benfrog writes "Tridium's Niagra framework is a 'marvel of connectivity,' allowing everything from power plants to gas pumps to be monitored online. Many installations are frighteningly insecure, though, according to an investigation by the Washington Post, leaving both public and private infrastructure potentially open to simple hacks (as simple as a directory traversal attack)."
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
MrSeb sends this excerpt from DailyDot: "Shortly, a new system in the U.S. will allow your ISP to give you gradually sterner warnings and possible punishment if you download copyrighted material. The Copyright Alerts System (CAS) — more commonly known as the 'six strikes' policy, after the number of warnings users receive — is coming. Soon. Any minute now. Really. But it's not here yet, even though several news outlets — including CNN — said the system would go online yesterday, Thursday. Speaking to the Daily Dot, a press contact for the six strikes system says: 'We do not intend to launch until we are confident that the program is consumer friendly. We expect our implementation to begin later this year, with each of the ISPs launching at potentially overlapping but different times.' ... The six strikes system is officially helmed by an industry coalition called the Center for Copyright Information (CCI), which was created by the MPAA and RIAA. It counts the U.S.'s five top ISPs under its umbrella: AT&T, Cablevision, Comcast, Time Warner Cable, and Verizon."
An anonymous reader writes "Facebook has added sleuthing to its array of data-mining capabilities, scanning your posts and chats for criminal activity. If the social-networking giant detects suspicious behavior, it flags the content and determines if further steps, such as informing the police, are required. Reuters provides an example of how the software was used in March: 'A man in his early 30s was chatting about sex with a 13-year-old South Florida girl and planned to meet her after middle-school classes the next day. Facebook's extensive but little-discussed technology for scanning postings and chats for criminal activity automatically flagged the conversation for employees, who read it and quickly called police. Officers took control of the teenager's computer and arrested the man the next day.'"
New submitter BButlerNWW writes "Federal agencies must be assured priority and uninterrupted access to public cloud resources before fully embracing the technology for national security and emergency response IT functions, a recent report finds. It recommends creating a program to develop a system to ensure federal organizations receive 'first-in-line' access to cloud-based resources during emergency situations."
judgecorp writes "4G services could interfere with terrestrial TV in the UK, so the government plans to offer one free filter for every household affected by the issue. The analysis suggests that 2.3 million households could be affected, but many of those have cable or satellite TV, so the plan might only need a million filters (each household only gets one, even if they have many TVs)."
pigrabbitbear writes "Lamar Smith just can't get a break. The Texas congressman and widely despised author of the Stop Online Piracy Act (SOPA) ruffled the Internet's feathers once again this week with the quiet unveiling of a new piece of legislation that's drawing criticism for being plucked out of SOPA's language and rushed through Congress. The Intellectual Property Attaché Act (IPAA) would streamline the process by which the U.S. protects its intellectual property by enforcing U.S. copyright law abroad through specially assigned diplomats or attachés. These officers would report to a new agency-level position, the Assistant Secretary for Intellectual Property and push agendas that, according to the bill's language, are 'consistent with the economic interests of the United States, both domestically and abroad.'"
NewYorkCountryLawyer writes "The United States Court of Appeals for the Fifth Circuit has upheld sanctions awarded by a District Court against one of the lawyers bringing copyright infringement cases against individuals for BitTorrent movie downloads, in Mick Haig Productions v. Does 1-670. The Court's opinion (PDF) described the lawyer's 'strategy' as 'suing anonymous internet users for allegedly downloading pornography illegally using the powers of the court to find their identity, then shaming or intimidating them into settling for thousands of dollars — a tactic that he has employed all across the state and that has been replicated by others across the country.'"
