Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Spotify Executive Chris Bevington Dies in Stockholm Attack (

lightbox32 writes: Chris Bevington was one of the four people who was killed in Friday’s truck attack in Stockholm. The British 41-year-old had served as Spotify’s director of global partnerships/business development, working from Stockholm. He had worked with the company for five years.
In a statement to the BBC, Bevington’s father, John, said, “We are all devastated by the untimely and tragic death of our talented, compassionate and caring son Chris. A wonderful husband, son, father, brother and close friend to many.”

Submission + - MIT's New Imaging System can read Closed Books using TeraHertz Radiation ( 1

An anonymous reader writes: MIT researchers and their colleagues are designing an imaging system that can read closed books.

In the latest issue of Nature Communications, the researchers describe a prototype of the system, which they tested on a stack of papers, each with one letter printed on it. The system was able to correctly identify the letters on the top nine sheets.

This new imaging system will be useful for reading the antique books in Museums without touching them, and it could be used to analyze any materials organized in thin layers, such as coatings on machine parts or pharmaceuticals.

Anyway, currently the cost of this system is around 100k, so it is still not in a position to be mass-produced for everyday use.

Submission + - Remote Evil Butler Attack Threatens Windows Computers (

An anonymous reader writes: Last year, a security researcher discovered a way to defeat BitLocker on Windows by taking a PC and inserting him into a network controlled by a rogue domain controller, that allowed the attacker to poison the credentials cache and set a new password on the targeted device. This type of attack is called an Evil Maid, because it requires the attacker physical access to the device.

Microsoft fixed this vulnerability (CVE-2015-6095), and then fixed it again when two researchers pointed out in February 2016 (CVE-2016-0049), that the fix was incomplete. At this year's Black Hat security conference, two Microsoft researchers have discovered a way to carry out the Evil Maid attack from a remote location, even over the Internet. The two researchers say that an attacker can compromise a PC, configure it to work as a rogue domain controller, and then use RDP to access computers (that have open RDP connections) on the same network and carry out the attack from a distance. This particular attack, nicknamed a Remote Evil Butler, can be extremely attractive and valuable for cyber-espionage groups.

Submission + - Worst Mass Shooting in U.S. History ( 17

An anonymous reader writes: From CNN:

"Fifty people were killed inside Pulse, a gay nightclub, Orlando Police Chief John Mina and other officials said Sunday morning, just hours after a shooter opened fire in the deadliest mass shooting in U.S. history. At least 53 more people were injured, Mina said. Police have shot and killed the gunman, he told reporters.

The shooter is not from the Orlando area, Mina said. He has been identified as Omar Saddiqui Mateen, 29, of Fort Pierce, about 120 miles southeast of Orlando, two law enforcement officials tell CNN.
Orlando authorities said they consider the violence an act of domestic terror. The FBI is involved. While investigators are exploring all angles, they "have suggestions the individual has leanings towards (Islamic terrorism), but right now we can't say definitely," said Ron Hopper, assistant special agent in charge of the FBI's Orlando bureau."

Submission + - Oklahoma state troopers can now seize bank accounts too (

mi writes: You may have heard of civil asset forfeiture. That's where police can seize your property and cash without first proving you committed a crime; without a warrant and without arresting you, as long as they suspect that your property is somehow tied to a crime.

Now, the Oklahoma Highway Patrol has a device that also allows them to seize money in your bank account or on prepaid cards. If a trooper suspects you may have money tied to some type of crime, the highway patrol can scan any cards you have and seize the money.

But do not worry: "If you can prove that you have a legitimate reason to have that money it will be given back to you. And we've done that in the past," — said Oklahoma Highway Patrol Lt. John Vincent.

Submission + - Pentagon admits to having deployed miitary spy drones over the US (

lightbox32 writes: A report by a Pentagon inspector general, made public under a Freedom of Information Act request, said spy drones on non-military missions have occurred fewer than 20 times between 2006 and 2015 and always in compliance with existing law. The use of unmanned aerial surveillance (UAS) drones over U.S. surfaced in 2013 when then-FBI director Robert Mueller testified before Congress that the bureau employed spy drones to aid investigations, but in a "very, very minimal way, very seldom."

The inspector general analysis was completed March 20, 2015, but not released publicly until last Friday.

The report also quoted a military law review article that said "the appetite to use them (spy drones) in the domestic environment to collect airborne imagery continues to grow, as does Congressional and media interest in their deployment."

