Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
The Internet

Reddit Imposes Ban On Sexual Content Posted Without Permission 306

Posted by samzenpus
from the permission-slip-or-get-out dept.
Mark Wilson writes If you want to post naked pictures or videos of people on Reddit without their consent, you only have a couple of weeks to do so. As of March, the site is imposing a ban on content of an explicit nature that the subject has not given permission to be posted. The cleanup of the site comes hot on the heels of news from Google that explicit content will be banned from Blogger. It also comes in the wake of last year's Fappening which saw a glut of naked celebrity photos leaked online.
Crime

3 Million Strong RAMNIT Botnet Taken Down 23

Posted by samzenpus
from the bring-it-down dept.
An anonymous reader writes The National Crime Agency's National Cyber Crime Unit worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol's European Cybercrime Centre, to shut down command and control servers used by the RAMNIT botnet. Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts.
United States

US Govt and Private Sector Developing "Precrime" System Against Cyber-Attacks 55

Posted by samzenpus
from the knowing-is-half-the-battle dept.
An anonymous reader writes A division of the U.S. government's Intelligence Advanced Research Projects Activity (IARPA) unit, is inviting proposals from cybersecurity professionals and academics with a five-year view to creating a computer system capable of anticipating cyber-terrorist acts, based on publicly-available Big Data analysis. IBM is tentatively involved in the project, named CAUSE (Cyber-attack Automated Unconventional Sensor Environment), but many of its technologies are already part of the offerings from other interested organizations. Participants will not have access to NSA-intercepted data, but most of the bidding companies are already involved in analyses of public sources such as data on social networks. One company, Battelle, has included the offer to develop a technique for de-anonymizing BItcoin transactions (pdf) as part of CAUSE's security-gathering activities.
Government

The Groups Behind Making Distributed Solar Power Harder To Adopt 364

Posted by Soulskill
from the sunsetting-the-sun dept.
Lucas123 writes: Distributed rooftop solar is a threat not only to fossil fuel power generation, but also to the profits of monopolistic model of utilities. While the overall amount of electrical capacity represented by distributed solar power remains miniscule for now, it's quickly becoming one of leading sources of new energy deployment. As adoption grows, fossil fuel interests and utilities are succeeding in pushing anti-net metering legislation, which places surcharges on customers who deploy rooftop solar power and sell unused power back to their utility through the power grid. Other state legislation is aimed at reducing tax credits for households or businesses installing solar or allows utilities to buy back unused power at a reduced rate, while reselling it at the full retail price.
Patents

Jury Tells Apple To Pay $532.9 Million In Patent Suit 186

Posted by Soulskill
from the or-remit-821,110-iphones dept.
An anonymous reader writes: Smartflash LLC has won a patent lawsuit against Apple over DRM and technology relating to the storage of downloaded songs, games, and videos on iTunes. Apple must now pay $532.9 million in damages. An Apple spokesperson did not hesitate to imply Smartflash is a patent troll: "Smartflash makes no products, has no employees, creates no jobs, has no U.S. presence, and is exploiting our patent system to seek royalties for technology Apple invented. We refused to pay off this company for the ideas our employees spent years innovating and unfortunately we have been left with no choice but to take this fight up through the court system." The trial happened in the same court that decided Apple owed VirnetX $368 million over FaceTime-related patents back in 2012.
United Kingdom

Use Astrology To Save Britain's Health System, Says MP 319

Posted by Soulskill
from the gullible-like-a-capricorn dept.
An anonymous reader writes: An MP from the governing Conservative Party has said that using astrology could radically improve the performance of Britain's National Health Service and that its opponents are "racially prejudiced" and driven by "superstition, ignorance and prejudice." David Treddinick even claims he has "helped" fellow legislators through astrology.
Encryption

Gemalto: NSA and GCHQ Probably Hacked Us, But Didn't Get SIM Encryption Keys 98

Posted by Soulskill
from the hand-in-the-encrypted-cookie-jar dept.
An anonymous reader writes: Last week The Intercept published a report saying agents from the NSA and GCHQ penetrated the internal computer network of Gemalto, the world's largest maker of SIM cards. Gemalto has done an internal investigation, and surprisingly decided to post its results publicly. The findings themselves are a bit surprising, too: Gemalto says it has "reasonable grounds to believe that an operation by NSA and GCHQ probably happened."

