tsamsoniw writes "In the wake of the most recent zero-day attacks exploiting Flash Player, Adobe claims that it's worked hard to make Player secure — and that most SWF exploits stem from users opening infected Office docs attached to emails. The company has a solution, though: A forthcoming version of Flash Player will detect when it's being launched from Office and will present users with a dialog box with vague warnings of a potential threat."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
dreamstateseven writes "In a not-so-unexpected move, the Department of Homeland Security has concluded that travelers along the nation's borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security. According to legal precedent, the Fourth Amendment — the right to be free from unreasonable searches and seizures — does not apply along the border. The memo highlights the friction between today's reality that electronic devices have become virtual extensions of ourselves housing everything from e-mail to instant-message chats to photos and our papers and effects — juxtaposed against the government's stated quest for national security. By the way, the government contends the Fourth-Amendment-Free Zone stretches 100 miles inland from the nation's actual border."
JG0LD writes "Students at a tiny Appalachian public school can't use Wi-Fi because any such network can throw the radio equivalent of a monkey wrench into a gigantic super-sensitive radio telescope just up the road. GBT's extraordinary sensitivity means that it's very susceptible to human-generated radio interference, according to site interference protection engineer Carla Beaudet. 'If there was no dirt between us and the transmitter, a typical access point ... would have to be on the order of 1,000,000 km [more than 620,000 miles, or about two and a half times the distance from the Earth to the Moon] distant to not interfere. Fortunately, we have mountains around us which provide lots of attenuation, so we're not seeing everything from everywhere,' she said. A standard Wi-Fi access point would wipe out a significant range of usable frequencies for the observatory. 'It simply ruins the spectrum for observations from 2400-2483.5MHz and from 5725-5875MHz for observational purposes,' wrote Beaudet."
MojoKid writes "A few weeks back, we discussed whether a new GPU like the GeForce GTX 660 could breathe new life into an older quad-core gaming system built in mid 2008. The answer concluded was definitely yes — but many readers asked to reconsider the question, this time using a lower-end dual-core Core 2 Duo. The Core 2 Duo CPU chip used was a first-generation C2D part based on Intel's 65nm Conroe core. It's clocked at 3GHz with 4MB of L2 cache and has a 1333MHz FSB. The CPU was paired with 3GB of DDR2-1066 memory. The long and short of it is, you can upgrade the graphics card on a six year-old dual core machine and expect to see a noticeable improvement in game performance — significant gains in fact, up to 50 percent or more."
tsu doh nimh writes "Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms, has suffered a compromise that cuts to the core of its business: helping clients distinguish known 'safe' files from computer viruses and other malicious software. A leading provider of 'application whitelisting' services, Bit9's security technology turns the traditional approach to fighting malware on its head. Antivirus software, for example, seeks to identify and quarantine files that are known bad or strongly suspected of being malicious. In contrast, Bit9 specializes in helping companies develop custom lists of software that they want to allow employees to run, and to treat all other applications as potentially unknown and dangerous. But in a blog post today, the company disclosed that attackers broke into its network and managed to steal the digital keys that Bit9 uses to distinguish good from bad applications. The attackers then sent signed malware to at least three of Bit9's customers, although Bit9 isn't saying which customers were affected or to what extent. The kicker? The firm said it failed to detect the intrusion in part because the servers used to store its keys were not running Bit9's own software."
ewenc writes "Mercenary computer coders are helping scientists cope with the deluge of data pouring out of research labs. A contest to write software to analyze immune-system genes garnered more than 100 entries, including many that vastly outperformed existing programs. The US$6,000 contest was launched by researchers at Harvard Medical School and Harvard Business School, both in Boston, Massachusetts. TopCoder.com, a community of more than 400,000 coders who compete in programming competitions, hosted the contest. The results are described in a letter published this week in Nature Biotechnology."
An anonymous reader writes "[Ars Technica] recently reviewed the documentary The Revisionaries, which chronicles the actions of the Texas state school board as it attempted to rewrite the science and history standards that had been prepared by experts in education and the relevant subjects. For biology, the board's revisions meant that textbook publishers were instructed to help teachers and students 'analyze all sides of scientific information' about evolution. Given that ideas only reach the status of theory if they have overwhelming evidence supporting them, it isn't at all clear what 'all sides' would involve."
New submitter ElDuque writes "Slate's top story today is a long, heavily-researched article about the life of, and case against, Aaron Swartz. It covers the formative years of both Mr. Swartz and the free information / open knowledge movement he felt so strongly about. Quoting: 'Aaron Swartz is a difficult puzzle. He was a programmer who resisted the description, a dot-com millionaire who lived in a rented one-room studio. He could be a troublesome collaborator but an effective troubleshooter. He had a talent for making powerful friends, and for driving them away. He had scores of interests, and he indulged them all. ... He was fascinated by large systems, and how an organization’s culture and values could foster innovation or corruption, collaboration or paranoia. Why does one group accept a 14-year-old as an equal partner among professors and professionals while another spends two years pursuing a court case that’s divorced from any sense of proportionality to the alleged crime? How can one sort of organization develop a young man like Aaron Swartz, and how can another destroy him?'"
