Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:iGoogle Disaster (Score 1) 435

In honor of Harry Randall Truman, I will scoff at this impending iGoogleocolypse which some claim will take my home. Despite this 2 day countdown, I don't have any idea whether it will cease to show. Ain't gonna hurt me... boy.

Submission + - Google's Director of Regime Change (

Memroid writes: 'It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA [...] Documents published last year by WikiLeaks obtained from the US intelligence contractor Stratfor, show that in 2011 Jared Cohen, then (as he is now) Director of Google Ideas, was off running secret missions to the edge of Iran in Azerbaijan. In these internal emails, Fred Burton, Stratfor’s Vice President for Intelligence and a former senior State Department official, describes Google as follows:

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do... [Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag."'

Submission + - Hackers Can Control Your Car via a Phone Call

Memroid writes: From the 2011 paper titled Comprehensive Experimental Analyses of Automotive Attack Surfaces, "[...] we can compromise the car’s radio and upload custom firmware via a doctored CD, we can compromise the technicians’ PassThru devices and thereby compromise any car subsequently connected to the PassThru device, and we can call our car’s cellular phone number to obtain full control over the car’s telematics unit over an arbitrary distance. Being able to compromise a car’s ECU is, however, only half the story: The remaining concern is what an attacker is able to do with those capabilities. In fact, we show that a car’s externally facing I/O interfaces can be used post-compromise to remotely trigger or control arbitrary vehicular functions at a distance and to exfiltrate data such as vehicle location and cabin audio."

Submission + - Open Source Health Monitoring 3

Memroid writes: What is stopping us from creating technologies for monitoring our health and hacking the human body? What technologies, products, and projects currently exists to detect problems before they become a problem? Blood pressure tracking, blood analysis, vitamin deficiency detection, etc. could save lives — perhaps your own. Can we move these diagnostic tools out of the hands of the health industry and take ownership of our own well-being? Is it feasible to monitor this information from our own home?

Comment "He hasn't done any damage" (Score 2) 214

I would argue that he may have done a great deal of damage. Releasing plans for future products can tip off competitors. Information regarding future products can also result in a customer not purchasing what is currently available in anticipation for a future product. Both of these can mean millions of dollars in losses for a company.

Slashdot Top Deals

If a thing's worth having, it's worth cheating for. -- W.C. Fields