Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission + - Slashdot goes mental with advertising 9

sizzlinkitty writes: Has anyone else noticed Slashdot failing to load because of your ad blocker? I know I sure have and it's breaking my user experience like no other.

Please post the blocking patterns you're using to make Slashdot usable again.

Submission + - Easy-To-Pick 'Smart' Locks Gush Personal Data, FTC Finds (arstechnica.com)

An anonymous reader writes: A padlock—whether it uses a combination, a key, or "smart" tech—has exactly one job: to keep your stuff safe so other people can't get it. Tapplock, Inc., based in Canada, produces such a product. The company's locks unlock with a fingerprint or an app connected by Bluetooth to your phone. Unfortunately, the Federal Trade Commission said, the locks are full of both digital and physical vulnerabilities that leave users' stuff, and data, at risk. The FTC's complaint (PDF) against Tapplock, released Monday, basically alleges that the company misrepresented itself, because it marketed its products as secure and tested when they were neither. A product—any product—simply being kind of crappy doesn't necessarily fall under the FTC's purview. Saying untrue things about your product in your advertisement or privacy policy, however, will make the commission very unhappy with you indeed.

The lock may be built with "7mm reinforced stainless steel shackles, strengthened by double-layered lock design with anti-shim and anti-pry technologies," as Tapplock's website promises, but according to the FTC, perhaps it should have considered anti-screwdriver technologies. As it turns out, a researcher was able to unlock the lock "within a matter of seconds" by unscrewing the back panel. Oops. The complaint also pointed to several "reasonably foreseeable" software vulnerabilities that the FTC alleges Tapplock could have avoided if the company "had implemented simple, low-cost steps."

One vulnerability security researchers identified allowed a user to bypass the account authentication process entirely in order to gain full access to the account of literally any Tapplock user, including their personal information. And how could this happen? "A researcher who logged in with a valid user credential could then access another user’s account without being re-directed back to the login page, thereby allowing the researcher to circumvent Respondent’s authentication procedures altogether," the complaint explains. A second vulnerability allowed researchers the ability to access and unlock any lock they could get close enough to with a working Bluetooth connection. That's because Tapplock "failed to encrypt the Bluetooth communication between the lock and the app," leaving the data wide open for the researchers to discover and replicate. The third vulnerability outlined in the complaint also has to do with a failure to secure communication data. That app that allows "unlimited" connections? The primary owner can of course add and revoke authorized users from the lock. But someone whose access was revoked could still access the lock because the vulnerability allowed for sniffing out the relevant data packets.

United Kingdom

UK Company Wants To Deliver Parcels Through Underground Tunnels 117

Zothecula writes Drones flown by Amazon aren't the only way we could be getting our parcels delivered in the near future. UK firm Mole Solutions is exploring the possibility of using small robot trains running on underground tracks to manage deliveries, and it's just received funding from the British government to help test the viability of the proposal.

Submission + - NY Magistrate: Legal Papers Can Be Server Via Facebook (nypost.com)

Wylde Stile writes: A Staten Island, NY family court support magistrate allowed a man to serve his ex-wife via Facebook. The man tried to serve the woman in person and via mail, but the woman moved with no forwarding address. The children would not return his calls so he has no way to get the address. The magistrate decided that in-person and mail would not work

The ex-wife maintains an active Facebook account. She even liked some photos on the current wife Facebook page days before the ruling. The magistrate conclude that the ex-wife could be served through Facebook.

Submission + - SHIELD Tablet $299 Android Gaming Tablet Reviewed (pcper.com)

Vigile writes: Last week NVIDIA announced the SHIELD Tablet and SHIELD Controller but reviews are finally hitting of the devices this morning. Based on the high performance Tegra K1 SoC that integrates 192 Kepler architecture CUDA cores, benchmarks reveal that that the SHIELD Tablet is basically unmatched by any other mobile device on the market when it comes to graphics performance — it is more than 2.5x the performance of the Apple A7 in some instances. With that power NVIDIA is able to showcase full OpenGL versions of games like Portal and Half-Life 2 running at 1080p locally on the 19x12 display or output to a TV in a "console mode." PC Perspective has impressions of that experience as well as using the NVIDIA Game Stream technology to play your PC games on the SHIELD Tablet and controller. To go even further down the rabbit hole, you can stream your PC games from your desktop to your tablet, output them to the TV in console mode, stream your game play to Twitch from the tablet while overlaying your image through the front facing camera AND record your sessions locally via ShadowPlay and using the Wi-Fi Direct powered controller to send and receive audio. It is incredibly impressive hardware but the question remains as to whether or not there is, or will be, a market for Android based gaming devices, even those with the power and performance that NVIDIA has built.

