Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - The FCC just passed sweeping new rules to protect your online privacy (washingtonpost.com) 1

jriding writes: Federal regulators have approved unprecedented new rules to ensure broadband providers do not abuse their customers' app usage and browsing history, mobile location data and other sensitive personal information generated while using the Internet.

The rules, passed Thursday in a 3-to-2 vote by the Federal Communications Commission, require Internet providers, such as Comcast and Verizon, to obtain their customers' explicit consent before using or sharing that behavioral data with third parties, such as marketing firms.

Submission + - How Police Body Cameras Fail (fastcompany.com)

tedlistens writes: Since the shooting of unarmed, 18-year-old Michael Brown in 2014—an incident that was not captured on camera—activists and city governments have stridently fought for more police oversight through body-worn cameras, and cities are responding, with the help of millions of dollars in body camera grants from the White House. But the public is discovering that the technology isn't foolproof: Cameras fall off, officers fail to record, and the video itself can be kept largely out of the public record, in deference to privacy laws, police policies, and the challenges of managing massive amounts of footage. But, critics worry, when video collected for oversight purposes isn't shared publicly—or isn’t collected at all—citizens might become more suspicious about police misconduct, amplifying mistrust amid an effort to fight it. An article at Fast Company details ways in which body camera programs are falling short of their goals, and ideas for improving what some have called the most rapid technology upgrade in policing history.

Submission + - Unencrypted Key Allows Drone Hijacking

An anonymous reader writes: A researcher has discovered a new technique for hijacking drones by attacking a popular radio wireless control protocol known as DSMx. The transmission protocol covers millions of hobbyist devices including radio-controlled toy cars, airplanes, helicopters and boats. While jammers are already available to intercept radio signals and disrupt flight paths, security expert Jonathan Andersson at Trend Micro DVLabs, has now found an exploitable vulnerability which allows a hijacker to completely control the drone itself. Andersson explained how the unencrypted binding key used to connect the remote transmitter with the DSMx receiver can be extracted from the protocol through brute-force attacks. He also found that a timing weakness allows for hijacker commands to be sent before legitimate ones, causing the compromised drone to reject the real operator’s instructions. Using a tiny device called Icarus, built using off-the-shelf electronics and software-defined radio (SDR), Andersson showed how an interceptor can take over control of the radio-controlled devices, locking out the original owner in seconds.

Submission + - FCC Enacts Major New Online Privacy Rule

Trailrunner7 writes: The FCC has voted to enact a new rule that will force broadband companies to get consent from customers before they sell information about those customers’ online movements, history, and other actions.

The new rule will require broadband companies to have customers opt in to the sale or sharing of their online histories as part of marketing or ad deals. It includes restrictions on the way that providers can share users’ location data and other information and also ensures that they will have to tell consumers exactly what data they collect and what they do with it. The changes do not apply to how broadband providers can use customer information in their own marketing, though.

The new regulations also require that broadband providers have “common-sense” data breach notifications and reasonable security practices.

The vote by the FCC makes distinctions between broadband providers and phone carriers and other service providers. Before the vote, providers and others had urged the FCC to align its rules with existing ones from the FTC on usage of customer data for marketing.

Submission + - Stolen Medical Records Available For Sale From $0.03 Per Record (helpnetsecurity.com)

Orome1 writes: Intel Security found that the price per record for stolen medical records remains lower than financial account records and retail payment account information, despite the increasingly time-sensitive, or perishable, nature of data such as credit and debit card numbers. The per record value of financial account data ranged from $14.00 to $25.00 per record, credit and debit cards drew around $4.00 to $5.00, but medical account data earned only from $0.03 to $2.42. Upon stealing a cache of medical records, it is likely cybercriminals must analyze the data, and perhaps cross-reference it with data from other sources before lucrative fraud, theft, extortion, or blackmail opportunities can be identified. Financial data, therefore, still presents a faster, more attractive return-on-investment opportunity for cybercriminals.

