sciencehabit writes "Despite long experience with the ways of the world, older people are especially vulnerable to fraud. According to the Federal Trade Commission, up to 80% of scam victims are over 65. One explanation may lie in a brain region that serves as a built-in crook detector. Called the anterior insula, this structure — which fires up in response to the face of an unsavory character — is less active in older people, possibly making them less cagey than younger folks, a new study finds."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
jfruh writes "A bipartisan group of U.S. Senators are working hard to make it legal for U.S. states to collect sales tax on any sales made to their residents, even if the sellers live elsewhere. They tried to add an amendment making the change to an unrelated defense appropriations bill, but the attempt was defeated. They have vowed to try again."
An anonymous reader writes "CNN reports that a Mexico City court has ordered Yahoo to pay $2.7 billion to Worldwide Directories and Ideas Interactivas. The classified directory publisher sued Yahoo, claiming various losses and breaches involving 'contracts related to a yellow pages listings service.' Yahoo announced its intention to appeal but is saying little else about the case."
GabriellaKat writes "Via El Reg: 'Apple is trying to patent wireless charging, claiming its magnetic resonance tech is new and that it can do it better than anyone else. This would be cool if its assertions were true. Apple's application, numbered 20120303980, makes much of its ability to charge a device over the air at a distance of up to a meter, rather than requiring close proximity. The Alliance For Wireless Power, which also touts long-range juicing, will no doubt be comparing Apple's designs to its own blueprints.'"
angry tapir writes "Just a few days after Ericsson filed several patent-infringement lawsuits against Samsung in the U.S., the Swedish mobile phone company also filed a complaint with the U.S. International Trade Commission (ITC), asking for an import ban of a wide range of Samsung products, including the Galaxy S III and the Galaxy Note. Ericsson alleges that Samsung violates Section 337 of the Tariff Act by importing patent-infringing products into the U.S and selling them."
wiredmikey writes "The head of the UN telecommunications body, Hamadoun Toure, told an audience at the World Conference on International Telecommunications (WCIT-12) in Dubai on Monday that Internet freedom will not be curbed or controlled. 'Nothing can stop the freedom of expression in the world today, and nothing in this conference will be about it,' he said. Such claims are 'completely (unfounded),' Toure, secretary general of the International Telecommunication Union, told AFP. 'We must continue to work together and find a consensus on how to most effectively keep cyberspace open, accessible, affordable and secure,' UN Secretary General Ban Ki-Moon said. Google has been vocal in warning of serious repercussions, saying that 'Some proposals could permit governments to censor legitimate speech — or even cut off Internet access,' noted Google's Vint Cerf in a blog post."
Sparrowvsrevolution writes "In the wake of Syria's 52-hour digital blackout last week, the networking firm Renesys performed an analysis of which countries are most susceptible to an Internet shutdown, based simply on how many distinct entities control the connections between the country's networks and those of the outside world. It found that for 61 countries and territories, just one or two Internet service providers maintain all external connections–a situation that could make possible a quick cutoff from the world with a well-placed government order or physical attack."
Eugene Kaspersky probably hates malware just as much as you do on his own machines, but as the head of Kaspersky Labs, the world's largest privately held security software company, he might have a different perspective — the existence of malware and other forms of online malice drives the need for security software of all kinds, and not just on personal desktops or typical internet servers. The SCADA software vulnerabilities of the last few years have led him to announce work on an operating system for industrial control systems of the kind affected by Flame and Stuxnet. But Kaspersky is not just toiling away in the computer equivalent of the CDC: He's been outspoken in his opinions — some of which have drawn ire on Slashdot, like calling for mandatory "Internet ID" and an "Internet Interpol". He's also come out in favor of Internet voting, and against SOPA, even pulling his company out of the BSA over it. More recently, he's been criticized for ties to the current Russian government. (With regard to that Wired article, though, read Kaspersky's detailed response to its claims.) Now, he's agreed to answer Slashdot readers' questions. As usual, you're encouraged to ask all the question you'd like, but please confine your questions to one per post. We'll pass on the best of these for Kaspersky's answers. Update: 12/04 14:20 GMT by T : For more on Kaspersky's thoughts on the importance of online IDs, see this detailed blog posting.
netbuzz writes "As rumors and news reports of John McAfee's alleged capture circulated widely yesterday – fueled by McAfee's own blog and blogging cohorts – police and other authorities in Belize denied that they had the man in custody and, well, they should have been believed. McAfee surfaced earlier this morning and had this to say in a blog post: 'We are not in Belize, but not quite out of the woods yet.' He also painted a picture of his 'escape' that could have been taken from a bad spy novel."