They say the two agencies were trying to intercept encryption keys that were being exchanged between mobile operators and the companies (like Gemalto) who supplied them with SIM cards. The company said it had noticed several security incidents in 2010 and 2011 that fit the descriptions in The Intercept's documents. Gemalto had no idea who was behind them until now. They add, "These intrusions only affected the outer parts of our networks – our office networks — which are in contact with the outside world. The SIM encryption keys and other customer data in general, are not stored on these networks." They claim proper use of encryption and isolation of different networks prevented attackers from getting the information they were after.
The Internet

Republicans Back Down, FCC To Enforce Net Neutrality Rules 593

Posted by Soulskill
from the on-to-the-courts dept.
An anonymous reader writes: Republican resistance has ended for the FCC's plans to regulate the internet as a public utility. FCC commissioners are working out the final details, and they're expected to approve the plan themselves on Thursday. "The F.C.C. plan would let the agency regulate Internet access as if it is a public good.... In addition, it would ban the intentional slowing of the Internet for companies that refuse to pay broadband providers. The plan would also give the F.C.C. the power to step in if unforeseen impediments are thrown up by the handful of giant companies that run many of the country's broadband and wireless networks." Dave Steer of the Mozilla Foundation said, "We've been outspent, outlobbied. We were going up against the second-biggest corporate lobby in D.C., and it looks like we've won."
Botnet

FBI Offers $3 Million Reward For Russian Hacker 66

Posted by Soulskill
from the go-big-or-go-home dept.
mpicpp sends word that the FBI and the U.S. State Department have announced the largest-ever reward for a computer hacking case. They're offering up to $3 million for information leading to the arrest of Evgeniy Bogachev, a 31-year-old Russian national. Bogachev is the alleged administrator of the GameOver Zeus botnet, estimated to have affected over a million computers, causing roughly $100 million in damages. "Bogachev has been charged by federal authorities in Pittsburgh, Pennsylvania, with conspiracy, computer hacking, wire fraud, bank fraud and money laundering... He also faces federal bank fraud conspiracy charges in Omaha, Nebraska related to his alleged involvement in an earlier variant of Zeus malware known as 'Jabber Zeus.'"
Democrats

Obama Vetoes Keystone XL Pipeline Bill 431

Posted by Soulskill
from the time-to-argue-about-oil-some-more dept.
An anonymous reader writes: As expected, President Obama has vetoed a bill that would have given the green light for construction of the Keystone XL Pipeline. "By saying no to the legislation, Mr. Obama retains the authority to make a final judgment on the pipeline on his own timeline. The White House has said the president would decide whether to allow the pipeline when all of the environmental and regulatory reviews are complete. ... Since 2011, the proposed Keystone pipeline, which would deliver up to 800,000 barrels daily of heavy petroleum from the oil sands of Alberta to ports and refineries on the Gulf Coast, has emerged as a broader symbol of the partisan political clash over energy, climate change and the economy."
Businesses

Can Tracking Employees Improve Business? 87

Posted by Soulskill
from the he-hasn't-gotten-out-of-his-chair-for-11-hours-i-think-he-might-be-dead dept.
An anonymous reader writes: The rise of wearable technologies and big-data analytics means companies can track their employees' behavior if they think it will improve the bottom line. Now an MIT Media Lab spinout called Humanyze has raised money to expand its technology pilots with big companies. The startup provides sensor badges and analytics software that tracks how and when employees communicate with customers and each other. Pilots with Bank of America and Deloitte have led to significant business improvements, but workplace privacy is a big concern going forward.
Encryption

NSA Director Wants Legal Right To Snoop On Encrypted Data 406

Posted by Soulskill
from the you-can-trust-us dept.
jfruh writes: This may not come as a huge shock, but the director of the NSA doesn't believe that you have the right to encrypt your data in a way that the government can't access it. At a cybersecurity policy event, Michael Rogers said that the U.S. should be able to craft a policy that allows the NSA and law enforcement agencies to read encrypted data when they need to.
AI

Facebook AI Director Discusses Deep Learning, Hype, and the Singularity 71

Posted by timothy
from the you-like-this dept.
An anonymous reader writes In a wide-ranging interview with IEEE Spectrum, Yann LeCun talks about his work at the Facebook AI Research group and the applications and limitations of deep learning and other AI techniques. He also talks about hype, 'cargo cult science', and what he dislikes about the Singularity movement. The discussion also includes brain-inspired processors, supervised vs. unsupervised learning, humanism, morality, and strange airplanes.
Censorship

Google Knocks Explicit Adult Content On Blogger From Public View 285

Posted by timothy
from the start-your-own dept.
Ellie K writes As of 23 March 2015, Google will remove blogs on its Blogger platform that don't conform to its new anti-adult policies. This is an abrupt reversal of policy. Until today, Google allowed "images or videos that contain nudity or sexual activity," and stated that "Censoring this content is contrary to a service that bases itself on freedom of expression." The linked article quotes the message which has been sent to Blogger users thus: (...) In the coming weeks, we'll no longer allow blogs that contain sexually explicit or graphic nude images or video. We'll still allow nudity presented in artistic, educational, documentary, or scientific contexts, or presented where there are other substantial benefits to the public from not taking action on the content. The new policy will go into effect on the 23rd of March 2015. After this policy goes into effect, Google will restrict access to any blog identified as being in violation of our revised policy. No content will be deleted, but only blog authors and those with whom they have expressly shared the blog will be able to see the content we've made private.
Biotech

Police Use DNA To Generate a Suspect's Face 100

Posted by Soulskill
from the it's-the-generic-looking-ones-you've-gotta-watch dept.
An anonymous reader writes: The NY Times has a pair of articles about a technology now being used in police investigations: computer generation of a suspect's face from only their DNA. Law enforcement in South Carolina had no pictures or descriptions of a man who murdered a mother and her daughter, but they had some of his DNA. From this, a company named Parabon NanoLabs used a technique called DNA phenotyping to create a rough portrait of the suspect's facial features, which the police then shared with the public.

