Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Illinois University Restricts Access To Social Media, Online Political Content

    onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.

    101 comments | yesterday

  • Finding an ISIS Training Camp Using Google Earth

    An anonymous reader writes: Terrorist organization ISIS has been in the news a lot lately for their hostile activities in Iraq and Syria. They've also been very active online, posting propaganda and photos on various social networking sites to try to recruit more members. Frequently, they'll have pictures of themselves in nondescript locations — but even carefully selected images give clues to a real location. Citizen journalists at Bellingcat analyzed a group of these photos, comparing buildings and bridges in the background to images from Google Earth. With very little to go on, they were able to pinpoint the location of a terrorist training camp.

    107 comments | yesterday

  • Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

    Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

    48 comments | yesterday

  • UK Police Warn Sharing James Foley Killing Video Is a Crime

    An anonymous reader points out that UK authorities have warned that sharing the video of the James Foley murder could lead to prosecution under anti-terror laws. Scotland Yard has warned internet users they could be arrested under terrorism legislation if they viewed or shared the video of James Foley's murder, as Twitter and YouTube attempted to remove all trace of the footage from the web. Twitter suspended dozens of accounts that published the graphic footage while YouTube tried to remove several copies of the video, which was first uploaded on Tuesday night. Twitter CEO Dick Costolo tweeted: "We have been and are actively suspending accounts as we discover them related to this graphic imagery. Thank you." The unprecedented social media clampdown came as the Metropolitan police warned that even viewing the video could constitute a criminal offence in the UK. The force said in a statement: "The MPS counter-terrorism command (SO15) is investigating the contents of the video that was posted online in relation to the alleged murder of James Foley. We would like to remind the public that viewing, downloading or disseminating extremist material within the UK may constitute an offence under terrorism legislation."

    370 comments | yesterday

  • Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques

    benrothke writes When I got a copy of Social Engineering in IT Security Tools, Tactics, and Techniques by Sharon Conheady, my first thought was that it likely could not have much that Christopher Hadnagy didn't already detail in the definitive text on the topic: Social Engineering: The Art of Human Hacking. Obviously Hadnagy thought differently, as he wrote the forward to the book; which he found to be a valuable resource. While there is overlap between the two books; Hadnagy's book takes a somewhat more aggressive tool-based approach, while Conheady take a somewhat more passive, purely social approach to the topic. There are many more software tools in Hadnagy; while Conheady doesn't reference software tools until nearly half-way through the book. This book provides an extensive introduction to the topic and details how social engineering has evolved through the centuries. Conheady writes how the overall tactics and goals have stayed the same; while the tools and techniques have been modified to suit the times. Keep reading for the rest of Ben's review.

    45 comments | 2 days ago

  • Interviews: Andrew "bunnie" Huang Answers Your Questions

    A while ago you had a chance to ask Andrew "bunnie" Huang about hardware, hacking and his open source hardware laptop Novena. Below you'll find his answers to those questions.

    31 comments | 2 days ago

  • 51% of Computer Users Share Passwords

    An anonymous reader writes Consumers are inadvertently leaving back doors open to attackers as they share login details and sign up for automatic log on to mobile apps and services, according to new research by Intercede. While 52% of respondents stated that security was a top priority when choosing a mobile device, 51% are putting their personal data at risk by sharing usernames and passwords with friends, family and colleagues. The research revealed that consumers are not only sharing passwords but also potentially putting their personal and sensitive information at risk by leaving themselves logged in to applications on their mobile devices, with over half of those using social media applications and email admitting that they leave themselves logged in on their mobile device.

