Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Space

It's Official: Voyager 1 Is an Interstellar Probe 218

astroengine writes "After a 35-year, 11-billion mile journey, NASA's Voyager 1 spacecraft left the solar system to become the first human-made object to reach interstellar space, new evidence from a team of scientists shows. 'It's kind of like landing on the moon. It's a milestone in history. Like all science, it's exploration. It's new knowledge,' long-time Voyager scientist Donald Gurnett, with the University of Iowa, told Discovery News. The first signs that the spacecraft had left the solar system's heliopause was a sudden drop in solar particles and a corresponding increase in cosmic rays in 2012, but this evidence alone wasn't conclusive. Through indirect means, scientist analyzing oscillations along the probe's 10-meter (33-foot) antennas were able to deduce that Voyager was traveling through a less dense medium — i.e. interstellar space." You can watch NASA's briefing on the probe's progress here.

Submission + - First Gear Mechanism Discovered in Nature (phys.org)

GameboyRMH writes: A gear mechanism has been discovered for the first time in nature in the nymph of the Issus, a small plant-hopping insect common in Europe. It uses the gears to synchronize the movement and power of its hind legs, forcing the legs to propel it in a straight line when jumping, which would otherwise be impossible for the insect if it had to control the timing and force of its leg muscles independently. The journal paper is paywalled but you can read a summary at phys.org.

Submission + - HP ZDI Dangles $300,000 for Mobile OS Zero-Days (securityweek.com)

wiredmikey writes: HP's Zero Day Initiative (ZDI) is dangling more than $300,000 in cash to entice hackers to demonstrate zero-day attacks against the Apple iOS, Android, Windows RT and BlackBerry mobile platforms.

As part of this year's Mobile Pwn2Own hacker challenge, ZDI is partnering with Google and Android to gather intelligence on realistic attacks against the most widely deployed smart phones.

The organizers plan to pay as much as $100,000 for exploits that target the baseband layer of mobile devices and $70,000 for a full code execution compromise of messaging services like SMS, MMS or CMAS. Attacks against short-distance technologies like Bluetooth, Wi-FI, USB or Near Field Communications (NFC) will pay out $50,000 while mobile web browser compromises will fetch $40,000.

According to HP ZDI's Brian Gorenc, successful attacks must require "little or no user interaction" and must demonstrate remote code execution by bypassing sandboxes (if applicable) and exfiltrating sensitive information, silently calling long-distance numbers, or eavesdropping on conversations. All vulnerabilities used in the attack must be unpublished zero-days.

Mobile Pwn2Own will form part of the PacSec Applied Security Conference in Tokyo, Japan later this year.

Cellphones

Video Apple Has a Lot In Common With The Rolling Stones (Video) 147

Tech journalist Ron Miller (not a relative) wrote a piece titled Apple has a lot in common with The Rolling Stones, based on the song It's Only Rock 'N' Roll (But I Like It). In the article, Ron writes: "Much like the Rolling Stones, Apple has to get up on stage again and again and figure out a way to blow the audience away – and it’s not always easy." In fact, Apple's latest iPhone announcement seems to have been greeted with a massive "ho hum" instead of the frenzied interest some of their earlier product announcements have created. In today's video, Ron tells us why he thinks this is, and ruminates briefly about the future of Apple and what kinds of products might help people get excited about Apple again.
Cellphones

Video Apple Has a Lot In Common With The Rolling Stones (Video) 147

Tech journalist Ron Miller (not a relative) wrote a piece titled Apple has a lot in common with The Rolling Stones, based on the song It's Only Rock 'N' Roll (But I Like It). In the article, Ron writes: "Much like the Rolling Stones, Apple has to get up on stage again and again and figure out a way to blow the audience away – and it’s not always easy." In fact, Apple's latest iPhone announcement seems to have been greeted with a massive "ho hum" instead of the frenzied interest some of their earlier product announcements have created. In today's video, Ron tells us why he thinks this is, and ruminates briefly about the future of Apple and what kinds of products might help people get excited about Apple again.

