An anonymous reader points out this Science Daily report: "Researchers ... have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. They have devised a new algorithm that calls into question the security of one variant of this problem, which has been closely studied since 1976. The result ... discredits several cryptographic systems that until now were assumed to provide sufficient security safeguards. Although this work is still theoretical, it is likely to have repercussions especially on the cryptographic applications of smart cards, RFID chips , etc."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
An anonymous reader writes "Reuters reports that Apple and Google's Motorola Mobility unit are settling all patent lawsuits over smartphone tech. The settlement 'does not include a cross license to their respective patents,' and the companies will work together for patent reform. According to Reuters, 'The two companies informed a federal appeals court in Washington that the cases should be dismissed, according to filings on Friday. However, the deal does not appear to apply to Apple's litigation against Samsung Electronics Co Ltd, as no dismissal notices were filed in those cases. The most high-profile case between Apple and Motorola began in 2010. Motorola accused Apple of infringing several patents, including one essential to how cell phones operate on a 3G network, while Apple said Motorola violated its patents to certain smartphone features.'"
An anonymous reader writes "A new FCC report (PDF) has found that U.S. cable TV prices are rising at four times the rate of inflation over the past two decades. 'Basic cable service prices increased by 6.5 percent [to $22.63] for the 12 months ending January 1, 2013. Expanded basic cable prices increased by 5.1 percent [to $64.41] for those 12 months, and at a compound average annual rate of 6.1 percent over the 18-year period from 1995-2013. ... These price increases compare to a 1.6 percent increase in general inflation as measured by the CPI (All Items) for the same one-year period.' Equipment prices rose faster than inflation, too. The report also found that the price increases weren't helped by competition — in fact, the prices rose faster where there were competing providers than in areas where the main provider had no effective competition."
Nemo the Magnificent writes: " Everybody knows software development is a young man's game, right? Here's a guy who hires and manages programmers, and he says it's not about age at all — it's about skills, period. 'It's each individual's responsibility to stay fresh in the field and maintain a modern-day skillset that gives any 28-year-old a run for his or her money. ... Although the ability to learn those skills is usually unlimited, the available time to learn often is not. "Little" things like family dinners, Little League, and home improvement projects often get in the way. As a result, we do find that we face a shortage of older, more seasoned developers. And it's not because we don't want older candidates. It's often because the older candidates haven't successfully modernized their developer skills.' A company that actively works to offer all employees the chance to learn and to engage with modern technologies is a company that good people are going to work for, and to stay at."
An anonymous reader writes: "Ouya, the Kickstarted, Android-based gaming console, had a much easier time selling people the idea of a mini-console than selling people on the console itself. Once people got over the excitement of seeing an indie console break into the market, they asked, 'Wait, why would I want to play Android games on my living room TV?' Almost a year has passed, and we're finally seeing an answer to that question: party gaming. It's one thing to play a console against your friends online, but when you get a bunch of people in the same room, most console games are too deep and complex to just pick up and play in a fun, semi-competitive way. The person who owns the fighting game is going to mop the floor with everyone else. Mobile games, on the other hand, are often incredibly simple, and Ouya forces every game to have a free trial, so you can easily weed out the ones that aren't good for groups. For example: 'In Hidden In Plain Sight, your character is one ninja lost in a sea of CPU-controlled ninjas with exactly the same texture. In the first few seconds, you have to walk left, right, up, down, anything that will let you understand which of the characters on the screen is yours. Once you've got that, you have to figure out your opponents. Any move that doesn't look like it's performed by the AI could give you away.'"