    115 comments | 3 days ago

  • New HP Laptop Would Mean Windows at Chromebook Prices

    New submitter nrjperera (2669521) submits news of a new laptop from HP that's in Chromebook (or, a few years ago, "netbook") territory, price-wise, but loaded with Windows 8.1 instead. Microsoft has teamed up with HP to make an affordable Windows laptop to beat Google Chromebooks at their own game. German website Mobile Geeks have found some leaked information about this upcoming HP laptop dubbed Stream 14, including its specifications. According to the leaked data sheet the HP Stream 14 laptop will share similar specs to HP's cheap Chromebook. It will be shipped with an AMD A4 Micro processor, 2GB of RAM, 32GB of flash storage and a display with 1,366 x 768 screen resolution. Microsoft will likely offer 100GB of OneDrive cloud storage with the device to balance the limited storage option.

    215 comments | 3 days ago

  • Delaware Enacts Law Allowing Heirs To Access Digital Assets of Deceased

    An anonymous reader writes Ars reports: "Delaware has become the first state in the U.S .to enact a law that ensures families' rights to access the digital assets of loved ones during incapacitation or after death." In other states, the social media accounts and email of people who die also die with them since the companies hosting those accounts are not obligated to transfer access even to the heirs of the deceased. In Delaware, however, this is no longer the case. The article notes that even if the deceased was a resident of another state, if his/her will is governed by Delaware law, his/her heirs will be allowed to avail of the new law and gain access to all digital assets of the deceased.

    82 comments | 4 days ago

  • Hackers Steal Data Of 4.5 Million US Hospital Patients

    itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.

    111 comments | 4 days ago

  • The Royal Society Proposes First Framework For Climate Engineering Experiments

    Jason Koebler writes The Royal Society of London, the world's oldest scientific publisher, has unveiled a proposal to create the first serious framework for future geoengineering experiments. It's a sign that what are still considered drastic and risky measures to combat climate change are drifting further into the purview of mainstream science. The scientific body has issued a call to create "an open and transparent review process that ensures such experiments have the necessary social license to operate."

    170 comments | 4 days ago

  • EFF's Cell Phone Guide For US Protesters

    An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."

    82 comments | about a week ago

  • Email Is Not Going Anywhere

    An anonymous reader writes: It seems the latest trend sweeping the online world is the idea that email is on its way out. Kids are eschewing email for any of the hundreds of different instant messaging services, and startups are targeting email as a system they can "disrupt." Alexis C. Madrigal argues that attempts to move past email are shortsighted and faddish, as none of the alternatives give as much power to the user. "Email is actually a tremendous, decentralized, open platform on which new, innovative things can and have been built. In that way, email represents a different model from the closed ecosystems we see proliferating across our computers and devices. Email is a refugee from the open, interoperable, less-controlled 'web we lost.' It's an exciting landscape of freedom amidst the walled gardens of social networking and messaging services." Madrigal does believe that email will gradually lose some of its current uses as new technologies spring up and mature, but the core functionality is here to stay.

    235 comments | about a week ago

  • Posting Soccer Goals On Vine Is Illegal, Say England's Premier League

    New submitter JonnyCalcutta writes: The football Premier League in England is warning about posting clips of goals on online services such as Vine and Twitter. The claim is that posting these clips is "illegal under copyright laws." I'm naturally dubious about blanket statements from rightsholders already known to push the truth, especially concerning such short clips, but I don't know enough about copyright law to understand the implications fully. Is it illegal? What can they actually do about it? Does adding commentary give the uploader any rights to post?

    226 comments | about a week ago

  • Web Trolls Winning As Incivility Increases

    mdsolar sends this story from the NY Times: The Internet may be losing the war against trolls. At the very least, it isn't winning. And unless social networks, media sites and governments come up with some innovative way of defeating online troublemakers, the digital world will never be free of the trolls' collective sway. That's the dismal judgment of the handful of scholars who study the broad category of online incivility known as trolling, a problem whose scope is not clear, but whose victims keep mounting. "As long as the Internet keeps operating according to a click-based economy, trolls will maybe not win, but they will always be present," said Whitney Phillips, a lecturer at Humboldt State University and the author of This Is Why We Can't Have Nice Things, a forthcoming book about her years of studying bad behavior online. "The faster that the whole media system goes, the more trolls have a foothold to stand on. They are perfectly calibrated to exploit the way media is disseminated these days."