Maximum Prophet writes "A while ago, Amazon caved on paying individual states sales taxes. Now we know why. Amazon is setting up same-day delivery warehouses everywhere. They will put most normal retailers out of business." If that's a bet, I'll take it.
whitroth writes "The judge who just dismissed the lawsuit between Apple and Motorola writes a column explaining what he considers to be reasonable uses of patents, and unreasonable ones. One of his thoughts would be to require a patent holder to produce the patented item within a certain time, to cut out patent trolls."
An anonymous reader writes "Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate websites, but with the advent of exploit kits, that technique is slowly getting sidelined. Prompted by the rise in numbers of spam runs leading to pages hosting exploit kits, Trend Micro researchers have recently been investigating a number of high-volume spam runs using the Blackhole exploit kit. According to them, the phishing messages of today have far less urgency and the message is implicit: 'Your statement is available online'; or 'Incoming payment received'; or 'Password reset notification.'" One thing that's long worried me is that the bulk of spammers and malware writers may hire copywriters with a better grasp of English than most of the ones I see now. "I send you this file in order to have your advice" was funny, because it stuck out.
An anonymous reader writes "Quick submission for all us Canadians: looks like the Supreme Court finally decided to rule on various copyright issues. No more fees to 'preview' a song. Another of these rule changes could save our schools a lot of money: no more fees required to photocopy material for students."
An anonymous reader writes "I am a systems administrator for a mid size state agency. We currently offer Blackberries to our staff, but we are migrating to Android devices in the near future. Since phones have sensative data (email, documents, etc.), what is a good choice for encrypting that data? Options abound, like OS-level encryption from Motorola and Samsung, 3rd party apps from GoTrusted and even a LUKS port for Android. Does anyone have experience managing encrypted Android devices? What are the important features I should be looking at? Many thanks in advance." (And, for that matter, are there good options for doing the same with iPhones? Other options to consider?)
Payphones have been famously disappearing from public life; cell phones and other means of communication have made them ever less important in many contexts (and for most people). Some places, it's hard to find not only payphones, but usable wireless signal as well. Still, there are a lot of payphones left in the wild (though the enclosed kind seem to be disappearing faster than on-premises ones), and now there's a plan in New York City to extend payphones' useful life by outfitting them as public Wi-Fi hotspots, beginning with a 10-phone trial already underway. It's not the first such project; we mentioned a similar multi-city wi-phone deployment in Canada 10 years ago. And in Austin, I've spotted at least one payphone fitted out as a solar-powered charging station for cellphones; probably not enough to get much charge, but at least it lets users place an emergency call with a flagging or dead battery. Covering Manhattan and the other boroughs with overlapping free Wi-Fi nodes, though, is a different beast entirely.
New submitter mordur writes "An Icelandic District Court has ordered the payment processing company Valitor to immediately reopen the merchant account (Icelandic original) of DataCell and start processing credit card payments for the Wikileaks organization. Noncompliance on behalf of Valitor will result in daily fines of ISK 800.000 (approx. USD 60.000). Under pressure from the USA based international credit card companies, Valitor stopped all service to DataCell, and thus to Wikileaks, just hours after having started processing payment in July 2011. The court found that Valitor had failed to prove that the processing of payments for Wikileaks was contrary to the business policies of the international credit card companies, nor had the company proved that DataCell was in breach of the service agreement between the companies by serving Wikileaks."
An anonymous reader writes "Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective 'D33Ds Company' following the compromise of a Yahoo subdomain. The attackers said that they managed to access the subdomain by leveraging a union-based SQL injection attack, which made the site return more information that it should have. According to Ars Technica, the dump also includes over 2,700 database table or column names and 298 MySQL variables retrieved during the attack." Update: 07/12 20:03 GMT by T :Reader techfun89 adds this update: "Yahoo has confirmed that the usernames and passwords of more than 400,000 accounts were stolen from their servers earlier this week and that data was briefly posted online. The information has since been removed but it wasn't just credentials for Yahoo, but also Gmail, AOL, Comcast, Hotmail, MSN, SBC Global, BellSouth, Verizon and Live.com as well."