Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Microsoft Using Hour of Code to Pitch its 200-Hour Minecraft CS Curriculum

theodp writes: "Coding serves as a gateway to essential 21st-century thinking skills," Microsoft-owned Minecraft Education writes in a blog post announcing Hour of Code 2024: The Show Must Go On!, its flagship tutorial for the upcoming Hour of Code, which is run by Microsoft-bankrolled Code.org during Computer Science Education Week, which in turn is run by the Microsoft-backed Computer Science Teachers Association. "We're celebrating ten years of Minecraft coding challenges," begins the 'trailer' for the 2024 Minecraft based tutorial, which offers block-based (using teen influencer-promoted Microsoft MakeCode) and text-based (using Python) programming interfaces.

On the Minecraft Hour of Code page, Microsoft also makes a pitch for educators to go beyond an Hour of Code to prepare their students for the digital future: "Inspire STEM passion in K–12 learners with our Minecraft CS learning progression, 200 hours of curriculum, and professional development." In June, Minecraft Education announced its AP Computer Science Principles course with Minecraft and MakeCode Curriculum for high school students has been approved for college credit by The College Board.

"Minecraft has always been a powerful platform to unlock students' creativity, while teaching the basics of coding," wrote Microsoft CEO Satya Nadella in 2018. "Over the past four years, there have been an incredible 130 million Minecraft Hour of Code sessions." The corporate-sponsored Hour of Code tutorials, a cynic might say, blur the lines between coding lessons and product infomercials.

Submission + - China State Hackers Infected 20,000 Fortinet VPNs, Dutch Spy Service Says (arstechnica.com)

An anonymous reader writes: Hackers working for the Chinese government gained access to more than 20,000 VPN appliances sold by Fortinet using a critical vulnerability that the company failed to disclose for two weeks after fixing it, Netherlands government officials said. The vulnerability, tracked as CVE-2022-42475, is a heap-based buffer overflow that allows hackers to remotely execute malicious code. It carries a severity rating of 9.8 out of 10. A maker of network security software, Fortinet silently fixed the vulnerability on November 28, 2022, but failed to mention the threat until December 12 of that year, when the company said it became aware of an “instance where this vulnerability was exploited in the wild.” On January 11, 2023—more than six weeks after the vulnerability was fixed—Fortinet warned a threat actor was exploiting it to infect government and government-related organizations with advanced custom-made malware.

Submission + - The Rise and Fall of BNN Breaking, an AI-Generated News Outlet (nytimes.com)

An anonymous reader writes: The news was featured on MSN.com: “Prominent Irish broadcaster faces trial over alleged sexual misconduct.” At the top of the story was a photo of Dave Fanning. But Mr. Fanning, an Irish D.J. and talk-show host famed for his discovery of the rock band U2, was not the broadcaster in question. “You wouldn’t believe the amount of people who got in touch,” said Mr. Fanning, who called the error “outrageous.” The falsehood, visible for hours on the default homepage for anyone in Ireland who used Microsoft Edge as a browser, was the result of an artificial intelligence snafu. A fly-by-night journalism outlet called BNN Breaking had used an A.I. chatbot to paraphrase an article from another news site, according to a BNN employee. BNN added Mr. Fanning to the mix by including a photo of a “prominent Irish broadcaster.” The story was then promoted by MSN, a web portal owned by Microsoft. The story was deleted from the internet a day later, but the damage to Mr. Fanning’s reputation was not so easily undone, he said in a defamation lawsuit filed in Ireland against Microsoft and BNN Breaking. His is just one of many complaints against BNN, a site based in Hong Kong that published numerous falsehoods during its short time online as a result of what appeared to be generative A.I. errors.

Mr. Fanning’s complaint against BNN is one of many. The site based published numerous falsehoods during its short time online.Credit...Paulo Nunes dos Santos for The New York Times BNN went dormant in April, while The New York Times was reporting this article. The company and its founder did not respond to multiple requests for comment. Microsoft had no comment on MSN’s featuring the misleading story with Mr. Fanning’s photo or his defamation case, but the company said it had terminated its licensing agreement with BNN. During the two years that BNN was active, it had the veneer of a legitimate news service, claiming a worldwide roster of “seasoned” journalists and 10 million monthly visitors, surpassing the The Chicago Tribune’s self-reported audience. Prominent news organizations like The Washington Post, Politico and The Guardian linked to BNN’s stories. Google News often surfaced them, too. A closer look, however, would have revealed that individual journalists at BNN published lengthy stories as often as multiple times a minute, writing in generic prose familiar to anyone who has tinkered with the A.I. chatbot ChatGPT. BNN’s “About Us” page featured an image of four children looking at a computer, some bearing the gnarled fingers that are a telltale sign of an A.I.-generated image.

