Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Communications

US Warns Olympic Visitors of Chinese Cyber-Spying 231

An anonymous reader writes to tell us the US Government has issued a strong warning to travelers headed to the Beijing Olympics (PDF) with respect to electronic data. Part FUD, part awareness, the CBS article reads like 1984, urging travelers to treat all electronic devices (from fax to cellphone and back) as compromised, and proceeds to talk about China's aggressive cyber-espionage programs. "China is one of a number of countries pushing active cyber-espionage programs aimed primarily at cracking U.S. national security computers and stealing corporate trade secrets. Billions have already been lost. In addition, cyber-gangs and criminals, many based in Asia, have stolen bank accounts and credit card numbers from an untold number of Americans."
The Internet

The Internet Meme Timeline 235

CNet pointed out a great use of timeline creation site "Dipity" that has resulted a timeline of internet fads and memes. While there are some subtle inaccuracies and a few notable omissions, it seems to have touched on most of the big stuff. Everything from GOTO being considered harmful to "the website is down," it's a great trip down memory lane if you don't mind a few speedbumps like the goatse guy.
The Military

USAF Enlists Shrinks To Help Drone Pilots Cope 587

An anonymous reader writes "Flying drones from halfway-across the world used to be considered a cushy military job. But the Iraq and Afghanistan wars have become so dependent on the robo-planes that the Air Force has called in chaplains and psychiatrists to help these remote-control warriors cope. 'In a fighter jet, "when you come in at 500-600 miles per hour, drop a 500-pound bomb and then fly away, you don't see what happens," said Colonel Albert K. Aimar, who is commander of the 163d Reconnaissance Wing here and has a bachelor's degree in psychology. But when a Predator fires a missile, "you watch it all the way to impact, and I mean it's very vivid, it's right there and personal. So it does stay in people's minds for a long time."'"
Security

Net Shoppers Bullied Into "Verified By Visa" Program 302

bluefoxlucid writes "According to The Register, several banks are forcing users to opt-in to the Verified by Visa optional service by locking their cards if and when they encounter a Verified by Visa participating site and fail to opt-in. Register reader Steve says, 'This seems like a strange way to implement a voluntary system. On most of the retailers' websites there is no clue that you are about to be challenged by Verified by Visa until you attempt to complete the transaction. This means that you trigger the "fraud protection" unintentionally. And when you have located a retailer who doesn't require Verified by Visa to complete a purchase, you can't because your account is on hold.' Further, '[I]n some cases resetting the password is all too easy. Fraudsters know this and go after these credentials which, once obtained, make it harder for consumers to deny responsibility for a fraudulent transaction. Phishing scams posing as Verified by Visa sites have sprung up targeting these login credentials.'"
Privacy

Fingerprint Test Tells Much More Than Identity 166

Mike sends in the story of a new fingerprint technology with interesting potential for both crime detection and rights violations; there are also intriguing possibilities in fighting cancer. "Using a variation of mass spectrometry called 'desorption electrospray ionization' or 'Desi,' a fingerprint can identify what the person has been touching — drugs, explosives, or poisons, for example. Writing in the Friday issue of the journal Science, R. Graham Cooks, a professor of chemistry at Purdue University, and his colleagues describe how the technique could find a wider application in crime investigations. As it becomes cheaper and more widely available, the Desi technology has potential ethical implications, Cooks said. Instead of drug tests, a company could surreptitiously check for illegal drug use of its employees by analyzing computer keyboards after the employees have gone home, for instance."
The Courts

Non-Compete Clauses Thrown Out In California 375

drfuchs writes "If you signed an employment agreement in California, any non-compete clause in it is null & (void*), says the state Supreme Court of California (ruling PDF). Better still, the San Francisco Chronicle opines that the US Federal courts are likely to fall in line with the decision in the way they interpret California law. (Most other states still have non-compete laws on the books and it's not clear this ruling will affect them.) Turns out it wasn't a high-tech case at all, but a CPA who had worked for the accounting firm Arthur Anderson (now disgraced due to their complicity in the Enron case)."
It's funny.  Laugh.