Submission + - It's Official: Voyager 1 is an Interstellar Probe (discovery.com)

astroengine writes: After a 35-year, 11-billion mile journey, NASA’s Voyager 1 spacecraft left the solar system to become the first human-made object to reach interstellar space, new evidence from a team of scientists shows. “It’s kind of like landing on the moon. It’s a milestone in history. Like all science, it’s exploration. It’s new knowledge,” long-time Voyager scientist Donald Gurnett, with the University of Iowa, told Discovery News. The first signs that the spacecraft had left the solar system's heliopause was a sudden drop in solar particles and a corresponding increase in cosmic rays in 2012, but this evidence alone wasn't conclusive. Through indirect means, scientist analyzing oscillations along the probe's 10-meter (33-foot) antennas were able to deduce that Voyager was traveling through a less dense medium — i.e. interstellar space.

Submission + - First DOSBox Powered Classics Trickle Into Linux Via Steam (thepowerbase.com)

An anonymous reader writes: Now, one year later, developer Night Dive Studios has brought 2 DOS classics to Linux by packaging DOSBox and the respective game content together into one spiffy little steam installer! While it’s not certain why GOG is not able to make this sort of effort, one thing should definitely be expected; more classic games making a legitimate and monetized appearance in Linux.

Submission + - Verizon's Plan To Turn The Web Into Pay-Per-View

snydeq writes: InfoWorld's Bill Snyder writes of Verizon's diabolical plan to to charge websites for carrying their packets — a strategy that, if it wins out, will be the end of the Internet as we know it. 'Think of all the things that tick you off about cable TV. Along with brainless programming and crummy customer service, the very worst aspect of it is forced bundling. ... Now, imagine that the Internet worked that way. You'd hate it, of course. But that's the direction that Verizon, with the support of many wired and wireless carriers, would like to push the Web. That's not hypothetical. The country's No. 1 carrier is fighting in court to end the Federal Communications Commission's policy of Net neutrality, a move that would open the gates to a whole new — and wholly bad — economic model on the Web.'
Chrome

Here Come the Chromebooks, As Google and Intel Cozy-Up On Haswell 139

MojoKid writes "News from Intel (and Google) today includes an announcement that more Chromebooks are on their way to market packing Intel's Haswell processors. The new chips are designed to consume less power, thus preserving battery life for an all-day charge, while still offering better overall performance. Google notes that there are schools in over 20% of school districts across the country that now use Chromebooks, and with prices for some of the machines dipping as low as $199, deploying fleets of these machines in academia is an attractive option. What's interesting is the alignment between Intel and Google now, which should cause folks in Redmond to smart a bit, as yet another major competitor to the Windows operating system seems to clearly be coming into focus. Intel-Google partners including Acer, ASUS, HP, and Toshiba will be rolling out Chromebooks based on Haswell soon, and they'll collectively be sporting more variety of form factors."

Submission + - Ask Slashdot: Can We Still Trust FIPS?

someSnarkyBastard writes: It has already been widely reported that the NSA has subverted several major encryption standards but I have not seen any mention of how this affects the FIPS 140-2 standard. Can we still trust these cyphers? They have been cleared for use by the US Government for Top-Secret clearance documents; surely the government wouldn't backdoor itself right?...Right?

Submission + - Red Hat Launches Red Hat Software Collections

An anonymous reader writes: From the press release:

This morning, Red Hat launched Red Hat Software Collections 1.0, an extension to the Red Hat Enterprise Linux platform which delivers the newest, most stable versions of open source runtime components. Supported on a three-year lifecycle separate from RHEL, Red Hat Software Collections provides access to the newest open source dynamic languages and database while still delivering the stability of the RHEL platform.

