Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Coral reef discovered off Naples (independent.co.uk)

davidone writes: A large white coral reef containing important species and fossil traces has been discovered at a depth of more than 500 metres in the Gulf of Naples, in a rare discovery for the Mediterranean, the Italian Research Council (CNR) said on Friday.

Submission + - More Screen Time Linked To Lower Test Scores For Elementary Students (www.cbc.ca)

An anonymous reader writes: The study by a team from Toronto's Hospital for Sick Children (also known as Sick Kids) and St. Michael’s Hospital was published in the Journal of the American Medical Association. It found that children who spent more time on screens before age eight scored lower on standardized tests. Child psychiatry researchers say handing kids digital devices, like iPads, every time they have a tantrum could lead to future issues. One new study links too much screen time to emotional and anger management problems.

The study followed more than 3,000 kids in Ontario over a 15 year span from 2008 to 2023, tracking how much time they spent watching TV or DVDs, playing video games, using the computer or playing on handheld devices like iPads, as reported by their parents. That data was compared to their EQAO standardized test scores, which are used to assess the reading and math skills of kids across Ontario in grades 3 and 6. The findings point to a “significant association,” between screen use and lower test scores, according to Dr. Catherine Birken, a pediatrician and senior scientist at Sick Kids and lead author of the study.

“For each additional hour of screen use, there was approximately a 10 percent lower odds of meeting standards in both reading and mathematics ... in Grade 3 and mathematics in Grade 6,” said Dr. Catherine Birken, a pediatrician and senior scientist at Sick Kids and lead author of the study, in an interview with CBC News. The study didn’t differentiate between different types of screen time — for example, whether a child was playing a game on their iPad versus FaceTiming a relative in another city, or watching an educational video. It was also an observational study that relied on parents answering questionnaires about how much time their kids spent in front of screens. The study authors note that this means the research can’t be taken as definitive proof that screen time causes lower grades, just that the two things tend to go hand in hand.

Submission + - DDoS Botnet Aisuru Blankets US ISPs in Record DDoS (krebsonsecurity.com)

An anonymous reader writes: The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like AT&T, Comcast and Verizon, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet’s attacks, which shattered previous records this week with a brief traffic flood that clocked in at nearly 30 trillion bits of data per second.

Since its debut more than a year ago, the Aisuru botnet has steadily outcompeted virtually all other IoT-based botnets in the wild, with recent attacks siphoning Internet bandwidth from an estimated 300,000 compromised hosts worldwide. The hacked systems that get subsumed into the botnet are mostly consumer-grade routers, security cameras, digital video recorders and other devices operating with insecure and outdated firmware, and/or factory-default settings. Aisuru’s owners are continuously scanning the Internet for these vulnerable devices and enslaving them for use in distributed denial-of-service (DDoS) attacks that can overwhelm targeted servers with crippling amounts of junk traffic.

As Aisuru’s size has mushroomed, so has its punch. In May 2025, KrebsOnSecurity was hit with a near-record 6.35 terabits per second (Tbps) attack from Aisuru, which was then the largest assault that Google’s DDoS protection service Project Shield had ever mitigated. Days later, Aisuru shattered that record with a data blast in excess of 11 Tbps. By late September, Aisuru was publicly flexing DDoS capabilities topping 22 Tbps. Then on October 6, its operators heaved a whopping 29.6 terabits of junk data packets each second at a targeted host. Hardly anyone noticed because it appears to have been a brief test or demonstration of Aisuru’s capabilities: The traffic flood lasted less only a few seconds and was pointed at an Internet server that was specifically designed to measure large-scale DDoS attacks.

Aisuru’s overlords aren’t just showing off. Their botnet is being blamed for a series of increasingly massive and disruptive attacks. Although recent assaults from Aisuru have targeted mostly ISPs that serve online gaming communities like Minecraft, those digital sieges often result in widespread collateral Internet disruption. For the past several weeks, ISPs hosting some of the Internet’s top gaming destinations have been hit with a relentless volley of gargantuan attacks that experts say are well beyond the DDoS mitigation capabilities of most organizations connected to the Internet today.

Submission + - SonicWall Data Breach Affects All Cloud Backups of Firewalls (heise.de)

An anonymous reader writes: On Sept. 17, security vendor SonicWall announced that cybercriminals had stolen backup files configured for cloud backup. At the time, the company claimed the incident was limited to “less than five percent” of its customers. Now, the firewall provider has admitted that “all customers” using the MySonicWall cloud backup feature were affected. According to the company, the stolen files contain encrypted credentials and configuration data. “[W]hile encryption remains in place, possession of these files could increase the risk of targeted attacks,” SonicWall warns in its press release.

Security specialist Arctic Wolf also warns of the consequences of the incident. “Firewall configuration files store sensitive information that can be leveraged by threat actors to exploit and gain access to an organization’s network,” explains Stefan Hostetler, threat intelligence researcher at Arctic Wolf. “These files can provide threat actors with critical information such as user, group, and domain settings, DNS and log settings, and certificates,” he adds. Arctic Wolf has previously observed threat actors, including nation-state and ransomware groups, exfiltrating firewall configuration files to use for future attacks.

Submission + - The people rescuing forgotten knowledge trapped on old floppy disks (bbc.com)

smooth wombat writes: At one point in technology history, floppy disks reigned supreme. Files, pictures, games, everything was put on a floppy disk. But technology doesn't stand still and as time went on disks were replaced by CDs, DVDs, thumb drives, and now cloud storage. Despite these changes, floppy disks are still found in long forgotten corners of businesses or stuffed in boxs in the attic. What is on these disks is anyone's guess, but Cambridge University Library is racing against time to preserve the data. However, lack of hardware and software to read the disks, if they're readable at all, poses unique challenges.