Presto Vivace sends this news from the Hill: "House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) said Friday that they plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA) next week during a speech at the Center for Strategic and International Studies in Washington. The bill is aimed at improving information-sharing about cyber threats between government and industry so cyberattacks can be thwarted in real time. ... It would also encourage companies to share anonymous cyber-threat information with one another, and provide liability protection for businesses so they don't get hit with legal action for sharing data about cyber threats. " You may recall CISPA from last year, when it was hailed as being even worse than SOPA, the Stop Online Piracy Act. We discussed why it was a bad bill back then; the new version is reportedly identical, so all of the same reasons will apply. The bill stalled last year against White House plans to veto it. Congressman Rogers said this about privacy fears: "We're talking about exchanging packets of information, zeroes and ones, if you will, one hundred millions times a second. So some notion that this is a horrible invasion of content reading is wrong. It is not even close to that." Don't worry folks; it's just zeroes and ones.
First time accepted submitter NewtonBoxers writes "Considering the amount of time most of us spend at work, it's surprising how few novels are set in the workplace and base their plot on the goings-on there. Perhaps, having spent a long day slaving in the corporate salt mines, many of us would rather forget about such humdrum matters and take refuge in books that offer us more excitement. Others, though, seem to enjoy the humor that can derive from the very things that drive us mad – management incompetence, byzantine procedures, pointless meetings... in short the stuff of everyday office life. We read Dilbert, we watch The Office, and we could do a lot worse than read Augustus Gump's very funny second novel, The Rise and Fall of T. John Dick. " Read on for the rest of NewtonBoxers's review.
New submitter rHBa sends this article about another high-profile email account breach: "The apparent hack of several e-mail accounts has exposed personal photos and sensitive correspondence from members of the Bush family, including both former U.S. presidents. The posted photos and e-mails contain a watermark with the hacker's online alias, 'Guccifer.' ... Included in the hacked material is a confidential October 2012 list of home addresses, cell phone numbers, and e-mails for dozens of Bush family members, including both former presidents, their siblings, and their children. ... Correspondence obtained by the hacker indicates that at least six separate e-mail accounts have been compromised, including the AOL account of Dorothy Bush Koch, daughter of George H.W. Bush and sister of George W. Bush. Other breached accounts belong to Willard Heminway, 79, an old friend of the 41st president who lives in Greenwich, Connecticut; CBS sportscaster Jim Nantz, a longtime Bush family friend; former first lady Barbara Bush’s brother; and George H.W. Bush’s sister-in-law. "
theodp writes "Got Milk? Got Milk Delivery Patent? Perhaps unfamiliar with the concept of the Milkman, the USPTO has granted Amazon.com a patent for the Recurring Delivery of Products , an idea five Amazon inventors came up with to let customers schedule product deliveries to their doorsteps or mailboxes on a recurring basis, without needing to submit a new order every time. 'For instance,' the filing explains, 'a customer may request delivery of one bunch of bananas every week and two gallons of milk every two weeks.'"
Nerval's Lobster writes "The U.S. Department of Justice has just settled with book publisher Macmillan in an ongoing case over the price of e-books, bringing its number of settlements with big-name publishers up to five. Justice claims that those five publishers, along with Apple, agreed to 'raise retail e-book prices and eliminate price competition, substantially increasing prices paid by consumers.' Apple competes fiercely in the digital-media space against Amazon, which often discounts the prices of Kindle e-books as a competitive gambit; although all five publishers earn significant revenues from sales of Kindle e-books, Amazon's massive popularity among book-buyers — coupled with the slow decline of bricks-and-mortar bookstores — gives it significant leverage when it comes to lowering those e-book prices as it sees fit. But Justice and Apple seem determined to keep their court date later this year."
Orome1 writes "Adobe has pushed out an emergency Flash update that solves two critical vulnerabilities (CVE-2013-0633 and CVE-2013-0634) that are being actively exploited to target Windows and OS X users, and is urging users to implement it as soon as possible. According to a security bulletin released on Thursday, the OS X exploit targets Flash Player in Firefox or Safari via malicious Flash content hosted on websites, while Windows users are targeted with Microsoft Word documents delivered as an email attachments which contain malicious Flash content. Adobe has also announced its intention of adding new protections against malicious Flash content embedded in Microsoft Office documents to its next feature release of Flash Player."
schnell writes "The New Statesman is publishing a new in-depth article that examines in detail the seemingly paradoxical nature of WikiLeaks' brave mission of public transparency with the private opaqueness of Julian Assange's leadership. On one hand, WikiLeaks created 'a transparency mechanism to hold governments and corporations to account' when nobody else could or would. On the other hand, WikiLeaks itself was 'guilty of the same obfuscation and misinformation as those it sought to expose, while its supporters are expected to follow, unquestioningly, in blinkered, cultish devotion.' If WikiLeaks performs a public service exposing the secrets of others but censors its own secrets, does it really matter? Or are the ethics of the organization and its leader inseparable?"
