2017-02-19T23:34:00+00:00The Los Alamos National Lab wrote in 2012 that "For over 20 years the military, the commercial aerospace industry, and the computer industry have known that high-energy neutrons streaming through our atmosphere can cause computer errors." Now an anonymous reader quotes Computerworld: When your computer crashes or phone freezes, don't be so quick to blame the manufacturer. Cosmic rays -- or rather the electrically charged particles they generate -- may be your real foe. While harmless to living organisms, a small number of these particles have enough energy to interfere with the operation of the microelectronic circuitry in our personal devices... particles alter an individual bit of data stored in a chip's memory. Consequences can be as trivial as altering a single pixel in a photograph or as serious as bringing down a passenger jet. A "single-event upset" was also blamed for an electronic voting error in Schaerbeekm, Belgium, back in 2003. A bit flip in the electronic voting machine added 4,096 extra votes to one candidate. The issue was noticed only because the machine gave the candidate more votes than were possible. "This is a really big problem, but it is mostly invisible to the public," said Bharat Bhuva. Bhuva is a member of Vanderbilt University's Radiation Effects Research Group, established in 1987 to study the effects of radiation on electronic systems. Cisco has been researching cosmic radiation since 2001, and in September briefly cited cosmic rays as a possible explanation for partial data losses that customer's were experiencing with their ASR 9000 routers.
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10266115&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T22:34:00+00:00An anonymous reader writes: "For the second time in three months, Google engineers have disclosed a bug in the Windows OS without Microsoft having released a fix before Google's announcement," reports BleepingComputer. "The bug in question affects the Windows GDI (Graphics Device Interface) (gdi32.dll)..." According to Google, the issue allows an attacker to read the content of the user's memory using malicious EMF files. The bad news is that the EMF file can be hidden in other documents, such as DOCX, and can be exploited via Office, IE, or Office Online, among many. "According to a bug report filed by Google's Project Zero team, the bug was initially part of a larger collection of issues discovered in March 2016, and fixed in June 2016, via Microsoft's security bulletin MS16-074. Mateusz Jurczyk, the Google engineer who found the first bugs, says the MS16-074 patches were insufficient, and some of the issues he reported continued to remain vulnerable." He later resubmitted the bugs in November 2016. The 90-days deadline for fixing the bugs expired last week, and the Google researcher disclosed the bug to the public after Microsoft delayed February's security updates to next month's Patch Tuesday, for March 15. Microsoft has described Google's announcements of unpatched Windows bugs as "disappointing".
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10266079&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T21:12:00+00:00An anonymous reader writes: "In many cases, your old TV isn't recycled at all and is instead abandoned in a warehouse somewhere, left for society to deal with sometime in the future," reports Motherboard, describing the problem of old cathode-ray televisions and computer monitors with "a net negative recycling value" (since their component parts don't cover the cost of dismantling them). An estimated 705 million CRT TVs were sold in the U.S. since 1980, and many now sit in television graveyards, "an environmental and economic disaster with no clear solution." As much as 100,000 tons of potentially hazardous waste are stockpiled in two Ohio warehouses of the now-insolvent recycler Closed Loop, plus "at least 25,000 tons of glass and unprocessed CRTs in Arizona...much of it is sitting in a mountainous pile outside one of the warehouses." One EPA report found 23,000 tons of lead-containing CRT glass abandoned in four different states just in 2013.
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10266007&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T19:38:00+00:00An anonymous reader writes:On a professional track in Buenos Aires, fans watched the first Formula E auto race with self-driving electric cars. "Roborace's two test vehicles battled it out on the circuit at a reasonably quick 115MPH," reports Engadget, "but one of the cars crashed after it took a turn too aggressively. The racing league was quick to tout the safety advantages of crashing autonomous cars ('no drivers were harmed'), but it's clear that the tech is still rough around the edges." Electrek is reporting that the cars "still have a cabin for a driver but neither car's cabin was occupied during the event." The ultimate goal is to have several teams racing the exact same self-driving car, while letting each team customize its car's driving software. An Argentinian journalist shared footage of the race cars on Twitter, and apparently at one point a dog wandered out in front of an oncoming race car. But the real question is how the fans are going to feel about watching a speed race between cars with no drivers?
