Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Security

How Security Experts Are Protecting Their Own Data (siliconvalley.com) 27

Today the San Jose Mercury News asked several prominent security experts which security products they were actually using for their own data. An anonymous Slashdot reader writes: The EFF's chief technologist revealed that he doesn't run an anti-virus program, partly because he's using Linux, and partly because he feels anti-virus software creates a false sense of security. ("I don't like to get complacent and rely on it in any way...") He does regularly encrypt his e-mail, "but he doesn't recommend that average users scramble their email, because he thinks the encryption software is just too difficult to use."

The newspaper also interviewed security expert Eugene Spafford, who rarely updates the operating system on one of his computers -- because it's not connected to the internet -- and sometimes even accesses his files with a virtual machine, which he then deletes when he's done. His home router is equipped with a firewall device, and "he's developed some tools in his research center that he uses to try to detect security problems," according to the article. "There are some additional things I do," Spafford added, telling the reporter that "I'm not going to give details of all of them, because that doesn't help me."

Bruce Schneier had a similar answer. When the reporter asked how he protected his data, Schneier wouldn't tell them, adding "I'm kind of a target..."
Google

Google Tests A Software That Judges Hollywood's Portrayal of Women 78

Slashdot reader theodp writes: Aside from it being hosted in a town without a movie theater, the 2016 Bentonville Film Festival was also unusual in that it required all entrants to submit "film scripts and downloadable versions of the film" for judgment by "the team at Google and USC", apparently part of a larger Google-funded research project with USC Engineering "to develop a computer science tool that could quickly and efficiently assess how women are represented in films"...

Fest reports noted that representatives of Google and the White House Office of Science and Technology Policy appeared in a "Reel vs. Real Diversity" panel presentation at the fest, where the importance of diversity and science to President Obama were discussed, and the lack of qualified people to fill 500,000 U.S. tech jobs was blamed in part on how STEM careers have been presented in film and television... In a 2015 report on a Google-sponsored USC Viterbi School of Engineering MacGyver-themed event to promote women in engineering, USC reported that President Obama was kept briefed on efforts to challenge media's stereotypical portrayals of women. As for its own track record, Google recently updated its Diversity page, boasting that "21% of new hires in 2015 were women in tech, compared to 19% of our current population"....
Businesses

How G.E. Is Transforming Into An IoT Start-Up (nytimes.com) 46

Slashdot reader mspohr shares an article about "General Electric 're-inventing' itself as a software start-up." Jeffrey R. Immelt, the CEO of America's largest manufacturer, describes how he realized that data collected from their machines -- like turbines, engines, and medical-imaging equipment -- could be as valuable as the machines themselves. Now G.E. is hiring software engineers and data scientists from Amazon, Apple, Facebook and Google to try to transform the company into a "124-year-old startup" to take advantage of the Internet of Things and offer futuristic new services like predictive maintenance.

The Times calls it "the next battlefield as companies fight to develop the dominant software layer that connects the machines," adding that by 2020 there will be 100 times as much data flowing from G.E.'s machines. Now G.E. Digital is using the open source PaaS, Cloud Foundry, to develop Predix, a cloud-based operating system for industrial applications like monitoring and adjusting equipment in the field, whether it's an oil-field rig or a wind-farm turbine. To help transform the company into a digital powerhouse, they're building a 1,400-employee complex in San Ramon, California "designed to suit the free-range working ways of software developers: open-plan floors, bench seating, whiteboards, couches for impromptu meetings, balconies overlooking the grounds and kitchen areas with snacks." And they've also launched the Industrial Dojo program "to accelerate the ability for developers to contribute code that enables the Industrial Internet".
Robotics

Recent College Grads Aim To Land A Robot On The Moon (thehindu.com) 36

Sunday the Indian Space Research Organization successfully test-launched a scramjet rocket, propelled by "an air-breathing propulsion system which uses hydrogen as fuel and oxygen from the atmosphere air as the oxidizer" rather than carrying a tank of liquid oxygen. "if the need for liquid oxygen is taken away, the space craft can be much lighter, hence cheaper to launch," notes one newspaper, adding that India is only the fourth country to flight-test a scramjet engine after the U.S., Russia and the European Space Agency.

