Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Encryption

The Clock Is Ticking On Encryption 228

CWmike writes "In the indictment that led to the expulsion of ten Russian spies from the US in the summer of 2010, the FBI said that it gained access to their communications after surreptitiously entering one of the spies' homes, during which agents found a piece of paper with a 27-character password. The FBI had found it more productive to burglarize a house than to crack a 216-bit code, despite having the computational resources of the US government behind it, writes Lamont Wood. That's because modern cryptography, when used correctly, is rock solid. Cracking an encrypted message can require time frames that dwarf the age of the universe. That's the case today. 'The entire commercial world runs off the assumption that encryption is rock solid and is not breakable,' says Joe Moorcones, vice president of information security firm SafeNet. But within the foreseeable future, cracking those same codes could become trivial, thanks to quantum computing."
Google

Hard-Coded Bias In Google Search Results? 257

bonch writes "Technology consultant Benjamin Edelman has developed a methodology for determining the existence of a hard-coded bias in Google's search engine which places Google's services at the top of the results page. Searching for a stock ticker places Google Finance at the top along with a price chart, but adding a comma to the end of the query removes the Google link completely. Other variations, such as 'a sore throat' instead of 'sore throat,' removes Google Health from its top position. Queries in other categories provide links to not only Google services but also their preferred partners. Though Google claims it does not bias its results, Edelman cites a 2007 admission from Google's Marissa Mayers that they placed Google Finance at the top of the results page, calling it 'only fair' because they made the search engine. Edelman notes that Google cites its use of unbiased algorithms to dismiss antitrust scrutiny, and he recalls the DOJ's intervention in airlines providing favorable results for their own flights in customer reservation systems they owned."
Transportation

Bruce Schneier vs. the TSA 741

An anonymous reader writes "Bruce Schneier has posted a huge recap of the controversy over TSA body scanners, including more information about the lawsuit he joined to ban them. There's too much news to summarize, but it covers everything from Penn Jillette's and Dave Barry's grope stories, to Israeli experts who say this isn't needed and hasn't ever stopped a bomb, to the three-year-old girl who was traumatized by being groped and much, much more." Another reader passed along a related article, which says, "Congressman Ron Paul lashed out at the TSA yesterday and introduced a bill aimed at stopping federal abuse of passengers. Paul’s proposed legislation would pave the way for TSA employees to be sued for feeling up Americans and putting them through unsafe naked body scanners."
Facebook

Top Facebook Apps Violate Privacy Terms 95

cgriffin21 writes "No stranger to privacy concerns, Facebook is once again in the privacy spotlight, following a Wall Street Journal report that some popular Facebook applications leak personal information to advertisers. 'Many of the popular applications, or 'apps,' on the social-networking site Facebook Inc. have been transmitting identifying information — in effect, providing access to people's names and, in some cases, their friends' names — to dozens of advertising and Internet tracking companies,' according to The Wall Street Journal, which wrote about Facebook Sunday in the latest installment of its recent 'What They Know' series about advertising and the Internet."
Space

Saturn's Rings Formed From Large Moon Destruction 115

Matt_dk writes "The formation of Saturn's rings has been one of the classical if not eternal questions in astronomy. But one researcher has provided a provocative new theory to answer that question. Robin Canup from the Southwest Research Institute has uncovered evidence that the rings came from a large, Titan-sized moon that was destroyed as it spiraled into a young Saturn."
The Military

Why Warriors, Not Geeks, Run US Cyber Command Posts 483

koterica writes "The Washington Post explains why the military prefers to have combat veterans rather than geeks running network security. '"It was supposed to be a war fighter unit, not a geek unit," said task force veteran Jason Healey, who had served as an Air Force signals intelligence officer. A fighter would understand, for instance, if an enemy had penetrated the networks and changed coordinates or target times, said Dusty Rhoads, a retired Air Force colonel and former F-117 pilot who recruited the original task force members. "A techie wouldn't have a clue," he said.'"
Education

MA High School Forces All Students To Buy MacBooks 1217

An anonymous reader sends in this excerpt from the Salem News: "A new program at Beverly High will equip every student with a new laptop computer to prepare kids for a high-tech future. But there's a catch. The money for the $900 Apple MacBooks will come out of parents' pockets. 'You're kidding me,' parent Jenn Parisella said when she found out she'd have to buy her sophomore daughter, Sky, a new computer. 'She has a laptop. Why would I buy her another laptop?' Sky has a Dell. Come September 2011, every student will need an Apple. They'll bring it to class and use it for homework. Superintendent James Hayes sees the technology as an essential move to prepare kids for the future. The School Committee approved the move last year, and Hayes said he's getting the news out now so families can prepare. 'We have one platform,' Hayes said. 'And that's going to be the Mac.'"
Microsoft

Microsoft Sues Salesforce.com Over Patents 243

WrongSizeGlass writes "CNET is reporting that Microsoft is suing Salesforce.com in Seattle federal court, claiming it infringes on nine patents. Two of the patents in question are a 'system and method for providing and displaying a Web page having an embedded menu' and a 'method and system for stacking toolbars in a computer display.'" Microsoft says it first notified Salesforce more than a year ago about the alleged infringement.
Businesses

Computer Competency Test For Non-IT Hires? 369

wto605 writes "As computers are used for more and more vital business functions, small businesses must have office employees who understand the dangers of, and how to recognize and avoid, malware, spam, and phishing. After having been stung by monthly virus cleanups (at $75 an hour) due to an otherwise competent office manager, my parents have realized they need to be aware of their employees' computer skills beyond the ability to type a letter in Microsoft Word (currently the closest thing they have to a test of computer competence). The problem is, as a small business, they have no IT expert who would be able to judge a potential employee's competency. I'm wondering if anyone knows of a good way to test these security/safety awareness skills, such as an online test, a set of questions, etc. I have already pointed them to Sonicwall's Spam and Phishing test, but it definitely does not cover all of the issues facing computer users."
Biotech

How To Grow a Head 355

Taco Cowboy writes "British scientists have found a mechanism within our gene sequence that allows the growing of a new head — with brains, etc. The gene is tentatively known as smed-prep, and the information contained in smed-prep also makes the new cells appear in the right place and organise themselves into working structures."

Comment Re:Microsoft's response (Score 5, Informative) 84

The last sentence of the article's summary is completely wrong. I am one of the "original researchers" for this issue (p42.us is my website). The patches that have been issued by Microsoft up to this point are successful at eliminating the primary security vulnerability, to the best of our knowledge. The main security vulnerability described in our white paper was disclosed to Microsoft last fall and Microsoft fixed the issue in January 2010. The one case that has not been addressed by the filters is very rare and extremely unlikely to be found on a given websites.
Cellphones

What Clown On a Unicycle? 284

R3d M3rcury writes "The New York Times has an article about walking and using a cellphone. 'The era of the mobile gadget is making mobility that much more perilous, particularly on crowded streets and in downtown areas where multiple multitaskers veer and swerve and walk to the beat of their own devices.' But the interesting part was an experiment run by Western Washington University this past fall. There was a student who knew how to ride a unicycle and a professor who had a clown suit. They dressed a student up as a clown and had him ride his unicycle around a popular campus square. Then they asked people, 'Did you see the Unicycling Clown?' 71% of the people walking in pairs said that they had. 51% of the people walking alone said that they had. But only 25% of the people talking on a cellphone said that they saw the unicycling clown. On the other hand, when asked 'Did you see anything unusual?' only about one person in three mentioned a unicycling clown. So maybe unicycling clowns aren't enough of a distraction at Western Washington University..."

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...