Some of the world's most treasured documents can be found deep in the archives of Cambridge University Library. There are letters from Sir Isaac Newton, notebooks belonging to Charles Darwin, rare Islamic texts and the Nash Papyrus – fragments of a sheet from 200BC containing the Ten Commandments written in Hebrew.

These rare, and often unique, manuscripts are safely stored in climate-controlled environments while staff tenderly care for them to prevent the delicate pages from crumbling and ink from flaking away.

But when the library received 113 boxes of papers and mementoes from the office of physicist Stephen Hawking, it found itself with an unusual challenge. Tucked alongside the letters, photographs and thousands of pages relating to Hawking's work on theoretical physics, were items now not commonly seen in modern offices – floppy disks.

They were the result of Hawking's early adoption of the personal computer, which he was able to use despite having a form of motor neurone disease known as amyotrophic lateral sclerosis, thanks to modifications and software. Locked inside these disks could be all kinds of forgotten information or previously unknown insights into the scientists' life. The archivists' minds boggled.

These disks are now part of a project at Cambridge University Library to rescue hidden knowledge trapped on floppy disks. The Future Nostalgia project reflects a larger trend in the information flooding into archives and libraries around the world.

Submission + - Autism should not be seen as single condition with one cause, say scientists (theguardian.com)

Bruce66423 writes: 'Those diagnosed as small children typically have distinct genetic profile from those diagnosed later, study finds'

So there's more than one condition out there that's being diagnosed as 'autism'. This, of course, messes with the debate about causes; one version of autism may be caused by something for which the evidence is very weak overall... ;)

Submission + - Hundreds of celebrities relaunch a McCarthy-era committee to defend free speech (npr.org)

alternative_right writes: On Wednesday, over 550 celebrities relaunched a group first organized during the post-World War II Red Scare: the Committee for the First Amendment. Their intent is to stand up in what they call a "defense of our constitutional rights," adding: "The federal government is once again engaged in a coordinated campaign to silence critics in the government, the media, the judiciary, academia, and the entertainment industry."

Submission + - SWIFT launches a global financial blockchain (reuters.com)

Camembert writes: In a move that is sure to make Ripple nervous, traditional financial network Swift announced yesterday that it is partnering with Consensys and more than 30 global banks to build a blockchain based network that will run in parallel with its traditional network. Interestingly, unlike XRP, there is no native coin, rather it aims for interoperability (probably using Chainlink with whom the company did case studies for a few years already). There is also a strong focus on regulatory compliance. There are several news articles and opinion pieces on this event, I linked the Reuters article.

Comment Re:I don't believe you (Score 2) 74

I believe they found what they stated but they aren't even sure what its for so its hard to believe the supposed threat. It was traced due to supposed text threats made to various congresspeople, again, unstated as to who or what it was. A quote I saw:

"The potential for disruption to our country’s telecommunications posed by this network of devices cannot be overstated," says US Secret Service Director Sean Curran.

THAT I do not believe, unless by disruption they mean spam, since it was also stated it could send a text message to every american in a very short time. To be fair, if that is also true, sending out a "War of the Worlds" sort of hoax message could indeed cause chaos, since the echo chambers of social media would confirm everyone got it and everyone would then believe the sky was falling.

I don't know how many simultaneous calls the emergency services can handle but 100K seem to me like a lot. Likewise i have no idea if they can apply any sort of sensible filtering akin to regular ddos to incoming calls. Alarms that use mobile network could be ddosed, security cameras. With a bit of imagination I'm sure there's more.

Submission + - EU policymakers finally plan to fix the cookie banner nightmare they created (techspot.com) 1

jjslash writes: The European Commission is drafting amendments to the ePrivacy Directive to reduce the constant flood of cookie consent banners. Currently, websites must get explicit permission and clearly explain their data practices, leading to widespread banner fatigue. Critics argue that this overuse has backfired, with most users clicking “accept” without reading, undermining privacy protections and awareness.

More than a decade ago, Europe rewrote internet rules which effectively forced the entire internet to adopt stricter rules on cookie consent by amending the ePrivacy Directive. Since 2009, from big tech giants, to small personal blogs, and virtually any internet-based organization had to display a "cookie banner" to first-time visitors. Collectively, European users spend an estimated 575 hours every year clicking through those pesky prompts.


Submission + - Criminals use portable SMS blasters to flood phones with phishing texts (techspot.com)

jjslash writes:

Cybercriminals are increasingly using portable devices known as SMS blasters to flood phones with fraudulent text messages, marking a shift in how large-scale phishing scams are carried out. Instead of relying on lists of numbers and automated delivery systems routed through mobile networks, criminals have begun installing fake cell towers in cars or backpacks to beam scam texts directly to nearby phones. These devices, often disguised inside vehicles, impersonate cellular base stations and force surrounding phones into insecure connections.

The trend is a turning point, according to Cathal Mc Daid, VP of technology at telecommunications and cybersecurity firm Enea. "This is essentially the first time that we have seen large-scale use of mobile radio-transmitting devices by criminal groups," Mc Daid told Wired.

Slashdot Top Deals

The biggest mistake you can make is to believe that you are working for someone else.

Working...