Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: Obama has no right to do this (Score 1) 476

I don't disagree that this is how "everyone refers to it" or that it's a convenient shorthand to use for purposes of conversation. That doesn't change the fact that it's not an accurate description of what is actually taking place, hence my statement "the confusion most people seem to have."

Submission + - Law enforcement agencies are dealing with malware (

mikehusky writes: Sheriff Todd Brackett’s first inclination last year when he learned part of his department’s computerized records management system had been taken over by ransomware was not to pay.

“We’re policemen,” he said. “We don’t pay ransom.” .Law enforcement agencies are dealing with malware and ransom demands

Submission + - IoT Needs Regulation to Prevent Botnets: Report (

MarkBrown151 writes: The market won’t fix the problem of botnets and IoT security and the government will need to get involved, according to a cybersecurity think tank.
The stability of the internet could be in serious danger. That’s the dire message from a new report by the Institute for Critical Infrastructure Technology (ICIT), a .cybersecurity think tank


AustinButcher writes: A Washington, D.C. think tank whose mission is critical infrastructure security has joined the call for lawmakers to consider regulating the security of connected devices. In a report published this week, the Institute for Critical Infrastructure Technology pinned the blame for a rash of Mirai malware-inspired IOT botnet DDoS attacks on manufacturer negligence. .IOT botnet DDoS attacks

Submission + - Security-by-design is an indispensable prerequisite to the establishment (

JohnSmith2016 writes: A concise overview of the basic structure of the Internet, including key players and protocols (ISO OSI, TCP/IP)
The anatomy of a Distributed Denial of Service Attack (DDoS) including details on Constructing Botnets, Conventional vs. IoT Botnets, Launching a DDoS Attack, and DDoS-as-a-Service
An overview of the Mirai Incidents including KrebsonSecurity, OVH ISP, Dyn, Liberia, Finland, the Tump / Clinton Campaigns, WikiLeaks and Russian Banks.The Dyn Attack Was Just a Practice Run

Submission + - Cisco: Zeus spawn "Floki bot" malware gaining use, cyber-underworld notorieity (

coondoggie writes: “[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote.

Submission + - AT&T To Cough Up $88 Million For 'Cramming' Mobile Customer Bills (

An anonymous reader writes: Some 2.7 million AT&T customers will share $88 million in compensation for having had unauthorized third-party charges added to their mobile bills, the Federal Trade Commission announced this morning. The latest shot in the federal government’s years-long battle against such abuses, these refunds will represent the most money ever recouped by victims of what is known as “mobile cramming,” according to the FTC. From an FTC press release: "Through the FTC’s refund program, nearly 2.5 million current AT&T customers will receive a credit on their bill within the next 75 days, and more than 300,000 former customers will receive a check. The average refund amount is $31. [...] According to the FTC’s complaint, AT&T placed unauthorized third-party charges on its customers’ phone bills, usually in amounts of $9.99 per month, for ringtones and text message subscriptions containing love tips, horoscopes, and 'fun facts.' The FTC alleged that AT&T kept at least 35 percent of the charges it imposed on its customers." The matter with AT&T was originally made public in 2014 and also involved two companies that actually applied the unauthorized charges, Tatto and Acquinity.

Comment I would want the option (Score 1) 336

I would certainly want the option, at least after the movie dropped off of the the "top 3 grossing movies of the past 72 hours" list.

I can't figure out a fair pricing model: They will have to charge the same to show it to 1 person on his big-screen TV as to show it to an entire family on their big-screen TV. That will either be too expensive for single people or it will so cheap that families will abandon theaters.

Comment Re:plenty of ways to waste your money. (Score 1) 53

I'll grant you premature retirement is not a good thing (though it can be, if the buyout is attractive enough) and changes the equation. That said, I stand behind my point. If the knowledge in your head doesn't exist elsewhere, you can make decent extra income in retirement. If you were FORCED out of that job by a stupid company despite having irreplaceable knowledge, you can charge them an asshole tax.

One of our technical sales guys is retiring next year. He already has multiple contracts lined up for his consultancy (with us and some of our customers). We'd be happier if he wasn't leaving at all, but he has city miles on him and old age is a bitch.

Comment Re:plenty of ways to waste your money. (Score 1) 53

In a lot of industries, retired people are brought back for niche knowledge, and get double the rate they made as an employee.

Let's do some quick math, shall we?

2x former salary rate/hour - 90% former hours - medical/dental benefits + Obamacare = less than what you made before.

Yeah, that pretty much sums up corporate abuse.

You're being disingenuous here. The reality is that retirees don't want a 40-60 hour work week--they're fucking retired. They don't mind (in fact, many really enjoy) getting paid a multiple of their former hourly rate to consult on projects for a few hours a week or month. If you work in the right industry / for the right company, it's even part of your retirement planning (that you'll have x additional income due to the 500 hours a year you plan to invoice your previous employer / their customers).

People in this role aren't burger flippers. They're people with valuable domain knowledge that hasn't been picked up by their replacement. Generally speaking, i's win-win for everyone except people like you that are bitching about the man keeping them down.

Submission + - Inside The NYPD's Attempt To Build Community Trust Through Twitter (

mirandakatz writes: When the NYPD rolled out its Twitter presence a couple years back, it didn't go so smoothly: the @NYPDNews account tweeted a request: “Do you have a photo with a member of the NYPD? Tweet us & tag it #myNYPD,” and by midnight the same day, more than 70,000 people had responded decrying police brutality. At Backchannel, Susan Crawford looks at the department's attempt to use Twitter to rebuild community trust, noting that while the NYPD has a long ways to go, any opening up of communication is an improvement on the traditionally tight-lipped culture.

Submission + - IoT devices that were infected with the Mirai botnet set new precedents (

JohnSmith2016 writes: Security-by-design is an indispensable prerequisite to the establishment of vital critical infrastructure resiliency. Each device vulnerable to adversarial compromise, inflates and bolsters the exploitable cyber-attack surface that can be leveraged against targets, and every enslaved device grants adversaries carte blanche access that can be utilized to parasitically entwine malware into organizational networks and IoT microcosms, and that can be leveraged to amplify the impact and harm inflicted on targeted end-users, organizations, and government entities" .James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

Submission + - Are your personal details for sale on the Dark Web? This new cybersecurity servi (

drunkdrone writes: A new online service security service has launched in the UK that scans the Dark Web for stolen data and alerts users if their personal information has been leaked online.

OwlDetect trawls encrypted websites most commonly used for illegal trading for "almost any piece of personal data" that might have been leaked or stolen during a cyberattack. This includes email addresses, debit and credit cards numbers, bank details and even driving license and passport numbers.

Slashdot Top Deals

I have never seen anything fill up a vacuum so fast and still suck. -- Rob Pike, on X.