Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Clinton Had Uncleared Filipino Maid Print Emails, Handle Sensitive Documents ( 13

An anonymous reader writes: The New York Post reveals that Hillary Clinton routinely had her emails forwarded so her immigrant Filipino maid who lacked a security clearance could print her emails from an iMac in Clinton's home, including ones that contained classified information. The maid also had access to the SCIF (sensitive compartmented information facility) built at Clinton's home so she could "securely" receive Top Secret information such as the presidential daily brief she received at times. The maid was expected to retrieve faxed information from the SCIF for Secretary Clinton. It appears that the maid was never interviewed by the FBI, nor was the computer seized or searched. One is left wondering, "Was email that hard to print in 2009?" Will the reinvigorated FBI investigation cover untrodden ground like this, or just serve as another white wash?

Submission + - De Beers Scientists Fight the Growing Threat of Man-Made Diamonds 1 writes: The WSJ reports that a small team of scientists working for De Beers is scrambling to stave off a looming threat that could tarnish the luster of natural-mined diamonds: high-quality man-made stones. For now, while synthetics make up just a fraction of the market, they have growing appeal to younger buyers — a headache for mine owners, who are under pressure to cut supply and lower prices, because traders, cutters and polishers are struggling to profit amid a credit squeeze and languishing jewelry sales. Synthetic producers can make 250,000 carats to 350,000 carats of rough diamonds annually, according to industry estimates, compared with about 135 million rough carats mined every year. But Martin Roscheisen, chief executive of Diamond Foundry Inc., a San Francisco synthetic-diamond producer with a capacity of 24,000 carats, says he believes nearly all diamonds consumers purchase will be man-made in a few decades. To counter the threat, last year De Beers helped launch a trade association with other producers to market the attraction of natural diamonds. At a plant about 30 miles west of London, De Beers scientists have been working to detect synthetic diamonds for years. The company has its own synthetic-diamond facility, called Element Six, which produces synthetic diamonds for industrial purposes, such as drilling, and helps De Beers keep up with technological developments. It also started marketing a new, cheap detector called PhosView, that uses ultraviolet light to detect lab-grown stones that quickly screens tiny synthetic diamonds. “We’re very focused on detection,” says Simon Lawson, head of Technologies U.K. at De Beers. “It underpins the integrity of natural diamonds and ensures that consumers cannot be duped into buying a synthetic diamond.” Despite the increased competition, De Beers has no intention of selling synthetics. “De Beers’ focus is on natural diamonds,” says Lawson. “We would not do anything that would cannibalize that industry.”

Submission + - Security Firm Shows How to Hack a US Voting Machine ( 1

An anonymous reader writes: Three days before the US Presidential Election takes place, California-based security firm Cylance showed the world how easy is to hack one of the many voting machine models that will be deployed at voting stations across the US on Election Day. The machine that Cylance researchers chose for their test was the Sequoia AVC Edge Mk1, one of the most popular models. The technique researchers created modifies the Public Counter, but also the Protective Counter, which is a backup mechanism that acts as a redundant verification system to ensure the first vote results are valid. Physical access is needed to hack the machine, but the hack takes a short time to perform. According to statements from FBI Director James Comey, hacking voting machines doesn't seem to be an issue as problematic as voter registration systems, which are connected to the Internet.

And again, these are the voter registration systems. This is very different from the vote system in the United States, which is very very hard for someone to hack into, cause it's so clunky and dispersed. It's Mary and Fred putting a machine under the basketball hoop at the gym. Those things are not connected to the Internet, but the voter registration are.

Submission + - Compromised Electronic Health Records May Haunt You Forever (

An anonymous reader writes: Healthcare systems are relentlessly and incessantly attacked by different types of attackers. If our electronic health records (EHRs) get compromised just once, and sold repeatedly all over the Dark Web, we’ll likely have problems for the rest of our lives. Information that is contained in those records can be used for many different types of fraud and attacks, such as medical identity theft, submission of false claims, acquisition of controlled and prescription substances, and obtainment of medical devices. For example, a thief may use a stolen medical identity so that the doesn’t have to pay for care at a hospital, but this information can be added to the record, and may turn out to interfere severely with future medical care of the person whose medical identity has been stolen.

Submission + - SPAM: Cisco's Network Bugs Are Front and Center in Bankruptcy Fight

schwit1 writes: Game of War: Fire Age, your typical melange of swords and sorcery, has been one of the top-grossing mobile apps for three years, accounting for hundreds of millions of dollars in revenue. So publisher Machine Zone was furious when the game's servers, run by hosting company Peak Web, went dark for 10 hours last October. Two days later, Machine Zone fired Peak Web, citing multiple outages, and later sued.

Then came the countersuit. Peak Web argued in court filings that Machine Zone was voiding its contract illegally, because the software bug that caused the game outages resided in faulty network switches made by Cisco Systems, and according to Peak Web's contract with Machine Zone, it wasn't liable. In December, Cisco publicly acknowledged the bug's existenceâ"too late to help Peak Web, which filed for bankruptcy protection in June, citing the loss of Machine Zone's business as the reason. The Machine Zone-Peak Web trial is slated for March 2017.

