Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Ransomware Authors Deliver Encryption Keys Via Bitcoin Blockchain (

itwbennett writes: Authors of the CTB-Locker ransomware have come up with a new method of delivering encryption keys to their victims using the bitcoin block chain itself. This new behavior was observed by researchers from security company Sucuri in a CTB-Locker version released in March. 'The new CTB-Locker variant generates a unique bitcoin wallet address for every infection,' explains Lucian Constantin. 'Once the victim pays the ransom by sending the required amount of bitcoins to that address, the attackers generate a new bogus transaction from that same wallet to which they append the encryption key in the OP_RETURN field.'

Submission + - DARPA's Latest Chip Is Designed to Be Bad at Arithmetic (

holy_calamity writes: Pentagon research agency DARPA has funded the creation of a chip incapable of correct arithmetic, in the hope of making computers better at understanding the real world. The S1 chip can process noisy data like video very efficiently because it doesn't need the extra circuits or operations needed to ensure every mathematical operation is performed perfectly. This summer DARPA will put five prototype computers, each equipped with 16 of the inexact S1 chips, online for researchers to experiment with.

Submission + - Seed from ancient extinct plant planted and brought back to life

schwit1 writes: Israeli scientists have successfully gotten a 2000-year-old seed of an extinct date plant to grow and now reproduce.

Methuselah sprouted back in 2005, when agriculture expert Solowey germinated his antique seed. It had been pulled from the remains of Masada, an ancient fortification perched on a rock plateau in southern Israel, and at the time, no one could be sure that the plant would thrive. But he has, and his recent reproductive feat helps prove just how well he’s doing.

For a while, the Judean date palm was the sole representative of his kind: Methuselah’s variety was reportedly wiped out around 500 A.D. But Solowey has continued to grow date palms from ancient seeds discovered in the region, and she tells National Geographic that she is “trying to figure out how to plant an ancient date grove.” Doing so would allow researchers to better understand exactly what earlier peoples of the region were eating and how it tasted.

Submission + - How Medical Tech Gave a Patient a Massive Overdose (

An anonymous reader writes: Pablo Garcia went to the hospital feeling fine. Then the hospital made him very sick. Through a series of technological mishaps, a prescription for one pill of a routine antibiotic became 38 pills, sending Garcia into a seizure. “Wait, look at this Septra dose,” the resident on duty said to Garcia's nurse at the time. “This is a huge dose. Oh my God, did you give this dose?” She had. But in this medical horror story, the real culprit was hospital technology.

Submission + - Snowden Used Social Engineering To Get Classified Documents ( 1

cold fjord writes: Reuters reports, "Edward Snowden used login credentials and passwords provided unwittingly by colleagues ... to access some of the classified material he leaked ... A handful of agency employees who gave their login details to Snowden were identified, questioned and removed from their assignments ... Snowden may have persuaded between 20 and 25 fellow workers at the NSA regional operations center in Hawaii to give him their logins and passwords by telling them they were needed for him to do his job as a computer systems administrator ... People familiar with efforts to assess the damage to U.S. intelligence caused by Snowden's leaks have said assessments are proceeding slowly because Snowden succeeded in obscuring some electronic traces of how he accessed NSA records. ... The revelation that Snowden got access to some of the material he leaked by using colleagues' passwords surfaced as the U.S. Senate Intelligence Committee approved a bill intended in part to tighten security over U.S. intelligence data. One provision of the bill would earmark a classified sum of money ... to help fund efforts by intelligence agencies to install new software designed to spot and track attempts to access or download secret materials without proper authorization."

Comment Thanks and Good Luck (Score 1) 1521

Taco: Many, many thanks for investing all that love into this site which I discovered with great joy and happened to read every day since then. Let all the good karma you accumulated these years be with you and your family in whatever activity that you engage next. ...And who knows, maybe you come back more often than you think...

Thanks again to you and to all your team.

Comment Re:Dumb (Score 2) 497

I don't think these published accounts are 'paid' accounts. There is no reason to think that they are.

Also does not require email confirmation to make an account: I just signed up with email address '' and got immediately logged in to the site.


Slashdot Top Deals

There must be more to life than having everything. -- Maurice Sendak