clm1970 sends news that researchers from Mayo Clinic have successfully put a patient's cancer into remission using a modified measles virus. The researchers are quick to note that further trials are needed to determine whether these results are repeatable. Here are the two academic papers. "Multiple myeloma in a 49-year-old woman seemed to disappear after she received an extremely high-dose injection of a measles virus engineered to kill the cancer cells. Multiple myeloma affects immune cells called plasma cells, which concentrate in the soft tissue, or marrow, inside bones. A second woman also with multiple myeloma began responding to the therapy, but her cancer eventually returned. Four other patients who received the high-dose therapy had no response. .. [Dr. Stephen Russell] and colleagues believe the two women who showed some response had few or no circulating measles antibodies, which might eliminate the engineered virus before it has a chance to kill the cancer cells. The therapy will now enter a mid-stage trial to see whether more patients with low circulating antibodies respond to high-doses of the virus, he said."
msm1267 writes: "Researchers have discovered previously unreported problems in SNMP on embedded devices where devices such as secondary-market home routers and a popular enterprise-grade load balancer are leaking authentication details in plain text. The data could be extracted by gaining access to the read-only public SNMP community string, which enables outside access to device information. While only vulnerabilities in three brands were disclosed today, a Shodan search turns up potentially hundreds of thousands of devices that are exposing SNMP to the Internet that could be equally vulnerable."
Daniel_Stuckey writes: "A homemade Lithuanian drone was reportedly being used to smuggle cigarettes into Russia, meaning that organized crime has beaten Amazon to the punch in the quest to deliver desirable products to customers aerially. Russia has 'detained' the drone, a spokesman with the Kaliningrad border department of the Russian Federal Security service told one of Russia's largest news organizations earlier this week. It's not the first time drones have been used to smuggle products — back in November, people tried to smuggle drugs into a prison in Georgia; the same thing happened in Sao Paolo back in March and in Quebec last fall. Basically, people have learned that drones are good at carrying things."
cartechboy writes: "Tesla seems to be doing quite well these days, but one bond trader thinks the company should quit making electric cars and focus efforts on making batteries instead. Bond manager Jeffrey Gundlach says he's already tried to meet with Elon Musk to persuade him to take the battery-only route. Speaking to Bloomberg, he said Tesla could be 'wildly transformational' in the same way electricity and electromagnets were at the advent of their discovery. Enough people are interested in Tesla's vehicles that Musk probably won't take Gundlach's advice. Should he?"
jfruh writes: "AMD has never been able to match Intel for profits or scale, but a decade ago it was in front on innovation — the first to 1GHz, the first to 64-bit, the first to dual core. A lack of capital has kept the company barely holding on with cheap mid-range chips since; but now AMD is flush with cash from its profitable business with gaming consoles, and is preparing an ambitious new architecture for 2016, one that's distinct from the x86/ARM hybrid already announced."
coondoggie writes "NASA today said it would fund the technology fixes required to make its inoperative Kepler space telescope active again and able to hunt for new planets and galaxies. Kepler, you may recall, was rendered inoperable after the second of four gyroscope-like reaction wheels, which are used to precisely point the spacecraft for extended periods of time, failed last year, ending data collection for the original mission. The spacecraft required three working wheels to maintain the precision pointing necessary to detect the signal of small Earth-sized exoplanets."
First time accepted submitter Dufflepod (3656815) writes "After yet another hardware purchase last week, I realized with some alarm just how drastically an enterprising burglar could increase the crapulence quotient of my life if they ever made off with my hardware. The house is alarmed, but much to my annoyance it isn't always set when people go out for any length of time. Ideally I want to 'alarm' the expensive items among my various PCs, UPS, NAS box, test equipment, and some of the sundry other gadgets & gizmos I require to stroke my inner geek. Over the past few days I have spent hours Googling for every combination of "anti-theft perimeter alarm radius motion detector vibration wireless" etc etc.. I have found various possible solutions, though the cost of some of them does make my eyes water (eg SonicShock @ €150/box). Has anyone out there decided to bite-the-bullet and protect their kit with decent alarms, and do you have any suggested 'do's & don'ts'?" So how would you secure valuable items, as opposed to securing the entire place?
