Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:When did facebook become a right? (Score 4, Insightful) 176

America imprisons more people than any other country. On a per-capita basis we imprison more than Russia, Saudia Arabia, Cuba, and four times as many as China. We spend more on prisons than the rest of the world combined. Yet we have one of the worse recidivism rates. It would be hard to design a dumber system even if you tried. Enforcing social isolation just makes it even worse.

Excellent point. So maybe if we just replicate the prison conditions of Russia, Saudi Arabia, Cuba, and China--
Would that reduce recidivism? Goodbye, Facebook!

Comment Unbiased estimates... (Score 3, Insightful) 91

The wireless industry estimates that for every 10 Megahertz of spectrum licensed for wireless broadband, 7,000 American jobs are created and U.S. gross domestic product increases by $1.7 billion."
Yes, of course they do. That's a nice press release for both the wireless industry, and the politicians they paid for.

Comment Re:Visible from Earth? (Score 1) 126

That would be perfectly normal. Lots of small satellites are visible with the naked eye at just the right time of day. If they're still in the sunlight, and you're in the dark (dusk and dawn) you can see them.

With this one being "geo-sychrounous" (probably geostationary) it would only be visible in certain locations.

Submission + - Google Releases More Windows Bugs (computerworld.com)

An anonymous reader writes: Just days after Google angered Microsoft by releasing information about a Windows security flaw, they've now released two more. "The more serious of the two allows an attacker to impersonate an authorized user, and then decrypt or encrypt data on a Windows 7 or Windows 8.1 device. Google reported that bug to Microsoft on Oct. 17, 2014, and made some background information and a proof-of-concept exploit public on Thursday. Project Zero is composed of several Google security engineers who investigate not only the company's own software, but that of other vendors as well. After reporting a flaw, Project Zero starts a 90-day clock, then automatically publicly posts details and sample attack code if the bug has not been patched." Microsoft says there's no evidence these flaws have been successfully exploited.

Submission + - Phony USB Charger Masquerades as Wireless Keylogger (threatpost.com) 3

msm1267 writes: Hardware hacker and security researcher Samy Kamkar has released a slick new device that masquerades as a typical USB wall charger but in fact houses a keylogger capable of recording keystrokes from nearby wireless keyboards.

The device is known as KeySweeper and Kamkar has released the source code and instructions for building one of your own. The components are inexpensive and easily available, and include an Arduino microcontroller, the charger itself and a handful of other bits. When it’s plugged into a wall socket, the KeySweeper will connect to a nearby Microsoft wireless keyboard and passively sniff, decrypt and record all of the keystrokes and send them back to the operator over the Web.

Submission + - US Slaps Sanctions on North Korea After Sony Cyberattack (securityweek.com)

wiredmikey writes: The United States imposed financial sanctions Friday on North Korea and several senior government officials in retaliation for a cyber attack on Sony Pictures. President Obama said he ordered the sanctions because of "the provocative, destabilizing, and repressive actions and policies of the Government of North Korea, including its destructive, coercive cyber-related actions during November and December 2014."

The activities "constitute a continuing threat to the national security, foreign policy, and economy of the United States," he added, in a letter to inform congressional leaders of his executive order. The new measures allow the Treasury Department "to apply sanctions against officials of the Government of North Korea and the Workers' Party of Korea, and persons determined to be owned or controlled by, or acting for or on behalf of" these bodies.

Submission + - Doxing As An Attack 1

HughPickens.com writes: Bruce Schneier writes that the practice of publishing personal information about people without their consent can be incredibly offensive. Doxing is not new, dating back to at least 1987 when Robert Bork's video tape rentals were leaked to the press. Usually it’s things like an address and phone number, but it can also be credit card details, medical information, private e-mails—pretty much anything an assailant can get his hands on. More recently in 2013, several women were doxed by male gamers trying to intimidate them into keeping silent about sexism in computer games. Companies can be doxed, too as we've seen in the past few weeks with the ongoing doxing of Sony. "Everyone from political activists to hackers to government leaders has now learned how effective this attack is. Everyone from common individuals to corporate executives to government leaders now fears this will happen to them. And I believe this will change how we think about computing and the Internet."

Slashdot Top Deals

Behind every great computer sits a skinny little geek.

Working...