The accuracy of these portraits is still an area of hot debate — most of them look rather generic. The NY Times staff tested it with a couple of their employees, circulating the DNA-inspired portraits and seeing if people could guess who it was supposed to be. None of the ~50 employees were able to identify reporter John Markoff, and only about 10 were able to identify video journalist Catherine Spangler. But even though the accuracy for a person's entire face is low, techniques for specific attributes, like eye color, have improved greatly. Of course, the whole situation raises a slew of civil liberties questions: "What traits are off limits? Should the authorities be able to test whether a suspect has a medical condition or is prone to violence should such testing be possible?"
Cellphones

Pakistanis Must Provide Fingerprints Or Give Up Cellphone 134

Posted by Soulskill
from the must-donate-kidney-to-keep-tablet dept.
schwit1 sends this report from the Washington Post: Cellphones didn't just arrive in Pakistan. But someone could be fooled into thinking otherwise, considering the tens of millions of Pakistanis pouring into mobile phone stores these days. In one of the world's largest — and fastest — efforts to collect biometric information, Pakistan has ordered cellphone users to verify their identities through fingerprints for a national database being compiled to curb terrorism. If they don't, their service will be shut off, an unthinkable option for many after a dozen years of explosive growth in cellphone usage here.

Prompted by concerns about a proliferation of illegal and untraceable SIM cards, the directive is the most visible step so far in Pakistan's efforts to restore law and order after Taliban militants killed 150 students and teachers at a school in December. Officials said the six terrorists who stormed the school in Peshawar were using cellphones registered to one woman who had no obvious connection to the attackers.
Medicine

Looking Up Symptoms Online? These Companies Are Tracking You 147

Posted by samzenpus
from the that's-sick dept.
merbs writes When we feel sick, fear disease, or have questions about our health, we turn first to the internet. According to the Pew Internet Project, 72 percent of US internet users look up health-related information online. But an astonishing number of the pages we visit to learn about private health concerns—confidentially, we assume—are tracking our queries, sending the sensitive data to third party corporations, even shipping the information directly to the same brokers who monitor our credit scores.
Businesses

Lenovo Hit With Lawsuit Over Superfish Adware 114

Posted by samzenpus
from the here-comes-the-trouble dept.
An anonymous reader writes with news that the fallout from the Superfish fiasco might just be starting for Lenovo. "Lenovo admitted to pre-loading the Superfish adware on some consumer PCs, and unhappy customers are now dragging the company to court on the matter. A proposed class-action suit was filed late last week against Lenovo and Superfish, which charges both companies with 'fraudulent' business practices and of making Lenovo PCs vulnerable to malware and malicious attacks by pre-loading the adware. Plaintiff Jessica Bennett said her laptop was damaged as a result of Superfish, which was called 'spyware' in court documents. She also accused Lenovo and Superfish of invading her privacy and making money by studying her Internet browsing habits."
Encryption

NSA, GHCQ Implicated In SIM Encryption Hack 155

Posted by samzenpus
from the protect-ya-neck dept.
First time accepted submitter BlacKSacrificE writes Australian carriers are bracing for a mass recall after it was revealed that a Dutch SIM card manufacturer Gemalto was penetrated by the GCHQ and the NSA in an alleged theft of encryption keys, allowing unfettered access to voice and text communications. The incident is suspected to have happened in 2010 and 2011 and seems to be a result of social engineering against employees, and was revealed by yet another Snowden document. Telstra, Vodafone and Optus have all stated they are waiting for further information from Gemalto before deciding a course of action. Gemalto said in a press release that they "cannot at this early stage verify the findings of the publication" and are continuing internal investigations, but considering Gemalto provides around 2 billion SIM cards to some 450 carriers across the globe (all of which use the same GSM encryption standard) the impact and fallout for Gemalto, and the affected carriers, could be huge.
Cellphones

In Florida, Secrecy Around Stingray Leads To Plea Bargain For a Robber 241

Posted by timothy
from the it-looks-just-like-a-snipe dept.
schwit1 writes The case against Tadrae McKenzie looked like an easy win for prosecutors. He and two buddies robbed a small-time pot dealer of $130 worth of weed using BB guns. Under Florida law, that was robbery with a deadly weapon, with a sentence of at least four years in prison. But before trial, his defense team detected investigators' use of a secret surveillance tool, one that raises significant privacy concerns. In an unprecedented move, a state judge ordered the police to show the device — a cell-tower simulator sometimes called a StingRay — to the attorneys. Rather than show the equipment, the state offered McKenzie a plea bargain. Today, 20-year-old McKenzie is serving six months' probation after pleading guilty to a second-degree misdemeanor. He got, as one civil liberties advocate said, the deal of the century.