Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - iOS 10 Just Made Hacking Into iPhone And iPad Backups Much Easier (

MojoKid writes: Apple bills iOS 10 as being "More personal. More powerful. More playful." Given the features that Apple has infused into the mobile operating system including a totally revamped iMessage app, rich notifications, third-party app integration with Siri, more useful 3D Touch actions and the like, it does seem like a fairly robust upgrade. However, at least one area in iOS 10 has seen a bit of a regression compared to previous versions, and it could leave your iPhone and iPad data less secure than before. Russian researchers at ElcomSoft say that Apple has made local iTunes backups for devices more vulnerable to hackers, thanks to what is described as an "alternative password verification mechanism" that has been added with iOS 10. Reportedly, this new method offers a shortcut for verification, allowing it to skip some critical security checks. As a result, iOS 10 backup passwords in iTunes can be obtained through brute force methods "approximately 2,500 times faster" than what was possible with iOS 9.

Submission + - SPAM: Apollo 11's landing was 47 years ago today

StartsWithABang writes: Less than a decade after the first human was launched into space, astronauts Neil Armstrong, Buzz Aldrin and Michael Collins journeyed from the Earth to the Moon. For the first time, human beings descended down to the lunar surface, opened the hatch, and walked outside. Humanity had departed Earth and set foot onto another world. While Armstrong and Aldrin walked on the surface, collecting now-iconic photos, deploying science instruments and returning hundreds of pounds of lunar samples, Michael Collins orbited overhead, embarking on a missing that no human being had undertaken before. Forty-seven years later, humanity has never had a bigger breakthrough as far as crewed space exploration goes. Relive it all in this incredible video, made exclusively with NASA archival photos.

Submission + - Scientists Announce Plans For Synthetic Human Genomes (

An anonymous reader writes: After it was reported three weeks ago that scientists have held a secret meeting to consider creating a synthetic human genome, the participants of that meeting have officially published their plans. They announced a plan to launch a project that would radically reduce the cost of synthesizing human genomes, a revolutionary development in biotechnology that could enable technicians to grow human organs for transplantation. The Washington Post reports: "The announcement, published Thursday in the journal Science, is the latest sign that biotechnology is going through a rapidly advancing but ethically fraught period. The promoters of synthetic genomes envision a project that would eventually be on the same scale as the Human Genome Project of the 1990s, which led to the sequencing of the first human genomes. The difference this time would be that, instead of 'reading' genetic codes, which is what sequencing does, the scientists would be 'writing' them. They have dubbed this the 'Genome Project-write.'"

Submission + - New data challenges consensus on galaxy formation (

schwit1 writes: A new study has found that the accepted consensus for the formation of large elliptical galaxies does not work, and that, rather than forming from the merger of smaller spiral galaxies, ellipticals formed in place from the material at hand.

From the press release [pdf].

“We started from the data, available in complete form only for the closer galaxies and in incomplete form for the more distant ones, and we filled the ‘gaps’ by interpreting and extending the data based on a scenario we devised” comments Mancuso. The analysis also took into account the phenomenon of gravitational lensing, which allows us to observe very distant galaxies belonging to ancient cosmic epochs.

In this “direct” manner (i.e., model-independent) the SISSA group obtained an image of the evolution of galaxies even in very ancient epochs (close, in a cosmic timescale, to the epoch of reionization). This reconstruction demonstrates that elliptical galaxies cannot have formed through the merging of other galaxies, “simply because there wasn’t enough time to accumulate the large quantity of stars seen in these galaxies through these processes”, comments Mancuso. “This means that the formation of elliptical galaxies occurs through internal, in situ processes of star formation.

The important take-away of this result is that it shows that the present theory of galaxy formation, where smaller spiral galaxies merge to form larger elliptical galaxies, does not fit the data. And if a theory does not fit the data, it must be abandoned.

Submission + - The Milky Way's most recent supernova is revealed at last

An anonymous reader writes: In 1604, Kepler's supernova went off, the last Milky Way supernova visible to naked-eye skywatchers here on Earth. Yet since the development of radio and X-ray astronomy, other, more recent supernova remnants in our galaxy have been found. They've only been invisible to the naked eye because of the galactic gas and dust that blocks their visible light. In 1984/5, the VLA discovered the most recent known remnant near the galactic center, and follow-up observations showed a rapid expansion. The most recent data not only dates this remnant to be only 110 years old, but it teaches us that it's a Type Ia supernova that formed from the merger of two white dwarfs. The standard model — of one white dwarf accruing matter from a binary companion — may not only be a minority of Type Ia events, perhaps it doesn't occur at all.

