references. It addresses that problem by disallowing nulls. Instead, there is a construct usually called Maybe (or Option in some languages). A Maybe can be Nothing or Just some value. Working with Maybe s forces developers to always consider both cases. They have no choice in the matter. They must handle the Nothing case every single time they encounter a Maybe. Doing so eliminates the many bugs that null references can spawn.

Functional programming also requires that data be immutable, meaning that once you set a variable to some value, it is forever that value. Variables are more like variables in math...

Pure functional programming solves many of our industry's biggest problems by removing dangerous features from the language, making it harder for developers to shoot themselves in the foot.... I anticipate that the adoption of pure functional languages will improve the quality and robustness of the whole software industry while greatly reducing time wasted on bugs that are simply impossible to generate with functional programming. It's not magic, but sometimes it feels like that, and I'm reminded of how good I have it every time I'm forced to work with a non-functional codebase.

Education

Survey Reveals the Most-Regretted (and Least-Regretted) College Majors (cnbc.com) 25

A report from the Georgetown's Center on Education and the Workforce found that Bachelor's degree holders generally earn 84% more than those with just a high school diploma, reports CNBC.

"Still, 44% of all job seekers with college degrees regret their field of study." Journalism, sociology, communications and education all topped the list of most-regretted college majors, according to ZipRecruiter's survey of more than 1,500 college graduates who were looking for a job. "When you are barely managing to pay your bills, your paycheck might become more important." Of graduates who regretted their major, most said that, if they could go back, they would now choose computer science or business administration instead.

All in, the top-paying college majors earn $3.4 million more than the lowest-paying majors over a lifetime.

Graduates entering the workforce with good career prospects and high starting salaries are the most satisfied with their field of study, job site ZipRecruiter also found. Computer science majors, with an average annual starting salary of almost $100,000, were the happiest overall, according to ZipRecruiter. Students who majored in criminology, engineering, nursing, business and finance also felt very good about their choices.

Science

'Iceman' Discovery Wasn't a Freak Event. More Frozen Mummies May Await (science.org) 8

In 2001 Slashdot ran a story about a 5,100-year-old "ice mummy" discovered in the Alps. But now researchers are arguing that our assumptions about how weather, climate, and glacial ice conspired to preserve it were all wrong. Science magazine reports: In 1991, hikers in the Alps came across a sensational find: a human body, partially encased in ice, at the top of a mountain pass between Italy and Austria. Police called to the scene initially assumed the man had died in a mountaineering accident, but within weeks archaeologists were arguing he was actually the victim of a 5100-year-old murder.

They were right: Later dubbed Ötzi after the Ötztal Valley nearby, the man's body is the oldest known "ice mummy" on record.... But Ötzi's preservation may not be as unusual as it first seemed, archaeologists argue in a paper published today. And that could mean more bodies from the distant past are waiting to emerge as ice melts in a warming climate.

Ötzi "was such a huge surprise when he was found people thought he was a freak event," says Lars Pilø, an archaeologist working for the Oppland County Glacier Archaeological Program in Norway. But many of the original assumptions about how weather, climate, and glacial ice conspired to preserve him were wrong, Pilø; and other researchers write in the journal The Holocene. "This paper sheds new light on the interpretation of this exceptional archaeological find," says Matthias Huss, a glaciologist at ETH Zürich, who was not part of the team....

"The general understanding was that Ötzi marked this beginning of a cooler period," Huss says, "as people were sure that [he] must have been within the ice without interruption since his death." But with the retreat of glaciers and ice patches around the world over the past few decades, other ancient remains have emerged, including bodies, hunting equipment, horse manure, and skis. "No one expected similar sites," says Thomas Reitmaier, an archaeologist at the Archaeological Service of the Canton of Grisons in Switzerland and a co-author of the new study. "Now, we have lots, and we find this one fits quite well with the picture of glacial archaeology we've developed."

Thanks to Slashdot reader sciencehabit for sharing the story.
The Military

After 908 Days in Orbit, US Military's X-37B Space Plane Finally Lands (space.com) 10

After 908 days in orbit, the U.S. military's X-37B space plane finally touched down today in Florida, reports Space.com.

