×
Bitcoin

Bitcoin Thefts Surge, DDoS Hackers Take Millions 305

CowboyRobot writes "In November, Denmark-based Bitcoin Internet Payment System suffered a DDoS attack. Unfortunately for users of the company's free online wallets for storing bitcoins, the DDoS attack was merely a smokescreen for a digital heist that quickly drained numerous wallets, netting the attackers a reported 1,295 bitcoins — worth nearly $1 million — and leaving wallet users with little chance that they'd ever see their money again. Given the potential spoils from a successful online heist, related attacks are becoming more common. But not all bitcoin heists have been executed via hack attacks or malware. For example, a China-based bitcoin exchange called GBL launched in May. Almost 1,000 people used the service to deposit bitcoins worth about $4.1 million. But the exchange was revealed to be an elaborate scam after whoever launched the site shut it down on October 26 and absconded with the funds. The warnings are all the same: 'Don't trust any online wallet', 'Find alternative storage solutions as soon as possible', and 'You don't have to keep your Bitcoins online with someone else. You can store your Bitcoins yourself, encrypted and offline.'"
Education

White House Calls On Kids To Film High-Tech Education 95

theodp writes "Over at WhiteHouse.gov, Bill Nye has issued a call for entries for the first-ever White House Student Film Festival, a video contest for K-12 students, whose finalists will have their short films shown at the White House. From the website: "The President has an assignment for you: Our schools are more high-tech than ever. There are laptops in nearly every classroom. You can take an online course on Japanese — and then video chat with a kid from Japan. You can learn about geometry through an app on your iPad. So, what does it all mean? We're looking for videos that highlight the power of technology in schools. Your film should address at least one of the following themes: 1. How you currently use technology in your classroom or school. 2. The role technology will play in education in the future."
Medicine

A Review of the "Mental Illness" Definition Might Prevent Crime 260

An anonymous reader writes "Following a BBC report showing abnormal variation in the number of people taken into police custody with mental health problems, concerns have been raised about the legal definition of "mental illness". Prof. Steve Fuller argues that a much sharper legal distinction is required to ensure criminals with mental disorders are not released without appropriate treatment. Fuller distinguishes between two cases: a 'client', who pays a therapist and enjoys a liberal, level-playing field in face-to-face interactions, and a 'patient' who is being treated by a doctor for a particular disorder. If the former relationship cannot be established due to person's mental state, then the latter one should be enforced. Thus, Fuller calls for 'a return to institutions analogous to the asylums of the early 19th century.'"
Music

Piracy Offers Heavy Metal a New Business Model 246

hessian writes "Despite being extensively pirated worldwide, Iron Maiden have managed to put themselves in the £10-20m for 2012. This means that despite the growing popularity of the band on social media, and the extensive and pervasive torrent downloading of the band's music, books and movies, the band is turning a profit. This is in defiance of the past business model, and the idea that piracy is killing music. In fact, piracy seems to be saving music in Iron Maiden's case. One reason for this may be metal itself. It has a fiercely loyal fanbase and a clear brand and identity. The audience identifies with the genre, which stands in contrast to genericized genres. It doggedly maintains its own identity and shuns outsiders. As a result, fans tend to identify more with their music, and place a higher value on purchasing it."
Privacy

Ask Slashdot: How Do You Protect Your Privacy When It's Out of Your Control? 174

An anonymous reader writes "A week ago, Slashdot was asked, "How do you protect your privacy?" The question named many different ways privacy is difficult to secure these days, but almost all of the answers focused on encrypting internet traffic. But what can you do about your image being captured by friends and strangers' cameras (not to mention drones, police cameras, security cameras, etc.)? How about when your personal data is stored by banks and healthcare companies and their IT department sucks? Heck; off-the-shelf tech can see you through your walls. Airport security sniffs your skin. There are countless other ways info on you can be collected that has nothing to do with your internet hygiene. Forget the NSA; how do you protect your privacy from all these others? Can you?"
United States

Officials Say HealthCare.gov Site Now Performing Well 644

The much-discussed health care finance sign-up website HealthCare.gov has benefited from the flurry of improvements that have been thrown at it in the last several weeks. Centers for Medicare and Medicaid spokesman Aaron Albright told Fox News Saturday that "[w]ith the scheduled upgrades last night and tonight, we're on track to meet our stated goal for the site to work for the vast majority of users." CMM spokeswoman Julie Bataille. "said the installation of new servers Friday night helped improved the response times and error rates, even with heavier-than-usual weekend traffic." If you've used the site this weekend, what has your experience been like?
Privacy