    456 comments | about a week ago

  • The Benefits of Inequality

    New submitter MutualFun sends this article from Science News: Which would you prefer: egalitarianism or totalitarianism? When it comes down to it, the choice you make may not be as obvious as you think. New research suggests that in the distant past, groups of hunter-gatherers may have recognized and accepted the benefits of living in hierarchical societies, even if they themselves weren't counted among the well-off. This model could help explain why bands of humans moved from largely egalitarian groups to hierarchical cultures in which social inequality was rife.

    254 comments | about two weeks ago

  • Where are the Flying Cars? (Video; Part One of Two)

    Detroit recently hosted the North American Science Fiction Convention, drawing thousands of SF fans to see and hear a variety of talks on all sorts of topics. One of the biggest panels featured a discussion on perhaps the greatest technological disappointment of the past fifty years: Where are our d@%& flying cars? Panelists included author and database consultant Jonathan Stars, expert in Aeronautical Management and 20-year veteran of the Air Force Douglas Johnson, author and founder of the Artemis Project Ian Randal Strock, novelist Cindy A. Matthews, Fermilab physicist Bill Higgins, general manager of a nanotechnology company Dr. Charles Dezelah, and astrobiology expert Dr. Nicolle Zellner. This video and the one you'll see tomorrow show their lively discussion about the economic, social, and political barriers to development and adoption of affordable flying cars. (Alternate Video Link)

    107 comments | about two weeks ago

  • A Look At Advanced Targeted Attacks Through the Lens of a Human-Rights NGO

    An anonymous reader writes New research was released on cyber-attacks via human-rights NGO World Uyghur Congress over a period of four years. Academic analysis was conducted through the lens of a human-rights NGO representing a minority living in China and in exile when most targeted attack reports are against large organizations with apparent or actual financial or IP theft unlike WUC, and reported by commercial entities rather than academics. The attacks were a combination of sophisticated social engineering via email written primarily in the Uyghur language, in some cases through compromised WUC email accounts, and with advanced malware embedded in attached documents. Suspicious emails were sent to more than 700 different email addresses, including WUC leaders as well as journalists, politicians, academics and employees of other NGOs (including Amnesty International and Save Tibet — International Campaign for Tibet). The study will be presented at USENIX on August 21, and the full paper is already available.

    25 comments | about two weeks ago

  • Twitter Reports 23 Million Users Are Actually Bots

    An anonymous reader writes: In its most recent quarterly report to the Securities and Exchange Commission, Twitter disclosed that approximately 8.5% of its users are actually bots. Some of these 23 million bots were created to make revenue-generating URLs, others were created to collect followers that would later be sold to whoever needs a ready audience, and a few were created to mimic stereotypes just for fun. Now that Twitter is a public company, some wonder if these bots help or hinder Twitter's stock value.

    84 comments | about two weeks ago

  • Online Tool Flagged Ebola Outbreak Before Formal WHO Announcement

    Taco Cowboy (5327) writes Nine days before the announcement from WHO regarding the Ebola outbreak in West Africa, an online tool had the incident flagged. HealthMap, a team of 45 researchers, epidemiologists and software developers at Boston Children's Hospital founded in 2006, hosting an online tool that uses algorithms to scour tens of thousands of social media sites, local news, government websites, infectious-disease physicians' social networks and other sources to detect and track disease outbreaks. Sophisticated software filters irrelevant data, classifies the relevant information, identifies diseases and maps their locations with the help of experts. The tool was introduced in 2006 with a core audience of public health specialists, but that changed as the system evolved and the public became increasingly hungry for information during the swine flu pandemic. To get a feel of how HealthMap works, in the case of the Ebola outbreak, visit the site.

    35 comments | about two weeks ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>