Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - LG G3 'Snap' vulnerability leaves owners at risk of data theft (betanews.com)

Mark Wilson writes: Security researchers have discovered a vulnerability in LG G3 smartphones which could be exploited to run arbitrary JavaScript to steal data. The issue has been named Snap, and was discovered by Israeli security firms BugSec and Cynet.

What is particularly concerning about Snap is that it affects the Smart Notice which is installed on all LG G3s by default. By embedding malicious script in a contact, it is possible to use WebView to run server side code via JavaScript. If exploited, the vulnerability could be used to gather information from SD cards, steal data from the likes of WhatsApp, and steal private photos.

Submission + - Microsoft has your encryption key if you use Windows 10 (theintercept.com) 1

An anonymous reader writes: The fact that new Windows devices require users to backup their recovery key on Microsoft’s servers is remarkably similar to a key escrow system, but with an important difference. Users can choose to delete recovery keys from their Microsoft accounts (you can skip to the bottom of this article to learn how) – something that people never had the option to do with the Clipper chip system. But they can only delete it after they’ve already uploaded it to the cloud.

and..

As soon as your recovery key leaves your computer, you have no way of knowing its fate. A hacker could have already hacked your Microsoft account and can make a copy of your recovery key before you have time to delete it. Or Microsoft itself could get hacked, or could have hired a rogue employee with access to user data. Or a law enforcement or spy agency could send Microsoft a request for all data in your account, which would legally compel them to hand over your recovery key, which they could do even if the first thing you do after setting up your computer is delete it. As Green puts it, “Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”

Comment Re:Why though? (Score 1) 509

I work in a remote mining camp in northern Saskatchewan (that's in Canada for the geographically unaware). I bring my X-Box 360 to game for a few hours after my 12 hour shift. There is no internet there. With the X-Box One, how am I supposed to use it? Well I guess I can't. I am not alone, there is quite a few people who also bring their gaming devices to work. Other than working out or satellite TV there is nothing to do here when you are not working. There is multitudes of reasons why having a always on connection is unacceptable for many people.

Comment Re:For what (Score 2) 377

If I bought a shed and then lost the keys in a fishing accident, would it be wrong of me to get a locksmith to come and drill the lock out and replace it with another functioning one? Or would I have to buy a new shed because I lost the locking mechanism. I cannot believe and will not agree that losing a license key means I lose access to the product I bought. I will use a keygen or a crack in order to use my product if I do not have the "key".

Submission + - Chistopher Hitchens passes away (bbc.co.uk)

Things_falling_apart writes: Noted atheist and writer Christopher Hitchens has passed from pneumonia. Always controversial, the world has lost a leading intellectual, one who devoted an entire lifetime to change the world. Whether you loved or hated him, we should all take a moment to reflect on this loss and be inspired to do our best to make the world a better place, as he would have wanted.
Software

Submission + - New Call Center Software Will Knows When You're An 2

Hugh Pickens writes writes: "The Telegraph reports that researchers have developed new voice recognition software that detects how users are feeling that could be used in automated call centers to route inquiries differently according to the emotional state of the caller. The researchers looked closely at the anger, boredom and doubt that people often experience when talking to automated call center voices and by examining tone of voice, the speed of speech, the duration of pauses, the energy of the voice signal and up to a total of sixty different ‘acoustic parameters’, they have produced computer models of what people sound like according to the emotions they are feeling. “Thanks to this new development, the machine will be able to determine how the user feels and how the caller intends to continue the dialog (PDF)”, claims David Griol one of its creators. "For example, a dialog management strategy could be as follows: If the emotional state is Angry apologize and transfer the call to a human operator immediately.""

Comment Re:Phil Plait is not a bad astronomer (Score 1) 84

His original site was all about debunking myths and misconceptions related to astronomy. Here is the link to his original site: http://www.badastronomy.com/index.html He changed to a blog format when he joined the discover magazine network. His name refered to him pointing out bad astronomy in the movies and TV. Not really all that hard to understand why he has his name. He got pretty well known and discover magazine put him on the payroll and since he was well known, he kept his moniker.

Comment Re:Inflated Membership Numbers (Score 1) 265

Because the media leaves their parents basement once in a while and notices in every direction in a reasonably populated area that there is either:
a) multiple conversations that the word facebook comes up every 3rd sentence
b) sees someone using their internet connected device (ie - smartphone, Ipad, DSi, netbook, etc) on facebook.

My suggestion is leave the house once in a while.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...