But in addition, 15 former ISRO scientists are now helping Team Indus, one of the 16 teams remaining in Google's $30 million Lunar XPRIZE competition, who will use ISRO's polar satellite launch vehicle to send their spacecraft to the moon. GillBates0 writes: An official designated as "Skywalker", said that such space missions used to be limited to extremely elite people and PhDs in the past. That stereotype is now breaking. "I was just a college student a couple of years ago and now I am working on an actual space mission, how cool is that," said Karan Vaish, 23, who is helping the team to design the lunar rover. Eighty per cent of the team is reported to be less than five years out of college.
Data Storage

Ask Slashdot: What's The Best Way To Backup Large Amounts Of Personal Data? (foxdeploy.com) 207

An anonymous Slashdot reader has "approximately two terabytes of photos, currently sitting on two 4-terabyte 'Intel Rapid Storage' RAID 1 disks." But now they're considering three alternatives after moving to a new PC: a) Keep these exactly as they are... The current configuration is OK, but it's a pain if a RAID re-sync is needed as it takes a long time to check four terabytes.

b) Move to "Storage Spaces". I've not used Storage Spaces before, but reports seem to show it's good... It's a Good Thing that the disks are 100% identical and removable and readable separately. Downside? Unknown territory.

c) Break the RAID, and set up the second disk as a file-copied backup... [This] would lose a (small) amount of resilience, but wouldn't suffer from the RAID-sync issues, ideally a Mac-like "TimeMachine" backup would handle file histories.

Any recommendations?

This is also a good time to share your experiences with Storage Spaces, so leave your answers in the comments. What's the best way to backup large amounts of personal data?
Television

Welcome To 1986: Inside 'Halt And Catch Fire's' High-Tech Time Machine (fastcompany.com) 40

The third season of AMC's technology drama "Halt and Catch Fire" painstakingly recreated Silicon Valley and San Francisco in 1986. Long-time Slashdot reader harrymcc shares his first-person report: The new episodes...are rich with carefully-researched plot points, dialogue, and sets full of vintage technology (including a startup equipped with real Commodore 64s and a recreated IBM mainframe). I visited the soundstage in Atlanta where the producers have recreated Northern California in the 1980s, and spoke with the show's creators and stars about the loving attention they devote to getting things right.
Harry argues that the show "is in part about how we got from the past to the present," and writes that he saw several 5 1/4-inch floppy disks "including Memorex, 3M, and BASF FlexyDisk," plus "a manual for Frogger for the Atari 2600, a copy of a spreadsheet program known as MicroPro CalcStar...and countless other little pieces of history."
Databases

100 Arrested In New York Thanks To Better Face-Recognition Technology (arstechnica.com) 70

New York doubled the number of "measurement points" used by their facial recognitation technology this year, leading to 100 arrests for fraud and identity theft, plus another 900 open cases. An anonymous reader quotes a report from Ars Technica: In all, since New York implemented facial recognition technology in 2010, more than 14,000 people have been hampered trying to get multiple licenses. The newly upgraded system increases the measurement points of a driver's license picture from 64 to 128.

The DMV said this vastly improves its chances of matching new photographs with one already in a database of 16 million photos... "Facial recognition plays a critical role in keeping our communities safer by cracking down on individuals who break the law," Gov. Andrew M. Cuomo said in a statement. "New York is leading the nation with this technology, and the results from our use of this enhanced technology are proof positive that its use is vital in making our roads safer and holding fraudsters accountable."