Zothecula writes "One of life's less pleasant surprises is discovering the chocolate bar that you forgot you had in your pocket on a hot day. Two scientists working at Cadbury's research and development plant in Bourneville, U.K., are fighting that gooey surprise with the invention of chocolate that remains solid even when exposed to temperatures of 40 C (104 F) for more than three hours. Aimed at tropical markets, the 'temperature tolerant chocolate' is described in a World Intellectual Property Organization (WIPO) patent application."
porsche911 writes "The Wall Street Journal has an interesting article about how the data from Implanted health devices is managed and the limitations patients run into when they want to see the data. Companies like Medtronic plan to sell the data but won't provide it to the person who generated it. From the article: 'The U.S. has strict privacy laws guaranteeing people access to traditional health files. But implants and other new technologies—including smartphone apps and over-the-counter monitors—are testing the very definition of medical records.'"
jamaicaplain writes "Reuters reports that 'Iran has suspended the death sentence for a computer programmer convicted on charges of running a pornographic website after he "repented for his actions," his lawyer was quoted as saying on Sunday. Saeed Malekpour, an Iranian citizen and Canadian resident, was arrested in 2008 while visiting relatives in Iran, according to Amnesty International. Although Iranian authorities accused him of running a pornography site, Amnesty has said the charges appear to stem from a software program created by Malekpour that was used without his knowledge to post pornographic images.'" It's not clear if he'll ever be released, however.
netbuzz writes with a quick update about John McAfee on the run. From the article: "A blog being maintained for the past three weeks by antivirus pioneer John McAfee and others is claiming to have received "an unconfirmed report" that McAfee has been captured near the border of Belize and Mexico. However, authorities in Belize say that report is not true and that the whereabouts of McAfee, wanted for questioning as a 'person of interest' after the Nov. 11 murder of his neighbor, remain unknown."
An anonymous reader writes "Joshua Simmons authored an article for the N.Y.U. Journal of Intellectual Property and Entertainment Law. The article is a comparison of the developments in copyright law and patent law in the nineteenth century that resulted in copyright law developing a work made for hire doctrine while patent law only developed a patch work of judge-made employment doctrines. The article theorizes that patent law did not develop an inventions made for hire doctrine, because inventive activity was almost exclusively perceived to be performed by individuals. It goes on to suggest that, as patentable inventions today are generally perceived to be invented collaboratively, the Patent Act should be amended to borrow from the Copyright Act and adopt a principle similar to the work made for hire doctrine."
dryriver writes "Russia Today's correspondents have visited Julian Assange in the Ecuadorian Embassy in London, where Assange has been holed up for nearly 6 months now. In the 12 minute long interview with RT, Assange has many interesting things to say about privacy, and government data interception in particular. A small excerpt: 'The people who control the interception of the Internet and, to some degree also, physically control the big data warehouses and the international fiber-optic lines. We all think of the Internet as some kind of Platonic Realm where we can throw out ideas and communications and web pages and books and they exist somewhere out there. Actually, they exist on web servers in New York or Nairobi or Beijing, and information comes to us through satellite connections or through fiber-optic cables. So whoever physically controls this controls the realm of our ideas and communications. And whoever is able to sit on those communications channels, can intercept entire nations, and that's the new game in town, as far as state spying is concerned — intercepting entire nations, not individuals. ... So what's happened over the last 10 years is the ever-decreasing cost of intercepting each individual now to the degree where it is cheaper to intercept every individual rather that it is to pick particular people to spy upon.'"