Submission + - Microsoft releases first public preview of RTVS under MIT and GPLv2 licenses (

shutdown -p now writes: Microsoft has released the first public preview of RTVS (R Tools for Visual Studio), an extension for Visual Studio that adds support for the R (GNU S) programming language. The product is open source, and while most of the code is under the MIT license, some components are GPLv2, in accordance with the R license.

Submission + - Cancer Clinic Data Breach Compromised As Many As 2.2 Million Patient Records (

An anonymous reader writes: Florida-based cancer clinic company, 21st Century Oncology Holdings, has notified 2.2 million patients and employees of a cyberattack that hit its system last year through which their personal data may have been obtained by a malicious third-party. First revealed on 4 March, the cancer treatment chain was informed of the breach, which took place on 13 November 2015, by the FBI. The federal agency knew of the attack but asked that 21st Century Oncology not disclose the incident until a thorough investigation had been conducted. It was discovered that the cybercriminals had accessed the medical group’s systems at the beginning of October last year, and were able to reach and steal sensitive patient and employee data, including names, social security numbers, diagnosis and treatment details, as well as insurance information.

Submission + - IPhones Bricked by Setting Date to Jan 1, 1970 (

lightbox32 writes: Beware of a hoax circling the interwebs promising an Easter egg, which can be seen by setting your iPhone's date to January 1, 1970. The Guardian is reporting that doing so will brick the device. It’s unclear what exactly causes the issue, but could be related to how iOS stores date and time formats. Jan. 1, 1970 is a value of zero or less than zero, which would make any process that uses a time stamp to fail.

Apple is aware of the issue and is looking into it.

Submission + - EU Proposes End Of Anonymity For Bitcoin And Prepaid Card Users (

An anonymous reader writes: In June the European Commission will propose new legislation to effectively end the possibility of anonymous payment, by forcing users of virtual currencies like Bitcoin, and of prepaid credit cards, to provide identity details. Additionally the EC intends to propose monitoring inter-bank transfers within Europe, a measure which had not been implemented with the launch of the EU-US Terrorist Financing Tracking Programme (TFTP). Though the proposed measures are intended to heap new pressure on the financing of terrorism, a report from Interpol last week concluded that terrorist funding methods have not changed substantially in recent years, stating 'Despite third party reporting suggesting the use of anonymous currencies like Bitcoin by terrorists to finance their activities, this has not been confirmed by law enforcement.'

Submission + - Survey: Average Successful Hack Nets Less Than $15,000 (

itwbennett writes: According to a Ponemon Institute survey, hackers make less than $15,000 per successful attack and net, on average, less than $29,000 a year. The average attacker conducts eight attacks per year, of which less than half are successful. Among the findings that will be of particular interest to defenders: Hackers prefer easy targets and will call off an attack if it is taking too long. According to the survey, 13 percent quit after a delay of five hours. A delay of 10 hours causes 24 percent to quit, a delay of 20 hours causes 36 to quit, and a majority of 60 percent will give up if an attack takes 40 additional hours. 'If you can delay them by two days, you can deter 60 percent of attacks,' said Scott Simkin, senior threat intelligence manager at Palo Alto Networks, which sponsored the study.

Submission + - Seagate Faces Lawsuit Over Defective Hard Drives (

An anonymous reader writes: Consumers have today filed a class-action lawsuit against data storage company Seagate, after it had continued to sell a 3TB hard drive model that had an ‘exceptionally’ high failure rate. The case is based on figures released by data backup company Backblaze, who found that failure rates for the ST3000DM001 were not only far higher than other drives, but also did not display a typical ‘bathtub-shaped’ failure rate curve. Backblaze’s report has since been accused of not representing real-world use. Seagate is likely to adopt this line as it responds to the suit.

Submission + - Trend Micro Flaw Could Have Allowed Attacker To Steal All Passwords (

itwbennett writes: Trend Micro has released an automatic update fixing the problems in its antivirus product that Google security engineer Tavis Ormandy discovered could allow 'anyone on the internet [to] steal all of your passwords completely silently, as well as execute arbitrary code with zero user interaction.' The password manager in Trend's antivirus product is written in JavaScript and opens up multiple HTTP remote procedure call ports to handle API requests, Ormandy wrote. Ormandy says it took him 30 seconds to find one that would accept remote code. He also found an API that allowed him to access passwords stored in the manager. This is just the latest in a string of serious vulnerabilities that have been found in antivirus products in the last seven months.

Slashdot Top Deals

Frankly, Scarlett, I don't have a fix. -- Rhett Buggler