At least 39 US states use some form of facial recognition software, and New York says their new system also "removes high-risk drivers from the road," stressing that new licenses will no longer be issued until a photo clears their database.
Graphics

Players Seek 'No Man's Sky' Refunds, Sony's Content Director Calls Them Thieves (tweaktown.com) 281

thegarbz writes: As was covered previously on Slashdot the very hyped up game No Man's Sky was released to a lot of negative reviews about game-crashing bugs and poor interface choices. Now that players have had more time to play the game it has become clear that many of the features hyped by developers are not present in the game, and users quickly started describing the game as "boring".

Now, likely due to misleading advertising, Steam has begun allowing refunds for No Man's Sky regardless of playtime, and there are reports of players getting refunds on the Play Station Network as well despite Sony's strict no refund policy.
Besides Sony, Amazon is also issuing refunds, according to game sites. In response, Sony's former Strategic Content Director, Shahid Kamal Ahmad, wrote on Twitter, "If you're getting a refund after playing a game for 50 hours you're a thief." He later added "Here's the good news: Most players are not thieves. Most players are decent, honest people without whose support there could be no industry."

In a follow-up he acknowledged it was fair to consider a few hours lost to game-breaking crashes, adding "Each case should be considered on its own merits and perhaps I shouldn't be so unequivocal."
Biotech

'Longest Living Human' Says He Is Ready For Death At 145 (telegraph.co.uk) 155

Slashdot reader schwit1 quotes an article from The Telegraph: An Indonesian man who claims to be the longest living human in recorded history has described how he "just wants to die". Mbah Gotho, from Sragen in central Java, was born on December 31, 1870, according to the date of birth on his identity card. Now officials at the local record office say they have finally been able to confirm that remarkable date as genuine. If independently confirmed, the findings would make Mr Gotho a staggering 145 years old -- and the longest lived human in recorded history.
"One of Mr Gotho's grandsons said his grandfather has been preparing for his death ever since he was 122," according to the article. Though he lived long enough to meet his great-great grandchildren, he's already outlived four wives, all 10 of his brothers and sisters, and all of his children.
Data Storage

RIP John Ellenby, Godfather of the Modern Laptop (nytimes.com) 29

John Ellenby managed the development of the Alto II before starting the company that built the world's first successful "clamshell" laptop. Slashdot reader fragMasterFlash quotes the New York Times: Ellenby, a British-born computer engineer who played a critical role in paving the way for the laptop computer, died on August 17 in San Francisco. He was 75... Mr. Ellenby's pioneering work came to fruition in the early 1980s, after he founded Grid Systems, a company in Mountain View, California. As chief executive, he assembled an engineering and design team that included the noted British-born industrial designer William Moggridge.

The team produced a clamshell computer with an orange electroluminescent flat-panel display that was introduced as the Compass. It went to market in 1982. The Compass is now widely acknowledged to have been far ahead of its time.

Back in the 1980s, NASA used them as backup navigational devices on the space shuttle -- one was recovered from the wreckage of the Space Shuttle Challenger -- and John Poindexter, America's national security advisor during the Reagan administration, described them as "built like an armored tank". Data storage cost $8,150 -- equivalent to $20,325 today.
Security

New Ransomware Poses As A Windows Update (hothardware.com) 71

Slashdot reader MojoKid quotes an article from Hot Hardware: A security researcher for AVG has discovered a new piece of ransomware called Fantom that masquerades as a critical Windows update. Victims who fall for the ruse will see a Windows screen acting like it's installing the update, but what's really happening is that the user's documents and files are being encrypted in the background...

The scam starts with a pop-up labeled as a critical update from Microsoft. Once a user decides to apply the fake update, it extracts files and executes an embedded program called WindowsUpdate.exe... As with other EDA2 ransomware, Fantom generates a random AES-128 key, encrypts it using RSA, and then uploads it to the culprit. From there, Fantom targets specific file extensions and encrypts those files using AES-128 encryption... Users affected by this are instructed to email the culprit for payment instructions.