An anonymous reader writes with some snippets pulled from a lengthy Q&A session at The New Yorker with former NSA head Keith Alexander, in which Alexander defends the collection of metadata by U.S. spy agencies both abroad and within the United States: "The probability of an attack getting through to the United States, just based on the sheer numbers, from 2012 to 2013, that I gave you—look at the statistics. If you go from just eleven thousand to twenty thousand, what does that tell you? That's more. That's fair, right? [..] These aren't my stats. The University of Maryland does it for the State Department. [...] The probability is growing. What I saw at N.S.A. is that there is a lot more coming our way. Just as someone is revealing all the tools and the capabilities we have. What that tells me is we're at greater risk. I can't measure it. You can't say, Well, is that enough to get through? I don't know. It means that the intel community, the military community, and law enforcement are going to work harder."
davecb (6526) writes "At Guido von Rossum's urging, Mike Bland has a look at detecting and fixing the "goto fail" bug at ACM Queue. He finds the same underlying problem in both in the Apple and Heartbleed bugs, and explains how to not suffer it again." An excerpt: "WHY DIDN'T A TEST CATCH IT? Several articles have attempted to explain why the Apple SSL vulnerability made it past whatever tests, tools, and processes Apple may have had in place, but these explanations are not sound, especially given the above demonstration to the contrary in working code. The ultimate responsibility for the failure to detect this vulnerability prior to release lies not with any individual programmer but with the culture in which the code was produced. Let's review a sample of the most prominent explanations and specify why they fall short. Adam Langley's oft-quoted blog post13 discusses the exact technical ramifications of the bug but pulls back on asserting that automated testing would have caught it: "A test case could have caught this, but it's difficult because it's so deep into the handshake. One needs to write a completely separate TLS stack, with lots of options for sending invalid handshakes.""
As reported by TheNextWeb, the extended outage of the authentication mechanism of Adobe's Creative Cloud service has been resolved. From the story: 'According to a series of tweets: 'Adobe ID issue is resolved. We are bringing services back online. We will share more details once we confirm everything is working.' Adobe said further, 'We have restored Adobe login services and all services are now online. We will be sharing a complete update on the outage soon.' and 'We know we let you down. We apologize and are working to ensure it doesn't happen again."' A good time to revisit this prediction from last year about how going to an all-cloud, all-subscription model might hurt customers.
jfruh (300774) writes "The EFF has released its annual "Who Has Your Back" report, which uses publicly available records to see which web companies do the most to resist government demands for your personal data, by requiring warrants and being transparent about requests received. Social media giants Facebook and Twitter scored quite well; Snapchat was at the bottom of the list, and Amazon and AT&T didn't do much better." Here's the report itself.
Sockatume (732728) writes "The resignation of Prof. Lennart Bengtsson from an anti-global-warming think tank has triggered widespread outrage in the British tabloids, with the University of Bristol Professor blaming his departure on a 'witch-hunt' environment amongst climate scientists and the rejection of one of his papers. The UK's Times quotes a passage from the reviewer comments in support of this, in which it is claimed that the paper was rejected for being 'unhelpful to their cause.' In response, that journal's publisher has taken the rare step of publishing the referees' report in full. The report describes Bengtsson's paper as a 'simplistic comparison of ranges from AR4, AR5, and Otto et al [data sets], combined with the statement they they are inconsistent,' 'where no consistency was to be expected in the first place' and therefore is not publishable research. The referee adds a number of possible areas of discussion which would allow Bengtsson to make the same data into a publishable paper, but warns that publishing it in its current state 'opens the door for oversimplified claims of errors and worse from the climate sceptics media.'"