walterbyrd writes with news that Microsoft's PR department has started a campaign to convince Gmail users that Google reads your personal emails, referring to Google's automated method of scanning emails for keywords to generate supposedly relevant advertising. "The gist of the scare campaign is that Google is a scary, scary company that reads your private emails in order to send you targeted ads. 'Even if you don't use Gmail, if you send email to someone who does, Google goes through those emails to generate advertising revenue too,' Microsoft warns in material sent to reporters. Oh, and Microsoft points out that six class-action lawsuits have been filed against Google over this issue, and asks people to sign a petition 'to tell Google to stop going through your personal email messages.'"
jones_supa sends this quote from Phoronix: "David Herrmann has provided an update on his ambitious initiative to kill off the Linux kernel console. Herrmann has long been working on making the Linux kernel CONFIG_VT option unnecessary for providing a Linux console by punting it off to user-space. The Linux kernel VT console hasn't been changed much in the past two decades and Herrmann is hoping to see it replaced with a user-space solution he's been developing that would allow for multi-seat support, a hardware-accelerated console, full internalization, and other features."
Andy Prough writes "Apparently those wise folks at Fox have figured out America's reluctance to invest as much money in solar energy as Germany — the Germans simply have more sun! Well, as Will Oremus from Slate points out, according to the U.S. Dept. of Energy's Solar Resource map comparison of the U.S. and Germany, nothing could be further from the truth — Germany receives as much sunlight as the least lit U.S. state — Alaska."
johnsnails writes "Some of the biggest news sites in the world disappeared yesterday when Facebook took over the internet with a redirection bug. Visitors to sites such as The Washington Post, BuzzFeed, the Gawker network, NBC News and News.com.au were immediately transferred to a Facebook error page upon loading their intended site. It was fixed quickly, and Facebook provided this statement: 'For a short period of time, there was a bug that redirected people logging in with Facebook from third party sites to Facebook.com. The issue was quickly resolved, and Login with Facebook is now working as usual.'"
An anonymous reader writes "The New York Times is running a pair of stories about U.S. financial institutions being investigated by the Federal government and courts for alleged systemic and illegal activities that helped bring about the housing crisis and collapse of the world economy in 2008. Emails produced during courtroom discovery reveal that insiders at JP Morgan Chase knew that the bundles of securities they were marketing to investors were rotten with bad loans. And emails show the credit rating agency Standard & Poor's (a division of McGraw-Hill) was determined to stop losing deals to its competitors by being too tough on the banks whose products they were evaluating."
First time accepted submitter admiral snackbar writes "The European Court of Human Rights has declared that the copyright monopoly stands in direct conflict with fundamental Human Rights, as defined in the European Union and elsewhere. 'For the first time in a judgment on the merits, the European Court of Human Rights has clarified that a conviction based on copyright law for illegally reproducing or publicly communicating copyright protected material can be regarded as an interference with the right of freedom of expression and information under Article 10 of the European Convention [on Human Rights]. Such interference must be in accordance with the three conditions enshrined in the second paragraph of Article 10 of the Convention. This means that a conviction or any other judicial decision based on copyright law, restricting a person's or an organization's freedom of expression, must be pertinently motivated as being necessary in a democratic society, apart from being prescribed by law and pursuing a legitimate aim.'"
sciencehabit writes "A new study shows that ant pupae—a stage between larvae and adult—can communicate via sound, and that this communication can be crucial to their survival. The young insects have a specialized spike along their abdomen that they stroke with one of their hind legs, similar to dragging the teeth of a comb along the edge of a table. This noise serves primarily as an emergency beacon, allowing the ants to shout for help when being threatened by a predator."
cylonlover writes "Drones have become a valuable asset for any military force in recent years for both combat and surveillance. But while scanning a warzone from miles away is great from a tactical standpoint, unmanned aircraft can be just as useful in the hands of troops on the ground. That's why British soldiers in Afghanistan have been issued several Black Hornet Nanos, a palm-sized UAV that can scout around corners and obstacles for hidden dangers. Each UAV measures just 4 x 1 inches (10 x 2.5cm) and weighs a mere 0.6 ounces (16 grams), making it easy for troops to carry along with the rest of their gear. A built-in camera transmits live video and still images to a handheld control unit at a range of up to half a mile (800 meters)."
Rick Zeman writes "The Washington Post writes about how vendor fragmentation leads to security vulnerabilities and other exploits. This situation is '...making the world's most popular mobile operating system more vulnerable than its rivals to hackers, scam artists and a growing universe of malicious software' unlike Apple's iOS which they note has widely available updates several times a year. In light of many companies' Bring Your Own Device initiatives 'You have potentially millions of Androids making their way into the work space, accessing confidential documents,' said Christopher Soghoian, a former Federal Trade Commission technology expert who now works for the American Civil Liberties Union. 'It's like a really dry forest, and it's just waiting for a match.'"