While the ransomware is busy encrypting your files, it displays Microsoft's standard warning about not turning off the computer while the "update" is in progress. Pressing Ctrl+F4 closes that window, according to the article, "but that doesn't stop the ransomware from encrypting files in the background."
Bitcoin

Kim Dotcom Will Revive Megaupload, Linking File Transfers To Bitcoin Microtransactions (fortune.com) 66

Long-time Slashdot reader SonicSpike quotes an article from Fortune: The controversial entrepreneur Kim Dotcom said last month that he was preparing to relaunch Megaupload, the file-sharing site that U.S. and New Zealand authorities dramatically shut down in 2012, with bitcoins being involved in some way... This system will be called Bitcache, and Dotcom claimed its launch would send the bitcoin price soaring way above its current $575 value.

The launch of Megaupload 2.0 will take place on January 20, 2017, he said, urging people to "buy bitcoin while cheap, like right now, trust me..." Crucially, Dotcom said the Bitcache system would overcome bitcoin's scaling problems. "It eliminates all blockchain limitations," he claimed.

Every file transfer taking place over Megaupload "will be linked to a tiny Bitcoin micro transaction," Dotcom posted on Twitter. His extradition trial begins Monday, and he's asking the court to allow live-streaming of the trial "because of global interest in my case." Meanwhile, the FBI apparently let the registration lapse on the Megaupload domain, which they seized in 2012, and Ars Technica reports that the site is now full of porn ads.
EU

EU Copyright Reform Proposes Search Engines Pay For Snippets (thestack.com) 154

An anonymous Slashdot reader reports that the European Commission "is planning reforms that would allow media outlets to request payment from search engines such as Google, for publishing snippets of their content in search results." The Stack reports: The working paper recommends the introduction of an EU law that covers the rights to digital reproduction of news publications. This would essentially make news publishers a new category of rights holders under copyright law, thereby ensuring that "the creative and economic contribution of news publishers is recognized and incentivized in EU law, as it is today the case for other creative sectors."
Microsoft

Microsoft Lost a City Because They Used Wikipedia Data (theregister.co.uk) 103

"Microsoft can't tell North from South on Bing Maps," joked The Register, reporting that Microsoft's site had "misplaced Melbourne, the four-million-inhabitant capital of the Australian State of Victoria." Long-time Slashdot reader RockDoctor writes: Though they're trying to minimise it, the recent relocation of Melbourne Australia to the ocean east of Japan in Microsoft's flagship mapping application is blamed on someone having flipped a sign in the latitude given for the city's Wikipedia page. Which may or may not be true. But the simple stupidity of using a globally-editable data source for feeding a mapping and navigation system is ... "awesome" is (for once) an appropriate word.

Well, it's Bing, so at least no-one was actually using it.

"Bing's not alone in finding Australia hard to navigate," reports The Register. "In 2012 police warned not to use Apple Maps as it directed those seeking the rural Victorian town of Mildura into the middle of a desert."
Iphone

Apple Fixes Three Zero Days Used In Targeted Attack (onthewire.io) 70

Trailrunner7 quotes a report from On The Wire: Apple has patched three critical vulnerabilities in iOS that were identified when an attacker targeted a human rights activist in the UAE with an exploit chain that used the bugs to attempt to remotely jailbreak and infect his iPhone. The vulnerabilities include two kernel flaws and one in WebKit and Apple released iOS 9.3.5 to fix them.

The attack that set off the investigation into the vulnerabilities targeted Ahmed Mansoor, an activist living in the UAE. Earlier this month, he received a text message that included a link to what was supposedly new information on human rights abuses. Suspicious, Manor forwarded the link to researchers at the University of Toronto's Citizen Lab, who recognized what they were looking at. "On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising ;new secrets' about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based 'cyber war' company that sells Pegasus, a government-exclusive "lawful intercept" spyware product," Citizen Lab said in a new report on the attack and iOS flaws.

Slashdot Top Deals