No Shirt, No Shoes, No Service — and No Google Glass, Either 845

Seattle diners who want to take their food-tweeting pictures with Google glass were already facing a preemptively hostile environment; now (in a different restaurant), a diner's been asked to remove his Google Glass headset, or leave. He chose to leave. Maybe Faraday cages and anti-surveillance features will become the norm at the restaurants where things like Glass are most likely to appear.
Communications

The Dismantling of POTS: Bold Move Or Grave Error? 582

New submitter TheRealHocusLocus writes "The FCC is drafting rules to formalize the process of transition of 'last-mile' subscriber circuits to digital IP-based data streams. The move is lauded by AT&T Chairman Tom Wheeler who claims that significant resources are spent to maintain 'legacy' POTS service, though some 100 million still use it. POTS, or 'Plain Old Telephone Service,' is the analog standard that allows the use of simple unpowered phone devices on the wire, with the phone company supplying ring and talk voltage. I cannot fault progress, in fact I'm part of the problem: I gave up my dial tone a couple years ago because I needed cell and could not afford to keep both. But what concerns me is, are we poised to dismantle systems that are capable of standing alone to keep communities and regions 'in-touch' with each other, in favor of systems that rely on centralized (and distant) points of failure? Despite its analog limitations POTS switches have enforced the use of hard-coded local exchanges and equipment that will faithfully complete local calls even if its network connections are down. But do these IP phones deliver the same promise? For that matter, is any single local cell tower isolated from its parent network of use to anyone at all? I have had a difficult time finding answers to this question, and would love savvy Slashdot folks to weigh in: In a disaster that isolates the community from outside or partitions the country's connectivity — aside from local Plain Old Telephone Service, how many IP and cell phones would continue to function?"
Government

Snowden Document Says Dutch Secret Service Hacks Internet Forums 162

vikingpower writes "In the ever-longer wake of the NSA scandal, much-respected Dutch newspaper NRC today reveals, in English, as mandated by the gravity of the occasion, that the Dutch secret service, the AIVD, hacks internet forums. And yes, that is gross misconduct against Dutch law. The service, whose headquarters are in Zoetermeer, did not yet comment upon the divulgence of the document from Edward Snowden's collection. Incensed Dutch parliamentarians are calling for an enquiry."
Privacy

Encrypted Social Network Vies For Disgruntled Facebook Users 162

angry tapir writes "With the look of Google Plus and Facebook-like elements, a new social network named "Syme" feels as cozy as a well-worn shoe. But beneath the familiar veneer, it's quite different. Syme encrypts all content, such as status updates, photos and files, so that only people invited to a group can view it. Syme, which hosts the content on its Canada-based servers, says it can't read it. "The overarching goal of Syme is to make encryption accessible and easy to use for people who aren't geeks or aren't hackers or who aren't cryptography experts," co-founder Jonathan Hershon said in an interview about the service." See also Diaspora.
The Internet

Woman Fined For Bad Review Striking Back In Court 249

An anonymous reader writes "Here's an update to the earlier Slashdot story about KlearGear.com 'fining' a couple for a bad review left four years earlier on RipoffReport: Not only did KlearGear report this as a bad debt to credit reporting agencies, but KlearGear is hiding behind a DomainsByProxy domain name to making finding their real identities harder. Now Public Citizen is representing the couple and is going after KlearGear for $75,000. The TV station that broke this story, KUTV, now reports that RipoffReport will likely be on the couple's side. The BBB and TRUSTe say their logos were used by KlearGear.com without permission, and credit reporting agency Experian is also investigating."
Piracy

French Court Orders Search Engines, ISPs To Block Pirate Sites 75

rtoz sends word that a French court has ordered Google, Yahoo, and Microsoft to remove 16 unauthorized video streaming sites from their search results. Many ISPs were also ordered to block access to the sites. According to TorrentFreak, "The court ruled that the film industry had clearly demonstrated that the sites in question are 'dedicated or virtually dedicated to the distribution of audiovisual works without the consent of their creators,' thus violating their copyrights. As a result the search services of Google, Microsoft, Yahoo and local company Orange are now under orders to 'take all necessary measures to prevent the occurrence on their services of any results referring to any of the pages' on these sites. Several ISPs – Orange, Free, Bouygues Télécom, SFR, Numéricable and Darty Télécom were also ordered to 'implement all appropriate means including blocking' to prevent access to the infringing sites."
Books