Google

Verizon and Google Offer Up Net Neutrality Truce 115

When it comes to net neutrality, can we get along? Google and Verizon, antagonists on the question yet partners in Droid, say yes. The two companies have even teamed up to send the FCC ideas on how to handle network management disputes. 'Google/Verizon say that the Internet should function as an "open platform." That means, to them, that "when a person accesses cyberspace, he or she should be able to connect with any other person that he or she wants to—and that other person should be able to receive his or her message," they write. The 'Net should operate as a place where no "central authority" can make rules that prescribe the possible, and where entrepreneurs and network providers are able to "innovate without permission."'"
Encryption

What's Holding Back Encryption? 660

nine-times writes "After many years in IT, I've been surprised to notice how much of my traffic is still unencrypted. A lot of businesses that I interact with (both business and personal) are still using unencrypted FTP, and very few people use any kind of encryption for email. Most websites are still using unencrypted HTTP. DNSSEC seems to be picking up some steam, but still doesn't seem to be widely used. I would have thought there would be a concerted effort to move toward encryption for the sake of security, but it doesn't seem to be happening. I wanted to ask the Slashdot community, what do you think the hold up is? Are the existing protocols somehow not good enough? Are the protocols fine, but not supported well enough in software? Is it too complicated to manage the various encryption protocols and keys? Is it ignorance or apathy on the part of the IT community, and that we've failed to demand it from our vendors?"
Internet Explorer

Microsoft Says Upgrade To IE8, Even Though It's Vulnerable 279

Barence writes "Microsoft has issued a statement urging people to upgrade their browser to IE8, after the zero-day exploit that was used to attack companies such as Google went public. According to Microsoft's security advisory: 'the vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.' But, although IE6 has been the source of the attacks until now, Microsoft's advisory admits that both IE7 and IE8 are vulnerable to the same flaw, even on Windows 7."
Microsoft

Microsoft Bots Effectively DDoSing Perl CPAN Testers 332

at_slashdot writes "The Perl CPAN Testers have been suffering issues accessing their sites, databases and mirrors. According to a posting on the CPAN Testers' blog, the CPAN Testers' server has been being aggressively scanned by '20-30 bots every few seconds' in what they call 'a dedicated denial of service attack'; these bots 'completely ignore the rules specified in robots.txt.'" From the Heise story linked above: "The bots were identified by their IP addresses, including 65.55.207.x, 65.55.107.x and 65.55.106.x, as coming from Microsoft."
Robotics

Robotics Prof Fears Rise of Military Robots 258

An anonymous reader writes "Interesting video interview on silicon.com with Sheffield University's Noel Sharkey, professor of AI & robotics. The white-haired prof talks state-of-the-robot-nation — discussing the most impressive robots currently clanking about on two-legs (hello Asimo) and who's doing the most interesting things in UK robotics research (something involving crickets apparently). He also voices concerns about military use of robots — suggesting it won't be long before armies are sending out fully autonomous killing machines."
Mozilla

Mozilla Starts To Follow a New Drumbeat 226

ChiefMonkeyGrinder writes "Key, then, to the Drumbeat project is openness, specifically openness as applied to the Internet. That fits in well with the original impulses behind Mozilla and Firefox. The former was about transforming the Netscape Communicator code into an open source browser, and the latter was about defending open standards from Microsoft's attempt to lock people into Internet Explorer 6 and its proprietary approaches. Both Mozilla and Firefox have succeeded, but the threats have now changed."
Networking

Chinese Game Operator Used DDoS Attacks On Rivals 28

carusoj writes "An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police. The escalation began with a distributed denial-of-service attack on a domain registrar that serves many small gaming companies. While the national scale of the effects was unusual, such attacks are common among some small Internet businesses competing to draw customers in China, security researchers say. Police have arrested four people involved in the attack."
Security

Apple Keyboard Firmware Hack Demonstrated 275

Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."

Slashdot Top Deals

If mathematically you end up with the wrong answer, try multiplying by the page number.

Working...