Red Hat Software Collections 1.0 includes:

- Dynamic programming languages for modern web application development: Ruby 1.9.3 with Rails 3.2.8, PHP 5.4, Python 3.3 and 2.7, Perl 5.16.3, and node.js 0.10 (delivered as a Technology Preview); and

- Runtime databases: MariaDB 5.5, MySQL 5.5, and PostgreSQL 9.2
Social Networks

Social Media Is a New Vector For Mass Psychogenic Illness 373

Hugh Pickens DOT Com writes "There is an interesting read at the Atlantic where Laura Dimon writes that mass psychogenic illness, historically known as "mass hysteria"—is making a comeback and it appears that social media is a new vector for its spread. Mass hysteria such as the Salem Witch Trials of 1692-1693, the most widely recognized episode of mass hysteria in history, which ultimately saw the hanging deaths of 20 women, spreads through sight and sound, and historically, one person would have to be in the same room as somebody exhibiting symptoms to be at risk of 'catching' the illness. 'Not anymore,' says Robert Bartholomew, a sociologist who has studied over 600 cases of mass hysteria dating back to 1566, noting that social media — 'extensions of our eyes and ears' — speeds and extends the reach of mass hysteria. 'Epidemic hysterias that in earlier periods were self-limited in geography now have free and wide access to the globe in seconds,' says Bartholomew. 'It's a belief, that's the power here, and the technology just amplifies the belief, and helps it spread more readily.' In a recent case, nearly 20 students at a Western New York Junior-Senior High school began experiencing involuntary jerks and tics. Some believe that the Le Roy outbreak was a direct result of videos posted to YouTube by Lori Brownell, a girl with severe tics in Corinth, New York, 250 miles east of Le Roy. The story took off quickly, not just on the local and national news but on Facebook and autism blogs and sites devoted to mental health and environmental issues. Bartholomew warns that there is 'potential for a far greater or global episode, unless we quickly understand how social media is, for the first time, acting as the primary vector or agent of spread for conversion disorder.'"
Businesses

Michael Dell To Buy Dell Inc. 175

awarrenfells writes "After a shareholder vote, Michael Dell is expected to buy out and take Dell Inc. private. This move comes in the wake of plans to move Dell into position as an enterprise computing provider, but some analysts state this move may have come too late, much of the target market being taken by IBM and HP already." Nerval's Lobster provides some more details at Slash Cloud: "[T]he final buyout price was $13.75 a share, which includes a 13-cent-a-share “special dividend.” All told, that puts the deal’s price at $24.9 billion. In order to reach this point, Dell and Silver Lake had to fend off activist investor Carl Icahn and investment firm Southeastern Asset Management, which made their own combined play for a restructured capitalization. In a series of public letters, Icahn argued that Dell’s privatization proposal undervalued the company, and—at least until the beginning of September—made it very clear that he was willing to fight things out in court. By convincing the shareholders that his plan is the best route forward, Dell avoids what could have devolved into a very protracted and messy battle. Michael Dell wants to focus the majority of the company’s efforts on services, essentially remaking it into a tech firm more along the lines of IBM."

Submission + - IETF floats draft PRISM-proof security considerations (paritynews.com)

hypnosec writes: PRISM-Proof Security Considerations, a draft proposal to make it harder for governments to implement and carry out surveillance activities like PRISM, has been floated by the Internet Engineering Task Force (IETF). The draft highlights security concerns as a result of government sponsored PRISM-like projects and the security controls that may be put into place to mitigate the risks of interception capabilities. Authored by Phillip Hallam-Baker of the Comodo Group the draft is however very sparse on details on how the Internet can be PRISM-proofed.
Businesses

Insider Steals Data of 2 Million Vodafone Germany Customers 40

wiredmikey writes "Vodafone Germany said on Thursday that an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany. 'This criminal attack appears to have been executed by an individual working inside Vodafone,' the company said in a statement provided to SecurityWeek. 'An individual has been identified by the police and their assets have been seized.' The company said the attack was discovered on September 5, but said authorities had requested that the breach remained under wraps while an investigation was conducted. The data accessed by the attacker includes customer names, addresses, gender, birth dates, bank account numbers and bank sort codes, the telecommunications giant said. Vodafone said credit card numbers, passwords, PINs, and mobile phone numbers were not exposed, and no personal call information or browsing data was accessed."

Slashdot Top Deals

MESSAGE ACKNOWLEDGED -- The Pershing II missiles have been launched.

Working...