Unpublished J. D. Salinger Stories Leaked On Bittorrent Site 218

192_kbps writes "Catcher in the Rye author J. D. Salinger wrote the short story The Ocean Full of Bowling Balls and left depository copies with a few academic libraries with the understanding that the work would not see mass distribution until the mid-21st century. The only authorized place to read the story is in a special reading room at Princeton where electronics are not allowed and a librarian continuously babysits the reader. A PDF of the story, as well as two other unpublished stories, appeared on private bittorrent site what.cd where a huge bounty had been placed for the work. Incredibly, the uploader (or someone connected to the uploader) bought an unauthorized copy on eBay for a pittance. The file, Three Stories, is making the bittorrent rounds but can also be read on mediafire."
The Internet

Group Thinks Anonymity Should Be Baked Into the Internet Itself Using Tor 123

Hugh Pickens DOT Com writes "David Talbot writes at MIT Technology review that engineers on the Internet Engineering Task Force (IETF), an informal organization of engineers that changes Internet code and operates by rough consensus, have asked the architects of Tor to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps and would allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. The IETF is already working to make encryption standard in all web traffic. Stephen Farrell believes that forging Tor into a standard that interoperates with other parts of the Internet could be better than leaving Tor as a separate tool that requires people to take special action to implement. 'I think there are benefits that might flow in both directions,' says Farrell. 'I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems.' Andrew Lewman, executive director of Tor, says the group is considering it. 'We're basically at the stage of 'Do we even want to go on a date together?' It's not clear we are going to do it, but it's worth exploring to see what is involved. It adds legitimacy, it adds validation of all the research we've done.'"
United States

Disabled Woman Denied Entrance To US Due To Private Medical Records 784

Jah-Wren Ryel writes "In 2012, Canadian Ellen Richardson was hospitalized for clinical depression. This past Monday she tried to board a plane to New York for a $6,000 Caribbean cruise. DHS denied her entry, citing supposedly private medical records listing her hospitalization. From the story: '“I was turned away, I was told, because I had a hospitalization in the summer of 2012 for clinical depression,’’ said Richardson, who is a paraplegic and set up her cruise in collaboration with a March of Dimes group of about 12 others.'"
The Military

US Military Settles Software Piracy Claims For $50M 127

Rambo Tribble writes "The BBC reports that the U. S. government has agreed to pay software maker Apptricity $50 million to settle claims that the U.S. Army pirated thousands of copies of the firm's provisioning software. The report indicates 500 licensed copies were sold, but it came to light an army official had mentioned that 'thousands' of devices were running the software." $50 million in tax money could have paid for a whole lot of open source software development, instead.
Education

Code.org Wants Participating Students' Data For 7 Years 90

theodp writes "As part of its plan to improve computer science education in the U.S., the Mark Zuckerberg and Bill Gates-backed Code.org is asking school districts to sign a contract calling for Code.org to receive 'longitudinal student achievement data' for up to seven academic years in return for course materials, small teacher stipends, and general support. The Gates Foundation is already facing a backlash from the broader academic community over attempts to collect student data as part of its inBloom initiative. The Code.org contract also gives the organization veto power over the district teachers selected to participate in the Code.org program, who are required to commit to teaching in the program for a minimum of two school years."
Government

FOIA: NSA Contracts Stored In Paper Files, Unsearchable, Unindexed 114

v3rgEz writes "Wish you were a little more organized? Have trouble finding that archived contract when you actually need it? Don't feel too bad: The National Security Agency has the same problem, claiming that its contract database is stored manually and impossible to search by topic, category, or even by vendor in most cases."
United Kingdom

UK Gov't Plans To Censor "Extremist" Websites Via Orders To ISPs 208

Not content with blacklisting certain kinds of pornography, writes an anonymous reader, according to this news from The Guardian, "The UK government is to order broadband companies to block extremist websites and empower a specialist unit to identify and report content deemed too dangerous for online publication. The crime and security minister, James Brokenshire, said on Wednesday that measures for censoring extremist content would be announced shortly. The initiative is likely to be controversial, with broadband companies already warning that freedom of speech could be compromised."

Slashdot Top Deals