"Machine Zone wasn't acting in good faith," says Steve Morrissey, a partner at law firm Susman Godfrey, which is representing Peak Web. "They were trying to get out of the contract." Machine Zone has disputed that assertion in court documents, but it declined to comment for this story. Cisco also declined to comment on the case, saying only that it tries to publish confirmed problems quickly.

There's buggy code in virtually every electronic system. But few companies ever talk about the cost of dealing with bugs, for fear of being associated with error-prone products. The trial, along with Peak Web's bankruptcy filings, promises a rare look at just how much or how little control a company may have over its own operations, depending on the software that undergirds it. Think of the corporate computers around the world rendered useless by a faulty update from McAfee in 2010, or of investment company Knight Capital, which lost $458 million in 30 minutes in 2012-and had to be sold months laterâ"after new software made erratic, automated stock market trades.

Link to Original Source

Submission + - University of California's outsourcing is wrong, says U.S. lawmaker (

dcblogs writes: A decision by the University of California to lay off IT employees and send their jobs overseas is under fire from U.S. Rep. Zoe Lofgren (D-Calif) and the IEEE-USA. "How are they [the university] going to tell students to go into STEM fields when they are doing as much as they can to do a number on the engineers in their employment?" said U.S. Rep. Zoe Lofgren (D-Calif). Peter Eckstein, the president of the IEEE-USA, said what the university is doing "is just one more sad example of corporations, a major university system in this case, importing non-Americans to eliminate American IT jobs." The university recently informed about 80 IT workers at its San Francisco campus, including contract employees and vendor contractors, that it hired India-based HCL, under a $50 million contract, to manage infrastructure and networking-related services. The affected employees will leave their jobs in February, after they train their contractor replacements.

Submission + - SPAM: The government vs the people of Louisiana

schwit1 writes: During the recent flooding in Louisiana, it was repeatedly the government vs ordinary citizens as people scrambled to deal with the disaster.

The government was repeatedly in the way and working to prevent people from helping themselves. In fact, it often seemed more interested in collecting fees and paperwork than allowing people to be rescued or homes to be rebuilt.

Submission + - iPhones Are Now Faster than Macs (

An anonymous reader writes: It’s official—well at least according to reported Geekbench scores spotted in the wild! iPhones are now faster than Macs! The latest, and most recently updated, 2016 12” MacBook is slower than the iPhone 7 Plus.

Submission + - Slashdot ads compromised (

An anonymous reader writes: The Slashdot ad network is potentially spreading malware through malicious redirects as part of what's at the very least a phishing campaign and at worst a drive-by malware delivery network.

This was reproduced on a fresh, fully patched device.

Submission + - New OS X Backdoor Emerges With Tor C&C

Trailrunner7 writes: Researchers have discovered a new backdoor for Mac OS X that gives attackers essentially complete control over an infected machine. The malware is disguised as a common file converter utility and uses Tor for some communication functions.

Known as Eleanor, the backdoor has a wide range of functionality, including the ability for the attacker to remotely control the infected machine, steal data, take pictures from the machine’s camera, and take many other actions. The infection routine starts when the user downloads and runs the malicious app, called EasyDoc Converter, which looks like a drag-and-drop conversion utility. Once on a new machine, the app executes a script that serves as an installer for the rest of the malware’s functionality, including a Tor component, a Web service agent, and a Pastebin agent.

Submission + - Hacked Smart Watch Can Reveal the Wearer's ATM Pin (

the_newsbeagle writes: By gaining access to the sensors in someone's smart watch, hackers could track the person's hand movements at an ATM and figure out his/her pin. The hacker needn't be anywhere near the ATM; data can be lifted from the smart watch by either a discreet wireless sniffer or by malware on the watch that sends info to a server. This is hardly the first demonstration of the security flaws in smart watches. Last year, a research group showed that a watch's sensors can reveal keystrokes on a computer keyboard.

Submission + - Architecture/engineering 5th highest suicide rate, computers/tech 8th highest (

afeeney writes: The CDC reported on the suicide rates from 2012, across 17 of the United States. The highest rates are in farming, fishing, and forestry, the lowest in education, training, and library. Architects and engineers had the 5th highest rate, and computers and technology had the 8th highest. Male engineers were far more likely to kill themselves (32.8 suicides per 100,000) than females (12.5).

Do you perceive this as based on the characteristics of the population (including the fact that jobs focused on precision might make suicide attempts more successful, higher proportion of males) or the characteristics of the jobs (stress, complexity)?

If you've ever been there or know somebody who has, what helped?

Help is available at the National Suicide Prevention Hotline if you or somebody you care about is considering suicide.

Submission + - New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second (

An anonymous reader writes: A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that's capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim's card. The device, named Contactless Infusion X5, is extremely dangerous because it can copy up to 15 bank cards per second, something that may come in hand if a crook is going through a crowd at a concert or through a crowded subway cart. The device can collect data such as the card's number and expiration date. If the debit card's RFID chip stores information such as the card holder’s name, home address, and a mini statement, X5 can steal that data as well. The X5 is sold on the Dark Web for only 1.2 Bitcoin (~$825), and its creators say that each buyer will receive the X5 device, a USB cable for charging and data transfers, and 20 blank cards.

Slashdot Top Deals

No amount of genius can overcome a preoccupation with detail.