And "the Boeing-built space plane also carried a service module on the newly completed mission, a first for the U.S. Space Force's X-37B program." "With the service module added, this was the most we've ever carried to orbit on the X-37B, and we're proud to have been able to prove out this new and flexible capability for the government and its industry partners," Jim Chilton, senior vice president at Boeing Space and Launch, said in a statement today.

The X-37B resembles NASA's now-retired space shuttle but is much smaller, measuring just 29 feet (8.8 meters) from nose to tail. The space shuttle was 122 feet (37 m) long and was piloted — another key difference, as the X-37B is autonomous.

The U.S. Space Force is thought to own two X-37B vehicles, both of which were provided by Boeing. To date, the duo has flown six orbital missions, each of which is known by the signifier OTV ("Orbital Test Vehicle"):

OTV-1: Launched on April 22, 2010 and landed on Dec. 3, 2010 (duration 224 days).
OTV-2: March 5, 2011 to June 16, 2012 (468 days).
OTV-3: Dec. 11, 2012 to Oct. 17, 2014 (674 days).
OTV-4: May 20, 2015 to May 7, 2015 (718 days).
OTV-5: Sept. 7, 2017 to Oct. 27, 2019 (780 days).
OTV-6: May 17, 2020 to Nov. 12, 2022 (908 days).

Programming

NVIDIA Security Team: 'What if We Just Stopped Using C?' (adacore.com) 141

This week the Adacore blog shared a story about the NVIDIA Security Team: Like many other security-oriented teams in our industry today, they were looking for a measurable answer to the increasingly hostile cybersecurity environment and started questioning their software development and verification strategies. "Testing security is pretty much impossible. It's hard to know if you're ever done," said Daniel Rohrer, VP of Software Security at NVIDIA.

In my opinion, this is the most important point of the case study — that test-oriented software verification simply doesn't work for security. Once you come out of the costly process of thoroughly testing your software, you can have a metric on the quality of the features that you provide to the users, but there's not much you can say about security.

Rohrer continues, "We wanted to emphasize provability over testing as a preferred verification method." Fortunately, it is possible to prove mathematically that your code behaves in precise accordance with its specification. This process is known as formal verification, and it is the fundamental paradigm shift that made NVIDIA investigate SPARK, the industry-ready solution for software formal verification.

Back in 2018, a Proof-of-Concept (POC) exercise was conducted. Two low-level security-sensitive applications were converted from C to SPARK in only three months. After an evaluation of the return on investment, the team concluded that even with the new technology ramp-up (training, experimentation, discovery of new tools, etc.), gains in application security and verification efficiency offered an attractive trade-off. They realized major improvements in the security robustness of both applications (See NVIDIA's Offensive Security Research D3FC0N talk for more information on the results of the evaluation).

As the results of the POC validated the initial strategy, the use of SPARK spread rapidly within NVIDIA. There are now over fifty developers trained and numerous components implemented in SPARK, and many NVIDIA products are now shipping with SPARK components.

Medicine

Lucid Dying: Patients Recall Near-Death Experiences During CPR (scitechdaily.com) 133

"Around 20% of people who survive cardiopulmonary resuscitation (CPR) after cardiac arrest may describe lucid experiences of death that occurred while they were seemingly unconscious and on the brink of death," reports SciTechDaily.

"This is according to new research led by investigators at NYU Grossman School of Medicine and elsewhere." Long-time Slashdot reader InfiniteZero shared their report: Included in the study were 567 men and women whose hearts stopped beating while hospitalized and who received CPR between May 2017 and March 2020 in the United States and the United Kingdom.... Survivors reported having unique lucid experiences, including a perception of separation from the body and observing events without pain or distress. They also reported a meaningful evaluation of life, including of their actions, intentions, and thoughts toward others. The researchers found these experiences of death to be different from hallucinations, dreams, delusions, illusions, or CPR-induced consciousness.

