Trailrunner7 writes "The Microsoft Digital Crimes Unit has been spearheading botnet takedowns and other anti-cybercrime operations for many years, and it has had remarkable success. But the cybercrime problem isn't going away anytime soon, so the DCU is in the process of building a new cybercrime center here, and soon will roll out a new threat intelligence service to help ISPs and CERT teams get better data about ongoing attacks. Dennis Fisher sat down with TJ Campana, director of security at the DCU, to discuss the unit's work and what threats could be next on the target list."
Check out SlashCloud for the latest in cloud computing.
hypnosec writes "The Electronic Frontier Foundation (EFF) has started accepting donations in the form of Bitcoins again after a two year hiatus, stating that the legal uncertainty hovering over the digital currency has all but disappeared. On their blog the EFF noted that a report from U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN), in addition to their own findings, 'have confirmed that, as a user of Bitcoin or any virtual currency, EFF itself is likely not subject to regulation.'"
benrothke writes "Had Locked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach against attorneys for their obliviousness towards information security and privacy. In numerous places, the book notes that lawyers are often clueless when it comes to digital security. With that, the book is a long-overdue and valuable information security reference for anyone, not just lawyers." Read below for the rest of Ben's review.
Pirate Bay Founder Gottfrid Svartholm Warg is to be tried starting tomorrow in Sweden, after his indictment last month for computer hacking and fraud. Wikileaks has released several documents related to his detention and the associated charges. From the summary of this material: "This material includes inter alia the interrogations with GSW and his co-accused, internal correspondence from the Swedish Foreign Minister and the Swedish embassy in Cambodia, damage assessment reports by the companies and the authorities concerned, and correspondence between GSW and Kristina Svartholm and the Swedish prison authorities. The material is formally public, but the Swedish prosecution authority has refused to provide the documents in digital format. Photocopying this volume of paper costs around £350." Notable is the refusal of Warg's request to obtain a graphing calculator while in prison.
garymortimer writes "Geologists have long used seismology on the bottom of the ocean or have been throwing dynamite from snowmobiles when they look for oil. But now researchers at Centre for Integrated Petroleum Research, a joint venture between the University of Bergen and Uni Research, have found a new preferred method – using drones to map new oil reserves from the air. ... The group’s main task is to create digital maps in 3D of potential oil fields. Using laser scanners, infrared sensors and digital cameras, the researchers create realistic, virtual models. ... Pictures shot with the help of a drone complement the images from low-level terrain that the researchers already have in hand. The end result is more precise and complete 3D models."
vikingpower writes "The winner of this year's World Press Photo award, Paul l Hanssen, is under fire for allegedly having photoshopped the winning picture. The Hacker Factor is detailing the reasons and technicalities for the accusations. ExtremeTech also runs an item about the possible faking. Upon questions by Australian news site news.com.au, Hanssen answers his photo is not a fake. The whole story, however, is based upon somewhat thin proof: three different times in the file's Adobe XMP block; this does not necessarily mean that more than one file was used in order to obtain a composite image." Update: 05/14 20:04 GMT by S : World Press Photo says the photo is genuine.
Nate the greatest writes "It looks like those 4 month old rumors are true. Amazon has confirmed today that they have bought Liquavista, a Netherlands based screen tech company. There's no info yet on how much Amazon paid to Samsung, but previous rumors suggested that the asking price was under $100 million. Amazon also isn't talking about how they plan to use the electrowetting screen tech, but many are assuming that a Color Kindle is in the works."
A while ago you had the chance to ask mathematician and theoretical physicist Freeman Dyson about his work in quantum electrodynamics, nuclear propulsion, and his thoughts on the past, present, and future of science. Below you'll find his answers to your questions.
Ars reports on an international treaty being negotiated that would relax restrictions on versions of books made to be more accessible to blind people. Unfortunately, the MPAA and similar organizations have been lobbying aggressively to have the treaty strengthen copyright protections as well, and could derail the entire process. Quoting: "In principle, the digital revolution should have dramatically improved blind peoples' access to the world's information. ... Unfortunately, copyright law often stands in the way. Legal restrictions on circumventing digital rights management (DRM) technologies can limit the accessibility of e-books. And in some countries, libraries and other non-profits must seek permission from the creator of each work before producing accessible versions of books in other formats. Getting permission is a laborious process that, in practice, means that only a small fraction of available works is ever converted into accessible formats. ... The pending WIPO treaty would change that. It has two core goals that everyone we talked to supports in principle: requiring countries to enact an exception for blind people similar to America's Chaffee Amendment and allowing nonprofit organizations that help blind people to share accessible works across international borders. ... Negotiators had already excluded audiovisual works from the treaty in order to placate the movie studios. But to the frustration of treaty advocates, Hollywood has gotten involved in the negotiations anyway."
Sparrowvsrevolution writes "The promise of a fully 3D-printable gun is that it can spread via the Internet and entirely circumvent gun control laws. Two days after that digital weapon's blueprint first appeared online, it seems to be fulfilling that promise. Files for the printable gun known as that 'Liberator' have been downloaded more than 100,000 times in two days, according to Defense Distributed, the group that created it. Those downloads were facilitated by Kim Dotcom's startup Mega, which Defense Distributed is using to host the Liberator's CAD files. And it's also been uploaded to the Pirate Bay, where it's one of the most popular files in the filesharing site's uncensorable 3D printing category."