8 People Buy "I Am Rich" iPhone App For $1,000 684

FsG writes "In the first 24 hours that it was available, eight people bought a completely useless iPhone app for $1,000 a pop. This app does nothing except alert onlookers that you have a lot of money. The developer priced it at $999.99, which is the most you can charge on Apple's store. Apple has since yanked the app (without explanation as usual), while the inventive programmer walked away with $5,600."
Microsoft

Microsoft Tries a New Ad Agency 372

Diomidis Spinellis writes "An article in this week's Economist outlines Microsoft's marketing response to Vista's travails and Apple's hip Get a Mac campaign. Describing the recent Mojave Experiment as 'Microsoft at its worst,' the article's writer wonders whether hiring a new hot ad agency, Crispin Porter + Bogusky, to put together a $300m campaign can make Microsoft look cool. Can money buy you love?"
The Almighty Buck

Nearly 50,000 IT Jobs Lost In Past Year 460

snydeq writes "Employment statistics from the US Department of Labor show what most IT people have already realized: IT jobs are getting harder to come by. According to the Bureau of Labor Statistics, 13,000 jobs in the information industry were cut in July, bringing the total to 44,000 year over year. An additional 5,000 jobs were lost in telecom this past month. The statistics reinforce a recent survey of top CIOs who indicated that they will be reducing their IT staff over the coming year. According to a staffing research firm, some jobs have gone to outsourcers, while other jobs are simply going away, either due to cost-oriented automation efforts or due to increasing the remaining staff's workload."
Programming

Computer Beats Pro At US Go Congress 496

Bob Hearn writes "I was in attendance at the US Go Congress match yesterday where history was made: the go program MoGo, running on an 800-core supercomputer, beat 8-dan professional go player Myungwan Kim in a 9-stone handicap game. Most in the audience were shocked at the computer's performance; it was naturally assumed that the computer would be slaughtered, as usual. Go is often seen as the last bastion of human superiority over computers in the domain of board games. But if Moore's law continues to hold up, today's result suggests that the days of human superiority may be numbered." Read below for more details in Bob's account of the match.
Security

Vista's Security Rendered Completely Useless 415

scribbles89 sends in a story that originally ran in SearchSecurity; it sounds like it could be a game-changer. "While this may seem like any standard security hole, other researchers say that the work is a major breakthrough and there is very little that Microsoft can do to fix the problems. These attacks work differently than other security exploits, as they aren't based on any new Windows vulnerabilities, but instead take advantage of the way Microsoft chose to guard Vista's fundamental architecture. According to Dino Dai Zovi..., 'the genius of this is that it's completely reusable. They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over.'" Update: 08/08 14:23 GMT by KD : Changed the link, as the story first linked had been lifted without attribution.
Linux Business

IBM Exec Bemoans Lack of Industry-Specific Linux Apps 302

Ian Lamont writes "Bob Sutor, IBM's vice president of open source and standards, used his keynote appearance at LinuxWorld to complain about the lack of industry-specific open source apps. Despite some encouraging signs in the educational field with Sakai, Sutor said that he was 'tired of waiting' for specialized applications to appear in other sectors, adding that the proliferation of different licenses — and changing legal requirements for using the same software over time — is holding some businesses back from using open source applications."
Communications

Mozilla Launches Snowl Messaging Prototype 85

Jack Spine writes with the story that the Mozilla project "has launched 'Snowl' — an experimental messaging prototype that could allow people to collate and view messages from email, RSS, messaging, and social networks. From the article: 'Key ideas behind the project, called 'Snowl', are to enable users to prioritise messages by importance, and have a search-based interface for message retrieval, according to Mozilla developer Myk Melez. "Could the web browser help you follow and participate in online discussions?" wrote Melez in a blog post on Wednesday. "Snowl is an experiment to answer that question." Another of the key ideas of the project is that browser functionality for navigating web content, including tabs, bookmarks, and history, be used to navigate messages.'"
Earth

New Map of Carved Up Arctic 294

thepacketmaster writes "The International Boundaries Research Unit has recently published a new jurisdictional map of the Arctic, using geographic and legal definitions. Now it appears Santa Claus could potentially be Danish. But as pointed out in an article at The Star, more important than St. Nick is 'an area thought to contain one-fifth of the world's undiscovered and recoverable oil and gas resources,' and from this map, Russia has a huge claim in that."
Security

How Phishers Think, Act, and Make a Profit 133

whitehartstag writes with a write up of "the excellent session at Black Hat that detailed 'how phishers create sites, share info and code, and basically are lazy.' They store their stolen data 'on websites that they have hacked into, or on [publically available] sites like guestbooks. And even worse, they are not protecting their stolen data ... which means that all one needs to do to find this info is to reverse engineer a real phisher's website, look at their PHP script, and find out where they are storing the data.'"

Slashdot Top Deals

The computer is to the information industry roughly what the central power station is to the electrical industry. -- Peter Drucker

Working...