Submission + - Senator Al Franken accuses AT+T of 'skirting' net neutrality rules (washingtonpost.com)

McGruber writes: In a letter to the U.S. Federal Communication Commission and the Department of Justice, Senator Al Franken warned that letting AT&T acquire Direct TV could turn AT&T into a gatekeeper to the mobile Internet. Franken also complained that AT&T took inappropriate steps to block Internet applications like Google Voice and Skype: "AT&T has a history of skirting the spirit, and perhaps the letter" of the government's rules on net neutrality, Franken wrote.

Submission + - Pedophile Asks To Be Deleted From Google Search After European Court Ruling

Hugh Pickens DOT Com writes: Jane Wakefield reports at BBC that a man convicted of possessing child abuse images is among the first to request Google remove links links to pages about his conviction after a European court ruled that an individual could force it to remove "irrelevant and outdated" search results. Other takedown requests since the ruling include an ex-politician seeking re-election who has asked to have links to an article about his behaviour in office removed and a doctor who wants negative reviews from patients removed from google search results. Google itself has not commented on the so-called right-to-be-forgotten ruling since it described the European Court of Justice judgement as being "disappointing". Marc Dautlich, a lawyer at Pinsent Masons, says that search engines might find the new rules hard to implement. "If they get an appreciable volume of requests what are they going to do? Set up an entire industry sifting through the paperwork?" says Dautlich. "I can't say what they will do but if I was them I would say no and tell the individual to contact the Information Commissioner's Office." The court said in its ruling that people could request the removal of data related to them that seem to be "inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed."

Submission + - Unlock Your Android Phone with Open Source Wearable NFC (adafruit.com)

coop0030 writes: Beck Stern at Adafruit has created a guide on how to create an open source NFC ring or other wearable to mod and unlock your Android phone. From the tutorial:

Unlock your phone by just picking it up! No more pesky password or gesture PIN, just scan an NFC tag! This guide covers creating an NFC ring, putting an NFC tag in your nail polish, modding your Android installation to read tags from the lockscreen, and creating an automation toolchain to unlock the phone when the desired tag is scanned.

There is also a video that demonstrates how it works.

Submission + - FISA Judges Oppose Intelligence Reform Proposals Aimed At Court (latimes.com) 2

cold fjord writes: The LA Times reports, "Judges on the ... surveillance court have strongly rejected any proposed changes to their review process ... In a blunt letter to the House and Senate intelligence and judiciary committees, U.S. District Judge John D. Bates made it clear that the 11 judges on the Foreign Intelligence Surveillance Court are united in opposition to key recommendations by a presidential task force last month ... their skepticism adds to a list of hurdles for those advocating significant reforms following former National Security Agency contractor Edward Snowden's massive disclosures of domestic and foreign surveillance programs. ... Obama and some intelligence officials have publicly signaled support for creating an adversarial legal process in the court ... and aides have suggested the president will create an advocate's position or call for legislation to do so ... But Bates disagreed sharply, arguing that "the participation of an advocate would neither create a truly adversarial process nor constructively assist the courts in assessing the facts, as the advocate would be unable to communicate with the target or conduct an independent investigation." Adding an advocate to "run-of-the-mill FISA matters would substantially hamper the work of the courts without providing any countervailing benefit in terms of privacy protection," he added." — The Hill adds that Bates, "... recommended an advocate chosen by the court, rather than an independent authority, for only a limited number of cases. " — More at Computerworld and NPR.

