×
Communications

Skype Disables Password Resets After Huge Security Hole Discovered 65

another random user writes with news of a vulnerability in the Skype password reset tool "All you need to do is register a new account using that email address, and even though that address is already used (and the registration process does tell you this) you can still complete the new account process and then sign in using that account Info (original post in Russian)" concealment adds a link to another article with an update that Skype disabled the password reset page as a temporary fix.
Hardware Hacking

Fully Open A13-OLinuXino Single-Board Linux Computer 111

Penurious Penguin writes "Via LXer, an article from PCWorld describes the A13-OLinuXino, produced by OLIMEX. Similar, but distinct from the Raspberry Pi, the Linux-powered OLinuXino is touted as 'fully open,' with all CAD files and source-code freely available for both personal and commercial reuse. Its specs include an Allwinner A13 Cortex A8 1GHz processor, 3D Maili400 GPU, 512MB RAM, all packed into a nano-ITX form and fit for operation in industrial environments between -25C and 85C. The device comes with Android 4.0, but is capable of running other Linux distros, e.g., ArchlinuxARM."
Google

Motorola Wants 2.25% of Microsoft's Surface Revenue 278

An anonymous reader writes "On the opening day of a patent trial between Microsoft and Google-owned Motorola Mobility, Motorola filed a brief (PDF) arguing that the WiFi tech central to the case is also critical to Microsoft's new Surface tablet. Motorola says royalties totaling 2.25% of all Surface revenues is a good starting point. They wrote, 'Microsoft's new Surface tablet will use only 802.11, instead of cellular or wired connections, to connect to the internet. Without 802.11 capability, the Surface tablet would be unable to compete in the market, because consumers can readily select tablet devices other than the Surface that have 802.11 capability.' Microsoft, of course, says this figure is outrageous, given 'Motorola's promise to standards bodies to offer access to the "standard essential" patents on fair and reasonable terms.'"
AT&T

Ask Slashdot: AT&T's Data Usage Definition Proprietary? 562

stox writes "As many of you know, AT&T has implemented caps on DSL usage. When this was implemented, I started getting emails letting me know my usage as likely to exceed the cap. After consulting their Internet Usage web page, I felt the numbers just weren't right. With the help of Tomato on my router, I started measuring my usage, and ended up with numbers substantially below what AT&T was reporting on a day-to-day basis. Typically around 20-30% less. By the way, this usage is the sum of inbound and outbound. At this point, I decided to contact AT&T support to determine what exactly they were defining as usage, as their web pages never really define it. Boy, did I get a surprise. After several calls, they finally told me they consider the methodology by which they calculate bandwidth usage to be proprietary. Yes, you read that right; it's a secret. They left me with the option to contact their executive offices via snail mail. Email was not an option. So, I bring my questions to you, all-knowing Slashdotters: are there any laws that require AT&T to divulge how they are calculating data usage? Should I contact my state's commerce commission or the FCC to attempt to get an answer to this?"
Security

Cyberespionage For Everyone 44

Mephistophocles writes "A chilling article by Darkreading's Kelly Jackson Higgins describes how the growing accessibility of hacking tools like RATs (Remote Access Trojans) have made cyber-espionage possible for more than just those financially backed by large nation-states, and speculates on what the implications of this may be: 'Researchers at Norman Security today revealed that they recently analyzed malware used in phishing emails targeting Israeli and Palestinian targets and found that attackers used malware based on the widely available Xtreme RAT crimeware kit. The attacks, which first hit Palestinian targets, this year began going after Israeli targets, including Israeli law enforcement agencies and embassies around the world. Norman says the same attacker is behind the attacks because the attacks use the same command-and-control (C&C) infrastructure, as well as the same phony digital certificates. This attack campaign just scratches the surface of the breadth and spread of these types of attacks around the world as more players have been turning to cyberspying. "We're just seeing the tip of the iceberg," says Einar Oftedal, deputy CTO at Norman.'"
Space

