Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment I wonder (Score 1) 72

I'm all for regulation of mass surveillance. After the Snowden incident I started using a password manager and made sure my pgp key was up to snuff. But I wonder how many other more important secrets he had to tell the Russians to get amnesty, how many ships sank because of his lose lips.

Submission + - 3-D Printed Skull Successfully Implanted in Woman

djhaskin987 writes: The first successful implantation of a 3-D printed skull has taken place in the Netherlands, according to NBC news:

Doctors in the Netherlands report that they have for the first time successfully replaced most of a human’s skull with a 3-D printed plastic one — and likely saved a woman's life in the process. The 23-hour surgery took place three months ago at University Medical Center Utrecht. The hospital announced details of the groundbreaking operation this week and said the patient, a 22-year-old woman, is doing just fine.

Submission + - Microsoft Launches Office For iPad: Includes Word, Excel, And PowerPoint

An anonymous reader writes: At an event in San Francisco today, Microsoft Office General Manager Julia White unveiled Office for iPad, featuring Word, Excel, and PowerPoint. The new suite, which supports viewing but not editing for free, will go live in Apple's App Store at 11:00AM PDT (2:00PM EST). Word, Excel, and PowerPoint for iPad feature a ribbon interface just like the one featured in Office for Windows and OS X. The trio of apps are much more powerful on the tablet than the smartphone, but naturally aren't comparable to the desktop versions.

Submission + - How do the FBI and Secret Service know your network has been breached before you (networkworld.com)

coondoggie writes: By all accounts, many of the massive data breaches in the news these days are first revealed to the victims by law enforcement, the Secret Service and Federal Bureau of Investigation (FBI). But how do the agencies figure it out before the companies know they have been breached, especially given the millions companies spend on security and their intense focus on compliance? The agencies do the one thing companies don’t do. They attack the problem from the other end by looking for evidence that a crime has been committed. Agents go undercover in criminal forums where stolen payment cards, customer data and propriety information are sold. They monitor suspects and sometimes get court permission to break into password-protected enclaves where cyber-criminals lurk.

Slashdot Top Deals

Space tells matter how to move and matter tells space how to curve. -- Wheeler

Working...