Submission + - Future robots will learn through curiosity and self-generated goals (robohub.org)

Kassandra Perlongo writes: Like something out of the popular sci-fi show Westworld, a new Horizon 2020 project is investigating intrinsic motivations (IMs) and curiosity in the hopes of creating autonomous learning both in biological agents and robots.

If curiosity and IMs are at the basis of human versatility and adaptability then endowing artificial agents with architectures and algorithms mimicking IMs might help the needed “motivational engine” to drive robots through an “open-ended” autonomous learning process without the need for continuous programming and training by human experts.

Submission + - DARPA looking to develop drone destroying, personnel protection system (networkworld.com)

coondoggie writes: The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones. DARPA says it will offer $3 million for each phase 1 developer.

Submission + - Terabit-Scale DDoS Events Are On The Horizon (helpnetsecurity.com)

Orome1 writes: Corero Network Security has disclosed a new DDoS attack vector observed for the first time against its customers last week. The technique is an amplification attack, which utilizes the LDAP: one of the most widely used protocols for accessing username and password information in databases like Active Directory, which is integrated in most online servers. While experts have so far only observed a handful of short but extremely powerful attacks originating from this vector, the technique has potential to inflict significant damage by leveraging an amplification factor seen at a peak of as much as 55x. When combined with other methods, particularly IoT botnets, we could soon see attacks reaching previously unimaginable scale, with far-reaching impact. Terabit scale attacks could soon become a common reality and could significantly impact the availability of the Internet.

Submission + - Rich People Pay Less Attention To Other People, Says Study (businessinsider.com)

An anonymous reader writes: In a small recent study, researchers from New York University found that those who considered themselves in higher classes looked at people who walked past them less than those who said they were in a lower class did. The results were published in the journal of the Association for Psychological Science. According to Pia Dietze, a social psychology doctoral student at NYU and a lead author of the study, previous research has shown that people from different social classes vary in how they tend to behave towards other people. So, she wanted to shed some light on where such behaviors could have originated. The research was divided into three separate studies. For the first, Dietze and NYU psychology lab director Professor Eric Knowles asked 61 volunteers to walk along the street for one block while wearing Google Glass to record everything they looked at. These people were also asked to identify themselves as from a particular social class: either poor, working class, middle class, upper middle class, or upper class. An independent group watched the recordings and made note of the various people and things each Glass wearer looked at and for how long. The results showed that class identification, or what class each person said they belonged to, had an impact on how long they looked at the people who walked past them. During Study 2, participants viewed street scenes while the team tracked their eye movements. Again, higher class was associated with reduced attention to people in the images. For the third and final study, the results suggested that this difference could stem from the way the brain works, rather than being a deliberate decision. Close to 400 participants took part in an online test where they had to look at alternating pairs of images, each containing a different face and five objects. Whereas higher class participants took longer to notice when the face was different in the alternate image compared to lower classes, the amount of time it took to detect the change of objects did not differ between them. The team reached the conclusion that faces seem to be more effective in grabbing the attention of individuals who come from relatively lower class backgrounds.

Submission + - Carriers to Implement Do Not Originate List to Defeat Robocalls

Trailrunner7 writes: An industry led strike force is preparing to take away one of the most valuable pieces of technology used by phone scammers: caller ID spoofing.

The Robocall Strike Force, convened by the FCC and comprising wired and wireline telecom companies, has been working since August on a handful of new technologies, standards, and other techniques to help address the robocall problem. On Wednesday, members of the strike force delivered their report to the FCC and said that a trial of a new Do Not Originate list has shown tremendous promise in preventing scammers from being able to spoof numbers belonging to government agencies, charities, and other legitimate organizations.