Total Solar Eclipse Bedazzles Northern Australians 52

Penurious Penguin writes "Tuesday at 6:38AM (2038 GMT Tuesday) thousands of Australians witnessed a solar eclipse in northern Queensland, where it was the first total eclipse in over 1000 years for the specific region. The most prominent view occurred in Cairns, while elsewhere in locations such as New Zealand, parts of Indonesia and Australia, partial eclipses were visible. Totality lasted approximately two minutes — video and photos can be seen at Universe Today. Scientists are also taking the opportunity to study both land and aquatic wildlife in affected areas."
Transportation

Airlines Face Acute Pilot Shortage 421

Hugh Pickens writes "The WSJ reports that U.S. airlines are facing their most serious pilot shortage since the 1960s. Federal mandates are taking effect that will require all newly hired pilots to have at least 1,500 hours of prior flight experience — six times the current minimum. This raises the cost and time to train new fliers in an era when pay cuts and more-demanding schedules already have made the profession less attractive. Meanwhile, thousands of senior pilots at major airlines soon will start hitting the mandatory retirement age of 65. 'We are about four years from a solution, but we are only about six months away from a problem,' says Bob Reding, recently retired executive vice president of operations at AMR Corp. A study by the University of North Dakota's aviation department indicates major airlines will need to hire 60,000 pilots by 2025 to replace departures and cover expansion over the next eight years. Meanwhile, only 36,000 pilots have passed the Air Transport Pilot exam in the past eight years, which all pilots would have to pass under the Congressionally imposed rules, and there are limits to the ability of airlines, especially the regional carriers, to attract more pilots by raising wages. While the industry's health has improved in recent years, many carriers still operate on thin profit margins, with the airlines sandwiched between rising costs for fuel and unsteady demand from price-sensitive consumers. 'It certainly will result in challenges to maintain quality,' says John Marshall, an independent aviation-safety consultant who spent 26 years in the Air Force before overseeing Delta's safety. 'Regional carriers will be creative and have to take shortcuts' to fill their cockpits."
Network

French Company Building a Mobile Internet Just For Things 35

holy_calamity writes "France now has a dedicated cellular data network just for Internet-of-Things devices, and the company that built it is rolling out the technology elsewhere, says MIT Technology Review. SigFox's network is slower than a conventional cellular data network, but built using technology able to make much longer range links and operate on unlicensed spectrum. Those features are intended to allow the service to be cheap enough for low cost sensors on energy infrastructure and many other places to make sense, something not possible on a network shared with smartphones and other consumer devices."
Input Devices

Mind-Controlled Robot Avatars Inch Towards Reality 34

Zothecula writes "Researchers at the CNRS-AIST Joint Robotics Laboratory (a collaboration between France's Centre National de la Recherche Scientifique and Japan's National Institute of Advanced Industrial Science and Technology) are developing software that allows a person to drive a robot with their thoughts alone. The technology could one day give a paralyzed patient greater autonomy through a robotic agent or avatar."
Open Source

Oracle Makes Red Hat Kernel Changes Available As Broken-Out Patches 104

Artefacto writes "The Ksplice team has made available a git repository with the changes Red Hat made to the kernel broken down. They are calling this project RedPatch. This comes in response to a policy change Red Hat had implemented in early 2011, with the goal of undercutting Oracle and other vendors' strategy of poaching Red Hat's customers. The Ksplice team says they've been working on these individual patches since then. They claim to be now making it public because they 'feel everyone in the Linux community can benefit from the work.' 'For Ksplice, we build individual updates for each change and rely on source patches that are broken-out, not a giant tarball. Otherwise, we wouldn't be able to take the right patches to create individual updates for each fix, and to skip over the noise — like a change that speeds up bootup — which is unnecessary for an already-running system.'"
Music