Submission + - Supreme Court Refuses to Hear Newegg Patent Case

NormalVisual writes: "It's a really tough time to be a patent owner", said Soverain Software, LLC president Katharine Wolanyk, after the Supreme Court refused to hear their appeal after the U.S. Court of Appeals for the Federal Circuit invalidated three of Soverain's shopping cart patents. Soverain had sued Newegg for allegedly infringing the patents in question, and had won in the U.S. District Court for the Eastern District of Texas. Newegg later had the decision overturned on appeal, with the court ruling that the patents in question were obvious, and thus invalid.

Submission + - Hollywood's Love of Analytics Couldn't Prevent Six Massive Blockbuster Flops (slashdot.org) 3

Nerval's Lobster writes: In June, Steven Spielberg predicted that Hollywood was on the verge of an “implosion” in which “three or four or maybe even a half-dozen megabudget movies are going to go crashing to the ground.” The resulting destruction, he added, could change the film industry in radical and possibly unwelcome ways. And sooner than he may have thought, the implosion has arrived: in the past couple weeks, six wannabe blockbusters have cratered at the North American box office: “R.I.P.D.,” “After Earth,” “White House Down,” “Pacific Rim,” and “The Lone Ranger.” These films featured big stars, bigger explosions, and top-notch special effects—exactly the sort of summer spectacle that ordinarily assures a solid run at the box office. Yet all of them failed to draw in the massive audiences needed to earn back their gargantuan budgets. Hollywood's more reliant than ever on analytics to predict how movies will do, and even Google has taken some baby-steps into that arena with a white paper describing how search-query patterns and paid clicks can estimate how well a movie will do on its opening weekend, but none of that data seems to be helping Hollywood avoid shooting itself in the foot with a "Pacific Rim"-sized plasma cannon. In other words, analytics can help studios refine their rollout strategy for new films—but the bulk of box-office success ultimately comes down to the most elusive and unquantifiable of things: knowing what the audience wants before it does, and a whole lot of luck.

Submission + - How MOOCs Could Watch Students' Faces for Signs Of Confusion Or Frustration (technologyreview.com)

moon_unit2 writes: Tech Review has a story on research showing that facial recognition software can accurately spot signs that programming students are struggling. NC State researchers tracked students learning java and used an open source facial-expression recognition engine to identify emotions such as frustration or confusion. The technique could be especially useful for Massive Open Online Courses (MOOCs)--where many thousands of students are working remotely--but it could also help teachers identify students who need help in an ordinary classroom, experts say. That is, as long as those students don't object to being watched constantly by a camera.

Submission + - How Much is Your Gmail Account Worth to Crooks? (krebsonsecurity.com) 1

tsu doh nimh writes: If you use Gmail and have ever wondered how much your account might be worth to cyber thieves, have a look at Cloudsweeper, a new OAuth service launching this week that tries to price the value of your Gmail address based on the number of retail accounts you have tied to it and the current resale value of those accounts in the underground. From KrebsOnSecurity: "The brainchild of researchers at the University of Illinois at Chicago, Cloudsweeperâ(TM)s account theft audit tool scans your inbox and presents a breakdown of how many accounts connected to that address an attacker could seize if he gained access to your Gmail. Cloudsweeper then tries to put an aggregate price tag on your inbox, a figure thatâ(TM)s computed by totaling the resale value of other account credentials that crooks can steal if they hijack your email."

Submission + - Chinese Media Calls for Boycott of Cisco

An anonymous reader writes: China's state run media is calling on the countries wireless carriers to more away from Cisco products. According to reports using Cisco products allows the US to “attack China almost at will” and forms a “terrible security threat.” Chinese officials are urging the companies wireless carriers to switch to hardware made by Huawei and ZTE Corp. Citing cybersecurity concerns, the United States has banned the use of equipment from both Huawei and ZTE in its cellular networks. Cisco has not yet been named in documents describing the NSA's global wiretapping operations. Apple, a company named in leaked documents, has slashed iphone production for the second half of this year on falling overseas sales.

Slashdot Top Deals

Real Programmers think better when playing Adventure or Rogue.

Working...