A trial of the DNO list that’s been running for the last few weeks on some IRS numbers has resulted in a 90 percent drop in the volume of IRS scam calls, officials from AT&T, which leads the strike force, said during the FCC meeting Wednesday. The carriers on the strike force, which include Sprint, Verizon, and many others, plan to continue testing the DNO list in the coming months, with the intent to fully implement it some time next year.

Submission + - A Mesh Network Radio For The Masses? (vice.com)

tedlistens writes: A new device debuting today on Kickstarter, the goTenna Mesh, aims to bring the dream of mesh networking to the masses. The 6" pill-shaped radio connects to phones over Bluetooth and allows them to âoemeshâ together in order to transmit messages in daisy chains that can reach miles. Relying on a protocol that sends short bursts of data over long-range radio signals, the device, retailing for $179 and preselling for $129, won't replace an internet connection or allow users to watch Netflix. But it may be the first consumer-friendly device for a reliable off-grid peer-to-peer communication network.

Users neednâ(TM)t need know the nodes relaying their message, only the person they are communicating with, via the appâ(TM)s encrypted chat. The app also has a "Shout" feature, allowing a goTenna or goTenna Mesh user to send a message to whomever is in the vicinity.

GoTenna hopes the device will change the way people communicate during outdoor adventures, on field trips, or at large events or protests, during emergencies, when network service is otherwise bad or nonexistent.

Submission + - Why do we kill? Controversial study blames our distant ancestors (sciencemag.org)

sciencehabit writes: Human bloodlust—from war to murder—traces back millions of years to our primate ancestors. That’s the conclusion of a controversial new study, which reaches far back into our family tree to uncover the evolutionary roots of lethal violence among more than 1000 mammalian species. ased on the rates of lethal violence seen in our close relatives. Based on their research, the team predicted that 2% of human deaths would be caused by another human. And indeed, from 50,000 years ago to 10,000 years ago, when humans lived in small groups of hunter-gatherers, the rate of killing was “statistically indistinguishable” from the predicted rate of 2%, based on archaeological evidence

Submission + - Can 'predictive policing' prevent crime before it happens? (sciencemag.org)

sciencehabit writes: Many police departmentss, both in the U.S and abroad, have adopted or are interested in predictive policing, an approach that seeks to predict where and when crime is likely to occur or identifies people most at risk of becoming a perperator or a victim. Supporters say predictive policing—which uses large data sets and algorithms borrowed from fields as diverse as seismology and epidemiology--can help bring down crime rates while also reducing bias in policing. But civil liberties groups and racial justice organizations argue that the algorhitms perpetuate racial prejudice and they worry about privacy issues. To what degree predictive policing actually prevents crime, meanwhile, is still up for debate.

Submission + - Melinda Gates Announces Initiative to Get More Women into Tech (backchannel.com)

mirandakatz writes: The first lady of philanthropy is striking out on her own with a personal office dedicated to increasing the numbers of women in tech and helping them stay there. To Melinda Gates, it's personal: she got her start in tech, studying computer science and spending a decade at Microsoft. In an exclusive interview with Backchannel, Gates says that "women truly only get empowered when there’s a collective of them. You get one woman down in a village trying to break the system. She can’t do it at the village level unless she’s got women around her. It’s the power of the collective. Then she can go demand her rights. You have one woman in an AI lab? She’s not going to be able to make the change that three or four can if it’s amongst 10 coders." Click through for the full read, and to leave your own thoughts on exactly how Gates should spend her money: Backchannel will publish the best suggestions in a letter to Gates in the coming weeks.

Submission + - Self-Driving Chairs Are Coming (pcmag.com)

jasonbrown writes: Nissan, the Japanese automaker this week debuted what it's calling the ProPILOT Chair — an autonomous chair that automatically queues for you while you sit back and relax. With its built-in cameras, the high-tech chair "detects and automatically follows the chair ahead of it, maintaining a fixed distance and travelling along a set path." Standing (or sitting) in line has never been so much fun.

Slashdot Top Deals

So... did you ever wonder, do garbagemen take showers before they go to work?