Tests for hidden brain activity were also included in the research. A key finding was the discovery of spikes of brain activity, including so-called gamma, delta, theta, alpha, and beta waves up to an hour into CPR. Some of these brain waves normally occur when people are conscious and performing higher mental functions, including thinking, memory retrieval, and conscious perception. "These recalled experiences and brain wave changes may be the first signs of the so-called near-death experience, and we have captured them for the first time in a large study," says Sam Parnia, MD, PhD, the lead study investigator and an intensive care physician, who is also an associate professor in the Department of Medicine at NYU Langone Health, as well as the organization's director of critical care and resuscitation research."Our results offer evidence that while on the brink of death and in a coma, people undergo a unique inner conscious experience, including awareness without distress...."

"These lucid experiences cannot be considered a trick of a disordered or dying brain, but rather a unique human experience that emerges on the brink of death," says Parnia. As the brain is shutting down, many of its natural braking systems are released. Known as disinhibition, this provides access to the depths of a person's consciousness, including stored memories, thoughts from early childhood to death, and other aspects of reality. While no one knows the evolutionary purpose of this phenomenon, it clearly reveals "intriguing questions about human consciousness, even at death," says Parnia.

Electronic Frontier Foundation

Aaron Swartz Day Commemorated With International Hackathon (eff.org) 18

Long-time Slashdot reader destinyland shares this announcement from the EFF's DeepLinks blog:

This weekend, EFF is celebrating the life and work of programmer, activist, and entrepreneur Aaron Swartz by participating in the 2022 Aaron Swartz Day and Hackathon. This year, the event will be held in person at the Internet Archive in San Francisco on Nov. 12 and Nov. 13. It will also be livestreamed; links to the livestream will be posted each morning.

Those interested in attending in-person or remotely can register for the event here.

Aaron Swartz was a digital rights champion who believed deeply in keeping the internet open. His life was cut short in 2013, after federal prosecutors charged him under the Computer Fraud and Abuse Act (CFAA) for systematically downloading academic journal articles from the online database JSTOR. Facing the prospect of a long and unjust sentence, Aaron died by suicide at the age of 26....

Those interested in working on projects in Aaron's honor can also contribute to the annual hackathon, which this year includes several projects: SecureDrop, Bad Apple, the Disability Technology Project (Sat. only), and EFF's own Atlas of Surveillance. In addition to the hackathon in San Francisco, there will also be concurrent hackathons in Ecuador, Argentina, and Brazil. For more information on the hackathon and for a full list of speakers, check out the official page for the 2022 Aaron Swartz Day and Hackathon.

Speakers this year include Chelsea Manning and Cory Doctorow, as well as Internet Archive founder Brewster Kahle, EFF executive director Cindy Cohn, and Creative Commons co-founder Lisa Rein.
The Courts

Prosecutors Seek 15-Year Prison Sentence for Theranos' Elizabeth Homes, $800M Restitution (theguardian.com) 86

"Federal prosecutors are asking a judge to sentence Elizabeth Holmes to 15 years in prison," reports the Guardian, "and require the Theranos founder to pay $800m in restitution, according to court documents filed on Friday." A jury found Holmes guilty in January of four counts of investor fraud and conspiracy. Her sentencing is scheduled for 18 November, and she faces a maximum 20 years in prison. Prosecutors argued that "considering the extensiveness of Holmes's fraud", their recommended sentencing would "reflect the seriousness of the offenses, provide for just punishment for the offenses, and deter Holmes and others".

Holmes's lawyer argued in documents filed on Thursday that the ex-Theranos boss should not be sentenced to prison at all and, at most, should receive 18 months of house arrest. The court filings argued that Holmes had been made a "caricature to be mocked and vilified" by the media over the years, though she is a caring mother and friend.

"Ms Holmes is no danger to the public," Holmes's lawyer said in the court documents. "She has no criminal history, has a perfect pretrial services compliance record, and is described by the people who know her repeatedly as a gentle and loving person who tries to do the right thing."

Sci-Fi

'Three-Body Problem' Animation Sci-Fi Series Starts Next Month (gizmodo.com) 38

"Cixin Liu's sci-fi novel The Three-Body Problem can't stop jumping to other formats," reports Gizmodo: In addition to next year's Netflix series from The Terror: Infamy's Alexander Woo and Game of Thrones creators David Benioff and DB Weiss, last year saw the release of a serialized podcast (different from the audiobook version).

And for 2022, we've got an animated series that's premiering actually pretty soon.

