Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Only usable in some jurisdictions (Score 1) 186

AC posts! Stranger Danger!

In all seriousness though, I do entirely agree with this comment. The widespread education via parents, schools, even advertisements warning of these things just doesn't seem to exist anymore. Seeing how with the internet and other tech advances, these dangers have only grown, it seems odd that we are no longer teaching the children how to recognize and avoid these situations.

Comment Re:Only usable in some jurisdictions (Score 1) 186

If the person doesn’t appear to be interested in talking to the chatbot, it gets more insistent about having a conversation

The above quote from the article is what makes me curious if it could be considered entrapment. If the person doesn't seem interested, the bot gets more persistent and will start bringing up topics that might "peak the chatter's interest."

Submission + - Dwarf Planet Ahoy! Spacecraft Spies Pluto and Charon (discovery.com)

astroengine writes: As NASA’s New Horizons probe powers through interplanetary space, it’s keeping a careful eye forward, watching its target gradually loom larger on the proverbial celestial horizon. But earlier this month the spacecraft spotted something right next to Pluto — a pixelated Charon, the dwarf planet’s largest moon. “The image itself might not look very impressive to the untrained eye, but compared to the discovery images of Charon from Earth, these ‘discovery’ images from New Horizons look great!” said New Horizons Project Scientist Hal Weaver, of the Johns Hopkins University Applied Physics Laboratory, Laurel, MD. “We’re very excited to see Pluto and Charon as separate objects for the first time from New Horizons.”

Submission + - iPhone Apparently Open To Old Wi-Fi Attack (techweekeurope.co.uk) 1

judgecorp writes: Security researchers say that iPhone and other Apple devices are vulnerable to an old attack, using a fake Wi-Fi access point. Attackers can use an SSID which matches one that is stored on the iPhone (say "BTWiF"), which the iPhone will connect to automatically. Other devices are protected thanks to the use of HTTPS, which enforces HTTPS, but iPhones are susceptible to this man in the middle attack, researchers say.

Slashdot Top Deals

To do nothing is to be nothing.

Working...