Raystonn (1463901) writes "Toshiba has announced the integration of Bitcoin support in their touch-screen point-of-sale platform, VisualTouch, used by over 6,000 merchants. The merchants will now be able to accept Bitcoin payments at the register from anyone with a smartphone or any other QR code reader. Acceptance of Bitcoin as a payment method frees merchants from worries of fraudulent chargebacks, as Bitcoin payments are non-reversible just like cash, while allowing settlement deposits in any of 9 currencies, including USD and Bitcoin."
schwit1 (797399) writes "When it rains it pours: A Russian Proton rocket crashed Friday nine minutes after launch. Considering the tensions between the U.S. and Russia over space, combined with the increasing competition for the launch market created by SpaceX's lower prices, another Proton failure now is something the Russians could do without. Moreover, the Russians were planning a lot of Proton launches in the next few months to catch up from last year's launch failure. Many of these scheduled launches were commercial and were going to earn them hard cash. This failure definitely hurts, and will certainly be used as justification by their government in increase its control over that country's aging aerospace industry."
SmartAboutThings (1951032) writes "After it was long rumored and discussed about, the ability to text 911 in case of emergency is slowly rolling out in the United States to subscribers of AT&T, Sprint, T-Mobile and Verizon Wireless. For the time being, the service is available in areas of Colorado, Georgia, Illinois, Indiana, Iowa, Maine, Maryland, Montana, New York, North Carolina, Ohio, Pennsylvania, South Carolina, Texas, Vermont and Virginia. According to the FCC, the service will gradually roll out to more areas and by the end of this year, virtually anyone with a cellphone and enough service will be able to make use of it. Which means that all carriers will support it." TechCrunch has a deeper article that explains why "you probably can't use it yet," and links to the FCC's own explanation of the service.
Hugh Pickens DOT Com (2995471) writes "Jane Wakefield reports at BBC that a man convicted of possessing child abuse images is among the first to request Google remove links links to pages about his conviction after a European court ruled that an individual could force it to remove 'irrelevant and outdated' search results. Other takedown requests since the ruling include an ex-politician seeking re-election who has asked to have links to an article about his behaviour in office removed and a doctor who wants negative reviews from patients removed from google search results. Google itself has not commented on the so-called right-to-be-forgotten ruling since it described the European Court of Justice judgement as being 'disappointing'. Marc Dautlich, a lawyer at Pinsent Masons, says that search engines might find the new rules hard to implement. 'If they get an appreciable volume of requests what are they going to do? Set up an entire industry sifting through the paperwork?' says Dautlich. 'I can't say what they will do but if I was them I would say no and tell the individual to contact the Information Commissioner's Office.' The court said in its ruling that people could request the removal of data related to them that seem to be 'inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed.'"
schwit1 (797399) writes "Jupiter's trademark Great Red Spot — a swirling storm feature larger than Earth — is shrinking. This downsizing, which is changing the shape of the spot from an oval into a circle, has been known about since the 1930s, but now these striking new NASA/ESA Hubble Space Telescope images capture the spot at a smaller size than ever before."
anzha (138288) writes "After sponsoring a NASCAR racer, DogeCoin's community has wondered, 'What next?' The answer is literally 'To The Moon!' RevUp Render is sponsoring a DogeCoin promoting micro rover challenge, the Lunar Iditarod. The micro rovers, called DogeSleds, are the size of an smart phone and will be first qualified and then raced here on Earth. The top three competitors will be placed on a Google Lunar X PRIZE team's lunar lander to conduct a short, nine meter race on the moon itself. Registration opens on May 21st and closes July 31st for the first race. The first quarterly race will take place September 5th through September 7th. The event will be public and in the San Francisco Bay Area. All teams, international and American, are welcome, but be forewarned, all fees are in...dogecoin!"
StartsWithABang (3485481) writes "You've all had the experience: you're all excited to microwave your favorite snack. So you pull it out of the freezer, you throw it in, and you let it rip. A minute or two later, you pull it out, and there it is: boiling on the outside, frozen in the middle. Finally, a physicist answers the eternal question: why do microwaved foods remain frozen on the inside when they reach scalding temperatures on the outskirts? Starts With A Bang explains the whole phenomenon. Bonus for the crisping sleeve explanation!"