Come December 3, an anime version of The Three-Body Problem will release on the Chinese streaming platform Bilibili. This series was originally announced in 2019 with a trailer, but things have been fairly quiet on that front up until now. Developed by CG studio YHTK Entertainment in partnership with The Three-Body Universe, a studio built specifically for the purpose of managing the franchise, a new trailer for the upcoming anime was released earlier in the week during a Bilibili anime showcase.

"Having enjoyed the book, I think it looks promising," writes Slashdot reader Camembert. The 2008 book was the first in Liu's hard sci-fi series Remembrance of Earth's Past — and according to Gizmodo, this is just the beginning: Bilibili's adaptation is the first of a larger initiative called the Three-Body Global Creator Project. Per the press release, animation studios across the world are permitted to explore the Remembrance franchise to showcase its global potential through various art and animation styles....

And if animation or Netflix aren't your bag, Tencent Video has made a live action version of The Three-Body Problem, though that version has yet to receive a release date.

United States

How Close Was America's FBI to Deploying Pegasus Spyware? (yahoo.com) 41

In a statement in February, America's Federal Bureau of Investigation "confirmed that it obtained NSO Group's powerful Pegasus spyware" back in 2019, reported the Guardian. At the time the FBI added that "There was no operational use in support of any investigation, the FBI procured a limited licence for product testing and evaluation only."

"But dozens of internal F.B.I. documents and court records tell a different story," the New York Times reported today: The documents, produced in response to a Freedom of Information Act lawsuit brought by The New York Times against the bureau, show that F.B.I. officials made a push in late 2020 and the first half of 2021 to deploy the hacking tools — made by the Israeli spyware firm NSO — in its own criminal investigations. The officials developed advanced plans to brief the bureau's leadership, and drew up guidelines for federal prosecutors about how the F.B.I.'s use of hacking tools would need to be disclosed during criminal proceedings. It is unclear how the bureau was contemplating using Pegasus, and whether it was considering hacking the phones of American citizens, foreigners or both. In January, The Times revealed that F.B.I. officials had also tested the NSO tool Phantom, a version of Pegasus capable of hacking phones with U.S. numbers.

The F.B.I. eventually decided not to deploy Pegasus in criminal investigations in July 2021, amid a flurry of stories about how the hacking tool had been abused by governments across the globe. But the documents offer a glimpse at how the U.S. government — over two presidential administrations — wrestled with the promise and peril of a powerful cyberweapon. And, despite the F.B.I. decision not to use Pegasus, court documents indicate the bureau remains interested in potentially using spyware in future investigations. "Just because the F.B.I. ultimately decided not to deploy the tool in support of criminal investigations does not mean it would not test, evaluate and potentially deploy other similar tools for gaining access to encrypted communications used by criminals," stated a legal brief submitted on behalf of the F.B.I. late last month....

The specifics of why the bureau chose not to use Pegasus remain a mystery, but American officials have said that it was in large part because of mounting negative publicity about how the tool had been used by governments around the world.

The Times also notes two responses to their latest report. U.S. Senator Ron Wyden complained the FBI's earlier testimony about Pegasus was incomplete and misleading, and that the agency "owes Americans a clear explanation as to whether the future operational use of NSO tools is still on the table."

But an F.B.I. spokeswoman said "the director's testimony was accurate when given and remains true today — there has been no operational use of the NSO product to support any FBI investigation."

Thanks to long-time Slashdot reader crazyvas for suggesting the story.
Iphone

Apple Sued for Allegedly Deceiving Users With Privacy Settings (gizmodo.com) 30

"Apple is facing a class action lawsuit for allegedly harvesting iPhone user data even when the company's own privacy settings promise not to," reports Gizmodo: The suit, filed Thursday in California federal court, comes days after Gizmodo exclusively reported on research into how multiple iPhone apps send Apple analytics data, regardless of whether the iPhone Analytics privacy setting is turned on or off. The problem was spotted by two independent researchers at the software company Mysk, who found that the Apple App Store sends the company exhaustive information about nearly everything a user does in the app, despite a privacy setting, iPhone Analytics, which claims to "disable the sharing of Device Analytics altogether" when switched off.