Why Dissonant Music Sounds 'Wrong' 183

ananyo writes "Many people dislike the clashing dissonances of modernist composers such as Arnold Schoenberg. But what's our problem with dissonance? There has long been thought to be a physiological reason why at least some kinds of dissonance sound jarring. Two tones close in frequency interfere to produce 'beating': what we hear is just a single tone rising and falling in loudness. If the difference in frequency is within a certain range, rapid beats create a rattling sound called roughness. An aversion to roughness has seemed consistent with the common dislike of intervals such as minor seconds. Yet when cognitive neuroscientist Marion Cousineau of the University of Montreal in Quebec and her colleagues asked amusic subjects (who cannot distinguish between different musical tones) to rate the pleasantness of a whole series of intervals, they showed no distinctions between any of the intervals but disliked beating as much as people with normal hearing. Instead the researchers propose that harmonicity is the key (abstract). Notes contain many overtones — frequencies that are whole-number multiples of the basic frequency in the note. For consonant 'pleasant sounding' intervals the overtones of the two notes tend to coincide as whole-number multiples, whereas for dissonant intervals this is no longer the case. The work suggests that harmonicity is more important than beating for dissonance aversion in normal hearers."
Piracy

App Auto-Tweets False Piracy Accusations 231

An anonymous reader writes "Certain iPhone and iPad applications from a Japanese company have broken software piracy detection mechanisms that are sending out tweets on the user's own Twitter account, saying, 'How about we all stop using pirated iOS apps? I promise to stop. I really will. #softwarepirateconfession.' The trouble is, it's sending these out on accounts of users who actually paid up to $50 or more for the software and who are legally using it. The app is asking for access to users' Twitter accounts, but does not give the reason why it is asking, so the author of the article concluded (rightly) that things were being done deliberately. Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures?"
Google

Government Surveillance Growing, According To Google 105

A reader writes with news that Google has updated is Transparency Report for the sixth time, and the big takeaway this time around is a significant increase in government surveillance. From the article: "In a blog post, Google senior policy analyst Dorothy Chou says, ' [G]overnment demands for user data have increased steadily since we first launched the Transparency Report.' In the first half of 2012, the period covered in the report, Chou says there were 20,938 inquiries from government organizations for information about 34,614 Google-related accounts. Google has a long history of pushing back against governmental demands for data, going back at least to its refusal to turn over search data to the Department of Justice in 2005. Many other companies have chosen to cooperate with government requests rather than question or oppose them, but Chou notes that in the past year, companies like Dropbox, LinkedIn, Sonic.net and Twitter have begun making government information requests public, to inform the discussion about Internet freedom and its limits. According to the report, the U.S. continues to make the most requests for user data, 7,969 in the first six months of the year. Google complied with 90% of these requests. Google's average compliance rate for the 31 countries listed in the report is about 47%."
AMD

AMD Hires Bank To Explore Sale Options 226

Dainsanefh tips this report from Reuters: "Advanced Micro Devices has hired JPMorgan Chase & Co to explore options, which could include a potential sale, as the chipmaker struggles to find a role in an industry increasingly focused on mobile and away from traditional PCs, according to three sources familiar with the situation. ... Some investors believe part or all of AMD could be bought by a technology company that might want to emulate Apple Inc's tight control of software and components, a strategy credited in part for the success of the iPad and iPhone. Microsoft Corp, Google Inc, Samsung Electronics, Intel Corp and even Facebook Inc have been suggested by Wall Street analysts as potential suitors that could benefit from some of AMD's chip business, including its graphics division, PC processors and server chips. Others say AMD's most valuable asset may be its deep bench of engineers or its patents." Update: 11/14 01:44 GMT by S : In an emailed statement, an AMD representative said the company "is not actively pursuing a sale of the company or significant assets at this time."
Crime

In Mississippi: 15-Year Jail Sentence For Selling Pirated Movies and Music 339

New submitter patella.whack writes "A guilty plea for six counts of selling counterfeit media gets a defendant 15 years in Mississippi. An undercover reporter from the Attorney General's Intellectual Property Theft Task Force managed to buy a total of five copied movies and one music CD from the defendant, who had 10,500 pirated discs at home and two prior convictions: one for assaulting a police officer 17 years ago and one for CD piracy that got him a year under house arrest. Says the RIAA: '[This] highlights the fact that the individuals engaging in these activities are frequently serial criminals for whom IP theft is simply the most convenient and profitable way they could steal from others.' Frequently serial criminals? 15 years? I wonder how much of his sentence can be attributed to his priors rather than to other factors."

Slashdot Top Deals