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10265909&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T18:34:00+00:00An anonymous reader quotes KrebsOnSecurity: On Thursday, a Ukrainian man who hatched a plan in 2013 to send heroin to my home and then call the cops when the drugs arrived was sentenced to 41 months in prison for unrelated cybercrime charges. Separately, a 19-year-old American who admitted to being part of a hacker group that sent a heavily-armed police force to my home in 2013 was sentenced to three years probation. Sergey Vovnenko, a.k.a. "Fly," "Flycracker" and "MUXACC1," pleaded guilty last year to aggravated identity theft and conspiracy to commit wire fraud. Prosecutors said Vovnenko operated a network of more than 13,000 hacked computers, using them to harvest credit card numbers and other sensitive information... A judge in New Jersey sentenced Vovnenko to 41 months in prison, three years of supervised released and ordered him to pay restitution of $83,368. Separately, a judge in Washington, D.C. handed down a sentence of three year's probation to Eric Taylor, a hacker probably better known by his handle "Cosmo the God." Taylor was among several men involved in making a false report to my local police department at the time about a supposed hostage situation at our Virginia home. In response, a heavily-armed police force surrounded my home and put me in handcuffs at gunpoint before the police realized it was all a dangerous hoax known as "swatting"... Taylor and his co-conspirators were able to dox so many celebrities and public officials because they hacked a Russian identity theft service called ssndob[dot]ru. That service in turn relied upon compromised user accounts at data broker giant LexisNexis to pull personal and financial data on millions of Americans.
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10265387&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T17:34:00+00:00An anonymous reader writes: Andy Oram, who's been an editor at O'Reilly since 1992, has written a new free report about how open source software is everywhere in Brazil. The country's IT industry is booming in Brazil -- still Latin America's most vibrant economy -- with open source software popular in both startups and in cloud infrastructure. Oram attributes this partly to the government's support of open source software, which over the last 15 years has built public awareness about its power and potential. And says the Brazil now has a thriving open source community, and several free software movements. Even small towns have hacker spaces for collaboration and training, and the country has several free software movements.
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264947&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T16:34:00+00:00An IBM security researcher recently discovered something interesting about smart cars. An anonymous reader quotes CNN: Charles Henderson sold his car several years ago, but he still knows exactly where it is, and can control it from his phone... "The car is really smart, but it's not smart enough to know who its owner is, so it's not smart enough to know it's been resold," Henderson told CNNTech. "There's nothing on the dashboard that tells you 'the following people have access to the car.'" This isn't an isolated problem. Henderson tested four major auto manufacturers, and found they all have apps that allow previous owners to access them from a mobile device. At the RSA security conference in San Francisco on Friday, Henderson explained how people can still retain control of connected cars even after they resell them. Manufacturers create apps to control smart cars -- you can use your phone to unlock the car, honk the horn and find out the exact location of your vehicle. Henderson removed his personal information from services in the car before selling it back to the dealership, but he was still able to control the car through a mobile app for years. That's because only the dealership that originally sold the car can see who has access and manually remove someone from the app. It's also something to consider when buying used IoT devices -- or a smart home equipped with internet-enabled devices.