Gizmodo asked the researchers to run additional tests on other iPhone apps, including Apple Music, Apple TV, Books, and Stocks. The researchers found that the problem persists across most of Apple's suite of built-in iPhone apps....

[I]n the tests, turning the iPhone Analytics setting off had no evident effect on the data collection, nor did any of the iPhone's other built-in settings meant to protect your privacy from Apple's data collection. Mysk's tests on the App Store found that Apple receives that data along with details that can identify you and your device, including ID numbers, what kind of phone you're using, your screen resolution, your keyboard languages and how you're connected to the internet — the kind of information commonly used for device fingerprinting.

Encryption

Introducing Shufflecake: Plausible Deniability For Multiple Hidden Filesystems on Linux (kudelskisecurity.com) 78

Thursday the Kudelski Group's cybersecurity division released "a tool for Linux that allows creation of multiple hidden volumes on a storage device in such a way that it is very difficult, even under forensic inspection, to prove the existence of such volumes."

"Each volume is encrypted with a different secret key, scrambled across the empty space of an underlying existing storage medium, and indistinguishable from random noise when not decrypted." Even if the presence of the Shufflecake software itself cannot be hidden — and hence the presence of secret volumes is suspected — the number of volumes is also hidden. This allows a user to create a hierarchy of plausible deniability, where "most hidden" secret volumes are buried under "less hidden" decoy volumes, whose passwords can be surrendered under pressure. In other words, a user can plausibly "lie" to a coercive adversary about the existence of hidden data, by providing a password that unlocks "decoy" data.

Every volume can be managed independently as a virtual block device, i.e. partitioned, formatted with any filesystem of choice, and mounted and dismounted like a normal disc. The whole system is very fast, with only a minor slowdown in I/O throughput compared to a bare LUKS-encrypted disk, and with negligible waste of memory and disc space.

You can consider Shufflecake a "spiritual successor" of tools such as Truecrypt and Veracrypt, but vastly improved. First of all, it works natively on Linux, it supports any filesystem of choice, and can manage up to 15 nested volumes per device, so to make deniability of the existence of these partitions really plausible.

"The reason why this is important versus "simple" disc encryption is best illustrated in the famous XKCD comic 538," quips Slashdot reader Gaglia (in the original submission. But the big announcement from Kudelski Security Research calls it "a tool aimed at helping people whose freedom of expression is threatened by repressive authorities or dangerous criminal organizations, in particular: whistleblowers, investigative journalists, and activists for human rights in oppressive regimes.

"Shufflecake is FLOSS (Free/Libre, Open Source Software). Source code in C is available and released under the GNU General Public License v3.0 or superior.... The current release is still a non-production-ready prototype, so we advise against using it for really sensitive operations. However, we believe that future work will sensibly improve both security and performance, hopefully offering a really useful tool to people who live in constant danger of being interrogated with coercive methods to reveal sensitive information.
Earth

US Will Regulate Methane Leaks from Oil and Gas to Fight Climate Change (msn.com) 99

Methane traps about 80 times as much heat as carbon, the Washington Post points out. So Friday at the UN's Climate Change conference, America's Environmental Protection Agency "unveiled an updated proposal to regulate methane seeping from pipes and other equipment maintained by the U.S. oil and gas industry, the country's biggest industrial source of the potent greenhouse gas." The proposal, which was partially released during last year's climate conference in Glasgow, Scotland, would be the first time the federal government requires existing facilities to find and fix methane leaks. "These are critical, common sense standards that will protect workers, protect communities ... and make very sharp cuts in dangerous pollutants that threaten our planet," EPA Administrator Michael EPA [Administrator Michael] Regan said at a news conference in Egypt.

Under the proposal, the agency is seeking to compel oil and gas operators to use remote sensors to quickly address leaks and to require states to develop plans to curb methane from older wells. Gathering feedback from the industry over the past year, the EPA plans to offer companies more flexibility in how they monitor for leaks. Federal regulators will also establish a program to respond to blowouts and other "super-emitter" events, allowing third-party groups to help quickly identify major leaks. Officials say the regulations will reduce U.S. greenhouse gas emissions by one percentage point below 2005 levels, adding to the roughly 40 percent cut expected to come from the Inflation Reduction Act passed earlier this year. A methane fee program included in that legislation would require oil and gas to pay for all emissions above a certain threshold — providing an incentive for operators to abide by the new regulations, Regan said.