Submission + - 1,400+ Vulnerabilities Found In Automated Medical Supply System 1

An anonymous reader writes: Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies – that are still being used in the healthcare and public health sectors in the US and around the world. The vulnerabilities can be exploited remotely by attackers with low skills, and exploits that target these vulnerabilities are publicly available.

Submission + - A possible impact on Jupiter?

schwit1 writes: On March 17 two different amateur astronomers have taken videos of a bright flash on Jupiter which suggests something had crashed into the gas giant.

March 17th's impact, if the evidence for it holds up, becomes the fourth such event in the past decade. The largest of these occurred July 19, 2009, and it left a distinctly dark "powder burn" in Jupiter's upper atmosphere first spotted by Australian astro-imager Anthony Wesley. That was followed by three lesser strikes on June 3, 2010 (recorded independently by Wesley and Christopher Go); on August 10, 2010 (independently seen by Masayuki Tachikawa and Kazuo Aoki); and on September 10, 2012 (seen visually by Dan Petersen and independently recorded by George Hall).

Counting the historic multiple-hit crash of Comet Shoemaker-Levy 9 in July 1994, that's a grand total of six impacts on Jupiter in the past 22 years.

Submission + - SPAM: China Proposes Foreign Domain Name Censorship

An anonymous reader writes: A new draft law in China could potentially increase domain name restrictions, limiting domestic access to foreign websites. The measures outlined in the ‘Internet Domain Name Management Rules’ remain unclear, yet suggest a marked effort to increase censorship on online content. The proposals, released for public comment by the Ministry of Industry and Information Technology, seek to update existing regulations to censor any domain names not registered within China. Only domain names approved by authorities would be permitted, while other names registered outside of China would be blocked automatically.
Link to Original Source

Submission + - Chinese QQ Browser Caught Sending User Data to Its Servers

An anonymous reader writes: A report from the Citizen Lab at the University of Toronto reveals that the popular QQ Browser is collecting sensitive user information and sending it in an insecure manner to its servers. The Android version is collecting data such as the user’s search terms, browsing history, nearby WiFi networks, and the user's device IMSI and IMEI codes. For the Windows version of QQ Browser, the app was caught collecting data such as the user's browsing history, hard drive serial number, MAC address, Windows hostname, and Windows user security identifier.

All of this is sent unencrypted, or with weak encryption, to Tencent's servers, QQ Browser's manufacturer. Additionally, the update process is flawed and delivered in an insecure manner that allows others to manipulate upgrade patches with malicious software. This is the third browser caught exhibiting this behavior after UC Browser and Baidu Browser.

Submission + - Apple widespread IOS Bug - URL links fail to open in Safari and some apps. (

lxrocks writes: There are many users experiencing problems with their iPhone/iPad where links fail to open from Safari or Mail. Apple support community is full of users with problems. The issue renders any type of search with Safari as useless as none of the links returned will open.

A very wide-spread issue impacting a lot of users — no official work around yet — and seems to be affecting users on both 9.2 and 9.3 IOS.

  Take your phone to the Genius bar and all they can do is apologise and say that Apple is working on the issue.


Submission + - Virtual reality roller coasters are having a moment (

agent elevator writes: IEEE Spectrum has a story on the making of the Galactica virtual reality roller coaster, which opens tomorrow. They also explain why the heck there are suddenly so many virtual reality roller coasters (like 20 opening this year). Two companies came up with tech that syncs VR content to ride car's position on the track. That was really important, because any appreciable mismatch between the sensation and the visuals means the riders will lose their collective lunches—something that may have doomed earlier attempts at VR roller coasters.

Submission + - Vulnerability in 70 CCTV DVRs Traced Back to Chinese Firm Who Ignores Researcher (

An anonymous reader writes: RSA security researcher Rotem Kerner has identified a common vulnerability in the firmware of 70 different CCTV DVR vendors, which allows crooks to execute code and gain root privileges on the affected devices.

The problem was actually in the firmware of just one DVR sold by Chinese firm TVT. The practice of "white-labeling" products helped propagate this issue to other "manufacturers" who did nothing more than to buy a non-branded DVR, tweaked its firmware, slapped their logo on top, and sold it a their own, vulnerability included.

Comment Re:Meanwhile... (Score 1) 551

Writing this on a W510 as well. I put an SSD in earlier this year, only because I've ditched my desktop and am actually going mobile with the laptop fairly often now.

I have been thinking of getting a new one lately, mainly because I really miss having a real numpad. I have a USB one but it's just not the same, too flimsy, moves around too much, and not where my brain expects it to be. However, Lenovo keeps jacking around with the keyboard layout for no good reason, and all the new Thinkpads have ditched the menu/context key on the right side between Ctrl and Alt, and put prtscr there instead. Good god why.

Slashdot Top Deals

With your bare hands?!?