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264867&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T15:34:00+00:00An anonymous reader writes: "A typo in the Zerocoin source code allowed an attacker to steal 370,000 Zerocoin, which is about $592,000 at today's price," reports BleepingComputer. According to the Zcoin team, one extra character left inside Zerocoin's source code was the cause of the bug. The hacker exploited the bugs for weeks, by initiating a transaction and receiving the money many times over. "According to the Zcoin team, the attacker (or attackers) was very sophisticated and took great care to hide his tracks," reports the site. "They say the attacker created numerous accounts at Zerocoin exchanges and spread transactions across several weeks so that traders wouldn't notice the uneven transactions volume... The Zcoin team says they worked with various exchanges to attempt and identify the attacker but to no avail. Out of the 370,000 Zerocoin he stole, the attacker has already sold 350,000. The Zcoin team estimates the attacker made a net profit of 410 Bitcoin ($437,000)."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264841&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T14:34:00+00:00Freshly Exhumed quotes Hackaday: The famous HAARP antenna array is to be brought back into service for experiments by the University of Alaska. Built in the 1990s for the US Air Force's High Frequency Active Auroral Research Program, the array is a 40-acre site containing a phased array of 180 high-frequency antennas and their associated high-power transmitters. Its purpose is to conduct research on charged particles in the upper atmosphere, but that hasn't stopped an array of bizarre conspiracy theories. A university space physics researcher will actually create an artificial aurora starting Sunday (and continuing through Wednesday) to study how yjr atmosphere affects satellite-to-ground communications, and "observers throughout Alaska will have an opportunity to photograph the phenomenon," according to the University. "Under the right conditions, people can also listen to HAARP radio transmissions from virtually anywhere in the world using an inexpensive shortwave radio."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264501&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T12:34:00+00:00A new arena-league football team plays on a 50-yard field and uses a mobile app that allows fans to vote on the team's next play. An anonymous reader writes: Slate describes a receiver tackled for a short gain after the audience instructed the quarterback to throw a quick pass -- as "shouts and cheers exploded from the stands, with phones raised triumphantly in the air." The quarterback is informed of the chosen plays through an earphone in his helmet, and after one touchdown, one of the players even thanked a fan in the seats for picking a good play. "Then noses immediately returned to screens...the coach and QB were antsy, peering upward, waiting for the fans' next call as the play clock ticked down again..." The team eventually lost 78-47, but to at least make things more interactive, the players all have their Twitter handles sewn on the backs of their jerseys. Fans can also be "virtual general managers" for a small fee, dialing in to a weekly phone call to give feedback to the team's president, and fans also selected the team's head coach from online resumes and some YouTube videos of interviews. In fact, the article says the fans even picked the team's name, with the name "Screaming Eagles" finally winning out over "Teamy McTeamface" and "Spaghetti Monsters."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264797&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T08:34:00+00:00Three months ago Shiva Ayyadurai won a $750,000 settlement from Gawker (after they'd already gone bankrupt). He'd argued Gawker defamed him by mocking Ayyadurai's claim he'd invented email, and now he's also suing Techdirt founder Michael Masnick -- who is not bankrupt, and is fighting back. Long-time Slashdot reader walterbyrd quotes Ars Technica: In his motion, Masnick claims that Ayyadurai "is seeking to use the muzzle of a defamation action to silence those who question his claim to historical fame." He continues, "The 14 articles and 84 allegedly defamatory statements catalogued in the complaint all say essentially the same thing: that Defendants believe that because the critical elements of electronic mail were developed long before Ayyadurai's 1978 computer program, his claim to be the 'inventor of e-mail' is false"... The motion skims the history of e-mail and points out that the well-known fields of e-mail messages, like "to," "from," "cc," "subject," "message," and "bcc," were used in ARPANET e-mail messages for years before Ayyadurai made his "EMAIL" program. Ayyadurai focuses on statements calling him a "fake," a "liar," or a "fraud" putting forth "bogus" claims. Masnick counters that such phrases are "rhetorical hyperbole" meant to express opinions and reminds the court that "[t]he law provides no redress for harsh name-calling." The motion calls the lawsuit "a misbegotten effort to stifle historical debate, silence criticism, and chill others from continuing to question Ayyadurai's grandiose claims." Ray Tomlinson has been dead for less than a year, but in this fascinating 1998 article recalled testing the early email protocols in 1971, remembering that "Most likely the first message was QWERTYIOP."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264219&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T04:34:00+00:00A recruiter with 20 years of experience recently reported on the research into whether remote software teams perform better. One study of 10,000 coding sessions concluded it takes 10-15 minutes for a programmer to resume work after an interruption. Another study actually suggests unsupervised workers are more productive, and the founders of the collaboration tool Basecamp argue the bigger danger is burnout when motivated employees overwork themselves. mikeatTB shares his favorite part of the article: One interesting take on the issues is raised by ThoughtWorks' Martin Fowler: Individuals are more productive in a co-located environment, but remote teams are often more productive than co-located teams. This is because a remote team has the advantage of hiring without geographic boundaries, and that enables employers to assemble world-class groups. The article shares some interesting anecdotes from remote workers, but I'd be interested to hear from Slashdot's readers. Leave your own experiences in the comments, and tell us what you think. Are remote software teams more productive?