The rule should also help the country fulfill the "Global Methane Pledge" — a U.S.-backed effort to curb emissions of the potent greenhouse gas 30 percent by 2030. Although more than 100 nations have signed on to the pledge since it was launched in 2021, a recent World Meteorological Organization report found that methane emissions this year are rising faster than ever before...Three of the world's t op five methane emitters — China, India and Russia — have not joined the initiative....

The United Nations on Friday also announced the launch of a public satellite system to detect major methane releases from the power, waste and agricultural sectors.

Advertising

KFC Blames Semi-Automated Bot for Insensitive App Alert on Kristallnacht (bbc.com) 115

"KFC has apologised after sending a promotional message to customers in Germany, urging them to commemorate Kristallnacht with cheesy chicken," reports the BBC. The Nazi-led series of attacks in the country in 1938 left more than 90 people dead, and destroyed Jewish-owned businesses and places of worship. It is widely seen as the beginning of the Holocaust....

The fast-food chain sent an app alert on Wednesday, saying: "It's memorial day for Kristallnacht! Treat yourself with more tender cheese on your crispy chicken. Now at KFCheese!"

Around an hour later another message was sent with an apology, according to the Bild newspaper. "We are very sorry, we will check our internal processes immediately so that this does not happen again. Please excuse this error," the message is reported to have said.

The fast food chain "apologized for the error," reports the Jerusalem Post, "explaining that they 'use a semi-automated content creation process linked to calendars that include national observances.'" "In this instance, our internal review process was not properly followed, resulting in a non-approved notification being shared." Calling the mistake "obviously wrong, insensitive and unacceptable," KFC Germany added that they "have suspended app communications while we examine our current process to ensure such an issue does not occur again.
Australia

After Ransomware Gang Releases Sensitive Medical Data, Australia Vows Consequences (sbs.com.au) 51

Last week Australia's bigest health insurer, Medibank, said that data on all 4 million of its customers was breached. Now the group behind that breach "have since released more sensitive details of customers' medical records on the dark web, including data on abortions and alcohol issues," reports Australia's public broadcaster.

Their article points out that the release "follows Medibank's refusal to pay a ransom for the data, with almost 500,000 health claims stolen, along with personal information." But what's really interesting is that article's headine:

" 'Hunt down the scumbags': Australian government to 'hack the hackers' behind Medibank breach" The Australian government is going to "hunt down the scumbags" responsible for the Medibank hack that compromised the private information of nearly 10 million customers, cyber security minister Clare O'Neil said.... "Around 100 officers around these two organisations will be a part of this joint standing operation, and many of these officers will be physically co-located from the Australian Signals Directorate," she said. Ms. O'Neil said the officers will "show up to work every day" with the "goal of bringing down these gangs and thugs".

"This is the formalisation of a partnership — a standing body within the Australian government which will day in, day out, hunt down the scumbags who are responsible for these malicious crimes against innocent people," she said. "The smartest and toughest people in our country are going to hack the hackers...."

Australian Federal Police Commissioner Reece Kershaw on Friday said officers were also working with Interpol to track down the criminals. "We know who you are," he said. "The AFP has some significant runs on the scoreboard when it comes to bringing overseas offenders back to Australia to face the justice system."

One Australian think tank told the Associated Press that the breach was caused by a stolen username and password, sold on a Russian dark web forum. "In a tweet, Australian Prime Minister Anthony Albanese, whose own Medibank data was stolen, said the Australian Federal Police knows where the hackers are and are working to bring them to justice," reports TechCrunch: The cybercriminals claimed that they initially sought $10 million in ransom from Medibank before reducing the sum to $9.7 million, or $1 per affected customer, the blog said. "Unfortunately, we expect the criminal to continue to release stolen customer data each day," Medibank CEO David Koczkar said on Friday. "These are real people behind this data and the misuse of their data is deplorable and may discourage them from seeking medical care."
Thanks to long-time Slashdot reader schwit1 for sharing the story.

Slashdot Top Deals