another random user writes "Facebook is reportedly introducing video advertisements to News Feeds this summer. Reports in the Financial Times (registration required) say that the clips will last for around 15 seconds, and the first one users see each day will play automatically. The first video will apparently play without audio, and restart if the account holder chooses to activate sound. Facebook is yet to officially confirm the move, but the report claims that the social network will gradually introduce video advertising to minimize user disruption. The company's most lucrative marketing partners, including American Express, Coca Cola, Ford, Diageo and Nestle, are expected to be the first brands to make use of the feature. Facebook is said to have implemented the strategy in a bid to take a slice out of TV ad revenue by undercutting the sector."
wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."
theodp writes "Remember New Coke? Twenty-eight years ago, Coca-Cola replaced the secret formula of its flagship brand, only to announce the return of the "classic" formula just 79 days later. Had it launched in 2013, Coke's Jay Moye suspects a social media backlash would have prompted it to reverse itself even sooner. In a timely follow-up, ZDNet's Steven Vaughan-Nichols points out that Microsoft is facing its own New Coke moment with Windows 8. 'Does Ballmer have the guts to admit he made a mistake and give users what they clearly want?' Vaughan-Nichols asks. 'While it's too late for Windows 8, Blue might give us back our Start button and an Aero-like interface. We don't know.'"
New submitter davesays writes "CNN anchors Erin Burnett and Carol Costello have interviewed Former FBI Counterterrorisim specialist Tim Clemente. In the interviews he asserts that all digital communications are recorded and stored. Clemente: 'No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.' 'All of that stuff' — meaning every telephone conversation Americans have with one another on U.S. soil, with or without a search warrant — 'is being captured as we speak.' 'No digital communication is secure,' by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications — meaning telephone calls, emails, online chats and the like — are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is."
dryriver writes "Dear Slashdotters, We are a two man crew who have spent almost three years developing a video processing algorithm that 'upgrades' the visual quality of digital video footage. We take video footage that is "of average quality" — think an amateur shooting on a cheap digital camcorder or on a smartphone camera — and use various mathematical tricks we have developed to make the footage look better — optically sharper, better lit, more vivid colours, improved contrast, enhanced sense of three-dimensionality and of 'being-there realism.' In about a month, we will be presenting our algorithm to some venture capitalists. We have the obligatory before-and-after video demos prepared for this, of course. But there will also be a short PowerPoint presentation where we explain our tech in some detail. Now here is our main question: What, in your opinion, should we — or indeed should we NOT — put in the PowerPoint presentation to impress a Venture Capitalist? Should we talk about how we developed the algorithm at all — what kind of R&D and testing was involved? Should we try to walk the VCs through how our algorithm works under the hood — simplified a bit for a 'non-engineer' audience of course? Or should we stick to talking about market potential, marketing strategy & money-related stuff only? If you were in our shoes — presenting a digital video-quality improvement technology to professional VCs — what would and would you not put in your PowerPoint? Any advice on this from Slashdotters with some experience would be most welcome!"
jrepin writes "Digital restrictions management (DRM) creates damaged goods that users cannot control or use freely. It requires users to give-up control of their computers and restricts access to digital data and media. Device manufacturers and corporate copyrights holders have already been massively infecting their products with user-hostile DRM. Tablets, mobile phones and other minicomputers are sold with numerous restrictions embedded that cripple users freedom. The proposal at table in W3C to put DRM into HTML goes even further. Fight it: use today's today is international Day Against DRM, so spread the word and make yourself heard!" The EFF suggests making every day a day against DRM.
sciencehabit writes "An insect's compound eye is an engineering marvel: high resolution, wide field of view, and incredible sensitivity to motion, all in a compact package. Now, a new digital camera provides the best-ever imitation of a bug's vision, using new optical materials and techniques. This technology could someday give patrolling surveillance drones the same exquisite vision as a dragonfly on the hunt."
Nate the greatest writes "Remember last year when Apple received a patent on the faux page curl in iBooks? Lots of people laughed at the idea that Apple could patent the page turn, but not Samsung. The gadget maker has just filed for their own page turn patent. The paperwork explains in great detail what the page turn looks like, how the software would work, and what on screen gestures could be used to turn the page."
tdog17 writes "Verizon and MySpace scored a zero out of a possible six stars in a test of how far 18 technology service providers will go to protect user data from government data demands. Twitter and Internet service provider Sonic.net scored a perfect six in the third annual Electronic Frontier Foundation 'Who Has Your Back?' report. Apple, AT&T and Yahoo ranked near the bottom, each scoring just one star. 'While we are pleased by the strides these companies have made over the past couple years, there’s plenty of room for improvement. Amazon holds huge quantities of information as part of its cloud computing services and retail operations, yet does not promise to inform users when their data is sought by the government, produce annual transparency reports, or publish a law enforcement guide. Facebook has yet to publish a transparency report. Yahoo! has a public record of standing up for user privacy in courts, but it hasn't earned recognition in any of our other categories. Apple and AT&T are members of the Digital Due Process coalition, but don’t observe any of the other best practices we’re measuring. ... We remain disappointed by the overall poor showing of ISPs like AT&T and Verizon in our best practice categories.'"
itwbennett writes "According to a study (PDF) by the Georgetown Center for Business and Public Policy, restricting the ability of Verizon Wireless and AT&T to bid in upcoming spectrum auctions would drive down the bidding during the auction, and could cost the U.S. treasury as much as $12 billion. Even a partial restriction of bids by Verizon and AT&T could have a significant impact on auction revenues, said Douglas Holtz-Eakin, a co-author of the Georgetown study. Matt Wood, policy director at digital rights group Free Press, fired back, saying 'No one is talking about completely barring AT&T and Verizon from the incentive auction. Sensible people are talking about making sure that more than two companies have a chance at obtaining spectrum. The fact that these duopolists hired economists to parrot the companies' own talking points isn't really that newsworthy.'"