Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Fair use tweets (Score 3, Insightful) 130

A takedown from pastebin is reasonable, but the size limitation on tweets essentially ensures extracts are appropriate fair use for criticism. Indeed "violated Proctorio's exclusive rights by copying and posting extracts from Proctorio's software code on his Twitter account" sounds like the definition of fair use.

Comment Already known (Score 2) 32

This is not a "first" for magnetic perception in dogs, nor is it very persuasive. There was research published, and much media coverage in 2014, for example slashdot! https://science.slashdot.org/s...
There was a wonderful bit in the Canadian TV show "The Nature of Things": https://gem.cbc.ca/media/the-n... (starting around the 33 minute mark). The orientation tendency is dependent on the stability of the ambient magnetic field at the time.

Submission + - Dogs may use Earth's magnetic field to take shortcuts (sciencemag.org) 1

sciencehabit writes: Dogs are renowned for their world-class noses, but a new study suggests they may have an additional—albeit hidden—sensory talent: a magnetic compass. The sense appears to allow them to use Earth’s magnetic field to calculate shortcuts in unfamiliar terrain.

The finding is a first in dogs, says Catherine Lohmann, a biologist at the University of North Carolina, Chapel Hill, who studies “magnetoreception” and navigation in turtles. She notes that dogs’ navigational abilities have been studied much less compared with migratory animals such as birds.

Submission + - Iranian Spies Accidentally Leaked Videos of Themselves Hacking (wired.com)

An anonymous reader writes: Researchers at IBM's X-Force security team revealed today that they've obtained roughly five hours of video footage that appears to have been recorded directly from the screens of hackers working for a group IBM calls ITG18, and which other security firms refer to as APT35 or Charming Kitten. It's one of the most active state-sponsored espionage teams linked to the government of Iran. The leaked videos were found among 40 gigabytes of data that the hackers had apparently stolen from victim accounts, including US and Greek military personnel. Other clues in the data suggest that the hackers targeted US State Department staff and an unnamed Iranian-American philanthropist.

The IBM researchers say they found the videos exposed due to a misconfiguration of security settings on a virtual private cloud server they'd observed in previous APT35 activity. The files were all uploaded to the exposed server over a few days in May, just as IBM was monitoring the machine. The videos appear to be training demonstrations the Iran-backed hackers made to show junior team members how to handle hacked accounts. They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims. This sort of data exfiltration and management of hacked accounts is hardly sophisticated hacking. It's more the kind of labor-intensive but relatively simple work that's necessary in a large-scale phishing operation. But the videos nonetheless represent a rare artifact, showing a first-hand view of state-sponsored cyberspying that's almost never seen outside of an intelligence agency.

Slashdot Top Deals

Kiss your keyboard goodbye!

Working...