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264469&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T02:34:00+00:00It's one of the longest-running comics on the internet. (Slashdot is approaching its 20th anniversary, and in its first year ran two stories about Pokey.) Open source developer Steve Havelka of Portland, Oregon created the truly bizarre strip back in 1998 -- one legend says it was originally a parody of another comic drawn with Microsoft Paint -- and he's since sporadically cranked out 637 strips. Since 2010 he's also been publishing the cartoons in printed books, and this year launched an equally surreal page on Patreon identifying himself as "Steve Havelka, THE AUTHORS of Pokey the Penguin," offering supporters a "mystery item in the mail". Pokey has lots of fans -- he earned a shout-out in the videogame Hitman: Blood Money -- and very-long-time Slashdot reader 198348726583297634 informs us that on this 19th anniversary Pokey "is celebrating on Twitter!" where he's apparently accosting other web cartoonists and touting a new birthday strip. (Not to be confused with that truly horrible Pokey-goes-to-a-party movie created in Adobe Flash.) I'd like to hear from any Slashdot readers who remember Pokey the Penguin -- but I'm also curious to hear from Slashdot readers who have never read the strip. ComixTalk called it "one of those webcomics that really only exist because of the Internet -- it would be hard to see something like this in any other medium... there's just something about Pokey the Penguin that fits online."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264671&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-19T00:34:00+00:00Long-time Slashdot reader Toe, The sums up what he learned from freeCodeCamp's Quincy Larson: "Before you travel internationally, wipe your phone or bring/rent/buy a clean one." Larson's article is titled "I'll never bring my phone on an international flight again. Neither should you." All the security in the world can't save you if someone has physical possession of your phone or laptop, and can intimidate you into giving up your password... Companies like Elcomsoft make 'forensic software' that can suck down all your photos, contacts -- even passwords for your email and social media accounts -- in a matter of minutes.... If we do nothing to resist, pretty soon everyone will have to unlock their phone and hand it over to a customs agent while they're getting their passport swiped... And with this single new procedure, all the hard work that Apple and Google have invested in encrypting the data on your phone -- and fighting for your privacy in court -- will be a completely moot point. The article warns Americans that their constitutional protections don't apply because "the U.S. border isn't technically the U.S.," calling it "a sort of legal no-man's-land. You have very few rights there." Larson points out this also affects Canadians, but argues that "You can't hand over a device that you don't have."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264341&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)
2017-02-18T23:34:00+00:00The RSA Conference "is perhaps the world's largest security event, but that doesn't mean that it's necessarily a secure event," reports eSecurityPlanet. Scanning the conference floor revealed rogue access points posing as known and trusted networks, according to security testing vendor Pwnie Express. storagedude writes: What's worse, several attendees fell for these dummy Wi-Fi services that spoof well-known brands like Starbucks. The company also found a number of access points using outdated WEP encryption. So much for security pros... At least two people stayed connected to a rogue network for more than a day, according to the article, and Pownie Express is reminding these security pros that connecting to a rogue network means "the attacker has full control of all information going into and out of the device, and can deploy various tools to modify or monitor the victim's communication."
Read more of this story at Slashdot.src="https://slashdot.org/slashdot-it.pl?op=discuss&id=10264279&smallembed=1" style="height: 300px; width: 100%; border: none;">(image)